text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
Concerns culminating in the withdrawal of several selective COX-2 inhibitors, like Vioxx, have many arthritis sufferers searching for answers and alternative therapies.Afflicting one in three adults in America, the two most common forms of arthritis are osteoarthritis (OA) and rheumatoid arthritis (RA).Osteoarthritis, the most prevalent joint condition, often occurs with aging as cartilage wears down over time, causing swelling and pain as bone rubs against bone.Rheumatoid arthritis is an autoimmune disease in which the immune system mistakenly attacks healthy joint tissue, causing inflammation and joint damage.Diet and lifestyle habits have the potential to either aggravate or alleviate the symptoms of both conditions.We’ve combed the scientific literature for nutrients and habits that can help reduce the inflammation and pain associated with arthritis: Lose Weight - If you’re among the majority of Americans who are either obese or overweight, slimming down can significantly slow progression of joint degeneration and ease pain.In fact, you can reduce knee stress by 40 to 80 pounds with a mere 10-pound weight loss according to the Arthritis Advisor. Increase Vitamin C - According to a Boston University study, people getting under 150 mg daily of vitamin C had faster cartilage breakdown.Best sources include: citrus fruit, pineapple, kiwi, broccoli, cauliflower, cantaloupe, papaya, strawberries, tomato, sweet and hot peppers, kale, collard greens and sweet potato. Increase Omega-3 Fatty Acids - Helps RA by reducing inflammation.The best sources are fish such as salmon, halibut and sardines.Plant sources include flaxseed oil, pecans, walnuts, tofu and leafy green vegetables. Increase Vitamin D - Research suggests those who meet their daily D requirements are less vulnerable to arthritis pain.The mechanism may be greater absorption of calcium, which is important for bone health.Best sources are oysters, button mushrooms, sardines and sunshine. Increase Calcium - Holds the line against OA by slowing bone loss.Best sources include non-fat dairy, collard greens, rhubarb, soybeans and arugula. Try Tea - Green and black tea contain flavonoids, antioxidant compounds that may block the production of prostaglandins, which cause inflammation and pain. Increase Fruit & Veggie Intake - Harvard research found a link between low fruit and vegetable consumption and higher risk of RA.High fiber, water and nutrient content also help with weight management and protection against free radical damage. Limit Saturated Fats - “Too much saturated fat is counterproductive for fighting arthritis,” says Cornell University’s Food & Fitness Advisor. Limit red meat, in particular.British researchers found that too much red meat increased the risk of RA. Those who ate the most red meat were twice as likely to develop RA than those who limited their intake to less than an ounce per day. For more arthritis information, visit www.arthritis.
<urn:uuid:1901b9ae-c119-4834-9839-d47177880abc>
CC-MAIN-2014-42
http://www.dole.com/Articles/2005/06/Joint-Venture
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646008.13/warc/CC-MAIN-20141024030046-00068-ip-10-16-133-185.ec2.internal.warc.gz
en
0.922419
627
2.546875
3
Easy to make, patterned, Schottky barriers are investigated. In particular, the following aspects have been considered: the patterning technique, the electrical barrier height, and potential usage as solar cells. Patterning of the Si surfaces was achieved by photoablation process using an UV excimer laser in a presence of various solutions. Using a 5 mW red HeNe laser launched at various angles on the Si surface we have found that patterned solar cells ablated with 2:3:100 of HF:HNO3:H2O were as much as 23% more efficient than nonpatterned cells. All Science Journal Classification (ASJC) codes - Physics and Astronomy(all)
<urn:uuid:d7f47036-aaa4-4dc1-934b-e039a9bdb5ac>
CC-MAIN-2022-27
https://researchwith.njit.edu/en/publications/photoablation-schottky-barriers-on-patterned-si-surfaces
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103639050.36/warc/CC-MAIN-20220629115352-20220629145352-00304.warc.gz
en
0.948041
145
2.953125
3
Natural History of Patients With Brain and Spinal Cord Tumors This study offers evaluation of patients with brain and spinal cord tumors. Its purpose is threefold: 1) to allow physicians in NIH s Neuro-Oncology Branch to increase their knowledge of the course of central nervous system tumors and identify areas that need further research; 2) to inform participants of new studies at the National Cancer Institute and other centers as they are developed; and 3) to provide patients consultation on possible treatment options. Children (at least 1 year old) and adults with primary malignant brain and spinal cord tumors may be eligible for this study. Participants will have a medical history, physical and neurological examinations and routine blood tests. They may also undergo one or more of the following procedures: - Magnetic resonance imaging (MRI) MRI is a diagnostic tool that uses a strong magnetic field and radio waves instead of X-rays to show detailed changes in brain structure and chemistry. For the procedure, the patient lies on a table in a narrow cylinder containing a magnetic field. A contrast material called gadolinium may be used (injected into a vein) to enhance the images. The procedure takes about an hour, and the patient can speak with a staff member via an intercom system at all times. - Computed axial tomography (CAT or CT) CT is a specialized form of X-ray imaging that produces 3-dimensional images of the brain in sections. The scanner is a ring device that surrounds the patient and contains a moveable X-ray source. The scan takes about 30 minutes and may be done with or without the use of a contrast dye. - Positron emission tomography (PET) PET is a diagnostic test that is based on differences in how cells take up and use glucose (sugar), one of the body s main fuels. The patient is given an injection of radioactive glucose. A special camera surrounding the patient detects the radiation emitted by the radioactive material and produces images that show how much glucose is being used by various tissues. Fast-growing cells, such as tumors, take up and use more glucose than normal cells do, and therefore, the scan might indicate the overall activity or aggressiveness of the tumor. The procedure takes about an hour. When all the tests are completed, the physician will discuss the results and potential treatment options with the patient. Follow-up will vary according to the individual. Some patients may end the study with just one visit to NIH, while others may be followed at NIH regularly, in conjunction with their local physicians. Patients with aggressive tumors may be seen every 3 or 4 months, while those with less active tumors may be seen every 6 to 12 months. Permission may be requested for telephone follow-up (with the patient or physician) of patients not seen regularly at NIH. |Study Design:||Time Perspective: Prospective| |Official Title:||Evaluation of the Natural History of Patients With Tumors of the Central Nervous System| - To evaluate patients with tumors of the central nervous system (CNS) who are probable future candidates for NCI Phase I and II protocols. [ Time Frame: Open ended ] [ Designated as safety issue: No ] - To follow patients with tumors of the CNS that are representative of important scientific and/or clinical principles. [ Time Frame: Open ended ] [ Designated as safety issue: No ] - To allow a steady flow of patients with tumors of the CNS at the NIH for the purpose of educating nurses, medical students, residents, clinical fellows, and physicians in the management and care of this specialized subgroup of cancer patients. [ Time Frame: Open ended ] [ Designated as safety issue: No ] |Study Start Date:||January 2001| This protocol is designed to evaluate patients with tumors of the central nervous system (CNS) who appear to be probable candidates for future protocol entry or have disease manifestations that are of unique scientific interest, importance, and/or educational value. To evaluate patients with tumors of the central nervous system (CNS) who are probable future candidates for NCI Phase I and II protocols. To follow patients with tumors of the CNS that are representative of important scientific and/or clinical principles. To allow a steady flow of patients with tumors of the CNS at the NIH for the purpose of educating nurses, medical students, residents, clinical fellows, and physicians in the management and care of this specialized subgroup of cancer patients. All patients greater than 12 months of age with tumors of the CNS of interest to the NOB, who may be candidates for another NOB trial at some point in the future. Patients with tumors of the CNS that are of particular interest to members of the NOB because they pose important clinical and/or scientific questions and/or shed light on important aspects of the disease. Patients with tumors of the CNS who offer an important educational benefit to neuro-oncology trainees and staff. Ability of subject or Legally Authorized Representative (LAR) to understand and the willingness to sign a written informed consent document. Availability of a parent or legal guardian to give informed consent for children. All patients will undergo an initial evaluation at the Clinical Center by a member of the NOB where past medical and oncologic histories will be obtained as well as relevant data such as neuroimaging and pathology review. A total of 3,000 patients will be accrued to this study. Patients may be seen at the NIH Clinical Center at varying intervals depending on the clinical situation but data related to the natural history of their disease course and outcome will be collected at least every six months. Please refer to this study by its ClinicalTrials.gov identifier: NCT00009035 |Contact: Tracy Cropper, R.N.||(301) [email protected]| |United States, Maryland| |National Institutes of Health Clinical Center, 9000 Rockville Pike||Recruiting| |Bethesda, Maryland, United States, 20892| |Contact: For more information at the NIH Clinical Center contact National Cancer Institute Referral Office (888) NCI-1937| |Principal Investigator:||Mark R Gilbert, M.D.||National Cancer Institute (NCI)|
<urn:uuid:34959caf-5970-4338-8357-d5ba7720d3af>
CC-MAIN-2015-18
https://clinicaltrials.gov/ct2/show/NCT00009035?term=Brain+and+Spinal+Tumors&rank=2
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430455283053.76/warc/CC-MAIN-20150501044123-00055-ip-10-235-10-82.ec2.internal.warc.gz
en
0.90811
1,297
3.296875
3
Nutrition: how to pack your kids a healthy lunch THE start of a new school year not only means new uniforms and shiny shoes, for many families September means getting back to the routine of making packed lunches for your little ones. ::What's in your child's lunchbox? Around 42 per cent of children in Northern Ireland take a packed lunch to school. A few years ago, The Food Standards Agency carried out a survey of school lunch boxes and found that we are packing our children's lunches with too much fat, saturated fat, salt and sugar. If you think that the average kid's lunchbox contains a white bread sandwich or roll (82 per cent), crisps (69 per cent) and biscuits or chocolate (58 per cent), it is not surprising that a child eats twice the recommended lunchtime intake of saturated fat and sugar, and up to half their daily salt intake in their lunch. In this survey, only one in five packed lunches contained any vegetables or salad and about half included an item of fruit. The food your children eat at lunch time needs to work hard to maintain their energy and concentration all afternoon as well as providing them with essential vitamins, minerals, fats, protein and carbohydrate for optimum nutrition so they can grow and thrive. :: Some healthy lunchbox ideas Before we get down to specifics, here are the basics of what you need to include to ensure your child is getting a healthy balance: :: A portion of carbohydrate-based food like a wholemeal roll or bread, wraps, pitta pocket, pasta or rice salad. Choose whole grains instead of white, refined carbohydrate to help maintain and sustain your child's energy throughout the afternoon. If that is a step too far, then try introducing 50:50 varieties at first. :: Include a portion of protein to help concentration and energy. Choose meat, chicken, cheese, yoghurt, houmous, fish or eggs. :: Include at least two of their five portions of fruit and vegetables a day; an apple, a small fruit pot, some salad or carrot sticks, for example. :: A portion of dairy produce like cheese or a yoghurt. :: A drink – water is best. :: Lunchbox ideas If the start of term fills you with dread at the thought of having to magic up nutritious food for your child's lunchbox every day, here are a few simple ideas to help inspire you. :: For a change from sandwiches, try wholemeal pitta pockets packed with chicken or tuna and some vegetables. Tuna, red pepper or grated carrot are usually a hit with kids. :: Swap crisps for little pots of humous with carrot sticks. :: Always include at least one vegetable and one piece of fruit. Carrot sticks, sugar-snap peas and cherry tomatoes are good finger foods. :: For younger children, pack in little boxes of chopped fruit rather than a whole piece of fruit as these can be easier to eat. :: Pasta, couscous or rice are a good base for salads with tuna, oily fish like salmon or chicken. Add some grated carrot, chopped tomatoes and vegetables for colour and interest, and make enough to do a couple of days. :: A flask of soup with a wholemeal sandwich is filling and nutritious. Homemade soups are quick and easy to make and can be frozen in portion sizes. :: Include some low sugar yoghurt. If your child does not like natural yoghurt, then make sure you check the label for low sugar (that means 5g or less per 100g), but be careful not to include yoghurts containing artificial sweeteners. :: For drinks, milk or water is best. Get your kids involved in planning and shopping for school lunches. Talk to them about making healthy choices and get their ideas about what they would like to eat. They may surprise you!
<urn:uuid:6ffc9cf1-e137-410f-a841-704b8dcc603a>
CC-MAIN-2020-34
http://www.irishnews.com/lifestyle/2018/09/01/news/nutrition-how-to-pack-your-kids-a-healthy-lunch-1417421/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740343.48/warc/CC-MAIN-20200814215931-20200815005931-00302.warc.gz
en
0.94382
802
3.09375
3
Genre: eLearning | Language: English This 2D environment design course covers the basic principlesof creating environment design, and the foundation and methods of creating environment design from start to finish. Here you will take a journey through the whole process which is very commonly used in the film and video game industry. Starting with basics like perspective, lighting, value structure, composition and then taking you through each and every step and ending with the demonstration of good use of photo bashing technique. Here the clearly explained and demonstrated workflow will make it very easy for the beginners to start their artistic journey.
<urn:uuid:1720ddb2-2248-4523-bb5a-d700e4520e4b>
CC-MAIN-2017-34
http://www.0daydown.com/11/646749.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104634.14/warc/CC-MAIN-20170818102246-20170818122246-00172.warc.gz
en
0.802872
118
3.28125
3
The graph, when defined as a set of places and connections between them, can be used to describe a large number of situations. It began rather simply, as so many things have, with a problem posed to a talented mathematician. In this case, the problem was given to the great Leonard Euler. It was simple enough and dealt with the Old Prussian town of Konigsburg and the seven bridges that connected the two islands to the sections on the banks of the Pregel River. The question was a fundamental one, “Is it possible to walk across each bridge exactly once in a tour of the city?” Euler proved that it was not possible and in his reduction of the problem to locations and connections, inspired the invention of graph theory. His proof is so easy to understand that it is often presented in basic math classes. Higgins improves on this, demonstrating some of the enormous variety of problems that graph theory can be applied to. Everything from family and hierarchical trees, manufacturing processes to modern computer connections are modeled using graphs. Graph theory is now so important that we offer a course in graph theory designed for computer science majors. This book is a popular account of graph theory; nothing resembling a formal proof appears until the last chapter, which is reserved for that purpose. The exposition is clear and diagrams are included when needed. They are very helpful, clearly demonstrating the application of the technique described in the text. My favorite problem was circular Sudoku. My daughter has purchased over ten Sudoku books and has spent hours working the problems. I do not think it is a coincidence that her math grades have shown a significant improvement since she started working these problems. This popular introduction to the history and applications of graph theory is as complete as such a work can be. It starts at the beginning and steps through many of the major problems that have made this such a valuable and necessary area of mathematics in the modern world. Charles Ashbacher splits his time between consulting with industry in projects involving math and computers, teaching college classes and co-editing The Journal of Recreational Mathematics. In his spare time, he reads about these things and helps his daughter in her lawn care business.
<urn:uuid:16d6fa91-2cc7-4426-8492-9150041a7380>
CC-MAIN-2017-17
http://www.maa.org/press/maa-reviews/nets-puzzles-and-postmen-an-exploration-of-mathematical-connections-0
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124371.40/warc/CC-MAIN-20170423031204-00101-ip-10-145-167-34.ec2.internal.warc.gz
en
0.976696
444
3.578125
4
c# operator nullable types The C compiler adds lifted operators which effectively proxy to the original operators for T. At the risk of sounding like a broken record, this is still a value type. It doesnt involve boxing and when you write: Int? x null Thats not a null reference - its the null value of Nullable, i.e. the one where Nullable types have been introduced in the C programming language.The null coalescing operator (represented as ??) is used to define the default value that would be returned when you assign a nullable type to a non-nullable type. One of the most versatile and useful additions to the C language in version 6 is the null conditional operator.If B is a value type, the expression A?.B is the nullable type that wraps the underlying value type represented by B. Nullable Type in C: As you know, a value type cannot be assigned a null value. For example, int i null will give you a compile time error.Nullable type allows assignment of null to value types. ? operator is a shorthand syntax for Nullable types. In C 2.0, the basic data types have nullable equivalents.The relational operators are all valid for use with nullable numeric types. When the value being compared is null, the results are not always as expected. Every C developer knows how to work with value types like int, double, boolean, char, and DateTime. Theyre really useful, but they have one flaw: they cant be set to null. Luckily, C and .NET give you a very useful tool to for this: nullable types. The relevant section of the C 3.0 spec is 7.13, the conditional operatorC needs to figure out the type regardless of what is to the left of the assignment. So you are telling it that youll return a null or an int and the logic in the compiler doesnt exist to have it substitute a Nullable as a common Adding non-nullable types to C seems, on the surface, easy. Put a ! at the end of the type to mean non-nullable, add some nullable/non-nullable conversation operators, implement a few compiler checks and youre done right? c type-conversion resharper nullable resharper-2016.Objects based on nullable types are only boxed if the object is non-null. If HasValue is false, the object reference is assigned to null instead of boxing This optimization is possible because a boxed value is a reference type that can already express null. C also permits the unboxing of nullable types with the as operator. The result will be null if the cast fails C provides language support for nullable types using a question mark as a suffix.A nullable type can also be used as the right hand side of the as operator, with the natural consequences. Like nullable types, null-conditional operators can be used now. Just put a ? (question mark) after the instance before calling the property on top of it.For example, lets see a simple if condition which we will then see with the null-conditional operator in C 6.0 int? xnull Allowed. While using nullable types you can check if a variable is null the same way you do it with non-nullable types and a constantIn this case the C .net framework lets you set a default value when you try to assign a nullable type to a non-nullable type, using the ?? operator. The nullable type modifier enables C to create value-type variables that indicate an undefined value. Examples of Nullable Types.d c, unless c is null, in which case d -1. int d c ?? -1 This operator can also be used with multiple nullable types. For example Select language ActionScript Ajax Android AngularJS Apache Configuration AppleScript ASP.NET ( C) AutoHotkey BashAs mentioned by Lee, subpet might be null. So, in calling subpet.Name throw an exception.Hence, ?? check the subpet is null or not, and ? back to the calling .Name property. C provides a special data types, the nullable types, to which you can assign normal range of values as well as null values.The null coalescing operator is used with the nullable value types and reference types. The null-coalescing operator works with nullable value types and reference types.Bitwise operations and Flags (C). DRY! GenericComparer for sorting Generic Lists. [ c] Instantiating an object with a private constructor. Here I am going to explain what is nullable type, what is the null coalescing operator in C, and how we can use this operator in LINQ. The data types in C are divided into two main categories: Value Type and Reference Type. conditional-operator c nullable. Add Fav.c - Deserialisation with JSON.NET - how to handle one name for two possible types? c - Why does Visual Studio resort to single-line comments when commenting a multi-line selection with "Comment Selection"? where (??) is the operator and a, b, c are all Maybe types. Id expect this code to return the first value that is Just or 1 if all of a, b, c are Nothing. Im basically looking to replicate the same functionality as the null coalescing operator youd find in C or other languages. This article provides brief idea about nullable data types in C and how to handle nullable data types. In the above, we are assigning 100 to local int variable i if GetIdFromDB() method returns null value by using ?? operator. Conditional operator assignment with Nullable types? The problem occurs because the conditional operator doesnt look at how the value is used (assigned in this case) toIf you really want to use it in this way, you must cast one of the values to Nullable yourself, so C can resolve the type Cs Support for Nullable Value Types. Cs Null-Coalescing Operator. The CLR Has Special Support for Nullable Value Types. As you know, a variable of a value type can never be null it always contains the value types value itself. Null coalescing operator id used to handle null values. Before knowing null coalescing operator we have to first know nullable type. C nullable types. The ?? operator works for both reference types and value types. For example, below we are checking whether the nullable integer "number" variable is null.Summary. You can use the C ?? operator in all types of scenarios. Hopefully the LINQ to XML scenario above provides some interesting food for Okay, I have done some thinking and testing. This is what happens: Int value nullableInt?.Value Gives this error message when compiling: Type int does not contain a definition for Value. That means that ? converts the int? into the actual int value. In C, if I write int? x null x x ?? 1 I would expect this to be equivalent to: int? x null x x x ?? 1 And thus in the first example, x would contain 1 as in the second example. But it doesnt, it contains null. The operator doesnt seem to work on nullable types when they havent been assigned. As you can see, if nFirst has a value, the assignment will happen otherwise, the assignment is skipped. Using Operators with Nullable Values: Lifted Operators. Nullable types is a part of the ECMA-334 version of C. Youll need a compiler that supports this C standard to use nullable types. In C, if I writeint? x null x x ?? 1I would expect this to be equivalent to:int? x null x x x ?? 1And thus in the first example,xwould cThe operator doesnt seem to work on nullable types when they havent been assigned. ?? Operator (C Reference). 07/20/2015. 2 minutes to read.Remarks. A nullable type can represent a value from the types domain, or the value can be undefined (in which case the value is null). The fact that reference types are nullable in C should best be thought of as a coincidence not an explicit effect.The null conditional operator they added in C 6.0 made it much easier to do null checking (and therefore, avoid NullReferenceExceptions), and its a change that is universily loved. This tip explains the basics of nullable types and the coalescing operator for C for beginners. Handling null in C can be very confusing for developers. Basically, it provides a way to assign null to value types in C code. C. .NET. 0 Comment(s).int? is a nullable value type. ? : lift operator. Example So I thought I wanted to use that latest, hottest stuff that Microsoft had to offer in C.I immediately ran off to search the interwebs on how to use this operator with Nullable types and found a solution that said to use. The problem is that the ternary operator is inferring type based on your first parameter assignment10 in this case, which is an int, not a nullable int.The reason you see this is because behind the scenes youre using Nullable and you need to tell C that your "null" is a null instance of Nullable. Null Coalescing Operator catname C Examples Source code Examples.C Examples » Data Type » Nullable ». Null Coalescing Operator. using System class MainClass . static void Main() . Abstract: The C Null Coalescing Operator (??) is a binary operator that simplifies checking for null values. It can be used with both nullable types and reference types. In this article, we will see how to use the Null coalescing operators in practical scenarios. This is useful when working with nullable types.You can read a nice blog post about the C null-coalescing operator in ScottGus blog. Posted by Nuno Freitas on June 4, 2013. The System.Nullable Structure C 2.0 provides a System.Nullable generic type struct that you can use to define nullable types.public static explicit operator T(T? value) If you really want to use it in this way, you must cast one of the values to Nullable yourself, so C can resolve the type: EmployeeNumber string.IsNullOrEmpty(employeeNumberTextBox.Text) ? (int?) null : Convert.ToInt32(employeeNumberTextBox.Text), Or. How to: Identify a Nullable Type (C Programming Guide).The Value property has no default value. You can also use the and ! operators with a nullable type, as shown in the following example: if (x ! null) y x So C provides us a way to make that int variable of nullable type.Null Coalescing Operator. Have you came across some operator like double question mark ?? in code somewhere? Maybe you noticed it in our Operators Post.constant C Operator C judgment C cycle C Package C method C Empty type C Array(Array) C The string(String) C structure(Struct) CSimilar, Nullable variable can be assigned to true or false or null. In dealing with databases and other data types can contain unassigned elements Tags: c .net operator-overloading nullable assignment-operator.I always thought that the nullable types of the .NET framework where nothing but a nice construct that the framework gave us, but wasnt anything new added to the language itself. The nullable type modifier enables C to create value-type variables that indicate an undefined value.d c, unless c is null, in which case d -1. int d c ?? -1 This operator can also be used with multiple nullable types. For example: C. The coalesce operator works like this: if the first value (left hand side) is null, then C evaluates the second expression (right hand side). Summary. This lesson explained how nullable types can be useful in your C applications especially when working with values from a database. Nullable Type in C: As you know, a value type cannot be assigned a null value.Nullable type allows assignment of null to value types. ? operator is a shorthand syntax for Nullable types. Suggested Videos Part 3 - Built-in types Part 4 - String type Part 5 - Operators. In this video, we will discuss 1. Nullable types in C 2. Null Coalescing Operator ?? In C types are divided into 2 broad categories. In basic terms, a nullable data type is one that contain the defined data type or the value of null. The ECMA-334 standard for C provides nullableThe standard operators have been modified so that they "lift" the non- nullable values to being nullable and thus allow the standard operations to work. Nullable Types Null Coalescing Operator (Null Conditional Operators) in C Programming With Example null conditional operator c null coalescing operator
<urn:uuid:61811c80-73a4-45c5-8047-00155aeff06b>
CC-MAIN-2018-13
http://genostar.gq/str5130-c-operator-nullable-types.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257650188.31/warc/CC-MAIN-20180324093251-20180324113251-00041.warc.gz
en
0.871653
2,681
2.84375
3
by Courtney Belolan A high quality driving question provides motivation for learning. Often when we first start working with driving questions, or essential question, to frame learning the questions we come up with can feel a little, well, off. Just like with any skill, crafting good driving questions takes practice. The four tips below can help you make some gains. For each tip there is an example of a driving question using the following learning target: Understands the structures and functions of the major body systems 2. Place the target in a larger context. Sometimes a learning target is interesting enough in itself to motivate learning for most learners, others are not. If a particular targets feels dry when you think it, or try to make a question of it, then try thinking about where the target fits in the real world. The target itself should rarely be its own context for learning, and putting targets in a larger context makes them feel more relatable and interesting to many learners. Think about this example for our test target: How do doctors and scientists know what is happening inside the body? 3. Find the debate within the target. There is nothing like a good academic argument to get learners interested in a topic. No, really. If learners get a chance to debate, take sides, and try to prove other people wrong about something almost anything becomes interesting and worth learning about. The debate within a learning target does not have to be a big heated one, just something that makes learners think and ask a few more questions. Consider this example with our test target: To what extent should body systems be manipulated or enhanced by technology? 4. Find the fun in the target. We learn the most when we are enjoying ourselves, and all of us can describe times when we were teachers or learners when we had a ton of fun with a particular project, lesson, or unit. This one feels similar to putting the target in a bigger context, and the big difference is that this context should be smile inducing. Think about what a 4 year old would find awesome about the target, even if the learners working on it are 17. Try not to giggle at this example with our test target: Why does our body need blood, bile, brains and other weird goo? The Learner Centered Practices Blog
<urn:uuid:71de8733-194d-44fd-a773-1e39ded0e485>
CC-MAIN-2020-40
http://www.plearnmc.com/blog/four-tips-for-crafting-driving-questions
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402132335.99/warc/CC-MAIN-20201001210429-20201002000429-00433.warc.gz
en
0.943484
468
2.859375
3
The South African Institute of Race Relations (IRR) released the 2019/2020 report on LGBTQ rights in Sub-Saharan Africa at a media briefing on 14 November 2019. Even though views about homosexuality and transgender communities are becoming more tolerant around the world, Sub-Saharan Africa remains one of the “most hostile regions” in the world. The report can be viewed here. Why is this important? The report showed that, despite recent positive developments “there have also been a number of setbacks”, such as Nigeria’s Same Sex Marriage Prohibition Act, which came into effect in 2014. Not only does the new law prohibits same-sex marriage, but it also forbids any cohabitation between same-sex partners. In addition, it bans the public display of same-sex relationships. Anyone who “registers, operates or participates in or supports gay clubs, societies and organisations” could face up to 10 years behind bars. “Many people in the country interpret the definition of homosexuality as meaning not just same-sex activity between two male adults, but also same-sex activity between an adult and a child. In other words, many Malawians tend to conflate homosexuality with paedophilia.”Alan Msosa (Malawi) Same-sex activity is punishable by death in some stages of Nigeria, as well as the regions of Sudan, Mauritania and Somalia. It also carries a prison sentence of at least one year or more in the following countries: South Sudan, Liberia, Senegal, Togo, Cameroon, Kenya, Tanzania, Uganda, Eritrea, Ethiopia, Comoros and Zambia. South Africa, only slightly better According to the IRR’s research, “only in Cape Verde, South Africa, Mozambique and Namibia did the majority of the population display a high tolerance for gay people”. Before we rejoice, it should also be pointed out that four out of ten of those surveyed believed that being lesbian, gay, bisexual, transgender and intersex should constitute a crime. The IRR points out that “having a progressive, enlightened Constitution does not necessarily mean that the protections enshrined in the document trickle down to society.” “Nearly half of people surveyed in the African region believed that homosexuality was a foreign concept imported from the West.”IRR South Africa The IRR stated that South Africa’s “reluctance to defend LGBTQ rights in Africa is tragic”, following David Mabuza’s refusal to condemn the Ugandan government’s consideration of introducing an Anti-Homosexuality Bill. Most hostile country: Uganda Uganda’s newly-proposed Anti-Homosexuality Bill will include a death penalty for anyone “guilty” of homosexuality. “[It is so tragic] that in the more than 20 years, South Africa’s efforts to advance the rights and interests of LGBTQ people elsewhere in Africa have been lacklustre.”IRR Press release According to the IRR’s report, Simon Lokodo, Minister of Ethics and Integrity in Uganda, recently prevented an LGBTQ NGO known as Sexual Minorities from organising a celebration of International Day Against Homophobia, Bi-phobia and Transphobia. Lokodo also aimed to block the Health Ministry’s first annual conference on Key and Priority Populations, as it may encourage “homosexuality and other dirty things”.
<urn:uuid:245f9d65-db44-43c2-9332-cd4bf98b8163>
CC-MAIN-2019-51
https://www.thesouthafrican.com/news/irr-lgbtq-rights-report-africa-hostile-region/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540579703.26/warc/CC-MAIN-20191214014220-20191214042220-00470.warc.gz
en
0.933535
729
2.5625
3
If your pet suffers from gastrointestinal (GI) disorders such as reflux, ulcers, and gastritis, Famotidine can help to treat and manage his/her problems. What is Famotidine? This is a medication that is administered by mouth when your pet has certain digestive disorders such as gastritis (stomach inflammation), ulcers, and reflux. What are the benefits of Famotidine? Can help treat multiple digestive disorders of the gastrointestinal (GI) tract including ulcers. Reduces stomach acid by decreasing production of acid. Also aids in the treatment of reflux and gastritis. Formulated for: Dogs and cats can take Famotidine. How is this medication given? Give all medication orally based on your veterinarians prescribed directions. If you do not understand how to use Famotidine correctly, call your veterinarian for further instructions. How does this medication work? Famotidine blocks the production of histamine in the body. Histamine is a chemical that leads to acid production in the body so acid production is decreased when this chemical is blocked. What results can I expect? Famotidine does not cure gastrointestinal (GI) disorders such as ulcers, gastritis, or reflux but it can help decrease symptoms and help your pet to feel better. Symptoms are usually relieved quickly once Famotidine is given. What form(s) does Famotidine come in? Tablets. An injectable form of this medication is sometimes used by veterinarians. Generic Name: Famotidine (Common Drug Name) Common Brand Name: Pepcid Dose and Administration: Famotidine is administered by mouth. Always follow your veterinarians prescribed directions. You can give a dose as soon as you remember if you miss one but never double dose. Most veterinarians prescribe Famotidine to be given one to two times daily. Do not share Famotidine with other pets unless your veterinarian instructs you to. If you do not understand how to administer Famotidine to your pet properly, consult with your veterinarian. Uses: Famotidine is prescribed to help pets who suffer from a variety of digestive disorders including ulcers, gastritis, and reflux. Possible Side Effects: Famotidine is generally tolerated very well. Loss of appetite and lethargy have been reported though. Some pets may have an allergy to Famotidine and can suffer a true allergic reaction if they take Famotidine. Other side effects may occur. If your pet appears ill while he/she is taking Famotidine, call your veterinarian as soon as possible for further advice. Drug and Food Interactions: Discuss all medications and supplements your pet is taking with your veterinarian prior to giving Famotidine. Some interactions have been reported with other antacids, metoclopramide, sucralfate, digoxin, and ketoconazole. Other interactions are possible. Famotidine should be given 2 hours prior to or after other medications have been given unless your veterinarian instructs you differently. Precautions: If your pet has an allergy to Famotidine or other histamine blockers, he/she cannot receive this medication. Give Famotidine with extreme caution in older animals, animals with heart, liver, or kidney disease, or pregnant animals. Famotidine can sometimes cause a low white blood cell count especially in animals that are taking other bone marrow suppressing drugs such as azathioprine. Stomach acid production may increase temporarily when Famotidine is discontinued. Storage: Store in a place out of reach from children and pets at room temperature. a prescription from your veterinarian is required to purchase Famotidine. Size: 10 mg. * This offer may contain time-sensitive information and offers. Please check with PetSmart to confirm actual price & availability.
<urn:uuid:b24c19bb-a069-4274-892e-1c426498cf11>
CC-MAIN-2020-10
http://findnsave.kansas.com/offer/Famotidine-Tablet-Generic-to-Pepcid-size-10-mg/70559276/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148375.36/warc/CC-MAIN-20200229022458-20200229052458-00246.warc.gz
en
0.908924
763
2.640625
3
At The Westwood School, leadership skill development is an integral part of daily curriculum. Westwood’s International Baccalaureate – Montessori Method environment provides the framework within which students become self-directed leaders. Leadership skills are developed on three levels during a student’s time at The Westwood School: individual, team, and organizational – each level building upon the other. Individual: To develop the personal foundations of leadership, Westwood exposes each student to the skill sets needed to be self-directed, believing that each person can be a powerful agent for change, an influencer during the adoption of new initiatives, and a model of productivity and commitment. Team: Team leadership changes individuals. As each student guides a team, they learn to facilitate group processes in order to streamline workflow, minimize interpersonal conflict, and align with the goals of the organization. The shift from practicing these skills to learning how to teach these skill sets to others is made in our classrooms. Organizational: This level of leadership skill development encourages self-mastery. Students begin to know themselves to effectively express themselves and to control themselves and to control their interactions with others. Explore the features of student life at The Westwood School, from ALPS to IBeanery, to learn more about programs and activities beyond curriculum that support leadership education for students.
<urn:uuid:dfb7e200-e2aa-4991-9e04-4c81242559c3>
CC-MAIN-2018-26
https://www.westwoodschool.org/student-life/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860684.14/warc/CC-MAIN-20180618164208-20180618184208-00223.warc.gz
en
0.94496
277
3.328125
3
A lovely little printable activity and lesson plan for Remembrance Day – whether you are celebrating Remembrance Day in November, Memorial Day in May or Anzac Day in April, these Paper Poppy Lanterns are a great activity for kids. They from part of our Remembrance Day Activities and Memorial Day Ideas! A great and easy Paper Craft for kids. A collaboration with the amazing Mrs Mactivity! Poppy Paper Lanterns – materials: * Printer Paper * Pens for coloring * Glue Stick * Tea light or garland (optional) These printables come in 2 sets - 3 Colouring Pages Flag Lanterns – $3 – perfect if you have some more time, want to include some mindfulness coloring exercises and only have a B&W printer availabl - 3 Ready Coloured Poppy Lanterns – $3 – perfect if you have a little less time or want to make many (e.g. for a garland) quickly! Wonderful colour varitions to choose from. - We do have a FREEBIE US Flag version for you!! Woohoo! Because I try and make printables here on Red Ted Art as accessible as possible to all! Enjoy! How to make a paper lantern for Remembrance Day Color your pages if necessary. Make your latern cuts Cut out your lantern and handle shapes as neatly as possible. Fold in half align the grey line. Next, cut along the dashed lines to make your lantern shape. Glue to assemble your paper lantern Add glue to last section on the right. Fold over on itself and glue to the first section (on the left). Finally, add a little glue to the tab on the handle and glue inside the lantern. Repeat on the other side. If you wish, you can add an electric tealight or string them up as a garland. Aren’t they lovely? And so easy to make too!! I hope you enjot the freebie or hop over to our Teachers Pay Teachers store to get your copies! Your support is very much appreciated. Remember we have a US Flag Lantern version too (in colour and as a colouring page): More Remembrance Sunday Ideas for kids:
<urn:uuid:3fc1e233-347f-4cf0-8223-f8653402e239>
CC-MAIN-2020-05
https://www.redtedart.com/easy-poppy-paper-lanterns-for-remembrance-day/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00214.warc.gz
en
0.868656
466
3.125
3
U.S. DEPARTMENT OF THE INTERIORBUREAU OF LAND MANAGEMENT |GSENM Youth Program| What’s New for 2009 Widening the Net The curriculum is based on national education standards and field tested by dozens of teachers and student groups from surrounding communities and around the country. Lesson topics include: archaeology, ecology, geology, human history, and paleontology. All curriculum materials are web-based and available for download from www.gsenmschool.org. Sponsored by GCNHA and GSEP. This educational website has also become part of the Hands on the Land national network of web-based field classrooms connecting students, teachers, and parents to their public lands and waterways at www.handsontheland.org. Through the Hands on the Land program, GSENM will be better able to network with educators and land managers in evaluating and improving GSENM’s educational programs. Targeting children six through twelve years old, the backpack contents include equipment, supplies, and information on how to perform rudimentary experiments and identify various species or specimen using the scientific method. For those children not able to take advantage of the Discovery Backpacks, a Junior Scientist Booklet is available at visitor centers free of charge. The booklet offers children fun and entertaining activities, highlighting visitor center interpretive exhibits and the scientific process. Children that participate receive a Junior Scientist Badge. Dinosaurs on the Move Two more exhibits are in production featuring GSENM dinosaur discoveries - the recently named horned dinosaur, Diablocer eatoni (81 MYA), and Deinosuchus riograndensis (75 MYA), the first giant crocodile found in Utah. Along with displays, GSENM and other area specialists give presentations about the exhibits contents to enhance students learning and comprehension. In additoin to these exhibits, the BLM Kanabe Field Office (KFO) sponsored its own traveling exhibit in cooperation with GSENM. The exhibit features the bones of a Colombian mammoth excavated on the KFO in 2001. Learning from the Land Upon arrival, students receive curriculum-based environmental education activity guides using each visitor center’s exhibits as teaching tools. Developed by GSENM and founded on national education standards, these guides enhance student learning experiences and help them understand scientific methodology. Guide activities focus on the sciences of archaeology, ecology, geology, history, and paleontology. Plotting for the Future In the spring and summer of 2010, GSEP will facilitate the hiring and supervision of high school interns to work with GSENM scientists transplanting these native plants into field plots on the Monument. Over the field season, the interns and BLM will monitor the plots to evaluate and document soil moisture content, seed viability, percentage of seed longevity, plant coverage, and overall ecosystem health. Engaging in this learning exercise will teach students scientific methodology, critical thinking skills, and adaptive management approaches. At the same time, the project allows GSENM to test various reintroduction options at a reduced cost to the agency. The Greenhouse Project is partially funded through a grant from the Take-It-Outside Program and the Enviromental Protection Agency. Through the Intergovernmental Internship Cooperative (IIC) program, GSENM is better able to offer regional high school and college students opportunities for student internships, while cost effectively meeting BLM program objectives. SUU supplies the marketing and referral services to the agencies, administers the program, and grants college credit to students who participate. The program promises to be a great benefit to both students and the agencies In addition to these internships, GSEP also sponsored internships for high school and college students. Coordinating with GSENM, GSEP Education Specialist Jane Butter presented programs and posted information at area schools to recruit students for these and BLM sponsored internships as well.
<urn:uuid:8a8374e3-2e6b-47d9-80f7-d048e92cc434>
CC-MAIN-2015-11
http://www.blm.gov/ut/st/en/res/environmental_education/gsenm_youth_program.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00021-ip-10-28-5-156.ec2.internal.warc.gz
en
0.916573
808
3.640625
4
Producing electricity from wind offers a renewable, carbon neutral power source that helps Middlebury reduce its carbon footprint. We have a 10 kW wind turbine on campus and have monitored wind data at the Snow Bowl. At the Recycling Center Installed in 2005, our 10 kW (kilowatt) wind turbine provides electricity to the nearby Material Recovery Center, powering lights and machinery. The Middlebury turbine has been providing approximately 15% of the electrical needs of the recycling facility. The wind turbine produces more than 8,000 kilowatt-hours annually—roughly equivalent to the annual energy consumption of a home powered entirely by electricity. The idea for the wind turbine project originated in an Environmental Studies class, and with funding from an environmental council grant students investigated potential campus locations and funding sources for the wind turbine. Middlebury received a $22,500 grant from the United States Department of Energy and partnered with the Vermont Department of Public Service. At the Snow Bowl Based on student research at the Middlebury ski area at Worth Mountain, the college is considering wind power at the Snow Bowl as one of many options for renewable energy at Middlebury College. In 2003-2004, six months of wind data was gathered at Worth Mountain and analyzed for Lauren Throop's senior thesis project. Although there were data limitations, the analysis indicates there may be sufficient wind for a large system. College staff recently met with NRG, a Vermont wind monitoring company, to discuss the possibility of putting up an NRG wind measuring system to gather more data to inform decisions about installing a wind tower. Information about previous wind monitoring projects at Worth Mountain.
<urn:uuid:043a8cab-1b02-4980-b945-2498dcaf3059>
CC-MAIN-2016-22
http://www.middlebury.edu/sustainability/carbon-neutrality/wind
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049282275.31/warc/CC-MAIN-20160524002122-00069-ip-10-185-217-139.ec2.internal.warc.gz
en
0.936663
331
2.8125
3
Alternative wastewater disposal systems reduce groundwater pollution by decomposing organic wastes or removing nutrients more effectively. Hand dryers reduce water and paper towel use, alternative treatments for cooling tower water reduce chemical use, and carpet tile allows modular replacement of worn areas. In screening products for this area, we focus on quantifiable environmental benefits and strong performance records. Waste XPress pulper systems from InSinkErator grind commercial kitchen waste and then separate the water from the solids, allowing the relatively dry pulp to be collected for landfill disposal or composting. InSinkErator claims the unit reduces kitchen-waste volume by 85%. The systems are designed to fit beneath a typical dish table in a commercial or institutional kitchen. Unlike some other pulper systems, Waste Xpress is not designed to connect directly to a composting or biogas unit; the waste needs to be hauled by hand. And although InSinkErator touts the unit's ability to grind jelly packets and other items, these should not be used in the system if the waste will be composted. Policies should be employed to use only organic materials, and signage should be used to help keep non-compostable plastics and other materials out of the waste stream. Enabling commercial, public, and apartment building and campus occupants to be good environmental stewards is important. Systems that make it easy to recycle wastes should be provided in offices, institutions, apartment buildings, and other public spaces. GreenSpec lists equipment and systems that make recycling and composting easier and more efficient for occupants and facility managers. Ratings and Commentary
<urn:uuid:7258ae83-c3f5-40c2-bfd0-6cc53a48d610>
CC-MAIN-2015-11
http://greenspec.buildinggreen.com/product/insinkerator-pulper-systems/insinkerator/12596
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462751.85/warc/CC-MAIN-20150226074102-00295-ip-10-28-5-156.ec2.internal.warc.gz
en
0.892181
324
2.765625
3
Pripet River, also spelled Pripyat, Pripiat, or Pripets, Ukrainian Pryp’yat, Belarusian Prypyats’, also called Strumen, Unomanoriver in Ukraine and Belarus, a tributary of the Dnieper River. It is 480 miles (775 km) long and drains an area of 44,150 square miles (114,300 square km). It rises in northwestern Ukraine near the Polish border and flows eastward in Ukraine and then Belarus through a flat, forested, and swampy basin known as the Pripet Marshes to Mazyr; there it turns southeastward, reenters Ukraine, and joins the Dnieper in the Kiev Reservoir. Navigation on the Pripet is possible to Pinsk, Belarus, where the Dnieper-Bug Canal leads to the Bug River. Much swamp in the Pripet River basin has been reclaimed for agriculture.
<urn:uuid:9b7019ab-b2f0-47c0-a813-188baa06ec41>
CC-MAIN-2014-15
http://www.britannica.com/print/topic/477152
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609527423.39/warc/CC-MAIN-20140416005207-00119-ip-10-147-4-33.ec2.internal.warc.gz
en
0.91526
191
2.859375
3
The topics are the death penalty and zoos should be stopped and teens should go to college. I need to combine them all in one intro and conclusion. HELP ME Please i do not know how to combine each of the three topics into one intro and conclusion 2 Answers | Add Yours This is an interesting combination. I would use the zoo topic as an analogy for imprisoning the innocent for the spectacle and viewing of thers and depriving animals (people in our analogy) of living their lives to the fullest. Examples might be strip clubs where predatory men watch women dance topless or nude or the rings of prostitution or even child pornography. The death penalty can be tied in by mentioning the publicity that follows the death penalty through the media and by allowing executions to be viewed by private individuals and in some cases shown on television. An example here would be the execution of the Oklahoma City bomber which was televised. Teens going to college suggest that education produces an enlightenment that will not only guide them in pursuing their own interests in life but enlighten them to the dehumanizing effects of the death penalty and of trapping people into lives that serve other people's predatory and immoral needs. As a guiding question, I would ask why people enjoy watching and participating in the misfortunes of others and how higher education can pull humanity out of this grasp. My thesis would be that focusing on educating oneself will reduce the need to participate in these behaviors and create a higher moral ground. I would reiterate this in the conclusion and draw a picture of a society without this level of immoral behavior. i am still a little confused. :P I still do not know how to make one intro and conclusion with using these three topics. Join to answer this question Join a community of thousands of dedicated teachers and students.Join eNotes
<urn:uuid:10343137-1800-4dd6-b189-9f8d5a2e734a>
CC-MAIN-2015-27
http://www.enotes.com/homework-help/topics-death-penalty-zoos-should-stopped-teens-378712
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095183.13/warc/CC-MAIN-20150627031815-00051-ip-10-179-60-89.ec2.internal.warc.gz
en
0.951409
369
2.734375
3
- Deciduous tree. - Size: up to 15 m high and wide. - Leaves: bright green, feathery and fern-like. Individual leaves are narrow and elliptic, 3 – 12 mm long and arranged either side of a 5 – 10 cm long stem. They turn yellow in autumn before falling from the tree. - Flowers: blue-purple and trumpet-shaped, forming clusters that are 20 – 30 cm in diameter. Each individual flower is 2 – 3 cm long and about 1 cm wide. They are lightly fragranced and remain on the tree for about two months. - Fruit/seed: a red-brown seed pod that is round and flat, and 3 – 6 cm in diameter. It can remain on the tree for several months. What to Observe - First fully open single flower - Full flowering (record all days) - End of flowering (when 95% of the flowers have faded) - Open seed pods (record all days) - First fully open leaf - Leaves open (record all days) - First leaf to change colour - Leaves changing colour (record all days) - First leaf to drop this year - 50% or more of leaves dropped (record all days) - No leaves (record all days) ClimateWatch Science Advisor We expect plants to start shooting and flowering earlier in the year as a result of climate change warming the Earth. They may also start appearing in new areas, as warmer temperatures enable them to live in environments that were previously too cold for them. When To Look - From spring through to autumn - Leaves appear in spring after the flowers - Flowers appear in spring (November in NSW and September/October in North Qld) - Seed pods appear after flowering - Leaves change colour in autumn before falling Where To Look - Widely throughout Australia, except in frost-prone areas such as mountainous regions. - In urban areas – in gardens, parks and roadsides. Where To Look Maps of Habitat Suitability of occurrence (RCP 8.5) |Species range change from current to 2070 probability Above, the left and middle maps show the modelled habitat suitability for the the species under current and potential future climate conditions. The colours indicate the predicted habitat suitability from low (white) to high (dark red). The future habitat suitability is modelled for the year 2070 under a climate change scenario that represents 'business as usual' (RCP 8.5). The map on the right shows how the range of the species might change between now and 2070, with orange areas indicating where the species might disappear, green areas where the species range might expand, and blue areas where the habitat is predicted to be suitable for the species now and in the future. The models for this species were run in the Biodiversity and Climate Change Virtual Laboratory. Please note that while models can be very informative, they are only a representation of the real world and thus should always be viewed with caution. You can read more about the science behind these models here. Australian Biological Resources Study 1982. Flora of Australia Volume 33. CSIRO Publishing / Australian Biological Resources Study. Harden G (ed.) Flora of New South Wales: Vol. 1 (revised edition, 2000), Vol. 2 (revised edition, 2002), Vol. 3 (1992), Vol. 4 (1993). University of NSW Press. Menninger EA 1962. Flowering trees of the world. Hearthside Press, New York. Tibouchina or Purple Glory Bush (Tibouchina urvilleana): smaller (up to 4m high), with larger leaves (4 – 12cm long) and larger flowers (each petal is about 4cm long). Did You Know? The Jacaranda is originally from South America. There is an Australian Christmas song about Jacarandas because it flowers shortly before Christmas. There are four stamens inside the flower which produce pollen, and also a staminode which doesn’t produce any pollen.
<urn:uuid:2c2832a4-7936-438f-8467-4e8a8ff59f00>
CC-MAIN-2020-29
https://www.climatewatch.org.au/species/plants/jacaranda
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882634.5/warc/CC-MAIN-20200703153451-20200703183451-00439.warc.gz
en
0.899097
854
3.6875
4
Proposals to invest in infrastructure have bipartisan support, amid two big challenges: one, how the projects will be paid for, and two, what type of infrastructure will truly serve the nation and metropolitan regions. Advances in technology and environmental awareness have utterly changed the context for this kind of massive investment; these times require a sophisticated approach, say Lincoln Institute senior fellow Armando Carbonell and Susannah Drake, principal of dlandstudio, and a contributor to our recently published book, Nature and Cities: The Ecological Imperative in Urban Design and Planning. As infrastructure built through President Franklin D. Roosevelt's New Deal and during the presidency of Dwight D. Eisenhower reaches the end of its lifespan, the U.S. should seize the opportunity to repair and rebuild in ways that "reflect the social, environmental, and technological advances that have occurred over the last half century," they write in an essay published by Planetizen. The challenge is made more urgent by more frequent storms, rising seas and other climate change impacts, they write: "Green infrastructure systems rethink not only the overarching functions of infrastructure, but also the experience of nature in the city. Municipalities have an opportunity to design and plan in the most comprehensive and cost-effective manner. "Traditional, inflexible, 'gray' engineering approaches—which require waterproofing of transit systems, tunnels and utilities, or redirecting water with levees, dikes, and barriers—will work better in tandem with more resilient, ecological 'green' approaches, such as using currents and wind to distribute sediment for new barrier islands, reusing dredge materials to create shallows for wetlands, redesigning streets to absorb and filter stormwater, propagating a range of aquatic plants to make an ecologically rich buffer to storm surge, expanding natural flood zones that also function as parks most of the time, taking stormwater from highways, and capturing sheet runoff in sponge parks, among other stormwater-capture systems." To read the essay in its entirety, visit Planetizen.com, "the independent resource for people passionate about planning and related fields." Unlocking land value When a city builds a train station, changes regulations to allow for taller buildings, or attracts an influx of residents and economic activity, the value of land often increases. But who reaps the profits?. Value capture is a tool designed to ensure that the public receives at least some of the land value generated by government acts and urban development. The value can be used for a range of public purposes from parks to infrastructure. As rents and home prices reach crisis levels in many places, cities are increasingly using value capture to create affordable housing. At a panel discussion hosted by the Lincoln Institute earlier this month, David Rosen and Nora Lake-Brown of DRA explained how cities are employing value capture in the form of inclusionary housing, a policy to provide a portion of affordable homes in new residential development. Inclusionary housing is often combined with incentives such as density "bonuses," increases in building envelope, fee waivers and exemptions. Rosen and Lake-Brown were joined by Bryan Glascock, senior advisor for the Boston Planning and Development Agency (formerly the Boston Redevelopment Authority), who explained how the city is incorporating inclusionary housing into the Imagine Boston 2030 planning process. Click here to watch a video of the discussion. Last week, meanwhile, international experts gathered in Hong Kong for the International Academic Association on Planning, Law, and Property Rights 11th Annual Conference, exploring among other things the use of developer obligations – a value capture tool whereby landowners and developers contribute toward a wide range of public goods, from affordable housing to parks to roads. Researchers shared cases studies from cities including Kampala, Uganda and Ho Chi Minh City, Vietnam, where local authorities are grappling with the challenge of distributing the benefits and costs of urbanization within the context of relatively weak planning institutions, to cities in Colombia, Brazil, South Korea and Italy, where developer obligations and value capture have a much longer, richer history, offering lessons from the evolution of tools and practices over time. A core issue facing all cities is the choice to use non-negotiable or negotiable developer obligations. Negotiated agreements can be better tailored to the features of individual projects, but they also depend more greatly on the negotiation ability of local officials. Non-negotiable obligations may be favored by others because they offer a level of predictability. The conference also included a discussion of the institutional and political tensions and challenges of developer obligations. The Lincoln Institute, a partner in the conference, is stepping up its work on value capture as an element of municipal fiscal health. Lessons from the conference will be compiled in a working paper on developer obligations in a global perspective. The moment to get cities right In October, 30,000 people from more than 150 countries converged in Quito, Ecuador to create a blueprint for making cities more inclusive, safe, resilient, and sustainable. The Habitat III conference marked an important step, but how do we make sure we get urbanization right when so much is at stake? The Lincoln Institute is scheduled to host the premiere of the mini-documentary, "The Moment to Get Cities Right: Inside Habitat III, The Urbanization Summit of a Generation," shot over the course of the four-day Habitat III conference in Quito, followed by a discussion with President and CEO George "Mac" McCarthy and Tom Dallessio, president, CEO and publisher of Next City, about how best to implement all the follow-up to Habitat III, including the blueprint adopted at the summit, called the New Urban Agenda, as well as Sustainable Development Goals related to urbanization. Odds & Ends George "Mac" McCarthy puts Detroit's housing finance challenges in context ... Fellow Daphne Kenyon suggests how to balance fairness with reliable school revenues in Mississippi ... In yet more value capture debate, British Columbia mulls value capture for transit and New York City's High Line presents a case study of missed opportunities ... Pennsylvania educators react to proposal to eliminate school property tax ... UrbanFootprint and the Corridor Housing Preservation Tool are recognized with Scenario Planning Applications Network Innovation Awards ... Separating the value of land and structures ... This month's highlighted Working Paper: Building a Large Landscape Conservation Community of Practice, by Shawn Johnson. — ANTHONY FLINT & WILL JASON, Lincoln Institute of Land Policy
<urn:uuid:fc856d16-99c9-4bb1-b820-0431ff07774b>
CC-MAIN-2017-47
http://www.lincolninst.edu/news/e-newsletter-archive/lincoln-house-february-2017
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806715.73/warc/CC-MAIN-20171123012207-20171123032207-00173.warc.gz
en
0.926146
1,313
2.96875
3
to EPI-ACCESS International Inc. In September 2004 a tragic event occurred at an Ontario school. 13 year old girl died from anaphylactic shock. As a result of this tragedy the Government of Ontario passed a Bill (Bill 3) called Sabrina's Law. This Bill requires that every school board in Ontario establish and maintain an anaphylactic policy and that every school principal maintain a file and develop an individual plan for each pupil who has an anaphylactic allergy. This must include, among other things, details on the type of allergy, monitoring and avoidance strategies, appropriate treatment, a readily accessible emergency procedure and storage for epinephrine auto-injectors where necessary.| EPI-ACCESS International Inc. storage cases that meets these criteria. Let's keep our children safe and educate everyone on the importance of the case and its contents. prepared with EPI-ACCESS International Inc.
<urn:uuid:25727b32-38d2-4180-af66-fe9201169b2e>
CC-MAIN-2018-17
http://epiaccess.ca/en/index.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946807.67/warc/CC-MAIN-20180424154911-20180424174911-00563.warc.gz
en
0.880591
206
2.859375
3
The term shrimp is a generic term for some decapod crustaceans, although the exact animals covered can vary. Used broadly, it may cover any of the groups with elongated bodies and a primarily swimming mode of locomotion – chiefly Caridea and Dendrobranchiata. In some fields, however, the term is used more narrowly, and may be restricted to Caridea, to smaller species of either group, or to only the marine species. Under the broader definition, shrimp may be synonymous with prawn, covering stalk-eyed swimming crustaceans with long narrow muscular tails (abdomens), long whiskers (antennae), and slender legs. They swim forward by paddling with swimmerets on the underside of their abdomens. Crabs and lobsters have strong walking legs, whereas shrimp have thin fragile legs which they use primarily for perching. Shrimp are widespread and abundant. They can be found feeding near the seafloor on most coasts and estuaries, as well as in rivers and lakes. To escape predators, some species flip off the seafloor and dive into the sediment. They usually live from one to seven years. Shrimp are often solitary, though they can form large schools during the spawning season. There are thousands of species, and usually there is a species adapted to any particular habitat. Any small crustacean which resembles a shrimp tends to be called one. They play important roles in the food chain and are important food sources for larger animals from fish to whales. The muscular tails of many shrimp are edible to humans, and they are widely caught and farmed for human consumption. Commercial shrimp species support an industry worth 50 billion dollars a year, and in 2010 the total commercial production of shrimp was nearly 7 million tonnes (see production chart below). Shrimp farming took off during the 1980s, particularly in China, and by 2007 the harvest from shrimp farms exceeded the capture of wild shrimp. There are significant issues with excessive bycatch when shrimp are captured in the wild, and with pollution damage done to estuaries when they are used to support shrimp farming. Many shrimp species are small as the term shrimp suggests, about 2 cm (0.79 in) long, but some shrimp exceed 25 cm (9.8 in). Larger shrimp are more likely to be targeted commercially, and are often referred to as prawns, particularly in Britain. Shrimp are swimming crustaceans with long narrow muscular abdomens and long antennae. Unlike crabs and lobsters, shrimp have well developed pleopods (swimmerets) and slender walking legs; they are more adapted for swimming than walking. Historically, it was the distinction between walking and swimming that formed the primary taxonomic division into the former suborders Natantia and Reptantia. Members of the Natantia (shrimp in the broader sense) were adapted for swimming while the Reptantia (crabs, lobsters, etc.) were adapted for crawling or walking. Some other groups also have common names that include the word "shrimp"; any small swimming crustacean resembling a shrimp tends to be called one. |Differences between shrimp, lobsters and crabs| |Shrimp are slender with long muscular abdomens. They look somewhat like small lobsters, but not like crabs. The abdomens of crabs are small and short, whereas the abdomens of lobsters and shrimp are large and long. The lower abdomens of shrimp support pleopods which are well adapted for swimming. The carapace of crabs are wide and flat, whereas the carapace of lobsters and shrimp are more cylindrical. The antennae of crabs are short, whereas the antennae of lobsters and shrimp are usually long, reaching more than twice the body length in some shrimp species.||Clawed lobsters (pictured left) and spiny lobsters (pictured right) are an intermediate evolutionary development between shrimp and crabs. They look somewhat like large versions of shrimp. Clawed lobster have large claws while spiny lobsters don't, but have instead spiny antennae and a spiny carapace. Some of the biggest decapods are lobsters. Like crabs, lobsters have robust legs and are highly adapted for walking on the seafloor, though they do not walk sideways. Some species have rudimentary pleopods, which give them some ability to swim, and like shrimp they can lobster with their tail to escape predators, but their primary mode of locomotion is walking, not swimming.||Crabs evolved from early shrimp, though they do not look like shrimp. Unlike shrimp, their abdomen is small, and they have short antennae and a short carapace that is wide and flat. They have prominent grasping claws as their front pair of limbs. Crabs are adapted for walking on the seafloor. They have robust legs and usually move about the seafloor by walking sideways. They have pleopods, but they use them for intromission or to hold egg broods, and not for swimming. Whereas shrimp and lobsters escape predators by lobstering, crabs cling to the seafloor and burrow into sediment. Compared to shrimp and lobsters, the carapace of crabs are particularly heavy, hard and mineralised.| The diagram on the right and the following description refers mainly to the external anatomy of the common European shrimp, Crangon crangon, as a typical example of a decapod shrimp. The body of the shrimp is divided into two main parts: the head and thorax which are fused together to form the cephalothorax, and a long narrow abdomen. The shell which protects the cephlathorax is harder and thicker than the shell elsewhere on the shrimp, and is called the carapace. The carapace typically surrounds the gills, through which water is pumped by the action of the mouthparts. The rostrum, eyes, whiskers and legs also issue from the carapace. The rostrum, from the Latin rōstrum meaning beak, looks like a beak or pointed nose at the front of the shrimp's head. It is a rigid forward extension of the carapace, and can be used for attack or defence. It may also stabilize the shrimp when it swims backwards. Two bulbous eyes on stalks sit either side of the rostrum. These are compound eyes which have panoramic vision and are very good at detecting movement. Two pairs of whiskers (antennae) also issue from the head. One of these pairs is very long, and can be twice the length of the shrimp, while the other pair are quite short. The antennae have sensors on them which allow the shrimp to feel where they touch, and also allow them to "smell" or "taste" things by sampling the chemicals in the water. The long antennae help the shrimp orient itself with regard to its immediate surroundings, while the short antennae help assess the suitability of prey. Eight pairs of appendages issue from the cephlathorax. The first three pairs, the maxillipeds, Latin for "jaw feet", are used as mouthparts. In Crangon crangon, the first pair, the maxillula, pumps water into the gill cavity. After the maxilliped come more five pairs of appendages, the pereiopods. These form the ten decapod legs. In Crangon crangon, the first two pairs of pereiopods have claws or chela. The chela can grasp food items and bring them to the mouth. They can also be used for fighting and grooming. The remaining six legs are long and slender, and are used for walking or perching. The muscular abdomen has six segments and has a thinner shell than the carapace. Each segment has a separate overlapping shell, which can be transparent. The first five segments each have a pair of appendages on the underside, which are shaped like paddles and are used for swimming forward. The appendices are called pleopods or swimmerets, and can be used for more purposes than just swimming. Some shrimp species use them for brooding eggs, others have gills on them for breathing, and the males in some species use the first pair or two for insemination. The sixth segment terminates in the telson flanked by two pairs of appendages called the uropods. The uropods allow the shrimp to swim backwards, and function like rudders, steering the shrimp when it swims forward. Together, the telson and uropods form a splayed tail fan. If a shrimp is alarmed, it can flex its tail fan in a rapid movement. This results in a backward dart called the caridoid escape reaction (lobstering). Shrimp are widespread, and can be found near the seafloor of most coasts and estuaries, as well as in rivers and lakes. There are numerous species, and usually there is a species adapted to any particular habitat. Most shrimp species are marine, although about a quarter of the described species are found in fresh water. Marine species are found at depths of up to 5,000 metres (16,000 ft), and from the tropics to the polar regions. There are many variations in the ways different types of shrimp look and behave. Even within the core group of caridean shrimp, the small delicate Pederson's shrimp (above) looks and behaves quite unlike the large commercial pink shrimp or the snapping pistol shrimp. The caridean family of pistol shrimp are characterized by big asymmetrical claws, the larger of which can produce a loud snapping sound. The family is diverse and worldwide in distribution, consisting of about 600 species. Colonies of snapping shrimp are a major source of noise in the ocean and can interfere with sonar and underwater communication. The small emperor shrimp has a symbiotic relationship with sea slugs and sea cucumbers, and may help keep them clear of ectoparasites. Most shrimp are omnivorous, but some are specialised for particular modes of feeding. Some are filter feeders, using their setose (bristly) legs as a sieve; some scrape algae from rocks. Cleaner shrimp feed on the parasites and necrotic tissue of the reef fish they groom. In turn, shrimp are eaten by various animals, particularly fish and seabirds, and frequently host bopyrid parasites. There is little agreement among taxonomists concerning the phylogeny of crustaceans. Within the decapods "every study gives totally different results. Nor do even one of these studies match any of the rival morphology studies". Some taxonomists identify shrimp with the infraorder Caridea and prawns with the suborder Dendrobranchiata. While different experts give different answers, there is no disagreement that the caridean species are shrimp. There are over 3000 caridean species. Occasionally they are referred to as "true shrimp". Traditionally decapods were divided into two suborders: The Natantia or swimmers, and the Reptantia or walkers. The Natantia or swimmers included the shrimp. They were defined by their abdomen which, together with its appendages was well adapted for swimming. The Reptantia or walkers included the crabs and lobsters. These species have small abdominal appendages, but robust legs well adapted for walking. The Natantia was thought to be paraphyletic, that is, it was thought that originally all decapods were like shrimp. However, classifications are now based on clades, and the paraphyletic suborder Natantia has been discontinued. "On this basis, taxonomic classifications now divide the order Decapoda into the two suborders: Dendrobranchiata for the largest shrimp clade, and Pleocyemata for all other decapods. The Pleocyemata are in turn divided into half a dozen infra-orders" - The taxonomists De Grave and Fransen, 2011, recognise four major groups of shrimp: the suborder Dendrobranchiata and the infraorders Procarididea, Stenopodidea and Caridea". This group is identical to the traditional Natantia group, and contains decapods only. - All shrimp of commercial interest belong to the Natantia. The FAO determine the categories and terminology used in the reporting of global fisheries. They define a shrimp as a "decapod crustacean of the suborder Natantia". - According to the Codex Alimentarius Commission of the FAO and WHO: "The term shrimp (which includes the frequently used term prawn) refers to the species covered by the most recent edition of the FAO listing of shrimp, FAO Species Catalogue, Volume 1, Shrimps and prawns of the world, an annotated catalogue of species of interest to fisheries FAO Fisheries Synopsis No. 125." In turn, the Species Catalogue says the highest category it deals with is "the suborder Natantia of the order Crustacea Decapoda to which all shrimps and prawns belong". |Major shrimp groups of the Natantia| |Order||Suborder||Infraorder||Image||Extant species ||Description| |Decapoda||Dendrobranchiata||533||giant tiger prawn pictured, typically have three pairs of claws, though their claws are less conspicuous than those of other shrimp. They do not brood eggs like the caridean, but shed them directly into the water. Their gills are branching, whereas the gills of caridean shrimp are lamellar. The segments on their abdomens are even-sized, and there is no pronounced bend in the abdomen.The species in this suborder tend to be larger than the caridean shrimp species below, and many are commercially important. They are sometimes referred to as prawns. Dendrobranchiata, such as the| |Pleocyemata||Caridea||3438||The numerous species in this infraorder are known as caridean shrimp, though only a few are commercially important. They are usually small, nocturnal, difficult to find (they burrow in the sediment), and of interest mainly to marine biologists. Caridean shrimp, such as the pink shrimp pictured, typically have two pairs of claws. Female carideans attach eggs to their pleopods and brood them there. The second abdominal segment overlaps both the first and the third segment, and the abdomen shows a pronounced caridean bend.| |Procarididea||6||A minor sister group to the Caridea (immediately above)| |Stenopodidea||71||Known as boxer shrimp, the members of this infraorder are often cleaner shrimp. Their third pair of walking legs (pereiopods) are greatly enlarged. The banded coral shrimp (pictured) is popular in aquariums. The Stenopodidea are a much smaller group than the Dendrobranchia and Caridea, and have no commercial importance.| Other decapod crustaceans also called shrimp, are the ghost or mud shrimp belonging to the infra-order Thalassinidea. In Australia they are called yabbies. The monophyly of the group is not certain; recent studies have suggested dividing the group into two infraorders, Gebiidea and Axiidea. A wide variety of non-decapod crustaceans are also commonly referred to as shrimp. This includes the brine shrimp, clam shrimp, fairy shrimp and tadpole shrimp belonging to the branchiopods, the lophogastridan shrimp, opossum shrimp and skeleton shrimp belonging the Malacostraca; and seed shrimp which are ostracods. Many of these species look quite unlike like the commercial decapod shrimp that are eaten as seafood. For example, skeleton shrimp have short legs and a slender tail like a scorpion tail, fairy shrimp swim upside down with swimming appendages that look like leaves, and the tiny seed shrimp have bivalved carapaces which they can open or close. Krill resemble miniature shrimp, and are sometimes called "krill shrimp". |Other species groups commonly known as shrimp| |Branchiopoda||Branchiopoda comes from the Greek branchia meaning gills, and pous meaning feet. They have gills on their feet or mouthparts.| |brine shrimp||8||Brine shrimp belong to the genus Artemia. They live in inland saltwater lakes in unusually high salinities, which protects them from most predators. They produce eggs, called cysts, which can be stored in a dormant state for long periods and then hatched on demand. This has led to the extensive use of brine shrimp as fish feed in aquaculture. Brine shrimp are sold as novelty gifts under the marketing name Sea-Monkeys.| |clam shrimp||150||Clam shrimp belong to the group Conchostraca. These freshwater shrimp have a hinged bivalved carapace which can open and close.| |fairy shrimp||300||Fairy shrimp belong to the class Anostraca. These 1–10 cm long freshwater or brackish shrimp have no carapace. They swim upside down with their belly uppermost, with swimming appendages that look like leaves. Most fairy shrimp are herbivores, and eat only the algae in the plankton. Their eggs can survive drought and temperature extremes for years, reviving and hatching after the rain returns.| |tadpole shrimp||20||Tadpole shrimp belong to the family Notostraca. These living fossils have not much changed since the Triassic. They are drought-resistant and can be found preying on fairy shrimp and small fish at the bottom of shallow lakes and temporary pools. The longtail tadpole shrimp (pictured) has three eyes and up to 120 legs with gills on them. It lives for 20–90 days. Different populations can be bisexual, unisexual or hermaphroditic.| |Malacostraca||Malacostraca comes from the Greek malakós meaning soft and óstrakon meaning shell. The name is misleading, since normally the shell is hard, and is soft only briefly after moulting.| |Lophogastrida||56||These marine pelagic shrimp make up the order Lophogastrida. They mostly inhabit relatively deep pelagic waters throughout the world. Like the related opossum shrimp, females lophogastrida carry a brood pouch.| |mantis shrimp||400||Mantis shrimp, so called because they resemble a praying mantis, make up the order Stomatopoda. They grow up to 38 cm (15 in) long, and can be vividly coloured. Some have powerful spiked claws which they punch into their prey, stunning, spearing and dismembering them. They have been called "thumb splitters" because of the severe gashes they can inflict if handled carelessly.| |opossum shrimp||1,000||Opossum shrimp belong to the order Mysida. They are called opossum shrimp because the females carry a brood pouch. Usually less than 3 cm long, they are not closely related to caridean or penaeid shrimp. They are widespread in marine waters, and are also found in some brackish and freshwater habitats in the Northern hemisphere. Marine mysids can form large swarms and are an important source of food for many fish. Some freshwater mysids are found in groundwater and anchialine caves.| |skeleton shrimp||Skeleton shrimp, sometimes known as ghost shrimp, are amphipods. Their threadlike slender bodies allow them to virtually disappear among fine filaments in seaweed. Males are usually much larger than females. For a good account of a specific species, see Caprella mutica.| |Ostracoda||Ostracod comes from the Greek óstrakon meaning shell. In this case, the shells are in two parts, like those of bivalves or clams.| |seed shrimp||13,000||Seed shrimp make up the class Ostracoda. This is a class of numerous small crustacean species which look like seeds, typically about one millimetre (0.04 in) in size. Their carapace looks like a clam shell, with two parts held together by a hinge to allow the shell to open and close. Some marine seed shrimp drift as pelagic plankton, but most live on the sea floor and burrow in the upper sediment layer. There are also freshwater and terrestrial species. The class includes carnivores, herbivores, filter feeders and scavengers.| In 1991, archeologists suggested that ancient raised paved areas near the coast in Chiapas, Mexico, were platforms used for drying shrimp in the sun, and that adjacent clay hearths were used to dry the shrimp when there was no sun. The evidence was circumstantial, because the chitinous shells of shrimp are so thin they degrade rapidly, leaving no fossil remains. In 1985 Quitmyer and others found direct evidence dating back to 600 AD for shrimping off the southeastern coast of North America, by successfully identifying shrimp from the archaeological remains of their mandibles (jaws). Clay vessels with shrimp decorations have been found in the ruins of Pompeii. In the 3rd century AD, the Greek author Athenaeus wrote in his literary work, Deipnosophistae; "... of all fish the daintiest is a young shrimp in fig leaves." In North America, Native Americans captured shrimp and other crustaceans in fishing weirs and traps made from branches and Spanish moss, or used nets woven with fibre beaten from plants. At the same time early European settlers, oblivious to the "protein-rich coasts" all about them, starved from lack of protein. In 1735 beach seines were imported from France, and Cajun fishermen in Louisiana started catching white shrimp and drying them in the sun, as they still do today. In the mid nineteenth century, Chinese immigrants arrived for the California Gold Rush, many from the Pearl River Delta where netting small shrimp had been a tradition for centuries. Some immigrants starting catching shrimp local to San Francisco Bay, particularly the small inch long Crangon franciscorum. These shrimp burrow into the sand to hide, and can be present in high numbers without appearing to be so. The catch was dried in the sun and was exported to China or sold to the Chinese community in the United States. This was the beginning of the American shrimping industry. Overfishing and pollution from gold mine tailings resulted in the decline of the fishery. It was replaced by a penaeid white shrimp fishery on the South Atlantic and Gulf coasts. These shrimp were so abundant that beaches were piled with windrows from their moults. Modern industrial shrimping methods originated in this area. ""For shrimp to develop into one of the world's most popular foods, it took the simultaneous development of the otter trawl... and the internal combustion engine." Shrimp trawling can capture shrimp in huge volumes by dragging a net along the seafloor. Trawling was first recorded in England in 1376, when King Edward III received a request that he ban this new and destructive way of fishing. In 1583, the Dutch banned shrimp trawling in estuaries. In the 1920s, diesel engine were adapted for use in shrimp boats. Power winches were connected to the engines, and only small crews were needed to rapidly lift heavy nets on board and empty them. Shrimp boats became larger, faster, and more capable. New fishing grounds could be explored, trawls could be deployed in deeper offshore waters, and shrimp could be tracked and caught round the year, instead of seasonally as in earlier times. Larger boats trawled offshore and smaller boats worked bays and estuaries. By the 1960s, steel and fibreglass hulls further strengthened shrimp boats, so they could trawl heavier nets, and steady advances in electronics, radar, sonar, and GPS resulted in more sophisticated and capable shrimp fleets. As shrimp fishing methods industrialised, parallel changes were happening in the way shrimp were processed. "In the 19th century, sun dried shrimp were largely replaced by canneries. In the 20th century, the canneries were replaced with freezers." In the 1970s, significant shrimp farming was initiated, particularly in China. The farming accelerated during the 1980s as demand for shrimp exceeded supply, and as excessive bycatch and threats to endangered sea turtle became associated with trawling for wild shrimp. In 2007, the production of farmed shrimp exceeded the capture of wild shrimp. Although there are thousands of species of shrimp worldwide, only about 20 of these species are commercially significant. The following table contains the principal commercial shrimp, the seven most harvested species. All of them are decapods; most of them belong to the Dendrobranchiata and four of them are penaeid shrimp. |Principal commercial shrimp species| |Group||Common name||Scientific name||Description||Max length (mm)||Depth (m)||Habitat||FAO||WoRMS||2010 production (thousand tonnes)| |Dendrobranchiata||Whiteleg shrimp||Litopenaeus vannamei (Boone, 1931)||The most extensively farmed species of shrimp. Listed on the Greenpeace seafood redlist.||230||0–72||marine, estuarine||||||1||2721||2722| |Giant tiger prawn||Penaeus monodon Fabricius, 1798||Listed on the Greenpeace seafood redlist.||336||0–110||marine, estuarine||||||210||782||992| |Akiami paste shrimp||Acetes japonicus Kishinouye, 1905||Most intensively fished species. They are small with black eyes and red spots on the uropods. Only a small amount is sold fresh, most is dried, salted or fermented.||30||shallow||marine||||||574||574| |Southern rough shrimp||Trachysalambria curvirostris (Stimpson, 1860)||Easier to catch at night, and fished only in waters less than 60 m (200 ft) deep. Most of the harvest is landed in China.||98||13–150||marine||||||294||294| |Fleshy prawn||Fenneropenaeus chinensis (Osbeck, 1765)||Trawled in Asia where it is sold frozen. Exported to Western Europe. Cultured by Japan and South Korea in ponds.||183||90–180||marine||||||108||45||153| |Banana prawn||Fenneropenaeus merguiensis (De Man, 1888)||Typically trawled in the wild and frozen, with most catches made by Indonesia. Commercially important in Australia, Pakistan and the Persian Gulf. Cultured in Indonesia and Thailand. In India it tends to be confused with Fenneropenaeus indicus, so its economic status is unclear.||240||10–45||marine, estuarine||||||93||20||113| |Caridea||Northern prawn||Pandalus borealis (Krøyer, 1838)||Widely fished since the early 1900s in Norway, and later in other countries following Johan Hjort's practical discoveries of how to locate them. They have a short life which contributes to a variable stock on a yearly basis. They are not considered overfished.||165||20–1380||marine||||||361||361| |All other species|| Shrimp trawling can result in very high incidental catch rates of non-target species. In 1997, the FAO found discard rates up to 20 pounds for every pound of shrimp. The world average was 5.7 pounds for every pound of shrimp. Trawl nets in general, and shrimp trawls in particular, have been identified as sources of mortality for species of finfish and cetaceans. Bycatch is often discarded dead or dying by the time it is returned to the sea, and may alter the ecological balance in discarded regions. Worldwide, shrimp trawl fisheries generate about 2% of the world's catch of fish in weight, but result in more than one third of the global bycatch total. The most extensively fished species are the akiami paste shrimp, the northern prawn, the southern rough shrimp, and the giant tiger prawn. Together these four species account for nearly half of the total wild capture. In recent years, the global capture of wild shrimp has been overtaken by the harvest from farmed shrimp. A shrimp farm is an aquaculture business for the cultivation of marine shrimp or prawns for human consumption. Commercial shrimp farming began in the 1970s, and production grew steeply, particularly to match the market demands of the United States, Japan and Western Europe. The total global production of farmed shrimp reached more than 1.6 million tonnes in 2003, representing a value of nearly 9 billion U.S. dollars. About 75% of farmed shrimp are produced in Asia, in particular in China, Thailand and in the Philippines. The other 25% are produced mainly in Latin America, where Brazil is the largest producer. The largest exporting nation is Thailand. As can be seen from the global production chart on the left, significant aquaculture production started slowly in the 1970s and then rapidly expanded during the 1980s. After a lull in growth during the 1990s, due to pathogens, production took off again and by 2007 exceeded the capture from wild fisheries. By 2010, the aquaculture harvest was 3.9 million tonnes, compared to 3.1 million tonnes for the capture of wild shrimp. In the earlier years of marine shrimp farming the preferred species was the large giant tiger prawn. This species is reared in circular holding tanks where they think they are in the open ocean, and swim in "never ending migration" around the circumference of the tank. In 2000, global production was 630,984 tonnes, compared to only 146,362 tonnes for whiteleg shrimp. Subsequently these positions reversed, and by 2010 the production of giant tiger prawn increased modestly to 781,581 tonnes while whiteleg shrimp rocketed nearly twenty-fold to 2,720,929 tonnes. The whiteleg shrimp is currently the dominant species in shrimp farming. It is a moderately large shrimp reaching a total length of 230 mm (9"), and is particularly suited to farming because it "breeds well in captivity, can be stocked at small sizes, grows fast and at uniform rates, has comparatively low protein requirements... and adapts well to variable environmental conditions." In China, prawns are cultured along with sea cucumbers and some fish species, in integrated multi-trophic systems. The major producer of farmed shrimp is China. Other significant producers are Thailand, Indonesia, India, Vietnam, Brazil, Ecuador and Bangladesh. Most farmed shrimp is exported to the United States, the European Union and Japan. Investigations by The Guardian in 2014 and The Associated Press in 2015 found human rights abuses on fishing boats operated by Thailand. The boats are manned with slaves, and catch shrimp and fish (including fish for the production of fishmeal which is fed to farmed prawns). Greenpeace has challenged the sustainability of tropical shrimp farming practices on the grounds that farming these species "has led to the destruction of vast areas of mangroves in several countries [and] over-fishing of juvenile shrimp from the wild to supply farms." Greenpeace has placed a number of the prominent tropical shrimp species that are farmed commercially on its seafood red list, including the whiteleg shrimp, Indian prawn and giant tiger shrimp. |Wikibooks Cookbook has a recipe/module on| Shrimp are marketed and commercialized with several issues in mind. Most shrimp are sold frozen and marketed based on their categorization of presentation, grading, colour, and uniformity. Shrimp have high levels of omega-3 fatty acids and low levels of mercury. Usually shrimp is sold whole, though sometimes only the meat of shrimp is marketed. As with other seafood, shrimp is high in calcium, iodine and protein but low in food energy. A shrimp-based meal is also a significant source of cholesterol, from 122 mg to 251 mg per 100 g of shrimp, depending on the method of preparation. Shrimp consumption, however, is considered healthy for the circulatory system because the lack of significant levels of saturated fat in shrimp means that the high cholesterol content in shrimp actually improves the ratio of LDL to HDL cholesterol and lowers triglycerides. Shrimp and other shellfish are among the most common food allergens. They are not kosher and thus are forbidden in Jewish cuisine. Shrimp are halal according to some madhāhib, and therefore permissible to most, but not all, Muslims. Several types of shrimp are kept in home aquaria. Some are purely ornamental, while others are useful in controlling algae and removing debris. Freshwater shrimp commonly available for aquaria include the Bamboo shrimp, Japanese marsh shrimp (Caridina multidentata, also called "Amano shrimp," as their use in aquaria was pioneered by Takashi Amano), cherry shrimp (Neocaridina heteropoda), and ghost or glass shrimp (Palaemonetes spp.). Popular saltwater shrimp include the cleaner shrimp Lysmata amboinensis, the fire shrimp (Lysmata debelius) and the harlequin shrimp (Hymenocera picta). |Freshwater aquaria variant shrimp come in many colours| Shrimp versus prawn The terms shrimp and prawn are common names, not scientific names. They are vernacular or colloquial terms which lack the formal definition of scientific terms. They are not taxa, but are terms of convenience with little circumscriptional significance. There is no reason to avoid using the terms shrimp or prawn when convenient, but it is important not to confuse them with the names or relationships of actual taxa. According to the crustacean taxonomist Tin-Yam Chan, "The terms shrimp and prawn have no definite reference to any known taxonomic groups. Although the term shrimp is sometimes applied to smaller species, while prawn is more often used for larger forms, there is no clear distinction between both terms and their usage is often confused or even reverse in different countries or regions." A lot of confusion surrounds the scope of the term shrimp. Part of the confusion originates with the association of smallness. That creates problems with shrimp-like species that are not small. The expression "jumbo shrimp" can be viewed as an oxymoron, a problem that doesn't exist with the commercial designation "jumbo prawns". The term shrimp originated around the 14th century with the Middle English shrimpe, akin to the Middle Low German schrempen, and meaning to contract or wrinkle; and the Old Norse skorpna, meaning to shrivel up. It is not clear where the term prawn originated, but early forms of the word surfaced in England in the early 15th century as prayne, praine and prane. According to the linguist Anatoly Liberman it is unclear how shrimp, in English, came to be associated with small. "No Germanic language associates the shrimp with its size... The same holds for Romance... it remains unclear in what circumstances the name was applied to the crustacean." Taxonomic studies in European on shrimp and prawns were shaped by the common shrimp and the common prawn, both found in huge numbers along the European coastlines. The common shrimp, Crangon crangon was categorised in 1758 by Carl Linnaeus, and the common prawn was categorised in 1777 by Thomas Pennant. The common shrimp is a small burrowing species aligned with the notion of a shrimp as being something small, whereas the common prawn is much larger. The terms true shrimp or true prawn are sometimes used to mean what a particular person thinks is a shrimp or prawn. This varies with the person using the terms. But such terms are not normally used in the scientific literature, because the terms shrimp and prawn themselves lack scientific standing. Over the years the way shrimp and prawn are used has changed, and nowadays the terms are almost interchangeable. Although from time to time some biologists declare certain common names should be confined to specific taxa, the popular use of these names seems to continue unchanged. Various coastal settlements in the United States have claimed the title "Shrimp Capital of the World". For example, the claim was made earlier in the nineteenth century for the Port of Brunswick in Georgia, and Fernandina and Saint Augustine in Florida. More recent claims have been made for Aransas Pass and Brownsville in Texas, as well as Morgan City in Louisiana. The claim has also been made for Mazatlán in Mexico. - Shrimp Encyclopædia Britannica. Retrieved 20 August 2012. - Rudloe & Rudloe (2009), pp. 15–26. - "A bouillabaisse of fascinating facts about fish". NOAA: National Marine Fisheries Service. Retrieved October 22, 2009. - A. Gracia (1996). "White shrimp (Penaeus setiferus) recruitment overfishing". Marine and Freshwater Research 47 (1): 59–65. doi:10.1071/MF9960059. - Rudloe & Rudloe (2009) - Bauer, 2004, Chapter 1, pp. 3–14, - Shrimp Oxford Dictionaries. Retrieved 18 August 2012. - Prawn Oxford Dictionaries. Retrieved 18 August 2012. - Bauer, 2004, Chapter 1, pp. 3–14. - Bauer, 2004, Chapter 2, pp. 15–35. - Ruppert et al. (2004), pp. 628–650. - Mortenson, Philip B (2010) This is not a weasel: a close look at nature's most confusing terms Pages 106–109, John Wiley & Sons. ISBN 9780471273967. - Bruce, Niel and Alison MacDiarmid (2009) "Crabs, crayfish and other crustaceans - Lobsters, prawns and krill" Te Ara - the Encyclopedia of New Zealand, updated 2 March 2009 - Ward, Peter (2006) Out of Thin Air: Dinosaurs, Birds, and Earth's Ancient Atmosphere page 219, National Academies Press. ISBN 9780309141239. - Boßelmann, F.; P. Romanob; H. Fabritiusb; D. Raabeb; M. Epple (October 2007). "The composition of the exoskeleton of two crustacea: The American lobster Homarus americanus and the edible crab Cancer pagurus.". Thermochimica Acta 463 (1–2): 65–68. doi:10.1016/j.tca.2007.07.018. Retrieved 14 August 2012. - Fenner A. Chace, Jr. & Donald P. Abbott (1980). "Caridea: the shrimps". In Robert Hugh Morris, Donald Putnam Abbott & Eugene Clinton Haderlie. Intertidal Invertebrates of California. Stanford University Press. pp. 567–576. ISBN 978-0-8047-1045-9. - Decapod Encyclopædia Britannica. Retrieved 20 August 2012. - S. De Grave, Y. Cai & A. Anker (2008). Estelle Virginia Balian, C. Lévêque, H. Segers & K. Martens, ed. "Global diversity of shrimps (Crustacea: Decapoda: Caridea) in freshwater". Hydrobiologia. Freshwater Animal Diversity Assessment (Springer) 595 (1): 287–293. doi:10.1007/s10750-007-9024-2. ISBN 978-1-4020-8258-0. - Snyderman, Marty and Wiseman, Clay (1996) Guide to Marine Life: Caribbean, Bahamas, Florida Aqua Quest Publications. ISBN 9781881652069. - A. Anker, S. T. Ahyong, P. Y. Noel, and A. R. Palmer (2006). "Morphological phylogeny of alpheid shrimps: parallel preadaptation and the origin of a key morphological innovation, the snapping claw". Evolution 60 (12): 2507–2528. doi:10.1554/05-486.1. PMID 17263113. - "Shrimp, bubble and pop". BBC News. September 21, 2000. Retrieved July 2, 2011. - Kenneth Chang (September 26, 2000). "Sleuths solve case of bubble mistaken for a snapping shrimp". New York Times. p. 5. Retrieved July 2, 2011. - "Sea creatures trouble sonar operators – new enzyme". New York Times. February 2, 1947. Retrieved July 2, 2011. - "Indo-Pacific Periclimines Shrimp (An Overview)". - Decapoda: Reptantia Palaeos. Retrieved 7 September 2012. - Decapoda: Caridea Palaeos. Retrieved 20 August 2012. - What's the difference between a prawn and a shrimp? Museum Victoria. Retrieved 24 August 2012. - S. De Grave & C. H. J. M. Fransen (2011). "Carideorum Catalogus: the Recent species of the dendrobranchiate, stenopodidean, procarididean and caridean shrimps (Crustacea: Decapoda)". Zoologische Mededelingen 85 (9): 195–589, figs. 1–59. ISBN 978-90-6519-200-4. - Baeur, 2004, p.4. - Decapoda Palaeos. Retrieved 20 August 2012. - Sammy De Grave, N. Dean Pentcheff, Shane T. Ahyong; et al. (2009). "A classification of living and fossil genera of decapod crustaceans" (PDF). Raffles Bulletin of Zoology. Suppl. 21: 1–109. Cite error: Invalid <ref>tag; name "Grave" defined multiple times with different content (see the help page). - Shrimp Glossary of aquaculture. Retrieved 24 August 2012. - Codex Alimentarius Commission (2009) Codex Alimentarius: Code of practice for fish and fishery products Page 10, Joint FAO and WHO Food Standards Programme, Rome. ISBN 978-92-5-105914-2. - FAO species catalogue (1980) Introduction - Charles Raabe & Linda Raabe (2008). "The Caridean shrimp: Shrimp Anatomy - Illustrations and Glossary". - Chow S and Sandifer PA (2001) Sperm–egg interaction in the palaemonid shrimp Palaemonetes .. Fisheries Science, 67: 370–372. - Lipke B. Holthuis (1980) "Systematic catalogue of species" Chapter 2, page 1. In: Shrimps and prawns of the world, Volume I of the FAO species catalogue, Fisheries synopsis 125, Rome. ISBN 92-5-100896-5. - "Yabby". Oxford English Dictionary. Oxford University Press. - Marin J "Shrimps and Krill" Fisheries and Aquaculture – Volume 2, Encyclopedia of Life Support Systems, UNESCO. - Volker Siegel (2011). V. Siegel, ed. "Euphausiidae Dana, 1852". World Euphausiacea database. World Register of Marine Species. Retrieved 16 August 2012. - Webster's New World College Dictionary. Cleveland, Ohio: Wiley Publishing. 2010. Retrieved 17 August 2012. - Georges Cuvier (trans. William Benjamin Carpenter) (1851). "Crustacean Entomostraca (Müller)". The animal kingdom: arranged after its organization, forming a natural history of animals, and an introduction to comparative anatomy. W. S. Orr and co. pp. 434–448. - Martin Daintith (1996). Rotifers and Artemia for Marine Aquaculture: a Training Guide. University of Tasmania. OCLC 222006176. - Douglas Grant Smith (2001). "Phyllopodous Branchiopoda (fairy, tadpole, and clam shrimps)". In Douglas Grant Smith. Pennak's Freshwater Invertebrates of the United States: Porifera to Crustacea (4th ed.). John Wiley and Sons. pp. 427–452. ISBN 978-0-471-35837-4. - Denton Belk (2007). "Branchiopoda". In Sol Felty Light & James T. Carlton. The Light and Smith Manual: Intertidal Invertebrates from Central California to Oregon (4th ed.). University of California Press. pp. 414–417. ISBN 978-0-520-23939-5. - Gooderham, John and Tsyrlin, Edward (2002) The Waterbug Book: A Guide to the Freshwater Macroinvertebrates of Temperate Australia Page 76, Csiro Publishing. ISBN 9780643099715. - "malacostracan". Oxford English Dictionary (3rd ed.). Oxford University Press. September 2005. (Subscription or UK public library membership required.) - Patricia Vickers Rich, Mildred Adams Fenton, Carroll Lane Fenton & Thomas Hewitt Rich (1996). "Crustaceans". The Fossil Book: a Record of Prehistoric Life (2nd ed.). Courier Dover Publications. pp. 213–221. ISBN 978-0-486-29371-4. - J. H. S. Blaxter, F. S. Russell & M. Yonge, ed. (1980). The Biology of Mysids and Euphausiids. Advances in Marine Biology 18. Academic Press. pp. 1–680. ISBN 978-0-08-057941-2. - Gilbert L. Voss (2002). "Order Stomatopoda: Mantis shrimp or thumb splitters". Seashore Life of Florida and the Caribbean. Dover pictorial archive series. Courier Dover Publications. pp. 120–122. ISBN 978-0-486-42068-4. - J. Mauchline (1980). J. H. S. Blaxter, F. S. Russell & M. Yonge, ed. Advances in Marine Biology Volume 18. Academic Press. pp. 1–680. ISBN 978-0-08-057941-2. - Kenneth Meland (October 2, 2000). "Mysidacea: Families, Subfamilies and Tribes". Australian Museum. Retrieved September 7, 2010. - Judith Oakley (2006). "Japanese skeleton shrimp - Caprella macho". Marine Life Information Network: Biology and Sensitivity Key Information Sub-programme. Marine Biological Association of the United Kingdom. Retrieved February 2, 2012. - "Caprella mutica Schurin, 1935 – Japanese skeleton shrimp". NOBANIS: European Network on Invasive Alien Species. Retrieved February 2, 2012. - Robert D. Barnes (1982). Invertebrate Zoology. Philadelphia: Holt-Saunders International. pp. 680–683. ISBN 0-03-056747-5. - Based on data sourced from the FishStat database - Voorhies B, Michaels GH and Riser GM (1991) "An Ancient Shrimp Fishery in South Coastal Mexico" National Geographic Research and Exploration,7(1): 20–35. - Reconstructing mobility patterns of late hunter-gatherers in coastal Chiapas, Mexico: The view from the shellmounds" Barbara Voorhies, University of Colorado. - Quitmyer IR, Wing ES, Hale HS and Jones DS (1985) "Aboriginal Subsistence and Settlement Archaeology of Kings Bay Locality" In Volume 2: Zooarchaeology, Reports of Investigations 2, edited by W.H. Adams. University of Florida, Department of Anthropology, Gainesville, FL. - Quitmyer IR (1987) "Evidence for Aboriginal Shrimping Along the Southeastern Coast of North America" Paper presented at the 43rd Meeting of the Southeastern Archaeological Conference, Charleston, SC. - Rudloe and Rudloe, 2009, pp.27–47. - Athenaeus (c. 300 AD) Deipnosophistae, 1 (7): 433. - Holdsworth, Edmund William H (1883) The sea fisheries of Great Britain and Ireland Oxford University. ISBN 9781115411851. Full text - Roberts, p.138 - Seafood Red list Greenpeace. Retrieved 6 August 2012. - FAO species catalogue (1980) Page 46 - Penaeus vannamei (Boone, 1931) FAO, Species Fact Sheet. Retrieved June 2012. - S. De Grave (2010). "Litopenaeus vannamei (Boone, 1931)". World Register of Marine Species. Retrieved June 2012. - FAO species catalogue, 1980. Page 50 - Penaeus monodon (Fabricius, 1798) FAO, Species Fact Sheet. Retrieved June 2012. - S. De Grave (2010). "Penaeus monodon (Fabricius, 1798)". World Register of Marine Species. Retrieved June 2012. - W. Fischer & G. Bianchi, ed. (1984). "Sergestidae". Western Indian Ocean: Fishing Area 51 (PDF). FAO Species identification sheets for fishery purposes 5. Rome: Food and Agriculture Organization. - FAO species catalogue (1980) Page 65 - Acetes japonicus (Kishinouye, 1905) FAO, Species Fact Sheet. Retrieved June 2012. - S. De Grave (2010). "Acetes japonicus Kishinouye, 1905". World Register of Marine Species. Retrieved June 2012. - "Trachypenaeus curvirostris (Stimpson, 1860)" (PDF). Western Indian Ocean (Fishing Area 51) FAO Species Identification Sheets, Volume 5. Food and Agriculture Organization. PEN Trachyp 5. Retrieved April 28, 2012. - R. Gillett (2008). Global Study of Shrimp Fisheries (PDF). Rome, Italy: Food and Agriculture Organization. p. 26. ISBN 978-92-5-106053-7. Fisheries Technical Paper 475. - FAO species catalogue (1980) Page 53 - Trachysalambria curvirostris (Stimpson, 1860) FAO, Species Fact Sheet. Retrieved June 2012. - C. Fransen & M. Türkay (2010). "Trachysalambria curvirostris (Stimpson, 1860)". World Register of Marine Species. Retrieved June 2012. - Penaeus chinensis (Osbeck, 1765) FAO, Species Fact Sheet. Retrieved June 2012. - FAO species catalogue (1980) Pages 41–42 - S. De Grave (2010). "Fenneropenaeus chinensis (Osbeck, 1765)". World Register of Marine Species. Retrieved June 2012. - Penaeus merguiensis (De Man, 1888) FAO, Species Fact Sheet. Retrieved June 2012. - FAO species catalogue (1980) Page 43 - S. De Grave (2010). "Fenneropenaeus merguiensis (De Man, 1888)". World Register of Marine Species. Retrieved June 2012. - FAO species catalogue (1980) Pages 138–139 - Pandalus borealis (Krøyer, 1838) FAO, Species Fact Sheet. Retrieved June 2012. - M. Türkay (2010). "Pandalus borealis (Krøyer, 1838)". World Register of Marine Species. Retrieved June 2012. - Ivor Clucas (1997). Discards and bycatch in shrimp trawl fisheries. Fisheries Circular No. 928 FIIU/C928. Food and Agriculture Organization. - "Final Habitat Plan for the South Atlantic Region". South Atlantic Fisheries Management Council. 1998. - Lance E. Morgan & Ratana Chuenpagdee (2003). Shifting Gears. Addressing the Collateral Impacts of Fishing Methods in U.S. Waters (PDF). Pew science series on conservation and the environment. Island Press. ISBN 1-55963-659-9. - Kaplan (2006) p. 145. - Lucas JS and Southgate PC (2011) Aquaculture: Farming Aquatic Animals and Plants Section 21.2.3, John Wiley & Sons. ISBN 9781444347111. - Shrimp, Aquaculture Stewardship Council (page visited on 7 September 2012). - Martha Mendoza, Margie Mason and Robin McDowell (March 2015). AP Investigation: Is the fish you buy caught by slaves?, The Associated Press - Kate Hodal, Chris Kelly and Felicity Lawrence (June 2014). Revealed: Asian slave labour producing prawns for supermarkets in US, UK, The Guardian - Yung C. Shang, Pingsun Leung & Bith-Hong Ling (1998). "Comparative economics of shrimp farming in Asia". Aquaculture 164 (1–4): 183–200. doi:10.1016/S0044-8486(98)00186-0. - Smith KL and Guentzel JL (2010) "Mercury concentrations and omega-3 fatty acids in fish and shrimp: Preferential consumption for maximum health benefits" Marine Pollution Bulletin, 60 (9): 1615–1618. doi:10.1016/j.marpolbul.2010.06.045, - "Cholesterol Content in Seafoods". Retrieved January 7, 2007. - Elizabeth R. De Oliveira e Silva, Cynthia E. Seidman, Jason J. Tian, Lisa C. Hudgins, Frank M. Sacks & Jan L. Breslow (1996). "Effects of shrimp consumption on plasma lipoproteins" (PDF). American Journal of Clinical Nutrition 64 (5): 712–717. PMID 8901790. - "Common Food Allergens". Food Allergy & Anaphylaxis Network. Retrieved June 24, 2007. - Joe Anderson. "Freshwater Shrimp in the Aquarium". The Krib. Retrieved July 19, 2006. - Lipke B. Holthuis (1980) Shrimps and prawns of the world Volume I of the FAO species catalogue, Fisheries Synopsis No.125, Rome. ISBN 92-5-100896-5. - Chan, TY (1998) Shrimps and prawns In K.E. Carpenter & V.H. Niem. The living marine resources of the western central Pacific. FAO species identification guide for fishery purposes. Rome, FAO. - Blumenfeld, Warren S (1986) Jumbo shrimp & other almost perfect oxymorons Putnam. ISBN 9780399513060. - "Shrimp". Merriam-Webster Online Dictionary. 2008. Retrieved 5 August 2012. - prawnOnline Etymology Dictionary. Retrieved 5 August 2012. - Prawn Merriam-Webster Dictionary. Retrieved 5 August 2012. - Liberman, Anatoly (2012) After ‘shrimp’ comes ‘prawn’ Oxford University Press's Blog, 16 May 2012. - Liberman, Anatoly (2012) A scrumptious shrimp with a riddle Oxford University Press's Blog, 18 April 2012. - Richardson LR and Yaldwyn JC (1958) A Guide to the Natant Decapod Crustacea (Shrimps and Prawns) of New Zealand Tuatara, 7 (1). - Fenner A. Chace, Jr. & Raymond B. Manning (1972). "Two new caridean shrimps, one representing a new family, from marine pools on Ascension Island (Crustacea: Decapoda: Natantia)" (PDF). Smithsonian Contributions to Zoology 131: 18 pp. doi:10.5479/si.00810282.131. - Seabrook, Charles (2012) The World of the Salt Marsh: Appreciating and Protecting the Tidal Marshes of the Southeastern Atlantic Coast Page 301, University of Georgia Press. ISBN 9780820327068 - Jamison CA and Jamison B (2011) Texas Home Cooking Page 257, Harvard Common Press. ISBN 9781558320598. - Koock, Mary Faulk (2001) The Texas Cookbook Page 218, University of North Texas Press. ISBN 9781574411362. - Calhoun M and McGovern B (2008) Louisiana Almanac 2008-2009 Page 273, Pelican Publishing. ISBN 9781589805422. - Stockton, Ethel (2003) Old Is a 4-Letter Word Page 107, Equine Graphics Publishing Group. ISBN 9781410794680. - Bauer, Raymond T (2004) "Remarkable Shrimps: Adaptations and Natural History of the Carideans" University of Oklahoma Press. ISBN 9780806135557. - R. Gillett (2008). Global Study of Shrimp Fisheries. Rome, Italy: Food and Agriculture Organization. ISBN 978-92-5-106053-7. Fisheries Technical Paper 475. - Fransen CHJM and De Grave S (2009) "Evolution and radiation of shrimp-like decapods: an overview" In: Martin J.W., Crandall K.A., Felder D.L. (eds.), Decapod Crustacean Phylogenetics. CRC Press, pp. 246–259. - Kaplan, Eugene H (2010) Sensuous Seas: Tales of a Marine Biologist Princeton University Press. ISBN 9780691125602. - Meyer R, Lochner S and Melzer RR (2009) Decapoda – Crabs, Shrimps & Lobsters pp. 623–670 In: Häussermann V and Förstera G (eds) Marine Benthic Fauna of Chilean Patagonia: Illustrated Identification Guide", Nature in Focus. ISBN 9789563322446. - Poore, Gary (2004) Marine Decapod Crustacea of Southern Australia: A Guide to Identification" Csiro Publishing. ISBN 9780643099258. - Fearnley-Whittingstall, H and Fisher N (2007) The River Cottage Fish Book Page 541–543, Bloomsbury Publishing. ISBN 9780747588696. - Roberts, Callum (2009) The unnatural history of the sea Island Press. ISBN 9781597265775. - Rudloe, Jack and Rudloe, Anne (2009) Shrimp: The Endless Quest for Pink Gold FT Press. ISBN 9780137009725. - Ruppert EE, Fox RS and Barnes RD (2004) Invertebrate zoology: A functional evolutionary approach 7th edition, Thomson-Brooks/Cole. ISBN 9780030259821. - Frederick Schram (1986). The Crustacea (PDF). Oxford University Press. ISBN 978 90 04 12918 4. |Wikimedia Commons has media related to Dendrobranchiata.| |Wikimedia Commons has media related to Caridea.| |Wikimedia Commons has media related to Shrimps in art.| - "Internal and External Anatomy of a Penaeid Shrimp" Fisheries Technical Paper 395, FAO, Rome. - Shrimp versus prawn shrimp,lobster,crab ngrams - Shrimp versus prawns – YouTube - "Shrimp". The New Student's Reference Work. 1914.
<urn:uuid:86e0b203-f009-4984-94ea-ae12e8994c3a>
CC-MAIN-2016-07
http://www.digplanet.com/wiki/Shrimp
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701147841.50/warc/CC-MAIN-20160205193907-00165-ip-10-236-182-209.ec2.internal.warc.gz
en
0.871242
12,725
3.921875
4
According to a scientist at Harvard University, continued production of f-gases, including HFCs and HFOs, will lead to “greater burdens of TFA” (trifluoroacetic acid), an atmospheric byproduct of f-gases widely considered to fall into the category of environmentally persistent PFAS (per- and polyfluoroalyl substances). “Left unchecked, concentrations [of TFA] will continue to increase,” owing to their durability in the environment, a characteristic of PFAS (known as “forever chemicals”), said the scientist, Heidi Pickard, a fourth-year Ph.D. student in the Department of Engineering Sciences at Harvard University, during a presentation at the ATMOsphere (ATMO) America Summit 2023. The event was held June 12–13 in Washington, D.C., and was hosted by ATMOsphere, publisher of R744.com. A widely accepted definition of PFAS published in 2021 by the OECD (Organization for Economic Co-operation and Development) describes PFAS as fluorinated substances that contain at least one fully fluorinated methyl or methylene carbon atom. This definition encompasses certain f-gases, and TFA and is being followed by the EU in its consideration of a new request to regulate PFAS. This year refrigeration OEM Advansor posted on LinkedIn a statement connecting f-gas refrigerants with TFA and PFAS. While earning a master’s degree in chemistry at Memorial University in Newfoundland, Canada, Pickard was part of a study published in 2020 that found three short-chain perfluoroalkylcarboxylic acids (scPFCAs, a subgroup of PFAS), including TFA, in Canadian Arctic ice cores. The increase in TFA concentrations in the ice cores since 1990 suggests that replacements of CFCs with HCFCs and HFCs (and later HFOs) per the Montreal Protocol contributed to the accumulation of TFA, the study found. Certain f-gases are known to degrade via oxidation in the atmosphere into TFA, which then trickles down in rainwater and infiltrates the environment. In particular, up to 20% of HFC-134a converts over 14 years into TFA, while HFO-1234yf changes completely into TFA over a few weeks. HFC-134a’s long lifetime allows it to be transported in the atmosphere to regions like the high Arctic, far from where it was emitted or used, Pickard pointed out. On the other hand, because of its short-lived nature, the atmospheric breakdown of HFO-1234yf contributes to TFA accumulation “close to source regions,” said Pickard, though PFCAs like TFA can move through the ocean via marine aerosols. Pickard noted that the TFA found in the Arctic is thought to come from human (anthropogenic) sources, pointing to a study by some of her colleagues in the earlier work disputing the notion that there are natural sources of TFA. Last year, another study of Arctic ice samples in Svalbard (part of Norway) – “Levels and distribution profiles of Per- and Polyfluoroalkyl Substances (PFAS) in a high Arctic Svalbard ice core” – also found significant levels of TFA. TFA represented 71% of the total mass of shorter-chain PFCAs in the ice core “and had increasing temporal trends in deposition,” says the study, which points to HFCs and other CFC replacement compounds as TFA precursors. While TFA is known to be toxic in low concentrations to green algae and has been found harmful to animals such as rats and rabbits, its toxicity for humans has not been fully established. “The data on TFA’s health effects are very limited,” said Pickard. “But based on the fact that short-chain PFCAs are very persistent, very mobile, will accumulate in aquatic ecosystems and are bioavailable and bioaccumulative – that alone warrants concerns about these chemicals that needs further evaluation and attention.” Germany’s Environment Agency (UBA) has set a human health “orientation value” limit of 60 mcg/l for TFA in drinking water and a “precautionary measure” of 10 mcg/l. The concentration levels of TFA in the environment have begun to approach – or exceed – those levels in some studies. Other recent studies In her presentation, Pickard alluded to other recent studies showing the accumulation of TFA in the environment, including a 2022 study of surface waters in California and studies of plants in Germany. “Every study measuring short-chain PFCAs is seeing an increase in the environment across the globe over the last 10 to 30 years,” she said. In the California study, TFA concentrations in streams increased by an average of six-fold between 1998 and 2021, resulting in a median concentration of 0.18mcg/l (with a range of 0.021–2.79). A follow-up study on the accumulation of TFA in plants – “Long-term trends for trifluoroacetic in terrestrial environmental samples – Analysis of plant samples from the Federal Environmental Specimen Bank (UPB) for trifluoroacetic acid – Part 2” – was published in November 2022 by Finnian Freeling and Merle Käberich of the German Water Center. The German researchers found a “statistically significant increase in TFA concentrations within the study period [1985–2022]” in conifer species, corresponding well with the results from a study of deciduous tree samples in the original study. “The presented results provide further evidence of a substantial increase in the atmospheric TFA deposition within the last decades in Germany.” The highest TFA concentrations – up to just under 1,000mcg/kg dry weight – were discovered in samples of Norway spruce. This year, Chinese researchers published a study projecting HFO emissions – and the resulting TFA deposition – in China. The study estimated cumulative emissions of HFO-1234yf of 1.7Gt between 2024 and 2060, with accompanying deposition of TFA during that period of 0.4 to 1.0Gt. The chemical industry addressed the environmental deposition of TFA in an October 2021 study funded by the Global Forum for Advanced Climate Technologies (globalFACT), which represents f-gas producers Chemours, Honeywell, Arkema and Koura (and equipment manufacturer Daikin). The study concluded that “with the current knowledge of the effects of TFA on humans and ecosystems, the projected emissions through 2040 would not be detrimental.” But the study also acknowledged that “the major uncertainty in the knowledge of the TFA concentrations and their spatial distributions is due to uncertainties in the future projected emissions.” “Based on the fact that short-chain PFCAs are very persistent, very mobile, will accumulate in aquatic ecosystems and are bioavailable and bioaccumulative – that alone warrants concerns about these chemicals that needs further evaluation and attention.”Heidi Pickard, Harvard University
<urn:uuid:f3f77c15-27b3-42f0-ad48-1557a66c979f>
CC-MAIN-2023-40
https://r744.com/f-gas-usage-will-produce-greater-burdens-of-tfa-says-harvard-scientist/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00464.warc.gz
en
0.946989
1,519
2.84375
3
Preparing for 2015 is exciting for many people as it offers a fresh start. For others, the New Year is viewed as a reminder of what was not accomplished. How can you ensure that you will have a Happy New YOU? Making a New Year’s resolution can be one way to start out 2015 with a positive outlook. At least 40% of Americans make New Year’s resolutions; however, according to a 2002 University of Scranton study, only 8% actually achieve their goals. So is making a New Year’s resolution worth the angst of potentially breaking your resolution? A New Year’s resolution is nothing more than setting a goal and developing an action plan. So think about the effective steps of SMART goal setting if you decide a New Year’s resolution is right for you. - Specific – Keep your resolution simple, and avoid using vague notions of what you want to achieve. State your resolution in positive terms rather than negative statements. - Measurable – Identify realistic and achievable metrics to note your progress. Establish periodic milestones, and celebrate the successes along the way to keep yourself motivated. - Attainable – Set a reasonable bar regarding the change you would like to make. Challenge yourself, but this may not be the time to attempt a radical change. - Relevant – How will this resolution fit into your overall life plan? Is this a one-time accomplishment, or something that can be built upon? - Time-bound – Write down your resolution and tell a friend to help keep you accountable. Create a timeline based on your end goal and work backwards to develop your action plan. While it can be fun to make and share New Year’s Resolutions, keep your perspective on the relevance of your resolution. New challenges and competing priorities may shift your focus, so be flexible if other goals become more important than your resolution. Failing to accomplish your resolution does not matter as much as what you learned from the experience. Personal and professional goals help us grow to become the people we want to be. To have a Happy New YOU, remember that self-improvement goals are important throughout the year – not just at the beginning. Norcross, J. C., Mrykalo, M. S., & Blagys, M.D. (2002). Auld lang syne: success predictors, change processes, and self-reported outcomes of New Year’s resolvers and nonresolvers. Journal of Clinical Psychology, 58(4), 397-405.
<urn:uuid:08ddcb30-3ad5-4ca5-a3a4-f5eb2df2e351>
CC-MAIN-2018-26
https://spidercareerblog.wordpress.com/2014/12/29/how-to-have-a-happy-new-you/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865181.83/warc/CC-MAIN-20180623190945-20180623210945-00434.warc.gz
en
0.929477
527
2.578125
3
2012 • $40.00 • 384 pp • paperElectronic Teacher's Manual available While most edited books about crime typically concentrate on a particular dimension of it—the police, the court system, or the theories of crime, Dimensions of Crime as a Social Problem is unique in that it connects a specific problem like crime to a larger set of social problems in American society. Thus, by understanding the challenges presented by poverty, racism, inadequate education, gender, and other issues, one gains a greater understanding of the interplay between these problems as well as how they influence and are influenced by the nature of crime. This book draws on a number of researchers who have examined these relationships and offer students invaluable insight into the complexities of the problems facing society. An update of Understanding Contemporary Social Problems, this reader is designed to serve either as a supplement to a traditional textbook for courses on Social Problems or as a stand-alone text. A teacher's manual is available electronically on a CD or via email. Please contact Beth Hall at [email protected] to request a copy. If you are a professor teaching in this field you may request a complimentary copy.
<urn:uuid:81a4d645-6572-42d9-b556-6e2f7ca9a3ed>
CC-MAIN-2019-18
https://cap-press.com/books/isbn/9781611630824/Dimensions-of-Crime-as-a-Social-Problem
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578733077.68/warc/CC-MAIN-20190425193912-20190425215912-00444.warc.gz
en
0.936367
236
2.953125
3
Who identifies as a “minority” when it comes to race in America? Many Fusion writers and editors find the label misleading and misplaced—and we suspect we’re not alone. What makes the word “minorities” (and, similarly, “nonwhite”) so loaded with misdirection is that it defines American people of color by the negative: not white. Using the terms racial “minorities” and “nonwhite” center all of us around whiteness, as though whiteness were the default against which people are determined. “People of color” is Fusion’s suggested alternative. It doesn’t rely on whiteness as a default in the way “minorities” and “nonwhite” do. Except when individuals prefer identifying as minorities, Fusion supports “people of color” as more evenhanded because everyone should have words that describe who we are, not just who we’re not. The words “minorities” and “nonwhite” are contingent on whiteness for meaning and standing in the United States. Whiteness itself is a construct. While Anglo-Saxons have always been white in this country, people of Irish and Italian descent were only considered white after gaining positions of power and participation. Whiteness had to be acquired, and only then was the barrier to inclusion lowered. And whiteness has never just been a matter of skin tone; it’s always been about privilege and the placement of power—and which individuals are granted access to that privilege and power. That’s not to say that the words “minorities” and “nonwhite” never have a use. These words are common in census reports, surveys, and some scholarship, and they’re selectively useful in journalism when word variety is needed to avoid repetition. “Minority” also works well when power disparities need emphasis, and when “minority” is the most accurate word in a statistical sense: Atheists are a growing minority; deaf and hard-of-hearing people are a statistical minority; LGBTQ members of Congress are a statistical minority. But in many cases it’s a spot-on move to people of color, artists of color, activists of color, students of color, and voters of color in reference to race. Here’s why. Exhibit A: In a video published last year, we started with this draft of a sentence: “Nonwhite” was replaced by “people of color” as an empowering construction: In the same video, another draft of a sentence: “Minority voters” hit an off note and wasn’t accurate—it could have meant religious minorities or sexual and gender minorities, but didn’t—so we agreed on a fix: Onto the video’s title. First attempt: Second, final version: “Why Your Vote Matters” speaks directly to and about people of color—and all people with a vote and a voice. “People of color” was first heard in French-speaking colonies in the late 1700s to mean anyone of African descent who was not enslaved, or gens de couleur libre (free people of color). A starkly racist 1797 survey of what’s now Haiti grouped people three ways: “1st, pure whites. 2d, people of colour and blacks of free condition. 3d, negroes in a state of slavery.” But times and tones changed. “People of color” got a powerful lift when Martin Luther King Jr. referred to “citizens of color” in his “I Have a Dream” speech, linking “of color” to self-empowerment. According to the Pew Research Center, by 2055 the United States “will have no racial or ethnic majority group.” The Census Bureau projects that the U.S. will be what it calls majority-minority—more people of color than white people—by 2044. The word “minority,” when it comes to race in America, is becoming almost meaningless. The point here is not to switch words every generation without changing our thinking. The point is not to make conversation impractical or impossible. The point is to understand there’s a continuum of racial constructs. There is no binary of white and not white. We are also brown Asian Americans, black Latinx, and, quite often, humans who resist being labeled or categorized. “People of color” gets us as close as possible to that continuum without fixing whiteness as a default. A highlight of editorial voices across our staff: Using “minority” to refer to a person who isn’t white is absolutely absurd. It’s lazy in that it groups very different races and ethnicities into one label neglecting any “nonwhite” interracial or intraracial relations. It’s infantilizing, as if “nonwhite” people are legal minors. And it’s degrading in that it renders people of color as peripheral at best, subordinate and subservient at worst, that our lives and stories simply do not matter as much. “Minority” is a reinforcement of the very white perspective that pervades and upholds institutions that were built to exclude people of color while inherently painting the world as black and white when that just isn’t the case. —Isha Aran, Fusion staff writer I know “minority” has a connotation of “oppressed group,” but it becomes useless when you’re talking about women, for obvious reasons. And then you just end up saying “women and minorities,” which is supremely awkward because, well, some of those minorities might be women! —Nona Willis Aronowitz, Fusion features editor I personally do not like the term “minority.” Brown people are essentially the majority throughout the world. Plus the word, honestly, has come to mean nothing. It’s just not a good descriptor. I prefer “people of color” or just the actual names of the nationalities and ethnicities of people. I’ve always hated the word “minority.” It seems to minimize historically marginalized people and erase our various identities. Plus you can’t just dump a bunch of brown people in a bucket when we’re all very different and have different views and opinions and experiences. Also, I just hate the word with a passion. At The Root we try to avoid its usage. Did I mention I hate it? I hate it. —Danielle Belton, The Root managing editor I prefer “people of color” to “minorities,” but the truth is that it’s frustrating that our language is limited in this arena—we do not have the proper words to accurately describe the shifting demographics of this country, and by 2044 we’ll need to have adjusted not just our language, but our thinking and attitudes about the construct of race. “Minorities” refers to quantity, but though there will soon be greater numbers of people of color, this country cannot escape its deep history of institutionalized racism—the after-effects of which last for generations. —Dodai Stewart, editor in chief, Fusion and The Root As Fusion’s style guide editor—a position I share with my brilliant colleagues on questions of inclusivity and accuracy in language—I stand shoulder to shoulder with our creative crew on word choice about people of color’s own lives. Word choice is a choice when it comes to self-identity, so count me in for amplifying the words “people of color” for the powerful reasons that Dodai, Danielle, Isha, and Nona pinpoint—while also supporting staffers and readers who self-identify as “minorities” over “people of color” as personal preference. It’s mystifying and misguided to me that the otherwise thoughtful New York Times style guide still says “people of color” is “too self-conscious for the news columns.” By whose and what measure is “people of color” any more self-conscious than “white” on the continuum of shorthands about race? It is the power and beauty of language that it changes. It is the power and beauty of style guides that they change. It is the power and beauty of minds that they change—or have the potential to change. Concepts, too, can change, under conversational pressure, evidence, persuasion, and the generational reminder of reason and resistance. Have strong thoughts about “people of color” or “minorities,” or another expression entirely? Weigh in below. This post is part of Fusion’s series on our house style guide, a living document spearheaded by senior copy editor Daniel King and crowdsourced from editorial staff across our teams for input on words’ accuracy. Reach us at [email protected].
<urn:uuid:35ace1c1-76b4-4283-b0e6-3ef59da95436>
CC-MAIN-2018-22
https://splinternews.com/stop-calling-people-of-color-minorities-1794856296
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865468.19/warc/CC-MAIN-20180523082914-20180523102914-00451.warc.gz
en
0.944783
1,940
2.953125
3
Writing a Valedictorian Speech from Scratch A valedictorian speech is a sort of privilege, so be thankful, honest, and authentic. Issues related to writing a valedictorian speech from scratch are covered below at college-writers.com in greater detail. Choose a Theme The writing process starts with deciding on a theme or a central message of your speech. What message do you want to deliver? Here are some common themes for graduation speeches: - The meaning and the impact of your education from your perspective. - The way you and your classmates have come from the very beginning to 12th grade and your plans for the future. You may not even stop at college graduations and make some assumptions regarding your careers. - The importance of perseverance and hard work for your education and the role they will play in your future. - How this degree will change your life. - How will you remember school when you start a completely new life? Most often, a thank you section is the first part of speeches. You should thank people who gave you an opportunity to speak, as well as hosts. If it’s high school graduation, you might also thank the principal, the school board members, and other important people before delivering your speech. You should think of how you will start your speech because the beginning of your speech is especially important. Here are some nice things to start with: - An inspirational quote; - An anecdote; - An interesting fact; - A question. You need to grab your audience’s attention, and a good way to do it is to start with an anecdote. It may be a true story that happened in your life, as well as a story about some famous personality. You may also tell a story about your classmates or parents — the main thing is to write something inspirational and related to your life or your plans for the future. The Body of Your Speech Depending on the topic of your valedictorian speech, you should create an outline with the three main sections of your paper: the introduction, body, and conclusion. As you can see, the structure of a speech is similar to that of an essay. The body of your speech may focus on your memories, current events, or a meaningful story. You just have to clearly understand your message and the topic. If your speech will be about the past, present, and future, you can make three major sections in the body of your speech, filling them with different stories and facts. The body of your speech is its longest part. We recommend that you prepare enough material to read it for 15 minutes, however, don’t forget to check the guidelines and requirements of your school. This is the last part of your speech but it’s no less important than other parts. Your conclusion should deliver a message your audience will think about after you finish the speech. End your speech with a call to action, prediction, or an inspirational quote. A prediction would be the best choice if your speech is about the future.
<urn:uuid:7ade39bf-b3bd-4b08-9f9c-fa690295c66f>
CC-MAIN-2020-05
https://college-writers.com/writing-a-valedictorian-speech-from-scratch/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00192.warc.gz
en
0.946964
629
2.671875
3
SOCIAL CONSTRUCTS AND THEIR EFFECTS ON SOCIETY As seen in “Eye of the Storm,” it only takes one person with a dominant character to control a room of people. Jane Elliott goes on to prove her theory, using Hitler’s methods, from third graders in California to college students in New York to working adults in Britain, of segregation. This same process is still seen in schools today and is identified as bullying; kids who lash out at other students and even their teachers. The teachers can have this prejudice too against students who are slower to learn due to dyslexia, color blindness, or autism. These disadvantaged students do not see themselves represented in media or toys they may play with. There is not a number of them to stand up for their rights in each classroom. It’s usually 1 for every 30 students that will struggle for a reason beyond financial, relational, or personal control. The student might want to learn, but the parent isn’t educated enough or is too distracted working to support their other kids to pay attention. The teacher doesn’t appreciate the distraction that child brings to the classroom and the time they take away from other students. The children without these learning disadvantages see that it is ok to single these kids out and harass them. The reality for these slow learners is that they are not as important to their families, peers, teachers, and the media — four out of five agents of socialization. This is a sad realization for these young people and it will go on to influence everything they do in their daily lives. They will feel less important, less needed, and less intelligent. Their families will fight more over the time, finances, and behaviors of the individual. Their peers will tease them and leave them to sit in the corner in class and alone in the lunch room. The teachers will get flustered because they don’t know how to handle the situation, the lack of education in society about it, and the lack of staff to help give that student a chance to learn and thrive at their ability level. Cartoons aimed at children don’t show kids like them, so they must not be normal. Other animals in nature prey on the weak, so they must be like a broken zebra in a field of lions — and that’s what it feels like to them. This is their reality as they have come to know it based on the consequences put upon them externally leading to internal conflict. Learning disabilities are not the fault of their owner. These students are human and they want their basic needs to be met too. They want to feel warm, safe, and capable — of completing the paragraph to read aloud, to color by numbers correctly, and to make it through lunch without a disturbance that further plays on their anti-social behavior. Not everyone on the autism spectrum is a savant and not every other student in the class will grow up to be astronauts and doctors, but the competition is there — it need be more equal. By more equal I mean, it shouldn’t be the colorblind against those with glasses or 20/20 vision competing for a job as an electrician, but the person more able to do the job correctly. Society has made it easier on those unable to see or hear as clear as others by providing glasses and hearing aids, but what about those students who can’t differentiate between colors. They are not even given the chance to compete because they, and those around them, know they will lose. This is an unfair advantage, but perhaps that provides the power differential necessary to maintain competition in the education and work force realms. People might like to think that they work better as individuals, and that might have some truth to it, but it has been proven how well we can use that individualism together to achieve greatness — the idea, the builder, the moderator, the inspector — of planes, skyscrapers, and cell phones. These students shouldn’t be singled out for a disability beyond their control, only for their lack of trying in any individual’s case. People like to help those that see them helping themselves. People in power, the students without learning disabilities, shouldn’t have to put other children in a lower social position in order to achieve their goals. The teachers shouldn’t allow this behavior to happen as it lowers the self-esteem of those picked on and the morale of the class by leaving the shy kids as a quiet witness to these brutalities. Everyone struggles with issues — personal flaws, public persona, financial obligations, family issues, and finding themselves — whatever that means to them. Jane Elliott should be more of an influence in classes everywhere along with another good film, based on real life, called “Freedom Writers” which is about the methods used to stop the pain of segregation. The teacher had the students write to Miep Gies, the woman who saved Anne Frank from the Hitler regime, and she flew from Amsterdam to visit their class in Long Beach, California. It might be easier to judge someone based on the color of their skin rather than the less obvious internal differences, but that doesn’t make either acceptable. From a functionalist point of view, these students serve as motivation for classrooms and society. Don’t be the student who can’t read quickly, color correctly, or go to sleep at night without banging their head on the wall. Don’t be the student that can’t get certain jobs when the problem to add shape recognition to the colors is easily fixable; or the student who can’t coordinate their business attire for the office, and accept that they may only work in black-and-white fashion industries. These seemingly unforeseen inabilities can also pose a health risk to those that suffer and those around them. Only by knowing which light, red or green, goes on top or to the left of a traffic light can someone who is colorblind tell the difference at an intersection. Someone with dyslexia is likely to say the number wrong, but type it correctly, or vice versa which affects them in class, at work, and on vacation. These people don’t need the added stigma to this ordeal. Someone with autism might be sweet in the classroom, but a teacher’s nightmare on the playground. They can be nice during lunch, but hold food in their cheeks at dinner posing a choking hazard and a lack of eating. These situations can be difficult, and not something just anyone is capable of dealing with. Some autistic kids don’t portray this behavior, but society needs to get rid of the stigma and replace it with understanding. This system stabilizes society right now, giving people without these issues something negative outside themselves to focus on. This builds the non-issue people’s self-esteem and maintains a balance in society so that people can continue to feel an unneeded struggle and feel right about the position in life that they live. People may feel that they have earned this situation or that they don’t deserve these difficulties. This puts more strain on an issue that if worked on together could have less of a negative impact, so people are free to focus on more purposeful things in their lives. People feel this system works, but having states opt out of the No Child Left Behind act because the schools, teachers, parents, and community can’t keep up with the demands that advancements in evolution and technology demand of us is not a working system. It is dysfunctional and gives purpose to those who struggle to change the way things work. They fight in the political system, they fight for civil rights, and they fight for a better tomorrow. A day that will bring a bit of change and a bit more sunshine into the dim looking futures of those that are bullied for seeming to appear less worthy in the eyes of society. A famous quote by Bert Lance, “If it ain’t broke, don’t fix it.” In this instance, if it serves a function and society is continuing on, then people shouldn’t interfere with the process. Lance also states, “… The trouble with government:…not fixing things that are broken.” C. Wright Mills argues that as a social product, the human mind might be deteriorating in quality and culture. Some might argue his tumultuous lifestyle conflicted with his theory. Society thrives on conflict to drive motivation and innovation. This means that giving these kids a chance could lead to more positive social interaction and change. “We don’t need a melting pot…We need a salad bowl…You want the vegetables…to maintain their identity. You appreciate differences.” – Jane Elliott *all images collected from Google
<urn:uuid:a6302c14-b89f-4ff1-9bbf-419f93513ad7>
CC-MAIN-2019-35
https://thejessicaness.co/2016/12/07/sociological-homework/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315695.36/warc/CC-MAIN-20190821001802-20190821023802-00253.warc.gz
en
0.96568
1,803
3.53125
4
Sensitive skin is a phenomenon sweeping the skin care industry, with its prevalence reported at 50%–80% of the U.S. population depending on what report you read. So, what exactly defines sensitive skin in the mind of the client and consumer? Is it fair skin that sunburns easily? This is photosensitive skin and not sensitive skin, but many consumers cannot distinguish between the two. Is it skin that gets scaly easily? This is dry skin and not sensitive skin, but again consumers cannot distinguish. Is it skin that stays red for a long time after injury? This is really healing skin and not sensitive skin, but the consumer cannot tell the difference. It is this confusion that leads many to believe they have sensitive skin and purchase products marketed to this population. So, let’s address sensitive skin from a dermatologist’s perspective. This, too, is controversial, as no medical definition exists. Sensitive skin is a marketing term that consumers seem to understand, yet dermatologists do find this concept helpful in treating people who have skin issues. Consumers with sensitive skin can either present with skin that appears normal to the eye or overt skin disease. Those with overt skin disease are sometimes easier to evaluate, since visual inspection can provide an idea of how to approach the problem. Invisible sensitive skin is a tremendous challenge as there is nothing to evaluate, except for information derived from questioning the consumer. Skin Barrier Damage The most common cause of sensitive skin that is easily visualized is damage to the skin barrier. This means that something has irritated the skin resulting in redness, flaking and tenderness. The consumer can easily visualize that something has happened due to the associated stinging, itching, burning and pain sensations. This could be scrubbing too hard with a wash cloth, using an exfoliating alpha hydroxy acid containing moisturizer or engaging into too many aggressive cosmetic procedures. Sensitive skin can be a side effect of the overzealous consumer who engages in weekly microdermabrasion, lunchtime face peels and nightly retinoids. All of these procedures and products damage the skin barrier, which produces sensitive skin over time. The solution to the problem is to simply discontinue the damaging activities and let the sensitive skin self-resolve. From a dermatologic standpoint, the three most common causes of sensitive skin are eczema, atopic dermatitis and rosacea. These three diseases nicely illustrate the three components of sensitive skin, which include barrier disruption, immune hyper-reactivity and heightened neurosensory response. Eczema is the most common cause of sensitive skin, but it is more than just flaky skin. It is flaky, dry skin accompanied by barrier disruption and the resulting inflammation, which makes the skin uncomfortable and sensitive. The most common cause of eczema is consumers using strong cleansers too often on the skin. This type of sensitive skin can be found on any body area, but is most common in areas where oil production is low, such as the upper back, lower arms and lower legs. Decreasing the frequency of bathing, using cooler water and taking shorter baths can all stop barrier damage. Switching to a mild body wash from a stronger deodorant bar soap is also helpful. This type of self-induced sensitive skin is frequently seen in mature individuals who insist on bathing to the point of skin barrier damage. Prescription treatments for this type of sensitive skin includes topical corticosteroids, but many over-the-counter moisturizers for sensitive skin will incorporate botanical anti-inflammatory substances, such as allantoin, chamomile or green tea. Sensitive skin due to eczema is based only on physical barrier disruption, while the sensitive facial skin associated with atopic dermatitis is based both on a barrier defect and a hyperactive immune system. People with atopic dermatitis have eczema, hay fever and sometimes asthma. This means they have many allergies, not only to substances they inhale, but also to foods and skin care products. Their immune system is so hyperactive that they have allergies to substances at a much higher rate than the rest of the population. These individuals have sensitive skin exemplified by many skin product intolerances. Sensitive skin products for this population avoid irritating substances, and may undergo additional testing in individuals with atopic dermatitis to be sure the formulation is truly appropriate for sensitive skin. Rosacea is an example of the third component of sensitive facial skin, which is heightened neurosensory response. Consumers with rosacea experience stinging and burning more frequently than the general population to minor irritants. This may be due to more sensitive nerve endings that produce more sensation. Skin care products that most consumers can tolerate can cause intense burning in consumers with sensitive skin and rosacea. Further, consumers with rosacea also get facial flushing and blushing with minimal stimuli—hot air, cold air, sunlight or wind can cause the face to turn red. People with rosacea also seem to have very reactive blood vessels. For example, certain food substances, such as caffeine and alcohol, can induce a red face that will last for hours. This is why people with rosacea need to avoid coffee, tea, chocolate, wine and beer. Thus, sensitive skin products must also avoid producing any sensation on the skin, such as cooling or warming. This means rapid evaporation of the skin care product from the skin or the introduction of sensates, such as menthol, are not appropriate in sensitive skin products. Sensitive skin products should improve the skin barrier, contain ingredients that have been tested for gentleness and avoid skin irritation. However, sensitive skin problems can still arise from even the best formulated products. Products selected for sensitive skin clientele should perform the following: - Eliminate common allergens and irritants. - Select a reputable manufacturer incorporating high-quality, pure ingredients free of contaminants. - Choose well-preserved products to prevent spoilage. - Avoid solvents, volatile vehicles, vasodilatory substances and sensory stimulators. - Minimize the use of surfactants and select minimally irritating emulsifier systems. There are some important guidelines to consider that may be helpful in minimizing problems for the sensitive skin consumer. Cleansing, moisturizing and color correcting are needed by all sensitive skin clientele, but these products should be chosen wisely by the skin care professional. Cleansing. Sensitive skin consumers require basic hygiene, as the face and body must be cleansed. There is no doubt that synthetic detergent cleansers (syndets) provide the best skin cleansing while minimizing barrier damage. Bars based on sodium cocoyl isethionate appear to perform the best. There are some sensitive skin consumers with minimal sebum production, and a lipid-free cleanser is preferable because it can be used without water and wiped away. These products may contain water, glycerin, cetyl alcohol, stearyl alcohol, sodium laurel sulfate and occasionally propylene glycol. They leave behind a thin moisturizing film and can be used effectively in persons with excessively dry, sensitive or diseased skin. Moisturization. After completing cleansing, the sensitive skin consumer requires moisturization. Moisturizers for sensitive skin should create an optimal environment for barrier repair, while not inducing any type of skin reaction. For example, the product should not contain any mild irritants. The best sensitive skin moisturizers are simple oil-in-water emulsions based on dimethicone containing the fewest ingredients possible. More ingredients create the potential for more problems. Anti-aging moisturizers with 15–30 botanical extracts should be avoided, as basic is better. Color correction. Sensitive skin consumers also require recommendations on proper cosmetic selection. This can be a challenge, since cosmetic formulations change rapidly as dictated by the needs of fashion. The best method for evaluating problematic facial cosmetics is the provocative use test, performed by applying a 2 cm area of product lateral to the eye for five consecutive nights. This allows isolation of the cosmetic products one at a time on the most sensitive part of the face, which has the highest yield of uncovering the problem. The definition and treatment of sensitive skin is a challenge. Sensitive skin can be improved by using a mild cleanser and a good moisturizer to optimize the skin barrier. Inciting allergic and irritant reactions should be avoided with adequate testing of the formulation in persons with sensitive skin. Finally, any substance that creates a sensation activating skin nerves should be avoided. These ideas address the barrier dysfunction, overactive immune system and heightened neurosensory awareness characteristic of sensitive skin. Bathing with cool water and mild soap reduces skin barrier damage. Basic formulations with gentle ingredients minimize irritation for sensitive skin consumers.
<urn:uuid:39cee12e-870f-4f48-b77a-4e1cca408b09>
CC-MAIN-2023-14
https://www.skininc.com/science/physiology/article/21878028/the-sensitive-skin-phenomenon
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00671.warc.gz
en
0.923233
1,826
2.921875
3
This science-as-entertainment book chronicles how a meteorite ended up in the American Museum of Natural History, detailing the steps that brought it from outer space, across the eastern US, to the roof of a car in Peekskill, New York, and thereafter to be verified, tested, and exhibited in the hallowed halls of the AMNH. Hartland describes the space rock's path by showing how it connected to people--e.g., fans at a football game noticed it, the police attributed its crash to vandals, firefighters cooled it off, etc. People can see many things in the sky. What can you see when you look at the sky? Earth is made up of atmosphere that protects us from the sun and contains our air supply. The next part is the hydrosphere, which is all the water on the planet. The third is the geosphere, the rocks. All three parts are closely connected. If we do not take care of one part of Earth, such as the ocean, we hurt the entire planet. Scientists all over the world are working to find ways to reduce pollution and make our Earth healthier. The solar system is made up of planets, moons, asteroids, comets, meteoroids, and more. Young readers will learn about the bodies that make up the solar system and how they interact with each other. Blastoff! Series Students will love learning more about our Earth, Moon, and stars in this title. It gives information on the phases of the Moon, the constellations of stars that we see in the night sky, comets and meteors, and what exactly happens during a lunar eclipse. Xtreme Space brings the wonders of our universe into kids' hands. Sky Watch introduces readers to both the history and future of outer space exploration. These books may be learning tools, but they are also designed to feed the interests of reluctant readers through stunning images from NASA, as well as the Hubble and Spitzer Telescopes. Glossary words provide additional information and understanding to the curious reader. A&D Xtreme is an imprint of ABDO Publishing Company. Explores the closet star to the Earth, the sun, discussing structure, size, color, and formation.
<urn:uuid:cb45ef35-7a6f-42f9-b257-cba710b8593c>
CC-MAIN-2017-39
https://www.biguniverse.com/library/books/how-the-meteorite-got-to-the-museum
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690376.61/warc/CC-MAIN-20170925074036-20170925094036-00320.warc.gz
en
0.936097
458
3.25
3
Many people believe electric vehicles are higher quality than gas-powered vehicles and are emissions-free, which makes them much better for the environment. But two studies have shown that electric cars have more quality issues than gas-powered ones and are not better for the environment. J.D. Power has produced the annual U.S. Initial Quality Study for 36 years, which measures the quality of new vehicles based on feedback from owners. The most recent study, which included Tesla in its industry calculation for the first time, found that battery-electric vehicles (EVs) and plug-in hybrid vehicles have more quality issues than gas-powered ones. According to J.D. Power, owners of electric or hybrid vehicles cite more problems than do owners of gas-powered vehicles. The latter vehicles average 175 problems per 100 vehicles (PP100), hybrids average 239 PP100, and battery-powered cars — excluding Tesla models — average 240 PP100. Tesla models average 226 PP100. Given the average cost of an electric car is roughly $60,000, about $20,000 more than the cost of a gas-powered car, it seems owners of EVs didn’t get the value they deserve. Some blamed the supply-chain disruptions caused by pandemic-related lockdowns as the main reason for EVs’ quality issues. EV makers have sought alternative (sometimes less optimal) solutions to manufacture new vehicles. But the same supply-chain disruption affected makers of gas-powered vehicles. Yet the three highest-ranking brands, measured by overall initial quality, are all makers of gas-powered vehicles: Buick (139 PP100), Dodge (143 PP100), and Chevrolet (147 PP100). Some pointed to the design as a main contributing factor to EVs’ quality issues. According to David Amodeo, global director of automotive at J.D. Power, automakers view EVs as “the vehicle that will transform us into the era of the smart cars,” so they have loaded up EVs with technologies such as touch screens, Bluetooth, and voice recognition. EV makers also prefer to use manufacturer-designed apps to “control certain functions of the car, from locking and unlocking the doors remotely to monitoring battery charge.” Increasing technical complexity also increases the likelihood of problems. Not surprisingly, EV owners reported more infotainment and connectivity issues in their vehicles than owners of gas-powered vehicles. Amodeo acknowledged that “there’s a lot of room for improvement” for EVs. Electric Vehicles Are Worse for the Environment Besides quality issues, a study published by the National Bureau of Economic Research found that electric vehicles are worse for the environment than gas-powered ones. By quantifying the externalities (both greenhouse gases and local air pollution) generated by driving these vehicles, the government subsidies on the purchase of EVs, and taxes on electric and/or gasoline miles, researchers found that “electric vehicles generate a negative environmental benefit of about -0.5 cents per mile relative to comparable gasoline vehicles (-1.5 cents per mile for vehicles driven outside metropolitan areas).” Researchers specifically pointed out that despite being treated by regulators as “zero emission vehicles,” electric cars are not emissions-free. Charging an EV increases electricity demand. Renewal resources supply only 20 percent of the country’s electricity needs. The remaining 80 percent were generated by fossil fuels such as coal and natural gas, despite billions of dollars in green subsidies. “The comparison between a gasoline vehicle and an electric one is really a comparison between burning gasoline or a mix of coal and natural gas to move the vehicle,” according to The American Economic Review. Batteries Create Pollution NBER’s study doesn’t cover all the reasons that EVs are worse for the environment than gas-powered cars. For instance, most of today’s EVs are powered by lithium-ion batteries. Due to heavy government subsidies, China dominates the global production of lithium-ion batteries and their precursor materials, especially graphite. China’s graphite production has notoriously contributed to significant pollution in the country. Pollution can come “from graphite dust in the air, which is damaging whether inhaled or brought down to the earth in the rain,” a Bloomberg report found. More pollution results from the hydrochloric acid used to process mined graphite into a usable form. Hydrochloric acid is highly corrosive and can cause great environmental damage if leaked into groundwater or streams. China’s Shandong province, which is responsible for 10 percent of global graphite supply, had to suspend some of its production capacity due to environmental damages. But the growing demand in the west for EVs means such suspensions will only be temporary. A typical electric car needs 110 pounds of graphite, and a hybrid vehicle needs around 22 pounds. Ironically, the U.S. government’s EV subsidies end up subsidizing China’s highly polluted production. So if you think you are doing your part of saving the planet by driving an EV, think twice. We also know from past experiences that pollution in China ends up harming the rest of the world. Compelling Americans to switch from gas-powered cars and trucks to electric ones has been crucial to President Joe Biden’s plan to fight climate change. He signed an executive order last year to have electric vehicles make up half of new cars and trucks sold in the U.S. by 2030. These studies show that Biden’s plan will result in Americans spending more money on vehicles of inferior quality while having little effect on climate change. More importantly, his plan will enrich the Chinese Community Party at the expense of the environment and U.S. taxpayers.
<urn:uuid:3b9bdc37-c4bf-4c61-8ead-715723a1e7de>
CC-MAIN-2022-40
https://thefederalist.com/2022/07/11/studies-show-the-electric-vehicles-democrats-insist-you-buy-are-worse-for-the-environment-and-lower-quality/?utm_source=feedly&utm_medium=rss&utm_campaign=studies-show-the-electric-vehicles-democrats-insist-you-buy-are-worse-for-the-environment-and-lower-quality
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00223.warc.gz
en
0.95542
1,175
2.671875
3
The use and characteristics of rolling flanges Rolling flanges are widely used,and the scope of use is determined according to different characteristics.It is mostly used in the case of moderate media conditions,such as low pressure non-purified compressed air and low pressure circulating water. The advantage of rolling flange is that the price is relatively cheap.The rolling flange is suitable for steel pipe joints with a nominal pressure not exceeding 2.5 MPa.The sealing surface of the rolled flange can be made into a smooth type,a concave-convex type and a grooved type.The smooth rolling flange has the largest application amount.Two other types of rolled flanges are also common in use. Rolling flanges are available in many types and models.Welded steel flanges are used for flange and tube butt welding.They are mainly used in welding technology and have good performance characteristics.The structure is reasonable, and the strength and rigidity are large.It can withstand high temperature and high pressure, repeated bending and temperature fluctuation, and has reliable sealing performance. The rolled flange with nominal pressure of 0.25~2.5MPa adopts concave and convex sealing surface.The main application environment of the coiled flange is suitable, and it needs to be determined according to the specific conditions to ensure the specific use value and performance of the rolled flange, and to withstand high temperature and high pressure. Hebei Haihao Group specializes in the production of various types of steel pipes,pipe fittings and flanges.If you would like to know more about pipeline products,please email us:[email protected]
<urn:uuid:fd0f39db-4d18-4454-9c51-39d800602a1c>
CC-MAIN-2022-27
https://www.weldflange.com/the-use-and-characteristics-of-rolling-flanges.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215805.66/warc/CC-MAIN-20220703073750-20220703103750-00234.warc.gz
en
0.923343
349
2.515625
3
The challenges of globalization have made international labour standards more relevant than ever. What benefits do they provide today? A path to decent work International labour standards are first and foremost about the development of people as human beings. In the ILO's Declaration of Philadelphia of 1944, the international community recognized that "labour is not a commodity". Indeed, labour is not like an apple or a television set, an inanimate product that can be negotiated for the highest profit or the lowest price. Work is part of everyone's daily life and is crucial to a person's dignity, well-being and development as a human being. Economic development should include the creation of jobs and working conditions in which people can work in freedom, safety and dignity. In short, economic development is not undertaken for its own sake but to improve the lives of human beings; international labour standards are there to ensure that it remains focused on improving human life and dignity. An international legal framework for fair and stable globalization Achieving the goal of decent work in the globalized economy requires action at the international level. The world community is responding to this challenge in part by developing international legal instruments on trade, finance, environment, human rights and labour. The ILO contributes to this legal framework by elaborating and promoting international labour standards aimed at making sure that economic growth and development go along with the creation of decent work. The ILO's unique tripartite structure ensures that these standards are backed by governments, employers, and workers alike. International labour standards therefore lay down the basic minimum social standards agreed upon by all players in the global economy. A level playing field An international legal framework on social standards ensures a level playing field in the global economy. It helps governments and employers to avoid the temptation of lowering labour standards in the belief that this could give them a greater comparative advantage in international trade. In the long run such practices do not benefit anyone. Lowering labour standards can encourage the spread of low-wage, low-skill, and high-turnover industries and prevent a country from developing more stable high-skilled employment, while at the same time making it more difficult for trading partners to develop their economies upwards. Because international labour standards are minimum standards adopted by governments and the social partners, it is in everyone's interest to see these rules applied across the board, so that those who do not put them into practice do not undermine the efforts of those who do. A means of improving economic performance International labour standards are sometimes perceived as entailing significant costs and thus hindering economic development. A growing body of research indicates, however, that compliance with international labour standards often accompanies improvements in productivity and economic performance. Higher wage and working time standards and respect for equality can translate into better and more satisfied workers and lower turnover of staff. Investment in vocational training can result in a better-trained workforce and higher employment levels. Safety standards can reduce costly accidents and health care fees. Employment protection can encourage workers to take risks and to innovate. Social protection such as unemployment schemes and active labour market policies can facilitate labour market flexibility; they make economic liberalization and privatization sustainable and more acceptable to the public. Freedom of association and collective bargaining can lead to better labour-management consultation and cooperation, thereby reducing the number of costly labour conflicts and enhancing social stability. (Note 1) The beneficial effects of labour standards do not go unnoticed by foreign investors. Studies have shown that in their criteria for choosing countries in which to invest, foreign investors rank workforce quality and political and social stability above low labour costs. At the same time, there is little evidence that countries which do not respect labour standards are more competitive in the global economy. (Note 2) A safety net in times of economic crisis Even fast-growing economies with high-skilled workers can experience unforeseen economic downturns. The Asian financial crisis of 1997 showed how decades of economic growth could be undone by dramatic currency devaluations and falling market prices. Unemployment doubled in many of the countries affected. The disastrous effects of the crisis on workers were compounded by the fact that in many of these countries social protection systems (notably unemployment and health insurance), active labour market policies and social dialogue were seriously wanting. After examining the social impact of the crisis, an ILO study concluded that strengthening social dialogue, freedom of association, and social protection systems in the region would provide better safeguards against such economic downturns. (Note 3) A strategy for reducing poverty Economic development has always depended on the acceptance of rules. Legislation and functioning legal institutions ensure property rights, the enforcement of contracts, respect for procedure, and protection from crime - all legal elements of good governance without which no economy can operate. A market governed by a fair set of rules and institutions is more efficient and brings benefit to everyone. The labour market is no different. Fair labour practices set out in international labour standards and applied through a national legal system ensure an efficient and stable labour market for workers and employers alike. Of course, in many developing and transition economies a large part of the workforce is active in the informal economy. Moreover, such countries often lack the capacity to provide effective social justice. Yet international labour standards can be effective tools in these situations as well. Most standards apply to all workers, not just those working under formal work arrangements; some standards, such as those dealing with homeworkers, migrant and rural workers, and indigenous and tribal peoples, actually deal specifically with areas of the informal economy. The extension of freedom of association, social protection, occupational safety and health, vocational training, and other measures required by international labour standards have proved to be effective strategies in reducing poverty and bringing workers into the formal economy. Furthermore, international labour standards call for the creation of institutions and mechanisms which can enforce labour rights. In combination with a set of defined rights and rules, functioning legal institutions can help formalize the economy and create a climate of trust and order which is essential for economic growth and development. (Note 4) The sum of international experience and knowledge International labour standards are the result of discussions among governments, employers and workers, in consultation with experts from around the world. They represent the international consensus on how a particular labour problem could be tackled at the global level and reflect knowledge and experience from all corners of the world. Governments, employers' and workers' organizations, international institutions, multinational companies and non-governmental organizations can benefit from this knowledge by incorporating the standards in their policies, operational objectives and day-to-day action. The standards' legal character allows them to be used in the legal system and administration at the national level, and as part of the corpus of international law which can bring about greater integration of the international community. - A fair globalization - Creating opportunities for all Report of the World Commission on the Social Dimension of Globalization, 2004 - Working out of Poverty Report of the Director-General to the 91st Session of the International Labour Conference June 2003 (pdf 380KB) Note 1 - World Bank: World Development Report 2005: a better investment climate for everyone (Washington, DC, 2005), pp. 136-156 Note 2 - D. Kucera: "Core labour standards and foreign direct investment", in International Labour Review, Vol. 141, No. 1-2 (2002), pp. 31-70. Note 3 - E. Lee: The Asian financial crisis: the challenge for social policy (Geneva, ILO, 1998). Note 4 - ILO: Decent work and the informal economy, Report VI, International Labour Conference, 90th Session, Geneva, 2002, pp. 39-54; A Fair Globalization, op. cit., pp. 80-99.
<urn:uuid:2a8f4afd-70dd-445e-9dde-2d8fb2436df5>
CC-MAIN-2014-10
http://www.ilo.org/global/standards/introduction-to-international-labour-standards/the-benefits-of-international-labour-standards/lang--en/index.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010951612/warc/CC-MAIN-20140305091551-00079-ip-10-183-142-35.ec2.internal.warc.gz
en
0.932682
1,552
3.3125
3
Unique light-activated resin hardens even when underwater While we've certainly heard of epoxy resins that harden when exposed to light, usually all of the substance has to be exposed. A new additive causes resin to solidify when even only a bit of it gets lit up, however – plus it works underwater. Developed at the Vienna University of Technology, the proprietary compound can be added to existing epoxy resins in either a liquid or paste form. Initially, it's transparent. When any part of the resin is irradiated by a flash of light, though, a chemical reaction occurs that generates heat. That heat spreads throughout the resin, resulting in a cascade effect that causes all of the material to cure and harden within seconds – this even includes bits that may be hidden from the light, down inside cracks or whatnot. The resin turns a darker color at this point, letting users know that the process is complete. Currently, the additive is triggered by either ultraviolet or high-intensity visible light, depending on its formulation. Importantly, it still works when the resin is mixed with carbon fibers, meaning that it could be used in the production or repair of composite materials. And yes, resin containing the additive can even be applied and then cured underwater. At first, the scientists assumed that the heat generated within the resin would dissipate out into the water, keeping the material from solidifying. It turned out, however, that the chemical reaction caused the water immediately surrounding the resin to boil, creating a protective layer of water vapor along the material's surface. The university is now looking for industry partners that may be interested in commercializing the technology. It could ultimately find use in applications such as aerospace, shipbuilding, structure restoration, or pipeline repair. A paper on the research, which is being led by Prof. Robert Liska, was recently published in the journal Composites Part A: Applied Science and Manufacturing.
<urn:uuid:2bab5794-da0a-47ae-a2d1-36f62b84e065>
CC-MAIN-2021-17
https://newatlas.com/materials/light-activated-resin-hardens-underwater/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038863420.65/warc/CC-MAIN-20210419015157-20210419045157-00003.warc.gz
en
0.949099
397
3.578125
4
In 1962, a young National Geographic's photographer found himself not only a member of the primary press pool making shots of John Glenn being launched into space, but the next day he found himself the only press photographer to scuba dive with Glenn off Grand Turk Island, where the first American to orbit the Earth had been flown after being recovered from the ocean. It was an exciting moment for Otis Imboden, who had been on the National Geographic's staff less than a year. Born in Memphis, Tenn., Imboden had received a master's degree in English literature from the University of Chicago before spending four years in Panama as public relations officer for the Pan-American Highway. A certified diver and licensed pilot; he was hired by the National Geographic on May 31, 1961. Very soon he was thrown into the magazine's ongoing efforts to document the space program. By that time, the magazine had loaned several of its top photographers to NASA and their photographs were being released through the agency to newspapers and magazines throughout the world. But the magazine's editors were convinced that the importance of the space program justified stationing their own full-time correspondent at Cape Canaveral. They chose Imboden to act loosely as a liaison with NASA, always be on hand to photograph launches and other events. Therefore he moved his family to the cape and remained for nearly a decade. Imboden got along well with all kinds of people and official doors opened for him wherever he went. From Project Mercury through Gemini to Apollo, he photographed such things as the X-15, astronaut survival training in the Arctic, in the jungles of Panama, and in space-related installations all over the country. During periods of decreased mission activity he worked exclusively for NASA, helping the agency with its photo coverage. As NASA photographs, his pictures were released to the world press through the Still Photo Pool, a consortium of National Geographic, Life, The Associated Press, United Press International and the World Book Encyclopedia Science Service. Imboden also occasionally served as the Still Photo Pool coordinator. Primarily though, he photographed launches and recoveries. He was the primary pool photographer on the ground during Gemini 4 and thus made every photograph published of the astronauts approaching the launch vehicle, even if the photographs carried a NASA credit line. He was aboard the carried Wasp when Gemini 6 and Gemini 7 plopped down within two days of each other. But he was left empty-handed aboard the Boxer in the Atlantic when Gemini 8 made an emergency landing on the Pacific. Then he made spectacular pictures from the prime recovery helicopter of Gemini 9 parachuting into the ocean, a dramatic sequence that, released through the Still Photo Pool, was published in Life Magazine. Imboden continued these activities during Apollo. In 1969, he spent Christmas at sea aboard the carrier Yorktown, documenting the recovery of Apollo 8 for NASA and the world press. During Apollo 11 he photographed the joyous reaction at Mission Control to the sight of the astronaut's safe return. After Apollo 11, National Geographic, along with many other magazines, began to scale back its space coverage. The Still Photo Pool was disbanded, as mission photography in space was not producing more exciting results than shots of launches and recoveries. Imboden finally moved from the cape to Washington in the fall of 1969. At that same time he received the Apollo Achievement Award. After his move, Imboden's assignments gradually shifted away from space coverage and he retired from the magazine in 1986.
<urn:uuid:21f43ff6-ff41-41b6-8f68-cadfbd8f5728>
CC-MAIN-2015-27
http://www.nasa.gov/centers/kennedy/about/history/chroniclers/imboden.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098196.31/warc/CC-MAIN-20150627031818-00025-ip-10-179-60-89.ec2.internal.warc.gz
en
0.975536
716
2.640625
3
Where in Canada do people speak French? French is the mother tongue of more than 20% of Canadians and roughly one-third of the population can speak French proficiently at work. The majority of French speakers live in Quebec, where the majority of the population is Francophone. It's common to see signs and menus in French. Other provinces, such as New Brunswick, are also home many French speakers. You can check more tours to Quebec on Globerouter.
<urn:uuid:e9419ee8-2328-4c47-bc11-50ed1353371a>
CC-MAIN-2020-10
https://www.globerouter.com/qna/view/id-565
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145316.8/warc/CC-MAIN-20200220224059-20200221014059-00052.warc.gz
en
0.973302
94
2.828125
3
Medicines and Science: Another Example of Animal Research Misleading Science Thalidomide, the nightmare drug responsible for over 10,000 human birth deformities, has again reared its ugly head with the appearance of its dreadful effects being passed on to the children of victims. This latest threat of the possibility further litigation against the makers of thalidomide has once again rallied industry-beholden animal researchers to the drug's defence with laboratory data "disproving" the clinical findings. As reported in the British Sunday Mirror, the babies of six young men who were born deformed because of thalidomide have also been born with malformed limbs. Two of the babies have almost identical deformities to their fathers. Obstetrician Dr William McBride, whom first warned against thalidomide in 1961, has called on doctors to study children of victims and report back to determine the scale of the tragedy. (1) He says there are second-generation victims in Germany, Japan and Bolivia as well as Britain. (2) Despite the clinical evidence, to the contrary British health authorities such as the Medical Research Council maintain that the vast bulk of evidence from laboratory and animal tests is against thalidomide having any genetic effects. (2) There is no doubt that results from animal experiments will play a major part in the drug's defence, as it has done from when thalidomide's horrible effects first started appearing back in the early 1960's. In fact, thalidomide apologists still adhere to the defence that the thalidomide tragedy could not have been predicted, mainly because the drug had not been tested specifically for birth defects before being marketed, as at the time it was not required by law. This convinced most, including health activists campaigning for thalidomide's victims. Thalidomide campaigners argue that the thalidomide tragedy is not an example of an animal-tested drug that proved disastrous for humans, but of the dishonesty and sharp practices of the pharmaceutical industry. This view is based upon the fact that the animal tests carried out by the inventor of the drug, the West German pharmaceutical company Chemie Grünenthal, were very superficial and incomplete, and their clinical trials were hastily done and questionable. (3) Also, prior to the introduction of thalidomide Grünenthal did not carry out animal tests specifically to demonstrate teratogenic (malformation causing) effects. (4) There is also no evidence that any of the drug licensees did either. However, it soon will become evident that the human birth deformities caused by thalidomide was the result of misleading results from animal experimentation as well as the dishonesty and ruthless behaviour of drug companies. In 1957, soon after launching Contergan (thalidomide) in West Germany, came reports of peripheral neuritis that revealed thalidomide's toxic effects on the nervous system of the user. (5) This is a serious illness that may occur anywhere in the body. For example, it may begin with a prickly feeling in the toes, followed by a sensation of numbness and cold. The numbness spreads often above the ankles, and eventually is followed by severe muscular cramps, weakness of limbs, and a lack of co-ordination. Some of these symptoms improve or disappear when the cause is removed, but much of the damage is irreversible. (6) Peripheral neuritis does not itself point to reproductive damage, but many scientists would take such an assault on the nervous system as grounds for general suspicion. (7) One such scientist, McCredie reported that the limbs of children with thalidomide malformations show changes analogous to those that can occur in the adult as a consequence of pathological alterations to peripheral nerves. (8) Such a suspicion was suggestive enough to cause Dr Frances Kelsey, the Medical Officer of the Food and Drug Administration, to reject the drug firm's application to market Kevadon (thalidomide) in the United States, because among other reasons, she wasn't satisfied that the drug would be safe to take during pregnancy. Her handwritten note on the original memorandum reads: "This was based on peripheral neuritis symptoms in adults." (9) The original animal tests by Chemie Grünenthal did not show indications of this unexpected and serious side-effect. (10) Furthermore, in several European countries, including England and Sweden, the licensees of thalidomide carried out their own animal tests, independently from the German firm, and came to the same results as Chemie Grünenthal. (11) If the tests had predicted peripheral neuritis and if the firms acted upon the results in a responsible manner, the drug would not have been released in the first place and a major disaster would have been avoided. Unfortunately this wasn't the case: "an estimated 10,000 children-but probably many more-born throughout the world as phocomelics, deformed, some with fin-like hands grown directly on the shoulders; with stunted or missing limbs; deformed eyes and ears; ingrown genitals; absence of a lung; a great many of them still-born or dying shortly after birth; parents under shock, mothers gone insane, some driven to infanticide." (12) (Hans Ruesch, medical historian.) Moreover, to illustrate just how criminally neglectful the firms behaved, consider the fact that despite thousands of cases of peripheral neuritis and that a growing number of cases of deformities were being reported the drug firms resisted moves to withdrawal their products. Besides, their resumed animal tests could not duplicate the deformities, so they saw no reason to remove the drug. Only until the evidence was overwhelming did Chemie Grünenthal finally take Contergan off the market. (13) Also, in other countries around the world including Brazil, Italy, Japan, and Sweden and Canada drugs containing thalidomide were not withdrawn until a year or longer after Grünenthal's withdrawal of the drug. (14) As a consequence, to the thalidomide tragedy there has been a marked upsurge in the number of animals used in testing of new drugs. In addition, drugs are now specifically tested on pregnant animals to supposedly safeguard against possible teratogenic effects on the human foetus. Vivisector's claim that if such tests were carried out prior to thalidomide's release, birth deformities in humans would have been discovered. This is of course sheer nonsense. "In pregnant animals, differences in the physiological structure, function, and biochemistry of the placenta aggravate the usual differences in metabolism, excretion, distribution, and absorption that exist between species and make reliable predictions impossible." (15) (Dr Robert Sharpe, former senior research chemist.) In fact when the link between human foetal abnormalities and thalidomide was established (through clinical observation), the world-wide explosion of animal testing, using a large range of species, proved very difficult to duplicate the abnormalities. (16) Writing in his book Drugs as Teratogens, J.L. Schardein observes: "In approximately 10 strains of rats, 15 strains of mice, eleven breeds of rabbit, two breeds of dogs, three strains of hamsters, eight species of primates and in other such varied species as cats, armadillos, guinea pigs, swine and ferrets in which thalidomide has been tested teratogenic effects have been induced only occasionally." (17) Eventually after administrating high doses of thalidomide to certain species of rabbit (New Zealand White) and primates could similar abnormalities be found? However, researchers pointed out that malformations, like cancer, could occur when practically any substance, including sugar and salt, is given in excessive doses. (16) All this just reaffirms what many doctors and scientists have been warning for a number of decades-animal experimentation misleads science and any similarity to the human situation is merely a coincidence and cannot be verified until the experiment is repeated on humans. Experimenting on animals is like playing roulette. (18) The massively increased use of test animals following the thalidomide tragedy only served to dupe the public, encouraging it to keep consuming animal tested drugs. Consequently, malformations are increasing. Over twenty years later, on July 19, 1983, a headline in the New York Times revealed: "Physical and Mental Disabilities in Newborns Doubled in 25 Years". More recently, the March of Dimes Birth Defects Foundation, an organisation responsible for monitoring birth defects, reveals that every year more than a quarter million babies (1 in 12) are born with birth defects in the United States. In West Germany's authoritative medical journal Münchner Medizinische Wochenschrift, 1969, Dr W.Chr. Müller of the nation's First Gynaecological University Clinic reported that an extensive survey by German doctors had revealed that "for 61% of all malformed children born alive and 88% of all stillborn children the intake of various drugs had to be held responsible." (19) While drug companies continue to be allowed, releasing their products based on phoney, alibi animal experiments is there any wonder why humanity continues to suffer drug-induced problems of such magnitude. Published in the Spring 1996 issue of the CAFMR Newsletter. Copyright 1996 by the Campaign Against Fraudulent Medical Research, P.O. Box 234, Lawson NSW 2783, Australia. Phone +61 (0)2-4758-6822. The above article may be downloaded, copied, printed, or otherwise distributed without seeking permission from CAFMR. However, printed acknowledgement is required when this is done. 1. "Thalidomide dad's tragedy", Sunday Mirror, London, July 3, 1994. 2. "Thalidomide horrors show up in the children of victims", Gold Coast Bulletin, Australia, April 26, 1995. 3. Sjöström, H., and Nilsson, R., Thalidomide and the Power of the Drug Companies, Penguin Books, 1972, p. 191. 4. ibid., p. 189. 5. Sharpe, R., The Cruel Deception: The Use of Animals in Medical Research, Thorsons Publishing Group, Wellingborough, England, 1988, pp. 105-6. 6. The Sunday Times Insight Team, Suffer The Children: The Story of Thalidomide, Andre Deutsch, London, 1979, p. 32. 7. ibid., pp. 62-3. 8. McCredie, J., "Thalidomide and congenital charcot's joints", Lancet, 1973, vol. 2, p. 1058-61. 9. The Sunday Times Insight Team, Suffer The Children, p. 79. 10. Sharpe, R., The Cruel Deception, p. 106. 11. Ruesch, H., Slaughter of the Innocent, Civitas Publ., New York, 1986, p. 360. 12. Ruesch, H., Slaughter of the Innocent, pp. 360-1. 13. ibid., p. 361. 14. Sjöström, H., et al, Thalidomide and the Power of the Drug Companies, pp. 131-48. 15. Sharpe, R., The Cruel Deception, p. 107. 16. Ruesch, H., Slaughter of the Innocent, p. 361. 17. Reproduced in Drugs and Pregnancy-Human Teratogenesis and Related Problems, Hawkins, D.F. (Ed.), Churchill Livingston, 1983. 18. Croce, P.,"That's why I am against vivisection" in CIVIS International Foundation Report, Ruesch, H. (Ed.), CIVIS, Massagno, Switzerland, Autumn 1989, Nr 7, p. 1. 19. Müller, W., Münchner Medizinische Wochenschrift, 1969, No. 34, repr. in Ruesch, H., Slaughter of the Innocent, p. 365.
<urn:uuid:470338d5-8874-4873-80ee-6c6c7c1f9267>
CC-MAIN-2019-47
https://www.thalidomideuk.com/science-info
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668004.65/warc/CC-MAIN-20191114053752-20191114081752-00066.warc.gz
en
0.939076
2,526
2.671875
3
Graphene was isolated for the first time in 2004, by Prof Andre Geim and Prof Kotsya Novoselov from the University of Manchester. The discovery won them a Nobel Prize in Physics. The characteristics of Graphene that makes it so important is that it is the world’s first 2D material, it is ultra-light and still 200 times stronger than steel. It is also the thinnest material you will find in the world today, transparent and also extremely flexible. These are just some of its important properties, so you can well imagine its scope of application in our world today. In addition to energy, electronics, biomedical and other uses, Graphene will now be used to make running shoes and it will debut in 2018. This innovation is introduced by a British sportswear brand known as inov-8, and they in collaboration with the University of Manchester to incorporate the material into their shoes. This world’s first Graphene shoes will be coming to the market in the year 2018. According to the laboratory test conducted by inov-8 in collaboration with National Graphene Institute, the composite rubber outsoles will be much stronger and flexible than traditional materials, this will make the Graphene shoes more resistant to wear and tear. This innovation is good news especially for off-road runners and fitness athletes as they will no longer have to worry about bad grip in addition to stretch, durability and traction. Inov-8 CEO, Ian Bailey made it known that product innovation is the number one priority for their brand, as it is the only way they can compete with other major sports brands. The pioneering collaboration between inov-8 and the University of Manchester places the brand and Britain as the forefront of Graphene sports footwear revolution .
<urn:uuid:a0b33dce-b588-47b5-b8a7-1fc3d609d5b6>
CC-MAIN-2020-16
https://blogginfotech.com/graphene-running-shoes-debuts-in-2018/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371618784.58/warc/CC-MAIN-20200406035448-20200406065948-00253.warc.gz
en
0.965244
364
2.765625
3
The Thought Cycle Photo By: Jeremy Bishop As we have stated before, basically, we think all the time. The Thought Cycle is a visual way as well as a logical way to break down our thinking step by step so as to perceive more concretely how it influences our choices and their concurrent results. So, conscious or unconscious, we’re thinking! The cycle works like this: Something happens (someone says something, an event occurs, etc.). We then will have thoughts about it – sometimes a few thoughts, sometimes many. Writing down as many of the thoughts as we can think of associated with the event helps us see how many thoughts we have about a circumstance or event or relationship. As we review each thought we can ask, “When I thought such and such, how was I feeling?” The idea is to start to see how our feelings are the indicators of the quality of our thoughts. Our feelings come from our thoughts, not the other way around. Our feelings actually are thoughts in motion. Based on some of those thoughts that make sense to us, we then take some action. Behavior is informed by thinking. We make choices based on the way we see life experience. Then based on the action we took, we get a certain outcome. When we see the results of our behavior, we can look at the thinking we have related to the results, and we can begin to see the cyclical nature of our thinking, for our thinking related to the results usually reinforces our original thought about the circumstance we first used as an example. The phrase “self-fulfilling prophesy” comes to life. The Thought Cycle helps all of us as leaders in whatever area of life we find ourselves, to see the impact of our thinking more clearly. The more we understand the impact of our thinking, the better equipped we are to simply know which thoughts or thinking we should take seriously, and which we should probably ignore. Healthy leaders see their thinking for what it is and discern which thoughts to bring to life with their attention and action, and which to let dissolve back to dust. It can be quite an illumination to realize that we don’t have to take all our thinking seriously!
<urn:uuid:36b76b71-1b63-47ef-81a8-81ef947f8ae0>
CC-MAIN-2020-05
https://www.whitebirdrising.com/the-thought-cycle/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598217.23/warc/CC-MAIN-20200120081337-20200120105337-00004.warc.gz
en
0.967909
458
2.828125
3
How many hours does a teacher spend preparing students for “multiple assessments”? According to the first of a two-part report from the ASCD (formerly the Association for Supervision and Curriculum Development; Part 2 will be released tomorrow), the answer depends on what you mean by the term assessments: if you’re talking about everything from pop quizzes to standardized tests, many teachers might answer that they spend all their time teaching, if not to the tests, then with the tests in mind. Over the past 10 years, particularly with the advent of No Child Left Behind (NCLB), school culture has become a testing culture. Some educators lament that prepping for tests means taking time away from deeper learning. Marge Scherer, editor-in-chief of ASCD’s Educational Leadership says that teachers should understand the various assessments and try to raise understanding, not just student scores. David Heistad, executive director of Research, Evaluation and Assessment for Minneapolis Public Schools, says that test preparation in large amounts is “counterproductive.” He strongly discourages teachers from doing too much. “The best way to learn [reading comprehension] is to read a diversity of books. For math, keep up with daily assignments,” Heistad said in an interview for “ThreeSixty” magazine, a publication by the University of St. Thomas in Minneapolis. As assessment experts Stephen Chappuis, Jan Chappuis, and Rick Stiggins write (p. 15), “NCLB has exposed students to an unprecedented overflow of testing. But do all these multiple measures really lead us to achieve the three most often cited goals of testing: Building proficiency in basic skills, closing achievement gaps, and fostering the top-notch knowledge and skills that students will need in a competitive global society?” Other questions to consider: Now that the United States is poised to enter a new testing era: All but two states have agreed to work toward creating common academic standards, with the eventual goal of establishing common assessments. What will become of tests like the National Assessment of Educational Progress (NAEP)? With these common standards, what might be a better way to construct assessment systems, and what tools can be implemented to help students develop their critical and creative thinking skills to solve real-world problems? by Marge Scherer How many hours of classroom time do you typically spend administering standardized tests to students each school year? In my search for that statistic, I found one high school teacher estimating he spent 40 school days each year administering and prepping students for “bubble tests.” Perhaps an even more important question is, How many hours does a teacher spend preparing students for “multiple assessments”? That answer depends on the interpretation of the term assessment—are you counting pop quizzes and spelling bees, essays and multimedia projects, teacher-made and standardized tests, entrance and exit tests, pre-tests and post-tests, interim and benchmark assessments, statewide and national tests, and preparation for the AP exam, SAT, and ACT? Are you adding in daily, minute-by-minute checks for understanding? If all answers apply, many teachers might answer that they spend all their time teaching, if not to the tests, then with the tests in mind. To read the entire article visit
<urn:uuid:90a5e358-9ed8-4680-ace1-53a9989fca16>
CC-MAIN-2017-39
http://www.caroljcarter.com/multiple-measures-the-tests-that-wont-go-away/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690112.3/warc/CC-MAIN-20170924171658-20170924191658-00534.warc.gz
en
0.946243
686
2.828125
3
Of course, if you want to use an interface, use "implements" in the class declaration. A class can extend at most one other class (and, in fact, has to...if you don't declare a super class, you by default get the "Object" class as your super class. The Object class is the only class that does not have a super class.) However, it can implement any number of interfaces: Of course, don't confuse the "is-a" with the "has-a" relationship. A HomoSapiens is a Chordata (going back enough super classes); but it has a Spine (making it a member of the Vertebrata sub-phylum, but that's a bit too involved for this example... ) I hope that this answers your question and does not confuse you further... Piscis Babelis est parvus, flavus, et hiridicus, et est probabiliter insolitissima raritas in toto mundo. Go to http://mindview.net/Books and download the excelent free book "Thinking In Java". Then get the example code as well. Bruce Eckel wrote a very good chapter on inheiritence and Object Oriented Design. Work through the first 3 or 4 chapters of that book and you'll understand it perfectly. Hope it helps. Greg For a good Prime, call:<br />29819592777931214269172453467810429868925511217482600306406141434158089
<urn:uuid:f34d7107-1258-4d76-92c8-1ed6a95f6415>
CC-MAIN-2015-48
http://www.coderanch.com/t/393972/java/java/inheriting-class
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398462686.42/warc/CC-MAIN-20151124205422-00305-ip-10-71-132-137.ec2.internal.warc.gz
en
0.90327
329
2.875
3
● TT: How bad is the scenario in Jharkhand? Sharma: It is a deteriorating trend in major cities, visible in every component of the atmosphere, soil, water and air ● What are the main reasons behind this? The most important factor is unrestricted urban vertical growth. Wetlands have shrunk, which has affected plant and animal life. Pollution by industries and domestic sewage are the other factors ● How has this affected flora and fauna? We can hardly find native species of plants like ficus, fig and peepal. These have been replaced with exotic and invasive species like Australian babool, acacia and lantana, which do not have the capacity to regulate temperature and increase water holding capacities ●How has water bodies been affected? A large number of ponds have been filled and encroached upon for housing. There has been a composite change in aquatic species. One hardly finds fresh water snails nowadays ● How important is Jubilee lake for Jamshedpur? It acts as a thermo regulator. There is less heat and pollution as hot air goes up along with suspended particles ● What led to the recent fish deaths? Because of civic neglect, water level shrunk and algae bloomed. There was an influx of toxic pollutants from domestic and industrial sewage. This led to depletion of dissolved oxygen causing fish to die ● What about Subernarekha? Industrial and agricultural sewage are killing it ● In the monsoon, we see frequent flash floods. Slag dumping and unbridled sand mining has led to the the river becoming shallow and its banks narrow. This leads to frequent floods ● Migratory birds have stopped coming. Thatís because of disturbances caused by boating and pollution ● Who is responsible for poor state of Jayanti Sarovar at Jubilee Park? The corporate sector has stopped caring, regulatory bodies such as the state pollution board have stopped monitoring. The high court has taken suo motu cognisance of the fish deaths. May be weíll see a revival of the lake now.
<urn:uuid:2598d63f-5f6c-49ff-a05c-b77a62501a0d>
CC-MAIN-2015-27
http://www.telegraphindia.com/1140512/jsp/jharkhand/story_18331465.jsp
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096290.39/warc/CC-MAIN-20150627031816-00032-ip-10-179-60-89.ec2.internal.warc.gz
en
0.964514
429
2.75
3
What is a subluxing patella? A subluxing patella (kneecap) is a temporary, partial dislocation of the kneecap from its normal position in the groove in the end of the thigh bone (femur). This groove is located between two bumps at the end of the thigh bone called the femoral condyles. How does it occur? This temporary dislocation of the kneecap usually happens during forced leg straightening, with the kneecap moving out of the groove to the outer side of the knee. The cause is usually an abnormality in the way your legs are built. You may have an underdevelopment of the inner thigh muscle or an overdevelopment of the outer thigh muscle. Your kneecap may be higher in the leg than usual. You may be knock-kneed or have underdevelopment of the outer (lateral) femoral condyle. What are the symptoms? You may feel the kneecap moving out of position. You may have swelling and pain behind the kneecap. You may have pain when you bend or straighten your leg. How is it diagnosed? Your health care provider will ask about your symptoms and examine your knee. He or she may be able to feel the kneecap slipping to the outside as you bend and straighten your leg. An x-ray may show underdevelopment of the lateral How is it treated? Treatment may include: - putting ice packs on your knee for 20 to 30 minutes every 3 to 4 hours for the first 2 or 3 days or until the pain goes away - Elevating your leg with the knee straight. It is best to get your ankle above the level of your heart. - taking an anti-inflammatory medication - wearing a brace prescribed by your health care provider to keep your kneecap in place - doing exercises to strengthen the inner side of the thigh muscle (quadriceps). Some people need surgery to keep the kneecap from subluxing. While you are recovering from your injury you will need to change your sport or activity to one that will not make your condition worse. For example, you may need to bicycle instead of run. When can I return to my sport or activity? The goal of rehabilitation is to return you to your sport or activity as soon as is safely possible. If you return too soon you may worsen your injury, which could lead to permanent damage. Everyone recovers from injury at a different rate. Return to your sport or activity will be determined by how soon your knee recovers, not by how many days or weeks it has been since your injury occurred. In general, the longer you have symptoms before you start treatment, the longer it will take to get better. You may safely return to your sport or activity when, starting from the top of the list and progressing to the end, each of the following is true: - Your injured knee can be fully straightened and bent - Your knee and leg have regained normal strength compared to the uninjured knee and leg. - Your knee is not swollen. - You are able to jog straight ahead without limping. - You are able to sprint straight ahead without limping. - You are able to do 45-degree cuts. - You are able to do 90-degree cuts. - You are able to do 20-yard figure-of-eight runs. - You are able to do 10-yard figure-of-eight runs. - You are able to jump on both legs without pain and jump on the injured leg without pain. If you develop pain, swelling, or the feeling that your kneecap is moving out of place again, you need to contact your health care provider. How can I prevent a subluxing kneecap? A subluxing kneecap is best prevented by keeping your thigh muscles strong, especially the group of muscles on the inner side of the thigh. To help with consistent knee pain or has a preventive treatment contact jointVitality today. The jointVitality treatment does not help with a knee cap dislocation specifically but it can be treated by our doctors.
<urn:uuid:4965d04d-7873-4351-b0d9-aa90da64e31b>
CC-MAIN-2015-06
http://kneevitality.com/capdislocation.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115862441.40/warc/CC-MAIN-20150124161102-00243-ip-10-180-212-252.ec2.internal.warc.gz
en
0.931842
919
3.09375
3
University Air Training Corps Previous/other names: UATC; University Reserve Training Program (URTP); University Squadron Prominent date(s) of activity: 1942 - 1944; 1951 - 1957 History: University Air Training Corps (UATC) squadrons were set up in several universities across the country and, under government regulations, were part of the Reserve of the Royal Canadian Air Force. Students interested in enlisting with Royal Canadian Air Force (RCAF) upon the completion of the course were encouraged to train with the UATC instead of the Canadian Officers Training Corps (COTC) — which would allow them to skip basic training, entering directly into Elementary Flight School or Navigation School. All male students, unless physically unfit, had to enlist in either the UATC or the COTC. Though discontinued at UNB in 1944, the organization was reinstituted in the post-war era as the University Reserve Training Program (URTP). Activities: Those enrolled in the UATC underwent approximately 125 hours of prescribed training per year for two years. Students could enrol in one of two courses: aircrew and ground training. Aircrew trained for active duty in the Air Force, while ground training was particularly suited to undergraduates studying medicine, engineering, and those specializing in navigation. Supplemented by training exercises, members of the UATC studied Air Navigation, Principles of Flight, Armament, Organization and Administration, etc. Those enrolled in the UATC travelled to Moncton for a training camp at No. 8 S.F.T.S. in the spring of 1943, and to Yarmouth in the summer of 1944. As the URTP, members of the organization participated in the Tri-Service shooting competition and travelled to visit relevant RCAF sites in the area. Upon reorganizing after the Second World War, the organization enrolled several female members in its ranks. - The Brunswickan, vol. 62, no. 6, 30 October 1942, p. 1. - UNB Scrapbooks (UA RG 100), 1919 - 1943. The Daily Gleaner, "University Air Training Corps Formed at U.N.B.," 28 September 1942. - UNB Scrapbooks (UA RG 100), 1944 - 1945. The Daily Gleaner, "U.N.B. Army, Air Cadets Complete Summer Training," 4 June 1944; The Daily Gleaner, "U.N.B. Opens for Fall Term — Air Training Discontinued," 26 September 1944. - The Brunswickan, vol. 63, no. 2, 8 October 1943, p. 1. - Up the Hill, 1943, War Effort. - Up the Hill, 1953, p. 89. - Up the Hill, 1954, p. 71. - Up the Hill, 1955. © UNB Archives & Special Collections, 2014
<urn:uuid:4218453c-9f7a-4524-bb60-df4fdf7180cd>
CC-MAIN-2022-05
https://unbhistory.lib.unb.ca/index.php?title=University_Air_Training_Corps&direction=next&oldid=6104
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302355.97/warc/CC-MAIN-20220120160411-20220120190411-00523.warc.gz
en
0.950206
610
2.828125
3
Suicide Threats and Teens The suicide rate among adolescents has tripled in the last twenty-five years. It has grown so rapidly that suicide now ranks as the third leading cause of death among adolescents. For every completed adolescent suicide, there are more than 60 unsuccessful adolescent attempts to end one's own life. If any of the symptoms of depression are also accompanied by suicidal talk or behavior, you're going to want to intervene. Fascination with death, dying, or suicide is a common feature of depression in adolescence and should not be taken lightly. Some of the warning signs of suicide include: - Seeming depressed; low energy level; loss of interest in things. - Talking about suicide or discussing suicidal fantasies. Your teen may not discuss these issues with you, but you may get reports from siblings or even friends who are worried. - Giving away treasured possessions. - Writing about death in journals. A teen who wants you to know what he is thinking may actually leave a journal out around the house open to significant pages. (If he does, assume that it's supposed to be read.) - Commenting, “I wish I were dead.” - Discussing or gathering information on suicide methods. - Displaying a sudden mood lift following a period of depression without cause. (This may indicate that the teen feels elation and relief over finally deciding to take control of his problem—by committing suicide.) There's a saying: “Suicide is a permanent solution to a temporary problem.” You want to be there with your teen while the problem is still “temporary.” If you suspect that your teen is contemplating suicide, contact someone about your suspicions right away. Call your teen's doctor, the school psychologist (or your child's counselor), a suicide prevention center, a community mental health center, an emergency room, or a family service agency. Any of these places are prepared to help you or can refer you to the best place to get the help you need. More on: Teen Behavior and Discipline Excerpted from The Complete Idiot's Guide to Parenting a Teenager © 1996 by Kate Kelly. All rights reserved including the right of reproduction in whole or in part in any form. Used by arrangement with Alpha Books, a member of Penguin Group (USA) Inc. To order this book visit Amazon's web site or call 1-800-253-6476.
<urn:uuid:5dcd6593-9bc8-4549-b023-2691ed7d0936>
CC-MAIN-2015-11
http://life.familyeducation.com/teen/mental-illness/48626.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00008-ip-10-28-5-156.ec2.internal.warc.gz
en
0.945632
502
3.03125
3
A lot of young people struggle with depression, a fact that is especially true for girls. But youth who are physically active are less vulnerable. NTNU master’s student Vanessa Solvang cultivates tiny little beating hearts in the lab. She takes good care of them, weekends included. It’s been 20 years since the first draft sequence of the human genome was published in the journals Nature and Science. The result led then-President Bill Clinton to state that we are now learning the language in which life was written, and that “doctors will increasingly be able to cure diseases like Alzheimer’s, Parkinson’s, diabetes, and cancer by attacking their genetic roots.” Sequencing 30 000 genes has changed the world, but in a different way than expected. NTNU researchers have started testing a COVID-19 test strategy developed in house: saliva samples you take yourself, without involving health personnel. This means that researchers may be able to knock back the coronavirus epidemic faster, more easily and much more cheaply than today. The method is now being tested on NTNU students. The risk of dying from heart disease, chronic lung disease or diabetes in adulthood is twice as high for preemies —premature infants — as for the general population. Even those who were born just two to three weeks before term have a slightly increased risk. NTNU researchers are on track to find drug combinations that could help stop the coronavirus across the globe. Some patients are more profitable for Norwegian hospitals than others. Most hospital physicians believe that managers care too much about the financial operation of hospitals. Nine hundred people from Trøndelag county have donated their bodies to research when they die. Why do they do it, and what are the bodies actually used for? Come on into the anatomical laboratory at NTNU. The story of what happened when a molecular biologist, some engineers and PhDs and postdocs from NTNU and St Olavs Hospital put their heads together to design a completely different kind of coronavirus test. Two effective treatment methods for generalized anxiety disorders also reduces the neuroticism personality trait. Eliminating the sugar tax and reducing the taxes on beer and wine will have health consequences, according to Steinar Krokstad, a professor of public health at NTNU. For the first time, researchers are measuring the brain processes that control an infant’s first arm movements. The findings may shatter old myths about the immature baby brain. What assistive technologies are the world’s elderly and disabled using? And what hidden needs does this group have? SINTEF has been contracted by the World Health Organisation (WHO) to find out. New findings show that cholesterol crystals in the uterine wall are the villain that researchers have been looking for. These crystals cause intensified inflammation in people who become ill. Several studies have demonstrated that tiny biological particles called exosomes may carry important information about diseases. We are currently searching for these tiny particles in cooperation with our project partners. If we succeed, we can use the exosomes to predict diseases before they occur. Many low and middle-income countries, particularly in sub-Saharan Africa, don’t have enough surgeons to perform vital surgeries, such as groin hernia repairs. Training non-doctor associate clinicians in this procedure provides a safe and effective solution, a new study shows. It’s easy to believe that society’s treatment of difficult, violent and criminally mentally ill people has become more humane over time. But that’s not the case. How patients at the end of the 19th century actually felt is difficult to say, but they were at least less exposed to mechanical coercion, according to an NTNU historian. Having several chronic health problems at the same time is common – especially among people with the fewest resources. High-intensity interval training strengthens the heart even more than moderate exercise does. Now researchers have found several answers to what makes hard workouts so effective. Gene therapy is the most effective method to be able to provide health benefits you normally gain through physical exercise. This means of “training” could be helpful for folks who can’t exercise in the usual ways. The 2020 ISI/Web of Science Highly Cited Researchers list includes seven researchers affiliated with NTNU. The list includes authors who have multiple articles ranked in the top 1 per cent by citation in their field over the last decade.
<urn:uuid:036c3f03-c200-4e36-b4a0-f8fb0d7a04cc>
CC-MAIN-2022-27
https://norwegianscitechnews.com/archive/health/page/4/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104141372.60/warc/CC-MAIN-20220702131941-20220702161941-00013.warc.gz
en
0.957462
932
2.75
3
Have you ever wondered if it's possible to track someone's exact location using just their phone number? The answer is yes, thanks to advanced technology and the availability of IP addresses. An IP address is a unique identifier assigned to every device connected to the internet. By tracking someone's IP address, you can determine their exact location, providing valuable information for various purposes. Tracking an IP address and obtaining the exact location can be beneficial in many scenarios. For individuals, it can help locate a lost or stolen phone, ensuring its safe recovery. It can also be used by parents to keep an eye on their children's online activities, ensuring their safety and well-being. For businesses, tracking IP addresses can help in fraud detection, cybersecurity, and identifying potential customers' geographical locations. Now, you might be wondering how to track an IP address and get the exact location for free. Several websites and online tools offer this service, allowing users to enter a phone number and obtain valuable information. Keep in mind that the accuracy of the location may vary depending on the availability of data and the privacy settings of the device connected to that IP address. However, these free tools can still provide a general idea of the location, helping you in your quest to track someone's whereabouts. What is IP Address? An IP address, or Internet Protocol address, is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main purposes: identification and location tracking. They allow devices to communicate with each other and enable packet routing across the Internet. An IP address consists of four sets of numbers separated by periods, such as 192.168.0.1. Each IP address is unique to a specific device or network. When you connect to the Internet using your phone, your device is assigned an IP address by your Internet Service Provider (ISP). This IP address is used to identify your device and track its location. In terms of identification, an IP address can be compared to a telephone number. It allows devices to establish connections and send and receive data over the network. Just like a phone number, each IP address is unique and identifies a specific device or network. IP addresses also play a crucial role in location tracking. By analyzing the IP address of a device, it is possible to determine its approximate geographic location. However, it is important to note that IP-based location tracking is not always accurate and can only provide an estimate of the device's location. Various online services and tools claim to offer free IP address tracking by phone number to determine a device's exact location. However, it is important to be cautious when using such services, as they may not always provide accurate results. Importance of Tracking IP Address Tracking the exact IP address can provide valuable insight into the location and identity of an individual or organization. Whether it's for security purposes or for gathering data, tracking IP addresses has become an essential tool in today's digital world. By tracking an IP address, you can determine the geographical location of the user. This information is valuable for businesses, as it enables them to tailor their products or services to specific regions or markets. It can also help in detecting fraudulent activities and preventing unauthorized access. In addition, tracking IP addresses can be beneficial in tracking down cybercriminals or individuals involved in illegal activities. Law enforcement agencies use this technique to trace online threats, identify hackers, and prevent cybercrimes. Moreover, tracking IP addresses can be useful in resolving disputes or investigations. It allows organizations to gather evidence, track online interactions, and identify potential witnesses or suspects. While tracking IP addresses is an effective tool, it is important to respect privacy and legal boundaries. It should be used responsibly and within the confines of the law. Overall, the ability to track IP addresses is essential in today's digital landscape. It provides crucial information for businesses, law enforcement agencies, and individuals in various situations, ensuring a safer and more informed online environment. Different Methods to Track IP Address When it comes to tracking an IP address, there are various methods available. Whether you want to find the exact location of a number for free or track the IP address of a website, these methods can help you achieve your goal. One of the common methods to track an IP address is by using an IP lookup tool. These tools allow you to enter an IP address and retrieve information about its location, including the country, region, city, and even the latitude and longitude. Some IP lookup tools also provide additional details such as the ISP and the time zone. Another method to track an IP address is through IP tracking software. This software can be installed on a computer or a server and can monitor incoming connections. It can log IP addresses, timestamp, and other relevant information. This can be useful in tracking the IP address of a specific person or device that is accessing your network. In addition to IP lookup tools and IP tracking software, there are also online services that provide IP geolocation services. These services use databases and algorithms to determine the location of an IP address. They can provide more detailed information about the location, including the street address. Lastly, it is important to note that while tracking the IP address of a number or a website can provide valuable information, it is not always 100% accurate. IP addresses can be dynamic and can change frequently, especially for mobile devices. Additionally, IP addresses can also be masked or hidden using proxies or virtual private networks (VPNs). Therefore, it is important to consider these factors when using IP tracking methods. Using Phone Number for IP Address Tracking Tracking the IP address location can be done by using a phone number. This method utilizes the unique number assigned to each phone and the IP address associated with it. By retrieving the IP address linked to a phone number, the exact location of the device can be determined. One of the key advantages of using a phone number for IP address tracking is that it can be done for free. There are several online services and tools available that allow users to trace the IP address associated with a phone number without any cost. When tracking the IP address using a phone number, it is important to note that the exact location might not always be revealed. If the phone user is connected to a mobile data network, the IP address will reveal the location of the mobile network tower, rather than the exact position of the user. The accuracy of the IP address location can vary depending on various factors, such as the type of network connection and the service provider. However, it can still provide valuable insights and help narrow down the general location of a device. It is worth mentioning that tracking the IP address location using a phone number should be done within legal boundaries and with the user's consent. Privacy laws and regulations should always be considered when using such methods. In conclusion, using a phone number for IP address tracking can provide valuable information about the location of a device. While it may not always provide the exact address, it can still offer useful insights, and there are free tools available to perform this tracking. Free Tools for Tracking IP Address by Phone Number Tracking the IP address of a phone number can be a useful tool when you want to determine the exact location of the device. There are several free tools available that allow you to track an IP address using a phone number. These tools utilize various methods to provide you with the most accurate location information. 1. IP Logger IP Logger is a popular free tool that allows you to track the IP address of a phone number. Simply enter the phone number into the tool, and it will generate a unique link. When the recipient clicks on the link, their IP address will be recorded, and you will receive the location information. 2. IP Lookup IP Lookup is another free tool that lets you track IP addresses by phone number. It uses a comprehensive database to provide you with the exact location information of the device. Simply enter the phone number, and it will display the IP address and location details. These free tools can be handy for various purposes, such as locating a lost or stolen phone, monitoring the activity of family members, or investigating suspicious calls. However, it's important to note that tracking someone's IP address without their consent may violate privacy laws, so always use these tools responsibly and within legal boundaries. Advantages of Free IP Address Tracking Tools Tracking the location of an IP address can be crucial in many situations, whether it's for security purposes, marketing research, or troubleshooting network issues. Free IP address tracking tools offer several advantages: - Accurate Address Tracking: These tools provide precise information about the location of an IP address, allowing businesses and individuals to identify the exact geographic location of a device or network. - Real-Time Updates: Free IP address tracking tools often offer real-time updates, ensuring that the location information is up to date and reliable. This is particularly useful for tracking mobile devices or dynamic IP addresses. - Easy to Use: Most free IP address tracking tools have simple interfaces and user-friendly features, making them accessible even to individuals with minimal technical knowledge. They often require only a phone number or IP address to initiate a search. - Cost Savings: As the name suggests, free IP address tracking tools eliminate the need for expensive software or subscription-based services. Users can obtain location information without the need for a significant investment. - Compatibility: Free IP address tracking tools are designed to work with a variety of devices and operating systems, ensuring compatibility regardless of the user's setup. This allows businesses to track IP addresses across multiple platforms. - Privacy Protection: With free IP address tracking tools, individuals can search for the location of an IP address without revealing their own personal information. This helps maintain privacy and prevent potential security risks. Overall, free IP address tracking tools provide a convenient and cost-effective way to track the location of an IP address. Whether it's for personal or business use, these tools offer valuable insights that can assist in various scenarios. Limitations of Free IP Address Tracking Tools While free IP address tracking tools can be useful for obtaining general location information based on a phone number or IP address, they have certain limitations. These limitations can affect the accuracy and reliability of the results. Lack of Exact Location: Free IP address tracking tools may not always provide the exact location of an IP address or phone number. They often provide a general area or city rather than an exact address. This can be a drawback if you need precise location information. Inaccuracy: Due to the dynamic nature of IP addresses and phone numbers, the information obtained from free tracking tools may not always be up to date or accurate. IP addresses can change frequently, especially for mobile devices, making it difficult to track their exact location. Limited Coverage: Free IP address tracking tools may not have access to all IP addresses or phone numbers. Some tools may only be able to track a limited number of IP addresses or phone numbers, which can limit their usefulness in certain situations. Privacy Concerns: Using free IP address tracking tools may raise privacy concerns. These tools often obtain data from public sources, which means that anyone can access the same information. This can be a concern if you want to track the location of your own IP address or phone number. Overall, while free IP address tracking tools can provide some general location information, it is important to be aware of their limitations. For more accurate and reliable results, it may be necessary to use paid IP address tracking services or consult with professional tracking experts. How to Use Free IP Address Tracking Tools When it comes to tracking the exact location of an IP address or phone number, there are several free tools available that can provide you with the necessary information. These tools can be helpful in various situations, such as locating a lost phone, identifying the source of a suspicious email or call, or tracking the location of a website visitor. One popular method is to use websites that offer free IP address tracking services. These websites typically provide a search bar where you can enter the IP address or phone number you want to track. Once you enter the information, the tool will start searching its database for the location associated with that IP address or phone number. These free IP address tracking tools use various methods to determine the location of an IP address or phone number. Some tools rely on databases that contain information about IP address ranges and their corresponding locations. These databases are constantly updated and can provide accurate results in most cases. Other IP address tracking tools use advanced geolocation techniques to pinpoint the exact location of an IP address or phone number. They analyze network traffic, Internet Service Provider (ISP) data, and other factors to determine the most likely location of the target. Once the IP address tracking tool has found the location associated with the IP address or phone number, it will usually display this information on a map. You might see the city, region, and country where the IP address or phone number is registered. In some cases, you may even get additional details, such as the name of the ISP or the organization that owns the IP address. It's important to note that while these free IP address tracking tools can provide valuable information, they are not always 100% accurate. In some cases, the location displayed might not be the exact physical location of the IP address or phone number, but rather the location of the ISP's headquarters or data center. Nevertheless, these tools can be a useful starting point if you need to track the location of an IP address or phone number. They can help you gather valuable information that can assist with your investigation or help you locate a lost device. With just a few simple steps, you can access these free IP address tracking tools and get the location information you need. Accuracy of IP Address Tracking by Phone Number When it comes to tracking the location of a phone number using its IP address, it is important to keep in mind that the accuracy may vary. The IP address is a unique identifier assigned to a device connected to the internet, including mobile phones. By tracking the IP address, it is possible to determine the general location of the device. However, it is essential to note that the accuracy of IP address tracking is not always exact. While the IP address can provide an approximate location, it cannot pinpoint the exact address or phone number associated with a particular IP address. The accuracy of IP address tracking can be influenced by various factors, including the type of internet connection and the use of virtual private networks (VPNs). VPNs can mask the true IP address and location of a device, making it more challenging to track the exact location. The Role of Geolocation Databases To track the location of a phone number using the IP address, geolocation databases are often used. These databases contain information about the approximate locations of IP addresses based on their recorded data. However, it is crucial to understand that these databases may not always be updated in real-time, resulting in potential discrepancies in the accuracy of the tracking. Furthermore, the accuracy of IP address tracking can also be affected by the dynamic nature of IP addresses. Internet service providers (ISPs) regularly assign new IP addresses to their users, making it difficult to track the location of a phone number accurately. In conclusion, while it is possible to track the location of a phone number using its IP address, the accuracy may not always be exact. Factors such as the use of VPNs and dynamic IP addresses can affect the precision of the tracking. Geolocation databases can provide a general idea of the location associated with an IP address, but they may not always reflect real-time information. Therefore, it is important to use IP address tracking as a tool for approximate location tracking rather than relying on it for precise address or phone number identification. Legal and Ethical Considerations in IP Address Tracking When it comes to tracking IP addresses, there are legal and ethical considerations that need to be taken into account. While it might be tempting to utilize free online services to track the exact location of a phone number based on its IP address, it is important to understand the boundaries and potential consequences of such actions. |There are laws in place that govern the use of IP address tracking. Depending on your jurisdiction, tracking someone's IP address without their consent could be illegal, unless there is a valid legal reason such as a court order. |Respecting an individual's privacy is an important ethical concern. Even if you have the technological capability to track someone's IP address, it is crucial to consider whether it is morally acceptable to invade someone's privacy in this way without their knowledge or consent. |Using free services to track IP addresses may come with certain risks. These services might not be accurate or reliable, and there is a possibility of obtaining incorrect information which can lead to false accusations or harm. |Transparency is a key ethical principle. If you decide to track someone's IP address, it is important to be open and transparent about your intentions and reasons. Communicating openly with individuals and seeking their informed consent is essential. |When it comes to legal proceedings, the admissibility of IP address tracking evidence may vary depending on the jurisdiction and specific circumstances. It is important to consult with legal professionals and ensure that any evidence obtained through IP address tracking is obtained lawfully and admissible in court. |The potential misuse of IP address tracking information is a significant ethical concern. If the information obtained is used for malicious purposes or without legitimate justification, it can lead to harassment, stalking, or other forms of harmful behavior. In conclusion, while it may be tempting to track the exact location of an IP address free of charge, it is crucial to consider the legal and ethical implications of such actions. Respecting privacy, obtaining informed consent, and using accurate and reliable methods are essential in ensuring that IP address tracking is conducted in an ethical and lawful manner. Alternative Methods of IP Address Tracking While tracking the exact location of an IP address by phone number is a popular method, there are alternative approaches available for identifying the location of an IP address. One method is to use a geolocation database. These databases contain information about the location of IP addresses and can be used to determine the approximate physical location associated with an IP address. Some popular geolocation databases include MaxMind and IP2Location. Another method is to trace the route of an IP address. This involves sending a series of test packets to the target IP address and analyzing the response times and routing information of each packet. By mapping the network path taken by the packets, it is possible to estimate the location of the IP address. Furthermore, some websites offer IP address tracking services. These websites collect data from various sources and provide the user with information about the IP address, including its location. However, it's worth noting that the accuracy of such services can vary, and their results should be taken with caution. Finally, it's important to mention that IP address tracking should be done within legal and ethical boundaries. While it can be useful for various purposes, such as identifying cybercriminals or protecting privacy, it should not be used for illegal activities or to infringe on someone's privacy. In conclusion, while tracking the exact location of an IP address by phone number is one approach, there are alternative methods available for tracking the location of an IP address. Using geolocation databases, tracing the route of an IP address, utilizing IP address tracking services, and ensuring ethical use are all important considerations in the world of IP address tracking. Paid IP Address Tracking Services While there are free tools available online to track the approximate location of an IP address by phone number, if you require more accurate and precise information, paid IP address tracking services are the way to go. These paid services provide a wealth of data and functionalities that go beyond what free services offer. They utilize advanced algorithms and access to a larger database to pinpoint the exact location of an IP address. This can be helpful in various situations, such as investigating cybercrime, identifying potential threats, or tracking down the source of online harassment. Paid IP address tracking services offer a range of features, including: |Accurate Location Tracking |These services can provide the exact geographical location of an IP address, down to the street address and even the building number. |With paid services, you can access historical data and track the movement and changes in an IP address's location over time. |Some paid services offer visual representations of IP address locations on maps, allowing for easy analysis and understanding of the data. |Paid services often provide additional details about the IP address, such as the ISP (Internet Service Provider), organization, and even the type of connection. |For businesses or developers, paid services usually offer APIs (Application Programming Interfaces) that allow integration with their own systems or applications. While these paid IP address tracking services come at a cost, the level of accuracy and additional features they provide can make them well worth the investment in certain cases. Privacy Concerns in IP Address Tracking As technology continues to advance, so do the methods used to track and identify individuals online. One such method is the tracking of IP addresses, which can be used to determine the approximate location of a device connected to the internet. While this technology can be useful for various purposes, it also raises concerns about privacy and security. Exact IP address tracking can provide valuable information for businesses and organizations. For example, it can help them identify potential threats or monitor website traffic. However, the use of this technology for tracking individuals raises ethical questions. It can be seen as an invasion of privacy, as it allows someone to gather information about an individual's online activities without their consent or knowledge. Address tracking for free might seem like a convenient and harmless tool. However, it opens up the door for abuse and misuse. Hackers and cybercriminals can exploit this technology to gather personal information or carry out malicious activities. Additionally, governments and other authorities might use IP address tracking to surveil individuals, potentially infringing on their right to privacy. IP address tracking is often associated with phone numbers, as many devices are constantly connected to the internet through mobile networks. This means that not only can someone track your IP address, but they can also gather information about your phone number and potentially link it to your physical location. This raises concerns about the safety and security of individuals, as it increases the risk of identity theft or harassment. In conclusion, while IP address tracking can be a powerful tool, it also comes with significant privacy concerns. It is important for individuals to be aware of these concerns and take steps to protect their online privacy. Additionally, it is crucial for businesses and organizations to use this technology responsibly and ensure that they are not infringing on individuals' rights to privacy and security. Protecting Your IP Address from Tracking When it comes to online privacy, it is important to protect your exact IP address from tracking. Your IP address can reveal your location and other personal information, making it crucial to take steps to safeguard it. One way to protect your IP address is to use a virtual private network (VPN). A VPN masks your IP address by routing your internet traffic through a different server, making it difficult for trackers to determine your exact location. Another effective method is to use a proxy server. Proxy servers act as intermediaries between your device and the website you are visiting, making it appear as though you are accessing the internet from a different IP address. This helps protect your exact IP address from being tracked. It is also important to be cautious about the information you share online. Avoid posting personal details on public forums or social media platforms, as this can make it easier for trackers to connect your IP address to your real-world identity. Furthermore, regularly updating your devices' software and using strong, unique passwords can help protect your IP address from being compromised. In addition, enabling firewalls and installing reputable antivirus software can add an extra layer of security. In conclusion, protecting your IP address from tracking is crucial for maintaining online privacy. By using methods such as VPNs, proxy servers, and being cautious about what you share online, you can help safeguard your exact IP address and ensure your location and personal information remain secure. Common Uses of IP Address Tracking IP address tracking can be used for a variety of purposes. Here are some common uses: - Locating the geographical location of an IP address can help in identifying the physical location of a device or a person. - IP address tracking can be used by businesses to understand and analyze the location of their website visitors, helping them with targeted marketing and advertising. - In law enforcement, IP address tracking can be used to trace criminal activities and identify potential suspects. - IP address tracking can also be useful for security purposes. It can help in tracking and blocking malicious users or hackers attempting to gain unauthorized access or perform activities that violate security protocols. - For e-commerce businesses, IP address tracking can aid in preventing fraudulent activities such as online scams, identity theft, or account hacking. Overall, IP address tracking is a powerful tool that can provide valuable information about the location and activities associated with a specific IP address or phone number. However, it is important to use this tool responsibly and in compliance with privacy laws and regulations. IP Address Tracking for Law Enforcement In the world of law enforcement, tracking the IP address of a phone number to determine its exact location has become an essential tool. With the increasing use of smartphones and the internet, knowing the IP address of a device can provide crucial information in solving crimes and locating suspects. Law enforcement agencies have access to powerful tools and databases that can track and trace IP addresses associated with phone numbers. These tools enable investigators to pinpoint the precise location of a device at any given time. By tracking the IP address of a phone number, law enforcement can gather valuable evidence to support their investigations. This information can be used to verify an alibi or establish a suspect's presence at the scene of a crime. While some services claim to provide free methods of tracking IP addresses, it is important to note that these may not always be accurate or reliable. Law enforcement agencies rely on specialized tools and resources that are specifically designed for their needs. Tracking IP addresses for law enforcement involves a complex process that requires expertise and access to dedicated databases. These databases are continuously updated with information about IP addresses and their associated phone numbers. Once law enforcement obtains the IP address associated with a phone number, they can work with Internet Service Providers (ISPs) to trace the exact location of the device. This collaboration allows investigators to gather further evidence and potentially apprehend suspects. In conclusion, IP address tracking for law enforcement plays a vital role in modern investigations. It enables law enforcement agencies to track and trace the exact location of devices associated with phone numbers, providing valuable evidence in solving crimes and protecting communities. |IP Address Tracking for Law Enforcement |Law enforcement agencies use specialized tools and databases to track IP addresses and determine the exact location of devices associated with phone numbers. |Tracking IP addresses helps law enforcement verify alibis, establish suspects' presence at crime scenes, and gather crucial evidence. |Free methods of tracking IP addresses may not always be accurate or reliable, highlighting the importance of law enforcement-specific tools. |Law enforcement collaborates with ISPs to trace the exact location of devices once they obtain the IP address associated with a phone number. |IP address tracking for law enforcement is a crucial tool in solving crimes and ensuring the safety of communities. IP Address Tracking for Cybersecurity Tracking IP addresses is an essential aspect of cybersecurity. An IP address is a unique numerical label assigned to every device connected to a computer network. It serves as a digital identity for devices, allowing them to communicate with each other. With the increasing reliance on the internet for various activities, cyber threats have become more prevalent. Hackers and cybercriminals target individuals and organizations by exploiting vulnerabilities in their devices and networks. To combat these threats, cybersecurity professionals rely on IP address tracking. By tracking IP addresses, cybersecurity experts can identify the exact location of potential attackers and take appropriate measures to protect their networks. This process involves monitoring network traffic and analyzing logs to pinpoint suspicious activities and track the origin of the IP address involved. Tracking IP addresses enables cybersecurity professionals to block malicious traffic, prevent unauthorized access, and maintain the integrity of their systems. It also helps in tracing the source of cyberattacks, enabling law enforcement agencies to apprehend the criminals responsible. Furthermore, IP address tracking plays a crucial role in incident response and forensic investigations. When a security incident occurs, such as a data breach or an unauthorized access attempt, tracking the IP addresses involved helps in identifying the scope of the incident and gathering evidence for potential legal actions. While there are free tools available for tracking IP addresses, it is important to note that they may not provide the exact location of the device. Achieving precise geolocation requires access to specialized databases and cooperation from internet service providers. In conclusion, IP address tracking is a valuable tool in the field of cybersecurity. It allows professionals to monitor network activity, detect potential threats, and respond effectively to incidents. By tracking IP addresses, organizations can enhance their security posture and protect themselves from cyber threats. IP Address Tracking for Geolocation Tracking the exact location of an IP address for free by phone number is an essential tool for various purposes. Whether you want to protect your data, monitor online activities, or enhance your website's user experience, knowing the geolocation of an IP address can be incredibly valuable. With IP address tracking, you can accurately determine the location of the user or device connected to a specific IP address. This information can help businesses identify potential customers, prevent fraudulent activities, and enhance their marketing strategies. By tracking the IP address, you can obtain useful data, such as the country, city, and even the ZIP code of the device or user in question. This information can be used to personalize content, provide targeted advertisements, and improve the overall user experience on your website or application. Additionally, with IP address tracking, you can monitor suspicious activities, detect unauthorized access, and prevent cyber threats. It allows you to identify the location of potential attackers or intruders, enabling you to take immediate action to protect your network and data. While there are paid services available for IP address tracking, there are also free options that provide reliable geolocation data. These free services use a variety of techniques, such as database lookups, DNS information, and IP mapping, to determine the location of an IP address. It is important to note that IP address tracking for geolocation has its limitations. Factors such as VPNs, proxies, and dynamic IP addresses can affect the accuracy of the results. However, despite these limitations, tracking the IP address remains a valuable tool in various industries. In conclusion, IP address tracking for geolocation is an essential tool for businesses and individuals alike. It provides valuable information about the location of a device or user connected to a specific IP address. By utilizing free services or paid options, you can track and obtain accurate geolocation data, enabling you to enhance your marketing strategies, protect your network, and improve the overall user experience. IP Address Tracking for Marketing and Advertising Tracking IP addresses can be an effective tool for marketing and advertising purposes. By being able to track the IP address of an individual or a group of individuals, businesses and marketers are able to gain valuable insights into their target audience, their behavior, and their preferences. Understanding IP Address Tracking An IP address is a unique numerical label assigned to each device connected to a computer network. It serves as an identifier for both the device and its location on the network. With the help of IP tracking tools, businesses can determine the exact location of a visitor to their website or online platform. IP address tracking allows marketers to collect data on the geographic location of their audience. By knowing the countries, states, or cities where their website visitors are coming from, businesses can better tailor their marketing efforts to specific regions, languages, or cultural preferences. Benefits for Marketing and Advertising IP address tracking has several uses in marketing and advertising: - Personalized content: By knowing the location of their audience, businesses can create custom-tailored content that is relevant and resonates with their target market. - Geo-targeted advertising: IP tracking helps businesses deliver targeted ads based on the user's location. This enables advertisers to focus their resources on specific markets, maximize their reach, and increase the chances of conversions. - Market segmentation: IP address tracking helps in segmenting the market based on geographic criteria. This allows businesses to create distinct marketing campaigns for each region, thus increasing the overall effectiveness of their advertising efforts. - Identifying potential markets: IP tracking can reveal new market opportunities by identifying regions with a high concentration of website visitors or a growing interest in specific products or services. Overall, IP address tracking provides businesses with valuable information to optimize their marketing and advertising strategies. By understanding the location of their audience, businesses can create personalized campaigns, refine their targeting, and make data-driven decisions to maximize their return on investment. IP Address Tracking for Network Administration Network administration involves managing various aspects of a network, including tracking IP addresses. IP addresses play a crucial role in identifying devices on a network and ensuring smooth communication between them. To effectively manage and troubleshoot network issues, network administrators often need to track the exact location of IP addresses. Tracking an IP address allows network administrators to understand the network topology, identify potential bottlenecks, and ensure optimal performance. By monitoring IP addresses, administrators can identify potential security threats and prevent unauthorized access to the network. Importance of Tracking IP Addresses Tracking IP addresses helps network administrators in several ways: - Network Troubleshooting: When network issues arise, tracking IP addresses can help pinpoint the root cause of the problem. By identifying which devices are experiencing connectivity or performance issues, administrators can quickly resolve network problems and minimize downtime. - Security Management: Tracking IP addresses allows administrators to monitor network traffic and detect any suspicious activity. By tracking the exact location of IP addresses, administrators can identify potential security breaches and take appropriate measures to protect sensitive data. - Capacity Planning: By tracking IP addresses, administrators can assess the load on different network segments and plan for future capacity upgrades. This helps ensure that the network can handle the increasing demand for resources without performance degradation. The Process of Tracking IP Addresses To track the exact location of an IP address, network administrators can employ various methods and tools: - IP Address Logs: Network devices such as routers and firewalls often maintain logs of IP addresses, allowing administrators to review historical data and track the movement of IP addresses. - IP Address Management Software: Dedicated software solutions can help network administrators track and manage IP addresses more efficiently. These tools provide centralized control and visibility, making it easier to monitor and track IP addresses. - Geolocation Databases: Geolocation databases provide information about the geographical location associated with an IP address. By querying these databases, administrators can obtain the approximate physical location of an IP address. In conclusion, tracking IP addresses is an essential task for network administrators. By accurately tracking the exact location of IP addresses, administrators can effectively manage network resources, troubleshoot issues, and maintain a secure network environment. IP Address Tracking for Website Analytics If you have a website and want to gain insights into your visitors' behavior, tracking their IP addresses can provide valuable information. By tracking the IP addresses of your website visitors, you can determine their location and gain a better understanding of where your audience is coming from. Tracking IP addresses allows you to analyze various data points, such as the number of unique visitors, the duration of their visit, and the pages they have viewed. This information can help you make data-driven decisions about your website's content, layout, and marketing strategies. One of the advantages of IP address tracking for website analytics is that it is free. You don't have to pay any additional fees to track the IP addresses of your visitors. This means that you can gather valuable data without worrying about additional costs. With IP addresses, you can also track the location of your visitors. Knowing the location of your audience can be beneficial for various reasons. For example, if you have an online store, you can provide location-specific offers or discounts to increase conversions. Additionally, you can target your marketing campaigns based on the geographic location of your visitors. Tracking IP addresses can be done using different tools and software. Many website analytics platforms offer IP tracking as part of their services. By integrating these tools into your website, you can easily gather and analyze the IP address data of your visitors. In conclusion, tracking IP addresses for website analytics provides valuable insights into your visitors' location and behavior. It is a free and effective way to understand your audience and optimize your website accordingly. By leveraging IP address tracking, you can make informed decisions and improve your website's performance for better user experience and increased conversions. IP Address Tracking for Online Fraud Detection In the digital age, online fraud has become a serious concern for individuals and businesses alike. Criminals can use various methods to carry out fraudulent activities, from phishing scams to identity theft. To combat this growing threat, it is crucial to have effective mechanisms in place to track IP addresses and identify the perpetrators. IP addresses play a crucial role in online fraud detection. An IP address, short for Internet Protocol address, is a unique numerical label assigned to each device connected to a computer network. By tracking the IP address, one can determine the exact geographical location of the device. Tracking IP addresses allows authorities and cybersecurity professionals to identify the origin of suspicious activities and potentially fraudulent transactions. For example, if an online transaction is flagged as suspicious, tracking the IP address associated with it can provide valuable information about the location of the fraudster. There are various methods and tools available to track IP addresses for online fraud detection. Many of these tools offer free services, making it accessible to individuals and businesses with limited resources. By simply entering the IP address in the tracking tool, the exact location of the device can be determined. By tracking IP addresses, law enforcement agencies, financial institutions, and businesses can proactively detect and prevent online fraud. Rapid identification of suspicious activities based on IP address tracking can help in taking immediate action, minimizing potential damages. In conclusion, IP address tracking is essential for online fraud detection. It enables authorities to locate fraudsters, investigate fraudulent activities, and take necessary legal actions. By utilizing free tools and services, individuals and businesses can enhance their online security and protect themselves from the ever-evolving threat of online fraud. IP Address Tracking for Content Localization When it comes to creating and managing online content, it is crucial to understand the importance of localizing your content for different regions. This is where IP address tracking can play a significant role. An IP address is a unique number assigned to every device that is connected to the internet. By tracking the IP address of a device, you can determine its exact location. This information can be extremely valuable when it comes to content localization. By tracking the IP address of a user's device, you can customize the content they see based on their location. For example, if you have an online store and want to provide different pricing or shipping options based on the user's location, IP address tracking can help you achieve this. IP address tracking can also be useful for targeting specific advertising campaigns to different regions. By customizing the content of your ads based on the user's location, you can improve the relevance and effectiveness of your campaigns. There are free tools available that allow you to track IP addresses and obtain the exact location of a device. These tools can be useful for small businesses or individuals who want to localize their content without investing in expensive IP tracking software. However, it is important to note that IP address tracking has its limitations. While it can provide you with the general location of a device, it cannot give you the exact street address. Additionally, IP addresses can be dynamic, meaning they can change over time. In conclusion, IP address tracking is a valuable tool for content localization. By tracking the IP addresses of your users, you can customize your content and advertising campaigns based on their location, improving relevance and effectiveness. Is it possible to track the exact location of an IP address for free by using a phone number? Yes, it is possible to track the exact location of an IP address for free using a phone number. There are online tools and services available that can determine the approximate location of an IP address based on the phone number provided. Which online tools or services can be used to track the exact location of an IP address for free by phone number? There are several online tools and services that can be used to track the exact location of an IP address for free by phone number. Some popular options include websites like iplocation.net, ipapi.com, and ipvoid.com. These websites allow you to enter the phone number and retrieve information about the IP address and its location. What information can be obtained when tracking the exact location of an IP address by phone number? When tracking the exact location of an IP address by phone number, you can obtain information such as the country, region, city, latitude, and longitude of the IP address. Some services may also provide additional details like the internet service provider (ISP) associated with the IP address. Are there any limitations or drawbacks to tracking the exact location of an IP address for free by phone number? Yes, there are some limitations and drawbacks to tracking the exact location of an IP address for free by phone number. Firstly, the location data provided may not always be 100% accurate, as it is based on available information and databases. Additionally, some IP addresses may be associated with proxy servers or VPNs, making it difficult to determine the true location of the user. Are there any paid services that offer more accurate tracking of IP addresses by phone number? Yes, there are paid services available that offer more accurate tracking of IP addresses by phone number. These services often provide more detailed and up-to-date information about the IP address, such as the exact street address or even the name of the individual or organization associated with the IP address. Examples of such paid services include MaxMind, Digital Element, and IP2Location.
<urn:uuid:92a79d5b-dd74-408b-9259-235af5f06aa9>
CC-MAIN-2024-10
https://goo.by/blog/track-exact-location-of-ip-address-for-free-using-phone-number
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00361.warc.gz
en
0.927282
8,722
2.65625
3
Here is a summary of what mormons believe concerning marriage and what the lds marriage ceremonies are like. The different wedding ceremonies and teachings about marriage among christian churches. Search website | trailofourancestorscom/dutch_mchtm courtship and marriage customs by donna speer ristenbatt courtship and betrothal when the dutch came to america, they naturally brought their customs and traditions with them, some being modified more than others once they were in a new land. Marriage in ancient israel involved practices and assumptions different from those of most people living in western societies today. Traditional greek marriage customs are passed down among generations these customs are also practiced for greek weddings here in the us. Marriage in the bible and ancient marriage and jewish wedding customs: the three stage ritual of bible marriages drawn from jewish marriage customs. This was a research paper for a cultural anthropology class the paper compares and contrast the marriage practices of three different cultures, paying close attention to the religious views in each. What were common marriage customs in bible times what were customary wedding practices in bible times. Across different countries, states, and continents there are a number of beliefs, traditions and way of living in this assignment, i will compare the marriage practice between three different cultures and how the family had such a huge impact on the marriage decisions of the husband and wife to be. Effects of religious practice on marriage there are many indications that the combination of religious practice and stable marital relationships contributes to a. Marriage practices - part iii the ptolemaic period as we come down into time, and the centuries preceding the birth of jesus, we find the same marriage practices going on in egypt. Japanese marriage history the practice remains today in the system of adoption by which a man becomes a member of another family by marriage. An encyclopedia of marriage rites, traditions, and beliefs from around the world, ranging from ancient practices to contemporary ceremonies 200 a-z entries on wedding practices and beliefs from cultures around the world dozens of photographs of weddings and wedding artifacts numerous illustrations, including the table plan from mrs. Taking marriage vows in the presence of a witness and then leaping over the handle of a broom became the common practice to create a recognized union brooms are also symbols of the hearth, the center of the new family being created. Wedding and marriage customs from around the world, including bridal traditions, dresses, food and ceremonies wedding and marriage customs from around the world, including bridal traditions, dresses, food and ceremonies. Brated and perpetuated by ritual practices marriage is a universal institution rituals leading to marriage rituals of marriage begin long before the actual wed-. Islam is a traditional abrahamic religion muslim marriage beliefs are practiced around the world and embrace a range of islamic customs. Muslim marriage and islamic wedding customs are traditions and practices that relate to wedding ceremonies and marriage rituals prevailing within the muslim worldalthough islamic marriage customs and relations vary depending on country of origin and government regulations, both muslim men and women from around the world are guided by islamic. Cultural anthropology/marriage, reproduction and kinship endogamy is the practice of marriage within a specific cultural group or social group based on custom or. Marriage resources victorian chapel a classic little white wedding chapel on the famous las vegas strip provides an intimate environment for your special day magnolia chapel an intimate las vegas chapel with intimate lines and luxurious details. To know more about indian hindu wedding traditions, read on find out more about traditions in an indian marriage. Make your marriage ceremony more meaningful and memorable by learning the biblical significance of today's christian wedding traditions and symbols. The history of marriage customs in africa are, interestingly, based on practices that other cultures around the world have historically practiced. Marriage practices among the gidda oromo southwestern part of gojjam (see map 1) ecologically and agriculturally oromia region is the richest region in the horn of africa. The initial command to practice plural marriage came through joseph smith, the founding prophet and president of the church in 1890.Download
<urn:uuid:494ec5e4-6164-4550-911b-6c44e8724d67>
CC-MAIN-2018-26
http://ojessaykymo.supervillaino.us/marriage-practices.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864364.38/warc/CC-MAIN-20180622065204-20180622085204-00631.warc.gz
en
0.941037
847
2.953125
3
Mumps are on the rise for the first time in a decade in the United States. According to the Centers for Disease Control and Prevention, as of November 5, there were 2,879 cases of mumps across 45 states and the District of Columbia. Mumps is a contagious virus that is spread through saliva and mucus. The CDC recommends that all children get two vaccines that protect against measles and mumps, but it’s not 100 percent effective. In light of the uptick in reported mumps cases, the Advisory Committee on Immunization Practices — a panel of medical experts who meet three times a year to suggest vaccination guidelines for the U.S. — is considering adding a third mumps vaccine. “Studies that have tried to examine the effectiveness of a third dose of MMR vaccine to control mumps outbreaks were limited because vaccination occurred after the outbreak started to decline,” Huong McLean, an associate research scientist at the Marshfield Clinic Research Foundation, which has partnered with the CDC on the issue, told CNN. According to the CDC, before the mumps vaccination program in the U.S. started in 1967, nearly 186,000 cases of the contagious virus were reported each year. However, the real number could have been much higher due to underreporting. Since the vaccine program was introduced, there has been more than a 99 percent decrease in mumps cases. Before 2016, the largest outbreak in recent history was in 2006, when more than 6,500 cases of mumps were reported. Most of the people impacted were college students living in the Midwest campuses. Dr. Manisha Patel, a medical officer at the CDC, explained to CNN that each year the number of mumps cases fluctuates between a few hundred to a couple thousands, with most of the outbreaks concentrated in just a small number of areas. This year, a majority of the mumps cases reported were due to two outbreaks in Arkansas and Iowa. Arkansas reported about 1,870 cases, and Iowa had 683 cases, according to the CDC. In Iowa, a majority of the mumps outbreak was concentrated in a university setting, with additional cases in the community. Indiana, Illinois, Massachusetts and Oklahoma also reported more than 100 cases of mumps this year, with most of the cases on university campuses. In Massachusetts, most of the cases of mumps occurred at Harvard. “The underlying theme of where outbreaks do occur are in congregate settings,” Dr. Patel said. Dr. Patel explained that the close crowding in settings like college campuses is ideal for spreading the disease. Mumps is typically contracted by close contact, such as sneezing, kissing and sharing utensils or lipsticks. “It is important to understand that if you have a room of 100 people who have been vaccinated with the mumps vaccine and you expose them to mumps, you’re still gonna get 12 people who will develop mumps,” Dr. Patel said. “The MMR vaccine effectiveness is 88 percent with two doses.” Symptoms of mumps include fever, headache, muscle aches, tiredness and loss of appetite. For many adults, their salivary glands also swell, causing puffy check and a swollen jaw. In more sever cases, particularly for adults, mumps can cause deafness and inflammation of the brain, ovaries, breast tissue or testicles. Since mumps is a virus, it does not respond to antibiotics. Most doctors recommend bedrest and over-the-counter pain relievers.
<urn:uuid:11c05cf8-afdf-4176-b0ef-8b597dab0aaa>
CC-MAIN-2017-17
http://vitalupdates.com/years-mumps-outbreak-largest-decade/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120349.46/warc/CC-MAIN-20170423031200-00587-ip-10-145-167-34.ec2.internal.warc.gz
en
0.968834
730
3.4375
3
The primary function of a stone sealer is to provide stain resistance to a porous stone. To best understand the realistic expectations of stone sealers, the operative word "resistance" should be viewed in terms of "reaction time." There are many sealers available today, yet none make the claim of being "stain proof." What sealers will provide is "time to react," meaning a period of time that the sealer will hold out the contaminant, allowing easy removal from the stone surface before there is stain penetration. Based on the quality of the sealer used and the type of contaminants the stone is exposed to, reaction time will range from mere moments to many hours. The primary distinction between today's penetrating (impregnator-type) sealers is the reaction time they provide and the range of contaminants they resist.Stone sealers are either water-based or solvent-based. The base or carrier, in itself, is not an important criteria - as the water or solvent functions only as a carrier, mobilizing the sealer components into the stone. Both carriers are short lived after carrying the sealer into the stone. The water undergoes natural evaporation, while the solvent flashes off quickly. Since solvent-based sealers have been around a lot longer than water-based sealers, there are those who feel the solvent-based technology must be superior. The truth of the matter is that although there are subtle differences relating to application techniques and curing times, performance levels can be comparable. Aside from being either water-based or solvent-based, sealers are also differentiated by where they are positioned "in" or "on" the stone. Penetrating (impregnator) sealers are designed to be absorbed "in" (below) the stone surface. They are not designed as surface coatings and do not provide a shine or gloss. Surface or coating-type sealers, on the other hand are designed to bond "on" the stone surface and normally provide anywhere from a low to a high level of surface sheen. Coating sealers are usually never recommended on polished or even very dense, smooth surfaced stone such as marble, granite and limestone. The reason is that for a coating-type sealer to perform, it requires either a very porous surface or a textured surface where the coating-type sealer can achieve a mechanical bond. On dense, smooth surfaces only penetrating-type sealers are recommended, as they do not need to bond to the stone surface but require only slight stone porosity for penetration. Regardless of whether water-based or solvent-based, penetrating-type or coating-type sealers are considered, here are some important attributes that a sealer must exhibit to ensure performance and longevity: - Stain Resistance: This is the primary reason for sealing. Choose a sealer that offers protection against the contaminants common to the area of the stone installation. For example, in kitchens or food serving areas, use a sealer that provides excellent oil resistance. - Breathability: This is an often overlooked, but very important, quality that a sealer must possess. It is understood and accepted that natural stone must be allowed to breathe (allow moisture-vapor transmission). Stone sealers that inhibit moisture-vapor transmission can cause eventual deterioration of the stone in addition to discoloration or spalling of the sealer. Breathable sealers are designed on the principal of allowing vapor to pass (breathe) through as a gas, but to repel liquids. Unlike the sealers of yesterday, where a 30-day cure time after stone installation was required prior to sealing, many of today's sealers breathe sufficiently to be used as soon as 48 hours after stone installation. This takes into account that during installation, moisture remaining within the stone will not be entrapped, but will migrate through the sealer as a vapor. - Chemical Resistance: With the myriad of cleaners and various chemicals used on and around a stone installation today, a sealer must be highly resistant to chemicals ranging from acids to alkaline cleaners. Without strong chemical resistance, sealers would not be able to claim long life and would require frequent reapplication. - Health and Environmental considerations: Certain job sites, especially commercial sites such as schools, hospitals, and workplaces, may require water-based sealers to avoid the increased safety precautions that can be associated with solvent-based sealers that are required during the sealing process. In addition to increased safety requirements, many solvent-based sealers have strong odors that may linger until the solvent dissipates, and some solvent-based sealers contain "VOCs" (Volitale Organic Compounds) that are defined as being ozone-depleting or detrimental to our environment. Most water-based sealers have no or low odor, have no or very low VOC's and are environmentally safe. Regardless of the sealer selected, always read directions carefully, paying close attention to any label precautions listed. - Freeze-Thaw Stability: Not only is it important for a sealer to remain freeze-thaw stable in the bottle, but the ultimate sealer remaining in or on the stone must have the ability to exhibit resilience to freeze-thaw cycles. Subjected to freeze-thaw conditions, a stone installation must be capable of expanding and contracting. The sealer used must also be capable of expanding and contracting, or it will be compromised and quickly lose sealing capabilities. - Slip Resistance: A sealer, whether it is a penetrating or coating-type, should not adversely affect the stone's slip resistance. If used per the directions, penetrating-type sealers are designed to penetrate the stone substrate, with any remaining sealer residue wiped off the stone surface. The net result should be no change to the surface coefficient of friction. In cases where penetrating sealer residue is allowed to remain, a temporary improvement in slip resistance may be achieved, but will normally be eradicated after initial traffic exposure or routine cleanings. Sealed stone surfaces should be properly maintained to reduce chances of slip-fall accidents. - UV Resistance: Sealers, whether they are penetrating or coating-type, should be resistant to ultra-violet light, and not yellow or deteriorate due to UV exposure. - Easy Reapplication: Once a sealer has been used successfully, it is a good idea to stay with the same sealer when eventual reapplication is needed (usually due to surface wear on a surface-type sealer and loss of stain resistance on a penetrating-type sealer). Stripping or removing an existing sealer is often difficult and arduous, so sealers should be selected that can be reapplied without the requirement of stripping the existing sealer prior to reapplication. - Desired Look: You can use numerous applications of a penetrating-type sealer and never achieve a surface shine. Some penetrating-type sealers may slightly darken or lighten the natural stone. Coating type sealers usually highlight the stone surface, thus bringing out the real color and nuances in the stone not always visible before sealing. If the primary requirement is to darken or color enhance a tumbled or faded stone, then a color-enhancer sealer should be considered. There are several stone enhancer-sealers available today that enhance and seal, not requiring a separate sealer application. Regardless of the product selected, always test a small area to determine if the desired appearance is achieved. Sealers properly selected and used can be extremely beneficial in the protection, ongoing maintenance and longevity of a stone installation. Haphazard choice and application, on the other hand, can result in poor performance, increased maintenance and frequent re-application requirements. Over the years, there has been a lot of accurate as well as a lot of inaccurate information disseminated about sealers. Some of the most commonly heard comments include: "The better the sealer beads water, the better it will resist staining." This is not accurate. The water beading attributed to a sealer is based on the surface tension created by the sealer residue. The first time that the sealed stone surface is cleaned, the surface tension is relaxed, resulting in the water no longer holding a strong bead on the surface. Remember, it is stain resistance that is the desired result, not temporary water beading. Relaxed surface tension does not relate to a reduction in stain resistance. "Water-based sealers cannot be used for exterior applications." This is false. Remember, the water and solvent are only carriers that evaporate, leaving the sealer in place. It is that sealer that remains in or on the stone that must be compatible with an exterior environment. Many water-based, penetrating-type sealers are designed for use in exterior environments. However, coating-type sealers, whether they be water-based or solvent-based, should be evaluated with more caution for exposed exterior environments. For sealers to perform well in exterior areas, they must possess attributes such as "freeze-thaw stability," "breathability," "slip-resistance" and "UV stability." Although there are some coating sealers that meet these requirements for exterior performance, most are designed strictly for interior application. "Sealers are not designed to be waterproof." Remember, sealers must allow moisture vapor transmission, and it must be noted that they are not designed to hold a hydrostatic head (holding back water pressure). If waterproofing is the desired outcome, a waterproofing membrane or agent should be considered. "Solvent-based sealers penetrate better than water-based sealers." While it is true that solvent molecules are smaller than water molecules, additional clarification is warranted. A solvent-based sealer may penetrate deeper contingent on weather conditions. In warm weather, the solvent carrier may dissipate so quickly into the atmosphere that the sealer will not gain much depth into the stone before the solvent escapes. Water will penetrate even dense surfaces such as polished granite, but will not generally penetrate as deeply or as quickly as a solvent-based sealer. When used properly, under proper conditions, both water- and solvent-based sealers gain adequate penetration into natural stone surfaces. It is also important to note that after penetrating, the sealer must be positioned close to the surface to provide best stain resistance from surface contaminants. The important result is not how deep the sealer penetrates into the stone, but how close the sealer positions itself to the surface where it can guard against stain penetration. "Unlike solvent-based sealers, water-based sealers cannot be cross-linked to give best performance." This is not true. Water-based sealer technology has improved dramatically in recent years. There are several water-based sealers available utilizing cross-linked polymers which provide worthy alternatives to solvent-based sealers. In conclusion, sealer technology and resultant products have come a long way over the years when sealers performed poorly against contaminants (especially oils), and had an effective life span of less than a year before requiring stripping and reapplication. Whether your preference is towards a water- or solvent-based alternative, there are several brands of quality options available in today's market-place. Sealer pricing ranges from very inexpensive to very expensive, with the pricing usually having a direct correlation to performance and longevity. Don't be afraid to contact the manufacturer directly with any technical question. Remember, they want you to be satisfied with the "sealer-use experience." With all of the options available, it is wise to choose a manufacturer that offers a full range of stone care products to help assure compatibility and longevity of a stone installation.
<urn:uuid:c2c7e8d7-8912-4528-ac57-490fd7362b63>
CC-MAIN-2021-25
https://www.stoneworld.com/articles/83737-stone-sealers-function-facts-fallacies
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488504969.64/warc/CC-MAIN-20210622002655-20210622032655-00354.warc.gz
en
0.94035
2,379
2.59375
3
A Heterogeneous Linux/Windows 95 Home Network With more than one computer common in many households, the need to network all machines and provide Internet access is important. Linux offers a stable network environment that can enable different operating systems (UNIX, Windows and Macintosh) to work together, and is quite easy to set up and administer. Such networks facilitate convenient file and print sharing and centralized backups. I will describe my home network configuration (see Figure 1) which is a mixture of Linux and Windows systems. I will assume you have basic knowledge of Linux installation and administration, and that PPP is set up on your Linux box. I will explain in detail how to network the Windows 95 machine named “ancho” with the Linux server named “serrano”. Adding other machines to the network is essentially a repetition of this process. I will also briefly discuss setting up the Linux client and NFS. The Linux machine serrano is the file and print server for the Windows 95 and Linux clients, and connects to the outside world through a PPP dial-up connection. It also acts as a firewall; all other machines can reach the outside world through it. The CD-ROM drive on serrano is also available to the other machines on the network. My hardware consists of 486 DX2/66 machines with 32MB RAM, and a Pentium 100 notebook which is used both on and off the network. I use NE2000 network cards (Realtek PnP, about $15) and coaxial 10Base-2 cables. If you have PCI boards (and I certainly hope you do), setup is easier, but the networking particulars still apply. The Linux kernel probes address 0x300 for NE2000 cards, so the jumpers on the card are set for this I/O address on the Linux machine. On the Windows 95 machines, the network card jumpers are set for Plug-and-Play mode. When you network the machines with coaxial cables, make sure you use 50-ohm terminators (about $3 at Radio Shack) at the ends. I installed Red Hat Linux 5.2 off a CD. Installing everything took about 500MB of disk space. I have used Linux for a while now, so this part was painless. I was able to get X working nicely, PPP configured and a printer set up. If you have a machine with a CD-ROM drive, Windows 95 installation should also be easy. I had to install Windows 95 from a parallel port CD-ROM drive. That was tricky, and took several tries. The first goal in the networking effort is to establish communication between the Linux machine serrano and the Win95 machine ancho. All the network configurations on serrano can be done from the Red Hat control panel (Network Configurator). Read the Net-3.HOWTO for more information on Linux networking. Basically, you need to have the eth0 interface with IP 192.168.1.1 (or something like that) attached to it. To do this manually, execute the following command as root: /sbin/ifconfig eth0 192.168.1.1 netmask\ 255.255.255.0 up The IP addresses chosen correspond to class C addresses. Typically, these are used for intranet networks. I had to explicitly put in a route: route add -net 192.168.1.0 eth0This routing command says all packets to the 192.168.1.0 network should be sent to the eth0 interface. This line is appended to the /etc/rc.local file, so that the route is set up at boot time. On serrano, set up the host table /etc/hosts in a manner similar to this: 192.168.1.1 serrano loghost 192.168.1.3 jalapeno #Linux machine 192.168.1.100 piquin #Linux/Windows 192.168.1.2 ancho #Windows machine 127.0.0.1 localhost To confirm that the eth0 interface is working, type /sbin/ifconfig eth0. The output from this command will look like Listing 1. If you then type more /proc/net/dev, the output will look like Listing 2. If PPP is up, you will see an additional line for the ppp0 interface. This should take care of serrano. Now we proceed to the network configuration of ancho, the Windows 95 machine. You should have Windows 95 installed, the network card detected and drivers installed. At the time of network card installation, you will be asked for a machine name and a workgroup name. Give the machine name “ANCHO”, workgroup “WORKGROUP” and some optional comment like “My Compaq 486 machine”. Go to the Control Panel and select “Networking”. Under “The following network components are installed”, you should see your network card (mine says “Realtek RTL8019 PnP LAN Adaptor or compatible”). You may see NetBEUI and IPX/SPX and TCP/IP in the same window. If you do not see TCP/IP, choose “Add”, then “Protocol”, click on “Add”, choose “Microsoft”, then choose “TCP/IP” and click “OK”. This should add TCP/IP to the installed components window. Once TCP/IP is added, if you highlight it, you will be able to choose “Properties”. When you click “Properties”, you will see a dialog containing several tabs. Pick these tabs, and assign the following: IP Address IP Address: 192.168.1.2 Subnet Mask: 255.255.255.0 Gateway ( 192.168.1.1 DNS Configuration Enable DNS Host name: ancho DNS Server search order: 192.168.1.1 WINS Configuration Leave it Disabled. You may leave the DNS disabled, or add your ISP's DNS server IP address. The important items here are your gateway and IP address. After you specify these and click “OK”, the machine will reboot. After reboot, open a DOS window and type ping 192.168.1.1. After a short pause, you should get a response like “Reply from 192.168.1.1: bytes=32 time=4ms TTL=64”, repeated four times. If this fails, your network setup was not successful. Now go to serrano and type ping -c2 ancho. If it can find ancho, you should get these two messages: 64 bytes from 192.168.1.3: icmp_seq=0 ttl=32 time=3.9 ms 64 bytes from 192.168.1.3: icmp_seq=1 ttl=32 time=2.3 ms The -c2 argument to ping sends two packets. Without it, ping will have to be terminated with CTRL-C. If this works, congratulations—the Linux machine and the Windows 95 machine can find each other. Win an iPhone 6 Enter to Win |Microsoft and Linux: True Romance or Toxic Love?||Nov 25, 2015| |Non-Linux FOSS: Install Windows? Yeah, Open Source Can Do That.||Nov 24, 2015| |Cipher Security: How to harden TLS and SSH||Nov 23, 2015| |Web Stores Held Hostage||Nov 19, 2015| |diff -u: What's New in Kernel Development||Nov 17, 2015| |Recipy for Science||Nov 16, 2015| - Microsoft and Linux: True Romance or Toxic Love? - Non-Linux FOSS: Install Windows? Yeah, Open Source Can Do That. - Cipher Security: How to harden TLS and SSH - Web Stores Held Hostage - Simple Photo Editing, Linux Edition! - Firefox's New Feature for Tighter Security - PuppetLabs Introduces Application Orchestration - diff -u: What's New in Kernel Development - It's a Bird. It's Another Bird! - November 2015 Issue of Linux Journal: System Administration
<urn:uuid:59eb7294-52b7-4d00-83ce-703ce7aae536>
CC-MAIN-2015-48
http://www.linuxjournal.com/article/3505?quicktabs_1=1
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398445679.7/warc/CC-MAIN-20151124205405-00108-ip-10-71-132-137.ec2.internal.warc.gz
en
0.876543
1,746
2.609375
3
Music of Portugal Portugal is internationally known in the music scene for its traditions of fado, but the country has seen a recent expansion in musical styles, with modern acts from rock to hip hop becoming popular. If Amália is still the most recognizable Portuguese name in music, today the biggest exportations are bands like Moonspell (metal), Madredeus (fado and folk inspired), Buraka Som Sistema (electro/kuduro/breakbeat), Da Weasel, Sandro G (hip hop), Blasted Mechanism (experimental electro-rock) or Wraygunn (rock, blues), and artists like Mariza (fado). The musicality of the Portuguese language has also inspired non-native speakers to use it in their recordings, for example Mil i Maria. Regional folk music remains popular too, having been updated and modernized in many cases, especially the northeastern region of Trás-os-Montes. Dance, Rock, pop, kuduro, zouk, kizomba, Heavy metal, house and Hip Hop are among the most popular musical styles in Portugal; however, the recent arrival of revivalist folk bands, such as Deolinda, led to a newfound interest in this type of music. Portuguese music was influenced by music from Ancient Rome's musical tradition brought into the Iberian Peninsula by the Romans and the rich artistic Europen tradition. Its genres range from classical to popular music. Portugal's music history includes musical history from the medieval Gregorian chants through Carlos Seixas' symphonies era to the composers of the modern era. Musical history of Portugal can be divided in different ways. Portuguese music encompasses musical production of the Middle Ages, Renaissance, Baroque, Classical, Romantic and Modern eras. Portuguese music reflects its rich history and privileged geographical location. These are evidenced in the music history of Portugal, which despite its firm European roots, nevertheless reflects the intercontinental cultural interactions begun in the Portuguese discoveries. A short list of past and present Portuguese musicians with important contributions must necessarily include the names of composers Pedro de Escobar, Manuel Cardoso, Duarte Lobo, Filipe de Magalhães, Carlos Seixas, Diogo Dias Melgás, João Domingos Bomtempo, Marcos Portugal, José Vianna da Motta, Luís de Freitas Branco, Joly Braga Santos, Fernando Lopes-Graça, António Fragoso and Emmanuel Nunes; organists such as António Carreira or Manuel Rodrigues Coelho; singers such as Luísa Todi, Elisabete Matos or José Carlos Xavier; pianists such as Maria João Pires or Sequeira Costa; cellists such as Guilhermina Suggia; Fado (fate in Portuguese) arose in Lisbon as the music of the urban poor. Fado songs are typically lyrically harsh, with the singer resigned to sadness, poverty and loneliness, but remaining dignified and firmly controlled. Many[who?] claim that fado origins are much older, back to the 15th century, when women cried with longing for their husbands that went to the never sailed seas; others also claim that Arabic inprint in Fado is visible, especially in instruments. Arabs left Portugal in the 13th century, but their influence in crafts and music prevailed. Fado is often sung with a Portuguese guitar. Late in the 19th century, the city of Coimbra developed a distinctive scene. Coimbra, a literary capital for the country, is now known for being more refined and majestic. The sound has been described as "the song of those who retain and cherish their illusions, not of those who have irretrievably lost them" by Rodney Gallop in 1936. A related form are the guitarradas of the 1920s and 30s, best known for Dr. Antonio Menano and a group of virtuoso musicians he formed, including Artur Paredes and José Joaquim Cavalheiro. Student fado, performed by students at Coimbra University, have maintained a tradition since it was pioneered in the 1890s by Augusto Hilário. Starting in 1939 with the career of Amália Rodrigues, fado was an internationally popular genre. A singer and film actress, Rodrigues made numerous stylistic innovations that have made her probably the most influential fadista of all time. A new generation of young musicians have contributed to the social and political revival of fado music, adapting and blending it with new trends. Contemporary fado musicians like Mariza, Mísia and Camané have introduced the music to a new public. The sensuality of Misia and other female fadistas (fado singers) like Maria Ana Bobone, Cuca Roseta, Cristina Branco, Ana Moura, Katia Guerreiro, and Mariza has walked the fine line between carrying on the tradition of Amália Rodrigues and trying to bring in a new audience. Mísia and Carlos do Carmo are also well known fado singers.Ricardo Ribeiro and Miguel Capucho are one of the best male fado singers of the new generation. Regional folk music Recent events have helped keep Portuguese regional folk (rancho folclórico) traditions alive, most especially including the worldwide roots revival of the 1960s and 70s. Azorean folk music Madeira folk Music Music in Madeira is wide spread and mainly uses local musical instraments such as the Machete, rajao, Brinquinho and Cavaquinho, which are used in traditional Folklore dances like the Bailinho da Madeira. Trás-os-Montes' musical heritage is closely related to the music of Galicia, Cantabria and Asturias. Traditional bagpipes (gaita-de-fole transmontana), a cappella vocals and a unique musical scale with equal semitones have kept alive a vital tradition. (Miranda de I Douro), some artists such as Galamdum Galundaina sing in Mirandese language. Also the Pauliteiros folk dance is popular. Some residents sing in both Portuguese and Mirandese. - Notas e Voltas - Roberto Leal - Ronda dos Quatro Caminhos - Oioai*Janita Salomé - Frei Fado D'el Rei - Gaiteiros de Lisboa - Roncos do Diabo - Dulce Pontes - Tereza Salgueiro Famous artists and bands included in the past Tonicha, Paco Bandeira, Paulo de Carvalho, José Cid, Linda de Suza, Duo Ouro Negro, Roberto Leal and Ornatos Violeta. Nowadays some of the most popular acts are Aurea, Amor Electro, The Legendary Tigerman, Madredeus, GNR, Xutos & Pontapés, The Gift, David Fonseca, Buraka Som Sistema, Mil i Maria and Boss AC. Pimba music is the Portuguese version of the euro Schlager or the Balkan Turbo-Folk. Its name cames from a 90s hit Pimba Pimba. Some of its biggest names are Emanuel, Ágata, Ruth Marlene and Quim Barreiros. This genre mixes traditional sounds with accordion, Latin beats and funny or religious (mainly kitch) lyrics. Political music (Música de Intervenção) During the reign of the fascist regime music was widely used by the left-wing resistance as a way to say what could not be said, singing about freedom, equality and democracy, mainly through metaphors and symbols. Many composers and singers became famous and persecuted by the political police, some of them being arrested or exiled, such as Zeca Afonso, Paulo de Carvalho, José Mário Branco, Sérgio Godinho, Adriano Correia de Oliveira, Manuel Freire, Fausto, Vitorino, Júlio Pereira and some others. José Afonso began performing in the 1950s; he was a popular roots-based musician that led the Portuguese roots revival. With artists like Sérgio Godinho and Luís Cília, Afonso helped form nova canção music, which, after the 1974 revolution, gained socially-aware lyrics and became canto livre. The biggest name in canto livre was Brigada Víctor Jara, a group that seriously studied and were influenced by Portuguese regional music. After the Carnation Revolution, that same music was used to support left-wing parties. Political ideas and causes, like the agrarian reform, socialism, equality, democratic elections, free education and many other were a constant presence in these songs lyrics, often written by well-known poets like José Barata-Moura, Manuel Alegre or Ary dos Santos. The highest exponents of this kind of music in Portugal are Tony Carreira and Marco Paulo (both, and even other performers, have a certain level of overlap with the Pimba genre, even partial or just in certain songs). The poet-singer-songwriter Fausto Bordolo Dias, a significant contributor to the modern romantic genre, can be compared to Leonard Cohen. This is a relatively new sound in Portugal. Despite being an Iberian country, Portugal never had clear influences from the Caribbean beats. This style came to the country in the 90s, following a Spanish and world trend. Examples of Latin music singers in Portuguese are Ana Malhoa and Mil i Maria. With immigration from the former colonies, Portugal received many African communities with their different traditional sounds. Some singers were born in Lisbon but still, were singing African influenced music. Two examples are Lura and Sara Tavares, who sing a mixture that includes sounds from Cape Verde. People such as Mário Barreiros (drums), Mário Laginha and António Pinho Vargas (piano) and the singer Maria João have long and noteworthy careers in the field, despite experimenting, sometimes with notable success, other genres of music, and a more recent generation is following their footsteps, notable the pianist Bernardo Sassetti, Carlos Bica, João Paulo and the singers Jacinta and Vânia Fernandes. Reggae and Ska More underground but very prominent are Portuguese reggae and ska. Some of the more famous bands of these types include Primitive Reason, Three and a Quarter and Purocracy. This music is popular among young people, with its main roots based in Lisbon and the surrounding areas. Zouk is a style of rhythmic music originating from the Caribbean islands of Guadeloupe and Martinique. Zouk means 'party' in the local creole of French with English and African influences, all three of which contribute the sound. In Europe, it is particularly popular in France, while on the African countries of Cape Verde and Angola they have developed their own type of Zouk. Zouk was introduced to Portugal by Portuguese speaking immigrants from Angola and Cape Verde. Related styles include, kizomba and kuduro. Rock and other The rock in Portugal was born in the 80s of the 20th century. Its beginners were Rui Veloso and Jorge Palma, among others. An example of a popular Portuguese rock band, having a long history, is Xutos & Pontapés who've been playing for over 30 years and are known widely throughout Portugal, as well as Mão Morta, a unique and controversial group with 25 years of existence. Well known solo singers include Rui Veloso, Jorge Palma, and Pedro Abrunhosa. Clã (pop rock), Blasted Mechanism (experimental electro-rock), RAMP (metal), Re:aktor (metal) ThanatoSchizO (metal), Alkateya (metal) Faithfull (soft rock), Suspiria Franklyn (punk-rock/new wave), Riding Pânico (post rock), Linda Martini (post/noise rock), peixe : aviao (post-rock), Ornatos Violeta (indie rock), Stereo Parks (Indie Rock), A Book in the Shelf (grunge rock), Mazgani (alternative) or Green Echo (experimental dub), are other important acts. Portuguese hip hop The beginning of the 21st century was the origin of a new wave of Portuguese Hip Hop singers, who adapted foreign sounds to the Portuguese reality and who sing in Portuguese. Some of the best examples are Da Weasel, Boss AC and Sam the Kid. The biggest exponent of heavy metal music in Portugal are the bands Moonspell and Corpus Christii, originally from Lisboa and who have achieved some international recognition, mainly in Finland, Germany, the Netherlands, Italy and Turkey. Others bands like Holocausto Canibal, Heavenwood, Sirius, Decayed, Fili Nigratium Infernallium, Morte Incandescente, Gwydion, Tarantula also achieved some international recognition. In electronica, Underground Sound of Lisbon was a musical project that brought international attention to the Portuguese DJs, namely Rui da Silva – the only Portuguese musician to reach #1 on the UK charts – and DJ Vibe, Pete tha Zouk. Some other important names of this kind of music are Buraka Som Sistema and Micro Audio Waves. In Porto, the hometown to numerous talents such as Nuno Forte, Drum n' Bass styles are immensely popular, and the city has hosted various important international names in the genre such as Noisia, The Panacea and Black Sun Empire. Also, in the Psychedelic Trance genre there are a worldwide famous project: Paranormal Attack. Experimental and Avantgarde Portuguese music has a striving experimental underground musical scene since the 80's, with some exponents attaining international attention. Notable groups and musicians in this genre are Osso Exótico, Ocaso Épico, Telectu, Carlos Zíngaro and Pedro INF. Popular and Rock Other popular music include bands born out of Portuguese 'telenovelas' or 'soap-operas'. The first wave of such bands included 4Taste and DZRT who went on to gain national popularity. The indie and alternative rock movements are also popular in Portugal. Some indie and alternative bands and artists from Portugal are Os Pontos Negros, Memória de Peixe, We Trust, B Fachada, Linda Martini, The Glockenwise, Capitão Fausto, Frankie Chavez and Best Youth. Portugal has been participating at the Eurovision Song Contest since 1964, its best result being the 6th place achieved by Lucia Moniz's folk inspired song "O meu coração não tem cor" in 1996, penned by Pedro Vaz Osorio. Since then Portugal never had a Top 10 place. Singers of Portuguese-descent Musicians such as Nelly Furtado, Katy Perry, DEV, Kenny Rogers and Nuno Bettencourt (the latter actually Portugal-born) are popular in North America, though only Nelly Furtado reflected some of her Portuguese origin, especially in lesser-known songs in her first albums (songs like "Scared" sung by Furtado in English and Portuguese, "Nas Horas do Dia" and "Força"). Luso-francofonic artists (also of Portuguese origin) include Linda de Suza (Portuguese born and later an immigrant in France) and Marie Myriam. Steve Perry, former lead singer of rock group Journey is American of Portuguese ancestry. The lead singer from Jamiroquai, Jay Kay is descendent from Portugal through his father. Ana da Silva founding member of the cult post-punk band The Raincoats is of Portuguese origin. - Cronshaw, Andrew and Paul Vernon. "Traditional Riches, Fate and Revolution". 2000. In Broughton, Simon and Ellingham, Mark with McConnachie, James and Duane, Orla (Ed.), World Music, Vol. 1: Africa, Europe and the Middle East, pp 225–236. Rough Guides Ltd, Penguin Books. ISBN 1-85828-636-0 - (French) Audio clips: Traditional music of Portugal. Musée d'Ethnographie de Genève. Accessed November 25, 2010. - Portuguese Music Information Centre - Folk and Trad music and dance News, interviews, reviews, photos and music - XLRap – www.xlrap.net – Portuguese HipHop Portal, containing news, events, interviews, biographies, books, reviews and hosting local radio podcasts - BlancoMusic Home of Mil i Maria, Portuguese-language nu-fado. - Portuguese Music By Gina Modesto in Accessible Portugal Online Magazine - GangdoMoinho – HipHop Tuga – Hip Hop Tuga e Crioulo, downloads, videoclips, albuns, mixtaps, entrevistas, concertos, beefs/battles, novidades e desporto online (Sportv) - Portuguese Composers Database
<urn:uuid:f9fae1d3-a7bd-43ef-86d2-f3be6341a4ab>
CC-MAIN-2013-20
http://en.wikipedia.org/wiki/Music_of_Portugal
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706933615/warc/CC-MAIN-20130516122213-00055-ip-10-60-113-184.ec2.internal.warc.gz
en
0.911964
3,648
2.953125
3
In response to us foul-mouthed evolutionists, Casey Luskin asks, "Yet for all their numbers and name-calling, not a single one has answered Egnor's question: How does [sic] Darwinian mechanisms produce new biological information?" I've never liked the whole "biological information" concept. As far as I can tell, the creationists started bandying the term about after this George Gilder article in Wired was published: Just as physicists discovered that the atom was not a massy particle, as Newton believed, but a baffling quantum arena accessible only through mathematics, so too are biologists coming to understand that the cell is not a simple lump of protoplasm, as Charles Darwin believed. It's a complex information-processing machine comprising tens of thousands of proteins arranged in fabulously intricate algorithms of communication and synthesis. The human body contains some 60 trillion cells. Each one stores information in DNA codes, processes and replicates it in three forms of RNA and thousands of supporting enzymes, exquisitely supplies the system with energy, and seals it in semipermeable phospholipid membranes. It is a process subject to the mathematical theory of information, which shows that even mutations occurring in cells at the gigahertz pace of a Pentium 4 and selected at the rate of a Google search couldn't beget the intricate interwoven fabric of structure and function of a human being in such a short amount of time. Natural selection should be taught for its important role in the adaption of species, but Darwinian materialism is an embarrassing cartoon of modern science. As PZ notes, if you're going to comment on cellular function and organismal development, you really should know what the hell you're talking about. When you strip away the 'Power and Glory' bit, it's an absurd argument, particularly coming from someone who supposedly knows something about computers. Why? Because cellular functions don't happen sequentially, but in parallel--as in parallel processing. A 'technologist' should have heard of that before.... But then Gilder brings the Full Metal Stoopid: welcome to the world of Cyber-Vitalism! Brace yourself (italics mine): Intelligent design at least asks the right questions. In a world of science that still falls short of a rigorous theory of human consciousness or of the big bang, intelligent design theory begins by recognizing that everywhere in nature, information is hierarchical and precedes its embodiment. The concept precedes the concrete. The contrary notion that the world of mind, including science itself, bubbled up randomly from a prebiotic brew has inspired all the reductionist futilities of the 20th century, from Marx's obtuse materialism to environmental weather panic to zero-sum Malthusian fears over population. In biology classes, our students are not learning the largely mathematical facts of 21st-century science; they're imbibing the consolations of a faith-driven 19th-century materialist myth. Mind you (pun intended), Gilder doesn't actually present any evidence that "the concept precedes the concrete", but I suppose an emphatic declarative statement is just as good. Of course, if this sounds anything like the Genesis story where God speaks (i.e., generates information), and only then creation happens, I'm sure that's a coincidence. It's sure not evidence ("coincidence is not evidence"--I like the sound of that). But enough about the possible origins of the creationist infatuation with "biological information"--I prefer the term genetics, but that's so Darwinist. (an aside: We, like, so need a Darwinist emoticon). Here's another problem with Luskin's argument (PZ demolishes the supposed production of new information problem): sometimes evolution results in the reduction of information, whether it be the loss of operons during the evolution of Shigella/E. coli, or the massive chromosomal reduction during the evolution of Wolbachia and other insect symbionts. When you hear someone talk about "biological information" and evolution, there's a creationist lurking around somewhere. Does Gilder really think the Big Bang theory is not rigorous? Maybe because we haven't recreated it in the lab? I wonder how he feels about quantum mechanics. kemibe: He sounds like the proverbial New Ager who shouts at the scientists, "Haven't you ever heard of quantum mechanics?!" while not recognising that there's a Schroedinger wave equation written on the blackboard. "Cyber-vitalism" is just solipsism in new garb. Yawn. Actually, the garb isn't even that new. Deepak Chopra's already broken it in. Have these people seriously never seen an ant colony, bee hive, or termite mound? Do they seriously think there is some frickin' architect ant directing the digging and foraging and babysitting? The colony "knows" the shortest distance to food, how many diggers are needed, and when to form a new colony, but no individual ant has any comprehension of any of those things. Information is in no way soley hierarchical. The emergent systems all around us prove that. I think the problem with the "information theory" argument as usually presented is not so much a difference of sequential vs. parallel processing, but a difference between a global search of sequence space as opposed to something approaching more of a simplex minimization. I can fit data to a model containing 7 independently adjusted variables in a second, to a remarkable precision in each variable, and there are other algorithms that are more powerful still. These algorithms don't try all possible combinations of the variables in a fine-precision net--that would indeed take longer than my career. They just look for the best combination in a sample of combinations, and then head off in that direction in my variable space, and gradually contract around a minimum. Likewise, nature doesn't decide to "create" an organism with 3 billion base pairs, and then mix up 4 to the 3 billion combinations to see what works. That would take longer than the age of the universe. That would be dumb. I think that perhaps the intelligent design people create God in there own image (not too bright) and then insist that nature is dumber than God. Michael brings up an interesting point that I've wanted to get to, but never got around to elucidating. When IDers talk about "information theory", they are often really talking about optimization theory and metaheuristics. Optimizations are not useful in that they are "new information" (something that is trivial given any technical metric), but that they are a useful problem. And the irony of it all is that optimization theorists and practitioners have been drawing upon evolution for quite a while to develop new algorithms and metaheuristics. Should be "useful solution to a problem" above, sorry about that. :( Re: "the concept precedes the concrete" You could say that an idea actually does exist in a chemical state for a fraction of a second prior to its being caught and processed or realized by whatever filtering mechanism we use. It wouldn't be the kind of information Gilder is talking about though. It would be "sound of tree falling in the forest" information. lol Did Charles Darwin ever believe that the cell is a single lump of protoplasm? I'm sure he had no idea what is in it but he must have realized that it is complex. Michael brings up an interesting point that I've wanted to get to, but never got around to elucidating. When IDers talk about "information theory", they are often really talking about optimization theory and metaheuristics. Optimizations are not useful in that they are "new information" (something that is trivial given any technical metric), but that they are a useful problem
<urn:uuid:b5c12a0a-9338-4b1e-960e-b4775163e9ab>
CC-MAIN-2020-10
https://scienceblogs.com/mikethemadbiologist/2007/03/29/creationists-biological-inform
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144111.17/warc/CC-MAIN-20200219092153-20200219122153-00273.warc.gz
en
0.949954
1,638
2.53125
3
ANNAPOLIS, Md. (AP) — State officials say they are seeking proposals for Maryland's Stream Restoration Challenge. The program started last summer seeks to establish 1,000 acres of forested stream buffers by 2015. The buffers help keep stormwater runoff and sediment from entering waterways and eventually the Chesapeake Bay, where they can cause oxygen-robbing algae blooms and harm plant life and other bay species. The program provides up to $6 million in grants to local governments, school systems and other groups for bay restoration, service learning and environmental education projects. Proposals are chosen based on factors including effectiveness, cost and student participation. Organizers say that this month alone, nearly 1,500 students involved in Stream Challenge projects will plant 30,000 trees statewide. The Department of Natural Resources is accepting proposals through May 30.
<urn:uuid:602db3b0-bfde-4cc3-bd8b-5a504bdb9632>
CC-MAIN-2018-26
http://delmarvapublicradio.net/post/maryland-seeking-proposals-restore-streams
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861641.66/warc/CC-MAIN-20180619002120-20180619022120-00432.warc.gz
en
0.930791
172
2.546875
3
A comprehensive list of food that you should never feed your dog! If your dog has consumed any of these, please consult a vet to ensure the dog is monitored correctly. Alcohol – I’m sure you’ve heard of the birthday parties where the dog accidentally gets into some of the spilled keg beer, and then gets all silly to the amusement of the crowd. While it may be funny to you, it’s not funny to your dog. Alcohol can cause not only intoxication, lack of coordination, poor breathing, and abnormal acidity, but potentially even coma and/or death. Apple Seeds – The casing of apple seeds are toxic to a dog as they contain a natural chemical (amygdlin) that releases cyanide when digested. This is really only an issue if a large amount was eaten and the seed were chewed up by the dog, causing it to enter its blood stream. But to play it safe, be sure to core and seed apples before you feed them to your dog. Avocado – Avocados contain Persin, which can cause diarrhea, vomiting, and heart congestion. Baby Food – Baby food by itself isn’t terrible, just make sure it doesn’t contain any onion powder. Baby food also doesn’t contain all the nutrients a dog relies on for a healthy, well-maintained diet. Cooked Bones – When it comes to bones, the danger is that cooked bones can easily splinter when chewed by your dog. Raw (uncooked) bones, however, are appropriate and good for both your dog’s nutritional and teeth. Candy and Chewing Gum – Not only does candy contain sugar, but it often contains Xylitol, which can lead to the over-release of insulin, kidney failure, and worse. Cat Food – Not that they would want this anyway, but cat food contains proteins and fats that are targeted at the diet of a cat, not a dog. The protein and fat levels in cat food are too high for your dog, and not healthy. Chocolate – You’ve probably heard this before, but chocolate is a definite no no for your pup. And it’s not just about caffeine, which is enough to harm your dog by itself, but theobromine and theophylline, which can be toxic, cause panting, vomiting, and diarrhea, and damage your dog’s heart and nervous systems. Citrus Oil Extracts – Can cause vomiting. Coffee – Not sure why you would give your dog coffee, but pretty much the same applies here as to chocolate. This is essentially poison for your dog if ingested. Corn on the Cob – This is a sure way to get your dog’s intestine blocked. The corn is digested, but the cob gets lodged in the small intestine, and if it’s not removed surgically, can prove fatal to your dog. Additionally, too much corn kernels can upset the digestive tract as well so be cautious to not feed too much. Fat Trimmings – Can cause pancreatitis. Fish – The primary fish that you need to be careful about are salmon and trout. Raw salmon can be fatal to dogs if the fish is infected with a certain parasite, Nanophyetus salmincola. The parasite itself isn’t dangerous to dogs, but is often infected with a bacteria called Neorickettsia helminthoeca, which in many cases is fatal to dogs if not treated properly. If diagnosis occurs early on, the dog has a great chance of recovering. Cooked salmon is fine as it kills the parasite. Garlic – While garlic can be okay for dogs in very small amounts (and even beneficial for flea treatment), larger amounts can be risky. Garlic is related to onions which is toxic for dogs so it may be best to just avoid it. Grapes and Raisins – This is one that lots of dog owners are unaware of. Grapes contain a toxin that can cause severe liver damage and kidney failure. We’ve heard stories of dogs dying from only a handful of grapes so do not feed your pup this toxic food. Hops – An ingredient in beer that can be toxic to your dog. The consumption of hops by your dog can cause panting, an increased heart rate, fever, seizures, and even death. Human Vitamins – Some human vitamins are okay to use, but the key is comparing the ingredients (all of them – active and inactive) to the vitamins your vet subscribes for your dog (often you can get the human equivalent for much less money). Make sure there’s no iron – iron can damage the digestive system lining, and prove poisonous for the liver and kidneys. Liver – In small amounts, liver is great but avoid feeding too much liver to your dog. Liver contains quite a bit of Vitamin A, which can adversely affect your pup’s muscles and bones. Macadamia Nuts – These contain a toxin that can inhibit locomotory activities, resulting in weakness, panting, swollen limbs, and tremors as well as possible damage to your dog’s digestive, nervous, and muscle systems. Marijuana – Not that you would pass the bong to your dog, but if you do, you should know that marijuana can adversely affect your pup’s nervous system and heart rate, and induce vomiting. Read more about Dogs and Marijuana. Milk and Dairy Products – While small doses aren’t going to kill your dog, you could get some smelly farts and some nasty cases of diarrhea. Why? Dogs are lactose intolerant (as are an increasing number of humans today), and don’t have enough of the lactase enzyme to properly digest dairy foods. If you really need to give them dairy, look into lactose-free dairy products. Mushrooms – Just as the wrong mushroom can be fatal to humans, the same applies to dogs. Don’t mess with them. Onions and Chives – No matter what form they’re in (dry, raw, cooked, powder, within other foods), onions are some of the absolute worst foods you could possibly give your pup (it’s poisonous for dogs, and its even worse for cats). They contain disulfides and sulfoxides (thiosulphate), both of which can cause anemia and damage red blood cells. Persimmons, Peaches and Plums – Peach pits are not only a choke hazard they contain amygdalin, a cyanide and sugar compound that degrades into hydrogen cyanide (HCN) when metabolized. Pear seeds also contain trace amount of arsenic and are dangerous. So if you live in an area that is home to persimmon, peach, or plum trees, look out. Persimmon seeds and peach and plum pits can cause intestinal obstruction and enteritis. You’ll want to make sure there aren’t any wild persimmon or other fruit trees that produce seeds growing in your backyard. If you notice your dog pooping all over the place, and see a bunch of seeds or pits in their waste, you’ll need to break out the saw and chop down some trees. Rhubarb and Tomato Leaves – These contain oxalates, which can adversely affect the digestive, nervous, and urinary systems. Raw Fish – Another vitamin B (Thiamine) deficiency can result from the regular consumption of raw fish. Loss of appetite will be common, followed by seizures, and in rare instances, death. Salt – Just like salt isn’t the healthiest thing for humans, it’s even less healthy for dogs. Too much of it can lead to an imbalance in electrolyte levels, dehydration and potentially diarrhea. Spices containing Capsaicin – Capsaicin, found in chili powder, paprika, and just about any other pepper (bell, chili, etc.), is an irritant for mammals of all shape and size. String – While not a food itself, foods can often contain or be similar to string (ie. meat you’ve wrapped for the oven). If your dog were to eat a string, it could get stuck in their digestive tract and cause complications. Sugar – This applies to any food containing sugar. Make sure you check the ingredient label for human foods – corn syrup (which is a less expensive form of sugar or glucose) is found in just about everything these days. Too much sugar for your pup can lead to dental issues, obesity, and even diabetes. Tobacco – A major toxic hazard for dogs (and humans). The effects nicotine has on dogs are far worse than on humans. Nicotine can damage your pup’s digestive and nervous systems, increase their heart rate, make them pass out, and ultimately result in death. Xylitol – A sugar alcohol found in gum, candies, baked goods, and other sugar-substituted items, Xylitol, while causing no apparent harm to humans, is extremely toxic to dogs. Even small amounts can cause low blood sugar, seizures, liver failure, even death for your pup. Yeast (on its own or in dough) – Just like yeast rises in bread, it will also expand and rise within your pup’s tummy. Make sure they don’t get any. While mild cases will cause gas, lots of farting, and discomfort – too much of it could rupture their stomach and intestines.
<urn:uuid:a4b75b46-4b5c-484e-bfd2-5b7477360157>
CC-MAIN-2020-45
https://vanwijkstreetvet.co.za/care-guides/food-to-keep-away-from-your-dog/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107889574.66/warc/CC-MAIN-20201025154704-20201025184704-00488.warc.gz
en
0.940185
1,979
2.65625
3
Harcourt, Brace & Co. 1943. While Eudora Welty composed “A Still Moment,” one of eight stories in The Wide Net, the noise of World War II surrounded her. In 1941, the Royal Netherlands Military Flying School was located at Hawkins Field in Jackson. As a further reminder of the time, the 1943 first edition of The Wide Net and Other Stories bears an advertisement for war bonds: “This book, like all books, is a symbol of liberty and the freedom for which we fight. You, as a reader of books, can do your share in the desperate battle to protect those liberties. Buy War Bonds.” Three real-life characters converge on the Natchez Trace in “A Still Moment.” Itinerant preacher Lorenzo Dow in search of souls, James Murrell, a storied outlaw of the Trace, whose mission through murder and crime was to “destroy the present,” and John James Audubon, the great recorder of American birds in their natural habitats, meet beside "a great forked tree" and are transfixed by a snow-white heron. As Dow, Murrell, and Audubon were in awe of the bird, so Eudora Welty must have been captivated by Audubon's descriptions of travel and painting up and down the Trace and the Mississippi River during the early 1800s. While recording the birds of the deep South, Audubon visited Natchez where he painted $5 charcoal portraits to support his travels. Further south in Louisiana, he rested in the long-gone Bayou Sara—one of the largest shipping ports between New Orleans and Natchez before 1860--where his wife set up a profitable teaching practice for a short time. Audubon even stopped in Jackson on May 1, 1823 when the capital was only a year old. He described the village in the wilderness as “a mean place, a rendezvous for gamblers and vagabonds” in Life of Audubon. First editions of The Wide Net and Other Stories are scarce in good condition and dust jackets are usually marred, in a somewhat charming way, by faded pink print on the spine. Written by Lisa Newman - First Editions - Our First Editions Club - Shop Books - A Real Bookstore
<urn:uuid:8e3533cc-f662-4a51-9551-8bc50f4ee325>
CC-MAIN-2021-31
https://www.lemuriabooks.com/Articles.asp?ID=262
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154302.46/warc/CC-MAIN-20210802012641-20210802042641-00010.warc.gz
en
0.952242
485
2.875
3
The Spanish Empire created normal trade hyperlinks across both the Atlantic and the Pacific Oceans. In the 16th and 17th centuries, the Portuguese gained an financial benefit in the Kingdom of Kongo due to distinct philosophies of trade. Whereas Portuguese traders concentrated on the accumulation of capital, in Kongo spiritual meaning was attached to quite a few objects of trade. According to economic historian Toby Green, in Kongo “giving additional than getting was a symbol of spiritual and political energy and privilege.” Regardless of whether you want to join a trade mission, find out about marketing overseas, uncover sources of grant cash in assistance of international trade, or participate in training sessions, we and our partners are right here to show you the way. This is largely a book of financial theory and its application to trade subjects. As such, it is largely acultural, not being specifically sensitive or unsensitive to cultural matters. There are quite a few cultural problems that one could delve into with respect to topics in international economics and globalization having said that, these are the topics of this book. That the majority of examples of cost-free trade agreements across the globe that the book references are properly-established rather than recent, it is unlikely that the text will be obsolete in coming years. Alterations, such as the enactment of new significant trade offers or international trade guidelines and agreements, will be simple to insert into copies of the text in coming years. It is therefore important to know the distribution of economic activities each across households and inside households. The results for India recommend that the welfare impact from improved via wages has been pro-poor . This can be noticed in the Illustration, which shows that the welfare gains via wage incomes are about six% for households in the poorest quintile, and decrease to roughly 3% for the richest households. We estimate that these 3 channels collectively produce up to $eight.three trillion in value annually—a figure that would increase overall trade flows by $four. trillion and reallocate a different $four.3 trillion presently counted as part of the flow of goods to services. If viewed this way, trade in solutions is currently additional precious than trade in goods. This point of view would substantially shift the trade balance for some nations, most notably the United States. In some situations, there could be no domestic alternative, and trade would then provide a resource that would otherwise be unattainable. Considering the fact that the US has opened up free of charge trade, there are statistics to show that the economy has boomed as a direct outcome. Altogether, these 20 nations only make up about 6% of the planet population. Nevertheless, these places purchase pretty much half of the United States of America’s goods. This is a direct example of how smaller countries importing goods can optimize their getting power. Get data on nation financial data and evaluation, development assistance, and regional initiatives. The Global Alliance for Trade Facilitation is a collaboration of international organisations, governments and corporations. We are led by the Center for International Private Enterprise, the International Chamber of Commerce and the Planet Financial Forum, in cooperation with Gesellschaft für Internationale Zusammenarbeit. As your organization grows, so do the challenges of staffing for international trade. We augment your employees to assure uncompromised functionality wherever you trade. Lots of firms with a global footprint struggle with inconsistent practices and procedures at their various nation areas. Quite a few occasions, by-products of subsidies are overproduction and a decrease in trade. Collectively with our government affairs and public policy practice, we work to guarantee that emerging legislation establishes or maintains favorable trade and investment circumstances for our clientele. We closely monitor and advise our consumers on legislative developments in international trade policy and remain prepared to advocate ahead of important choice makers on behalf of our clients’ diverse interests. The Steptoe international trade practice has secured substantial amendments to US trade remedy laws as effectively as tariff modifications by means of the US Miscellaneous Tariff Bills . The United States once imposed size restrictions to “protect” U.S. buyers from smaller tomatoes. The outcome was a highly productive trade barrier that protected U.S. producers and raised U.S. tomato costs. These restrictions had been abolished under terms of the North American Totally free Trade Agreement, which has led to a huge improve in U.S. imports of Mexican tomatoes and a reduction in U.S. tomato production (Guajardo, R. G. and Homero A. Elizondo, 2003). Many economists pressure that trade boosts the overall economy by lowering prices and growing productivity. Study much more about Highlights of the Philippine Export and Import Statistics March 2022 . In April 2022, the country’s total external trade in goods amounted to USD 17.03 billion which indicates an annual development rate of 16.two percent. Study a lot more about Highlights of the Philippine Export and Import Statistics April 2022 . In Could 2022, the country’s total external trade in goods amounted to USD 18.30 billion which indicates an annual development rate of 21.five percent. As the membership-primarily based small business association for organic agriculture and merchandise in North America, we are the top voice for the organic trade in the United States, representing over 9,500 organic businesses across 50 states. Considering the fact that tearing his Achilles ideal prior to 2021 education camp, Akers has played in ten games, which includes postseason, and carried the ball 123 times for 326 yards, scoring a single touchdown and fumbling it 3 times. Teams cannot be assured that he will ever rebound to pre-injury status and even if he did, Akers had yet to truly “prove himself” as a running back for the duration of his rookie season. It took him a although to be established as the quantity one particular back and a lot of his production stems from a single 171-yard functionality against the Patriots. The excess production more than demand would now be exported to the rest of the planet. A single of the initial points produced in this section is that a domestic policy can be the basis for trade. In other words, even if trade would not occur otherwise involving countries, it is attainable to show that the imposition of domestic taxes or subsidies can induce international trade, even if a nation is tiny in international markets. In general, any variety of domestic tax or subsidy policy, or any form of government regulation that impacts the behavior of firms or buyers, can be classified as a domestic policy. There are a wide range of these policies, any of which can have an impact on international trade. For instance, there is escalating concern in the United States about the environmental and labor policies of a lot of U.S. trade partners.
<urn:uuid:b493b11c-0da3-4858-a858-a95e8b5c49a8>
CC-MAIN-2023-06
https://vausu.com/2022/10/17/what-is-my-vehicle-worth-get-blue-book-utilized-car-trade-in-values-kelley-blue-book/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00375.warc.gz
en
0.951845
1,368
2.65625
3
As we close out Hispanic Heritage Month (September 15 through October 15), we continue to recognize the achievements made by Hispanics. Those achievements include Rita Moreno, the first Hispanic actress to win an Oscar for her role in West Side Story; their participation in military wars, such as World War I and II; Justice Sonya Sotomayor becoming the first Hispanic on the Supreme Court; Cesar Chavez and his farm workers strike; Ellen Ochoa becoming the first Hispanic to fly in space. Another area we should recognize is the rise of Hispanic Heritage artistic themes and communities in the US. In the series, Photographs Documenting the Secretary’s Headquarters and Field Activities, and Agency Officials and Events, 2001-2014 from RG 207: General Records of the Department of Housing and Urban Development, there is file entitled 207-DP-8922P – Hispanic Heritage Select Photos (NAID 6190393) containing 41 selected digital photographs of assorted communities accenting Hispanic Heritage theme: residents, neighborhoods, buildings, and murals. The photos were created by David Valdez. The photographs are fully digitized and made available via our online catalog with no copyright restrictions. The titles have all the same name as the file “Hispanic Heritage Select Photos”.
<urn:uuid:63a0cd4e-0431-40e8-9d33-bb4d632ffcba>
CC-MAIN-2021-43
https://unwritten-record.blogs.archives.gov/2020/10/06/hispanic-heritage-month-recognizing-and-celebrating-hispanic-culture/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587926.9/warc/CC-MAIN-20211026200738-20211026230738-00492.warc.gz
en
0.943398
253
2.71875
3
St. Thomas, the Disciple - St. Thomas, the Disciple (? – A. D. 72) Dr. K. Mani Rajan Cor-episcopo St. Thomas, one among the twelve disciples of Jesus Christ, was a Jew. He was probably from Galeele (Aphrem, 1964; White 1991). Thomas in Armaic Syriac is known as Teoma and in Greek Didymus (John: 11:16; 20:24). The meaning of these words is twin (The encyclopedia Americana, 1988). The name “twin” was called because of his twin brother Adai who later was the Episcopo of Edessa (Aphrem Aboodi, 1966; Curien, 1982). Thomas was most probably a carpenter (Britannica, 1988). The Bible has only a few references to Thomas, the disciple. Jesus went to Bethany after the death of Lazarus. Thomas along with other disciples went with Jesus. Thomas said to his fellow disciples, “Let us also go, that we may die with Him” (John 11:16). The willingness of Thomas to follow Jesus unto death was fulfilled in his On another occasion Jesus said, “And where I go you know, and the way you know” (John 14:4). Thomas said unto Him, “Lord, we do not know where you are going and how can we know the way?” (John 14:5). Jesus said to him “I am the way, the truth, and the life . . .” (John 14:6). Thomas puts questions like a child for he wants to know and believe. After the resurrection of Jesus Christ, He appeared to the disciples and Thomas was not with them (John 20:24). The other disciples said to him, “We have seen the Lord” so he said to them, “unless I see in His hands, the print of the nails, and put my fingers into the print of the nails, and put my hand into His side, I will not believe” (John 20:25). Doubt is the first step to belief. Jesus Christ cleared his earnest doubt. “ . . . Jesus came and said to Thomas, reach your finger here, and look at my hands; and reach your hand here, and put it into my side. Do not be unbelieving, but believing. And Thomas answered and said to Him, “My Lord and My God !” (John 20:26-28). This confession of faith is repeated in the Holy mass when the second coming of Jesus is commemorated. This proclamation is the sum total of the salvific act of Jesus Christ on earth. Apart from the New Testament references, Mor Aphrem, the Syrian (306-373); Gregory of Nazianzen (330-395), John Chrysostom (347-407), and Jacob of Sarug (451-521) have described the work of Thomas in India (Panicker, 1989; Koodapuzha, 1984; Kolangadan, 1995-96). These accounts are based on the ‘Acts of St. Thomas’. Some stone writings, coins and Tamil writings have been triangulated to suggest the work of St. Thomas in India (D’Souza, 1952; Paul, 1997). Moreover, the prayers of Syrian Church fathers written in the 4th and 5th centuries are relied on to establish that St. Thomas preached Gospel In the memre’ of Jacob of Sarug, it is said that the lot fell on Thomas to go to India. Thomas was hesitant to go to the black Indians (Panicker, 1989). Then, Thomas was sold as a slave to Haban (Aban), a merchant. It is also mentioned in prayers that he was sold as a mason for the construction of a building for a king (Abraham, 1981, p. 212). This 1st century king’s name is given as Gondaphorus (Kolangadan, 1995- 96). The king is also referred as Gudnapher (Menachery, 1973). Some coins of Gondophares and Gad (brother of the king) were discovered in North India in the 19th century. It must be said, however, that it by no means certain that Gordophares of the coins is the same person as Gudnapher of the Acts of St. Thomas (Menachery, 1973, p. 3). St. Thomas was ordered to build a palace for the King. He was entrusted with twenty pieces of silver. However, when the King was absent, he used the silver for charitable purposes. When the King returned, he imprisoned St. Thomas, intending to flay him alive (White, 1991, p. 360). At that juncture, the King’s brother died, and when the brother was shown the place in heaven that Thomas’s good work had prepared for the King, he was allowed to return to earth and offer to buy the spot from the King for himself. The King refused, released Thomas, and was converted by him. The incident is alluded to in the evening prayer (Bovuso) of the first Sunday after Easter. are other accounts regarding the life of St. Thomas in India referred to by other writers. It is said that the King’s brother (Gad) was called to life by St. Thomas after his death (Menachery, 1973). It is also mentioned that St. Thomas attended the marriage of the King’s daughter. He was beaten up at the banquet. That person’s hand was torn off by a dog, which St. Thomas healed (Panicker, 1989, p. 61). The miracle done at the wedding feast is referred to in the morning prayer of the first Sunday after Easter (Abraham, 1981, p. 213). of St. Thomas was primarily in the Kingdom of Gudnapher and then in places under King Mazdai (Menachery, 1973, p. 3). It is believed that St. Thomas landed at Kodungaloor in A. D. 52. He preached gospel to Jews and then to Gentiles. He established houses of worship at Maliankara, Kollam, Niranam, Chayal (Nilakkal), Gokkamangalam, Paravur (Kottakkavu), and Palayoor (D’Souza, 1952; Aphrem, 1964). He appointed as priests elders from four Brahmin families, namely; Shankarapuri, Pakalomattom, Kalli and Kaliyankal and then went to Malakka. A. D. 72 he was pierced with a lance on December 18 and entered the heavenly abode on December 21 at Mylapore near Chennai, India. St. Thomas was buried at Mylapore, Chennai. On 3rd July A. D. 394 the holy remains were transferred to Urhoy (Edessa) and interred there on August 22 (Aphrem, 1964). The relocation of the relic of St. Thomas to Urhoy is described in the Hoothomo of the feast day. Later the holy relics were transferred to the St. Thomas Syrian Orthodox Cathedral in Mosul, Iraq. A portion of the relics was discovered by His Grace Mor Severios Zakka (later Patriarch) in the altar of the St. Thomas church, Mosul, Iraq, during renovation work in 1964. St. Thomas is considered to be the patron of builders by the Western Church. Three dates are observed as the feast days of St. Thomas. They are: New Sunday (a movable feast), July 3 – transportation of the relic to Urhoy, and December 21 – Aphrem Paulose Ramban (1964). Sheemakkaraya Pithakkanmar (Fr. T. J. Abraham, Trans.) Manjanikkara: Mor Ignatius Dayara. Aprem Aboodi Ramban (1966). Stuthi chowayakkapetta suriyani sabha. (Madappattu Yacoub Ramban, Trans). Pathanamthitta: Ajantha Press. Curien Corepiscopa Kaniyamparambil (1982). Suriyani Sabha Thiruvalla: Chev. K. T. Alexander Kaniyanthra. D’souza, H. (1952). In the steps of St.Thomas. Madras: The Diocese of Mylapore. Kolangadan, J. (1995-96). The historicity of Apostle Thomas evangelisation in Kerala. The Harp, VIII & IX, 305-327. Koodpuzha, S. (Ed.) (1984). Thirusabha charithram (2nd ed.). Kottayam: Oriental Institue of Religious Studies. Menachery, G. (Ed.) (1973). The St.Thomas Chistian encyclopaedia of India ((Vol. II). Trichur. The new encyclopaedia Britannica. (1988). Encyclopaedia Britannica Inc. White, K. E. (1991). A guide to the saints. New York: Ivy Books.
<urn:uuid:afeae030-0cd1-4ae8-b960-e6726ac0ab0c>
CC-MAIN-2015-22
https://groups.yahoo.com/neo/groups/SOCM-FORUM/conversations/topics/24905?viscount=-30&tidx=1
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928520.68/warc/CC-MAIN-20150521113208-00324-ip-10-180-206-219.ec2.internal.warc.gz
en
0.926986
2,047
2.65625
3
With the end of 2015, a year of commemorating the 70th anniversary of the end of World War II, the curtain closes on another chapter in the recurring historical debates in Northeast Asia. Despite signs of a thaw in political relations between Japan and its neighbors, China and South Korea, deep differences in historical perceptions – and historical responsibility – have not changed. It’s not surprising, however, that there’s no consensus on history among the three neighbors because there is no consensus within Japan itself. Historical narratives spark debate and controversy domestically, among society at large as well as within the political elite. Just as former Prime Minister Tomiichi Murayama, author of the famous Murayama statement, was attacked by right-wing critics for going too far in criticizing Japan’s wartime deeds, current Prime Minister Shinzo Abe has been attacked by left-wing critics for being an apologist and revisionist. Behind the politics, behind the international disputes, there’s the central question of how modern Japan remembers history. And there’s no better place to start unraveling this monumental topic than by a visit to the site that, in many ways, has come to embody the controversy: Yasukuni Shrine, in Tokyo.
<urn:uuid:82a79c4f-39eb-4531-9f89-04efc9f8b4bd>
CC-MAIN-2018-05
https://thediplomat.com/2015/11/how-japan-views-history/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891705.93/warc/CC-MAIN-20180123012644-20180123032644-00617.warc.gz
en
0.958962
254
3
3
Iceland’s Parliament is preparing to consider a bill that would give the world’s largest aquaculture corporations unfettered access to the country’s famously pristine rivers and fjords, with dire consequences for the environment and local aquatic life. These companies want to import a cheap and destructive method of salmon farming called open-pen net farming, or “uncontained aquaculture.” Barred from expanding in their home country, they need new territory to exploit—and Iceland’s unspoiled waters and lax oversight make it the perfect target. But in true Icelandic spirit, environmentalists, business owners, and residents are demanding a stop to the bill, demanding a thorough environmental review and consideration of sustainable alternatives. They need your help. Can you show your support by signing their petition? Let Parliament know the world is watching! Why is uncontained aquaculture harmful? Uncontained aquaculture poses three grave threats to the environment and wild fish stocks: pollution, disease and lice, and genetic contamination. 1. Pollution. Thousands of salmon are grown in crowded net pens, fed meal made from soybeans, ground-up feathers, genetically-modified yeast, and chicken fat—a diet rich in chemicals, drugs, and dyes. This mixes with concentrated fish feces and falls through nets, smothering and contaminating aquatic life. 2. Lice & disease. High densities of trapped fish are vulnerable to infestation by disease and parasites. Sea lice is the biggest threat. They feed on the mucus, blood, and skin of salmon, eating fins, eroding skin, and causing constant bleeding and deep open wounds—even death. They also attack wild baby salmon migrating to sea. These lice are typically removed before coming to market, so consumers don’t even know their food was infested. 3. Genetic contamination. Some farmed salmon inevitably escape their net pens. When these fish breed with wild salmon, they create hybrid offspring that are ill-equipped to survive. Wild eggs fertilized by farmed salmon equal lost eggs. I’ve personally witnessed the damage to our oceans that open net salmon farms have caused in the U.S., Canada, Chile and Norway. They are also producing a toxic product that should never be eaten by humans or even our pets. We already know that there are better ways to farm, but will we have the imagination and courage to do the right thing for our home planet? Yvon Chouinard (Founder & Owner, Patagonia, Inc.) But with wild salmon populations in danger, how else can we meet the increasing demand for protein and food? There are other safer and better alternatives, like closed containment and land-based farming. These systems force aquaculture companies to deal with waste, chemical runoffs, diseases and parasites, without contaminating local ecosystems. And there’s no escapes, so wild salmon populations have a chance at surviving without interference from man-made technologies. #AgainstTheCurrent seeks to reverse the trend of destroying nature to cheaply produce fish. Tell Iceland’s Parliament to freeze expansion of uncontained aquaculture while it creates a regulatory regime in harmony with nature, one that prevents the spread of pollution, disease, and genetic destruction. Iceland can be a leader in sustainable aquaculture. Sign the petition via the button below and spread the word! Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
<urn:uuid:0723990d-f434-409d-8936-0249f103f96f>
CC-MAIN-2021-39
https://www.fishandfly.com/iceland-considers-uncontained-aquaculture/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057274.97/warc/CC-MAIN-20210921221605-20210922011605-00411.warc.gz
en
0.930453
801
2.921875
3
The least common multiple integers problem solving of 16 single parent struggles essay and how to write a research paper for kids 52 digital literacy u essay is 208, which can be found by looking at the decimal when 52 is divided by 16. he starts with outline samples for research papers the bait 2 feet below the surface of the water. suitable for grades 6–12 problems involving ratios and proportions use the two related numbers as your first steny hoyer committee assignments ratio. sep 04, 2013 · word problems with social problems essay steps in writing research paper integers 1. 63kb page count: aug 15, 2014 · an integer is never a fraction, decimal, or percentage, it can only be a whole number. this integers: x cover letter online x = 2x. 0. in this integers worksheet, learners use the table and the number line to help them …. three pages of complex hedge fund business plan math integers problem solving problems draw on critical thinking skills and logic in order to find the correct solution unique compare and contrast essay topics check out our new feature choose-your-own-maths-adventure for a week of inspirational math. solve for x to obtain. solve in integers. problem solving – match math expressions integers problem solving with their correct values. subtracting integers:.
<urn:uuid:9b62b18e-5c29-4f39-8fb8-e4c8b69a4156>
CC-MAIN-2020-45
https://bestessaywriting.website/2020/10/11/integers-problem-solving_u6/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107902745.75/warc/CC-MAIN-20201029040021-20201029070021-00712.warc.gz
en
0.881289
259
2.75
3
Course Name: Science 9 Course Teacher: Ms. Myles 1. List off ALL the functional procedures you used in this class? Using a search engine Accessing a school website Uploading and/or downloading Printing a document Saving to a cloud (Office 365) Accessing work on multiple devices (ie. at home and at school) Sending/responding to an email Cutting/pasting text, pics or links 2. Describe one digital tool or resource you found useful in this class. How did you use it and why was it useful? In this class, I found the links supplied to us through teams very useful. 3. Describe a tool, app, or resource you are hoping to use in the future. What would you use it for? An app I am hoping to use in the future is Cheggs, it is a Flashcards app and it was very useful for studying for science tests. Hopefully I can use it again.
<urn:uuid:ca4de2d1-a06d-49f5-82a8-0061ea64a97f>
CC-MAIN-2020-50
http://terryfox.sd43.bc.ca/paigec2019/reflection-3/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141747774.97/warc/CC-MAIN-20201205104937-20201205134937-00462.warc.gz
en
0.917555
210
3.25
3
Before there were bones Early multi-celled animals like jellyfish and sponges and worms also didn’t have skeletons, but beginning with arthropods, about 550 million years ago, animals began to make specialized structures to support their bodies and give them a definite shape. What is an exoskeleton? The earliest skeletons were exoskeletons – they were on the outside of the animal. Modern lobsters, crabs, and snails have exoskeletons. These hard shells formed on creatures during the Proterozoic Eon. The spinal cord and vertebrae By about 510 million years ago, eels began to have their skeletons on the inside as well as on the outside (their scales). They evolved first notochords and then vertebrae to protect their delicate spinal cords. These early inside skeletons (endoskeletons) were made out of cartilage rather than bone. Sharks still have skeletons made out of cartilage. Fish skulls made out of teeth! By about 480 million years ago, some fish were beginning to have teeth, so they could eat other fish. To protect their heads, some fish evolved their teeth into skulls – the earliest skulls look like lots of tiny teeth! Fish also evolved two sets of fins – one near their heads, and the other about half-way down – to help them swim faster. During the Devonian period, about 400 million years ago, many seas were very shallow, and fish evolved to be able to live in very shallow water. Their fins developed into four legs, because walking worked better than swimming in these puddles, and they developed fingers to help them balance when they were walking. From fish to frogs Gradually these lungfish evolved into frogs, about 375 million years ago, and lived more and more on land. Their bodies were not supported by the water anymore, and they needed stronger bones to hold them up. How did the frog skeleton change from the fish skeleton? Can you see which parts match up? Starting from the head, you can see that frogs have lost all their fish teeth. They didn’t need teeth to eat the little insects they lived on. Like fish, frogs have hard skulls, but they have much bigger eye sockets, because they needed better eyes to catch the flying insects. Where fish have vertebrae and ribs, frogs have them too, but fewer of them.
<urn:uuid:c8372e5e-a46d-4e91-9e22-27d501588eae>
CC-MAIN-2019-39
https://quatr.us/biology/skeletons-evolution-biology.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573827.2/warc/CC-MAIN-20190920030357-20190920052357-00247.warc.gz
en
0.9825
496
3.859375
4
Production Schedule Template A production schedule template is a document which outlines the format in which a production schedule will be prepared. By production schedule we mean how resources are allocated and the different tasks are organised to produce goods and services to meet a target. Production scheduling refers to the time every activity starts and finishes on a particular machine and also mentions any additional resources required to do the job. While preparing a production schedule, project manager needs to plan and manage different tasks that are involved in a project and accordingly he must specify things like which machine should be run to run a particular batch or what job should follow next or if any order will be delivered late etc. You can Download the Free Production Schedule Template form, customize it according to your needs and Print. Production Schedule Template is either in MS Word, Excel or in PDF. Sample Production Schedule Template: |Name and address of company: __________ [Mention name and location of company, factory or warehouse]| |Date: ____________ [Mention day and date of production schedule]| |Name of manager: _________ [Give name of authorized manager or supervisor of this production schedule] Category: Schedule Templates
<urn:uuid:a50045f0-7221-4b7e-b59e-73a726b5a2b9>
CC-MAIN-2017-17
http://www.sampletemplates.org/production-schedule-template.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119995.14/warc/CC-MAIN-20170423031159-00426-ip-10-145-167-34.ec2.internal.warc.gz
en
0.874576
241
2.5625
3
Volume 22, Number 1—January 2016 Identification of Source of Brucella suis Infection in Human by Whole-Genome Sequencing, United States and Tonga Brucella suis infection was diagnosed in a man from Tonga, Polynesia, who had butchered swine in Oregon, USA. Although the US commercial swine herd is designated brucellosis-free, exposure history suggested infection from commercial pigs. We used whole-genome sequencing to determine that the man was infected in Tonga, averting a field investigation. In August 2013, a man in his 20s from Tonga, Polynesia, who had moved to the United States in June 2010, was examined in a hospital in Portland, Oregon after experiencing 4 weeks of fever, night sweats, headache, productive cough, shortness of breath, and weight loss. He also reported pleuritic chest pain and abdominal pain radiating to his back. A computed tomography scan showed lung and liver abnormalities. Blood cultures grew Brucella suis biovar 1. After treatment with oral sulfamethoxazole (800 mg 3×/d), trimethoprim (160 mg 3×/d), and doxycycline (100 mg 1×/d); and intravenous gentamicin (580 mg 3×/d), the infection resolved. Because Brucella infection is a reportable condition in Oregon, the case was referred to the Oregon Health Authority Acute and Communicable Disease office, and authority personnel informed the Oregon Department of Agriculture’s veterinary officials that the patient had routinely purchased pigs from a local farm for home slaughter, suggesting the patient may have contracted B. suis from commercial swine. The US commercial swine herd is considered to be free of B. suis; however, B. suis is endemic among feral swine and occasionally has infected domestic swine (1,2). Slaughter surveillance, primarily by using the buffered acidified plate antigen test, is conducted routinely to identify such events to prevent the re-establishment of B. suis in the commercial swine herd and to protect workers. Serum from sows culled on the farm in question had been collected during routine slaughter surveillance. Two weakly positive results during the previous 3 years were investigated by following the guidelines in the USDA Swine Brucellosis Control/Eradication State-Federal-Industry Uniform Methods and Rules (3); no brucellosis was confirmed. Although feral swine reside in Oregon, none had recently been reported near the farm. The case-patient’s lack of exposure to feral swine and a known exposure to commercial swine required further investigation. An epidemiologic investigation to evaluate the commercial herd’s infection status would require testing of swine on the premises and related farms, and tasks such as tracing sales from the herd and testing swine possibly exposed to swine brucellosis by temporary movement of boars to or from farms for breeding purposes. Such investigations can be costly, especially if there has been extensive movement of swine in and out of the herd. Whole-genome sequencing (WGS) and single-nucleotide polymorphism (SNP) analyses can provide increased resolution to identify the source of infections without conducting more expensive field investigations (4). The National Veterinary Services Laboratories (NVSL) had implemented WGS and SNP analysis as the primary means of genotyping B. abortus and Mycobacterium bovis isolates and applied this information to identify sources of other outbreaks. Although a project to sequence B. suis isolates from animals of US origin was in process at the time of this investigation, few had been sequenced. To rapidly investigate the case in Oregon, laboratory staff from the Centers for Disease Control and Prevention extracted and provided DNA from the isolate recovered from the Oregon patient, and the NVSL sequenced 59 B. suis biovar 1 isolates recovered from US-origin animals. Oregon was declared free of swine brucellosis in 1987 (http://www.oregon.gov/ODA/programs/AnimalHealthFeedsLivestockID/AnimalDiseases/Pages/AnimalDiseases.aspx), and the NVSL did not have archived isolates from Oregon or surrounding states. Consequently, isolates selected for sequencing were mostly from the southern United States and had been recovered from domestic swine and cattle during 1993–2013 (Technical Appendix 1). A few isolates were selected from dogs, horses, and humans, all of whom, based on data from epidemiologic investigations, likely had contact with feral swine. To obtain the whole-genome sequences, we sequenced B. suis DNA on a MiSeq instrument (Illumina, San Diego, CA, USA) using 2×250 paired-end chemistry and the Nextera XT library preparation kit (Illumina), targeting 100% coverage. FASTQ files from the instrument were put through the NVSL in-house analysis pipeline (https://github.com/USDA-VS). Reads were aligned to B. suis isolate 1330 (GenBank Reference Sequence accession nos. NC_017250 and NC_017251) by using BWA (5) and Samtools (6). We processed BAM files (6) by using the Genome Analysis Toolkit best-practice workflow (7). SNPs were called by using the UnifiedGenotyper from the toolkit, outputting SNP to variant call files (7–9). Results were filtered by using a minimum Phred (http://www.1000genomes.org/node/101) quality score (scaled probability of SNP presence) of 300 and allele count of 2. From the variant call files, SNPs gathered were output in 3 formats: an aligned FASTA file (http://www.ncbi.nlm.nih.gov/BLAST/blastcgihelp.shtml); a tab-delimited file with the position location and SNPs grouped and sorted; and a phylogenetic tree created by using RAxML (10). We visually validated SNPs using the Integrative Genomics Viewer (11). Sequencing files were deposited in the National Center for Biotechnology Information Sequence Read Archive (SRA) under the Bioproject PRJNA251693 http://www.ncbi.nlm.nih.gov/bioproject/?term=PRJNA251693 (online Technical Appendix 1). Initially, as evidenced by the 60 isolates described, the United States could not be ruled out as a source because of a lack of resolution. Two approaches were considered to improve the resolution of the B. suis database: sequence enough isolates originating in the United States to assess the likelihood that any US-origin isolate would closely match, or sequence isolates originating from Tonga and determine whether they were clustered with the isolate from the case-patient in Oregon. The difficulty in obtaining isolates from representative feral swine throughout the United States precluded the first option as a viable solution. To obtain isolates from Tonga, we contacted the Ministry of Primary Industries in New Zealand for assistance; its staff members provided DNA from 7 B. suis isolates recovered from patients who were from Tonga. New Zealand is not known to have B. suis in its feral or commercial swine populations; therefore, humans with diagnoses of B. suis had likely been infected in another country. We constructed a maximum-likelihood phylogenetic tree comprising the Oregon human isolate, the 59 field isolates from the United States, and the 7 isolates from New Zealand recovered from patients from Tonga (Figure). The branch labeled as OutGroup_suis3 roots the phylogenetic tree, and the A node is the most recent common ancestor (MRCA) for all isolates. Three lineages evolved from the MRCA. Initially, the Oregon human isolate was the only representative in its lineage. Without the perspective of the Tonga isolates, a US source for this isolate could not be ruled out because it shared the same MRCA as 2 other lineages occurring within the United States. All additional Tonga–origin isolates clustered tightly with the Oregon human isolate share a common ancestor at the B node. The Oregon human isolate is anchored by 2 additional common ancestors: C and D. In addition to the phylogenetic tree, a table displaying divergent SNPs of closely related isolates, including nucleotide calls and the positions within the genome, was created for transparency and clarity (Technical Appendix 2). Often, 1 or 2 SNP calls inform the epidemiology of a case. For example, the 08-924 isolate recovered from a patient in Tonga in 2008 has 1 additional SNP (a thymine at position 1809039 on chromosome 2) from sharing a common ancestor with the Oregon isolate. WGS and SNP analysis effectively concluded that this case-patient was infected in Tonga and not by swine in the United States. Thus, widespread testing of domestic swine was not conducted; agricultural trade continued without restrictions, and postexposure treatment of contacts participating in home slaughter or meat preparation was not needed. This case also demonstrates the value of and need for an international database of validated WGS isolates that can be used by both human and animal health officials in their respective and collaborative epidemiologic investigations. Finally, this case highlights the benefits of a One Health (http://onehealthinitiative.com/) approach between public and animal health, including state, federal, and international authorities. Dr. Quance is a microbiologist for the Diagnostic Bacteriology Laboratory, Mycobacteria and Brucella Section, at the National Veterinary Services Laboratories, Ames, Iowa. Her research interests include Brucella isolation, identification and genotyping. We thank David Silverman, who conducted the farm investigation, and Patrick Camp and Angela Gruis for their technical work on this case. - Wyckoff AC, Henke SE, Campbell TA, Hewitt DG, VerCauteren KC. Feral swine contact with domestic swine: a serologic survey and assessment of potential for disease transmission. J Wildl Dis. 2009;45:422–9. - United States Department of Agriculture Animal and Plant Health Inspection Service. Swine brucellosis status map. APHIS. 2011 Jul [cited 2015 Jan 11]; http://www.aphis.usda.gov/wps/wcm/connect/294e846c-3d5f-4031-b5a6-500c283ad650/br_status_map_257.jpg?MOD=AJPERES - United States Department of Agriculture Animal and Plant Health Inspection Service. Swine brucellosis control/eradication: state–federal–industry uniform methods and rules. APHIS. 1998 Apr [cited 2015 Sep 13]. https://www.aphis.usda.gov/animal_health/animal_dis_spec/swine/downloads/sbruumr.pdf - Kao RR, Haydon DT, Lycett SJ, Murcia PR. Supersize me: how whole-genome sequencing and big data are transforming epidemiology. Trends Microbiol. 2014;22:282–91. - Li H, Durbin R. Fast and accurate short read alignment with Burrows-Wheeler transform. Bioinformatics. 2009;25:1754–60. - Li H, Handsaker B, Wysoker A, Fennell T, Ruan J, Homer N, The sequence alignment/map format and SAMtools. Bioinformatics. 2009;25:2078–9. - DePristo MA, Banks E, Poplin R, Garimella KV, Maguire JR, Hartl C, A framework for variation discovery and genotyping using next-generation DNA sequencing data. Nat Genet. 2011;43:491–8. - McKenna A, Hanna M, Banks E, Sivachenko A, Cibulskis K, Kernytsky A, The Genome Analysis Toolkit: a MapReduce framework for analyzing next-generation DNA sequencing data. Genome Res. 2010;20:1297–303. - Stamatakis A. RAxML version 8: a tool for phylogenetic analysis and post-analysis of large phylogenies. Bioinformatics. 2014;30:1312–3 and. - Robinson JT, Thorvaldsdottir H, Winckler W, Guttman M, Lander ES, Getz G, Integrative genomics viewer. Nat Biotechnol. 2011;29:24–6.
<urn:uuid:eae386c6-7c41-4737-b8be-f1fec817eb43>
CC-MAIN-2021-21
https://wwwnc.cdc.gov/eid/article/22/1/15-0843_article
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991488.53/warc/CC-MAIN-20210515223209-20210516013209-00609.warc.gz
en
0.918372
2,651
2.609375
3
The grey heron has a slow flight, with its long neck retracted. This is characteristic of herons and bitterns, and distinguishes them from storks, cranes, and spoonbills, which extend their necks. It flies with slow wing-beats and sometimes glides for short distances. It sometimes soars, circling to considerable heights, but not as often as the stork. In spring, and occasionally in autumn, birds may soar high above the heronry and chase each other, undertake aerial manoeuvres or swoop down towards the ground. The birds often perch in trees, but spend much time on the ground, striding about or standing still for long periods with an upright stance, often on a single leg. Fish, amphibians, small mammals, and insects are taken in shallow water with the heron's long bill. It has also been observed catching and killing juvenile birds such as ducklings, and occasionally takes birds up to the size of a water rail. It may stand motionless in the shallows, or on a rock or sandbank beside the water, waiting for prey to come within striking distance. Alternatively, it moves slowly and stealthily through the water with its body less upright than when at rest and its neck curved in an "S". It is able to straighten its neck and strike with its bill very fast. Small fish are swallowed head first, and larger prey and eels are carried to the shore where they are subdued by being beaten on the ground or stabbed by the bill. They are then swallowed, or have hunks of flesh torn off. For prey such as small mammals and birds or ducklings, the prey is held by the neck and either drowned, suffocated, or killed by having its neck snapped with the heron's beak, before being swallowed whole. The bird regurgitates pellets of indigestible material such as fur, bones and the chitinous remains of insects. The main periods of hunting are around dawn and dusk, but it is also active at other times of day. At night it roosts in trees or on cliffs, where it tends to be gregarious. Source : wikipedia
<urn:uuid:dbc1932e-070e-4b75-a549-efd15539e781>
CC-MAIN-2021-04
https://www.wildlifeofkenya.com/categories/wading-and-water-birds/heron-grey/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703500028.5/warc/CC-MAIN-20210116044418-20210116074418-00352.warc.gz
en
0.967977
446
3.625
4
WASHINGTON-- The rapid decline in costs associated with many common laboratory techniques, such as DNA sequencing and synthesis, has led to their adoption by individuals outside of traditional university or industrial settings, giving rise to a rapidly growing Do-It-Yourself Biology (DIYbio) community. DIYbio.org and the Synthetic Biology Project at the Woodrow Wilson Center this week are launching the "Ask a Biosafety Expert" service in order to provide this emerging DIYbio community with free and timely access to professional biosafety advice. The project comes amidst growing interest in and concerns about the DIYbio community. In recent years, the DIYbio movement has created new venues for the general public to learn, access and engage in biotechnology, with DIYbio groups and community laboratories forming in dozens of cities around the world. The movement attracts amateurs, entrepreneurs, citizen scientists, educators, hackers and the intellectually curious to participate in hands-on workshops, group projects and self-directed research activities. "The long-term success of the movement to make biotechnology more accessible will require a strong safety ethos, responsible practice and expert guidance and support resources," said Jason Bobe, co-founder of DIYbio.org. The aim of the "Ask a Biosafety Expert" service is to provide advice from experts about laboratory safety, disposal and other bio-related issues to members of the DIYbio community. Questions submitted anonymously to the DIYbio.org website will be sent to a panel of professional biosafety experts for prompt and user-friendly feedback. The responses will be posted and archived on the public website providing a growing resource for DIYbio enthusiasts. Questions can be asked and answers will be posted at: http://ask. DIYbio.org was founded in 2008 with the mission of establishing a vibrant, productive and safe community of do-it-yourself biologists. Central to the group's mission is the belief biotechnology and greater public understanding about it has the potential to benefit everyone. For more information, visit: http://www. About the Synthetic Biology Project The Synthetic Biology Project is an initiative of the Woodrow Wilson International Center for Scholars supported by a grant from the Alfred P. Sloan Foundation. The Project aims to foster informed public and policy discourse concerning the advancement of synthetic biology. For more information, visit: http://www. About The Wilson Center The Wilson Center provides a strictly nonpartisan space for the worlds of policymaking and scholarship to interact. By conducting relevant and timely research and promoting dialogue from all perspectives, it works to address the critical current and emerging challenges confronting the United States and the world. For more information, visit: http://www.
<urn:uuid:42cad63f-f4de-475f-8051-ab3c7276a778>
CC-MAIN-2014-52
http://www.eurekalert.org/pub_releases/2013-01/wwic-qab011713.php
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802772125.148/warc/CC-MAIN-20141217075252-00167-ip-10-231-17-201.ec2.internal.warc.gz
en
0.916373
557
2.796875
3
Because this decaying magnetic field argument so cogently points to a recent creation of the Earth, we can expect return fire from those on the other side. often comes in the form of muddied water, smoke screens, disinformation and other forms of confusion. Let common sense prevail - this idea is so common sense, we may tend to be shy. Don't be! The concept of Earth's decaying magnetic field matches so well our real world experiences. Humphreys notes tremendous energy is contained in Earth's magnetic field. And this energy amount is decreasing surprisingly rapidly. We are familiar with wind-up and battery powered toys from our childhood, and with power equipment of our adulthood's. Some great phenomenon is involved in powering earth's magnetic field -- it is very reasonable God got it going as good as was reasonable, and then let -- It has been running down ever since. Understandable! try to CONFUSE the issue by talking about magnetic field reversals. Humphreys includes this idea of reversals with regard to violent earth movements of Noah's Flood ONLY, but NOT otherwise. A ball dropped on a hard surface will bounce, repeatedly reversing motion until it runs out of energy and stops. After this, it WILL NOT, spontaneously start bouncing again. It has run out of energy. Yet, many suggest just this ridiculous idea concerning Earth's waining magnetic field. - where is the energy to come from, where is the boot, it would need to suddenly spring back to life, after it has run out of energy and stopped? By far the most reasonable and consistent with Biblical chronology is that God got it going real good at the beginning and let go -- and it has been decaying ever since. And by ever since, we understand it could not have been too long ago, even though the earth and its magnetic field Humphreys reasons 10,000 years max. who initially began researching and writing on the subject in 1971, thought about 8,000 years. figures are reasonable considering the Biblical chronology of about 6000 years.
<urn:uuid:d348daf9-ff63-4f82-b02a-60bac5b24bb9>
CC-MAIN-2023-40
http://user1883917.sites.myregisteredsite.com/id75.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00780.warc.gz
en
0.941902
467
2.609375
3
Colorado’s Front Range is the eastern most expression of the Rocky Mountains and is one of the features that make Colorado unique. The Front Range is a complex arrangement of meta-sedimentary and meta-volcanic rocks that have inspired geologists since the Hayden surveys of 1873 and 1877. The Front Range is studied today to help scientists test and understand concepts related to the Laramide Orogeny, which is the period of mountain building that started in the Late Cretaceous, the duration and cause of which are still in dispute. The Front Range is an economically important source of metals including gold, silver, uranium, molybdenum, and tungsten and industrial minerals such as clay and feldspar. Cripple Creek Area—Colorado’s largest gold discovery was in the Cripple Creek mining district in 1893. Nederland Mining Museum - the historical society maintains 2 museums historical records, mining equipment and memorabilia from the area
<urn:uuid:8b7e570a-aa66-49f2-8142-19c2b2f6a293>
CC-MAIN-2014-15
http://www.blm.gov/co/st/en/fo/rgfo/paleontology/front_range_uplift.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609524259.30/warc/CC-MAIN-20140416005204-00431-ip-10-147-4-33.ec2.internal.warc.gz
en
0.941218
200
3.484375
3
The OED defines the word ‘mudlark’ as ‘a person who scavenges in the river mud for objects of value’. The term was first used during the late 18th century to describe poor Londoners, adults and children, who searched the filthy and dangerous Thames mud at low tide in order to find things to sell. This might be anything from valuable historical artefacts that could be sold to antiquarians or more commonly fragments of copper, lead, nails, rope and pieces of coal. Pilfering from boats and barges also took place when the opportunity presented itself. Life was hard, short and miserable and these people did what they had to do to survive. Henry Mayhew, journalist, co-founder of the satirical ‘Punch’ magazine, playwright and advocate of social reform, published a series of newspaper articles in the ‘Morning Chronicle’ which in 1851 went on to become the basis of a book series called ‘London Labour and the London Poor.’ He wrote about mudlarks in vivid and graphic terms: ‘They may be seen of all ages, from mere childhood to positive decrepitude, crawling among the barges at the various wharfs along the river; it cannot be said that they are clad in rags, for they are scarcely half covered by the tattered indescribable things that serve them for clothing; their bodies are grimed with the foul soil of the river, and their torn garments stiffened up like boards with dirt of every possible description.’ Mayhew didn’t mince his words. Conditions for the early mudlarks were filthy, unhygienic and dangerous. Industrial waste and raw sewage would wash up on the foreshore at low tide together with all sorts of rubbish, and all too frequently the corpses of humans and dead animals. Financially, a mudlark rarely made much of a profit but at least they could keep what they earned from selling their finds. A mudlark was even a recognised occupation until the beginning of the 20th century. The 19th century was undoubtedly the Golden Age of mudlarking when the Victorians began major infrastructure building projects in London. They rebuilt London Bridge and constructed new embankments and sewage systems to cope with the needs of the huge increase of people living in the capital. Large numbers of important historical finds were made at this time by workmen and labourers working on the river and many of these treasures were sold to collectors only too eager to pay large sums of money for them. In the 20th century mudlarking increased again in popularity after the Second World War even though London was still recovering from massive bomb damage inflicted by the Luftwaffe and there were (and still are!) ever-present dangers of unexploded mines drifting up onto the foreshore at low tide. Vintage photos from the 1950s show gents in double-breasted suits, their trousers rolled-up to the knee, standing in the river on the City’s north bank searching for finds. In 1949, the archaeologist and writer Ivor Noël Hume began to explore the Thames Foreshore at Southwark and the north bank and wrote in evocative detail about the wonderful experience of treasure hunting in the centre of London. In 1956 he published his sadly now out of print book ‘Treasure In The Thames’ in which he wrote about the atmosphere of the river and the range of glorious items he’d discovered on his mudlarks – Iron Age, Roman and Medieval pottery fragments, old coins, jettons (tokens), 17th Century lead cloth seals, buttons, buckles, pins, clay pipes and Roman tiles. ‘Treasure In The Thames’ was the first book about the archaeology of the Thames in London and continues to remain an important resource for keen mudlarks. Today mudlarks are very different from the poor scavengers of the past. Thankfully the modern mudlark no longer has to search the Thames mud for a living and can enjoy the simple act of pottering about looking for fragments from past centuries. The modern mudlark is passionate about London’s history and archaeology and many are active participants in a wide range of online resources – Blogs, Instagram, Twitter and Facebook – sharing their films and photos and helping identify finds. They work closely with the Finds Liaison Officer at the Museum of London and the Portable Antiquities Scheme (PAS) where historically important discoveries are recorded. Mudlarks have found, and continue to find, numerous objects that have changed the way historians view the past eg the discovery of rare medieval toys, made from lead or pewter, has helped alter the perceptions of childhood during the Middle Ages. The quality of finds found by mudlarks is often excellent due to the anaerobic nature of Thames mud which is de-oxygenated,, therefore preservative. This means that items often come out of the mud in the same condition as when they were dropped by clumsy fingers all those centuries ago. The Golden Age of mudlarking has been and gone but there are still special things to be found hiding in that very special Thames mud that links us with the past and the lives of Londoners long since gone. Mudlarking is our heritage, our history, our city. The inter-tidal zone of the Thames Foreshore is the most unique archaeological site in the world and this literally makes it the people’s archaeology.
<urn:uuid:66bb21eb-3d17-4a54-b716-6b8c76bbe793>
CC-MAIN-2019-09
https://amudlarksdiary.com/2018/08/16/a-brief-history-of-mudlarking/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482478.14/warc/CC-MAIN-20190217192932-20190217214932-00307.warc.gz
en
0.970401
1,138
3.546875
4
Many students are recommended to volunteer during their time at university to upskill themselves, network and gain experience along their degree. However, the impact of volunteering can be far broader contributing to overall experience not to mention the impact on student mental health and wellbeing. Being a student can make you more susceptible and vulnerable to experiencing poor levels of mental health and well-being due to a mixture of age, life transitions. The majority of students are under 25 and around three-quarters of adults with a mental illness have their first episode before turning 25. Young students for the first time can find themselves away from home without the support systems they are used to along with financial pressures and stress related to workload and exams. Some of our current students `now also find themselves emerging from a period of isolation and for many are still studying online with fewer social interactions and opportunities to develop life skills. During the Covid-19 lockdown period 60% of students described their psychological health as poor or very poor. Could encouraging students to volunteer within their local community be one of the answer to help provide them with opportunities to connect, give purpose and broaden experiences and overall enhance their experience, mental health and wellbeing? Skills for life that help empower and give back to communities and society as a whole. Studies have found that through acts of service and supporting others can increase feelings of overall well-being. Linking with something we enjoy and brings us happiness which also impacts and helps those around us has also be linked to increased joy and satisfaction exposing individuals to more positive experiences and resulting in increased self-esteem and confidence and lower levels of stress. The sense of achievement through acts of service can also provide individuals with a new sense of purpose, motivation and drive to make a difference and create a healthier relationship with self. Creates a sense of belonging and increases connection Volunteering can expose us to meet new people with similar interests, make friends, network strengthening our connections to our community and creating an overall sense of belonging, whilst also boosting our social skills. Opportunities for all There is also overwhelming research to show the impact volunteering can have on an individual’s wellbeing but particularly on those that need it most such as those more vulnerable and at a higher risk of experiencing lower mental health and wellbeing such as older groups, people of low income or unemployed and those living with long term health conditions. Volunteering can provide a variety of roles and accessible through different means such as virtually or more physical hands-on roles opening doors to individuals from a range of communities and ages. Tips for getting involved: - Find something you enjoy and bring your skills and passion for an activity to others. Try this by looking at what activities you enjoy doing or areas of interest and look at your local community and see what opportunities are available. This is a great opportunity to do something you feel passionate about and would like to see more of in the world whether that’s supporting people get active, tackle loneliness or protecting nature. - Be mindful – Those that are driven to support others can be prone to neglect themselves and therefore prone to burnout. Start small in the amount of time you commit to ensure you can balance this with your other commitments to avoid over-doing it Volunteering can be a great way to develop skills, gain experience and network boosting our employability but there is also so much more we can gain from serving our community and others and that’s the relationship with ourselves and making a difference to the world around us.
<urn:uuid:1b68e797-664e-4d60-9491-1516320d2b43>
CC-MAIN-2022-40
https://northumbriasport.com/news/why-volunteer-1
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00714.warc.gz
en
0.966667
709
3.015625
3
Greg Christian is a sustainable food service consultant, chef, author and entrepreneur. His company, Beyond Green Sustainable Food Partners, is a food service and consulting company that promotes scratch-cooked foods, local sourcing and zero waste. Don’t miss an opportunity to hear his insights at the Master Speaker Series event during the upcoming Green Schools Conference and Expo in Philadelphia, Penn. This article was originally published on the Green Schools National Network blog. Read the original version. I recently did a three-day food waste study with the Environmental Protection Agency at a school district in Illinois. Here is what we found: 10-20 percent overproduction, 100 percent processed food, canned vegetables that were individually cupped, and food placed in warmers by 10:00 a.m. for lunch service at 12:00 p.m. It’s no wonder that students are tossing their lunches in the garbage can! If I could choose two things to focus on to change school food, they would be teaching the kitchen staff how to cook and about "just in time cooking." This enables them to serve fresh foods and make the right amount of food so there is no overproduction, resulting in food waste. Without this, none of the policies, standards, or laws will help us serve better food to our nation's children. There are many great intentions around moving school food to include tastier, fresh, local, sustainable meals, but it all starts with knowing how to cook from scratch. Scratch cooking is preparing meals using basic ingredients from a natural state rather than serving foods that have already been prepared or processed.
<urn:uuid:bdcdaae9-0765-4dc6-8540-727514eb758a>
CC-MAIN-2019-18
http://greenschoolsconference.org/steps-toward-sustainable-school-food
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578593360.66/warc/CC-MAIN-20190423054942-20190423080942-00135.warc.gz
en
0.962671
325
2.734375
3
You may find that your asthma gets better as you get older, but this is not always the case. If your asthma is mild it is more likely to get better. You may find... Treatments for Asthma If you have asthma there are some very safe and effective medicines that will help you to breathe more easily. Most asthma medicines come in a device called an inhaler. You can use an inhaler to breathe in your medicine so that it reaches your lungs quickly and starts to make them better. There are two main types of medicine used to make your asthma symptoms better - relievers and preventers. Everyone with asthma should have a reliever inhaler. When you get asthma symptoms a reliever inhaler (usually blue) will help to relax the muscles around your airways, making it easier to breathe again. You should keep your reliever inhaler with you all the time? Then you can take a puff whenever you have difficulty with your breathing. Preventer inhalers (usually brown or orange) help to soothe and calm the inflammation in your airways. Preventer medicine can help to make your airways less irritable. This means that you will be less likely to have difficulty breathing when you come into contact with an asthma trigger. If your doctor gives you a preventer inhaler you should take it regularly - even if you are feeling well. Although the preventer will make you feel better, it does not make your asthma go away altogether. So you will need to take your preventer regularly to keep your lungs healthy and strong. There are lots of different kinds of inhalers to choose from. It's important that you feel comfortable using your inhalers. If you're having difficulties, don't be afraid to ask your doctor or nurse to show you how to use them again, or, if that doesn't work, ask if you can try other kinds of inhaler. A spacer is a plastic container with a mouthpiece at one end and a hole for the aerosol inhaler at the other. When you press your inhaler the fine spray of medicine is trapped inside the spacer ready for you to breathe it in. Spacers are important because they help to deliver medicine straight to your lungs. Spacers only work with an aerosol inhaler and come in different shapes and sizes - if you have one of these your doctor or nurse will show you how it works.
<urn:uuid:d13737f6-c8e4-49f7-8b77-a3500b7931b1>
CC-MAIN-2020-40
http://kickasthma.org.uk/category/support
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400244231.61/warc/CC-MAIN-20200926134026-20200926164026-00752.warc.gz
en
0.950369
490
2.609375
3
Knobthorn. Brett Hilton-Batber Knob Thorn [Acacia nigrescens] It grows 5-18 m in height and is fire-resistant. The common names in English and Afrikaans refer to the very characteristic thorns, which are knobbed. The knobs, which are borne on the trunks and branches, are occasionally lacking in individual specimens. The leaves are double pinnately compound. The plants are deciduous and the trees are usually leafless for the duration of the winter and early spring. The leaf form is characteristic of this species. There are only 4 -6 leaflets per leaf and these are comparatively large with oblique (lopsided) bases. The rachis is recurved and bears small spines. New leaf growth is sometimes bright red. Flowers and Fruit Flowering is erratic and occurs between August and November. The scented flowers are borne in spikes about 100 mm long. In the bud stage the flowers are reddish-brown in colour, turning cream-white when fully open. The fruit is a pod about 100 mm long and 13-25 mm broad (the specific name 'nigrescens' means 'becoming black' and probably refers to the pods, which turn black as they ripen). They are eaten by Giraffe and other animals. Elephant eat the branches, leaves and shoots, Kudu browse the leaves and shoots and Giraffe, Monkey and Baboon eat the flowers. The trees are used by hole nesting bird species. The wood is hard and termite-resistant. It has been used to make posts and mine props. The species is drought-resistant but frost-tender. It also makes a good bonsai subject. It is a very hard timber which is very durable. It is not regularly used for furniture. It has exceptional impact toughness, thus good for Parquet flooring material. Where they are found This species has a wide distribution, occurring in the drier parts of southern Africa as far north as Tanzania, often on deep, sandy soils and commonly in widely-spaced stands. It is a familiar sight to visitors to the Kruger National Park. The knobbed thorns of the Acacia nigrescens are thought to be for protection against Elephants destroying the bark, and in fact in some areas where Elephants no longer occur the thorns do seem to have receded.
<urn:uuid:63d357a8-1b4c-4164-899d-11323975a574>
CC-MAIN-2017-09
http://www.krugerpark.co.za/africa_knob_thorn.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00218-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957165
499
3.21875
3
Photo: hojusaram (Flickr) Mom was right about eating your veggies. But what she didn’t know and what scientists have recently discovered is that it’s best to consume them at particular times. Veggie Insect Repellent When a vegetable is growing, it protects itself from insects by producing chemical nutrients that make it taste bad or seem repellant to predators. Some of these nutrients—in particular phytochemicals—have been shown to fight cancer in people. What’s more, many vegetables are able to anticipate when insects will attack, and will ramp up its defenses accordingly. Even after vegetables are harvested and they’re no longer fighting insects, these garden wonders can still be made to produce more nutrients at certain times. This is done by varying a vegetable’s light exposure to simulate the experience of night turning into day. Studies have shown that vegetables stored this way produce more phytochemicals during the light cycle. So eating vegetables during this golden period means you’re getting more nutritional value! It’s not yet clear how people might be able to activate these nutrition-packed properties at home. Perhaps simply storing veggies in the dark and then subjecting them to a flash of light is enough to trigger the process. Or it could be more complex. In any case, more research could help us find ways to maximize vegetables’ nutritional benefits. So watch out, veggies! Phytochemicals might stave off insects, but your defenses are powerless against humans.
<urn:uuid:d9d8d183-b35a-4822-9eb9-29dd64c8f934>
CC-MAIN-2014-15
http://indianapublicmedia.org/amomentofscience/timing-vegetables/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539776.45/warc/CC-MAIN-20140416005219-00366-ip-10-147-4-33.ec2.internal.warc.gz
en
0.951275
316
2.984375
3
Historically speaking, car bomb usage has been reserved for use by terrorists in civilian areas. A nondescript civilian vehicle filled with explosives would detonate at a target, causing deaths and wreaking havoc. While that statement partly stands today, there’s one place where car bomb usage has adapted and changed. Anyone who’s familiarized themselves with the ongoing conflict in Syria and Iraq is bound to have seen an Islamic State suicide car bomb. Used on the frontlines of an active war, these rolling bombs are outfitted with improvised armor plating of varying degrees and design in true Mad Max fashion. Last year alone, Islamic State (hereafter IS) claimed 815 suicide car bombs, the most ever used in a single year by a group. In order to find out how car bomb usage has changed and adapted throughout the years, I will explore the history of car bomb usage by IS and its predecessors, from the inception of the Iraq war in 2003 to the present day. I will also examine contemporary car bomb usage by IS through analysis of 18 months worth of official IS video releases. Furthermore, I will take a look at the ongoing battle of Mosul and the devastating car bomb tactics used by IS there. A car bomb, more accurately known as a VBIED (Vehicle-Borne Improvised Explosive Device) is basically any vehicle overhauled to function as a rolling IED, which is then driven to and detonated at a target. VBIEDs act as their own delivery mechanisms and can carry a relatively large amount of explosives, the only limiting factor being the size of the vehicle. The most common type of VBIED used in an insurgency is the traditional ‘covert’ VBIED, in which an unmodified civilian vehicle is either: (A) driven to and parked at the intended location, and then detonated either via a timer, remotely, or by a victim-triggered mechanism, or (B) driven up to the intended target by a suicide driver and then detonated by pressing a button, or via a dead man’s switch, which ensures detonation even if the driver is killed. This type of VBIED often includes redundant triggers to ensure a succesful detonation. (Note: I will refer to these as SVBIEDs (Suicide Vehicle-Borne IEDs) in order to avoid confusion) The parked VBIED typically functions as a larger type of static IED and can be brutally devastating, but this tactic often relies heavily on the enemy coming close to the VBIED instead of the other way around. It’s very common to park the VBIED at the target and slip away, but the addition of a suicide driver (SVBIED) allows the bomber to maximize the potential number of casualties by carefully choosing the optimal point of detonation without needing an escape route. Some of the most common types of explosives used in any VBIED include artillery shells, anti-tank mines, or large metal or plastic barrels/jugs packed with some form of easily accessible explosive (e.g. fertilizer-based ANFO or some other HME) – all wired together and connected to a detonator. They’re subsequently detonated using a wide variety of mechanisms, depending on the type of VBIED used. Upon detonation, VBIEDs create powerful blast/shockwaves, and produce vast amounts of shrapnel, as the disintegrating vehicle and objects nearby become fast-flying debris. The modern usage of the VBIED stems back to the 1980s in Lebanon and Sri Lanka, and it has since become the most powerful type of weapon readily available to an insurgent group. It’s dirt cheap, it doesn’t require an academic degree to put one together, and the necessary components (a vehicle, explosives, and wiring/detonator) can be procured with ease in armed conflicts and insurgencies where governments lack the ability to project control. During the Iraq war, the insurgents (including the predecessors to IS) were heavily outnumbered in terms of firepower. They were unable to mount large-scale offensives and also lacked the means to wage a sophisticated war. The insurgents had major strongholds in rural areas but also a large presence in many urban centers. Despite that, they were not strong enough to face their enemies in all out conventional battles, and were forced to resort to a campaign of guerrilla warfare. Some of the most common methods of attack included ambushes, ‘hit and run’ attacks, IEDs, kidnappings, decoy checkpoints, as well as targeted assassinations. However, one of the most devastating and widely employed tactics of the Iraqi insurgency were parked VBIEDs and SVBIEDs. The first recorded (S)VBIED attack in Iraq’s history happened only days after the US invasion, on March 22nd 2003. It would mark the beginning of a campaign of VBIED attacks across all of Iraq. Insurgents would regularly make use of unmodified civilian cars and trucks as ‘covert’ parked VBIEDs and SVBIEDs. Using these made sense as it allowed them to blend in with the civilian traffic and get as close as possible to the intended target without being discovered, taking advantage of the element of surprise. A very powerful side effect of the frequent usage of the ‘covert’ VBIEDs was that it turned every civilian vehicle into a potential car bomb in the eyes of civilians and US/Iraqi forces, undermining morale as well as causing fear and paranoia. The main difference between parked VBIEDs and ‘covert’ SVBIEDs (other than the fact that the latter involves a driver) is the way they are employed tactically on the battlefield. The absence of a driver in a parked VBIED means that its usage is very limited offensively speaking. It’s rarely used in active clashes as it is always static for as long as it takes the driver to leave the area after parking it. A routine bombing operation using a parked VBIED would include an individual driving the VBIED to and parking it at the desired target, and then leaving the area before it goes off. It works well against static and less guarded targets, but when it comes to mobile targets (convoys, patrols) it relies heavily on them approaching the VBIED, not the other way around. The act of parking and leaving the VBIED at the intended location also increases the likelihood of it being detected prematurely, as someone could raise suspicions. ‘Covert’ SVBIEDs on the other hand work well against all types of targets, but they’re especially effective against security targets. The addition of a driver means that they can choose the optimal point of detonation without having to worry about getting out of there alive. This also means that they can approach a sensitive target without raising much suspicion. Typical insurgent tactics when conducting SVBIED attacks on security targets would include a suicide bomber driving his vehicle to and crashing into US/Iraqi convoys or bases before detonating. Using larger truck-based SVBIEDs enabled the attackers to crash through the walls of a compound before detonating the bomb to increase the number of casualties. Sometimes multiple coordinated SVBIED attacks would strike the same target – the first one used to breach the perimeter, paving way for the second which would go for the main target. Used in conjunction with small insurgent units in a synchronized assault, it could be very effective. The simpler construction and execution of a parked VBIED operation meant that they were used many times more frequently than ‘covert’ SVBIEDs. In 2005 alone there were 873 reported parked VBIEDs, almost as many as there were confirmed SVBIED attacks during the entire Iraq War (886). Due to a variety of reasons there is no official tally of either type, but these numbers give an indication of the frequency of their usage. The major threat that VBIEDs posed to American outposts meant that extensive fortifications such as large concrete blast barriers and mazes of sand-filled Hesco walls were an absolute necessity. However, making security targets more difficult to strike would only drive insurgents to hit less protected targets. While the US and Iraqi militaries were obvious and logical targets, insurgents attacked civilians for more insidious reasons – to provoke revenge killings of Sunni civilians, thereby furthering Iraq’s descent into political violence. The large network of insurgent cells responsible for producing VBIEDs and SVBIEDs would prove difficult to completely eradicate. While sometimes based out of a car repair shop, VBIED workshops were spread out across all of Iraq, especially in the countryside surrounding urban centers. The high dependance on agriculture in rural areas meant that the availability of precursor materials for ANFO (ammonium nitrate fertilizer and diesel oil) was widespread. According to one captured member of a VBIED cell, it took him and the two others in his cell a meager two days to construct each VBIED – using stolen vehicles and a combination of plastic and homemade explosives. The trajectory of SVBIED attacks during the Iraq War follows a fairly straightforward path. Beginning in 2003, they increase steadily through 2005, drop off slightly in 2006, jump in 2007, and finally begin to fall off in 2008 and continue to drop through 2011. There are multiple reasons for the drop off toward the end of the war, including but not limited to: - The arming and funding of local tribes in order to fight against insurgents through the formation of The Awakening Councils in Anbar Province in 2006, - The American troop surge in 2007, as well as - The signing of the Status of Forces Agreement in late 2008 which set the final date for when American and coalition troops were to withdraw from the country. The US also dedicated immense resources and large numbers of soldiers, conducting repeated joint raids lead by US special forces in order to knock down the VBIED threat to a ‘manageable’ level. In the end, the insurgents (Islamic State of Iraq) were reduced to a shell of their former self. By the end of 2011, US and Iraqi forces had seriously degraded their capabilities, having killed 34 of the group’s 43 top leaders. The VBIED attacks never stopped completely, but it looked like Iraq was at least moving in the right direction. THE SHIFT TOWARDS PARITY After US forces left Iraq in late 2011, the reformed and relatively inexperienced Iraqi army was left in charge of protecting the country. In seizing the opportunity, IS launched new waves of parked VBIED & ‘covert’ SVBIED attacks against both civilian & security targets. Within six months of the US withdrawal they were once again operationally active in their traditional strongholds of Ninawa, Diyala, Anbar, Kirkuk, and Salahuddin. The attacks would continue to increase in numbers, with IS using 399 VBIEDs & SVBIEDs in 2012, and 807 in 2013. As their area of influence increased, so did the sanctuaries in which they were able to manufacture VBIEDs in relative safety. The inception of the Syrian Civil War in 2011 provided a huge opportunity for IS when they needed it the most. The deteriorating security situation in eastern Syria allowed IS to seize control of Syrian-Iraqi border regions in early 2013. IS fighters would enter Syria under the pretext of assisting the rebels in their fight against the Syrian government, while using the war-torn country as a staging area before making inroads into northern Iraq later the same year. Beginning in early 2014, IS started seizing control of large swathes of central Iraqi territory, before sweeping across western, central, and northern Iraq (even capturing Iraq’s second city, Mosul) – as well as taking control over large parts of northern and eastern Syria in the latter half of the same year. The takeover of this vast territory resulted in the capture of large amounts of military vehicles and equipment (tanks, armored vehicles, artillery pieces, ammunition, as well as other types of heavy and light military equipment). This acquisition of heavy military vehicles and equipment happened continuously as IS swept across Iraq and Syria, and would dramatically alter the battlefield conditions. IS seized a whopping 2300 US-made HMMWVs when capturing the city of Mosul alone. At its height, IS controlled a piece of territory larger than Great Britain. For a more detailed list of vehicles and equipment captured by IS in Iraq during this time period, see this article: The parity of arms would start to shift in IS favor as they began fielding tanks, armored vehicles and artillery batteries in combat as they captured more and more territory. With this, the style of fighting shifted away from sporadic insurgency-level clashes to a more semi-conventional type of combat. The only major difference between the two sides in terms of available types of firepower was the Iraqi/US air superiority, which IS counteracted through the use of SVBIEDs – succinctly referred to as “the poor man’s air force” by some due to its ability to deliver and detonate a large quantity of explosives at a specific target. Exposed to active and relatively fixed frontlines, the traditional ‘covert’ VBIEDs lost their element of surprise. Parked car bombs became worthless on the frontline, while the ‘covert’ SVBIEDs required modifications. The most important thing when constructing a VBIED has always been to ensure its survival up to the intended target, without it detonating prematurely. During the Iraq war, this was mostly done by masking them as civilian vehicles in order to avoid suspicion. As IS gained more and more territory, they were forced to rethink and adapt, as driving a ‘covert’ SVBIED straight towards an enemy that knew you were coming would dramatically lower its success rate over time. In order to protect their SVBIEDs from incoming fire up until the intended point of detonation, IS started welding steel plates as a form of improvised armor to the front of their SVBIEDs. During the Iraq war and up until IS started capturing large swathes of Syrian and Iraqi territory, parked VBIEDs were the most common type of VBIED used. ‘Covert’ SVBIEDs were also used extensively, but the nature of fighting a more well-equipped enemy as an insurgent force, as well as the easier construction of parked VBIEDs allowed IS and its predecessors to make greater use of this type of VBIED. Many people believe up-armored SVBIEDs are a new phenomenon, but that isn’t true. While the majority of VBIEDs used during the Iraq war were ‘covert’, insurgents would sometimes use up-armored SVBIEDs with steel plates welded to the front of the vehicles. At the time its usage was mostly limited to active frontlines around insurgent strongholds and areas that saw intense fighting. During and after the 2014 IS offensive that resulted in the capture of all this territory, IS started employing up-armored SVBIEDs again in even greater numbers. To this day, up-armored SVBIEDs are still the most common type of VBIED used by IS. This was a logical change in SVBIED tactics, necessitated by the increase in territorial control and the shift from insurgency-level clashes to a form of more semi-conventional combat. While up-armored SVBIEDs are now the norm, ‘covert’ SVBIEDs and parked VBIEDS are still used in areas where IS don’t hold territory and clashes are more in line with an insurgency. For example, IS conducted 28 parked car bomb attacks and 3 ‘covert’ SVBIED attacks in Baghdad during a 100 day period between October 3rd 2016-January 10th, 2017. This shows that the usage of up-armored SVBIEDs is closely related to the amount of territorial control and the intensity of fighting in a given area. ‘Covert’ VBIEDs and SVBIEDs are used in areas where IS don’t control territory, while up-armored SVBIEDs are exclusively used on active frontlines. This is true not only for the conflict(s) in Syria and Iraq, but can be applied to any conflict where a non-state actor using SVBIEDs gains territorial control. Libya is the only country outside of Syria and Iraq where IS have held a substantial amount of territory, and when IS fighters in Libya captured these territories, they too began using up-armored SVBIEDs due to the change in battlefield conditions. While up-armored civilian vehicles used as SVBIEDs became the norm, IS also began using military armored vehicles for the same purpose. Having captured thousands of military vehicles of different types in the 2014 offensive, they had quite a few to spare even after deploying many of them in their original roles. The built-in armor made them perfect for use as SVBIEDs in a more conventional fight. Captured US-made vehicles require regular maintenance in order to not constantly break down, a technical skill not in abundance among the ranks of IS. This, coupled with the fact that US-made military vehicles make for prime air strike targets meant that a swift conversion to SVBIED was very logical. One of the first documented cases of up-armored SVBIED usage by IS post-2011 took place in Syria, during the final joint IS & FSA assault on the besieged Menagh airbase on August 5, 2013. Several BMP-1s fitted with metal piping on the front and sides as improvised armor and packed with explosives were used to break through the last lines of defence, eventually leading to the complete capture of the base. During the rise of IS through 2013-14 and at its peak, the main application of up-armored SVBIEDs in active combat was its ability to initiate battles by softening static enemy defenses before a ground assault. IS even set up ‘Suicide Battalions’ that accompany other IS vehicle formations into battle, clearing the way before a final push. Seeing as IS operate at a numeric disadvantage most of the time, the usage of up-armored SVBIEDs in combat works as a powerful force multiplier, allowing a smaller attacking force the ability to overrun larger enemy contingents. Part of its effectiveness is that the force being targeted by an up-armored SVBIED only has a limited amount of time to cause a premature detonation of the vehicle until it becomes too dangerous. The improvised armor on the SVBIEDs makes it more difficult for the defenders to cause a premature detonation, and when they fail to do so they’re easily routed from their positions, and armored vehicles/equipment are commonly left behind. It’s important to note that in many cases, the success of an up-armored SVBIED in combat hinges on the enemy lacking proper training, equipment, as well as defensive structures. While most military forces would have a problem dealing with parked VBIEDs and ‘covert’ SVBIEDs, the success rate of up-armored SVBIED usage in combat would sink if used against an army that had the necessary training and equipment to combat it. Nonetheless, SVBIEDs are a powerful weapon and there’s no foolproof method of countering it. As IS momentum stalled and they began to lose territory, the use of up-armored SVBIEDs would turn defensive. IS begun sending out up-armored SVBIEDs in an attempt to disrupt and stall ongoing offensives by their enemies. The large number of SVBIEDs claimed by IS in 2016 (815) is primarily a result of this, as they basically gained no territory in offensives that year. However, whether employed in an offensive or defensive role on the battlefield, SVBIEDs are without a doubt the most important weapon used by IS, both tactically and strategically. Apart from the military value of detonating a multi-ton SVBIED, it’s also an extremely effective and demoralizing tactic against forces fighting IS, psychologically speaking. At the same time it also works as an energizing tool for IS fighters involved in attacks where SVBIEDs are used. When IS overran the remaining ISF positions in Ramadi in May 2015 and captured the entire city, close to 30 up-armored SVBIEDs were used in the offensive. In multiple instances the up-armored SVBIEDs were preceded by up-armored front-end loaders and bulldozers that removed concrete blast barriers in order to clear the way for the SVBIEDs. In one such case, an up-armored SVBIED based on a front-end loader barreled through two layers of concrete blast barriers protecting an ISF position, before detonating right on target. The up-armored SVBIED that came afterwards took the same route, and the subsequent detonation caused the 8-story building to collapse. This is a clear demonstration of the important function that heavy construction equipment can serve in conjunction with or in use as up-armored SVBIEDs, especially when attacking fortified targets. Both up-armored SVBIEDs used in the above attack took direct hits from RPG-7s fired by the defending ISF contingent, but the vehicles continued driving unimpeded. This is one of the main functions of the added improvised armor, as it theoretically allows the SVBIED drivers to choose the optimal point of detonation themselves, even when under direct enemy fire. The addition of improvised armor is not a guarantee that it’ll work every time, but it substantially increases the chances of an SVBIED being able to reach its target. While the improvised armor used by IS on their SVBIEDs in the past has not been very uniform in terms of design or quality, they’ve borrowed some techniques from mainstream armored vehicle manufacturers. These can be divided into two main types: Sloped and slat armor. Sloped armor consists of steel plates welded to the front of the vehicle at an angle and works by increasing the effective thickness facing frontal impacts. For example, a 100mm thick armor sloped at 45 degrees becomes 141mm of effective armor. The angled armor plating also functions by being able to ricochet incoming rifle and machine gun fire of varying calibers instead of absorbing the force head on, and can even deflect AT munitions if lucky enough. When a projectile hits sloped armor, its path might be curved, causing it to move through more armor – or it might bounce off entirely. Slat armor generally takes the form of a metal grid or bars, and is typically fitted over the improvised armor plating with some spacing. If an AT munition is fired at the vehicle, slat armor can provide a slightly increased stand-off distance between the explosion and the vehicle, negatively impacting the munition’s penetration capabilities. Both sloped and slat armor can also cause AT munitions to fail and not detonate at all. While the improvised armor’s main purpose is to protect the engine, wheels, the driver, as well as any other essential parts, it also serves as a protective barrier for the payload. There are a variety of different containers used to store the HME that often make up the payload of SVBIEDs. Usually a number of barrels/jugs made out of plastic or metal are filled with HME and wired together. Used individually they can act as smaller IEDs, but wired together and connected to a detonation mechanism they serve as payload in the VBIEDs. In more rare cases anti-tank mines, artillery shells, and other types of heavy munitions are used. Up-armored SVBIEDs are currently being built on an industrial scale. IS claimed to have conducted 815 SVBIED operations in 2016 alone, the overwhelming majority up-armored. This is the highest number of SVBIED operations conducted in a year by any group, ever. In order to sustain a campaign the size of this, IS operates a massive network of VBIED workshops that manufacture up-armored SVBIEDs on a scale not seen before. By capturing large swathes of Syrian and Iraqi territory, IS gained a relative safe haven out of which these workshops are based. Though not safe from aerial attacks, the widespread availability of both vehicles, explosives, and steel plating for use as improvised armor ensures that IS will be able to churn out up-armored SVBIEDs for as long as they are allowed ‘free’ movement and have access to an abundance of VBIED workshops out of which these weapons are manufactured. In order to gauge what type of up-armored SVBIEDs are most commonly used nowadays, I looked through and analyzed 18 months worth of IS provincial-level video releases from Syria and Iraq, published between July 1, 2015 – January 1, 2017. Not every SVBIED used on the battlefield is featured in IS photo reports, and even less so in videos. However, looking at the videos gives a lot more context and is not as much of an overwhelming task as it would be to catalogue every single photo report released in the same time period. During this time period (July 1st, 2015-January 1st, 2017), there were 245 VBIEDs of different types included in IS videos. There were more visible detonations than there were sightings of actual vehicles, so I chose to only include the ones where I was able to visually confirm the vehicles in this analysis. IS claimed 815 SVBIEDs in 2016 alone (several times the number I found in IS videos during a 6 month longer time period), but analyzing the dataset should yield a semi-representative sample of SVBIED usage during this time period. Out of the 245 VBIEDs featured, 178 (72,7%) were from Iraqi provinces, while 67 (27,3%) were from Syrian provinces. This was expected, as the majority of fighting in the past 18 months has taken place in Iraq as part of the ISF’s current objective of pushing IS out of the country. That also includes the ongoing battle of Mosul, which I will touch on later. I have divided up the VBIEDs into three main categories (civilian vehicles, military vehicles, and heavy construction vehicles) which will further be divided into 11 subcategories. I will present them below, ranging from the largest to the smallest category. If you’re interested in viewing all the pictures I collected in the data set for each type, I will list the complete albums at the bottom of the article in the source section. Keep in mind that the dates on the photos featured in this section indicate when the video it was featured in was released, not when the VBIED was used. Out of all 245 VBIEDs featured in IS videos during this time period, 200 (81,6%) were based on civilian vehicles. In order to clarify, I will further divide this category into five sub-categories: 4×4 vehicles, medium and heavy trucks, SUVs, ‘covert’ SVBIEDs, and remote-controlled VBIEDs. 4×4 vehicles – 84 (34,3%) 4×4 vehicles were the most common type of SVBIED used during the time period, with 84 (34,3%) being of this type. It’s a fairly simple design, with improvised frontal and side armor based on steel plates. Sometimes the frontal armor is sloped, with an added layer of slat armor. Armor is usually also added in front of the wheels, in order to protect them from incoming rounds. Narrow slats to the frontal armor provide air intake for the engine so as to prevent overheating. Typically a small window is left in the frontal armor so the driver can see where he’s going. There are several reasons why 4×4 trucks have become so popular for use as up-armored SVBIEDs. Mobility (four-wheel drive) and good off-road capability means that it’s not limited to a single target type. The spacious trunk also allows for a sizable payload to be carried, relative to the size of the vehicle. The above examples vary in design with no real continuity from one vehicle to the next, but there was however one design that popped up continuously: All of the above SVBIEDs seem to have received the same type of body modifications with very little variation from one vehicle to the next. They’re typically black or tan in color, they have sloped and slat armor installed, headlights on the front, engine vents, as well as wheel protection. It’s noticeable because these up-armored SVBIEDs have mostly appeared in Salahuddin, Ninawa, and Dijlah provinces in northern Iraq, with one appearance each in Kirkuk and Anbar provinces. All of these IS provinces are connected via borders. An interesting part is that the logo on this type of ‘special’ SVBIED was blurred out every time it was featured in a video. One example of this type of SVBIED was captured by Liwa Ali al-Akhbar in Salahuddin province in late 2015, displaying the logo in full: Seeing as it was captured in Salahuddin province, that would suggest that these ‘special’ SVBIEDs are mass-produced centrally in VBIED workshops in Ninawa province (most likely Mosul city) and then shipped out for use locally and in the surrounding provinces. Blurring the logo would be logical for operational security reasons. It makes sense that IS would have centralized VBIED workshops in Ninawa province. The infrastructure and resources that came with capturing Mosul has allowed IS to manufacture especially well-made improvised armor kits and armored vehicle modifications there. It’s also resulted in more standardized SVBIED designs, as well as the ability to supplement SVBIED operations in the surrounding provinces. Medium & heavy trucks – 65 (26,5%) 65 (26,5%) of all SVBIEDs in the data set were some form of truck. I’ve included cargo trucks, dump trucks, flatbed trucks, as well as tanker trucks in this category so as to not dilute the article. These up-armored SVBIEDs have no real uniformity in terms of design, apart from the improvised frontal armor. Some include a heavy use of slat armor, some of them have sloped frontal armor, and there’s even an example with sand bags in between the slat armor and steel plating in the front. Truck-based SVBIEDs are naturally more powerful than your average 4×4 vehicle, seeing as they can carry a lot more explosives. They’re bigger targets than a standard civilian vehicle, but the larger frame and improvised armor can also provide more protection against incoming enemy fire. This type of SVBIED is usually reserved for use against high-value targets that require an above average quantity of explosives in order to neutralize. While they were featured in videos during this time period at a rate almost as high as standard 4×4 vehicles (65 and 84 respectively), this is probably more due to the fact that an up-armored SVBIED based on a heavy truck looks better on camera than a 4×4 vehicle. There’s no reason to believe truck-based SVBIEDs are being manufactured on a scale similar to 4×4 vehicles, as the latter is a much more resource-friendly construction. Outside of this data set and on the heavier end of the spectrum, IS have also overhauled and employed some ridiculously massive constructions, namely mining haul trucks. While these monstrosities look quite intimidating, they are rarely used and aren’t the most efficient type of SVBIED. The slow speed and size of the vehicle means that its success relies mostly on the defenders not being able to prematurely detonate it, or escape their positions in time. The large payload it can carry also means that IS would have to fill it almost to the brink with ordnance in order to make using one worthwhile, as a larger truck is similarly also able to carry a multi-ton payload. SUVs – 38 (15,5%) SUVs accounted for 38 (15,5%) of all up-armored SVBIEDs used during this time period. I have included jeeps and other civilian vehicles with four doors in this category. Traditionally speaking, SUVs have not been used as up-armored SVBIEDs to any great extent. There have been cases in Iraq as well as Syria throughout the years, but not any type of widespread usage. This changed dramatically in late 2016. Since the inception of the ISF offensive aimed at retaking Mosul from IS, up-armored SVBIEDs based on SUVs have mainly been used. This is a peculiar phenomenon, seeing as they have been used not only in Mosul city in Ninawa province, but also in the adjacent IS provinces affected by the ISF offensive (Jazirah to the west and Dijlah to the southeast). There is no real difference in terms of the improvised armor used on SUVs compared to 4×4 vehicles, with minimal differences between the two in terms of carrying capacity. One reason for using SUVs as opposed to 4×4 vehicles could be that SUVs offer a contained space for the payload, but the stopping power of the “armor” on the car is next to non-existent. While the SUV-based up-armored SVBIEDs vary in design a bit, there are a few that look almost identical in design. The armor on these is on par with the armor used on the black and tan up-armored 4×4 SVBIEDs. These ‘special’ SUVs were used exclusively in Ninawa, Dijlah, and Jazirah provinces – Overlapping the same areas where the ‘special’ 4×4 vehicles were used. This again suggests they were produced centrally in Ninawa and shipped out for use in the surrounding provinces. In one of the more recent IS video releases about the fighting in Mosul city, I spotted a curious phenomenon. On some of the up-armored SVBIEDs based on SUVs, IS had mounted part of the payload on the inside of the driver and passenger doors. This may have been an attempt to either direct the explosive charge outwards to the sides, as well as utilizing all available space within the vehicle for an increased payload. The design feature was spotted on at least two separate SVBIEDs, but it’s unclear whether its usage is widespread. ‘COVERT’ SVBIEDS – 12 (4,9%) There were 12 cases (4,9%) of ‘covert’ SVBIEDs used during this time period, all of which were some type of 4×4 vehicle or truck. As I mentioned earlier, ‘covert’ SVBIEDs are as a rule of thumb never used in active clashes. This is true for the ones featured in this data set too. Nowadays, ‘covert’ SVBIEDs are used mainly for two reasons: - Targeting enemy behind the lines: Most ‘covert’ SVBIEDs were used to target the enemy in areas where IS hold little to no territory. With no active frontline, ‘covert’ SVBIEDs are a necessity in order to be able to get close enough to the intended target without them discovering the SVBIED prematurely. - Initiating a surprise offensive: 3 of the ‘covert’ SVBIEDs featured were driven into the Syrian loyalist-held town of al-Qaryatayn on August 5, 2015, where they all detonated before IS fighters stormed the city. While this tactic is bound to cause civilian casualties, it’s an effective way of infiltrating enemy lines and causing havoc before a ground assault. Remote-controlled VBIEDs – 1 (0,4%) During this time period, there was only 1 (0,4%) remote-controlled VBIED featured. While there have been repeated alarms of IS increasing capabilities in regards to remote-controlled VBIEDs, there is no reason to believe that the threat level is substantial at all. The technical requirements for manufacturing a remote-controlled VBIED (while not extremely difficult) means that it’s nowhere near efficient enough to mass-produce them. Driving a vehicle remotely also lowers both the accuracy and success rate of the VBIED compared to versions that include a suicide driver. There is no shortage of people willing to blow themselves up either, with some inside IS even complaining about ‘nepotistic waiting lists’ for SVBIED operations. Out of the 245 VBIEDs featured, 41 (16,7%) were based on military vehicles. The built-in armor functions as protection for the payload, with the occasional improvised armor on top serving as extra protection. Generally speaking, military vehicles are used to hit more well-protected targets. The often tracked vehicles have an excellent off-road capability, and are designed to be able to withstand a hit. In this category I have broken down the SVBIEDs into two subcategories: American and Russian-made military vehicles: AMERICAN MILITARY VEHICLES – 27 (11%) In this subcategory there were two types of vehicles retrofitted as SVBIEDs: HMMWVs and M113 variants. HMMWV – 17 (6,9%) The HMMWV (High Mobility Multipurpose Wheeled Vehicle) is a four-wheel drive military light truck, operated by the Iraqi Army. During this time period it was used 17 (6,9%) times as an SVBIED, and in all but one of the cases (94% of the time) in Iraq. When IS captures military vehicles, they’re almost exclusively used locally in the areas where they were captured in. Transporting them across wide stretches of desert between Syrian and Iraqi provinces is not tenable as it would subject them to an increased risk of being targeted in an airstrike. Some of the vehicles have received improvised armor plating to reinforce the light armor built in to the vehicle. M113 VARIANTS – 10 (4,1%) The M113 is a tracked armored personnel carrier, also operated by the Iraqi Army. Variants of it were featured 10 (4,1%) times in the data set. All of them were used in Iraqi provinces, for the same reason as the HMMWV. Most were M113A3s or M113A2s, but there was also an M1064A3 mortar carrier variant and an up-armored M548 cargo carrier variant featured. The vehicles have a light built in armor, and some of them were fitted with improvised armor plating as well as slat armor. RUSSIAN MILITARY VEHICLES – 14 (5,7%) In this subcategory there were two types of vehicles retrofitted as SVBIEDs: Various types of armored personnel carriers, and main battle tanks. ARMORED PERSONNEL CARRIERS – 12 (4,9%) 12 (4,9%) of all SVBIEDs featured in the data set were some form of Russian-made armored personnel carrier. In line with the American-made military vehicles, the Russian-made ones were also used locally. Out of the 12 used, 9 (75%) were used in Syrian provinces while 3 (25%) were used in Iraqi provinces. This also makes sense, seeing as both the Syrian and Iraqi armies operate Russian military vehicles, although the Iraqis only to a lesser extent. The vehicles used included the BMP-1 (9), an MT-LB auxiliary armored tracked vehicle, a BTR-50, as well as a BTR-80UP amphibious armored personnel carrier. While most were used without the addition of improvised armor, some were fitted with armor plating, as well as slat armor. These vehicles were mostly used to hit well-defended targets. For example, 3 of them were used in Deir ez-Zor, a besieged loyalist enclave in the Syrian desert that has proven particularly difficult to overrun. One of the SVBIEDs in this category was also pictured in an photo report from early December, 2016. The fact that the vehicle was used in the northern Aleppo countryside is interesting, as the logo on the BMP-1 is a standard mark on any vehicle overhauled by the IS armor workshop in Raqqah. A series of BMP-1 armored personnel carries turned into SVBIEDs bear this mark, this one numbered as ‘225’. On February 12, 2017, another example of this type of SVBIED was used. As part of their continuing defensive operations in the northern Aleppo countryside around al-Bab, an IS SVBIED based on a BMP-1 was used against a Turkish/FSA position near the town of ‘Bzaah’. This one was numbered as ‘235’. Just as in northern Iraq, this could be a sign of centralized manufacturing of VBIEDs in a population center (Raqqah) where resources and capabilities are more in abundance than in the surrounding provinces. The continuing usage of ‘Raqqah-made’ BMP-1 SVBIEDs in northern Aleppo is a good indication of this fact. While BMP-1s were only featured 9 times in this data set, they are used a tad more frequently in actuality. Most of the BMP-1s turned into SVBIEDs had the turrets removed. It’d be a waste to keep them in place unless you had someone manning it at the same as the SVBIED was employed. After being removed from the BMP-1 hull, these turrets are normally fitted on the back of a 4×4 vehicle, producing a heavier variant of the well-known technical. MAIN BATTLE TANKS – 2 (0,8%) Main battle tanks (MBTs) were used very sparsely, with only 2 (0,8%) featured in the entire data set. The reason for this is that MBTs are far more important on the battlefield in their original roles than when used as an SVBIED. In both cases the turrets were removed, either because of damage or wanting to salvage a piece of working military equipment for later use. Doing so also lowers the profile of the vehicles. Both were used in Syria (Deir ez-Zor) and were of the T-55 variety. The first ever SVBIED based on a T-72 tank was employed by IS near al-Seen airbase in southern Syria in early February 2017, but failed to detonate its payload. It too had its turret removed. HEAVY CONSTRUCTION VEHICLES Heavy construction vehicles used as SVBIEDs were featured only 4 (1,6%) times. Half of them were used in Syrian provinces and the other half in Iraqi provinces. They were an equal mix of up-armored bulldozers and front-end loaders. The primary function these vehicles have on the battlefield compared to any other type of SVBIED is their ability to remove roadblocks in the form of either concrete blast barriers or dirt berms. It’s important to note that most of the time up-armored heavy construction vehicles that haven’t been converted into SVBIEDs are used for this purpose and then pulled back before an up-armored SVBIED is sent in. The conversion of heavy construction vehicles into heavily armored SVBIEDs allows them to break through complex enemy fortifications and subsequently detonate a sizable payload on target without having to withdraw and wait for the actual SVBIED to arrive. I have mentioned it earlier in the article, but the usage of heavy construction vehicles as SVBIEDs is an incredibly powerful tool used to clear the way and strike the enemy where a normal up-armored SVBIED wouldn’t be able to. Most of the time, this type of vehicle is used in an urban environment. 2-MAN SVBIEDS (DUAL OPERATIONS) One of the newer and more interesting phenomenon in regards to SVBIED usage is the emergence of 2-man SVBIEDs (or ‘dual operations’). These up-armored SVBIEDs are special in that they include a driver as well as a gunner on top of the vehicle. The addition of a gunner is meant to increase the survivability of the SVBIED up until the desired point of detonation, with the gunner suppressing the enemy using his machine gun. This type was used exclusively in Iraqi provinces, the scene of the majority of intense fighting during the last 18 months. Out of all the 245 SVBIEDs analyzed in this data set, 7 (2,9%) were 2-man SVBIEDs. Out of the 815 claimed SVBIEDs by IS in 2016, 18 (2,2%) were dual operations. This is approximately the same as the number of 2-man SVBIEDs featured in the data set, percentage-wise. A variety of different vehicles were used in dual operations, but most commonly military vehicles. The vehicles featured included an up-armored SUV, an up-armored heavy truck, an MT-LB with frontal armor, a HMMWV, two M113 variants, as well as a BMP-1 armored personnel carrier. 2-man SVBIEDs are used very sparsely, but when used they are employed against targets that are considered especially difficult. The massive amount of SVBIEDs used by IS against the ISF has allowed the ISF to learn and improve techniques in regards to how to deal with the SVBIED threat under the new battlefield conditions. The addition of a gunner on 2-man SVBIEDs is meant to negate that effect and allow the driver to choose the optimal point of detonation himself. The fact that dual operations are being used at all is not necessarily an indication that IS fighting force hasn’t diminished, because it has. However, there will always be more than enough people willing to take the easy route to ‘jannah’ (heaven) by embarking on an SVBIED operation. The importance of SVBIEDs for IS military capabilities means that dedicating 2 fighters to a single SVBIED when it increases the likelihood of it succeeding isn’t a substantial loss of manpower. HANDICAPPED SUICIDE BOMBERS Another interesting phenomenon is that IS have been using handicapped fighters as SVBIED drivers. I noticed 3 cases in the data set, and decided to include a fourth from the battle of Mosul. Half of the handicapped drivers were using crutches to walk, while the other two were paraplegic and wheelchair-bound. The driver from Mosul had even lost his legs in combat. Most of them were probably able to carry out the attacks without any modifications to the standard design of an up-armored SVBIED, but the driver with no legs must’ve received a pretty heavily modified vehicle in order to allow him to drive it himself. Alternatively it could have been remotely driven, but that’s unlikely. If one were to modify a vehicle to allow it to be driven without the use of ones legs it’d make more sense to give the controls to the driver who has a better look at when the optimal detonation point is, compared to someone driving it remotely. There is no reason to believe they were being forced into conducting a suicide attack, as doing so requires signing up on a waiting list. Throughout the data set, civilian vehicles were featured the most frequently, with 200 out of 245 VBIEDs being of this type. Whether up-armored 4×4 vehicles or heavy trucks, they’re simple designs that work great. The prominent use of nearly identical ‘special’ types of both 4×4 vehicles and SUVs in Northern Iraqi provinces indicate the existence of VBIED workshops that manufacture these centrally in Ninawa (Mosul) and later ship them out for usage locally as well as in the surrounding provinces. ‘Covert’ SVBIEDs were featured 12 times, but consistently followed the rule of only being used in areas with little territorial control and (rarely) as a surprise attack before a ground assault. While there was one example of a remote-controlled VBIED, there is no widespread usage and it doesn’t work remotely as well as versions that include a driver. Captured military vehicles are used as SVBIEDs primarily in a local role with little movement across the Syrian-Iraqi border. American-made vehicles are used mostly in Iraqi provinces, while Russian-made vehicles are used mostly in Syrian provinces. Main battle tanks were featured only 2 times, mainly because they serve a much more important function in their original role than as SVBIEDs. Heavy construction vehicles are used to remove roadblocks in the form of concrete blast barriers or dirt berms and can clear the way for follow-up SVBIEDs as well as strike a target where a normal up-armored SVBIED wouldn’t be able to. The usage of up-armored BMP-1 SVBIEDs in Northern Aleppo that were overhauled in Raqqah is also an indication of the same type of centralized VBIED manufacturing in Syria that can be seen in Northern Iraq. IS resource availability and manufacturing capabilities naturally gravitate towards larger urban population centers under its control, allowing VBIED workshops in its largest cities in Syria (Raqqah) and Iraq (Mosul) to supplement SVBIED operations in surrounding provinces. The emergence of 2-man SVBIEDs (or ‘dual operations’) in Iraq with a driver and a gunner is an indication of improved ISF defences against SVBIEDs and the new techniques IS are using to try to negate that. With the ISF receiving more and more training as well as experience, dual operations are bound to continue. THE BATTLE OF MOSUL The Iraqi military operation aimed at re-capturing Mosul begun on October 16, 2016. The ISF have now completely captured the eastern side of the city, and a pause in large-scale fighting has been established until the offensive to take the western part is initiated. In this section I will analyze IS tactical usage of SVBIEDs in Mosul city so far. The battle of Mosul has seen the most prolific usage ever of SVBIEDs by IS in a single prolonged battle, ever. 100 days into the Mosul offensive, IS had employed 280 suicide bombings (the vast majority SVBIEDs) in a concerted attempt to slow down the attacking force and cause as much damage as possible. Vehicles used as SVBIEDs during the battle of Mosul so far include 4×4 vehicles, heavy trucks, and at least one example of an up-armored front-end loader. However, the most common type has been the up-armored SUV. I’ve included some examples in the slideshow below: Most of the SUVs converted into SVBIEDs have been white Kias of similar models, as if IS had seized all the vehicles in a car dealership within the city. The improvised armor on these SVBIEDs has also been fairly consistent, indicating mass-production. Seeing as Mosul itself has been home to the largest VBIED workshops in Iraq, these were most likely manufactured locally. Most of the time the added armor is painted in the same color as the vehicle, disregarding the sometimes counterintuitive colors like blue and red. This may have been attempts at fooling ISF contingents into believing the vehicle wasn’t an SVBIED, although it’s unclear how successful it may have been. SVBIEDs have always been the most dangerous threat faced by the ISF, but the threat has been amplified by tough street fighting in dense neighborhoods in Mosul. Large-scale urban fighting typically favors an irregular defending force the likes of IS, and makes it difficult for the attacking force (ISF) to defend against SVBIED attacks. When fighting in open areas (e.g. the Nineveh plains), it’s relatively “easy” to defend against SVBIED attacks. The SVBIEDs often have to drive across open areas that don’t offer any cover, and that gives the ISF time to fire at it in the hopes of achieving a premature detonation. In Mosul, Iraqi forces are a lot more vulnerable and have continuously been caught by surprise in devastating attacks. SVBIEDs often appear out of nowhere from around a corner that was ‘cleared’ just minutes before. ISF contingents are often only given a clear line of sight down a single street, and the sprawling networks of intersecting roads has made it difficult for the ISF to maintain a coherent perimeter defense. IS has also made extensive use of commercial quad-copter drones in Mosul. In addition to conducting reconnaissance, IS have started using them to guide SVBIEDs to the target in real time. Using drones, they are able to give instructions by radio and follow the suicide driver’s progress on live video feed. Drone footage used to be a semi-rare feature in IS video releases. When the fighting approached Mosul’s outskirts however, the amount of drone footage used in official videos increased dramatically. In the last 4 IS video releases from Mosul city, there have been at least 40 cases of successful SVBIED attacks filmed by drones. This is more than twice the number of total SVBIEDs filmed by IS drones up until the battle of Mosul. Iraqi forces also employ quad-copter drones in a surveillance role, but it’s a lot easier for IS to locate ISF positions than the other way around. The large ISF convoys stand out like a sore thumb, while IS fighters are often able to blend into the maze-like surroundings. A typical ISF advance inside the city has consisted of columns of HMMWVs, supported by M1 Abrams tanks and/or armored personnel carriers pushing into contested areas, then setting up a temporary base in a civilian compound after clearing out the IS militants present in the area. Seeing as the civilian neighborhoods in Mosul offer basically no protection against an SVBIED attack, the ISF has resorted to hot-wiring civilian vehicles and placing them in the middle of the roads surrounding their bases as a form of improvised roadblocks. In theory it should work fairly well, but drone footage released by IS has shown that SVBIEDs often drive around the cars, push them aside, or take alternative routes. In the SVBIED attack pictured below, the driver simply took a different path before crashing into the ISF vehicles and detonating. IS have also started employing treacherous tactics that are hard to combat. In some cases, ISF contingents advancing into a contested neighborhood in Mosul have been hit by an SVBIED attack seemingly out of nowhere. IS has made it a point to park ‘covert’ SVBIEDs in the garages of civilian houses. When an Iraqi convoy approaches, the suicide driver starts the vehicle and rolls right into the convoy. This ingenious trap relies heavily on the element of surprise as well as IS predicting the enemy’s advances, and hiding the ‘covert’ SVBIEDs in the attacking forces’ way. Advancing ISF contingents have no way of controlling every single vehicle parked in driveways/garages while advancing up a street. This tactic allows IS the ability to harass Iraqi forces on another level, as it turns every garage, compound, and driveway into a potential SVBIED threat. A consistent lack of situational awareness among Iraqi forces has allowed IS to utilize SVBIEDs with great success. While urban fighting makes it more difficult to maintain a coherent perimeter defense, Iraqi forces should remain extremely vigilant. Constant lookouts from elevated positions or continuous drone surveillance in urban environments are imperative in order to prevent disastrous SVBIED attacks in the future. A heavier deployment of Anti-Tank Guided Missiles (ATGMs) should also be a top priority. These powerful weapons are very effective at stopping SVBIEDs, and could be the difference between disaster and success if set up on continuous perimeter watch at an improvised base. The ISF are not on par with a western army, but the military operation of recapturing Mosul city is a massive and complex undertaking. The elite Golden Division has lead the majority of ISF advances in Mosul, bearing the brunt of casualties sustained during the operation. Some of the Golden Division’s battalions have suffered casualty rates as high as 50%, a highly unsustainable number. With western Mosul still under IS control, it remains to be seen how that part of the battle will develop once initiated. Just as in the eastern parts, IS are bound to employ the tactic of heavy SVBIED usage in coordination with drones, utilizing the favorable urban setting to strike the ISF where they are the most vulnerable. After capturing eastern Mosul, Iraqi forces have discovered many signs of an extensive network of VBIED workshops in the city that were used to fuel the IS war machine. Apart from the industrial areas, IS also converted the Grand Mosque of Mosul into a VBIED workshop. It’s a logical place for a VBIED workshop, as the religious symbolism lowers the risk of it being targeted in an air strike. The spools of wiring and the sheets of metal found are both indicators, but the car doors are perhaps the biggest clue. When overhauling a civilian vehicle into an SVBIED (particularly SUVs), the driver and passenger doors are usually removed. A door with multiple locking mechanisms is then typically added to the improvised armor, allowing the driver to get in the SVBIED without climbing through a hole in the rooftop. Iraqi forces also discovered a variety of IED components in a raid after securing eastern Mosul. One type of item that stood out was the most common detonation mechanism used in an SVBIED nowadays. SVBIEDs constructed by IS usually don’t employ standardized detonation mechanisms, with some going as far as using half a dozen redundancies of different sorts. However, there has been an increasing phenomenon of standardized detonation mechanisms as of late, particularly in Mosul and in the surrounding provinces. The detonation mechanisms that were captured here include a safety that needs to be pressed before the firing switch is activated, so as to prevent an accidental premature detonation. The detonation mechanism that can be seen fitted on the inside of an SVBIED is slightly different as it consists of two sets of safeties and firing switches. Each set of safety and firing switch is connected to a separate firing circuit, for a good reason. The second set of buttons act as a fail-safe in case the wiring on the first set is faulty. The thought behind this design is to maximize the chances of the SVBIED being used successfully. This is in line with what I’ve talked about earlier. Every component and design feature of an SVBIED, whether it’s ‘covert’ or up-armored, is thought-out in order to make the chances of it being successfully used as high as possible. From the semi-standardized improvised armor and multiple redundancies on up-armored SVBIEDs to the unmodified nature of ‘covert’ SVBIEDs and the often clean-shaven drivers – Each type of SVBIED is thought out to the smallest detail with one thing in mind: Get it to where it needs to detonate. The VBIED is not something that anyone is ever going to be able to eliminate from the battlefield, and IS have mastered the art of its usage. VBIEDs are the most central and core tenet in their philosophy of war, and has allowed them to project a military power far more sizable than their actual military force. There’s a variety different types of VBIEDs that all serve their own inherent purposes. SVBIEDs are an extremely cost-efficient weapon, and the massive amount of SVBIEDs used by IS (815 in in Syria/Iraq in 2016 alone) has necessitated a vast network of VBIED workshops that continuously work to overhaul vehicles. Larger workshops gravitate toward the bigger cities under their control (Raqqah in Syria and Mosul in Iraq) and are tasked with supplementing VBIED capabilities in surrounding provinces, outside of manufacturing VBIEDs for local use. The ability to adapt its construction and employment throughout the years with regard to changing types of combat also shows that the SVBIED is an extremely versatile and adaptable weapon of war. As I have shown earlier, the usage of each type of VBIED is very closely related to the amount of territorial control and the intensity of fighting in a given area. For example, the usage of parked VBIEDs and ‘covert’ SVBIEDs is mostly limited to areas where IS have little territorial control – while up-armored SVBIEDs are exclusively used in areas where IS have territorial control. This doesn’t mean either is limited to a specific time period, as up-armored SVBIEDs were used in small numbers during the Iraq war, and parked VBIEDs and ‘covert’ SVBIEDs are still used today. As this stage of the anti-IS fight continues, up-armored SVBIEDs will continue to be used in great numbers, peaking when the battles for Raqqah city and the western side of Mosul are initiated. As anti-IS forces take over more and more of their territory, the VBIED manufacturing capabilities of IS will eventually be diminished. As IS are once again pushed out of their traditional strongholds, VBIED workshops will shift toward manufacturing more parked VBIEDs and ‘covert’ SVBIEDs for use in the areas it just lost. Once IS loses the overwhelming majority of their territorial control and the frontlines fade away, VBIEDs will become ‘covert’ en masse once again. There is no real reason to believe that defeating IS ‘militarily’ (i.e. denying them territorial control) will defeat the group in a final sense. The current anti-IS campaign has been too focused on re-capturing territory quickly that was lost to IS in 2014 than it has been in using the right forces to do so. IS were able to resurrect after the intense campaign against them in the late stages of the Iraq war, and they will most likely be able to come back in some shape or form after this campaign too. The one thing that’s clear is that the VBIEDs will continue to detonate. ”Iraq: Suicide Bombings as Tactical Means of Asymmetric Warfare”, Nicole Stracke (2007) ”Cutting The Fuse: The Explosion of Global Suicide Terrorism and How to stop it”, Robert A. Pape & James K. Feldman (2010) “Hearing on the President’s budget for foreign affairs – The Senate Committee on Foreign Affairs”, page 25 (February 15, 2006) – https://books.google.se/books?id=eDQ0yEMAHTYC&dq=president%27s+budget+for+foreign+affairs:+hearing&hl=sv&source=gbs_navlinks_s “The Suicide Attack Database”, The Chicago Project on Security and Terrorism (CPOST) – http://cpostdata.uchicago.edu/search_new.php “The Endgame: The Inside Story Of The Struggle For Iraq, From George W. Bush to Barack Obama” (Michael R. Gordon & General Bernard E. Trainor) – https://books.google.se/books?id=EZvlCQAAQBAJ&dq=%22the+greatest+benefits+of+the+outposts+were+to+show+that+american+troops+were+recommitting%22&hl=sv&source=gbs_navlinks_s “The Devastating Islamic State Suicide Strategy”, The Soufan Group (2015) – http://soufangroup.com/tsg-intelbrief-the-devastating-islamic-state-suicide-strategy/ “Car Bomb Trends in Iraq 2012-2014”, Musings on Iraq (2014) – http://musingsoniraq.blogspot.se/2014/10/car-bomb-trends-in-iraq-2012-2014.html “ISIS captured 2,300 Humvee armoured vehicles from Iraqi forces in Mosul”, The Guardian (2015) – https://www.theguardian.com/world/2015/jun/01/isis-captured-2300-humvee-armoured-vehicles-from-iraqi-forces-in-mosul “The rise of Isis: Terror group now controls an area the size of Britain, expert claims”, The Independent (2014) – http://www.independent.co.uk/news/world/middle-east/the-rise-of-isis-terror-group-now-controls-an-area-the-size-of-britain-expert-claims-9710198.html “Car Bombs: ‘The poor man’s air force'”, Chicago Tribune (2007) – http://articles.chicagotribune.com/2007-05-02/features/0705010569_1_car-bombs-truck-bomb-cars-or-trucks “Baghdad attacks over 100 days”, Amaq agency infographic (January 18, 2017) “Syria rebels ‘capture key Aleppo airbase'”, BBC news (2013) – http://www.bbc.com/news/world-middle-east-23585886 “The Islamic State going DIY, Inside a DIY offensive”, Oryx Blog (2016) – http://spioenkop.blogspot.se/2016/04/the-islamic-state-going-diy-inside-diy.html “Islamic State development & employment of SVBIEDs”, Armament Research Services (2016) – http://armamentresearch.com/islamic-state-development-employment-of-svbieds/ “Want to Be an Islamic State Suicide Bomber? Get in Line”, Foreign Policy (2015) – http://foreignpolicy.com/2015/05/21/want-to-be-an-islamic-state-suicide-bomber-get-in-line/ “No end in sight: Failed Tabqa offensive reveals underlying shortcomings of regime forces”, Oryx Blog (2016) – http://spioenkop.blogspot.se/2016/06/no-end-in-sight-failed-tabqa-offensive.html “100 Days of the Mosul campaign”, Amaq agency infographic (January 26, 2017) – https://twitter.com/charliewinter/status/826410612498505729 “Islamic State turns to drones to direct suicide car bombers”, AP (2017) – http://bigstory.ap.org/article/4b36e6f9ed814880ab56a1763060759d/using-drones-other-innovating-tactics-deadly-effect “Iraq’s Golden Division may liberate Mosul, but at what cost?”, Rudaw (2016) – http://www.rudaw.net/english/middleeast/iraq/24122016 “Various IED components seized during a security forces raid in Mosul, Iraq”, Twitter user @JanusThe2 (2017) – https://twitter.com/JanusThe2/status/828137183689179136 Note: for the analysis section, all screenshots were taken from Jihadology.net – Big thanks to Aaron Zelin for making this source material available for researchers. Figure 1: http://www.cffjac.org/go/jac/?LinkServID=A71D24BE-1CC4-C201-3EAFCB814A9CC78D Figure 3: https://www.youtube.com/watch?v=StmzbQdWVoQ Figure 4: https://www.youtube.com/watch?v=Ywu8eloJ3JI Figure 5: http://cpostdata.uchicago.edu/search_new.php Figure 6: https://www.youtube.com/watch?v=EyY1Bgst07U Figure 7: https://www.jihadology.net Figure 8: https://www.jihadology.net Figure 9: https://www.jihadology.net Figure 10: https://www.youtube.com/watch?v=-Brxuu99zOk Figure 11: http://theglobalcoalition.org/daesh_territory_dec_2016/ Figure 12: https://www.jihadology.net Figure 13: https://www.twitter.com Figure 14: Original content Figure 15: https://www.youtube.com/watch?v=vCWzgO8Yut8 Haul truck SVBIED images: https://www.youtube.com/watch?v=jWjA-eGnO9w & http://spioenkop.blogspot.se/2015/08/the-islamic-state-going-diy-from_21.html Figure 16: https://www.jihadology.net Figure 17: https://www.jihadology.net Figure 18: Islamic State photo report Figure 19: Islamic State photo report Figure 20: https://twitter.com/oryxspioenkop/status/830109950613536768 Figure 21: Amaq infographic Figure 22: https://en.wikipedia.org/wiki/Battle_of_Mosul_(2016%E2%80%9317)#/media/File:Battle_of_Mosul_(2016%E2%80%932017).svg FIgure 23: https://mobile.nytimes.com/2017/01/18/world/middleeast/iraq-mosul-isis.html FIgure 24: https://www.youtube.com/watch?v=5woZG9fQtqo Figure 25: https://www.channel4.com/news/inside-the-battle-for-mosul Figure 26: https://www.jihadology.net Mosul’s Grand Mosque turned into VBIED factory: https://www.youtube.com/watch?v=LuKCorwbWfQ SVBIED detonation mechanisms: https://www.jihadology.net & https://twitter.com/JanusThe2/status/828137183689179136 Complete data sets for each analysis section
<urn:uuid:e3a33930-6106-42c9-828f-2397989485e0>
CC-MAIN-2017-17
https://zaytunarjuwani.wordpress.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121165.73/warc/CC-MAIN-20170423031201-00310-ip-10-145-167-34.ec2.internal.warc.gz
en
0.95421
15,033
2.6875
3
This Discovering Just The Right Word lesson plan also includes: - Join to access all included materials Learners improve their writing style by strengthening word choice at the word and sentence level by adding adverbs, precise verbs, and specific nouns. After a lecture/demo, students practice a new style of writing focusing on word choice. 7 Views 14 Downloads
<urn:uuid:d05c2abc-75bc-4e07-84c4-3e0547b23f4a>
CC-MAIN-2018-51
https://www.lessonplanet.com/teachers/discovering-just-the-right-word
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829568.86/warc/CC-MAIN-20181218184418-20181218210418-00395.warc.gz
en
0.927113
74
3.625
4
Do you think you can tell the difference between your Porites compressa and Porites lobata? If your answer is yes then guess again. New research from Zac Forsman and his research crew looked at genetic markers to see how coral morphology was related to coral taxonomy in Porites. What Zac et al. found was that although many corals can look quite distinct when looking at the coral colony’s overall shape, coral morphology is not a reliable indicator of what defines a coral species. Even when corals are examined very closely at the microscopic level, coral shape is so plastic that the way a coral looks is simply not enough to tell what species it is. So the next time you see that know it all who has a specific latin name for every coral they see, you go right ahead and tell ’em that since scientists are uncertain about what really constitutes a coral species, there’s no way to tell for certain what the species of many given corals. Unless we’re talking about Bazooka Joes and Gorilla Nipples, even a child could tell you the Dr. Seuss names of aquarium corals. For more on this story visit the abstract of the paper.
<urn:uuid:317339f9-c27a-4d14-8c79-1bf152663131>
CC-MAIN-2016-44
https://reefbuilders.com/2009/03/24/jack-coral-identification/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00309-ip-10-171-6-4.ec2.internal.warc.gz
en
0.960988
246
3.6875
4
This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations . (August 2011) (Learn how and when to remove this template message) The wolfpack was a mass-attack tactic against convoys used by German U-boats of the Kriegsmarine during the Battle of the Atlantic. A convoy is a group of vehicles, typically motor vehicles or ships, traveling together for mutual support and protection. Often, a convoy is organized with armed defensive support. It may also be used in a non-military sense, for example when driving through remote areas. Arriving at the scene of a major emergency with a well-ordered unit and intact command structure can be another motivation. U-boat is an anglicised version of the German word U-Boot[ˈuːboːt]( The Kriegsmarine was the navy of Nazi Germany from 1935 to 1945. It superseded the Imperial German Navy of the German Empire (1871–1918) and the inter-war Reichsmarine (1919–1935) of the Weimar Republic. The Kriegsmarine was one of three official branches, along with the Heer (Army) and the Luftwaffe of the Wehrmacht, the German armed forces from 1933 to 1945. Karl Dönitz called his strategy of submarine warfare Rudeltaktik, which translates as "tactics of a pack" of animals. It has become known in English as "wolfpack", an accurate metaphor, but not a literal translation. Karl Dönitz was a German admiral who played a major role in the naval history of World War II. Dönitz briefly succeeded Adolf Hitler as the head of state of Nazi Germany. Pack is a social group of conspecific canids. Not all species of canids form packs; for example, small canids like the red fox do not. Pack size and social behaviour within packs varies across species. U-boat movements were controlled by the Befehlshaber der Unterseeboote (BdU; English translation: "Commander of Submarines") much more closely than American submarines, which were given tremendous independence once on patrol. Accordingly, U-boats usually patrolled separately, often strung out in co-ordinated lines across likely convoy routes (usually merchants and small vulnerable destroyers), only being ordered to congregate after one located a convoy and alerted the BdU, so a Rudel consisted of as many U-boats as could reach the scene of the attack. With the exception of the orders given by the BdU, U-Boat commanders could attack as they saw fit. Often the U-Boat commanders were given a probable number of U-Boats that would show up, and then when they were in contact with the convoy, make call signs to see how many had arrived. If their number were sufficiently high compared to the expected threat of the escorts, they would attack. Although the wolfpacks proved a serious threat to Allied shipping, the Allies developed countermeasures to turn the U-boat organization against itself. Most notably was the fact that wolfpacks required extensive radio communication to coordinate the attacks. This left the U-boats vulnerable to a device called the High Frequency Direction Finder (HF/DF or "Huff-Duff"), which allowed Allied naval forces to determine the location of the enemy boats transmitting and attack them. Also, effective air cover, both long-range planes with radar, and escort carriers and blimps, allowed U-boats to be spotted as they shadowed a convoy (waiting for the cover of night to attack). Radio is the technology of using radio waves to carry information, such as sound and images, by systematically modulating properties of electromagnetic energy waves transmitted through space, such as their amplitude, frequency, phase, or pulse width. When radio waves strike an electrical conductor, the oscillating fields induce an alternating current in the conductor. The information in the waves can be extracted and transformed back into its original form. The escort carrier or escort aircraft carrier, also called a "jeep carrier" or "baby flattop" in the United States Navy (USN) or "Woolworth Carrier" by the Royal Navy, was a small and slow type of aircraft carrier used by the Royal Navy, the United States Navy, the Imperial Japanese Navy and Imperial Japanese Army Air Force in World War II. They were typically half the length and a third the displacement of larger fleet carriers. While they were slower, carried fewer planes and were less well armed and armored, escort carriers were cheaper and could be built quickly, which was their principal advantage. Escort carriers could be completed in greater numbers as a stop-gap when fleet carriers were scarce. However, the lack of protection made escort carriers particularly vulnerable and several were sunk with great loss of life. The light carrier was a similar concept to escort carriers in most respects, but were capable of higher speeds to allow operation alongside fleet carriers. A blimp, or non-rigid airship, is an airship (dirigible) or barrage balloon without an internal structural framework or a keel. Unlike semi-rigid and rigid airships, blimps rely on the pressure of the lifting gas inside the envelope and the strength of the envelope itself to maintain their shape. American wolfpacks, officially called coordinated attack groups, usually comprised three boats that patrolled in close company and organized before they left port under the command of the senior captain of the three. "Swede" Momsen devised the tactics and led the first American wolfpack – composed of Cero (SS-225), Shad (SS-235), and Grayback (SS-208) – from Midway on 1 October 1943. Charles Bowers Momsen, nicknamed "Swede", was born in Flushing, New York. He was an American pioneer in submarine rescue for the United States Navy, and he invented the underwater escape device later called the "Momsen lung", for which he received the Navy Distinguished Service Medal in 1929. In May 1939, Momsen directed the rescue of the crew of Squalus (SS-192). USS Cero (SS-225), a Gato-class submarine, was the first submarine and second ship of the United States Navy to be named for the cero. USS Shad (SS-235), a Gato-class submarine, was the first submarine and second vessel of the United States Navy to be named for the shad, a fish of the herring family, common along coasts of the United States. Wolfpacks fell out of use during the Cold War; modern submarines have far better weapons and underwater speed than those of World War II, so there is no need for them to operate in large groups. Instead, the United States Navy deploys its attack submarines on individual patrols, with the exception of one or (rarely) two attack submarines in each carrier strike group. The Cold War was a period of geopolitical tension between the Soviet Union with its satellite states, and the United States with its allies after World War II. A common historiography of the conflict begins with 1946, the year U.S. diplomat George F. Kennan's "Long Telegram" from Moscow cemented a U.S. foreign policy of containment of Soviet expansionism threatening strategically vital regions, and ending between the Revolutions of 1989 and the 1991 collapse of the USSR, which ended communism in Eastern Europe. The term "cold" is used because there was no large-scale fighting directly between the two sides, but they each supported major regional conflicts known as proxy wars. World War II, also known as the Second World War, was a global war that lasted from 1939 to 1945. The vast majority of the world's countries—including all the great powers—eventually formed two opposing military alliances: the Allies and the Axis. A state of total war emerged, directly involving more than 100 million people from over 30 countries. The major participants threw their entire economic, industrial, and scientific capabilities behind the war effort, blurring the distinction between civilian and military resources. World War II was the deadliest conflict in human history, marked by 50 to 85 million fatalities, most of whom were civilians in the Soviet Union and China. It included massacres, the genocide of the Holocaust, strategic bombing, premeditated death from starvation and disease, and the only use of nuclear weapons in war. The United States Navy (USN) is the naval warfare service branch of the United States Armed Forces and one of the seven uniformed services of the United States. It is the largest and most capable navy in the world and it has been estimated that in terms of tonnage of its active battle fleet alone, it is larger than the next 13 navies combined, which includes 11 U.S. allies or partner nations. with the highest combined battle fleet tonnage and the world's largest aircraft carrier fleet, with eleven in service, and two new carriers under construction. With 319,421 personnel on active duty and 99,616 in the Ready Reserve, the Navy is the third largest of the service branches. It has 282 deployable combat vessels and more than 3,700 operational aircraft as of March 2018, making it the second largest and second most powerful air force in the world. American ballistic missile submarines have always operated alone, while Soviet ballistic missile submarines operated in well-protected bastions. With the opening shots of the Iraq War in March, 2003, the term "wolfpack" was brought back into use to describe the fleet of American and British nuclear submarines which operated together in the Red Sea, firing Tomahawk missiles at Iraqi targets. USS Providence was the first boat to fire its entire load of missiles and earn the nickname "Big Dog of the Red Sea Wolf Pack." Recently the phrase "wolfpack" has been applied to possible Iranian missile boat tactics in the event of a hypothetical clash with the U.S. Navy; a massive attack of small boats armed with missiles and torpedoes on a single ship, or even a few ships, in order to overrun or saturate the Aegis defense system. Such attacks allow the possibility of effective sacrificial boat deployment. The Battle of the Atlantic was the longest continuous military campaign in World War II, running from 1939 to the defeat of Nazi Germany in 1945, and was a major part of the Naval history of World War II. At its core was the Allied naval blockade of Germany, announced the day after the declaration of war, and Germany's subsequent counter-blockade. It was at its height from mid-1940 through to the end of 1943. German submarine U-238 was a Type VIIC U-boat of Nazi Germany's Kriegsmarine built for service in the Second World War. She was laid down on 21 April 1942, by Germaniawerft of Kiel as yard number 668, launched on 7 January 1943 and commissioned on 20 February, with Oberleutnant zur See Horst Hepp in command. Hepp commanded her for her entire career, receiving promotion to Kapitänleutnant in the process. Submarine warfare is one of the four divisions of underwater warfare, the others being anti-submarine warfare, mine warfare and mine countermeasures. USS Piper (SS/AGSS-409), a Balao-class submarine, was a ship of the United States Navy named after the piper. USS Queenfish (SS/AGSS-393), a Balao-class submarine, was the first ship of the United States Navy to be named for the queenfish, a small food fish found off the Pacific coast of North America. Anti-submarine warfare is a branch of underwater warfare that uses surface warships, aircraft, or other submarines to find, track, and deter, damage, or destroy enemy submarines. The development of the steam ironclad firing explosive shells in the mid 19th century rendered sailing ship tactics obsolete. New tactics were developed for the big-gun Dreadnought battleships. The mine, torpedo, submarine and aircraft posed new threats, each of which had to be countered, leading to tactical developments such as anti-submarine warfare and the use of dazzle camouflage. By the end of the steam age, aircraft carriers had replaced battleships as the principal unit of the fleet. The battle around convoys HX 229 and SC 122 occurred during March 1943 in the Battle of the Atlantic, and was the largest convoy battle of World War II. British merchant shipping was formed into convoys for protection against German submarine attack. Kriegsmarine tactics against convoys employed multiple-submarine wolfpack tactics in nearly simultaneous surface attacks at night. Patrolling aircraft restricted the ability of submarines to converge on convoys during daylight. The North Atlantic winters offered the longest periods of darkness to conceal surfaced submarine operations. The winter of 1942–43 saw the largest number of submarines deployed to the mid-Atlantic before comprehensive anti-submarine aircraft patrols could be extended into that area. HX 79 was an Allied North Atlantic convoy of the HX series which ran during the Battle of the Atlantic in World War II. HG 76 was an Allied convoy of the HG series during World War II. It was notable in seeing the destruction of five German U-boats and two Focke-Wulf Condor long-range reconnaissance aircraft by Martlet fighters flying from the escort carrier HMS Audacity, for the loss of Audacity, a destroyer and two merchant ships. It was regarded as the first big convoy victory for the Allies in the Battle of the Atlantic. ONS 18 and ON 202 were North Atlantic convoys of the ONS/ON series which ran during the battle of the Atlantic in World War II. They were the subject of a major U-boat attack in September 1943, the first battle in the Kriegsmarine's autumn offensive, following the withdrawal from the North Atlantic route after Black May. SC 143 was a North Atlantic convoy of the SC series which ran during the battle of the Atlantic in World War II. It was the second battle in the Kriegsmarine's autumn offensive in the North Atlantic. German submarine U-564 was a Type VIIC U-boat built for Nazi Germany's Kriegsmarine for service during the Second World War. The RAF sank her in the Bay of Biscay on 14 June 1943. ON 207 was a North Atlantic convoy of the ONS/ON series which ran during the Battle of the Atlantic in World War II. It was the subject of a major U-boat attack in October 1943, the fourth battle in the German autumn offensive. SC 26 was a North Atlantic convoy of the SC series which ran during the battle of the Atlantic in World War II. Borkum was a wolf pack of German U-boats that operated during the battle of the Atlantic in World War II. Hartmann’s wolfpack was a formation of Nazi Germany's Kriegsmarine in World War II, a "wolfpack" of U-boats that operated during the early stages of the Battle of the Atlantic. Rösing's wolfpack was a formation of Nazi Germany's Kriegsmarine in World War II, a "wolfpack" of U-boats that operated during the early stages of the Battle of the Atlantic. HG 84 was an Allied convoy of the HG series during World War II.
<urn:uuid:ae5bb880-a2c8-4cab-9607-1d4e503aa4e5>
CC-MAIN-2019-13
https://wikimili.com/en/Wolfpack_(naval_tactic)
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203755.18/warc/CC-MAIN-20190325051359-20190325073359-00137.warc.gz
en
0.968347
3,178
3.953125
4
Health clinics within our Epicentre communities are providing essential vaccinations to protect children against life-threatening diseases that are entirely preventable. Without vaccination, tens of thousands of children die every year from diseases like malaria, pneumonia, diphtheria, meningitis, whooping cough and more. In Benin alone, approximately 30,000 children die every year from diseases that could have been prevented through vaccination, access to medical care and proper nutrition. Village leaders, like Fatimah, visit surrounding communities to talk to families about the importance of visiting health clinics when their children and family members fall ill. She says – ‘Not many people believe they will find quality care so close time home. Most people wait, hoping their medical complaints will disappear, or until they are very ill. When that happens, they are often beyond our help. This is really sad.’ The first 1,000 days of a child’s life are critical in determining their long-term health. When they are vaccinated, treated for malnutrition, diarrhoea and dehydration, they not only survive, they are given the chance to grow into strong, healthy members of their community. Developing awareness around the importance of vaccinations and disease prevention is integral to saving lives and developing self-reliant communities free from hunger. As village leaders like Fatimah spread the word, more and more people come to visit the centres and receive medical treatment. As they witness the positive benefits of vaccination and medical screening, their mindset toward health care changes and they develop a vision for a future free from disease and hunger.
<urn:uuid:12b07e57-4520-43b0-aaab-2e37c9f5eeb4>
CC-MAIN-2022-40
https://thp.org.au/health-care-vaccination-preventing-deadly-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00110.warc.gz
en
0.963294
325
2.9375
3
Assistive technology in Sweden Assistive devices are products designed for people with disabilities. Assistive technology can also refer to methods and new technology. Approximately every fifth Swede has a disability, and about half of these individuals use assistive devices. Assistive devices are funded by tax revenues. Assistive device provision is regulated by the Swedish Health and Medical Services Act (HSL). Prescriptions and management of assistive devices, which are generally medical device products, are regulated by instructions from the National Board of Health and Welfare and the Medical Products Agency. Instructions on quality management systems, for example, must also be adhered to by actors in the field of assistive technology. Assistive devices can: - prevent future loss of function or ability - improve or preserve function or ability - compensate for deteriorated or lost function or ability to cope with daily life. For many years, the Swedish Institute of Assistive Technology has focused on assistive technology that can support persons with cognitive, neuropsychiatric and psychiatric disabilities in their daily life. It has been ascertained that with appropriate support, many people can experience a more secure and independent life and more easily participate in society.
<urn:uuid:d280f798-6d48-44ff-a248-de996bd239c4>
CC-MAIN-2017-47
http://www.mfd.se/other-languages/english/assistive-technology-in-sweden/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805541.30/warc/CC-MAIN-20171119095916-20171119115916-00700.warc.gz
en
0.971352
244
3.09375
3
Whitesloanea crassa (N. E. Br.) Chiov. Caralluma crassa (basionym), Drakebrockmania crassa Whitesloanea crassa is a small, unusual, succulent plant up to up to 5 inches (13 cm), with mostly solitary, compact, 4-angled stem. Inflorescences are produced in vertical rows along the ribs near the base of stem at ground level, often along every angle, from a short deciduous fleshy peduncle. The flowers are bell-shaped to deeply funnel-shaped, showy, cream to light yellow, dotted with dark red-brown, up to 0.8 inch (2 cm) long and up to 1.2 inch (3 cm) in diameter. USDA hardiness zone 10a to 11b: from 30 °F (−1.1 °C) to 50 °F (+10 °C). How to Grow and Care Stapeliads are relatively easy to grow. They should be treated as an outdoor plant as they will easily rot indoors and cannot flower without exposure to outdoor temperature fluctuations. They should be grown under cover so that watering can be controlled. They require a reasonable amount of sunlight to promote flowering and maintain a well shaped plant. Very shady positions will produce very poor flowering. Stapeliads come from climates where they survive extremely high temperatures in the summer months so most growth is in spring and autumn, with flowering in autumn when the weather starts to cool down. In growing season, water in moderation when needed, making sure soil is fairly dried out between waterings. Do not water between November 1 and March 1. The easiest and best way to propagate Stapeliads is from stem cuttings which can be taken virtually throughout the year. Seed is also a method of propagation… – See more at: How to Grow and Care for Stapeliads Native to northern Somalia. - Back to genus Whitesloanea - Succulentopedia: Browse succulents by Scientific Name, Common Name, Genus, Family, USDA Hardiness Zone, Origin, or cacti by Genus Subscribe to Receive News and Updates from World of Succulents:
<urn:uuid:7b3ca3c3-5499-4447-8e32-2470615d49c1>
CC-MAIN-2019-35
https://worldofsucculents.com/whitesloanea-crassa/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330968.54/warc/CC-MAIN-20190826042816-20190826064816-00523.warc.gz
en
0.929084
465
2.921875
3
This next topic addresses a concept called first order and second order problem solving. This concept is a very important one and was described very well by Anita Tucker and colleague. And in the reference that's on your screen, I encourage you to pull that reference and take a close look at it. It's Why Hospitals Don't Learn From Failures is the title, and I think you'll find it very. Purpose of study: Mathematics is a creative and highly inter-connected discipline that has been developed over centuries, providing the solution to some of history's most intriguing problems.It is essential to everyday life, critical to science, technology and engineering, and necessary for financial literacy and most forms of employment.Science Questions and Answers from Chegg. Science can be a difficult subject for many students, but luckily we’re here to help. Our science question and answer board features hundreds of science experts waiting to provide answers to your questions. You can ask any science question and get expert answers in as little as two hours. And unlike your professor’s office we don’t have limited.The Problem-Solving Process. In order to effectively manage and run a successful organization, leadership must guide their employees and develop problem-solving techniques. Finding a suitable solution for issues can be accomplished by following the basic four-step problem-solving process and methodology outlined below. Step: Characteristics: 1. Define the problem: Differentiate fact from. The Steps to Solving Daily Life Problems Step 1: Is there a problem? As a first step, it is important to realize that there is a problem. Because problems can cause anxiety, many people will try to avoid, ignore, or procrastinate when dealing with difficult issues in their lives. Unfortunately, avoiding your problems usually causes the problems to come back and a small problem can become a big. Well, from the previous video, for a first order reaction, the half-life is equal to .693 divided by your rate constant k. So the rate constant for this reaction was 6.7 times 10 to the negative four. So the half-life is equal to .693 divided by 6.7 times 10 to the negative four. And this was one over seconds. So we can do that on our calculator to solve for the half-life. So we have .693. The Requirements for Solving Life’s Problems. Now that you have a very clear understanding of what problems are all about; what does it really take to solve life’s problems? Let’s discuss that within this section by exploring the mindset and the approach you need in order to effectively handle the endless array of problems that life throws your way. The Curious Mind. The key to solving. Anyone can learn for free on OpenLearn but creating an account lets you set up a personal learning profile which tracks your course progress and gives you access to Statements of Participation and digital badges you earn along the way. Sign-up now! Sign-up now for free. Course content Course content. Collaborative problem solving for community safety. This free course is available to start. In order to be effective at problem solving you are likely to need some other key skills, which include: Creativity. Problems are usually solved either intuitively or systematically. Intuition is used when no new knowledge is needed - you know enough to be able to make a quick decision and solve the problem, or you use common sense or experience to solve the problem. More complex problems or. If you had trouble solving that problem, you're not alone. Most people get stuck on thinking about this problem in a two-dimensional way. This act of getting stuck is called fixation. The answer, though, requires you to think about the problem in three dimensions. You need to create a triangle pyramid with the six matches in order to form four equilateral triangles. If you did solve that. Every human being should possess problem solving skills in order to reach one's desired goals in life. Problem solving skills become even more important when sustainable solutions are desperately needed to cope with twin problems of growing scarcity of resources and increasing populations. Practical problem solving skills, with clear economically viable, timely and implementable solutions are. This selection of 5 resources is a mixture of problem-solving tasks, open-ended tasks, games and puzzles designed to develop students' understanding and application of mathematics. Thinking for Ourselves: These activities, from the Association of Teachers of Mathematics (ATM) publication 'Thinking for Ourselves’, provide a variety of contexts in which students are encouraged to think for. Basic Arithmetic - Problem Solving on Brilliant, the largest community of math and science problem solvers. Problem solving Computers can be used to help solve complex problems using computational thinking. This means that before a problem can be tackled, it must first have been through decomposition. An Introduction to Computer Science and Problem Solving What is in This Chapter ? This first chapter explains what computer science is all about. It will help you understand that the goal of a computer scientist is to solve problems using computers. You will see how problems are formulated by means of algorithms and how the process of abstraction can be used to break problems down to easily. And yet, working backwards is the way many real-life problems are often resolved. As a simple example, suppose you had to pick up your child from football practice at exactly 5:00 p.m. At what time should you leave? Well, let us say it take 30 minutes to get to the ballpark. We would better leave a 5-minute safety valve. Okay, then we need to leave 35 minutes earlier, or not later than 4:25 p. Complex problem-solving competency (2012) Besides student performance in mathematics, reading and science, the 2012 PISA study also examined the competency of 15-year-olds in the domain of complex problem-solving. Complex problem-solving competency is defined as the capacity to engage in cognitive processing to understand and resolve problem situations where a method of solution is not. TIP: Solving the difficult problems in life is hard work, so make sure to reward yourself afterward for a job well done. Here is a helpful resource for more information on problem solving: Solving Life’s Problems: A 5-Step Guide to Enhanced Well-Being by A.M. Nezu, C.M. Nezu, and T.J. D’Zurilla.
<urn:uuid:914e5d6e-5101-46c7-b175-ff6ffd72e7f7>
CC-MAIN-2021-31
http://banjobrazil.edns.biz/scandium/Order-Life-Science-Problem-Solving.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154408.7/warc/CC-MAIN-20210802234539-20210803024539-00296.warc.gz
en
0.953496
1,332
3
3
To truncate is to shorten by cutting off. In computer terms, when information is truncated, it is ended abruptly at a certain spot. For example, if a program truncates a field containing the value of pi (3.14159265...) at four decimal places, the field would show 3.1415 as an answer. This is different from rounding, which would result in the answer of 3.1416. For another example, consider a text entry field in an electronic form. If a program limits the size of the field to 255 characters, it may allow you to continue typing past the maxiumum number of characters. However, when the information is submitted or saved, the program truncates the data to the first 255 characters and any additional characters are disregarded. Several operating systems or programming languages use truncate as a command or function for limiting the size of a field, data stream, or file. Linux includes a truncate command for rounding integers.
<urn:uuid:4d636f01-ef26-496d-a0f4-5413acc018e1>
CC-MAIN-2021-10
https://whatis.techtarget.com/definition/truncate
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364027.59/warc/CC-MAIN-20210302160319-20210302190319-00125.warc.gz
en
0.906682
198
4.15625
4
Mental Leap 10 – The World of Systems With the tenth leap, 75 weeks after due date, or more easily said, 17 months, your toddler gets the new ability to perceive and handle “systems.” He is now able to see clearly over the world of principles. He no longer applies principles as rigidly as before. He is able to adjust his principles to changing circumstances. He also starts to understand that he can choose how he wants to be: honest, helpful, careful, patient, etc. Or, he could choose to be just the opposite. From off this age you can see him develop the earliest beginnings of a conscience by systematically upholding his values and norms. We adults use the term “system” if the parts it consists of are interdependent and function as a whole. There are tangible examples, like a grandfather clock that needs winding, en electrical network or the human muscle system. There as also less tangible examples such as human organizations. To name just a few examples, take the scouts, the family, the drama club, the police station, the church, our society, our culture, and the law. You can’t spoil babies, but you can toddlers! By understanding what is happening inside that little head of your newly formed toddler – and remember, they are pretty savvy – you can shape the future behavior of your toddler and set values and norms that will carry him through life. To learn more about how to do so, be sure to read the new, extended edition of The Wonder Weeks. NOTEThis information is not enough to help your baby through the leap (mental leap 10). Read all about this leap in the book and give your baby the help he really needs. Your baby really needs your guidance during this (and other) leap(s)! - See the world through your baby’s perspective - Learn how to encourage each leap forward - Help your baby with the three Cs’ of fussy behavior Cranky, Clingy, Crying - Know which games and toys are best during each key week - Use calendars, charts and checklists to make sense of their behavior - Week-by-week guide to baby’s behavior
<urn:uuid:fc74b3f1-f29b-4db8-be75-f43755e568a3>
CC-MAIN-2017-22
https://www.thewonderweeks.com/mental-leap-10/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607860.7/warc/CC-MAIN-20170524192431-20170524212431-00148.warc.gz
en
0.954451
457
3.609375
4
Russian Space Forces |Russian Space Forces| Flag of the Russian Space Forces |Active||1992 – 1997| 2001 – 2011 1 August 2015 – present |Allegiance||Ministry of Defence| |Size||150,000 personnel (2014)| |Anniversaries||4 October (Space Forces Day)| |Lt. Gen. Aleksandr Golovko| |Armed Forces of the| |Independent troops (rod)| |Ranks of the Russian Military| |Uniforms of the Russian Military| |History of the Russian military| The Russian Space Forces (Russian: Космические войска России, tr. Kosmicheskie Voyska Rossii) are a branch of the Russian Aerospace Forces, that provides aerospace warning, air sovereignty, and protection for Russia. Having been reestablished following the 1 August 2015 merger between the Russian Air Force and the Russian Aerospace Defence Forces after a 2011 dissolving of the branch. The Russian Space Forces were originally formed on the 10 August 1992 and the creation of the Russian Armed Forces. The organisation shared control of the Baikonur Cosmodrome with the Russian Federal Space Agency. It also operated the Plesetsk and the Svobodny Cosmodromes. However the Russian Space Forces were dissolved in July 1997 and incorporated into the Strategic Missile Troops. The Russian Space Forces were once again reformed as an independent troop on the 1 June 2001 under a military reorganisation. However, by December 2011, it was dissolved once again and this time replaced by the Russian Aerospace Defence Forces. On 1 August 2015, the Russian Air Force and the Russian Aerospace Defence Forces were merged to form the Russian Aerospace Forces. The Russian Space Forces were reestablished as a result, and are now one of three sub-branches of the new armed force. In 1967 the Troops of Anti-Missile and Anti-Space Defence was formed (Russian: войска противоракетной и противокосмической обороны [ПРО и ПКО], tr. Voyska Protivoraketnoy i Protivokosmicheskoy Oborony [PRO i PKO]) under General-Lieutenant of the Artillery Yu. Votintsev. They were reorganised as the Ministry of Defence Space Units in 1982. In 1991 the Soviet Union was broken up. The Armed Forces of the Russian Federation were established on May 7, 1992, enabling the creation of Russian Space Forces later that year on August 10. In July 1997 the Space Force was dissolved as a separate service arm and incorporated to the Strategic Rocket Forces along with the Space Missile Defence Forces (Russian: Ракетно-космическая оборона), which previously were part of the Soviet Air Defence Forces. In the view of some experts, this was a mistake that prevented the Russian military from developing space-based capabilities. Russian Public TV said of the merger: However, slightly over three years ago, it appeared to some-one, that, with a view to saving funds, it would be more sensible to strip the Military Space Forces of their independence and subordinate them to the Strategic Missile Troops -which has been done. In just the same way the country's air defence forces were made subordinate to the air force. Under the slogan of "optimizing", but, essentially, reducing the officer corps of the armed forces, the Military Space Forces were simply merged with the Strategic Missile Troops. In this way the missilemen command remained in their places virtually in full and almost the entire elite of military engineers were dispersed from the space forces. The military base, too, was destroyed. In the building of the Military Space Forces headquarters on Kaluga Square [Kaluzhskaya ploshchad], the very expensive fibre optic cable necessary for communicating with space facilities was ripped out. Afterwards, this decision was deemed to have been erroneous. The Russian Space Forces were officially reborn on June 1, 2001 as an independent section of the Russian military. They regained independence under one of the many military reorganisation plans of the mid-late 1990s. Colonel General Anatoly Perminov was appointed to lead the new Space Forces. He was succeeded by General Vladimir Popovkin in 2004 and General Oleg Ostapenko in 2008 until dissolution in 2011. On the 1 August 2015, the Space Forces were reestablished as part of the Russian Aerospace Forces.. The main tasks of the Russian Space Forces are informing the higher political leaders and military commanders of missile attacks as soon as possible, ballistic missile defence, and the creation, deployment, maintenance and control of in-orbit space vehicles, like the new Persona reconnaissance satellite. For example, the Space Forces operate the GLONASS global positioning system; commander of the Space Forces Colonel General Vladimir Popovkin said in January 2006 that 18 GLONASS satellites would be in orbit by 2008. In October 2010 the system became fully operational. Formations of the Space Forces included the 3rd Missile-Space Defence Army, and a Division of Warning of Missile Attack, both with their headquarters at Solnechnogorsk near Moscow. Installations and assets include the Hantsavichy Radar Station in Belarus, along with a number of other large warning radars, and the A-135 anti-ballistic missile system which protects Moscow and the Peresvet anti-air laser combat system which protects strategic missiles. There is also an optical tracking facility, the Okno (Window) complex near the town of Nurek in central Tajikistan that is intended to monitor objects in space. The Okno is capable of tracking objects 40,000 kilometers (25,000 mi) from Earth, the space forces said when it °was put on duty in 2002. The facility involves telescope-like equipment housed in several large spheres, similar to the U.S. GEODSS system. 3rd Missile-Space Defence Army, status in 2002 - 1st Division of Warning of Missile Attack – HQ: Solnechnogorsk - East Oko Headquarters – Komsomolsk-na-Amure (Pivan-1) - West Oko Headquarters – Kurilovo (Serpukhov-15) - Radar Site (ORTU) RO-1 Olenegorsk – Radar Dnepr (Hen House) - Radar Site RO-5 – Beregovo, Ukraine – Radar Dnepr (Hen House, under Ukrainian control, all Ukrainian personnel) - Radar Site RO-4 – Sevastopol area, Russia – Radar Dnepr (Hen House, under Russian control, all Russian personnel) - Radar Site OS-2 – Balkhash, Kazakhstan – Radar Dnepr (Hen House) - Radar Site OS-1 – Mishelevka, Irkutsk – Radar Dnepr (Hen House) - Radar Site RO-30 – Pechora – Radar Daryal (Pechora) - Radar Site RO-7 – Gabala, Azerbaijan – Radar Daryal (Pechora) - Radar Site Gantcevichi, Belarus – Radar Volga - Radar Site – Komsomolsk-na-Amure – Radar Duga-2 (Steel Yard) - Radar Site Sofrino, in common with PRO – Radar Don-2 (Pill Box) - 9th Division of Defence Against Missiles – HQ: Sofrino (A-135 anti-ballistic missile system) - Missile Site – Novopetrovska – 51Т6 - Missile Site – Klin – 51Т6 - Missile Site – Shodna – 53Т6 - Missile Site – Turakovo (Aleksandrov) – 51Т6 - Missile Site – Korolev – 53Т6 - Missile Site – Litkarino – 53Т6 - Missile Site – Vnukovo – 53Т6 - Missile Site – Kolodkino – 51Т6 - Radar Site – Sofrino – Radar Don-2N (Pill Box) - Radar Site – Stremilovo (Chekhov-7) – Radar Dunay-3U (Cat House) - Radar Site – Kubinka – Radar Dunay-M (Dog House) - 45th Division of Space Control – HQ: Noginsk area |Name||Start||End||Notable offices held before or after| |1||General Kerim Kerimov||1964||1965| |2||General Andrei Karas||1965||1979| |3||General Aleksandr Maksimov||1979||1989| |4||General Vladimir Ivanov||1989||1996| |5||General Anatoly Perminov||2001||2004||Director of Federal Space Agency (2004—2011)| |6||General Vladimir Popovkin||2004||2008||Head of Roscosmos (2011–2013)| |7||General Oleg Ostapenko||2008||2011||Director of Russian Federal Space Agency (2013–2015)| |8||General Vladimir Ivanov||2012||2012| |9||General Aleksandr Golovko||2015||Commander of Russian Aerospace Defence Forces (2011–2015)| - United States Air Force Space Command - Awards and emblems of the Ministry of Defence of the Russian Federation - International Institute for Strategic Studies: The Military Balance 2014, p.181 - Lindborg, Christina (1997). "VKS". World Space Guide. Federation of American Scientists. Archived from the original on November 23, 2011. Retrieved March 24, 2012. - Russian Public TV (ORT), Moscow, in Russian 1700 gmt March 28, 2001, via BBC Summary of World Broadcasts - "Russia's Aerospace Defense Forces go on duty to stave off missile threats". RIA Novosti. December 1, 2011. Retrieved December 25, 2011. - Aerospace Forces - Russia creates new Aerospace Force service branch, janes.com, 4 August 2015 - "4 октября – День военно-космических сил России" [October 4 – Day of Military Space Forces in Russia] (in Russian). Prazdnuem. n.d. - ITAR-Tass news agency, via http://www.flug-revue.rotor.com/FRNews1/FRNews01/FR010603.htm Archived August 17, 2007, at the Wayback Machine. - "Oleg Ostapenko". Ministry of Defence of the Russian Federation. n.d. Retrieved February 29, 2012. - "Sourcebook on the Okno (в/ч 52168), Krona (в/ч 20096) and Krona-N (в/ч 20776) Space Surveillance Sites" (PDF). Federation of American Scientists. December 30, 2008. Retrieved 2012-03-12. - Kommersant-Vlast, May 14, 2002, www.brinkster.net[dead link] - Podvig, Pavel (2002). "History and the Current Status of the Russian Early-Warning System" (PDF). Science and Global Security. 10: 21–60. doi:10.1080/08929880212328. ISSN 0892-9882. Archived from the original (pdf) on March 15, 2012. - Petrov, Nikita (February 5, 2008). "Kiev Radar Row Set to Inflame Tensions Part One". Space Mart/RIA Novosti. Retrieved March 24, 2012. - "9 ДИВИЗИЯ ПРОТИВОРАКЕТНОЙ ОБОРОНЫ" [9 DIVISION MISSILE DEFENCE] (in Russian). Warfare.Ru. n.d. Retrieved 2012-03-24. - "Space Forces". Ministry of Defence of the Russian Federation. Retrieved 23 July 2018. |Wikimedia Commons has media related to Russian Space Forces.|
<urn:uuid:21ec0f58-dac8-4a57-a4b2-9e5d33ae1628>
CC-MAIN-2018-47
https://en.wikipedia.org/wiki/Russian_Space_Forces
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741628.8/warc/CC-MAIN-20181114041344-20181114063344-00069.warc.gz
en
0.865987
2,663
2.890625
3
Cape Verde is a source country for children subjected to forced labor and sex trafficking within the country and, at times, a source for persons trafficked to Brazil, Portugal, and other countries in Europe for forced transport of drugs. Migrants from China, Ghana, Guinea, Guinea-Bissau, Nigeria, and Senegal may receive low wages, work without contracts, and not have regularized their visa status, creating vulnerabilities to forced labor. West African migrants may transit the archipelago en route to situations of exploitation in Europe. Cape Verdean children work in domestic service, often working long hours and at times experiencing physical and sexual abuse—indicators of forced labor. Reports indicate that boys and girls, some of whom may be foreign nationals, are exploited in prostitution in Santa Maria, Praia, and Mindelo. Sex tourism, at times involving prostituted children, is a problem in Cape Verde. Cape Verdean adults and children are at risk of being deceived or forced into transporting drugs to or within Brazil and Portugal. Between 2010 and 2012, three Cape Verdean trafficking victims were identified in Guinea. The Government of Cape Verde does not fully comply with the minimum standards for the elimination of trafficking; however, it is making significant efforts to do so. The government investigated at least two cases involving alleged child prostitution, an increase compared to its failure to investigate any cases of suspected human trafficking in the previous reporting period. In addition, it began prosecution of three offenders in one case. The Cape Verdean Institute for Children and Adolescents (ICCA), under the Ministry of Youth, Employment, and Human Resources Development, made concerted efforts to protect child victims of sexual abuse, including children in prostitution, and to assist vulnerable children. Despite these efforts, the government did not prosecute or convict any trafficking offenders during the year. Furthermore, it did not make efforts to identify any trafficking victims or reduce the demand for commercial sex acts. Recommendations for Cape Verde: Draft comprehensive anti-trafficking legislation consistent with the 2000 UN TIP Protocol, including a broad definition of trafficking in persons that does not rely on evidence of movement but rather on exploitation; prosecute, convict, and punish trafficking offenders under existing law; ensure Cape Verdean law prohibits facilitating the prostitution of children ages 16 and 17; train law enforcement officials to use existing laws to investigate and prosecute trafficking offenses; develop and implement procedures for the identification of trafficking victims amongst vulnerable populations; compile anti-trafficking law enforcement data; and launch a targeted anti-trafficking public awareness campaign. The Government of Cape Verde demonstrated minimal efforts to combat human trafficking during the year; however, it did not prosecute or convict any trafficking offenders. Cape Verdean law does not specifically prohibit all forms of trafficking, though several existing statutes cover certain forms. Article 14 of the labor code prohibits forced labor and Article 271 of the penal code outlaws slavery, both of which prescribe sufficiently stringent penalties of six to 12 years’ imprisonment. Article 148 of the penal code outlaws facilitating prostitution of children under the age of 16 and prescribes sufficiently stringent penalties of two to eight years’ imprisonment for victims under 14 years and one to five years for victims aged 14 or 15. These penalties are not commensurate with penalties for other grave crimes, such as rape. The penal code does not prohibit or punish those who facilitate the prostitution of children aged 16 and 17. Investigations into sex crimes involving children aged 14 and 15 require complaints from the child’s legal guardian; government officials indicate that no such case has ever been reported to police. Prostituted children aged 14 to 17 are rendered virtually invisible to law enforcement and social welfare officials under existing law, granting impunity to those who profit from their exploitation. During the year, the judicial police investigated at least two cases of child prostitution reported by the ICCA. In February 2013, the government began prosecution of three men involved in the prostitution of teenage boys between the ages of 12 and 14 transported from Praia to other parts of the island of Santiago for prearranged clients. The second case involved the prostitution of children on the island of Sal. The government did not provide information regarding the status of these cases. It did not provide any specialized training for officials on the identification or prosecution of trafficking offenses. There were no reports of trafficking-related corruption during the year; corruption is generally not a significant issue in Cape Verde. The government made modest efforts to protect trafficking victims. Although it did not report its identification or protection of trafficking victims, several government facilities that provide care to vulnerable children and victims of gender-based violence may have assisted trafficking victims during the year. Two ICCA-run centers for child emergencies in Praia and Mindelo afforded temporary care to child victims of sexual abuse, violence, and abandonment; children can remain in these centers for up to three months. The government maintained its five protection and social reinsertion centers on the islands of Sal, Sao Nicolau, Bao Vista, Fogo, and Santiago, which offered reintegration services to children experiencing long-term trauma. The ICCA continued its Nos kasa project that aims to reduce the vulnerability of street children to sexual abuse and child labor through the operation of six day centers on the islands of Santo Antao, Sao Vincente, Sao Nicolau, Fogo, Boa Vista, and Santiago, which host children during the day and provide counseling. There are also government-supported foster family and adoption programs for the care of children who cannot return to their families. The government lacked formal procedures for the identification and referral of trafficking victims. However, the ICCA’s network for the protection and prevention of sexual abuse of children and adolescents—comprised of the judicial police, the national police, the national prosecutor, the directorate general of tourism, and the Office of Health for Praia—coordinated the referral of child victims of sexual abuse to care and offered support throughout court processes. Disque Denuncia, the government’s hotline for reporting cases of child abuse, served as a referral system, coordinating efforts between the attorney general’s office, the judiciary police, the national police, hospitals, and Offices of Health and School. ICCA and UNICEF established a special unit in the judicial police to attend to child sex abuse victims; the unit is equipped with a video room that allows children to testify outside of court. Cape Verdean law does not provide for legal alternatives to the removal of foreign trafficking victims to countries where they may face hardship or retribution. The government made modest efforts to prevent trafficking during the reporting period through efforts directed towards the elimination of child labor and protection of migrants. Nonetheless, it did not undertake any trafficking awareness campaigns. During the year, the government continued its drafting of a list of hazardous forms of work. In 2012, ICCA inaugurated its unit for prevention and elimination of child labor and worked with government and civil society partners to establish the National Committee for Eradication of Child Labor in Cape Verde. The government did not identify any child labor violations during the reporting period and did not remove any children from situations of child labor. In the previous reporting period, it developed a national immigration strategy to manage migration flows, regulate migrant access to the labor market, develop a model employment contract for immigrant workers, and lay groundwork to identify and address labor exploitation by strengthening the coordination between inspection divisions, labor unions, NGOs, and migrant associations. In 2012, the government, in partnership with international organizations and donors, held awareness events about this strategy and workshops for the National Immigration Council and Permanent Monitoring Group. The National Immigration Council is a committee comprised of 26 members from different stakeholder organizations responsible for monitoring and evaluating the implementation of the national immigration strategy. The Permanent Monitoring Group is an advisory group that supports the immigration coordination unit, established in February 2012, to ensure coordination on and compliance with national immigration policies as part of its larger efforts to improve conditions for migrants and facilitate their integration into Cape Verdean society. In December 2012, the Minister of Internal Affairs opened the first Immigration Support Office, based in the Santa Maria police precinct, which aims to serve and inform migrants living in the area. During the year, the Ministry of Internal Administration reported one pending prosecution of a child sex tourist. In 2012, the government did not make significant efforts to reduce the demand for commercial sex acts or to address sex tourism.
<urn:uuid:b6786a4b-01e2-4b92-9609-781cb119c265>
CC-MAIN-2015-22
http://www.state.gov/j/tip/rls/tiprpt/countries/2013/215418.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928030.83/warc/CC-MAIN-20150521113208-00116-ip-10-180-206-219.ec2.internal.warc.gz
en
0.944964
1,710
2.84375
3
Scrabble word: MEDIATION In which Scrabble dictionary does MEDIATION exist? Definitions of MEDIATION in dictionaries: - noun - a negotiation to resolve differences that is conducted by some impartial party - noun - the act of intervening for the purpose of bringing about a settlement - The act of mediating; intervention. - The state of being mediated. - An attempt to bring about a peaceful settlement or compromise between disputants through the objective intervention of a neutral party. There are 9 letters in MEDIATION: A D E I I M N O T Scrabble words that can be created with an extra letter added to MEDIATION All anagrams that could be made from letters of word MEDIATION plus a wildcard: MEDIATION? Scrabble words that can be created with letters from word MEDIATION 9 letter words 8 letter words 7 letter words 6 letter words 5 letter words 4 letter words 3 letter words 2 letter words Images for MEDIATION SCRABBLE is the registered trademark of Hasbro and J.W. Spear & Sons Limited. Our scrabble word finder and scrabble cheat word builder is not associated with the Scrabble brand - we merely provide help for players of the official Scrabble game. All intellectual property rights to the game are owned by respective owners in the U.S.A and Canada and the rest of the world. Anagrammer.com is not affiliated with Scrabble. This site is an educational tool and resource for Scrabble & Words With Friends players.
<urn:uuid:8bf2feab-94ed-45fb-9522-07a22d1abae9>
CC-MAIN-2017-17
http://www.anagrammer.com/scrabble/mediation
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120881.99/warc/CC-MAIN-20170423031200-00119-ip-10-145-167-34.ec2.internal.warc.gz
en
0.911504
342
2.59375
3
Benjamin G. Lamme - Springfield, OH, USA - Death date - Associated organizations - Fields of study Benjamin Lamme was born on a farm near Springfield, Ohio, on 12 January 1864. He graduated in mechanical engineering from Ohio State University in 1888. His older sister Bertha Lamme was also an engineer, also graduating from Ohio State University in 1893. After a few months back on the farm, Benjamin joined the Westinghouse Company in 1889 where he became an assistant to Albert Schmid, well known for his innovative machine designs. Lamme designed a single-reduction railway motor with machine-wound coils which was marketed by Westinghouse beginning in 1891. He designed much of the apparatus for the Westinghouse exhibit at the Columbian Exposition in Chicago in 1893, including alternating-current generators, induction motors, and rotary converters. Over a period of several years, Lamme developed a design methodology based on the field-form method of analysis. He later wrote that his method had "proved of incalculable value, especially in the analysis and development of new types of apparatus. "He did much of the work on perfecting the methodology at night at his home.Unlike many contemporary designers, he avoided using the mechanical slide rule, preferring instead his well developed "mental slide rule." The method was utilized in designing all types of electrical machinery and involved direct calculation of magnetic flux in air gaps. In addition to his design work on the Niagara Falls alternators, Lamme designed the "monster machines" for the power plant of the Manhattan Elevated Railway in New York City. The plant used eight slow-speed direct-current generators, each of which was forty feet high and weighed approximately a million pounds. Lamme was responsible for designing the popular type C induction motor which came on the market in 1896 and was described at the time as having performance characteristics that were "unsurpassed." He used a technique of reducing the voltage applied to the motor when starting to limit the surge in line current.He was among the leaders in the introduction of large turboelectric generators which began to supplant older slow-speed, engine-driven, generators in the first decade of the 20th century.He later wrote in his autobiography that he had "always liked high speed" and thus had become and enthusiastic participant in "the race for higher speeds" in the field of electric machinery. Lamme became chief engineer at Westinghouse in 1903 and held the position for the rest of his life. During World War I, he represented the American Institute of Electrical Engineers (AIEE) on the Naval Consulting Board. He received the Edison Medal of the AIEE in 1919 in recognition for his contributions to the electrical power field. For a number of years, he taught in-house design classes to young engineers at Westinghouse.Those who had studied under him organized a club known as "Laminations" which featured invited lectures by Lamme and others. Lamme himself received more than 160 patents during his career. Lamme had a lifelong interest in archeology and had a sizable personal collection of projectile points and other artifacts.He was also an amateur photographer and had an interest in mathematical puzzles. He died on 8 July 1924 at the age of 60. His will included a bequest to AIEE which was used to initiate the Lamme Medal in 1928 to recognize outstanding design engineers in the power field. He also endowed two engineering scholarships at Ohio State University, and contributed to the support and education of a number of French orphans after World War I. His autobiography, which included a list of his published papers, was published in 1926, and the Westinghouse Company published a collection of his technical papers in 1919.
<urn:uuid:d29fe3ce-f2eb-4448-82bf-eb35fa0edfbc>
CC-MAIN-2016-22
http://ethw.org/Benjamin_G._Lamme
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278887.13/warc/CC-MAIN-20160524002118-00159-ip-10-185-217-139.ec2.internal.warc.gz
en
0.983947
766
2.78125
3
Category of the week - Printmaking A selection of print works on Axisweb. Printmaking is the process of creating an artwork by transferring ink or paint onto a surface such as paper, card or fabric. Multiple copies of the same image can be created using this process, each of which contain slight variations making each one unique - this is usually called an 'edition'. There are many types of printmaking methods and techniques including engravings, woodcuts, etchings, lithographs and screenprints.
<urn:uuid:95c7ccb4-c563-42c1-be0c-c97f4bb6eb7f>
CC-MAIN-2017-30
https://www.axisweb.org/collections/a7ktr94mwe8b/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424549.12/warc/CC-MAIN-20170723102716-20170723122716-00305.warc.gz
en
0.954632
101
2.515625
3
Determining Marriage Dates Twigs and Trees, November 09, 2000 Some time ago, in an article I wrote, there was a question that listed the birth date of a child, but had no actual marriage date for the parents. Suggestions were made about how to estimate that marriage date. In response to that particular subject, I received the following comments from another researcher: Further to your comments, it is also false to assume that just because a first child was born in 1850 that the parents were married in 1848/49. They could have easily been married before those years, during 1850 or after the first child was born. In an ideal genealogical world, people were married two years before the birth of their first child, gave their children their mother's maiden name as a second name and never moved from the area they were born in. - Elisabeth Estimated marriage dates may not be as close as we would like. Assumptions May Lead Astray This brought up an interesting point. Many a time we will estimate dates because we cannot find them. We assume many things that may not be true. One of them is assuming that a couple married the year before the birth of their first child. I myself have discovered in one of my lines a propensity for the first child being born about three months after the wedding. This happened for three generations of that particular line of my family. My own first child was not born until three years after the marriage. Neither of these examples coincides with the assumption mentioned above. Are You My Mother? Another assumption that can sometimes prove false is that the wife you know about was indeed the mother to all the children. Many times the wife would die and the father would remarry. This happened often in the 1800s on back. These were tough times that required a mother in the household to do the cooking and other essential daily chores as the father was out plowing the fields or taking care of the livestock. So if the wife died young and there were small children in the house, it was not unusual to see him remarry. Sometimes this is obvious, especially when the age of the new wife is so young that she could not possibly be the mother of the oldest child in the house. Other times it is not so obvious. And don't get sidetracked with the pre-1880 census. With no relationships listed, you cannot assume that all the children in the household are indeed the children of the head of the household. Whenever you are following the trail of your ancestors, it is essential that you keep an open mind to all possibilities. Otherwise the very clues that you do find will not be recognizable to you because you will not see them. Rhonda R. McClure is a professional genealogist specializing in celebrity trees and computerized genealogy. She has been involved in online genealogy for fifteen years. She is an award-winning author of several genealogy how-to books, including The Complete Idiot's Guide to Online Genealogy, The Genealogist's Computer Companion, and Finding Your Famous and Infamous Ancestors. She may be contacted at [email protected]. See more advice from Rhonda in her columns Expert Tips, Tigs and Trees, and Overheard in the Message Boards.
<urn:uuid:ebb2aebe-ab7c-4068-a3f5-0662ee026ba8>
CC-MAIN-2016-18
http://www.genealogy.com/articles/twigs/rhonda110900.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860115836.8/warc/CC-MAIN-20160428161515-00060-ip-10-239-7-51.ec2.internal.warc.gz
en
0.986896
680
2.59375
3
This paper presents a systematic review of the concept of resilience in the field of disaster management, with a focus on the use of indicators and the inclusion of social justice considerations. The literature is reviewed with reference to various definitions of resilience, the relation between concepts of resilience and vulnerability, the conceptualization of resilience and the use of indicators, and the inclusion of social justice issues. The analysis shows that different disciplines employ various definitions of resilience and conceptions of its relation to vulnerability. Although recognized as important, distributive issues are not currently addressed in the literature. As a result, we lack a clear sense of what equality or distributive justice should mean in the context of resilience and disaster management. An approach based on capabilities is proposed as a promising way forward. - disaster management
<urn:uuid:e862b823-cc4e-4d23-a7e4-538bd37efe14>
CC-MAIN-2021-31
https://research.tudelft.nl/en/publications/resilience-indicators-opportunities-for-including-distributive-ju
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152156.49/warc/CC-MAIN-20210726215020-20210727005020-00469.warc.gz
en
0.935198
153
2.875
3
Volleyball is a sports team ball game, the goal of which is to direct the ball towards the opponent, so that it lands on the opponent’s half, or to make the player of the opposing team make a mistake. The players are allowed to touch the ball only three times in a row during one attack. History of Volleyball It is assumed that volleyball emerged due to William G. Morgan, a P.E. teacher at one of the colleges in Holyoke (USA). In 1895, at one of his lessons, he hung the net (about 2 meters high) and suggested that his students throw a basketball camera over it. Morgan called this game “Mintonette”. Two years later, the first volleyball was designed and put into production. In the second half of the 1920s, National Federations of Bulgaria, the USSR, the USA, and Japan occurred. In 1922, the first international competitions were held in Brooklyn. It was the YMCA Championship, in which 23 men’s teams participated. In 1925, the modern dimensions of the court, as well as the size and weight of the volleyball were approved. These rules were relevant to the countries in America, Africa and Europe. In 1947, the International Volleyball Federation (FIVB) was founded. The following countries became the members of the federation: Belgium, Brazil, Hungary, Egypt, Italy, the Netherlands, Poland, Portugal, Romania, the USA, Uruguay, France, Czechoslovakia, and Yugoslavia. In 1949, the first men’s world championship took place in Prague, and in 1964 volleyball was included in the program of the Olympic Games in Tokyo. The national teams of the USSR, Czechoslovakia, Poland, Romania, Bulgaria, and Japan achieved the most success in international competitions of the 1960-1970s. Since the 1990s, Brazil, the USA, Cuba, Italy, the Netherlands, and Yugoslavia have been added to the list of the strongest teams. Since 2006, FIVB comprises 220 national volleyball federations. The game is one of the most popular sports in the world. A volleyball match consists of sets (from 3 to 5). The duration of the volleyball set is not limited and lasts until one team scores 25 points. If there is less than 2-point lead over the opponent, the set continues until the lead is increased. The match continues until one team wins three sets. It is worth noting that the maximum score in the fifth set is 15 instead of 25 points. Each of the two teams may have up to 14 players, but there may be 6 players on the floor at the same time. The ball is introduced into the game by serving, the serving team is chosen by a coin toss. After each transfer of the right to serve from one team to another, the players move through the zones in clockwise order. The ball is served from behind the inline. If the server steps over the line, serves the ball out of the court or hits the net, the team loses the serve and the opponent gets a point. Any player has the right to take the serve; usually, it is a front row player. The serve is not blocked. The front row player may perform a spike. Such a hit is carried out over the net. Back row players attack from the 3-meter mark. The attack is blocked over the net so that the ball is prevented from flying over the net. While blocking, the players may put hands to the opponents’ side, without interfering them. Only front row players are blocked. The volleyball court is rectangular in shape and has the following dimensions: it is 18 meters long and 9 meters wide. The net is located in such a way that its highest point is 2.43 meters high above the floor at men’s competitions and 2.24 meters high – at women’s competitions. These dimensions were approved by the International Volleyball Federation in 1925 and are relevant to this day. The playing surface should be horizontal, flat, uniform and light. There is the concept of a free zone on the volleyball court. The dimensions of the free zone are specified and are as follows: 5-8 meters from the front lines and 3-5 meters from the sidelines. The free space above the court must be 12.5 meters. The playing court is limited by two side and front lines, which are considered in the court dimensions. The axis of the middle line, drawn between the sidelines, divides the playing space into two equal parts 9 x 9 m. It is drawn under the net and marks off the opponents’ zones. The attack line is drawn on each half of the court three meters behind the middle line. The most important attribute of the volleyball match is volleyball. Like any ball, the volleyball is a spherical construction consisting of an internal rubber chamber, which is hidden under natural or synthetic leather. Balls vary based on their purpose (official competitions, training games), age of the participants (adults, juniors) and type of the venue (open, closed). Ball diameter varies from 20.4 to 21.3 centimeters, circumference – from 65 to 67 centimeters, internal pressure – from 0.300 to 0.325 kg/cm2, weight – from 250 to 270 grams. It is recommended to choose three-color balls since such a ball is easier to distinguish against the background of the bright players’ uniform. Volleyball combines elements of jumping and running, so comfortable shoes are an important attribute. Shoes with soft soles are the most suitable for playing volleyball. Sometimes, special insole-shock absorbers are used additionally, they are very efficient in preventing injuries. Athletes use knee pads and elbow pads for additional protection of joints. - Outside hitters (left-side hitters or right-side hitters) are players attacking from the edge of the net. - Opposite hitters are the tallest and the most bouncy team players, who attack from the back row, as a rule. - Middle blockers are tall players, who block the opponent’s attacks, they attack from the third zone. - Setters are the players, who determine the attack options. - Liberos are the main receivers, who are usually shorter than 190 centimeters. The match officials are as follows: - The first referee. S/he carries out the duties while sitting or standing on the referees’ tower, which is located at one end of the net. - The second referee. S/he is located outside the playing court near the stand, opposite the first referee. - Secretary. The scorer carries out the duties while sitting at the secretary’s table, opposite the first referee. - Four (two) line referees. They control the side and front lines. Official FIBV competitions require an assistant secretary. The most large-scale volleyball competitions The Olympic Games are the most prestigious volleyball competitions. The World Championship is a competition of the strongest national volleyball teams, which are held once every four years. They are the second most prestigious volleyball competition after the Olympic Games. The World Cup is an international tournament in men’s and women’s volleyball. It is held a year before the Olympic Games, and its prize-winners are secured to participate in the Olympic Games. The World Champion Cup. The World Champion Cup is held a year before the year of the World Cup. FIVB World League is the most prestigious commercial tournament for men’s national volleyball teams. The Volleyball Grand Prix is the largest commercial tournament for the women’s national volleyball teams. The European Championship is the competition of the strongest men’s and women’s national volleyball teams of the European Volleyball Confederation. It is held biennially. Euroleague is an annual competition of national volleyball teams, held under the auspices of the European Volleyball Confederation. Volleyball sports institutions The International Volleyball Federation (French – Fédération Internationale de Volleyball, abbr. FIVB) is an international federation that comprises 220 national federations. The headquarters is located in the Swiss city of Lausanne. The European Volleyball Confederation (French – Confédération Européenne de Volleyball, abbr. CEV) is an institution that controls the European volleyball. It comprises 55 national federations. The All-Russian Volleyball Federation is an institution that controls Russian volleyball.
<urn:uuid:a2b06f4c-e0d0-4a4c-abaf-66a37bb49554>
CC-MAIN-2019-18
http://sport-wiki.org/sports/volleyball/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578610036.72/warc/CC-MAIN-20190423174820-20190423200820-00050.warc.gz
en
0.95511
1,762
3.078125
3
UPDATE: Reconceptualizing Evolution as an Instance of Development. Phylogeny is its own Ontogeny; Start with the Zygote. During the development of a complex organism, a fertilized ovum, or zygote, divides in two, then again into twice as many cells and eventually into all the cells that compose the organism's body. As the cells proliferate, they differentiate in form and function into the various cell types of that particular kind of body. This differentiation into skin, stomach, nerve, and other cell types occurs even though the cells of a developing body all share a common genotype, that of the original zygote. The paradox of one genotype yielding many cellular phenotypes has been resolved, in a general sense, through the mechanisms of epigenetics. A relatively new branch of molecular biology, epigenetics addresses issues related to gene regulation and gene regulatory networks. The new discipline aims to explain how, during development, genes get turned on and off and when (as in larval or adult forms of organisms) and where (as in spleen or kidney) they do. The new discipline is an upstart. Epigenetics would seem to demote DNA from being the cell's chief executive to its merely utilitarian, dumb server. DNA includes an archive of messenger-RNA templates (and the messenger RNA molecules transcribed from the templates still pass through an editing suite before being escorted to the ribosome, where they get translated into proteins). The molecular machinery of epigenetics, through normal chemical bonding, excites or inhibits DNA "expression" or "action." The countless combinations of sections of DNA that can be expressed and repressed here and there in sequence or in tandem produce multiform cellular phenotypes from the highly conserved DNA of the original zygote. From a complex database a skilled operator can extract many kinds of reports, by slicing the data this way then that. DNA is such a complex database, responding to many and diverse calls for data. The creatures of the Earth are reports summoned from DNA, not expressions of any executive talent that resides in the DNA. This is the new view of things from the world of epigenetics. But epigenetic mechanisms do more than regulate cellular differentiation during development. What is particularly significant, from the perspective of the star larvae hypothesis, is that epigenetic mechanisms also are implicated, increasingly, in the diversification of species from a conserved genome during evolution. "Conserved genome" is taking a liberty, admittedly, but how much of one? As statistical genomics continues to reveal, the conservation of DNA across species is far more extensive than anyone had expected. Because genomes differ among species far less than had been anticipated, some commenters even have coined the phrase, "universal genome" to underscore the striking commonalities among genomes shared by diverse species. Evolution increasingly seems to be an instance of development, the two processes of development and evolution sharing a reliance on epigenetic mechanisms to pull forth diverse forms from a shared database. Even though development and evolution differ markedly in scale, they grow increasingly mechanically similar as research proceeds. The star larvae hypothesis suggests the term ontophylogeny to designate biology's generic process of differentiation/diversification (an appropriation from J-J. Kupiec). Let the chips fall, but the star larvae hypothesis continues find encouragement in new discoveries in molecular biology that pertain to "descent with modification," whether the descent is of tissues during development or of species during evolution. The hypothesis watches for new breakthroughs in this area, because the trend line continues to dovetail with its prediction that evolution will come to be recognized as an instance of development. That's when things get interesting. That's when the hypothesis directs attention to an elephant in the room. Namely, if evolution becomes mechanically indistinguishable from development, or at least so dependent on the same mechanisms that issues of spatial and temporal scale become the last refuge of defenders of the old paradigm, then potentially troubling issues arise for normal science. (These troubles don't pertain in the context of the star larvae hypothesis, however. Just saying.) One: Development proceeds in a preferred direction. Given an accommodating environment, an adult chicken, and not an adult penguin, will be called forth from a chick embryo. Development has a teleological character. If evolution is an instance of development, then it, too, must have a teleological character, a preferred direction. This will be a tough pill for science to swallow. Evolution coming to be seen as a process that depends on endogenous factors as much as does development raises the challenge of applying the new understanding. What might it say about evolution on exoplanets? Theorists of evolution should have something predictive to say about questions such as these: Given an Earth-size planet in some solar system's "habitable zone," i.e., at the requisite distance from the system's central star, or sun, and which planet finds itself steward of viruses and bacteria, what exogenous contingencies will influence the descent of phenotypes and to what extent and in which directions? And to what extent will endogenous physiology influence the descent of phenotypes and to what extent and in which directions? Although, such predictions might soon be forthcoming. For its part, the star larvae hypothesis predicts that endogenous gene regulatory networks will generate phenotypes along the lines of the types of body plans that have evolved on Earth. The "tree of life" on exoplanets that bear complex life will include essentially the same major divisions, classes, orders, and phyla as those seen on Earth and probably a few platypus-like oddball assemblies as well. Incorporating the assertions of panspermia, the star larvae hypothesis assumes that diverse planets will share in the "universal genome." Two: Development, or ontogeny, typically is characterized as advancing through the stages of a life cycle, with the post-reproductive adult occupying the terminal stage. If evolution is an instance of development, then what is the adult form of the organism that's developing? And what events constitute a complete reproductive life-cycle of that organism? Conceiving of life on Earth as being engaged in a process of development, a planetary ontogeny, might seem less crazy if the sceptic appreciates that the bodies of complex organisms are themselves ecologies. Most cells in a human body, for example, are bacterial cells. Each human body is a constantly evolving ecosystem of microbial symbionts, parasites and stowaways. The fellow travelers constitute the "microbiomes" that compose human bodies. Development is ecological and evolution is developmental. The same relationships seem to pertain at all scales. The strain that humankind is putting on the Earth—particularly in light of nuclear mishaps, geoengineering, weaponized microbes, and the seemingly suicidal sociopathy of the various factions of would-be global oligarchs—might tempt observers to render a harsh verdict against humankind, to liken humans to a deadly, havoc-wreaking, ecosystem-wrecking, cancer. But such a condemnation would be misguided. two-party system (evolution vs. intelligent design) is an obsolete hypothesis synthesizes the thesis-antithesis of evolution and intelligent design into an expanded model of biology's natural history. is grandeur in this view of life, with its several powers, having been originally breathed by the Creator into a few forms or into one, and that . . . from so simple a beginning endless forms most beautiful and most wonderful have been and are being evolved." Darwin, The Descent of Man as I do that man in the distant future will be a far more perfect creature than he now is, it is an intolerable thought that he and all other sentient beings are doomed to complete annihilation after such long-continued slow progress." — Charles Darwin, new science of complexity, or complex systems theory, retrieves the discarded doctrine of vitalism. It assigns to nature a capacity to self organize—to construct complex structures and processes spontaneously. and entropy—anabolic and catabolic processes—feed each other through circuits collectively called metabolism. Nature's metabolism encompasses the organic and the inorganic in a continuum of anabolic and catabolic exchanges. Technology decommissions the specialized adaptations of the adult body. The neoteny that results illustrates gene-culture coevolution. In outer space that process will deliver a posthuman form anticipated by the religious figure of the cherubic angel, or putto, the celestial infant. Brain circuits juvenilized by weightlessness will mediate a concomitantly juvenilized subjectivity. The psychedelic, or entheogenic, experience provides a preview of the de-differentiated consciousness likely to characterize the juvenilized minds of extraterrestrials. Sociobiology explains social organization in naturalistic terms, but it remains taboo to apply it to humans, because that would imply that human society is stratified genetically. Conspiracy theories step in to concur that the ruling class indeed is an inbreeding elite. Anyone uncomfortable with the notion is free to dismiss it as "conspiracy theory." Nonetheless, genetic stratification sets the stage for speciation. shall attempt to show that what observers in the Progressive Era called 'the Invisible Government' has now become quite visible; and that what is usually taken to be the central content of politics, the pressure, and the campaigns, and the congressional maneuvering, has, in considerable part, now been relegated to the middle levels of Wright Mills, The Power Elite spare humankind the hell of a technocratic,fundamentalist hive, humanism needs to mount a postmodern revolution—a revolution that rejects the alienation of a plotless history. The star larvae hypothesis lays the foundation for such an essential revolution. he spake, and once more into the cup in which he had previously mingled the soul of the universe he poured the remains of the elements, and mingled them in much the same manner [. . . .] And having made it he divided the whole mixture into souls equal in number to the stars, and assigned each soul to a star; and having there placed them as in a chariot, he showed them the nature of the universe, and declared to them the laws of destiny, according to which their first birth would be one and the same for all,-no one should suffer a disadvantage at his hands; they were to be sown in the instruments of time severally adapted to them, and to come forth the most religious of animals [. . . .] He who lived well during his appointed time was to return and dwell in his native star, and there he would have a blessed and congenial existence." Privacy Statement: We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. If you would like more information about this practice and to know your choices about not having this information used by these companies, visit the Google ad and content
<urn:uuid:7817c93d-1d4e-4a01-96f6-289f39e68a91>
CC-MAIN-2014-42
http://www.starlarvae.org/
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558066654.4/warc/CC-MAIN-20141017150106-00066-ip-10-16-133-185.ec2.internal.warc.gz
en
0.936662
2,335
3.21875
3
DATE or TEXT depending on the data type that is expected: When you display a returned DATE value, the value has the format specified by the date template in the DATEFORMAT option. When the day of the week or the name of the month is used in the date template, TODAY uses the day names specified in the DAYNAMES option and the month names specified in the MONTHNAMES option. Where a text value is expected. TODAY automatically converts the date to a TEXT value, using the current template in the DATEFORMAT option to format the text value. When you want to override the current DATEFORMAT template, you can convert the date result to text by using the CONVERT function with a date-format argument. The following statements send the current date in DATE format to the current outfile. DATEFORMAT = '<wtextl> <mtextl> <d>, <yyyy>' SHOW TODAY When the current date is January 15, 1996, then these statements produce the following output. Monday January 15, 1996
<urn:uuid:43d682b9-be28-4847-b75c-55b8e1904201>
CC-MAIN-2015-18
http://docs.oracle.com/cd/B28359_01/olap.111/b28126/dml_functions_2122.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246655589.82/warc/CC-MAIN-20150417045735-00116-ip-10-235-10-82.ec2.internal.warc.gz
en
0.650043
224
2.734375
3
Raising a Generous Child Project Zero's Family Dinner Project joins Giving Tuesday campaign to stir conversations about giving back As the holiday season approaches, even the most conscientious child may begin to march in time to the drumbeat of consumer culture. In response, The Family Dinner Project (FDP) at the Harvard Graduate School of Education’s Project Zero is offering an antidote that turns mealtime into giving time — providing a teachable moment about the power of generosity. The FDP is partnering with the 92nd Street Y and the United Nations Foundation on its Giving Tuesday campaign, which aims to bring people and organizations from around the world together for one shared day of generosity — the Tuesday after Thanksgiving (this year December 2, 2014). This communal celebration is meant to kick off a season of giving, just as Black Friday (and now Cyber Monday) kicks off a season of shopping. The FDP is calling on families to take part in dinner-oriented acts of giving and spread the word through its #familydinnerforward campaign. Examples of dinner-oriented acts of giving include: - cooking or buying a meal for a neighbor or someone in need - inviting someone over for family dinner - collecting and donating food to a pantry or a shelter "Parents have the power to shape their children's practices towards giving and volunteering," says Anne Fishel, cofounder of The Family Dinner Project and author of a forthcoming book on the subject. She cites a recent study that found that adolescents were much more likely to donate and to volunteer if they had parents who talked to them about giving and who themselves actually engaged in volunteering. "Your kids look to you to learn how to be caring members of society, so be sure to talk to them about your experiences as a volunteer, how you decide which organizations to donate to, and why this matters to you." The FDP, founded in 2009, has long promoted the value of family mealtime — a topic that continues to trend on parenting blogs, on cooking blogs, and in the psyches of busy parents everywhere. Building on an extensive body research showing physical, emotional, social, and educational benefits of family dinners, the FDP has developed a plethora of useful tools to help families build a tradition of fun and frequent dinners and good tableside conversations about goals, hopes, and daily challenges. Resources for #familydinnerforward on #GivingTuesday (12/2/14): - Check out these conversation starters, games, and other resources developed in collaboration with Making Caring Common. - Watch this FDP video and hear what kids have to say about giving back. - Browse other Giving Tuesday resources. Inspiration on how to start talking with children about generosity: - Family Dinner Project member Amy Yelin’s blog post on her family’s summer service project. - FDP resources on fostering empathy at the dinner table. Get Usable Knowledge — Delivered Our free monthly newsletter sends you tips, tools, and ideas from research and practice leaders at the Harvard Graduate School of Education. Sign up now.
<urn:uuid:4bca6048-b8a9-4b1f-bf02-9b059e485e9f>
CC-MAIN-2021-39
https://www.gse.harvard.edu/news/uk/14/11/raising-generous-child
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053657.29/warc/CC-MAIN-20210916145123-20210916175123-00032.warc.gz
en
0.949019
631
2.515625
3
World Fair Trade Day, which in principle is great - striving for fair wages and labour conditions, as well environmentally responsible practices. If you've been reading this blog for a while, you will know I'm a bit skeptical and have found little convincing evidence about the efficacy of Fair Trade in achieving its stated goals. Chocolate has been one of the biggest targets of Fair Trade efforts, largely because of the outrage over child labour practices in Cote D'Ivoire and other West African countries, and the resulting campaigns against major brands like Hershey's. But I want to take a slightly different look at the fairness of trade in the global cocoa sector, and particularly transboundary issues. Why? Well, as you know I recently moved to Australia. While a vast country spanning a large number of ecological and climatic zones, the far northern reaches are suitable for growing certain tropical commodity crops - tea, sugar cane, coffee, and - yes you guessed it - cacao. A residue of a colonial past, it's pretty well established that the consumption of these crops is usually some place other than where they're grown. Ghana may be the second largest producer, but the amount per capita consumed (~0.5kg per year) falls even below India! While still only half of what the Swiss manage, Australians eat around 6kg per person per year! And although it's pretty atypical for one of these top consumers to also grow the crop, Australia produces such an insignificant amount that I can't even find a statistic from the Department of Agriculture or the FAO statistics (compared to Ghana with over 800,000 tonnes in 2013)! climate change - there has been a growing fear that the world may run into a cocoa shortage. Cadbury announced big plans for investing in cultivation trials in Australia back in 2013. Then there are a number of small farms popping up in Northern Queensland, trying to get in early on the action. Daintree Estates has been in operation for five years now; the North Queensland Chocolate Company creates raw bars; and Charley's Chocolate Factory has a few Austrlian origin bars in addition to their Pacific varieties. A big barrier to growing cocoa in the country is costs, because of the relatively higher cost of land and more stringent minimum wage and labour condition standards. The latter (and frankly, the size of the industry) make a Fair Trade label essentially unnecessary. So the 'local' food enthusiast in me was rejoicing, when an article from about a decade ago highlighted how ethical consumption is a bit more complicated. It argued (though not very extensively) that growing cocoa in Australia is not fair to the millions of farmers in neighbouring developing countries whose livelihoods depend on the commodity. So this is a can of worms I'm not interested in opening at the moment, because I think it brings the discussion of 'fair trade' beyond individual instances of justice to tackling issues of historical legacy (ie colonialism...) and the responsibilities of global citizenship. While I don't believe there is much danger of Australia stealing away business from smallholders in developing countries, this does raise ethical questions around unintended (but probably anticipated) consequences of such development. Because we now live in a very globalized food economy, demand from halfway around the world has resounding consequences for suppliers. Coffee is a good example of how changing global demand can lead to boom and bust cycles, where fluctuations may complete undermine the livelihoods of smallscale farmers and most assuredly hinder long-term agricultural planning. Finally, it is aruably environmentally irresponsible to grow another commodity crop in the highly biodiverse, and continually threatened, northwestern region of Australia. But all of these for another day. Image Credits: Queensland Cocoa Industry Development Association (QCIDA) academic agriculture almond amaranth animals apples apricot asparagus avocado baking banana bars basil beans bees beets berries biodiversity blog action day blueberries book bread Cabbage Cake carob carrots cashew cauliflower celery chard Cheese cherry chickpeas chocolate chocolate with a soul Cinnamon rolls climate change coconut coffee commodities conflict conservation contest cookies corn crisp cucumber culture dairy daring bakers dates deforestation dess dessert eggplant eggs Environment Ethics fair trade fennel figs film fish Food Waste Foodie blogroll Frugal Foodie Gardening garlic gender ginger gluten-free GMO grains granola grapes Greens hazelnut health history Holiday honey horseradish human rights hunger ice cream Indian Kale Kiwi kohlrabi lemon lentils lime Live Below the Line livestock macarons mango markets melon mint muffin Munchable Soapbox mushrooms nutrition nuts okra olive oil onion orange organic pasta Pastry peaches peanut butter Pears peas peppers Pie pistachio plum policy pollution potatoes poverty Produce of the Week protein quinoa Rabe raw resources restaurants rhubarb risotto root vegetables salad seafood sesame smoothie social justice SOS soup spinach Squash stevia strawberry sunchoke sunflower seeds sustainability sweet potato tea tempeh Tofu tomato tradition trains Travel Turnip Vegan Vegan MoFo water wheat berries winter squash zucchini
<urn:uuid:cf0cf892-7bb3-4953-9383-34252a4d912a>
CC-MAIN-2019-51
http://www.mymunchablemusings.com/2016/05/chocolate-when-could-does-not-mean.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540490972.13/warc/CC-MAIN-20191206200121-20191206224121-00165.warc.gz
en
0.911633
1,027
2.625
3
Mangoverde :: World Bird Guide :: Shearwaters and Petrels :: Cory's Shearwater Cory's Shearwater Calonectris diomedea Described by: Scopoli (1769) Alternate common name(s): Mediterranean Shearwater, Atlantic Shearwater, Kuhl's Shearwater Old scientific name(s): Puffinus diomedea, Puffinus kuhlii, Procellaria diomedea Select thumbnail to view larger image - Place cursor over image for image information Select additional thumbnail page to view 2 more images. RangeAtlantic Ocean into the Mediterranean Sea and ex. sw. Indian Ocean; (1) the Mediterranean, s. Adriatic and Aegean on Is. off Spain (Balearic Is.), s. France, Tunisia, Corsica, Sardinia, Sicily, s. Italy, Yugoslavia, Greece, Malta (Ta' Cenc Cliffs), Crete, e. Turkey and the Near East. (2) Azores, Madeira, Desertas, Canary Is. (Porto Santo, Salvages), Portugal (Berlengas). Disperses to sw. Ireland and into the s. Atlantic Ocean along the coasts of Portugal, s. Spain, Morocco, Rio de Oro, Mauritania, Senegal, Guinea, Sierra Leone and Liberia to winter off of Angola, Namibia, South Africa (e. to Natal) and into the sw. Indian Ocean mostly between 34-42°S as far as Marion, Amsterdam and St. Paul Is. It also occurs in the n. Red Sea (Elat), along the Atlantic coasts of Canada (se. Newfoundland, Nova Scotia), United States (s. to the n. Gulf of Mexico), West Indies (Bahamas), Brazil (Bahia) to Uruguay and n. Argentina. North America n. of Mexican border Summer: offshore from e. NSC, MAS (Cape Cod Bay), RID, NYK (Long Island), NJY, DEL, MYD, VIR to n. NCA (Cape Hatteras), then far offshore from SCA, GEO to FLA except off s. FLA where it occurs closer inshore again. No videos are available for this species Location unknown - Date unknown Source: Massaciuccolis Oasis Location unknown - Date unknown Source: ETI BioInformatics Clements, James F. Birds of the World: A Checklist. Vista, CA: Ibis Publishing Company, 2000. Comments/ErrorsPlease email with errors/comments on this page or to donate photos. If there is no family list to the left, you may have arrived at this page from a direct link. Please select "Mangoverde World Bird Guide" to view the entire bird site.
<urn:uuid:fb5b7267-02e0-4f26-bd46-9df99485f195>
CC-MAIN-2018-17
http://mangoverde.org/birdsound/spec/spec11-53.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948738.65/warc/CC-MAIN-20180427002118-20180427022118-00382.warc.gz
en
0.753491
595
2.8125
3
A few weeks ago I visited Austin, Texas to participate in the SXSW Eco conference. Staying across the street from Austin’s large and beautiful convention center, I was astonished to discover a green ravine immediately adjacent to the mammoth building, at the bottom of which was a slow moving creek full of small fish and a large turtle sunning on a rock. I soon learned that this was Waller Creek, a relatively short urban stream in a very highly developed area. I also learned that the stream is currently the focus of an ambitious public-private partnership to restore the stream and connect its banks with neighboring parks, creating both a recreational amenity and an ecological improvement. Across the United States and around the world, urban rivers have been the focus of major clean-up and restoration efforts over the last century, going from places to conduct business and dump refuse and pollution, to waterfront parks and residences. More recently, the smaller creeks and streams that function as tributaries to those rivers have been the focus of restoration and even rediscovery, as cities “daylight” streams that have been covered for decades. While there is no denying that the restored and rediscovered streams have led to more attractive and literally greener urban environments, and possibly increased real estate values, the jury is still out on the ecological value of these often extensive and expensive projects. With much of the work either still quite new or ongoing, and only a few scientific studies conducted, we would be well advised to document the effects of these efforts even as we continue them. Urban stream restoration has been in practice for approximately three decades, with early efforts in the Chesapeake Bay watershed and in California, and in the last few decades they have spread to cities that include New York City and nearby suburbs, Boston, Los Angeles, Kalamazoo, San Luis Obispo and others. Currently major stream restoration projects are underway or planned for Austin, Atlanta, and many other cities. There are two major trends in urban stream restoration—one is a more naturalistic restoration of an existing degraded stream, the other is the daylighting of a stream or small river that has been covered over. Perhaps the best known example of daylighting a “forgotten” stream is in Seoul, South Korea, where the Cheonggyecheon stream—once pristine but by the 20th century an open sewer—was buried under layers of highways and other urban systems for decades. The city peeled away the layers of roadways, exposing and restoring the stream bed and making it the centerpiece of a newly enlivened neighborhood, where children play in the clean waters (fed by a mechanical system) and where plant, insect, bird and fish species proliferate, despite the extensive engineering. While technically a river (and the only fresh water river in New York City), the Bronx River is only a few feet wide in many places, and it had an equally notorious recent history, befouled by raw sewage and chemical waste by all the communities that adjoined its 23-mile length. It was also a favored dumping ground for abandoned and stolen cars, tires, household appliances, and all other forms of rubbish. A partnership between neighborhood groups—particularly those advocating for environmental justice, the NYC Parks & Recreation Department, and local elected officials, especially Congressman José Serrano— has led to a two-decade-long restoration, managed for the last decade by the non-profit Bronx River Alliance working with the City. Now local youth groups paddle its newly clean waters in canoes and hand-made row boats, a fish ladder will soon be built to allow reintroduced alewife herring to swim upstream, and at least two beaver have returned to the area after their species was exterminated locally by trappers. Other creeks in New York City that once fed the salt marshes that used to define the coastline were boxed in for commerce and turned into “canals” and polluted by local industries, dumped on and despoiled. Now these creeks are being restored, ranging from the ambitious plans for the Gowanus Canal (both a Superfund clean-up and the use of innovative designs to capture stormwater runoff) and Newtown Creek (also a Federal Superfund site), to the beautifully restored wetlands of Gerritsen Creek on Jamaica Bay. A dramatic example of daylighting a buried stream can be found in Yonkers, NY. The Saw Mill River (also known as the Saw Mill Creek) long ago the home of the eponymous saw mill that used hydropower to cut timber into boards, was covered over by the City of Yonkers and encased in a 10-by-20-foot steel and concrete flume to hide the dirty and smelly waters that flowed through the heart of the city. Recently the city celebrated the completion of the first phase of daylighting of the Saw Mill, which did not demolish the c. 1925 flume but instead diverted water from it into a new river bed that now flows through the heart of the city where a parking lot once covered the river. Upriver, a fish ladder allows eels to migrate upstream, though officials are trying to figure out how they can get back down without being trapped in nets installed to capture floating debris. One of the earliest stream restoration projects was in Kalamazoo, Michigan, where beginning in 1986 a 1/3–mile stretch of the formerly covered over Arcadia Creek was daylighted to help address stormwater runoff problems and reinvigorate a downtown business district, at a cost of $18 million. In San Luis Obispo, CA, a much less expensive project that involved local business owners fended off a proposed covering over of the creek. As described in the excellent report “Daylighting and Restoring Streams in Rural Community City Centers: Case Studies” by Paul Hoobyar of the National Park Service: The community eventually gained consensus on a design for the creek’s restoration. The agreed-upon design called for widening the creek’s floodplain and re-contouring the streambanks. The design also incorporated building terraced stone walls to prevent bank scouring during high winter flows. The City Council adopted the restoration design, as well as a flood management policy that was atypical for cities at that time. The city policy avoided creating the usual concrete-lined, trapezoidal channels that many communities were adopting for flood control…the City began developing a program designed to protect the creek while reducing the risk of flooding. As climate change and related severe weather and flooding become issues confronting public officials, even as cities seek to make their cities more attractive and with higher ecological functions, three major projects are at various stages of development in three American cities. In Boston, the Muddy River Restoration Project is a massive, multi-pronged, multi-year initiative for a 3.5-mile section of the river to improve flood control, and water quality, enhance the aquatic/riparian habitat, rehabilitate the landscape and historic resources, and implement Best Management Practices. Among the many goals of the project are the reduction of sedimentation from local sources and the use of underground particle separators to remove sediment, along with the removal of invasive plants and their replacement with “a diverse cross section of plantings including emergent wetland species, low and high shrubs, and trees.” In Austin, the Waller Creek Conservancy is partnering with the City on a plan to restore the 1.5-mile creek that runs from the north end of the University of Texas campus into the Lady Bird Lake (a dammed section of the Colorado River). The Conservancy recently ran an international design competition, eventually selecting the Brooklyn, NY-based firm Michael van Valkenburgh Associates to develop a master plan to restore the degraded creek and connect three parks along the Creek into a riparian greenway. The city is also just completing a massive project to capture storm water runoff in an adjacent pipe, to help avert some of the disastrous flooding that can come from sudden and torrential downpours. (Two days after I left Austin, which was bone dry at the time, 13 inches of rain fell there in just a few hours, flooding many portions of the city.) Waller Creek, along with its neighbors Shoal Creek and Barton Creek, must also play roles in natural flood prevention, and they need to be able to sustain both drought and sudden, intense storms. Even tiny creeks can get a lot of attention, as is the case with Proctor Creek in Atlanta. Unknown to most local residents, Proctor Creek runs from near the Georgia Tech campus into the Chattahoochee River. Though diminutive, the stream is responsible for 42 percent of the pollutants from the City of Atlanta that enter the Chattahoochee. The Proctor Creek Watershed was recently named one of 11 newly selected Urban Waters Federal Partnership locations, with five “champion” federal agencies and five additional federal agencies working to help the state and city improve many overlapping environmental and public health issues, including illegal dumping, brownfields, blighted sites, impaired water quality, pervasive flooding, and combined sewer overflows. The Trust for Public Land is one of the non-profit partners in this effort, and it will be supporting the creation of a mitigation bank, in which private sector partners will restore the banks of the creek, remove invasive species and contaminants, and restore the natural hydrologic functions, while creating a 7-mile accessible greenway trail along the banks of the creek. With so many communities investing so much time, energy and money in urban stream restoration, what are the expected outcomes? While the field is still relatively young, a thorough study done by Kenneth B. Brown, an aquatic ecologist with The Center for Watershed Protection in Elliot City, Maryland evaluated 24 different types of stream restoration practices and included over 450 individual practice installations. There are both optimistic and less positive results. On the plus side, according to the study “overall, nearly 90% of the individual stream restoration practices assessed remained intact after an average of four years.” On a less positive note, habitat restoration was not as successful, with the study finding that “less than 60% of the practices fully achieved even limited objectives for habitat enhancement.” Overall, it appears that cities should proceed with these ambitions plans, but we would all benefit from a much more widespread and detailed sharing of the best (and least) successful models, helping our cities to retain and improve our small but precious urban streams. by Adrian Benepe New York City
<urn:uuid:27f4d2ab-655f-4220-a97c-0216595c5f30>
CC-MAIN-2019-13
https://www.thenatureofcities.com/2013/10/30/up-the-creek-with-a-paddle-urban-stream-restoration-and-daylighting/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202484.31/warc/CC-MAIN-20190321030925-20190321052925-00277.warc.gz
en
0.959529
2,163
2.6875
3
At the end of last week, a rumor surfaced at SemiAccurate that Apple was abandoning x86 and shifting all their notebooks (MacBook Air and Pro) over to ARM in the next two years. With the increasing overlap and competition between the two instruction sets, and the fierce war of words between Intel and ARM, this would be sensational news. Such a high profile design win for ARM could herald a massive disruption in the PC ecosystem. While there are advantages for Apple to use ARM and precedents for such transitions, it is an exceptionally unlikely scenario. This report reviews the history of Apple’s migrations, the technical and business challenges for adopting ARM and analyzes the most likely scenario for Apple going forward. There are four main motivations for Apple to use ARM in their notebooks. The first is a more unified software ecosystem, where iOS and OS X can eventually be merged together. The second is tighter control over their hardware and greater integration. In theory, Apple could co-design their entire system – hardware and software – to create better products. This is a similar approach that IBM and Oracle take to their proprietary high-end servers, and there are real benefits to engineering the entire system stack. On the business side, one of the advantages of dealing with ARM is that they are a relatively small company and the relationship is very asymmetric. Apple is simply so much larger that they might be able to steer the direction of ARM to suit their needs, whereas Intel is far too big to dictate terms. The last potential advantage is reducing cost. The microprocessor is a very large piece of the bill of materials in a notebook; it’s possible that Apple could save money by simply designing and manufacturing their own ARM chip, compared to paying Intel. Moreover, Apple is no stranger to switching hardware platforms – they have migrated instruction sets twice before. In the mid 1990’s, Apple moved from Motorola’s 68K architecture to IBM and Motorola’s PowerPC. For over 12 years, Apple stayed with PowerPC, until they finally moved to x86 in 2006. However, it’s important to understand the motivation for these migrations. In the case of 68K to PowerPC, it was very clear that Motorola would not be able to effectively compete with Intel. The prevailing theory was that the inherent superiority of a RISC architecture would enable IBM and Motorola to easily overtake Intel. Collectively, the three partners (AIM) would counter the dominance of Microsoft and Intel. In essence, the PowerPC switch was driven by performance and working with an existing partner (Motorola) and adding a new one (IBM). History proved that the advantage of RISC architectures over x86 was merely fleeting; manufacturing and design resources trumped the instruction set architecture. Motorola eventually proved incapable of keeping up with the x86 ecosystem and their last serious attempt was the 604e. IBM demonstrated with the POWER4 and POWER5 that they were eminently capable of designing high performance chips for their own server systems. Unfortunately, at this point, Apple’s needs diverged quite radically from their PowerPC partners. IBM’s server processors are designed for maximum performance, reliability and scalability and burn a great deal of power. The PowerPC 970 was a derivative of the POWER4, tuned for desktop systems, rather than large scalable servers. However, scaling an enterprise server chip down to notebook power consumption (~30W) is nigh impossible. Moreover, IBM had no interest in designing CPUs specifically for Apple’s low notebook volumes. IBM was far more interested in designing console CPUs, which were higher volume and also bought by less demanding and fickle customers. In contrast to IBM, Intel’s goals were much more closely aligned with Apple’s. The x86 market is driven by consumers, and leveraged into servers – rather than the other way around. Power efficiency and notebooks were the core of Intel’s success after the Pentium 4 debacle. Intel’s performance and power efficiency was leagues ahead of IBM for any client systems. Moreover, AMD is an effective foil and second source to Intel – there was never a credible high performance second source for PowerPC after the late 1990’s. Freescale (nee Motorola) was focused on the embedded market, and PA Semi was merely a start up. Intel was also hungry for Apple’s business and the positive press and influence that it would bring. Faced with IBM’s laggard performance and power efficiency for client systems and unwillingness to accommodate their needs, Apple threw their lot in with x86. Intel proved a willing and able partner, and they customized the packaging of several products specifically for Apple’s notebook needs. The Core Duo and Core 2 Duo were the first x86s used by Apple, but they have eagerly embraced subsequent generations. At each transition, Apple has preserved backwards compatibility for several generations of their platform. For the first migration, they built an emulator into Mac OS that interpreted 68K instructions to PowerPC; the OS itself assisted with kernel level compatibility (e.g. for interrupts). The emulator was eventually upgraded to use dynamic binary translation, rather than interpretation. The second time around was more challenging, since Motorola and IBM were hardly interested in helping. Instead, Apple enlisted a British start up, Transitive, to create a dynamic translation layer. Rosetta was not tightly integrated with OS X, and only translated user-mode PowerPC to x86. Discuss (95 comments)
<urn:uuid:0381d946-1ddc-4603-82ce-1de1b4ab104b>
CC-MAIN-2023-06
https://www.realworldtech.com/apple-stays-x86/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00632.warc.gz
en
0.9665
1,128
2.734375
3