text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
You'll meet three very important elements that work in partnership to create a unique exposure for the particular photo you want to create. They're the same three components whether you shoot digital or film, though some details are slightly different. The Big Three work in sync to give you just the right amount of light for your film or your sensor to capture the detail you want. A landscape has lots of detail, a silhouette very little. Your photo - your choice! Frans Lanting calls ISO the Great Enabler, which is my reason for placing it in the top position. (Frans is an amazing photographer who works for National Geographic and other prestigious nature magazines.) What he means by 'enabling' is that by changing ISO settings to make the sensor more or less sensitive to light, you get more freedom to make creative exposure choices with your shutter speed and aperture. Film is a chemical medium... the chemicals are sensitive to light. You could buy film in 24 or 36 exposures. Some film has been discontinued with the popularity of digital cameras. A sensor is electronic and sensitive to light. A DSLR has ISO settings anywhere from 100-6400. Some cameras have ISO 12800. Increasing speed (higher number) causes increased digital noise. Both film and digital sensor ISO almost always double in number. Mostly, film speed runs 50, 100, 200, 400, 600, 1600, and 3200. There are exceptions.... Such as Ilford H4 film, a bit of a black sheep with an ISO of 125... one of my favorite films. The larger the number, the more sensitive the film or sensor is to light... 800 or1600 are good settings for night shots. Typically, the less sensitive 100 or 200 ISO is for bright daylight photography. The aperture is built into the lens and the range of apertures is often different for different lenses. Your choice of a large or small opening determines how much of your image is in sharp focus. Just like the iris in your eye... the iris dilates (opens up) to let more light in and constricts (gets smaller) to decrease the light coming in. The iris can expand and contract because much of it is muscle. Think about how tiny the pupil in your eye becomes when you're in bright sunlight and how huge it gets when you've been in a dark room. The pupil is the "black hole" right in the middle of your eye. The red rose photos give you an idea of how to use your aperture. You'll want to learn more about aperture and shutter speed so you know the difference and how to use them. I used a wide aperture of f 5.6 Look at the second rose. Is it in sharp focus? A large aperture gives you a narrow depth of focus. I focused on the first rose so the one behind it's blurry. This time, I closed the aperture way down to a tiny opening of f 22. Both beautiful red roses are in focus and so is the silk. Get to know aperture here. From the rose photos, you get the idea that: If you're out shooting a mountain landscape, you'll want all the scene in focus... the foreground, middle and background. Same if you shoot architecture. But, if you're taking a portrait of your girlfriend, you'll want her in focus, and the background blurred. In a minute, you'll see that: Shutter speed is most important when we're photographing a subject in motion. Want blur? The choice is a slower shutter speed. Need to freeze action? You'll want a fast shutter speed to stop movement in it's tracks! If you're a sports photographer, your subjects are usually in motion. If you're shooting for a newspaper or magazine, you want to freeze the action. Otherwise, you can choose to be creative and blur your subjects. Try panning a moving subject - keep the subject sharp and blur the background. There's more information here about panning in the article on shutter speed. If you want to set a specific shutter speed, you can use your digital camera modes, and Shutter Priority is the one you want. Find out more about camera modes here. That means that whatever shutter speed you set... the camera will not change it. It will change your aperture to get the correct exposure WARNING: this camera mode is sometimes a bit tricky. The camera can't always supply a correct aperture. Most cameras have some kind of warning when that happens, but you may not realize and your resulting picture might be over or underexposed. Cameras have a built-in light meter to gauge the light coming in through your camera lens. Is the correct amount or do you need to make some adjustments? If you're dialed in to "Auto", the camera's going to do all the calculations and make important exposure decisions. When you look through your viewfinder, you'll see your meter, which looks very much like this... In Auto, your camera will set what it considers the correct exposure and the marker will be at 0. Your meter measures light in the scene and averages it out to 18% grey. Your camera isn't always right! There are tricky light situations and your light meter will feed you bad information. That's where exposure compensation comes into play. You're in control again. Exposure compensation allows you to dial in extra light or subtract light from the exposure your light meter sets. You can use it in Manual as well as the semi-auto digital camera modes: aperture priority , shutter priority and program mode - but not in Auto. Examples of very tricky situations: If you don't take over the wheel, your snow (and other light scenes) will be too dark and your dark or night scenes will be too light. Your camera's histogram can't be beat for nailing the exposure you want. Don't really know what a histogram is? See the little graph on the back of my camera ... to the right of the rose? This shows the luminance of all the tones in your image. Luminance just means brightness. It's the histogram I usually use, but you also have an RGB histogram that shows the color information (Red Green Blue). Your histogram tells you if you're overexposed or underexposed and need to make adjustments. Every histogram is like a fingerprint. It's unique to it's image. If you want more information, go an visit David DuChemin's blog. This is an article he wrote on exposure and metering - he gives some good information about the histogram. There's a lot of information on this page alone. Take the time to go over each of the additional pages on every subject. Exposure is the most important basic photography concept. It requires some concentration and then practice. Master it! If you get comfortable with setting your exposure, then you have more time being creative in other ways. If you botch your exposure, there's no way to recover it, especially disastrous if you shoot JPG and not RAW. Photoshop can't magically resuscitate an inferior image. To learn more about exposure and so many more aspects of photography, consider joining my photo class on exposure. Flower Photography Home › Exposure
<urn:uuid:c42579ec-06b1-4541-966b-6b80ef9dcdf3>
CC-MAIN-2018-51
https://www.shootpetals.com/exposure.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826856.55/warc/CC-MAIN-20181215105142-20181215131142-00087.warc.gz
en
0.932352
1,523
2.6875
3
Describes the value of molecular biology genetic tools in enhancing the delineation of the genetic diversity and the effects of environmental degradation on living species. Links to research, which differentiated two species of sage-grouse. Plan for an upcoming study, at the microbiological scale, of the benthic communities (including corals) that reside in and around mid-Atlantic canyons, which are located at the edge of the continental shelf. Information on the Gap Analysis Program in Ohio, a geographic approach to planning for biological diversity by mapping native aquatic and terrestrial animal species and natural communities on present-day conservation lands. A web-based Federal mapping resource for species occurrence data in the United States and its Territories. Includes records for most living species found in the US. Explains how you can contribute information. Change in streams accompanying land and water use may affect benthic invertebrate assemblage composition and structure through changes in density of invertebrates or taxa richness, the number of different species living in the stream.
<urn:uuid:c21d54ea-cf3d-40cc-8b69-6bfac1b0382c>
CC-MAIN-2015-48
http://www.usgs.gov/science/science.php?term=1089&order=alpha&b=0&n=20
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450715.63/warc/CC-MAIN-20151124205410-00104-ip-10-71-132-137.ec2.internal.warc.gz
en
0.902841
210
3
3
Coloring page 08 space experiments Please use Forest Friendly paper for printing. |08 space experiments - Images for schools and education - teaching resources| |Category: Home > Coloring page Space exploration > Coloring page Exploring space > 08 space experiments| |Coloring page, drawing, picture, school, education, primary school, educational image: 08 space experiments| |Keywords: 08 space experiments, space, moon, planet, star, astronaut, | --- Image information --- These pages brought to you by the Coalition for Space Exploration, a collaborative effort that seeks to generate momentum and enthusiasm for the Vision by sharing the excitement and tangible benefits of our space program with the general public and our nation’s leaders. Kids, parents, and teachers can find more information and activities and even ask astronauts questions about space travel at www.discoverspace.org. All images can be used for private educational, non-commercial purposes. Plz feel free to contact us for more information.
<urn:uuid:4d364971-d617-44be-9eb0-565e84fbd7e0>
CC-MAIN-2014-10
http://www.edupics.com/coloring-page-08-space-experiments-i4201.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011131391/warc/CC-MAIN-20140305091851-00003-ip-10-183-142-35.ec2.internal.warc.gz
en
0.815638
210
3.40625
3
printable art worksheets for high school elementary activities history students free language arts w best home decoration workshe. punctuation worksheets lesson plan on changes and sentence meaning elementary free language arts apostrophes worksheet 2 for graders math grade. analogies worksheet best images on of free analogy language arts elementary worksheets worksh. language arts lesson plans teaching lessons art worksheets cover elementary history music for high school rhythm 5 grade histo. language arts worksheets grade activities com visual elementary free printable elementar. lessons in the language arts teach your elementary school students with a physical disability reading skills writing vocabulary and critical thinking worksheets for level stud. comma worksheets proofreading for kindergarten grade in this language elementary school arts yearbook grammar graders exer. elementary art history worksheets worksheet fun language arts picture lesson plans high school ar. all about me questions language arts worksheets elementary school. worksheets for elementary students free homework kindergarten printable puzzle worksheet on animals in fun school language arts workshee. language art worksheets for grade analysis worksheet elementary arts interesting lesson high school appreciation free teacher resources line drawing elem. language arts lesson plan template free templates elementary art school worksheets elemen. attitude worksheets for students teamwork elementary language arts worksheet elegant lesson plans luxury best weather free kids grade langua. free school worksheets language arts elementary. free elementary grammar worksheets download them and try to solve school language arts. first grade language arts worksheets free elementary literacy. light shadow student practice page handout art worksheets elementary free language arts for grade printable pract. worksheets elementary the best image collection download and share free printable language arts w. double avoiding negatives worksheet answers the best worksheets elementary school language arts negative drawing conclusions grade image collections choice workshee. fun language arts worksheets writing activities for grade ma lessons middle school first elementary l. language medium to large size of trending free history worksheets resource for middle art lesson plans plan therapy elementary teachers printable arts tren. language arts worksheets middle school worksheet for students collection of download them free printable elementary workshe. my cent word free printable vocabulary term worksheet for kids in elementary school grades 1 3 language ar. computer lab worksheets for elementary back to school fun worksheet 2 snapshot image of grade free printable language arts ele. printable art worksheets for high school line elements of worksheet elementary middle language arts free bundle wor. the educational app elementary school math language arts and science worksheets is designed for first to fifth grade students provides free printab. free language arts lesson plans elementary new best for teachers worksheets practice super languag. 1 opposite words worksheets antonyms free printable grade elementary language arts primary school maths image collections 2 comprehension. worksheets arts elementary curriculum map interim assessment free printable language fi. grammar worksheets for elementary school printable free library download and print on language arts transform grade workshe. 5 language downs k databases program complete free elementary arts worksheets slide. sequencing worksheets have fun teaching sequence worksheet 2 writing free elementary language arts printable sequ. new worksheets for k 5 education world elementary school language arts word family. quiz worksheet free printable worksheets made by teachers find this pin and more on language arts elementary ideas school. nouns verbs adjectives reading language arts elementary worksheets and school. experiment free grade science worksheets solubility 7 library for elementary school language arts worksheet factors answers. math worksheets printable elementary free for grade language arts lang. free health worksheets for elementary students worksheet language arts elementa.
<urn:uuid:79e312f8-32a7-4704-98ca-449c0907430a>
CC-MAIN-2019-09
http://prosib.info/elementary-language-arts-worksheets/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489729.11/warc/CC-MAIN-20190219081639-20190219103639-00228.warc.gz
en
0.812037
810
3
3
Published Tuesday, February 13, 2018 at: 7:00 AM EST "Fake news" has exacted a high cost to American culture and political discourse, but the internet fakery that costs you time and money is phishing, emails diabolically aimed to trick you into opening your personal data to crooks and miscreants. Phishing is the practice of emailing people purporting to be a reputable company to fool people into revealing passwords, credit card numbers, contacts, emails, internet accounts, and your most personal digital data. It's rampant. Whether you're using a smartphone, tablet, or computer, here are some tips for protecting yourself: Reply email address. In this phishing email, the reply address at the top left says "Microsoft support," but if you look closer, the reply email address is "[email protected]" and that is not a Microsoft address. The "bn" suffix is the internet country code for Brunei, and that's another telltale sign of fraud. Clever phishing emails often fake reply addresses in other ways. The easiest way to verify a reply email address is to double click on it and look at its properties. If the email purports to be from Microsoft or Google, will hitting reply send an email to a Microsoft or Google email account? If not, it's fake. Links. Don't click on links in a suspicious email without being deliberate. The link could be a malicious website. Right click on the link and check its properties and see if the link goes to the company. Slow down. The grammar, misspelling, bad links, and other telltale signs are easily overlooked when you're in a rush, and that's perhaps the reason why people become ensnared by phishing emails. Verify before you trust. Trust but verify works for some things but not with internet security. First verify and then you can trust. Secure Software. Microsoft and Apple release updates to computer operating systems continually and those are essential to staying secure. Anti-virus and anti-malware programs are also essential and they need to be kept updated with the latest fixes. This article was written by a professional financial journalist for Trustmont Group and is not intended as legal or investment advice.
<urn:uuid:73553678-b016-4aaa-a89f-405c2a95bde5>
CC-MAIN-2022-05
https://trustmontgroup.com/index.php?option=com_apicontent&view=fbclist&id=4191&Itemid=110
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302715.38/warc/CC-MAIN-20220121010736-20220121040736-00472.warc.gz
en
0.940304
590
3.046875
3
As you make your list of things to buy for your new fitness goals, add a pedometer to that list so you can track the number of steps you walk each day. Increasing your steps is an easy way to burn calories and improve your health. An eventual goal of 10,000 steps per day is an excellent target to focus on, even if that seems insurmountable at the moment. You can build up to it gradually. Pedometers are available at sports stores in many styles. A very basic mechanical pedometer simply counts your steps, while digital models have a variety of features. Some digital pedometers can be calibrated for the length of your stride so you can accurately determine how many miles you're walking. Ten thousand steps typically is about five miles. Remember that you're taking steps throughout the day; each one counts toward your goal. Attach your pedometer to your belt, waistband or a pocket on your pants before you begin your normal daily routine. At the end of the day, you'll see how many steps you typically take in an average day. This will include actions such as walking: - to and from your car - to the mailbox and back - around the grocery store and other stores - around your place of work or school - through the house as you do your regular activities If your lifestyle has been sedentary, you might be starting with 2,000 to 3,000 steps per day. Fitness experts consider any number below 5,000 steps per day as sedentary. Add a certain number of steps per day and increase the number on a daily or weekly basis. You might start with an extra 500 or 1,000 steps as a walk before or after work, for example, or as a walk during your lunch break. You also can sneak in extra steps throughout the day. You might: - take the stairs instead of the elevator - park your car further from entrances - get up from your desk and take a short walk in the building every hour or two - get up from the couch during commercials and walk around the room Reaching Your Goal Within a month or two, you'll be at your goal of 10,000 steps per day. You'll have reached that goal by incorporating various strategies, including taking walks and simply being more active throughout the day. Taking 10,000 steps now comes easily and naturally to you, and you wonder how you ever thought it would be difficult. You can definitely consider yourself an active person!
<urn:uuid:920db8ac-4345-49ee-8987-cde5bf01f163>
CC-MAIN-2023-40
http://playersguide.org/2014/08/28/10000-steps-per-day-a-worthy-fitness-goal-for-you/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510676.40/warc/CC-MAIN-20230930113949-20230930143949-00396.warc.gz
en
0.96409
524
2.71875
3
In terms of logistical operations, like moving a large building, constructing a shipping hard where giant ships which ship shipping ships are built, or building the world’s tallest skyscrapers, none of them seem as challenging and time-consuming as this. With over 10,000 shipping containers lost in the deep blue ocean every year, many companies and individuals undertake deep-diving recovery missions to find the sunken treasure. A great majority of these are automobiles. In December 2012, the Baltic Ace cargo ship with 1400 cars on board sunk in the Baltic Sea, which is a very busy shipping passage. The salvage operation for this disaster was started in November of 2014, with oil and 1400 wrecked cars to be recovered. This was more about eliminating an environmental risk than recovering saleable commodities. Two floating barges were used to cut sections of the wreck, with new engineering solutions required to keep the heavy load sections stable. An enormous crane did most of the heavy lifting with each part delicately sectioned to ensure no spillage to the environment. Check out the video below to see the sheer scale of efforts involved, with a finish date of August 2015.
<urn:uuid:1300f262-bd45-4179-812f-20d4e5d4e053>
CC-MAIN-2017-51
http://performancedrive.com.au/video-recovered-1400-cars-sunken-baltic-ace-ship-0810/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948592972.60/warc/CC-MAIN-20171217035328-20171217061328-00627.warc.gz
en
0.965
235
2.828125
3
On one hand, Australia has clearly committed to the energy transition: the share of coal in domestic electricity generation is constantly decreasing while the share of renewables rises. Yet on the other hand, the country defends its position as leading global exporter of coal by all possible means. It even supports the project for a new giant mine in a yet untapped area in North Queensland, just opposite the Great Barrier Reef. To defend this treasure under threat from rising temperatures, environmental groups are attempting to scupper this project while on the ground inhabitants are hoping for it to have a positive impact on employment. Why we selected this film This film is interesting because it uses the example of Australia to show us that it is not that easy to separate economic and environmental concerns. In the Latrobe Valley, the transition is difficult for local workers as several generations have lived off coal mining. Many lack the necessary skills to work in the field of renewable energy. In the Galilee Basin, where a mine with reserves of 27 billion metric tons of coal is set to be opened by Indian company Adami, environmental campaigners are fighting to stop the mining operations. Everyone condemns the hypocrisy, lack of understanding and negotiations of a country which has signed the Paris Agreement, undertaking to cut the use of coal nationally, but which is content to export coal to emerging countries which will burn it in old, polluting power stations and will take on the carbon footprint.
<urn:uuid:31682969-9eb4-4b60-bb9d-f4c75b32324f>
CC-MAIN-2019-26
https://greenpeacefilmfestival.org/en/film/australia-addicted-coal/?replytocom=42521
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999291.1/warc/CC-MAIN-20190620230326-20190621012326-00157.warc.gz
en
0.955341
284
2.78125
3
Earthquakes on the surface: earthquake location and area based on more than 14 500 ShakeMaps - Woodrow Wilson School of Public and International Affairs, Princeton University, Princeton, NJ 08544, USA Correspondence: Stephanie Lackner ([email protected]) Earthquake impact is an inherently interdisciplinary topic that receives attention from many disciplines. The natural hazard of strong ground motion is the reason why earthquakes are of interest to more than just seismologists. However, earthquake shaking data often receive too little attention by the general public and impact research in the social sciences. The vocabulary used to discuss earthquakes has mostly evolved within and for the discipline of seismology. Discussions on earthquakes outside of seismology thus often use suboptimal concepts that are not of primary concern. This study provides new theoretic concepts as well as novel quantitative data analysis based on shaking data. A dataset of relevant global earthquake ground shaking from 1960 to 2016 based on USGS ShakeMap data has been constructed and applied to the determination of past ground shaking worldwide. Two new definitions of earthquake location (the shaking center and the shaking centroid) based on ground motion parameters are introduced and compared to the epicenter. These definitions are intended to facilitate a translation of the concept of earthquake location from a seismology context to a geographic context. Furthermore, the first global quantitative analysis on the size of the area that is on average exposed to strong ground motion – measured by peak ground acceleration (PGA) – is provided. Earthquakes receive a lot of attention from the general public as well as numerous disciplines across the natural and social sciences. With the notable exception of seismology, most of them are primarily or even exclusively concerned with the surface phenomenon and the impacts of earthquakes. However, the literature commonly uses magnitude or other suboptimal measures to quantify the natural hazard of earthquakes for impact research. The physical phenomenon of strong ground motion does often not receive enough attention and the literature lacks an interdisciplinary discussion of the natural hazard of earthquake-related surface shaking. Earthquake risk communication is generally considered a high priority topic and many research and practical efforts are concerned with educating the public and improving preparation. The Southern California Earthquake Center (SCEC), for example, has started the Great California ShakeOut (Jones and Benthien, 2011), which has become an annual drill with millions of participants. The Global Earthquake Model (GEM) project is an international effort to develop a global model of earthquake risk as an open-source, community-driven project (Crowley et al., 2013, https://www.globalquakemodel.org/, last access: 10 May 2018), and the Global Seismic Hazard Map project (GSHAP) has promoted a regionally coordinated, homogeneous approach to future seismic hazard evaluation, including the production and distribution of a global seismic hazard map (Giardini, 1999). Technological progress has also allowed for the emergence of real-time seismology, which provides real-time information about an event during and in the immediate aftermath of an earthquake (Kanamori, 2008). For research on earthquake impacts, an appropriate understanding of the physical hazard of past earthquake shaking as well as access to relevant data are necessary. However, earthquake communication about past events is a relatively neglected topic and many authors struggle with the inconsistent – and sometimes inadequate – approaches in the social science literature (Kirchberger, 2017). This study utilizes USGS ShakeMap data (Wald et al., 1999) – a real-time seismology product – to create a dataset of global past shaking exposure. Natural hazard exposure maps are necessary for impact research, and they also allow one to spatially overlap the natural hazard with social variables representing vulnerability or preparedness. This study provides a discussion and quantitative analysis of global earthquake ground shaking and variables of interest that can be calculated from such data. Many different factors about an earthquake play important roles in what kind of shaking is experienced on the Earth's surface. Douglas (2003) classifies them into three categories: those related to the earthquake source (e.g., magnitude, depth, or faulting mechanism), travel path (e.g., geology can have a significant impact on attenuation), and local site conditions. The prediction, estimation, and recording of strong ground motion parameters are active fields of ongoing research and technological improvements (Douglas, 2003; Denolle et al., 2014; Wald et al., 2011; Caprio et al., 2015; Kong et al., 2016). SCEC, for example, has a Ground Motion Prediction Working Group. Strong ground motion can be expressed with different parameters, but it is commonly characterized by peak ground acceleration (PGA), peak ground velocity (PGV), and peak ground displacement (PGD). More sophisticated measures such as response spectra or Arias intensity (Arias, 1970) generally provide a better characterization of strong ground motion (Joyner and Boore, 1988), but such data are not as easily available as PGA or PGV. No individual index of strong ground motion is ideal to represent the entire frequency range, but peak ground motion parameters are considered to perform satisfactorily (Riddell, 2007). This study will focus on PGA as the ground motion parameter. However, PGA alone only provides a limited representation of ground motion. To represent the entire frequency range more appropriately a multi-parameter characterization of ground motion is commonly used (e.g., for selected earthquakes the ShakeMap product also provides response spectra maps at periods of 0.3, 1, and 3 s – according to three Uniform Building Code reference periods). Nevertheless, while appropriate in engineering, a multi-parameter approach is not reasonable for many social science applications. PGA is still widely use in earthquake engineering, and it provides the advantage of a single-valued parameter with good data availability. Expressing past shaking with PGA is also consistent with the common approach of using PGA for earthquake hazard maps. While more sophisticated approaches to calculate ground motion parameters (e.g., those employed by SCEC) than the ShakeMap methodology exist, USGS ShakeMaps are unique in providing consistent earthquake strong ground motion data for a large number of events on a global scale and for several decades. For this study 14 608 ShakeMaps of earthquakes from 1960 to 2016 have been compiled into one dataset. Each ShakeMap consists of observed instrumental ground motion parameters where available and estimates from models based on ground motion prediction equations, nearby observations, and other data, where no observations exist. The ShakeMap methodology is continuously improved and documented in numerous publications, which can be found through the USGS website (https://earthquake.usgs.gov/data/shakemap/background.php, last access: 10 May 2018). In December 2016 all online available USGS ShakeMaps were collected and combined into one dataset for this study. The ShakeMaps were combined with the GPWv4 gridded Land and Water Area (CIESIN, 2016) to restrict the ShakeMaps to only on surface land shaking. Except for one event in 1923, ShakeMaps generally exist starting from 1960, and they are systematically available from 1973 onwards. The representativeness of the sample of earthquake ground shaking in the dataset compared to all earthquake ground shaking in the time period is assessed by matching the ShakeMap data to two different earthquake lists, which allows a cross validation. Since not every earthquake has a ShakeMap, a reference dataset of all (or at least almost all) earthquakes since 1960 is required. For this purpose the ANSS Comprehensive Earthquake Catalog (ComCat, 2017) is used. More information on the ComCat data can be found in Appendix A. Finally, the NGDC Significant Earthquake Database (NGDC/WDS, 2017) is applied as an additional reference dataset and to assign impacts to events (the impact data will be used in future research). The combination of the three earthquake data sources can help to identify how representative the aggregated ShakeMap dataset is for all global earthquake ground shaking. Details on how the three datasets were linked with each other are described in Appendix B. As a result, the dataset can be considered to contain all relevant global earthquake ground shaking from January 1973 to October 2016, a reasonable sample from 1970 to 1972, and shaking from individual devastating events from 1960 to 1969. However, the sample is more complete in later years, in that it contains more weaker events. For smaller events the dataset has a bias towards North American events, which can be avoided by restricting the sample to only events with a magnitude of 5.5 or greater. However, reducing this threshold to 4.5 is generally sufficient to avoid this bias. Details on the representativeness of the ShakeMap dataset can be found in Appendix C. Past earthquake shaking can be approached from two different angles, either comparing different locations or comparing different events. First, we can consider the exposure of a location or region to past earthquake shaking of an individual event or to several events over a time period. The constructed dataset allows one to visualize the global past shaking exposure. Hsiang and Jina (2014) term the average annual pixel exposure to maximum cyclone wind speeds the “cyclone climate”. This representation of past exposure to a natural hazard can be particularly useful in social science applications. In a similar way, the average annual pixel exposure to maximum PGA could be called the earthquake shaking “climate”. Since earthquakes are not a climate phenomenon and past exposure maps are not equivalent to future hazard maps, it is more reasonable to refer to it as the earthquake shaking history. Figure 1 illustrates the earthquake shaking history of 1973–2015, the period for which the dataset is found to be representative of overall shaking in the specific time range. However, some limitations of ShakeMaps become apparent in Fig. 1a: (i) the cutoff edges of the individual ShakeMaps are visible, (ii) some unrealistically high outliers might skew individual pixels, and (iii) low shaking/impact events are more likely to receive a ShakeMap when they are in areas of interest (e.g., cities in Australia). The visualization in Fig. 1b avoids these limitations by restricting to shaking above a PGA of 10 %g and showing the number of events above that threshold. Earthquake hazard maps are a common way to illustrate where and what strength of future earthquake shaking is likely to occur. Such maps are usually expressed in PGA that is expected to be exceeded at a certain likelihood within a given number of years (e.g., Shedlock et al., 2000). Using the maximum shaking over time instead of the average annual shaking allows one to compare the actually experienced shaking (or estimates of it) with the probabilistic estimates from hazard maps. To illustrate this potential application of ShakeMap data, a comparison of the earthquake maximum shaking history with the GSHAP global earthquake hazard has been conducted and can be found in Appendix E. Second, the comparison of different past events can be the main objective instead of comparing individual regional (or single coordinate) exposures. Two crucial aspects of a particular earthquake are the location and the area affected by the shaking. It is, however, not straightforward to define these concepts. An earthquake is caused by the rupturing of a fault segment (illustrated in Fig. 2). The earthquake originates at the hypocenter, but waves radiate out from the whole segment of the fault that ruptures (rupture area). This results in the epicenter not being necessarily at the center of the strong ground motion area. In the figure this depends on the size of the rupture and the dip angle of the fault. Other factors such as local site conditions and water bodies also affect where strong ground shaking occurs. From a social science perspective the surface projection of the rupture area could actually be considered to be more relevant than the epicenter – which is the surface projection of the hypocenter. However, there are numerous other factors that influence surface shaking and even two earthquakes on the same fault can behave very differently due to their underlying rupture processes. Earthquake location is currently primarily discussed within and from the context of seismology. However, a translation to a geographic language would often be beneficial. Emergency response, hazard management, and regional planning often rely heavily on geographic parameters and the use of geographic information systems (GIS). Tobler (1970) coined the “first law of geography” stating that “everything is related to everything else, but near things are more related than distant things”. It is therefore not surprising that the location is information about an earthquake that is of great interest to the general public and disaster management. Furthermore, the consideration of spatial effects (e.g., spatial autocorrelation and spatial heterogeneity) can be crucial in econometric models (Anselin, 2007) in the social sciences and requires to assign a location to each observation. Thus earthquake location can also be a crucial parameter in social science applications. The currently most commonly used and calculated points to characterize earthquake location are the hypocenter and the epicenter. However, from a strong ground motion perspective they are not the most interesting points. The epicenter is not necessarily a good proxy for where strong ground motion occurs, and it is thus not the optimal location choice for many applications. When the epicenter is offshore it can also be far away from the strong shaking region, and it is not straightforward to assign the event to a country or region. Another earthquake location is the centroid location, such as those calculated by the CMT project (Ekström et al., 2012). The centroid location is the average location in space and time of the seismic energy release. However, the centroid location does also not account for water bodies and its surface projection can thus often be far from the strong shaking area as well. In disaster management and planning as well as social science applications, the desired location parameter should summarize the spatial component of earthquake ground motion. While location information about earthquakes is often supplemented with qualitative statements (e.g., “the epicenter is X km offshore” or “the most affected region is X km south of city Y”), the additional information does not necessarily enhance the digestion of information. This is particularly the case when the information provides details about the complexities of a rupture process. Details such as rupture length or directivity are important aspects about an earthquake in seismology and earthquake engineering, but they do not necessarily facilitate a better understanding for individuals without the respective backgrounds and can even contribute to confusion. A simple geographic parameter that summarizes the shaking of an earthquake can facilitate a translation from seismology and engineering to a geographic context. Since many decision makers are familiar with such a geographic context, this can enhance digestion of information by relevant individuals and groups. Moreover, in some social science applications it is essential to be able to assign coordinates to an individual event. Since the phenomenon of interest in these applications is ground shaking, the purpose of this location is to summarize shaking. So far, no formal definitions for earthquake locations based on ground motion parameters exist. This study will introduce two surface points other than the epicenter, both of which can be considered different definitions of the earthquake surface location: the shaking centroid and the shaking center. Both definitions are formulated such that they can be applied to any ground motion parameter. Nevertheless, this study specifically applies them to ShakeMap PGA data. The “shaking centroid” (xSCt,ySCt) will be defined as the average location (xi,yi) of shaking si weighted by the squared shaking for a given ground motion parameter, only including locations that experience at least 50 % of the maximum shaking smax of that event. Restricting the included locations to the area with at least 50 % of the maximum shaking is chosen for two reasons. First, it helps to avoid the problem that ShakeMaps are usually cutoff before the shaking has completely attenuated. Second, it ensures that the shaking centroid represents a location that summarizes best the strong shaking area of the particular event. The weaker shaking area is generally of less interest. The squares of the ground motion parameter are also chosen to allow for a stronger weight of the high shaking locations. Just like the epicenter, the shaking centroid could be a location that does not actually experience any shaking (when it falls in water) or only relatively low shaking itself. In contrast, the “shaking center” (SC) is the point on the surface which experiences the strongest shaking for a given ground motion parameter. The calculation of the shaking center provides a challenge when a ShakeMap has more than one location that shares this maximum value. Details on the here applied approach to handle this issue are described in Appendix D. Figure 3 provides an example of a ShakeMap with the three different surface locations. The shaking center and shaking centroid generally do not coincide with the epicenter. In particular when the epicenter lies in water, it will definitely be distinct from the shaking center and it will very likely also be distinct from the shaking centroid. The problems with the definitions of the shaking center and the shaking centroid are that (i) they depend on the choice of a ground motion parameter and (ii) any map of a ground motion parameter – and therefore also the shaking center and the shaking centroid – cannot be as accurately evaluated as the epicenter. However, the shaking center and shaking centroid are locations of greater interest for many applications. Table 1 compares the locations of epicenter, shaking center and shaking centroid for PGA as the ground motion parameter for all 12388 ShakeMaps in the dataset with magnitude 4.5 or greater. About 57 % of those earthquakes have their epicenter in water and some of those events do not cause any shaking. Among the 11 510 events that do cause shaking about 54 % have their epicenter in water. For the 46 % of those earthquakes that have their epicenter on land, the average distance between the epicenter and the shaking center is 7 km. This distance increases to 53 km when the epicenter is in water. The full distribution of shaking center to epicenter distances is shown in Fig. 4. The PGA at the epicenter is on average 13 % weaker than at the shaking center, given that the epicenter is on land and experiences any shaking (5285 events). In terms of the area affected by an earthquake, the literature so far has mainly referred to the area exposed to certain levels of a qualitative intensity scale for individual events. There has been no study on the global pattern of the area that is on average exposed to strong ground motion parameters for a given earthquake. This study provides the first summary of global earthquake area size. The size of the area that experiences strong ground motion from an earthquake is strongly dependent on the regional geology. Figure 5 illustrates how different the size of the area exposed to strong ground motion can be across the world. In particular it shows the average size of the area that was exposed to at least 90 % of the maximum PGA within each grid cell for the time period 1973–2015 (see Fig. C1 in Appendix C for reference to how many earthquakes are used in each grid cell to calculate the average). For example, earthquakes along the west coast of South America can generally be felt at far wider distances from the epicenter than earthquakes on the west coast of North America. The west coast of South America in Fig. 5 also illustrates how earthquakes close to the coast are spatially smaller, since the ocean restricts the shaking pattern to one side. Water bodies are crucial in defining the area that can experience ground motion, and therefore also for the area exposed to strong ground motion. Earthquake magnitude and distance are two of the most important factors in ground motion prediction equations. It is therefore intuitive that magnitude affects the area exposed to a particular shaking threshold, and it is indeed easy to see this relationship in the data. However, as Fig. 6d shows, other factors (e.g., geology and water bodies) introduce significant noise in this relationship and make it thus less straightforward. This highlights the importance of other factors than magnitude in determining surface shaking. A more detailed summary of average shaking areas can be found in Tables 2 and 3. The tables provide the average area exposed to 90 % of the maximum PGA for each ShakeMap and the average area exposed to at least 10 %g PGA, separately by magnitude and maximum PGA level. The total number of earthquakes in each category, which is used to calculate the average, can be found in Table C1. A stronger magnitude event – keeping everything else about the earthquake constant (i.e., depth, geology, fault type, hypocenter location) – will result in larger areas exposed to any given PGA level. This is generally confirmed by the data in Table 3. A high-magnitude event can only have a low maximum PGA level when the epicenter is in water. It is, however, likely that a still large area would be exposed to these relatively low shaking values. Such events are responsible for the very large areas exposed to 90 % of the maximum PGA in Table 2 and Fig. 6b. While an increase of the area above a fixed PGA threshold with increasing magnitude is intuitive, Table 2 and Fig. 6b suggest that also the area exposed to a fixed percentage of the maximum PGA increases with magnitude. This is most likely due to the fact that large magnitude events tend to turn the large amount of energy released not necessarily into stronger shaking, but into larger areas experiencing strong shaking. A similar relationship does not seem to hold for maximum PGA and area (see Fig. 6a). This can be interpreted as the size of the area exposed to a certain percentage of the maximum PGA being independent of the maximum PGA, but dependent on magnitude. Earthquake magnitude therefore seems to contain more information about the spatial extent of an earthquake than the maximum PGA. The relationship between magnitude and the area exposed to at least 90 % of the maximum PGA could potentially affect the global pattern of attenuation illustrated in Fig. 5. However, the same figure only for earthquakes with magnitude between 5.5 and 6.5 (see Fig. C2) confirms the overall pattern. This study provides a discussion of earthquake shaking data for an interdisciplinary audience and with applications in earthquake impact research, particularly with the social sciences in mind. It constructs and utilizes a comprehensive dataset of global strong ground motion data to define new concepts of earthquake location as well as strong shaking area to help summarize the natural hazard of surface shaking. These concepts can help to facilitate a more effective communication about the natural hazard of past earthquakes that is focused on surface shaking. The concept of a shaking center and a shaking centroid are introduced, which can often be better suited location definitions for an earthquake than the epicenter in social science applications and in disaster management. More than 14 500 individual ShakeMaps were compiled into one comprehensive dataset. The dataset can be considered to contain all relevant global earthquake ground shaking from January 1973 to October 2016, a reasonable sample from 1970 to 1972, and shaking from individual devastating events from 1960 to 1969. Observed or estimated shaking data of past events can be used to compare hazard maps with maps of actual shaking occurrences. An example of this application can be found in Appendix E, which compares the maximum PGA exposure for 1973–2015 according to the ShakeMap data with the GSHAP hazard map of probabilistic estimates. The dataset is applied to calculate the shaking center and shaking centroid for all events in the dataset. The shaking center is particularly useful to assign a country to an event, since it is always on land. The shaking centroid, in contrast, is generally the best representation of the overall location of shaking. It is the most reasonable choice for the assignment of an event to a general region or to use as the location in spatial regression models or other statistical tools. The CMT centroid location could also be a relatively good predictor of the location of strong surface shaking. An interesting future extension of this research would therefore be to combine the ShakeMap dataset with the CMT data to compare the shaking center and shaking centroid with the CMT centroid location. Finally, the dataset is also applied to calculate a number of different shaking area variables. This work provides the first summary of global earthquake strong ground motion area size. The average strong ground motion area is shown to be a useful tool to visualize attenuation across different regions of the world. The constructed dataset can be used in future research to determine the short-term and long-term impacts of past earthquakes. This will allow us to investigate the impacts of earthquakes based on measures that represent the natural hazard of interest: earthquake ground shaking. The data sources used in this study are freely available at the USGS website (https://earthquake.usgs.gov/data/shakemap/ and https://earthquake.usgs.gov/data/comcat/, last access: 10 May 2018; ComCat, 2017), the NGDC website (https://www.ngdc.noaa.gov/hazard/earthqk.shtml; NGDC/WDS, 2017), and the GSHAP website (http://static.seismo.ethz.ch/GSHAP/global/, last access: 10 May 2018). The code that was used to process the data and create the tables and figures, as well as more details about the raw data, is available at the following GitHub repository: https://github.com/slackner0/EQSurface. For this work the list of all events with magnitude 4.5 or higher that occurred between January 1960 and October 2016 is used. Additionally, events below magnitude 4.5 during that time period were added if they do have a ShakeMap according to ComCat. This results in a list of 225 429 earthquakes. The data were downloaded in March 2017 with the ComCat online access tool (https://earthquake.usgs.gov/earthquakes/search/, last access: 10 May 2018). The threshold of 4.5 is chosen since earthquakes outside the US below this magnitude are not as systematically recorded in ComCat. We thus have a reliable but not entirely complete list of global earthquakes of magnitude 4.5 and higher for the chosen years. Since some of the earthquake data sources in ComCat only provide data starting from certain years, the data are more complete for more recent years. As the analysis will show, particularly for the time period 1960–1972, the ComCat list cannot be considered complete. A more likely problem than the lack of events in the list are possible duplicate events in the list. Earthquakes often occur in clusters. A big event might have foreshocks or aftershocks. Sometimes two different earthquakes occur at very close proximity and less than a minute apart. However, a close investigation of the ComCat list reveals that some of those particularly similar events in terms of timing, location, and magnitude might actually not be separate events, but the same event with slight differences in the estimated source parameters from different data contributors. I exclude 33 events from the GCMT network for which another event within 1.5 s at a distance of under 3∘ exists, since those events seem to be duplicates. Furthermore, I also exclude six events that do not fulfill these criteria but have been manually identified as most likely duplicates. There are, however, most likely more duplicate events, as the representativeness analysis shows. After excluding these events, we have a list of 225 390 events which can be uniquely identified by the combination of the following parameters (rounded to specific accuracies in parentheses): timing (to the minute), magnitude (0.1), longitude (1), latitude (0.25), and depth (25). The first step is to combine the ComCat earthquake list with the ShakeMap dataset. Unfortunately, the ComCat list and the ShakeMap data are often updated separately from each other and earthquake source parameters (e.g., magnitude, timing, location) can therefore differ between a ComCat event and the ShakeMap for the same event. Also the earthquake “ID” does not always agree between the ShakeMap and the corresponding ComCat event. The differences in source parameters stem either from the data providing network updating the parameters or from different networks being chosen for the ShakeMap and the ComCat with slightly deviating parameters. Sometimes the magnitude type might also be different, resulting in different magnitude values. When possible events from the datasets are matched by timing (to the minute), magnitude (rounded to 0.1), longitude (rounded to 1), latitude (rounded to 0.25), and depth (rounded to 25). Such a match is possible for 7882 ShakeMaps. The remaining ShakeMaps are matched to the remaining ComCat events (i) if they are at most 60 s apart, at a (Euclidean) distance of at most 2∘, and have a difference in magnitude of at most 2.2 (0.7 if the ShakeMap magnitude is below 5.5), or (ii) if they occur within 2 s and at a distance of at most 2∘. If several events fulfill these criteria, the event with the least time difference and the event with the least spatial difference are identified, and if they are the same event it is assigned to the ShakeMap. Otherwise the event with the least time difference is chosen if that time difference is at most one-fifth of the next closest event (in terms of timing). If that again is not the case, the spatially closest event is chosen, given that it has a spatial distance of at most 1∘. For all so far unmatched events of relevance (high magnitude of the ShakeMap or ComCat event, or ComCat indicates that a ShakeMap should exist for an event) a manual check and potential assignment is done. For 20 events a manual assignment was necessary to match the right ComCat event and ShakeMap. This process finally results in a total of 14 592 ComCat events with ShakeMap. According to ComCat only 5310 events are supposed to have a ShakeMap. It was, however, possible to find significantly more than that on the USGS website. Nevertheless there are 127 events which are supposed to have a ShakeMap, which is missing in the dataset. Most of them are missing because they were produced after December 2016 when the ShakeMaps were downloaded and some also because the ShakeMap files were corrupted. The magnitude of 67 of those events is below 4.5 and for only three of the 127 events is the magnitude higher than 5.5. It is therefore reasonable to assume that the exclusion of these 127 ShakeMaps will not affect the representativeness of the dataset in a significant way. The second step is assigning each event from the significant earthquakes list to a ComCat event. Again, the source parameters show slight deviations and a similar approach as matching ShakeMaps with ComCat events is utilized. Each significant earthquake event is matched to a ComCat event if they are at most 90 s apart, at a distance of at most 5∘, and have a difference in magnitude under or equal to 2. If more than one ComCat event fulfills these criteria the event with the smallest time difference and spatial distance is chosen (they always agree for this dataset). However, for some events the significant earthquake list has missing timing data (second, minute, or hour). For those events, the timing has to be within the same day and the spatial difference cannot be more than 2.5∘. Additionally, 14 events were matched manually. Unfortunately some events in the significant earthquake list seem to have typos (e.g., a drop in the leading 100∘ of a longitude location). Some typos are identified manually and they are part of the 14 manual matches, but there are potentially more typos or just deviations in the data in terms of the timing. For all unmatched events with no ComCat event within 90 s, we therefore identify matches if they are within 24 h, at a distance of at most 0.2∘, and have a magnitude that deviates by at most 0.2. All but 152 of the 2130 significant earthquakes can finally be matched with ComCat events. An additional 16 events of the significant earthquake list that are not in the ComCat list were able to be matched with yet unmatched ShakeMaps. It is unlikely that excluding the remaining 136 events will bias the data in a problematic way. First, most of those events have relatively low magnitudes and are therefore not in the ComCat list (114 of the 136 events have a magnitude below 5.5). Second, 86 of the 136 earthquakes stem from the period of 1960–1972. This is a sign that the ComCat list for that period is not as complete as for later periods, which we already expect from the data availability of the ComCat data sources. Finally, considering the impact of fatalities, 91 of the 136 events caused at least 1 death, but the average among those is only 11, with a maximum of 80. After 1972, the largest number of fatalities among these events is 14. For the time period of January 1960–October 2016 we have 14 608 ShakeMaps that are matched either to a ComCat event (13 061), to a significant earthquake list event (16), or to both (1531). For those events we will use the source parameters from the ShakeMap and disregard the potentially deviating ComCat and significant earthquake list parameters. If no ShakeMap exists, the ComCat source parameters will supersede the significant earthquake list parameters in the dataset. The final ShakeMap dataset consists of 14 608 events. Table C1 summarizes the number of events in the dataset by magnitude and maximum PGA. Figure C1 provides a geographic overview of the earthquakes in the dataset by epicenter location. Figure 5 presents the geographic distribution of the average strong motion area for all events in the dataset, and Fig. C2 provides a similar representation of the data, but restricted to only events with a magnitude between 5.5 and 6.5. The combination of the three earthquake data sources can help to identify how representative the aggregated ShakeMap dataset is for all global earthquake ground shaking. The first concern is whether “big” events – in terms of either shaking or impacts – might not be in the dataset. The ShakeMap creation criteria (Allen et al., 2009) are supposed to ensure that this does not happen. However, the significant earthquake list provides us with a tool to test this. We would generally expect that a “significant” earthquake should have a ShakeMap. Indeed, 1547 significant earthquakes in our combined dataset do have a ShakeMap. We already discussed the 136 cases of significant earthquake events that could not be matched to either a ComCat event or a ShakeMap. Those events are either relatively small or from the time period of 1960–1972, suggesting that the ComCat event list is not complete for that time period. Of the 447 significant earthquake list events which have been matched to a ComCat event without a ShakeMap, 99 caused at least one fatality. This is a concern, since events with fatalities should usually have a ShakeMap. However, 84 of those events are from the time period of 1960–1972. This is not unexpected, since ShakeMaps were not systematically produced before 1973. The remaining 15 events after 1972 with fatalities but no ShakeMap have on average 3 fatalities and a maximum of 11. We can therefore expect that these events are sufficiently small to not miss a major impact event. Of the entire 447 events, 207 are from 1960 to 1972 and they therefore cause no additional concern beyond the already known unreliability of that time period. For the remaining 240 events, only 73 have a magnitude of 5.5 or higher. Many of these higher-magnitude events are in remote locations such as Antarctica or Alaska or occurred far offshore and did not cause a lot of shaking. We have overall 9780 ShakeMaps with magnitude 5.5 or greater. The 73 missing events therefore imply an error rate of 0.7 %, which is in an acceptable range. Nevertheless, we can assume that the missing events would have on average lower shaking and impacts than the included events, since such events are more likely to get attention and therefore have a ShakeMap produced. Another question is whether the ShakeMap coverage is comparable across years. To answer this question we first need to consider the reference data. As we already discussed before, the ComCat list is most likely not as complete for the time period 1960–1972 as for the years after that. In Fig. C3 we can see that the total number of events for “all earthquakes” (ShakeMap events plus ComCat events without ShakeMap) seemingly increases over time. However, this should in theory not be the case. The number of earthquakes per year should be more or less constant over years. Part of the variation is natural noise, but a lot of the increase can probably be explained by missing events for the time period 1960–1972. This becomes particularly apparent when events below magnitude 5.5 are considered. Another possible reason for the increase is that duplicates in the ComCat database are more likely for the time periods with more data contributing networks. Since additional networks were added over the years, the number of duplicate events might also increase with years. In particular the year 2011 looks suspiciously like it might hold a large number of duplicate events, not only because the number of events is exceptionally large but also because the number of events with magnitude 5.5 and without ShakeMap is surprisingly high for such a recent year. This needs to be kept in mind when comparing the number of ShakeMap events with the number of all events in Fig. C3. Nevertheless, we can clearly see that from 1960 to 1970 ShakeMaps only exist for very few selected events, all of which have fatalities. Starting in 1970, ShakeMaps generally existed and were systematically produced from 1973 onwards. In 2006/2007 the share of events with ShakeMaps drastically increases. The ShakeMap data are increasingly complete in more recent years and it is particularly incomplete before 1973 (and even more so before 1970). The extra ShakeMaps in more recent years, however, come from more and more weaker events receiving a ShakeMap. We can also confirm this with the distribution of magnitude for events with and without ShakeMap in Fig. C4. With increasing magnitude the share of ShakeMaps also increases. Most high-magnitude events do have a ShakeMap and the lower-magnitude (but above 5.5) events without ShakeMap are on average older events than those with ShakeMap. This figure also confirms that “big” events do generally have a ShakeMap and we are not missing a significant number of high-magnitude events in the ShakeMap dataset. A bigger concern is whether the ShakeMaps have a geographic bias. Since the USGS is a North American institution, we expect that ShakeMaps for low-magnitude earthquakes in North America are more likely produced than for such events from different regions of the world. Comparing global maps of the number of events in the ComCat list to the number of ShakeMaps does indeed confirm a bias towards more North American events, in particular along the US west coast. Figure C5 helps us to investigate the North America bias further. We can loosely define an event to be in North America when its epicenter has a latitude between −170 and −60 and a longitude between 25 and 70∘. We can then see that for all events since 1973, almost all ShakeMaps with magnitude under 4 are from North America and there is a strong bias towards North American events until about magnitude 4.5. Between magnitude 4.5 and 5.5 still relatively more North American ShakeMaps are available, but the bias is in a reasonable range. For events with magnitude greater than 5.5 no apparent North American bias exists. Panel a in Fig. C5 has some outliers with a much lower than expected ratio of high-magnitude events having a ShakeMap. The most pronounced outliers are even for the share of North American events being low for some relatively high-magnitude values. It is unlikely that there are actually that many high-magnitude events (particularly in North America) without ShakeMap and we are most likely seeing the effect of duplicates in the ComCat list artificially increasing the denominator. It is advised to restrict the dataset to ShakeMaps with magnitude above 4.5 or even 5.5 for many applications to avoid the North America bias. Events with a magnitude under 5.5 can still occasionally cause severe impacts. We therefore do not want to exclude all of them, particularly since the events often have a ShakeMap if they did indeed cause significant impacts. Nevertheless, it is important to be aware that the sample is geographically biased for earthquakes below the magnitude threshold of 5.5. If we only considered ShakeMaps from events with a magnitude of 4.5 or higher, our sample size would be 12 388. In the sample of 11 510 ShakeMaps with positive shaking and magnitude 4.5 or higher, 10 401 ShakeMaps have a unique maximum PGA location, 656 events have two grid cells with the maximum PGA, and 453 ShakeMaps have more than two grid cells sharing the maximum PGA. For the earthquakes with more than one grid cell as potential shaking center, it is necessary to define a consistent way to pick one of them as the shaking center. The here applied approach to tackle this problem is to incrementally add the surrounding cells of the shaking center candidate cell and calculate the average shaking value in that square. Only those shaking center candidates that reach the highest value for that measure are kept, until only one location remains. In this manner, the location with the maximum shaking that has the strongest shaking in the area surrounding it is chosen as the shaking center. This procedure reaches the edge of the ShakeMap in only 47 cases when PGA as the ground motion parameter. We then assume that the average shaking outside of the ShakeMap is the same as the average shaking of the added cells that are still in the ShakeMap at the same distance to the potential shaking center. However, for 24 of the 47 events still no unique shaking center can be found, since they occurred in small island regions and only caused shaking in very small areas (those events have on average only 17 km2 exposed to any shaking). For those events the location closest to the shaking centroid that experiences maximum shaking is chosen as the shaking center. This procedure results in a unique shaking center for all 11 510 events. In cases where this would not be sufficient, the smallest distance to the epicenter can be considered. ShakeMap data can be used to compare probabilistic shaking estimates for the future (hazard maps) with actual shaking occurrences. To illustrate this the earthquake maximum shaking history calculated here (maximum PGA exposure for 1973–2015) is compared with the GSHAP global earthquake hazard map in Fig. E1. The scale is cut off at a difference of 10 %g, presenting any higher values in the same color as a difference of exactly 10 %g. Since only limited documentation about the GSHAP data could be found, it is necessary to make some assumptions about the data before it can be combined with the ShakeMap data. In particular, (1) it is assumed that the coordinates refer to the center of each grid cell, and (2) the data for the longitude 193 are dropped due to repetition of the longitude column (longitude −167∘ is kept in the data). For this comparison, the maximum shaking history is calculated at the resolution of the GSHAP data of ∘. Each grid cell is assigned the maximum PGA value exposure that occurred anywhere in that grid cell at some point between 1973 and 2015 according to the ShakeMap data. The author declares that she has no conflict of interest. I want to thank John Mutter, Art Lerner-Lam, Douglas Almond, Amir Jina, and George Deodatis for their advice on this work. I also thank Timothy Foreman, Jesse Anttila-Hughes, and Markus Riegler for helpful comments and discussions. I am grateful to David Wald and Michael Hearne for advice on the ShakeMap data and for providing some MATLAB code that helped process the Edited by: Maria Ana Baptista Reviewed by: two anonymous referees Allen, T. I., Wald, D. J., Earle, P. S., Marano, K. D., Hotovec, A. J., Lin, K., and Hearne, M. G.: An Atlas of ShakeMaps and population exposure catalog for earthquake loss modeling, B. Earthq. Eng., 7, 701–718, https://doi.org/10.1007/s10518-009-9120-y, 2009. a Anselin, L.: Spatial Econometrics, in: A Companion to Theoretical Econometrics, Blackwell Publishing Ltd, Malden, MA, USA, 310–330, 2007. a Arias, A.: A measure of earthquake intensity, in: Seismic Design for Nuclear Power Plants, edited by: Hansen, R. J., Cambridge, MA, USA, 1970. a Caprio, M., Tarigan, B., Worden, C. B., Wiemer, S., and Wald, D. J.: Ground motion to intensity conversion equations (GMICEs): A global relationship and evaluation of regional dependency, B. Seismol. Soc. Am., 105, 1476–1490, https://doi.org/10.1785/0120140286, 2015. a Center for International Earth Science Information Network (CIESIN): Gridded Population of the World, Version 4 (GPWv4): Land and Water Area, Tech. rep., Columbia University, Palisades, NY, https://doi.org/10.7927/H45M63M9, 2016. a Crowley, H., Pinho, R., Pagani, M., and Keller, N.: Assessing global earthquake risks: The Global Earthquake Model (GEM) initiative, in: Handbook of Seismic Risk Analysis and Management of Civil Infrastructure Systems, Elsevier, 815–838, https://doi.org/10.1533/9780857098986.5.815, 2013. a Douglas, J.: Earthquake ground motion estimation using strong-motion records: a review of equations for the estimation of peak ground acceleration and response spectral ordinates, Earth-Sci. Rev., 61, 43–104, https://doi.org/10.1016/s0012-8252(02)00112-5, 2003. a, b Ekström, G., Nettles, M., and Dziewoński, A. M.: The global CMT project 2004–2010: Centroid-moment tensors for 13 017 earthquakes, Phys. Earth Planet. In., 200–201, 1–9, https://doi.org/10.1016/j.pepi.2012.04.002, 2012. a Hsiang, S. M. and Jina, A.: The Causal Effect of Environmental Catastrophe on Long-Run Economic Growth: Evidence From 6 700 Cyclones, Tech. rep., National Bureau of Economic Research, Cambridge, MA, https://doi.org/10.3386/w20352, 2014. a Joyner, W. B. and Boore, D. M.: Measurement, Characterization and Prediction of Strong Ground Motion, in: Geotechnical Special Publication, 43–102, available at: http://pubs.er.usgs.gov/publication/70014404 (last access: 10 May 2018), 1988. a Kong, Q., Allen, R. M., Schreier, L., and Kwon, Y.-W.: MyShake: A smartphone seismic network for earthquake early warning and beyond, Science Advances, 2, e1501055, https://doi.org/10.1126/sciadv.1501055, 2016. a National Geophysical Data Center/World Data Service (NGDC/WDS): Global Significant Earthquake Database, 2150 BC to present, National Geophysical Data Center, NOAA, https://doi.org/10.7289/V5TD9V7K, last access: 1 January 2017. a, b Wald, D. J., Quitoriano, V., Heaton, T. H., Kanamori, H., Scrivner, C. W., and Worden, C. B.: TriNet “ShakeMaps”: Rapid Generation of Peak Ground Motion and Intensity Maps for Earthquakes in Southern California, Earthq. Spectra, 15, 537–555, https://doi.org/10.1193/1.1586057, 1999. a Wald, D. J., Quitoriano, V., Worden, C. B., Hopper, M., and Dewey, J. W.: USGS “Did You Feel It?” Internet-based macroseismic intensity maps, Ann. Geophys.-Italy, 54, 688–707, https://doi.org/10.4401/ag-5354, 2011. a
<urn:uuid:670cac0e-eeaf-436e-abc2-f45759e8296a>
CC-MAIN-2021-43
https://nhess.copernicus.org/articles/18/1665/2018/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584567.81/warc/CC-MAIN-20211016105157-20211016135157-00486.warc.gz
en
0.927193
10,150
3.421875
3
Tempro-Mandibular Joint (TMJ) Tempro- Mandibular Joint (TMJ) Disorder This disorder encompasses a group of problems involving the Tempro-mandibular joints (TMJ) and the muscles, tendons, ligaments and blood vessels associated with them. Symptoms of TMJ Disorder - pain in the jaw joint - ringing in the ears - clicking, popping or grating sounds in the jaw joint - locking of the jaw when attempting to open the mouth - neck, shoulder and back pain - swelling of the sides of the face - inability to open the mouth comfortably Treatment of TMJ Disorder May involve one or more of the following: - Self care practises, such as eating soft foods, using heat packs and avoiding extreme movements like yawning and gum chewing - Occlusal Adjustments, where teeth are ground down to bring the bite into balance - Repositioning of the jaw using a night guard (Occlusal Splint) - Prescription medication such as anti-inflammatory and muscle relaxants - Stress management such as counselling and Yoga - Surgical treatment Bruxism is excessive clenching or grinding of the teeth that is not a part of normal chewing movements. It is an oral parafunctional activity that occurs in most humans at sometime in their life. clenching and grinding may occur during the day or at night. Bruxism during sleep causes the majority of health and oral complaints. Bruxers (persons with bruxism) are often unaware that they developed this habit and often do not know that treatment is available until damage to the mouth and teeth has occurred. Causes of Bruxism A combination of physical and psychological factors contribute to buxism. - Physical Stress, such as illness, nutritional deficiency and dehydration - Psychological Stress, anxiety and tension - Abnormal Anatomy of the teeth such as high spot on fillings, super erupted teeth Signs and Symptoms of Bruxism These may vary according to the nature, frequency, duration and strength of excessive clenching and grinding. - pain in the teeth - sensitivity to hot and cold - chronic facial pain with tension headache - stiffness and pain in the jaw joints (TMJ) and muscles with restricted opening of the mouth and difficulty in chewing - flattened and worn tooth surface - microfractures of the tooth enamel - noise that occurs when the teeth are ground together, witnessed by partners, relatives or friends Bruxism diagnosis is based on clinical examination and dental and medical history. This is assessed by: - the location of the pain, stiffness or soreness - range of jaw movements - tooth wear Treatment of Bruxism - Behaviour Modification: teaching the patient how to rest his/her tongue teeth and lips - Occlusal Splint (also called night guard), a specially-fitted plastic mouth appliance worn at night to even to force of biting. It also prevents further wear of the teeth surfaces - Biofeedback: this involves the usage of an electronic device that measures the amount of muscle activity of the mouth and jaw indicated to the patient when too much muscle activity is taking place so that the behaviour could be changed.
<urn:uuid:0948854d-3d42-4fce-8fcd-3b3c6c0c6dfd>
CC-MAIN-2021-04
https://meltondentalgroup.com.au/our-services/tempro-mandibular-joint-tmj/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704832583.88/warc/CC-MAIN-20210127183317-20210127213317-00793.warc.gz
en
0.940142
682
2.828125
3
Hurricane Katrina made landfall near New Orleans in 2005 and wreaked havoc on built-up areas of the Gulf Coast. The Caribbean, Eastern United States and Gulf Coast areas were then visited by devastating hurricanes Irma, Maria and Harvey in 2017. All told, those storms caused damage valued at more than $407 billion. Meanwhile, four of the 10 costliest tornadoes recorded in U.S. history have occurred within the last decade. The most significant one ravaged Joplin, Missouri, in May 2011, causing damage estimated at $2.8 billion. Extreme weather risks are real, and the costs to recover from these events continue to increase. Population density has increased in storm-prone areas, and as the magnitude of storms is perceived to have grown, codes, standards and ordinances have evolved to address the ability of structures to withstand these events. The 2015 International Building Code now recognizes that emergency response centers and facilities that are to remain operational during significant storm events must also be designed to withstand them. The Code establishes the standard to which weather-resistant buildings must be designed. Its “Definitions” chapter establishes the description for such a building: Storm shelter: A building, structure or portions thereof, constructed in accordance with ICC 500 and designated for use during a severe wind storm event, such as a tornado or hurricane. The Code requires a shelter to be designated as either a tornado shelter, a hurricane shelter or a combination of both. Tornado shelters require structural design to withstand winds up to 250 mph for short periods of time. Hurricane shelters require structural design to withstand lesser wind speeds, but for longer periods of time. The Code also establishes the building types that are required to be designed as storm shelters. Emergency operations facilities must meet the International Code Council (ICC) 500 Standard, which includes: 911 call stations Emergency operations centers Fire, rescue, ambulance and police stations Each of these structures must include a storm shelter. A Storm Shelter’s Key Features So how is a high-wind-resistant building—a storm shelter—likely to be configured? Our North Texas Municipal Water District Water Operations Center project is a great example. It includes office space for plant management and engineering personnel, a training room for districtwide use (to be used as an emergency operations center during storm events), a conference room and breakroom, a small laboratory, typical service spaces and a supervisory control and data acquisition (SCADA) control room. Two-thirds of this building is “hardened” to meet the storm shelter requirement. It is a business (office) occupancy, and the key features of its storm shelter include the following: Siting, which ensures it will not be affected by flood events Concrete tilt-wall enclosure with integral thin stone and thin brick veneer Composite metal deck and concrete roof Windowless enclosure surrounding the control and training rooms Projectile-resistant windows in the office areas Adequate restroom and breakroom facilities for emergency operations staff Adequate emergency generator power in a hardened enclosure to support all facilities Adequate HVAC in a hardened penthouse to support all facilities, with projectile-resistant louvers Fire protection and fire alarm systems independent from the remainder of the building Architectural forms, material use and landscaping (a hardened structure can still be aesthetically pleasing, and this one is a model for water conservation) The Code now responds to the need within communities to design and construct essential structures to withstand severe storms. It provides architects and engineers with the specific criteria for accomplishing the design of storm shelters. Whether a building site is located within the tornado-prone or hurricane-prone regions of the country (or both), the Code now provides designers with the tools needed to design buildings that will withstand those storm events. IN THE KNOW: #Architect gives life to unbuilt #FrankLloydWright designs / #AutonomousVehicles that can “reason” / U… https://t.co/e94GHvGTCz It’s #InfrastructureWeek, and coincidentally, we are proud to announce that Lamberto "Bobby" Balli has joined the H… https://t.co/3y6YQqxBkL James Arbuckle and Mike Marlar (not pictured) represented Halff+Marlar at the #InfrastructureWeek breakfast at the… https://t.co/vtD6fMsvUK ASFPM Annual Conference May 19 – 24, 2019 APWAOK/OWEA Spring Tech Conference May 20 – 22, 2019 TFMA Spring Conference May 29 – 31, 2019 South Texas County Judges and Commissioners Association Conference San Antonio, Texas June 10 – 13, 2019 Texas Association of Counties Legislative Conference Sept. 3 – 5, 2019 Texas Municipal League Conference San Antonio, Texas Oct. 9 – 11, 2019
<urn:uuid:9d7410d5-9f62-4504-a78e-89c2671c38bf>
CC-MAIN-2019-22
https://www.halff.com/newsroom/designing-a-built-environment-that-is-resilient/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257939.82/warc/CC-MAIN-20190525084658-20190525110658-00182.warc.gz
en
0.924936
1,022
3.171875
3
Computer science? That’s boy stuff. Or so 15-year-old Hesme believed when she switched schools in 10th grade. “I thought I’d be terrible at it,” she says. Her former school in Durban, on the coast of South Africa, didn’t offer comprehensive science, technology, engineering or math (STEM) classes. But when she moved to Curro Heritage House High School in Morningside, Durban, STEM classes were going to be a regular part of the curriculum. She was nervous about that —but when her brother dared her to take a computer science elective, she accepted the challenge to prove him wrong. To her amazement, she loved it. “It became my passion,” she says now, in her final year of high school. As the only girl in the class, at first she felt intimidated but ended up thriving. And when the call came out to try out for an all-girls artificial intelligence (AI) hackathon, she immediately began writing the required motivational letter to apply. “I was just sitting in class, writing, and all my passion came out,” she says. When chosen to be on a five-girl team representing South Africa, she was ecstatic. Today, Hesme is developing her own AI-based app to help people like herself — diagnosed as being on the autism spectrum — to better cope when interacting with the world. She plans to get a higher-level certificate in AI next year before going on to study computer science at university. And she was thrilled when her team won second place in the first all-girls edition of Microsoft’s Imagine Cup Junior virtual AI hackathon held in cooperation with the United Nations Educational, Scientific and Cultural Organization (UNESCO), in celebration of International Women’s Day. “AI captured my heart over that weekend,” says Hesme, whose team competed against 16 others from 11 countries across Europe, Africa and the Middle East. Business as usual doesn’t give equal opportunities to girls The gender gap in education is serious. More than 130 million girls were already being denied education before COVID-19 hit. And as schools around the world closed, UNESCO estimated that 11 million additional girls are at risk of never going back to school. This could mean a big step back after years of slow-but-steady progress towards gender equality. It also puts young girls at risk of adolescent pregnancy, early and forced marriages and gender-based violence. Even before COVID-19, the rate of change wasn’t fast enough, according to Justine Sass, chief of the Section of Education for Inclusion and Gender Equality at UNESCO. UNESCO partnered with Microsoft on the hackathon under UNESCO’s Global Education Coalition’s Gender Flagship which unites more than 70 institutions from the United Nations, civil society, academia and the private sector to help minimize the effects of COVID-19 on education and gender equality. UNESCO believes curtailing girls’ education ultimately impacts the entire world. In an era when jobs increasingly require digital skills, educating girls can boost local and regional economies and fight poverty. But it’s not happening fast enough. “Last year was the 25th anniversary of the Beijing Declaration,“ says Sass, referring to the U.N. declaration of ensuring equality for women around the world. “If we continue at this rate, we won’t get every girl into primary school until 2050.” And still, two-thirds of the illiterate adults in the world are women, she says. “It’s been the same proportion since 2000, so we’re not making progress in that area,” says Sass. You can’t be what you don’t see A critical first step is to expose girls to positive female role models in STEM fields. Girls who know a woman in a STEM profession are significantly more likely to feel confident when doing STEM coursework (61%) than those who don’t know a woman in a STEM profession (44%). Unfortunately, most girls simply don’t have those kinds of role models in their lives. When asked to describe a typical scientist, engineer, mathematician or programmer, 30% of girls sketch out male personas. Even adult women do the same (40%) — including 43% of the women who work in STEM themselves. “At UNESCO, we’re often looking to address gender stereotypes — for example, in textbooks — and offer more equal visions of a world,” says Sass. “We need to start small. Who’s represented as a politician and who’s represented in the kitchen in the books students see in school?” Perhaps even more importantly, recent Microsoft research shows that girls don’t see how a STEM career can be creative and have a positive impact on the world. But staging “interventions” in the form of giving girls role models and exposure to real-world STEM applications, educators have the power to dramatically change their minds. One study found that participating in a proactive “role-model intervention” increased girls’ STEM interest by between 20% and 30%. This is precisely why UNESCO seeks to engage female role models, including teachers, to close digital and STEM gaps in the classroom through initiatives such as YouthMobile, which was mobilized to support this first All-Girls Edition of the Microsoft’s Imagine Cup Junior Virtual AI Hackathon. “We don’t have older girls showing that they are capable,” says Karla, a senior from the High School of Math and Natural Sciences, in Osijek, Croatia, a small town on the Drava River. Her team placed third in the hackathon. Perhaps they exist, she says, but “they’re not speaking up about it, and showing the rest of us what they are doing.” Precisely because of this lack of visibility of women in STEM, it was empowering to participate in the hackathon alongside more than 80 girls from countries throughout Europe, Africa and the Middle East and receive advice from other women in the field, says Anamika, a third-year student at the Corro Waterfall High School in southern South Africa, and a member of the South African team. Hackathon as an intervention to interest girls in AI The theme of the hackathon focused on AI for Earth and sustainability. The only prerequisites were that the girls be between 14 and 18 years old and have an interest in STEM. Prior to the hackathon, the participants were assigned homework and “leveling up” activities that introduced them to coding. During the two-day virtual event on Microsoft Teams, they were invited to attend talks from women in STEM fields and participate in hands-on workshops where they worked together on practical exercises designed to teach them how AI could be used to solve real-world problems using AI prediction modelling and techniques, such as decision trees and random decision forests. The ultimate challenge presented to the teams: use the AI tools they’d learned to come up with a way to save a species. Team Clustering from Spain won first prize with their AI solution meant to preserve the Mediterranean Sea. The team first predicted the future evolution of sea temperatures using linear regression in Python, a programming language. Then, they used image classification to identify the most polluted areas. Bringing these two sets of data together, the team created a machine learning model to reduce pollution, while preserving the area’s marine species. Team Cognition from South Africa placed second with an AI solution for saving African wild dogs. The species is endangered because of habitat loss, disease, predators, and human behavior. Leveraging image classification and anomaly detection, the team first located the areas populated by wild dogs, and gathered data regarding any human activities or otherwise dangerous conditions for the dogs in those areas. Then, through satellite images and image recognition, the team tracked the wild dogs’ behaviors. Using anomaly detection, they could decide when to intervene to save the at-risk wild dogs population. Team OCR from Croatia won third place with their plan to save griffon vultures, which play an important role in the natural cleaning cycle in their country. Using neural networks, a series of algorithms that recognizes underlying relationships in data, the team first identified which areas are habitable for the birds. Then they identified the griffon vultures using image classification. Finally, the team used regression to predict possible increases or decreases in griffon vulture population, to help authorities make intervention decisions. Most of the girls went into the hackathon feeling nervous and unsure of themselves, according to Nokuthula Mnguni, an information technology teacher who was a mentor for the South African team. “They really didn’t know whether or not they had the correct skills that were needed,” she says. “But given the opportunity, they ended up finding strengths they didn’t even know they had.” In a way, the problem they were assigned distracted them from their fear of the technology, says Inmaculada Morena Lara, a computer science teacher who was the mentor for the Spanish team, from the Santo Tomás de Aquino-La Milagrosa High School in the small Spanish town of Tomelloso. “They were focused on solving a real-world problem,” she says. “They weren’t thinking about AI concepts or subjects. They didn’t realize all the things that they were learning. They were not studying a subject; they were solving a problem.” Leapfrogging technology for its own sake to achieve bigger dreams In 2018, Microsoft commissioned research to investigate girls’ attitudes toward STEM, expecting negative results. “But surprisingly, we found that actually they were quite positive about STEM and technology,” says Alexa Joyce, Microsoft’s Future-Ready Skills Director, who answered questions and shared advice during the hackathon for young women looking to change the world through AI. “Typically, you hear, ‘Oh, girls think technology is hard or boring.’ But our research didn’t bear that out,” she says. Instead, girls were clearly interested in using technology to be creative and address issues that would impact the world. It was the application of the technology — not the technology itself — that fascinated them. Third-year Spanish student Andrea Rodríguez Limón agrees. There’s currently a big push in Spain to try and interest girls in STEM. But Rodriguez has always dismissed the posters and public service messages posted in school hallways and on buses that attempt to convince her to go into a tech career. Because they are focused on building and programming machines, and full of technical jargon, “They don’t appeal to girls. They don’t know how to talk to girls. If they want to interest us they have to try another way,” says Rodriguez. “Tell them that it’s something they can use to save the world, and they are with you 100%,” says Joyce. Sass says we cannot afford to live in a world where scientific and technological solutions are desperately needed and yet exclude half of the world’s talent needed to help create them. “There’s still a huge amount of bias in AI. A lot of that is because men are still driving the agenda and we don’t have enough women contributing.” COVID-19 also remains a huge concern, with huge numbers of countries moving towards remote learning or hybrid learning, raising serious concerns that girls aren’t learning in those contexts because of the existing gender digital divide, says Sass. “Our initial data coming in is that all of those inequalities are likely to be exacerbated because of COVID-19,” she says. “There is actually a huge opportunity right now for us to close some of those gaps and to really use technology to its advantage. It’s an opportunity to open more pathways for girls to develop digital skills and drive more equal futures for themselves.”
<urn:uuid:5c2a6932-a818-466c-8940-e20af44af0cf>
CC-MAIN-2022-27
https://news.microsoft.com/europe/features/bridging-the-stem-divide-ai-hackathon-helps-young-women-excel-in-computer-science/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00468.warc.gz
en
0.960855
2,543
2.796875
3
Room: GNN 377 Office: 613-562-5800 ext. 6749 Work E-mail: [email protected] Prof. Blouin-Demers has spent most of his research efforts attempting to explain two major patterns: 1) why does animal density vary spatially, and 2) why are several animals polymorphic. He has mostly used reptiles as study organisms, but has worked on fish, amphibians, birds, and mammals. Because reptiles are, proportionally, the most threatened vertebrate group in Canada, prof. Blouin-Demers also hopes to contribute to their conservation. - Blouin-Demers G, Lourdais O, Bouazza A, Verreault C, El Mouden H & Slimani T. 2013. Patterns of throat colour variation in Quedenfeldtia trachyblepharus, a high-altitude gecko endemic to the High Atlas Mountains of Morocco. Amphibia-Reptilia 34: 567-572. - Halliday WD, Paterson JE, Patterson LD, Cooke SJ & Blouin-Demers G. 2014. Testosterone, body size, and sexual signals predict parasite load in Yarrow's spiny lizards (Sceloporus jarrovii). Canadian Journal of Zoology 92: 1075-1082. - Halliday WD, Thomas AS & Blouin-Demers G. 2015. High temperature intensifies negative density dependence of fitness in red flour beetles. Ecology and Evolution 5: 1061-1067. - Ursenbacher S, Guillon M, Cubizolle H, Dupoué A, Blouin-Demers G & Lourdais O. 2015. Postglacial recolonisation in a cold climate specialist in western Europe: patterns of genetic diversity in the adder (Vipera berus) support the central-marginal hypothesis. Molecular Ecology 24: 3639-3651. - Beale M, Poulin S, Ivanyi C & Blouin-Demers G. 2016. Anthropogenic disturbance affects movement and increases concealment in western diamondback rattlesnakes (Crotalus atrox). Journal of Herpetology, in press.
<urn:uuid:e695f2ce-c021-4d8d-85b7-0f07d12c47ab>
CC-MAIN-2020-24
https://science.uottawa.ca/biology/people/blouin-demers-gabriel
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348504341.78/warc/CC-MAIN-20200605205507-20200605235507-00151.warc.gz
en
0.759398
477
2.5625
3
Slow and in Control Benefits of slow and controlled workout In any free-weight exercise there are two basic motions. One is Concentric, or lifting phase. The other is the Eccentric or lowering phase. During the lifting phase the muscle shortens and contracts. During the lowering phase the muscle lengthens. An example would be a Dumbbell bicep curl workout. Lifting the weight upwards toward the shoulder shortens and contracts the muscle. Lowering the weight to the beginning spot lengthens the muscle. Studies have confirmed that lowering the weight is just as important as lifting the weight. Lowering the weight causes just as much muscle-cell damage as lifting the weight does. The muscle-cell damage and repair is how our muscles grow. Hence every repetition must be done slow and with proper control. Also ensure that you lift weights appropriate enough to do the entire range of motion. We often notice members lifting weights bigger than their physical capacity. This results in quick rapid movements with half the range of motion , leading to a completely non beneficial workout.Tags: Control, dumbbells, lifting, motions, Muscle, slow, weights 03 Nov, 2015
<urn:uuid:399e06d8-030d-41fd-9e0a-f333d2c89cf9>
CC-MAIN-2018-22
https://www.contours.in/slow-and-in-control/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864968.11/warc/CC-MAIN-20180522205620-20180522225620-00436.warc.gz
en
0.946228
240
2.75
3
The relationship between marijuana and Islam is complicated, to say the least. Today, it is considered a prohibited substance to the point where its sale and even possession could result in execution in certain Islamic countries. There is no mention of cannabis as a ‘forbidden’ substance in the Qur’an, mainly because it had not yet been discovered by Muslims at the time of Muhammad the Prophet (570 – 632 AD). Followers of Sufism, a movement within Islam, consume weed openly as part of their ritual practices in a bid to reach a higher state of consciousness. The majority of Islamic religious figures and scholars say that because cannabis is an intoxicating substance, it is ‘haram,’ which means it is prohibited. However, cannabis was used in Iran and other nations that are now Islamic for at least 1,500 years before the birth of Muhammad. Early Arabic texts mention the use of ‘hashish’, which referred to cannabis resin, flower heads, and dried leaves. The Arabs also made ‘sweetmeat’ with weed, which was eaten rather than smoked. First Use of Marijuana in Islam All manner of tales and legends surround Islam’s first encounter with marijuana. It was always likely to happen, because the Arabs rapidly expanded westwards in the 7th and 8th centuries. As well as destroying the Sassanid Empire in 651, the Arabs came close to conquering the Byzantine Empire, only to be halted at the great city of Constantinople, which used Greek Fire to destroy the Arab navy in the 670s. The expansion was only halted at the Battle of Tours in 732. According to one story, an Indian pilgrim introduced it to the Persians during the reign of Khosrow II (531 – 579). As a result, when the Arabs conquered Persia in the 650s, they would invariably have uncovered weed. Another story claims that a Chinese Buddhist scholar named Huan Tsang visited Punjab in 641 and introduced cannabis to the Arabs. Yet another tale claims that marijuana was unknown to the Muslims until one of their kings, the Ghaznavid King Mahmud, entered the Indian subcontinent in the 11th century. It is highly unlikely that the Islamic world was not exposed to cannabis until after 1000. After all, weed had been used for medicinal purposes in the region that later became known as the Arab world since Roman times. It was an anesthetic and a painkiller. Rhazes, also known as Abou Bakr Mohammed ibn Zakariya Ar Razi, was a famous Islamic physician who lived in the 9th century. He is known to have prescribed marijuana as a medicine. His contemporary, a physician called Ibn Wahshiyah, was not as sure about the use of weed in the medical field. In fact, in On Poisons, he wrote that it was deadly when used in large amounts. Both men would have read the translated writings of Hippocrates, Dioscorides, and Galen, Greek scholars who wrote about the herb. In his 1971 essay, The Herb, Franz Rosenthal wrote that hashish was used as an intoxicant in Islam during the 9th century. He said that religious sects used it and there was minimal cultural opposition because the substance had not been named as a prohibited one in the Qur’an. It is more likely that cannabis use spread across the Middle East as Islam expanded during the late 7th century. If nothing else, marijuana was certainly widely used by the 11th century for recreational purposes. At that time, the Seljuk Turks, a Turkish people, captured Baghdad in 1055 from the Shia Buyids under a commission from the Abbasid Empire which was little more than a figurehead. The Seljuks didn’t seem to have an issue with weed. Falsifying a Link Between Weed & Violence During this era, hashish was popular in the Islamic world. In 1090, Hasan-I-Sabbah, founder of the order called Assassins, allegedly recruited young men to complete dangerous missions such as murdering political opponents. According to legend, he trained them in his fortress, the Alamut, provided beautiful women to sleep with, and gave them a secret potion which emboldened them and gave them the courage to complete their tasks. According to Silvester de Sacy in 1818, this potion was almost certainly hashish. Not only that, but the Assassins order was actually called the ‘Hashishiyans.’ Unfortunately, anti-marijuana protesters in the 20th century used this false information to link marijuana with violent behavior. There is no question that the Assassins order committed numerous violent acts. Hasan’s followers, known as the fidai, blindly carried out his orders. For example, they murdered Conrad Marquis de Montferrat, one of the leaders of a Crusade, in the 12th century. An Assassin disguised himself as a monk and infiltrated the Marquis’ camp. Hasan was so feared that even Saladin, the legendary Muslim warrior of lore, decided against his plan to storm the Alamut. In reality, the only evidence de Sacy used to link weed with violence was an anecdotal account by famed explorer, Marco Polo. According to Polo’s report, a potion was given to the Assassins, but he never named a drug. If Hasan did give the men hashish, it was probably to provide them with the pleasures of the paradise spoken of by Muhammad who said great things awaited men who died in battle. Religious Use of Marijuana & Its Spread It is the Sufi sect who have the greatest Islamic association with cannabis. In Part 4 of the series, I spoke about how Haydar founded the Sufis in Kharasan in the late 12th century. A popular legend claimed that Haydar discovered weed one day while out walking and was positively euphoric upon his return to the monastery. As was the case 2,000 years previously with Hindu priests who had discovered hashish, Haydar swore his followers to secrecy. Although it is likely that the story isn’t true, it is a fact that the Sufis consumed the substance and spread it throughout the Islamic world. They even introduced it to Egypt and Syria. According to some Sufis, marijuana brought peace, insight, and a closeness to God. If nothing else, the tales of the Assassins and Sufis show that weed was rapidly expanding throughout the Arab world. It is interesting to note that while King al-Afdal banned the sale and production of alcohol in Egypt and Syria towards the end of the 1100s, no such restrictions applied to cannabis. Initially, cannabis was mainly used for medical purposes in the Islamic world. In the 9th century, a physician called al-Razi wrote about using hemp leaves to help with earaches and flatulence! According to another physician called al-Badri in the 13th century, weed was used to improve the appetite. The Downfall of Marijuana in the Islamic World In many ways, it was inevitable that cannabis would eventually be banned in Islam. Although the substance is not named in the Qur’an, intoxicants, called khamr, were expressly forbidden, and weed is certainly an intoxicant – a fact that countless Muslims discovered while using it. The imams pointed out that it was wrong for prayers to be offered to Allah by individuals under the influence of marijuana. Rosenthal maintains that confirmed cannabis users were classified as poor and low-class individuals with bad moral character. Most evidence suggests that hashish consumers were predominantly the poorest members of society, including unskilled laborers and uneducated peasants. This is primarily because weed was far cheaper than alcohol. Also, it was available on every street corner, and an ounce of weed was far more effective than several pints of wine. Disapproval towards the drug was abundant in the middle of the 13th century onwards. Matters were not helped when the Mongols captured Baghdad in 1258. These fierce warriors were known for their liberal consumption of alcohol and marijuana. Arab historians such as al-Zarkoshi and Ibn Taymiyah blamed the spread of the herb on the Mongol invaders, even though it had been widely used by Muslims for centuries! The Sufis were poorly regarded in Islamic society and were even considered a threat to public order. In 1253, Islamic authorities raided a Sufi community in Cairo and burned all their cannabis plants on a pyre. The Sufis paid farmers to continue growing the weed, a compromise which lasted until 1324 when the authorities purged the whole countryside and destroyed every marijuana plant they could find. In 1378, Soudoun Sheikhouni introduced martial law in Egypt in a bid to wipe out marijuana use. Cannabis crops were burned, and farmers found to be growing the plant were tortured and murdered. Those who were caught using weed had all their teeth pulled out. Yet these extreme measures failed to stamp out marijuana use, and it was reported that within a few years, it was like Sheikhouni’s measures had never taken place. In actual fact, the use of cannabis expanded even further, to the East and North coasts of Africa and Spain, in the 14th century. In 1393, the Sultan of Baghdad didn’t seem to care about bans as he openly used hashish. During the 16th century, the Ottomans defeated the Mamluks, which meant Egypt and Syria came under new rule. During the reign of the famed Suleiman the Magnificent, (1520 – 1566), lower, middle, and upper-class Egyptians used the herb. However, it soon became known as “the grass of the poor.” In the 17th century, traders from Europe introduced tobacco to the Ottomans, a habit they soon considered immoral. People began smoking tobacco and marijuana together, although new strict penalties for using tobacco were introduced. It wasn’t until the 19th century that further repressive measures to stamp out cannabis use in the Islamic world were tried. In 1877, the Ottoman government in the city of Constantinople finally decreed that all marijuana in Egypt must be destroyed. Two years later, the Khedivate of Egypt banned the importation of weed. In 1890, Sultan Hassan I of Morocco placed strict regulations on the cultivation and trade of marijuana, although he allowed a number of Rif tribes to have special weed privileges. Final Thoughts on Marijuana Use in the Islamic World During the Dark and Middle Ages, the Arab world was one of the most advanced on the planet, and marijuana use was rife. While some historians try to link the decline of the Islamic Empire to weed use, it fails to take into account that marvelous mosques and fabulous institutes of learning were created when cannabis use was at its greatest. When the Arabs were busily expanding in the early days of the empire, weed use was unknown. However, it gradually made its way through all aspects of Muslim society and arguably distracted many from the long-term goal of Muhammad, which was to establish Islam as the true faith throughout the world. In the end, despite Islam’s attitude towards intoxicants, marijuana was a major part of its culture for hundreds of years.
<urn:uuid:281532a7-eb2d-4b0e-aedf-ae00ee27d836>
CC-MAIN-2020-05
https://www.marijuanabreak.com/how-cannabis-became-part-of-thriving-cultures-the-islamic-world
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251789055.93/warc/CC-MAIN-20200129071944-20200129101944-00194.warc.gz
en
0.980538
2,309
2.734375
3
The Chesapeake Bay Program has spent millions of dollars to help clean up the Chesapeake Bay, and is the largest estuary restoration project undertaken by the United States. The Environmental Protection Agency plays a major role directing this effort, which includes restoring the Bay’s living resources. Ironically, another federal agency, the National Oceanic and Atmospheric Administration, through a loan program, is providing financial assistance totaling $20.6 million to Omega Protein Corp., which operates a fish-processing plant in Reedville, VA that annually harvests approximately 250 million pounds of Atlantic menhaden from the Bay. Omega Protein is the largest commercial fishing operation on the Chesapeake Bay and along the Atlantic coast. Atlantic menhaden are a vital link in the food chain, and have the ability to filter a volume of water equal to the entire Bay in less than one day, with the potential to annually consume up to 25 percent of the Chesapeake’s nitrogen. Because there is no quota to limit or control the harvest, this intensive fishery for Atlantic menhaden seasonally depletes the Bay of one of its most valuable living resource. The loan program, mandated by Congress and authorized by Title XI of the Marine Act of 1936, is administered by the National Marine Fisheries Service, an integral part of NOAA, and has assisted Omega Protein in securing loans through lenders with low interest rates enhanced with a government guaranty to the lender for up to 80 percent of the financing. Omega Protein’s current Title XI borrowings are secured by liens on 17 fishing vessels and mortgages on their plants in Reedville and Abbeville, LA. In 1996, Title XI borrowing was modified to permit loans obtained through this program to be used for shoreside construction. Omega Protein allocating approximately $14 million to refurbish 18 vessels. The remaining $6.5 million was used to modernize their plants, with $4.5 million going to the Reedville plant. Loans are now available under similar terms pursuant to the Title XI program without intervening lenders and Omega Protein has applied for an additional loan of $1.9 million under this new program to refurbish more of their vessels. The Atlantic States Marine Fisheries Commission, composed of 15 coastal states from Maine to Florida, is responsible for the management of menhaden through the Atlantic Menhaden Fishery Management Plan. The NMFS does not have an Atlantic Menhaden Fishery Management Plan and does not require the reduction fishing industry to be licensed in federal waters. Therefore, Omega Protein has unregulated access offshore to one of the country’s most valuable marine resources. Purse seine fishing for menhaden takes place along the Atlantic Coast and in Virginia’s portion of the Chesapeake Bay. Approximately 84 percent of the menhaden purse seine landings along the Atlantic Coast are harvested by the reduction industry using spotter planes and vessels up to 200 feet long. The larger vessels owned by Omega Protein harvest and process approximately 90 percent of the Atlantic menhaden caught by the reduction fishery on the East Coast. The reduction industry processes menhaden into fishmeal, fish oil and fish solubles. Fishmeal is an important ingredient in poultry and livestock fees because of its high protein content. The oil is refined and is used extensively in cooking oils and margarine throughout Europe. The remainder of the menhaden, caught by independently owned smaller boats, are usually sold for bait. Atlantic menhaden are the most important filter feeder and one of the most abundant species of finfish in the Chesapeake Bay, with the filtering capacity to consume approximately 10 times more phytoplankton than the Eastern oyster. Adult menhaden feed on phytoplankton (algae), zooplankton and suspended organic plant detritus. They consume and redistribute a significant amount of energy within and between the Chesapeake Bay and the ocean. Menhaden are the dominant prey species for many predatory fish and mammals such as striped bass, bluefish, weakfish, Spanish mackerel, seals and whales. Because of their schooling behavior, they also are a favorite target for common loon, herons, egrets, ospreys and eagles. The Chesapeake Bay is an important nursery area for Atlantic menhaden, and accounts for approximately 45 percent of the Atlantic menhaden recruitment along the East Coast. Omega Protein targets immature Age-1 and Age-2 Atlantic menhaden, accounting for approximately 80 percent of the purse seine landings by the reduction fishery in the Bay. Since 1970, the average annual landings of Atlantic menhaden have tripled in the Chesapeake to approximately 300 million pounds, or 44 percent of the total coastal menhaden reduction fishery harvest. Menhaden are captured in pound nets in Maryland’s portion of the Bay, and landings have annually averaged approximately 3 million pounds since 1975, which is only 1 percent of the reduction fishery landings in the Chesapeake Bay. ýn fact, Maryland’s annual total commercial seafood harvest for the past 15 years has averaged only 57 million pounds, or approximately 19 percent by weight, of the reduction fishery’s average annual landings of Atlantic menhaden from the Chesapeake Bay. Maryland has prohibited purse seining in state waters (0-3 miles from the coast) and in the Chesapeake Bay since before the 1950s. There is growing concern that the massive removal of Atlantic menhaden by the reduction fishery from the Chesapeake Bay in the past 30 years has been harmful by limiting the Bay’s fish production and affecting the health of its top predators, such as striped bass. Since the menhaden population has declined, trends in water quality and living resources have raised concern about the Bay’s future. The Chesapeake Bay Program monitoring data since 1985 indicate: 1. Populations of mesozooplankton, the food base for many fish species, have declined in mid-Bay and lower-Bay waters. 2. Food (phytoplankton and zooplankton) generated in the highly productive open water habitats of the Chesapeake Bay has been increasingly shunted toward ctenophores (comb jellyfish) and bacteria and away from fish. 3. Comb jellyfish, a predator of zooplankton, fish eggs and larvae, are increasing in mid-Bay waters. 4. In the Bay’s mainstem, water clarity has been decreasing, while nutrient levels have not changed significantly. Atlantic menhaden have suffered from poor recruitment in the Bay since 1992. Poor reproductive success is at least partially responsible for the declining menhaden population, but the species also suffers from poor fisheries management, (e.g. overfishing in the Chesapeake), disease and mass mortalities from low dissolved oxygen episodes associated with harmful algae blooms. The total estimated menhaden reduction fishery landing for the Atlantic Coast in 2000 is 368 million pounds, the second lowest since the NMFS began keeping records in 1940. The NMFS currently estimates that the number of Atlantic menhaden Ages-1 to 8 is less than 2 billion, the lowest population on record. Recently, the ASMFC amended its Atlantic Menhaden Fishery Management Plan. But it did not address one of the plan’s main ecological objectives: the allocation of the stock. The plan allowed the reduction fishery to exploit the menhaden population until individual states along the Atlantic Coast effectively banned or imposed restrictions within their borders. This forced the reduction fishery to concentrate their efforts entirely in Virginia’s portion of the Bay and nearby coastal waters. This is an example of a fishery management plan doomed to failure, causing a potential ecological disaster by allowing the reduction fishery to harvest massive numbers of immature Atlantic menhaden with no harvest limits in the Bay, the menhaden’s most important nursery grounds. The ASMFC has mismanaged one of the nation’s most important natural resources to the point where uncoordinated decisions by individual states have virtually altered the ability of the Atlantic Menhaden Fishery Management Plan to adequately regulate the fishery. The ASMFC’s Atlantic Menhaden Management Board has failed to address written requests from the public in accordance with their own Interstate Fisheries Management Program Charter to consider reducing the Atlantic menhaden harvest in the Chesapeake Bay and to protect Age-0 Atlantic menhaden from being exploited along the Atlantic coast. The ASMFC should be required to coordinate their Fishery Management Plans with the Chesapeake Bay Program before developing new Fishery Management Plans that could have a negative impact on the ecology of the nation’s largest estuary. How is the Chesapeake Bay Program supposed to succeed in restoring the Bay’s living resources if NOAA continues to offer financial assistance to Omega Protein and the ASMFC continues to employ a Fishery Management Plan that allows Omega Protein to harvest unlimited numbers of Atlantic menhaden from the Bay?
<urn:uuid:52964747-4d84-425b-b77f-c6f4f21f5f66>
CC-MAIN-2018-05
https://www.bayjournal.com/article/exploitation_of_menhaden_threatens_chesapeakes_restoration
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887981.42/warc/CC-MAIN-20180119125144-20180119145144-00686.warc.gz
en
0.935689
1,867
2.90625
3
Enlargement of the liver or hepatomegaly is an alarming symptom, indicating that the liver is susceptible to damage due to the presence of a disease. In fact, hepatomegaly is observed in severe liver diseases, including the development of cirrhosis, and failure of this organ, and in cases when the body is vulnerable to infectious disease and the increase in size is a consequence of the work of this body by filtering out toxins produced by the bacteria. Depending on the degree of increase in the liver and also the specifics of the disease that caused these changes, the main manifestations can be different. The liver of a healthy person on palpation feels soft, and when examined, not feelings tenesmus. At the initial stage of enlarged liver on palpation feels firm and when pressed, the person experiences a mild discomfort. A slight enlargement of the liver is not a cause for concern, especially if there is accompanying catarrhal disease. In case of serious liver diseases, including cirrhosis of increase liver is more pronounced. In this case, liver tissue swell, significantly increasing in size. On palpation the liver is hard and painful. In case of strong swelling of the liver causes the patient discomfort, as a feeling of the presence of a foreign object under the ribs on the right side. In addition, there may occur a sharp pain with movements of the body. Strong hepatomegalia has symptoms. There is a slight swelling in the upper abdomen. Patient pain nausea, an unpleasant breath, possible heartburn. Frequent symptoms of the skin, including the appearance of a petechial rash, peeling of the skin and severe itching. With prolonged neglect hepatomegaly ascites develops. This phenomenon is characterized by fluid accumulation in the abdominal cavity. Fluid stands out due to the fact that increased in size and having a dense structure of the liver presses on the vessels which leads to the excretion of fluids. Fluid in the abdomen not infrequently serves as a factor for the beginning of peritonitis, so we can say that the increase in the liver triggers a number of diseases. The main symptoms increase in the liver occur only in the acute form. In this case shows the treatment under the supervision of a physician. To determine the degree of disorders of the liver made blood tests, which keep track of whether the liver produces proteins enzymes. Hepatomegalia is the deviation, which can long time not to have florid manifestations. In most cases, swelling of the liver goes away after you correct the underlying disease, but with liver disease for example cirrhosis, is required addressed to the treatment of this disease.
<urn:uuid:eea4dad7-8038-43f7-9fda-5cd60a4b2197>
CC-MAIN-2023-23
https://eng.kakprosto.ru/how-862233-what-are-the-signs-of-liver-enlargement
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647525.11/warc/CC-MAIN-20230601010402-20230601040402-00074.warc.gz
en
0.934253
558
2.6875
3
The Captain is a major character in the story, and his character holds the other crew members heads up keeping them motivated during times of distress. He was the captain on the original boat, but after the boat sank, he become injured and could not physically participate in keeping the dinghy afloat. In the beginning, the captain feels that he has lost his sense of direction due to not being used to letting others take charge. Without his sense of authority intact, he feels disconnected from the world, and his spirit becomes dismantled. However, since he was not able to contribute in the way he preferred, he led the way by giving specific instructions to the other characters in order to keep the dinghy afloat. Every member on the boat follows his directions. He commands very respectably. This... ... middle of paper ... ...ibing two different qualities that is being used together in the same statement. In summary, “The Open Boat” is a highly intriguing story that can not only be read for pure enjoyment, but it also has a moral to the story. No matter where someone comes from in life, whether someone is the richest or the poorest person on Earth, he or she should always make sure to make it a point to look out for someone and have their back when they are struggling. By looking out for each other, just as they did in “The Open Boat,” they created strong everlasting friendships. If someone is being looked out for by someone else, then that person will make a point to return the favor as well. Life is just like the ocean. We might have our ups and our downs, but life never changes. The only thing that will affect the outcome of our lives is the perspective that we put toward our life. Need Writing Help? Get feedback on grammar, clarity, concision and logic instantly.Check your paper » - Literary Criticism Essay “The Open Boat” fixates on the idea that Nature doesn’t care about man, and gives a glimpse of how men form a bond of brotherhood to overcome it. Stephen Crane’s poem War Is Kind exemplifies the disdain ways of nature and how it engenders it to be dispassionate towards men. Crane exemplifies that Nature finds man unworthy of its consideration by the way he writes about death. In the beginning of the poem Crane writes “Because your lover threw wild hands towards the sky And the affrighted steed ran on alone, Do not weep.... [tags: The Open Boat, Stephen Crane, Literature, Man] 771 words (2.2 pages) - American author, Stephen Crane often wrote about different predicaments that his fellow men encounters. “The Open Boat” is a fictional account of his experience as a correspondent shipwrecked while on expedition to the Cuban revolutionaries in 1897 (http://www.poetryfoundation.org/bio/stephen-crane) where he spent over 30 hours on a life boat with three other passengers. This realistic story depicts how four men are forced onto a 10 foot dingy after their ship sinks. Crane takes a realist approach when describing the natural elements such as unsettling winds and the raging seas which represent the uncaring and unforgiving nature of life.... [tags: The Open Boat, Stephen Crane, Nature, Man] 701 words (2 pages) - “The Open Boat” by Stephen Crane There are many inspiring literary works from the short stories, plays and poems but there is one in particular that will have a lasting and profound effect on my perspective concerning the strength and determination of mankind, “The Open Boat” by Stephen Crane. Crane presents the epic battle of man against nature with such vivid imagery that it ignites the imagination. It is an attribute of mankind to seek supremacy against each other, fate and nature itself, as can be seen in this short story.... [tags: The Open Boat, Stephen Crane, Man, Perception] 724 words (2.1 pages) - Never rely on others “Don’t depend too much on anyone in this world. Because even your shadow leaves you when you’re in darkness” (lbn Taymiyyah). The idea of this quote may seem ridiculous to some people that do not depend on anyone, because in this world, people have too many families and friends that we can rely on. However there are some situations that our friends and families cannot help up out. Like in the story “The Open Boat” by Stephen Crane, tells a story about four men-a captain, a cook, an oiler, and a correspondent who float in an open boat over the sea.... [tags: The Open Boat, Stephen Crane, Help me, A Story] 842 words (2.4 pages) - Stephen Crane's "The Open Boat" “None of them knew the color of the sky.” This first sentence in Stephen Crane’s “The Open Boat” implies the overall relationship between the individual and nature. This sentence also implies the limitations of anyone’s perspective. The men in the boat concentrate so much on the danger they are in, that they are oblivious and unaware to everything else; in other words, maybe lacking experience. “The Open Boat” begins with a description of four men aboard a small boat on a rough sea.... [tags: Open Boat Stephen Crane Essays] 776 words (2.2 pages) - The Power of Nature Revealed in The Open Boat In 1894, Stephen Crane said, "A man said to the universe: 'Sir, I exist!' 'However,' replied the universe, 'The fact has not created in me a sense of obligation.'" This short encounter of man and nature is representative of Crane’s view of nature. However, he did not always see nature as indifferent to man. In 1887, he survived a shipwreck with two other men. "The Open Boat" is his account from an outsider’s point of view of the two days spent in a dinghy.... [tags: Open Boat Essays] 930 words (2.7 pages) - Determinism, Objectivity, and Pessimism in The Open Boat In Stephen Crane's short story "The Open Boat", the American literary school of naturalism is used and three of the eight features are most apparent, making this work, in my opinion, a good example of the school of naturalism. These three of the eight features are determinism, objectivity, and pessimism. They show, some more than others, how Stephen Crane viewed the world and the environment around him. Determinism is of course the most obvious of the three features.... [tags: Open Boat Essays] 694 words (2 pages) - Indifference to Anxiety in Crane's The Open Boat In recent years, critical response to Stephen Crane's The Open Boat has shifted dramatically, focusing less on the tale's philosophical agendas than on its epistemological implications. The story no longer stands as merely a naturalistic depiction of nature's monumental indifference or as simply an existential affirmation of fife's absurdity. Instead, we have slowly come to realize a new level of the text, one that, according to Donna Gerstenberger, explores "man's limited capacities for knowing reality" (557).... [tags: Open Boat Essays] 2604 words (7.4 pages) - Stephen Crane's The Open Boat Humanity often tends to see itself as being somehow important in the grand scheme of the Universe. We speak of 'fate' as if we were put here for some reason, or purpose. We have our religions, which often serve as an engine to drive our lives and as a means to give meaning to them. But why do we think of ourselves in such a superior fashion. Do we really matter at all. Would the Universe stop if we were suddenly taken away. In his short story, 'The Open Boat,' Stephen Crane shows us a Universe totally unconcerned with the affairs of humankind; it is an indifferent Universe in which Man has to struggle to survive.... [tags: Stephen Crane Open Boat Essays Papers] 1032 words (2.9 pages) - Analysis of The Open Boat by Stephen Crane Story: “The Open Boat,” 1897 Author: Stephen Crane (1871-1900) Central Character: There is no real central character in this story. All the men on the boat are spoken about more or less equally and no prominent character jumps out at the reader as being the central character. Although more emphasis is put onto the correspondent, and Billie the oiler. Other Character: The cook: bails water from boat. Billie the oiler: steers and rows boat, is the only of the men that does not make it alive to land.... [tags: The Open Boat Stephen Crane Essays] 1402 words (4 pages)
<urn:uuid:1a5049d3-4d4e-4fac-a979-7685062dbb90>
CC-MAIN-2019-47
https://www.123helpme.com/the-open-boat-preview.asp?id=222082
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670006.89/warc/CC-MAIN-20191119042928-20191119070928-00101.warc.gz
en
0.954364
1,835
3.3125
3
Did you know that 80 percent of all strokes are preventable? Learn which foods should be eaten in moderation to reduce your family’s risk of stroke. By Sadie Wangler, Neurosciences Program Manager for Renown Institute for Neurosciences Stroke is the fifth leading cause of death in the nation and a major cause for disability, killing 130,000 people each year. But did you know that 80 percent of all strokes are preventable, according to the American Stroke Association? Several stroke risk factors — high blood pressure, smoking, diabetes, physical activity level, obesity, high cholesterol and heart and artery disease — can be controlled, treated and improved, right down to the foods we choose to consume each day. Diets high in sodium can increase blood pressure, putting you at greater risk for stroke. A high-calorie diet can lead to obesity — another risk factor. And foods high in saturated fats, trans fat and cholesterol will raise your blood cholesterol levels causing blood clots, which — you guessed it — can lead to a stroke. The “not-so-fab” five foods listed below play a large role in damaging your body and causing vascular disease, stroke and heart disease and should be avoided on a regular basis. However: Moderation is the key to life, in my opinion. Sure, everyone is going to have a soda here and there or a steak off the grill, but keep it off the main menu. Packaged and Fried Food Have you noticed foods like hot dog buns and bottled salad dressings rarely go bad? Ever asked yourself why? This is due to the use of hydrogenated oils, which are trans fats. Hydrogenated oils stay solid at room temperature and do not require refrigeration. Convenient? Yes. Healthy? No. Unfortunately, many frozen foods and meals also fall into this category, except for frozen fruits and veggies. So here’s the lowdown on trans fats: They’re considered by many experts as the worst type of fat you can consume, raising your LDL (“bad”) cholesterol and lowering your HDL (“good”) cholesterol. While some meat and dairy products contain small amounts of naturally occurring trans fat, most dietary sources are formed through an industrial process adding hydrogen to vegetable oil, causing the oil to solidify at room temperature. The FDA is in the process of restricting or possibly banning trans-fats from food in the U.S. A study published in JAMA Cardiology compared data from counties with and without trans-fat restrictions and the findings were substantial: There was a 6 percent decline in hospitalizations for heart attack and stroke in counties with trans-fat restrictions. Bottom line: Ideally no processed food should pass your lips, but realistically, aim for less than 2 grams of trans fat per day. Skip the store-bought treats at the office and fries at lunch. Also avoid crackers, regardless of what you are dipping them in. Choose to eat fruits to satisfy your sweet cravings and veggies and hummus to satisfy the savory. Processed meats, including bacon, smoked meats and hot dogs, are all on the DNE (Do Not Eat) list, unless you want to play with fire. Processed meats are a no-go if you want to keep your arteries clear of plaque buildup. So what is the alternative to your salami sandwich? Try a healthy alternative like a tuna sandwich with avocado (a great alternative to mayo) or a veggie sandwich. Diet soft drinks First of all, when a drink is sweeter than a candy bar but it contains zero sugar and zero calories, buyer beware. Many consumers think because a soda is labeled “diet” it’s a better choice, but studies have linked diet soft drink consumption with an increased risk of stroke and vascular disease. In a nine-year study of more than 2,500 people, those who drank diet soda daily were 48 percent more likely to have a heart attack or stroke or die from those events, compared with those who rarely or never drank soda. What else are you supposed to drink? If you must drink soda, break the everyday habit and drink it on special occasions; otherwise water rules. And if you don’t like water, try flavoring your water with fruit slices. Good-old red meat So is there ANY good meat out there you ask? The answer is yes, but it’s not red. In the journal Stroke, an article showed women who consumed large servings of red meat regularly had a 42 percent higher incidence of stroke. Red meat is high in saturated fat, which clogs arteries with plaque. The alternative to red meat is a heart-healthy protein like poultry or fish, or even non-animal products like beans, nuts and tofu. Steer clear of factory processed soups, beans and sauces. Canned items all have incredible amounts of sodium or MSG or baking soda/powder to maintain their freshness and shelf life. One study showed if you consume more than 4,000 mg of salt per day, you more than double the risk of stroke compared to diets with less than 2,000 mg. Another tip: When possible, plan and make meals from scratch. Making the wrong meal or snack choices is one of the biggest contributing risk factors for stroke and heart disease. Most people know what good food choices are, but they don’t realize the serious impact the bad choices have on overall health. Learn what is most beneficial to your body to consume. It will be a life changer … literally.
<urn:uuid:f58b1fa3-85d0-40fd-8a54-fc9c302e1e09>
CC-MAIN-2017-39
http://bestmedicinenews.org/nutrition/the-not-so-fab-five-foods-that-increase-stroke-and-heart-disease-risk/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688926.38/warc/CC-MAIN-20170922074554-20170922094554-00594.warc.gz
en
0.943625
1,156
3.015625
3
Croatia was once the tourist centre of the former Yugoslavia, boasting a thriving hospitality industry. Visitors were attracted by the gorgeous summer climate and rich, diverse culture – Dubrovnik, known as the Pearl of the Adriatic, and Split were particularly popular. In 1990, over 8.5 million tourists visited the country. However, with the outbreak of civil war in 1991, Yugoslavia broke apart in a prolonged and bloody ethnic conflict. IN THE SHADOW OF WAR After the Second World War, Croatia became a multiethnic republic forming part of the socialist federation that was Yugoslavia. Following the death in 1980 of President Tito, the federation saw its individual members increasingly asserting their desire for independence, a trend accelerated by the fall of communism in Eastern Europe in 1989. In 1991 Croatia declared independence, following free elections the previous year for the first time in half a century. A Croatian Serb force backed by the Yugoslav Army (JNA) responded by expelling Croats in eastern Yugoslavia, sparking the four-year conflict. The consequences were almost as ruinous for the hospitality industry as they were for the Croats. In Dubrovnik, for example, which was bombarded by the JNA, up to 70% of the city’s buildings were damaged by heavy shelling and many historic monuments were destroyed. During the war, the hotel sector had a very different role. “Hotels were used to accommodate refugees and displaced persons,” explains Amelia Tomasevic, managing director of the Zagreb Tourist Board and the former general manager of the Hotel Esplanade in Zagreb. “Out of 700,000 refugees in 1992, some 65,000 were accommodated in over 200 hotels.” After the war ended in 1995, hotels remained homes for the displaced. In 1997 there were still 15,000 refugees housed in over 140 hotels. Tomasevic notes that one refugee from Vukovar, Branka Boban, arrived at the Hotel Esplanade in Zagreb in 1991 and only left when the hotel closed for renovation in 2003. “Most displaced people arrived from rural areas and their room became their home,” adds Tomasevic. “Hoteliers provided safety, support, love, protection and food. They empathised with their unhappy guests – they became part of their lives.” Since 1995 hotels have made themselves a home for tourists rather than refugees. Requiring massive investment; the tourism industry had collapsed; much of the tourism infrastucture had been destroyed and many hotels had to be reconstructed. Hotels were forced to apply for substantial bank loans and there was an exodus of qualified staff. RECAPTURING FORMER GLORIES 12 years after the end of war, Croatia is seeing something of a tourism boom. The Croatian Tourist Board’s slogan, ‘The Mediterranean As It Once Was’, reflects this newfound confidence. The reconstruction of Dubrovnik has been a key part of this resurgence. Since 1991 the Croatian Government has spent around $2m a year on the city, with further investment coming from abroad. The redevelopment of infrastructure has also been vital, with 350km of new motorways constructed in recent years. Today Croatia is seeing record annual numbers of tourists. In 2006 the total topped ten million for the first time. The renovation work on existing hotels and the opening of new properties is clearly paying off. The government is also focused on revitalising rural tourism, offering incentives and education programmes for individual households and promoting Croatia’s cultural heritage. New hotel developments in Dubrovnik include the five-star Rixos Hotel Libertas and Hotel Bellevue. Tomasevic is understandably bullish about the future. “Looking ahead, the goal is to achieve 11 million arrivals and 66 million overnight stays by 2010, which looks achievable given the investment infrastructure and properties, and the growing appeal of the country’s climate and culture to international visitors.” As with many other destinations in Eastern Europe, investment is still needed, most likely from Western hotel operators looking for further opportunities in the in the region. Regardless, Croatia has made some giant steps in getting tourism back to pre-1991 levels and looks poised for further growth.
<urn:uuid:6f0d4212-cf6f-4ac6-8844-096292ad952d>
CC-MAIN-2020-40
https://www.hotelmanagement-network.com/features/feature1092/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400226381.66/warc/CC-MAIN-20200925115553-20200925145553-00360.warc.gz
en
0.972703
878
3.125
3
Skip to Main Content We are developing a modular electronic device to allow users to perceive and respond simultaneously to multiple spatial information sources using haptic stimulus. Each module of this wearable "haptic radar" acts as an artificial hair capable of sensing obstacles, measuring their range and transducing this information as a vibro-tactile cue on the skin directly beneath the module. Our first prototype (a headband) provides the wearer with 360 degrees of spatial awareness thanks to invisible, insect-like antennas. During a proof-of-principle experiment, a significant proportion (87%, p = 1.26 * 10-5) of participants moved to avoid an unseen object approaching from behind without any previous training. Participants reported the system as more of a help, easy, and intuitive. Among the numerous potential applications of this interface are electronic travel aids and visual prosthetics for the blind, augmentation of spatial awareness in hazardous working environments, as well as enhanced obstacle awareness for motorcycle or car drivers (in this case the sensors may cover the surface of the car).
<urn:uuid:230fb58b-faec-453d-ba8a-be0e958ae6bb>
CC-MAIN-2014-10
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&Citations&tp=&arnumber=4067727&contentType=Conference+Publications&sortType%3Dasc_p_Sequence%26filter%3DAND(p_IS_Number%3A4067708)
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021767149/warc/CC-MAIN-20140305121607-00097-ip-10-183-142-35.ec2.internal.warc.gz
en
0.903566
215
2.8125
3
Why Lesson Planet? Find quality lesson planning resources, fast! Share & remix collections to collaborate. Organize your curriculum with collections. Easy! Have time to be more creative & energetic with your students! In this alphabet letter C learning exercise, students trace and write the uppercase and lowercase letter C ten times each. Students write the letter C next to the seven pictures that begin with the letter C and draw their favorite C word. 5 Views 13 Downloads
<urn:uuid:0d54edbb-a5d0-4af0-aadb-b84c97ff790d>
CC-MAIN-2017-04
https://www.lessonplanet.com/teachers/letter-c-worksheet
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281421.33/warc/CC-MAIN-20170116095121-00570-ip-10-171-10-70.ec2.internal.warc.gz
en
0.840404
99
3.671875
4
March 2018 health news roundup is coming a bit late. I apologies. Here are some insightful health news, that you will find informative just in case you didin’t know. - THE WEARABLE BRAIN SCANNER YOU CAN MOVE AROUND IN If you have ever gotten your brain scanned before, you would know that you have to sit absolutely still in a particular position for hours before any results can be achieved. Also, before now, it was difficult to measure accurately the brain activities of babies, children and people with movement disorder. An improvement in science has now made it possible. Scientists in Nottingham have invented a new type of brain scanner that can be worn on the head, allowing patients to move while being scanned. The device records the tiny magnetic fields generated by the brain. Magnetoencephalography [MEG] has been around for decades, but conventional scanners are large, weighing half a ton. The sensors used to measure the brain’s magnetic fields have to be super cooled to minus 269c. The MEG scanners are largely limited to research, because its subjects have to keep completely still. But with this newly developed wearable MEG, which uses light weight quantum sensors mounted in a 3D printed helmet, the subjects can behave totally natural which is a plus while scanning for total brain activities. This wearable MEG scanner will also be useful in imaging patients with Parkinson’s disease. - THIS MODIFIED SMARTPHONE MEASURES BLOOD PRESSURE DIRECTLY FROM YOUR FINGER High blood pressure can lead to heart disease and stroke, but it often goes undetected and untreated. A new technology could change that by putting a simple blood pressure monitor in everyone’s pockets. Normally, blood pressure is measured using an inflatable cuff that presses down on an artery in the arm while a device records the effect on blood flow. Now, scientists have created a smartphone attachment that measures blood pressure directly from the finger, removing the need for any specialized equipment. The user places their finger on a pressure sensor and is guided by a chart displayed on the phone to gradually increase the applied force. Meanwhile, another sensor measures blood volume by illuminating the finger and detecting changes in how light is absorbed. Software on the phone then uses this information to determine blood pressure. The researchers tested their prototype on 30 people, and found that most, quickly learned how to use it. Although the device was not quite as precise as an arm monitor, the scientists say its accuracy could be improved by taking multiple measurements over time. Modern smartphones already contain most of the hardware needed to transform them into portable blood pressure monitors, which would be particularly useful in developing countries where access to cuff-based devices is limited, but where smartphones are becoming commonplace. Talk of Science and Tech enhancing health care. - INTERSTITIUM: NEWLY FOUND ORGAN IN THE HUMAN BODY Scientists have identified a new human organ hiding in plain sight, in a discovery they hope could help them understand the spread of cancer within the body. Layers long thought to be dense, connective tissue are actually a series of fluid-filled compartments researchers have termed the “interstitium”. These compartments are found beneath the skin, as well as lining the gut, lungs, blood vessels and muscles, and join together to form a network supported by a mesh of strong, flexible proteins Remarkably, the interstitium had previously gone unnoticed despite being one of the largest organs in the human body. The study said the interstitium can compress or expand in size, suggesting it could serve as “shock absorbers” for other parts of the body. This is the second time in as many years humans have learned details about a new organ. Last year, an Irish surgeon discovered the mesentery, which connects the intestine to the abdomen. Its identifiable function is still not known. Officially, the interstitium has been defined as a contiguous fluid-filled space existing between the skin and the body organs, including muscles and the circulatory system. The fluid in this space is called interstitial fluid (or lymph), which is composed of extracellular fluid and its solutes. - TOXIC FOODS YOU EAT EVERYDAY The number one cause of injury-related death is poisoning. That is why the third week of March is National Poison Prevention Week. Poisonous items in your home don’t always have a warning label, so what you could be eating every day may be toxic to your health. Fruits are good for a healthy diet, but what’s inside some fruits may send you to the hospital. Some seeds and pits contain cyanide, a poisonous chemical that can be deadly in high doses. So beware of the seeds and pits from apples, cherries, apricots and peaches. A few won’t do any harm if eaten accidentally, but ingesting just a couple of milligrams of these seeds can do some serious damage. You should also be on the lookout for a popular item in wines and teas. Elderberry leaves and stems can produce cyanide and uncooked elderberries contain a toxic alkaloid. Another warning: nutmeg, if consumed in large amounts, can have hallucinogenic effects. Eating five or more grams can cause gastrointestinal reactions and heart palpitations. Finally, potatoes are great to make fries and chips with, but green potatoes have toxic levels of a harmful pesticide that can cause nausea, headaches and neurological problems. - MALE BIRTH CONTROL PILLS COULD BE AVAILABLE SOON In March 2018, researchers at the University of Washington, Seattle announced they may have finally created an effective male birth control pill. Known as Dimethandrolone Undecanoate [DMAU], the male pill contains a combination of hormones that suppress sperm production and is taken once a day. In addition to blood work indicating the pill was working effectively, research subjects who took the pill reported minimal side effects. While further studies are necessary before the pill becomes widely available, the news is promising. For years, researchers have attempted to create a male birth control pill, but have run into a number of common problems. Testosterone used in past male birth control pills could cause liver problems. In addition to this, pills previously tested had to be taken twice daily to work effectively. While the new pill causes mild cholesterol issues, it so far seems to have avoided many of the major problems associated with male birth control in the past. The real question now is , how willing will men be to take birth control pills? A burden that seems to have been on females for years past. Time will tell how the male population receive this new development.
<urn:uuid:8ce86beb-3e87-4276-b2d1-9a4698e8c1d6>
CC-MAIN-2018-47
https://yourhealthattitude.com/march-2018-health-news-roundup/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743216.58/warc/CC-MAIN-20181116214920-20181117000920-00154.warc.gz
en
0.947217
1,396
3.03125
3
What was World War One about? How did it start? Who won? And what did they win? Now, 100 years after those final shots rang out, these questions still puzzle historians and laymen alike. But as we shall see, this confusion is not a happenstance of history but the wool that has been pulled over our eyes to stop us from seeing what WWI really was. This is the story of WWI that you didn’t read in the history books. This is The WWI Conspiracy. November 11, 1918. All across the Western front, the clocks that were lucky enough to escape the four years of shelling chimed the eleventh hour. And with that the First World War came to an end. From 10 o’clock to 11 — the hour for the cessation of hostilities — the opposed batteries simply raised hell. Not even the artillery prelude to our advance into the Argonne had anything on it. To attempt an advance was out of the question. It was not a barrage. It was a deluge.[. . .] Nothing quite so electrical in effect as the sudden stop that came at 11 A. M. has ever occurred to me. It was 10:60 precisely and — the roar stopped like a motor car hitting a wall. The resulting quiet was uncanny in comparison. From somewhere far below ground, Germans began to appear. They clambered to the parapets and began to shout wildly. They threw their rifles, hats, bandoleers, bayonets and trench knives toward us. They began to sing. And just like that, it was over. Four years of the bloodiest carnage the world had ever seen came to a stop as sudden and bewildering as its start. And the world vowed “Never again.” Each year, we lay the wreath. We hear “The Last Post.” We mouth the words “never again” like an incantation. But what does it mean? To answer this question, we have to understand what WWIwas. WWI was an explosion, a breaking point in history. In the smoldering shell hole of that great cataclysm lay the industrial-era optimism of never-ending progress. Old verities about the glory of war lay strewn around the battlefields of that “Great War” like a fallen soldier left to die in No Man’s Land, and along with it lay all the broken dreams of a world order that had been blown apart. Whether we know it or not, we here in the 21st century are still living in the crater of that explosion, the victims of a First World War that we are only now beginning to understand. What was World War One about? How did it start? Who won? And what did they win? Now, 100 years after those final shots rang out, these questions still puzzle historians and laymen alike. But as we shall see, this confusion is not a happenstance of history but the wool that has been pulled over our eyes to stop us from seeing what WWI really was. This is the story of WWI that you didn’t read in the history books. This is The WWI Conspiracy. PART ONE – TO START A WAR June 28, 1914. The Archduke Franz Ferdinand, heir to the Austro-Hungarian throne, and his wife Sophie are in Sarajevo for a military inspection. In retrospect, it’s a risky provocation, like tossing a match into a powder keg. Serbian nationalism is rising, the Balkans are in a tumult of diplomatic crises and regional wars, and tensions between the kingdom of Serbia and the Austro-Hungarian Empire are set to spill over. But despite warnings and ill omens, the royal couple’s security is extremely lax. They board an open-top sports car and proceed in a six-car motorcade along a pre-announced route. After an inspection of the military barracks, they head toward the Town Hall for a scheduled reception by the Mayor. The visit is going ahead exactly as planned and precisely on schedule. And then the bomb goes off. As we now know, the motorcade was a death trap. Six assassins lined the royal couple’s route that morning, armed with bombs and pistols. The first two failed to act, but the third, Nedeljko Čabrinović, panicked and threw his bomb onto the folded back cover of the Archduke’s convertible. It bounced off onto the street, exploding under the next car in the convoy. Franz Ferdinand and his wife, unscathed, were rushed on to the Town Hall, passing the other assassins along the route too quickly for them to act. Having narrowly escaped death, the Archduke called off the rest of his scheduled itinerary to visit the wounded from the bombing at the hospital. By a remarkable twist of fate, the driver took the couple down the wrong route, and, when ordered to reverse, stopped the car directly in front of the delicatessen where would-be assassin Gavrilo Princip had gone after having failing in his mission along the motorcade. There, one and a half metres in front of Princip, were the Archduke and his wife. He took two shots, killing both of them. Yes, even the official history books—the books written and published by the “winners”—record that the First World War started as the result of a conspiracy. After all, it was—as all freshman history students are taught—the conspiracy to assassinate the Archduke Franz Ferdinand that led to the outbreak of war. That story, the official story of the origins of World War I, is familiar enough by now: In 1914, Europe was an interlocking clockwork of alliances and military mobilization plans that, once set in motion, ticked inevitably toward all out warfare. The assassination of the Archduke was merely the excuse to set that clockwork in motion, and the resulting “July crisis” of diplomatic and military escalations led with perfect predictability to continental and, eventually, global war. In this carefully sanitized version of history, World War I starts in Sarajevo on June 28, 1914. But this official history leaves out so much of the real story about the build up to war that it amounts to a lie. But it does get one thing right: The First World War was the result of a conspiracy. To understand this conspiracy we must turn not to Sarajevo and the conclave of Serbian nationalists plotting their assassination in the summer of 1914, but to a chilly drawing room in London in the winter of 1891. There, three of the most important men of the age—men whose names are but dimly remembered today—are taking the first concrete steps toward forming a secret society that they have been discussing amongst themselves for years. The group that springs from this meeting will go on to leverage the wealth and power of its members to shape the course of history and, 23 years later, will drive the world into the first truly global war. Their plan reads like outlandish historical fiction. They will form a secret organization dedicated to the “extension of British rule throughout the world” and “the ultimate recovery of the United States of America as an integral part of a British Empire.” The group is to be structured along the lines of a religious brotherhood (the Jesuit order is repeatedly invoked as a model) divided into two circles: an inner circle, called “The Society of the Elect,” who are to direct the activity of the larger, outer circle, dubbed “The Association of Helpers” who are not to know of the inner circle’s existence. “British rule” and “inner circles” and “secret societies.” If presented with this plan today, many would say it was the work of an imaginative comic book writer. But the three men who gathered in London that winter afternoon in 1891 were no mere comic book writers; they were among the wealthiest and most influential men in British society, and they had access to the resources and the contacts to make that dream into a reality. Present at the meeting that day: William T. Stead, famed newspaper editor whose Pall Mall Gazette broke ground as a pioneer of tabloid journalism and whose Review of Reviews was enormously influential throughout the English-speaking world; Reginald Brett, later known as Lord Esher, an historian and politician who became friend, confidant and advisor to Queen Victoria, King Edward VII, and King George V, and who was known as one of the primary powers-behind-the-throne of his era; and Cecil Rhodes, the enormously wealthy diamond magnate whose exploits in South Africa and ambition to transform the African continent would earn him the nickname of “Colossus” by the satirists of the day. But Rhodes’ ambition was no laughing matter. If anyone in the world had the power and ability to form such a group at the time, it was Cecil Rhodes. Richard Grove, historical researcher and author, TragedyAndHope.com. RICHARD GROVE: Cecil Rhodes also was from Britain. He was educated at Oxford, but he only went to Oxford after he went to South Africa. He had an older brother he follows into South Africa. The older brother was working in the diamond mines, and by the time Rhodes gets there he’s got a set up, and his brother says “I’m gonna go off and dig in the gold mines. They just found gold!” And so he leaves Cecil Rhodes, his younger brother—who’s, like, in his 20s—with this whole diamond mining operation. Rhodes then goes to Oxford, comes back down to South Africa with the help of Lord Rothschild, who had funding efforts behind De Beers and taking advantage of that situation. And from there they start to use what—there’s no other term than “slave labor,” which then turns in later to the apartheid policy of South Africa. GERRY DOCHERTY: Well, Rhodes was particularly important because in many ways, at the end of the 19th century, he seriously epitomized where capitalism was [and] where wealth really lay. Gerry Docherty, WWI scholar and co-author of Hidden History: The Secret Origins of the First World War. DOCHERTY: Rhodes had the money and he had the contacts. He was a great Rothschild man and his mining wealth was literally uncountable. He wanted to associate himself with Oxford because Oxford gave him the kudos of the university of knowledge, of that kind of power. And in fact that was centered in a very secretive place called “All Souls College.” Still you’ll find many references to All Souls College and “people behind the curtain” and such phrases [as] “power behind thrones.” Rhodes was centrally important in actually putting money up in order to begin to gather together like-minded people of great influence. Rhodes was not shy about his ambitions, and his intentions to form such a group were known to many. Throughout his short life, Rhodes discussed his intentions openly with many of his associates, who, unsurprisingly, happened to be among the most influential figures in British society at that time. More remarkably, this secret society—which was to wield its power behind the throne—was not a secret at all. The New York Times even published an article discussing the founding of the group in the April 9, 1902, edition of the paper, shortly after Rhodes’ death. The article, headlined “Mr. Rhodes’s Ideal of Anglo-Saxon Greatness” and carrying the remarkable sub-head “He Believed a Wealthy Secret Society Should Work to Secure the World’s Peace and a British-American Federation,” summarized this sensational plan by noting that Rhodes’ “idea for the development of the English-speaking race was the foundation of ‘a society copied, as to organization, from the Jesuits.’” Noting that his vision involved uniting “the United States Assembly and our House of Commons to achieve ‘the peace of the world,’” the article quotes Rhodes as saying: “The only thing feasible to carry out this idea is a secret society gradually absorbing the wealth of the world.” This idea is laid down in black and white in a series of wills that Rhodes wrote throughout his life, wills that not only laid out his plan to create such a society and provided the funds to do so, but, even more remarkably, were collected in a volume published after his death by co-conspirator William T. Stead. GROVE: Rhodes also left his great deal of money—not having any children, not having married, dying at a young age—left it in a very well-known last will and testament, of which there were several different editions naming different benefactors, naming different executors. So in 1902 Cecil Rhodes dies. There’s a book published that contains his last will and testament. The guy who wrote the book, William T. Stead, was in charge of a British publication called The Review of Reviews. He was part of Rhodes’ Round Table group. He at one time was an executor for the will, and in that will it says that he laments the loss of America from the British Empire and that they should formulate a secret society with the specific aim of bringing America back into the Empire. Then he names all the countries that they need to include in this list to have world domination, to have an English-speaking union, to have British race as the enforced culture on all countries around the world. The will contains the goal. The goal is amended over a series of years and supported and used to gain support. And then, by the time he dies in 1902, there’s funding, there’s a plan, there’s an agenda, there’s working groups, and it all launches and then takes hold. And then not too long later, you’ve got World War One and then from that you’ve got World War Two and then you’ve got a century of control and slavery that really could have been prevented. When, at the time of Rhodes’ death in 1902, this “secret” society decided to partially reveal itself, it did so under the cloak of peace. It was only because they desired world peace, they insisted, that they had created their group in the first place, and only for the noblest of reasons that they aimed to “gradually absorb the wealth of the world.” But contrary to this pacific public image, from its very beginnings the group was interested primarily in war. In fact, one of the very first steps taken by this “Rhodes Round Table” (as it was known by some) was to maneuver the British Empire into war in South Africa. This “Boer War” of 1899–1902 would serve a dual purpose: it would unite the disparate republics and colonies of South Africa into a single unit under British imperial control, and, not incidentally, it would bring the rich gold deposits of the Transvaal Republic into the orbit of the Rothschild/Rhodes-controlled British South Africa Company. The war was, by the group’s own admission, entirely its doing. The point man for the operation was Sir Alfred Milner, a close associate of Rhodes and a member of the secret society’s inner circle who was then the governor of the British Cape Colony. Although largely forgotten today, Alfred Milner (later 1st Viscount Milner) was perhaps the most important single figure in Britain at the dawn of the 20th century. From Rhodes’ death in 1902, he became the unofficial head of the roundtable group and directed its operations, leveraging the vast wealth and influence of the group’s exclusive membership to his own ends. With Milner, there was no compunction or moral hand-wringing about the methods used to bring about those ends. In a letter to Lord Roberts, Milner casually confessed to having engineered the Boer War: “I precipitated the crisis, which was inevitable, before it was too late. It is not very agreeable, and in many eyes, not a very creditable piece of business to have been largely instrumental in bringing about a war.” When Rhodes’ co-conspirator and fellow secret society inner circle member William Stead objected to war in South Africa, Rhodes told him: “You will support Milner in any measure that he may take short of war. I make no such limitation. I support Milner absolutely without reserve. If he says peace, I say peace; if he says war, I say war. Whatever happens, I say ditto to Milner.” The Boer War, involving unimaginable brutality—including the death of 26,000 women and children in the world’s first (British) concentration camps—ended as Rhodes and his associates intended: with the formerly separate pieces of South Africa being united under British control. Perhaps even more importantly from the perspective of the secret society, it left Alfred Milner as High Commission of the new South African Civil Service, a position from which he would cultivate a team of bright, young, largely Oxford-educated men who would go on to serve the group and its ends. And from the end of the Boer War onward, those ends increasingly centered around the task of eliminating what Milner and the Round Table perceived as the single greatest threat to the British Empire: Germany. DOCHERTY: So in the start it was influence—people who could influence politics, people who had the money to influence statesmen—and the dream. The dream of actually crushing Germany. This was a basic mindset of this group as it gathered together. Germany. In 1871, the formerly separate states of modern-day Germany united into a single empire under the rule of Wilhelm I. The consolidation and industrialization of a united Germany had fundamentally changed the balance of power in Europe. By the dawn of the 20th century, the British Empire found itself dealing not with its traditional French enemies or its long-standing Russian rivals for supremacy over Europe, but the upstart German Empire. Economically, technologically, even militarily; if the trends continued, it would not be long before Germany began to rival and even surpass the British Empire. For Alfred Milner and the group he had formed around him out of the old Rhodes Round Table society, it was obvious what had to be done: to change France and Russia from enemies into friends as a way of isolating, and, eventually, crushing Germany. PETER HOF: Yes, well from the British perspective, Germany, after their unification in 1871, they became very strong very quickly. And over time this worried the British more and more, and they began to think that Germany represented a challenge to their world hegemony. And slowly but surely they came to the decision that Germany must be confronted just as they had come to the same decision with regard to other countries—Spain and Portugal and especially France and now Germany. German finished goods were marginally better than those of Britain, they were building ships that were marginally better than those of Britain, and all of this. The British elite very slowly came to the decision that Germany needed to be confronted while it was still possible to do so. It might not be possible to do so if they waited too long. And so this is how the decision crystallized. I think that Britain might possibly have accepted the German ascendance, but they had something that was close at hand, and that was the Franco-Russian Alliance. And they thought if they could hook in with that alliance, then they had the possibility of defeating Germany quickly and without too much trouble. And that is basically what they did. But crafting an alliance with two of Britain’s biggest rivals and turning public opinion against one of its dearest continental friends was no mean feat. To do so would require nothing less than for Milner and his group to seize control of the press, the military and all the diplomatic machinery of the British Empire. And so that’s exactly what they did. The first major coup occurred in 1899, while Milner was still in South Africa launching the Boer War. That year, the Milner Group ousted Donald Mackenzie Wallace, the director of the foreign department at The Times, and installed their man, Ignatius Valentine Chirol. Chirol, a former employee of the Foreign Office with inside access to officials there, not only helped to ensure that one of the most influential press organs of the Empire would spin all international events for the benefit of the secret society, but he helped to prepare his close personal friend, Charles Hardinge, to take on the crucial post of Ambassador to Russia in 1904, and, in 1906, the even more important post of Permanent Under-Secretary at the Foreign Office. With Hardinge, Milner’s Group had a foot in the door at the British Foreign Office. But they needed more than just their foot in that door if they were to bring about their war with Germany. In order to finish the coup, they needed to install one of their own as Foreign Secretary. And, with the appointment of Edward Grey as Foreign Secretary in December of 1905, that’s precisely what happened. Sir Edward Grey was a valuable and trusted ally of the Milner Group. He shared their anti-German sentiment and, in his important position of Foreign Secretary, showed no compunction at all about using secret agreements and unacknowledged alliances to further set the stage for war with Germany. HOF: He became foreign secretary in 1905, I believe, and the foreign secretary in France was of course Delcassé. And Delcassé was very much anti-German and he was very passionate about the recovery of Alsace-Lorraine, and so he and the king hit it off very well together. And Edward Grey shared this anti-German feeling with the king—as I explained in my book how he came to have that attitude about Germany. But in any case, he had the same attitude with the king. They worked very well together. And Edward Grey very freely acknowledged the heavy role that the king played in British foreign policy and he said that this was not a problem because he and the king were in agreement on most issues and so they worked with very well together. The pieces were already beginning to fall into place for Milner and his associates. With Edward Grey as foreign secretary, Hardinge as his unusually influential undersecretary, Rhodes’ co-conspirator Lord Esher installed as deputy governor of Windsor Castle where he had the ear of the king, and the king himself—whose unusual, hands-on approach to foreign diplomacy and whose wife’s own hatred of the Germans dovetailed perfectly with the group’s aims—the diplomatic stage was set for the formation of the Triple Entente between France, Russia and Great Britain. With France to the west and Russia to the east, England’s secret diplomacy had forged the two pincers of a German-crushing vise. All that was needed was an event that the group could spin to its advantage to prepare the population for war against their former German allies. Time and again throughout the decade leading up to the “Great War,” the group’s influential agents in the British press tried to turn every international incident into another example of German hostility. When the Russo-Japanese War broke out, rumours swirled in London that it was in fact the Germans that had stirred up the hostilities. The theory went that Germany—in a bid to ignite conflict between Russia and England, who had recently concluded an alliance with the Japanese—had fanned the flames of war between Russia and Japan. The truth, of course, was almost precisely the opposite. Lord Lansdowne had conducted secret negotiations with Japan before signing a formal treaty in January 1902. Having exhausted their reserves building up their military, Japan turned to Cecil Rhodes’ co-conspirator Lord Nathan Rothschild to finance the war itself. Denying the Russian navy access to the Suez Canal and high-quality coal, which they did provide to the Japanese, the British did everything they could to ensure that the Japanese would crush the Russian fleet, effectively removing their main European competitor for the Far East. The Japanese navy was even constructed in Britain, but these facts did not find their way into the Milner-controlled press. When the Russians “accidentally” fired on British fishing trawlers in the North Sea in 1904, killing three fishermen and wounding several more, the British public was outraged. Rather than whip up the outrage, however, The Times and other mouthpieces of the secret society instead tried to paper over the incident. Meanwhile, the British Foreign Office outrageously tried to blame the incident on the Germans, kicking off a bitter press war between Britain and Germany. The most dangerous provocations of the period centered around Morocco, when France—emboldened by secret military assurances from the British and backed up by the British press—engaged in a series of provocations, repeatedly breaking assurances to Germany that Morocco would remain free and open to German trade. At each step, Milner’s acolytes, both in government and in the British press, cheered on the French and demonized any and every response from the Germans, real or imagined. DOCHERTY: Given that we’re living in a world of territorial aggrandizement, there was a concocted incident over Morocco and the allegation that Germany was secretly trying to take over the British/French influence on Morocco. And that literally was nonsense, but it was blown up into an incident and people were told “Prepare! You had better prepare yourself for the possibility of war because we will not be dictated to by that Kaiser person over in Berlin!” One of the incidents —which I would need to make reference to to get the date perfectly right—referred to a threat. Well, it was portrayed as a threat. It was no more of a threat than a fly would be if it came into your room at the present moment—of a gunboat sitting off the coast of Africa. And it was purported that this was a sign that in fact Germany was going to have a deep water port and they were going to use it as a springboard to interrupt British shipping. When we researched it, Jim and I discovered that the size of that so-called gunboat was physically smaller than the king of England’s royal yacht. What? But history has portrayed this as a massive threat to the British Empire and its “masculinity,” if you like—because that’s how they saw themselves. Ultimately, the Moroccan crises passed without warfare because, despite the best efforts of Milner and his associates, cooler heads prevailed. Likewise the Balkans descended into warfare in the years prior to 1914, but Europe as a whole didn’t descend with them. But, as we well know, the members of the Round Table in the British government, in the press, in the military, in finance, in industry, and in other positions of power and influence eventually got their wish: Franz Ferdinand was assassinated and within a month the trap of diplomatic alliances and secret military compacts that had been so carefully set was sprung. Europe was at war. In retrospect, the machinations that led to war are a master class in how power really operates in society. The military compacts that committed Britain—and, ultimately, the world—to war had nothing to do with elected parliaments or representative democracy. When Conservative Prime Minister Arthur Balfour resigned in 1905, deft political manipulations ensured that members of the Round Table, including Herbert Henry Asquith, Edward Grey and Richard Haldane—three men who Liberal leader Henry Campbell-Bannerman privately accused of “Milner worship”—seamlessly slid into key posts in the new Liberal government and carried on the strategy of German encirclement without missing a step. In fact, the details of Britain’s military commitments to Russia and France, and even the negotiations themselves, were deliberately kept hidden from Members of Parliament and even members of the cabinet who were not part of the secret society. It wasn’t until November 1911, a full six years into the negotiations, that the cabinet of Prime Minister Herbert Henry Asquith started to learn the details of these agreements, agreements that had been repeatedly and officially denied in the press and in Parliament. This is how the cabal functioned: efficiently, quietly and, convinced of the righteousness of their cause, completely uncaring about how they achieved their ends. It is to this clique, not to the doings of any conspiracy in Sarajevo, that we can attribute the real origins of the First World War, with the nine million dead soldiers and seven million dead civilians that lay piled in its wake. But for this cabal, 1914 was just the start of the story. In keeping with their ultimate vision of a united Anglo-American world order, the jewel in the crown of the Milner Group was to embroil the United States in the war; to unite Britain and America in their conquest of the German foe. Across the Atlantic, the next chapter in this hidden history was just getting underway. TO BE CONTINUED . . . For those with limited bandwidth, CLICK HERE to download a smaller, lower file size version of this episode. For those interested in audio quality, CLICK HERE for the highest-quality version of this episode (WARNING: very large download).
<urn:uuid:2ea63614-44b6-4565-b502-f6de24ec8af1>
CC-MAIN-2021-21
https://theglobalelite.org/wwi-conspiracy/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243992159.64/warc/CC-MAIN-20210517084550-20210517114550-00626.warc.gz
en
0.9776
6,186
2.8125
3
Here's What You Need to Remember: The F-23 included some characteristics that may eventually find themselves in a sixth generation fighter, or perhaps in the Air Force’s “deep interceptor” intended to support B-21 Raiders on the way to their targets. For example, the V-tail aspect has been mentioned in some of the early conceptualization for a next generation fighter. And Boeing will undoubtedly hearken back to its experience with the F-23 when thinking about its next fighter. The Department of Defense (DoD) didn’t have to opt for the F-35. In the 1990s, both Boeing and Lockheed Martin bid for the next big fighter contract, a plane that would serve in each of the Air Force, Navy, and Marine Corps, as well as grace the air forces of many US allies. Boeing served up the X-32; Lockheed the X-35. The Pentagon chose the F-35. Given the struggles of the last decade with the Joint Strike Fighter, it’s impossible not to wonder about what might have been; what if DoD had gone with Boeing’s X-32 instead, or with some combination of the two aircraft? At the end of the Cold War, the Pentagon proposed a joint fighter project in the hopes of reducing the overall logistical tail of fielded forces, as well as in minimizing development costs. Each of the three fighter-flying services needed replacements for the 4th generation aircraft in their inventory; the F-15 and F-16 in the case of the Air Force, and the F/A-18 and AV-8B Harrier in the case of the Navy and the Marine Corps. The new fighter, thus, needed conventional, carrier, and STOVL (short take off vertical landing) configurations. DoD had not, historically, had good luck with joint programs, but the hope was that increased “jointness” between the services, combined with more advanced production techniques and more carefully refined logistics procedures, would make a shared fighter worth the effort. All parties understood that the winner of the competition would likely enjoy a great deal of export success, as many air forces around the world required a fifth-generation fighter. In short, this was the biggest deal on the horizon of the post-Cold War defense industry. Boeing and Lockheed Martin won contracts to develop two demonstrators each. Built to the same specifications, the X-32 and the F-35 had relatively similar performance parameters. Deciding to compete on cost, Boeing designed the X-32 around a single-piece delta wing that would fit all three variants. The X-32 lacked the shaft-driven turbofan lift of the F-35, instead using the same thrust vectoring system as the AV-8 Harrier. The X-32’s system was less advanced than the F-35’s, but also less complex. The X-32 was designed to reach Mach 1.6 in conventional flight. It could carry either six AMRAAMs or two missiles and two bombs in its internal weapons bay. Range and stealth characteristics were generally similar to those expected of the F-35, and the body of the aircraft could accommodate much of the advanced electronic equipment that the F-35 now carries. One thing is for certain; the X-32 was a ridiculously ugly aircraft. It looked like nothing so much as the spawn of an A-7 Corsair and a hideously deformed manatee. The F-35 is no prize from an aesthetic point of view, lacking the sleek, dangerous lines of the F-22, but the X-32 made the F-35 look positively sexy by comparison. How much should this matter? Not a bit. How much did it matter? Good question. Fighter pilots don’t like to fly aircraft that look like they could be run over by Florida speed boat. On more concrete grounds, Boeing’s strategy probably hurt its chances. Instead of building one demonstrator capable of fulfilling the requirements of all three services, Boeing built two; one capable of conventional supersonic flight, and the other of vertical take-off and landing. Lockheed’s prototype could do both. The Pentagon also liked the innovative (if risky) nature of the F-35’s turbolift. Finally, Lockheed’s experience with the F-22 suggested that it could probably handle another large stealth fighter project. Chosen in 2001, the F-35 went on to become the largest Pentagon procurement project of all time, and one of the most beset by trouble. The X-32 escaped all of the most significant challenges to the F-35. The X-32 never faced decades of testing and redesign; it never saw massive cost overruns; it was never subjected to an endless series of articles about how it couldn’t out-dogfight an F-16A. Nostalgia for what might have been is common in aircraft competitions, and it’s impossible to say whether the X-32 would have run into the same difficulties of the F-35. Given the complex nature of advanced fighter projects, the answer is almost certainly “yes.” But in hindsight, it almost certainly would have made more sense to go with a VSTOL alternative fighter for the Marine Corps. This would have eliminated the most complex aspect of the “joint” project; the need to create an aircraft that shared critical components across three wildly different variants. This also would have helped spread the wealth across different major defense contractors, a practice that has increasingly become a Pentagon priority. Of course, given that the STOVL aspects of the F-35 and X-32 were baked in at the proposal stage, this would have required turning the clock back all the way to 1993, not just to 2001. The Advanced Tactical Fighter (ATF) competition, staged at the end of the Cold War, yielded a pair of remarkable fighter designs. The United States would eventually select the F-22 Raptor, widely acknowledged as the most capable air superiority aircraft of the early twenty-first century. The loser, the YF-23, now graces museums in Torrance, California and Dayton, Ohio. How did the Pentagon decide on the F-22, and what impact did that decision have? We will never know, but going with the F-22 Raptor may have saved the Pentagon some major headaches. The origins of the ATF competition came in the early 1980s, when it became apparent that the Soviets were planning to field fighters (the MiG-29 and the Su-27) capable of competing effectively with the U.S. Air Force’s (USAF) F-15/F-16 “high-low” mix. The ATF would allow the US to re-establish its advantages, potentially on grounds (notably stealth) where the Soviets would struggle to compete. To great degree, the success of either of the ATF competitors was overdetermined. The Soviet Union disappeared during the course of the competition, and the major European aerospace powers largely declined to compete on the same terrain (stealth, supercruise, and eventually sensor fusion). Either the F-22 or the F-23 would become the finest fighter of the early 21st century; the only question was which aircraft would win the investment of DoD. And each plane had its advantages. The YF-23 enjoyed superior supercruise, and in some accounts better stealth performance, over the F-22. The F-22 offered a somewhat simpler, less risky design, along with an extraordinary degree of agility that made it an awesome dogfighter. As Dave Majumdar pointed out a year ago, political and bureaucratic factors contributed to the selection of the F-22. Fed up with Northrop and (the still independent) McDonnell Douglas in the wake of the B-2 and A-12 projects, the Pentagon preferred Lockheed. The US Navy disliked the F-23 for idiosyncratic reasons, and hoped it would get a crack at a heavily modified F-22. For its part, the Air Force preferred the gaudy maneuverability of the F-22, which gave it an advantage in nearly every potential combat situation. In a sense, the F-22 (and to some extent its Russian competitor, the PAK-FA) represent the ultimate expression of the jet-age air superiority fighter. They can challenge and defeat opponents in every potential aspect of a fight, while also having stealth characteristics that allow them to engage (or refuse an engagement) under highly advantageous circumstances. Had the ATF competition not taken place coincident with the collapse of the Soviet Union, the YF-23 might have stood a chance for resurrection. Some of its characteristics were sufficiently advanced that they could have drawn further attention and investment. Moreover, building the F-23 alongside the F-22 could have been justified on grounds of maintaining the health of the US defense industrial base; as it was, the selection of the Lockheed aircraft undoubtedly contributed to the decision to consolidate Boeing and McDonnell Douglas. As is the case with the X-32, the YF-23 never faced the most dramatic problems to afflict the F-22 Raptor. It never experienced cost overruns, technology failures, software snafus, or pilot-killing respiratory issues. Those problems, which regularly afflict new defense projects (in fairness, the pilot suffocation is largely idiosyncratic to the Raptor) were consequential. In context of the broader demands of the War on Terror, Secretary of Defense Robert Gates curtailed the F-22 production run at 187 operational aircraft, just as the fighter was working through its teething troubles. Although understandable at the time, this left the USAF with a fighter deficit that only the F-35 could fill. Had the YF-23 enjoyed a smoother development path (a huge “if”), the fighter might not have faced such a hostile environment as it entered service. But given that the YF-23 was generally perceived to be the more innovative (and therefore riskier) design, and that it had a slightly higher price tag, the chances that it could have sailed through without a hitch are correspondingly low. And trouble with design and production might have left the USAF with even fewer operational fighters.
<urn:uuid:78b05fa8-d163-41e9-9985-381b613864d9>
CC-MAIN-2023-50
https://nationalinterest.org/blog/reboot/ugly-stealth-fighter-almost-made-it-us-air-force-175252
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00265.warc.gz
en
0.964547
2,117
2.671875
3
“Congratulations! You’re pregnant! So how far along are you?” “Well, I’m at 18 weeks. So that’s four months. Or is it four and a half? Well, if I count back from my last cycle…Ummmmm…let me see....” If you’ve been stuck in a conversation like this one, don’t feel bad. Most people think of a pregnancy as nine months long, and when they ask you how far along you are, they expect to hear an answer in terms of months, or possibly trimesters. On the other hand, most caregivers want to be more precise and track the pregnancy in terms of weeks. To make things more confusing, the count begins with the first day of your last period – before you were even technically pregnant. So how do you sort it all out? And what’s the simplest way to answer the question,“How far along are you?” The traditional way to calculate a pregnancy is through calendar months. To calculate your due date, you take the first day of your last menstrual period, add nine months, and add one week. So if the first day of your last menstrual period was January 1, you would add nine months and one week to get a due date of October 8. In February you could say you were one month pregnant, in March you would be two months pregnant, and so on. Using that measurement, it is also easy to calculate trimesters. Months 1-3 would be your first trimester, months 4-6 would be your second trimester, and months 7-9 would be your third trimester. The second and more “official” way to calculate your pregnancy is through lunar months or weeks. This is the method that most doctors use, and the method by which most experts measure fetal development. How does it work? Each lunar month consists of four weeks, of seven days each. A “normal” pregnancy will last 280 days from the date of your last menstrual period. And here’s the confusing part – that means your pregnancy will be 40 weeks or ten “months” long, measuring in terms of lunar months. To put this method to work, let’s go back to the first example again: You’re pregnant, and the first day of your last menstrual period was January 1. You’ll still have an estimated due date of October 8. But at the time of your ovulation, about January 15, you will have been considered two weeks pregnant. By the time you miss your period, you will be considered four weeks pregnant. (By this measure, most pregnancies are not confirmed until you are five weeks pregnant.) Using this scale, your first trimester would be between conception and 13.5 weeks, your second trimester would be from 13.5 to 27 weeks, and your third trimester would be 27 to 40 weeks. Of course, all of these calculations assume that you have a standard 28-day menstrual cycle. If your cycle is longer or shorter, you will need to adjust your due date calculation. (Most due date calculators allow you to make this adjustment.) You may also need to make adjustments if you’re not sure about the first day of your last menstrual period, especially if you tend to have irregular cycles or spotting. So going back to the original question, what do you say when someone asks you how far along you are? For your grandmother, your co-worker, or a friend you meet in the supermarket, it’s easiest to answer in calendar months because those are terms that everyone understands. But for your health care providers, it’s better to be more specific and speak in terms of lunar months or weeks so that they can measure exactly where you are in terms of where you’re supposed to be. Either way, the count will be over soon enough, and you’ll face a new challenge: figuring out whether to measure your baby’s age in weeks or months.
<urn:uuid:e4791743-a146-4b95-a9b3-e2fce15901cc>
CC-MAIN-2018-26
https://www.justmommies.com/pregnancy/first-trimester/how-to-calculate-your-pregnancy-timetable-weeks-vs-months
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863980.55/warc/CC-MAIN-20180621001211-20180621021211-00052.warc.gz
en
0.957928
844
3.296875
3
What was advertised in a colonial American newspaper 250 years ago today? “Preparing a number more Accounts to be left with different Attorneys.” Daniel Fowle and Robert Fowle, the printers of the New-Hampshire Gazette, meant business. They placed a notice in their own publication to inform subscribers, advertisers, and other customers that they needed to settle their accounts or else face the consequences. The Fowles periodically placed such notices, but they ratcheted up the rhetoric in November 1768. The printers were exasperated and they made that clear to readers. The Fowles declared that they were “determined in a few Weeks, to publish a List of Customers … whose Accounts are of long standing.” With this warning, they offered a grace period. Those subscribers delinquent in settling their accounts could avoid public embarrassment by resolving the matter soon after this notice appeared in the newspaper. If they chose, however, not to take advantage of the grace period then they could expect to have their public shaming compounded by having “the Sum due” printed alongside their name. The printers aimed “to show how injuriously they are treated” by customers who refused to pay their bills. Furthermore, the Fowles made it clear they were aware of some of the stratagems used by those who owed them money. “Many Customers who live in the Country,” they observed, “are often seen in Town, but if possible avoid coming to the Printing Office.” To add insult to injury, those who did visit often informed the Fowles “how they are involved in such and such a Law Suit, and that they have just paid all their Money to such a Lawyer.” The printers reasoned that two could play that game: “Therefore as they fancy paying Money to Attorneys best, we have left, and are preparing a number more Accounts to be left with different Attorneys.” The Fowles would not hesitate to take legal action if it became necessary. They made that threat, however, only after publishing gentle reminders for customers to submit payments. Less than two months earlier, they inserted a notice that celebrated the twelfth anniversary of the New-Hampshire Gazette but also called on “a considerable Number of our Customers” to settle accounts. They considered doing so a “great Service.” Several weeks later they abandoned the language of service in favor of legal obligation. Rather than flaunting the money they spend on lawsuits against others, it was time for customers of the New-Hampshire Gazette to invest those funds in paying the printers.
<urn:uuid:a2718374-934c-4a08-80b5-1989bc42c30f>
CC-MAIN-2019-39
https://adverts250project.org/2018/11/18/november-18-3/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574084.88/warc/CC-MAIN-20190920221241-20190921003241-00476.warc.gz
en
0.979528
546
3.421875
3
Scientific Name: Stephanoetus coronatus Afrikaans Name: Kroonarend Zulu Name: isiHuhwa This species lives in dense indigenous bush and can take off almost vertically from the forest floor. During breeding season they perform undulating aerial courtship displays that are always accompanied by a beautiful serenade. The Crowned Eagle living at the Sanctuary is named ‘Thor”. This male ‘crownie’ was found on the side of a road on the South coast. He had a badly broken wing and toe! They live in indigenous forest and hunt monkey, dassie and small antelope. So strong legs and wings are imperative to their survival. These eagles are found commonly in the Highway area of KZN, but sadly they often come into conflict situations with people. It is believed that the outer Durban area has one of the densest populations of Crowned eagles in the world. So saying, there has been large scale development in this area resulting in an increased clash between eagle and man. Many young crowned eagles get into trouble as they are making their way in the world, because they mistakenly attempt to hunt a small dog or cat when they find insufficient wildlife to eat. Normally they spend most of their time perched in forest canopy looking for their prey. Now suburban homes are nestled under this forest canopy along with unsuspecting pets. The birds are now listed as threatened in the RED DATA BOOK
<urn:uuid:6a6d6e4c-7d97-4107-9cee-0b381fbc07f3>
CC-MAIN-2020-45
http://africanraptor.co.za/gallery/african-crowned-eagle-2/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880401.35/warc/CC-MAIN-20201022225046-20201023015046-00702.warc.gz
en
0.969544
297
2.875
3
Make your own games. Get a supply of cards, children’s scissors, glue and anything else you may want to make some fun games. Old school games like Pin the Tail on the Donkey or Snakes and Ladders can all be easily made at home and will keep the children occupied for some time. (Note: You will probably have to help out with smaller children.) Cooking and baking. Once a week plan a cooking or baking day. Involve the kids in the process from the beginning — let them chose from a selection of recipes that you have ingredients for. If the child can read, get them to read from the recipe book. Step by step, help them to work through the instructions. Try to avoid the temptation of doing it yourself. Make an assault course. Old pieces of wood, boxes, buckets, garden chairs — anything that can be jumped over, under or around. Tell the children to time each other around the assault course. The course can be completed on a bicycle, scooter, skateboard, or simply by running. Build a garden patch (if you have a garden that is). Dedicate a small patch in the garden to the kids. Plant flowers, herbs, lettuce — anything that grows quickly and gives them the satisfaction of having produced something. If your kids are small, just give them a spade, put on their old clothes, and let them loose. I read recently that gardeners are the happiest people alive. The explanation was that there is a form of bacteria in the soil that actually makes you happy. No harm giving it a go; we all want happy and relaxed children. Go camping. Build a tent indoors or outdoors with blankets and sheets. Once the tent is up, give them a torch and a picnic to take with them. I guarantee you won’t see them for hours. Go on picnics. You don’t have to go far to have a picnic — my children regularly ask for a picnic out the garden. I give them whatever I have in the fridge. You’d be amazed how once it is packed in a plastic container and eaten on a blanket on the grass, how much the atmosphere romanticizes the most boring of sandwiches. Have a treasure hunt. Make a treasure map with clues to find some treasure you have hidden somewhere in the garden. It doesn’t have to be expensive or big — any little treat will be exciting when it is found outdoors. Create a Corona virus Diary. Encourage the little ones to keep a Diary or scrapbook. They can take photos of special days and write about them. It will become a lovely memory book for them in the future — and also keep them busy for hours. Get jamming. Grab some musical instruments — things like bongos, shakers or tambourines, and get jamming. Get your kids to sing and dance along. (Alternatively, you can stick on Baby Shark, let your hair down, and dance on the furniture.) Make a movie. Get your phone and some Star Wars/Barbie figures. They can create it themselves and use Windows MovieMaker to edit it afterwards. They get to have creative fun and you can make it into a movie night when finished (any excuse for popcorn) Paint. One of the nicest ways to express your creativity is to use paint. Get large sheets of paper and lots of paint. Go mad and use your hands and feet — it’s liberating. To avoid any stress, prepare the area well and cover with plastic or newspaper. Have some water on hand to wash when you are finished. Get into jewellery making. Go to a bead shop and stock up on beads, wire and clasps, and get busy making your own jewellery. This activity can be done with the smallest of children, just be sure to get appropriate bead sizes for different age groups. The children will be so proud to wear the jewellery that they have made. Sketching. Go to a local park to sketch. They all had their own sketch pads and pencils, and they were encouraged to draw what they saw around them. They all had so much fun and want to make it a regular date. Take nature walks. Go on nature walks with a purpose. On the beach, collect shells and stones to later make a shell castle or shell and stone sculptures. In the Campo, get kids to seek out different sorts of bugs, plants or trees. Alternatively, give them a map to plot the route you are taking. By giving them control and a plan will ensure they don’t get bored too quickly. Have a clear out. Get the kids to clear out their rooms and have a go at selling the “crap” on-line. You could make a little bit of money . Pool all the money together and use it to pay for an outing for the whole family. Visit the library (If it is open). Use your local library regularly. In most libraries you can get more than books; you can get movies and music. Make a day out of it. Do some reading while you’re there instead of getting some books and heading home. Give your children a love of books — it is one of the best gifts you can give them Have a “Chill Day”. With all that activity planned, kids will also need some down time. Make sure you plan some days where you just chill, watch some movies, read some books, and take it easy. Electric scooters have risen enormously in popularity in the last year and are now considered a convenient method of transport. More and more people are opting to use scooters to get to work in the mornings or to move around towns and cities. The benefits of these scooters are clear: they are quick, cheap to run and can be folded and carried around easily. We must admit we loved the idea of zipping about town with minimal effort, no need to circle round for parking etc. But the speed of some of them did have us concerned and a friend of ours already picked up a 200€ fine! New regulations have been put in place by Spain’s Directorate of Traffic after drivers, pedestrians and policemen complained about the dangerous practices of some electric scooter users. Now, after thousands of complaints and accidents, Spain’s Directorate of Traffic has announced a series of temporary regulations that electric scooter users must comply with. The regulations are standing in until new laws in line with the European Union are passed. Sub-director at the General Directorate of Traffic has said that the formal regulation of personal transporter vehicles has been requested by policemen who struggle to respond to certain situations involving electric scooters. He added that a lot of officers believe they are having a negative impact on road safety, especially in bigger towns and cities. The regulation considers personal transporters as vehicles with one or more wheels that are designed for one person and are propelled exclusively by electric motors, with a maximum speed between 6 and 25 kilometres per hour. According to the regulations, electric scooters are no longer allowed to circulate on the pavement or on pedestrian zones, as they can put pedestrians in harms way. A €200 sanction will be given to electric scooters circulating in areas meant exclusively for pedestrians. People on scooters will also be obliged to undergo alcohol and drug tests and would be fined between €500 and €1,000 in the case of exceeding alcohol rates or in the presence of drugs. The use of mobile phones and earplugs is also completely banned and users will be fined €200 if found to do so. More punishable offences are circulating at night without wearing a reflecting vest or a lighting system and more than one person at a time on the scooter. If a minor is fined, it will be the parents or guardians who will be liable for the infraction committed by the person under 18 years of age. Rather than issuing a ticket to a financially-strapped Wisconsin mother, this compassionate police officer surprised her family with gifts instead. Officer Kevin Zimmerman of the Milwaukee Police Department pulled over Andrella Jackson for a registration issue with her car earlier this month. He was then cheerfully greeted by her and her two daughters—although he was dismayed to find that the little girls did not have car seats. Unfortunately, Jackson explained that she could not afford the seats since she has been struggling to buy new winter clothing for her kids for the upcoming Milwaukee winter. Zimmerman then visited a nearby Walmart and used his own money to buy coloring books, stickers, and two new car seats for $75. After paying for the purchase, he went to Jackson’s house to deliver the gifts. He even helped her install the seats and fill out the safety recall cards. Though Zimmerman did not think very much of his gesture, Jackson later posted photos of the 36-year-old officer and her kids to Facebook as a thank you for his kindness—and it was quickly shared thousands of times. “Now, I’m able to finish getting coats,” Jackson told WTMJ. “That saved me 70 something dollars on buying coats and hats and gloves. He’s awesome. I really love him. I really appreciate everything he did for me.” It’s always exciting for a young child to be visited by the Tooth Fairy—so when this Wisconsin elementary school student lost one of his loosened front teeth amidst the chaos of a playground game, he was distraught. The first grader from Gillett Elementary had been playing a made-up game called “ga-ga ball” with his classmates earlier this month when he suddenly found that his loose tooth had disappeared. The youngster may have swallowed the wiggly tooth; or it may have simply fallen out onto the ground. Regardless, parents and teachers alike rallied together to scour the playground in hopes of finding the boy’s lost tooth—but to no avail. The boy then approached Principal Curt Angeli for help. Upon listening to the boy’s story, Angeli knew just what to do: he wrote a letter to the Tooth Fairy as an official pardon for the tooth’s disappearance. The note read: “Dear Tooth Fairy: Today, [my student] lost a tooth while playing outside at recess. Unfortunately, it was lost in our ga-ga pit, and despite the valiant efforts of an intrepid search team, we were unable to recover the tooth. “As a trained principal and hobby dentist, I can verify that there is definitely a gap in [the student’s] teeth that was not there this morning when he came in. Please accept this letter as official verification of a lost tooth and provide the standard monetary exchange rate you normally use for a real tooth.” Angeli then concluded the letter with an amusing note to the fairy, saying: “P.S. I am still waiting for the money for my wisdom teeth from 1987. Please remit as soon as possible.” Since a photo of the letter was published by a Gillett Elementary School teacher, it has been shared hundreds of times by social media users praising the principal for going above and beyond the call of duty to comfort a distressed child. Party Boothz provides a unique twist to any event with a photo booth to capture the memories of your special occasion. It is totally mobile and can be placed in any location. You can rent the photo booth for parties, weddings, anniversaries, corporate events, charity functions or any social gathering and you can arrange for your photos to be developed in colour or black & white plus you can choose the theme and they will arrange the rest. This is a newly developed leisure area located on the banks of the Rio Fuengirola right beside the Sohail Castle just off the N340. There is a basketball court, table tennis area and a bike track which runs right along the river to the beach plus several play areas for the younger children. This Spanish run company focuses on adventure tourism and events offering all sorts of activities including paintballing, rock climbing, hiking trails, abseiling, canoeing, water sports, horse riding and archery. There are various outdoor paintball zones in the Coin area plus a portable field consisting of inflatable objects. The company organises special activities for children too. Located at Malaga Nostrum commercial park this go-karting track is an ideal spot to go for an adrenalin boost. Each session takes around 8 minutes. The track is open Monday to Friday 4pm - 12am and weekends 10am - 12am. RoundaboutSpain.com is the only online resource directory on the Costa del Sol, Spain designed specifically for families with babies, toddlers, young or teenage children living on, or visiting the Costa del Sol. Our online directory includes a comprehensive listing of ‘things to do’ and ‘places to go’ across the Costa del Sol and Andalucía in Southern Spain, including Malaga, Benalmadena, Fuengirola, Marbella, Estepona, Gibraltar, Seville, Granada and many other places.
<urn:uuid:0340336e-3515-4f13-90f9-fac95e9654be>
CC-MAIN-2021-25
https://www.roundaboutspain.com/tag/kids/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487633444.37/warc/CC-MAIN-20210617192319-20210617222319-00436.warc.gz
en
0.961234
2,720
2.8125
3
The post below is by guest blogger Celine Coggins. I have a chapter in my new book called: Equity is Everything (And Nothing). When I talk with groups of teachers who haven’t yet read the book, they are universally puzzled by the And Nothing part of the headline. Of course, they are immediately onboard with Equity is Everything. Yes, the goal of public education is to serve all kids. The Everything part is easy. Then how could it also be nothing? I’ve had more than a few teachers tell me I’m just wrong about the Nothing part. Equity is Everything in education. Kumbaya. Everyone from teachers to policy makers should agree. When President Trump made his vile comments about the incidents in Charlottesville having “many sides” he did untold damage to race relations in this country, but he also created a powerful teachable moment. In his use of “many sides”, he was invoking his own personal definition of fairness and equal treatment. He was co-opting equity to mean the opposite of equity. Equity is nothing because we have no shared agreement on what it is. “Many sides” is the most stark example I’ve ever seen of my chapter title. It is possible to say (and believe) something that is the very definition of unjust, but do so in the name of fairness and pursuing equitable treatment for different groups of people. What does that mean for those of us who may be advocates in the education space? When I coach teachers on preparing to meet with leaders who make decisions about their classrooms, I suggest three questions to ensure a productive start as an advocate: 1. Are you too biased toward finding agreement? Most educators’ natural instinct is to keep the peace. Your average local politician won’t be as impolitic as the President. They’ll say they care about equity, meaning a great education for all kids. You need to get beneath the hood on that. Do they see equity as equality of inputs or on doing what it takes to ensure that students from different starting points have equitable opportunities for success? Your goal for that meeting as an advocate should be to emerge with some understanding of how that person sees you issue. Are they an ally, adversary are somewhere in the middle? Don’t make it too easy for them to give lip service to equity. 2. What specifics can you probe? Many aspects of leaders’ beliefs about equity are codified for public viewing in budgets, laws, contracts. Use those to ask concrete questions. One of my favorite things is seeing teachers on Facebook who have been through our Policy Fellowship post the link when the first draft of their district budget becomes public, tag other teachers, and draw their attention to certain issues to raise at the next school committee meeting. That’s the way to go deeper on how those in power define equity. 3. Which are the policy problems and which are the relationship problems? The battle for greater equity for disadvantaged students is a war on two fronts. Some parts of the problem are best solved at the individual-level through relationships (i.e. influencing a leader’s thinking, getting invited to the decision-making table). Some parts of the problem are best solved at the system-level through formal policies (i.e. who has access to certain support services and programming; how funding gets allocated across schools). Separating the two types of problems, will help you get clear on the issues you can tackle next on each front. The President opened our eyes to how far we have to go to make equity a meaningful word in our society. There are “many sides” to how we organize and fund schools, but viewing the problem that way is a sure-fire path to preserving the achievement gaps and racial segregation of today far into the future. Celine Coggins is the founder of Teach Plus, a teacher leadership organization that operates in ten states across the US. This month she is transitioning from Teach Plus to become a Lecturer and Entrepreneur-in-Residence at the Harvard Graduate School of Education.
<urn:uuid:863dd638-68bc-4893-bdf9-368da5234ba9>
CC-MAIN-2019-13
http://www.eduwonk.com/2017/08/equity-is-everything-and-nothing.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912207618.95/warc/CC-MAIN-20190327020750-20190327042750-00316.warc.gz
en
0.968042
846
2.578125
3
Updated: Jun 23 One of the many challenges of working in a recently glaciated environment, like the Central Interior of British Columbia, is the accurate identification of 'soil' sample material and its anomalies. Maybe this sounds familiar? A soil grid is laid out across promising magnetic signatures, with encouraging geology, and maybe there are even a few historic drill holes or mineral occurrences in the area. With gusto, the team sets out and diligently collects 'B' horizon material from each site and sends their hard work into the lab. Assays are returned, merged with the field data and plotted on a map only to show an array of disconnected 'highs' and 'lows' with very little visual correlation to the fantastic magnetic signatures and geology. What went wrong? As noted above, in a 2013 CIM short course by Steve Armor at the Geological Survey of Newfoundland and Labrador, one thing that can go wrong is directly comparing different soil horizons. Other red flags include: The groupings of sample concentrations or bins - Are evenly sequential, The separation of values is likely at the detection limit (1 ppm Cu), And anything above 6 ppm copper was arbitrarily(?) considered anomalous. There are samples in the blue waterbodies, which either means the waterbody resolution is too low for the scale, or there may be some muddy and/or organic-rich samples, or beach sand, taken along the shoreline. The assumption that all values returned at or above the detection limit since the smallest value is 1 ppm copper, but this would likely be described in the text of the report. The interpretation of the data could be enhanced if the topography, watercourses, and saturated soils (i.e., wetlands) were included as part of the base map. Since the samples are somewhat evenly spaced, interpretation could be enhanced by interpolation between samples, like inverse distance weighting (IDW), to compare with topography as well as geophysical and geological data. Lastly, opening up the data with a log-ratio method, and then binning the values by Natural Breaks (or Jenks) would help visually identify patterns related to geology and potential mineralization. Tip #1 - What colours are your samples? Textbook definitions of the 'B' horizon will tell you that the presence of clay is the distinguishing feature to differentiate the 'B' horizon from the 'A' and 'C' horizons, but they fail to mention that till, which covers most of the Central Interior of BC, can have a strong clay component. Till is sometimes called 'boulder clay' after all. Always take photos of the material you are sampling for post-sampling quality analysis. Soil colour is the result of its mineral composition, element concentration, organic matter, and moisture content. It also reflects the soil properties and soil processes that lead to the creation of the soil. Colour is an important characteristic to determine soil horizon and soil classification. The 'B' horizon is commonly collected for mineral exploration in Canada. This horizon forms, top-down, by rainwater percolating through the layer(s) above, to precipitate leached material when certain conditions are met. The 'B' horizon may also form in place, by weathering, and can be the result of biological, chemical, or physical actions. The 'B' horizon is typically derived from the 'A' horizon, or mineral layer, which was formed at the surface where all or much of the original structure of the underlying rocks or geological deposits have been obliterated, as well as from the 'O' horizon, which is the detrital layer of organic material accumulated at the surface. The distinguishing characteristics of the illuvial (top-down) action that forms the 'B' horizon include: The illuvial concentration of silicate clay, iron, aluminum, humus, carbonates, gypsum, or silica, alone or in combination; Evidence of removal of carbonates; The residual concentration of sesquioxides (clays resulting from the chemical weathering of iron/aluminium silicates where they lose all their silicon, and most other ions except iron/aluminium; Coatings of sesquioxides that make the horizon conspicuously lower in colour value, higher in chroma, or redder in hue, without apparent illuviation of iron, than overlying and underlying horizons; Alteration which forms silicate clay or liberates oxides, or both, and forms a granular, blocky, or prismatic structure if volume changes accompany changes in moisture content; or Alternatively, the 'A' or 'Ah' horizon is collected. This horizon is known as the mineral horizon which has formed at or near the surface and contains less than 17 % organic carbon by weight. The 'h' modifier refers to an increase in accumulated organic matter which is typically represented by a darkening in the soil colour, whereas an 'e' modifier is expressed by a lightening of the soil colour to an ash-grey. The 'Ah' horizon can be useful in exploration for metals, whereas the 'Ae' horizon may assist with exploration that uses indicator minerals; like for diamonds or porphyry deposits. Below is a cartoon description by Gruškovnjak, L. (2019) that shows: a) rock parent weathering in situ and, b) soil forming on stratified alluvial sedimentary parent material. In the Central Interior of BC, we will typically see: (a) t1 along cliffs and ridges where glaciers and rivers scoured through mountains that have undergone weathering for the past 10,000 years; (a) t2 in pine flats or terraced benches with or without a very thin 'O' layer that may also be patchy; a derivative of (a) t3 with a thick 'O' layer in areas that were likely waterbodies not too long ago (geologically speaking); a derivative of (a) t4 with a thicker 'O' horizon, and much thinner 'A' and 'B' horizons; or (a) t5 with a thicker 'O' layer of mosses and roots under a canopy of evergreen trees with much thinner 'A', 'Ae' and 'B' horizons. Gruškovnjak, L. (2019). Hypothetical profile of soil development by top-down pedogenesis. (a) Soil forming on a rock parent material weathering in situ. The weathered rock or saprolite and the soil forming on it constitute the regolith (drawn after models in Schaetzl and Anderson 2005: Fig. 3.2-3; Weil and Brady 2017: Fig. 2.26, 2.36). (b) Soil forming on a stratified alluvial sedimentary parent material (drawn after models in Straffin et al. 1999: Fig. 2; Mandel and Bettis 2001: Fig. 7.1; Holliday 2004: Fig. 5.5; Weil and Brady 2017: Fig. 2.26). Legend: t = time of observation. Ideally, project-wide soil samples should be within the same colour family, which sounds absolutely insane to a soil scientist, but is one low-tech way to try to ensure that the processes, and source (i.e., top-down soil formation for the 'B' horizon), that formed the soil sample material were similar. In British Columbia, the 'B' horizons are typically variations of brown due to the presence of iron oxides. If colours are trending towards a bright white, it could mean that the 'Ae' mineral horizon was sampled; particularly if the sample was shallow, or found directly beneath a thick organic layer. If colours are trending towards a pale grey then it's likely the 'C' horizon, where till resides, or a gleysolic soil particularly if it was found in a low-lying area. As a note, gleysolic soils, which can be grey, are not a desirable sample material because they can develop from a till source and are not necessarily from a bedrock source. Tip #2 - Map soil sample locations over terrain or hillshade models Understanding the formation of soil material on different topography can help determine if samples underwent different processes of deposition and accumulation. It's important that different sample media are not compared directly to each other. For example, 'soil' collected from the slide slope of a ravine with a creek running through will have a quite different formation history than a sample collected from a plateau covered with pine trees. A trail of anomalous 'soil' samples downstream and downslope of mineralized subcrop or outcrop within a ravine can be a misleading series of 'anomalous' samples. These samples are typically colluvial or alluvial in origin. A series of soil anomalies in areas with lower relief (flatter), however, may be more related to low areas in the landscape, with higher organic contents allowing the accumulations of anomalies, such as copper, rather than representing the underlying geology. Know the formation history of your samples and that there is a difference between soil derived from bedrock, soil from an outcrop on a slope, and soil worked by flood or historical water levels further downslope of the outcrop. Tip #3 - Re-evaluate anomalies with respect to organic content One of the greatest influences on metal contents in soils is the presence of organic material. Trace metals tend to bind to organic material within soils as compared to inorganic materials, such as clays and carbonates. The organic material in the soil can preferentially scavenge the metals, causing an abnormal 'high' in metal content when the organic material is dissolved later in the processing of the sample at the lab. So, if a 'soil' sample is collected within an old stream bed, with a build-up of organic material, or near a stream bank or lake shore within muddy organic layers, the copper content of those samples may appear much greater, to the point of being considered anomalous. These 'anomalies' may instead represent an accumulation over time, rather than an indication of an anomalous source. Tip #4 - Practice sound statistical methods Geochemical data are compositional data. Compositional means that the values are represented as proportions where 1 gram per tonne of gold is 1 gram of gold in 1 tonne of sample material, which is the same as 2 grams of gold per 2 tonnes of sample material and so on. Geochemical data are also often skewed left meaning that there tends to be more results at the smaller values. Using gold as an example again, most of the results will be around the detection limit of the assay method like 0.1 grams per tonne of gold. The results we receive will look like real numbers, such as 1 or 0.1, but they are ratios and therefore don't meet the requirements of some statistical methods. Most statistics include assumptions that the data can vary independently or have a normal distribution (i.e., normality, where most results are near the middle of a bell curve). Univariate statistical methods that check one variable, such as average, are typically suitable for geochemical data using a below detection replacement method such as 1/2, 1/3 or the square root of the assay's detection limit. Bivariate statistical methods, such as scatter plots, and multivariate statistical methods, such as principal component analysis (PCA), are often not suitable without first pre-processing the data. Pre-processing can include imputing (not replacing) below-detection limit values by calculating the expected below-detection limit value based on the other element concentrations, and 'opening' up the data through a log-ratio method on data with all the same units (e.g., converting all values to ppm before normalizing to a log-ratio method). For example, Pearson Correlation, a bivariate statistical analysis, assumes that there is an absence of outliers and that the scatterplot relationship between each pair of element values is linear, not curved (i.e., linearity). Tell-tale signs of poor statistical practices include: Displaying unit measurements in graphs (particularly mixed units like ppm and ppb), scatter plots with logarithmic values on the x and/or y-axis Hand-drawn lines drawn on graphs, PCA biplots that are not centred at 0 or show the poor separation of the elements (they are primarily clustered in one direction or quadrant), Bulls-eye interpretations around one sample, And values grouped by 10 or some other even number (e.g., 0 - 10, 10 - 20, 20 - 30, etc.). Tip #5 - Be wary of single-point anomalies Regardless of your QA/QC program or sample spacing, it is good practice to be skeptical of single-point geochemical anomalies. Ideally, there will be a gradual decrease in value around samples with greater values unless there is a corroborating structural or geological explanation like a fault or change in rock type. Hand-drawn soil contours will often fall into the trap of single-point anomalies, whereas interpolation methods, such as Inverse Distance Weighting (IDW) for gridded data or Kriging for non-gridded data, will smooth out, or reduce, the effects of single-point anomalies. Most single-point anomalies will be subdued, or removed, with appropriate pre-processing of the data using a log-ratio transformation and Natural Breaks (Jenks optimization) classification (binning method to group similar samples). Soil sampling in British Columbia doesn't have to be complex if a few simple tips are followed: Watch for colour changes, Be wary of anomalies in low-lying areas, Practice sound statistical methods, And be cautious following up on single-point anomalies. Contact us to help you Design, Compile, and Interpret your geochemical and biogeochemical results. About the Author: Dr. Diana Benz has over 25 years of experience working in the mineral exploration industry searching for diamonds and metals in a range of roles: from heavy minerals lab technician to till sampler, rig geologist, project manager and business owner/lead consultant. She has a Bachelor of Science in General Biology, a Master of Science in Earth Sciences researching diamond indicator mineral geochemistry, and a PhD in Natural Resources and Environmental Studies using geochemical multivariate statistical analysis techniques to interpret biogeochemical data for mineral exploration. Diana has conducted fieldwork in Canada (BC, NWT, YT and ON) as well as in Greenland. She has also been involved, remotely through a BC-based office, on mineral exploration projects located in South America, Africa, Eurasia, Australia and the Middle East. Currently, Diana is the owner of Takom Exploration Ltd., a small geological and environmental firm focused on metal exploration in BC and the Yukon. Soils of Canada: Identify Horizons A Concise Guide to Compositional Data Analysis Linear Analysis Regression Assumptions Pearson Correlation Assumptions Introduction to Multivariate Analysis Alba Giacalone, Antonio Gianguzza, Santino Orecchio, Daniela Piazzese, Gaetano Dongarrà, Salvatore Sciarrino & Daniela Varrica(2005)Metals distribution in the organic and inorganic fractions of soil: a case study on soils from Sicily, Chemical Speciation & Bioavailability,17:3,83-93, DOI: 10.3184/095422905782774892
<urn:uuid:45480bc4-2b3d-44a1-8271-6c4708e8d3e3>
CC-MAIN-2023-40
https://www.takomexploration.com/post/ultimateguidesoilsampling
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00224.warc.gz
en
0.916596
3,273
3.578125
4
Because of their geographic isolation and strong sense of community, the Gullah and Geechee people were able to develop a distinct language and preserve more of their African cultural tradition than any other black community in the United States, says Emory Campbell. But Campbell, of Hilton Head Island and chairman of the federal Gullah-Geechee Cultural Heritage Corridor Commission, also has seen real estate development, changing job markets and population shifts force many to leave their traditional family lands. Mixed with a lack of awareness and increasing homogenization of society, the culture's mix of African, Caribbean and European influences were threatened, he said. Now he hopes national efforts over the past four years to develop a plan to preserve the culture, which has survived since colonial times, will continue. The public is being asked to weigh in on three options to manage more than 340 miles of historic coastal land, including in Beaufort County, that comprise the Gullah-Geechee Heritage Corridor. The culture is known as Gullah in the Carolinas and Geechee in Georgia and Florida. Two alternatives would free up more federal money for preservation groups along the corridor to help draw tourists and bring more attention to the Gullah and Geechee people, Campbell says. "These alternatives would also give us broader reign to preserve the praise houses, cemeteries, churches and family land across the county," Campbell said. Designated by Congress in 2006 and managed by the National Park Service, the corridor stretches from Wilmington, N.C., to Jacksonville, Fla., and extends about 30 miles inland. Along the corridor, the Gullah and Geechee cultures arose from slaves brought from West and Central Africa to work the rice, cotton and indigo plantations. The National Park Service on Thursday proposed three alternatives for how to manage the corridor over the next 10 years: • Continue the status quo. The management plan would be completed as required by law. The corridor commission would continue to operate but would lack a guiding framework and would lose all funding from the National Heritage Area program. • Design strategies to document and archive the culture's history, customs and buildings. This would include developing a list of "most endangered Gullah-Geechee sites" and starting programs that share Gullah-Geechee history with residents, visitors and scholars. • Design programs to educate people of the culture, enhance economic opportunities for Gullah-Geechee people, protect natural resources and preserve skills, arts and craft unique to the culture. The final solution could also include a mix of those ideas, Campbell said. The last two alternatives would provide a shot in the arm to local preservation groups, such as the Mitchelville Preservation Project on Hilton Head, said Campbell, also president of the Gullah Heritage Service of Hilton Head. Mitchelville was the first freed slaves' village in the United States. "These alternatives have quality-of-life implications for people of the Gullah heritage," Campbell said. "It is my hope that one day you can stop off the corridor and go to an art museum and see Gullah art or find a place to enjoy a Gullah meal. We could see families living on their Gullah property in an improved environment. ... Right now, some of these things are sporadic. I see them being more organized and directed under this plan." Tom Barnwell Jr., chairman of the Mitchelville project, said lack of funding and research are the largest obstacles to preserving the culture. "We will need researchers to verify certain components. An example is Harriet Tubman is said to have visited Hilton Head," Barnwell said. "... I can't verify that. Some say they can, but I'd like to make sure. We need startup funds." Congress authorized the commission to receive as much as $1 million a year over 10 years, with funding expiring in 2017. However, the commission has received only about $150,000 each of the past three years, Campbell said. Most of that has been spent on planning, he said. Though federal dollars are scarce, approval of the management plan would free up more for the commission to carry out its mission, said Michael Allen, a specialist with the National Park Service overseeing the corridor's management plan. "It's important for cities, towns and counties to step up and support this endeavor, because it benefits them by drawing more dollars and tourism to the area," Allen said. The Park Service will choose its path in November and start the management plan next year, Allen said.
<urn:uuid:bdd526fa-118a-4716-8928-fee9e006089b>
CC-MAIN-2019-26
https://www.islandpacket.com/news/local/article33393852.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999291.1/warc/CC-MAIN-20190620230326-20190621012326-00099.warc.gz
en
0.965513
925
3
3
Statistics from Altmetric.com What is already known on this topic? Safe driving requires ‘situation awareness’, a combined implementation of skills and traits that include attending to the driving task, focusing on relevant hazards, and being aware of traffic and road conditions and responding appropriately.1 Deficits in attention and impulse control put patients with attention-deficit hyperactivity disorder (ADHD) at increased crash risk. Consistent ADHD medication use, ensuring therapeutic levels while driving, has the potential to reduce this risk.2 What does this paper add? This landmark population-based study is the first to quantify an almost 50% increased risk of serious crash injuries among adults with ADHD. For adult men, injuries were 58% less likely when on-medication compared with when off-medication; for motorcyclists alone, on -medication injuries were 90% less likely. Only 57.5% of men with ADHD had been prescribed ADHD medication. At the end of the study period, only 37.2% were on medication. Among women with ADHD, no evidence of reduction in crashes … If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
<urn:uuid:2bbdd12b-7990-40a5-b471-7ebbb74d506c>
CC-MAIN-2019-18
https://ebmh.bmj.com/content/17/4/102
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578721441.77/warc/CC-MAIN-20190425114058-20190425140058-00312.warc.gz
en
0.939205
285
2.703125
3
New chips bring more speed and much more memory. But choosing the right processor for life science work involves more than just wanting to go faster. By Salvatore Salamone October 15, 2003 | BACK IN THE day when dinosaur microcomputers roamed the Earth, their brains could handle only 8 bits of data at a time, and their memory capacity was a paltry 64 kilobytes. Then Intel came along with a chip, the 8086, that doubled the amount of instructions a computer could chew on at once, and expanded the amount of memory a program could access to a whopping 1 megabyte. Deciding to upgrade was a no-brainer. Now we're at another historic juncture. Intel, AMD, and Apple/IBM have introduced new 64-bit processors that will power the next generation of high-performance computing systems. The challenge for life scientists is figuring out which processor will deliver the best price/performance to meet their computing needs. The new 64-bit chips are the Itanium from Intel, the Opteron from AMD, and the PowerPC G5, based on IBM's design and starring in Apple's new G5 PowerMac. In theory, all three offer substantial raw performance improvements over 32-bit processors. In practice, the true performance will depend on many factors, including the amount of memory a company is willing to purchase and whether applications are optimized to take advantage of the processor's capabilities. Additionally, if the 64-bit systems are part of a cluster, the efficiency and performance of the interconnection software and switches in the cluster will also affect performance. That said, the main advantage of using a 64-bit system is that much more data can be put into memory — which means faster results. A 32-bit system can access only 4 gigabytes of memory. (There are ways around this limitation, but these solutions are typically complicated and expensive.) In many common life science applications — searches of a huge database, for example — this 4GB limit can be a real performance stopper. |Systems based on the new 64-bit processors from AMD, Intel, and Apple/IBM can be used in many high-performance computing environments. However, based on the existing prices and available system configurations, some systems are more suited to certain applications than others. To work with a large database or other big application requires the use of virtual memory, which sets aside a portion of a hard drive's space to temporarily store additional data for the application. But accessing and manipulating data stored in hard drive virtual memory in this way takes about 40 times longer than when the data are stored in random access memory (RAM). A 64-bit system circumvents this obstacle because it can accommodate a much larger amount of data in memory — up to 16 terabytes. By loading an entire database into memory, any calculations, searches, and manipulations can be performed more quickly than when accessing the same data residing in virtual memory on a hard disk drive. Grabbing a piece of data from RAM is like calling it up in your own brain; snagging it from a hard disk is like reaching over and pulling the information off a bookshelf. This is one of the most compelling reasons life scientists are eyeing 64-bit systems. "We expect the superior memory addressability and floating-point performance of the Itanium 2-based systems to meet our scientific researchers' [high] requirements for processing massive data sets," says Gunaretnam Rajagopal, acting director of the Singapore Bio-Informatics Institute. The Old Compatibility Issue Beyond the memory support for much larger databases, two other factors — compatibility and pricing — are guiding life science choices when considering 64-bit systems. A recent study commissioned by AMD and carried out by Gartner Custom Research (a division of Gartner Inc.) found that existing 32-bit applications are of major concern when considering the issue of moving to 64-bit technology. More than 80 percent of the IT managers surveyed said the capability to run both 32-bit and 64-bit applications while migrating to 64-bit systems is important. |Processors and Performance |Two factors determine the raw performance of a computer's central processing unit At the heart of this compatibility issue is whether the performance boost realized when running existing applications justifies the higher costs of a 64-bit system. Interestingly, AMD and Intel have taken vastly different approaches to this situation. The first Itanium-based systems introduced last year ran many 32-bit programs slower than these same programs ran on existing high-end Pentium systems — and the Itanium systems were significantly more expensive. Such early results, widely reported in computer trade publications, left a bad taste in many IT managers' mouths. "We realized the Itanium was a new architecture, one that offered some interesting benefits for the future," says the manager of a Cambridge, Mass., biotech company who did not want to be identified. "But the high costs and poor performance with current applications caused me to wait. It was as if someone introduced a new high-performance car, but it didn't run well on gasoline." Intel has addressed this issue with a software emulation program that runs 32-bit applications at speeds comparable to Pentium systems. On the other hand, AMD's Opteron runs both 32-bit and 64-bit applications in their native modes. This, and the fact that Opteron systems are priced only slightly higher than high-end Pentium systems, has led many to consider the AMD CPU. "Right now, the Opteron-based systems look like a no-brainer for any company adding computational power for common bioinformatics tasks like performing BLAST runs or alignment programs," says David O'Neill, an independent IT consultant and a former network administrator at a specialty drug manufacturer. The Opteron systems "give a company a migration path to take advantage of new 64-bit applications as they become available. And these systems are just about the same price as [higher-end] versions of many existing servers." Who Needs 64 Bits? The new 64-bit systems will have an impact on life sciences ranging from the desktop for the individual researcher all the way up to the core of an entire enterprise's computational efforts. Three general classes of applications could benefit from the 64-bit processor: The widely used search and sorting bioinformatics algorithms such as BLAST, Hidden Markov Modeling (HMM), and Smith Waterman Simulation and modeling applications such as molecular docking and computational chemistry algorithms, as well as programs that calculate the binding energy between two molecules Applications that include large-scale data mining (and searching), knowledge management, and visualization |Not all 64-bit systems are suitable for every application. Selecting the right system depends on the mix of applications that must be supported. It also depends on where an application runs today — on a single server or workstation, on a departmental cluster, or as part of an enterprise computing facility. While all these applications could run faster using the increased memory afforded by 64-bit applications, not all 64-bit systems are suitable for every application. Selecting the right system depends on the mix of applications that must be supported. It also depends on where an application runs today — on a single server or workstation, on a departmental cluster, or as part of an enterprise computing facility. For example, one use envisioned for Opteron-based systems is new departmental clusters, taking advantage of Opteron's high performance and relatively low cost. "Almost every lab could have its own cluster chugging away," says Douglas O'Flaherty, strategic program manager at AMD. "There can be a dedicated system in each lab. [Scientists] don't share assays, so why share in silico assays?" Similarly, the Apple PowerMac G5, which uses a processor based on IBM's 64-bit PowerPC architecture, offers the speed and memory to conduct research that involves running common bioinformatics software such as BLAST and Smith Waterman. Opteron systems can also serve as a bridge between today's research and the algorithms of tomorrow. For a company that does a lot of search and sorting runs on an enterprise cluster of Pentium servers, Opteron-based machines could deliver comparable performance now, would not cost significantly more than adding new Pentium systems, and would provide a migration path as 64-bit versions of popular programs become available. That's not to say Itanium systems will not be used for these applications. But if researchers want simply to run existing 32-bit applications with the option of running 64-bit applications in the future, the high price of Itanium systems might prove excessive for this segment of the market. (If previous Intel processor rollouts are any indication, pricing often drops significantly over time. Expect a sharp reduction in Itanium prices within the year.) Itanium systems are commanding a lot of attention from companies interested in building an infrastructure to support life science research for as far out as a decade. In this scenario, the Itanium is seen more as a long-term investment. "We will be using Itanium processors, as they are powerful and are widely viewed as the next-generation IT infrastructure," Rajagopal says. "We're looking for architectures that will last three to five years, maybe even 10 years," concurs Al Stutz, director of high-performance computing at the Ohio Supercomputing Center. "We think the Intel architecture is that architecture." The processing power of the Itanium "will benefit our researchers in [areas] of protein folding, computational chemistry, and new drug design," Stutz says. "We will be able to do these discoveries a lot faster." The research collaborative called the TeraGrid is standardizing on distributed clusters of Itanium servers running Linux. The TeraGrid, once completed, will have more than 20 teraFLOPs (20 trillion floating-point operations per second) of processing power and about 1 petabyte of storage capacity distributed over five sites. Itanium and Opteron (to a lesser degree) are also drawing attention as substitutes for high-powered but proprietary systems. For example, some industry experts believe Itaniums will, in many cases, replace high-end machines from Sun Microsystems and Hewlett-Packard, which have been using chips based on 64-bit reduced instruction set computer (RISC) architectures. These RISC processors include Sun's UltraSPARC and Hewlett-Packard's Alpha. RISC-based servers are used to run many simulation programs as well as perform modeling, simulations, and data mining on extremely large data sets. Because the new 64-bit processors can support memory in excess of 4 gigabytes, servers with the newer chips could compete with the RISC-based systems. RISC workstations have dominated the data visualization market. Usually, such machines are quite pricey — often costing well over $10,000. The Apple Power Mac G5 is a likely, less expensive candidate to replace some of these high-end systems. However, even with the benefits of the new 64-bit chips, some companies will for the time being stay with their older RISC hardware. For instance, earlier this year when Celera Genomics undertook the replacement of its RISC-based Alphaserver systems, it chose a RISC-based alternative, the IBM p690 Regatta (see "Buying Power," July 2003 Bio·IT, page 32). |"We didn't go for bleeding edge. We were looking for flexibility and didn't want to have lots of platforms. So we chose a platform that we could lock down and repurpose to support the mix of applications that we run." John Reynders, Celera Genomics When Celera first began thinking about its upgrade project almost two years ago, "We didn't go for bleeding edge," says John Reynders, vice president of informatics. "Everything we got is solid. We were looking for flexibility and didn't want to have lots of platforms. So we chose a platform that we could lock down and repurpose to support the mix of applications that we run."Keys to Adoption Many IT managers are sticking with Pentium systems for now, given the relatively early development of 64-bit processors and the lack of software tuned to take advantage of their capabilities. But there are many areas where systems based on the Itanium, Opteron, and PowerPC G5 make sense. Indeed, early adopters are leaning on their systems vendors and the developer community to optimize their applications to perform better. On the systems side, most major players (IBM, Dell, HP, etc.) are selling products based on Itanium and Opteron. And other companies, such as Linux NetworX, that have expertise in both the life sciences and higher-performance computing, are offering 64-bit systems. Of course software is a big part of the equation. Applications have to be engineered to take advantage of the faster hardware. Groups such as Gelato.org are dedicated to advancing the development of optimized Linux applications that run on Itanium-based systems. In September, the U.S. Department of Energy's Pacific Northwest National Labs, a member of Gelato, upgraded its center to include a 2,000-Itanium Linux cluster capable of delivering 11.8 teraFLOPs — among the top 10 most powerful supercomputers in the world. The BioTeam consultancy has optimized certain bioinformatics applications to take advantage of Apple's Velocity Engine, part of the G5 processors. The Velocity Engine allows for the parallel execution of up to 16 operations in a single clock cycle. The optimization process involves looking for parts of an algorithm, such as a repetitive loop, that can be executed in parallel instead of sequentially. Such efforts by developers and systems companies will likely speed the adoption of 64-bit systems in the life sciences. But many companies will need to see clear price/performance benefits for their specific applications before large-scale deployment occurs. ILLUSTRATION BY STUART BRADFORD
<urn:uuid:636b1aac-7b8e-43ec-9040-fb198f23c5df>
CC-MAIN-2015-35
http://www.bio-itworld.com/archive/101003/bit.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065330.34/warc/CC-MAIN-20150827025425-00277-ip-10-171-96-226.ec2.internal.warc.gz
en
0.947362
2,910
3.203125
3
Posted: 1/1/2020 8:00:00 AM by James Rodriguez, Ph.D., LCSW Trauma Informed Care (TIC) is an approach to practice that raises awareness of the impact of psychological trauma and how common it is in society. Whether considered a movement or an approach to practice, people working in all sectors of human services should have a basic understanding of what TIC is and why it’s important for anyone in the helping professions. The Community Technical Assistance Center (CTAC) of New York State, in collaboration with Coordinated Care Services, Inc. (CCSI), created a series of self-learning modules to increase knowledge and awareness of TIC. Although TIC is gaining traction across many service sectors from healthcare to behavioral health to schools to child welfare, a number of factors can interfere with its full and complete emabrace by services providers and educators. For instance, trauma informed care can sometimes be confused with trauma treatment, or more specifically with treatment of Post-traumatic stress disorder (PTSD). From our perspective, TIC is an umbrella term that includes trauma treatment, but also much more. We view TIC as a change in mindset about how services are delivered at the organizational level. The self-learning package includes 4 modules, 20-30 minutes in length that cover a range of topics associated with TIC, including: definitions of trauma, adversity and toxic stress; the impact of trauma on well-being and development; understanding the guiding principles of TIC, and; understanding the human stress response and the science behind TIC. Everyone providing services to children, youth, adults or families should have a basic understanding of trauma and toxic stress. Our main goal in developing these learning modules is to raise awareness about TIC and provide common language about trauma and trauma informed care to foster communication within and across organizations. Our hope is that the self-learning modules will serve three purposes. First, we hope that they could be used as an on-boarding or orientation tool for all new staff, although it could also be used to training existing staff who are unaware of TIC. Second, it can also be used to engage in organizational change projects. Organizational assessment tools like the TRUST or TRUST-S available on the New York State Trauma Informed networks website could more easily be completed if oranizational stakeholders have some of the common language contained in these modules. Lastly, we hope that the modules can be used in preparation for engaging in more intensive skills training to learn new interventions and practices that help create tauma responsive enviroments. The modules can be found here. You can also visit the CTAC website for more offerings on the topic of trauma informed care.
<urn:uuid:5ee50fe1-be06-43c5-82eb-e47ec6759877>
CC-MAIN-2020-40
https://traumainformedny.org/TINY-Blog/January-2020-(1)/The-Community-Technical-Assistance-Center-of-NY-La
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221382.33/warc/CC-MAIN-20200924230319-20200925020319-00001.warc.gz
en
0.944951
557
2.828125
3
It was R. Cajal's student, Pio del Rio-Hortega, who coined the term microglia around 1920. He conducted the first systematic studies on this cell type. The cells had been previously described by F. Nissl and F. Robertson but Rio-Hortega is rightly considered the "father" of the microglia. Many of his observations are still valid (1). Resting microglia show characteristic elongated, almost bipolar cell bodies with spine-like processes that often branch perpendicularly. There has been a decades-long debate about the "nature" and "identity" of microglial cells which lasted until immunocytochemical as well as lectin markers were discovered in the 1980s. It then became clear that microglia share phenotypic characteristics (as well as lineage properties) with bone marrow-derived monocytes/macrophages. In general, the immunophenotype of microglial cells appears to be "down-regulated" but the cells should not be considered "tamed" macrophages; microglia display a number of properties that are unique to these resident cells of the CNS which are about as numerous as neurons. One example is their involvement in synaptic plasticity under pathological conditions ("synaptic stripping", http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=Retrieve&db=pubmed&dopt=Abstract&list_uids=5706753). During vascularization of the CNS, cells related to the mononuclear phagocyte system appear to invade the central nervous tissue and give rise to resting microglia. Unlike neuroectodermal glia, microglial cells are not electrotonically coupled, i.e. functionally connected via gap junctions. This may explain their very localized involvement in disease processes, which is of great diagnostic use including in neuroimaging (http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=Retrieve&db=pubmed&dopt=Abstract&list_uids=12697620). The presentation of antigen to lymphocytes is a likely function of microglia. Microglia are a resident CNS source of a number of "immune molecules" apart from MHC antigens, e.g. interleukins. There are many different names for microglia which exhibit considerable morphological plasticity. The term amoeboid microglia should be reserved to describe the cell's appearance in developing nervous tissue. Microglial rod cells representing an activated microglia phenotype are mainly found in the cerebral cortex typically in quaternary syphilis, subacute sclerosing panencephalitis and lead intoxication. Brain macrophages which are morphologically indistinguishable from macrophages of peripheral sources are found in early active multiple sclerosis lesions and in a cerebral infarcts. Some brain tumours (especially high grade gliomas) are very rich in what appear to be phagocytic microglia but it is at present impossible to be certain about their source.In addition to microglia, there are other macrophage phenotypes present within the bony confinements of the normal CNS. These include epiplexus and meningeal macrophages as well as perivascular macrophages (aka "perivascular cells" as they lack a macrophage phenotype in normal conditions) (http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=Retrieve&db=pubmed&dopt=Abstract&list_uids=2926837). The topic of brain macrophages and microglia is a difficult one due to historical nomenclatorial controversy and some still existing confusion. Terminological clarity is of utmost importance. As Wittgenstein said: if it is true it can be said clearly. Reference not found in Medline: 1. Rio-Hortega (1932) Microglia. Cytology & Cellular Pathology of the Nervous System. Paul B. Hoeber, Inc., New York, pp 483-534
<urn:uuid:8b7c6e9a-e68a-49e5-8af5-4670a4fafd24>
CC-MAIN-2015-48
http://www.microglia.net/ImportantPoints.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447729.93/warc/CC-MAIN-20151124205407-00047-ip-10-71-132-137.ec2.internal.warc.gz
en
0.916187
871
2.953125
3
Smoking and skin aging. The smear of the entire chemical cocktail, which is formed as a result of the combustion of tobacco, hits the smoker’s skin: ammonia, hydrocyanic acid, butane, nicotine, carbolic acid, formaldehyde, pyridine, arsenic, cadmium. Leather and Cigarette Our largest organ – the skin, although it is located outside, feeds through the blood vessels from the inside of the body. The food that we consume is split down to the smallest parts, some of which are nutrients, and some are ballast, “wastes of production.” All this is delivered with a current of blood to the skin. Nutrients are used on-site, and part of the “waste” is removed with sweat. In the same way, the skin receives oxygen as well – during normal breathing. But when tobacco smoke enters the lungs, the process of breathing and nourishing the skin is broken. What happens to the skin while smoking? When we inhale the smoke of cigarettes, carbon monoxide (carbon monoxide, CO) combines with hemoglobin in carboxyhemoglobin. The affinity of hemoglobin for CO is 200 times higher than in oxygen, as a result of which oxygen starvation (hypoxia) develops. Skin, like the largest organ, suffers from a lack of oxygen and a direct toxic effect of carbon monoxide in the first place. But that is not all. The impact of the entire chemical cocktail, which is formed as a result of the combustion of tobacco, hits the skin: ammonia, hydrocyanic acid, butane, nicotine, carbolic acid, formaldehyde, pyridine, arsenic, cadmium – and this is not even half the list. The consequences are catastrophic – the skin loses its normal appearance, turns yellow, becomes dry and flaky. The more cigarettes a person smokes a day, the worse his skin looks. Why does smoking cause skin aging? In addition to direct damaging effects, there is also an indirect mechanism through which smoking causes premature aging of the skin: each cigarette neutralizes in the body 35 mg of vitamin C (ascorbic acid), which can not be produced inside our body and must come from the outside. One of the many functions of vitamin C is the protection of collagen, a substance that is responsible for the smoothness and elasticity of the skin. In the absence of ascorbic acid, collagen is destroyed, which contributes to the premature formation of wrinkles, especially around the eyes and mouth. The longer a person smokes, the less likely it is to reverse the degenerative processes in the skin and restore her firmness and healthy color. Regardless of whether or not there is an easy way to quit smoking, you need to throw cigarettes. Save your skin – give up cigarettes. Share “Smoking and skin aging” with others.
<urn:uuid:11b2d9fc-13c2-420d-a741-28f341122aa6>
CC-MAIN-2021-04
https://seekers-zone.com/smoking-and-skin/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703518201.29/warc/CC-MAIN-20210119072933-20210119102933-00186.warc.gz
en
0.943259
600
2.703125
3
Did you know that lack of sleep is one of the biggest health problems facing society today? Most adults need about 7 to 8 hours sleep each day, for optimum health and well-being, and if you're not getting enough, you run the risk of a wide variety of problems. Regular lack of sleep can make you feel grumpy but can also affect your sex life, memory, health, looks and your ability to lose weight! More seriously, research has also shown that obesity, heart disease, diabetes and a shortened life expectancy can all result from a regular lack of sleep. So, are YOU getting enough? How does it work? There are four main brainwave states with different levels of electrical activity, they are; In our stressful modern world, most of us spend most of our time in a BETA state. If we can reduce this to ALPHA we are in the ideal state to learn new things. But, sadly, many people have great difficulty in reaching the THETA state of consciousness and are very rarely able to reach DELTA. But with the Insomnilight sleep mask, the pre-programmed light pulses act to reduce your brainwave activity to that perfect deep sleep state. Go from BETA to DELTA in one short, simple relaxing step with Insomnilight.
<urn:uuid:67f2eb93-8dce-4869-b6b4-fcbaa707cc85>
CC-MAIN-2018-13
https://lipo-light-belgium.myshopify.com/pages/about-insomnilight
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647545.84/warc/CC-MAIN-20180320224824-20180321004824-00191.warc.gz
en
0.95231
271
2.765625
3
Presenter: Bob Iseminger, Pieces of Learning Core Area: Differentiated Curriculum Grade Level: Elementary & Secondary What good is a tool if we do not teach a child how to use it? If information is a tool, critical thinking skills are the key to making that information useful for our students. In this course, you will learn how technology in the 21st century has changed the way G/T students interact with information and how it helps them build critical thinking skills in the classroom and beyond. Add to Cart or Click Here for District Pricing
<urn:uuid:e9cd51bc-e30a-4dc9-b7bd-fbc951eb2240>
CC-MAIN-2020-05
https://tagtondemand.com/product/building-critical-thinking-skills-and-infusing-creativity-and-creative-thinking-skills-into-the-gifted-and-talented-classroom-6-hour/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251672440.80/warc/CC-MAIN-20200125101544-20200125130544-00077.warc.gz
en
0.901179
117
4
4
As soon as you cut your finger on a kitchen knife or scrape your knee in a fall, your body begins a complex process to heal the wound. Below, Michelle Lage, a physical therapist and wound care specialist with UCHealth SportsMed Clinic – Steamboat Springs, describes how wounds heal and how you can best help the healing along. Four phases of wound healing Immediately after you cut yourself, platelets collect in the area to form a clot and stop the bleeding. That’s the first phase of wound healing, known as hemostasis. Next is the inflammatory phase, in which white blood cells clear the wound of debris, infection or bacteria. After that, healthy cells migrate to the wound site for the proliferation phase. “The new tissue builds from the edges of the wound and causes skin contraction,” Lage said. And finally, the remodeling or maturation phase takes place, in which the wound site is strengthened. Smaller cuts may fully heal in a week, while larger lacerations can take an entire year. Addressing chronic wounds Sometimes, wounds get stuck in the inflammation phase. “It happens for a lot of reasons,” Lage said. “If there’s a large infection, or if a wound is overrun by natural skin bacteria, or if the area was radiated for cancer or a person has diabetes — anything that will slow the body’s natural ability to heal itself can cause the wound to get stuck.” Wounds that last for more than two weeks with no change or show any sign that infection may have become chronic should be checked out by a medical provider. How to care for a wound Wounds should be kept clean and moist to promote healing. “A lot depends on how it’s taken care of when it happens,” Lage said. “If you get a cut and ignore it, you’ll form a scab. Bacteria can get under that scab if it dries or cracks, setting it up for delayed healing.” When cleaning a wound, use saline solution or sterile water, which most closely resembles the body’s natural fluids, to flush out any debris that may have entered the wound. “Soap is very drying, and chlorine and additives in tap water aren’t natural,” Lage said. “You want to be as gentle to the area as possible.” Keep a wound covered when showering, then after the shower, cleanse the wound with water or saline solution and redress it. Use a very thin layer of a single or double antibiotic ointment, avoiding the triple antibiotic ointments such as Neosporin, as they can sometimes cause irritation. “The wound needs to be able to breathe and balance moisture,” Lage said. Wounds shouldn’t get too dry or too wet, as both conditions can delay healing. An adhesive bandage can be used to cover smaller wounds, keeping in mind that some people are sensitive to adhesives. If a wound is draining, add gauze. “It should be relatively covered with no openings that would allow air in and cause it to dry out,” Lage said. When to see a doctor For any wound that won’t stop bleeding, you should go to the emergency department immediately. Wounds that are very red and hot, cause streaks on nearby skin, have yellow or green drainage or pus, are very swollen or are surrounded by skin that has become hard may be infected, so should be seen by a medical professional. And any wounds that may have become chronic warrant a trip to the doctor’s office. “I’ve seen people who had an open spot on their leg for six months,” Lage said. “Maybe they fell, and the cut started to get better, but then it stayed the same and never healed. Those shouldn’t be ignored. If you’re not sure what to do, go ahead and see a physician.”
<urn:uuid:661a692e-713b-4c54-a265-94708533844a>
CC-MAIN-2022-05
https://www.uchealth.org/today/wound-healing-after-everyday-cuts-and-scrapes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305423.58/warc/CC-MAIN-20220128074016-20220128104016-00362.warc.gz
en
0.943553
861
2.921875
3
|The polynya is the dark region of open water within the ice pack. Credit: NASA Worldview| A mysterious, massive hole, as large as Lake Superior or the State of Maine, has recently been spotted in the winter sea ice cover around Antarctica. This opening, known as a polynya, is the largest observed in the Weddell Sea since the 1970s. At its largest extent, this winter's polynya had an area of open water close to 80,000km2. This marks the second year in a row in which the polynya has formed, although it was not as large last year. Without the insulating effect of sea ice cover, a polynya allows the atmosphere and ocean to exchange heat, momentum and moisture leading to significant impacts on climate. Ocean convection occurs within the polynya bringing warmer water to the surface that melts the sea ice and prevents new ice from forming. Professor Kent Moore of the University of Toronto Mississauga's Department of Chemical and Physical Sciences has been collaborating with members of the Southern Ocean Carbon and Climate Observations and Modeling (SOCCOM) project to investigate these polynyas and their climate impacts. Due to the harshness of the Antarctic winter and the difficulties of operating within its pack ice, there exist few direct observations of these polynyas and their impacts on the atmospheric and oceanic circulation. As part of the SOCCOM project, robotic profiling floats capable of operating under sea ice have deployed in the region for the past number of years. Last month, one of these floats surfaced inside the Weddell Sea polynya, making contact with researchers and providing unique data on its existence. With these new ocean measurements, along with space-based observations and climate models, comes the possibility that these polynyas' secrets and their impacts on the climate may finally be revealed. The study was published in the Current Climate Change Reports.
<urn:uuid:4855bc08-e5b0-47c6-82bd-6694c7ce20f7>
CC-MAIN-2019-26
http://www.geologyin.com/2017/10/massive-hole-size-of-ireland-opens-and.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999066.12/warc/CC-MAIN-20190619224436-20190620010436-00236.warc.gz
en
0.953364
395
3.84375
4
Telephonic Etiquette is an electronic representation of your behavior and not just some speech pattern to follow or lines to remember. Since the inception of the telephone, it is being used as one of the most effective medium of communication. With the changes in technology, the devices became sophisticated but the essence remained intact. While some people are very courteous when they talk on the phone; some are very rude. If you think that telephone talking does not require any mannerism, then you are sadly mistaken. Human interaction should be based upon politeness and this should not be restricted to face-to-face interaction alone. In fact, the talk on the telephone should also be followed with proper etiquettes because good manners are a direct reflection of one’s behavior and character. Hence telephone etiquette is the right term which can be used for this. Telephonic etiquette is not merely a bunch of phrases but the virtual image of your behaviors. As per this system, there are several phrases which should be used while talking on the phone and several don’ts, which also should be observed simultaneously. How should one sound formal or vice versa- is an important factor which should be well understood while telephonic conversation? In the professional calls, people are formal with each other and follow the mannerism too. There is no formal course or training module for telephone etiquettes. As kids, we were taught to be considerate to other humans. Though the modules are absent, yet the main thing to understand is that we need to focus on having a smooth conversation; whether it is with a family member, relative, or a friend. Merely starting and ending the conversation with greetings is not enough. It should be smooth throughout. Few handy tips are mentioned which will help people to achieve a smooth talk on the phone. - You can never be too busy to be courteous. Yes, it is true that we live in a stressful world with peer pressure. But these are no reasons enough which gives us the ticket to be rude to the people on the other end. Even if it is unwanted sales calls or customer care calls; talking with etiquettes is the least which can be done and it will not cost anything, not even much time. - The tone should be correct. Though physically one cannot see the person at the other end; yet it is not only the words which reach the ears of the listeners. The fact is that the tone reaches the person and the entire persona of the person is reflected through the tone. If the person speaks with a positive attitude, the listener will also get positive vibes and the tone will be received correctly. - Short and crisp calls are preferred in the professional world. This may not apply for the personal calls but in the professional and official calls, people always prefer to have short and crisp calls. - There is absolutely no need to flaunt the fluency in the language. It is not required to use heavy words of the vocabulary. It is better to be simple and make the person receptive of the message which has to be put across. - Try to make the conversation interesting and share the thoughts properly in the personal conversations.
<urn:uuid:ed894473-7825-471f-942f-f73cfd71052f>
CC-MAIN-2020-24
https://www.engmates.com/blog/personality-development/telephonic-etiquette-electronic-representation-behavior/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347439213.69/warc/CC-MAIN-20200604063532-20200604093532-00256.warc.gz
en
0.958357
650
2.96875
3
Garden Diary: February February can be a difficult month with the ground vacillating between solid and sodden. Your mind may be on the vegetable patch but there are a few tasks in the garden before the flurry of activity that is just around the corner… is it really February already? - As with last month make sure that garden birds have plenty of food and fresh water. - As soon as conditions are favourable fruit trees/bushes and canes can be planted. Afterwards mulch with garden compost or well rotted manure – ensure the ground is moist but not frozen before mulching. - Cut back established autumn fruiting raspberry canes to ground level. - If not already done in November cut back rose bushes by about one third removing any dead, diseased or damaged growth to create an open framework. - Prune winter flowering shrubs that have finished flowering including heathers – the easiest way to do these is with shears. Trim back to the base of the flower stalks. - Prune summer flowering shrubs that flower on new wood, such as buddleja, deciduous ceanothus, hardy fuchsia and lavatera. These can all be cut back hard to produce a good show of flowers later in the year. - Keep off the lawn if it is frozen otherwise footprints will show yellow where the grass has been damaged once the frost disappears. New lawns can be laid this month provided the soil is not frozen or waterlogged. - Remember you can stop pots from freezing by raising them on pot feet or bricks. Wrap in bubble wrap and move to a sheltered position if necessary. Cut back overgrown shrubs and hedges before nesting season begins. Deciduous hedges and broadleaved hedges such as Laurel can be cut back hard but Conifers should only be trimmed lightly- never cut back into old wood as it will not produce new growth from here. Most recent Growing articles - Five unusual and versatile vegetables to grow this spring 24th January, 2016 - Composting: what is it and why should you be doing it? 02nd November, 2015 - Know your onions: Growing onions, leeks, shallots and garlic 15th June, 2015 - Growers’ yearbook December – edible hedgerows and other ideas 01st December, 2014 - Growers’ yearbook November 04th November, 2014 - Growers’ Yearbook: October 04th October, 2014
<urn:uuid:41a82d92-ed14-465b-be87-a8b76599316d>
CC-MAIN-2020-45
http://www.pocketfarm.co.uk/garden-diary-february/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107882103.34/warc/CC-MAIN-20201024080855-20201024110855-00444.warc.gz
en
0.940485
518
2.78125
3
A brief history of the College of Law The Board of Regents of the University of the Philippines formally approved the establishment of the College of Law on January 12, 1911. In June 1911, the College was formally opened with first and second year classes. There was a total of 125 students comprising freshmen and sophomores, the latter numbering fifty when they started the YMCA school. Of this first law class, one became a President of the Philippines, another, a Chief Justice of the Supreme Court, while several others became legislators and legal luminaries. The faculty was at first predominantly American, but the faculty profile changed when the American teachers were supplanted by Filipinos. Sherman Moreland, Justice of the Philippine Supreme Court, was Acting Dean from July 1 to October 11, 1911; George Malcolm was Secretary and subsequently Dean until 1917 when he was elevated to the Supreme Court. Jorge C. Bocobo, a member of the 1911 faculty, succeeded Dean Malcolm and became the first Filipino dean of the College. He held that position until 1934. In the early years of the College, classes were held after five o’clock in the afternoon because most of the students held some employment during the day. The College offered a three-year course for students devoting full time to their studies in the College and a four-year course for students who were employed. Commencing with the school year 1917-1918, the four-year course was prescribed for all students. By its twenty-fifth year, the enrollment in the College of Law totaled 547 students and the faculty was composed of eight full-time and nine part-time members. A graduate program leading to the Master of Laws degree had been established; two earned the degree in 1918. Classes were then held in Palma Hall on the Padre Faura Campus in Manila and the greater number of students attended day classes. Evening classes were maintained for students who were employed during the day. Dean Jose A. Espiritu was appointed in 1934 to succeed Dean Bocobo. Upon the outbreak of the war in 1941, the College was closed and classes did not resume until August of 1945. Returning from a brief stint in the Supreme Court, Dean Espiritu commenced the difficult task of rehabilitating the College. *Malcolm Hall, named after the founder and first dean of the College of Law, houses the College of Law. When UP was transferred to Diliman in 1948. In December 1948, with the transfer of the main campus of the University of the Philippines to Diliman, Quezon City, the College was assigned first an army hut, and later, a three-storey building named Malcolm Hall after its founder and first permanent dean. Dean Espiritu retired in 1953 and was su cceeded by Dean Vicente G. Sinco. Dean Sinco was appointed President of the University in 1958 and Judge Vicente Abad Santos, a former member of the law faculty, became dean. Dean Abad Santos held the deanship until 1969. Prof. Perfecto V. Fernandez was appointed Officer-in-Charge of the College about a year until Dr. Irene R. Cortes was appointed in 1970. Thus, she became the first woman to hold the pos ition. In April 1978, Dr. Froilan M. Bacungan, then the Director of the Law Center, succeeded to the deanship. In October 1983, Prof. Bartolome S. Carale was appointed Dean of the College and served until April 1989. The College of Law and the Law Complex subsequently underwent a process of reorganization, and a new dean was not appointed until after its completion. Dr. Pacifico A. Agabin was appointed dean in October 1989 and served until October 1995 when Prof. Merlin M. Magallona became the tenth Dean of the College. In August 1999, Dr. Raul C. Pangalangan was appointed Dean of the College until his second term ended in September 2005. Prof. Salvador T. Carlota is the twelfth Dean of the College from October 2005 to April 2008. Marvic M.V.F. Leonen served as Dean from 2008 to 2011. Danilo Concepcion is now the present Dean of the College of Law. A century after it was founded, the College of Law can point to its alumni in the highest positions of the government. Four became President of the Philippines: Jose P. Laurel Sr., Manuel A. Roxas, Elpidio R. Quirino, and Ferdinand E. Marcos. Thirteen served as Chief Justice of the Supreme Court; Ricardo M. Paras, Jose Y. Yulo, Cesar C. Bengzon, Querube C. Makalintal, Fred Ruiz Castro, Enrique M. Fernando, Felix V. Makasiar, Ramon C. Aquino, Pedro L. Yap, Marcelo B. Fernan, Hilario G. Davide, Jr., Reynato S. Puno and Maria Lourdes P. A. Sereno. A sizeable percentage of the former and incumbent senators and members of the House of Representatives are also graduates of the College. Two College of Law alumni became President of the University of the Philippines: Vicente G. Sinco and Edgardo J. Angara. Many more of its graduates are prominent law practitioners, high officials in government service, political leaders, as well as pioneers in private enterprises.
<urn:uuid:3a8590ad-203a-432f-ae76-875ff7258e7a>
CC-MAIN-2014-10
http://www.law.upd.edu.ph/index.php?option=com_content&view=category&id=34&Itemid=53
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999651905/warc/CC-MAIN-20140305060731-00024-ip-10-183-142-35.ec2.internal.warc.gz
en
0.982683
1,108
2.59375
3
Kansas Jury Selection Jury selection is the procedure whereby persons from the community are called to court, questioned by the litigants as to their qualifications to serve as a juror and then either selected to or rejected to serve as a juror. In Kansas, for a person to be qualified as a juror h/she: - Must be citizen of the United States and a resident of the county in which they have been summoned to serve; - Possess the qualification of elector; - Be at least 18 years of age; - Have not been adjudged incompetent by a court; - Must be able to read, write and comprehend the English language; - Cannot have been convicted of a felony within the last 10 years. At least 30 days before a juror service is required, the clerk of the county shall draw from the jury box the names of persons to serve as jurors and the names of 24 persons to serve as petit jurors. In all civil trials, upon the request of a party, the court shall cause enough jurors to be called, examined, and passed for cause before any peremptory challenges are required. Therefore, there will at least twelve jurors, after the number of peremptory challenges allowed by law for the case on trial shall have been exhausted. Peremptory challenge refers to a right in jury selection for the defense and prosecution to reject a certain number of potential jurors who appear to have an unfavorable bias without having to give any reason. Other potential jurors may be challenged for cause, i.e. by giving a reason why they might be unable to reach a fair verdict. The existence of peremptory challenges is an important safeguard in the judicial process as it allows both the defendant and the prosecution to get rid of potentially biased jurors. In civil cases, each party shall be entitled to three peremptory challenges. Multiple defendants or multiple plaintiffs are considered as a single party for purpose of making challenges except that if the judge finds there is a good faith controversy existing between multiple plaintiffs or multiple defendants. The court in its discretion and in the interest of justice, allow any of the parties, single or multiple, additional peremptory challenges and permit them to be exercised separately or jointly. All challenges for cause, whether to the array or panel or to individual prospective jurors, shall be determined by the court. Peremptory challenges shall be exercised in a manner, which will not communicate to the challenged prospective juror the identity of the challenging party or attorney. Further, prospective jurors shall be examined under oath as to their qualifications to sit as jurors (Voir dire examination of jurors). The court shall also permit the parties or their attorneys to conduct an examination of prospective jurors[i]. The jurors shall be sworn to try the case conscientiously and return a verdict according to the law and the evidence. If any person shall ask, procure or offer to procure, for himself or for another person, a place upon any jury, or shall seek to have himself or another placed upon the list of jurors as by this act provided, he shall be deemed guilty of a misdemeanor, and fined not less than five dollars for each offense. [i] K.S.A. § 60-247
<urn:uuid:c30e573b-16ba-44dd-9e47-e02f29ac9da7>
CC-MAIN-2013-48
http://civilprocedure.uslegal.com/trial/jury-selection/kansas-jury-selection/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164701395/warc/CC-MAIN-20131204134501-00037-ip-10-33-133-15.ec2.internal.warc.gz
en
0.943098
671
2.640625
3
Benefits of Montessori Montessori education offers our children opportunities to develop their potential as they step out into the world as engaged, competent, responsible, and respectful citizens with an understanding and appreciation that learning is for life. - Each child is valued as a unique individual. Montessori education recognizes that children learn in different ways, and accommodates all learning styles. Students are also free to learn at their own pace, each advancing through the curriculum as he is ready, guided by the teacher and an individualized learning plan. - Beginning at an early age, Montessori students develop order, coordination, concentration, and independence. Classroom design, materials, and daily routines support the individual’s emerging “self-regulation” (ability to educate one’s self, and to think about what one is learning), toddlers through adolescents. - Students are part of a close, caring community. The multi-age classroom—typically spanning 3 years—re-creates a family structure. Older students enjoy stature as mentors and role models; younger children feel supported and gain confidence about the challenges ahead. Teachers model respect, loving kindness, and a belief in peaceful conflict resolution. This entry was posted in Uncategorized . Bookmark the permalink
<urn:uuid:db7f3111-d530-404c-aabc-77f79dfda3d9>
CC-MAIN-2018-26
http://childrensmontessorihouse.com/benefits-of-montessori/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267862248.4/warc/CC-MAIN-20180619095641-20180619115641-00153.warc.gz
en
0.953602
261
3.59375
4
In every culture there are basic standards for social interaction such as personal space distance, eye contact,. Kingdom Of Elyesia. We advocate for the profession of psychology, and provide benefits to support members. Although this lesson is focussed on negative attitudes rather than behaviour, which is explored further in lesson 6, you may find that discrimination is introduced through your discussion. 13, you undergo completely different ranges and challenges to acquire each bit of wool. Cotherapy is an effective way to blend the diverse skills, resources, and therapeutic perspectives that two therapists can bring to a group. You can also use role-play to spark brainstorming sessions, to improve communication between team members, and to see problems or situations from different perspectives. Representation matters. Corpses now only cleanup if they aren't being actively used in roleplay. Mar 30, 2019- Explore sherlockd221b's board "Roleplay ideas!", followed by 310 people on Pinterest. Lesson Plan – Stereotypes. As Jan De Hower et. Cultural Factors affecting Consumer Behaviour Consumer behaviour deals with the study of buying behaviour of consumers. curricula that are inclusive of diversity education training is important. Circle Time Lesson Plan with The Family Book – How To Teach About Diverse Families Learning about families is an important lesson plan for preschool because young children see the world through a very ego-centric lens. TEAL Center Fact Sheet No. The foundation embraces the importance of diversity, equity, and inclusion both internally, in our hiring process and organizational culture, and externally, in our grantmaking and related practices. 74 Case Studies of Families Involved with Welfare and Child Welfare This section examines the ways that economic stress and disruptive life events. The Best Practices for Development, Delivery, and Evaluation of Susan Harwood Training Grants document was created in order to assist Susan Harwood grantees in developing, delivering, and evaluating training for workers and employers. They help students listen to diverse opinions, support knowledge claims with evidence, engage in critical and creative thinking, and participate in open and meaningful dialogue. For example, Dulci Dando Soccer Star is about a young girl who challenges the doubts of the boys on the school soccer team and proves her skills as a soccer player. Test your students' understanding of race, gender, and socioeconomic class with these quizzes, leading seamlessly into a dialogue on stereotypes, misinformation, and prejudices and how they inform teaching and learning. LET THE ADVENTURE BEGIN! Today I play Diversity, the complete the monument map that offers a different Minecraft map genre for every piece of the monument! I will bring in a different guest each. about the school counselor's role. SWOT is an acronym for Strengths, Weaknesses, Opportunities and Threats. In addition, diversity in the workplace equips companies with the cultural competency to understand, respect and connect with their target audience. Centre for Teaching Excellence, University of Waterloo. And for some of you, this is synonymous with Resident Assistant Training. Within the unique map, you must gather differing types and colors of wool to construct the monument, however in Diversity Map 1. What Are Diversity, Equal Employment Opportunity, and Affirmative Action? Click to expand for more details Embracing Diversity, Equal Employment Opportunity (EEO), and Affirmative Action (AA) are three components of UC Berkeley's work toward creating Equity in the Workplace for its employees. However, there are a lot of these programs that fail to produce results. and role play (Caldera, Huston & O'Brien, 1989) whereas play with masculine toys Gender and Play Complexity 97 tends to foster higher mobility, activity, and manipulative play (Serbin & Connor,. Synonyms for diverse at Thesaurus. Then in small groups, students role play state legislators and supporters and opponents of hate-crime legislation. A school administrator promotes the success of all students by acting with integrity, fairness,. The emphasis should be on quality and safety, evidence-based practice, research, and leadership. The criminal justice system is viewed as a three-part system consisting of the judge and jury, the prosecutor, and the defense lawyer. This is often impossible and even if you look at employing people as te. Consumer behaviour helps us understand why and why not an individual purchases goods and services from the market. com now! Brooklyn Nine-Nine is a police sitcom that follows a team of detectives in the fictional 99th Presinct of the NYPD led by Captain Raymond Holt -- Jake Peralta, Amy Santiago, Charles Boyle, and more. Diverse Role Play The place for people to explore Role Playing in worlds beyond Star Wars!. Begin by allowing players to communicate feelings experienced during the role-play. ’s map looks like a color wheel: South Central Los Angeles is largely Black (green dots), while the southwestern communities are almost exclusively. The onboarding process is one of the most important aspects of building your killer sales team. Facilitating the Difficult Dialogue: Role Plays. Bullying is the number one discipline problem in middle schools. Read IMPORTANT! from the story IT Roleplay by Rose_Ravenholt (「Guinea. CULTURAL DIFFERENCES. 50 Strategies for Communicating and Working with Diverse Families, Third Edition presents practical strategies teachers can use to create a positive, family-centered approach to their classrooms. Diversity and Inclusiveness in the Classroom. Momma」) with 34 reads. ROLE PLAY SCENARIOS Below are two of the role play exercises we have used. Written evaluation of counselling role play 1 Written evaluation of counselling role play In counselling, as in general life, the quality of the relationships we form are largely determined by the time and effort we invest in developing and sustaining the intimacy of these bonds. The process of studying a person's life story and performing as if one were that person is rooted in the institution of Chautauqua. " The professional incentives are assumed to be identical. Kinesthetic learning activates the physical self, the body and doing actions. Does your child love pretending? Find out how pretend play can spur child development, while learning new dramatic play ideas, activities and games. All suits are easy to put on and take off and are made of heavy duty materials ideal for lots of play. Though they are among America’s most diverse cities, Cable’s maps of Los Angeles (above) and Miami (below) paint clear pictures of how people of different races and ethnicities segregate. The feedback15, 19 For the analysis of the interpersonal interactions of a role-play situation, nurses can use the three-stage model of the counseling process. As the nation becomes more diverse, so should learning and playtime. We believe in the importance of promoting quality early learning environments for children that are culturally and developmentally appropriate. The following role play scenarios are among those created by the Minnesota Department of Corrections for training purposes. However in Diversity, each wool is obtained by finishing a completely different Minecraft map genre. The best teaching & training videos in psychotherapy, counseling and addiction treatment for psychotherapists, counselors, and social workers. Diversity is discussed in a broad sense in. Barry is one of the nicest guys on the team. We are all trying our best to fix it! Stay updated for more info! Estimated date the server will be open: December 20, 2017. A diverse workforce is essential for industries like healthcare, higher education and law enforcement. The pack includes two banners, labels, signs, opening times, posters, a receipt writing frame and a tool hire form. Authentically value and respect all individuals for their talents and contributions. Wentworth (see SBAR form for scenario 1) Nurse: You have just received Mrs. Read Aloud. The actors would undertake role play with small groups (5-8) of medical students and may also be recruited to take part in medical student assessments. 2a Identify which legislation and codes of practice relating to equality, diversity and discrimination apply to their own role 4. Brooks-Harris, Lori E. The feedback15, 19 For the analysis of the interpersonal interactions of a role-play situation, nurses can use the three-stage model of the counseling process. Essential for developing multicultural/diverse perspective learnings is a positive and trusting classroom environment - one in which all students are made to feel welcome, comfortable, and respected. A group of my young learners recently played the roles of pizza chef and customer. Although this lesson is focussed on negative attitudes rather than behaviour, which is explored further in lesson 6, you may find that discrimination is introduced through your discussion. West, Cindy S. Welcome to Woodring College of Education Preparing outstanding teachers, educational leaders, human services professionals, nurses and rehabilitation counselors. Here you will find teaching resources relating to various religious and secular celebrations and festivals. Find out more by visiting the 'Is it OK to ask?' page. The most recent I. We take pride in being one of the most realistic roleplay community on Xbox One. Fostering and Reflecting on Diverse Perspective-Taking in Role-Play Utilizing Puppets as the Catalyst Material under CSCL Toshio Mochizuki, Senshu University, [email protected] This is not an example of the work produced by our Essay Writing Service. Highly qualified support staff (employed by Diverse Computing and located entirely in the United States) are always available. Reddit is a network of communities based on people's interests. Several types of portfolio evidence can be generated from these activities. 4 percent are Native Americans, Pacific Islanders, and Asians. Roleplay Guidelines. The goal of these role play exercises is to see how perform in the role you have applied for with particular emphasis on your demeanour throughout the exercise. Engage in the Difficult Conversation (5 minutes each) 3. Automate Your Roleplay Sim Administration Get back to enjoying your own sim, Sim Owners Learn More Built with WordPress The Klimact platform is built on top of the most widely used content management system in the world, WordPress. SKSE64 and SkyUI are "soft requirements" -- you can run the mod without them. It is important that preschools provide children with the opportunity to develop their imagination. Martin Luther. land boundaries and the diversity in cultures re-sults in the diversity in people around the world. The resources on this site should not be used as a substitute for professional medical care or advice. Biodiversity is a contraction of biological diversity. Student Workshop Respect: It Starts with You! 5 The goal of this workshop is to help students understand the impor-tance of respect and of taking responsibility for their own behavior. Choose a conflict-resolution strategy. more homogeneous. •Bad boy/girl x Good girl/boy •Popular. Eberly Center › Teaching & Learning Principles › Teaching Principles Teaching Principles Teaching is a complex, multifaceted activity, often requiring us as instructors to juggle multiple tasks and goals simultaneously and flexibly. A scenario might be written down and distributed to all group members. A unique MMO set in the vast, fantasy world of Gielinor, brimming with diverse races, guilds and ancient gods battling for dominion. Management's role in shaping organizational culture Aim The present study addresses the importance of the manager’s role in the development and maintenance of organizational culture. In this worksheet there are seven different role play ideas for students to perform in the classroom. Comprised of about 50 members from across all nine divisions of Johns Hopkins, the Diversity Leadership Council advises university President Ronald Daniels on matters of diversity and inclusion. Role Play - Scenario C Skill building opportunity • Working hard to understand a team perspective different than your own • Talking about the feelings that accompany the loss of a team members Role 3 - Coach/Lifeliner: You will start the role play in an observing role. A role play on the Constitutional Convention which brings to life the social forces active during and immediately following the American Revolution with focus on two key topics: suffrage and slavery. Diverse Roleplay is a an English speaking community that is all about providing the best quality roleplay for their members. Understanding the differences between equity and equality helps us to recognize and respond to differences in health and well-being that are unfair, avoidable and changeable. I enjoy roleplaying, and i know others do. Russet was outside of the Castle, hidden beneath a tree. Kingdom Of Elyesia. 0 in development , a Garry's Mod server, located in United States of America. diverse backgrounds and the richness of the language and literacy knowledge they bring to kindergarten. However, its origins are certainly influenced by costuming, fiction, myth and legend, roleplay and psychodrama in their various aspects. Here is a list of toys, games and books that encourage children to express themselves, learn about other cultures and explore. Welcome, adventurer. Dress-Up Play. Boundaries will help teachers to work within their limits and adhere to the professional code of practice. Whether you're a writer looking for the perfect place to store and display your poetry, stories and other writing or a reader willing to offer feedback for our writers and their writings, this is the website for you. Blaine County RolePlay Community, BCRPC, is recruiting Civ, SAHP, LSPD, SAHP, SAFD & SAC. It presents pragmatics as a discipline that may be taught and learned utilizing the experiential learning cycle. role-play without being disturbed by other groups. The American Music Therapy Association is a resource and organization dedicated to professional music therapists. Exercise listening skills taught in the program to improve the chances for open communication. Many popular diversity activities simulate life through role plays or other experiences in which participants are asked to take on one or more predefined identities. How Do I Differentiate Instruction to Meet the Needs of All Learners? statistics An Elementary School Snapshot The total school population is 850. Harvard University is a universally known beacon of knowledge and excellence. Fun Activities for Teaching Cooperation. Helping teachers support Aboriginal and Torres Strait Islander education Report This article is intended as a guide to professional development and learning options for all Australian teachers – Aboriginal, Torres Strait Islander and non-Indigenous – in these areas of learning. Demonstrate progress by recruiting for diversity, nurturing a safe environment, focusing on equitable conservation results, and building an inclusive culture. Learning about different cultural aspects offers new experiences for children. When children engage in role playing it helps to develop their way of thinking and helps them to develop feelings of empathy. That's because role playing works best when there is sufficient time to prepare people for the role play, do the actual role play, provide expert feedback, and do any debriefs. Many well-developed role-playing exercises are available on the scenario pages, organized by topic or by type. Experiencing Diversity: Experiential Exercises for use in Multicultural and Diversity Workshops Edited by Jeff E. [AD]Diverse Roleplay, new server with PR-RP's script, has a medium. Diverse Roleplay is a an English speaking community that is all about providing the best quality roleplay for their members. There is nothing more fulfilling for children than to be able. It is important that you refl ect on the dynamics of your class. If you're like me, this means preparing for leadership training opportunities. Engage in the Difficult Conversation (5 minutes each) 3. Does your child love pretending? Find out how pretend play can spur child development, while learning new dramatic play ideas, activities and games. Defining leisure, play, and recreation provides us as leisure professionals with a strong foundation for the programs, services, and facilities that we provide. How to Develop Empathy at Work. Synonyms for diverse at Thesaurus. 13, you undergo completely different ranges and challenges to acquire each bit of wool. It's exactly as uncomfortable as it sounds, but it's how I've began each morning since the 5 th grade. Mar 30, 2019- Explore sherlockd221b's board "Roleplay ideas!", followed by 310 people on Pinterest. Find out more by visiting the 'Is it OK to ask?' page. Educators use our materials to supplement the curriculum, to inform their practices, and to create civil and inclusive school communities where children are. 10 percent are African American. Department of Education’s Office of Special Education Programs (OSEP) and the Office of Elementary and Secondary Education (OESE), the Technical Assistance Center on PBIS supports schools, districts, and states to build systems capacity for implementing a multi-tiered approach to social, emotional and behavior support. Wentworth's INR results. Integrity By upholding the highest ethical standards, public servants conserve and enhance public confidence in the honesty, fairness and impartiality of the federal public sector. This resource was developed to help schools and their safe and accepting schools teams foster and maintain a positive school climate. If you like writing, worldbuilding, and character development, check us out. Access the online course now at www. Helping teachers support Aboriginal and Torres Strait Islander education Report This article is intended as a guide to professional development and learning options for all Australian teachers – Aboriginal, Torres Strait Islander and non-Indigenous – in these areas of learning. The Academy of International Business (AIB) is the premier global community of international busineess scholars. We've been working on these virtual worlds for the better part of 20 years, and are excited to begin sharing what we've created — plots to unfold, quests to complete, and so much more. In today's economic difficulty, work related stress is even more pronounced than ever before. Scenario 1 In this role play the key issues are custom and tradition. This is a massive open world that you are free to explore. Biodiversity is a contraction of biological diversity. The nurse educator faces many role challenges within their profession, and the nurse educator is held accountable to find effective, realistic solutions. Read story Roleplay Ideas by -SarcasmQueen- (Kate) with 14,127 reads. Almost every use of roleplaying in large group training sessions involves extreme compromise, often to the extent that learning does not occur, or is interfered with. understanding of both the changing healthcare environment and the needs of a diverse student population (Stanley & Dougherty, 2010). Prior to class time generate a series of questions relevant to an isuse involving India’s diversity. Diversity training may a good option to address any further cultural difference items or a place to include the identification and brainstorm exercise mentioned above. Here you will find teaching resources relating to various religious and secular celebrations and festivals. Members of a cultural group share characteristics that distinguish them from other groups. There numerous benefits to equality and diversity in the workplace. Schools must prioritize efforts to promote diversity and equity within their school culture and within the classroom. Read Aloud. Role play and simulations are forms of experiential learning (Russell & Shepherd, 2010). We take pride in being one of the most realistic roleplay community on Xbox One. diversity management and its ethics, and so managers are finding it difficult to effectively practice diversity management, which in turn has become an albatross on their neck. Scenario 1: Mrs. Twelve vignettes were generated from actual child welfare cases. Martin Luther. However, historical pressures and domestic political trends have limited the right to cultural autonomy and expression of some citizens. Free training resources, energisers and training games. Multicultural Role Play Dressing Up Clothes. Search for tips. Role Play to Teach Cultural Competency by Ijeoma Ekeocha, Pharm. Diversity training may a good option to address any further cultural difference items or a place to include the identification and brainstorm exercise mentioned above. Diversity Resources for History Class. Yet for a teacher, this image is an outmoded mindset. DRAMATIC PLAY / Diversity Acceptance of diversity encourages children to appreciate and respect differences in others. Whether it's handling complaints, helping employees navigate changes, or resolving conflicts, SHRM can help you master employee relations. These lesson, activities, and. 2b Demonstrate interaction with individuals that respects their beliefs, culture, values and preferences 4. Diversity and inclusion is a sizeable challenge for any organisation, especially those that have previously been less diverse and demonstrably exclusive. Ice Cream Cut-and-Paste Art Pattern This cut-and-paste ice cream art project will provide your students with opportunities to improve their fine motor dexterity and their ability to follow directions. They were designed to work in pairs, but some of them can also be used in groups so that you can use them for different levels. In order to work effectively with Culturally and Linguistically Diverse (CLD) young people and their families, workers should: Be open to developing their knowledge and understanding of different cultural groups and of diversity within those cultural groups. 2 Roleplay City City Rpg Slimefun. However, it's way more entirely different because of its personal influences. Facebook is showing information to help you better understand the purpose of a Page. Culture is the total range of activities and ideas of a group of people with shared traditions, which are communicated and strengthened by members of the group. If educators act on the knowledge research offers, we can realize the educational excellence we desire for all children. com with free online thesaurus, antonyms, and definitions. This is a massive open world that you are free to explore. Role Play Preparation We have seen that there are various different assessment centre role play exercises and each one is tailored to the position you are applying for. A few zealots persist in the old key-to-the-uni verse view of it; but less driven thinkers settle down after a while to the problems the idea has really generated. (Female/46) 12) An unemployed man, formally a proffessor of literature. Students are given cards (similar in size to Bingo cards) with twenty-five identities,. Sorry about the server down! We are experiencing problems on the host. It is not an exhaustive list of celebrations and festivals and there are gaps which we will be looking to fill over time. What does it take to become an elite athlete? Complement your class Nestlé for Healthier Kids experience with a visit to the Australian Institute of Sport. There may be enemies from two sides of a war present. Hence, diversity is neither a constraint to be managed, nor an issue to be solved. Mar 30, 2019- Explore sherlockd221b's board "Roleplay ideas!", followed by 310 people on Pinterest. Corpses now only cleanup if they aren't being actively used in roleplay. Prior to class time generate a series of questions relevant to an isuse involving India’s diversity. In an ideal world, when recruiting for positions we would have the opportunity to "try before you buy" and see an individual actually at work before you hire them. New to roleplaying and want to learn some of the basics? Want to play a character but don't know of any significant qualities to portray? No problem! New to running a roleplay and want some tips? Need events ideas? No problem! ♦Please read the "about page" for more info ♦GMT - 4. 10 percent are African American. Hello, we’re Tes We’re an education business supporting teachers, school staff and schools to succeed in every aspect of their teaching life. Social work is. Harvard University-Boston, 28 February 2014. Students are given cards (similar in size to Bingo cards) with twenty-five identities,. Start the role-play. Begin by allowing players to communicate feelings experienced during the role-play. Tim stands up with a smile on his face, ready to greet him, when the dam bursts – his client explodes into an angry tirade because Tim's organization has failed to make a delivery on time. Equality and diversity The College has produced a Valuing Difference and Inclusion strategy to replace the 2009 version of the Equality strategy. The residents and staff of Cocoa Bay have been dedicated for facilitating a culture and community of roleplay for 3 years. 13 and others version. It also allows employees to practice making mistakes without having any serious consequences and gets them involved interactively in a lesson. In order to work effectively with Culturally and Linguistically Diverse (CLD) young people and their families, workers should: Be open to developing their knowledge and understanding of different cultural groups and of diversity within those cultural groups. CULTURAL DIFFERENCES. Get Your Custom Essay on Unity in diversity skit Get custom paper There are about 28 states each have its own language, tradition, culture but inspite of these differences India still continues to be one of the most widen democracy. Representation matters. Plus, get practice tests, quizzes, and personalized coaching to help you succeed. Why? PG to Reflective Practice_Booklet. They help all students in the areas of academic achievement, career and social/emotional development, ensuring today's students become the productive, well-adjusted adults of tomorrow. Resistant Clients: We've all had them; here's how to help them. Puzzles and Games. An elementary school adaptation of the Constitution Role Play by Bill Bigelow. Diversity Map is a unique take on the CTM genre. See more ideas about Childhood education, Classroom design and Activities. If educators act on the knowledge research offers, we can realize the educational excellence we desire for all children. Communication and ethics: Ethical communication is the foundation of decision making, responsible thinking and the building of relationships, not just in day to day life, but at work as well. brian-mcnaught. Synonyms for diverse at Thesaurus. Click here to go to VoiceThread Universal Amazing conversations about media. A few zealots persist in the old key-to-the-uni verse view of it; but less driven thinkers settle down after a while to the problems the idea has really generated. These questions cover four common bases from classics, team leadership, examples and role play as well as customer service – know-how and competency. Logical learning follows from using rational patterns, cause and. When you join Sun City Roleplay, you aren't just roleplaying as a generic member, you're creating a character to explore, make friends (or enemies), and to pursure a personalized goal within one of our many Departments or Subdivisions. We created a fun DIY banner to help celebrate the people and cultures around us – learning diversity appreciation. For example, it’s a great strategy to use when discussing bullying. Role play: with adults and children What I find very interesting in role plays with my children, i. The feedback15, 19 For the analysis of the interpersonal interactions of a role-play situation, nurses can use the three-stage model of the counseling process. We also offer forums, reviews, resources and much more. Accredited training course materials that you can use to run your own training course. ODI strives to reinforce diversity, inclusion, and engagement in VA in order to build and maintain a diverse workforce, foster and nurture an inclusive workplace, and promote inclusive diversity to deliver the best services to our Nation's Veterans, their families, and beneficiaries. This essay on gender roles and stereotypes was written in defense of women. As well, role plays are fun and motivating for students. They were designed to work in pairs, but some of them can also be used in groups so that you can use them for different levels. Working with Children – Revision Version 01/01 Page 2 Working with Children Introduction Facilitators who have not recently trained or worked in the area covered by this Resource Pack, should read carefully through the various Topics, Overheads, Exercises, Handouts and Readings before starting to plan their training activity. Just as there are lots of different makes of cars, bikes, washing machines, balls or just about anything you can think of, so there is diversity among people. CULTURAL DIFFERENCES. If educators act on the knowledge research offers, we can realize the educational excellence we desire for all children. Concept Collections - Fiction. Jackson , PhD, MA a and J. The foundation embraces the importance of diversity, equity, and inclusion both internally, in our hiring process and organizational culture, and externally, in our grantmaking and related practices. Lee Gardenswartz, Ph. Strategies To Support Multicultural Instruction. Cultural and linguistic diversity: Case study The purpose of this professional learning is to create an opportunity for teachers and staff to view and discuss a case study on cultural and linguistic diversity and how this relates to the Queensland kindergarten learning guideline ( QKLG ). encourage both boys and girls to play and explore diverse roles. March 02, 2017 by Thomas Broderick. Diversity Leadership Council. This is also the new Spawn Explore the region of Tora as you build or join a town and meet new people Race Selection You will be able to choose from 7 base races. With that, we're building a large section for roleplay enthusiasts. This is a very broad definition, as it includes groups of all sizes, from dyads to whole societies. The human resources manager (participant) will present the information for the presentation to you in a role-play to take place in your office. Diversity Bingo 7 "How Comfortable am I?" 8-9 Perceptions 10 Whom to Leave Behind 11 Section 2: Self Awareness Activities Are You What You Eat? 13 Circles of My Multicultural Self 14-16 Class and Poverty Awareness Quiz 17-20 Connections 21. Put together a team with different backgrounds, passions, and capabilities. Article on effectively dealing with resistance in psychotherapy. Management's role in shaping organizational culture Aim The present study addresses the importance of the manager’s role in the development and maintenance of organizational culture. I have divided the list into two sections. The Corey’s Perspective on Groups – Groups are not a second-rate approach to helping people change – Groups are the treatment of choice – Groups offer a natural laboratory where people can experiment with new ways of being – Members’ interpersonal difficulties get played out in the group Tyson, 2009 Group Process. Momma」) with 34 reads. the global scenarios series script for You need to cultivate awareness and sensitivity to understand our world’s diverse cultures, such General Instructions. As the Pan-American Health Organization puts it, equity is the means, equality is the outcome. Boundaries will help teachers to work within their limits and adhere to the professional code of practice. Dr Pauline Hanesworth has worked in higher education for 11 years, first as a university lecturer and programme leader, developing various learning and teaching initiatives, second as an academic development officer at the Higher Education Academy in Scotland, specialising in equality, diversity and inclusivity. As a “leading-out”, education is a rendering explicit of the immanent Intellect ( Intellectus or Nous ), the seat of which, symbolically speaking, is the heart. As the nation becomes more diverse, so should learning and playtime. In this chapter the concept “organisational culture” is explored in more detail. As usual, you have to complete the monument by collecting the coloured wool. This page contains an up-to-date list of the top 25 most downloaded maps for each category on our site. Please get in touch for more details of if you are interested in this opportunity: [email protected] ít, 2017, itrp. The Fires of Rebellion roleplay is set 500 years after the Hundred-Year Darkness and more than 6,000 years before the Star Wars films. RPG is a community of writers building shared universes, assembling compelling narratives, and telling incredible stories. 2 Roleplay City City Rpg Slimefun. 2: Universal Design for Learning 2010 Page 1 Universal Design for Learning. Some questions to think about:. Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients. Single nucleotide polymorphisms, frequently called SNPs (pronounced “snips”), are the most common type of genetic variation among people. It may be used for the training of professionals or in a classroom for the understanding of literature, history, and even science. It's quite difficult to do this, so don't worry about accidentally doing it. In both cases, there is opportunity to celebrate diversity through the telling of traditional tales, whatever the age group and profile of our students. 2a Identify which legislation and codes of practice relating to equality, diversity and discrimination apply to their own role 4. Elysium Roleplay We welcome all players new and experienced with Roleplay The new Elysium offers a stunning new Roleplay area Arcton. How to use trait in a sentence. Does your child love pretending? Find out how pretend play can spur child development, while learning new dramatic play ideas, activities and games. Name _____ Date _____ Created Date: 1/14/2002 1:35:10 PM. » Read more. After translating, click on the "show original" button at the top of this page to restore page to English. 22 Looking for decent-good English speakers who want to play on a light roleplay server. Role Play in Early Years Settings. Another team member, Barry, is talking at length again. Diversity is discussed in a broad sense in. CE available. While we might disagree on the standard definition of leisure, play, or recreation, we are all concerned with providing an experience for participants. Any teachers taking culturally diverse classes will tell you to be careful. We understand the importance of not only having international accreditation but also building partnerships with other like-minded organizations from around the world. Demonstrate progress by recruiting for diversity, nurturing a safe environment, focusing on equitable conservation results, and building an inclusive culture. One of the most common forms of stress is that related to our careers and the workplace. 0 and meets the requirements of the 2012 Standards for Training Packages. Fortunately, much of the work of preparation, once done, can be distributed to other educators. Department of Health. o You can have participants try to decide if the scenario is actually sexual harassment or not. Students develop empathy through role-play activities. Diversity Leadership Council. Diversity Builder, Inc. The details of what you need to do depend entirely on why you want to include role-playing exercises in your course. Objective for the day Develop better understanding of key concepts fundamental to fostering diversity and inclusion in work spaces. Throughout scripture, you see it this way: David was the son of Jesse who was the son of Obed who was the son of Boaz. It is only through understanding each other that we truly gain knowledge and can move forward together. Discuss how this role-play is or isn't similar to real life.
<urn:uuid:08fb8216-a1fc-4cca-9baf-726bc9ec41b6>
CC-MAIN-2019-47
http://cbtt.metallskulpturen-kuelchen.de/diverse-roleplay.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669755.17/warc/CC-MAIN-20191118104047-20191118132047-00018.warc.gz
en
0.942013
7,111
3.15625
3
Mathematics Education Forum - Math 30-1 Mathematics 30-1 & Pre-Calculus 12: Explained, an unofficial online resource aligned to the WNCP curriculum used in Western Canada. Contains workbooks and flash animations to assist instruction. - Manga High High quality new math games including Intermediate, Middle and High School math games. Free to play online. Teachers can invite and guide students through math curriculum. Free professional-quality animations of mathematical concepts for middle schools with clear explanations, suitable for the IWB or data-projector. Convergence is an online magazine on the history of mathematics and its use in teaching, published by the Mathematical Association of America. - E-GEMS: Electronic Games for Education in Math and Science An interdisciplinary team doing research and development on children's interactions with computers, design and use of (educational) computer games and strategies and materials to integrate game-like computer activities with other forms of classroom learning. The project is no longer active, but the page remains interesting. for Research in Mathematics Education (JRME) Journal of the NCTM, addressing all levels of math education. TERC is an education research and development organization in Cambridge, MA whose mission is to improve mathematics, science and technology teaching and - Math in the Malls Popularizing mathematics through mall displays with hands-on activities. - Math Central Math Central is a collection of internet services designed for teachers and students of mathematics at the K-12 level. The Resource Room allows mathematics educators to share resources having to do with math teaching. Submissions are stored in a database that can be browsed by educational level and curriculum strand, or searched by keyword. The Quandaries and Queries area is a large and growing database of questions on all manner of mathematical topics sent in by students and the public, solved and explained by math consultants. It is run by Prof. Harley Weston, who received the CMS Adrien Pouliot Award in 2008.
<urn:uuid:56849057-7e64-4144-8bdd-d598313e64fd>
CC-MAIN-2016-30
https://cms.math.ca/Education/enseignants.e
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824995.51/warc/CC-MAIN-20160723071024-00027-ip-10-185-27-174.ec2.internal.warc.gz
en
0.903962
416
3.3125
3
Let s make teaching kindergarten math a lot of fun with these kindergarten math worksheets pdf handouts. Free download 115 kindergarten workbooks pdf containing 4 000 worksheets. Kindergarten math worksheets in printable pdf format. Worksheet for nursery maths pdf. The following topics are covered among others. Canada pharmacy our free math worksheets pdf for kindergarten first grade second grade third grade fourth grade fifth grade sixth grade seven grade will help students kids to the head of the class. They focus on learning the letters of the alphabet numbers and counting pre writing and tracing skills scissor skills shapes colors and more. It features all math topics covered in kindergarten and contains well illustrated math worksheets with graphics that appeal to kids. Alphabet letters numbers handwriting tracing phonics reading math science etc. Download kindergarten math worksheets pdf files for free. Writing reinforces maths learnt. These worksheets are from preschool kindergarten to grade 6 levels of maths. If you are a teacher or homeschool parent this is the right stop to get an abundant number worksheets for homework tests or simply to supplement kindergarten math activities. All math worksheets printables by grades these worksheets are printable pdf exercises of the highest quality. They cover a lot of bases so let s get started. These worksheets are from preschool kindergarten to grade 6 levels of maths. Preschool math worksheets for children who little or no notion of math. Free math worksheets and workbooks pdf for kids download free printable math practice worksheets activities and workbooks pdf for preschool pre k kindergarten nursery school and 1st grade. Preschool worksheets pdf to print here is a list of my free printable preschool worksheets and activities by skills they promote. The following topics are covered among others. All math worksheets printables by grades these worksheets are printable pdf exercises of the highest quality. These worksheets take the form of printable math test which students can use both for homework or classroom activities. Writing reinforces maths learnt. This page contains links to math topics which also link to pages with loads of colorful pdf printable math worksheets for pre kindergarten each worksheet is carefully crafted with the best graphics and colors which appeal to young learners. Use them for homework math centers homeschooling or for extra math practice at home.
<urn:uuid:96b810b8-d446-43bc-bcb5-a94ddf0e4e35>
CC-MAIN-2020-50
https://tokonita.com/2020/05/06/worksheet-for-nursery-maths-pdf/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195069.35/warc/CC-MAIN-20201128040731-20201128070731-00040.warc.gz
en
0.908519
484
3.15625
3
Born: October 19, 1910 Died: August 21, 1995 Achievements: Discovery of Chandrasekhar Limit; awarded Nobel Prize in Physics in 1983. Subrahmanyan Chandrasekhar was one of the greatest scientists of the 20th century. He did commendable work in astrophysics, physics and applied mathematics. Chandrasekhar was awarded the Nobel Prize in Physics in 1983. Subrahmanyan Chandrasekhar was born on October 19, 1910 in Lahore. His father, Chandrasekhara Subrahmanya Ayyar was an officer in Government Service in the Indian Audits and Accounts Department. His mother Sita was a woman of high intellectual attainments. C.V. Raman, the first Indian to get Nobel Prize in science was the younger brother of Chandrasekhar's father. Till the age of 12, Subramanyan Chandrasekhar had his education at home under his parents and private tutors. In 1922, at the age of 12, he attended the Hindu High School. He joined the Madras Presidency College in 1925. Subrahmanyan Chandrashekhar passed his Bachelor's degree, B.Sc. (Hon.), in physics in June 1930. In July 1930, he was awarded a Government of India scholarship for graduate studies in Cambridge, England. Subrahmanyan Chandrasekhar completed his Ph.D. degree at Cambridge in the summer of 1933. In October 1933, Chandrasekhar was elected to a Prize Fellowship at Trinity College for the period 1933-37. In 1936, while on a short visit to Harvard University, Subrahmanyan Chandrasekhar, was offered a position as a Research Associate at the University of Chicago and remained there ever since. In September 1936, Subrahmanyan Chandra Shekhar married Lomita Doraiswamy. She was her junior at the Presidency College in Madras. Subrahmanyan Chandrasekhar is best known for his discovery of Chandrasekhar Limit. He showed that there is a maximum mass which can be supported against gravity by pressure made up of electrons and atomic nuclei. The value of this limit is about 1.44 times a solar mass. The Chandrasekhar Limit plays a crucial role in understanding the stellar evolution. If the mass of a star exceeded this limit, the star would not become a white dwarf. It would continue to collapse under the extreme pressure of gravitational forces. The formulation of the Chandrasekhar Limit led to the discovery of neutron stars and black holes. Depending on the mass there are three possible final stages of a star - white dwarf, neutron star and black hole. Apart from discovery of Chandrasekhar Limit, major work done by Subrahmanyan Chandrasekhar includes: theory of Brownian motion (1938-1943); theory of the illumination and the polarization of the sunlit sky (1943-1950); theory of the illumination and the polarization of the sunlit sky (1943-1950); the equilibrium and the stability of ellipsoidal figures of equilibrium, partly in collaboration with Norman R. Lebovitz (1961-1968); the general theory of relativity and relativistic astrophysics (1962-1971); and the mathematical theory of black holes (1974- 1983). Subrahmanyan Chandrasekhar was awarded (jointly with the nuclear astrophysicist W.A. Fowler) the Nobel Prize in Physics in 1983. He died on August 21, 1995.
<urn:uuid:ed59d21a-3ee7-4c43-8e8f-b64702a09f65>
CC-MAIN-2015-48
http://www.iloveindia.com/indian-heroes/subrahmanyan-chandrasekhar.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447860.26/warc/CC-MAIN-20151124205407-00242-ip-10-71-132-137.ec2.internal.warc.gz
en
0.945962
786
3.296875
3
UCSB's diverse and botanically rich ornamental horticulture includes plants from six continents. A few plant species are unique to the campus and are found nowhere else in Santa Barbara County. The free, illustrated brochure is the first in a series of Exotic Flora Walking Tours to be produced by the center's Campus Flora Project. Copies are available from the UCSB Visitor Center, the Bookstore, and the Cheadle Center, which is located in the Harder Stadium Building near Storke Field. Additional walking tours focusing on palms and edible plants are planned. "Each plant on campus has a wonderful story to tell," explains Bree Belyea, project manager. Belyea and her colleagues are cataloging UCSB's plant species and compiling their rich histories for an interactive new web site. For the first time, UCSB's extraordinary horticultural history and preservation efforts including the notes of the botanical collectors will be accessible to students, educators, and enthusiasts. "Using the site's interactive map, everyone will be able to design their own botanical tours of UCSB based on their specific interests in a particular species or a desire to see red flowering plants in April, for example, using their preferred mode of transportation," said Belyea. Many of the campus' exotic plants were propagated from seeds or grown from specimens gathered decades ago by UCSB botanists, including the late Vernon I. Cheadle, UCSB chancellor from 1962-1977. He recognized the special opportunity and favorable circumstances of this botanically rich coastal environment, said Jennifer Thorsch, Katherine Essau director of the Cheadle Center. Cheadle had a vision of developing the campus into an outdoor classroom that would serve as an educational tool and also create an environment of great beauty. Today, biology, art, geology, geography, and environmental studies classes make use of the extraordinary plants in UCSB's landscape. The cover of the brochure includes an illustration produced by Oriana Connolly, a student in a College of Creative Studies botanical illustration class. The exotic tree tour, which begins and ends at the Visitor Center, is an hour-long loop. The brochure's map identifies the location of 11 species. Each description provides the common name, species, origin, history, and cultural use. For example, the dawn redwood (Metasequoia glyptostroboides), near South Hall, "was originally described from fossil specimens and thought to be extinct for millions of years until living specimens were found in China in 1944. In 1947, a botanical expedition to China brought back seeds and later distributed living plants to various U.S. botanical gardens." The Jurassic Park area on the west side of Webb Hall is home to various plants whose ancestors were present when T. rex roamed the planet. These plants have evolved minimally over millions of years. They include Araucaria bidwillii from Queensland, Australia, and Araucaria rulei, from New Caledonia. Some of the oldest trees on campus are the massive windrow of Tasmanian blue gum (Eucalyptus globulus) next to Noble Hall. The row of eucalyptus was planted to provide a windbreak for bean crops in the 1940s or earlier. Other remnants of windrows are found throughout the campus. In addition, the Cheadle Center recently published the third edition of its immensely popular pocket guide, "Native Plants & Habitats of the UCSB Campus" (see cover at right). The 135-page booklet, featuring seven habitats and 57 California native plants, includes a photograph of each plant, and information about cultural and wildlife use. It is a great resource for anyone interested in learning about California Native Plants, said Ben Reder, restoration coordinator at the center. Reder first prepared the guide as a teaching tool for Kids in Nature, an educational outreach program at the center. Demand has steadily grown, and the book has been redesigned and reprinted twice. "Native Plants & Habitats of the UCSB Campus" is available for purchase from the Cheadle Center, the UCSB Bookstore, the Santa Barbara Botanic Garden, the Santa Barbara Museum of Natural History, and the Isla Vista Food Co-op. Beautiful greeting cards with photographs of local plants and wildlife taken by the center's staff (see sample at right) are also for sale at the center and the campus bookstore. Proceeds from the sale of the guide and the cards support the center's student internship and restoration programs. A walking tour of UCSB Campus Lagoon Area has also been produced by the center. Both the exotic tree tour and the lagoon tour are available online. (Please see link below.) The Cheadle Center for Biodiversity and Ecological Restoration houses over 350,000 botanical and zoological specimens. For over 60 years, these valuable collections have contributed to the research and educational missions of the university. It is responsible for managing and restoring many of the biologically diverse natural areas on campus including the Lagoon, North Bluff, Storke Wetlands, Manzanita Village, and most recently the San Clemente Housing project. The Cheadle Center's collections are available for use by UCSB faculty, researchers, staff, and students as well as community members, including biological consultants, government agencies, and K-12 educators and their students. The Campus Flora Project is funded by a grant from the Elvenia Slosson Foundation at UC Davis. For more information about the Cheadle Center visit: ccber.lifesci.ucsb.edu or call (805) 893-4211. The center is open Monday through Friday, between 8 a.m. and 5 p.m. The UCSB Exotic Flora Walking Tour brochure is available here [3338k PDF]. The Campus Lagoon Area Tour brochure is available here [550k PDF].
<urn:uuid:058dbf6d-cf4a-46f0-8018-26ec320a4e51>
CC-MAIN-2013-20
http://www.ia.ucsb.edu/pa/display.aspx?pkey=1570
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698924319/warc/CC-MAIN-20130516100844-00088-ip-10-60-113-184.ec2.internal.warc.gz
en
0.932096
1,231
2.875
3
This page uses many schematics, which are loaded individually for performance reasons. [Schematic Help] - 1 Introduction - 2 RS Latches - 3 D Latches and Flip-Flops - 4 JK Flip-Flops and Latches - 5 T Flip-Flop Latches and flip-flops are effectively 1-bit memory cells. They allow circuits to store data and deliver it at a later time, rather than acting only on the inputs at the time they are given. As a result of this, they can turn an impulse into a constant signal, "turning a button into a lever". Devices using latches can be built to give different outputs each time a circuit is activated, even if the same inputs are used, and so circuits using them are referred to as "sequential logic". They allow for the design of counters, long-term clocks, and complex memory systems, which cannot be created with combinatorial logic gates alone. Latches are also used when a device needs to behave differently depending on previous inputs. There are several basic categories of latches, distinguished by how they are controlled. For all types, the input lines are labeled according to their purpose (Set, Reset, Toggle, Data, Clock). There are also more arbitrary labels: The output is commonly labeled Q for historical reasons. Sometimes there is also an "inverse output" Q̅, which is always ON when Q is OFF and vice versa. If both Q and Q̅ are available, we say the circuit has "dual outputs". Most of the following types can be built as a "latch" that responds to the level of a signal, or as a "flip-flop" triggered by a change in the signal. - A RS latch has separate control lines to set (turn on) or reset (turn off) the latch. Many also have dual outputs. The oldest form of RS latch in Minecraft is the RS-NOR latch, which forms the heart of many other latch and flip-flop designs. - A T latch has only one input, the toggle. Whenever the toggle is triggered, the latch changes its state from OFF to ON or vice versa. - There are also SRT latches, combining the inputs and abilities of the RS and T latches. - A D latch has a data input and a clock input. When the clock is triggered, the data input is copied to the output, then held until the clock is triggered again. - A JK latch has three inputs: A clock input, and the J and K inputs. (J and K don't stand for anything.) When the clock is triggered, the latch's output can be set, reset, toggled, or left as is, depending on the combination of J and K. While these are common in real-world electronics, in Minecraft they tend to be bulky and impractical—most players would use an SRT latch instead. About RS Latches An RS latch has 2 inputs, S and R. The output is conventionally labeled Q, and there is often an optional "inverse output" Q̅. (Having both Q and Q̅ is called "dual outputs"). When a signal comes into S, Q is set on and stays on until a similar signal comes into R, upon which Q is reset to "off". Q̅ indicates the opposite of Q -- when Q is high, Q̅ is low, and vice versa. Where a Q̅ output is available, you can often save a NOT gate by using it instead of Q. Note that the proper name for this category of latch is "SR latch". However, in real-world electronics as in Minecraft, the classic implementation of such latches starts by inverting the inputs; such a latch is the proper "RS latch", but they're so common that the term is commonly used also for what "should" be called SR latches. Typical uses include an alarm system in which a warning light stays on after a pressure plate is activated until a reset button is pushed, or a rail T-junction being set and reset by different detector rails. RS latches are common parts of other circuits, including other sorts of latches. Setting both inputs high simultaneously is a "forbidden" condition, generally something to avoid. In the truth table, S=1, R=1 breaks the inverse relationship between Q and Q̅. If this happens, you will get "undefined behavior"—various designs can do different things, and especially Q and Q̅ can be high or low at the same time. If the forbidden state is co-opted to toggle the output, the circuit becomes a JK latch, described in its own section. If there is instead a third input which toggles the output, the circuit becomes an "RST latch". Any RS latch with dual outputs is functionally symmetrical: pulsing each input turns on "its" output, and turns off the other one. Thus R and S are interchangeable, if you also swap the outputs: Which input you pick as S chooses which of the outputs is Q, then the other input will be R and the other output will be Q̅. (If the original circuit only had a Q output, then swapping the inputs will turn it into Q̅.) In several designs (A, B, D, F, I) the functional symmetry is reflected by the circuit's physical symmetry, with each input energizing the torch it leads to, while turning off the other. RS latches can be built in a number of ways: - Two NOR gates can be linked so that whichever is lit, the other will be off. The RS NOR latch is the "original" RS latch, and still among the smallest memory devices that can be made in vanilla Minecraft. While they can be built with just torches and redstone dust, repeaters can also be used. Many of these designs have "duplex I/O"—the same locations can be used to read or set the latch state. - It is also possible to construct an RS NAND latch, using NAND gates instead of NOR gates. These will be larger and more complex than an RS NOR latch, but may be useful for specialized purposes. Their inputs are inverted (see below for details). - Other RS latches can be created by fitting an "input sustaining circuit" with a reset switch, say by adding a pair of NOT gates or a piston, placed so as to interrupt the circuit when triggered. Such a construction can be nearly as compact as an RS NOR latch (and often with better I/O isolation and/or timing), but they will usually not have a natural Q̅ output. - Other devices can also be involved. Pistons can be used to physically toggle a block's location, while hoppers or droppers can pass around an item entity. These circuits can be very fast and small, with little redstone dust. |0||0||1||1||Keep state||Keep state| Designs A and B are the most fundamental RS-NOR latches. In both cases, their inputs and outputs are "duplex"—the latch state can be read (Q) or set (S) on one side of the circuit, while on the other side, the latch can be reset (R), or the inverse output read (Q̅). If separate lines for input and output are needed, opposite ends of B can be used, or A can be elaborated into A' with separate locations for all four lines. These can be modified to provide separate, even isolated, input and output. C and D use torches and repeaters respectively to isolate the outputs, though the inputs can still be read. E expands the circuit slightly to isolate all four I/O lines. Design F provides a vertical (1-wide) option; again, the I/O is duplex, though isolated outputs can be taken at alternate locations. Design G takes up more room than F, but may be preferable, as both the set and reset are on the same side. Also, be sure to compensate for the extra tick on (Q̅), caused by the last torch. RS NAND Latches An RS latch can also be designed using NAND gates. In Minecraft, these are less efficient than the RS NOR latch, because a single Redstone torch acts as a NOR gate, whereas several torches are required to create a NAND gate. However, they can still be useful for specialized purposes. Such an "RS NAND latch" is equivalent to an RS NOR, but with inverters applied to all the inputs and outputs. The RS NAND is logically equivalent to the RS NOR, as the same R and S inputs give the same Q output. However, these designs take inverse R and S (R̅, S̅) as inputs. When S̅ and R̅ are both off, Q and Q̅ are on. When S̅ is on, but R̅ is off, Q̅ will be on. When R̅ is on, but S̅ is off, Q will be on. When S̅ and R̅ are both on, it does not change Q and Q̅. They will be the same as they were before S̅ and R̅ were both turned on. RS-Latch Summary Table 1 This table summarizes the resources and features of the RS latches which use only redstone dust, torches, and repeaters. Input Stabilization with Reset An "Input-Stabilizing Circuit" responds to an input pulse by turning its input on and leaving it on. This can be built up into an RS Latch by adding a means to turn it off. These circuits usually don't offer a "natural" Q̅ output. Design J adds a pair of NOT gates, with the reset going to the second torch. (The NOT gates can also be added to the upper redstone loop.) Design K uses its piston to block the circuit where it goes up onto the solid block. Design L shows the reverse approach, breaking the circuit by withdrawing a power-carrying block. Pistons and other devices A pair of non-sticky pistons can be used to physically push a block back and forth. This can make or break a circuit from a torch, producing an RS latch with no inverse output (M). If the block being pushed is a block of redstone, the circuit can be even smaller, with dual outputs (N). Both of these have isolated inputs and outputs. Putting two blocks between the pistons produces an SRT latch O, with an extra input to toggle the latch state. And droppers can also be pressed into service, as in design P: Small, tileable, but it does require a comparator. - An RS latch can easily be expanded into a monostable circuit, which automatically disables itself some time after being activated. To do this, split the output redstone path into 2 parts. The new path should run through some repeaters, and in to the reset input. When you turn on the latch, the redstone will run through the delay before turning off the latch. (This works not only for Q and R, but for Q̅ and S as well.) You can also use a more complex delay mechanism instead of repeaters, e.g. a water clock. - An "Enable/Disable RS latch" can be made by adding a pair of AND gates in front of the inputs, testing each of them against a third input, E. Now if E is true, the memory cell works as normal. If E is false, the memory cell will not change state. That is, E latches (or equivalently, clocks) the RS latch itself. Note that for design Q, the outputs are not isolated, and a signal to them can set the latch regardless of E. Alternatively, repeaters could be used to latch the inputs, but this costs more and saves no space. - As noted above, if it is possible to add a "toggle" input, the RS latch becomes an RST latch. If the "forbidden" state is used for the toggle, then it's a JK latch. RS-Latch Summary Table 2 |Other devices||--||1 sticky piston||1 sticky piston||2 normal pistons||2 normal pistons||2 normal pistons||2 droppers, 1 comparator||--| D Latches and Flip-Flops A D ("data") flip-flop or latch has two inputs: The data line D, and the "clock" input C. When triggered by C, the circuits set their output (Q) to D, then hold that output state between triggers. The latch form, a "gated D latch", is level triggered. It can be high- or low-triggered; either way, while the clock is in the trigger state, the output will change to match D. When the clock is in the other state, the latch will hold its current state until triggered again. A D flip-flop is edge triggered; it sets the output to D only when its clock input changes from "off" to "on" (positive edge) or vice versa (negative edge), according to the circuit. An edge trigger can turn a gated D latch into a D flip flop. Building these devices with torches is fairly unwieldy, though some older designs are given below. Happily, since version 1.4 of Minecraft, repeaters have a special latching ability, which drastically simplifies the problem. Now a gated D latch can be made with two repeaters, and a D flipflop with four repeaters and a torch: Design G uses the repeater's new latching feature, added to the game in version 1.4. It holds its state while the clock is high, and is by far the most compact of the D latch designs. Design H combines two such latches, one high and one low triggered, to create a positive edge-triggered D flip-flop. The block and redstone torch can be reversed for a negative edge-triggered design. The design is based on a real life implementation of an edge-triggered D flip-flop called a "Master-Slave" configuration. For historical interest, here are several older designs, not dependent on latched repeaters, along with a table of their resource needs and other characteristics. A few of these designs also have the additional inputs and inverse output of an RS Latch. This basic level-triggering gated D latch (design A) sets the output to D as long as the clock is set to OFF, and ignores changes in D as long as the clock is ON. However, on a positive clock edge, if D is low, the output will pulse high for 1 tick, before latching low. Design B includes a rising-edge trigger and it will set the output to D only when the clock goes from OFF to ON. The torch-based edge trigger could also be replaced with one of the designs from the Pulse circuit page. The circuits are based on an RS latch, with a front-end to set it appropriately. The RS latch can also be triggered directly: using the R and S inputs can override the clock and force a certain output state. So can sending signals into the Q and Q̅ lines, because the output is not isolated. To get isolated outputs, just add inverters and swap the labels. Design C is a one block wide vertical version of A, except for using a non-inverted clock. It sets the output to D while the clock is ON (turning the torch off). This design can be repeated in parallel every other block, giving it a much smaller footprint, equal to the minimum spacing of parallel data lines. A clock signal can be distributed to all of them with a wire running perpendicularly under the data lines, allowing multiple flip-flops to share a single edge-trigger if desired. The output Q̅ is most easily accessed in the reverse direction, toward the source of input. As in design A, the un-isolated Q and Q̅ wires can do double duty as R and S inputs. Q can be inverted or repeated to isolate the latch's Set line. Design E provides a more compact (but more complex) version of A, while still affording the same ceiling requirement. E' allows the latch to act on a high input. Design F holds its state while the clock is high, and switches to D when the clock falls low. The repeater serves to synchronize the signals that switch out the loop and switch in D. It must be set to 1 to match the effect of the torch. |Trigger||Low Level||Rising Edge||High Level||High Level||Low Level||High Level||Low Level||High Level||Rising Edge| |Input isolated?||Yes||Yes||C Only||C Only||Yes||Yes||No||Yes||Yes| JK Flip-Flops and Latches A JK flip-flop is another memory element which, like the D flip-flop, will only change its output state when triggered by a clock signal C. They can be edge-triggered (designs A, D, E) or level-triggered (C). Either way, the two inputs are called J and K. These names are arbitrary, and somewhat interchangeable: if a Q̅ output is available, swapping J and K will also swap Q and Q̅. When the flip-flop is triggered the effect on the output Q will depend on the values of the two inputs: - If the input J = 1 and the input K = 0, the output Q = 1. - When J = 0 and K = 1, the output Q = 0. - If both J and K are 0, then the JK flip-flop maintains its previous state. - If both are 1, the output will complement itself — i.e., if Q = 1 before the clock trigger, Q = 0 afterwards. The table summarizes these states — note that Q(t) is the new state after the trigger, while Q(t-1) represents the state before the trigger. The JK flip-flop's complement function (when J and K are 1) is only meaningful with edge-triggered JK flip-flops, as it is an instantaneous trigger condition. With level-triggered flip-flops (e.g. design C), maintaining the clock signal at 1 for too long causes a race condition on the output. Although this race condition is not fast enough to cause the torches to burn out, it makes the complement function unreliable for level-triggered flip-flops. The JK flip-flip is a "universal flip-flop", as it can be converted to any of the other types: It's already an RS latch, with the "forbidden" input used for toggling. To make it a T flip flop, set J = K = T, and to make it a D flipflop, set K to the inverse of J, that is J = K̅ = D. In the real world, mass production makes JK latches useful and common: a single circuit to produce in bulk, that can be used as any other sort of latch. In Minecraft, however, JK latches are generally larger and more complex than the other types, and using their toggle function is awkward. It's almost always easier to build the specific latch type needed. Notably, an SRT Latch has all the same abilities, but gets the toggle function from a separate input. Design E is a vertical JK Flip-Flop from the basis of design A. Aside from these redstone designs, it is also possible to make a JK flip-flop by modifying a rail toggle, or with newer components such as hoppers and droppers. T flip-flops are also known as "toggles." Whenever T changes from OFF to ON, the output will toggle its state. A useful way to use T flip-flops in Minecraft could for example be a button connected to the input. When you press the button the output toggles (a door opens or closes), and does not toggle back when the button pops out. These are also the core of all binary counters and clocks, as they function as a "period doubler", releasing one pulse for every two received. There are many ways to build a T flipflop, ranging from torches and dust through pistons to more exotic devices. Many designs depend on a quirk in sticky-piston behavior, namely that after pushing a block, a sticky piston will let go of it if the activating pulse was 1 tick or less. This allows short pulses to toggle the position of a block, which is obviously useful here. Best in Class TFF Designs These are designs which seem markedly superior in various categories. L3 is a latch, which responds to a high level. Like most T latches, if the toggle line is held high too long, it will "oscillate", toggling repeatedly. That being said, make sure you use a stone button and not a wooden button as wooden buttons do stay active for a little bit longer which will cause this oscillation effect. L5 is a true flipflop with the same footprint (but higher), which triggers on a rising edge. Both are extremely compact, thanks to the use of latched repeaters. L4 is even smaller, but requires a piston (thus not silent), and it activates on a falling edge. L6 is a compact 1-high adaptation of D flip-flop H. The video shows L6 and a similar T FlipFlop. |L6 and another TFF Video (view on YouTube)| Design M is a 1-wide dual-piston design, which can be tiled adjacent to each other for compact circuitry. (If they don't have to be right next to each other, dust can be used instead of the output repeater.) The hidden piston forms a simple monostable circuit that cuts off the button signal (10 ticks or so) as soon as a 1-tick signal has passed through to the second repeater. Due to the piston quirk mentioned above, this 1-tick signal lets the main piston toggle the position of its mobile block, to set or unset the latch and the output. That linear design can also be bent into a 3×3 square, as N. (The "any" blocks can be air, and that torch can just as well be on the ground.) Tiling design N is a little tricker, but it can be done in either horizontal direction, by mirroring adjacent copies. Note that the output can be taken from whichever side of that corner is free, but you'll need repeaters to keep adjacent outputs from cross-connecting. Design O uses a single block that swaps positions (between above a torch and not) when the top dust receives a signal; it is a dual piston design that uses only three torches, two dust, and three solid blocks. While not the most compact design possible at 1×4×4, it requires no slime balls and uses few resources while allowing for four areas to input and two areas to output. Other conventional TFF Designs |Section needs work There are many designs here which are not well documented, and some may be redundant or broken. Any help in describing or testing circuits would be appreciated. Design A demonstrates that a TFF can be made solely with redstone dust and torches, but it sprawls over 9×7×3 blocks. Design B is slightly unreliable for very long pulses; while the input is on, the piston will toggle every time the block below the piston arm is updated. The design D (another torches-and-dust design, but vertical) does not have an incorporated edge trigger and will toggle multiple times unless the input is passed through one first. Design E adds such a trigger (and a repeater). Designs J and K make more use of repeaters, but not as latches, and they are still quite large. Design L2, (also L3, L4, and L5 above) relies on the redstone repeater locking mechanic introduced in version 1.4.2. L4 is the smallest, but requires a piston and activates on a falling edge. TFF Summary Table |These tables are incomplete, and need more data.| |Other Devices||none||1 SP||none||none||none||none||2 SP||2 P| |Output(s) isolated?||No||No||No||No||Q̅ only||No||Yes||No| |Other devices||1 SP||none||none||1 SP||none||none| |Output(s) isolated?||Yes||Yes||Yes||Yes||Q̅ only||No| |Other devices||1 SP||1 SP||1 SP||1 SP||1 SP| - "In a void", that is include required blocks supporting redstone. - The number of ticks from the trigger to switching the output. - Cycle time - How often the latch can toggle, including any recovery time. This is the period of the fastest clock that can drive it. - Other Devices - P == normal piston, SP == sticky piston, C == comparator, H == hopper, D == dropper. - rising edge (the usual), falling edge, high or low level. Level-triggered TFFs oscillate on long pulses. Rail and Exotic TFFs The Rail T flip-flop is a T flip-flop which uses rails and redstone. The general design uses a length of track that is stopped by a block at both ends. When the T flip-flop is in a stable state, the minecart is at either end of the track (depending on the state). An input pulse turns on powered rails at both ends of the track, causing the minecart to move to the other end. Along the track, there are two separate detector elements (e.g. detector rails). These two detectors are each connected to an input of an RS NOR latch, and hence serve to translate minecart motion into a state transition. When the minecart moves, depending on its direction of motion, one detector will turn on (and off) before the other; the second detector to be hit is what determines which input of the RS NOR latch stays on last and hence what the new state of the RS NOR latch is. Design A uses detector rails, while design B uses pressure plates. (A minecart triggers a pressure plate on the inside of a turn, including diagonals.) Note that for B, the other side of the latch isn't a true Q̅, as the passage of the cart turns on Q before actually switching the latch. This type of T flip-flop is slower than traditional redstone-only circuits, but this may be desirable in certain situations. With T flip-flop designs that are level-triggered (as opposed to clocked or edge-triggered), a long input pulse will cause the flip-flop to continuously switch state (oscillate) while the pulse is present. In pure redstone circuits, this is only limited by the redstone circuit delays, and hence a relatively short input pulse can cause several state transitions. Pure redstone T flip-flops usually include an edge-trigger or pulse-limiting circuit to the design, since the input pulse usually can't be guaranteed to be short enough without the use of that kind of circuit. With rail-based designs, the speed at which the output can flip is limited by the time needed for the cart to move from one end of its rail to the other, which allows for a much longer pulse to be applied to a level-triggered input without needing an edge-trigger or pulse limiter circuit. However, the delay between the input pulse and the output transition is also longer. Grizdale's T Flipflop This hopper/dropper design is not only compact, but tileable in three dimensions. The only hitch (for survival mode) is that you need access to Nether Quartz for the comparator. The A variant has a size of 1×2×3. The B variant puts the input and output inline, but changes the footprint to 2×2×2, or 4×2×2 if you want fully powered input and output. The B design can also be tiled in line, side by side, vertically (by reversing alternate rows), or all three at once. Once built, place a single item inside any of the containers and it will work as a T Flip-flop, with the item cycling between the two droppers. The core has a 1 tick delay between input and turning off or on, but the optional repeaters would raise this to 3. This T Flip Flop can be turned into an SRT latch by only powering the bottom dropper to set, and the top to reset. However, it won't be as tileable as the original TFF. First known appearance: 23 March 2013 on this forum thread. Obsolete T flip-flops Designs Z1 and Z2 do not work as of version 1.5.2 -- in both cases, their pulse generator does not cause the piston to toggle its block as apparently intended.
<urn:uuid:01dbc8c7-c259-427c-84ee-db3bd2ff5e55>
CC-MAIN-2015-22
http://minecraft.gamepedia.com/Memory_circuit?cookieSetup=true
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929422.8/warc/CC-MAIN-20150521113209-00223-ip-10-180-206-219.ec2.internal.warc.gz
en
0.8907
6,180
3.90625
4
|What's New||Knitting Patterns and Kits||Yarn||Knitting Needles||Machine Knit Socks||Custom Carding and Spinning||Home| Wool comes from sheep. They grow a wool coat and once a year this wool coat is sheared off the animal. In Wisconsin, this is frequently done in the early spring shortly before they have their lambs. A shorn ewe will be more likely to stay out of the wind and bad weather and protect her new-born lamb if she does not have a thick wool coat on her. The shorn wool coat is called a fleece. It is also called "grease wool" because of all the oil and lanolin in the wool. This fleece must be cleaned before it can be processed into wool yarn. There is much vegetable matter, manure and natural oil that must be removed. Sometimes as much as 50% of the weight of the fleece is not wool. 3. Skirting a fleece 4. Washing the wool The grease must then be removed from the wool. This can be done using soap or detergent and a lot of water or it can be done by submerging the wool in an acid bath which dissolves all the vegetable matter as well as the grease (this is called scouring). The washed and dried wool is then "teased" or "picked" which is the beginning of the process of opening up the locks of wool and turning it into a consistent web. The wool is put through a picker which opens the locks and blows the fluffy wool into a room. At the same time a special spinning oil is added which helps the wool fibers slide against each other but also helps them stick together as a fine web through the processing. The wool fibers are then put through a series of combing steps called carding. This can be done with small hand cards that look much like brushes you would use on a dog. It can also be done on a larger scale with machine driven drums covered with "card cloth" which combs the wool many times by transfering it back and forth from one drum to the other as it is passed down the series of drums. We have "woolen"cards which produce a wool web with the fibers coming off in random alignment. This is in contrast to "worsted" combing that lines up all the fibers (as you would see in thread). The final step in the carding process divides the web into small strips called pencil rovings. These are collected on large spools on the end of the card. These spools of pencil roving will be placed on the spinning frame to make yarn. Pencil roving is too delicate to be handled much, so when proccessing fiber for handspinners the roving is taken off the machines earlier and wound into balls. 9. Wind and/or skeining When the wooden bobbins are full of yarn, they are placed on a cone winder and the yarn is transferred to paper cones for use in weaving and knitting machines. It could also be put into skeins of yarn which are the form that knitters like to use. 3776 Forshaug Rd, Mount Horeb WI 53572, 608-437-3762 Please direct comments or questions to: [email protected]
<urn:uuid:d194324e-e6f6-4fa8-9fb6-bb63af339050>
CC-MAIN-2018-05
http://blackberry-ridge.com/prosdscr.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891705.93/warc/CC-MAIN-20180123012644-20180123032644-00717.warc.gz
en
0.963488
690
3.015625
3
Posted 5 years ago Here are a few German made glass ornaments, made between 1900 and the 1920's. The glass is paper thin, and they are as light as a feather. Most likely these ornaments were made in the area of Lauscha, a 16th century town in the German state of Thuringia. Lauscha is consider the "birthplace of Christmas ornaments". The inside of the ornaments are given a coating of silver nitrate, while the outside is hand painted with various colors using a brush, or airbrush. Considering how fragile these ornaments are, it is a wonder they survived 100 years or more.
<urn:uuid:1282b68e-4751-4f13-9cd7-10612a8f03ce>
CC-MAIN-2017-09
http://www.collectorsweekly.com/stories/39801-early-1900s-christmas-ornaments?in=563
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00508-ip-10-171-10-108.ec2.internal.warc.gz
en
0.970327
137
2.890625
3
Programming for the Cloud means programming in a distributed environment. In this environment the flow of a program is parallel, asynchronous and has to react to external events. Developers need to make the sitch from the old sequential programming mind se to a distributed and asynchronous one, cloud computing is forcing this transformation. Writing, debugging and maintaining parallel and asynchronous code is very difficult. Like in the past, now with the new era, cloud computing, big data, mobility and distributed architectures have created new challenges for developers and it seems like the community is responding once again with an abundance of new languages. The common themes among the new emerging programming languages are: - parallel computing - multi-platform programming - multi paradigm programming(Object Oriented + Functional Programming) The ideal language for the Cloud age should be object oriented and embrace functional programming. FP is a practical implementation of the study behind a formal system called lambda calculus, designed in the academic world to resolve problems related to calculation. The system was based on functions that look other functions as parameters and returned functions as results. The benefits of functional programming languages can be summarized in one phrase: they allow writing code without "side effects", ideal for concurrent, high availability, critical and distributed systems. In functional languages, the basic unit of work is a function. Unlike imperative languages, variables are immutable in pure FP and their values cannot be changes after initialization. The FP function cannot ever cause side effects: a function cannot modify a value outside of its scope for another function to use. This means that the only effect of eveluating a function is its return value and the only thing that affects the return value of a function is its arguments. Benefits of FP: - Multi-threading: a functional program is ready for concurrency. There is no need to worry abour deadlocks and race conditions because data cannot be modified twice by the current thread or other threads. - Debugging: it is easier in FP because a bug doesn't depend on separate code. If a return value of a function is wrong, it is always wrong, what code was executed before running the function?! - Parallelism: two or more time-consuming functions can be run in parallel on a multi-CPU system because their return value is indipendent of modifications to the global state from other functions. Each function may modify the state of its scope. - Hot deployment: is easier if the application is written with FP. You can replace a component at runtime without worrying about losing state data associated with that component. - Lazy evaluation: the value are only computed when, and if, they are actually needed, instead of when they are passed to some function. All these characteristics are very powerful in the age of cloud computing. However, "pure" FP languages have not been very successful. In reality, many other languages are incorporating functional elements without strictly adhering to functional dogma. This approach of combining elements of Object Oriented and FP is called multi-pradigm programming. Examples of new programming languages are: - Dart (by Google) - GO (by Google) - OPA (similare to Node.JS) - Scala (general purpose programming language) Libraries and Frameworks: - Hadoop: can coordinate a number of machines working on a problem and compile their work into a single answer. This project imitates some of the Map/Reduce framework developed by Google. The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models. It is designed to scale up from single servers to thousands of machines, each offering local computation and storage.
<urn:uuid:cc40db75-7f18-41f7-876e-70c766cd213d>
CC-MAIN-2019-22
http://www.appuntivari.net/informatica/cloud/new-programming-languages
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262029.97/warc/CC-MAIN-20190527065651-20190527091651-00037.warc.gz
en
0.919095
760
3.328125
3
Students of SS. Peter & Paul School in Williamsville learn about the atrocities of Auschwitz in art class. They develop pride in their school in art class. They discover confidence in art class. They learn about art from Mary McIntyre. Principal Deborah Lester calls McIntyre an "art teacher extraordinaire" with good reason. McIntyre has a way of drawing her students into art and art from her students. In her nine years at the Williamsville school, she has developed an interdisciplinary way of teaching, thus putting art into the science-heavy STREAM curriculum. Projects have created visual representations of lessons taken from social studies and reading classes, as well as works derived from the masters Picasso and Matisse. Her efforts have been recognized by the diocesan Department of Catholic Schools, which will present her with the Sister Lucille Socciarelli/Father John Sturm Making A Difference Award at the annual Gala 22:6 dinner on Feb. 1. In the school hallways are visual displays of "Hana's Suitcase," the iconic item from the Karen Levine book about a young Czech girl killed in a concentration camp during World War II. Students took computer boxes glued on newspaper headlines, strips of cloth with the Star of David, and bed straw. The project wove the lessons from social studies with art. The students didn't just read about a person, they put themselves in her shoes, first by making, then carrying a suitcase just as she did. "I find that the more excitement you can create with an art foundation and showing respect for what they teach, to me it brings so much more to the table. It brings so much more to the kids," McIntyre said. Other projects brought language arts skills to the art world as students used onomonopeia to create 3-D displays of "Pow" and "Bam." The bulletin board now looks like something out of "Batman." McIntyre keeps up her own skills by taking part in the Burchfield Penney Art Teachers Program, the BISSNET STEAM Conference, the Milestones of Science Educator Preview presented by the Buffalo & Erie County Public Library, and the Albright-Knox Art Gallery's Art'scool "Inspired" contest. Her student artwork has been on display for the second time as a juried art show at the Buffalo & Erie County Botanical Gardens during the Christmas season last year. Her students' work has also been on display at Williamsville's Glen Park Art Festival for a number of years, as well as the Williamsville Village Hall and Barnes & Noble Bookstores. The school itself consists of hallway after hallway of gallery. Even the cafeteria ceiling tiles have been painted by students who expressed their favorite things, turning the ceiling into a quilt patch design. Graduates always look for their tile when they come back to visit. It gives them a sense of attachment to their school. For McIntyre, a former clothing designer from St. Catharines, Ontario, art gave her the same confidence she received from her sports prowess. She realizes not everyone is athletic or musical, but some might find drawing, painting or design to be their niche. Students learn that by working hard, they can improve in any subject. "I struggled in math," she laughed. "So, (art) helped me, because I knew I was good at something." When her students see their work hanging around the corner from Picassos at the Albright-Knox Art Gallery or selected by a jury to be hung at the Botanical Gardens, they take some pride in their accomplishments. Outside of the art world, McIntyre is the school's Thoughtful Ed coordinator. Thoughtful Ed teaches the philosophy of creative education, assist kids in Common Core, incorporate different learning styles at different academic levels. "Anytime anything needs to be done, she is the first one to volunteer to do it. She has taken our art program and just expanded it," said Lester, shortly after a field trip to the Albright-Knox. "She immerses them in art so much that they love everything they do when they get there. They understand what they're seeing. Then she gives them time to sketch in the art gallery. They come back and adapt the pictures in the classroom." McIntyre has created her own STREAM academy courses. Jean Comer, diocesan STREAM coordinator, uses McIntyre to teach it to other teachers. "Everything she does, she does big," said Lester.
<urn:uuid:4805a532-9437-40b8-ae90-512c4ad6fe64>
CC-MAIN-2019-35
https://www.wnycatholic.org/news/article/featured/2018/01/29/102928/williamsville-art-teacher-gives-confidence-receives-award
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027321140.82/warc/CC-MAIN-20190824130424-20190824152424-00312.warc.gz
en
0.969749
927
2.546875
3
HURRICANE ETA TO HAVE CATASTROPHIC IMPACTS IN CENTRAL AMERICA – THEN WE HAVE TO WATCH THE REMNANTS Stunningly strong Hurricane Eta is pounding the Caribbean coast of Nicaragua. A devastating impact on coastal communities is likely. Eta’s vicious winds will destroy all but the strongest structures, and the Caribbean water is forecast to rise 14 to 21 feet above normal tide levels at the Nicaraguan coast. Hurricane Eta is one of the strongest storms ever recorded in November – the strongest being a tremendously destructive Category 5 that hit central and eastern Cuba in 1932. That storm peaked in intensity in the Caribbean not far from where Eta was located yesterday. There is a lot of deep warm water in the central and western Caribbean, even in November. If the atmospheric environment is super-supportive, like it is now, there is nothing to limit the strength of hurricanes there. Eta’s top winds are weakening as it makes landfall, but it won’t change the outcome. By later today, Eta’s winds will be winding down significantly as the system tracks over Nicaragua and toward Honduras. Over the next few days, the center of the storm should be over the mountainous terrain, which will likely disrupt or destroy the circulation at ground level and the top winds will rapidly diminish. Once Eta is over the land, however, the extreme threat comes from torrential rain falling over the mountains. More rain will fall at higher elevations – 2 to 3 feet of rain is forecast – and that water has to come downhill. Gullies and creeks will become unsurvivable torrents. Rivers will swell, sweeping away structures along their banks. Thousands of people have died from this type of scenario in the past – 1998’s Hurricane Mitch and 1974’s Hurricane Fifi are both estimated to have killed 8,000 to 10,000 people or more in Honduras and Nicaragua. It’s a frightening situation. The strong winds over Florida are caused by the high contrast in pressure between the high-pressure system to the north, which pushed the cold front through the state, and the extreme low pressure of Hurricane Eta to the south. Breeziness will continue through the week, but it won't be quite as strong as Eta’s pressure rises as the storm weakens, and the high to the north moves away. By the end of the week, the remnants of Eta are forecast to move back over the Caribbean. Whether Eta’s circulation is part of those remnants, or whether it’s just a broad upper-level system that incorporates some of Eta’s spin, is an open question. If the National Hurricane Center can track the surface circulation through the mountains, and a new storm develops once it gets over the water, it will be called Eta once again. If, however, Eta’s circulation is ripped up by the high terrain, and a new circulation forms with winds eventually reaching 40 mph or higher, it will be called Tropical Storm Theta. Whatever the new system is named, assuming it organizes and strengthens, its eventual track is highly uncertain. A strong dip in the jet stream is forecast to move across the Gulf over the weekend. To what extent that will scoop up the new system – assuming it exists – and pull it north is unclear. The system’s location and strength will affect how ex-Eta and the dip interact. It’s also unclear whether the jet-stream dip will create a supportive or hostile environment for the system to strengthen. The consensus of the computer forecast models is that Eta/Theta, or whatever the system is at the time, will be in the vicinity of Cuba at some point over the weekend, and moving slowly. If this is approximately correct, tropical moisture will be spreading over South Florida, and substantial rain would be likely. For now, speculation is useless. There is a long history of hurricane becoming disheveled over mountains and never recovering. As we’ve learned during this relentless hurricane season, slow-moving systems that are in the organizational stages are impossible to forecast well. And in this case, we’re talking about developments a week from now. We have to see what happens late in the week after Eta, or whatever’s left of it, emerges or reforms over the Caribbean. Between now and then, the people of Nicaragua and Honduras are going to be impacted by another historic storm. It’s hard to imagine how a catastrophe can be averted with an extreme hurricane like Eta bearing down.
<urn:uuid:4f507165-2382-41d1-b15c-ef74a40cc7af>
CC-MAIN-2021-49
https://www.hurricaneintel.com/post/hurricane-eta-to-have-catastrophic-impacts-in-central-america-then-we-have-to-watch-the-remnants
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361169.72/warc/CC-MAIN-20211202054457-20211202084457-00236.warc.gz
en
0.945302
961
2.890625
3
Critical thinking in the math classroom The mathematical association of victoria (mav) in collaboration with the melbourne graduate school of education’s mathematics education group (meg) pr. Critical thinking and critical thinkers thoughts on promoting critical thinking: classroom assessment for critical thinking teaching of. Critical thinking questions for 6th grade //classroomsynonymcom/critical-thinking-questions critical thinking questions for 6th grade math last. The critical thinking company publishes several students in the classroom this book helped no only with math concepts but with mathematics critical thinking. 1 developing critical thinking skills in the abe classroom denise reddington nh bureau of adult education 2012 mini-grant. Despite the difficulties, many teachers are now promoting critical thinking in the classroom they are (1 the key to critical reading instruction. Elementary educators (k-3) we have created a k-3 teacher bundle to help you foster critical thinking in the classroom on a daily basis. According to the council for exceptional children, teachers can develop the basic critical thinking skills of analysis, synthesis, and evaluation in their students. The mathematics education into the 21st century project aspects of critical thinking in classroom instruction of critical thinking. Center for teaching thinking into standard content instruction with an emphasis on teaching and assessing the skills of critical and creative thinking. Critical thinking skills are necessary in the 21st century give as homework or use in the classroom critical thinking math skills. Mentoring minds helps k-12 administrators & teachers raise students why mentoring minds why critical thinking meet our team inside and outside the classroom. Work sheet library: critical thinking: grades 3-5 you can use with your students to build a wide variety of critical thinking the math problems to get the. This guide focuses on two important 21st century skills, critical thinking and problem solving, and how to teach them to students. The pursuit of higher-order thinking in the mathematics classroom: a review paul l goethals this review was completed and submitted in partial fulfillment of. The importance of teaching critical thinking and is a good starting point for ideas about inclusion of critical thinking skills in the classroom math. In teaching mathematics in schools, critical thinking listening to lectures in the classroom impact of critical thinking on performance in mathematics among. Find and save ideas about critical thinking activities on pinterest | see more ideas about thinking skills find this pin and more on classroom ideas: math by eym82. 2 the flipped classroom: its effect on student academic achievement, and critical thinking skills in high school mathematics by joranna marita saunders. Marian small on classroom discourse provoking student thinking in mathematics keywords: good math questions, role of questioning in mathematics. 10 great critical thinking activities that engage your students them engages the classroom in a way openly during critical thinking activities is the. Critical thinking in the math classroom Brain teasers for daily use in your classroom all the brain teasers and math puzzles are interactive with cyberchase - critical thinking games. - Inside classroom management: boosting creative thinking in math class by lana gundy july 9 i asked them to construct their own creative-thinking math questions. - Teaching strategies to promote critical thinking compare and contrast today’s math lesson with last how do you teach critical thinking in your classroom. - Mathematics: what why when and how why take the time to promote critical thinking in mathematics • deliberately nurture a classroom culture in which. Submit your own lesson plan for a chance to receive a free $50 classroom supplies gift card learn more. Critical thinking means being able to make an argument for your beliefs or opinions making predictions is a tool that is quite useful in the esl classroom. Questioning techniques to engage students in critical thinking if we use a picture to start a conversation about a classroom setting subscribe to tesol blog. This book teaches and develops the math concepts and critical thinking skills necessary for success in algebra this book can be used as a classroom textbook.
<urn:uuid:c8d47bb4-75b3-432c-adbf-2939c2d1e2a1>
CC-MAIN-2018-26
http://oncourseworkgmto.1hourloans.us/critical-thinking-in-the-math-classroom.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863463.3/warc/CC-MAIN-20180620050428-20180620070428-00056.warc.gz
en
0.913766
797
3.828125
4
"Infants do not need tutoring to acquire their native language; they pick it up subconsciously. What's more they do this with remarkably little linguistic data - what the Harvard University linguist Noam Chomsky has called the "poverty of stimulus" - suggesting that this subconscious learning allows youngsters to use information very efficiently." The nativist language acquisition argument from the "poverty of the stimulus" seems as though it may have been misconstrued. It is not a quantitative argument but a qualitative one. Miller and Chomsky claimed in 1963 that children's input included many grammatical errors and disfluencies. How were children to discover which input to attend to and which input to ignore? More recent arguments suggest that, errors aside, given the lack of negative evidence, it is hard to see how children could learn what is ungrammatical. We have evidence for children overapplying rules such as regular past tense endings. Given that, it would be logical to assume they would overapply other patterns such as the following: - She sent a letter to him. / she sent him a letter. - She explained the letter to him. / *She explained him the letter. Without evidence that this last construction is not possible, the 'poverty of the stimulus' argument goes, how are children to know that they merely have not yet heard it? The idea that children simply don't get enough input, however, is odd. Research suggests that average North American children get somewhere in the range of 26 million (plus or minus many million) words of input in their first four years of life. It's hard to see how this can be called "remarkably little linguistic data." Post a Comment
<urn:uuid:c41011b3-dbdc-4e81-90b4-73cb6b8820c6>
CC-MAIN-2023-23
https://english-jack.blogspot.com/2007/12/lack-of-data-vs-poverty-of-stimulus.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00250.warc.gz
en
0.966279
352
3.234375
3
Keeping a field notebook can help birders improve their birding skills, make their observations more valuable for themselves and for science, and provide a treasure trove that elicits powerful memories for decades, both for the birder and for posterity. There are almost as many styles of notebooks as there are birders. Four people at the Cornell Lab of Ornithology share samples from their own field notebooks on these pages: John Fitzpatrick, the Cornell Lab's director Chris Wood, co-leader of eBird Jessie Barry, audio curator in the Macaulay Library Pedro Fernandes, science illustration intern Also, see some tips for keeping a field notebook, at bottom. John Fitzpatrick, director of the Cornell Lab of Ornithology, described his first encounters with California Condors on the pages of his field notebook in August 1981 Chris Wood, co-leader of eBird, enters birds and details about time and place into his pocket-sized field notebook, adding notes to document interesting behaviors and describe plumages of new or unusual species. He uses abbreviations and shortcuts that may make his field notes hard for others to read, but as soon as possible he enters the data at www.eBird.org in a more usable format. He draws a slash through sections after putting the data into eBird. These pages are from Chris’s trip to Argentina in January 2010. Jessie Barry, assistant curator of audio in the Macaulay Library, uses her field notebook to sketch and record data. Her notes and sketches of this Common Ringed Plover at Port Susan Bay in Washington in September 2006 supplied useful documentation for this exceptional rarity. Pedro Fernandes, the Cornell Lab’s 2007 Bartels Science Illustration Intern, captures plumage details and behaviors in his field notebooks, along with habitat notes. Pedro took these notes on a canoe trip through some of the Rio Negro system in Brazil. Tips for Keeping a Field Notebook • Ring-binder notebooks work well to archive pages written in the field while conveniently holding pertinent maps, checklists, and photos. • Many birders and field ornithologists like pocket-sized notebooks for sketching and for writing quick details that can be transcribed and expanded into a larger notebook during travel time or at the end of the day. • Always keep your original notes after you transcribe them to eBird and/or a neater permanent notebook. • Pencils write well under dry or wet conditions and don’t fade over time. Some ornithologists prefer permanent ink to prevent altering data. • Waterproof paper enables you to take notes under rainy conditions, though it can be very expensive. • Start out each trip by writing in the date, time, place, and weather conditions. • Never use abbreviations for bird names unless they are ones you are extremely familiar with and are certain you will never forget. • When you head to each new location for the day, start a new list. Keep track of the starting time at each location. Try to add the ending time at each, keeping track of travel time separate from birding time. • Sketch interesting behaviors and plumages and unusual birds, and add notes to remind yourself of other details. • If you take digital photos, make a notation next to bird names as you photograph them. • Occasionally leaf through your old notebooks, both to conjure fond memories and to raise your sense of how you can improve your note-taking. Tally ho! A simple way to keep track of numbers Many birders keep track of large flocks by writing the number in a circle. But when you’re adding one or just a few individuals here and there, this is a simple way to keep track.
<urn:uuid:d15d58eb-dda5-4eb8-9f64-85020d6c0bc0>
CC-MAIN-2014-23
http://www.allaboutbirds.org/page.aspx?pid=1852
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889255.54/warc/CC-MAIN-20140722025809-00191-ip-10-33-131-23.ec2.internal.warc.gz
en
0.927149
774
2.75
3
Basics of Magnetism by Ron Kurtus (revised 29 January 2013) Magnetism is a force of attraction or repulsion that acts at a distance. It is due to a magnetic field, which is caused by moving electrically charged particles. It is also inherent in magnetic objects such as a magnet. A magnet is an object that exhibits a strong magnetic field and will attract materials like iron to it. Magnets have two poles, called the north (N) and south (S) poles. Two magnets will be attracted by their opposite poles, and each will repel the like pole of the other magnet. Magnetism has many uses in modern life. Questions you may have include: - What is a magnetic field? - What is a magnetic force? - What is the relationship between magnetism and electricity? This lesson will answer those questions. Useful tool: Units Conversion A magnetic field consists of imaginary lines of flux coming from moving or spinning electrically charged particles. Examples include the spin of a proton and the motion of electrons through a wire in an electric circuit. What a magnetic field actually consists of is somewhat of a mystery, but we do know it is a special property of space. Magnetic field or lines of flux of a moving charged particle Names of poles The lines of magnetic flux flow from one end of the object to the other. By convention, we call one end of a magnetic object the N or North-seeking pole and the other the S or South-seeking pole, as related to the Earth's North and South magnetic poles. The magnetic flux is defined as moving from N to S. Note: The Earth does not follow the magnetic configuration in the above illustration. Instead, the lines of flux are opposite from a moving charged particle. (See Confusion About the North Magnetic Pole for more information.) Although individual particles such as electrons can have magnetic fields, larger objects such as a piece of iron can also have a magnetic field, as a sum of the fields of its particles. If a larger object exhibits a sufficiently great magnetic field, it is called a magnet. (See Magnets for more information.) The magnetic field of an object can create a magnetic force on other objects with magnetic fields. That force is what we call magnetism. When a magnetic field is applied to a moving electric charge, such as a moving proton or the electrical current in a wire, the force on the charge is called a Lorentz force. (See Magnetism and the Lorentz Force for more information.) When two magnets or magnetic objects are close to each other, there is a force that attracts the poles together. Force attracts N to S Magnets also strongly attract ferromagnetic materials such as iron, nickel and cobalt. (See Magnetic Materials for more information.) When two magnetic objects have like poles facing each other, the magnetic force pushes them apart. Force pushes magnetic objects apart Magnets can also weakly repel diamagnetic materials. (See Magnetic Materials for more information.) Magnetic and electric fields The magnetic and electric fields are both similar and different. They are also inter-related. Electric charges and magnetism similar Just as the positive (+) and negative (−) electrical charges attract each other, the N and S poles of a magnet attract each other. In electricity like charges repel, and in magnetism like poles repel. Electric charges and magnetism different The magnetic field is a dipole field. That means that every magnet must have two poles. On the other hand, a positive (+) or negative (−) electrical charge can stand alone. Electrical charges are called monopoles, since they can exist without the opposite charge. Magnetism is a force that acts at a distance and is caused by a magnetic field. The magnetic force strongly attracts an opposite pole of another magnet and repels a like pole. The magnetic field is both similar and different than an electric field. Be valuable to others Resources and references Explanation of Magnetism - from NASA Questions and comments Do you have any questions, comments, or opinions on this subject? If so, send an email with your feedback. I will try to get back to you as soon as possible. Click on a button to bookmark or share this page through Twitter, Facebook, email, or other services: Students and researchers The Web address of this page is: Please include it as a link on your website or as a reference in your report, document, or thesis. Where are you now? Basics of Magnetism
<urn:uuid:7c96dae6-e8bc-4cb2-ae02-19efd574b206>
CC-MAIN-2017-04
http://school-for-champions.com/science/magnetism.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00341-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930261
955
4.375
4
Short 4th and 5th metacarpals Loading Stack - 0 images remaining Also called the metacarpal sign, shortening of the 4th and 5th metacarpals is present when a line drawn at a tangent to their heads intersects the 3rd metacarpal. The commonest causes areidiopathic, post-traumatic, Turner’s syndrome, pseudohypoparathyroidism, pseudopseudohypoparathyroidism and basal cell naevus syndrome. In this case an old fracture of the 5th metacarpal suggests the cause may be previous trauma. Image courtesy of Dr Donna D'Souza - 1. Dahnert W. Radiology Review Manual, 5th edition. Lippincott, Williams and Wilkins 2003 - 2. Weissleder R. et al Primer of Diagnostic Imaging, 3rd edition, Mosby 2003
<urn:uuid:8a152c79-98ba-49d4-8946-1712d975e684>
CC-MAIN-2018-43
https://radiopaedia.org/cases/short-4th-and-5th-metacarpals
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510893.26/warc/CC-MAIN-20181016221847-20181017003347-00181.warc.gz
en
0.790907
198
2.640625
3
More women are realizing that strength training can provide numerous positive systemic benefits. These include everything from better metabolism and improved hormonal regulation to increased bone density and just plain being stronger. As the ways in which strength training benefits women becomes more widely known, the facts behind them also come to light. Statistically, women tend to put more emphasis on cardio, high-intensity interval training, stretching, and abdominal training than strength training. In fact, the National Center for Health Statistics shows that as few as one in five women include strength training in their weekly workout routines. Surely this percentage would be higher if more women understood its benefits in terms reaching and maintaining a healthy weight without dieting. Engaging in strength training twice a week can reduce overall body fat by as much as three percent in as little as ten weeks for women without a diet change. This is because strength training reduces body fat and burns calories more efficiently. Muscle built during strength training also reduces a woman’s risk of injury by improving her balance and coordination. Hormonal changes as women age often lead to decreased bone density, which also increases their risk of developing osteoporosis, a condition in which bones become brittle and fragile due to a loss of tissue. That decrease in bone density puts women at risk of injury should they fall. The inclusion of regular strength training helps to slow that deterioration, so that bones maintain their strength longer. It may come as a surprise to many that women generally have better stamina when it comes to maintaining at higher intensities. This often manifests itself in women needing fewer intra-set rest times than men. Although women carry less muscle mass than men, they produce the same amount of force per unit of area. Compared to men, most women have better hip, t-spine, shoulder, and pelvic mobility. One of the biggest misconceptions about women in strength training is the concept of getting too bulky. The reality is that the majority of women will never appear “too muscular” regardless of their level of strength training. The area where women generally could gain too much mass is in their quadriceps via intensive squats and lunges. Additionally, some women can see more development in their back through progressive overload with deadlifts, but reaching that level requires pretty intensive and progressive weights. Some women can get too muscular for their preferences in the upper body and should simply utilize variety rather than progressive overload for upper body lifts. It is also possible for women to develop abdominals that appear too blocky for their personal preference by overdoing core training. With todays increased desire for a more pronounced backside, strength training can only do so much. In fact, women need not worry about overdevelopment in their gluteus maximus musculature no matter how much resistance training they perform. There is little doubt that women enjoy being physically strong. By making strength training a part of their regular workout routine, women can enjoy numerous benefits that can positively affect all aspects of their lives.
<urn:uuid:7bbb3bc5-d6a9-4e08-bb2d-b6edc3c20b56>
CC-MAIN-2018-51
https://nationalpti.edu/important-strength-training-facts-women/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823738.9/warc/CC-MAIN-20181212044022-20181212065522-00557.warc.gz
en
0.971509
604
2.5625
3
A new study has found that bath toys, like the iconic yellow rubber ducky, are probably full of bacteria. The study, published in the journal NPJ Biofilms and Microbiomes, found that the slimy substance inside of bath toys are riddled with bacteria, like Agrobacterium, Bradyhizobium, Sphingomonas and Caulobacter. Pseudomonas was also found, which can cause ear and eye infections in humans. Researchers tested 19 different toys as part of the study and concluded that the combination of plastic toys and dirty bath water creates a breeding ground for bacteria. The researchers compared the bath toys from five Swiss households against a control group. The bath toys had up to 75 million bacterial cells per square centimeter of interior surface. Markus Egert, microbiologist at Furtwangen University in Germany, told the Independent that the bacteria level is “the same density of bacteria you can find in human stool samples.” Lead researcher Frederik Hammes said the main problem is the components that make up the plastic used in bath toys. “All these soft plastic materials have softeners called plasticizers in them to make them flexible,” said Hammes. The plasticizers migrate out of the toy and into the water, where bacteria feed on them. Microbes and bacteria also like the warm water in the bath, which is full of phosphates and nitrogen supplied by human body fluids and soap. Hammes noted how children love to squirt their faces with bath toy water. One on hand, the bacteria may strengthen the child’s immune system, he said. On the other hand, it could cause ear, eye or gastrointestinal infections. While the results of the study are alarming, Hammes says there is no reason to panic. Humans are exposed to bacteria and microbes every day. Regular cleaning with hot water and soap can help prevent bacteria growth, Hammes says. Other experts recommend boiling the toys after each use, but surviving bacteria tends to be stronger and potentially more harmful. Hammes also suggests that while they are less fun, bath toys without holes are cleaner. Hammes also suggests implementing tighter regulations on polymeric materials that are used to make plastic bath toys. He also says further research is needed on the potential risks of biofilms and the contaminants that collect inside of toys. “To assess the real extent of this risk, more experimental work with specific focus on hygienic aspects is needed,” he said. Bathrooms in general are covered with germs, but only about one to two percent of all germs are harmful. The bathtub is the one of the dirtiest places in the entire home. In fact, tubs have more than 1,000 bacteria per square inch, according to Today. The bathtub material makes no difference either. Porcelain, cast iron and lucite bathtubs are vulnerable to bacteria growth. Streptococcus, E. coli and staph are commonly found in bathtubs, as they thrive in wet, warm bathtubs. Part of the problem is that bathtubs don’t dry entirely. So before you hop in the tub for a relaxing bath, be sure to clean the bathtub entirely to kill as much bacteria as possible.
<urn:uuid:c457f300-aff0-4886-a4c0-94c8846fbdd2>
CC-MAIN-2019-30
https://axcessnews.com/national/health/rubber-bath-ducky-probably-full-bacteria-study-finds_5166/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525974.74/warc/CC-MAIN-20190719032721-20190719054721-00086.warc.gz
en
0.955642
688
3.09375
3
A little late, but below are my notes from the Integrated Education Program (IEP) Conference in Pretoria (6-7 February 2008). The Integrated Education Program (2004-08) aimed to improve the quality of primary education by supporting programmes in teacher education, as well as school management and governance, in selected districts in the Eastern Cape, KwaZulu-Natal, Limpopo and the Northern Cape. The program was funded by USAID (approx. R155m) and implemented in partnership with the South African Department of Education. Overall goal: to improve learner performance in literacy and numeracy (in gr 3), and mathematics and science (in gr 6) in participating schools (the poorest of the poor in SA). As a result of the program the average improvement in learner performance was 5%. This shows just how difficult it is to raise the average grade. The director general in the Department of Education, Duncan Hindle, said that we need to: - Shift resources from the FET to GET phases, especially Foundation Phase. - Raise expectations amongst parents and society at large of the high levels of teaching that they should expect for their children, of what the service levels should be. He visited a school where at 11am on a Friday all of the teachers had left for the weekend. When he asked the parents if they were concerned about this, they didn’t realise that this was not normal practice. General comments from speakers and the audience: - A culture of assessment has not taken root amongst teachers. Not enough regular assessments, e.g. testing, and recording of results. - Language of instruction (LOI): Despite the language policy, there is confusion in the some schools as to whether they should teach in the local language or in English. Some of the schools said that the LOI for gr 3 was isiXhosa, but when the learners were given survey instruments in isiXhosa they could barely understand the documents. The learners managed to answer the English instruments. There is a need to clarify the implementation of the LOI policy. - Teachers have to be held accountable for performance. At the same time, they must be given solid training and support materials. - It is crucial to develop literacy skills in the Foundation Phase for cognitive development. This requires reading and extended or complex writing, which is more than a paragraph, ideally a page of writing. Statistical analysis in SA Education Dr Luis Crouch. See How to stem the Matthew Effect in education. Additional notes below. Suggestion for improving education in SA: - Make schools divulge their results. Universal external assessment might help. - Ensure that schools understand what their expected grade achievement is. - Popularise good teachers: those that arrive on time, that cover the curriculum, etc. - He gave an example of a school in the EC where the teachers vote democratically on what they’ll teach that week. Can’t run a school system like that. Mid-90s, almost no public statistical analysis by Apartheid government. Since then, explosion of stats, but how much have we learned? Further, most academics, NGOs and education departments are slow to take up and act on the sound research findings that have been produced in post-94 SA, . Learner drop-out is something to consider. But a much bigger problem is whether those in school are actually learning anything. The average child in SA learns less than 97% of European kids. Effect of socioeconomic status (SES): Within the group of low parental wealth there is a big discrepency in reading scores. The poor get highly variable levels of education. To run a good school, need: - Principal who is pedagogical leader and good manager. - Teachers that follow curriculum. - Learners that are disciplined. IEP learner achievement results Ms. Carla Pereira, JET Education Services Gr 3: Literacy Overall improvement in project schools over control groups (using very basic descriptive statistics), though not a huge improvement. Gr 6: Science Sometimes in project schools and control schools the grades actually dropped over the course of the studies. Performance by skills She confirmed that literacy intervention has an impact on mathematics and science skills that have narrative components. If a learner can’t read, he/she can’t understand maths and science concepts that require reading. IEP impact study Eric Schollar provided a qualitative review of the impact of the IEP and also lessons learned about the actual implementation of the program, which are relevant to any large-scale educational intervention. (Gain refers to the difference between the control and project groups for the pre-, mid- and post-tests.) The percentages given below represent the gain made by the one group relative to the other, not the actual test results. The summary of the IEP impact is as follows (in terms of gain): - Literacy (gr 3): +4% - Numeracy (gr 3): +11.3% - Mathematics (gr 6): -0.1% - Natural Sciences (gr 6): +2.7% Gain for gr 6 is not significant, but is very strongly concentrated at gr 3 level. Overall, the average gain (gr 3 & 6) is +4.5%. Schools in KZN made the most impressive gains. Distribution of impact Of the test groups (127 schools), the distribution of impact (i.e. greater than 4%) of the IEP was as follows: - Positive impact: 45.7% - No impact: 26.8% - Negative impact: 27.6% So for a program such as IEP, which cost R155m, more than half of participating schools were either unchanged or left in a worse position by the program. It is hard to understand how this happens, but apparently this distribution is about average for large-scale educational interventions. The reason is that some schools are so dysfunctional that more resources provided (e.g. through the IEP) make no positive difference whatsoever. External organisations simply cannot impose managerial authority on those schools. Basically, only the school can save itself! Analysis of the impact Schools that made the highest mean gains did so as follows: - Literacy: +35% - Numeracy: +24% - Mathematics: +12% - Natural Sciences: +18% In other words, in some schools the project group improved the literacy scores by 35% relative to the control group. Schools with the lowest mean gains: - Literacy: -18% - Numeracy: -9% - Mathematics: -10% - Natural Sciences: -25% Why was impact concentrated in KZN? Only in KZN were all scores increased at post-test. Why? The following reasons were offered, all of which are relevant to any educational intervention: - In KZN the learner workbooks were supplied to all schools. Assessment resource banks (ARB) were provided in all participating provinces but in KZN they were accompanied by common assessments (supported by the DoE). - In KZN information from the external evaluation was regularly supplied and performance targets set for schools. - In KZN detailed monitoring instruments were used. The overall insights and lessons learned for educational interventions are as follows: - Teachers are very strongly in favour of the classroom-level support they have enjoyed through the IEP. Many of them are still uncertain of the practical application of the planning and methodological principles of the OBE curriculum in classrooms. Independent service provider (ISP) field workers are popular partly because they can demonstrate these aspects in real situations. (This insight dispels the commonly held notion that teachers don’t want outsiders coming into their classrooms and helping them to do their jobs.) - Mr Schollar felt that one of the main causes of learner performance improvements is the provision of a syllabus supported by learner workbooks, together with common assessment tools. - Systemic, rather than localised, assessment is vital for the SA educational system. Mr Schollar believes that one of the most important steps taken by the DoE since 1994 is to begin to implement across-the-board assessments. In some instances, local assessments pass learners to the next grade while those same learners fail national assessments. - Because many teachers are “confused about OBE”, IEP training in this regard is one of the most highly valued elements of the program. Quality of outcome was mainly due to the materials supporting classroom teaching. - Teachers very strongly favour the provision of project materials that provide guidance to classroom planning, activity and assessment. Mr Firoz Patel, Deputy Director-General, DoE, who presented later, even proposed that the support materials provide minute-by-minute guidance on how to implement the NCS in the context of the OBE philosophy. Dr Nick Taylor, CEO, Jet Education Services - Teachers perceive OBE to be something completely different to their previous understanding of teaching. So they feel that they can’t teach OBE until they’ve been trained and developed to do so. But OBE is not something magical. They are still meant to be imparting knowledge. Need to move beyond dependency culture on training. - Secondly, need to follow text books It’s all in there, just follow the book. - Because of poor teachers, learners are being socialised into a mentality of low expectations, low grades and low performance. The learners don’t know that they should be pushing themselves harder, that they can achieve more.
<urn:uuid:f29b03bc-c3d7-4534-ab40-3af94424ba8e>
CC-MAIN-2023-06
https://stevevosloo.com/2008/03/04/notes-from-the-integrated-education-program-iep-conference/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00228.warc.gz
en
0.957192
2,025
2.734375
3
Warren Subbasin Artificial Recharge The Hi Desert Water District (HDWD) implemented an artificial ground-water recharge program in early 1995 to reverse the decline of ground-water levels in the 19 square mile Warren subbasin of the Morongo ground-water basin (~100 miles east of Los Angeles, California). Ground-water levels declined as much as 300 feet from 1940 to1994, owing to increased pumping. The artificial ground-water recharge program introduced imported surface water to recharge ponds to replenish ground water in the underlying aquifer and, in response, water levels recovered as much as 250 feet in the vicinity of the recharge ponds. However, since the implementation of the artificial-recharge program, ground-water nitrate concentrations have shown a marked increase from 10 milligrams per liter to more than 110 milligrams per liter. Prior to the water-level rise, nitrate concentrations were near background levels, indicating that the nitrates had not reached the water table or that denitrification was occurring in the unsaturated zone. The increase in nitrate concentrations in Warren subbasin ground waters is attributed to the entrainment of septage by rising water levels. The objectives of this study are to: (1) identify the vertical distribution of nitrogen species in the unsaturated zone within the west hydrogeologic unit (2) determine the potential for denitrification in the unsaturated zone; (3) provide a means of monitoring artificial recharge; and (4) develop water-management strategies that control water levels and nitrate concentrations. This study consists of three principle tasks: (1) characterize the hydraulic, chemical, and microbiological properties of the unsaturated zone; (2) monitor changes in water levels and water quality in response to the artificial-recharge program; and (3) use a ground-water flow and solute-transport model previously developed by the USGS to allow HDWD to manage their water-resource facilities. Project Chief: Tracy Nishikawa
<urn:uuid:e53d23d2-ea50-4d61-99a3-978643b7a18a>
CC-MAIN-2015-32
http://ca.water.usgs.gov/projects/warren.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981753.21/warc/CC-MAIN-20150728002301-00310-ip-10-236-191-2.ec2.internal.warc.gz
en
0.925513
405
3.046875
3
Classification of Radioactive Waste The classification of radioactive waste plays a crucial role in how it is finally stored. Radioactive waste may be solid, liquid or gaseous and is classified according to its activity and half-life. It may be low-, intermediate- or high-level radioactive waste (LLW, ILW or HLW respectively) and short- or long-lived waste. Low- and intermediate-level waste (LLW, ILW) in Austria mainly results from medicine, industry and research as well as from the decommissioning of old facilities. This waste primarily includes radionuclides with half-lives that do not exceed 30 years (for example cesium-137 or strontium-90). Low- and intermediate-level waste may also contain a limited amount of long-lived radionuclides. This type of waste does not give off warmth and is usually stored in near-surface final repositories or repository mines (final repository for low- and intermediate-level radioactive waste). Besides low- and intermediate-level radioactive waste medicine mostly produces very short-lived wastes. The half-life of the radionuclides contained in this type of waste is less than 100 days. This waste is stored until the radioactivity decays to a level where it can be cleared and released from regulatory control. It can then be disposed of in a regular landfill and does not need to be stored in a final repository. High-level radioactive waste (HLW) and spent fuel elements arise from nuclear power plants and nuclear research reactors. These types of radioactive waste generate heat, thus, the general consensus is that they must be stored in deep geological repositories. This guarantees a safe enclosure for several hundreds of millennia. As Austria does not operate any nuclear power plants and the spent fuel elements of Vienna University of Technology’s research reactor will be sent back to their supplier (US Department of Energy) according to contract, no high-level radioactive waste or spent fuel elements will need to be stored in a final repository in Austria.
<urn:uuid:8530622c-15c8-4b9c-ae48-f473fb1444bc>
CC-MAIN-2022-40
https://www.entsorgungsbeirat.gv.at/en/themen/hintergrund/classification-of-radioactive-waste
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337531.3/warc/CC-MAIN-20221005011205-20221005041205-00390.warc.gz
en
0.912679
417
3.796875
4
In addition, proponents and land managers should refer to the Recovery Plan (where available) or the Conservation Advice (where available) for recovery, mitigation and conservation information. |EPBC Act Listing Status||Listed as Extinct as Argyreia soutteri| |Adopted/Made Recovery Plans| Federal Register of Declaration under s178, s181, and s183 of the Environment Protection and Biodiversity Conservation Act 1999 - List of threatened species, List of threatened ecological communities and List of threatening processes (Commonwealth of Australia, 2000) [Legislative Instrument] as Argyreia soutteri. |State Listing Status|| |Scientific name||Argyreia soutteri | |Species author||(Bailey) Domin| |Reference||Beiträge zur Flora und Pflanzengeographie Australiens (Sep. 1928) 1087, in obs. [= Bibliotheca Botanica Heft 89 (Sep. 1928) 533].| |Other names||Lettsomia soutteri | |Distribution map||Species Distribution Map not available for this taxon.| Scientific name: Argyreia soutteri Argyreia soutteri was a climbing plant with a silvery-white stem. The appearance of the leaves varied on individual plants and were either oblong to lance-shaped and approximately 5 cm long, or oval to heart-shaped and exceeding 15 cm in length. The leaves generally tapered to a sharp point. The upper surface of the leaf was smooth and green and the lower surface silvery white. The primary veins were prominent on both sides. There were 7 to 9 pairs of leaves. The leaf-stalks were 2.55 cm long and grooved. The stalk of the flower-head was 2.55 cm long, and bore a few white-coloured flowers. The oval-shaped sepals were approximately 2.5 cm long, smooth on the inner surface and silky on the outer. The petals were about 2.5 cm long. The stamens were short and hairy at the base (Bailey 1890). Argyreia soutteri was found at the Johnstone River, North Queensland (Bailey 1890). The following table lists known and perceived threats to this species. Threats are based on the International Union for Conservation of Nature and Natural Resources (IUCN) threat classification version 1.1. |Threat Class||Threatening Species||References| |Uncategorised:Uncategorised:threats not specified||Argyreia soutteri in Species Profile and Threats (SPRAT) database (Department of the Environment and Heritage, 2006bg) [Internet].| Bailey, F.M. (1890). A synopsis of the Queensland flora. Supplement. 3:130. This database is designed to provide statutory, biological and ecological information on species and ecological communities, migratory species, marine species, and species and species products subject to international trade and commercial use protected under the Environment Protection and Biodiversity Conservation Act 1999 (the EPBC Act). It has been compiled from a range of sources including listing advice, recovery plans, published literature and individual experts. While reasonable efforts have been made to ensure the accuracy of the information, no guarantee is given, nor responsibility taken, by the Commonwealth for its accuracy, currency or completeness. The Commonwealth does not accept any responsibility for any loss or damage that may be occasioned directly or indirectly through the use of, or reliance on, the information contained in this database. The information contained in this database does not necessarily represent the views of the Commonwealth. This database is not intended to be a complete source of information on the matters it deals with. Individuals and organisations should consider all the available information, including that available from other sources, in deciding whether there is a need to make a referral or apply for a permit or exemption under the EPBC Act. Citation: Department of the Environment (2014). Argyreia soutteri in Species Profile and Threats Database, Department of the Environment, Canberra. Available from: http://www.environment.gov.au/sprat. Accessed Wed, 16 Apr 2014 19:46:37 +1000.
<urn:uuid:5351343c-ad93-4785-aad9-0e4286969297>
CC-MAIN-2014-15
http://environment.gov.au/cgi-bin/sprat/public/publicspecies.pl?taxon_id=17185
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00011-ip-10-147-4-33.ec2.internal.warc.gz
en
0.881147
907
2.703125
3
Thanks to John Feeney for alerting me to this important article. If you find this interesting, a second article on the same topic can be accessed here: http://www.imachordata.com/?p=1217 Impacts of biodiversity loss rival those of climate change and pollution Current estimates suggest we are now, or soon will be, in the grip of earth’s sixth mass extinction of species. This is of course a tragedy in many ways-but will it really affect us in any substantial way? With the thundering hooves of all the other apocalyptic horsemen bearing down on us-global warming heating, hypoxic dead zones, overfishing, ocean acidification-can we afford to worry about declining biodiversity? Is this really that big a deal? Yes. In fact we can’t afford not to worry about biodiversity. That is the message from our new analysis, published online today in Nature. For the first time we’ve been able to compare-directly, quantitatively, and rigorously-the impacts of losing wild species to the effects of all the other human-caused environmental changes on the productivity and functioning of ecosystems and their ability to continue providing for us. The time is ripe because two decades of research have now shown pretty conclusively that more biologically diverse ecosystems are generally more productive, as John previously highlighted here. And that means that ongoing extinctions of species caused by habitat loss, overharvesting, and a slew of other environmental changes might well stuff up nature’s ability to provide things we need and want. Like food, clean water, and a stable climate. But so far it’s been unclear how such biodiversity losses stack up against other big environmental changes. Now we can answer that question with some confidence. To read the full article, click here: http://theseamonster.net/2012/05/impacts-of-biodiversity-loss-rival-those-of-climate-change-and-pollution/ Current World Population Net Growth During Your Visit
<urn:uuid:2cebb327-3e68-4d85-be19-d71b0af7104b>
CC-MAIN-2021-04
https://www.populationmedia.org/2012/05/04/impacts-of-biodiversity-loss-rival-those-of-climate-change-and-pollution/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703521139.30/warc/CC-MAIN-20210120151257-20210120181257-00249.warc.gz
en
0.885661
429
2.90625
3
“He Iti Marangai, Tu ana te pahukahuka, He iti pioke, no Rangaunu, He au tona” “Small although the pioke (dogfish shark) may be, Great is its wake, as it traverses the might of the Rangaunu harbour” Paparore School is about 15km north of Kaitaia in the Far North. It has a lot of history. The school was first sited near Te Paa A Parore Marae. It then moved between Paparore and Waimanoni settlements so the Waimanoni students didn’t have to travel so far to get to school. The school was moved to its third and current site because the second site was next to the airfield and during WW2 it became too dangerous with all the bomb carrying aircraft next door. Around all three of the school sites there used to be gumfields. The gumdiggers built their huts near the gumfields so the gumdiggers wouldn’t have to travel far to work everyday. The gum in those days was like new gold. On the schools poupou there are three gum nuggets. These represent the three sites of Paparore School. Read about our school poupou on the living heritage site. We have 7 classes and they are represented by parts of a tree: Te Kakano (Year 0-1) which means the seed, Te Pihi (Year 1-2) means the seedling, Te Putake (Year 2-3) means the roots, Te Tinana (Year 3-4) is the trunk of the tree. Te Manga (Years 3-5) means the branches of the tree, Te Puawai (Year 5) means the blossoms and finally, Te Kauru (Years 5&6), the crown of the tree.
<urn:uuid:6ae95ee2-7d04-4100-bc22-fdb29ba27e2d>
CC-MAIN-2019-13
https://www.paparore.school.nz/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203438.69/warc/CC-MAIN-20190324103739-20190324125739-00062.warc.gz
en
0.97247
397
2.609375
3
In 1207 William Marshal, now Earl of Pembroke, and his Countess Isabel could at last turn their attention to the needs of the province of Leinster. A town was planned on the River Barrow, which would fulfil their ambition to open the province up to new avenues of trade at an international level. The illustrious William was in a position to acquire the services of ship-builders, merchants and bankers to develop the various aspects of the port to European standards, and they swiftly ensured that the natural advantages of the area of Ros Mic Treon on the mighty river were fully exploited. Arterial waterways, the Nore and the Suir, fed into the Barrow estuary allowing water traffic to stretch from the midlands to the sea. Bankers from prominent Italian companies set up financial centres, offering loans, facilitating exports and investing in futures, the latter largely in wool-clips. Wool was the most important single export from the hinterland of Ros. In the centre of the panel, three bankers – a Frescobaldi, a Spini and a Riccardi, preside over the port’s financial affairs.
<urn:uuid:b9579dd4-ff66-4f65-99d9-1eb92659c51b>
CC-MAIN-2019-13
http://rostapestrylovers.com/gallery/item/5-the-thriving-port-of-ros
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202526.24/warc/CC-MAIN-20190321152638-20190321174638-00287.warc.gz
en
0.961199
235
3.125
3
Approximately 18 months after two sons vanished during the Battle of Cedar Creek in the Shenandoah Valley, William H. Rogers of Quitman in Brooks County in Georgia received a letter from Maine. The letter was from a Yankee lieutenant, Lagrange Severance, not someone upon whom Rogers could look favorably. After reading the letter, Rogers may have felt differently. Brooks County lay in southern Georgia, just west of Valdosta and hard up against the Florida-Georgia state line. Not directly touched by Union invaders during the war, the rural county had sent men to fight elsewhere. Two of Rogers’ sons, Mitchell A. and Uriah J., had enlisted as privates in Co. I (Piscola Volunteers), 26th Georgia Infantry Regiment, on July 23, 1861. Mitchell had been promoted to corporal in May 1862 and third sergeant on Oct. 1, 1864. Uriah was elected the Co. I captain in January 1864. The last their father knew, the 26th Georgia Infantry was tramping somewhere through Virginia. So were the 12th Maine Infantry Regiment and Lt. Lagrange Severance. Born in December 1839, Severance had left school at age 14 to work at the Daily Whig & Courier, the Republican-leaning daily that dominated Bangor-based journalism. He joined the 12th Maine Infantry in November 1861 as a private in Co. H; the regiment wound up assigned to duty in the Mississippi Valley, and Severance saw action at Irish Bend and Port Hudson, among other battles. With the Mississippi River firmly in Union hands, the 12th Maine later shipped to Virginia and joined the Phil Sheridan-led army assigned to sweeping the Shenandoah Valley of all Confederate resistance. A Sheridan-applied whuppin’ at Winchester on Sept. 19, 1864 supposedly broke the back and spirit of the Confederate Army of the Valley, commanded by Jubal Early. Sheridan evidently believed that advancing up the Valley would be a cakewalk afterwards. Early disagreed. The 12th Maine and the 14th Maine Infantry (also sent to Virginia from the Deep South) belonged to the 1st Brigade led by Brig. Gen. Henry Warner Birge, who reported to Brig. Gen. Cuvier Grover, the commander of the 2nd Division, XIX Army Corps. Tuesday, Oct. 18 found that corps camped north of meandering Cedar Creek, around 20 miles south of Winchester. That evening, Birge received orders from Grover “to be in readiness to move at 5.30 the next morning” to make “a reconnaissance toward Strasburg,” farther up the Valley.* Commanded by 1st Lt. Eben D. Haley, the 1st Maine Battery “hitched up at 5 a.m.,” Wednesday, Oct. 19, according to Birge. All four brigades of the 2nd Division turned out “in light marching order” that morning and formed two lines extending from east to west and facing south. The left flanks of both lines were “reaching almost to the [Valley] pike,” Birge noted. Haley and his six cannons and approximately 100 gunners of the 1st Maine Battery “occupied commanding ground,” and “the whole position [of the 2nd Division] was very strong against attacks from the front, and had been strengthened by earth-works thrown up along the front of the first line, the general direction of which was parallel to Cedar Creek.” But there was a major problem, as Lagrange Severance and the 12th Maine boys would soon discover. The XIII Corps held “the high ground” east of the Valley Pike; this terrain “entirely commanded” the ground occupied by the 2nd Division, Birge noticed. Rather than roll over and play dead as Phil Sheridan had imagined, Jubal Early came calling that foggy morning. Launching a successful surprise attack, his Confederate divisions struck the XIII Corps hard. With Early came the 26th Georgia Infantry and the Rogers’ brothers, assigned to Evans’ Brigade (led by Brig. Gen. Clement Evans) of the division commanded by Maj. Gen. John B. Gordon. According to Birge, “musketry firing was heard” to the east “about 5.15 a.m. and before any of the troops had moved out on the projected reconnaissance.” The shooting spread west to “our own picket-line in front.” Grover deployed his brigades to meet the perceived Confederate attack, confirmed as all out when “the firing in the direction” of XIII Corps “became very heavy and incessant,” Birge said. The 2nd Division pickets scrambled north across Cedar Creek, and “as day dawned the enemy appeared in strong force on the high ground on the left of position.” Birge recalled that the Confederate lines extended “from the creek to our left [flank] and rear as far as could be seen through the smoke and prevailing fog.” The Confederate troops piled into the left flank of the 2nd Division, where the Union boys “made a stubborn resistance” and “a hand-to-hand conflict ensued” involving at least New York regiments. As enemy artillery enfiladed Cuvier’s division, “our line was forced back, retiring in good order” while leaving bodies on the ground and prisoners in Confederate hands, according to Birge. The 1st Maine Battery gunners fought desperately; Confederates shot and wounded Haley and killed multiple horses, forcing the gunners to abandon one cannon and three caissons while withdrawing. The 1st Brigade pulled uphill and formed a line perpendicular to the line held only minutes earlier. “Making a short stand here,” the brigade and the 12th Maine then withdrew to another hill, made “a short stand here,” and pulled back once more and “made a stand in an open field,” Birge later reported. Lagrange Severance and the 12th Maine lads participated in that fighting retreat, with the entire 2nd Division “making stands at three different points” until mid-morning, according to Birge. Meanwhile, Capt. Uriah Rogers and Co. I, 26th Georgia Infantry, had fought hard as the clock ticked toward 11 a.m. As the fortunes of war shifted sometime during the next several hours, Uriah and Mitchell would fall on this body- and debris-strewn battlefield. Not for 1½ years would their father, William Rogers, learn what happened to them. *Directions in the Shenandoah Valley are based on the Shenandoah River, which flows from southwest (upriver) to northeast (downriver). From Birge’s vantage point, Strasburg was upriver or “up” the Valley. Next week: Lagrange Severance of Maine keeps a promise made to a dying Georgia soldier. If you enjoy reading the adventures of Mainers caught up in the Civil War, be sure to like Maine at War on Facebook and get a copy of the new Maine at War Volume 1: Bladensburg to Sharpsburg, available online at Amazon and all major book retailers, including Books-A-Million and Barnes & Noble. Sources: Report of Brig. Gen. H.W. Birge, No. 89, Official Records, Series 1, Vol. 43, Part 1, pp. 322-323; Roster of the Confederate soldiers of Georgia 1861-1865, Volume 3, p. 323; Lagrange Severance letter to William H. Rogers, Aug. 1, 1866, generously provided by Robert L. Bartlett of Columbia, S.C. Brian Swartz can be reached at [email protected]. He loves hearing from Civil War buffs interested in Maine’s involvement in the war.
<urn:uuid:a6919458-defe-4b48-8316-4e549ff0075c>
CC-MAIN-2020-29
http://maineatwar.bangordailynews.com/2016/10/19/a-bangor-lieutenant-discovers-the-fate-of-two-georgia-brothers-part-i/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657145436.64/warc/CC-MAIN-20200713131310-20200713161310-00038.warc.gz
en
0.962094
1,668
2.96875
3
In this week's roundup, the latest scientific research on the coronavirus and efforts to find treatments and vaccines suggest that the omicron variant of COVID-19 cannot escape the body's second-line defense, booster shots reduce the risk of omicron's transmission in households and breakthrough infections in cancer patients often become severe. A key part of the immune system's second-line defense – its T cells – are highly effective at recognizing and attacking the omicron variant, thereby preventing most infections from progressing to critical illness, a new study shows. Omicron's mutations help it escape from antibodies, the body's first line of defense against infection. Researchers have speculated that other components of the immune response would still target omicron, but there has been no proof until now. In test tube experiments, researchers in South Africa exposed copies of the virus to T cells from volunteers who had received vaccines from Johnson & Johnson or Pfizer/BioNTech or who had not been vaccinated but had developed their own T cells after infection with an earlier version of the coronavirus. "Despite omicron's extensive mutations and reduced susceptibility to neutralizing antibodies, the majority of T cell response, induced by vaccination or natural infection, cross-recognizes the variant," the researchers reported on Tuesday on medRxiv ahead of peer review. "Well-preserved T cell immunity to omicron is likely to contribute to protection from severe COVID-19," which supports what South African doctors had initially suspected when most patients with omicron infections did not become seriously ill, they said. The "T" stands for thymus, the organ in which the cells' final stage of development occurs. The odds that vaccinated people will catch the virus if a household member becomes infected are nearly three to four times higher with omicron than with delta, but booster doses reduce that risk, new findings suggest. Researchers analyzed transmission data collected from nearly 12,000 infected households in Denmark, including 2,225 households with an omicron infection. Overall, there were 6,397 secondary infections in the week after the first infection in the house. After accounting for other risk factors, the rate of person-to-person spread of the virus to fully vaccinated people was roughly 2.6 times higher in omicron households than in delta households, the researchers reported on Monday on medRxiv ahead of peer review. Booster-vaccinated people were nearly 3.7 times more likely to get infected in the omicron households than in the delta households, they found. Looking only at omicron households, however, booster-vaccinated people were 56% less likely to become infected compared to vaccinated people who had not received a booster. And overall, when booster-vaccinated people were the ones who first brought home the virus, they were less likely than unvaccinated and vaccinated-but-not-boosted people to pass it to others. Vaccinated people with cancer should not underestimate their risks from breakthrough cases of COVID-19, researchers warn. Among 54 cancer patients who became infected despite receiving a two-dose vaccine from Moderna or Pfizer/BioNTech or a single-dose vaccine from Johnson & Johnson – before booster doses were recommended – 65% needed to be hospitalized, 19% ended up in intensive care units and 13% died, according to data from the international COVID-19 and Cancer Consortium. The study did not analyze the vaccines' efficacy at preventing infections in the first place. But among those who did become infected, COVID-19 was no less severe than it was in a comparison group of 1,656 unvaccinated cancer patients with COVID-19, researchers reported on Friday in Annals of Oncology. The risks were greatest for patients with blood cancers. "Many studies ... have suggested that patients with cancer don't create a strong immune response, and this is the first large study that likely shows the consequences of this," said Dr. Jeremy Warner of Vanderbilt University in Nashville, Tennessee. "Additional doses and boosters are critical, as are continued masking, social distancing, and encouragement of all close contacts of patients with cancer to get vaccinated." Please click to read our informative text prepared pursuant to the Law on the Protection of Personal Data No. 6698 and to get information about the cookies used on our website in accordance with the relevant legislation. 6698 sayılı Kişisel Verilerin Korunması Kanunu uyarınca hazırlanmış aydınlatma metnimizi okumak ve sitemizde ilgili mevzuata uygun olarak kullanılan çerezlerle ilgili bilgi almak için lütfen tıklayınız.
<urn:uuid:337ed756-9d47-434f-945b-cd7695c5fa39>
CC-MAIN-2022-05
https://www.dailysabah.com/life/science/covid-19-roundup-omicron-vs-bodys-defenses-boosters-in-households
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304686.15/warc/CC-MAIN-20220124220008-20220125010008-00394.warc.gz
en
0.965152
1,006
3.046875
3
For this week's proverb, we're starting with Proverbs 28:26, He who trusts in his own mind is a fool; but he who walks in wisdom will be delivered. What, exactly, is walking in wisdom? And why would its opposite be trusting in one's own mind? Another passage in Proverbs might help us here. Trust in the Lord with all your heart, and do not rely on your own insight. In all your ways acknowledge him, and he will make straight your paths. Be not wise in your own eyes; fear the Lord, and turn away from evil. (Proverbs 3:5-7) Scripture tells us repeatedly to trust in the Lord. God's got it covered. (Remember last week's proverb?) When we trust our own minds, we're not exactly trusting God, are we? Our minds are prone to error; our knowledge is imperfect and limited, yet we draw conclusions and make judgments and act as if we know it all. Fear of the Lord is the beginning of wisdom. Trusting our own mind means we're arrogant, not fearfully humble before God, and leads to evil. This evil can lead to horrible suffering: think of PTL and the fleecing of the poor, think of Westboro Baptist's actions at military funerals, think of the Boston marathon bombers. Our arrogance in thinking we are right leads us to act in ways that are very, very wrong. And when we use God as an excuse for that wrong, our sin multiplies. We are, however, born into the world and live in the world. We cannot avoid drawing conclusions, making judgments, and acting decisively in big and small matters every single day. We have to trust at least some of our judgments...or we become paralyzed with indecision and fear. I have a friend who became paralyzed while trying to decide which car to buy. It's a big decision, and she was struck with doubt that she deserved the safe, reliable, used car she could easily afford. She thought it was too nice for her. She prayed but didn't feel that God was giving her a solid answer. Let's face it. God doesn't speak to us each morning out of our blow dryers (a modern burning bush!), telling us which car to buy or where to eat lunch or whether to buy organic apples. How, then, do we balance the necessity of living in the world with the call to walk in wisdom with God? At least part of the answer, I think, lies in humility and love. God created the universe and all matter in it. What a miracle! How small we are, how limited! We see darkly, for a brief time. He sees clearly for all time. Yet He loves us, each and every one of us, and wants us to love Him and each other and ourselves. He has given us free will, a will to choose our path, a will to choose evil or good. God trusts us to think about what the right thing might be, to come to Him prayerfully with our problems, to listen to Him, to study His Word for guidance, to live in Christian community with others to help guide us, and to act always in love and humility. This, for me, is walking in wisdom, and I fall short of it every single day. This Week's Reflections How do you walk in wisdom? Did I leave something out of my list? Have you ever felt that you trusted too much in your own understanding and hurt someone as a result? Has your own error ever made your path crooked? If it's still not straight, what could you do to walk in wisdom again and trust Him to straighten that path for you?
<urn:uuid:4a1e18d0-8796-42ee-9341-e66b79ac0629>
CC-MAIN-2018-26
http://transformingcommondays.blogspot.com/2013/05/reflections-on-proverbs-walking-in.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861980.33/warc/CC-MAIN-20180619060647-20180619080647-00117.warc.gz
en
0.971515
780
2.65625
3
We all hear the term ‘strain’ and ‘sprain’ being thrown around when we injure ourselves. But what really is the difference? A sprain is damage to the ligament (connective tissue that connects bone to bone) when excess force has been put through a joint. These ligaments support the joint and with damage to them- whether it be mild or severe can disrupt the joints ability to stabilise. This stabilisation is known as ‘proprioception’. Proprioception retaining is very important after sprain and can be involved in long-term rehab. The ankle is the most common joint to suffer from a sprain, as well as the wrist and thumb. A strain is damage to the muscle or tendon (connective tissue connecting the muscle belly to the bone). When the muscle or tendon under go too much loading or a high intensity of stress it can strain or tear. Damage to muscle fibres or tendons cause bleeding and swelling to the area and can be very painful! Both sprains and strains present with swelling, bruising, pain, reduced movement and poor function. (I.e.: difficulty walking with a strained hamstring or sprained ankle). Both require immediate RICE: Rest, Ice, Compress and Elevate. Acute injuries generally heal well with this management and physiotherapy intervention to assist with the repair of the damaged tissue and the outline of a rehabilitation and management plan. It is important to seek attention immediately after an injury has occurred so that you may get the best outcome in function, movement and returning to sport or exercise. - Massage (soft and deep tissue) - Ultrasound or Electrotherapy - Dry Needling - Taping or strapping - Home exercise management - Gradual exercises that are gradually progressed and supervised by your physiotherapist. These may include: stretches, strengthening exercises, proprioception retraining and plyometrics. The healing of strains and sprains is determined by the severity of the injury, it can take between 6-12 weeks of healing and rehabilitation to get you back to feeling pain free.
<urn:uuid:410d7442-3e58-4bdf-a1f1-e3c04c9a751b>
CC-MAIN-2022-27
https://www.lifereadyphysio.com.au/1-life-1-body/sprain-strain-whats-difference/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104690785.95/warc/CC-MAIN-20220707093848-20220707123848-00292.warc.gz
en
0.947619
459
3.21875
3
Monounsaturated fat is considered to be the healthiest type of dietary fat. Monounsaturated fats remain stable at higher temperatures, and are therefore better for cooking because they're less likely to hydrogenate or become saturated. Monounsaturated fats also carry a number of health benefits. Chemically speaking, monounsaturated fats are fats that have one double-bonded carbon in the molecule. They are liquid at room temperature and begin to turn solid when chilled. Olive oil is an example of a monounsaturated fat.Monounsaturated Fats Can Lower Your Risks of Stroke, Heart Disease and Cancer When eaten in moderation, and used to replace saturated and trans fatty acids in your diet, monounsaturated fats can have a beneficial effect on your health. They can help decrease the levels of "bad" LDL cholesterol in your blood, while increasing levels of "good" HDL cholesterol. They can lower your risk of heart disease and stroke, while providing nutrients, such as vitamin E, that your body needs. Monounsaturated fats can also decrease your risk for breast cancer, help you lose weight and relieve the pain of rheumatoid arthritis.Monounsaturated Fats Help Your Body Absorb Nutrients Some amount of fat is essential to a healthy diet because fats help your body absorb nutrients, especially the fat-soluble vitamins A, D, E and K. Fats provide energy and help to keep our hair and skin healthy. Fats also help you feel full after a meal.Monounsaturated Fats Regulate Bodily Functions Monounsaturated fats and fatty acids help keep your heart healthy by reducing total cholesterol, triglycerides and "bad" LDL cholesterol, while increasing levels of HDL cholesterol in the blood. Fats are needed for normal growth and development in children, and they help keep our brains and central nervous systems healthy. They also produce hormone-like substances that regulate blood pressure, blood clotting and the immune system.Balancing Monounsaturated Fats in Your Diet While monounsaturated fats can have a number of health benefits, it's still important not to consume too many of them. No more than 25 to 35 percent of your daily calories should come from fat. You should minimize your intake of saturated fats and trans fatty acids as much as possible, and try to substitute monounsaturated and polyunsaturated fats instead. Monounsaturated fats come mostly from plant sources. Foods that contain monounsaturated fats include: peanuts, avocados, olivescanola, olive, almond, hazelnut and peanut oils.Monounsaturated fats are liquid at room temperature and may become solid when chilled. Fats that are solid at room temperature, such as stick margarine and vegetable shortening, contain hydrogenated oils and may be high in trans fatty acids. Try to keep these types of fats out of your diet; use canola, olive, peanut or almond oil and tub margarine instead. Avoid processed foods and deep fried foods, such as donuts and french fries, as these are often high in trans fatty acids. Read More at Wikipedia
<urn:uuid:fe4f92f6-64cf-4574-8bf6-507314820bd6>
CC-MAIN-2017-39
http://justcooking.in/dictionary/monosaturated-fats
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695726.80/warc/CC-MAIN-20170926122822-20170926142822-00517.warc.gz
en
0.947264
648
3.140625
3
This week’s posts are on the theme of the WordPress photo challenge, ‘Tour Guide.’ A myriad of unique species evolved on these isolated islands. Many have disappeared, victims of other species introduced willfully or accidentally, decimated by new-to-them diseases, or simply displaced by the relentless encroachment of humans. Of those that still survive, many are under great threat. However, there are success stories. Nēnē, the state bird, have come back from almost nothing and are doing well. Some ‘amakihi appear to have developed resistance to avian malaria, and ‘alalā, the Hawaiian crow, have recently been reintroduced into the wild in small numbers in an attempt to reestablish a wild population. The palila is another endemic species that is rebounding with a little help. It is the only one of 16 finch-billed honeycreepers still in existence. It used to live on the islands of O’ahu, Kaua’i and Hawai’i. Today it exists only on Hawai’i, the Big Island. Even here, it’s habitat, which once covered the māmane forests of Mauna Kea, Hualali and Mauna Loa, has been reduced to a small area on the southwestern slopes of Mauna Kea. The palila is a specialist feeder and this is one of the reasons it’s in trouble. It feeds mostly on immature seeds of the māmane, but māmanes have been badly affected by agricultural expansion and by grazing by wild sheep and goats. The Palila Forest Discovery Trail is an area that has been fenced off and is protected from these threats. I’d been up there several times (four-wheel drive required) but had never caught so much as a glimpse of a palila. One of the reasons for their elusiveness is that palilas follow their food. Māmane flowers at different times depending on the elevation, so palila move up and down the hillside as the flowers bloom and the seeds reach the state they prefer. Last time I was up there, however, my luck changed. I was taking photos of a moth when something flashed by just above me. I looked round and sitting on a nearby branch was a palila (I’m not a birder, but they’re quite distinctive.). I quickly snapped a few photos, desperate to get some kind of record of this elusive bird before it disappeared. I needn’t have worried. It seemed unconcerned by my presence and was soon joined by several others. What was most striking was their feeding habit. A palila would pluck a green seed pod and take it to another branch. Once it was settled, the reason for its it stocky bill became apparent. It absolutely hammered at the pod, pinning it to the branch and banging away with its beak to access the seeds. The image of a workman smashing concrete with a pneumatic drill popped into my mind. For half an hour or so I got to watch them at work. They seemed much like other birds I see — lively, healthy, a thriving group. But looking around, it was a sobering thought to realize I could see all their habitat, containing all that is left of an entire species. For more information about palila and the Palila Forest Discovery Trail, go to dlnr.hawaii.gov/restoremaunakea/palila-forest-discovery-trail/. For more information about birding on the Big Island, go to http://hawaiibirdingtrails.hawaii.gov/.
<urn:uuid:25c79bad-a0f3-469f-9674-7bbd3d5d82d4>
CC-MAIN-2023-14
https://grahamsisland.com/tag/palila/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00725.warc.gz
en
0.973209
773
3
3
GMO's and Monsanto: The Company Who Has No Concern for Consumers Monsanto is an organization that is responsible for several advances in agricultural technology. They pride themselves as an ethical organization there to promote the health and wellbeing of consumers and farmers alike. They stand for providing technologically advanced products meant to enhance our existence. However, this is a facade used to drive profits. The truth is that their products cause many negative effects on consumers and farmers alike. Monsanto is an unethical company. This is proven through their lack of ethical considerations with consumers and farmers. Monsanto provides a variety of products on the marketplace including aspartame (an artificial sweetener), saccharin (an artificial sweetener), and Bovine Growth Hormone (BST) (used in cows to increase milk production). Most commonly known are their genetically modified seeds, with over 2,000 seed varieties and pesticides (Monsanto, 2014). Most food in the marketplace today comes from genetically modified crops. About 60% to 70% of processed foods are genetically modified, with 88% of corn and 94% of soy being genetically modified crops (Dupont, Veronique, 2013). Monsanto is the host for several brands. Weed control brands include Roundup, Degree Xtra, Lariat, Micro-Tech, OutRider, INTRRO, and Harness (Monsanto, 2014). Their vegetable seed brands include De Ruiter and Seminis and their agricultural seed brands include Asgrow, channel. Kruger seeds, Gold Country Seed, Deltapine, Lewis Hybrids, and Hubner seed among many others (Monsanto, 2014). They are also partnered with Corn States, Acceleron, Genuity, and Integrated Farming Systems (Monsanto, 2014). The goal of this partnership, from Monsanto's words, increase the use of technology to create higher crop yields or seeds to be healthier and grow faster (Monsanto, 2014). Monsanto supports their use of technology and the safety of their products for consumers. They have conducted many private studies through researchers on their payroll to furnish this information for the public. In addition, their advertising efforts are also promoting the safety and positive effects of the technology and products. Their propaganda illustrates their dedication to farmers and consumers, and highlights their appreciation in consumers utilization of the products provided. Through the use of technology, Monsanto voices that their genetically modified seeds produce crops that are nutritious and can endure pesticides more than unmodified crops. Their advertising efforts primarily focus on the increase in crop yield and the overall reduction of loss of crops due to insects and seeds. Their website directly states, "whether it's ensuring environmental standards are not only met, but exceeded or protecting safety of our people and communities, Monsanto's stewardship commitments are a top priority" (Monsanto, 2014). Monsanto Cuts 16% of Work Force as Sales in Roundup Herbicide Fall 34% - Monsanto Cuts 16% of Work Force as Sales in Roundup Herbicide Fall 34% - Sustainable Pulse Monsanto announced Wednesday that sales in the company's agricultural productivity segment, which includes its probable carcinogen Roundup herbicide, fell Do you choose organic or GMO free options when shopping? One must ask, with the message Monsanto is sending, how can they ignore the mounting evidence against the safety of the products and technologies they are providing? They were part of the Manhattan Project and was the leading producer of Agent Orange in the 1970's (Hartley, 2014). These efforts were an established effort to eliminate lives, not to enhance lives. There have been many examples of populations experiencing the negative effects of Monsanto products. A recent instance occurred on Molokai, Hawaii. Though still being researched, it is evident that upon the entrance of Monstano's Bt (Bacillus thuringiensis) corn. This is a genetically modified crop that expanded across 1,850 acres on the island (Martino, 2014). Monsanto has been spraying glyphosate (also known through brand naming as RoundUp) across the crops and nearby residents claim to see an increase in health issues since (Martino, 2014). There has been evidence linking breast cancer to pesticides such as glyphosate. Other locations such as India and Argentina have been showing concerns with Monsanto products being used (Martino, 2014). Thanal, an environmental organization from India explains: As the acute toxicity -- reflected in the WHO (World Health Organization) classification of glyphosate is low, it has long been promoted as safe. However, recent evidence shows substantial adverse health and environmental effects, especially of formulated products . . . Recent experiences and studies show a wide range of long-term adverse health effects, again mostly related to formulated products, such as leukemia and other cancers, skin diseases, and birth defects, gastrointestinal problems, and alterations to the central nervous system. Other findings link glyphosate and especially formulations with affecting embryo development, damage cells and DNA, and interrupting the hormone system (Martino, 2014). David Verses Monsanto The Island of Molokai is living proof of what Thanal expressed. Oregon found itself as a laboratory for Monsanto when it was uncovered that genetically modified wheat was being grown without the authorization (Dupont, 2013). Monsanto's products have created many negative and long lasting effects to consumers and residents in areas where products are used. Many of the effects were not seen until recent years, due to the long term onset. It took time to measure the effects and equate them to the use of Monsanto products. Many studies have been conducted further proving the negative impact of Monsanto's products and technology. In 1998 Arpad Pusztai, presented evidence that genetically modified organisms caused organ damage, reproductive failure, among many other effects (CMNEWS, 2014). Hussein Kaoud from Cairo University‘s Faculty of Veterinary Hygiene fed rats genetically modified wheat, soy, corn and canola and concluded there were alterations in the kidneys, liver, and spleen. He found that learning and memory were affected as well (CMNEWS, 2014). A recent study published in Food Chemistry provided evidence from Iowa soybean crops and expressed that genetically modified soy is less nutritious and contained more herbicide residues than non genetically modified crops (Philpott, 2014). The University of Pittsburg also found that Roundup water caused morphological changes in frogs. The glyphosate also harmed beneficial bacteria, which can shift the balance of gut microbiota (Philpott, 2014). This can occur just the same in humans. There are also many concerns about long term environmental impacts of glyphosate. We now ingest it through our food, water, and through the air (Philpott, 2014). The amount we are subject to seems to increase year over year. In 2012, a report called the 2012 Nutritional Analysis: Comparison of GMO Corn versus Non-GMO Corn, illustrated the stark contrast in nutritional differences between genetically modified and non genetically modified corn. The analysis concluded that: - Non-GMO corn has 6130 ppm of calcium while GMO corn has 14 – non-GMO corn has 437 times more calcium. - Non-GMO corn has 113 ppm of magnesium while GMO corn has 2 – non-GMO corn has about 56 times more magnesium. - Non-GMO corn has 113 ppm of potassium while GMO corn has 7 – non-GMO corn has 16 times more potassium. - Non-GMO corn has 14 ppm of manganese while GMO corn has 2 – non-GMO corn has 7 times more manganese. (Barrett, 2014) The study also found the corn contained formaldehyde at 220 ppm, which is 200 times more than the maximum safety amount (Barrett, 2014). These are just a few of the many studies conducted over Monsanto products, further highlighting the negative impacts of their products. Do you believe GMO's are a major problem and a cause for consumer concern? These studies prove that Monsanto's claim to care for the safety of their products and the highlight of the importance of the consumer is a sham. It is propaganda to gain a solid customer base and hide the negative effects of their products. In result, the goal would be to secure more profits, without regard for the collateral damage created. The farmers are also impacted negatively by Monsanto. There is much legislation that protects Monsanto and makes it difficult for farmers to stay independent. Monsanto is responsible for suing many farmers whose crops become contaminated by Monsanto's seeds (Hauck, 2014). In turn, farmers then are forced to pay Monsanto for the seeds that were unintentionally used, and must continue to buy Monsanto seeds year after year, further adding to Monsanto's profits. This is slowly driving out independent farmers as more and more Monsanto farms are created. These farmers do not have the goal of utilizing Monsanto's products, but are strong armed into it through litigation and Monsanto's relentless efforts to create a gain out of inevitable natural occurrences, such as cross pollination (Hauck, 2014). Monsanto's website attempts to excuse their suing efforts against farmers. It explains how farmers sign an agreement that they will not replant seeds from Monsanto and that a small percentage of farmers do not honor the agreement, so they have the right to sue in these instances. However, in most of the cases where Monsanto has sued farmers, these farmers were not customers of Monsanto. They had no interest in the use of Monsanto products, and therefore are not subject to the agreement the website mentions. As an organization Monsanto is a greedy company solely interested in gaining profits. Their products have been causing harm to consumers and farmers for many years. However, they seem to be immune to any litigation or government regulation. Many researchers have exposed the fallacies behind their claims of safety and benefit to consumers and farmers alike. There is no increase in crop yields, nor is there a reduction of pesticides used on crops that are genetically modified. The company has portrayed a false image of ethical considerations, when in fact there is a complete disregard for ethics. They are responsible for negative impacts on the environment and humanity. People and animals are becoming sick. The water and everything around us is contaminated with chemicals that cause cancer and other ailments. It is unavoidable and all the responsibility of Monsanto. Instead of educating customers on the risks behind their products, they use propaganda and false promises to mislead. Monsanto has even launched efforts to eliminate the labeling of genetically modified products (Costa, 2014). Through their vast resources, including wealth, their efforts have been felt. Their goal is to make sure consumers are not educated on what they are eating. Monsanto's is driven to achieve high profits. There is a lack of consideration on the effects to consumers and farmers. Their products are harmful to health and the environment and consumers and farmers are not properly notified of the risks. Ask Your Local Congressman to Support GMO Labeling - Contact Congress | Just Label It We need you to take immediate action and tell Congress you support federally mandated GMO labeling! Representatives Mike Pompeo (R-Kan.) and G. K. Butterfield (D-N.C.) introduced legislation in 2014, and are expected to introduce similar legislation Petition - Stop Monsanto's Dream Bill! - Let Me Decide: Label GMOs | Food & Water Watch People have questions about whether GMOs are safe to eat, but the government doesn’t ask enough questions to know. That’s why at minimum we should label GMOs so people can decide for themselves. Do you view Monsanto's business practices as ethical? Barrett, Mike. (2014). Study Finds Monsanto's BM Corn Nutritionally Dead, Highly Toxic. Healthy Holistic Living. Retrieved from http://www.healthy-holistic-living.com/study-finds-monsantos-gm-corn-nutritionally-dead-highly-toxic.html CMNEWS. (2014). Scientist that Discovered GMO Health Hazards Immediately Fired, Team Dismantled. CMNEWS. http://consciousmedianews.com/scientist-that-discovered-gmo-health-hazards-immediately-fired-team-dismantled/ Costa, Tamra. (2014). GMO Labeling Update: State Efforts Pick Up Momentum, Big Ag Doubles Down. Civil Eats. Retrieved from http://civileats.com/2014/04/16/gmo-labeling-update-state-efforts-pick-up-momentum-big-ag-doubles-down/ Dupont, Veronique. (2013). GMO corn, soybeans dominate US market. PHYS.ORG. Retrieved from http://phys.org/news/2013-06-gmo-corn-soybeans-dominate.html Hartley, Jo. (2014). Who and What Is the Monsanto Chemical Corporation? Natural News. Retrieved from http://www.naturalnews.com/023094_Monsanto_WHO_industry.html Hauck, Darren. (2014). Supreme Court hand Monsanto victory over farmers on GMO seed patents, ability to sue. RT. Retrieved from http://rt.com/usa/monsanto-patents-sue-farmers-547/ Martino, Joe. (2014). How Monsanto Annihilated A Paradise & Turned It Into An Island Of Illness. Collective Evolution. Retrieved from http://www.collective-evolution.com/2014/04/25/how-monsanto-annihilated-a-paradise-turned-it-into-an-island-of-illness/ Monsanto. (2014). Retrieved from http://www.monsanto.com/products/pages/default.aspx Monsanto. (2014). Why Does Monsanto Sue Farmers Who Save Seeds?. Monsanto. Retrieved from http://www.monsanto.com/newsviews/pages/why-does-monsanto-sue-farmers-who-save-seeds.aspx Philpott, Tom. (2014). Monsanto GM Soy Is Scarier Than You Think. Mother Jones. http://www.motherjones.com/tom-philpott/2014/04/superweeds-arent-only-trouble-gmo-soy Smith, Jeffrey M. (2010) Exerpt: Genetic Roulette: The Documented Health Risk of Genetically Engineered Foods. IRT Institute for Responsible Technology. Retrieved from http://www.responsibletechnology.org/health-risks © 2016 Healthy Habits
<urn:uuid:fe905216-6867-4b2c-98c9-4f9e846df0c4>
CC-MAIN-2018-43
https://hubpages.com/health/Monsanto-Driven-By-Profits-Not-Concerned-By-Long-Term-Product-Impacts
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512014.61/warc/CC-MAIN-20181018194005-20181018215505-00116.warc.gz
en
0.93399
2,982
2.515625
3
Join Brad Rhodes to explore “free” Big Data tools, tactical techniques, and concepts you can use right now to understand the cyber stuff in your environment!Details Cybersecurity is the practice of defending computers, devices, networks, systems, and data from malicious attacks, unauthorized access, or criminal use. The threat landscape continues to evolve—individual and state-backed hackers and agencies become increasingly emboldened to compromise websites and servers, steal CPU cycles for cryptocurrency mining, embark on social engineering efforts to find backdoors, and sway public opinion through fake news and other measures. As the threat landscape changes, so must cybersecurity tools and applications. zvelo provides the most advanced URL/IP categorization database which can be leveraged by cybersecurity applications for web filtering, whitelists and blacklists, and residential and business protections against bad actors and malicious online behavior. Explore our network security solutions, and malicious exploit detection offerings for the most advanced threat intelligence available to OEMs and device manufacturers. Implementing a multi-tiered Circle of Trust approach to cybersecurity allows maximum flexibility with varying degrees of trust for shared network resources. zvelo’s cybersecurity team shares best security practices and tips for remote workers as the world grapples with the impact of COVID-19. zvelo Cybersecurity Recap- SnowFROC is an application security conference designed to help developers and technologists improve the security of software. Unpatched vulnerabilities cause one third of breaches. 34% of all vulnerabilities reported so far this remain unpatched. How are you mitigating your risks? Implementing critical security policies is one thing, but enforcing them is an uphill battle. Here are 5 security battles worth fighting to enforce. Phishing attacks increasingly focus on people because the human layer is easily exploited. Here are 3 ways to fortify your defenses against phishing.
<urn:uuid:7ec71539-5929-4698-ad28-cd82ce3591e9>
CC-MAIN-2020-29
https://zvelo.com/tag/cybersecurity/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902496.52/warc/CC-MAIN-20200710015901-20200710045901-00051.warc.gz
en
0.910074
380
2.53125
3
How to Use Reading 1: Pierre Samuel du Pont and Delaware's African-American Schools The early 20th century in America, a period characterized by nationwide social reform, is often referred to as the Progressive Era. During this period, more and more people recognized that education was the best guarantee of economic success for young people. Delaware's educators were eager to reform their schools, which were often old, too small, and in very poor condition. In fact, according to a 1915 federal study of the quality of education in the states, Delaware ranked in 39th place out of the then 48 states. Reforms were interrupted by the country's involvement in World War I, but in 1919 Delaware adopted a new school code. Among other changes, the code established that schools for African Americans would receive some of the money collected from white taxpayers. The new school code also supported the rebuilding of schools for white students. There was no provision for rebuilding schools for African-American children, however. Concerned about the condition of education in Delaware, philanthropist Pierre Samuel du Pont decided to help pay to have schools in the state rebuilt. Pierre Samuel du Pont was a member of the family that established the Du Pont Company in the early 19th century in Wilmington, Delaware. Located on the banks of the Brandywine River, which powered mills that manufactured gun powder, the company became a world leader in the explosives industry. In 1919, du Pont resigned as president of the family business and began devoting much of his time to the cause of education, including serving on the State Board of Education. Using his own money, du Pont established a two-million dollar trust fund for remodeling existing school buildings and constructing new ones in Delaware. He designated a substantial amount of that money to build new schools for African-American children. According to Delaware's new school code, African-American children were subject to mandatory attendance laws requiring all children under age 14 to attend school during the 180-day school year. It was demonstrated through a survey of the place of residence of every African-American child in Delaware that many of the existing schools were inconveniently located. Establishing several, small, single-teacher schools close to centers of population was considered the best solution to address scattered populations and low attendance records. This also would help address the concerns of parents who depended on their children's labor for economic support. Between 1919 and 1928 du Pont personally financed the construction of more than 80 schools for African Americans. By 1938, after many of the schools for whites and all the schools for African Americans had been rebuilt, Delaware had advanced to eighth place out of the 48 states in terms of the quality of its public education system. In 1926, when asked by the editor of Afro-American Magazine why he had funded these schools, du Pont replied: If the Delaware experiment proves satisfactory, which I am sure it will, it will be a great incentive to go ahead more quickly in other States....The progress of Delaware schools will bear watching, for on their success must hang the fate of Negro public school education in the United States for many years.11Pierre S. du Pont to Carl Murphy, March 1, 1926, Pierre S. du Pont Papers, Longwood Manuscripts, Group 10, Series A, File 712, Box 3 (Hagley Museum and Library, Wilmington, Delaware). 2. How did Delaware officials plan to deal with scattered population and low attendance at African-American schools? Do you think this was a reasonable solution? Why or why not? 3. Who was Pierre Samuel du Pont and why did he undertake what he called the "Delaware experiment"? Can the benefits of du Pont's gift be measured? If so, how? Reading 1 was adapted from Susan Brizzolara Wojcik, "Iron Hill School Number 112C," (New Castle County, Delaware) National Register of Historic Places Registration Form, Washington, DC: U.S. Department of the Interior, 1995; and from the Papers of Pierre Samuel du Pont (Courtesy of Hagley Museum and Library).
<urn:uuid:7951a564-863a-41df-bd4d-352daaf9686d>
CC-MAIN-2015-48
http://www.nps.gov/nr/twhp/wwwlps/lessons/58iron/58facts1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446286.32/warc/CC-MAIN-20151124205406-00332-ip-10-71-132-137.ec2.internal.warc.gz
en
0.973535
828
3.828125
4
Identify the major themes of three different dissertations/literature reviews that involve students taught in today's society using technology. Use APA style. Also state rationale for choosing themes. Should the Computer Teach the Student, or Vice ... - CITE Journal www.citejournal.org/vol2/iss3/.../seminalarticle1.pdf Students that are taught, other ways that a computer The onslaught of technology in the classroom is predicated upon the onslaught of technology in life. The increasing use of technology in every area of society has led to computers increasingly being used as the delivery system in classrooms for instructing English, Math, and other vital subjects that ... The major themes of three different dissertations/literature reviews that involve students taught in today's society are given.
<urn:uuid:90262973-e438-44a7-a850-375dac944d31>
CC-MAIN-2016-50
https://brainmass.com/education/learning-teaching/ways-students-taught-todays-society-553096
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540909.75/warc/CC-MAIN-20161202170900-00032-ip-10-31-129-80.ec2.internal.warc.gz
en
0.877729
167
2.875
3
The benefits of quality sleep, including cell renewal, cannot be overstated as they play a significant role in one’s productivity throughout the day. After getting good rest at night, you usually wake up feeling refreshed and enthusiastic for the new day. Although sleeping is ordinary in human beings, not everyone may enjoy the benefits of the same, especially those with sleeping disorders, including sleep apnea. This condition affects your sleep quality as you wake up multiple times during the night due to obstructed breathing. Symptoms like loud snoring and drowsiness during the daytime may indicate the need to visit Barry Chase DDS for medical intervention. What is sleep apnea? It is a sleep disorder characterized by repeated interrupted breathing when sleeping. If you have sleep apnea, you may experience episodes of stopped breathing more than a hundred times during the night. Most people do not realize when this happens but wake up with morning headaches, mood changes, and a dry mouth. Sleep apnea falls under two categories that include: - Obstructive sleep apnea Obstructive sleep apnea is the most common sleep disorder of the two. Obstructive sleep apnea occurs when your throat muscles relax, block your airways and partially obstruct breathing during sleep. As a result, you repeatedly stop and start breathing while you sleep. The most noticeable symptom for people with obstructive sleep apnea is snoring. However, you can snore if you do not have obstructive sleep apnea. Consult with your doctor if the snoring is too loud, with periods of silence in between. Patients with this sleep disorder may benefit from various treatment options, including positive airway pressure and sometimes surgical procedures. - Central sleep apnea Central sleep apnea does not involve any form of blockage in your airways. Instead, instability in the respiratory control center affects signal transmission between the brain and muscles, affecting breathing. This type of sleep apnea is linked to the function of the central nervous system. Causes of sleep apnea The causes for sleep apnea are different depending on the type of disorder. Central sleep apnea is common in patients with medical conditions like stroke and neuromuscular diseases such as amyotrophic lateral sclerosis, which affect the function of the central nervous system. Obstructive sleep apnea occurs when the muscles in the back of your throat relax and affect normal breathing. Although obstructive sleep apnea can develop in people of all ages, certain factors put you at risk for this disorder. For example: - Age. The risk of obstructive sleep apnea increases as you advance in age. However, it levels off when you get to your 60s and 70s. - Obesity. Most people with obstructive sleep apnea have excess body weight. Extra fat deposits along your airways can obstruct breathing. Other conditions associated with obesity, like polycystic ovary syndrome, can also cause obstructive sleep apnea. - High blood pressure. People with hypertension are at risk for this sleep-disordered than those who have normal blood pressure. - Chronic nasal congestion narrows the airways, increasing your chances for obstructed breathing as you sleep. Symptoms such as loud snoring, drowsiness, morning headaches, and trouble concentrating during the daytime should not be ignored. These are signs it is time for you to schedule a session with your specialist at Chase Dental Sleepcare to diagnose and treat obstructive sleep apnea.
<urn:uuid:81b3f516-dc16-4980-a8e6-7eddb0914cc5>
CC-MAIN-2023-06
https://www.bestfitnesstrackertoday.com/understanding-the-causes-and-risk-factors-for-sleep-apnea.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00161.warc.gz
en
0.94536
702
3.09375
3
||It has been suggested that this article be merged with Cultural competence and Cross-cultural competence. (Discuss) Proposed since March 2014.| - Appropriately. Valued rules, norms, and expectations of the relationship are not violated significantly. - Effectively. Valued goals or rewards (relative to costs and alternatives) are accomplished. Intercultural competence is also called "cross-cultural competence" (3C). Cultures can be different not only between continents or nations but also within the same company and even within the same family. The differences may be ethical, ethnic, geographical, historical, moral, political, or religious. The basic requirements for intercultural competence are empathy, an understanding of other people's behaviors and ways of thinking, and the ability to express one's own way of thinking. It is a balance, situatively adapted, among four parts: - Knowledge (about other cultures and other people's behaviors) - Empathy (understanding the feelings and needs of other people) - Self-confidence (knowledge of one's own desires, strengths, weaknesses, and emotional stability) - Cultural identity (knowledge of one's own culture) Cross-cultural competence (3C) has generated confusing and contradictory definitions because it has been studied by a wide variety of academic approaches and professional fields. One author identified eleven different terms that have some equivalence to 3C: cultural savvy, astuteness, appreciation, literacy or fluency, adaptability, terrain, expertise, competency, awareness, intelligence, and understanding. The United States Army Research Institute, which is currently engaged in a study of 3C has defined it as "A set of cognitive, behavioral, and affective/motivational components that enable individuals to adapt effectively in intercultural environments." Organizations in academia, business, health care, government security, and developmental aid agencies have all sought to use 3C in one way or another. Poor results have often been obtained due to a lack of rigorous study of 3C and a reliance on "common sense" approaches. Cross-cultural competence does not operate in a vacuum, however. One theoretical construct posits that 3C, language proficiency, and regional knowledge are distinct skills that are inextricably linked, but to varying degrees depending on the context in which they are employed. In educational settings, Bloom's affective and cognitive taxonomies serve as an effective framework for describing the overlapping areas among these three disciplines: at the receiving and knowledge levels, 3C can operate with near-independence from language proficiency and regional knowledge. But, as one approaches the internalizing and evaluation levels, the overlapping areas approach totality. The development of intercultural competence is mostly based on the individual's experiences while he or she is communicating with different cultures. When interacting with people from other cultures, the individual experiences certain obstacles that are caused by differences in cultural understanding between two people from different cultures. Such experiences may motivate the individual to acquire skills that can help him to communicate his point of view to an audience belonging to a different cultural ethnicity and background. Immigrants and international students A salient issue, especially for people living in countries other than their native country, is the issue of which culture they should follow: their native culture or the one in their new surroundings. International students also face this issue: they have a choice of modifying their cultural boundaries and adapting to the culture around them or holding on to their native culture and surrounding themselves with people from their own country. The students who decide to hold on to their native culture are those who experience the most problems in their university life and who encounter frequent culture shocks. But international students who adapt themselves to the culture surrounding them (and who interact more with domestic students) will increase their knowledge of the domestic culture, which may help them to "blend in" more. Such individuals may be said to have adopted bicultural identities. Cultural characteristics can be measured along several dimensions. The ability to perceive them and to cope with them is fundamental for intercultural competence. These characteristics include: - Interdependence of every human; - Reverse of individualism; - High priority on group than individual; - Collectivist cultures include Pakistan, India and Japan. - moral worth of individual; - promote the exercise of one's goals and desires and so value independence and self-reliance; - advocate that interests of the individual should achieve precedence over the state or a social group; - Liberalism, existentialism and anarchism are examples of movements that take the human individual - characteristics or roles appropriate to, a man; - Opposite can be expressed by terms such as "unmanly'" or epicene. - Masculinity pertains to societies in which social gender roles are clearly distinct - Feminine - set of attributes, behaviors, and roles generally associated with girls and women; - made up of both socially defined and biologically created factors; - Traits traditionally cited as feminine include gentleness, empathy, and sensitivity. - Femininity pertains to societies in which social gender roles overlap. - Uncertainty avoidance - reflects the extent to which members of a society attempt to cope with anxiety by minimizing uncertainty; - uncertainty avoidance dimension expresses the degree to which a person in society feels uncomfortable with a sense of uncertainty and ambiguity; - Countries exhibiting strong Uncertainty avoidance Index or UAI maintain rigid codes of belief and behavior and are intolerant of unorthodox behavior and ideas. Weak UAI societies maintain a more relaxed attitude in which practice counts more than principles; - People in cultures with high uncertainty avoidance tend to be more emotional. Low uncertainty avoidance cultures accept and feel comfortable in unstructured situations or changeable environments and try to have as few rules as possible; - People in these cultures tend to be more pragmatic, they are more tolerant of change. - Power distance - people in some cultures accept a higher degree of unequally distributed power than do people in other cultures; - high power distance culture the relationship between bosses and subordinates is one of dependence; - low power distance society the relationship between bosses and subordinates is one of interdependence; - People in high distance countries tend to believe that power and authority are facts of life - time-fixed, "one after the other” - Doing one thing at a time - Involved with doing the job - Time commitments taken seriously - Follows plan - Deals with short-term relations - Narrow focus - Lower risk tolerance - Self-reliant ethic - Sequential tasks - Positional power - Many things at the same time, "multitasking". Also called "long-term orientation." - Involved with family, friends, customers - Commitments in time mean little - Changes plan - Builds lifetime relationships - Big picture - Higher risk tolerance - Networking focus - Simultaneous engineering - Charismatic leadership - Error-tolerant system - Structural characteristics: The assessment of cross-cultural competence is another field that is rife with controversy. One survey identified 86 assessment instruments for 3C. A United States Army Research Institute study narrowed the list down to ten quantitative instruments that were suitable for further exploration of their reliability and validity. The following characteristics are tested and observed for the assessment of intercultural competence as an existing ability or as the potential to develop it: ambiguity tolerance, openness to contacts, flexibility in behavior, emotional stability, motivation to perform, empathy, metacommunicative competence, and polycentrism. Quantitative assessment instruments Three examples of quantitative assessment instruments are: - the Inter-cultural Development Inventory - the Cultural Intelligence - the Multi-cultural Personality Questionnaire Qualitative assessment instruments Research in the area of 3C assessment, while thin, points to the value of qualitative assessment instruments in concert with quantitative ones. Qualitative instruments, such as scenario-based assessments, are useful for gaining insight into intercultural competence. Intercultural coaching frameworks, such as the ICCA™ (Intercultural Communication and Collaboration Appraisal), do not attempt an assessment; they provide guidance for personal improvement based upon the identification of personal traits, strengths, and weaknesses. An interesting aspect in management offers Riether in his book "Business Cooperation - cultural Integration as Keyfactor - Reasons for Failing and improving chances for success" of business-related cooperation and globalization. He assumes in his CRT-model that Communication, Relationship building and Trust are the essential factors to enable cooperation. Integration is not just to understand the other but to accept and to integrate the others behavior i.e. to act in a way which the other will understand, accept but also to meet expectations It is important that cross-cultural competence training and skills does not break down into the application of stereotypes. Although its goal is to promote understanding between groups of individuals that, as a whole, think differently, it may fail to recognize specific differences between individuals of any given group. Such differences can be more significant than the differences between groups, especially in the case of heterogeneous populations and value systems. Madison (2006) has criticized the tendency of 3C training for its tendency to simplify migration and cross-cultural processes into stages and phases. Madison's article offers an outline of the original research. See also a recent article by Witte summarizing objections to cultural theories used in business and social life. - Messner, W., & Schäfer, N. (2012) The ICCA Facilitator's Manual. Intercultural Communication and Collaboration Appraisal. London: GloBus Research, p. 41 (also see: http://icca.globusresearch.com); Spitzberg, B. H. (2000). A Model of Intercultural Communication Competence. In L. A. Samovar, & R. E. Porter, Intercultural Communication - A Reader (pp. 375-87). Belmont: Wadsworth Publishing. - Selmeski, B.R. (2007). Military cross-cultural competence: Core concepts and individual development. Kingston: Royal Military College of Canada Centre for Security, Armed Forces, & Society. - Abbe, A., Gulick, L.M.V., & Herman, J.L. (2007). Cross-cultural competence in Army leaders: A conceptual and empirical foundation. Washington, DC: U.S. Army Research Institute. - Bloom, B.S. (Ed.). (1956). Taxonomy of educational objectives: Handbook I: Cognitive domain. New York: David McKay. - Krathwohl, D.R., Bloom, B.S., & Masia, B.B. (1973). Taxonomy of Educational Objectives, the Classification of Educational Goals. Handbook II: Affective Domain. New York: McKay Co., Inc. - "Geert Hofstede cultural dimensions". ClearlyCultural.com. - Fantini, A.E. (2006). 87 Assessment tools of intercultural competence [Electronic version]. Brattleboro, VT: School for International Training. Retrieved June 20, 2007 from http://www.sit.edu/publications/docs/feil_appendix_f.pdf - Kitsantas, A. (2004). Studying abroad: the role of college students' goals on the development of cross-cultural skills and global understanding. College Student Journal, 38(3). Retrieved July 9, 2007 from ERIC database. - Lessard-Clouston, M. (1997). "Towards an understanding of culture in L2/FL education". Ronko: K.G. studies in English 25: 131–150. - Lievens, F.; Harris, M.; Van Keer, E.; Bisqueret, C. (2003). "Predicting cross-cultural training performance: The validity of personality, cognitive ability, and dimensions measured by an assessment center and a behavior description interview". Journal of Applied Psychology 88 (3): 476–489. doi:10.1037/0021-9010.88.3.476. PMID 12814296. - Davis, B. (1993). Tools for teaching. San Francisco: Jossey-Bass Publishers. - Doll, W. (1993). A post-modern perspective on curriculum. New York: Teacher's College Press. - English, F. & Larson, R. (1996). Curriculum management for educational and social service organizations. Springfield, IL: Charles C. Thomas Publishers. - Palomba, A. & Banta, T. (1999). Assessment essentials. San Francisco: Jossey-Bass. - Messner, W. & Schäfer, N. (2012). The ICCA™ Facilitator's Manual London: Createspace. - "What is The ICCA?". Intercultural Communication and Collaboration Appraisal. GloBus Research Ltd. Retrieved 25 June 2012. - Riether W.(2014). Business Cooperation cultural Integration as Keyfactor Saarbruecken: AV Akademikerverlag ISBN 978-3-639-67924-3 - Rathje, S. (2007). Intercultural Competence: The Status and Future of a Controversial Concept. Journal for Language and Intercultural Communication, 7(4), 254–266 - Madison, Greg (2006). "Existential Migration". Existential Analysis 17 (2): 238–60. - Witte, A. "Making the Case for a Post-National Cultural Analysis of Organizations," Journal of Management Inquiry (2012) 21:141. Originally published online 13 September 2011.
<urn:uuid:85abec9e-421a-4285-88cf-c008d0f7fbdc>
CC-MAIN-2015-48
https://en.wikipedia.org/wiki/Intercultural_competence
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456975.30/warc/CC-MAIN-20151124205416-00136-ip-10-71-132-137.ec2.internal.warc.gz
en
0.905067
2,836
3.203125
3
Preschool: March-Review of the ladybug group What an exciting month we have had! We learned all about eggs The children explored eggs with all their senses: We smelled, ate, touched, cooked, and experimented with eggs. Where do the eggs come from? Which animals lay eggs? What does the egg look like inside? What happens to the eggshell when we place it in vinegar? The children created a table where they voted on what egg they wanted to eat and then we cooked the eggs accordingly. We also crafted and colored all kinds of eggs and had a big Easter egg hunt with the entire Preschool on the playground! Musical education was also very exciting this month: The German a cappella group 'Vocaldente' visited our Preschool and the children were delighted. Mr. David brought his trumpet and each Ladybug got a chance to play on that trumpet – with individual mouthpieces - several times. The children were so excited! Early mathematical and logical thinking was stimulated this month while sorting by color and similarities as well as sequencing. Blocks and building of streets, buildings, towers and other construction projects were especially popular in our group. During these construction projects the children not only develop their spatial thinking, but they also explore through trial and error the cause and effect of their actions while working together. This social development can especially be observed during role play. The children imitate their everyday life, are engaging with others, listen and respond, all of which promote social emotional and language development. We truly enjoy experiencing all these developmental milestones with your children! Lara Agbro & Sandra Kelley
<urn:uuid:a244d2f9-dddc-49ad-bcfc-19b7993936a2>
CC-MAIN-2017-22
http://dswashington.org/news/preschool-march-review-of-the-ladybug-group.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609817.29/warc/CC-MAIN-20170528120617-20170528140617-00397.warc.gz
en
0.976681
327
2.9375
3
Enginology - Investigating Detonation And Pre-IgnitionWritten by on January 4, 2012 Understanding exactly what detonation and pre-ignition can help you solve many engine related problems For a variety of reasons, race engines can experience either or both these conditions involving uncontrolled combustion. And, we all know either or both can cause power losses and potentially damaged parts, depending upon the frequency and severity of the events. Experience has shown that there is sometimes a misunderstanding about how these two events are created, what actually takes place in the combustion space when they do occur, and ways to avoid both problems. First, let’s examine each of the events to determine how they transpire. During normal combustion and following spark ignition, the flame front travels through the combustion space, burning air/fuel charges while compressing and raising the temperature in the remaining, unburned air and fuel. Tests have shown that during this process, the pressure in the burning and unburned charges are relatively equal. If we focus our attention on what is occurring with and within the remaining unburned air/fuel charge, we find that as the flame front is approaching, the unburned charge has had its temperature and pressure increased not only by the advancing flame front but also by the piston ascending on its compression stroke. It’s during this phase of the combustion process that the remaining unburned charge will reach a temperature and pressure that exceeds the “self ignition” point, causing the unburned charge to spontaneously ignite. Studies have shown it’s because of this excessive and rapid rise in unburned air/fuel charge and the fact self-ignition occurs so rapidly that it is considered combustion at a constant volume. Since the cylinder pressure rise associated with the first part of the combustion process is much lower than the cylinder pressure that occurs at self-ignition, a pressure wave resulting from the latter travels back and forth across the combustion space, creating audible “knock” or the sound of detonation. So by way of definition, we could say that detonation is the result of self-ignition (virtually instantaneous combustion) of the unburned air/fuel charge brought about by excessive temperatures and pressures following the normal initiation and progression of the burn. But as Smokey often said, “There’s just one more little item.” Digging a bit deeper, it has been discovered experimentally that even when air/fuel charges are compressed and heated above the point of self-ignition (spontaneous ignition), there is a time period that passes before this ignition occurs. By definition, this is called the “delay period” prior to combustion. Further, such experiments revealed that even when such charges are conditioned beyond the point of self-ignition, this event doesn’t occur every time. In fact, by sufficiently increasing the delay period (experimentally), the normal flame front may pass through the last portions of the air/fuel charge without detonation. Therefore, in a running engine, if the delay period is so short that the end-portions of the air/fuel charge are not exposed to the normally-advancing flame front, the previously described condition of excessive pressure and temperature leads to spontaneous combustion (detonation). From a practical standpoint, the list of factors that can affect flame speed include piston displacement, piston speed, air/fuel charge ratio, the presence of combustion byproducts, compression ratio and rpm. Of these, at least within the scope of this discussion, there are two we’d like to point out and identify their effects on flame speed; rpm and combustion residue in the combustion space. First, let’s examine the effects of rpm. As engine speed increases, so does airflow velocity, independent of how fuel is introduced. Whether by intended or unintended reasons, so does airflow turbulence. Sometimes this is controlled, sometimes not. Short of turbulence that causes a mechanical separation of air and fuel (obviously not good), air/fuel charge atomization can be improved, and we’ve previously discussed the benefits from this; e.g., improved atomization, improved flame speed and generally increased combustion efficiency as evidenced by lower brake specific fuel consumption readings. Combustion residue in the combustion space? Not good at all. Exhaust gas does not combust. Any presence of combustion residue interrupts smooth and rapid flame travel. By whatever process causes inefficient evacuation of combustion byproducts (typically from reversion), flame speed suffers. And when you factor in the influence of a poor intake manifold design, cylinder-to-cylinder mixture distribution becomes an added problem against having near equal flame speed in each combustion space. It turns out that distribution problems among an engine’s cylinders, caused by an intake manifold, can vary as a function of rpm and manifold design. And sorting out mixture distribution issues on an engine dynamometer often bears little resemblance to the patterns that occur on the track. But we digressed. The results from detonation, aside from parts damage, include such factors as loss of power, efficiency and….pre-ignition. As a rule, pre-ignition is the initiation of the combustion process by something other than a controlled spark, typically a hot-spot in the combustion space. Pretty straightforward. But there’s more. If pre-ignition occurs early in the normal combustion cycle, additional work must be done by the engine working against combustion pressure, as the piston would normally be completing its compression stroke ahead of a controlled spark. Much like an over-advanced ignition system, power is reduced. Further to this, if a hot-spot is remotely located from the spark plug and initiates combustion from that location early after normal combustion begins, the two flame fronts can elevate cylinder pressure to the point of creating detonation. Simply stated, detonation and pre-ignition aren’t the same, although pre-ignition can lead to detonation, if the circumstances are right. A Few Hands-on TipsIn terms of applying some of this information to your parts selection, modification or use, there are two areas of particular importance. The first deals with air/fuel charge mixture quality, as it relates to detonation suppression. Previous discussions in this column have emphasized the need to homogenize and mix the two as well as possible. Flame speed is also a function of atomization efficiency; e.g., the smaller the droplets (all else being equal), the faster the burn, the higher the total force on the pistons (power) and the less the tendency toward detonation. Specifically, roughened intake paths, improved carburetor booster efficiency, and “roughed-up” piston crowns can all contribute to increased atomization. You may also find less total ignition spark is required for optimum power, a direct result of a quicker burn as evidenced by reduced exhaust gas temperatures. The other area has to do with reducing exhaust residue in the combustion space to an absolute minimum. Early exhaust events (relative to BDC piston position on the power stroke) place an added burden on reducing this inert gas. Two suggestions come to mind. Intake valve jobs that help reduce back-flow into the inlet path. Such modifications can be evaluated by flowing intake ports in reverse direction. And finally, you may find that exhaust port modifications measured with the exhaust valve “parked” at about 85 percent of maximum lift (on the flow bench) will yield more efficient total exhaust gas elimination from the combustion space. Successful modifications here will also show up as reduced brake specific fuel consumption (b.s.f.c.) numbers on the dyno. Clearly, fresh air/fuel charges diluted with exhaust gas not only reduce flame speed and power but can lead to detonation problems already discussed.
<urn:uuid:e8f669bb-d87e-4661-9e26-321bf00fad99>
CC-MAIN-2016-18
http://www.hotrod.com/how-to/engine/ctrp-1204-enginology-investigating-detonation-pre-ignition/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111455.18/warc/CC-MAIN-20160428161511-00121-ip-10-239-7-51.ec2.internal.warc.gz
en
0.944036
1,605
3.09375
3
The Trillium flower, known as the Wake Robin, is a sign that spring has just arrived and a treasure to find in northwest forests. They are slow growing and if picked the plant will likely die off, so please don't pick them. We suggest you take a photo of the flower instead! Habitat: Moist to wet woods, stream banks, shaded open areas with well-drained soil. Description: Showy perennial, with three white petals turning pink to purple with age and three green sepals beneath; single, terminal on a stalk. The flower blooms from April to June. Trillium are grown from rhizomes and produce three-sectioned seed pods. Trillium is also known as wake robin because they bloom in early spring, often before robins return to their nests from winter. Trillium is pollinated by ants. Each seed has a little oil-rich appendage that is attractive to ants. The ants carry the seeds back to their nests where they eat the appendages or feed them to the larvae and then discard the remaining seeds on rubbish piles. This is a reasonably effective mechanism for seed dispersal. Other spring-flowering “ant plants” include bleeding heart and wild ginger. Trillium seeds take 2 years to germinate and another 7 years to bloom flowers. Roots have been used as medicine, mainly for poultices. In folklore, trillium symbolizes modest beauty. Invasives that threaten the property: - English Ivy - this non-native plant threatens forest land all over the northwest by smothering out native plants and depleting habitat for wildlife. In Trillium Park the ivy has taken over much of the forest floor, making it difficult for the Trillium to reproduce and covering existing Trillium. - Yellow Arch Angel - Originally sold as an ornamental ground cover, this invasive non-native plant grows to about 6" tall and has escaped nearby properties into the park. Yellow Arch Angel has green leaves with a white center and grows in thick patches. It is also threatening the Trillium habitat. Park Stewardship is an important part of helping the Trillium thrive in the park. Habitat restoration and maintenance of the trails are an ongoing volunteer effort. The Stewardship Program has volunteer opportunities to steward this park and many others. There are also drop-in work parties that focus on invasive removal, trail work and other park maintenance tasks.
<urn:uuid:10ddc12d-4a67-4f4d-acea-2ffdc73db41d>
CC-MAIN-2020-10
http://olympiawa.gov/city-services/parks/volunteering/trillium-ovatum.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145746.24/warc/CC-MAIN-20200223032129-20200223062129-00066.warc.gz
en
0.950088
516
3.328125
3
A child's illness can affect the entire family. Here are some things that can help: What Siblings Need Routine: Normal day-to-day activities such as going to school or day care will help siblings feel safe when separated from caregivers and family. Be honest: It is important to be honest and talk to siblings using words they can understand to explain why their brother or sister is in the hospital. This will help children to feel less afraid. Talk: Children need lots of opportunities to express their feelings as they try to understand what is happening. Behaviors to Be Aware of Every child reacts differently when their brother or sister is in the hospital. It is normal for siblings to feel: Fear - "Can I catch what my brother has?" Guilt - "Did my fight with my brother make him sick?"; "Why is he sick and not me?" Anger - "My brother is getting so many presents in the hospital, why can't I have new toys?" Confusion - "What is going to happen to my brother in the hospital?"; "When is my brother coming home?" Loneliness - "What about me? Nobody is paying attention to me." You might see this in your child's behavior by: Acting out; aggressive play Becoming more clingy or quieter than usual Regression to behaviors of their younger years (thumb sucking, bed wetting) Complaints of stomach aches, headaches or other sickness Changes in sleeping or eating habits How You Can Help Siblings need extra support when a brother or sister is in the hospital. Include your children as much as possible to answer questions and lessen fears. Activities You Can Do at Home to Keep Siblings in Touch Draw pictures or write letters to take to the hospital Set up special one-on-one sibling visits Talk on the phone, video chat, email, send mail Ask siblings to help pack favorite items to send to the hospital, such as stuffed animals, movies, music or games Before visiting the hospital, talk to siblings about what they can expect to see and do. Remind them that it is always OK to ask questions. Activities to Do at the Hospital Make decorations for the hospital room (signs, pictures) Play games, read books, play music, work on art projects Visit the playroom Books You Can Read Together "What About Me? When Brothers & Sisters Get Sick" - A storybook for 5-10 year old brothers and sisters of hospitalized children. By Alan Peterkin. 1992. "Hi, My Name is Jack" - A storybook for 3-7 year old brothers and sisters of children with a chronic illness. By Christina Beal-Sullivan. 2000. "When Molly Was in the Hospital" - A book for brothers and sisters of hospitalized children. By D. Duncan. 1994. "When Someone Very Special Has a Serious Illness" - A workbook for 7-13 year old brothers and sisters of hospitalized or chronically ill children. By Marge Heegard. 1991. If you would like help talking to your child about what to expect when they visit their brother or sister in the hospital, contact your Child Life Specialist or the Child Life Department at 312.227.3270.
<urn:uuid:9dc33f7f-e26c-4fd7-b5df-f728de9376d7>
CC-MAIN-2021-10
https://www.luriechildrens.org/en/patients-visitors/resources-support-services-for-families/how-to-help-siblings-cope/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369721.76/warc/CC-MAIN-20210305030131-20210305060131-00375.warc.gz
en
0.946231
686
3.421875
3
The welding system of the future is self-learning LUT is developing an entirely new kind of welding system, one which solves quality and productivity problems related to automated and mechanised welding. The system is self-adjusting, flexible and adaptable, such that it can be integrated as part of different robotic systems and different manufacturers' power supplies. It's self-adjusting properties are based on a new kind of sensor system which is controlled by a neural network program. Most often in welding a monitoring sensor is used which tracks the bevel angle, an essential part of the welding process. In the system being developed by LUT, there are also monitoring sensors for the thermal profile (the weld pool's heat values) and the weld form. The monitoring data is transferred from the sensors to the neural network, which is able to deduce and react to simultaneous changes in multiple variables. 'When a mistake is detected, the system is able both to correct it during the welding process and also calculate what other faults may arise. Thus the final product is flawless. The problem with welding automation systems is that certain values are set for the work, based on which the whole weld is carried out, and only then is it checked whether the result is good. Now the welding is monitored throughout the whole process', explains Project Manager Markku Pirinen. In the gas-shielded arc welding process, factors affecting outcome quality include the welding current, the arc voltage, the wire feeding and transporting speeds, and the position of the welding gun. With the help of the neural network, a regulating window can be set for these system variables, and they can then be controlled so that they remain within certain limits, which ensures that final product is as required. 'In practice this means that when the welding values approach the boundary values set in the parameter window, the system corrects the process so that the welding values move back towards the centre of the value range and the possible defect is prevented.' Added value for Arctic steel construction The new system works very well with high-strength steel welding, as the parameter windows for the high-strength materials are significantly narrower than those for construction steel, and the harder the steel is, the more difficult it is to weld. High-strength steel is used, for example, in arctic steel construction work, where the materials used must be light, robust, and strong. 'In the Arctic, welds must be of higher quality than in warmer regions. In the North, errors would have catastrophic consequences. For example, the welds must be able to withstand temperature of up to -60 °C, and they must be flawless. Operating safety must be so high that no accidents occur at all', says Pirinen. The market for the new system developed by LUT is worldwide. The system can be used, for example, in the manufacture and quality verification of pressure vessels, different kinds of containers, pipes and pipe systems, booms and beam structures. In Pirinen's opinion, the welding industry has been waiting for a control system such as this ever since automated welding came onto the market. 'This system will bring significant savings to the welding industry, as resources will no longer be required for post-welding checks and repairs. However, the system can only by used for mass-welding operations, so hand-operated welding will continue to be used for the kinds of work which the robotic welders cannot do.' The budget for the Neural-network guided self-adjusting welding system project is approx. 800,000 euros, 70% of which will be provided by Tekes. The project is part of the Tekes TUTLI (New knowledge and business from research ideas) programme, aimed at the commercialisation of research results as new business activities. The project realizer is LUT's welding technology laboratory. Project Manager Markku Pirinen, [email protected], tel. 040 483 9307
<urn:uuid:0c0ac4b2-6fe0-4e13-8ed6-82337f4a70e0>
CC-MAIN-2016-44
http://www.lut.fi/web/en/news/-/asset_publisher/lGh4SAywhcPu/content/the-welding-system-of-the-future-is-self-learning
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00103-ip-10-171-6-4.ec2.internal.warc.gz
en
0.936929
811
2.578125
3
The e-learning has gained popularity in recent years where private schools have adopted its usage and public and government schools are in a mode to sync with the new age teaching technology. Carrying the trend of e-content to classroom is still at a nascent stage in India but Kalyani Rangarajan, Dean, VIT Business School, VIT University, believes that tablet is a powerful tool in a technologically advanced world today How important do you think is a tablet for the curriculum in your institution? As important as the ‘Fountain Pen’ was before it was demolished by the ‘Ball pen’! Tablet is a powerful tool in the technologically advanced world to impart learning to the students. Just as we have shifted from desktop to laptop we need to shift to tabs. Soon it would be all encompassing mobiles and sooner than later we might have google glasses and other wearables. Is a tablet the only way for the colleges and the universities to help their students understand the concepts better? If the question is, ‘can the tablet replace the teacher?’, the answer ‘might’ be ‘No!’ But it might even be better to have the tablet as a teacher, which can be non-judgmental, and definitely better than moody and sometimes inappropriate Teachers. Other methodologies in use such as role play, simulations, games etc. might be adapted to a tablet mode, in the days to come! Then, one might, justifiably say that there is no substitute for a tab. What can a tablet, e-book and e-content not do? At present, physical contact with other human beings might still be a problem, provided it is a necessary component of learning. But if only information sharing is important, then one can easily do with a tablet, which can provide enough and more content, correct and relevant. How do you evaluate, assess a tablet before selecting it for the curriculum in your institution? Availability, price, quality, and ease of use would largely decide the particular brand or specs that are required for a specific group. Soon MOOCs would alienate the teacher from the taught and Prof. Gautam Kaul has clearly stated that no student should try to contact the instructor directly by mail or phone as it is impossible for him to devote time to any of the thousands who register for a MOOC Introduction of digital tools into the classrooms has brought the narratives alive. The traditional tools of teaching are slowly losing their relevance. Do you see any inherent contradiction between the two? The ancient gurukul, where the teacher had personal contact with few students, he would condescend to teach, has given way to large class rooms and impersonal teaching through blackboards, whiteboards and smartboards. However, as long the objectives of the teaching – learning process are achieved, one cannot complain about the lack of personal touch, which was the very essence of teaching in days of yore. Although the private institutions are far ahead of the public institutions, the new government appears committed to bridging the digital deficit. How do you think should the government move? There is indeed a welcome change in the approach of the government to improve the quality of education in the public institutions. This would pose a greater challenge to the private institutions as they need to be ahead of the public institutions if they have to attract good quality students at the higher fees that they charge. If government does it this year, private should have already done it a couple of years earlier. The digital roads to smart education have their own shares of potholes. Infrastructure continues to be the main bottleneck. How do you think can it be overcome? When the going gets tough, the tough gets going. Nothing great is achieved without its share of pains and obstacles. Both the management and the faculty of these institutions need to strive hard to enable the smooth transition from the blackboard to the tablet mode of teaching – learning process. Power availability, internet connectivity, students’ techno-phobia, evaluation methodology, and the objectives of the learning process need to be addressed to break the bottlenecks. Having a large cap might help. Do you think that e-learning runs the risk of over exposure and doing more harm than good in the end? A knife can be used both to kill a person and also to save him from death, depending on who is wielding it. Similarly one has to have a trade-off between no information and overload of information. Guess, the amount of water drunk depends on how thirsty is the person. The massive open online courses (MOOCS) have brought closer the dream of digital equality in our country. However, the shallow internet density in our country is making a crisis out of an opportunity. How do you think can the Government come to seize upon the opportunity? The easier option would be to put a ban on all MOOC courses, so that the limited band width is used only for emails. It is like throwing the baby with the bathwater. Having made millions of rupees, it would be more appropriate for the government to ensure that the 3G and 4G bandwidths are implemented and the last mile issues in internet connectivity are resolved at the earliest. Having caught up with the mobile revolution, we should not lose out on the wide band video communication
<urn:uuid:240756fa-05a4-47a6-912d-5f3bfc9a56d0>
CC-MAIN-2020-10
https://digitallearning.eletsonline.com/2015/02/transitioning-from-blackboard-to-tabs/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146665.7/warc/CC-MAIN-20200227063824-20200227093824-00102.warc.gz
en
0.962307
1,095
2.671875
3
By Holly Krutka Executive Editor, Cornerstone Responsible Editor, Cornerstone The process of reclamation of mining lands includes many important considerations and is often far from simple. However, practices related to reclamation have improved significantly in recent years. Although the primary purpose of a mine reclamation plan is usually to minimize the impact to the local environment after a mine is closed, today’s mine reclamation plans can encompass much more than just returning a mining site to its natural state. In fact, some closed mines are now forests, farmlands, open spaces, or public parks. In the history of mining operations, there have been too many examples of mining lands that were not properly cared for and, of course, such instances have garnered much publicity. Today, practices are changing and, in many countries, mining permits will not be granted without a complete mine closure plan with the funding secured to support the plan. This article highlights the strategy, options, and select success stories from mining sites that were reclaimed properly. Using best practices to reclaim mining lands after a mine has been closed comes at a cost—an estimated US$1.5 million per mine.1 The way this money is spent is based, in part, on how the land will be used, which is often determined after consultation with the local government, NGOs, land owners, and others. The steps for the land reclamation process can include: 1 - Landscape maintenance and design (e.g., map predicting topography, backfill as necessary, examination of drainage) - Management and restructuring of overburden and soil (e.g., ensuring slope stability) - Backfilling: Necessary in deep mines to avoid collapse and in surface mines to promote safety and create a smooth landscape - Topsoil management - Management and reuse of waste materials After these steps are taken, the ecosystem can be rebuilt, either actively or passively. The case studies presented here highlight several examples of how ecosystems were rebuilt, which can be contingent on the type of land use intended. Options for Mine Reclamation Several options are available for uses for reclaimed mining sites; the selection for the land usage must be based on economic considerations, location, societal needs, and the local ecosystem. There are economic uses for the land (e.g., industry or housing) as well as productive uses (cultivation, grazing, fishing, parking, etc.). In some cases, it could also be appropriate to open the reclaimed mine site to community use, such as a public park, nature conservancy, etc. The optimal use of closed mining sites must be based on the needs of the local community. For example, in the European Union over 50% of mining lands that have been reclaimed are used for forests or grasslands. However, in China, where there is a shortage of farmland, over 70% of reclaimed mining lands are used for agricultural purposes.2 In most cases worldwide, reclaimed mining sites are converted into lands suitable for forestry or agriculture. Case Studies of Reclaimed Mines Ereen Mine, Mongolia The Peabody Energy Ereen mining site, located on the remote northern slopes of Mongolia, was acquired by Peabody Energy through a joint venture in 2009. However, the mine was shut down soon after it was acquired. To carry out the mine closure and land reclamation plan, the mine owners allotted the resources to support 60 personnel, including a key choice for leading the closure and reclamation effort, Vern Pfannenstiel, who had extensive experience with mine closure and land reclamation. The most relevant example of his work experience related to his involvement with restoration projects on the Black Mesa (Arizona, U.S.), where he also dealt with a remote location and the need to work with the indigenous people. In addition to the usual issues that come with mine closure and land reclamation, the remoteness of the Ereen site posed unique challenges. For example, workers had to camp at the site. Without the necessary specialized seeding equipment available locally, such equipment had to be shipped from the U.S., which required five months. The US$1 million project transformed the former mine site into 44 acres of grassland, which is now used as pastureland for traditional livestock grazing. The project also provided a source of fresh drinking water in an area that did not previously have easy access to potable water. Peabody Energy carried out the restoration with the nomadic community’s cultural practices and land uses in mind. The new community well separates drinking water from livestock water, protecting the purity of water intended for human consumption. The design took into account the harsh conditions typical in Mongolia. The restored landscape also incorporates a surface pond where local herders can bring their cattle, goats, horses, and sheep to drink. Fencing protects the reclamation area from free-roaming livestock during the establishment phase of the project. Recent monitoring indicates that, with foliage production running at four times that of native lands, the site has strong potential as a hay production resource, critical for feeding local livestock during the harsh winter. All the project’s camp supplies, construction materials, and parts were purchased locally or through established manufacturers with branch offices in Mongolia. As well as transferring technical knowledge to the local workforce, Peabody Energy donated materials, supplies, and housing from the project back to the local governments and herders, and employed local families as caretakers. Two local families, one of which has grazed its herds at Ereen for generations, accepted responsibility for ongoing site maintenance and management. Another family took custodianship of the well, and keeps the upstream watershed free from potential contaminants. Huehnerwasser Catchment at Welzow-South Coal Mine, Germany A truly unique reclamation project is underway near Cottbus, State of Brandenburg, Germany, at a location called Huehnerwasser (Chicken Creek), where there was previously an open pit mine. This site is owned by the Swedish mining company Vattenfall Europe Mining AG, which is producing lignite in the region and is also responsible for restoration. While the reclamation project was closely watched and monitored, the ecosystem was left to develop itself. This gives researchers a rare opportunity to observe and monitor a fledgling ecosystem. In 2005, the first steps of the project, which spans approximately six football fields, were to deposit regional sediment, complete grading, and then fence it off. A local groundwater body was allowed to establish on top of a clay layer. After these steps, a relatively minimalist approach was taken.3Although the area was observed closely, no seeds were planted and no other active steps were taken to encourage plant growth. Then researchers from the Brandenburg University of Technology Cottbus, Technische Universitaet Muenchen, and other institutions were allowed to closely monitor the site. Many diverse groups share this research site in a collaborative effort: For example, plant ecologists closely watch which plants are able to take hold and the order in which plants grow; forestry researchers and soil ecologists watch for changes in the soil. Scientists are studying the influence of several key factors on ecosystem development. Over 70 papers have been published by the collaborative research center to date. The research group has also established a website (www.tu-cottbus.de/projekte /en/ oekosysteme) where webcams can be viewed by the public. The project is set to run for 12 years, which is relatively short as far as ecosystem development is concerned. The results from this project could hold discoveries not only valuable to the scientific community, but also to the mining industries on how best to encourage the return of closed mines to a natural state. Northumberlandia, Newcastle, England Northumberlandia is another truly unusual example of how mining operations and public use of land can go hand in hand. This project was completed in 2012 in the area of Cramlington, Northumberland, in northern England. Actually, Northumberlandia is considered a restoration-first project, wherein mining operations are ongoing while an extra piece of land near the mine was converted to a large public park, partly using material excavated from the mine. The cost of the project was £3 million (double the average costs for a mine reclamation project); both the creation of the park and its maintenance are privately funded by the Banks Mining Group and the Blagdon Estates. The park is open to the public free of charge. The park was designed by landscape architect Charles Jencks; his vision was to create a park in the shape of a nude woman. The park includes four miles of footpaths in a 47-acre park. Hunlunbeier, Inner Mongolia, China Hunlunbeier is located in northeastern Inner Mongolia in China. This area has rich coal reserves, estimated at more than 100 billion tons. The region is also the largest natural grassland in the world, and is characterized by a harsh winter climate and weak surface ecology. The Baorixile coal mine, owned and operated by the Shenhua Group, is located in the region and currently produces over 30 million tons coal per year. The grasslands are somewhat delicate; for this reason it is important that care is taken during the reclamation process, which is ongoing and carried out simultaneously with mining. For this site three main steps are employed for the ongoing reclamation: stripping the topsoil prior to mining, stacking and dumping the fill into the open pits, and beautification. Before any mining is begun, surface soil is stripped and stored for future use. The humus soil, which is 0.3–0.5 meters below the surface, is particularly important for supporting plant life. After mining at a particular location is complete, the stripped earth is stacked layer by layer and dumped into the open pits in a stepwise manner. The earth is dumped into the open pits in the largest possible quantities immediately after mining, which limits the amount of stripped earth on the grassland. Finally, the last step of the reclamation process includes beautification of the site, which mainly consists of introducing the appropriate ecology. Of course, the angle at which the land is recomposed is important to mitigate the risk of collapse. For the Shenhua Baorixile site, a hydraulic excavator and forklift were used to form the wastepile into a series of steps with a 35° angle. The angle of this particular site was selected to limit wastepile height as well as to ensure stability. After the shape of the wastepile was selected, the stored humus soil was spread over the wastepile. Finally, grass seed was sown, and plants began to grow. The Shenhua Group continues to monitor the many reclamation sites in this area and work on them as needed. The backfill and plant work are ongoing as the amount of reclaimed land increases and additional grass and trees are added as necessary. Today, the reclaimed land is used for growing fruit and vegetable crops, which provide an additional source of income to the local community. From 2006 to 2012, the Shenhua Group invested more than 112 million RMB (~US$18.7 million) to reclaim mining sites throughout the Baorixile coal mine area. To date, the reclaimed land covers more than 3,850,000 m2 (nearly 1000 acres). From 2012 to 2014, Shenhua Group expects to invest another 150 million RMB (US$25 million) on continued reclamation. A successfully reclaimed mining site can be valuable to a community long after mining operations have ceased. Several examples have been provided of successfully reclaimed lands; the final results for these projects included much needed grazing land, a unique park, a research project, and agriculture. Reclaimed mines can benefit the economy and the ecology of the local community if the reclamation process is carried out in a responsible manner. - L. Sloss, Coal Mine Site Reclamation CCC/216, Published online by the IEA Clean Coal Centre, February 2013, Available at bookshop.iea-coal.org.uk - X. Bian, H.I. Inyang, J.L. Daniels, F.J.L., Otto, F., Struthers, S. Environmental Issues from Coal Mining and Their Solutions, Mining Science and Technology, 2010, 20 (2), 215–223. - Elmer, M., Gerwin, W., Schaaf, W., Zaplata, M., Hohberg, K., Nenov, R., Bens, O., Huttl, R. Dynamics of Initial Ecosystem Development at the Artificial Catchment Chicken Creek, Lusatia, Germany, Environ. Earth Sci., 2013, 69, 491–505.
<urn:uuid:277f0fd4-5999-442a-9c65-34f283583031>
CC-MAIN-2015-11
http://cornerstonemag.net/case-studies-of-successfully-reclaimed-mining-sites/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00018-ip-10-28-5-156.ec2.internal.warc.gz
en
0.957341
2,615
3.234375
3
Modern health information systems today are proprietary and often only serve one department making it impossible to easily share data across one facility, never mind across different facilities or countries. It's a big problem. And it makes it difficult for doctors to capture a complete clinical history of a patient. But one project hopes to overcome this. “The healthcare interoperability problem can be investigated in two categories: Interoperability of the healthcare messages exchanged and interoperability of electronic healthcare records [EHRs],” says Professor Asuman Dogac, Director of the Software Research & Development Center at the Middle East Technical University in Ankara, Turkey, and coordinator of the IST-funded ARTEMIS project. Right now messaging interfaces, or interface engines, are used to exchange information among different healthcare information systems. Currently, the Health Level 7 (HL7) Version 2 Messaging Standard is the most widely implemented in healthcare. Unfortunately, HL7 V2 compliance does not imply direct interoperability between healthcare systems, because V2 has no explicit information model. Instead it has rather vague definitions for many data fields and it contains many optional fields. It offers great flexibility, but requires detailed bilateral agreements among healthcare systems to achieve interoperability. So Version 3 was developed, based on an object-oriented data model but that can't talk to V2. EHRs suffer from similar problems. An EHR is digitally stored healthcare information about an individual’s lifetime that supports continuity of care, education and research, while ensuring confidentiality at all times. A number of standardisation efforts are progressing to provide EHRs interoperability. However, an exchange of well-structured and machine-processable EHRs has not been achieved yet in practice. ARTEMIS provides the desperately required interoperability between medical information systems through semantically-enriched Web services that use defined meanings of individual pieces of input and output parameters. The team decided not to reinvent the wheel and used existing standards where they were relevant. For example, an essential element in defining Semantic Web services is domain knowledge. Medical informatics is one of the few domains to have considerable domain knowledge developed in standards. HL7 categorises events and defines messages in healthcare based on service functionality, which reflects the business logic. ARTEMIS uses HL7 as a basis for defining both the service action semantics and the message semantics. In the ARTEMIS project, their Message Exchange Framework provides the exchange of meaningful clinical information among healthcare institutes through semantic mediation. The framework involves first maps the source ontology onto the target message ontology with the help of a tool which produces a mapping definition. This mapping definition is then used to automatically transform the source ontology message instances into target message instances. Through a prototype implementation, ARTEMIS demonstrates how to mediate between HL7 Version 2 and HL7 Version 3 messages. However, the framework proposed is generic enough to mediate between any incompatible healthcare standards currently in use. For EHRs, ARTEMIS uses constraint rules for specific clinical concepts, called ‘archetypes’, rather than distinct entities in the reference information model. Archetype-based interoperability discovers existing archetypes based on their semantics. It annotates their archetypes with ontologies, an established list of definitions, and then composes templates from archetypes and retrieves corresponding data from the underlying medical information systems. ARTEMIS used electronic business XML (ebXML) registry semantic constructs to annotate, store, discover and retrieve archetypes. Continuity of care with EHR One crucial aspect in ARTEMIS is to find and retrieve clinical information about a particular patient from different healthcare organisations where concrete sources are unknown. To complicate matters, in most countries there are no unique person identifiers that would be valid for the whole lifetime of an individual and used by all parties in healthcare and for all episodes of care. On the contrary, in many cases several identifiers for a patient exist even within a single organisation. Consequently a protocol is needed that allows the identification of patients by means of non-unique patient-related attributes. ARTEMIS developed a ‘Patient Identification Process’ (PIP) Protocol’. PIP provides a solution for a common problem in the healthcare sector that is likely to become very important with the increasing mobility of the workforce in Europe: locating and accessing prior clinical records for continuity of care. Healthcare information systems operate within a strict regulatory framework that ensures the protection of personal data and outlines the conditions where processing is allowed. The ARTEMIS project responded to these conditions by providing comprehensive security and privacy protection mechanisms. Currently, the healthcare industry’s Integrating the Healthcare Enterprise (IHE) initiative proposes the Retrieve Information for Display (RID) integration profile to allow users to retrieve and display patient-related documents on systems other than the document keeping systems. Although the RID profile is well suited for use in a single hospital or within a trust of hospitals that belong to a single Patient Identifier Domain, it is not designed for cross-boundary access on information stored in different hospitals. ARTEMIS developed middleware infrastructure that extends the IHE RID protocol for cross-enterprise search and access to patient-related clinical information, even if no Master Patient Index is available, and without modifications to existing information source actors. Applied to the ARTEMIS infrastructure, the RID Information Source and Display actors may be located in different institutions using different Patient ID domains and different sets of demographic data. Within the ARTEMIS network, clinical records can be located using the Patient Identification Protocol which can also be combined with the IHE Cross-enterprise Document Sharing (XDS) Integration Profile. At the Healthcare Information and Management Systems Society (HIMSS) annual conference in San Diego, February 2006, "we will run a demonstrator that will realise a scenario where, after an accident, a patient is admitted to the most appropriate hospital from the ambulance,” says Dr Dogac. “The patient will be admitted before the ambulance arrives at the hospital, via a mobile device. The hospital admissions service will then automatically seek out any relevant healthcare records of the patient in the ARTEMIS P2P network, and presents them to the doctor, although the hospitals discovered may not be using interoperable standards with each other. This is a considerable improvement over current systems." In the meantime, the team will continue to work on improvements in the system, enhancing the peer-to-peer networking, security, privacy and patient identification modules and integrating them to the ARTEMIS architecture. Dr Dogac emphasised that the current aim of the project is to demonstrate the project results to the industry players on board. "We need to show more people what we are doing and publicise it more widely. We need to show them that it works." That's part of an on-going process to promote their work at conferences like HIMMS. In the meantime, Dr Dogac will begin a new project, SAPHIRE, in the next couple of months. "That project will seek to extend the functionality of ARTEMIS. It will expose medical sensor data as semantically-enriched Web services. It will process sensor output, the patient's medical history and clinical guidelines to help physicians with diagnoses and treatment," says Dr Dogac. While ARTEMIS is focused on the hugely important step of accessing disparate patient data through a semantic interoperability platform, SAPHIRE uses this system to create new services that are currently unavailable. It could mean a paradigm shift in patient care. But even without these new services, ARTEMIS already represents a major advance; it enables clinicians to capture the complete clinical history of a patient that may be spread out over a number of different institutes that do not interoperate. Cite This Page:
<urn:uuid:55ffe66b-7761-4414-8682-3f8ee8233d64>
CC-MAIN-2014-35
http://www.sciencedaily.com/releases/2006/01/060103182421.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909040132-00356-ip-10-180-136-8.ec2.internal.warc.gz
en
0.91126
1,597
2.59375
3
Sir John Johnson House National Historic Site of Canada Sir John Johnson House Links and documents 1784/01/01 to 1792/01/01 Listed on the Canadian Register: Statement of Significance Description of Historic Place Sir John Johnson House National Historic Site is a large, wooden house of typical nineteenth-century Ontario vernacular design, set amidst spacious grounds on the banks of the Raisin River in Williamstown, Ontario. The evolved house is built around a late eighteenth-century core. The designation refers to the house, as well as a shed, an ice-house, the remains of the west wing and the burnt layer from initial clearing of the land. Sir John Johnson House was declared a national historic site for: - its historical association with Sir John Johnson, - its age as one of the oldest surviving buildings in Ontario, - its architectural design. The heritage value of Sir John Johnson House lies in its illustration of late eighteenth-century frontier building techniques and in its association with Sir John Johnson. The original core of the house was built 1784-1792 as part of a complex of buildings centered around a mill. It was expanded around 1813-1830 (west addition), and in the early 1860s (east addition). Sources: HSMBC Minutes, May 1961; Commemorative Integrity Statement, 1996. Key features contributing to the heritage value of this site include: - the irregular, vernacular massing of the evolved house as expressed in its T-shaped footprint with a low rectangular one-and-a-half-storey original structure under a pitched roof broken by gables and chimneys, an extension to the east of similar massing and roof form, and a two-storey addition with a steeply pitched roof, and set at right angles to the original core, - the siting and orientation on a knoll with viewplanes over the Raisin River, - the eighteenth-century core in its surviving classically inspired design, form and materials including: - the symmetrical, five-bay main elevation, with central entry, gable and chimney, and simple, regularly spaced fenestration, - the front-sloping pitched roof, - evidence of original centre-hall interior plan, - its pièce sur pièce log construction, - surviving original pine log, wood clapboarding and shingling, - archaeological features associated with the Sir John Johnson period including remains of the first west wing construction and the burnt layer from initial clearing of the land. Government of Canada Historic Sites and Monuments Act National Historic Site of Canada 1784/01/01 to 1813/01/01 1813/01/01 to 1830/01/01 1860/01/01 to 1865/01/01 Theme - Category and Type - Expressing Intellectual and Cultural Life - Architecture and Design - Peopling the Land Function - Category and Type Architect / Designer Location of Supporting Documentation National Historic Sites Directorate, Documentation Centre, 5th Floor, Room 89, 25 Eddy Street, Gatineau, Quebec Cross-Reference to Collection
<urn:uuid:eab917e9-ad5f-45e9-8f37-f8de0c6486ae>
CC-MAIN-2023-50
https://www.historicplaces.ca/en/rep-reg/place-lieu.aspx?id=7866
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00805.warc.gz
en
0.889443
666
3.171875
3
Turkey and Syria earthquakes: The growing number of fatalities brings a greater awareness of human vulnerability to everyone. Emergency management enables people with a public service mentality to feel satisfaction about helping communities to recover from disasters. An emergency can come in many different forms and strike at any time. Learn about emergency preparedness like creating an emergency kit and contact plan. An accurate forecast can save lives and property. Climate changes – especially the type of changes that cause major weather events – are a concern. If you look at climatology or snowfall records over the past 100 years, the groundhog is correct the majority of the time about the weather. Starting February 1, travelers and commuters must wear face masks on nearly all forms of public transportation, due to a federal mask mandate. The live event industry is uniquely qualified to assist emergency managers and public health officials build and run vaccination sites. Here’s why the nation should turn to them for help defeating COVID-19. The pandemic has had major short- and long-term consequences for local towns. Listen to a town manager share his strategies about maintaining trust and keeping citizens informed.
<urn:uuid:330b81e8-0cb5-46b1-96e5-999641a45794>
CC-MAIN-2023-23
https://apuedge.com/category/public-safety/emergency-management/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00687.warc.gz
en
0.946028
232
2.75
3
Also found in: Dictionary, Thesaurus, Encyclopedia. Related to dental identification: Forensic odontology, odontologists Etymology: L, dens, tooth, idem, the same, facere, to make the process of establishing the unique characteristics of the teeth and dental work of an individual, thereby permitting the identification of the individual by comparison with his or her dental charts, records, plaster casts, radiographs or dental images, bite marks, and records. See also forensic dentistry. The use of the unique characteristics of a person's teeth or dental work as recorded in dental charts, radiographs, and records to establish the person's identity.
<urn:uuid:838b69e1-0429-4c0d-bde6-921e564bf67b>
CC-MAIN-2017-26
http://medical-dictionary.thefreedictionary.com/dental+identification
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00691.warc.gz
en
0.860703
137
3
3
When hundreds of paintings are found at a sandstone cave in a remote corner of Australia, it sparks world attention. The monumental discovery sets in motion one women’s journey to learn about her ancient ancestors and connect to her homeland, a place she never knew. It also captures the attention of a group of rock art specialists and scientists, who respond to her call for help and travel across the globe to uncover the cave’s age-old secrets. Their findings change world history and trigger a race to protect the paintings and their rocky home from myriad threats, both natural and man-made. How does the project meet the aims of a philanthropic foundation? The documentary has been made at the request of a group of Jawoyn elders who want to: 1. Advance global understanding of Aboriginal culture. 2. Document and showcase cultural stories, paintings, cultural knowledge and traditions. 3. Raise awareness about protecting and preserving cultural heritage sites and knowledge. 4. Inform and inspire future generations. On a more personal level, traditional owner Margaret Katherine wants the citizens of the world to see her special, spectacular site and for people to join her journey to learn about her ancestors and reconnect with her homeland. Margaret fears the younger generation aren't listening to their elders and important cultural knowledge is being lost. She sees Spirits in the Stone as an important way to capture stories and showcase the rich cultural heritage and rugged beauty of her untouched corner of Arnhem Land - a place so remote and protected, only a few will ever get to see with their own eyes. The film should also be supported because it focuses on important work in science and history. Specifically, Spirits in the Stone: 1. Showcases findings that change world history. 2. Illustrates the life and times of early humans, the first forms of human expression, technological and cultural advances. 2. Documents important scientific and historical research in Australia. 3. Highlights archaeology of living culture - where Aboriginal elders work with archaeologists. 4. Examines issues around conservation and protection of important cultural sites. What outcomes do you hope to achieve by making this film and how will you measure its impact? Aims & Objectives The greatest outcome for the film will be to fulfill the desires of the Jawoyn elders and traditional owner Margaret Katherine, as outlined above. Some of this success can be measured through qualitative and/or anecdotal evidence, and can also be found in increased interest in Indigenous cu lture, a growth in an interest of Arnhem Land, increased funding and work in documenting, researching and preserving Aboriginal cultural and art sites. From a more commercial perspective, the films impact can be measured through: - National and international broadcast and distribution on television - Invitations to screen at film festivals - Invitations to broadcast film and speak at community events - Inclusion in school curriculum - Positive media coverage and fi lm reviews - Social media presence What is your education and outreach strategy? Spirits in the Stone outreach and education strategy involves the following: - Television: Broadcast and distribution in Australia and internationally. - On demand / direct sales: Sales to on-demand sites including Netflicks andiTunes. - DVD/Blue-Ray: Worldwide distribution on hard media. - Film Festivals: We plan to enter a feature version of the documentary for screening at Cannes (Europe), Sundance Film Festival (US), Sydney Film Festival (Australia) and Toronto (Canada) and other festivals around the world. - Community: The film will be made available for community screenings in Indigenous communities. - Study guide: This will be an option if schools would like to feature the documentary in their curriculum. - Online: An interactive website is key to showcasing the film - www.spiritsinthestone.com - The site can be further developed to showcase the key issues, character profiles and an exploration of the site. - Social media: Social media is an important platform to promote the film and to connect with networks across the globe. Account have already been established on Twitter and Facebook.
<urn:uuid:c88b8661-b96a-4527-bce9-36a2b4ced835>
CC-MAIN-2019-22
http://www.documentaryaustralia.com.au/films/439/spirits-in-the-stone
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257259.71/warc/CC-MAIN-20190523143923-20190523165923-00124.warc.gz
en
0.916754
843
2.984375
3
At a minimum, investigations are conducted for the following: any injury, significant property damage or equipment damage, any incident that violates school policy or is criminal in nature. Investigations should serve as the following: determine the root causes, determine contributing factors, prevent similar incidents from occurring, document facts, provide information statistics and promote safety and security. Documenting the Investigations It is critical that each investigation be fully documented, and each is documented using a standard incident form. These forms can be found in the Public Safety Office or in the Office of Student Life. Completing the Incident Report Fill in the following blocks: nature of incident, date and time of report, complainant (name of person), location of incident, narrative (detailed description of incident), name of reporting officer or person performing the investigation. As part of orientation training, each employee is informed of the necessity to report any accident/incident immediately. The Director of Public Safety performs a self-audit of the site to verify implementation of the incident reporting and investigation program.
<urn:uuid:ad73bde4-ee03-448f-8805-bce9513d7c16>
CC-MAIN-2014-42
http://www.wlc.edu/safety/index.aspx?id=5304
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444312.8/warc/CC-MAIN-20141017005724-00018-ip-10-16-133-185.ec2.internal.warc.gz
en
0.927335
214
2.53125
3
Chief Agricultural Officer at Mars, Incorporated; Senior Fellow in the Department of Plant Sciences College of Agriculture and Environmental Sciences, University of California, DavisNo slides used Thirty seven percent of the children under the age of 5 in rural Africa are stunted due to chronic hunger and malnutrition. Improving the nutrition of the fundamental food system of Africa, which has not been studied by science, and the translation to scale are crucial to eradicating stunting. The African Orphan Crop Consortium (AOCC) is an uncommon collaboration which includes the African Union Commission (AUC) and African governments (through NEPAD), international organizations (FAO, UNICEF), companies (Illumina, Google, Mars), scientific bodies and civil society organizations working to improve the nutritional values of the food crops that 600 million rural Africans depend on. The AOCC hopes by the end of 2019 to have sequenced the genomes of 101 crops. Its third class of African plant scientists will graduate in 2018 from its African Plant Breeding Academy (AfPBA) led by UC Davis, in Nairobi, hosted by the World Agroforestry Centre. These scientists are trained at no cost to them on the world’s best equipment to re-sequence the genomes, breed more nutritious and resilient varieties for African farming families. Graduating scientists have returned to their home countries to establish national and regional orphan crops consortia. Currently there are 81 breeding programs in place. What has to happen to make sure we go from discovery to translation to scale?
<urn:uuid:4a0760cf-5953-4902-8b4a-40fdd59de8d2>
CC-MAIN-2019-18
https://goldlabfoundation.org/presentations/stunting-caused-by-chronic-hunger-and-malnutrition-is-a-crime-against-humanity/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578762045.99/warc/CC-MAIN-20190426073513-20190426095513-00118.warc.gz
en
0.940079
314
3.140625
3
Kearneysville in Jefferson County, West Virginia — The American South (Mid-Atlantic) Erected 1970 by West Virginia Department of Archives and History. Location. 39° 20.826′ N, 77° 56.135′ W. Marker is in Kearneysville, West Virginia, in Jefferson County. Marker is on Kearneysville-Virginia Line Road half a mile west of Leestown Pike, on the right when traveling west. Touch for map. Marker is in this post office area: Kearneysville WV 25430, United States of America. Other nearby markers. At least 8 other markers are within 4 miles of this marker, measured as the crow flies. “The Bower” (approx. 0.8 miles away); Johnsontown (approx. 2.4 miles away); Cedar Lawn (approx. 3.1 miles away); Harewood (approx. 3.2 miles away); Jefferson County / Berkeley County (approx. 3.4 miles away); Richwood Hall (approx. 3.9 miles away); "Travelers' Rest" (approx. 3.9 miles away); The Greenback Raid (approx. 3.9 miles away). Touch for a list and map of all markers in Kearneysville. Also see . . . Gen. Charles Lee - US Revolutionary War. (Submitted on October 4, 2008, by Bill Pfingsten of Bel Air, Maryland.) Categories. • Animals • Military • Notable Persons • War, US Revolutionary • Credits. This page was last revised on June 16, 2016. This page originally submitted on October 4, 2008, by Bill Pfingsten of Bel Air, Maryland. This page has been viewed 1,671 times since then and 34 times this year. Photos: 1, 2. submitted on October 4, 2008, by Bill Pfingsten of Bel Air, Maryland.
<urn:uuid:2899ce0c-5250-4f4e-8cc4-b1dc5aa23f94>
CC-MAIN-2017-22
https://www.hmdb.org/marker.asp?marker=12069
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612018.97/warc/CC-MAIN-20170529053338-20170529073338-00245.warc.gz
en
0.90292
401
2.53125
3
Incidence and Characterization of Feedlot Lambs and Ewe Flock Lameness Sheep production in Canada is increasing (one million head on 11,000 farms of which 2,000 farms are in Alberta), due to the growing demand for lamb meat by consumers over the last five years as a result of growing ethnic markets. Consequently, both ewe flocks and growing/finishing lamb feedlots have been increasing in number and size within Alberta to meet the demand for this growing market. Lameness is a common cause of welfare and economic concern in most sheep producing countries. For example, Healthy foot vs foot affected with foot rot Canadian sheep and lamb producers consider lameness a serious health and welfare issue, resulting in high culls rates of breeding stock, reduced ewe productivity, slow growth performance of feeder lambs, and high Lame feedlot sheep Knowledge generated by this research team on the occurrence, types and causes of lameness will help improve how producers and veterinarians diagnose lameness to improve prevention, treatment and control of the disease. This will benefit both animal health, welfare and production economics by providing sheep producers and small ruminant veterinarians with science-based information regarding disease diagnostics and animal management risk factors. This information is critical in mitigating the effects of lameness in the Alberta sheep industry. As well, it will help identify additional areas of research to help prevent the most common causes of lameness e.g. best management practices and new vaccines. Research Team members needed: YOU –THE PRODUCERS! We invite you to help us study this problem so that together we can learn how to minimize sheep lameness and improve animal welfare and productivity. What we are asking: We are looking for producers who are willing to share information with us via mail, email, fax or text, in the event that they have a lameness case arise on their farm. The information we would like you to collect includes animal identification, history of lameness for the animal and farm, diagnosis, treatment, results of treatment, photographs of lesion, comments such as severity of the lameness (ability to bear weight or not), recent weather events, and pen or pasture conditions (wet or dry). Forms will be provided to facilitate recording and reporting cases of lameness. For further information: [email protected] or 403-915-5864
<urn:uuid:f0e4a79e-7302-4122-8c1c-e3b349c0c72e>
CC-MAIN-2023-14
https://www.afac.ab.ca/incidence-and-characterization-of-feedlot-lambs-and-ewe-flock-lameness/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00122.warc.gz
en
0.926436
500
2.75
3
Leaders who think they have the individual power to change a system not only fool themselves while most likely trying to do so by capturing and keeping power for themselves. This is referred to as selfish or personal power. By trying to capture more personal power to make the difference they seek, they in fact will fail over time. Capturing and keeping selfish power cannot achieve sustainable leadership. Selfish power results in staff alienation, mistrust, withholding valuable resources, protecting turf, favoritism and selected communications. A leader does seek power, but it is not personal power they seek, but power that truly makes the difference. This is referred to as social power and today we know it as empowerment. Unfortunately, the term empowerment is an often overused and misused concept; but it does accurately mean that a leader will distribute any power attained back to the people in the organization. Social power is built on trust which every successful leader and organization must have as a value and practice. Social power is sharing information, aligning resources, building a positive culture, delegating responsibility, developing skills within others, accountability and establishing multiple means of effective communications. Sustainable leadership is inclusive therefore the practice of empowerment is spread throughout all levels within an organization. Empowering others results in a workforce better prepared to move forward and be successful. It is this workforce community that defines leadership rather than by the individual in that position. Sustainable leadership is never about the individual while individuals in authoritative positions may not be sustainable leaders if they view themselves as the greatest source of power in the organization. Sustainable leaders are those that realize the need for and practice empowerment.
<urn:uuid:1879ce33-aff1-40ed-8aaa-dd4d23c4c397>
CC-MAIN-2021-39
https://www.leadteamconsulting.com/blog-archive/archives/09-2016
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055684.76/warc/CC-MAIN-20210917151054-20210917181054-00075.warc.gz
en
0.963919
324
3.078125
3