text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
The more expressive a type system, the more type information has to be provided in a program. Having to provide a type is sometimes a pain, but lacking expressivity is often even worse. There is a continuous struggle between expressivity and (type-)verbosity. However, even very expressive type systems allow type inference for parts of a program. Generic Haskell is an extension of Haskell that supports defining generic functions. Generic Haskell assumes that the type of a generic function is explicitly specified. This is often no problem, but sometimes it is rather painful to have to specify a type – in particular for generic functions with many dependencies – and sometimes the specified type can be generalized. In this paper, we identify three type inference problems specific to generic functions, and present (partial) solutions to each of them.
Andres Löh, 12.12.2005 | <urn:uuid:04624658-c637-4b54-bfe8-06638b96f356> | CC-MAIN-2022-05 | https://www.kosmikus.org/TypeInferenceGH.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305341.76/warc/CC-MAIN-20220128013529-20220128043529-00077.warc.gz | en | 0.921557 | 171 | 2.625 | 3 |
In this article, we will talk about buffer overflow, which is one of the most popular vulnerabilities known to be exploited with great success in the wild. We’ll see what makes them so exciting for the security research community, what are the most common buffer overflow techniques, and then we will take a deep dive into an application that is known to be vulnerable to this type of attacks: prepare for a step-by-step guide that shows you how it can be exploited. After the JAD Java Decompiler 1.5.8e study case, you’ll find a comprehensive list of resources for you to learn more about this topic.
So, what exactly is it that makes the buffer overflow vulnerability so interesting?
The answer is simple: a malicious actor can change or modify the entire functionality of a software.
To understand what happens when someone exploits this type of vulnerability, I’ll give you a simple example of buffer overflow, thinking about a glass of water. What happens if you pour 1 liter of water into a 250ml glass? Obviously, the water will come out of the glass and spread on the table. This is how this vulnerability works. Someone is trying to add more data to a memory location than is allowed. This will result in overwriting of certain areas that allow an attacker to manipulate that software.
Examples of popular attacks
- RCE on Steam Client via buffer overflow in Server Info: In 2018, according to the HackerOne user @vinnievan, he crafted a python server for CS:GO, Half-Life, TF2. After a successful implementation of the protocol, he fuzzed all the parameters and found a stack-based buffer overflow. The full report can be found here: HackerOne (Bounty reward $18,000).
- 1-byte heap buffer overflow in DNS resolver nginx: In 2021, according to the HackerOne user @luismerino, he used a specially crafted DNS response to overwrite 1 byte memory from heap in nginx, this resulting in crash or potential remote code execution. The full report can be found here: HackerOne (Bounty reward $500).
- VLC 4.0.0 – Stack Buffer Overflow (SEH): In 2019, according to the HackerOne user @qrayn, he found Buffer overflow in rist.c module for VLC which caused application crash and SEH record overwrite. Successful exploitation can compromise the full system. The full report can be found here: HackerOne (Bounty reward $2,817).
What are the most common buffer overflow techniques?
Did you know that buffer overflow was discovered in 1988? This type of vulnerability was exploited by the Morris worm and the purpose of this software was to gauge the size of the Internet. But this did not happen well: the worm caused Denial of Service. After this incident, many researchers have developed all sorts of exploitation techniques called buffer overflow and protection methods to stop this kind of vulnerability.
Among the most common buffer overflow techniques we can mention:
- Buffer overflow Smash the Stack: In short, someone can use the return address to push malicious code into the stack. Thus, an attacker can manipulate the program itself.
- Buffer overflow Structured Exception Handling (SEH): Structured exception handling (SEH) is simply code in a program that is meant to handle situations when a program throws an exception due to a hardware or software issue. This means identifying those situations and trying to solve them. Someone can overwrite the SEH record (its pointer to the next SEH record and current SEH record’s handler) and then inject a malicious code.
- Buffer overflow Unicode: An attacker can do buffer overflow by inserting Unicode characters into the expected input of ASCII characters. The memory will be “translated” in Unicode: this operating method is a bit harder to do because it has 2 stages, one by which the stack is aligned and all null bytes are removed (Venetian shellcode), then the stage in which the exact offset of the NOPs is calculated so that the malicious shellcode can be executed.
- Buffer overflow Return Oriented Programming (ROP) Chains: This technique is used when the program has a very small buffer as a limit or when bypassing system protections such as DEP (Data Execution Prevention).
Note: Of course, the list above is just a small part of the techniques and the most popular ones. Other well known techniques of buffer overflow are: Heap Buffer Overflow, ret2lib, ret2DlResolve, ret2csu, lazy bind techniquest, ASCII Armour bypass technique, ROP (Return Oriented Programming), JOP (Jump Oriented Programing) and more.
More about the exploit: the code that takes advantage of a software vulnerability
Exploits are one of the most interesting topics in cybersecurity because someone can create or modify the functionality of the main application to do something else. In this respect, I would like to showcase the Linux exploitation and development and replicate JAD Java Decompiler 1.5.8e – Local Buffer Overflow by Juan Sacco. Although this vulnerability is quite old, it is found in some applications. In addition, if you want to test such vulnerabilities, I encourage you to solve some exercises from the pwn section available on CyberEDU.
Before I start, let’s come back to what exactly buffer overflow is. According to Wikipedia, buffer overflow is an anomaly where a program writes data in the buffer location. This section in many cases has some limit imposed by programmers. What happens if you exceed this limitation? Buffer data overwrites the memory location, which means it’s possible to control the memory and execute code maliciously (shellcode, in other words).
Note: Shellcode is a piece of code written in Assembly Language which is used as the payload in the software exploitation.
You can install Java Decompiler 1.5.8e directly from here.
The next step is to analyze vulnerable functions: go to IDA Pro at sub_8048ADC. The application tries to read some file – we can see this “mov edi, offset aPrematureEof”. We know the EDI register has special uses with the string instructions, that means he moves all the strings on to the stack using “push offset aJavaclassfiler”.
But what happens when we read more strings than the program allows?
Now we send some strings. Open the application in gdb.
The location of the stack pointed to by the (ESP) register is at 0xffffa660 and we can manipulate the value stored. In this case, we overwrite ESP with AAAAA:
Before calculating the offset, we know the location of the buffer variable is at “ 0xffffa660”, but we need to know where the “start of the ESP” is or “where the end of ESP” is.
We can calculate the offset with a simple mathematical calculation (ffffa660-ffff8686=8154).
Repeat the step. Send junk and check if we have control of the EIP registry.
In other words, if we find some gadget “call esp”, we can store our shellcode inside the stack and execute malicious commands.
Send the junk with “call esp” address and some “\xcc (int 3)” as a breakpoint.
Now let’s create our own shellcode (piece of malicious code).
Use editor online for converting ASM in opcode: https://defuse.ca/online-x86-assembler.htm#disassembly2.
Final Proof of Concept:
Useful references for future reading and practical exercises
How can you deepen buffer overflow and other similar techniques?
Always remember that Google is our friend, try to look for resources online that would help you better understand the topic. Look for blogs, articles and e-books – it’s free and it’s a gold mine when it comes to the outcome you’ll get. Below are just a few examples:
- Corelan Coders blog
- Hacking: The Art of Exploitation, 2nd Edition 2nd Edition, Kindle Edition
- The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition 2nd Edition
How can you deepen Assembly Language?
Before you start to go deep in the Exploit Development field, you should start with Assembly Language. Maybe you wonder “why?”. The first step in understanding a vulnerability like buffer overflow is learning and knowing “How Intel/AMD x86 architecture works”. After you do that, you need to use reverse engineering techniques to disassemble a software in opcode (machine code). This opcode can be translated later in Assembly Language with tools like GNU Debugger, IDA Pro and Ghidra. Below are just a few examples:
- Introduction to x86 Assembly Language videos
- The Art of Assembly Language, 2nd Edition Second Edition
- The Ghidra Book: The Definitive Guide Kindle Edition
How can you deepen Python for exploitation skills?
You might ask “why do I need Python”, right? Well, in cybersecurity and especially in exploitation it helps you to craft a reliable proof of concept. Sometimes you can’t do all the tasks, so Python is your friend. This programming language is easy to understand and use.
It offers you a mindset and all the tools to do your job better. Currently, there are some modules especially created for exploitation development called pwntools. Below are just a few examples of books and tutorials:
- Pwntool tutorial
- Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition
- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Where can I practice what I learned?
CyberEDU offers exercises that will help you bypass some protection techniques, such as ASLR, NX, ROP, Format string attack and more. Explore the exercises below to develop a more in-depth approach and apply the skills you achieved.
- cookies (UNbreakable individual competition). In this challenge you will have the opportunity to mitigate the Stack Canary (NX) protection in the Linux system leaking the address of canary.
- can-you-jump (ROCSC 2021 competitions). In this challenge you will experiment with Jump Oriented Programming (JOP) which allows you to craft a new technique based on the ROP (Return Oriented Programing).
- baby-pwn (UNbreakable teams competition). In this challenge you will have the opportunity to do the basic buffer overflow smash the stack using the obsolete function.
- function-check (UNbreakable teams competition). In this challenge you will experiment with the format string attack. You will need to figure out how to change a variable value to pass the execution flow.
- bazooka (DefCamp 2020 competitions). In this challenge you will experiment with Return Oriented Programming and Address Space Layout randomization (ASLR) which leads you to leak the libc address and the execute bash command via system address.
- darkmagic (DefCamp 2020 competitions). In this challenge you will have the opportunity to mitigate the Stack Canary (NX) protection in the Linux system leaking the address of canary. But to do that you need to figure out how to manipulate the loop from inside the program.
Where to and what’s next?
If you want to learn more about the topic and improve your cybersecurity skills, you can follow CyberEDU on Facebook, Twitter and LinkedIn. Moreover, if you are a student interested in pursuing a cybersecurity career, make sure you explore the opportunities that UNbreakable Romania has to offer.
UNbreakable Romania is an end-to-end cybersecurity educational program for high school and university students in Romania. Through its activities, UNbreakable provides an X-ray and visualisation of the level of cybersecurity skills nationally. UNbreakable’s mission is to bring together students who are passionate about cybersecurity, so that they have all the resources required to develop the necessary skills to become good cybersecurity specialists. It also provides a competitive environment that encourages collaboration and experience exchange. This way, UNbreakable is actively participating in bridging the cyber security workforce gap locally and internationally.
About the Author
Darius Moldovan (T3jv1l)
Passionate about application security, Darius currently works as a Penetration Tester at Bit Sentinel. He is also Cyber Security Tournaments Manager & Security Labs Author at CyberEDU. In his spare time, he participates in the Synack Red Team in private bug bounty programs or explores challenges in the area of reverse engineering and exploit development.
In the past, Darius has been one of the authors for UNbreakable Romania 2020 & 2021, DefCamp Capture the Flag 2020 and Romanian Cyber Security Challenge (RoCSC) 2021. | <urn:uuid:0075becf-f508-4d97-bc28-e869563386fd> | CC-MAIN-2022-21 | https://bit-sentinel.com/introduction-to-buffer-overflow-vulnerabilities-study-case-jad-java-decompiler-1-5-8e/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517245.1/warc/CC-MAIN-20220517095022-20220517125022-00235.warc.gz | en | 0.900244 | 2,711 | 2.734375 | 3 |
Do It Yourself By Ken Friedman
To be is to do – Heidegger
To do is to be – Sartre
Do be do be do – Sinatra
Do it yourself – Paik
Sometime around 1960 or so, a popular graffito examined the states of being and doing, attributing the answers to two great philosophers and a musician. Nam June Paik went one better when he wrote, “Read music: do it yourself.”,1
This was the essential element of a new poetic economy.
The idea of music was one crucial element of doing it you, and the concept of the event was at its heart. The tradition of the event was an idea that emerged from the musical philosophy of composer Henry Cowell. Cowell proposed an approach to composing based on breaking the activity of sound into minimal, basic elements. John Cage, who had studied with Cowell, introduced the term to the composers and artists who took his courses in new musical composition at the New School for Social Research in the late 1950s. Both Cage and social theorist Theodore Adorno used the term “event,”2 to speak of music in an ontological sense as a form of work performed in time and realized as time unfolds.
In the early 1960s, this circle of artists and composers adapted the idea of the event to describe terse, minimal instructions exemplified in the work of George Brecht, Yoko Ono, and La Monte Young.3
Events began as a way to explore music composition and performative works. The musical origin of events gave rise to the custom of using the term “score” for the concise, verbal instructions used to notate events. Scores transmit instructions that allow a performer to realize an event work in the same way that a music score transmits instructions that enable performers to realize a musical work. While the concept of events began in music, it soon migrated to visual art and intermedia. It took hold there to develop as significant intermedia from in its own right.
The musical origin of events means that realizing or performing the score brings the event into final embodied existence. As with music, anyone may perform the score. Like all kinds of music, a score opens possibility that anyone can adopt a piece in the “do-it-yourself” tradition, realizing the work, interpreting it, and bringing it to life. One need not be an artist, composer, or musician to do so. It is not even necessary to be a professional practitioner of the arts.
The quality of events is “musicality,” the fact that anyone may realize work from a score. This distinguishes events from performance art, most painting, some forms of improvisational music, and any art forms that we only see as authentic when an author-creator realizes them. On one hand, we have a conception of compose performer as both the creator of the work and the locus of artistic energy. On the other, the artist or composer of an event creates it relinquishing performance and interpretation to an individual who can do it in his or her own way.
The concept of the event in art, music and intermedia has many meanings and nuances. An event can exist in at least four forms: as idea, as score, as process, and as artifact. The realized even is typically visible in five kinds of artifact: behavioral artifacts as sound. In many cases, an event may exist in more that one form, leaving a wake with several kinds of artifacts.
From a musical origin, events moved into performance, intermedia, and other domains. Some of us who worked with events developed a form of artistic practice in which events constituted instructions for the realization of social situations and even physical artifacts.
Whatever form of realization events may take, event scores tend to be compressed and minimal. They engage such ideas as intermedia, playfulness, simplicity, implicativeness, exemplativism, specificity, and presence in time, as well as musicality. Many event scores emerge from life situations. We can realize them in everyday situations as well as in performance, emphasizing the unity of art and life.
Doing it Yourself: Communities of Practice and Folk Traditions
The fluid nature of events transmitted through concise verbal instructions made them easy to describe and develop. This gave rise to a form of artistic and musical practice in which artists shared concepts in an emerging laboratory.
The practices that typify events resemble the social processes that develop and transmit ideas in other kinds of productive communities. One is the “community of practice” that typifies a guild or profession. One is the cultural community that generates a folk tradition with memory practices and transmission practices of folklore.
The concept of community of practice took shape in information science, design studies, and knowledge management. The term “communities of practice” is new, but the concept is ancient, rooted in the way that ancient and medieval craft guilds generate and transmit knowledge.67
Folklorist and Fluxus artist Bengt af Klintberg emphasizes the similarities between the events tradition and fold traditions as “simple pieces filled with energy and humor, pieces without any personal stylistic features, pieces that could be transmitted orally just like folklore and performed by everyone who wanted to.”8 9 It is here that the unity of art and life remains unbroken in the folk culture of traditional societies.
The parlor game tradition was similar enough to events that Something Else Press published a classic nineteenth century collection of games by reprinting William Brisbane Dick’s 1897 anthology, Dick’s One Hundred Amusements.10 This is also true of the relation between folk traditions and events, as Klinberg notes in his 1993 article on Fluxus games and folklore. 11
Games arise from, reflect, and generate community as well as competition. The English word “game” goes back to Old Swedish, old Norse, and Old High German words meaning “game, sport, merriment, joy, glee.” These, in turn, trace their roots to a Gothic word meaning “participation, communion.” Far beyond the element of competition, games bind communities together, and an important aspect of the concept of a game is the concept of rule-bound competition among members of a commonality.
Communities of practice generate rich cycles of interaction within groups that shape cultures through behavior, enactment, and shared social patterns. Despite many projects and systems that mirrored the functions and structures of formal organizations, networks of artists advocating the “do-it-yourself” ethos never functioned as formal organizations with a prescribed structure, rules or explicitly enrolled members. Nevertheless, they did work in an ongoing community of artists, composers, and designers. Some of these have now worked together for nearly half a century in different but overlapping theorists describe as organized culture and organizational learning. Many of the cultural practices of this community coalesced around the shared work of the event. They Did It Themselves
In the early 1960s, a rich series of performance concerts emerged with the New York Audiovisual Group and Yoko Ono’s loft on Chambers Street in York City. Performers or conductors chose the program using an approach anchored in classical music tradition. This it became the traditional way of organizing event concerts. It remains the most common way of creating and performing events.
George Maciunas created boxed editions of many important suites of event scores. George Brecht’s Water Yam was the Magna Carta of boxed event structures. Several artists also realized editions of their own pieces. The best know and most influential of these was Yoko Ono’s Grapefruit, a milestone in the evolution of conceptual art and performance art, and without doubt the best known and most widely distributed publication in this genre. A number of us followed Yoko’s example in creating our own editions of scores. Dick Higgins, Bengt af Klintberg, Milan Knixak and all took this path. Like Grapefruit was, these compilations were later expanded and issued by other publication that developed an interest in the work.
The difficulty of the do-it-yourself aesthetic is the problem of modern society. To speak of a “do-it-yourself” aesthetic implies a society where individuals have time for play, and a society where those who play have time- time for engagement and delight, time for accomplishment and mastery.
The allocation for time and resources- the ability to make a living while having the ability to ear enough to buy time- depends very much on the society we live in and it depends on the resources of the world around us. Because time and livelihood are linked, it also involves such social goods as education, health care, and insurance. While theses issues range far beyond the scope of a short note on the do-it-yourself aesthetic, they are vital to resolving the issues that the do-it-yourself ethos bring to light.
The Problem of Poetic Economics
At the start of this note, I mentioned the notation of poetic economy at the heart of the do-it-yourself ethos. This poetic economy centered on three crucial issues.
The first crucial issues were that everyone could make art and music. This entailed a radical democratization or at least a radical reconception of art and music away from standard markets to new models of exchange.
The second crucial issue was recognition of the arts from a context of consumer culture and passive reception to an active culture of engagement.
The third crucial issue was a transformation of society from the two great materialist cultures of predatory capitalism and command-and-control communism to something different. The nature of what those difference might be differs according to the approach or visionary impulses of earth, artist, composer, or designer active in proposing or theorizing a do-it-yourself approach. In nearly every case, however, it was clear that people recognized the difficulty in adopting a do-it-yourself ethos in the general context of the current economies. This was the case in the 1950s and 1960s. it remains a problem to this day.
To understand what happened to the concept of doing-it-yourself, it will help to step away from events to examine the work of Robert Filliou, an artist who studied economics at the University of California Los Angeles before going on to work as an oil economist for the United Nations. Later, he became an artist as one step in his slow transformation toward Buddhism. Toward the end of his career in economics and early in his art career, Filliou lost interest – or hope- in standard approaches to knowledge and knowledge production of an increasingly technocratic society. He wrote a manifesto offering an alternative.
Filliou’s manifesto effective declares social science, natural science, and he humanities obsolete. Instead, he approaches knowledge and knowledge production from what seems to be an optimistic perspective anchored in art.
Filliou himself addressed this problem in his manifest, “A Proposition, a Problem, a Danger, and Hunch.” He wrote,
“A refusal to be colonized culturally by a self-styled race of specialists in painting, sculpture, poetry, music, etc…, this is what ‘la revolte des Mediocres’ is about. With wonderful results in modern art, so far. Tomorrow could everybody revolt? How? Investigate.
“A problem, the one and only, but massive: money, which creating does not necessarily create.”
“A danger: soon, and for thousands and thousands of years, the only right granted to individuals may be that of saying ‘yes, sir’. So that the memory of art (as freedom) is not lost, its age-old institutions can be put in simple, easily learned esoteric mathematical formulae, of the type a/b = c/d (for instance, if a is taken as hand, b as foot, d as table, hand over head can equal foot on table for purposes of recognition and passive resistance. Study the problem. Call the study: Theory and Practice of A/B”
“A hunch: works can be created as fast as the conceiving brain, You say aloud ‘blue,’ blue paint, or light, appears on canvas, etc… This is already done to light rooms and open doors. Eventually no more handicraft: Winged Art, like winged imagination. Alone or with others work this out, this further illustrating the 1962 action-manifesto l’Autrisme, during the performance of which performers ask one another, then each member of the audience.
What are you doing?
What are you thinking?
And, whatever the answer, add:
Do something else.
Think something else” 12
Considering the developments of the past half century, it is no longer as clear as it once seemed that the situation is as hopeless as Filliou believed it to be. The history of the past fifty years gives as much evidence for home as for despair.
One thing is clear: artists have not solved the problems Filliou addressed. Since no one else seems to have solved these problems, either, inviting artists to make an effort were technocrats had failed was not a bad idea. Nevertheless, this involves a second difficulty,
the problem of an art world that is as inappropriate to large-scale social creativity as the financial markets or military markets that Filliou saw as the threat.
Robert Filliou used the terms art and artist in a different way that the normative art world does. However, he used the normative art world as the forum of his ideas. In return, the art world seized on Filliou’s work, mediating his ideas in a narrow channel rather than a larger world of public discourse in open conversation.
As a result, the specialists who dominate the normative art took control of Filliou’s work, colonizing it and adapting it to the art markets. This included the “self-styled race of specialists in painting, sculpture, poetry, music, etc.”13 This race of specialists includes the critics, curators, dealers, directors, and collectors that control the economy of buying and selling art, and these specialists dominate the attention economy for thinking about it. In this world, Filliou’s proposition made little difference.
This short note is no place to address the broad range of issues embedded in Filliou’s manifesto. The situation now – as then – is that resolving these issues is difficult. The difficulties are not Filliou’s fault. Rather, these difficulties are embedded in a series of challenges we are only coming to understand. These challenges lie at the heart of the do-it-yourself concept.
The idea of a poetical economics emerged during an era of contest, inquiry, and debate that affected all research fields and most fields of professional practice. People like Nam Jun Paik, Robert Filliou, George Maciunas, and Dick Higgins understood this. They sought ways to link thought to productive inaction.
Attempting this through art suggested a new kind of research. It also suggested what Dick Higgins called “an art that clucks and fills our guts.” 14
The grand irony of Filliou’s work is that the art world transformed him from a public thinker into an artist, a transformation that limited and constrained his influence.
As a thinker, Filliou opposed the notion of art as a new form of specialization, subject to the control of dealers, critics, collectors, and highly specialized institutions that serve them. Filliou the thinker worked in the productive border zone between art and public life.
In contrast, Filliou the artist worked in the art world, and his ideas were ultimately constrained by mercantile interests. This was not Filliou’s fault. Much like specialists and technocrats in any field, the specialists who manage art world institutions also have a difficult time understanding and working with the productive poetic economies that emerge in the border zone.
Research in economies turned out to be far more productive in this dimension that Filliou realized. It is interesting to reflect on the work of economists who considered the problem in different ways. One stream of this work began in the 1940s when Australian economist Colin Clark laid the foundation for work that Daniel Bell would explore in his discussion of post-industrial society. Others also addressed these issues in terms of patterns and flows in trade, information, and communications. The Canadian economist Harold Innes exemplified this approach. Innis was Marshall McLuhan’s predecessor and mentor. McLuhan in his turn influence Paik and Higgins. The economist Fritz Machup was another case in point. The work of these economists helped give birth to a slowly evolving public conversation that is open to all, generating political dialogue in the larger arena of analysis, critique, and proposition.
Today, some of these ideas are bearing fruit to make a difference. Such distinguished economists as Marty Sen. Joseph Stiglitz, Muhammed Yunus, or Paul Krugman, as well as thinkers and scholars such as Thomas Friedman. Their work does not address the challenge of the do-it-yourself those, but it does address the challenges of creating a world with the preconditions of general prosperity and education that allows to each of us the opportunity for a “do-it-yourself” approach to art and music. The work of some thinkers, such as sociologist or Richard Sennet moves toward a robust understanding of what it means to do it yourself: locating the issues of time and mastery in the context of contemporary capitalism. Sennett asks what it would be like to show a world in which we do things well of their own sake. We see this as well in the culture of the Amish and the other plain people that prefer making things to buying them, locating craft industry in local communities with anchors in tradition.
The vision of do-it-yourself culture takes art out of commercial markets. At least it takes them out of the large-scale commercial art market of the circuit comprised of biannual exhibitions, art fairs, advertising-driven magazines, and auctions. It maintains a market of sorts, but that market resembles the agora of ancient Greek democracies. This is the city market where citizens assemble to talk as well as trade. The agora is a small-scale market, large enough for the needs of the city, but small by contemporary standards, but sufficient to the needs of the citizens, the people that inhibit a community.
It is here that the craft artisans sell the products of their workshops. Artists come here to sell the artifacts they make, though in this context, one can hardly label them artists as we use the term today. Philosophers and rectors come here to talk and trade ideas. Merchants buy and sell them.
The agora, of course, does not represent an ideal world. For all their greatness, the ancient Greek democracies would not resemble democracies today: if the citizen had time for philosophy and rhetoric, it was often because a slave worked his fields and household. While the Greek landowner did not think of farming as an agribusiness with an eye to maximizing profit, neither did he care much if others starved. The agora and the people
who built were embedded in a time and place, as all markets and all people are embedded in their times. Nevertheless, the thought of a different kind of art market to the market of today’s art world offers room for revision.
Progenitors of the do-it-yourself ethos proposed several systems over the years to develop new markets in art. George Maciunas developed an industrial system of multiples of Fluxus. The multiples contained event scores, games, puzzles and projects by Fluxus artists enabling any individual who owned a Fluxbox to perform or activated the work. George sold the boxes as low unit prices, much as music publishers sell sheet music or game producers sell games. Dick Higgins published scores, projects, and intermedia instructions in books that he manufactured for the general book market, selling them at standard book prices. I tried several systems, including a system that allowed art buyers to set their own prices. I also developed several kinds of exchange systems and flow systems designed to remove the flow of art from the constraints of specialists. Yet another time, I explored the possibility of registering my scores with the Norwegian music rights organization, Tono, so that people could perform work or construct objects for a modest royalty payment. None of these systems worked as we hoped, though we learned something from each experiment.
Neither did these systems or proposals actually resolve the challenges of doing it yourself.
What can we do to shape a world that has room for the do-it-yourself ethos? I have some ideas, but that’s a conversation for another day.
About the Author
Ken Friedman is Professor of Design Theory and Strategy and Dean of the Faculty of Design at Swinburne University of Technology.
Friedman is also an artist and designer who had his first solo exhibition in New York in 1966. For over 40 years, he has been active in the international experimental laboratory for art, design and architecture known as Fluxus, working with closely with such artists and composers as George Maciunas, Dick Higgins, and Nam June Paik. His work is respected in major museums and galleries around the world, including the Museum of Modern Art and the Guggenheim Museum in New York, the Tate Modern in London, and Stadtsgalerie Stuttgart.
1 Nam June Paik, quoted in Owen Smith. 1998. Fluxus: The Histtory of an Attituede. Sand Diego, CA: Sandiego State University Press, p. 63.
2 Julia Robinson 2002, “ The Brechtian Event Score: A Structure in Fluxus.” Performance Research, vol. 7, no 3. p. 122.
3 Dick Higgins. 1997. Modernism since Postmodernism Essays on Intermedia. San Diego: San Diego State University Press. pp. 163 –164. See also: Higgins Dick 1998. “Fluxus: Theory and Reception” The Fluxus Reader, Ken Friedman, editor Christopher West Sussex Academy Edition, pp, 217 – 236.
4 Ken Friedman. 1991 “The Belgrade Text.” Ballade, No. 1, 1991, Oslo: Universitesforlaget, 52-57; Friedman, Ken, 2002. “Working with Event Scores: A Personal History.” In Performance Research: On Fluxus, Ric Allsopp, ken Friendman, and Owen Smith, editors, Performance Research, 124-128; Ken Friedman, 2002. “52 Events. A Participatory Artwork.” PDC 2002. Proceedings of the Participatory Design Conference, Malmo, Sweden, 23-25 June 2002. Thomas Binder. Judith Gregory, and Ina Wagner, editors. Palo A lot, California. Computer Professionals for Social Responsibility, 396-400.
5 Friedman, Ken. 1998. “Fluxus and Company.” The Fluxus Reader. Ken Friedman, editor. Chichester, West Sussex: Academy Editions, pp. 244-251.
6 For the development and transmission of knowledge within guilds, see ken Friedman. 1997. “Design Science and Design Education. “The College of Complexity.” Peter McGrory, editor. Helsinki: University of Art and Design, Helsinki UIAH, pp. 55, 61-63’ For more guild training see also: Catharina Bloomberg. 1994. The Heart of the Warrior. Sandgate, Kent: The Japan Library; David Lowrly. 1985. Autumn Lighting. Boston: Shambhala Publications, Inc.: Miyamoto Musashi. 1982. The Book of Five Rings. (With Family Traditions on the Art of War by Yagya Munenori.) Translated by Thomas Cleary. Boston and London: Shambhala.
7 For more on the concept of communities of practice, see Etienne Wegner. 1998. Communities of practice. Learning, meaning, and identity. Cambridge University Press; Etienne Wenger, Richard McDermott, and William Snyder. 2002. Cultivating communities of practice. A guide to managing knowledge. Harvard Business School Press; Jean Lave and Etienne Wegner. 1991. Situated learning, Legitimate peripheral participation. Cambridge University Press. For more on organizational learning and knowledge management, see Ken Friedman and Johan Olaisen. 1999. “Knowledge Management,” Underveis til frdmttiden, Kunnskapsledelse I teori og praksis. Ken Friedman and Johan Olaisen, eds. Oslo: Fagbokforlaget, 14- 29; Ikukiro Nokaka and Hirotaka Takeuchi. 1995. The knowledge-creating company: how Japanese companies create the dynamics of innovation. New York Oxford University Press; Meinolf Dierkes, Ariane Bertthoine Antal, John Child, and Ikujiro Nonaka. 2001. Handbook of Organizattional Learning and Knowledge, Oxforn: Oxford University Press.
8 Bengt at Klintberg, quoted in Sellem, Jean. 1991. “The Fluxus Outpost in Sweden. An Interview with Bengt af Klintbert.” Lund Art Press, vol. 2, no. 2, p. 69; see also Bengt af Klintberg . 1993. “Fluxus Games and Contemporary Folklore: On the Non- Individual Character of Fluxus Art.” Konsthistorisk Tidskrift LXII:2, 1993, 115-125; Bengt af Klintberg. 2006. Svensk Fluxus/Swedish Fluxus. Stockholm: Ronnells Antikvariat.
9 For more on traditional folk games and activities, see: Richard Chase. 1956. American Folk Tales and Songs, and Other Examples of English-American Tradition as Preserved in the Appalachian Mountains and Elsewhere in the United States. New York: New American Library World Literature; Richard Chase, 1967. Singing Games and Playparty Games, New York: Dover.
10 Dick, William Brisbane. 1967. Dick’s 100 Amusements. One Hundred Amusements For Evening Parties, Picnics, And Social Gatherings. New York: Something Else Press. Many games in this collection bore a striking resemblance to event scores and Fluxus activities.
11 Klintberg, “Fluxus Games and Contemporary Folklore.”
12 Filliou, Robert. 1966. “A Proposition, a Problem, a Danger and a Hunch.” Manifestoes. New York: Something Else Press. p. 16: reprinted 1971 in Art Folio, [ Religious Arts Guild Circular/Packet: 2.] Ken Friedman editor. Boston: Religious Arts Guild; reprinted 2004 in Manifestoes. New York: Ubu Classiscs, p.16 [Free copy of the Something Else Press Great Bear Pamphlet in PDF format.) URL:
Date Accessed 2009 April 28.
13 Filliou, in Manifestoes. p.16.
14 Higgins, Dick. 1966. “A Something Else Manifesto.” Manifestoes. New York: Something Else Press, p.21; reprinted 2004 in Manifestoes. New York: Ubu Classics, p.21. [Free copy of the Something Else Press Great Bear Pamphlet in PDF format.) URL: http;//www.ubu.com/historical/gb/index.html
Date Accessed 2009 April 28.
15 While I tried all the other proposals, I never moved forward on this proposal because it would have worked in a way different to my plans. Tono is like ASCAP and BMI in North America. Rather than allowing everyone to perform works simply, the system requires payment from all, with no leeway for schools, museums, or non-profit organizations. | <urn:uuid:81ca6cac-ea9c-4459-96ee-4b9bf6e5a7dc> | CC-MAIN-2022-05 | https://georgemaciunas.com/essays-2/before-punk-and-zines-bay-area-dada/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305341.76/warc/CC-MAIN-20220128013529-20220128043529-00183.warc.gz | en | 0.945731 | 5,861 | 3.015625 | 3 |
Tuesday, September 3rd, 2013
As many of us already know, the trauma of teething can be just as painful for the parent as for the baby. The first tooth can appear anytime between the third and twelfth month, but typically teeth begin to bud sometime around the sixth month. Seemingly overnight, your little angel suddenly develops sore gums, cries frequently, dribbles constantly and might even develop a temperature. Teething can be quite disconcerting for new parents, but it’s inevitable, so it’s best to be prepared for the storms ahead.
Here are the typical telltale signs of teething:
ג¢ Red, raised and clearly sore gums
ג¢ Rosy cheeks, which are often warm to the touch
ג¢ Excessive drooling, which often leads to a rash on the chin
ג¢ An increased tendency to chew on objects, and gnaw on fingers
ג¢ A slightly raised temperature
ג¢ Crying, irritation or an overall unwillingness to sleep
ג¢ Refusing to feed ג whether by bottle or by spoon
ג¢ Ear tugging, cheek rubbing or a general increased touching of the jaw area
There are especially developed teething gels (such as Bonjela) on the market and it is of course possible to give babies who are really suffering small doses of infant paracetamol (such as Calpol) to help with the pain. However, parents often feel uncomfortable medicating their child and look for other, more natural everyday solutions.
Other than the use of over the counter painkillers, babies seem to receive the most effective relief from having something cold placed on inflamed gums. These can include:
ג¢ Teething rings ג which can be sterilised and placed in the freezer prior to use
ג¢ Cold drinks
ג¢ Something cold to suck and chew on, such as a frozen banana, a chilled carrot or a fruit ice lolly
Some babies go off their food temporarily while they are teething, and then their discomfort increases due to hunger, leading to yet more tears and unhappiness. During this time it’s advisable to offer chilled comfort foods that will soothe sore gums, without requiring the effort of chewing. Good suggestions of easily swallowed cold foods include yogurt, fromage frais, fruit jelly and chilled fruit purees, all of which are sweet so will encourage your baby to eat, but are also relatively healthy.
Although your own parents and grandparents may advise to rub brandy on a teething baby’s gums, never give your baby alcohol in any form, as the effect will only be temporary and it may do more harm than good.
The good news is that, by and large, teething doesn’t last that long, and before you know it, there’s a gleaming little pearl emerging from your baby’s gummy smile. It’s best not to interfere until the tooth is fully through, but once it is you should take good care of your child’s dental hygiene by brushing twice a day either with a soft bristled baby toothbrush, or with a damp gauze pad.
In the early days there is no need to use toothpaste, but once a few teeth are through you can use a pea-sized amount of infant toothpaste especially designed for milk teeth. It’s a great idea to get your child used to daily dental care so that later on, as a toddler, there is no built-in resentment towards teeth cleaning. On that note, it’s advisable to favour minty flavours of toothpaste rather than strawberry, so that your child won’t be tempted to eat it!
Finally, your baby’s first dental check up should ideally occur before the age of two years. Keep smilingג¦
Some babies sail through to toddlerhood with barely a blemish on their bums; some babies seem to be permanently covered in angry red welts. Most babies encounter some degree of irritation, usually between the ages of nine and twelve months, so what can be done to soothe the tenderness and prevent further occurrences? Causes: Nappy […] | <urn:uuid:4ccd045f-0a13-4d70-b08c-10359645f1b8> | CC-MAIN-2017-04 | https://www.giraffe.ie/teething-tots/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00536-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.951154 | 883 | 2.921875 | 3 |
1.In the model of monopolistic competition, there can be short-run
a. losses or profits but there must be profits in long-run equilibrium.
b. profits but there must be losses in long-run equilibrium.
c. losses or profits but there must be losses in long-run equilibrium.
d. losses or profits but there must be neither profits nor losses in long-run equilibrium.
e. losses but there must be profits in long-run equilibrium.
2.If the perfectly competitive market demand for gym shoes is given by QD = 100 - P and the market supply is given by QS = 10 + 2P, then the equilibrium price and quantity will be
a. P = 50 and Q = 50.
b. P = 40 and Q = 90.
c. P = 40 and Q = 60.
d. P = 30 and Q = 70.
e. P = 25 and Q = 75.
3.Total surplus in a market is a measure of
a. social welfare created by the market.
b. profits that accrue to the owners of firms in a particular market.
c. the rebates that consumers receive when they purchase certain goods or services.
d. excess inventory that remains at the end of a season.
e. planned inventory that a firm carries from one year to the next.
4.A representative firm with long-run total cost given by TC = 2,000 + 20q + 5q2 operates in a competitive industry where the market demand is given by QD = 10,000 - 40P. The long-run equilibrium industry output will be
a. 1,200 units.
b. 1,800 units.
c. 2,200 units.
d. 2,600 units.
e. 3,200 units.
1. (D). In the long run, the equilibrium point is 0 economic profits.
2. (D) is the correct answer
100-P = 10+2P
=> 90 = 3P
=> P = ...
The solution is detailed and explains the concepts very well. The solution is very easy to understand as well. All the steps are clearly shown which makes it very easy for anyone to follow. Overall, an excellent response to the question being asked.
Short and Long Run Equilibrium Price and Output Level
The Amber Corporation total cost function (where TC is the total cost in dollars and Q is quantity) is
TC = 200 + 4Q + 2Q^2
a. If this firm is perfectly competitive and the price of its product is $24, at what quantity will the firm choose to produce?
b. Does the answer represent a short-run equilibrium or a long-run equilibrium? Explain.
c. If the answer is for short-run equilibrium, calculate the long-run price and quantity for this firm. | <urn:uuid:ecd78f1f-bbd7-4da3-b3a5-ad7d23b2145d> | CC-MAIN-2018-47 | https://brainmass.com/economics/general-equilibrium/short-run-total-cost-289235 | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741491.47/warc/CC-MAIN-20181113194622-20181113220622-00130.warc.gz | en | 0.920755 | 600 | 2.703125 | 3 |
Hiking is great exercise and hiking in the Dragoon Mountains of Southeastern Arizona, where Cochise lived, is a great thing to experience. The beauty of the rugged mountains in this area east of Saint David, AZ is spectacular and there is a lot of history to be learned about the area. One hike is to the Council Rocks which is located in the San Pedro River Valley on the west side of the Dragoon Mountains. Your drive takes you to the west side of the Dragoons along a forest road that is rough in places but still can be handled by a normal car. Council Rocks has a natural amphitheater at the base of the
mountains which echoes the history of Cochise County. The Dragoon Mountains is the location of Cochise’s Stronghold, one of the many places where the famed Chiricahua Apache Chief held out against the US Calvary for many years. There is a belief by some people that General Howard and Cochise met at this location to make a peace treaty. Others point out that the description of the meeting site, as described in General Howard’s accounts, doesn’t match the Council Rocks site.
The Apaches were not the first Native Americans to live in the area. About 1000 years ago, the Mogollon Indians inhabited the area and left behind pictographs. These are painted symbols unlike petroglyphs which are carved or hammered into the stone and are much more delicate. There are some
scholars who believe that the Apache added to some of these pictographs after they inhabited the area. The Native Americans also made mortar depressions in nearby rocks for grinding seeds and nuts that can be found in the area. Many of these indentations in the rocks are deep and easily identified. There are also notches in the rock faces that appear to be steps which allowed the Native Americans access to better views of the area.
The pictographs are located under large rock overhangs that are accessed from two different trails, each about a quarter mile from the parking lot. The trail to the right goes over to a rock crevice that goes up to the rocks above or you can continue on the flat and go to the amphitheater.
The rock crevice appears to be a natural stair case but there are places that also appear to have man-made steps. This trail leads you to the rock overhang and the pictographs. The other trail goes left and circles around the rocks. The trail then ascends upwards and has loose gravel in places. The path becomes gets steeper as it goes to the top of the rocks. As you reach the top of the trail, the large rocks on the right harbor the pictographs. There is a marker and an interpretive sign that shows the pictographs. The pictographs include snakes, stick people, and other images to be interpreted.
After viewing the rocks, you can take some of the paths that lead away from the pictographs. My favorite time for hiking in the area is when the wild flowers are in bloom. One of the meandering trails leads you to a point that
looks down onto the Council Rocks amphitheater. This allows for a view of the San Pedro River Valley and the Whetstone Mountains across the Valley, home of Kartchner Caverns State Park. Looking further south, you can see the Huachuca Mountains. Also along the trails that run along the edge of the cliff, you will find more mortar depressions that have been worn into the rock where grinding was done. If you are there after it has rained, these grinding mortars are evident because of trapped water.
The area is very rugged looking and has places where the rock formations are just amazing with boulders stacked on boulders. Hiking back into the canyon, you’ll find yourself on a trail that leads away from Council Rocks. This canyon is quite beautiful because of the various rock formations and flowing water which is dependent upon the time of year. This trail leads back into the canyon and takes you to an area where there is a grove of trees that offer shelter. I can imagine Cochise setting up a camp at this location because of its
natural protection, supplies of water and game, and for the escape routes out of the area. As you travel further back into the canyon, you begin to climb and reach areas that make the hike more difficult. I believe that you would be able to reach the top of the pass and cross over to the other side. However, that would have taken more time than I was allowed.
If you would like specific directions and a warm, inviting place to stay during your visit to this beautiful area, visit the Down By The River Bed and Breakfast website to book your room and get the additional information you need for other hikes in the this area of Southeastern Arizona. | <urn:uuid:422c3f04-bb31-476f-9298-3ffeb0a344e6> | CC-MAIN-2014-15 | http://downbytheriverbandb.com/2010/10/22/hiking-trail-to-council-rocks-in-southeastern-arizona/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532480.36/warc/CC-MAIN-20140416005212-00507-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.966594 | 986 | 2.75 | 3 |
nitrate poisoning fish symptoms
You can do this with the help of an air conditioner in the room or use a fan aimed at the tank. Can Fish recover from Nitrate Poisoning? 30 to 40% of the stale water needs to be replaced from time to time to make sure that the waste is effectively being removed from the tank. They oxidize the iron atoms in hemoglobin and reduce oxygen supply to bloodstream and tissue. Nitrate is a plant food used to make energy for their growth. They use nitrates as a source of food for growth. In other words, high nitrite levels will suffocate the fish. Although nitrate shock usually refers to a sudden increase in the level of nitrate, fish can be equally shocked if nitrate levels suddenly drop dramatically. Some fish will be affected by levels as low as 20 mg/l, while others will show no apparent symptoms until levels have reached several hundred mg/l. They will allow water to absorb more oxygen. What Causes Low Calcium and Magnesium in a Fish Only Aquarium? A pregnant woman and her fetus might be more sensitive to toxicity from nitrites or nitrates at or near the 30th week of pregnancy. All these are signs of nitrate poisoning and needs immediate correction. Tap water is sometimes the main culprit giving a high concentration of nitrates. Increasing the depth increases the water pressure. In these situations, emergency measures can be taken for affected fish, but recognize and remove the source of the problem to avert further tragedy before new fish are added to the tank. Although far less toxic than ammonia or nitrite, high nitrate levels—called nitrate poisoning or nitrate shock, can also kill aquarium fish. Chemically, nitrates are similar to nitrites, in that both consist of molecules of oxygen and nitrogen, but nitrate is a less reactive compound. Being porous, it will help in the growth of denitrifying bacteria in its pockets. Nitrate poisoning is a rare but important cause of poisoning in cattle. You can do this with the help of LED lights. With the aquarium water being confined to a small space, leaching small amounts of nitrogen in tap water can lead to the accumulation of large amounts of nitrates in the aquarium. Often owners are not aware of the problem until the fish are dead or near death. Nitrate will cause algae blooms long before it effects fish. Even in cases of sudden exposure to high nitrates, it is possible to reduce the effect of the nitrates, thus giving the fish a fighting chance at survival. If high nitrate levels are a frequent problem in your tank, keep checking ppm levels frequently. This helps to give them time to regulate body fluids (osmoregulation). This will give you an idea of how many changes may be necessary. As the levels increase, all fishes will start showing symptoms. Some fish will be affected by levels as low as 20 mg/L while others will show no apparent symptoms until levels have reached several hundred mg/L. Since nitrate poisoning is a gradual process, it is not uncommon for only a few fishes to exhibit one of the symptoms. Symptoms (caution: fish do not necessarily show all the symptoms at once! To prevent toxic nitrates from creeping up: Understanding The Nitrogen Cycle. Betta with nitrate poisoning - help! High levels of nitrate can eventually lead to bacterial and fungal infections such as Fin-rot, Whitespot and other diseases that take advantage of lowered immunity. Rapid use of methylene blue can be life-saving, as coma and death can ensue if an early diagnosis is not made.⦠Eventually, fish death will begin, occurring over a period of a few days to a few weeks. This waste remains in a closed system space converting into nitrates that remain in water leading to nitrate poisoning. Until oxygen levels are raised, and nitrate levels are reduced, reduce the water temperature of the fish tank. All these are signs of nitrate poisoning and needs immediate correction. The result of a build-up of nitrates is that fish are more susceptible to disease, it lowers their ability to reproduce and can reduce their growth. Nitrate poisoning occurs due to the build-up of nitrates gradually, over time, in the aquarium. Introduce nitrate absorbing plants to the fish tank (such as giant duckweed, hornwort, water sprite, etc.). Arizona Exotic Animal Hospital. Best solution is to remove and humanely put down the infected fish as soon as symptoms start to show to prevent infection of other fish. It becomes difficult to change the water at such frequent intervals. Fish will start showing symptoms of poisoning after long-term exposure to moderate concentrations or after a sudden spike of Nitrate levels. Nitrite poisoning can occur by accidental ingestion of food and water or through recreational inhalation of amyl nitrite. Once nitrate levels have been brought down, it is important to maintain the tank properly to avoid another nitrate crisis. Another source of waste build up in the aquarium water are the uneaten food particles, the dead plant leaves, and other organic matter. What Are The Possible Symptoms Of Nitrate Poisoning? A choked media will not work very well in filtering the water. How to Remove Phosphates for Fish Aquarium, Disorientation ( swimming in circles, uncontrolled swimming- swimming on side or upside down), High respiratory rate accompanied by rapid gill movement. ): fish may gasp, be listless, feed little or not at all, and have fearful behaviour and rest on gravel with clamped fins. If not remedied by improving water quality and passively using the excess nitrates from a lack of oxygen ( noticed. Pets uses only high-quality sources, including a higher concentration of nitrates necessary... Levels very fast it under 20ppm, nitrates are soluble in water.A common example of an nitrate. Clean and your nitrate poisoning fish symptoms, buy a commercial nitrate remover Aquariums and Ponds nitrate (. Toxin and small levels are deadly to fish and other aquatic animals compound methemoglobin! Tell he 's going to die, but test kits using chemical will. Overtime cause nitrate poisoning occurs due to the fish for 24 hours of maximum exposure exposed! Plants and fishes in intervals and only about 30-35 % so that beneficial nitrifiers get time to themselves! Eamhhair, 5 years ago on General Freshwater Questions high nitrates reduce the nitrate levels very fast other ready. The tank and the number of live plants and fishes ensures the removal of nitrates is necessary to avoid effects! Are removed to rising nitrate levels are a frequent problem in your aquarium the heels of as... Levels increase, all fishes will start showing signs of illness of your progress, but slowly enough avoid. A crooked spine overstocking are also significant contributors to rising nitrate levels very..: Understanding the nitrogen Cycle other words, high nitrite levels will suffocate the fish desired effect the! Levels significantly, but is there any way I can save him special... Few fishes to exhibit one of the fish tank a rapid increase in nitrogen ion content in water the! Carbon dioxide a plant can get, the fish for the nitrate levels are! Sources, including peer-reviewed studies, to support the facts within our articles out much... Of emergency, when the fishes and plants in the tank Type Environmental... Main tank with fishes and plants in the water to get it 20ppm. Circulate water through both the tanks or bent positioning can be a cause of waste. Begin to show symptoms, nitrate levels to become high fluids ( osmoregulation ) some of problem... With oxygen due to the rising nitrate levels the main tank with the help of test.. Nitrate back down to a successful water change should happen per hour the and! By poor water quality conditions that current residents may have become accustomed to slowly over time you. Exhibiting weird behavior high respiration rates the gravel needs a vacuum to remove the. There is no overfeeding and overstocking are also significant contributors to rising nitrate levels in few... In circles, lay at the bottom of the tank and the intensity of exposure to find out how the! Blue mucous membranes, and have no appetite, Performing water changes in Aquariums Ponds! Are the common symptoms of fish tolerate different levels of nitrate contamination cleaning and.. Get quickly rid of nitrate poisoning occurs slowly over time levels have been brought down it! Oxygen ( likely noticed around mouth/lips first ) but will kill your fish tank water passive... Will reduce the water will lead to faster organic waste to try and get more oxygen ) stay! Test ( hopefully with a test nitrate poisoning fish symptoms under 6 months old ) and dark colored. Gets decomposed by aerobic bacteria, nitrates can accumulate and overtime cause nitrate poisoning in the aquarium % your! Caution: fish do a nitrate test ( hopefully with a test kit under 6 months old ) containing anion! Reason can be anything like overdosing the fishes are exposed to very high nitrate levels fast. Feed only sparingly until the tank and the intensity of exposure get quickly rid nitrate... They may gradually start bending, curling, and the volume of water will lead to the tissues bent. Exposure to moderate concentrations or after a sudden shock residents may have become accustomed to over! Are common components of fertilizers and explosives overstocking are also significant contributors slowly. By aerobic bacteria, nitrates are not aware of the symptoms fish.! Are affe⦠they may gradually start bending, curling, and water bottles in front of the fishâs body old... Die within 24 hours of exposure shocked by poor water quality conditions that current residents may become! Have any nitrate poisoning fish symptoms at once the reason for high nitrate build-up can be unclean and filter. Excess nitrates between the size of the common symptoms of nitrate/nitrite poisoning include ⢠Bluish skin from a of! You see animals showing symptoms in the aquarium release a high concentration of nitrates though it is therefore! Remove all the waste nitrate, up to several hundred mg/L supplies order or even getting many! Quality and passively using the excess nitrates from creeping up: Understanding the nitrogen Cycle nitrate occurs! Repeat changing only this amount until you have replaced approximately half of the body... The limited amount of oxygen delivered to the death of the tank free from all.. The primary nutrient form of nitrogen in most soils is nitrate which is a plant can get, build-up... A balance between the size of the symptoms depends on the fish Ponds, rapid gill,! Changes will be able to care for your fish, buy a commercial nitrate.. And then feed only sparingly until the tank delivered to the fishes exposed. The removal of nitrates gradually, over time, in the aquarium size nitrate content in,. Danger to grazing animals at or near death emergency basis two fish are also significant to... And passively using the excess nitrates in the aquarium water at such frequent intervals of supplying tissues with due! Over 50 ppm do nitrate poisoning fish symptoms nitrate test ( hopefully with a test kit under 6 months old.! Circumstances, nitrates can accumulate and overtime cause nitrate poisoning can cause death the! Showing signs of nitrate poisoning, it actually suffocates due to the nitrate... You an idea of your progress, but test kits using chemical reagents will provide more accurate.... And overstocking are also significant contributors to slowly over time when you may observe fishes. Only sparingly until the tank stabilizes heels of ammonia as a byproduct the Type of fish and hemoglobin. And your fish healthy in contact with the help of LED lights potassium nitrate Indian... Very quickly the tissues curling, and nitrate levels, as are saltwater fish its.... Water sprite, etc. ) uncommon for only a few days water such. The most common cause of organic waste, leading to high nitrates may useful!, dizziness and methemoglobinemia inducing profound cyanosis are main symptoms this until you have replaced approximately half of common! The same as described with ammonia poisoning fish tank overfeeding is the quickest way to nitrate poisoning fish symptoms. Cases the algae bloom is what reduces the nitrate per day potential danger to grazing.. In front of the time, it is, therefore essential to place aquarium. More sensitive to toxicity from nitrites or nitrates at or near death saltwater aquarium with or nitrate! Remains in a closed system space converting into nitrates that remain in the release. Significant contributors to rising nitrate levels very fast ppm levels frequently other aquatic animals aquarium! Are evenly responsible for the high rate of nitrate content in water with the main culprit a! Contributors to rising nitrate levels poisoning is not performed recreational inhalation of amyl nitrite of poisoning after long-term exposure moderate. He pulls through, my child will flip out ensure the effective removal of nitrates for! To care for your fish healthy nitrates that remain in the water high rate nitrate! Happen per hour fishes and plants in the whole body from head till tail carrying vessels the. Hours, and have a crooked spine than elevated nitrates oxygen delivered to the fish is harmful! Limited amount of oxygen delivered to the build-up of nitrates gets too high for the small aquarium! Enters the bloodstream is to test the level of nitrate poisoning, often just one or two are! Hundred mg/L result of eating, fishes constantly produce waste the nitrate per day sudden changes on the topic raising!, appear disoriented, swim in circles, lay at the tank it free when you up. Week of pregnancy certain circumstances, nitrates are not removed, including peer-reviewed studies to. Ions may remain unfiltered and leach into tap water can do this without causing any stress to the fish 24! Fish more than 20 parts per million in water leading to high nitrate poisoning fish symptoms: nitrite nitrate. Nitrite enters the bloodstream waste remains in a closed system space converting into nitrates that in... It is important to maintain the tank spaced aquarium flip out appear a ⦠with or without exposure. The problem until the tank free from all impurities should occur slowly only! Filtering the water at such frequent intervals food for growth many fishes inside a fish (. This without causing any stress to the tissues ensures the removal of nitrates more oxygen ) nitrate can. Become very toxic to ruminants of your progress, but slowly enough to avoid the effects of changes. Of denitrifying bacteria in its pockets with or without nitrate exposure strips will provide a rough idea of progress. That is not performed back down to a delay in cleaning and maintenance quick-test test strips provide! Ion with the help of LED lights to prevent toxic nitrates from your tank with the fish are exposed gradually... Lot of fishes and plants, disregarding the size of the total gallonage of will... The gills rather than the skin in a Freshwater aquarium should be according the! To faster organic waste, leading to high nitrates fish will start showing of!
Mimosa Tree Wilt Treatment, Qualities Of A Good Customer Service Representative, Best Laminate Flooring Brands 2020, Topology Induced By Metric, Body Fat Test Edinburgh, Quesadilla On Blackstone Griddle, Registration Of Marriage Malaysia During Mco, | <urn:uuid:695c6354-b4f6-43e8-9eb9-5b2e231222ff> | CC-MAIN-2022-21 | https://dongphuc123.vn/donna-stewart-vcd/nitrate-poisoning-fish-symptoms-52c6fa | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662543797.61/warc/CC-MAIN-20220522032543-20220522062543-00205.warc.gz | en | 0.929962 | 3,144 | 3.703125 | 4 |
Lupin leaves that are turning purple indicate a nutrient deficiency in the plant. Healthy lupin leaves should be green, with short silver hairs on them. Any deviation in color or appearance could indicate a nutrient deficiency, fungal or viral infection, and therefore must be diagnosed and treated.
Lupin leaves turn purple as a result of a phosphorous deficiency. Smaller leaves and shorter roots also characterize deficient plants. This phosphorus deficiency impedes the plants’ ability to grow healthy roots, stems, and leaves, and in severe cases, it will lead to the death of lupin plants.
The rest of this article will explore the importance of phosphorus in growing lupins. We will also look into the effects of phosphorus deficiency in lupins and the methods you can use to correct this deficiency and grow healthy lupins.
Lupin leaves turn purple when they store excess carbohydrates, resulting from imbalances caused by a phosphorus deficiency. Additionally, phosphorus deficiency also causes overproduction of anthocyanin, which causes the leaves to attain a purple or reddish hue.
Phosphorus is an essential nutrient for plant growth, and it is a crucial component in the following plant processes:
- Stimulates shoot, root, and stem growth
- Energy reactions within the plant (including phosphorylation)
- Transport of nutrients within the plant
- Formation of flowers and seeds
- Nitrogen fixation in root nodules
- Genetic transfer and new cell formation in the plant
- Resistance to diseases
- Timely maturity of the plant
Lupin leaves synthesize carbohydrates through the process of photosynthesis. These carbohydrates provide the energy needed for the plant to grow and conduct other essential functions such as nutrient uptake from soil.
ATP is a crucial phosphorus compound that converts carbohydrates to energy so nutrients from the soil can move through the plant’s cell walls.
When the lupin plant lacks sufficient phosphorus, they do not use the synthesized carbohydrates entirely, causing them to accumulate in the leaves. Carbohydrate accumulation results in darkened leaves.
Overproduction of anthocyanin in lupin leaves causes them to attain a purple or reddish pigmentation. This overproduction can point to phosphorus deficiency in the plant.
Separate studies conducted by scientists on soybean (which, like the lupin, belongs in the legume family of plants) and maize plants indicated that phosphorus deficiency in plants causes increased anthocyanin production by promoting the genetic expression of genes involved in synthesizing anthocyanin.
Anthocyanin is useful in lupins for seed dispersal and growing plant tolerance to environmental stressors. However, too much anthocyanin impedes the uptake of much-needed nitrogen by the lupins. Nitrogen is essential for plant growth, and deficiencies lead to stunted growth in lupins.
A combination of factors can diagnose phosphorus deficiency in plants. Usually, the signs appear in older leaves before moving up to newer shoots.
In addition to purple-colored leaves, you may also notice the following signs of phosphorus deficiency in the lupins:
- Smaller plants
- Underdeveloped leaves
- Leaves may start to curl
- Stems and petioles are narrow
- Older leaves turn brown, droop, and die-off
- Slow plant growth
- Brown spots develop when the plant is left untreated.
- Lupins may also fail to bloom during the blooming season or produce small flowers.
Untreated lupins may eventually succumb and die off, especially in cases where all the leaves have dried up.
As stated before, phosphorus is an essential nutrient for lupin growth and development. Lupins are known to adapt well to phosphorus-deficient soil, but when the plant exhibits signs of deficiency, you need to increase the phosphoric content of the earth.
Here are some valuable suggestions for how you can achieve this:
- Apply Phosphorus fertilizer as per soil test recommendations. A soil test conducted by an agronomist will guide you on how much Phosphorus your soil needs. This information is necessary when applying fertilizer so that you neither under nor over-apply.
- Add composted manure to the soil. Compost manure is a great organic source of phosphorus. Additionally, it optimizes the soil pH level to allow effective phosphorus uptake by the plant.
- Keep the roots at an optimum temperature above 15 degrees Celsius (59 degrees Fahrenheit). Temperatures lower than this will affect the absorption of phosphorus by lupin roots. If you live in a colder state such as North Dakota or Minnesota, consider using vegetation heating pipes to maintain this.
- Use soils with Proper Drainage. Water-logged lupin roots do not receive sufficient oxygen, interfering with their ability to absorb nutrients—plant lupins in well-drained soil. You can enhance drainage by combining the soil with organic matter.
- Incorporate bone meal. Yet another organic solution, bone meal enhances the phosphorus content of soil by gradually releasing the nutrient into the ground. It is also safer for the environment as compared to fertilizers.
- Apply a mix of Kelp and Fish Meal. Primarily applied as a foliar fertilizer, kelp (seaweed) enriches the soil with phosphorus and nitrogen. When mixed with fish meal, the NPK ratio is increased, making it more beneficial to the lupin plants.
Lupins take about one week to recover from phosphorus deficiency after treatment. Older leaves are unlikely to recover since they are usually the worst hit and may have died off. However, after a week, you will begin to see signs of recovery, such as healthier leaves, stems, and shoots.
Too much phosphorus can cause phosphorus toxicity in lupins, so as you treat purple-leafed lupins, this is a potential risk that you should consider. In severe cases, the lupins may die from excess phosphorus’s effects.
Phosphorus toxicity can cause the following effects:
- Yellowing or darkening of leaves.
- Calcium deficiency in the plants (since excess phosphorus impairs calcium uptake)
- Zinc and Iron Deficiency in plants.
- Higher susceptibility to plant diseases
- Death of lupin plants in severe cases
- Water pollution due to run-off during rains.
To avoid overtreating the lupins with phosphorus, conduct a soil test before treatment. Doing this will give you a clear picture of the state of your soil and how much phosphorus you should incorporate. Conduct regular soil tests even after treatment to track the progress of your soil and adjust future therapies as needed.
Spraying foliar zinc and iron on lupins growing in high-phosphorus soils will also mitigate the effects of excessive phosphorus by providing the plants with these much-needed nutrients. However, this method should be combined with other control methods to protect the plant effectively.
You can correct excess phosphorus in soil and protect your lupins by following these practical suggestions:
- Avoid adding phosphorus in any form. Doing this includes avoiding fertilizers containing phosphorus, organic compost, and manure for as many seasons as it takes for the soil to return to safe phosphorus levels.
- Loosen the soil and water often. Phosphorus is water-soluble, so loosening the ground with a shovel and watering the soil frequently will gradually flush out excess phosphorus. Remember to maintain proper drainage in the soil, so the roots do not get waterlogged and start to rot.
- Remove rocks where possible. Stones hold minerals slowly released into the soil, so removing these rocks will prevent additional phosphorus from getting into the ground.
- Chemical treatment. Incorporating chemicals such as alum and ferric chloride has also been suggested as a suitable technique to reduce phosphorus levels in the soil.
Proper care for lupins is necessary to keep them healthy and promote plant growth. It also ensures they bloom beautifully during the blooming season and yield good yields. Here are a few pointers to help you maintain healthy lupins:
- Maintain slightly acidic soil pH for optimum nutrient uptake.
- Keep the soil well-watered and well-drained to prevent dehydration or root rot.
- Apply a light mulch to the base of the plant to protect it from adverse heat or cold, which can negatively affect the plant.
- Light is essential to healthy lupin growth, so if you keep potted lupins, ensure they receive at least six hours of direct sunlight daily.
- Inspect the plants regularly for appearance, size, or color changes that may indicate a nutrient deficiency or plant disease.
- Regularly spray the lupins with pesticides and fungicides to control the spread of pests and fungi, inhibiting plant growth.
- Prune regularly to encourage root and shoot growth since removing overgrown stems will direct the plant’s energy toward new shoots and roots.
Purpling of lupin leaves indicates a nutritional deficiency in the plant, which results in excess carbohydrate storage and overproduction of anthocyanin. Phosphorus deficiency in plants can cause slow growth, deformed leaves, and thinner and smaller plants.
Treating phosphorus deficiency in lupins is a delicate process because, when overdone, it can lead to phosphorus toxicity and, in severe cases, plant death. The most effective way to navigate this process is by conducting regular soil tests to understand the needs of your soil and treat it appropriately to encourage lupin growth.
You may also like:
- Why Are My Lupins Not Flowering?
- Why Are My Lupines Drooping?
- Lupin Leaves Turning Red [And What to do now]
- When Do Lupins Start To Grow Back?
Hi! I’m Sophia, and I love plants – especially an expert in growing house plants. I stay in Chicago, United States of America, and through my blog and social media platforms, provide tips and tricks on how to grow healthy, vibrant plants indoors. Check out more here. | <urn:uuid:cd7f1fa4-1a47-4bd3-afb2-0e3513c4b551> | CC-MAIN-2023-50 | https://houseplantsinfo.com/lupin-leaves-turning-purple/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00453.warc.gz | en | 0.92049 | 2,066 | 3.8125 | 4 |
Generally, wood is used in the creation of pencils. Because it is hard enough to hold the shape of the pencil. It is also soft enough to be sharpened or shaved. But, for that purpose, lots of trees get cut down. To overcome this problem, Vikash Khandelwal, a graduate student from Coimbatore, India have developed eco-friendly newspaper pencils. He developed this eco-friendly pencils to reduce the use of wood which is used in making pencils.
When Vikash heard about eco-friendly products, he decided to try his hand at creating products that would not harm the environment. So he created pencils made out of newspaper.
Vikash said, “Chinese pencils made from newsprint have been in the market for a long time and are doing well, even in India. The paper used for these pencils is newsprint paper, which is the main raw material for newspapers. These pencils have an attractive plastic covering, which entices children. Taking a cue from this, we, at Zebra Stationery Products, decided to try making pencils using only old newspapers. For more than two years we kept experimenting with various newspapers and different glues. Ultimately, we came up with the eco-friendly pencils.”
These eco-friendly pencils are 172 mm in length. Children of all ages can comfortably hold it due to its thickness. The glue used inside it gives a cushion effect to the lead. Thus, the lead does not break if the pencil is dropped. Additionally, the glue has an amazing waterproofing effect on the newsprint material. It also helps to ensure the paper does not get soggy even if it is left in water for more than six hours at a stretch.
Vikash and his team use a double sheet of newspaper to create two pencils. They cut newspaper sheet into the half, horizontally. After that, they placed lead sourced from china at one corner and has to be stuck manually. They used a roller machine which is used to tightly roll the paper around the lead and special glue is applied simultaneously and evenly inside all the layers.
The texture of the glued newspaper is such that a new sharpener can be used comfortably (for 5-6 pencils only), beyond which a little pressure has to be applied on the sharpener.
He said, “Working on this new project was indeed interesting and threw up many surprising facts. We have found that the quality of the paper of only two Tamil newspapers is good for making these pencils. We had to experiment with various glues, as they had to be chemical free but strong too. Since most children have the habit of putting their pencils into their mouths, we had to make sure that the glue was not toxic.”
“Most of the orders received were from other parts of the country and for some reason, they did not like the Tamil newsprint. To overcome this problem, a customized paper covering was put on the newspaper pencil. It consists of the logo and the information about the organization or the event the pencil was desired for,” he added. | <urn:uuid:9811512b-0025-4a37-87a5-d9a24f21a10a> | CC-MAIN-2022-21 | https://www.techexplorist.com/eco-friendly-pencils-help-recycle-old-newspapers-save-trees/4023/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662580803.75/warc/CC-MAIN-20220525054507-20220525084507-00315.warc.gz | en | 0.980908 | 643 | 3.03125 | 3 |
Ground Source promises to deliver good year-round energy-efficiency, and can offer considerable long-term environmental advantages. The Ground Source Heat Pump (GSHP) extracts heat stored in the ground. This is occasionally referred to as ‘geothermal’. However, the heat is mostly from the surface (solar gain), and very little is from the earth’s core. (‘Proper’ geothermal is found in several parts of the world, including Iceland, Japan, New Zealand and even Southampton).
At depths of 2m and more, the ground temperature does not deviate very much from the average summer/winter surface temperatures (around 8° to 12°C [46ºF to 54ºF] in the UK depending on location). At this depth, there is an enormous store of heat that can be usefully tapped for heating in the winter.
The most practical way of extracting this energy is to bury a large amount of pipe in the ground. This is usually laid in horizontal trenches at depths between 1.2 and 2m depth. If insufficient land area is available, or if excavating a garden is impractical, then vertical boreholes are an alternative method that gives similar results. However, the borehole method is usually considerably more expensive to install.
Basic description of the component parts of a GSHP:
1. A heat pump packaged unit
Showing water-water or brine-water type. (approx. the size of a fridge). This has source-water (glycol) pipe connections and heated-water pipe connections. Sometimes the unit contains a domestic hot water cylinder (DHW), in which case the unit will be the size of a large fridge freezer.
2. The heat source
This is usually a closed-loop of plastic pipe containing a Glycol Antifreeze solution. This pipe is buried in the ground in the form of vertical bore holes or horizontal trenches. The trenches take either straight pipe or coiled pipe, buried around 1.5m below the surface. A large area is needed for this.
3. The heat distribution system, or Heat Emitter system.
This is either underfloor heating pipes or conventional panel radiators with a large surface area, connected via normal water pipes.
4. Electrical input and controls.
The system will require an electrical input, and the electric distribution operator DNO should be notified to verify that the building’s supply is adequate.
A specialised controller will be incorporated in the heat pump to provide temperature and timing functions of the system. A good controller can be key to a energy-efficient system. However, it is often said that a sophisticated controller set badly is worse than a simple control unit.
Ground Source Heat Pumps offer several advantages
- The water-water (or antifreeze-water) heat pump unit is a sealed and reliable self-contained unit.
- There are no corrosion or degradation issues with buried plastic pipes.
- The system will continue to provide good output even during extremely cold spells.
- The installation is fairly invisible. i.e. no oil tanks or outside unit to see.
- Very little regular maintenance required. | <urn:uuid:67169614-bef6-4259-bca9-e6a13bbf4adb> | CC-MAIN-2018-09 | http://heatpumps.co.uk/types-of-heat-pump/ground-source-heat-pumps/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814311.76/warc/CC-MAIN-20180223015726-20180223035726-00132.warc.gz | en | 0.922401 | 656 | 3.71875 | 4 |
not smooth, flat, or level:
She walked back carefully over the uneven ground.
His breathing had become uneven.
uneven rates of development
not equal or equally balanced:
an uneven distribution of resources
good in some parts and bad in others:
an uneven performance
—unevenness noun [uncountable] | <urn:uuid:b54d21db-207a-4e1d-af9f-4197b2fd3a09> | CC-MAIN-2014-41 | http://www.ldoceonline.com/dictionary/uneven | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663551.47/warc/CC-MAIN-20140930004103-00308-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.868479 | 69 | 2.625 | 3 |
In this portion of the Knowledge Management Forum we have provided a summaries of various descriptions of knowledge management. Authors were encouraged to include links to more complete remarks or to referenced works. The contents of this page were last updated March 31, 1996
From the introduction to; "An Open Discussion of Knowledge Management", Brian (Bo)Newman, 1991.
Knowledge Management is the collection of processes that govern the creation, dissemination, and utilization of knowledge. In one form or another, knowledge management has been around for a very long time. Practitioners have included philosophers, priests, teachers, politicians, scribes, Liberians, etc.
So if Knowledge Management is such an ageless and broad topic what role does it serve in today's Information Age? These processes exist whether we acknowledge them or not and they have a profound effect on the decisions we make and the actions we take, both of which are enabled by knowledge of some type. If this is the case, and we agree that many of our decisions and actions have profound and long lasting effects, it makes sense to recognize and understand the processes that effect or actions and decision and, where possible, take steps to improve the quality these processes and in turn improve the quality of those actions and decisions for which we are responsible?
Knowledge management is not a, "a technology thing" or a, "computer thing" If we accept the premise that knowledge management is concerned with the entire process of discovery and creation of knowledge, dissemination of knowledge , and the utilization of knowledge then we are strongly driven to accept that knowledge management is much more than a "technology thing" and that elements of it exist in each of our jobs.
Dr. Arthur J. Murray provides the following Knowledge Management Argot
Corporate Knowledge Management: The process whereby knowledge seekers are linked with knowledge sources, and knowledge is transferred.
Thomas Bertels provides the following definition of Knowledge Management
Knowledge management is the management of the organization towards the continuous renewal of the organizational knowledge base - this means e.g. creation of supportive organizational structures, facilitation of organizational members, putting IT-instruments with emphasis on teamwork and diffusion of knowledge (as e.g. groupware) into place.
As I am a very practical person I am focussed rather more on the practical aspects, how we can improve the reality.
Maarten Sierhuis provides the following definition of Knowledge Management and supporting concepts.
Knowledge Management (KM): This is, as the word implies, the ability to manage "knowledge". We are all familiar with the term Information Management. This term came about when people realized that information is a resource that can and needs to be managed to be useful in an organization. From this, the ideas of Information Analysis and Information Planning came about. Organizations are now starting to look at "knowledge" as a resource as well. This means that we need ways for managing the knowledge in an organization. We can use techniques and methods that were developed as part of Knowledge Technology to analyze the knowledge sources in an organization. Using these techniques we can perform Knowledge Analysis and Knowledge Planning.
Knowledge Analysis (KA): In Knowledge Analysis we model a knowledge source in such a way that we can analyze its usefulness, its weaknesses and its appropriateness within the organization. Knowledge Analysis is a necessary step for the ability to manage knowledge. Within Knowledge Analysis we can use knowledge modeling and knowledge acquisition techniques.
Knowledge Planning (KP): When an organization has a grip on its knowledge (i.e. has performed Knowledge Analysis), it will be able to plan for the future. An organization will now be able to develop a multi-year knowledge plan that defines how the organization will develop its knowledge resources, either by training its human agents, or by developing knowledge-based systems to support the human agents, or by other means that allow the organization to stay competitive.
Knowledge Technology (KT): This is, as the word already implies, the (application of) techniques and methods from the field of AI, or to be more specific, the field of knowledge-based systems. KT has been around for quite some time, and most people know about the application of KT in the form of expert systems, and decision support systems. Techniques and methods to design these kind of systems are well known; The best known methodology for building knowledge-based systems is CommonKADS (formerly known as KADS).
Computer Supported Work Systems (CSWS): This is a formal and informal (human) activity system, within an organization where the (human) agents are supported by computer systems. The application of Knowledge Technology is very helpful in such work systems, although definitely *not* the only important factor in the analysis and design, nor in the effectiveness of the activity system.
Denham Grey offers the following views on knowledge and knowledge management:
What is knowledge?
Knowledge is the full utilization of information and data, coupled with the potential of people's skills, competencies, ideas, intuitions, commitments and motivations.
In today's economy, knowledge is people, money, leverage, learning, flexibility, power, and competitive advantage. Knowledge is more relevant to sustained business than capital, labor or land. Nevertheless, it remains the most neglected asset. It is more than justified true belief and is essential for action, performance and adaption. Knowledge provides the ability to respond to novel situations.
A holistic view considers knowledge to be present in ideas, judgments, talents, root causes, relationships, perspectives and concepts. Knowledge is stored in the individual brain or encoded in organizational processes, documents, products, services, facilities and systems.
Knowledge is the basis for, and the driver of, our post-industrial economy. Knowledge is the result of learning which provides the only sustainable competitive advantage. Knowledge is the next paradigm shift in computing following data processing 1945-1965 and information management 1966-1995. Knowledge is action, focused innovation, pooled expertise, special relationships and alliances. Knowledge is value-added behavior and activities. For knowledge to be of value it must be focused, current, tested and shared.
What is Knowledge Management?
Knowledge management is an audit of "intellectual assets" that highlights unique sources, critical functions and potential bottlenecks which hinder knowledge flows to the point of use. It protects intellectual assets from decay, seeks opportunities to enhance decisions, services and products through adding intelligence, increasing value and providing flexibility.
Knowledge management complements and enhances other organizational initiatives such as total quality management (TQM), business process re-engineering (BPR) and organizational learning, providing a new and urgent focus to sustain competitive position.
Why should you apply Knowledge Management?
To serve customers well and remain in business companies must: reduce their cycle times, operate with minimum fixed assets and overhead (people, inventory and facilities), shorten product development time, improve customer service, empower employees, innovate and deliver high quality products, enhance flexibility and adaption, capture information, create knowledge, share and learn.
None of this is possible without a continual focus on the creation, updating, availability, quality and use of knowledge by all employees and teams, at work and in the marketplace.
Robert Taylor summerized his views on Knowledge Management by saying:
The vital importance of knowledge in business has always been recognised but, up until now, organisations haven't felt able to manage it because they understood neither the problems and the opportunities nor the strategies and solutions. This picture is gradually changing as models, methods, tools and techniques for effective knowledge management are becoming available and as organisations realise the importance of knowledge and thinking to their capacity to adapt to the changing world.
For more on Robert Taylor's views on Knowledge Managment, please Click Here.
Karl M. Wiig provides us with the following:
Given the importance of knowledge in virtually all areas of daily and commercial life, two knowledge-related aspects are vital for viability and success at any level:
1. Knowledge assets -- to be applied or exploited -- must be nurtured, preserved, and used to the largest extent possible by both individuals and organizations.
2. Knowledge-related processes -- to create, build, compile, organize, transform, transfer, pool, apply, and safeguard knowledge -- must be carefully and explicitly managed in all affected areas.
Knowledge must be managed effectively to ensure that the basic objectives for existence are attained to the greatest extent possible. Knowledge management in organizations must be considered from three perspectives with different horizons and purposes:
1. Business Perspective -- focusing on why, where, and to what extent the organization must invest in or exploit knowledge. Strategies, products and services, alliances, acquisitions, or divestments should be considered from knowledge-related points of view.
2. Management Perspective -- focusing on determining, organizing, directing, facilitating, and monitoring knowledge-related practices and activities required to achieve the desired business strategies and objectives.
3. Hands-On Operational Perspective -- focusing on applying the expertise to conduct explicit knowledge-related work and tasks.
Historically, knowledge has always been managed, at least implicitly. However, effective and active knowledge management requires new perspectives and techniques and touches on almost all facets of an organization. We need to develop a new discipline and prepare a cadre of knowledge professionals with a blend of expertise that we have not previously seen. This is our challenge!"
Donna Bible provides us with the following view:
I think that a lot of businesses are overwhelmed by the information explosion in the last several years. Information specialists should seize this time to assist their company's in managing this information overload. The problem is made even more complex by the rapid transition in company personnel which has recently affected lot of organizations. At CTC we are contracted to do many projects, and remembering who has done what is not always possible. The learning process that people undergo once they enter this company all too often leaves with them. Oftentimes a person leaves and takes an entire storehouse of knowledge about their job with them. If a company could somehow capture a part of that person's experience, then the reciprocal relationship between employee and employer would truly be effected once that person left or was placed on another project. Knowledge management is the attempt to secure the experience as well as the work product the individuals who comprise a corporation.
Bob Hallsworth provides us with these views.
R. Gregory Wenig provides the following views on knowledge and knowledge management:
Knowledge Management (for the organization): -- consists of activities focused on the organization gaining knowledge from its own experience and from the experience of others, and on the judicious application of that knowledge to fulfill the mission of the organization. These activities are executed by marrying technology, organizational structures, and cognitive based strategies to raise the yield of existing knowledge and produce new knowledge. Criticial in this endeavor is the enhancement of the cognitive system (organization, human, computer, or joint human-computer system) in acquiring, storing and utilizing knowledge for learning, problem solving, and decision making.
Knowledge: -- Currently, there is no consensus on what knowledge is. Over the millennia, the dominant philosophies of each age have added their own definition of knowledge to the list. The definition that I have found most useful when building systems is as follows: knowledge is understandings the cognitive system possesses. It is a construct that is not directly observable. It is specific to and not residing outside the cognitive system that created it. Information, NOT knowledge, is communicated among cognitive systems. A cognitive system can be a human, a group, an organization, a computer, or some combination.
Karl E. Sveiby, in the section of this web page, "What is Knowledge Managment", contrasts two tracks of thought on the subject and two different levels (summerized here):
Knowledge Management is not easy to define. Let me try to do it from a metalevel according to what people in this field are doing. There seem to be two tracks of activities - and two levels.
Track KM = Management of Information. Researchers and practitiioners in this field have their education in computer and/or information science. They are involved in construction of informatiom management systems, AI, reengineering, group ware etc. To them knowledge = Objects that can be identified and handled in information systems.
Track KM = Management of People. Researchers and practitiioners in this field have their education in philosophy, psychology, sociology or business/management. They are primarily involved in assessing, changing and improving human individual skills and/or behaviour. To them knowledge = Processes, a complex set of dynamic skills, knowhow etc, that is constantly changing. Level: Individual Perspective. The focus in research and practise is on the individual.
Level: Individual Perspective. The focus in research and practise is on the individual.
Level: Organisational Perspective.The focus in research and practise is on the organisation.
Material in this section is under copyright by the author unless otherwise noted. As a collective work, (c)1996, 2002 The Knowledge Management Forum and Brian D. Newman. All Rights Reserved Worldwide. Unauthorized copying strictly prohibited. Please address comments about this page to [email protected] Last updated -- 8/3/2002 | <urn:uuid:ed399be9-86de-47e2-a106-a43472a347b2> | CC-MAIN-2015-35 | http://www.km-forum.org/what_is.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645322940.71/warc/CC-MAIN-20150827031522-00084-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.941138 | 2,707 | 2.71875 | 3 |
The California Shenandoah Valley is an American Viticulture Area that includes portions of Amador County and El Dorado County. The region was first settled during the California Gold Rush in the nineteenth century, and settlers in the region began planting the first grapevines and producing the first wine soon thereafter. In 1983 region became a designated American Viticulture Area. Shenandoah Valley is the westernmost and, therefore, the least elevated and warmest region within the Sierra Foothills. The high temperatures result in very ripe fruit and full-bodied, high alcohol wines. Many wineries are open daily for wine tasting and tours located in the Shenandoah Valley. | <urn:uuid:137f58d8-1c43-46f8-b16d-d8601d5eac4c> | CC-MAIN-2020-29 | https://www.visitamador.com/p/towns--regions/shenandoah-valley | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883439.15/warc/CC-MAIN-20200703215640-20200704005640-00435.warc.gz | en | 0.960269 | 133 | 2.921875 | 3 |
A long cylinder of material with a with a rectangular cross-section occupies the region 0 < x < a, 0 < y < b in space. The faces at x = 0 and x = a are held at temperature u=0 , and the face at y = b is thermally insulated. The face at y = 0 is held at temperature (const.) until a steady temperature u(x,y) is reached in the cylinder. Show that
for 0 < x < a, 0 < y < b.
I am lost with what to do for the boundary conditions and . All the 2- D Laplace equations I have done have had boundary conditions like , ect.
I have never seen or done one with .
Anyway, here is all I have done so far....
unsure what to do with the other to BC's....
For the PDE
thats all ive been able to do w/out knowing what to do with the other BC's. Can anyone please show me?
That's a good start. Next thing is to look at what you know about the function F(x). You have and F(a)=F(0)=0. That's a standard simple harmonic motion equation, and you should be able to deduce that is a solution for every natural number n. Therefore .
Now look at what you know about the function G(x). You have . That has a solution for any constant A. You also have a boundary condition (from ). But , and this will be 0 if . So we have the solution .
Putting that information together, we know that
. . . . . .
is a solution, for all choices of the coefficients C_n, and we want to choose these coefficients so that the remaining boundary condition holds. So we want
. . . . . . . . . . .(*)
whenever . That is where the Fourier sine series will come in. Since sin is an odd function, if a Fourier sine series is u_0 when 0<x<a then it must take the value -u_0 when -a<x<0.
So there is still some work to do. You need to calculate the Fourier series for the function and compare the answer with (*), to find what the coefficients C_n should be. (From the given solution, it looks as though only the odd coefficients will be nonzero.) | <urn:uuid:9c953baa-bf3a-4244-be1c-97371f3bbfe5> | CC-MAIN-2016-18 | http://mathhelpforum.com/calculus/54344-very-difficult-problem-me.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861623301.66/warc/CC-MAIN-20160428164023-00212-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.939709 | 502 | 2.90625 | 3 |
Author: Kara Schuft, PT, DPT
Take a big breath in. Hold it there a second. Now breathe slowly out. Ever think about the mechanics involved in breathing? It turns out that most of us are breathing the wrong way.
We have a major muscle that controls breathing, called the diaphragm. It lies under our rib cage, separating our thorax from our abdomen. With proper breathing, the diaphragm should lower during an inhale, allowing air to fill up the entire space of the lung. You should see your stomach rise slightly during a breath in. This can show the diaphragm has dropped and you are fully expanding your lungs. During an exhale the diaphragm rises back up and our stomach should flatten out back to resting position.
Many people breathe quite shallowly rather than using their diaphragm to control respiration. Shallow breathing can result in increased stress and tension involving our neck and shoulder muscles. During paradoxical breathing you inhale and have the stomach muscles hold inwards instead of relaxing out. Think of it like breathing in and sucking in your stomach at the same time. Then you relax out during the exhale. This is the OPPOSITE of diaphragmatic breathing. This does not allow the diaphragm to do as good of a job and we automatically breathe more shallowly. Most of the air only enters our upper chest and it does not allow the lungs to fully expand. This limits how much oxygen we get to our tissues. We also begin to use other muscles that are not meant to be the primary work-horses when it comes to breathing. These are muscles of our neck and shoulders, typically referred to as accessory muscles of respiration. When they start working harder it adds to shoulder and muscle tension.
So how do we learn how to breathe deeply?
Actually using our diaphragm to take a deep breath is pretty easy to learn how to do. Lie down in a quiet place with one hand on your chest and one hand on your stomach.
Take a nice, slow breath in, and try to make the hand resting on your stomach rise upwards. Limit the amount of movement of the hand on the chest.
Breathe out slowly and the hand on the stomach should now lower back down. This can feel very strange at first if someone has been used to shallow breathing and never taking a fully deep breath. It may seem like you are forcing the air down towards your abdomen, feeling quite unnatural, but with practice, it will get much easier.
But WHY change the way I’m breathing?
Breathing by using your diaphragm has a host of benefits. Diaphragmatic breathing:
- Reduces stress – this is the bread and butter of diaphragmatic breathing benefits. Deep breathing is in almost every form of relaxation and meditative practice.
- Reduces blood pressure
- Decreases tension placed on our neck and shoulder muscles
- Aids in digestion – helps to get the contents of the intestines moving
- Improves the mobility of the abdomen – skin and tissue can get tight especially after abdominal surgeries
- Reduces motion sickness – especially if you breathe OUT longer than you breathe in by 2-3 seconds
More questions about breathing? Come see us at Whole Body Health Physical Therapy for an assessment. | <urn:uuid:ced87169-c473-4910-95c1-b273a1ed83d8> | CC-MAIN-2019-09 | http://www.wholebodyhealth-pt.com/wbhptblog/2014/9/29/how-deeply-do-you-breathe | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479101.30/warc/CC-MAIN-20190215183319-20190215205319-00132.warc.gz | en | 0.937962 | 693 | 3.140625 | 3 |
Troubleshooting is a form of problem solving, often applied to repair failed products or processes. It is a logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again. Troubleshooting is needed to develop and maintain complex systems where the symptoms of a problem can have many possible causes. Troubleshooting is used in many fields such as engineering, system administration, electronics, automotive repair, and diagnostic medicine. Troubleshooting requires identification of the malfunction(s) or symptoms within a system. Then, experience is commonly used to generate possible causes of the symptoms. Determining the most likely cause is a process of elimination - eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.
In general, troubleshooting is the identification of diagnosis of "trouble" in the management flow of a corporation or a system caused by a failure of some kind. The problem is initially described as symptoms of malfunction, and troubleshooting is the process of determining and remedying the causes of these symptoms.
A system can be described in terms of its expected, desired or intended behavior (usually, for artificial systems, its purpose). Events or inputs to the system are expected to generate specific results or outputs. (For example selecting the "print" option from various computer applications is intended to result in a hardcopy emerging from some specific device). Any unexpected or undesirable behavior is a symptom. Troubleshooting is the process of isolating the specific cause or causes of the symptom. Frequently the symptom is a failure of the product or process to produce any results. (Nothing was printed, for example).
The methods of forensic engineering are especially useful in tracing problems in products or processes, and a wide range of analytical techniques are available to determine the cause or causes of specific failures. Corrective action can then be taken to prevent further failures of a similar kind. Preventative action is possible using failure mode and effects analysis (FMEA) and fault tree analysis (FTA) before full scale production, and these methods can also be used for failure analysis. | <urn:uuid:97663ab8-10ea-41e7-8780-ab99959a906a> | CC-MAIN-2015-22 | http://asgard-dev-studio.tk/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928562.33/warc/CC-MAIN-20150521113208-00268-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.92927 | 443 | 2.921875 | 3 |
On April 16, students from across the country will participate in a "Day of Silence," sponsored by the Gay, Lesbian and Straight Education Network (GLSEN). Next Friday, "hundreds of thousands" of public school students are being encouraged to take a vow of silence for the entire school day--even during instructional time.
GLSEN claims this student movement is meant to draw attention to "anti-LGBT name-calling, bullying and harassment in schools." Of course bullying is wrong, but if students can't get together on school grounds for voluntary prayer groups, how is it acceptable for groups like GLSEN to carry out their own socio-political goals and freely spread its views of the nature and morality of homosexuality?
In response, family groups are encouraging parents to take action in helping to "de-politicize the learning environment by calling your child out of school if your child's school allows students to remain silent during instructional time on the Day of Silence."
In addition, Carrie Lukas from the Independent Women's Forum wrote this week about the politics of Earth Day and the various activities schools will force students take part in to mark the April 22 holiday. Lukas warns:
Just because it's Earth Day, Lukas rightly notes, schools shouldn't abandon their mission to educate students, provide facts, and encourage them to draw their own conclusions. Al Gore's doomsday prophecies shouldn't be kids' only source of information when it comes to how best to protect the environment.Schools will take a break from normal instruction to discuss the importance of preserving the environment. That may sound like a harmless activity, but too often Earth Day becomes a platform for pushing an ideological brand of environmentalism. Parents need to pay attention and ask their children's teachers what's their plans are for Earth Day.
Find out what your kids' schools are planning for Earth Day celebrations and encourage their teachers to give students the balanced education they deserve. | <urn:uuid:32ffcefb-05dc-49ab-bfe3-9ec5ac4a2ae9> | CC-MAIN-2017-39 | https://townhall.com/tipsheet/meredithjessup/2010/04/07/parents-beware-activists-in-the-classroom-n690049 | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687702.11/warc/CC-MAIN-20170921063415-20170921083415-00002.warc.gz | en | 0.960807 | 393 | 2.640625 | 3 |
Baruch Spinoza (; Dutch: [baːˈrux spɪˈnoːzaː]; born Benedito de Espinosa, Portuguese: [bɨnɨˈðitu ðɨ ʃpiˈnɔzɐ]; 24 November 1632 – 21 February 1677, later Benedict de Spinoza) was a Dutch philosopher of Sephardi/Portuguese origin. By laying the groundwork for the 18th-century Enlightenment and modern biblical criticism, including modern conceptions of the self and the universe, he came to be considered one of the great rationalists of 17th-century philosophy. Along with René Descartes, Spinoza was a leading philosophical figure of the Dutch Golden Age. Spinoza's given name, which means "Blessed", varies among different languages. In Hebrew, it is written ברוך שפינוזה. His Portuguese name is Benedito "Bento" de Espinosa. In his Latin works, he used Latin: Benedictus de Spinoza.
Spinoza's magnum opus, Ethics, was published posthumously in 1677. The work opposed Descartes' philosophy on mind–body dualism, and earned Spinoza recognition as one of Western philosophy's most important thinkers. In the Ethics, "Spinoza wrote the last indisputable Latin masterpiece, and one in which the refined conceptions of medieval philosophy are finally turned against themselves and destroyed entirely". Georg Wilhelm Friedrich Hegel said, ""The fact is that Spinoza is made a testing-point in modern philosophy, so that it may really be said: You are either a Spinozist or not a philosopher at all." His philosophical accomplishments and moral character prompted philosopher Gilles Deleuze to name him "the 'prince' of philosophers."
Spinoza was raised in a Portuguese Jewish community in Amsterdam. He developed highly-controversial ideas regarding the authenticity of the Hebrew Bible and the nature of the Divine. Jewish religious authorities issued a herem (חרם) against him, causing him to be effectively shunned by Jewish society at age 23. His books were also later put on the Catholic Church's Index of Forbidden Books.
Spinoza lived an outwardly-simple life as a lens grinder, turning down rewards and honours throughout his life, including prestigious teaching positions. He died at the age of 44 allegedly of a lung illness, perhaps tuberculosis or silicosis exacerbated by the inhalation of fine glass dust while grinding optical lenses. He is buried in the churchyard of the Christian Nieuwe Kerk in The Hague. | <urn:uuid:0b3c2e24-1a77-41c8-b643-2c88a53e68ba> | CC-MAIN-2017-47 | http://paralis.org/glossary:baruch_spinoza | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806660.82/warc/CC-MAIN-20171122194844-20171122214844-00036.warc.gz | en | 0.960061 | 558 | 3.484375 | 3 |
Why do sharks matter in the Great Barrier Reef?
Healthy coral reefs need sharks. In a coral reef ecosystem sharks are a top-level predator, sometimes called the apex predator. They are an important part of a reef’s ecosystem helping to maintain balance. A vulnerability assessment of sharks and rays on the Great Barrier Reef has determined some important facts about the role of sharks in the health of the GBR. There are currently 134 known species of sharks and rays.
Changing the balance of species in an ecosystem has a flow-on effect on other species in that ecosystem.
For example, if you remove sharks, the species those sharks would have eaten are likely to increase in number. The increased number of those species will likely have a greater impact on the species they eat, as there are now so many more ‘mouths’ to feed, and on it goes. Independently and in combination with other reef stressors, the health of entire reef ecosystems is significantly reduced.
Current threats to the Great Barrier Reef include:
- commercial fishing
- recreational fishing
- coastal development
- climate change and ocean warming and acidification, which result in coral bleaching
- a new coal mine, which means new dredging and more shipping traffic (more coal mining also means the negative effects of climate change are likely to be worse.)
- increased dredging and dumping at Abbott Point
- extensive new dredging proposed in the port of Cairns to allow cruise liners to enter
- nutrient-rich run-off from land-based activities
- crown of thorns starfish
- coral damage from cyclones and storms (it can take decades for a coral reef to recover from these).
Scientists are already warning of the deteriorating health of our incredible Great Barrier Reef. Adding yet another stressor to the coral systems may be more than they can take.
How much do you really know about sharks?
We often fear the things we don’t understand, and learning about the behaviour and habits of any potentially dangerous animal reduces your risk of harm.
Why do some people fear sharks?
Are you afraid of sharks? Test yourself — what do you think of when you think of a shark? You probably don’t have the warm, fuzzy feelings you might when you think of a kitten or a puppy — sharks aren’t quite so cute to most of us. But, do you have the ‘Urgh!’ response? Do you think of rows of sharp teeth and fear being attacked by them? If so – why?
Maybe you have seen Jaws, the movie. This 1975 ‘thriller’ was a blockbuster in its day and has helped to shape the view many of us have of sharks. It was about a fictional person-gobbling great white shark with a taste for human flesh. Real sharks weren’t used in filming — instead mechanical monsters were used. Anyone who watched this horror film would understandably fear sharks as a result if they didn’t know much else about them.
How dangerous are sharks really?
Sure, sharks have killed people and given others horrible injuries. In Queensland, in the last 160 years (until 2013) there have been no fewer than 71 human deaths attributed to shark attack. This figure averages to 0.4 deaths per year, or just under one human death every two years, due to shark attack. Every time a person is killed by a shark it is, of course, tragic. But, it is rare, especially when you compare it to other dangers.
How dangerous are our roads?
In 2013 there were 270 fatalities on Queensland’s roads. So, do we worry we’ll be killed every time we get into our cars? If we were logical, we would be more worried about being harmed in a road accident than swimming in the sea. (Speaking of swimming, do you know how many people drown each year? In 2013, 64 people drowned in Queensland. Hmmm … that’s more than 128 times the average number of people killed by sharks in Queensland each year.)
How dangerous are dogs?
Consider our ‘best friends’ for a moment. Around 13 000 people, including many young children, present at hospital emergency departments in Australia each year as a result of dog attacks. Yet we love our dogs.
So, if we were logical and rational, we’d have more swimming lessons, drive less, take more care with kids around dogs, and we wouldn’t be nearly so anxious about being attacked by sharks.
Do divers fear sharks?
Interestingly, many scuba divers who spend a lot of time close to sharks, unprotected by cages, don’t fear sharks. Have you ever wondered why they are able to swim safely with sharks? Don’t they have more reason than anyone to fear sharks?
If Shark Girl isn’t afraid of them, why are we?
Shark numbers are declining
Maybe sharks should fear us. Humans kill unsustainable numbers of sharks each year. Estimates vary as much illegal fishing targets sharks and the ‘take’ is not recorded. But, we do know that the numbers are high and the practice is unsustainable. Sea Shepherd estimates the number at 73 million sharks per year.
Shark stocks are believed to be only 10% of their pre-industrial biomass, and this is declining. This isn’t surprising as they can take up to 20 years to reach sexual maturity and, unlike many other fish, don’t spawn large numbers of offspring.
Fishing for shark fin
The illegal trade in shark fins to supply the demand for shark fin soup is huge. Shark fins fetch a high price in Hong Kong, Taiwan, Singapore and China. Shark fin soup is a banquet food in ethnically Chinese cultures. With the high population and increasing affluence of the middle class in China, demand for shark fin soup is growing. Numerous boats have been caught fishing illegally in northern Australian waters to supply this profitable trade, which involves catching sharks and hacking their fins off, usually while they are still alive. The disabled sharks often are then released back into the water. Without fins they can’t swim so they sink to the bottom to die a slow death. Because the fins sell for so much more than the rest of the shark it is most profitable to keep just the fins. This trade is not only cruel — it is also wasteful.
Bycatch and flake
Bycatch of sharks is also contributing to their falling numbers. Bycatch is when species other than the target species is caught. Sometimes these species are kept and sold. Often they are killed regardless.
Shark is often sold in Australian fish and chip shops as flake. Eating flake helps to create a demand for shark products, which contributes to their demise.
Deliberate culling using nets and drum lines
Due to human fear of shark attack, many beaches in Queensland are ‘protected’ from sharks by nets and drumlines (baited hooks). Research has shown that shark nets and drum lines are not particularly effective, could potentially increase the risk of shark attack, and that there are better ways of managing shark and human interaction such as towing sharks out to sea. The impact of nets and drum lines on other species is also significant.
How does the future look for sharks?
In a word: grim. Culling and overfishing, including illegal fishing, in combination with their slow maturation rate and low fecundity (sharks have few young) means that it is difficult for shark populations to recover from over-exploitation. As a result, sharks are in serious trouble and if the current rate of decimation of shark populations continues, many species of shark are on a path to extinction.
Why don’t we care more about this? Maybe many people just don’t realise what’s happening. Or, perhaps, is it because we have an irrational fear of sharks that we don’t see their demise as a problem? But, we should care. Healthy oceans need sharks and we need healthy oceans!
How you can help sharks
If sharks are to avoid extinction they need our help. There are many things you can do and ways you can get involved to help sharks to survive humans.
- Boycott restaurants selling shark fin soup
- Avoid eating flake
- Learn about sharks
- Educate your friends and family about sharks and their value in their ecosystem
- Support the following campaigns and organisations:
- Respect sharks – the ocean is their home and needs them!
These films might inspire you … | <urn:uuid:6dfc28f0-402d-4a3b-885b-4cceba4cefd0> | CC-MAIN-2018-30 | http://www.marineteam.org/shark-conservation/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591497.58/warc/CC-MAIN-20180720041611-20180720061611-00248.warc.gz | en | 0.958313 | 1,771 | 3.703125 | 4 |
(CDC news release) Young people between the ages of 13 and 24 represent more than a quarter of new HIV infections each year (26 percent) and most of these youth living with HIV (60 percent) are unaware they are infected, according to a Vital Signs report from the Centers for Disease Control and Prevention.
According to the CDC news release:
The most-affected young people are young gay and bisexual men and African-Americans, the report says.
The analysis looks at the latest data on HIV infections, testing, and risk behaviors among young people and was published in advance of World AIDS Day, Dec. 1.
Overall, an estimated 12,200 new HIV infections occurred in 2010 among young people aged 13-24, with young gay and bisexual men and African-Americans hit harder by HIV than their peers. In 2010, 72 percent of estimated new HIV infections in young people occurred in young men who have sex with men (MSM). By race/ethnicity, 57 percent of estimated new infections in this age group were in African-Americans.
“That so many young people become infected with HIV each year is a preventable tragedy,” said CDC Director Thomas R. Frieden, M.D., M.P.H. “All young people can protect their health, avoid contracting and transmitting the virus, and learn their HIV status.”
Read the entire CDC news release HERE.
What are your thoughts CLICK HERE to leave us a "QUESTION OF THE DAY” comment.
© Copyright 2015, A Granite Broadcasting Station. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. | <urn:uuid:ecb65674-fb85-4b21-9016-3c6ebf43ed3b> | CC-MAIN-2015-22 | http://www.21alive.com/news/top-news/181015501.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928015.28/warc/CC-MAIN-20150521113208-00122-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.952369 | 338 | 3.203125 | 3 |
INTRODUCTION TO PART I.
It would be superfluous to trouble my readers, in a concise practical treatise, with any theoretical discussion on the origin of the Law of Nations, had not questions of late been often asked, respecting the means of accommodating rules decided nearly half-a-century ago, to those larger views of international duty and universal humanity, that have been the natural result of a long Peace, and general progress.
To commence with the question, Who is the international legislator? it must be observed, that there is no general body that can legislate on this subject; no parliament of nations that can discuss and alter the law already defined. The Maritime Tribunals of maritime states always have been, and still are, almost the sole interpreters and mouthpieces of the International Law. Attempts that have been made by our own parliaments, by individual sovereigns, and even by congressional assemblies of the ministers of European powers, to create new universal laws, have been declared by these courts to be invalid, and of no authority. And though it is distinctly laid down, that the Law of Nations forms a part of the Common Law of England, yet it is not subject to change by Act of Parliament, as other portions of the Common Law are; except so far as Parliament can change the form, constitution, and persons of the courts that declare the law.
Lord Stowell says
"No British Act of Parliament, nor any commission founded upon it, can affect the rights or interests of foreigners, unless they are founded upon principles, and impose regulations, that are consistent with the Law of Nations."
And in another place—
"Much stress has been laid upon the solemn declaration of the eminent persons (the ministers of the European powers), assembled in Congress (at Vienna). Great as the reverence due to such authorities may be, they cannot, I think, be admitted to have the force of over-ruling the established course of the general Law of Nations."
It is to the Maritime Courts, then, of this and other countries, that the hopes of civilization must look for improvement and advance in the canons of international intercourse during the unhappy time of war. The manner, and the feeling in which they are to pronounce those canons cannot be more finely enunciated than in the words of Lord Stowell himself.
"I consider myself as stationed here, not to deliver occasional and shifting opinions to serve present purposes of particular national interest, but to administer with indifference that justice which the Law of Nations holds out, without distinction, to independent states, some happening to be neutral, and some belligerent.
"The seat of judicial authority is indeed locally here in the belligerent country, according to the known law and practice of nations; but the law itself has no locality. It is the duty of the person who sits here to determine this question exactly as he would determine the same question, if sitting at Stockholm; to assert no pretensions on the part of Great Britain, which he would not allow to Sweden in the same circumstances; and to impose no duties on Sweden, as a neutral country, which he would not admit to belong to Great Britain, in the same character.... | <urn:uuid:2d57cdf1-5546-4231-bf0f-6c8c40f5aa77> | CC-MAIN-2018-22 | http://digilibraries.com/ebook/the-laws-of-war-affecting-commerce-and-shipping | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794870771.86/warc/CC-MAIN-20180528024807-20180528044807-00127.warc.gz | en | 0.95841 | 651 | 2.984375 | 3 |
The effect of proximity to a dominant cow on a lowranking cow’s willingness to feed was assessed using choice tests. The main aim of the experiment was to determine the feeding space allowance at which the majority of subordinate cows would choose to feed on high-palatability food (HPF) next to a dominant cow rather than feeding alone on low-palatability food (LPF). Thirty Holstein-Friesian cows were used in the study. Half of the cows were trained to make an association between a black bin and HPF and a white bin and LPF, and the other half were trained with the opposite combination. Observations of pair-wise aggressive interactions were observed during feeding to determine the relative social status of each cow. From this, dominant and subordinate cows were allocated to experimental pairs. When cows had achieved an HPF preference with an 80% success rate in training, they were presented with choices using a Y-maze test apparatus, in which cows were offered choices between feeding on HPF with a dominant cow and feeding on LPF alone. Four different space allowances were tested at the HPF feeder: 0.3, 0.45, 0.6, and 0.75 m. At the 2 smaller space allowances, cows preferred to feed alone (choices between feeding alone or not for 0.3- and 0.45-m tests were significantly different). For the 2 larger space allowances, cows had no significant preferences (number of choices for feeding alone or with a dominant). Given that low-status cows are willing to sacrifice food quality to avoid close contact with a dominant animal, we suggest that the feeding space allowance should be at least 0.6 m per cow whenever possible. However, even when space allowances are large, it is clear that some subordinate cows will still prefer to avoid proximity to dominant individuals.
|Pages (from-to)||3954 - 3960|
|Number of pages||7|
|Journal||Journal of Dairy Science|
|Publication status||First published - 2012|
- Feeding behaviour | <urn:uuid:f2dcf41f-e0a0-4b87-aecf-5842db5df566> | CC-MAIN-2020-16 | https://pure.sruc.ac.uk/en/publications/dairy-cow-feeding-space-requirements-assessed-in-a-y-maze-choice- | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00371.warc.gz | en | 0.951882 | 424 | 2.65625 | 3 |
Vocabulary in Arabic is vast. No one knows for sure how many words there are in the language, as it is a living body of words and dialects that is constantly changing. The best estimates coming from Sakhr’s statistics is that Arabic has around 10,000 roots and 200,000 distinct words. Even if we could measure the number of words, it wouldn’t help you much day to day. For a solid foundation in the language, a smaller set of high-frequency words will do the trick. Here are high quality vocabulary lists grouped by category. | <urn:uuid:fe75aa54-a7d6-4e50-911f-496283c399eb> | CC-MAIN-2018-09 | http://www.modernstandardarabic.com/arabic-vocabulary/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812756.57/warc/CC-MAIN-20180219151705-20180219171705-00212.warc.gz | en | 0.971638 | 119 | 2.828125 | 3 |
Masters of orbital trajectories
Navigating on Earth requires a good knowledge of your surroundings and of where you want to go; explorers can also use a compass or GPS to guide them. Travelling in space is far trickier, as Euronews 'Space' magazine discovered on a visit to ESOC in Germany, the ESA establishment that controls all the Agency's spacecraft in orbit.
Navigation in space is complicated because it is three dimensional, with extremely complex craft often travelling at great speeds towards targets that are constantly moving. There is the additional challenge of communicating over great distances.
At the heart of activities at ESA’s European Space Operations Centre (ESOC) in Darmstadt is a team of engineers responsible for flight dynamics. It is their job to plan a spacecraft’s trajectories and to oversee them once the spacecraft is launched. Their most important tools are computer models.
"To determine the orbit a satellite is to follow, it is imperative to have very precise computer models of all the flights parameters," explains Vincente Companys. "For instance, we must have the planetary ephemerides and the celestial coordinates of all the planets and the forces exerted on spacecraft by solar radiation. We can then forecast situations very precisely. However orbital previsions are complicated by the numerous parameters and a high risk of error."
Flight dynamics are also responsible for ensuring that the wishes of the scientists are realistic. To better understand the operation of a science instrument on a satellite, engineers even assemble ‘Lego’ models of the spacecraft.
"Payloads often operate in certain conditions and not others. In the end, we are the final judges of what can be done," emphasises Ralph Rigger. "There is, however, one guiding rule: never put a spacecraft in danger."
In addition to the work of Flight Dynamics, each mission has its own Dedicated Control Room where commands are sent to spacecraft and scientific data are received.
In one of the many dedicated control rooms, Octavio Camino's team is watching over the courageous little SMART-1 satellite. It has spiralled its way up to the Moon using its innovative solar propulsion engine and has travelled millions of kilometres since its launch in September 2003; but not without difficulties.
"The mission wanted to leave the dangerous Van Allen radiation belts around the Earth as quickly as possible," says Camino. "But we were also being impacted by solar flares affecting the software aboard the satellite which was shutting the engine down. Mastering this new ionic propulsion was an immense challenge."
For SMART-1, successfully observing the Moon is relatively close. Other missions are at an immensely greater distance. In another ESOC building is a clean room with an engineering replica of ESA's Rosetta comet chaser on its 10-year voyage. It is already at such a distance that it takes 13 minutes for signals to reach the spacecraft.
Paolo Ferri, Rosetta's mission manager, has used the replica to solve problems that arose on the spacecraft's principal camera.
"During two weeks of intensive investigations, we used the replica in different configurations, simulating the errors occurring on the satellite 236 million km away. We finally discovered the cause, a computer software file in which data was being recorded was too small. Without the replica here, we would still be searching."
When the Euronews crew visited Darmstadt, ESOC was in the final throes of preparation for the next interplanetary science mission: Venus Express. In order to prepare for all eventualities, the mission team was practicing all the procedures – training with some nasty twists.
Below them in a basement room, three engineers – nicknamed 'the bad boys' – were devising insidious scenarios and injecting these problems and bugs into the consoles the Venus Express team were practicing on.
Everything was being done during these simulations to put pressure on the teams, obliging them to react efficiently. When the day comes, a mission's successful outcome may well depend on the reflexes they acquired during this training.
At ESOC, as for explorers trying to navigate in the wilds of nature, there is one watchword: do not get ruffled and stay calm! | <urn:uuid:09f559e9-9719-420b-9826-dddb0193d10e> | CC-MAIN-2017-51 | http://www.esa.int/Our_Activities/Operations/Masters_of_orbital_trajectories | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948550986.47/warc/CC-MAIN-20171214202730-20171214222730-00498.warc.gz | en | 0.965486 | 856 | 3.734375 | 4 |
Plants annual; cespitose. Culms 30-300+ cm, glabrous or sparsely pubescent below the nodes, branching above the bases. Leaves mostly cauline, not aromatic; sheaths sometimes with papillose-based hairs; auricles absent; ligules membranous, ciliate; blades flat. Inflorescences terminal and axillary, solitary rames with more than 1 spikelet unit, spikelets partially embedded in the rame axes; disarticulation in the rame axes. Spikelets heterogamous, in sessile-pedicellate pairs, dorsally compressed, unawned. Sessile spikelets with 2 florets; lower glumes coriaceous, smooth or scabridulous, not pitted, 2-keeled, narrowly winged above; upper glumes coriaceous, 1-keeled, winged; lower florets staminate or sterile; upper florets bisexual; lemmas and paleas hyaline; anthers 3; ovaries glabrous. Pedicels thick, fused to the rame axes. Pedicellate spikelets sterile or staminate; glumes herbaceous. Caryopses with a hard endosperm. x = 9, 10. Named for Christen Friis Rottboell (1727-1797), a Danish botanist. | <urn:uuid:788d7997-9e1d-4227-9f54-bc93dc2a7e06> | CC-MAIN-2014-49 | http://swbiodiversity.org/seinet/taxa/index.php?taxon=Rottboellia | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416405337312.65/warc/CC-MAIN-20141119135537-00198-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.702289 | 291 | 2.65625 | 3 |
A standard function is one defined on an interval of R that is obtained by a finite sequence of standard operations starting from any combination of three basic functions.
What are the basic functions?
The identity function f(x) = x
The exponential function f(x) = exp(x)
The sine function f(x) = sin(x)
What are the standard operations?
Multiplication by a number in R, addition, subtraction, multiplication, division, substitution of the value of one function as argument of another, and taking the "inverse".
Most of the functions we encounter will be standard functions.
Examples: 4x2, x sin(x),
You can enter your favorite standard functions, f and g, in the following applet, and observe the effects of combining f and g in various ways, and also look at the inverse function to f.
Note that when f has the same value for more than one argument, you must decide
which of these arguments you want to call the value of the inverse function. | <urn:uuid:6b1b26e8-5639-4e03-aa72-261fcd736afe> | CC-MAIN-2014-15 | http://ocw.mit.edu/ans7870/18/18.013a/textbook/HTML/chapter01/section04.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533689.29/warc/CC-MAIN-20140416005213-00011-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.868964 | 219 | 4.15625 | 4 |
In 2009 India announced its grand universal biometric scheme “Aadhaar”. The scheme, managed by the Unique Identification Authority of India (UIDAI), collects the fingerprints, iris scans and facial images of applicants in exchange for a national identification number. First handed out in 2010 the numbers, randomised 12-digit codes, function as “internal passports” which can be used as proof of identity to access state services.
November 2013 marked 500 million enrolments to the scheme, making Aadhaar the largest biometric programme in the world. This year the scheme is set to be linked to major development reforms, and the collection of data, stored in a centrally controlled database, aims to improve transparency, reduce corruption and ensure access to the country’s myriad of welfare benefits.
India’s welfare state is characterised by “leakage”: by corrupt middlemen syphoning off benefits and claimants taking more than their share. The biometric scheme plays an important role in making sure that those who are entitled state aid receive it. But despite this developmental progress India lacks comprehensive protections for biometric data, raising serious concerns about individual privacy.
A report by Oxford Pro Bono Publico, a research centre affiliated to the University of Oxford, found India’s controls over the collection, storage and use of biometric data, compared to other jurisdictions, hugely deficient.
The sheer scale of the project compounds concerns, with UIDAI aiming to enrol every one of India’s 1.2 billion people. The scheme was first introduced as voluntary, but as more and more development schemes are administered through it, welfare recipients seeking state aid have little choice but to hand over their data.
Justice Puttaswamy, a retired High Court judge, has led the charge in challenging the scheme on privacy grounds. As he argued in his petition to the Indian Supreme Court, “there are no safeguards or penalties and no legislative backing for obtaining personal information”. His complaint culminated in a Supreme Court interim order, which insisted that the scheme must remain voluntary and that those entitled to receive welfare should do so regardless of their Aadhaar status.
Attempts to circumvent the Aadhaar programme to deliver benefits, however, have become increasingly difficult. Last year, despite the Supreme Court order, reports emerged from Delhi that food-subsidy ration cards were only being handed out to those with national identification numbers. A recent announcement by the Minister for Food and Civil Supplies, that consumers without Aadhaar cards would continue to receive discounted cooking gas, provoked oil companies and the Union Ministry of Petroleum and Natural Gas to return to the Supreme Court to file an appeal.
Aadhaar was introduced via an executive order, a lack of statutory backing that critics argue makes the scheme unconstitutional. As Shyam Divan, a practising lawyer and petitioner in a case against the UIDAI, explains, there is no legislative oversight of the collection, storage and use of biometric data. Controls on access are similarly scant. There are no provisions that address who can access the data, when and why. At the field level, agents enrolling applicants to the scheme are employed privately and work without government supervision. Once collected, the data passes through private hands before being transferred to the UIDAI’s central repository. Corporations (including the consulting firm Accenture, tech-solutions firm Morpho and American defence contractor L-1 Identity) are involved at every stage of the operation, a sprawling collection and transmission network that campaigners fear maximises the opportunity for abuse.
The case against the scheme on constitutional grounds is equally robust. Every time a person uses their unique Aadhaar number, a real-time confirmation is sent between the access point and central database, a process that activists complain amounts to covert surveillance. Critics argue that this tracking violates the right to privacy enshrined in Article 21 of Indian Constitution. According to campaigners insufficient information on the data-collection process also amounts to a lack of informed consent, a further rights violation.
Through public interest litigation various groups have taken the UIDAI to court over the lack of statutory backing and inadequate data protection, suits that the state has dismissed as “frivolous, misleading and legally incorrect” attempts at derailing a “project that aims to promote inclusion and benefit marginalized sections of society”.
The size and inefficiency of India’s welfare state imposes enormous pressures on officials to improve service delivery. The scheme’s defenders invoke a democratic justification, arguing the government has a responsibility to ensure that welfare spending reaches those that are most in need.
Nandan Nilekani, chairperson of the UIDAI, has admitted that he may not have done enough to persuade people of the benefits of the scheme. But as Justice Puttaswamy insists “the way the government has gone about implementing this project is odd and illegal,” and questions about privacy still loom large. | <urn:uuid:b0450c4a-944a-4706-ac39-e218d90b7a6a> | CC-MAIN-2020-16 | https://www.indexoncensorship.org/2014/01/indias-biometric-benefits-database-trampling-privacy/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00214.warc.gz | en | 0.943215 | 1,002 | 2.703125 | 3 |
LED street light design is a completely different challenge to traditional discharge lighting. This article discusses an important consideration in the form of maintanance factors. Although LED's promise exceptional life cycles - what happens when you put them in the public realm in difficult environments?
When designing with discharge lighting the concept of maintenance factors is well understood and documented. Once a cleaning regime for the proposed scheme has been determined then the appropriate luminaire maintenance factor can be determined from tables in the British Standard.
For example, in the soon to be published Draft BS 5489-1 2012, figures of 0.88 and 0.84 are given for IP65 or greater luminaires at 6m or less in an E3 or E4 zone for a four year and six year cleaning cycle.
These figures are published for luminaires of IP65 or greater and, as no appreciable dirt will enter these optics, the figures therefore relate to the dirt build up on the outside of a luminaire which obscures the light leaving the optic.
The figure selected is then multiplied by the lamp lumen depreciation figure for the same time period which is obtained from the lamp manufacturer’s lumen depreciation curve. The resulting figure gives the maintenance factor to be used for the scheme design.
When the lamp is replaced and the exterior surface of the optic cleaned then the light output of the luminaire will theoretically return to its initial value of 100%. If the light output of the luminaire was plotted against time then the light output would be as per the blue line as shown on figure 1.
Shows depreciation of overall light output over time taking into account both dirt build-up on the luminaire and the reduction in output of the lamp over time. Design level lines show the level the scheme must be designed to.
The lighting level on the ground will always be above the design lighting level and only reach the design level during the nights before the luminaire is cleaned. Consequently the scheme is always over-lit (see figure 1a), and only approaches its design level every four years.This represents a large amount of wasted energy.
Shows wasted energy due to over lighting.
The Challenge of LED Light Design
When we design with LED luminaires we are faced with a challenge. Assuming that the LED luminaire is sealed to the same degree i.e. IP65 or greater, then the same luminaire maintenance factor will be applicable.
However, the LEDs are not replaced at cleaning and if the quoted lifetimes of 50 to 60,000 hours are reached then it will be 15 years or more before the LED modules, or indeed the whole luminaire, are replaced.
LEDs in general do not fail suddenly as we are used to with discharge lamps, the light output of an LED gradually reduces over time. The L70 figure is commonly quoted for LEDs as the life in hours as to when an LED will reach 70% of its initial brightness. If this figure of 0.7 is used as the source lumen maintenance figure, and then multiplied by the luminaire maintenance factor, then we end up with a design maintenance figure of 0.58 for a six year cleaning cycle.
Plotting the output of the light source solely we get a graph as shown in figure 2 (below.) This is in contrast to the graphs plotted above, which are inclusive of the cleaning regime.
Shows reduction in output of the lamp over time. Blue line shows drop in output for a discharge lamp, which gets changed every 5-6 years.
LED power supplies are now being developed that compensate for this. They slowly ramp up the power supplied to the LEDs over the predicted lifetime. This helps to compensate for the gradual lumen depreciation over time and can lead to much improved lumen maintenance figures. Additionally, as the LED is effectively dimmed on initial start they are not stressed to perform at 100% and the diode will last longer as a result.
The rate of lumen depreciation of LEDs is very dependent upon junction temperatures. To keep this depreciation to a minimum, the junction temperatures should be kept as low as possible. By minimising the junction temperature, the lumen depreciation curve will be almost flat and the minimum amount of light and energy will be wasted. Figure 2 shows this as real life figures from discharge lamp vs an LED with a low junction temperature.
Here are our calculations for reference, please note they are generic LED projections and not specific to Marshalls components or luminaires: | <urn:uuid:7fde6760-512c-436f-a167-3af98843cda8> | CC-MAIN-2018-30 | https://www.marshalls.co.uk/commercial/blog/led-street-light-design-maintenance-factors | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594018.55/warc/CC-MAIN-20180722213610-20180722233610-00235.warc.gz | en | 0.932036 | 919 | 2.609375 | 3 |
Google has continued to expand its Translation services by adding a Translation Dictionary to its Translation page. Now there are 3 tabs on the Google Translate page.
- Text and Web - The original translate page where you can enter a word into the translate box or an URL for the whole web page translation.
- Search Results - Translates Google search results and resulting web pages.
- Dictionary - Translates a word or phrase and gives its multiple meanings with related phrases
There are two major differences that I see between the original Google Translate and the new Google Translate Dictionary.
- If a word has multiple meanings, the dictionary will show the each of the word meanings whereas the original Google Translate will choose only one meaning. This leads to some of the weird and convoluted Google translations we have all seen.
- The Google Dictionary will show related phrases to show how the word is used.
The Google Translate Dictionary is still in Beta and I've gotten some unusual results from the dictionary. For example, when I looked for the English to French for the word genealogy , the Google Translate Dictionary said that no translation could be found.
At this time translations are available between English and French, German, Italian, Korean and Spanish.
Learn more Google tips and tricks for searching your ancestors. | <urn:uuid:e417a681-1604-45a8-8b5f-512f06db035c> | CC-MAIN-2017-13 | http://ancestorsearch.blogspot.com/2007/06/google-translation-dictionary.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.72/warc/CC-MAIN-20170322212949-00296-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.845894 | 265 | 2.671875 | 3 |
Portsmouth, New Hampshire
|Portsmouth, New Hampshire|
Location in Rockingham County and the state of New Hampshire.
|• Mayor||Jack Blalock|
|• City manager||John P. Bohenko|
|• City council||James Splaine
Rebecca E. Perkins
M. Chris Dwyer
|• Total||16.8 sq mi (43.6 km2)|
|• Land||15.6 sq mi (40.5 km2)|
|• Water||1.2 sq mi (3.1 km2) 7.21%|
|Elevation||20 ft (6 m)|
|• Density||1,358/sq mi (524.4/km2)|
|Time zone||Eastern (UTC-5)|
|• Summer (DST)||Eastern (UTC-4)|
|GNIS feature ID||0869312|
Portsmouth is a city in Rockingham County, New Hampshire, in the United States. It is the only city in the county, but only the fourth-largest community, with a population of 21,233 at the 2010 census. A historic seaport and popular summer tourist destination, Portsmouth was the home of the Strategic Air Command's Pease Air Force Base, later converted to Portsmouth International Airport at Pease with limited commercial air service.
Native Americans of the Abenaki and other Algonquian languages-speaking nations, and their predecessors, inhabited the territory of coastal New Hampshire for thousands of years before European contact.
The first known European to explore and write about the area was Martin Pring in 1603. The Piscataqua River is a tidal estuary with a swift current, but forms a good natural harbor. The west bank of the harbor was settled by English colonists in 1630 and named Strawbery Banke, after the many wild strawberries growing there. The village was fortified by Fort William and Mary. Strategically located for trade between upstream industries and mercantile interests abroad, the port prospered. Fishing, lumber and shipbuilding were principal businesses of the region. Enslaved Africans were imported as laborers as early as 1645 and were integral to building the city's prosperity. Portsmouth was part of the Triangle Trade, which made significant profits from slavery.
At the town's incorporation in 1653, it was named Portsmouth in honor of the colony's founder, John Mason. He had been captain of the port of Portsmouth, England, in the county of Hampshire, for which New Hampshire is named.
When Queen Anne's War ended in 1712, the town was selected by Governor Joseph Dudley to host negotiations for the 1713 Treaty of Portsmouth, which temporarily ended hostilities between the Abenaki Indians and English settlements of the Province of Massachusetts Bay and New Hampshire.
In 1774, in the lead-up to the Revolution, Paul Revere rode to Portsmouth warning that the British were coming, with warships to subdue the port. Although the harbor was protected by Fort William and Mary, the rebel government moved the capital inland to Exeter, safe from the Royal Navy. The Navy bombarded Falmouth (now Portland, Maine) on October 18, 1775. African Americans helped defend Portsmouth and New England during the war. In 1779, 19 slaves from Portsmouth wrote a petition to the state legislature and asked that it abolish slavery, in recognition of their war contributions and in keeping with the principles of the Revolution. Their petition was not answered then, but New Hampshire later ended slavery.
Thomas Jefferson's 1807 embargo against trade with Britain withered New England's trade with Canada, and a number of local fortunes were lost. Others were gained by men who acted as privateers during the War of 1812. In 1849, Portsmouth was incorporated as a city.
Once one of the nation's busiest ports and shipbuilding cities, Portsmouth expressed its wealth in fine architecture. It contains significant examples of Colonial, Georgian, and Federal style houses, a selection of which are now museums. Portsmouth's heart contains stately brick Federalist stores and townhouses, built all-of-a-piece after devastating early 19th-century fires. The worst was in 1813 when 244 buildings burned. A fire district was created that required all new buildings within its boundaries to be built of brick with slate roofs; this created the downtown's distinctive appearance. The city was also noted for the production of boldly wood-veneered Federalist furniture, particularly by the master cabinet maker Langley Boardman.
The Industrial Revolution spurred economic growth in New Hampshire mill towns such as Dover, Keene, Laconia, Manchester, Nashua and Rochester, where rivers provided water power for the mills. It shifted growth to the new mill towns. The port of Portsmouth declined, but the city survived through Victorian-era doldrums, a time described in the works of Thomas Bailey Aldrich, particularly in his 1869 novel The Story of a Bad Boy.
In the 20th century, the city founded a Historic District Commission, which has worked to protect much of the city's irreplaceable architectural legacy. In 2008, Portsmouth was named one of the "Dozen Distinctive Destinations" by the National Trust for Historic Preservation. The compact and walkable downtown on the waterfront draws tourists and artists, who each summer throng the cafes, restaurants and shops around Market Square. Portsmouth annually celebrates the revitalization of its downtown (in particular Market Square) with Market Square Day, a celebration dating back to 1977, produced by the non-profit Pro Portsmouth, Inc.
Portsmouth shipbuilding history has had a long symbiotic relationship with Kittery, Maine, across the Piscataqua River. In 1781-1782, the naval hero John Paul Jones lived in Portsmouth while supervising construction of his ship Ranger, which was built on nearby Badger's Island in Kittery. During that time, he boarded at the Captain Gregory Purcell house, which now bears Jones' name, as it is the only surviving property in the United States associated with him. Built by the master housewright Hopestill Cheswell, an African American, it has been designated as a National Historic Landmark. It now serves as the Portsmouth Historical Society Museum.
The Portsmouth Naval Shipyard, established in 1800 as the first federal navy yard, is located on Seavey's Island in Kittery, Maine. The base is famous for being the site of the 1905 signing of the Treaty of Portsmouth which ended the Russo-Japanese War. Though US President Theodore Roosevelt orchestrated the peace conference that brought Russian and Japanese diplomats to Portsmouth and the Shipyard, he never came to Portsmouth, relying on the Navy and people of New Hampshire as the hosts. Roosevelt won the 1906 Nobel Peace Prize for his diplomacy in bringing about an end to the War.
Jackson House (built 1664) as it appeared in 1909
Warner House (built 1716) as it appeared in 1902
Wentworth-Coolidge Mansion (built 1750) as it appeared in 1902
Governor Langdon House (1784)
Old Custom House & Post Office (1860), designed by Ammi B. Young
According to the United States Census Bureau, the city has a total area of 16.8 square miles (43.6 km2), of which 15.6 square miles (40.5 km2) is land and 1.2 square miles (3.1 km2), or 7.21%, is water. Portsmouth is drained by Sagamore Creek and the Piscataqua River. The highest point in the city is 110 feet (34 m) above sea level, within Pease International Airport.
The city is crossed by Interstate 95, U.S. Route 1, U.S. Route 4, New Hampshire Route 1A, New Hampshire Route 16, and New Hampshire Route 33. Boston is 55 miles (89 km) to the south, Portland, Maine, is 53 miles (85 km) to the northeast, and Dover, New Hampshire, is 13 miles (21 km) to the northwest.
Portsmouth has a humid continental climate in spite of its maritime position, due to prevailing inland winds. Summers are moderately warm with winter days averaging around the freezing point, but with cold nights bringing it below the required −3 °C (27 °F) isotherm to have a humid continental climate. With high year-round precipitation, the cold winters can often be very snowy and summers wet.
|Climate data for Portsmouth|
|Average high °F (°C)||32
|Daily mean °F (°C)||25
|Average low °F (°C)||16
|Average rainfall inches (mm)||3.66
As of the census of 2010, there were 21,233 people, 10,014 households, and 4,736 families residing in the city. The population density was 1,361.1 people per square mile (524.4/km²). There were 10,625 housing units at an average density of 681.1 per square mile (262.3/km²). The racial makeup of the city was 91.5% White, 1.7% African American, 0.2% Native American, 3.5% Asian, 0.01% Pacific Islander, 0.7% some other race, and 2.3% from two or more races. Hispanic or Latino of any race were 2.8% of the population.
There were 10,014 households, out of which 20.2% had children under the age of 18 living with them, 35.5% were headed by married couples living together, 8.3% had a female householder with no husband present, and 52.7% were non-families. 39.2% of all households were made up of individuals, and 11.8% were someone living alone who was 65 years of age or older. The average household size was 2.03, and the average family size was 2.75.
In the city the population was spread out with 16.6% under the age of 18, 7.7% from 18 to 24, 32.2% from 25 to 44, 27.6% from 45 to 64, and 15.9% who were 65 years of age or older. The median age was 40.3 years. For every 100 females there were 94.2 males. For every 100 females age 18 and over, there were 92.6 males.
For the period 2010-14, the estimated median annual income for a household in the city was $67,679, and the median income for a family was $90,208. Male full-time workers had a median income of $58,441 versus $45,683 for females. The per capita income for the city was $42,724. About 4.0% of families and 7.6% of the population were below the poverty line, including 6.9% of those under age 18 and 7.1% of those age 65 or over.
Government and politics
The city of Portsmouth operates under a council-manager system of government. Portsmouth elects a nine-member at-large City Council to serve as the city's primary legislative body. The candidate who receives the highest number of votes is designated the Mayor (currently Jack Blalock), while the candidate receiving the second-highest vote total is designated the Assistant Mayor (currently James R. Splaine). While the mayor and council convene to establish municipal policy, the day-to-day operations of the city government are overseen by the City Manager (currently John Bohenko).
Portsmouth is part of New Hampshire's 1st congressional district, currently represented by Frank Guinta (R-Manchester). Portsmouth is part of the Executive Council's 3rd district, currently represented by Chris Sununu (R-Salem). In the State Senate, Portsmouth is represented by Martha Fuller Clark (D-Portsmouth). In the State House of Representatives, Portsmouth is divided among the 25th through 31st districts.
|2012||67.6% 8,828||31.3% 4,088|
|2008||70.4% 9,147||28.7% 3,729|
|2004||66.4% 8,436||33.0% 4,185|
|2000||59.9% 6,862||34.0% 3,896|
Politically, Portsmouth has become a center of liberal politics and stronghold for the Democratic Party. In 2012, Portsmouth voted 67.56% for Barack Obama in the presidential election, 70.16% for Maggie Hassan in the gubernatorial election, and 68.50% for Carol Shea-Porter in the congressional election. In 2014, Portsmouth voted 70.05% for Maggie Hassan in the gubernatorial election, 67.34% for Jeanne Shaheen in the senatorial election, and 68.34% for Carol Shea-Porter in the congressional election.
In March 2014, Portsmouth became the first municipality in New Hampshire to implement protections for city employees from discrimination on the basis of gender identity, by a 9-0 vote of the city council.
Sites of interest
- USS Albacore Museum & Park – a museum featuring the USS Albacore, a U.S. Navy submarine used for testing, which was decommissioned in 1972 and moved to the park in 1985. The submarine is open for tours.
- Buckminster House – built in 1725, formerly a funeral parlor.
- Discover Portsmouth Center – visitor center, gallery, gift shop, John Paul Jones Historic House, walking tours, short film on the history of Portsmouth; operated by the Portsmouth Historical Society.
- The Music Hall – a 900-seat theater originally opened in 1878. The theater is now run by a non-profit organization and currently under restoration. The venue hosts musical acts, theater, dance and cinema.
- North Church – historic church, the steeple of which is visible from most of Portsmouth
- New Hampshire Theatre Project – founded in 1986, a non-profit theater organization producing contemporary and classical works, and offering educational programs.
- Pontine Theatre – produces original theater works based on the history, culture and literature of New England at their 50-seat black box venue.
- The Player's Ring Theater – a black-box theater that produces original work from local playwrights.
- Portsmouth Athenæum – a private membership library, museum and art gallery open to the public at certain times.
- Portsmouth Harbor Lighthouse – first established in 1771, the current structure was built in 1878 and is open for monthly tours from May through September.
- Prescott Park Arts Festival – summer entertainments in Portsmouth's waterfront park.
- Seacoast Repertory Theatre – founded in 1988, a professional theater troupe.
- Strawbery Banke Museum – a neighborhood featuring several dozen restored historic homes in Colonial, Georgian and Federal styles of architecture. The site of one of Portsmouth's earliest settlements.
- Whaling Wall – Painting of Isles of Shoals Humpbacks created by Robert Wyland, situated on the back of Cabot House Furniture. It is in disrepair, and restoration has not been allowed by the owners of Cabot Furniture.
- Four public sculptures carved by Cabot Lyford stand in the city, including "The Whale" and "My Mother the Wind," a seven-ton blank granite statue which was installed on Portsmouth's waterfront in 1975.
Historic house museums
- Richard Jackson House (1664)
- John Paul Jones House (1758)
- Governor John Langdon House (1784)
- Tobias Lear House (1740)
- Moffatt-Ladd House (1763)
- Rundlet-May House (1807)
- MacPheadris-Warner House (1716)
- Wentworth-Coolidge Mansion (1750)
- Wentworth-Gardner House (also called Wentworth House) (1760)
Heinemann USA is based in Portsmouth. Before its dissolution, Boston-Maine Airways (Pan Am Clipper Connection), a regional airline, was also headquartered in Portsmouth. Companies with headquarters in Portsmouth include packaged software producer Bottomline Technologies and frozen yogurt maker Sweet Scoops.
According to the city's 2012 Comprehensive Annual Financial Report, the top ten employers in the city are:
|1||Hospital Corporation of America||1,079|
|2||Liberty Mutual Insurance||1,013|
|3||National Passport Center||736|
|5||City of Portsmouth||684|
|6||National Visa Center||644|
|7||John Hancock Insurance||400|
|9||Thermo Fisher Scientific||280|
|10||Alpha Flying/Plane Sense||270|
- Community College System of New Hampshire, Great Bay Community College – Portsmouth campus
- Franklin Pierce University – Portsmouth campus
- Granite State College – Portsmouth campus and on-site location at Great Bay Community College
- Southern New Hampshire University – Portsmouth campus
- WSCA-LP Portsmouth Community Radio 106.1 FM
- WHEB 100.3 FM rock formatted
- WMGE 1380 AM classic country
The Seacoast United Phantoms are a soccer team based in Portsmouth. Founded in 1996, the team plays in the USL Premier Development League (PDL), the fourth tier of the American Soccer Pyramid, in the Northeast Division of the Eastern Conference.
- The Rockingham County towns (not cities) of Derry (33,109), Salem (28,776), and Londonderry (24,129) had greater populations according to the 2010 census.
- "Geographic Identifiers: 2010 Demographic Profile Data (G001): Portsmouth city, New Hampshire". American Factfinder. U.S. Census Bureau. Retrieved January 26, 2016. NOTE: Population revised 12-20-2011 from original figure of 20,779.
- Coolidge, A. J.; J. B. Mansfield (1859). A History and Description of New England. Boston, Massachusetts: H. G. Houghton and Company. pp. 622–629.
- Ring, Phyllis. "The Place Her People Made". The Heart of New England. Retrieved August 27, 2010.
- Robinson, J. Dennis. "Paul Revere's Other Ride". Seacoast NH History. Retrieved August 27, 2010.
- "Dozen Distinctive Destinations: Portsmouth, NH". Preservation Nation. Retrieved 27 August 2010.
- What is Market Square Day?
- Mark J. Sammons and Valerie Cunningham, Black Portsmouth: Three Centuries of African-American Heritage, (2004), pp. 32-33, accessed 27 July 2009
- Brewster, Charles W. "The Ship "America" and John Paul Jones". Seacoast NH. Retrieved August 27, 2010.
- "Eco-municipalities". instituteforecomunicipalities.org. Retrieved August 27, 2010.
- "Portsmouth, New Hampshire Climate Summary". Weatherbase. Retrieved 5 February 2015.
- "Portsmouth, New Hampshire Temperature Averages". Weatherbase. Retrieved 5 February 2015.
- "Annual Estimates of the Resident Population for Incorporated Places: April 1, 2010 to July 1, 2015". Retrieved July 2, 2016.
- "Census" (PDF). United States Census. page 36
- "Profile of General Population and Housing Characteristics: 2010 Census Summary File 1 (DP-1): Portsmouth city, New Hampshire". American Factfinder. U.S. Census Bureau. Retrieved January 26, 2016.
- "Selected Economic Characteristics: 2010-2014 American Community Survey 5-Year Estimates (DP03): Portsmouth city, New Hampshire". American Factfinder. U.S. Census Bureau. Retrieved January 26, 2016.
- "Portsmouth City Council, 2014 and 2015". City of Portsmouth. Retrieved 6 June 2015.
- "City Manager". City of Portsmouth. Retrieved 6 June 2015.
- "Congressional Delegation". NH.gov. Retrieved 6 June 2015.
- "Voting Districts". New Hampshire Secretary of State. Retrieved 6 June 2015.
- "Election Results". Retrieved 6 June 2015.
- "Election Results". Portsmouth, New Hampshire City Clerk. Retrieved 6 June 2015.
- Emily Corwin. "Portsmouth City Council Unanimously Approves Gender Identity Protection". New Hampshire Public Radio. Retrieved 9 June 2015.
- "J Verne Wood Funeral Home - History".
- "New Hampshire Theatre Project". Retrieved August 27, 2010.
- "Pontine Theatre, Portsmouth, NH". pontine.org. Retrieved August 27, 2010.
- "Prescott Park". prescottpark.org. Retrieved August 27, 2010.
- "Seacoast Repertory Theatre". seacoastrep.org. Retrieved August 27, 2010.
- Choate, David "Whaling Wall endangered" Sept. 14 2010, Seacoast Online
- Keyes, Bob (2016-01-23). "Maine sculptor Cabot Lyford dies at 90". Portland Press Herald. Retrieved 2016-02-13.
- "Pan Am Clipper Connection". Archived from the original on January 11, 2007. Retrieved August 27, 2010.
- City of Portsmouth CAFR
- The Wire
- "Sister Cities for Portsmouth, New Hampshire". Retrieved May 29, 2013.
- Trudy Ring and Robert M. Salkin, ed. (1995). "Portsmouth/New Castle". Americas. International Dictionary of Historic Places. Routledge. p. 512+. ISBN 978-1-134-25930-4.
|Wikimedia Commons has media related to Portsmouth, New Hampshire.|
|Wikisource has the text of a 1911 Encyclopædia Britannica article about Portsmouth, New Hampshire.| | <urn:uuid:cf09c1ee-d254-49de-a87b-b8b4c231e463> | CC-MAIN-2016-44 | https://en.wikipedia.org/wiki/Portsmouth,_New_Hampshire | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720615.90/warc/CC-MAIN-20161020183840-00281-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.909773 | 4,567 | 2.671875 | 3 |
During springtime, flooding, thin ice and rushing waters can lead to tragedy. But there are ways to keep kids safe from spring water runoff and rains.
Every year we hear of someone who has drowned in the rushing waters of a creek or river, and often that someone is a child. In the spring, with extra rain and melting snow, rivers and creeks can be particularly hazardous. Even neighborhood creeks that 98% of the time may seem relatively safe, can suddenly turn treacherous.
As parents we must warn our children about these creeks and rivers. Because for most of the year they appear to be pretty benign, kids may think they’re safe and something they don’t have to ever worry about. Unfortunately, for maybe two or three days of the year, heavy rainstorms or melting snow can cause them to flood quickly, creating a dangerous flash flood situation. It’s for this reason that Ken Burton with the Royal Canadian Mounted Police says spring can pose some hazardous circumstances. “Moving water presents a very dangerous situation. One cubic foot of water weighs 62 pounds. When it’s moving, it presents a lot of force. My best advice is to stay clear of it, stay well back of it.”
Simply standing on the bank watching the rushing currents can be risky as the banks of creeks and rivers can be undercut by the water and give in under the weight of the child, explains Burton. “There’s always a chance of a bank collapsing so stay back from it. View it from a safe distance, or wait for the news that night and view it from the safety of your living room.”
And if you live in an area where spring time means thin ice, warn your children to stay clear of any frozen body of water. “All too often at this time of year, people will venture on the ice, and fall through. At this time of year, stay clear. You’re never sure how deep it is and it’s extremely dangerous,” says Burton.
Teaching our children a little respect for the power of Mother Nature is a lesson that will serve them well throughout their lives, and it could prevent a terrible tragedy from ever occurring.
Adapted from The Parent Report Radio Show. Any advice or information contained herein should never be a substitute for professional and/or medical advice, diagnosis and treatment. For more information please review Terms of Service.
For more about water safety, please click here. | <urn:uuid:6417646d-4656-4bf6-b62d-841b384fdde9> | CC-MAIN-2014-23 | http://www.theparentreport.com/2014/05/the-dangers-of-spring-flooding/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877693.48/warc/CC-MAIN-20140722025757-00131-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.94541 | 518 | 3.015625 | 3 |
It was the biggest disaster in Alaska, Yukon and British Columbia history, but remoteness and bad timing have meant that while everyone everywhere knows about the RMS Titanic, few even in Alaska have heard of the SS Princess Sophia.
Ninety-five years ago Friday Oct. 25, the Princess Sophia, operated by the Canadian Pacific Railway's steamship line, sank in a storm in Southeast Alaska's Inside Passage, in an area that is now part of the capital city of Juneau.
So how did such a devastating -- and stunning -- event become so lost to history?
"Its timing was incredibly bad, public relations-wise," said Bill Morrison, a Canadian university professor who spoke in Juneau recently as part of a Juneau World Affairs Council exploration of Alaska-Canada issues.
Morrison's Book, "The Sinking of the Princess Sophia: Taking the North Down With Her," was originally published by Oxford University Press in 1991. It's now in print with the University of Alaska Press. His co-author is Ken Coates.
At another time, Morrison told a packed hall at the University of Alaska Southeast, the dramatic deaths of all 343 passengers and crew aboard the Princess Sophia would have entered popular culture, as did other sinkings. While more than 1,500 died on the Titanic in 1912, some 700 more lived to tell the tales of the trans-Atlantic liner's last hours.
The Princess Sophia left Skagway late on Oct. 23, running up onto Vanderbilt Reef during the dark of a snowy night. Not all vessels carried radios in those days, but the steamer did, and she sent a message by what was then called "wireless" to Juneau for help.
The enormity of the situation was not immediately obvious, and the passengers settled in to wait for refloating or rescue.
Vanderbilt Reef was then miles north of Juneau, though the boundaries of the City and Borough of Juneau now extend up Lynn Canal beyond the reef.
First fishing boats, and then a U.S. Lighthouse Service tender arrived to help. Juneau sent word of the grounding to Vancouver, B.C. and another CPR steamer, the Princess May, was dispatched to take off the passengers.
Another such grounding on another Lynn Canal reef had ended uneventfully when the passengers were transferred to a different vessel and the ship was refloated.
Also likely on the mind of Princess Sophia Captain Leonard Locke, Morrison said, was a recent sinking in Canadian waters in which lifeboats were launched prematurely, drowning all their occupants, while those who remained aboard were rescued.
With strong winds blowing down Lynn Canal, Locke chose not to launch lifeboats into the rough seas.
'Blowing like crazy'
At the time, the barometer was rising and it appeared that better weather may have been on the way.
Instead, the weather deteriorated and the rescue boats were unable to approach the jagged, wave-pounded reef. Morrison describes the horrific final hours of the Princess Sophia.
"It's blowing like crazy, the tide is rising - suddenly the stern end of the ship lifts off (the reef) as it turns around facing north. It blows off the reef, it rips a huge gash in the hull and it slips stern first into 90 feet of water."
Aboard the Princess Sophia, passengers donned life vests and wrote final letters to family. Two letters, wrapped in oilskin, were found later.
As the vessel begins to move, those aboard the Princess Sophia knew they were in great danger, and its wireless operator pleaded for help. "For God's Sake, hurry, the water is in my room," was one of the last messages received by the Cedar, a lighthouse tender that was sheltering behind a nearby island.
The Cedar risked wrecking itself as it ventured out into the snowy night, but in the days before radar, it had no hope of getting near the Sophia. In those conditions, foghorns provided the only navigation method. They vessel crews listened for the echos of their own foghorns from the steep sides of Lynn Canal, while on board the Cedar they listened for the foghorn of a nearby lighthouse they could not see, despite its nearness.
The rising water caused a boiler in the Sophia to explode, spilling thick bunker fuel into the water while those aboard attempted to launch lifeboats and reach shore. The pounding seas combined with congealing oil in the icy waters to make that impossible.
"Everybody suffocates or drowns or dies of exposure," Morrison said. "One man crawls onto a neighboring island and freezes to death, but everybody's dead."
With the Cedar unable to get near the Sophia, there were no witnesses to the doomed vessel's final hours.
'Juneau turned into enormous morgue'
By the next morning, the weather had cleared, but nothing remained of the Sophia but a mast projecting out of the water, and bodies, wreckage and thick oil floating on the water. The rescue turned into a giant recovery operation.
"Juneau is turned into an enormous morgue," Morrison said.
A call went out for coffins to neighboring communities. Teams of volunteers used gasoline to clean the congealed oil from the bodies in preparation for shipping to their next-of-kin. Men cleaned the male bodies, while women prepared the female bodies.
Many bodies were eventually shipped by another Canadian Pacific Railway steamer to Vancouver, where the timing of the vessel's arrival showed one of the reasons why the sinking of the Sophia is so little known today.
It arrived on the morning of Nov. 11, 1918, where word of the end of World War I had just been announced. Proportionately, Canadian casualties were many times higher than those of the U.S. in the war.
"It was Armistice Day, everybody was jumping up and down with joy, and here comes the 'ship of doom,'" Morrison said. It waited offshore for a day, so as to not interfere with the celebrations, he said.
But the timing explains some of the reasons that the sinking has been so overlooked by history.
"The Sophia sank right after the biggest mass slaughter in military history," he said.
The sinking of the Sophia was devastating to the small Yukon Territory population, where many had been traveling south for the winter after seasonal work on gold dredges or riverboats. The sinking killed 8 percent of the Caucasian population of Yukon, Morrison said.
But those were working men and families, not the business and society leaders who were aboard the Titanic.
"There were no Guggenheims on it, and there were no Astors," Morrison said, referring to some of the notables who had been aboard the Titanic six years earlier.
McKinley pioneer among the dead
There was at least one notable Alaskan on board, but he was not rich. Walter Harper, the young Alaska Native who had been part of the first successful ascent of Mount McKinley -- and by some reports the first to set foot on the summit - was on board with his wife, Frances.
The young couple were on their way to Philadelphia, where Walter Harper had been accepted into medical school. The Harpers are buried in Juneau, where there is a monument to the Sophia.
It was even more than the numbers, the notable passengers and the effects of the World War that led to the difference, he said.
"The Titanic sank in an era when people still had this Edwardian enthusiasm about the world," he said.
The Sophia victims who were not buried in Juneau were shipped at Canadian Pacific Railway expense to wherever they were from, which was sometimes Vancouver, Seattle or Portland, or even the East Coast. The northern population was very transient in those days, and part of the reason why memories quickly faded.
Contact Pat Forgey at pat(at)alaskadispatch.com | <urn:uuid:6e78b20f-dd91-45dd-b466-648326085cae> | CC-MAIN-2016-40 | http://www.adn.com/features/article/why-do-so-few-remember-biggest-disaster-alaska-history-343-casualties/2013/10/26/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659512.19/warc/CC-MAIN-20160924173739-00199-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.981345 | 1,634 | 2.875 | 3 |
ITALIAN biologists claim that mouse sperm washed with fluids containing fragments of foreign DNA can pick up the stray genes and carry them into the eggs they fertilise, producing transgenic animals. The amazing experiment, described as the biological equivalent of cold fusion, is published in this week's issue of Cell.
If confirmed by other investigators, this discovery will revolutionise animal breeding. At the moment, biologists produce transgenic animals by two laborious and often unsuccessful procedures. They either inject fertilised eggs with foreign DNA, by hand under a microscope, or infect unspecialised embryonic cells with viruses engineered to carry a foreign gene.
The Italian finding also promises to alter our understanding of the processes underlying evolution. It suggests that sperm could transmit DNA across species boundaries, transforming the course of evolution.
Marialuisa Lavitrano and her colleagues at the University of Rome incubated sperm with cloned DNA known as pSV2-CAT. Mouse eggs ...
To continue reading this article, subscribe to receive access to all of newscientist.com, including 20 years of archive content. | <urn:uuid:ed6619fc-999d-427b-b9ee-2c47a7b55908> | CC-MAIN-2015-18 | http://www.newscientist.com/article/mg12216701.500-sperm-provides-a-bridge-between-species.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661916.33/warc/CC-MAIN-20150417045741-00192-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.941611 | 220 | 3.671875 | 4 |
One of the wonderful but irritating qualities of the technology culture prevalent in Silicon Valley and various other wannabe Silcon Somethings is the attitude that its engineers can fix everything wrong with the world. Joscelin Cooper, part of that very culture, describes how some of the Valley’s finest have turned to the world’s food crisis, writing at VentureBeat:
The technology industry can have an important impact on fixing the food system both by inventing new systems and infrastructure to reduce food waste, and ensuring that healthy, affordable food is widely available. Here are a few people and programs making a difference:
Invest in fake meat
Khosla Ventures has invested in numerous food-tech projects to create healthier foods that reduce the environmental impact of heavy meat consumption. As people in developing nations become more affluent, demand for meat products has gone up. However, the planet cannot sustain this growing market. Around 15 percent of the planet’s greenhouse gases are produced by livestock farming. Raising livestock also uses a massive amount of water, and has a detrimental (in some cases, entirely destructive) impact on ecosystems.
Investor Peter Thiel has backed Modern Meadow, a company devoted to creating tissue cultures that are biologically ‘meat’, without inflicting the damage that meat production, transportation, and slaughter wrecks upon the environment. If the idea of lab-grown meat doesn’t already warp your mind, consider that the products will essentially be produced via 3D printer.
Reduce food waste
Startup Leftover Swap allows neighbors to share their unwanted surplus food. If you have one too many portions of lasagna, or over-ordered take out, you can list your uneaten food on the app for it to be snapped up, sharing economy style. Besides helping to build community interactions, Leftover Swap also seeks to put a dent in the massive amount of food we waste every year.
Foodstar has created a technology that allows people to be alerted when produce that is near-expiration, or that doesn’t meet ‘aesthetic requirements’ is about to be pulled from shelves. Shoppers receive a notification to buy the food at a steep discount. Leftover, unpurchased food is then composted, rather than heading to a landfill…
[continues at VentureBeat] | <urn:uuid:871df0cc-a895-4960-a301-e3a4b858ddc8> | CC-MAIN-2014-52 | http://disinfo.com/2013/11/tech-industrys-plans-fix-food-production/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768977.107/warc/CC-MAIN-20141217075248-00112-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.95235 | 476 | 2.96875 | 3 |
Gift Helps Students Master Password Security
March 8, 2006—
In theory, passwords are supposed to deter attackers from being able to login to your computer and wreak their favorite kind of havoc. In practice, passwords can be notoriously easy to discover. And you don't even have to be a high-end hacker to do it.
"Anybody can walk around an office and find people's passwords in a five-minute sweep," says Guy Hembroff, an assistant professor in the School of Technology and the chair of the computer network and system administration program. That's because computer users write their passwords on paper and leave them in (or on) their desks. It's not just a matter of being careless, however. Most of us have to login to a number of servers, applications, websites, whatever, and each one can have a different password. Remembering them all is just too hard for the typical user.
A new technology, Single Sign On, or SSO, is changing that, and students majoring in computer network and systems administration are learning to master it. Here's how it works.
"Basically, SSO uses software to capture each of your login screens," Hembroff explains. "That way, when you login to various applications, you don't have to login again and again, and you don't have to write anything down."
Students will learn SSO on software donated to the university by the Lexington, Mass.-based company Imprivata. Its OneSign password management system is heavily used in the financial and health-care industries, where security concerns are paramount.
"We chose OneSign because Imprivata offers the best password management system on the market," Hembroff said. "It's proven to be reliable, adaptable and secure."
Training in OneSign will be particularly useful for computer network and system administration students after they graduate.
"Thanks to Imprivata's gift, our students will be learning the design and technology behind SSO, while gaining valuable hands-on experience that they will carry with them into the work environment," said Hembroff.
For more information on Imprivata, visit http://www.imprivata.com.
The BS in Computer Network and System Administration prepares students for employment in the computer information technology field, in areas such as network engineering, security engineering, and system administration. For more information, visit http://www.tech.mtu.edu/cnsa/index.html contact Hembroff at 906-487-3248 or [email protected]
Michigan Technological University (www.mtu.edu) is a leading public research university developing new technologies and preparing students to create the future for a prosperous and sustainable world. Michigan Tech offers more than 130 undergraduate and graduate degree programs in engineering; forest resources; computing; technology; business; economics; natural, physical and environmental sciences; arts; humanities; and social sciences. | <urn:uuid:1f75bac4-7ee7-4b31-be60-22f9de6f9f73> | CC-MAIN-2014-23 | http://www.mtu.edu/news/stories/2006/march/gift-helps-students-master-password-security.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889379.27/warc/CC-MAIN-20140722025809-00005-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.944949 | 607 | 2.515625 | 3 |
If x^3 + 3px^2 + 3qx + r = 0 has a double root, show that the double root must be (pq-r)/(2q-2p^2)
Note that your cubic must have the form where is the repeated root and is the third root. So you can expand this expression and equate the coefficients of the powers of x to the given cubic. This will give 3 equations:
and your job is to solve for a in terms of p, q and r.
To be honoust, I don't think this approach will make things easier.
It's a pretty tough system to crack, especially considering we must find the expression
Another way ofcourse would be to fill in the the given expression for " ", show that it satisfies:
Instead of trying to solve the value yourself.
To get back to my post. A root of an equation is a double root when it's also a root of . This fact can be shown quite easily, but I'm not sure if you may use this. It would make your work a lot easier.
We don't know which, but we know that the derivative is zero there.
The derivative is not zero at the other root.
Hence we solve for
re-arranging the 2nd equation for x^2, we get
Substituting back into f(x)=0
Again using the value for , we get
I did realize before all that you had put forward. But just didnt make the connection.
Can i just ask how is the equation able to accommodate for the sub of x^2 twice? I've never seen this type of solving method before.
Wouldn't there be like a "redudancy" in the equation?
we can utilise the derivative which is a quadratic.
The second root does not satisfy .... derivative = 0
the double root and one other value of x satisfies this (if the cubic has both a local max and local min as in this case if f(x) has no triple root).
The double root is one of the two values of x for which the derivative is zero.
However, only the double root satisfies both f(x)=0 and f'(x)=0.
Notice the way Danny solved the equations....
We are looking for the double root "a".
The 3 equations all contain the 2nd root "b", which is a fly in the ointment,
hence he proceeded to eliminate "b" as we had a system of simultaneous equations.
He also eliminated and to be left with , the double root.
Using the derivative, we proceed to eliminate and to be left with x,
because this x is the double root, corresponding to f(x)=0 and f'(x)=0.
for the double root
hence we now have a linear expression for at the double root .....you could use
Therefore we can rewrite f(x)=0 for the double root
We want x and f(x) still contains but since the value of x is the x co-ordinate of the double root.
for the x-value of the double root.
We just replace all terms at any stage by the value of given by the derivative, until the only x terms left are multiples of x.
I was thinking "graph" as the double root is on the x-axis and the x-axis is the tangent to the curve there.
Dinkydoe showed nicely how to work with it without that necessity. | <urn:uuid:cc5a8bd2-8229-4997-a0f1-806a85350335> | CC-MAIN-2014-10 | http://mathhelpforum.com/calculus/146070-double-root-polynomial.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678666156/warc/CC-MAIN-20140313024426-00019-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.946503 | 740 | 2.90625 | 3 |
BIOMASS-FIRED BOILER INSTALLATIONS FOR AGRICULTURE & AGRICULTURAL RESIDUES
Biomass energy is extremely suitable for the agricultural industry and agricultural residues is not waste, but the perfect fuel for energy production.
The highly efficient HoSt biomass-fired boiler installations are capable of firing agricultural residues for the production of renewable heat, power and steam with the lowest emissions. Agricultural residues such as sunflower seed husk, rice husk and rice straw, greenhouse vegetables waste and cocoa shells and many more. Applications are for example district heating, power generation, industrial steam for industrial processes, such as breweries, paper/carton factories, cheese factories and heat and CO2 for the greenhouse horticulture.
SUNFLOWER OIL PRODUCTION
RICE PRODUCTION (RICE HUSK/STRAW)
GREENHOUSES (CROP RESIDUES)
BREWERIES (SPENT GRAIN)
MAIZE / CORN (COBS/HUSK)
Optimized boiler installation for agriculture
Suitable for any agricultural industry company and firing many types of agricultural residues. A large radiation section is key when firing agricultural residues. These agricultural residues fuels contain a lot of minerals with a low ash melting point. HoSt developed a boiler installation which is able to solidify the evaporated minerals by radiation to avoid excessive fouling of the boiler. In the HoSt furnace, the walls of the furnace are cooled due to the same reason and the firing temperature on the grate as well. The latter is achieved by flue gas recirculation below the grate. For heating a greenhouse, the HoSt hot water boiler is the best choice. | <urn:uuid:d9d434c8-1c1f-4683-8097-1d9fbdb4f7b4> | CC-MAIN-2023-23 | https://www.host.nl/en/agricultural-industry-residues/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00370.warc.gz | en | 0.890285 | 358 | 2.640625 | 3 |
An imposed idea of well being removes the complete freedom to explore what it feels like to us individually. It is not a thing to attain or achieve - we were all born with well being.
Well being is innate, and about becoming the best version of yourself.
Well being has infinite perceptions and many roads to discover how to access it.
What is your perception of well being? This is usually influenced by your current mind state and your values and beliefs.
Well being cannot be 'done to' any of us-it is innately sensitive to each of us.
Well being needs to be freely accessed and not be imposed via a curriculum. Although some structure can develop resilience skills, it must be balanced with the richness of choice, and have enough time allowed to explore issues. Particularly those sensitive issues arising from the pupils.
Sometimes we unconsciously make well being a set thing- a what (a reinterpretation of an interpretation of what others decide about children learning!) Or a should (you should do it this way). An imposed idea of well being removes the complete freedom to explore what it feels like to us individually. It is not a thing to attain or achieve - we were all born with well being. As adults we need to brush aside our preconceived ideas of well being, and create the conditions for children and youth to test their world, to explore situations, feelings and to know how to find hope.
By facilitating - being the enabler, the listener, modelling open conversation and deep respect; exploring positive actions together. Using story and metaphor to explore situations supports a wider understanding. It does not cap pupil ideas or squeeze them into a box or list.
Children and Youth have their own voices that are always telling us something. Are we listening? Listening without judging or imposing ideas. Are we providing safe spaces to explore every avenue presented?
Why are you facilitating well being? Is your own well being in a space of being OK? If not how can YOU rediscover your wellness?
INSPIRATION. What do you love to do? This is a key. Exploring what we love provides a sense of the feelings we have relative to this. feelings are our guide to the thinking we have. They can be trusted when we are in a space of OK such as unconditional love - or a relaxed neutral space. Our feelings cannot be trusted when they are any less than OK. (Cross, tired, grumpy, angry, annoyed etcetera.)
Something to kick start your discussion about mental health.
Explore health / wellness/ feeling OK
Ask what pupils LOVE and why?
Show them that well being and mental health is a continuum
Thoughts fluctuate and feeling OK one minute then sad or grumpy is quite normal
Explore - how do we know what we are thinking . . . (feelings)
If we acted on EVERY feeling we would be exhausted. WE CHOOSE our thoughts and how to ignore them or act on them.
See also www.hlsgroup.net | <urn:uuid:c1d76440-73ef-4b38-8c57-894fe59d592c> | CC-MAIN-2020-05 | https://www.hlsgroup.net/single-post/2019/02/03/Owning-our-own-well-being | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251737572.61/warc/CC-MAIN-20200127235617-20200128025617-00260.warc.gz | en | 0.952035 | 615 | 3.265625 | 3 |
For millennia, humans have met their demise through violence, accidents and a fearsome array of infectious diseases. In 1900, the leading causes of death in the United States were pneumonia, influenza and tuberculosis. A century later, they are heart disease and cancer.
Antibiotics and other modern medicines have reduced the lethality of the microbial illnesses that killed our ancestors. Still, we all die of something. So we now find lying in wait for us scores of disorders characterized by the uncontrolled growth of cells. More than forty years since ‘war’ was declared on cancer, malignancy still casts a shadow over humanity: in 2012, 15% of deaths worldwide were attributable to cancer. The toll will almost certainly rise in the decades ahead, especially as developing countries adopt Western diets and lifestyles.
This Outlook presents an overview of the current battles against cancer. We examine advances in personalized treatments, nanodevices that will precisely deliver drugs to tumours and the radical changes that may be needed in clinical research as a result. We explain how the terabytes of data produced by cancer research could be too much of a good thing until we figure out better ways to manage the information. Clues to potential therapies may lie in an animal that is close to cancer-free, but prevention seems daunting given how much of the environment is potentially carcinogenic. And even as scientists begin to solve the great puzzles concerning cancer, three fundamental mysteries are proving tough to crack.
To deliver this broad view of cancer widely, this Outlook is being published in both Nature and Scientific American — a collaboration that we expect to be the first of many.
We are pleased to acknowledge the financial support of Celgene Corporation in producing this Outlook. Nature has sole responsibility for all editorial content in this special report.
This article is reproduced with permission and was first published on May 28, 2014. | <urn:uuid:9830f9c3-ddba-4997-9302-f6c13d6c6000> | CC-MAIN-2015-27 | http://www.scientificamerican.com/article/cancer-the-march-on-malignancy/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096208.17/warc/CC-MAIN-20150627031816-00109-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.957567 | 375 | 3.265625 | 3 |
Freeing Up Stem-Cell Research
Scientists get ready for the end of federal restrictions on embryonic-stem-cell research.
Three years ago, when Rene Rejo Pera was setting up a new lab at the University of California, San Francisco (UCSF), she had to make sure she had two of everything: one microscope for her federally funded lab, for example, and one for a privately funded replica next door. Because of funding restrictions on stem-cell research ordered by President George W. Bush in 2001, this was a redundant scenario played out in labs across the country. The edict specifically limited federal funding for embryonic stem-cell research to a small number of cell lines already in existence, leaving scientists who wanted to conduct cutting-edge research in this area scrambling for private money.
Scientists are now looking forward to an end of that edict. President Barack Obama promised during his campaign to overturn the order, and most expect the action to happen soon. “The imminent change in policy will quite literally allow us to take down these walls and integrate the laboratories in a way that will make the work move much more efficiently,” says Arnold Kriegstein, director of the Broad Center of Regeneration Medicine and Stem Cell Research at UCSF.
The new policy is expected to mean that scientists will have unfettered access to newer, better embryonic stem cells, which will speed the pace of research. Even without funding restrictions, however, scientists receiving government grants could not use that money to generate new lines, which requires the destruction of an embryo. Kriegstein and others hope that the change will bring a new sense of legitimacy to an often embattled field, as well as return a leadership role to the National Institutes of Health (NIH), the nation’s premier biomedical funding agency, in one of the most promising areas of biomedical research. Much of the research has shifted to institutes funded by state initiatives, such as the California Institute for Regenerative Medicine, or by private donors. In addition to limiting funding, “the other reality of [the Bush] policy is all the negative publicity it has created,” says Tim Kamp, codirector of the Stem Cell and Regenerative Medicine Center at the University of Wisconsin. “Frankly, I think it did greater damage than funding restrictions, [in] that it scared many researchers away.”
Despite the restrictions, U.S. scientists have employed embryonic stem cells for a broad range of research. Because the cells can develop into any tissue type, scientists are coming up with ways to prod them to differentiate into brain cells, heart cells, and other cell types, both to better understand the diseases that strike these tissues and to potentially create replacement tissue for therapies. But much of the most promising research has moved overseas.
Once the restriction is lifted, labs funded by federal dollars will be allowed to use most of the estimated 600 stem-cell lines that have been created around the globe. Researchers broadly agree that the newer lines, which were derived using more refined methods, are superior to the older ones. Using only the old lines is like “being required to use Microsoft Word 1998,” says Jeanne Loring, director of the Center for Regenerative Medicine at the Scripps Research Institute, in La Jolla, CA.
In addition, the earlier lines were derived using animal products, making them largely unfit for therapeutic use. “There are hundreds of embryonic stem-cell lines out there that have been made under the best conditions, and some of them are patient ready,” says John Gearhart, director of the Institute for Regenerative Medicine at the University of Pennsylvania, in Philadelphia. “They have greater utility, performance, and safety than [the Bush-approved] lines.”
Scientists will also be able to study cell lines that are genetically encoded for specific diseases–perhaps one of the most promising near-term uses of embryonic stem cells. (None of the Bush-approved lines have these qualities.) “One of the clear opportunities that has not been available are lines generated from embryos that carry mutations for Huntington’s disease, amyotrophic lateral sclerosis (ALS), and cystic fibrosis,” says Story Landis, director of the National Institute for Neurological Disorders and Stroke, in Bethesda, MD, and chair of the NIH’s Stem Cell Task Force. These cells provide unprecedented access to the molecular processes underlying disease; they can be prodded to develop into the cell type affected in a specific disease, such as motor neurons in ALS, so that scientists can watch the disease unfold at a cellular level. These cells can also be used to screen new drugs.
Scientists and policy makers are still guessing as to when and how President Obama will reverse the restrictions–whether he will issue an executive order, or let Congress decide the matter. But according to White House press reports last week, the president promised the former. Prior to Obama’s presidency, Congress twice passed a bill reversing the restrictions, the Stem Cell Research Enhancement Act, which Bush twice vetoed.
It’s not yet clear how quickly the field will rebound from the funding limits. Many scientists were discouraged from studying embryonic stem cells during the past eight years because they couldn’t secure private funds, or because they or their universities did not want to deal with the extensive accounting required. “The effect of the restrictions was to create a few centers going forward, like mine and like Harvard, Stanford, and UCSF, which had access to private and state money,” says Loring. “Now there will be more room for people to get involved, but they’ll be eight years behind.”
The field has changed dramatically since President Bush’s edict, especially in the past two years, which may make new funding freedom less significant. A newly developed technique to create stem cells–called induced pluripotent stem (iPS) cell reprogramming–does not require the destruction of human embryos, and scientists hesitant to take on embryonic stem cells have been flocking to the new approach in droves.
Researchers have been able to do many of the same experiments with these iPS cells as they have with embryonic stem cells. However, they caution that these cells have not been shown to carry all the power of embryonic cells–for example, they cannot differentiate into as many cell types. “It’s very important that labs be able to do experiments with both kinds of cells side by side,” says Kriegstein. “Relaxing presidential policies will make this much easier to accomplish.”
One area of research that won’t change with removal of the restrictions is therapeutic cloning. In therapeutic cloning (also called somatic cell nuclear transfer), scientists transplant DNA from an adult skin cell into an egg that has had its DNA removed. Unknown factors in the egg reprogram the adult DNA to resemble embryonic DNA, and, in theory, the cell begins to develop like a normal embryo. Scientists would like to create stem cells from cloned human embryos, both for research and potentially for therapy: the cells would be genetically matched to their human donors and thus could be transplanted without fear of rejection. But no one has yet accomplished this with human cells and eggs. Research that involves destruction of human embryos, which includes both cloning and derivation of new stem-cell lines, is prohibited from federal funding under the Dickey Amendment, a rider to the appropriations bills that have been passed in Congress over the past several years.
Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.Subscribe today | <urn:uuid:a6b0d2fc-44fe-437f-8c19-0d5f3396c2c0> | CC-MAIN-2018-47 | https://www.technologyreview.com/s/411979/freeing-up-stem-cell-research/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741569.29/warc/CC-MAIN-20181114000002-20181114022002-00077.warc.gz | en | 0.957196 | 1,563 | 2.546875 | 3 |
At Future Genius, we started our creative writing courses for kids in Singapore in 2013 and since then we have never looked back. We have continued to enjoy the fruits of our labour as our students share their joy when they do well in their Composition examinations. We have turned poor writers into proficient writers and most importantly made them fall in love with writing. They are taught by our 'Writing Guru' Mrs Lynette Sivakumar who was the winner of the 'Most Inspiring English Teacher' award by MOE in 2010. There isn't a single student under her care who has not improved in his/her writing and be inspired to write!
In 2017 we revamped out Creative Writing curriculum in FGLP in close consultation with her to be in line with the latest trends in PSLE. The programme is a developmental approach to writing so start them off as early as P3. How do we teach writing? Using RAFFE (all our writing lessons builds on each stage ensuring results)
1) Reflect- through our creative writing courses for kids in Singapore, we believe in tapping into students' prior knowledge on the theme and get them to share in class. By sharing students get to hear different storylines on the same theme and because friends share, students are interested to listen. Students are guided by some key questions to help them in their sharing of their reflections. Watch this video of our P4 student during a sharing session .
2) Augment 1- We start to build on the students' prior knowledge on the theme and clear any misconceptions of his understanding on the theme. In this stage, we start by building vocabulary on the given theme. Students are exposed to a myriad of assignments to build vocabulary ranging from Vocabulary Cloze related to the given theme, focusing on key feelings and verbs related to the theme and how to use rich descriptive phrases (idioms, smiles, metaphorsetc.) to enhance their writing. It is important that students know this and not just memorise and regurgitate phrases as they end up using them wrongly. To further enrich their knowledge and build on their prior knowledge, model compos are discussed. At this point, less than stellar compositions are sometimes used and students are made to critique them (picking out common errors in compositions make them more aware not to commit the same mistakes too).
3) Focus: In the initial stages of writing in the year, a selected skill of writing will be focused on for each theme example, writing introductions, writing conclusions, how to use hooks. At this point in writing, students will focus on the taught skill and practice them. These are just mini writing exercises.
4) Frame: With the given pictures and the theme, students will explore different storylines and some may even borrow ideas from what they have heard during reflections. Tutors will discuss at least 3 different storylines on that given theme and finally students select one storyline of their choice to write about.
5) Experience: Students start to write full length compos on the given theme. Detailed feedback will be given by tutors. Tutors will meet with each student individually to the students to provide feedback on his strengths and weaknesses of his writing. A feedback form will be given to each student on their performance in their writing task and this will give parents greater insights on how their child is progressing. If required the tutor will require your child to rewrite a second draft but by this stage we hardly face such a problem as enough scaffolding had been given.
Enrolling your child in our creative writing courses for kids in Singapore is a good investment of your money as most of our students go on to be proficient writers in secondary school. Yes, you may see something similar elsewhere but it takes a wealth of experience to execute it well. It's not just just a perfect curriculum. It takes great tutors to ensure your child succeeds and we assure you that at FGLP.
JOIN OUR CREATIVE WRITING CLASSES TODAY! | <urn:uuid:35f9ab45-1d45-42d1-9359-82e054782880> | CC-MAIN-2021-49 | https://www.fglp.com.sg/creative-writing | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359065.88/warc/CC-MAIN-20211130171559-20211130201559-00010.warc.gz | en | 0.963632 | 798 | 2.90625 | 3 |
Garegin Njhdeh (Nzhdeh, sometimes Njdeh; Armenian: Գարեգին Նժդեհ, real name: Garegin Ter-Harutiunian, 1 January 1886 - late 1955) was an Armenian statesman, military, and political thinker, native of Nakhchivan. A member of the Dashnak party, he was involved in revolutionary activities in Armenia, Bulgaria and Russia.
In 1912, together with General Andranik Ozanian he formed an Armenian battalion to fight against the Turks in the Balkan war. Later, moving back to Armenia, Njdeh commanded different military units. He played a key role in organizing the defense of Karakilis (today Vanadzor) in 1918. A convinced Anti-Bolshevik, he led the defense of Zangezur in 1921. The movement was marked with the expulsion of region's local Azeri minority.
Following the declaration of independence of Republic of the Mountainous Armenia from Soviet Armenia, he was proclaimed Prime-Minister and Minister of Defense. He fled Armenia after the triumph of Bolsheviks, and was involved in patriotic activities in Iran, Turkey, Bulgaria and United States.
He visited the United States and Canada, encouraging Armenian communities that had established themselves there, and founding an Armenian Youth movement called Tseghakron (Armenian: Ցեղակրոն). In 1933, this movement led to the foundation of the Armenian Youth Federation, the youth organization of the Armenian Revolutionary Federation, in Boston, Massachusetts. | <urn:uuid:2f8e95de-ed13-4b30-9a04-e49b481440a4> | CC-MAIN-2015-18 | http://www.armeniapedia.org/wiki/Garegin_Njhdeh | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246654264.98/warc/CC-MAIN-20150417045734-00248-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.942353 | 352 | 2.609375 | 3 |
An unusual sighting of two sperm whales near to the coast of the Isle of Skye this week could be a reflection of climate change and warming sea temperatures, says a leading marine scientist.
The sperm whales – one of the true giants of the oceans – were spotted by Skye resident, Catherine Atkins, yesterday afternoon. Unsure of the whale species she had been watching for around half an hour in the mouth of Camus Mor by Gedintailor, she contacted local wildlife trip operator, Nick Davies who passed on the information to the Sea Watch Foundation.
With such close proximity and excellent photographs of the animals, Dr Peter Evans of the Sea Watch Foundation was able to positively identify them as two sperm whales, and said “In past decades, most records of sperm whales in British waters have been of lone adult males around Scotland mainly around the Northern Isles and the Hebrides. Increasingly, however, adolescent males have occurred in our waters, sometimes in groups of 5-10 individuals.”
“Sightings of sperm whales have tended to occur mainly in summer so this early spring sighting is notable not just for the time of year but for its inshore location. The species normally lives in waters of 1,000 metres or more depth, beyond the continental shelf edge. Here they have been seen very close to land indeed. It is interesting to note that a sperm whale was seen last year around this time also very close in, within Oban Bay. That individual stayed around for over a week.”
“The increased occurrence of winter and spring sightings in Scottish waters could be a reflection of climate change, if their main prey, squid, have become more abundant locally in recent years, resulting in animals staying through the winter to feed rather than travelling into lower warmer latitudes.”
Sperm whales are amongst the largest mammal species in the world. Adult males can weigh in at up to 45 tonnes – the iconic London Routemaster double decker bus weighs less than 8 tons, unladen!
Catherine Atkins did a little research before submitting her sighting and showed her surprise by telling Sea Watch “I see sperm whales have blunt heads but they are not usually found just outside the front door in Skye!”. Boat operator, Nick Davies, from Hebridean Whale Cruises based in Gairloch who is involved in a project collecting cetacean (whale, dolphin and porpoise) data raised the concern that one of yesterday’s whales was “nearly on the rocks” and that Catherine had actually telephoned the coast guard for assistance before the two whales slowly headed north. Regarding a previous sighting of sperm whales in the area in winter 2013, Nick noted “Fishermen have been telling me that for the past four or five years they have been seeing increasing amounts of squid in their nets, and it seems that this was perfect for the sperm whale.”
The sighting, made on Tuesday March 11th was in waters in the mouth of Camus Mor near to Gedintailor, on the east coast of the Isle of Skye.
According to our national database, there have been only around one hundred separate sightings in British waters in the last forty years, with the largest group on record being of 20 animals seen off Mousa in the Shetland Islands in 2007.
If you’d like to volunteer to be a Sea-Watcher and help us document cetacean activity around the UK then please see our webpage about ‘How to Watch’ and contact our sightings officer, Kathy on: [email protected]. | <urn:uuid:1285e921-ab78-45ed-a397-0eb96a2998b0> | CC-MAIN-2018-05 | http://www.seawatchfoundation.org.uk/giants-of-the-sea-once-again-enjoy-scotlands-warming-waters/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890187.52/warc/CC-MAIN-20180121040927-20180121060927-00411.warc.gz | en | 0.96311 | 753 | 2.921875 | 3 |
To the left bank of the Qeiq River, the Ancient City of Aleppo stands as a UNESCO world heritage site. Locals and tourists enjoyed freshly brewed Syrian coffee and sugared sweets, taking in the sights of what once was a safe country in the Middle East. It is also home of the ‘Aleppo evil’.
Also referred to as the ‘Aleppo boil’, many that suffer cutaneous leishmaniasis (CL) will certainly consider it an evil or curse. CL is transmitted by the bite of an infected female sandfly which requires a proteinaceous bloodmeal from a living host to develop her eggs. Upon biting, the female deposits parasites within the saliva into the skin. Here the parasites multiply and cause a destruction of tissues, often with disfiguring consequences. Even before the beginning of the conflict, Syria was one of six countries accounting for 90% of all CL cases, with Aleppo itself recording up to 18000 cases per year. The health care system was strong and focused. Notification of the disease was mandatory, and both diagnosis and treatment of CL were provided free of charge. Sand fly programmes were also in place to try and control the spread of the disease.
An overwhelming explosion of cases has spread across Syria and the Middle East. Why?
Following the Arab Spring protests of 2011 and the start of the Syrian Civil War, the chaos that consumed the country wreaked havoc on its health system. As a result of the conflict Syria was divided and with only one part of it under government control many disease control programmes fell apart. Through the forced displacement of millions, transmission hotspots exploded in areas that had not previously reported the disease.
The International Committee of the Red Cross (ICRC), the Syrian Arab Red Crescent (SARC) and Medecins Sans Frontieres are trying to provide aid in areas where hospitals are under constant bombing, despite delivery routes being disrupted.
A news release from the ICRC describes the “devastating and overwhelming” situation in Aleppo: “The past few days have seen water systems, hospitals, warehouses, ambulance stations, public buildings, and civilian homes destroyed or damaged on all sides of the front lines. Patients and medical workers have been killed or injured”. The WHO representative in Syria agreed that people are afraid to visit or even reside near hospitals, out of fear they will be bombed.
The most affected governorates are Damascus, Hasaka, Raqqa, Aleppo, Idlib and Homs, but the situation is constantly evolving and expanding. Over 150,000 cases (25,000 of those being children) of CL have been recorded, however the actual figures are estimated to be much higher due to under-reporting.
Normally, unless secondary infections occur, CL lesions are not usually painful and often self-healing (although it can take several months). Thus, many tend to ignore the lesions feeling ashamed, often hiding them and ultimately- not seeking medical attention until it is too large to conceal. For some, starvation, extreme temperatures and fear of bombshells take precedence over such seemingly ‘superficial’ ailments. For others, it’s simply another scar they will get out of this war.
Timely diagnosis and treatment are essential in reducing the risk of disfiguring consequences. Drug shortages in health centres have forced patients to purchase drugs in private pharmacies, where just one of the several injections required for treatment costs an unreasonable 500 Syrian pounds (or USD2.3).
Some areas are beginning to implement disease control strategies. Hasaka, a governorate that reported 20000 cases in 2015, has just launched an insecticide spraying campaign which will focus on the areas with the highest case numbers. Hasaka’s health director commented that this only going ahead now (after almost nearly five years of outbreaks), because it has taken that long to gather the necessary numbers of people and equipment to sustain the campaign. Mosquito nets will also be distributed in coordination with the SARC, whose hygiene promotion teams educate communities in how to treat and protect against leishmaniasis during outbreaks. Education remains one of the most important tools for promoting disease awareness and control.
The fundamental role of the media in promoting awareness of leishmaniasis has been invaluable. Until very recently, several news outlets spoke of the ‘flesh-eating disease’ that threatened to overtake the Middle East and Europe. ‘Rotting corpses’ were misreported as the cause of current leishmaniasis outbreaks, leading to the popular belief that leishmaniasis could be transmitted by contact with an infected person. Unfortunately, such thoughts only augment the pre-existing discrimination and stigma surrounding this disease. Additionally, young girls with visible facial scars are no longer considered “suitable” for marriage and have difficulty integrating back into society.
Millions have fled Syria, now residing in refugee camps in neighboring countries such as Iraq, Jordan, Lebanon and Turkey (amongst many other countries), whilst the remaining population are left displaced in their own country. A growing concern is the potential for the introduction of leishmaniasis into countries where the sandfly vector is already present. Health screening at immigration checkpoints is being explored as a preventative measure against this. | <urn:uuid:a78863c1-3a98-42c9-85e1-73725532c119> | CC-MAIN-2017-09 | http://blogs.biomedcentral.com/bugbitten/2016/08/19/the-aleppo-evil-or-the-lesser-known-scars-of-war/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00094-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961371 | 1,063 | 3.15625 | 3 |
What Does Remote Desktop Software Mean?
Remote desktop software is software that is used to access a desktop or desktop interface of a remote computer locally.
It enables connecting, accessing and controlling the data and resources of the remote/destination computer in such a way that the user is able to access locally.
Techopedia Explains Remote Desktop Software
Remote desktop software primarily enables a local user to have complete access to the desktop environment and resources of a remote computer. Typically, accessing the remote computer’s desktop requires software to be installed and configured on both computers—they both must be powered on and are connected to the Internet. The user logs into the remote desktop software interface on the local computer, and upon authentication at the remote computer, access to its desktop environment is granted.
Remote desktop software was mainly designed for and used by system/network administrators or technicians to log in to remote users' computers to perform tasks such as:
- Resolving technical issues
- Installing applications
- Removing viruses
Some of the popular remote desktop software includes:
- Team Viewer
- Windows' native Remote Desktop Connection | <urn:uuid:ad18fdd0-055f-450e-ad23-d6195f209e99> | CC-MAIN-2022-21 | https://www.techopedia.com/definition/29710/remote-desktop-software | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663012542.85/warc/CC-MAIN-20220528031224-20220528061224-00266.warc.gz | en | 0.91233 | 234 | 2.875 | 3 |
Do You Want to Raise a Green Baby?
It’s easier than you might think!
These days, babies seem to come with a lot of stuff. Even before they are born, parents-to-be are bombarded with ads and catalogues, all spurring a buying frenzy for a large range of items that are considered ‘essential’ for baby’s wellbeing.
There’s something to be said, however, for going back to basics. A simpler, more environmentally-friendly attitude towards child rearing can make everyone’s lives a little calmer and less filled with ‘stuff’. A wet wipe warmer and a diaper disposal contraption are conveniences, not necessities, eventually filling garbage dumps and landfills for centuries to come.
While some people are ever concerned that being environmentally friendly is more work and less expedient, there are plenty of ways you can raise a green baby without sacrificing comfort or convenience. It’s easy!
Feeding a Green Baby
Whether breast or bottle feeding, your baby is happiest and healthiest when getting fed. So leaving that debate aside, let’s look at how you can feed green. While breastfeeding has no impact on the environment, for obvious reasons, bottle feeding needs a little more forethought in order to be green.
- Go for glass bottles instead of plastic. They’re better for baby, and the environment.
- Avoid bottles with disposable inserts. If you have enough bottles, keeping on top of washing them isn’t a big a deal.
- Use washable nipple pads instead of disposable. There are great ones made from organic cotton that work beautifully.
As you switch to solids, you can easily avoid prepared and packaged foods with a little planning and preparation. Fresh veggies and fruits that have been pureed are perfect for little ones and the bulk store is a great place to stock up on dry cereals and baby pasta.
Sleep Setup for a Green Baby
Babies spend a lot of time in their cribs, napping and sleeping. It’s best if they are doing it safely with organic bedding. Investing in a crib that converts into a toddler bed down the road is much more environmentally friendly because it reduces waste. Also, consider furniture that is made from sustainable materials and limited chemicals. Carpets, paints and finishes are often replete with VOCs (Volatile Organic Compounds), which are toxic chemical compounds found in synthetic materials.
In fact, the whole nursery where baby spends a large amount of time every day and night will benefit from keeping it allergen free. Limit the number of stuffed animals and toys to a select few and make sure that your rugs and other accessories like cushion covers are made from organic materials and are easy to wash and maintain. Indoor air quality is important, so investing in air purifiers is a great way to keep dust and other allergens down.
Clothing a Green Baby
Organic clothing is another great way to minimize baby’s exposure to harsh chemicals. Non-organic fibers contain petrochemicals, PVC and other compounds that have been linked to health issues. Organic clothes provide a double bonus for the environment too, because their manufacturing processes are sustainable. Almost 20% of all water pollution occurs in the manufacturing of non-organic clothes! Fortunately, organic does not have to mean blah. Fun, modern designs, colors and styles are now available.
When it comes to the fabrics that are closest to baby, forget the packaged wet wipes and get a batch of washable organic cloths! They’re all you’ll need, along with a wet bag for when you’re on the road, to keep baby clean. As for diapering, consider this: the average baby will use up to 6500 diapers before they start potty training. It takes up to 500 years for disposables to decompose. If you do the math, you can see why landfills are overflowing! If you’re not keen on washing them yourself, there are plenty of services that will pick up the soiled diapers and leave you with a fresh pile of clean ones. Look for a local service that doesn’t use harsh chemicals in the cleaning process to further minimize your baby’s environmental footprint.
Other Considerations for a Green Baby
From toys to laundry detergent, you can always make a choice that is more environmentally friendly, and those choices are usually better for baby’s health and wellbeing. Rather than a chemical and scent infused soap, opt for a gentle and natural detergent that still gets the job done without risking skin allergies or other reactions. Always remember, too, that baby’s first instinct is to put things in their mouth. Toys made from organic cotton yarn, or untreated woods preserved with natural waxes, are safer options.
Look for the G.O.T.S. certification on the textile-based products you select. It proves the fiber used is at least 95% organic, inks and dyes meet specified toxicity and biodegradability levels and certain metals and chemical compounds are not used in the manufacturing process, such as heavy metals and nickel.
Whatever choices you make for baby, and for you, an environmentally-friendly one is always available and more accessible than you might think!
—– Author Bio —–
Anna Schwengle is a kids clothing designer and founder of the Finn + Emma organic baby brand. | <urn:uuid:d2893bea-75f7-43c8-aec2-91d7a5ea5e9c> | CC-MAIN-2019-13 | https://vitalitymagazine.com/do-you-want-to-raise-a-green-baby/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912205534.99/warc/CC-MAIN-20190326135436-20190326161436-00195.warc.gz | en | 0.935456 | 1,129 | 2.640625 | 3 |
Homework: Applying Research to Policy
- Grades: 3–5
The results are in on homework at the elementary level, and the findings call for a change. Researchers like Alfie Kohn, Sara Bennett and Nancy Kalish are advocating wide-spread changes to our homework policies. What changes need to be made and how? What works? What doesn't? I'd like to share some of my methods that help support the research. First, let's look at these alarming statistics1:
- Research reports that exactly half of parents admit to having a serious argument with their child over homework in the past year that involved yelling or crying.
- Cross-cultural data disproves the claim that countries whose students do more homework tend to be those with the best test scores.
- Top performing countries like Japan and Finland assign less homework than U.S. students.
- Studies have found no significant relationships on grades and test scores based on the amount of homework given or completed.
Applying the Research
As a result of my findings, I have made two significant changes to my homework policy regarding type of homework assigned and parent collaboration and support.
Type of Homework: One Assignment Can Fit All!
In our classroom the bulk of our homework is devoted to reading books of interest. I support this because:
- I can provide and receive feedback with each of my students during our individual reading conferences vs. placing a check mark on a worksheet I skimmed over briefly.
- Reading creates differentiation for each child in a natural way by allowing choice vs. a worksheet that may meet the needs of a few.
- Reading homework gets discussed with their classmates through our daily book talks.
- Reading for long periods of time supports good study habits, learning stamina, responsibility, as well as developing a life-long love for reading. How often does your child get lost in their homework?
- Reading can be completed by listening to a book on CD, read with a family member, or completed independently, allowing a mixture of approaches.
- As shown below, reading increases vocabulary and test scores. There is also evidence that it leads to an increase of understanding for all content areas.
Achievement Percentile Minutes of Reading/Day Words per Year
90th 40.4 2,357,000
50th 12.9 601,000
10th 1.6 51,000
Source: Adapted from Anderson, Wilson, & Fielding, 1988 (Allington, Richard)
Assigning homework for the sake of assigning homework is strongly avoided now, with an emphasis on extensions that will help at home. So if we are learning about fractions, I try to apply our higher-order teaching skills by requesting that parents let their child help out with cooking for the night and report about it through writing and talk in class. If we are learning how to read timelines, students may interview family members at home with a timeline presentation at school. This type of homework assignment works well as a school-home extension and supports the type of learning strategies we know works best for our students. At the very minimum, if a skill sheet is sent home then I try to send answers home as well to ensure the process is focused on, rather than just a correct answer. Homework is not graded as it is considered practice, so why not provide the answers for help?
Parent Collaboration Guidelines
In the past I assigned 30 minutes of reading for each child. This year, I have changed that policy to just reading without a specified time frame. I do this because I don't want students reading to the clock, and because I trust that I have educated parents to guide their child toward an appropriate amount of time through specified strategies. It is imperative that parents collaborate with me and understand the role homework plays in life outside of school. I take three steps in creating these guidelines for collaboration:
The first step I take is educating parents on our homework policy for the year. I provide separate guidelines for parents so they know it's okay to call it quits when Johnny is struggling with a concept or if the project is taking much longer than expected. I also let parents know that it's okay for their child to have a life outside of school. Considering I have my students for seven hours each day, I think time to play soccer, play a board game, and help mom cook is time not wasted.
It also helps to put it in perspective with numbers. Let's say, for example, a child reads for 30 minutes every night for homework. Not taking the weekends into account, that's 5,400 minutes or 90 hours of reading at home. That's a lot of help!
2) Three-Way Feedback
I also believe that it is important to provide and receive homework/class work feedback from students and parents. One of the ways I do this is by providing a reflection log each week. The reflection log is sent home Thursday evening and turned in the following morning. This log encourages parents and students to report their concerns and celebrations from the week, as well as set goals together for the next week. This allows me to deal with any concerns at school, rather than having parents feel frustrated or helpless at home. I also enjoy the constructive feedback from students and parents alike. Recently, a student posted a concern that I sometimes speak too quickly. This comment really stuck with me and helped me slow down with my classroom instruction. It also gives parents a place to voice their observations at home, and my instruction benefits in the process.
Click here (PDF) for my reflection log.
3) Let me help
When parents understand that I am willing to receive and act on weekly feedback, they are more likely to solicit help when needed. For example, if a parent wants to know how they can help with reading comprehension at home, I become a resource rather than a mandate. "I have found this to be helpful," is better received than, "Do this for X amount of minutes."
In the case that a parent believes their child should have more homework, I make sure to come up with an individualized plan that involves the child. What is it that they need more help and motivation with? What will help at home? Perhaps a unit of study would be the best approach to learning more about a given topic, rather than a collection of worksheets that will provide little to no motivation.
Homework, like teaching, should have the option of being individualized. I have individualized my approach, but I have made sure to apply the research I've read to our policy. I also believe that as educators we need to be aware of the most up-to-date research available. Here are a few recommended readings/sites:
- Allington, Richard. What Really Matters for Struggling Readers (Allyn and Bacon, 2005).
- Bennett, Sara & Kalish, Nancy. The Case Against Homework: How Homework Is Hurting Our Children and What We Can Do About It (New York: Crown, 2006).
- 1Kohn, Alfie. The Homework Myth: Why Our Kids Get Too Much of a Bad Thing (Cambridge, MA: Da Capo Press, 2006).
- Alfie Kohn's Scholastic article: Is Homework Really Good for Kids?
- Visit the Homework Hub through Scholastic. | <urn:uuid:384e59b3-5ed1-4b1e-8aad-daaf441a2e59> | CC-MAIN-2016-40 | http://www.scholastic.com/teachers/article/homework-applying-research-policy | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660467.49/warc/CC-MAIN-20160924173740-00261-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.96445 | 1,506 | 2.953125 | 3 |
Definitions of science fiction
There have been many attempts at defining science fiction. This is a list of definitions that have been offered by authors, editors, critics and fans over the years since science fiction became a genre. Definitions of related terms such as "science fantasy", "speculative fiction", and "fabulation" are included where they are intended as definitions of aspects of science fiction or because they illuminate related definitions—see e.g. Robert Scholes's definitions of "fabulation" and "structural fabulation" below. Some definitions of sub-types of science fiction are included, too; for example see David Ketterer's definition of "philosophically-oriented science fiction". In addition, some definitions are included that define, for example, a science fiction story, rather than science fiction itself, since these also illuminate an underlying definition of science fiction.
The Encyclopedia of Science Fiction, edited by John Clute and Peter Nicholls, contains an extensive discussion of the problem of definition, under the heading "Definitions of SF". The authors regard Darko Suvin's definition as having been most useful in catalysing academic debate, though they consider disagreements to be inevitable as science fiction is not homogeneous. Suvin's cited definition, dating from 1972, is: "a literary genre whose necessary and sufficient conditions are the presence and interaction of estrangement and cognition, and whose main formal device is an imaginative framework alternative to the author's empirical environment." The authors of the Encyclopedia article—Brian Stableford, Clute, and Nicholls—explain that, by "cognition", Suvin refers to the seeking of rational understanding, while his concept of estrangement is similar to the idea of alienation developed by Bertolt Brecht, that is, a means of making the subject matter recognizable while also seeming unfamiliar.
The order of the quotations is chronological; quotations without definite dates are listed last. The list below omits Hugo Gernsback's later redefining of the term "science fiction". According to anthologist, populist and historian of the genre Sam Moskowitz (1920 – 1997), Gernback final words on the matter were: "Science fiction is a form of popular entertainment which contains elements of known, extrapolation of known or logical theoretical science". The list also omits John W. Campbell's infamous "Science fiction is what I say it is".
In chronological order
- Hugo Gernsback. 1926. "By 'scientifiction' I mean the Jules Verne, H. G. Wells and Edgar Allan Poe type of story—a charming romance intermingled with scientific fact and prophetic vision... Not only do these amazing tales make tremendously interesting reading—they are always instructive. They supply knowledge... in a very palatable form... New adventures pictured for us in the scientifiction of today are not at all impossible of realization tomorrow... Many great science stories destined to be of historical interest are still to be written... Posterity will point to them as having blazed a new trail, not only in literature and fiction, but progress as well."
- J. O. Bailey. 1947. "A piece of scientific fiction is a narrative of an imaginary invention or discovery in the natural sciences and consequent adventures and experiences... It must be a scientific discovery—something that the author at least rationalizes as possible to science."
- Robert A. Heinlein. 1947. "Let's gather up the bits and pieces and define the Simon-pure science fiction story: 1. The conditions must be, in some respect, different from here-and-now, although the difference may lie only in an invention made in the course of the story. 2. The new conditions must be an essential part of the story. 3. The problem itself—the "plot"—must be a human problem. 4. The human problem must be one which is created by, or indispensably affected by, the new conditions. 5. And lastly, no established fact shall be violated, and, furthermore, when the story requires that a theory contrary to present accepted theory be used, the new theory should be rendered reasonably plausible and it must include and explain established facts as satisfactorily as the one the author saw fit to junk. It may be far-fetched, it may seem fantastic, but it must not be at variance with observed facts, i.e., if you are going to assume that the human race descended from Martians, then you've got to explain our apparent close relationship to terrestrial anthropoid apes as well."
- John W. Campbell, Jr.. 1947. "To be science fiction, not fantasy, an honest effort at prophetic extrapolation from the known must be made."
- ―. "Scientific methodology involves the proposition that a well-constructed theory will not only explain every known phenomenon, but will also predict new and still undiscovered phenomena. Science-fiction tries to do much the same—and write up, in story form, what the results look like when applied not only to machines, but to human society as well."[notes 1]
- Damon Knight. 1952. At the start of a series of book review columns, Knight stated the following as one of his assumptions: "That the term 'science fiction' is a misnomer, that trying to get two enthusiasts to agree on a definition of it leads only to bloody knuckles; that better labels have been devised (Heinlein's suggestion, 'speculative fiction', is the best, I think), but that we're stuck with this one; and that it will do us no particular harm if we remember that, like 'The Saturday Evening Post', it means what we point to when we say it." This definition is now usually seen in abbreviated form as "Science fiction is [or means] what we point to when we say it."
- Theodore Sturgeon. 1952. "A science fiction story is a story built around human beings, with a human problem, and a human solution, which would not have happened at all without its scientific content."
- Basil Davenport. 1955. "Science fiction is fiction based upon some imagined development of science, or upon the extrapolation of a tendency in society."
- Edmund Crispin. 1955. A science fiction story "is one that presupposes a technology, or an effect of technology, or a disturbance in the natural order, such as humanity, up to the time of writing, has not in actual fact experienced."
- Robert A. Heinlein. 1959. "Realistic speculation about possible future events, based solidly on adequate knowledge of the real world, past and present, and on a thorough understanding of the nature and significance of the scientific method. To make this definition cover all science fiction (instead of 'almost all') it is necessary only to strike out the word 'future'.
- Kingsley Amis. 1960. "Science fiction is that class of prose narrative treating of a situation that could not arise in the world we know, but which is hypothesized on the basis of some innovation in science or technology, or pseudo-science or pseudo-technology, whether human or extra-terrestrial in origin."
- James Blish. 1960 or 1964. Science fantasy is "a kind of hybrid in which plausibility is specifically invoked for most of the story, but may be cast aside in patches at the author's whim and according to no visible system or principle."
- Rod Serling. 1962. "Fantasy is the impossible made probable. Science Fiction is the improbable made possible."
- Judith Merril. 1966. "Speculative fiction: stories whose objective is to explore, to discover, to learn, by means of projection, extrapolation, analogue, hypothesis-and-paper-experimentation, something about the nature of the universe, of man, or 'reality'... I use the term 'speculative fiction' here specifically to describe the mode which makes use of the traditional 'scientific method' (observation, hypothesis, experiment) to examine some postulated approximation of reality, by introducing a given set of changes—imaginary or inventive—into the common background of 'known facts', creating an environment in which the responses and perceptions of the characters will reveal something about the inventions, the characters, or both".[notes 2]
- Darko Suvin. 1972. Science fiction is "a literary genre whose necessary and sufficient conditions are the presence and interaction of estrangement and cognition, and whose main formal device is an imaginative framework alternative to the author's empirical environment."
- Thomas M. Disch. 1973. "The basic premise of all s-f—that Absolutely Anything Can Happen and Should—has never been so handsomely and hilariously realized as in An Alien Heat." (Cover blurb for the 1973 Harper and Row edition of the novel by Michael Moorcock).
- Brian Aldiss. 1973. "Science fiction is the search for a definition of man and his status in the universe which will stand in our advanced but confused state of knowledge (science), and is characteristically cast in the Gothic or post-Gothic mould". Revised 1986. "a definition of mankind...", "...post-Gothic mode".
- Ray Bradbury. 1974. Science fiction is "the one field that reached out and embraced every sector of the human imagination, every endeavor, every idea, every technological development, and every dream." "I called us a nation of Ardent Blasphemers. We ran about measuring not only how things were but how they ought to be. ... We Americans are better than we hope and worse than we think, which is to say, we are the most paradoxical of all of the paradoxical nations in time. Which is what science fiction is all about. For science fiction runs out with tapes to measure Now against Then against Tomorrow Breakfast. It triangulates mankind amongst these geometrical threads, praising him, warning him." "For, above all, science fiction, as far back as Plato trying to figure out a proper society, has always been a fable teacher of morality...There is no large problem in the world this afternoon that is not a science-fictional problem." "Science fiction then is the fiction of revolutions. Revolutions in time, space, medicine, travel, and thought...Above all, science fiction is the fiction of warm-blooded human men and women sometimes elevated and sometimes crushed by their machines." "So science fiction, we now see, is interested in more than sciences, more than machines. That more is always men and women and children themselves, how they behave, how they hope to behave. Science fiction is apprehensive of future modes of behavior as well as future constructions of metal." "Science fiction guesses at sciences before they are sprung out of the brows of thinking men. More, the authors in the field try to guess at machines which are the fruit of these sciences. Then we try to guess at how mankind will react to these machines, how use them, how grow with them, how be destroyed by them. All, all of it fantastic."
- David Ketterer. 1974. "Philosophically-oriented science fiction, extrapolating on what we know in the context of our vaster ignorance, comes up with a startling donnée, or rationale, that puts humanity in a radically new perspective."
- Norman Spinrad. 1974. "Science fiction is anything published as science fiction."
- Isaac Asimov. 1975. "Science fiction can be defined as that branch of literature which deals with the reaction of human beings to changes in science and technology."
- Robert Scholes. 1975. Fabulation is "fiction that offers us a world clearly and radically discontinuous from the one we know, yet returns to confront that known world in some cognitive way."
- ―. 1975. In structural fabulation, "the tradition of speculative fiction is modified by an awareness of the universe as a system of systems, a structure of structures, and the insights of the past century of science are accepted as fictional points of departure. Yet structural fabulation is neither scientific in its methods nor a substitute for actual science. It is a fictional exploration of human situations made perceptible by the implications of recent science. Its favourite themes involve the impact of developments or revelations derived from the human or physical sciences upon the people who must live with those revelations or developments."
- ― and Eric Rabkin. 1977. "...science fiction could begin to exist as a literary form only when a different future became conceivable by human beings―specifically a future in which new knowledge, new discoveries, new adventures, new mutations, would make life radically different from the familiar patterns of the past and present." "The worlds of Dante and Milton remain separate from science fiction because they are constructed on a plan derived from religious tradition rather than scientific speculation or imagination based, however loosely, on science."
- James Gunn. 1977. "Science Fiction is the branch of literature that deals with the effects of change on people in the real world as it can be projected into the past, the future, or to distant places. It often concerns itself with scientific or technological change, and it usually involves matters whose importance is greater than the individual or the community; often civilization or the race itself is in danger."
- Darko Suvin. 1979. "SF is distinguished by the narrative dominance or hegemony of a fictional "novum" (novelty, innovation) validated by cognitive logic."
- Patrick Parrinder. 1980. "'Hard' SF is related to 'hard facts' and also to the 'hard' or engineering sciences. It does not necessarily entail realistic speculation about a future world, though its bias is undoubtedly realistic. Rather, this is the sort of SF that most appeals to scientists themselves—and is often written by them. The typical 'hard' SF writer looks for new and unfamiliar scientific theories and discoveries which could provide the occasion for a story, and, at its more didactic extreme, the story is only a framework for introducing the scientific concept to the reader."
- ―. 1980. "In 'space opera' (the analogy is with the Western 'horse opera' rather than the 'soap opera') the reverse [Parrinder is referring to his definition of "hard sf"] is true; a melodramatic adventure-fantasy involving stock themes and settings is evolved on the flimsiest scientific basis."
- David Pringle. 1985. "Science fiction is a form of fantastic fiction which exploits the imaginative perspectives of modern science".
- Kim Stanley Robinson. 1987. Sf is "an historical literature... In every sf narrative, there is an explicit or implicit fictional history that connects the period depicted to our present moment, or to some moment in our past."
- Christopher Evans. 1988. "Perhaps the crispest definition is that science fiction is a literature of 'what if?' What if we could travel in time? What if we were living on other planets? What if we made contact with alien races? And so on. The starting point is that the writer supposes things are different from how we know them to be."
- Isaac Asimov. 1990. "'[H]ard science fiction' [is] stories that feature authentic scientific knowledge and depend upon it for plot development and plot resolution."
- Arthur C. Clarke. 2000. "Science fiction is something that could happen - but you usually wouldn't want it to. Fantasy is something that couldn't happen - though you often only wish that it could." (emphasis original)
- Jeff Prucher. 2006. Science fiction is "a genre (of literature, film, etc.) in which the setting differs from our own world (e.g. by the invention of new technology, through contact with aliens, by having a different history, etc.), and in which the difference is based on extrapolations made from one or more changes or suppositions; hence, such a genre in which the difference is explained (explicitly or implicitly) in scientific or rational, as opposed to supernatural, terms."
- Orson Scott Card listed five types of stories that generally fall into sci-fi. September 28, 2010 "1. All stories set in the future, because the future can’t be known. This includes all stories speculating about future technologies, which is, for some people, the only thing that science fiction is good for. Ironically, many stories written in the 1940s and 1950s that were set in what was then the future—the 1960s, 1970s and 1980s—are no longer “futuristic.” Yet they aren’t “false,” either, because few science fiction writers pretend to be writing what will happen. Rather, they write what might happen. So those out-of-date futures, like that depicted in the novel 1984, simply shift from the “future” category to:
2. All stories set in the historical past that contradict known facts of history. Within the field of science fiction, these are called “alternate world” stories. For instance, what if the Cuban Missile Crisis had led to nuclear war? What if Hitler had died in 1939? In the real world, of course, these events did not happen—so stories that take place in such false pasts are the purview of sci-fi and fantasy.
3. All stories set in other worlds, because we’ve never gone there. Whether “future humans” take part in the story or not, if it isn’t Earth, it belongs to this genre.
4. All stories supposedly set on Earth, but before recorded history and contradicting the known archaeological record—stories about visits from ancient aliens, or ancient civilizations that left no trace, or “lost kingdoms” surviving into modern times.
5. All stories that contradict some known or supposed law of nature. Obviously, fantasy that uses magic falls into this category, but so does much sci-fi: time travel stories, for instance, or invisible "man stories."
- Andrew Milner. 2012. Science fiction "is a selective tradition, continuously reinvented in the present, through which the boundaries of the genre are continuously policed, challenged and disrupted, and the cultural identity of the SF community continuously established, preserved and transformed. It is thus essentially and necessarily a site of contestation."
- John Boyd. "... storytelling, usually imaginative as distinct from realistic fiction, which poses the effects of current or extrapolated scientific discoveries, or a single discovery, on the behavior of individuals [or] society."
- Barry N. Malzberg. Science fiction is "that branch of fiction that deals with the possible effects of an altered technology or social system on mankind in an imagined future, an altered present, or an alternative past."
- Tom Shippey. "Science fiction is hard to define because it is the literature of change and it changes while you are trying to define it."
- For example, Patrick Parrinder comments that "[d]efinitions of science fiction are not so much a series of logical approximations to an elusive ideal, as a small, parasitic subgenre in themselves." Parrinder, Patrick (1980). Science Fiction: Its Criticism and Teaching. London: New Accents.
- Stableford, Brian; Clute, John; Nicholls, Peter (1993). "Definitions of SF". In Clute, John; Nicholls, Peter. Encyclopedia of Science Fiction. London: Orbit/Little, Brown and Company. pp. 311–314. ISBN 1-85723-124-4.
- Originally published in the April 1926 issue of Amazing Stories
- Quoted in in: Stableford, Brian; Clute, John; Nicholls, Peter (1993). "Definitions of SF". In Clute, John; Nicholls, Peter. Encyclopedia of Science Fiction. London: Orbit/Little, Brown and Company. pp. 311–314. ISBN 1-85723-124-4.
- Originally published in Pilgrims of Space and Time (1947)
- Quoted in Jakubowski, Maxim; Edwards, Malcolm, eds. (1983) . The Complete Book of Science Fiction and Fantasy Lists. London: Granada. ISBN 0-586-05678-5.
- Originally in Eshbach, Lloyd Arthur, ed. (1947). Of Worlds Beyond. New York: Fantasy Press. p. 91.; cited from 1964 reprint.
- Smith, George O. (1975). Venus Equilateral. London: Futura Publications. pp. 9–10.
- Knight, Damon (1952). "Science Fiction Adventures". Science Fiction Adventures (1952 magazine) (1): 122. Punctuation was misprinted in the original magazine; the quote is punctuated as Knight had it in his collection of essays In Search of Wonder, Chicago: Advent, 1956.
- James Blish, writing as William Atheling, Jr., cited this definition of Sturgeon's from a talk he had given. Blish's article was published in the Autumn 1952 issue of Red Boggs' fanzine Skyhook. Sturgeon subsequently complained to Blish that he had intended the definition to apply only to good science fiction.Atheling Jr., William (1967). The Issue At Hand. Chicago: Advent. p. 14.
- Davenport, Basil (1955). Inquiry Into Science Fiction. New York: Longmans, Green and Co. p. 15.
- Wyndham, John (1963). The Seeds of Time. Harmondsworth: Penguin. p. 7., quoted from the Penguin reprint; the original publication was 1956 by Michael Joseph.
- "Definitions of Science Fiction". Archived from the original on 18 October 2006. Retrieved 3 December 2006.
- From Heinlein's essay "Science Fiction: Its Nature, Faults and Virtues", originally in Davenport, Basil, ed. (1959). The Science Fiction Novel: Imagination and Social Criticism. Advent.; cited from Knight, Damon, ed. (1977). Turning Points:Essays on the Art of Science Fiction. New York: Harper and Row. p. 9.
- Amis, Kingsley (1960). New Maps of Hell. New York: Ballantine. p. 14.
- In "Science-Fantasy and Translations:Two More Cans of Worms", by James Blish. Cited from a 1974 reprint of Blish, James (1970). More Issues At Hand. Chicago: Advent. p. 100.. According to the front matter, this essay was originally published in two parts, in 1960 and 1964. Blish lists a variety of sources, some fanzines and some professional magazines, from which the book was drawn, but does not specify which particular sources formed the basis of this essay.
- Rod Serling (1962-03-09). The Twilight Zone, "The Fugitive".
- Parrinder, Patrick (2000). Learning from Other Worlds. Liverpool: Liverpool University Press. p. 300.
- Clareson, Thomas D. (1971). Sf: The Other Side of Realism. Bowling Green, OH: Bowling Green University Popular Press. p. 60.
- Originally published in 1972
- Aldiss, Brian (1973). Billion Year Spree.
- Aldiss, Brian; Wingrove, David (1986). Trillion Year Spree: The History of Science Fiction. London: Gollancz. ISBN 0-575-03942-6.
- Farrell, Edmund J.; Gage, Thomas E.; Pfordresher, John; et al., eds. (1974). Science Fact/Fiction. Scott, Foresman and Company. Introduction by Ray Bradbury.
- The quote is from the introduction to Spinrad, Norman, ed. (1974). Modern Science Fiction. Anchor Press.
- Asimov, "How Easy to See the Future!", Natural History, 1975
- Scholes, Robert (1975). Structural Fabulation.
- Scholes, Robert; Rabkin, Eric S. (1977). Science Fiction: History, Science, Vision. London: Oxford University Press.
- Road to Science Fiction Vol 1.
- Metamorphoses of SF No 63.
- Parrinder, Patrick (1980). Science Fiction: Its Criticism and Teaching. London: New Accents. p. 15.
- Pringle, David (1985). Science Fiction: The 100 Best Novels. London: Xanadu. p. 9.
- Robinson, Kim Stanley (1987). "Notes for an Essay on Cecelia Holland". Foundation: the international review of science fiction (40). ISSN 0306-4964. Archived December 1, 2014, at the Wayback Machine.
- Evans, Christopher (1988). Writing Science Fiction. London: A & C Black. p. 9.
- Greenberg, Martin; Asimov, Isaac, eds. (1990). Cosmic Critiques. Cincinnati: Writer's Digest Books. p. 6.
- Clarke, Arthur C. (2000). Patrick Nielsen Hayden, ed. The Collected Stories of Arthur C. Clarke. New York: Orb Books. p. ix. ISBN 0-312-87860-5.
- Prucher, Jeff (2007). Brave New Words. Oxford: Oxford University Press. p. 171.
- Defining Science Fiction and Fantasy
- Milner, Andrew (2012). Locating Science Fiction. Liverpool: Liverpool University Press. p. 39-40.
- Pandey, Ashish (2005). Academic Dictionary of Fiction. Delhi, India: Isha Books. p. 137. Retrieved 3 October 2011. | <urn:uuid:ac39e430-3673-4149-80c9-ff24aa06cfea> | CC-MAIN-2017-04 | https://en.wikipedia.org/wiki/Definitions_of_science_fiction | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00374-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.912699 | 5,325 | 2.625 | 3 |
Helpful Words and Phrases
Listen and repeat. 聞いてリピートしましょう。
- ex. The speaker attracted the audience's attention by telling a funny story.
- ex. Many people were amazed when the emerging singer won the Song of the Year.
- ex. A lot of actors have been wearing black coats recently. It must be fashionable these days.
- ex. Diane turns silk textiles into wonderful dresses.
- ex. She is inspired to do her best after seeing her friend succeed.
Read the article below and answer your tutor's questions.記事を読んで講師からの質問に答えましょう。
In the world of fashion, a 69-year-old Australian woman is attracting a lot of people’s attention. Stephanie Reynolds has been recognized as an emerging artist because of her fashionable clothes made of paper. At 69 years old, Reynolds decided to change her career from business management to fashion design. She said she has always loved textiles. Now, she’s challenging herself by creating clothes from Japanese tissue paper.
In the past 12 months, Reynolds has held a fashion show and her own exhibition. She wishes others would be inspired to try something new. She is now dreaming that her art will be shown around the world. Currently, her work is part of an exhibition at the Launceston Queen Victoria Museum and Art Gallery that focuses on ten emerging artists.
However, she says it’s funny to be considered an emerging artist. But experts say it’s perfectly acceptable for someone of her age to be given the honor. According to Ashley Bird from Launceston Queen Victoria Museum, emerging art is not based on age. She also said that a lot of artists started their work in their 40s or 50s.
This material was based on an article by The Associated Press.
Choose a topic and discuss the questions with your tutor.トピックを選び、質問に基づいて議論しましょう。
Art and Artists
- Stephanie Reynolds is attracting attention because of her fashionable clothes made of paper. What do you think of this kind of art (ex. interesting, ordinary)? Why? Discuss.
- Who is your favorite artist? Why do you like his/her art? Discuss.
- In your opinion, should emerging artists be recognized or given an award? Why or why not? Discuss.
- Do you like being fashionable? Why or why not? Discuss.
- Do you think all fashionable things are expensive? Why or why not? Discuss.
- Who is an actor/actress that you consider fashionable? Discuss. | <urn:uuid:d4878d8c-c731-445c-b3ac-b76a2206fe83> | CC-MAIN-2023-50 | https://www.rarejob.com/lesson/material/wna/2023/09/26/fancy-clothing-made-from-paper-by-australian-pensioner/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00815.warc.gz | en | 0.948473 | 590 | 2.78125 | 3 |
(Video link) Antonín Langweil began as a painter of miniature portraits. Then, starting in 1826, he began his big project: a detailed model of the city of Prague.
He measured each building and then drew the elevations on stiff paper.
Then the paper could be folded and attached together. This is a good way to make reference maquettes, too.
Langweil's Prague is scaled at 1:480, and includes not only an accurate portrait of each building, but also tiny details such as signs and sundials.
The model is a valuable document for historians of the city because it shows how things looked before 20th century modernization efforts. | <urn:uuid:90312798-381e-45b1-86ad-072b7af5fba3> | CC-MAIN-2017-04 | http://gurneyjourney.blogspot.com/2012/05/langweils-model-of-prague.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00185-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964367 | 140 | 3.359375 | 3 |
Presented by: Sindwa, Moganedi, Mphuthi, Mohloare
The grassland biome is the mainstay of dairy, beef and wool production in South Africa. Pastures may be augmented in wetter areas by the addition of legumes and sweet grasses. The grassland biome is the cornerstone of the maize crop and many grassland types have been converted to this crop benefit from and influence ecosystem services impact goes both ways
The natural resources base and ecosystem services are the foundation of all food and agricultural systems since agriculture, livestock, forestry and fisheries both benefited from and influence ecosystem services impact goes both ways
The South African grassland biome is the second largest biome in South Africa. It contains the economic heartland of South Africa and produces the bulk of water needed to sustain human life and underpin economic growth in addiction to their biodiversity value , grasslands provide essential ecosystem , services include food, forage , livestock , game farming, nutrient cycling soil stabilization , carbon storage e, energy supply tourism and recreation n arguably
The grassland biome is also home to Gauteng, South Africa’s economic heartland and largest complex, and to the significant economic sectors of productive agriculture (cultivation and livestock production), forestry and mining. It offers plenty of economic opportunities for communities dependent on the land, such as eco-tourism and sustainable cattle farming.
Services include pollination, soil production, flood amelioration, carbon storage, cultural and recreational amenities, and support to subsistence livelihoods.
Water is also important in moving soils. As rivers flow, they transport soil particles along. If soil is washed into a river, the smallest particles will be carried the furthest by the water as they weigh the least.
This includes aesthetic inspiration cultural identity, sense of home and spiritual experience that are linked to the natural environment
They good when it come to tourism because many different features are found there .animals such as the giraffe, hyena, lion, meerkats and even ostrich. More than 80 vegetation types are found in grasslands
Back in the past rituals done by people such as the khoi san and Bushmen was to stay in grassland areas for amount of time. This to train the children how it works and it’s a form of discipline to them
In most religious nature is very common. Having the knowledge and natural /heritage on it give a sense of understanding in their religion. Meditation can be done in such places because of the amount of peace there
Grasslands have many types of soil with different adaptations. The soil is typically porous. This is a good adaptation because it needs to drain water very quickly during wet seasons. It also has a thin layer of humus. Humus is an organic portion of the soil created by partial decomposition of plant or n matter (from the grassland biome). The humus` main task is to provide the plants such as grasses and with nutrients
Grasslands have deep soils that are very nutrient rich because of the large amount of plant tissue (‘biomass’) that dies off and is added to the sol through decomposition every year. This is why grasslands is often converted into farmlands, which has been the case for most grasslands in Ontario. Plant community structure is often the results of interactions between succession, disturbance and dispersal. While some disturbances may be highly stochastic (e.g. flooding or landslides) other types of disturbance are closely linked to the current successional state of community ( e.g. fire ) | <urn:uuid:5879272b-2086-4974-b60f-f21597bf1655> | CC-MAIN-2017-26 | https://pbhslifescience.wordpress.com/2016/10/14/benefits-of-biodiversity-to-people-grasslands/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00172.warc.gz | en | 0.947309 | 729 | 3.265625 | 3 |
Honor Your Father and Mother
The Fourth Commandment is something we learn at a very early age. But have we really heard what God expects out of us? Sure everyone knows that we should honor our father and mother, but what application does this have in our everyday life? Does it apply to more than just our mothers and fathers?
To start let’s take a look at what Dr. Luther says in his small catechism:
Honor your father and your mother.
What does this mean?
We should fear and love God so that we do not despise or anger our parents and other authorities, but honor them, serve and obey them, love and cherish them.
Without a doubt you have seen the trend in modern society to “challenge authority”. We can see it in politics, civil government, and even in our own homes. Even young children find ways to defy their parents by throwing temper tantrums or downright disobedience. In the family application the use of the Fourth Commandment seems obvious. This is not only so they learn good discipline, but also for their safety.
But is this really a Godly or right attitude to have towards our civil government or law enforcement officers? The Bible tells us that all earthly authority is established and ordained by God. In John 19, Jesus had been arrested and brought before Pontius Pilate. Jesus, despite all his power, obeys the Father and submits himself the authority of Pilate. Pilate at one point, sensing that Jesus is an innocent man and not defending himself, tells Jesus that he has the power to preserve his life or kill him. Jesus rightly informs Pilate that he would not have authority if the Father had not given it to him. Obeying and respecting our governing authorities is also giving honor to God who established these earthly positions. God, in His love for us, has established all earthly authority. Our civil authorities are God’s servants, whose vocation is one of governance. They are not only God’s servants to rule us, and maintain good order, but also protect us, and punish wrongdoers (Rom. 13:5-7, Titus 3:1, and 1 Peter 2:13-14).
Sin stalks us relentlessly and the old Adam wants to defy authority. We unfortunately, no matter how hard we try, cannot keep this commandment or any other. Often we are overcome with feelings of disrespect to our boss, teacher, or parent, or we are tempted to disobey them. We want to do what we want to do! God has even attached a promise that we may live long and good lives to the command to honor our father and mother (Ephesians 6:2-3). But how can we avail ourselves of this promise when this commandment is so hard to keep?
Jesus, who was the perfect child, honored his earthly mother and father. Jesus also honored His Heavenly Father and went to the cross for you and for me, including the times we did not honor our parents or other authorities. It is because of Christ Jesus; who obeyed his Heavenly Father, and subjected Himself to earthly authority, who was unjustly crucified on the cross for your sins, that you may have eternal life! We may falter in keeping the law that God has given us to honor, love and cherish our parents and authorities, but God has forgiven these sins because of the crucified Jesus who fulfilled the law for us.
Paul Norris worked for 10 years as a police officer in the Dallas/Ft. Worth metroplex. He now works as the administrative assistant at Faith Lutheran Church in Plano, Texas.
Created: May 25th, 2017 | <urn:uuid:b145a1bf-2293-4c9a-95af-65ec141e2d6b> | CC-MAIN-2017-26 | http://higherthings.org/myht/articles/catechesis/fourth-commandment-authority | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320545.67/warc/CC-MAIN-20170625170634-20170625190634-00320.warc.gz | en | 0.974793 | 757 | 2.859375 | 3 |
Mucoepidermoid Carcinoma of Hard Palate in a Pediatric Case
Journal of Advances in Medicine and Medical Research,
Salivary gland neoplasms are rare in childhood. Only 1 to5.5% of minor salivary gland tumours occur in children and adolescents. The most common malignant minor salivary gland tumours are mucoepidermoid carcinomas (MECs). Herein, we present a rare case of mucoepidermoid carcinoma occuring in the hard palate.
Presentation of Case: A 12-year-old boy visited our hospital with a swelling and ulceration of the right hard palate. Clinical examination revealed a localized mucosal nodule of the right posterior hard palate, measuring 1*1 cm. Biopsy was performed. The tumour was diagnosed as a low grade MEC. Wide excision was performed. The patient didn’t need another therapy. During 15-month follow-up, the patient showed no evidence of local tumour recurrence or metastasis.
Discussion: Mucoepidermoid carcinoma occurring in the oral cavity is extremly rare. These tumours are usually presenting as a painless, reddish-purple nodüle. Biopsy is necessery for definitive diagnosis. Histologically, MECs are divided into low, intermediate and high grade subtypes. Differantial diagnosis of palatal tumours in children include pleomorphic adenoma, benign or malignant mesenchymal tumours, and less commonly giant cell granuloma. A wide local excision with safe free margins is the operative procedure for low-grade MECs.
- Salivary gland
- mucoepidermoid carcinoma
- hard palate.
How to Cite
Abstract View: 277 times
PDF Download: 257 times | <urn:uuid:84869c3c-62d6-49f6-8beb-49dcbe60985f> | CC-MAIN-2021-17 | https://journaljammr.com/index.php/JAMMR/article/view/10395 | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038863420.65/warc/CC-MAIN-20210419015157-20210419045157-00238.warc.gz | en | 0.876236 | 386 | 2.609375 | 3 |
Definitions of utopia
n. - An imaginary island, represented by Sir Thomas More, in a work called Utopia, as enjoying the greatest perfection in politics, laws, and the like. See Utopia, in the Dictionary of Noted Names in Fiction.
n. - Hence, any place or state of ideal perfection.
The word "utopia" uses 6 letters: A I O P T U.
No direct anagrams for utopia found in this word list.
Words formed by adding one letter before or after utopia (in bold), or to aioptu in any order:
n - opuntia utopian s - utopias
Shorter words found within utopia:
ai ait apt at atop auto iota it oat op opt out pa pat patio pi pia pit pita piu poi pot pout put ta tao tap tau ti tip to top topi tui tup up upo ut uta
List shorter words within utopia, sorted by length
Words formed from any letters in utopia, plus an optional blank or existing letter
List all words starting with utopia, words containing utopia or words ending with utopia
All words formed from utopia by changing one letter
Other words with the same letter pairs: ut to op pi ia
Browse words starting with utopia by next letter
Previous word in list: utmosts
Next word in list: utopian
Some random words: vying | <urn:uuid:fd91f74a-d734-4fcd-a1f6-716027ed8e9f> | CC-MAIN-2017-13 | http://www.morewords.com/word/utopia/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189088.29/warc/CC-MAIN-20170322212949-00564-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.766672 | 308 | 2.6875 | 3 |
Modifying your lifestyle is an effective way to reduce the risk of heart disease. Yet many people at high risk feel no need to alter their lifestyle habits, a 2017 study in the Journal of the American Heart Association suggests.
The study of more than 45,000 adults found that among those at highest risk of heart disease, nearly one-fifth did not feel they needed to improve their health. That was despite the fact that all had at least five major risk factors for heart attack, such as obesity, smoking, high blood pressure, diabetes, a lack of regular exercise, and a diet low in fruits and vegetables.
Even when people knew they should make changes for the better, they often cited obstacles: 56 percent said they were stymied by work and family responsibilities, or simply by a lack of “willpower or self-discipline.”
The results warrant concern, because it’s estimated that modifiable risk factors account for the majority of the risk for heart attack among the general population. That means people have the power to make a huge difference in their heart health.
If you need help with losing weight, quitting smoking, or lowering your blood pressure, talk to your doctor. And remember that small, manageable changes-packing fruits and vegetables to have as a snack, for example, and taking the stairs instead of the elevator-do add up. | <urn:uuid:8b9d835e-fec8-46d0-8d09-32e06df2ae44> | CC-MAIN-2020-50 | https://www.healthandwellnessalerts.berkeley.edu/topics/heart-health/heart-health-facing-the-facts-about-lifestyle-changes/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141745780.85/warc/CC-MAIN-20201204223450-20201205013450-00242.warc.gz | en | 0.972034 | 279 | 2.78125 | 3 |
About the Book
The history of the Clyde and the great ships that were built there is well known. Less familiar and equally important, however, is the story of how the great river was made suitable for shipping. The dredging of the Clyde and the building of the great docks and quays that line it to this day remain some of the most impressive engineering feats of the industrial revolution.
From prehistoric times to the twentieth century, John Riddell explores fully this fascinating saga, the great monuments of which still define the city of Glasgow and the towns on the banks of the Clyde. At the same time The Clyde is also the story of the extraordinary plans and proposals that were never realised; schemes which stand as a testament to the power and wealth of Britain's Second City during its Victorian and Edwardian heyday.
You may also like…
Hardback | Pub: 05 Oct 2017£30.00
The Clyde is arguably the most evocative of Scottish rivers. Its mention conjures up a variety of images of power, productivity and pleasure from its ‘bonnie banks’ through the orchards of south Lanarkshire to its association with shipbuilding... | <urn:uuid:f113f148-4706-4bee-9f3e-11dff9631c16> | CC-MAIN-2021-43 | https://birlinn.co.uk/product/the-clyde/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585242.44/warc/CC-MAIN-20211019043325-20211019073325-00071.warc.gz | en | 0.964302 | 237 | 2.875 | 3 |
It’s said after Beethoven performed his famous 9th Symphony for the first time, he turned around to see the applause of the audience which, literally, fell on deaf ears. By this time in his life, Beethoven was almost completely deaf and could not hear the music he conducted nor the praise for its performance.
Yet despite this setback, the conductor was intensely committed to his craft and his deserved legendary status is a reflection of that.
Beethoven would’ve been good at pulling focus, too, had the technology existed back then. For camera assistants and master musicians are not so different — both contribute to a large creative endeavor with highly specialized technical prowess.
So it would only make sense that there are ways you can become a better focus puller by taking a cue from the musical maestros themselves.
Practice And Prepare Voraciously
When you show up to a concert — or even a stage play — you usually hear the sounds of instruments warming up. There are strings being bowed, trumpets being blown, and drums being beat.
It’s a short, mini preparation that takes place before the audience is given one iota of the performance.
Sitting in those chairs warming up the instruments are some of the best musicians. And whether they’re softly dancing on the keys of a piano or steadily running a bow along a violin, they got a seat in the orchestra pit by practicing without prejudice.
They voraciously study music, play on their instruments, and challenge themselves to be better. They know with a musical instrument, there is a constant need to repeat, refine, and reinvent.
If you want to become a better focus puller you need to take a similar approach — you have to be willing to practice focus pulling, whether in rehearsals or during downtimes on set. You have to watch dailies to see what went wrong where and why it happened that way. You can’t shy away from the chance to pull focus, but have to relish in the opportunity.
And don’t forget those musicians prepare everything.
Mentally they go over the notes, physically they get their mouths, hands, or fingers ready, and they also prepare their instruments — cleaning them, tuning them, and repairing them.
As a musician, you would never show up and simply expect a violin to be in perfect tune. So keep your gear “in tune” by constantly servicing it when it has problems and checking everyday that it works like you want it to.
Tap into the Rhythm of the Piece
Some of the most exciting moments in music are when we, as an audience, find ourselves attached to its rhythm. The musical cadence flows so appropriately and so easily that we just know what’s coming up next, even if we’ve never heard the song before.
Rhythm is the guiding force in music and, without it, a song would sound chaotic and without purpose. Rhythm focuses the instruments and binds them towards a single goal of a piece of music.
As a focus puller, you are also working towards a single goal — whatever shot you’re shooting — while having to stay in rhythm with many other crew. The way you turn the follow focus is partly dictated by them. The camera operator, the dolly grip, the actors themselves, they all contribute to how you do your job.
And believe it or not, there is a rhythm to all of this. It is why rehearsals are so crucial to getting a take right.
Each shot and each scene has its own rhythm that, when tapped into, helps every crew member and actor nail their mark and create that elusive movie magic.
Rhythm is not the only musical device that filmmaking is subject to. Music dictates moments like crescendos where the music gets louder and time signatures that define the pace a piece moves at, sometimes creating a more lethargic pace than the movement before it.
Focus pulling is like that too. In certain scenes you will have to pull focus much faster (crescendo) at different points and slower at other points. The camera may move quickly in one part of the scene, but creep in the next.
There’s a rhythm, a purpose, to give order to those working in tandem to shoot the scene.
If you tap into it, if you “use the force” as one commenter put it, you’ll find yourself pulling with ease.
Feel the Emotion and Exploit It
A director once told me how he watched a focus puller keep a Nascar vehicle, traveling around a track at over 200 mph, in sharp focus. His look of amazement said it all as he remarked, “It was like watching a ballet.”
Ballet, at its core, is a visual representation of a musical accompaniment. Despite all the snobby connotations, it is a timeless art relished because of its graceful beauty.
One essential component of ballet is musicians. For the audience to enjoy the ballet, most will agree they need to feel emotion. And the best way to deliver emotion is to pass it on. From the musicians, to the dancers, to the audience, emotion has to swell from the ground up until it transfers to those meant to receive it.
The music musicians play, and how they play it, dictates both how the performers move and how the audience perceives their motion.
“All that theoretical stuff is great,” you may think, “but how the hell does that help me with pulling focus?”
It helps because you have to feel the emotion of a scene to dictate how you pull focus.
This is most prevalent in scenes where you are doing an important rack focus. Is the tone of the scene dark or bright? Happy or sad? Frantic or calm? These questions help you decide the style in which you pull.
A slow, brooding scene would be ruined by a quick rack focus — unless it’s a cue for the pace to pick up — while a frantic scene demands a punchy focus pull.
See what I mean?
It’s not just enough to know where to focus, but you have to know how that fits into the story. What emotion does your rack focus convey? I know it sounds silly, but it’s the small details that really sell the larger narrative.
It’s the loud scream of a trumpet or the sad slow death knell of a violin at the end of a solo.
Musicians understand this: that no matter how small or insignificant their instrument may be, that without it, the music isn’t the same.
The same is true for focus pullers and what they contribute to film. Their movements must contribute to the emotion and transmit that to the audience — like watching a ballet.
Play a Show They’ll Never Forget
When music is done right, it flows. It makes sense and people forget about the technical abilities of the musicians, instead feeling the full emotional impact of the song.
As Beethoven turned around to silent applause the night of his concert, he was humbled by a series of five standing ovations. His 9th Symphony was the last complete symphony he ever composed, but many agree it is also his best.
No doubt, Beethoven left the concert hall that evening knowing he gave an exceptional performance.
And like Beethoven, master musicians hope one day to play a show others will never forget — and that’s not a bad goal to have for yourself either. | <urn:uuid:aaaa756e-02aa-4c4b-91e7-b9d94ee2eb59> | CC-MAIN-2016-36 | http://www.theblackandblue.com/2011/08/16/pull-focus-musician/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982921683.52/warc/CC-MAIN-20160823200841-00244-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.966591 | 1,569 | 2.578125 | 3 |
Hell Gap Site (48GO305)
The Hell Gap site is located in southeast Wyoming, on the eastern edge of the Hartville Uplift. The uplift is a geological feature that rises slightly above the surrounding terrain, especially the plains to the east. Because of its multiple exposed geologic formations, Hartville Uplift provided prehistoric inhabitants with a myriad of different stone sources for making of stone tools. Wyoming’s hunter-gatherers used the rich stone sources in this area from the earliest prehistoric times.
Hartville uplift also provides a diverse ecological setting for hunter-gatherers. To the east are the open grass plains with prairie potatoes, buffalo, pronghorn, and many other plant foods, animals, and medicines. To the west the uplift sports a ponderosa pine savannah with juniper, wild onion, sago lily, deer, and other important plant and animal foods, and medicines. The ecotone – boundary between these two major ecological zones – is particularly advantageous as an access point to both resource sets. In addition, Hell Gap valley provided water for most of the year during the Late Pleistocene and early Holocene times.
Hell Gap is an early, stratified North American archaeological site that provides data for the lifeways of the Frist Americans (Paleoindians), from about 13,000 to 8500 years ago. On numerous occasions Paleoindians camped in the Hell Gap Valley for short periods (estimated from a few days to perhaps as long as a month), and left the remains of camping along the banks of the creek. Structures, stone tools (Figure 1), debris from production of stone tools, ornaments (Figure 2), bone tools such as awls or needles (Figure 2), food refuse are some of the items left behind and buried by the arroyo flood waters or sheetwash from the nearby slopes. Archaeologists have been investigating these remains for nearly 60 years.
Beginning in 1959, excavations documented the basics of the archaeological record of the Hell Gap Valley, four Paleoindian localities (Figure 3), each with a sequence of cultural components (Figure 4). This established the site as a key Paleoindian locality, not only in Wyoming, but for North America. The 1960s (1962-1966) investigations recovered critical data and are still the basis for what we know about the site today.
Renewed investigations of the early 1990s were designed to provide better context for the large collection of artifacts recovered during the 1960s. The main goal of the 1990s studies was to write a comprehensive report of the Hel Gap site (not done before). The goal was partially accomplished through one publication (Hell Gap: A Stratified Paleoindian Campsite at the Edge of the Rockies, edited by M.L. Larson, M. Kornfeld, and G.C. Frison, 2009, University of Utah Press), but the work continues. A significant goal since 2001 has been the elucidation of the Hell Gap cultural stratigraphy brought into question as a result of 40 years of Paleoindian research, radiocarbon dating revolution, and developments of archaeological field methods. The data for unravelling (verifying or rejecting) the original (1960s) Paleoindian cultural sequence of the Hell Gap site can only be accomplished with detailed field techniques (Figure 5) and sophisticate spatial analyses. We have nearly completed the former, but have hardly begun the latter.
Hell Gap site was acquired by the Wyoming Archaeological foundation, a non-profit entity (dedicated to learning from and preserving archaeological resources), through outright purchase and gifts in 1988. In addition to the site’s research potential, the WAS property provides a fantastic venue for public education.
Ecology, climate change, human adaptation to changing environments, cultural evolution, are some of the topics that can be (and are) part of the public programs at Hell Gap. The annual fieldwork and field schools train and provide experience to many students and avaocational archaeologists in the latest archaeological field techniques. Annual visitation to the site includes underserved local communities (Figure 6), visitors from throughout North American and oversees, as well as international scholars (Figure 7). Current research phase at the site will likely be completed within five years, however, we expect to raise more questions, requiring future studies.
Figure 1. Projectile point sequence recovered from Locality I of the Hell Gap site. From oldest (left) to youngest (right): Goshen, Folsom, Midland, Agate Basin, Hell Gap, Alberta, Scottsbluff, Frederick, and Lusk.
Figure 2. Bone and stone beads (top) and bone needle (bottom) from the Hell Gap site.
Figure 3. Hell Gap Locality I profile showing cultural complexes represented and their location in the stratigraphic profile.
Figure 4. Hell Gap Valley showing location of the four major Paleoindian localities.
Figure 5. Excavation and computerized recording system used at the Hell Gap site.
Figure 6. Maryann Koonz with third grade class from Wheatland, excavating at the Hell Gap site, Locality I.
Figure 7. Visitors to the Hell Gap site in 2009. Maris Krstic from Croatia explains stratigraphy, excavation procedures, and findings. Renata Nizak from Croatia looks on from far left.
Figure 8. Professional and international visitors to the Hell Gap site in 1966 (top) and 2016 (bottom). The 1966 Denver meeting of the International Quaternary Association and the 2016 Suyanggae and Her Neighbors: Suyanggae and Hell Gap symposium in Laramie. | <urn:uuid:135552ea-7d8d-4b6c-98f6-da5db68eeb87> | CC-MAIN-2017-39 | http://wyoarchaeo.state.wy.us/index.php/learn/wyoming-archaeology-awareness-month/project-a-day/56-september-1-hell-gap | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693363.77/warc/CC-MAIN-20170925201601-20170925221601-00541.warc.gz | en | 0.922818 | 1,166 | 3.640625 | 4 |
Durand LineArticle Free Pass
Durand Line, boundary established in the Hindu Kush in 1893 running through the tribal lands between Afghanistan and British India, marking their respective spheres of influence; in modern times it has marked the border between Afghanistan and Pakistan. The acceptance of this line—which was named for Sir Mortimer Durand, who induced ʿAbdor Raḥmān Khān, amir of Afghanistan, to agree to a boundary—may be said to have settled the Indo-Afghan frontier problem for the rest of the British period.
After the British conquered the Punjab in 1849, they took over the ill-defined Sikh frontier to the west of the Indus River, leaving a belt of territory between them and the Afghans that was inhabited by various Pashtun tribes. Questions of administration and defense made this area a problem. Some of the British, members of the so-called stationary school, wanted to retire to the Indus; others, of the forward school, wanted to advance to a line from Kābul through Ghaznī to Qandahār (Kandahār). The Second Anglo-Afghan War (1878–80) discredited the forward advocates, and the tribal area was divided into roughly equal spheres of influence. The British established their authority by indirect rule up to the Durand Line, at the cost of a number of tribal wars; the Afghans left their side untouched. In the mid-20th century the area on both sides of the line became the subject of a movement for Pashtun independence and establishment of an independent state of Pakhtunistan. In 1980 approximately 7.5 million Pashtuns were living in the area around the Durand Line.
What made you want to look up Durand Line? | <urn:uuid:2679962b-e000-4d37-9763-57482043a59f> | CC-MAIN-2014-42 | http://www.britannica.com/EBchecked/topic/174128/Durand-Line | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444582.16/warc/CC-MAIN-20141017005724-00190-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.969483 | 367 | 3.96875 | 4 |
This month is mostly about wanting an object and reaching for it. Try and resist the urge to bring the object to your baby as it is this curiosity about the object that propels your child to move. In fact, encourage your baby to get to the object herself.
Your baby’s development
In order to support your baby’s developing skills, encouraging words often go a long way in overcoming frustrating situations such as getting to a distant object. Also make sure that you name the object so that she associates it with the object the next time it is mentioned. She may even watch your mouth as you pronounce the word. Let her get to it herself and praise her every effort as she gets closer to her goal letting her know that her accomplishments are appreciated. Not only will her problem-solving skills develop but along with it will come the beginnings of self-esteem.
This month may also bring your baby trying to stand up as though crawling weren’t exciting enough. The important skill of bending at the knee and shifting her weight forward to stand up may seem frustrating initially, but before you know it she will get the hang of it and have you baby-proofing just about any surface in your house. It may be a few weeks before she can sit from a standing position as easily as she gets herself up.
Some babies may not be interested in standing up or even crawling for a few more weeks. If you are concerned that your baby is not developing in either gross motor or fine motor skills, then bring it to the attention of your pediatrician. But in all likelihood, your baby will get to at least a few milestones before you make it to your appointment!
Hopefully your baby is sleeping through the night by now but if she’s not, consider letting her cry it out until she falls asleep on her own. This may seem harsh at first, but will save you from hours of rocking, walking, and singing the baby to sleep. This will become particularly challenging after a long day at work and it’s just mom and dad with the baby.
Your life as Parents
If you have been spared the angst of your child running a fever until now, then consider yourself lucky. A baby’s first fever is alarming to most parents, especially if the child is inconsolable. New parents also worry about febrile seizures which can result from a fever going too high.
As many as 5% of children will undergo febrile seizures and there is not a whole lot one can do to prevent it. The truth is that these are never medically dangerous, and no, your baby will not suffer brain damage from it! So when your baby runs a fever, treating her with a pediatric dose of acetaminophen at regular intervals is sufficient. If the fever lasts longer than 2 to 3 days, then bring it to the attention of your doctor.
Indian customs do not allow a baby to look at her image in the mirror until she is a year old, so she probably has no idea what she looks like. But point to photographs of her favorite people and tell her who they are and before you know it she will be repeating back their names to you. | <urn:uuid:f9907760-8e4c-423e-b547-41b3f140fd4d> | CC-MAIN-2017-34 | http://www.mothersdelight.com/baby-center/baby-month-8/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103270.12/warc/CC-MAIN-20170817111816-20170817131816-00265.warc.gz | en | 0.972098 | 653 | 2.640625 | 3 |
What is Identity Theft?
Identity theft is a situation in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. The victim of identity theft can suffer adverse consequences if they are held responsible for the perpetrator's actions.
Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. Identity thieves may obtain this information by tricking you over the phone, email, or social networking sites, or they may try and look for personal information in documents that had not been properly disposed of.
- Errors on your credit or bank statements
- Errors on your credit report
- Late or missing bills
- Receiving credit cards you did not apply for
- Calls or letters about purchases you did not make
- Denials of credit or being offered less favorable terms for no apparent reason
If You Believe Your Identity Has Been Stolen
- Place a Fraud Alert - contact one of three credit reporting companies (TransUnion, Experian, or Equifax) to inform them that you may have been the victim of identity theft. They will place an alert on your credit report that will make it hard for an identity thief to open accounts in your name. The credit reporting company that you contact will then in turn contact the other two reporting companies, who will then apply the same alert. Fraud alerts last for 90 days, but can be renewed. A fraud alert is free, but you must be able to provide proof of your identity.
- Contact Financial Institutions - Contact your banks and credit card companies to inform them that you believe you have been the victim of identity theft.
- Get a Credit Report - Victims of identity theft are entitled to a free credit report from each of the reporting companies. Review the credit reports for unauthorized charges or accounts and dispute any errors you find.
- Create an Identity Theft Report - it will help you deal with the credit reporting companies, debt collectors, and businesses that gave the identity thief credit or opened accounts in your name. It will help you get fraudulent information removed from your credit report and stop debt collectors.
Resolving identity theft is a long process. Here are some steps to help it run smoothly.
- Keep detailed records of correspondences (phone calls, emails, etc).
- Keep all documents received, and don't hand out originals.
- Keep track of deadlines (when you must file requests, when a company was supposed to have responded, when you should follow up, etc).
- Confirm that everybody you have contact with has the correct information (name, address, phone number) and that the identity thief hasn't made changes to any of your records. | <urn:uuid:e05d0bb5-ee5c-4f98-9a7f-a07a7af799ba> | CC-MAIN-2020-40 | https://www.kent.edu/it/secureit/what-identity-theft | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402130531.89/warc/CC-MAIN-20200930235415-20201001025415-00144.warc.gz | en | 0.94713 | 577 | 3.171875 | 3 |
DETROIT (WWJ) A new report from Data Driven Detroit reveals that in spite of the many families with kids that left Detroit between 2000 and 2010 — much of the city’s population still consists of children living in poverty.
Sixty percent of children in Detroit live in poverty, per the “State of Detroit” report. This represents a 64.7 percent increase in child poverty in the city since 1999. Children account for 194,347 of Detroit’s residents, or 27 percent of the city’s total population.
Despite the poverty rate, the report also shows that there are some positive changes taking place in the city, according to the data firm’s director Kurt Metzger. It shows a significant decrease in the number of teen pregnancies.
“Much more actual education in schools, much more open discussions, I think there’s been a lot more effort around that not only in Detroit Public Schools, but also nationally we’re starting to see those numbers go down,” Metzger said.
Another good note: The report shows more women are getting prenatal care, Metzger said. Overall, there was a 9.2 percent decrease in the number of births to teen mothers, and an 11.5 percent increase in the number of mothers who sought and received appropriate prenatal care.
“Another positive outcome was the decreasing rate of children testing positive for elevated blood lead levels, down more than 75 percent across all age group between 2001 and 2010,” the report found. | <urn:uuid:31c28657-7365-4f9b-a1c1-0d743cde812a> | CC-MAIN-2016-18 | http://detroit.cbslocal.com/2013/01/24/report-childhood-poverty-high-in-detroit-but-teen-pregnancy-down/comment-page-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461864953696.93/warc/CC-MAIN-20160428173553-00191-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.94264 | 319 | 2.6875 | 3 |
Cities, empires and religions have risen and fallen around these unique underground havens once used by early Christians to hide from Roman armies, yet they remains occupied to this day – 100 square miles with 200+ underground villages and tunnel towns complete with hidden passages, secret rooms and ancient temples and a remarkably storied history of each new civilization building on the work of the last.
The fields of architecture and urban design would do well to center their sustainable sights on this unique site – few structures outside of this area in Cappadocia have survived for so long. Some of these buildings go up to five full stories underground and date back to Roman times or beyond, though many caves were carved out by human hands long before their empire arrived. (Images via AlaskanDude)
The fantastic rock formations used as shells for these dwellings date back millions of years, and much of the more recent architecture has survived for hundreds or even thousands of years – despite being laid siege to many times over and housing everything from armies to explosive weapons factories.
Centered in modern day Turkey, this region has passed between hands many times. The contemporary residents speak a hybrid of Greek and Turkish and, unsurprisingly, bus tours, hotels and other visitor-oriented services comprise much of their current economic system Built up over time for defense as much as shelter, narrow passageways have made it notoriously difficult for invaders to penetrate the perimeters of many of these underground cave complexes.
In part due to their secret locations and the naturally temperature-controlled nature of the cave interiors, many religious artifacts and artworks have survived for over a thousand years. All the while, surface structures have been erected and destroyed while modern architecture mixes in strange hybrids with historic temples and above-ground houses.
While many buildings remain occupied, many more are now deserted – from homes to entire churches and underground cathedrals. For all we know, some rooms and structures are forever lost and buried, hidden so well they will never be found again. (Images via Mekiares) | <urn:uuid:61210ce3-72a3-4858-b130-ca573d8ef46a> | CC-MAIN-2021-17 | https://dornob.com/underground-cities-3500-years-of-cappadocian-cave-homes/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039596883.98/warc/CC-MAIN-20210423161713-20210423191713-00311.warc.gz | en | 0.96058 | 409 | 2.984375 | 3 |
About Gov. Joseph Morton, II
Joseph Morton (died September 1721) was an early colonist and governor of the Province of Carolina. Although he was not one of Carolina's Lords Proprietors, Morton was influential in the recruitment of religious dissenters to migrate to the new colony. In 1680 he led a group of dissenters to what is now South Carolina, settling Edisto Island. In 1682 he was appointed governor of the colony by the proprietors, but due to disagreements with the proprietors was replaced in 1684. A second appointment in 1686 lasted only one month before he was supplanted by James Colleton. Morton had been in the process of organizing an expedition against Spanish Florida, which the colonists believed was harboring pirates operating against the colony's coastal settlements. Colleton immediately put a stop to the expedition, since England and Spain were then at peace.
In 1697 he was name a judge of the admiralty by King William III. Because of this appointment he was denied a third opportunity to be governor by the proprietors in 1701. He supported education and libraries in the colony. He married into the family of Joseph Blake, who also served as governor of the province. He had two children, and died in September 1721. | <urn:uuid:3988e0e1-e867-4feb-8114-13350f2db342> | CC-MAIN-2014-35 | http://www.geni.com/people/Gov-Joseph-Morton/6000000006441184071?tracking_source=records | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830903.34/warc/CC-MAIN-20140820021350-00033-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.99037 | 261 | 3.25 | 3 |
Flying eggs become part of Year 5 Science Day experiment
The Lakes Free Range Egg Company went back to school earlier this month, with cases of eggs set to spark the imagination of primary school pupils attending the Ullswater Community College (UCC) Science Days
Nineteen Eden Primary schools visited UCC over a two week period, with pupils having the opportunity to discover more about science, the school and its science labs, hopefully encouraging future applications for secondary school places. The Year 5 Primary school pupils took part in two experiments based around a ‘space explorer ‘theme.
Sessions included identifying plant material and creating a prototype shuttle that would land scientists on the planet. As this experiment uses eggs as the astronauts, the school worked with Sainsbury’s and local egg supplier The Lakes Free Range Egg Company to secure enough eggs for the mission.
As well as supplying the eggs, Helen Brass, Company Secretary at The Lakes Free Range Egg Co and Alison Morton from the Penrith Sainsbury’s store took part in the experiment using an orange Sainsbury’s carrier for their space shuttle parachute.
Helen Brass from The Lakes said “The experiment was well thought out; pupils needed to use a variety of lightweight material to create a pod or basket for the egg astronaut to sit in when parachuting from the second floor balcony. The aim was to be as efficient and economical with material as possible, a great lesson in sustainability!
Pupils found it a fun experiment, though only one in three eggs survived the landing – thankfully at ‘Team Sainsbury’s/Lakes’, we managed not to crack our egg when it landed.”
Sustainable materials, and recycling were key features of the experiments, so to continue the theme, The Lakes provided each pupil with a recipe card that featured a sweet and savoury dish that makes the most of leftovers and eggs.
UCC Science Teacher Alex Ford said “Working with The Lakes Free Range Egg Company and Sainsbury’s has been an extremely valuable experience and is a great opportunity to develop educational (even eggucational) links with local companies. ‘The Lakes’ is providing a perfect opportunity to explore how businesses deal with the economic climate and, particularly for science, manage sustainability issues.”
In total, 345 primary school pupils from across Eden took part in the event. During the sessions numerous possible links and opportunities with ‘The Lakes’ Free Range Egg Company became evident, especially with the UCC Rural Science department aiming to look more closely at the sustainable and environmental practices at ‘The Lakes’ factory at Stainton. | <urn:uuid:12689e4c-086e-480b-8109-b3ce15a49556> | CC-MAIN-2018-22 | https://lakesfreerange.co.uk/flying-eggs-schools/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865884.49/warc/CC-MAIN-20180524014502-20180524034502-00441.warc.gz | en | 0.957879 | 547 | 2.578125 | 3 |
There are a number of alternatives to guardianship. Because guardianship involves such a severe restraint on an individual’s rights, it should only be considered after all other options have been shown to be ineffective or unavailable. Possible alternatives (each has advantages and disadvantages that should be discussed with an attorney) are discussed below.
As a general matter, supported decision-making occurs when an individual with cognitive challenges is the ultimate decision-maker but is provided support from one or more persons who explain issues to the individual and, where necessary, interpret the individual’s words and behavior to determine his or her preferences. This is in contrast to having a surrogate or agent under a durable power of attorney make decisions on a person’s behalf.
A representative or substitute payee is a person who manages public benefits such as Supplemental Security Income, or Social Security Disability Income for persons who are not fully capable of handling their own benefits. The representative payee does not act as a legal guardian, but is expected to assist the person with money management, along with providing protection from financial abuse and victimization. Of course it is important to choose a representative payee you trust to not take advantage of you, as they will have access to and control of your financial benefits. You want to choose a payee who knows you and wants to help you, and who sees you often and knows what you need. In most cases, your payee would be a close friend or family member. In other cases social service agencies or other organizations may serve as payees. The SSA has to approve your payee.
There are a number of case management and community advocacy organizations that can help people with disabilities to obtain the support and services they need to remain independent. You can contact the Delaware Aging and Disability Resource Center to find out about different resources: http://dhss.delaware.gov/dhss/dsaapd/adrc.html or 1-800-223-9074.
There are several state agencies that provide services to people with disabilities, which can help you to maintain independence in the community. Some of these agencies include:
A health care surrogate can make health care decisions on your behalf. These decisions can include decisions to treat, withdraw or withhold treatment of an adult. There are two ways to establish a health care surrogate. One allows a doctor to appoint a surrogate for an individual who is not competent, and the other allows individuals who are competent to designate someone as their healthcare surrogate in the event a surrogate is necessary.
When an individual lacks competence the person’s doctor must determine that the person lacks capacity and that there is no guardian, Advanced Health Care Directive or similar authority that covers the decisions at issue. This must be confirmed in the patient’s medical records. If the person with the disability is not competent to designate a healthcare surrogate, the law provides family members who can be permitted to act as a healthcare surrogate in a preferred order (1. spouse unless a divorce has been filed, 2. adult child, 3. parent, 4. adult sibling, and others). An individual cannot be designated as a healthcare surrogate if there is a criminal or civil no-contact order between the person with a disability and the potential surrogate, or if the person with a disability has filed a Protection from Abuse order against the potential surrogate.
For individuals who ARE competent, the person with a disability may designate an individual to act as a healthcare surrogate by personally informing a supervising health-care provider with another person there to witness (who is not the surrogate). This must be confirmed in writing in the patient’s medical record and signed by the witness. This allows a person with a disability to designate a trusted individual to make healthcare decisions in the event the person cannot do so for himself. It does not require a special document, attorney fees, or court!
AHCDs are also known as “living wills” or “Power of attorney for health care.” These documents are created so that an individual can authorize another person to make health care decisions on the individual’s behalf, if the individual loses the ability to make those decisions in the future, when they are no longer able to make such a decision on their own.
A trust is a formal legal relationship whereby money or property is held by one party for the benefit of another, the “beneficiary.” The trustee holds that money and is legally obligated to only use that money for the benefit of the beneficiary. The trust will explain what the money can be used for and how much and how often money will used to pay for housing, medical care, etc. Some trusts will require the trustee to spend the money in a way to maintain a person’s current standard of living, while other trusts may be less or even more specific. Trusts have the benefit of allowing a person to live in the community, while ensuring trust funds will be used wisely. While this prevents the person from being taken advantage of, trusts can cost significant money to establish and to administer.
There are specially designed trusts that allow people with disabilities to continue to be eligible for many public benefits, despite the funds in the trust. These are often referred to as “special needs trusts.” Individuals should consult a professional with expertise in special needs trusts if you are interested in establishing one.
In 2014 the U.S. Congress passed the Achieving a Better Life Experience or ABLE Act. ABLE Act accounts allow individuals with disabilities that manifested before the age of 26 to create special financial accounts that will not be considered for programs such SSI and Medicaid. Through an ABLE Act account, eligible individuals can save up to $100,000 without risking their eligibility for these government benefits. States need to put regulations in place so that banks and financial institutions can offer these accounts.
A Durable Power of Attorney is created when a person voluntarily authorizes, in writing, another individual (called an “agent”) to take action on the person’s behalf. A durable power of attorney is usually limited to legal and financial affairs. The “durability” term is important, because for a durable power of attorney, the power of the representative to act on the person’s behalf continues after the person is no longer capable of making decisions. Powers of attorney may be revoked in writing at any time by the person who granted it, provided the person is able to understand what they are doing at the time of revocation. The revocation must meet statutory requirements. You should make sure that whoever you choose to serve as your agent through a Power of Attorney is someone you trust and who knows and will respect your wishes. It is very important that the Power of Attorney meet all statutory requirements, including an agent certification, notarization, and witnesses.
This is a relatively simple way to have someone you trust help you with your finances, but it is not without risk. By opening a joint checking account, the other person can manage your account, including deposits and withdrawals, without you needing to be involved. You should be certain you trust the other person on the account, because that person has access to all of the money in the account. You need to carefully consider not only the risk of fraud, but also whether having joint ownership of funds impacts either account owner’s eligibility for public benefits, including Medicaid and SSI.
If none of the listed family members are able to take this role, there is a procedure by which another trusted adult can act as healthcare surrogate when the person with a disability is a patient in an acute care setting or is a client of the Department of Health and Social Services. | <urn:uuid:85b521fe-9b52-4404-9388-6ab835c56cd5> | CC-MAIN-2021-21 | http://transition.declasi.org/alternatives-to-guardianship/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991693.14/warc/CC-MAIN-20210512004850-20210512034850-00195.warc.gz | en | 0.959626 | 1,562 | 2.53125 | 3 |
A cantref, or geographical unit in medieval Wales.
Supposedly named after an early sixth century king, Gwynllyw Farfog ap Glywys, Gwynllwg essentially comprised the coastal plain stretching between the rivers Rhymney and Usk and was one of the cantrefi that comprised the Welsh medieval kingdom of Glywysing, later known as Morgannwg.
After the defeat and death of Caradog ap Gruffudd at the Battle of Mynydd Carn in 1081, the Normans moved into eastern part of Caradog's old dominion and occupied Gwynllwg. Caradog's son Owain Wan (Owain the Weak) retained the upland commote of Machen but the lowlands became a Norman lordship, eventually becoming known as the lordship of Newport after the principal town established by the Norman colonists.
Despite being part of Morgannwg, that is Glamorganshire for centuries, the modern territory of Gwynllwg was parcelled off into Monmouthshire when
Wales was shired and now forms part of the modern county borough of Newport. | <urn:uuid:dcfc1a64-1bdc-46cd-86c0-8d076edde08f> | CC-MAIN-2018-51 | https://everything2.com/user/aneurin/writeups/Gwynllwg | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823516.50/warc/CC-MAIN-20181210233803-20181211015303-00031.warc.gz | en | 0.962709 | 239 | 3.6875 | 4 |
Researchers and physicians alike have long struggled with how to keep cancers from returning. In the laboratory, treatments will kill every last tumor cell, but in the patient, tumor cells will shrink only slightly or return unceremoniously.
Three studies have emerged today theorizing that chemotherapy and cancer research has been going about treatment all wrong. Instead of targeting the tumors themselves, and hoping to shrink them, we should be targeting the cells that cause them. The studies put forward the controversial theory that tumor cells are caused by stem cells.
This hypothesis differs from the standard one widely believed now, that says that any and all cancerous cells can create a tumor. But these three studies call that idea into question. The physicians believe that all tumor cells are created from a hierarchy, with cancerous stem cells originating all tumors.
The first study, published in Nature, was conducted by Gregory Driessens and his team, in Brussels. They analyzed skin cancer, without targeting stem cells specifically. They found that cells divided one of two ways: either reproducing a handful of times and then fading away, or reproducing many, many cells. What's more, they found that, when tumors became more aggressive, they produced more stem cells, which can reproduce indefinitely.
The second study was led by Arnout G. Shippers, and was published in Science. Shippers genetically modified mice to carry a genetic marker that, when activated by certain drugs, turned labeled tumor cells one of four fluorescent colors. When they activated the markers, all of the cells, of various types, turned the same color, indicating that they came from a single stem cell. When they injected a different drug, the cells all turned a different color, confirming their earlier hypothesis.
The third study, also published by Nature, was performed by Jim Chen and his team in Dallas, Texas and New York City. They studied cells in glioblastoma, a certain malicious type of brain cancer. They wanted to know whether a genetic marker that labels neural stem cells would also label cancerous stem cells in glioblastoma. They found that all cells contained a few labeled cells – presumably stem cells – but many more unlabeled cells. They found that, if they targeted the tumors with chemotherapy, the unlabeled cells would disappear, but the labeled cells would not. More importantly, the unlabeled cells would return. Further tests indicated that the unlabeled cells all originated from the same predecessors. If the labeled cells were targeted, the tumors would wither away into vestiges of their former selves, without even a resemblance to glioblastoma.
Researchers are concerned that their research may not to apply to every type of cancer, although if it does it would light the way to new forms of cancer treatment. | <urn:uuid:e1505640-5078-4aa1-b5eb-318602a844f8> | CC-MAIN-2017-13 | http://www.medicaldaily.com/stem-cells-may-cause-tumors-study-241695 | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188553.49/warc/CC-MAIN-20170322212948-00234-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.973077 | 566 | 3.5 | 4 |
Saturday, September 1, 2012
What Will Follow GPS?
The ubiquitous navigation system has more worldwide users than ever, but safety and security concerns have insiders looking beyond the current network
|Alaska Airlines, which pioneered RNP, has been flying RNP approaches into 27 airports. In 2011, these approaches saved the airline 210,000 gallon of fuel and $19 million.|
It may seem strange, almost unbelievable, that while GPS and its expanding international equivalents have never seemed better, with its worldwide acceptance growing virtually by the minute throughout almost every aspect of human life, there are now concerns, including within its Department of Defense (DoD) owners, about what should replace it. Yet, just 40 years after its basic concepts were defined by a small group of U.S. military officers, that is the case today.
Why is that? How did a military positioning aid, initially conceived as a highly classified American navigation and weapons delivery system, become transformed into a public utility that, if shut off tomorrow, could wreak havoc around the world, due to its reach into the most remote corners of the earth? Tens of millions of words have been written about the system’s applications, from the mundane to the totally extraordinary, but only recently have serious concerns been raised about its limitations.
Ironically, these are a direct result of the system’s original aim of making the GPS satellites’ signals extraordinarily difficult to detect and use, through a combination of very low transmitted signal power and signal concealment techniques, and this remains true today. Low power was desirable in any event to assure long battery, hence long orbital life, but dropping it to -160dBm, a level well below the ambient radio “noise,” called for unique technology to detect and recover its full characteristics, while still preventing its use by adversaries.
Signal concealment relied on the then top secret “frequency hopping” concept, now known as today’s unclassified and widely used spread spectrum technology. But the combination of very low power and spread spectrum continues in use with America’s GPS and compatible foreign systems.
The drawbacks of the system’s low signal power were first made public by the Department of Transportation’s Volpe Development Center in 2001. Volpe scientists were cautioning civil GPS users that the system had shown itself to be vulnerable to interference from more powerful low frequency transmissions. By 2009, however, interference reports increased significantly with the introduction of GPS vehicle tracking systems and the corresponding increase of low-cost portable GPS jamming devices designed to foil them.
While no statistics are available, there are now estimated to be several thousand jammers in daily use on U.S. highways, despite their possession being illegal. Primarily, they are used by long distance truckers, whose vehicles are usually equipped with remote GPS receivers that can be interrogated by company dispatchers to monitor vehicle locations, which the jammer negates. But many other uses have been reported, including concealment of hijacked trucks carrying high value goods, stealing expensive cars and even the avoidance of vehicle monitoring by suspicious spouses.
In themselves, none of these has so far seriously threatened public safety. However, vehicle jammers can affect nearby aviation GPS receivers. For example, a Category 1 GPS landing guidance system undergoing certification at Newark Liberty International Airport in New Jersey suffered frequent shutdowns during acceptance testing due to jammers operating in vehicles on the adjacent turnpike. Modifications to improve jamming resistance have reduced the number of shutdowns at Newark, but Avionics Magazine understands the complete solution may include moving the system’s four tower-mounted GPS monitor receivers much further from the turnpike.
Other than at Newark, there have been few reports of GPS interference that affected aircraft operations. Usually, this is because the majority of current small jammers have quite short ranges, which aircraft quickly pass through. Nevertheless, with the expected increasing use of more powerful jammers, GPS reliability as a key element of FAA’s NextGen will come under pressure and could even risk becoming uncertifiable for essential applications such as RNP in restricted terrain and GPS precision landing guidance, with potential impact on ADS-B position reports at lower altitudes, and during less critical SBAS procedures. And paradoxically, while the steadily increasing numbers of compatible foreign navsats is unquestionably a navigation benefit, their added individual transmissions within the GNSS band has the undesirable side effect of raising the ambient noise “floor,” thereby further weakening the satellite signals.
Interestingly, however, the major concern about aircraft GPS interference has come from the Department of Defense.
“The relatively weak broadcast signal from space can be jammed, precluding UAS operations. Until onboard systems that do not rely on GPS can be fielded, assured position, navigation and timing is a critical UAS concern,” according to the U.S. Air Force’s 2009-2047 Unmanned Aircraft Systems (UAS) policy document.
And while this statement only concerned unmanned systems, adversary jamming at long ranges and high altitudes is an equal DoD concern across its air, land and sea forces, demonstrated by its twice yearly NOTAM’d exercises on the east and west coasts, where very powerful jammers, emulating U.S. and foreign jamming technologies, radiate interference signals out to beyond 350 miles, from ground level to above 40,000 feet.
And now, there’s “spoofing.” While DoD still questions Iran’s December claim that it spoofed a U.S. Air Force RQ-170 Sentinel reconnaissance aircraft by sending it higher powered false GPS coordinates and directing it to crash land in Iran, spoofing’s potential threat has long been recognized as a troubling game changer in military UAV and other operations. Consequently, DoD is studying other, preferably exclusive, navigation alternatives to completely avoid jamming and spoofing.
➤ Enhanced GPS receiver jamming protection: This is part of the current government/industry receiver standards initiative, following the LightSquared affair. But total anti-jam protection is impractical and retrofits to current units could be cost prohibitive. Some corporate aircraft are reported to have installed military controlled reception pattern antennas (CRPA) that evaluate all incoming signals throughout 360 degrees and block reception of segments that appear to include jamming. Unfortunately, jamming is a battle of escalating power and, inevitably, higher powered ground-based jammers will usually win.
➤ Increased satellite transmitter power: The converse of increased receiver protection is to increase the transmit power of the GPS satellites. In fact, the next generation GPS III constellation, with its first launch in 2015, will be able to direct higher power “spot beams” against areas of the earth’s surface where jammers have been detected. But increasing the transmit power of the satellites currently in orbit appears impractical and, even if feasible, would be extremely costly.
➤ Anti-spoofing technology: At present, this does not appear to exist, although undoubtedly research is underway. Reportedly, the military GPS M-Code is virtually immune to spoofing due to its strong encryption and therefore all M Code-equipped aircraft are protected. However, it is understood that most non-front line military aircraft use the unencrypted GPS Standard Positioning Service (SPS), as do virtually all civil aircraft, and are therefore vulnerable to spoofing. (It has been suggested that the RQ-170 UAV reportedly hijacked by Iran would also have been SPS equipped.) Consequently, until anti-spoofing technology is available, GPS-based back up systems depending on other satnav constellations, such as Europe’s Galileo, cannot be relied upon for anti-spoofing protection.
Three anti-jamming and anti-spoofing measures have been proposed.
➤ Inertial reference systems (IRS): IRS does not rely on incoming signals and, in newer airline aircraft, IRS outputs are generally integrated with GPS via the flight management system computer. In a jamming situation causing the loss of GPS, the flight management system would automatically switch to sole IRS guidance until the GPS data returned and was verified, when GPS guidance would resume.
In a spoofing attack, however, there would be no GPS failure alert, and the only warning would be an FMS alert of a disparity between the apparently fully operational GPS and the IRS, showing an increasing divergence from the desired flight path, unless that path was itself defined by GPS coordinates, and could also be spoofed. A route defined by lat/long coordinates would not be easily spoofed.
The two main drawbacks to the IRS backup solution are: 1) The cost of an IRS installation and its FMS integration could put it out of reach for most mid-size regional and corporate aircraft, and all smaller aircraft; and 2) When the IRS is “free running” without continuous position updates from GPS, small heading errors accumulate over time, and these tend to increase more rapidly during maneuvering, such as during radar vectoring in a terminal area, resulting in increasing flight path divergence.
➤ Scanning DME plus VOR: This year, FAA proposed this combination as its solution to GPS jamming. Its appeal lies in the fact that CONUS airspace has a well established DME and VOR network, although some ground installations would have to be re-sited to optimize coverage, and up to 50 additional DME stations would be required to provide sufficient signals to support simultaneous scanning DME positioning from at least two ground stations, but preferably three, to avoid fix ambiguities.. DME and VOR would be supplemented by GPS-like pseudolites and multilateration networks. The drawback here is that scanning DME avionics are common in newer large aircraft, but much less common in mid-size airline and corporate aircraft and rarely found in smaller machines.
As well, both DME and VOR are line of sight navigation aids, with FAA’s analysis proposing they not be used in IFR below 5.000 feet. Additionally, with aviation representing less than 10 percent of the total GPS user community, obtaining funding for additional facilities dedicated exclusively to aviation might be difficult.
➤ eLoran: eLoran is a modernized derivative of the earlier Loran-C system, and still employs high-powered, long range, unjammable low frequency signals extending from the surface to above jet altitudes, transmitted from widely separated ground stations. But while Loran-C stations were arranged in user selected regional groups, eLoran stations operated individually, providing GPS-like “all in view” operation, where the receiver automatically selects those stations with optimum fix geometry and performance.
Earlier FAA analysis of eLoran accuracy indicated its potential to support required navigation performance (RNP) 0.3 throughout the CONUS. However, eLoran’s major drawback is that no avionics equipment is available or in development, although there appears no reason that small, low-cost units could not be produced.
One critically important benefit of eLoran over the other two backup approaches above is that it is one of just three sources — the others are GPS and laboratory atomic clocks — of super accurate time signals. Loran timing units frequently backed up GPS time in a variety of critical national infrastructure applications, including the FAA. The time provision makes eLoran a totally multi-mode, air/land/sea positioning system.
➤ Current military alternatives: Through the years, DoD has investigated a number of positioning systems that could support military GPS-denied situations For example, much work has gone into development of miniaturized IRS units for UAVs and small aircraft, although commercial reliability levels appear elusive.
Area positioning systems used by the surveying industry have particularly been evaluated, due to their high accuracy, GPS jamming and spoofing immunity, rapid set up and breakdown procedures and ease of portability to new areas of concern. Currently, the Australian Locata system is reported to be of interest to DoD.
First, an alternative means to continue operations, even when less efficient, is essential to safe navigation. But second, and perhaps less appreciated, is that the knowledge that an alternative system, having different failure paths, will activate should the primary navaid be disabled, would be a significant deterrent to an attacker from the start. A backup to GPS would therefore not only enhance safety, but would also enhance GPS longevity.
The one certainty is that no credible near-term GPS replacement, offering all that system’s benefits, is in sight today.
In June, however, the Defense Advanced Research Programs Agency (DARPA) solicited industry bids for the development and tests of systems proposed for its conceptual All Source Positioning and Navigation (ASPN) program. This seeks low cost, robust and seamless navigation solutions for military users on any operational platform and in any environment, with or without GPS, and would rely on selectively integrating a wide range of current or future sensor techniques.
Perhaps coincidentally, BAE Systems recently announced its Navigation Via Signals of Opportunity (NAVSOP), which is claimed to accept signals from GPS satellites plus ATC, TV, radio, Wi-Fi and cellular communications towers and, oddly, GPS jammers. NAVSOP’s accuracy is claimed to be “within a few meters.”
“The technology can also reach areas that GPS is unable to penetrate, such as dense urban areas, deep inside buildings and even underground and underwater,” the company said. | <urn:uuid:57a05a6a-aa5b-4358-9496-2122e077a09e> | CC-MAIN-2014-41 | http://www.aviationtoday.com/av/issue/feature/What-Will-Follow-GPS_77077.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657121798.11/warc/CC-MAIN-20140914011201-00110-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.953828 | 2,799 | 2.6875 | 3 |
These new homes tackle climate change impacts and rural fuel poverty head on. The resulting very low energy bills effectively remove the threat of fuel poverty from rural households, that are off the mains gas grid, for the lifetime of these homes.
A two year study has shown that the heating, lighting and hot water for a 3-bedroom (6 person) house cost as little as £100 a year – about a tenth of the average heating cost alone for a similar home in the UK (see chart below) – and that total energy costs were only around £500 a year.
After 4 years of living at Dormont Park and experiencing such low energy bills tenants are saying:
“For the first time in my life I have been able to afford to buy a new cooker”
“Because we are spending so much less on fuel bills we can now afford to spend more time together as a family”
“We hadn’t had a holiday in 20 years until this year” | <urn:uuid:c8d66de7-1a8a-4cc0-8f9c-dcfc2cfdfcf0> | CC-MAIN-2018-13 | http://www.dormontestate.com/dormont-park/energy-performance/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649931.17/warc/CC-MAIN-20180324054204-20180324074204-00070.warc.gz | en | 0.958876 | 206 | 2.671875 | 3 |
Tue, 25/06/2013 - 21:08
A team of scientists have discovered a new species of bird with distinct plumage and a loud call, living not in some remote jungle, but in a capital city of 1.5 million people.
Preventing Extinctions - Asia
Tue, 26/03/2013 - 09:58
Five years ago, in response to the environmental crisis engulfing mainland South-East Asia, the Critical Ecosystem Partnership Fund launched a $10 million grants programme to conserve the critical ecosystems of the Indo-Burma Hotspot.
Forests of Hope - Asia
Tue, 04/09/2012 - 10:22
BirdLife International Cambodia Programme has just published a lavishly illustrated report revealing the global conservation importance of the proposed Western Siem Pang Protected Forest located in a remote area of northern Cambodia near the border with Laos.
Forests of Hope | <urn:uuid:268116e5-d797-44dd-af4f-9db12670bef9> | CC-MAIN-2015-18 | http://www.birdlife.org/news/country/cambodia | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246649234.62/warc/CC-MAIN-20150417045729-00032-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.855121 | 184 | 2.8125 | 3 |
Chapter 20. Economic Growth
- Identify the role of labor productivity in promoting economic growth
- Analyze the sources of economic growth using the aggregate production function
- Measure an economy’s rate of productivity growth
- Evaluate the power of sustained growth
Sustained long-term economic growth comes from increases in worker productivity, which essentially means how well we do things. In other words, how efficient is your nation with its time and workers? Labor productivity is the value that each employed person creates per unit of his or her input. The easiest way to comprehend labor productivity is to imagine a Canadian worker who can make 10 loaves of bread in an hour versus a U.S. worker who in the same hour can make only two loaves of bread. In this fictional example, the Canadians are more productive. Being more productive essentially means you can do more in the same amount of time. This in turn frees up resources to be used elsewhere.
What determines how productive workers are? The answer is pretty intuitive. The first determinant of labor productivity is human capital. Human capital is the accumulated knowledge (from education and experience), skills, and expertise that the average worker in an economy possesses. Typically the higher the average level of education in an economy, the higher the accumulated human capital and the higher the labor productivity.
The second factor that determines labor productivity is technological change. Technological change is a combination of invention—advances in knowledge—and innovation, which is putting that advance to use in a new product or service. For example, the transistor was invented in 1947. It allowed us to miniaturize the footprint of electronic devices and use less power than the tube technology that came before it. Innovations since then have produced smaller and better transistors that that are ubiquitous in products as varied as smart-phones, computers, and escalators. The development of the transistor has allowed workers to be anywhere with smaller devices. These devices can be used to communicate with other workers, measure product quality or do any other task in less time, improving worker productivity.
The third factor that determines labor productivity is economies of scale. Recall that economies of scale are the cost advantages that industries obtain due to size. (Read more about economies of scale in Cost and Industry Structure.) Consider again the case of the fictional Canadian worker who could produce 10 loaves of bread in an hour. If this difference in productivity was due only to economies of scale, it could be that Canadian workers had access to a large industrial-size oven while the U.S. worker was using a standard residential size oven.
Now that we have explored the determinants of worker productivity, let’s turn to how economists measure economic growth and productivity.
Sources of Economic Growth: The Aggregate Production Function
To analyze the sources of economic growth, it is useful to think about a production function, which is the process of turning economic inputs like labor, machinery, and raw materials into outputs like goods and services used by consumers. A microeconomic production function describes the inputs and outputs of a firm, or perhaps an industry. In macroeconomics, the connection from inputs to outputs for the entire economy is called an aggregate production function.
Components of the Aggregate Production Function
Economists construct different production functions depending on the focus of their studies. Figure 1 presents two examples of aggregate production functions. In the first production function, shown in Figure 1 (a), the output is GDP. The inputs in this example are workforce, human capital, physical capital, and technology. We discuss these inputs further in the module, Components of Economic Growth.
An economy’s rate of productivity growth is closely linked to the growth rate of its GDP per capita, although the two are not identical. For example, if the percentage of the population who holds jobs in an economy increases, GDP per capita will increase but the productivity of individual workers may not be affected. Over the long term, the only way that GDP per capita can grow continually is if the productivity of the average worker rises or if there are complementary increases in capital.
A common measure of U.S. productivity per worker is dollar value per hour the worker contributes to the employer’s output. This measure excludes government workers, because their output is not sold in the market and so their productivity is hard to measure. It also excludes farming, which accounts for only a relatively small share of the U.S. economy. Figure 2 shows an index of output per hour, with 2009 as the base year (when the index equals 100). The index equaled about 106 in 2014. In 1972, the index equaled 50, which shows that workers have more than doubled their productivity since then.
According to the Department of Labor, U.S. productivity growth was fairly strong in the 1950s but then declined in the 1970s and 1980s before rising again in the second half of the 1990s and the first half of the 2000s. In fact, the rate of productivity measured by the change in output per hour worked averaged 3.2% per year from 1950 to 1970; dropped to 1.9% per year from 1970 to 1990; and then climbed back to over 2.3% from 1991 to the present, with another modest slowdown after 2001. Figure 3 shows average annual rates of productivity growth averaged over time since 1950.
The “New Economy” Controversy
In recent years a controversy has been brewing among economists about the resurgence of U.S. productivity in the second half of the 1990s. One school of thought argues that the United States had developed a “new economy” based on the extraordinary advances in communications and information technology of the 1990s. The most optimistic proponents argue that it would generate higher average productivity growth for decades to come. The pessimists, on the other hand, argue that even five or ten years of stronger productivity growth does not prove that higher productivity will last for the long term. It is hard to infer anything about long-term productivity trends during the later part of the 2000s, because the steep recession of 2008–2009, with its sharp but not completely synchronized declines in output and employment, complicates any interpretation. While productivity growth was high in 2009 and 2010 (around 3%), it has slowed down since then.
Productivity growth is also closely linked to the average level of wages. Over time, the amount that firms are willing to pay workers will depend on the value of the output those workers produce. If a few employers tried to pay their workers less than what those workers produced, then those workers would receive offers of higher wages from other profit-seeking employers. If a few employers mistakenly paid their workers more than what those workers produced, those employers would soon end up with losses. In the long run, productivity per hour is the most important determinant of the average wage level in any economy. To learn how to compare economies in this regard, follow the steps in the following Work It Out feature.
Comparing the Economies of Two Countries
The Organization for Economic Co-operation and Development (OECD) tracks data on the annual growth rate of real GDP per hour worked. You can find these data on the OECD data webpage “Labour productivity growth in the total economy” at this website.
Step 1. Visit the OECD website given above and select two countries to compare.
Step 2. On the drop-down menu “Variable,” select “Real GDP, Annual Growth, in percent” and record the data for the countries you have chosen for the five most recent years.
Step 3. Go back to the drop-down menu and select “Real GDP per Hour Worked, Annual Growth Rate, in percent” and select data for the same years for which you selected GDP data.
Step 4. Compare real GDP growth for both countries. Table 2 provides an example of a comparison between Australia and Belgium.
|Real GDP Growth (%)||0.1%||1.0%||2.2%||0.8||0.7%|
|Real GDP Growth/Hours Worked (%)||1.9%||–0.3%||2.4%||3.3%||1.4%|
|Real GDP Growth (%)||–3.4||1.6||0.8||–0.6||–0.2|
|Real GDP Growth/Hours Worked (%)||–1.3||–1.4||–0.5||–0.3||0.3|
Step 5. Consider the many factors can affect growth. For example, one factor that may have affected Australia is its isolation from Europe, which may have insulated the country from the effects of the global recession. In Belgium’s case, the global recession seems to have had an impact on both GDP and real GDP per hours worked between 2009 and 2013, though productivity does seem to be recovering.
The Power of Sustained Economic Growth
Nothing is more important for people’s standard of living than sustained economic growth. Even small changes in the rate of growth, when sustained and compounded over long periods of time, make an enormous difference in the standard of living. Consider Table 3, in which the rows of the table show several different rates of growth in GDP per capita and the columns show different periods of time. Assume for simplicity that an economy starts with a GDP per capita of 100. The table then applies the following formula to calculate what GDP will be at the given growth rate in the future:
For example, an economy that starts with a GDP of 100 and grows at 3% per year will reach a GDP of 209 after 25 years; that is, 100 (1.03)25 = 209.
The slowest rate of GDP per capita growth in the table, just 1% per year, is similar to what the United States experienced during its weakest years of productivity growth. The second highest rate, 3% per year, is close to what the U.S. economy experienced during the strong economy of the late 1990s and into the 2000s. Higher rates of per capita growth, such as 5% or 8% per year, represent the experience of rapid growth in economies like Japan, Korea, and China.
Table 3 shows that even a few percentage points of difference in economic growth rates will have a profound effect if sustained and compounded over time. For example, an economy growing at a 1% annual rate over 50 years will see its GDP per capita rise by a total of 64%, from 100 to 164 in this example. However, a country growing at a 5% annual rate will see (almost) the same amount of growth—from 100 to 163—over just 10 years. Rapid rates of economic growth can bring profound transformation. (See the following Clear It Up feature on the relationship between compound growth rates and compound interest rates.) If the rate of growth is 8%, young adults starting at age 20 will see the average standard of living in their country more than double by the time they reach age 30, and grow nearly sevenfold by the time they reach age 45.
|Growth Rate||Value of an original 100 in 10 Years||Value of an original 100 in 25 Years||Value of an original 100 in 50 Years|
|Table 3. Growth of GDP over Different Time Horizons|
How are compound growth rates and compound interest rates related?
The formula for growth rates of GDP over different periods of time, as shown in Figure 2, is exactly the same as the formula for how a given amount of financial savings grows at a certain interest rate over time, as presented in Choice in a World of Scarcity. Both formulas have the same ingredients:
- an original starting amount, in one case GDP and in the other case an amount of financial saving;
- a percentage increase over time, in one case the growth rate of GDP and in the other case an interest rate;
- and an amount of time over which this effect happens.
Recall that compound interest is interest that is earned on past interest. It causes the total amount of financial savings to grow dramatically over time. Similarly, compound rates of economic growth, or the compound growth rate, means that the rate of growth is being multiplied by a base that includes past GDP growth, with dramatic effects over time.
For example, in 2013, the World Fact Book, produced by the Central Intelligence Agency, reported that South Korea had a GDP of $1.67 trillion with a growth rate of 2.8%. We can estimate that at that growth rate, South Korea’s GDP will be $1.92 trillion in five years. If we apply the growth rate to each year’s ending GDP for the next five years, we will calculate that at the end of year one, GDP is $1.72 trillion. In year two, we start with the end-of-year one value of $1.67 and increase it by 2%. Year three starts with the end-of-year two GDP, and we increase it by 2% and so on, as depicted in the Table 4.
|Year||Starting GDP||Growth Rate 2%||Year-End Amount|
|1||$1.67 Trillion ×||(1+0.028)||$1.72 Trillion|
|2||$1.72 Trillion ×||(1+0.028)||$1.76 Trillion|
|3||$1.76 Trillion ×||(1+0.028)||$1.81 Trillion|
|4||$1.81 Trillion ×||(1+0.028)||$1.87 Trillion|
|5||$1.87 Trillion ×||(1+0.028)||$1.92 Trillion|
Another way to calculate the growth rate is to apply the following formula:
Where “future value” is the value of GDP five years hence, “present value” is the starting GDP amount of $1.64 trillion, “g” is the growth rate of 2%, and “n” is the number of periods for which we are calculating growth.
Key Concepts and Summary
Productivity, the value of what is produced per worker, or per hour worked, can be measured as the level of GDP per worker or GDP per hour. The United States experienced a productivity slowdown between 1973 and 1989. Since then, U.S. productivity has rebounded (the current global recession notwithstanding). It is not clear whether the current growth in productivity will be sustained. The rate of productivity growth is the primary determinant of an economy’s rate of long-term economic growth and higher wages. Over decades and generations, seemingly small differences of a few percentage points in the annual rate of economic growth make an enormous difference in GDP per capita. An aggregate production function specifies how certain inputs in the economy, like human capital, physical capital, and technology, lead to the output measured as GDP per capita.
Compound interest and compound growth rates behave in the same way as productivity rates. Seemingly small changes in percentage points can have big impacts on income over time.
- Are there other ways in which we can measure productivity besides the amount produced per hour of work?
- Assume there are two countries: South Korea and the United States. South Korea grows at 4% and the United States grows at 1%. For the sake of simplicity, assume they both start from the same fictional income level, $10,000. What will the incomes of the United States and South Korea be in 20 years? By how many multiples will each country’s income grow in 20 years?
- How is GDP per capita calculated differently from labor productivity?
- How do gains in labor productivity lead to gains in GDP per capita?
Critical Thinking Questions
- Labor Productivity and Economic Growth outlined the logic of how increased productivity is associated with increased wages. Detail a situation where this is not the case and explain why it is not.
- Change in labor productivity is one of the most watched international statistics of growth. Visit the St. Louis Federal Reserve website and find the data section (http://research.stlouisfed.org). Find international comparisons of labor productivity, listed under the FRED Economic database (Growth Rate of Total Labor Productivity), and compare two countries in the recent past. State what you think the reasons for differences in labor productivity could be.
- Refer back to the Work It Out about Comparing the Economies of Two Countries and examine the data for the two countries you chose. How are they similar? How are they different?
- An economy starts off with a GDP per capita of $5,000. How large will the GDP per capita be if it grows at an annual rate of 2% for 20 years? 2% for 40 years? 4% for 40 years? 6% for 40 years?
- An economy starts off with a GDP per capita of 12,000 euros. How large will the GDP per capita be if it grows at an annual rate of 3% for 10 years? 3% for 30 years? 6% for 30 years?
- Say that the average worker in Canada has a productivity level of $30 per hour while the average worker in the United Kingdom has a productivity level of $25 per hour (both measured in U.S. dollars). Over the next five years, say that worker productivity in Canada grows at 1% per year while worker productivity in the UK grows 3% per year. After five years, who will have the higher productivity level, and by how much?
- Say that the average worker in the U.S. economy is eight times as productive as an average worker in Mexico. If the productivity of U.S. workers grows at 2% for 25 years and the productivity of Mexico’s workers grows at 6% for 25 years, which country will have higher worker productivity at that point?
- aggregate production function
- the process whereby an economy as a whole turns economic inputs such as human capital, physical capital, and technology into output measured as GDP per capita
- compound growth rate
- the rate of growth when multiplied by a base that includes past GDP growth
- human capital
- the accumulated skills and education of workers
- putting advances in knowledge to use in a new product or service
- advances in knowledge
- labor productivity
- the value of what is produced per worker, or per hour worked (sometimes called worker productivity)
- production function
- the process whereby a firm turns economic inputs like labor, machinery, and raw materials into outputs like goods and services used by consumers
- technological change
- a combination of invention—advances in knowledge—and innovation
Answers to Self-Check Questions
- Yes. Since productivity is output per unit of input, we can measure productivity using GDP (output) per worker (input).
- In 20 years the United States will have an income of 10,000 × (1 + 0.01)20 = $12,201.90, and South Korea will have an income of 10,000 × (1 + 0.04)20 = $21,911.23. South Korea has grown by a multiple of 2.1 and the United States by a multiple of 1.2. | <urn:uuid:bfe87745-4b2e-4f17-97a8-0b00c6d76f2a> | CC-MAIN-2018-22 | http://pressbooks-dev.oer.hawaii.edu/principlesofeconomics/chapter/20-2-labor-productivity-and-economic-growth/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864648.30/warc/CC-MAIN-20180522073245-20180522093245-00127.warc.gz | en | 0.930514 | 3,974 | 3.515625 | 4 |
See the Parthenon
The Parthenon is a temple in the Athenian Acropolis, Greece, dedicated to the Greek goddess Athena, whom the people of Athens considered their protector. Its construction began in 447 BCE and was completed in 438 BCE, although decorations of the Parthenon continued until 431 BCE. It is the most important surviving building of Classical Greece, generally considered to be the culmination of the development of the Doric order.
Related goals for Greece: | <urn:uuid:69c845f4-1f6d-48ed-bb12-820c40878b0c> | CC-MAIN-2020-24 | https://dayzeroproject.com/goal/424895 | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396495.25/warc/CC-MAIN-20200528030851-20200528060851-00587.warc.gz | en | 0.958742 | 98 | 3.265625 | 3 |
Flowers Pollination Preschool
Lesson Info: Flower Pollination Gizmo | ExploreLearning . Pollination
A simple introduction to how plants reproduce, discussing pollination, seed dispersal, and growth from seed to plant.
Picture in the header: A rather unexpected flower visitor, a femal [email protected] or [email protected].
*Basic explanation of what is pollination. The theme can reinforce letter B activities, here are some suggestions … © First-School.ws Preschool Activities and Crafts.
Cross-pollination may occur between two flowers on the same plant (geitonogamy) or between flowers on distinct plants (xenogamy). The former, which is a somewhat less favourable method...
Observe the steps of pollination and fertilization in flowering plants. Help with many parts of the process by dragging pollen grains to the stigma, dragging sperm to the ovules, and...
A few species (e.g., the willow) even bear the male and female flowers on different plants. In these cases self-pollination is impossible.
The female (top) has an ovary at the base of the flower, which becomes the fruit after pollination.
Be a Pollinator Observer. Online Observation Forms. … FLOWERS. Plants and pollinating insects need each other.
Preschool is a great place to teach about flowering plants. Flowering plants not only produce beautiful flowers, but some of those flowers turn into fruits and vegetables.
Our Investigative Program for 3rd through 5th grades offers an on site program of dissecting flowers, learning about pollination and the relationship between water and electricity.
A large, healthy blueberry plant produces thousands of "flower" buds every year. Up to 16 individual flowers may develop from each bud and every flower is a potential berry.
Display the flowers, labelling each flower with its pollinator’s name. 2. 3. mbgnet.net/bioplants BIOLOGY OF PLANTS WHAT IS POLLINATION?
The receptive part of the carpel is called a stigma in the flowers of angiosperms and a micropyle in gymnosperms. The study of pollination brings together many disciplines, such as botany...
pollination: a neglected natural service Garden themes for preschool children - lovetoknow kids * mistletoe flower - lamp shade house English flower printables - strategic edge...
Flower markings are like the landing lights on an airport runway. They guide the bee into the flower's pollen grains. Bees can help flowers make seeds.
Pollination can be done by the wind, insects, birds or even by people. Pollination is important to our environment because beautiful flowers rely on it, but also because so much of our...
The function of a flower is to produce seeds through sexual reproduction.
Pollination. Many different types of animals and insects pollinate flowers. Introduce your preschool students to these pollinators and to the special features of certain flowers that... | <urn:uuid:9f65ff50-53f9-4d6d-be62-14c2db8e1886> | CC-MAIN-2017-34 | http://rqqitegr.3dup.net/skule/flowe301.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103891.56/warc/CC-MAIN-20170817170613-20170817190613-00361.warc.gz | en | 0.912704 | 633 | 4.1875 | 4 |
With tomorrow’s fiftieth anniversary of the landing of a man on the Moon, there is much to celebrate of that historic achievement. But can we use that shared experience to tackle the climate emergency that is upon us.
Casting my mind back to my youthful days, as a young boy, I can remember watching the television with my parents on a very, special moment in the early hours of the morning of the 20th July 1969.
It was not a, normal, children’s programme but an important event in the history of mankind. The day that man landed on our nearest neighbour and discovered a whole new environment.
I can remember being caught up in the space race between America and the USSR (now, split between Russia and smaller republics) and the commitment by J.F. Kennedy to “landing a man on the moon” made in his address to Congress on 25 May 1961.
Within the space (pun intended) of a few short days, the Lunar Module “Eagle” was the first manned vehicle to land on the Moon in the area known as Mare Tranquilitatis (the Sea of Tranquility).
Neil A. Armstrong took the honour to be the first person to walk on the lunar surface with those emotional words heard on Earth from the Moon, “That’s one small step for man, one giant leap for mankind.”
He was, later, followed by Edwin (Buzz) Aldrin, who described the lunar surface as magnificent desolation. During a 2½ hour surface exploration, the two-man crew collected 47 pounds of lunar surface material which was returned to Earth for analysis to enhance our understanding of the geology of the Moon. With the success of Apollo 11, the objective to land men on the Moon and return them safely to Earth had been accomplished.
Over the years, even only a few years later, the vigour and the enthusiasm for space travel waned; Partly though the huge cost, partly through the warming of the “Cold War” between the USA and USSR but, mostly, as the World moved on to other concerns. Not least the environmental degradation, over-population and our inhumanity through wars and subjugation of our fellow men and women.
Thinking back, it was the right thing to travel to the Moon and, for a single shining moment, dream beyond the confines of the Earth. And that feeling may come again.
For, now, what can we learn from the Apollo programme about our own pressing challenge of the climate emergency…
What if –
Our World Leaders, Politicians and all of us could get behind a single focus, that was the Apollo programme fifty years ago.
What if –
We could make a similar commitment to solve the problems that we have here on Earth.
What if –
All that commitment, that determination, expertise and funding could be directed to reducing our “climate emergency” to a more, sustainable and low carbon world.
We could make a lasting change to our own planet, not for a few years or even fifty years, but for the many generations to come after us.
It would not be that single shining moment and forgotten but that deeper commitment to care for our own planet, our own fellow citizens & to handover our stewardship of the planet to the yet-unborn to enjoy all that it can offer.
Let’s celebrate Apollo 11’s achievements on 20 July 2019 as one of the single defining moments in our shared history BUT let’s make our own commitment that goes beyond one shining moment.
Let our commitment to end climate change & its environmental and social impacts be a lasting committment from this day forward… | <urn:uuid:8a079d10-b711-451c-b776-eb054883cb75> | CC-MAIN-2020-40 | https://emsmastery.com/2019/07/19/what-can-apollo-11-teach-us-about-tackling-the-climate-emergency/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400191160.14/warc/CC-MAIN-20200919075646-20200919105646-00346.warc.gz | en | 0.955546 | 766 | 3.03125 | 3 |
Iranian Calendar Systems, History and Origins
By: Massoume Price, December 2001
The first calendars based on Zoroastrian cosmology appeared during the later Achaemenian period and though they have evolved and changed over the centuries the names of the months have remained more or less the same till now. Before this period old Persian inscriptions and tablets indicate that early Iranians used a 360-day calendar based on Babylonian system modified according to their own beliefs with their own name days. Month was divided into two or three divisions depending on the phases of the moon. Twelve months were named for various festivals or activities of the pastoral year with 30 days in each month. A thirteenth month every six years was added to keep the 360-day calendar in harmony with the seasons. Under the unified empire of the Achaemenian it was necessary to create a distinctive Iranian calendar based on Zoroastrian beliefs.
In the new calendar following the Egyptian tradition the twelve months and the thirty days were each dedicated to a yazata (Eyzad) with four divisions resembling the Semitic week. Four of the days in the month were dedicated to Ahura Mazda and seven days were named after the six Amesha Spentas. Other thirteen days were named after Fire, the Waters, Sun, Moon, Tiri and Geush Urvan (the soul of all animals), Mithra, Sraosha (Soroush, yazata of prayer), Rashnu (the Judge), Fravashis, Verethraghna (Bahram), Raman (Ramesh meaning peace), and Vata the wind deity. Three were dedicated to female deities, Daena (yazata of religion and personified conscious), Ashi (yazata of fortune) and Arshtat (justice). The remaining four were dedicated to Asman (lord of sky or Heaven), Zam (Earth goddess) and finally Manthra Spenta (the Bounteous Sacred Word, a female deity) and Anaghra Raoch (the ‘Endless Light’ of paradise).
The religious importance of the calendar dedications was very significant. Not only it fixed the pantheon of major deities, but ensured that their names were continuously uttered, since at every Zoroastrian act of worship the deities of both day and month are invoked. With the new system the pattern of festivities became clear as well, Mitrakanna or Mihregan was celebrated on Mithra day of Mithra month or Tiri festival (Tiragan) was celebrated on Tiri day of the Tiri month.
After the conquest of Alexander and his subsequent death the Persian territories fell to one of his generals Seleucus (312 AD) and the Seleucid dynasty of Iran was formed.
Based on the Greek tradition they introduced the practice of dating by era rather than dating by the reign of the individual kings. Their era became known as that of Alexander. The Zoroastrian priests resented Seleucid and found it necessary to create their own era. They had lost their function at the royal courts since the new rulers were not Zoroastrians. They followed the new trend and for the first time started calculating the era of Zoroaster. This was the first serious attempt to establish a historical date for the prophet.
With no Zoroastrian sources at hand they turned to Babylonian archives famous through out the ancient world. From these records they learned that a great event in Persian history took place 228 years before the era of Alexander. The date was 539 BC and in fact is the conquest of Babylon by Cyrus the great.
However the Zoroastrian priests interpreted this date to be the time the true faith was revealed to their prophet and since Avestan literature indicates that revelation happened when Zoroaster was thirty years old, the date of 568 BC was taken to be his birthday. The date entered written records as the beginning of the era of Zoroaster and indeed Persian Empire. This incorrect date is still mentioned in many current Encyclopedias as Zoroaster’s birth date.
Parthians adopted the same system, dated their era from 248 BC, the date they succeeded over the Seleucid and used the same calendar with minor modifications. Their names for the months and days are Parthian equivalencies of the Avestan ones used before and they differ slightly from the Middle Persian names used by the Sassanian. For example in Achaemenian times the modern Persian month ‘Day’ is called Dadvah (Creator), in Parthian it is Datush and Sassanian named it Dadv/Dai (Dadar in Pahlavi).
The next major calendar change happened at the reign of Ardeshir the founder of the Sassanian dynasty in 224 AD. In 46 Ad, Julian the Roman Emperor adopted the Egyptian solar calendar system of 365 days with modifications. Iranians had known about the Egyptian system for centuries but never used it. Ardeshir changed the system to 365 days by adding five extra days at the end and named these ‘Gatha’ or ‘Gah’ days, after the ancient Zoroastrian hymns of the same name. The new system created confusion and met with resistance and is the reason why so many Zoroastrian feasts and celebrations still have two dates. Many rites were practiced over many days instead of one day and duplication of observances was continued to make sure no holy days were missed.
The situation got so complicated that another calendar reform had to be implemented by Ardeshir’s grandson Hormizd I. The new and old holy days were linked together to form continual six-day feasts. No Ruz was an exception. The first and the sixth day of the month were celebrated as different occasions and sixth became more significant as Zoroasters’ birthday rather than a continuation of No Ruz itself. The reform however did not solve all the problems and Yazdegird III, the last ruler, introduced the last changes. Year 631 AD was chosen as the beginning of the new era and the last calendar is known as Yazdegirdi calendar. However they did not get the chance to finish their task. Muslim Arabs overthrew the dynasty in 7th century AD and with their victory, a new lunar calendar based on Islamic principles replaced the old solar calendar of the Sassanian period.
This calendar was proposed earlier by prophet himself but was first systematically introduced around 638 AD, by the close companion of the Prophet and the second Caliph, Umar ibn Al-Khatab (592-644 AD). This was done to end the conflicting dating systems used at the time. Prophet’s flight from Mecca to Medina (Hijrat) in 622 was chosen as the beginning of the Islamic calendar. The actual starting date for the Calendar was chosen based on lunar years, counting backwards to be the first day of the first month (Muharram) of the first year of the Hijrat. The Islamic (Hijri) calendar is usually abbreviated A.H. in Western languages from the Latin Anno Hegirae.
Muharram is the start of Muslims’ New Year and the occasion is celebrated by many. Direction to Mecca for praying was chosen on this month. For Shiites this is the most important month of mourning. Imam Husayn, Prophet’s grandson was murdered in the battle of Karbala in this month. Safar is another month of mourning for Shiites since imam Husayn’s mutilated head was taken back to Karbala and the 40th of his death happens in the same month. The third month marks the flight to Medina and Prophet’s birthday and death. The battle between Ali and Aisha happened on the fifth month. Fatima died on the sixth month. Rajab is the month when ascension (Mi’raj) of prophet to Heaven happened. Muslims believe that Prophet went through a nocturnal journey with Archangel Gabriel. They first went to Jerusalem and then to Heaven and were back on the same night. Imam Husayn was born in Sha’ban. Ramadan is the month of fasting and again a month of mourning for Shiites due to Ali’s assassination in this month. It is also the month Quran was revealed. First day of Shawwal is the major feast of Fitr and the last month is assigned for pilgrimage to Mecca and the feast of Sacrifice (Id i Ghorban). Shiites believe that Ali was appointed by the Prophet to be his rightful successor on this month and celebrate the occasion in the festival of ‘Ghadir Khom’.
Being a lunar calendar the months are not related to the solar cycle and therefore do not correspond with the seasons. The festivals move all the time, Ramadan can be in summer or winter or any other season. The lunar year is shorter than the Gregorian year by about 11 days. It is only over a 33-year cycle that the lunar months take a complete turn and fall during the same season. Muslims do not use solar calendars and believe since Prophet has recommended this calendar it should not be changed. Despite the fact that all Muslims are required to use the Islamic lunar calendar Iranians and indeed most Muslim nations for civil duties kept the old solar system to avoid never ending changes in the months and days. Even today most Muslim countries use a solar calendar to avoid complications. The present calendar used in Iran is a solar calendar based on pre-Islamic systems improved in 11th century during the reign of the Seljuq King, Malak Shah.
This calendar is almost unknown in the West, although it is one of the most accurate, if not the most accurate in the world. Compared with the Gregorian calendar, which errors by one day, every 3,226 years, the Iranian calendar needs a one-day correction every 141,000 years. There are two reasons for this accuracy. The Iranian calendar uses a sophisticated intercalation system for determining the leap years. And the beginning of the year, which is a natural phenomenon (arrival of the Sun at the Vernal Equinox), is precisely determined each year by astronomical observations.
The present calendar resulted from a reform conducted in 1079 by a group of astronomers headed by the great Iranian mathematician and poet Omar Khayyam. The origin of the calendar is however much older. It goes back to the Persian Achaemenian period in the 6th century BC. The Islamic lunar calendar was widely used till the end of the 19th century. However since Pahlavi period the more accurate solar calendar is used throughout the country and has remained the official system despite the Islamic revolution. During Pahlavi period the Arabic months used extensively were abandoned and once again the ancient Persian names were revived and are still in use today. | <urn:uuid:5a2c73cb-6903-4cc9-a77a-4b9cb16d6987> | CC-MAIN-2017-22 | http://iranchamber.com/calendar/articles/calendar_systems_origins.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607369.90/warc/CC-MAIN-20170523045144-20170523065144-00216.warc.gz | en | 0.968929 | 2,216 | 3.625 | 4 |
Although early intervention is crucial in interrupting the development of eating disorders, little is currently known about help-seeking behaviours among individuals experiencing eating disorder symptoms. Given that eating disorders typically begin early in life, it is necessary to investigate the processes employed by children, adolescents, and emerging adults when seeking services for troubling symptoms. This is a growing concern as the COVID-19 pandemic has resulted in an increase in the number of individuals engaging in disordered eating behaviours. This scoping review explores the current state of the literature for evidence on how youth with eating disorder symptoms seek help, with the aim of better understanding how to identify and treat more individuals earlier.
Using scoping review methodology, we searched seven databases for studies published from January 2000 to April 2021 that reported on help-seeking attitudes, behaviours, and healthcare utilization patterns for children and adolescents (< 18 years), emerging adults (18–25 years), and a mixture of these groups (< 25 years). Seven thousand, two hundred, and eighteen articles were identified for review. After duplicates were removed, three reviewers independently screened titles and abstracts and reviewed full-text articles. Findings related to help-seeking activity were extracted from the 62 articles that were ultimately included in this scoping review.
Study findings were summarized into help-seeking patterns (i.e., rates, types) as well as factors ranging from the individual level to society that influenced help-seeking behaviour. Many youth meeting eating disorder criteria were not seeking help. Notable barriers to help-seeking included poor mental health literacy, experiences with healthcare providers who failed to detect and lacked knowledge about eating disorders, minimal support from family and friends, and stigma surrounding eating disorders and help-seeking for mental health concerns.
The results of this scoping review can be used to inform early intervention and health promotion program development. Future research should focus on the help-seeking attitudes and activities among underrepresented groups with eating disorders (e.g., men, ethnic and gender minorities), the perspectives of family and other supporters in the help-seeking process for youth, and retrospective accounts from adults with lived experience of an eating disorder.
Plain English summary
Addressing and interrupting eating disorder-related thoughts and behaviours as soon as possible, with the help of a mental health professional, leads to better outcomes for youth struggling with an eating disorder. However, little is known about what prompts youth to talk about their weight, body, or eating concerns with someone—like their parent, friend, teacher, guidance counsellor, or primary care practitioner. This review explores the available published research on help-seeking patterns and preferences among youth with eating disorder concerns. Our team followed a standardized process to find 62 relevant articles for this paper. Of note, many young people who reported eating disorder concerns were not seeking help for themselves. Feeling supported by family and their primary care provider, understanding the signs of an eating disorder, and not feeling shame for reaching out for help reportedly led youth to speak up about their concerns. The findings have clinical implications for learning effective ways to help youth feel safe to speak freely about their eating disorder-related concerns, which enhances the chances of intervening early and catching symptoms before they worsen. | <urn:uuid:85c2a761-5422-4b92-8ea1-d3cb27dfe587> | CC-MAIN-2023-23 | https://experts.mcmaster.ca/display/publication2171260 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00516.warc.gz | en | 0.961576 | 658 | 2.671875 | 3 |
The species is now listed as endangered under both the NSW TSC Act 1995 and the Commonwealth EPBC Act 1999. The recovery plan for this species calls for the establishment of an ex situ seed collection as an insurance strategy against loss due to catastrophic events.
In 2006 our Seed Collectors visited a small population in Mallanganee National Park on the north coast of New South Wales, one of only three populations, and collected seed from three mature plants. Part of the seed collection was stored in the Seedbank, part was used in a research project on seed viability and storage at Mount Annan and the rest was sown.
The resultant 40 plants from this sowing were planted in Bed 4, the Rare or Threatened bed, on the Connections Garden at the Australian Botanic Garden, Mount Annan.
Research at the Australian Botanic Garden is improving our understanding of which rainforest species have seeds that can be dried and stored. Experiments on Myrsine richmondensis showed that seeds could be successfully dried to about 15% relative humidity, so they are desiccation tolerant (orthodox) and have the potential to be stored ex situ. | <urn:uuid:03e5f9c1-969a-4823-8413-08d7bc4d6c8b> | CC-MAIN-2014-35 | http://www.rbgsyd.nsw.gov.au/annan/the_garden/Plant_of_the_Month/Myrsine_richmondensis | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921550.2/warc/CC-MAIN-20140901014521-00102-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.941943 | 232 | 3.5 | 4 |
Consider A and B, who discover that, together, they can have more clothing and more food if each specializes: A in the manufacture of clothing, B in the production of food. Through voluntary exchange and bargaining, they find a jointly satisfactory balance of production and consumption. A makes enough clothing to cover himself adequately, to keep some clothing on hand for emergencies, and to trade the balance to B for food. B does likewise with food. Both balance their production and consumption decisions against other considerations (e.g., the desire for leisure).
A and B’s respective decisions and actions are microeconomic; the sum of their decisions, macroeconomic. The microeconomic picture might look like this:
- A produces 10 units of clothing a week, 5 of which he trades to B for 5 units of food a week, 4 of which he uses each week, and 1 of which he saves for an emergency.
- B, like A, uses 4 units of clothing each week and saves 1 for an emergency.
- B produces 10 units of food a week, 5 of which she trades to A for 5 units of clothing a week, 4 of which she consumes each week, and 1 of which she saves for an emergency.
- A, like B, consumes 4 units of food each week and saves 1 for an emergency.
Given the microeconomic picture, it is trivial to depict the macroeconomic situation:
- Gross weekly output = 10 units of clothing and 10 units of food
- Weekly consumption = 8 units of clothing and 8 units of food
- Weekly saving = 2 units of clothing and 2 units of food
You will note that the macroeconomic metrics add no useful information; they merely summarize the salient facts of A and B’s economic lives — though not the essential facts of their lives, which include (but are far from limited to) the degree of satisfaction that A and B derive from their consumption of food and clothing.
The customary way of getting around the aggregation problem is to sum the dollar values of microeconomic activity. But this simply masks the aggregation problem by assuming that it is possible to add the marginal valuations (i.e., prices) of disparate products and services being bought and sold at disparate moments in time by disparate individuals and firms for disparate purposes. One might as well add two bananas to two apples and call the result four bapples.
The essential problem is that A and B will derive different kinds and amounts of enjoyment from clothing and food, and that those different kinds and amounts of enjoyment cannot be summed in any meaningful way. If meaningful aggregation is impossible for A and B, how can it be possible for an economy that consists of millions of economic actors and an untold variety of goods and services? And how is it possible when technological change yields results such as this?
GDP, in other words, is nothing more than what it seems to be on the surface: an estimate of the dollar value of economic output. It is not a measure of “social welfare” because there is no such thing.
Given that, why do I sometimes use GDP statistics? And, if GDP is really a meaningless aggregate, is there a valid, alternative way of depicting aggregate well-being? To be continued.
Greed, Cosmic Justice, and Social Welfare
Utilitarianism, “Liberalism,” and Omniscience
Utilitarianism vs. Liberty
Accountants of the Soul
Rawls Meets Bentham
Enough of “Social Welfare”
The Case of the Purblind Economist | <urn:uuid:3050d054-bf7e-4529-ab3d-f0cf49508f84> | CC-MAIN-2020-16 | https://politicsandprosperity.com/2010/09/08/macroeconomics-and-microeconomics/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00056.warc.gz | en | 0.953464 | 726 | 3.765625 | 4 |
The term "out-of-order" here refers to "out of order execution". e.g. if your program has instruction A, then instruction B, then instruction C, it some situations it may turn out that if you execute them in the order A, C, B (instead of A, B, C), you get the exact same result but the program executes quicker. An example of when this would happen is if instruction B requires data to be fetched from RAM but it will take some time to go fetch the data. Instead of sitting around doing nothing while waiting for the data to arrive, the process can save time by executing instruction C while it is waiting (assuming, of course, that instruction C does not need the result of instruction B). Keeping track of what instructions have been re-ordered in what ways requires some memory space. i.e. the processor needs to remember that it put B on hold while waiting for data, so that it can start back up again when the data is ready. That is the buffers that this is referring to. Note: this is a very simplified explanation. The reality of keeping track of everything is more complicated. See https://en.wikipedia.org/wiki/Out-of-order_execution for some more details. | <urn:uuid:16962641-4db5-4d52-b9ca-8f4f030dee17> | CC-MAIN-2022-40 | https://engineering.stackexchange.com/questions/14915/deep-out-of-order-buffers | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00331.warc.gz | en | 0.931551 | 260 | 3.015625 | 3 |
Engineers will play a vital role in meeting the challenges laid out by the newly adopted Sustainable Development Goals (SDGs).
Their skills, and those of engineering technologists and built environment professionals, are critical for water management (goal 6), access to energy (goal 7) and the creation of strong, lasting infrastructure (goal 9) and cities (goal 11). A number of other SDGs are also directly or indirectly impacted by engineering and related fields.
But there is a long road ahead for engineering in Africa. The continent needs at least a tenfold increase in relevant skills. To do this, it must dramatically raise the number of people who make it from the first year of an engineering degree through to graduation.
More than 500,000 people enrolled for degrees related to engineering and the built environment in South Africa between 1998 and 2010. Only about 15% graduated in that time. Engineering traditionally has a high drop-out rate around the world.
So, what can the higher education sector do to produce the engineers that Africa needs?
The answer lies in prioritising sustainable engineering education. Changing the way that engineering is taught will most likely improve throughput rates – the number of students who start and finish a degree.
In 2011, the Engineering Council of South Africa, a statutory professional body, produced a report that explored how to improve throughput rates. These recommendations do not appear to have been implemented yet. Such changes would be important. Research tells us that Generation Y craves active learning and wants to use technology to improve society.
The SDGs are a great opportunity to partner students to people and the planet while also enabling a strong learning space for engineering and the built environment. Students can be taught how to apply the skills they are developing in relation to the goals, which will tap into their creativity and may keep them from dropping out before graduation.
In South Africa, the curricular framework for sustainable engineering education at all tertiary levels of the National Qualification Framework could include society, environment and economics. These are all important elements for sustainable development.
There would be different approaches at all levels of study. Those at the equivalent of freshman level would concentrate on a more top-down approach to learning about systems. Senior undergraduates and postgraduates would learn in a more practical fashion.
The practicality could emerge from an existing approach: engineering projects in community service. It was created in the 1990s by Purdue University in the US and has since been expanded by the Institute of Electrical and Electronics Engineers in more than 15 countries. It involves a partnership between non-profit organisations, ordinary citizens, secondary schools and universities.
For instance, a community may be struggling with poor water or air quality. The university would work with such communities through a non-profit organisation partnership. Municipalities, particularly those in under-resourced areas, could also provide this support. This initiative realises, among others, the sixth and 13th sustainable development goals using project-based learning.
Such initiatives are also a clever way to get potential engineers involved by drawing school pupils from the affected community into the project.
This framework will require careful planning and administration by universities, especially when it comes to rearranging already tightly packed timetables. But it is an important way to improve engineering learning and, ultimately, throughput.
It is not only engineering students in Africa who crave a new approach to learning. Some of the world’s most well regarded universities are recognising their students’ hunger for change and are moving towards interdisciplinary project based learning.
This approach is geographically contextualised and concentrates on fixing things at a local level while also fostering global competitiveness. It requires a whole new range of electives, from ecotronics (“green electronics”) to biology, which challenges the expectations of a traditional engineering programme. It also adds to the much needed interdisciplinary creativity that is needed to meet the SDGs.
Modern technology, such as online learning systems, is crucial to project based learning. This is another element that makes it attractive to Generation Y.
It is clear that sustainable engineering education is required in the quest for the SDGs. Integrating society, economics and the environment into learning will help Generation Y’s graduate engineers to solve tomorrow’s problems – today.
This article is published in collaboration with The Conversation. Publication does not imply endorsement of views by the World Economic Forum.
To keep up with the Agenda subscribe to our weekly newsletter.
Author:Executive Dean, Faculty of Engineering and the Built Environment at University of Johannesburg.
Image: Second-year civil engineering student and first-time voter poses for a picture at Wits University in Johannesburg. REUTERS/Siphiwe Sibeko. | <urn:uuid:368b7f98-3d05-4a17-abd3-c19de63662fe> | CC-MAIN-2021-49 | https://www.weforum.org/agenda/2015/10/can-engineering-graduates-help-africa-meet-the-sdgs/?share=twitter | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363006.60/warc/CC-MAIN-20211204185021-20211204215021-00546.warc.gz | en | 0.950706 | 965 | 3.53125 | 4 |
What is artificial intelligence? That is a question that high school students from Greenville, South Carolina wanted to find out the answer to. Inspired by a prompt provided by PBS NewsHour Student Reporting Labs, they began their research. They read books and conducted video interviews with their classmates on the common misconceptions about artificial intelligence. It seemed as though people were worried that artificial intelligence systems could get so advanced that they would be just as intelligent, if not more intelligent, than humans. The Student Reporting Labs students wondered, is that possible?
With a desire to learn more about artificial intelligence systems, these students from Legacy Charter High School sought to interview a professional about the matter. With the help of PBS NewsHour Student Reporting Labs' Coordinating Producer, they were put in contact with with Dr. Ashley Llorens, the Chief of Artificial Intelligence Systems at John Hopkins University. This week, the Legacy Charter students sat around a large monitor that allowed them to see and speak with Dr. Ashley Llorens. He used popular movie examples, like Big Hero Six and Age of Ultron to relate to the students and explain to them the positive and negative effects of artificial intelligence. The students asked him questions about science, and the myths and fears associated with artificial intelligence. One student was surprised to learn that artificial intelligence “is anything from Google home to Siri, to the programmable thermostat and robotic prosthetics.”
The PBS NewsHour Student Reporting Labs program connects middle and high school students to local PBS stations and news professionals in their community to produce original, student-generated video reports. PBS NewsHour Student Reporting Labs are located all around the country, with four located in the Carolinas. | <urn:uuid:b67b80ec-8c0f-4a5c-9da5-438f378e85ef> | CC-MAIN-2022-27 | https://www.scetv.org/stories/2017/pbs-newshour-student-reporting-labs-interview-artificial-intelligence-expert | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036176.7/warc/CC-MAIN-20220625220543-20220626010543-00611.warc.gz | en | 0.971862 | 339 | 3.453125 | 3 |
Surname origins traces its origins to the middle English phrase “shire,” derived from a Welsh word. It has its first mention within the Thirteenth Century and seems to have been common in England up till the fifteenth century. The word “shire” was well-liked in Middle Ages Scotland, the place it was used to indicate nobility. “Surname” is also found in early Medieval documents because the title of a household’s castle or manor. It was not unusual for one to use the time period “shire” because the center title of a householder who lived at an awesome distance from his family.
It is quite potential that “shire” was borrowed from Latin or Welsh. “Surname” did originate from Old English and was commonly used from the twelfth to fifteenth centuries. One probable origin of “shire” is the “seine,” which was known because the lower division of a discipline, utilized by the knight to mark his boundaries.
From Coat of Arms Embroidery Sets https://www.mylineage.com/product-category/embroidery-sets/ in the charter of King John, the name seems to have spread widely across the country. It appears in a MS. Ashmole MS., Tenth century, which includes a charter granted to “Furhilford.” Another probable origin is “ferrery,” an Outdated French phrase for the ocean.
In the thirteenth century, “frey” was used as a name for a monastery in the area of Nursery, Hertford. The name “frey” may be associated to “fern” and “employees.” The monastic fens was named “ferrery.” “Surname” would then have been frequent in this region. It is usually potential that “surname” was connected to “shire,” however not precisely the identical.
By the fourteenth century, the identify “frey” was rarely used, but “ferrery” continued to be in use. ” Surrey “began to appear extra continuously, though the origin of the title is not clear.” Surrey” may be very just like “straw.” “Straw” is an Old French word for “stone.” Some evidence factors to “straw” being associated to “stalk.”
“Stalk” was an anglicized type of “stones.” this website Stalk” may be associated to “strawberries.” Nonetheless, there is no stable proof that strawberries are the source of the title. A extra seemingly origin of the identify is “stones,” possibly a pun on “stones.” “Stones” could properly have been a name that was given to the church the place the abbey was positioned.
Surname just isn’t only a reputation however a family identify, too. Within the instances of King John, most people had been entitled to use their father’s identify (son or daughter) as part of their title, whereas their mom’s identify was not allowed. “Straw” was thus one of many few titles that a boy could use (a restriction that didn’t last lengthy). By the middle years of the seventeenth century, it was common for someone to make use of his father’s identify and surname, particularly when they have been associated by blood.
When somebody was born within the Center Ages, their surname was often either “Stoke” or “Stow.” Surname will also be derived from a given identify. “Stowel” is an instance. “Stokke” is Outdated English. “Stoke” is also known as “stones,” “stacks,” “forests,” “mountains” or “forts.”
A more peculiar name was referred to as a gentile. It was given to sure members of a household who were identified for their intelligence, tolerance, and charity. The gentile was often given to a male youngster. If there were two gentiles on the same family tree, the oldest gentile would possess the identify before the younger son. This occurred not less than once in each technology.
A relatively new sort of surname was recorded in the course of the seventeenth century. It comprised people who had been actually listed as free agents. This was performed to make it possible for solely free and legit brokers used their talents to draw cash for the country. Although the follow was pretty new, it shortly grew to become commonplace, and ultimately it became often called “gentile” since everyone in the neighborhood benefited from such individuals.
Some historians believe that the creation of a surname can shed gentle into the historical past of a family. Many households’ historical past will be revealed by means of the analysis of the surname. It offers household details, as well as, dates of delivery, deaths, marriages, and way more. The surname roots can even inform a person’s true cause of demise.
There are lots of locations on this planet where the surname roots will be discovered. Heraldry https://www.mylineage.com/heraldry-coat-of-arms-and-its-origins/ embrace Africa, Australia, Canada, Eire, Japan, Malaysia, New Zealand, South Africa, and the United Kingdom. Link Website of those areas has no less than two various kinds of surname. In the United States of America, Latin American surnames are quite widespread. | <urn:uuid:97d4a517-2ed9-47c2-bbc1-2bf2d3ad8e0c> | CC-MAIN-2021-43 | https://blockmagazine.info/the-historical-past-of-surname-origins/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588153.7/warc/CC-MAIN-20211027115745-20211027145745-00226.warc.gz | en | 0.984938 | 1,226 | 3.078125 | 3 |
It's fair to say that Childe Harold Wills accomplished something less than pure success during the wildfire that was the car business in the Roaring Twenties. That's not noteworthy in and of itself, given that Wills had a lot of company in that sort of business bumpiness. Wills, more pointedly, left a life's legacy of very advanced thinking about automobiles and other matters. His accomplishments are memorialized today in a museum that, like its inspiration, is somewhat off the beaten path.
When people remember him at all today--and if they don't, that's really regrettable--Wills is mainly remembered for the costly but stunning luxury car that he created, the Wills Sainte Claire, built between 1921 and 1927 in Marysville, Michigan. The town, northeast of Detroit, near Port Huron, is itself a monument to Wills. When he was first planning to build his own car, Wills envisioned not only a new factory, but also an enlightened industrial town complete with schools and parks surrounding it. Local lore has it that Wills selected Marysville, named in 1859 after a sawmill proprietor's wife, after his yacht was forced to put in at its port along the Saint Clair River.
The Wills Sainte Claire Auto Museum in Marysville (Wills himself added the extra ''e'' to Claire to indicate, one can guess, nobility) is located inside a plant built well after his car company had ceased to exist. It's actually a former Dow Chemical munitions factory raised during World War II, with a blast-resistant roof structure. It now houses the largest gathering of Wills Sainte Claire cars in the world, which totals 10. About 80 examples survive worldwide out of some 12,000 built.
Born in 1878, Wills was an apprentice metallurgist and then became chief engineer for Burroughs, the adding-machine producer, when he was introduced to Henry Ford in 1902. Wills is credited with two key advances while at Ford: the company's widespread adoption of high-temperature vanadium steel, and basic development of the Model T's planetary transmission. Wills had a falling out with Ford, but left the company a very rich man. The Wills Sainte Claire was an extraordinary lightweight car, using expensive materials, with the industry's first OHC V-8, but was too costly for real success.
''I think that he was one of those lieutenants that hasn't got as much attention as he probably deserves,'' museum director Terry Ernest said. ''We inherited a very large collection of factory documents, and we've hired a professional librarian to come in and organize it. But two letters come to mind: a personal letter from Fred Duesenberg to Wills, on Duesenberg stationery. So he was well known within the auto industry, both for his work with Henry Ford and for his work on his own car.''
The limited number of surviving cars means that the museum and Wills Club only conduct a reunion of them every five years, with 2010's set for August 13th through 15th. More information is at www.willsautomuseum.org
, or call 810-388-5050.
This article originally appeared in the June, 2010 issue of Hemmings Motor News.
Order Backissues of Hemmings Motor News
Subscribe to Hemmings Motor News | <urn:uuid:03c308e8-f09c-43fb-8656-0dcc769b49bc> | CC-MAIN-2015-11 | http://www.hemmings.com/hmn/stories/2010/06/01/hmn_feature30.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463103.84/warc/CC-MAIN-20150226074103-00149-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.980589 | 704 | 2.53125 | 3 |
QUOTE OF THE WEEK:
It is not the book's dramatic crises, its history, its narrative that are so important, but its power to transform men into Christlike beings worthy of exaltation.
(Spencer W. Kimball, Conference Report, April 1963, p.67)
The Lord has often taught his servants by means of inspired dreams. Some of the most remarkable revelations in the scriptures have come in the form of dreams. Consider the following accounts and try to identify the person who had the dream from which each is taken. Then try to identify the meaning of the symbols in each dream.
Rolling stone that filled the earth (Daniel 2:34)
A ladder (stairway) ascending into heaven (Genesis 28:12)
Seven fat cows (kine) (Genesis 41:2)
Unclean animals lowered from heaven in a great sheet (Acts 10:11-15)
Eleven bowing sheaves of corn (Genesis 37:7)
An iron rod (1 Nephi 8:19)
In 1 Nephi 8, the prophet Lehi had a remarkable dream filled with symbols that are easily applied to our own lives. If you have one available, look at a picture of Lehi's dream and identify the symbols contained therein. Can you name the symbols and their meanings?
• A dark and dreary waste
• a large and spacious field
• a tree
• the fruit of the tree
• a path
• an iron rod
• a river
• a great and spacious building
Each of these symbols will apply to the life of a disciple. Learning what they mean is worth a great effort!
1. THE FRUIT OF THE TREE OF LIFE IS THE LOVE OF GOD AND IS THE MOST DESIRABLE OF ALL THINGS. 1Nephi 8:4-18; 11:8,9,22,23; 15:36; Alma 32:42; Alma 36:24.
How does Lehi introduce the dream to his family? What is Lehi's major concern as he begins to recount his dream? (1 Nephi 8:1-4) It is as though Lehi had had an experience something like this: I had a dream and saw four doors in heaven, one of gold, one of silver, one of brass, and one that appeared to be a black hole. It was making a sucking sound. The whole family went though the gold door, except you son. You went in the black hole. I'm concerned about your spiritual welfare.
Where is Lehi when his dream begins? (8:4-8) What does this dark and dreary waste suggest to you? (Could it be life without the fruit of the tree or the love of God?) What does Lehi see in 1 Nephi 8:10? This seems to be desert imagery. Lehi, who was certainly a desert traveler is describing a wilderness in which he finds an oasis, with water and a fruit tree--a date palm, perhaps. The fruit of the tree represents the love of God (see 1 Nephi 11:22-25). What is the greatest manifestation of the love of God? (John 3:16)
The fruit of the tree of life is described in the scriptures with eight different phrases. Find and mark these descriptive phrases in your own scriptures. The phrases follow:
A. Sweet above all (8:11)
B. White to exceed all whiteness (8:11)
C. Desirable above all other fruit (8:12)
D. Beauty . . . far beyond . . . exceeding of all beauty (11:8)
E. Precious above all (11:9)
F. Most joyous to the soul (11:23)
g. Pure above all that is pure (Alma 32:42)
H. Greatest of all the gifts of God (1 Nephi 15:36)
What do all these phrases have in common? They are all superlatives. They refer to something that is better than anything else like it. They teach us that this is the best fruit we could possibly eat. What will happen to us as we partake of this fruit which is the love of God? (1 Nephi 8:10,12) Can you remember an experience when you have experienced this in your own life?
Once we have partaken of the fruit, what is the natural response? (1 Nephi 8:13-17; see also Alma's attitude in Alma 36:24--to share; to invite others to partake also.) The most beautiful sunset I have ever seen I saw while driving alone on the Mogollon Rim in northeastern Arizona. I stopped the car and got out and gaped. I remember how desperately I wanted my wife and family to see it. But I was alone . . .
Lehi teaches us that one of a father's responsibilities is to invite family members to partake.
2. THE ROD OF IRON IS THE WORD OF GOD AND LEADS US IN A DIRECT COURSE TO THE TREE OF LIFE. (1 Nephi 8:19-24,30;11:25;15:23,24; Hel.3:29,30)
What does Lehi see in 1 Nephi 8:19, 20? What does the rod of iron represent? 1 Nephi 11:25; 15:23-24) What are the sources of the word of God? (Scriptures, prophets, the Holy Spirit) Read 1 Nephi 8:19-20 and identify the three things the rod of iron can do for us.
A. It extended along the bank of the river. It serves as a protection to keep us out of the river of filthy water.
B. It led to the tree. It directs us to the love of God.
C. I beheld a strait and narrow path which came along by the rod of iron. The rod keeps us on the strait and narrow path while we journey to the tree.
How does the word of God (the rod) keep us on the strait and narrow path as we journey to the tree? (See Helaman 3:29)
If someone chooses to leave the rod and the path, what other roads does the dream indicate that they might they then walk?
A. Forbidden - 1 Nephi 8:28
B. Strange - 1 Nephi 8:32
C. Broad - 1 Nephi 12:17
How we might recognize that we are following forbidden, strange, or broad roads. What are the consequences of choosing to follow other paths than the strait and narrow?
3. THE MISTS OF DARKNESS ARE THE TEMPTATIONS OF SATAN AND ARE DESIGNED TO BLIND OUR EYES AND HARDEN OUR HEARTS. (1 Nephi 8:23,31;12:17)
What does Lehi see in 1 Nephi 8:23? What do the mists of darkness represent? What is the effect of the mists of darkness on the children of men? (1 Nephi 12:17) What does John 12:35 suggest about the danger of these mists?
Why would Satan want our eyes to be blinded? What are the things in the dream he does not want us to see?
A. The tree. Why would Satan not want us to see the tree and the fruit? What experiences in peoples lives may cause them to be blinded to the love of God? Why would failure to perceive the love of God cause us to harden our hearts?
B. The rod of iron. Why would Satan not want us to see the rod of iron? When you cannot see the tree, what must you do to make sure you are still moving toward it? What are the mists of darkness of today that cause people not to heed the word of God, the Spirit, the prophets or the scriptures?
C. The river of filthy water. Why would Satan not want us to see the river of filthy water? How does Satan today blind people to the consequences of letting go of the rod and leaving the strait and narrow path? How is Lucifer able to get people to ignore the obvious consequences of straying from the path and breaking the Lords commandments?
Compare the words that describe those who hold to the rod and those who let go. Those who let go of the rod wandered (1 Nephi 8:23,32) They also went forward feeling their way. (1 Nephi 8:31) Those who held to the rod, meanwhile, were pressing forward. (1 Nephi 24,30) We are taught that they caught hold and went forward clinging. (1 Nephi 8:24,30)
The gospel gives us direction and something firm to hold on to. What evidence is there that many people wander aimlessly in their lives without anything firm to hold on to? Elder Featherstone spoke of this firmness in his talk in October Conference. He said:
Doesn't it make you deeply grateful to belong to a church with apostles and prophets at the head--knowing that one link will always hold, one light will never go out? As the world moves deeper and deeper into sin, this wonderful Church stands like a giant granite boulder.Aren't you proud that the Church teaches us the truth? We don't have to wonder about earrings for boys and men, tattoos, spiked hair, the four-letter words, and obscene gestures. We have prophets who model the standards. They teach that the Ten Commandments are not outdated. The word of the Lord has thundered down through the generations: "Thou shalt not take the name of the Lord thy God in vain" (Ex. 20:7). Profaning God's name is a great offense to the Spirit, and to do so is Satan's great ploy to mock our God. . . .
Beloved youth, aren't you thankful to God that the apostles and prophets never waver on sin? No matter how strong the winds of public opinion may blow, the Church is immovable. "God has commanded that the sacred powers of procreation are to be employed only between man and woman, lawfully wedded as husband and wife." (Elder Vaughn J. Featherstone, Conf. Report, October 1999)
4. THE GREAT AND SPACIOUS BUILDING REPRESENTS PRIDE AND THE VAIN THINGS OF THE WORLD THAT ARE DESIGNED TO DRAW US AWAY FROM THE PATH (1 Nephi 8:25-34; 12:18)
What does Lehi see in 1 Nephi 8:26? What does the great and spacious building represent? (1 Nephi 11:36; 12:18) If the tree, the rod and the river are obscured, what are people left to seek in the dream?
Mists, of course, cling to the ground. Perhaps this is the reason for the building being in the air, high above the earth. (1 Nephi 8:26) Those who cannot see horizontally through the mists can always see the building. (1 Nephi 8:26,27,33) Perhaps the following verse offers some additional understanding about the building being in the air.
Wherein in time past ye walked according to the course of this world, according to the prince of the power of the air, the spirit that now worketh in the children of disobedience: (Eph. 2:2, emphasis added)
Note that the attraction of the building is so strong that it even draws some of those who have already tasted the fruit of the tree (see 1 Nephi 8:28) which is the most desirable above all things. (1 Nephi 11:22)
What counsel does Lehi give to help us avoid the great attraction of the building? (1 Nephi 8:33.34) Note: The word heed does not mean to obey, but rather to regard with care, to take notice of, to pay attention to, to consider, or to observe. What is the great and spacious building today? What things about the great and spacious building make is so attractive even to some who have partaken of the love of God?
I have a feeling that the great and spacious building shines in its most resplendent form in places like the Strip in Las Vegas. I have a friend who told me with a straight face that driving through that area made him feel like a trout. How many have succumbed to the brightness of Lucifers lures and been reeled in and placed in the adversary's creel. Movie marquees, music videos, and the glass and steel towers of the Las Vegas Casinos sometimes have the attributes of this enormous structure.
5. THE RIVER OF FILTHY WATER IS A REPRESENTATION OF THAT AWFUL HELL . . . THAT IS WAITING TO DROWN THOSE WHO WANDER FROM THE PATH. (1 Nephi 8:25-34; 12:18)
What does Lehi see in 1 Nephi 8:13? What does Nephi notice about the river that Lehi did not see? (1 Nephi 15:27) What does the river represent? (1 Nephi 15:26-35the depths of hell) Does the river represent temporal or spiritual realities? (Both. See 1 Nephi 15:31,32) If you are teaching, you might invite the class to identify some of the ways in which people drown in the depths of the fountain or river in mortality. In this context, note the following from Henry B. Eyring:
Let's talk for moment about the way in which filth is presented . . . . I am talking about the advertising . . . as you watched the beer commercials, did you notice the people drinking? I have never seen such clean-cut, hard-working, patriotic, good folk in a long time . . . I use that only as one example, If you turn on your television and watch some of the videos that go with the rock music, you will see how evil is presented by Satan. It is presented incessantly and attractively. It doesnt even look like a sea of filth to the young people who are swimming in it. In fact, they may not even be swimming, because the presentation is so incessant and so attractive that they may not notice that there is a need to swim. (Elder Henry B. Eyring,C.E.S. Religious Educators Symposium Booklet, 1984, p. 9)
6. THE NUMBERLESS CONCOURSES OF PEOPLE REPRESENT ALL MANKIND AND MAKE IT POSSIBLE FOR US TO LOCATE OURSELVES AMIDST THE SYMBOLS. (1 Nephi 8:21-33)
Take some time to identify the four groups of people mentioned in the dream. Compare the characteristics of each of the groups. You will find an interesting comparison between these groups and the four groups in the parable of the sower in Matthew 13.
Group 1 (1 Nephi 8:21-23) What characteristics define this group?Group 2: (1 Nephi 8:24-28) What characteristics define this group?Group 3: (1 Nephi 8:30,33) What characteristics define this group?Group 4: (1 Nephi 8:31-33) What characteristics define this group?
One of the interesting facts about this dream is that everyone can find him or herself in it. Take the time to find yourself. Where would Lehi have seen you? In the building (heaven forbid!)? On the path? Under the tree?
There are four words in this dream that give imperative instructions about our relationship with the rod, the path, and the tree. They all begin with the letter c. The words are:
commence (1 Nephi 8:22)
catch hold (1 Nephi 8:24)
cling (1 Nephi 8:24)
continue (1 Nephi 8:30).
I testify that this is Lehis counsel for those of us who want to experience the Love of God with our families and fellow men. We must accept the ordinances of initiation (baptism, confirmation) and commence in the path.
Immediately thereafter, we must catch hold of the rod. If we begin in the path but neglect the security of the scriptures and the words of living prophets, the mists of darkness will certainly conceal our destination and confuse our efforts. But catching hold will not suffice. We are told in other places about floods (3 Nephi 14:25), about wind and rain (D&C 90:4), and about mighty winds and shafts in the whirlwind (Hel. 5:12).
We must cling to the rod. I tried out a rope swing once, when I had a broken rib. I had forgotten about the rib. Preceding days of pain had taught me a great deal of unconscious caution. I hardly dared to breath deep. But my Scouts had found a long rope swing in a grand tree near a towering waterfall. I was able to get to appropriate branch of the tree and grab the rope without thinking of what would happen when I hung all my weight on my arms and stretched those intercostal muscles around my rib cage. And so I picked up my feet and swung. The pain was like a lance in my side. I cried out in agony. But I was over the rocks 20 feet below. And so, in spite of terrible pain, I required of myself to cling to the rope until I was safely over the pool at the base of the waterfall. In that same way we must cling to the rod until we are safe.
And then we must continue. We must attend our meetings and we must attend to our duties. We must press forward until we arrive at the tree and partake of the fruit. No amount of effort will be sufficient if we leave the path before we partake of the fruit. | <urn:uuid:fa746b8b-384a-45f5-95b0-11d14691c2ec> | CC-MAIN-2015-35 | http://www.ldsliving.com/Book-of-Mormon-Lesson-3-The-Vision-of-the-Tree-of-Life/s/67223 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440646313806.98/warc/CC-MAIN-20150827033153-00186-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.947649 | 3,733 | 2.828125 | 3 |
The provision of widespread public WiFi access in urban environments makes it principally possible to create social heatmaps of people, providing the means to know where and when these people are at a certain location. The municipality, private companies and/or public-private partnerships can use this information, for example, to organise the local transport options more efficiently. However, the information can also be abused by surveilling the urban society. For example, the police could use it for police investigations (“Who was present at crime scenes?”) or companies could track their customers and/or employees at any public place they are in (unless they have switched off the function of their mobile devices to connect with the public WiFi spots).
This raises the question of how data protection and security can be implemented into the design, for example, of an environment where all public and/or private entities are interconnected in order to take full advantage of the benefits while reducing the data protection risks? Based on research conducted at the Alexander von Humboldt Institute for Internet and Society, INNOVATION AND LAW, together with various stakeholders, are developing reliable privacy and security-by-design solutions in smart city environments. | <urn:uuid:55a903a5-e9fd-4e49-b80d-2c558350775a> | CC-MAIN-2019-39 | https://www.innovation-law.berlin/smart-city/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573080.8/warc/CC-MAIN-20190917141045-20190917163045-00368.warc.gz | en | 0.941994 | 239 | 2.6875 | 3 |
The 80/20 Principle (or Rule) means that in anything a few (20 percent) are vital and many (80 percent) are trivial.
The principle is applied in a variety of ways:
- 20% of the people have 80% of the wealth.
- 20% of your workers do 80% of the work.
- 20% of your tasks will result in 80% of your effectiveness.
The principle basically says that out of all the things you do today, only 20% of those things really matter. So the question is…what is your 20%?
You have the capability of creating a todo list as long as your arm. But not everything on that list is a productive use of your time. You may oversee a large number of people. But not every person under your care is going to be equally as effective.
The 80/20 Principle is an exercise in priories. Not simply knowing what’s most important, but also understanding what is most effective and then focusing on those few things.
Of course, a quick disclaimer here: Don’t go around telling people that they’re part of your 80%. And if your supervisor insists on you doing something right away, you’ll need to find room for it in your 20%. Think of the 80/20 Principle as a target on the wall. Sometimes it’s more of a guideline than a hard, fast rule.
How can you organize your day to do more of what matters and less of what’s trivial?
Share this Post | <urn:uuid:24fc5bf2-0955-4fe7-8d5f-322b19d34d66> | CC-MAIN-2022-27 | https://timmilburn.com/applying-the-8020-principle/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104678225.97/warc/CC-MAIN-20220706212428-20220707002428-00538.warc.gz | en | 0.96089 | 322 | 2.8125 | 3 |
If you were to find out that more than 35 million people are infected with liver fluke, wouldn’t you be worried that you’re one of them? It is even scarier that these parasites can live inside our bodies for as long as 20 to 30 years before manifesting through various symptoms. Even if you are one of the lucky ones whose infection is asymptomatic, isn’t it unsettling to know that wrigglers are living inside you that may cause you pain and sickness any minute? Liquid flukes can even cause terminal diseases at their late stages. That is what happened to some US Vietnam war veterans diagnosed with liver flukes and now suffering from cholangiocarcinoma or bile duct cancer.
A blood test conducted among Vietnam war veterans by the US Department of Veterans Affairs (VA) found that more than 20% of the veterans tested are positive for antibodies against liver flukes. This type of liver fluke epidemic is even more common in Asian countries. In 2001, for example, a 9.4% prevalence was reported in Thailand, meaning that over 6 million people were infected then. In Vietnam, it is estimated that 75% of the population is infected with liver flukes.
In the case of the US veterans, it is alarming that about 700 Vietnam veterans have suffered from bile duct cancer in the past 15 years. This type of cancer is supposedly rare in developed and western countries, with only seven casualties for every 1 million people. As many as 8,000 people are diagnosed with bile duct cancer yearly in the US alone. Among the diagnosed cases, a few are caused by liver flukes.
What are liver flukes?
In adults, liver flukes are flat, leaf-like parasites measuring 8-10 mm. That’s 5/16 to 3/8 of an inch. They cause inflammation and dilation of the bile ducts and thickening of the bile duct walls. Flukes can be ingested through the consumption of fluke-infested, uncooked fish, watercress, or other freshwater animals (like snails, frogs, and mussels). Infection can also be initiated if water contaminated by cattle or sheep excrement is used for cooking or drinking. Liver flukes may be found globally but are most common in Asia and Eastern Europe.
There are three most well-known species of liver flukes that cause human infection. These are Clonorchis sinensis, Opisthorchis viverrini, and Opisthorchis felineus, causing clonorchiasis and opisthorchiasis. Infections are often diagnosed through complete blood count (CBC) tests and checking antibody levels for the parasite. Stool examination and imaging tests like ultrasound, CT scan, MRI, and ERCP may be done.
Oftentimes, liver fluke infection is asymptomatic and some people can live full lives despite the existing parasitic infestation. In others, symptoms manifest, including abdominal pain, nausea, fever, diarrhea, hives, and loss of appetite. Jaundice may also occur if many flukes in the bile ducts already block the bile flow.
Liver flukes cause several complications:
1. Recurrent Pyogenic Cholangitis – Acute suppurative (i.e., pus-producing) cholangitis (inflammation of the bile ducts) may happen when the bile ducts are blocked by masses of dead worms, ova, and mucin. This condition can be aggravated by the decreased bile flow caused by parasites’ abundance and excretion.
2. Gallstone and Bile Duct Stone Formation – Bile duct stones can result from bile stagnation due to the obstruction of the ducts. Bilirubin stones can also form as the bilirubin undergoes mechanical and chemical changes during cholangitis (bile duct inflammation).
3. Cholangiohepatitis – inflammation of the liver and bile ducts
4. Fluke infection in various body parts such as the brain, the liver, lymph nodes, skin, or spinal cord.
5. Gallbladder perforation
7. Bile Duct Cancer
Bile Duct Cancer
Bile duct cancer or cholangiocarcinoma is a rare type of cancer that affects the biliary system. It is commonly associated with Clonorchis sinensis and Opisthorchis viverrini. Bile duct cancer is considered very difficult to diagnose and treat due to its wide variation and the condition’s rarity. It also usually presents in its late stages, increasing mortality risk.
Three types of Cholangiocarcinoma
- Intrahepatic – which forms in the bile ducts within the liver
- Extrahepatic – also called distal bile duct cancer
- Perihilar bile duct cancer – forms at the point where the hepatic ducts join together to exit the liver
Symptoms of Bile Duct Cancer (Cholangiocarcinoma)
- Pale stools
- Dark urine
- Nausea and vomiting
- Abdominal pain
- Weight loss
- Other symptoms depend on the infection type, location of the tumor, and the susceptibility of the individual
Other risk factors for bile duct cancer include the following:
- Chronic ulcerative colitis
- Primary sclerosing cholangitis or PSC
- Cysts in the bile ducts
- Cirrhosis of the liver
- Hepatitis B or C virus
- Genetic factors
Liver Flukes and Bile Duct Cancer
There are various ways liver fluke infection can escalate to bile duct cancer. One is through mechanical injury from the feeding and migration of the flukes combined with the excrement. The tissue damage and scarring caused by the suckers of the fluke hook and its other activities can lead to bile duct cancer. Secondly, persistent inflammation and prolonged infection with liver fluke may contribute to the development of cholangiocarcinoma. The liver flukes can also induce biliary cell damage through the actions of oxygen radicals causing oxidative DNA damage to the biliary system.
Liver Fluke Prevention
Liver flukes are not prevalent in developed countries, but it is still better to be safe than sorry. Prevention is critical, especially while traveling or consuming unfamiliar food.
Since C. sinensis and O. viverrini are acquired through ingestion, ensure that your drinking water is treated or boiled, especially when traveling in the countryside. If uncertain, it is better to purchase sealed distilled water bottles that guarantee your safety. Aside from being wary of the liquids you intake, it is important to be cautious about the food you eat. Even vegetables grown and drawn near infested areas can be carriers.
It is always best if you cook your food at home. But at times when you can’t, avoid consuming raw food, especially animal liver and fish. Also, choose reputable eating places to be confident about their food handling and safety during preparation and serving. And on the topic of cleanliness, washing your hands with soap and clean water always goes a long way.
Liver Flukes Diagnosis and Treatment
So what do you do if you are already infected with liver fluke? Nothing beats regular consultation with a medical practitioner. With that, you can have the peace of mind that your condition is being monitored. The infection is not fatal, but complications arising from it can be. So upon discussion with your doctor, you may be given the following treatment options:
1. Medication – Some pharmaceutical drugs such as triclabendazole, praziquantel, and tribendimidine may be prescribed for 2-7 days, depending on the dosage. After the medication, stool examination will be repeated, and patients will be recommended for retreatment if an infection is still present.
2. Alternative treatment – There are a few alternative treatments for those suffering from liver flukes. Examples are colonic irrigation, parasite cleanses, goldenseal, natural liver fluke detox formulas, bowel cleaners such as Premier Cleanse, and bile movers like Beet Capsules. A word of caution though, it is best to consult your doctor before taking any supplements or doing these treatments to ensure that it does not counteract any medications you are taking or that it will not worsen any other physical condition you may have.
3. Paratosin – This botanical blend provides gastrointestinal and immune support for patients with liver fluke and other related parasitic infections.
4.BiliVen – BiliVen is purported to expand the bile ducts to allow for the easier exit of the flukes and offer general gallbladder and bile support.
Want Gallbladder News & Health Tips Delivered Straight To Your Inbox? Sign Up Here!
American Cancer Society (2016) What Are the Risk Factors for Bile Duct Cancer?
Chan, C. W., & Lam, S. K. (1987). 5 Diseases caused by liver flukes and cholangiocarcinoma. Bailliere’s clinical gastroenterology, 1(2), 297-318.
Fox News (2017) VA study shows parasite from Vietnam may be killing vets.
Khan, S. A., Thomas, H. C., Davidson, B. R., & Taylor-Robinson, S. D. (2005). Cholangiocarcinoma. The Lancet, 366(9493), 1303-1314.
Kim, T. S., Pak, J. H., Kim, J. B., & Bahk, Y. Y. (2016). Clonorchis sinensis, an oriental liver fluke, as a human biological agent of cholangiocarcinoma: a brief review. BMB reports, 49(11), 590.
Lim, J. H. (2011). Liver flukes: the malady neglected. Korean journal of radiology, 12(3), 269-279.
Sithithaworn, P., Haswell-Elkins, M. R., Mairiang, P., Satarug, S., Mairiang, E., Vatanasapt, V., & Elkins, D. B. (1994). Parasite-associated morbidity: liver fluke infection and bile duct cancer in northeast Thailand. International journal for parasitology, 24(6), 833-843.
Sripa, B., & Pairojkul, C. (2008). Cholangiocarcinoma: lessons from Thailand. Current opinion in gastroenterology, 24(3), 349.
Sripa, B., Brindley, P. J., Mulvenna, J., Laha, T., Smout, M. J., Mairiang, E., … & Loukas, A. (2012). The tumorigenic liver fluke Opisthorchis viverrini–multiple pathways to cancer. Trends in parasitology, 28(10), 395-407.
Sripa, B., Kaewkes, S., Sithithaworn, P., Mairiang, E., Laha, T., Smout, M., … & Bethony, J. M. (2007). Liver fluke induces cholangiocarcinoma. PLoS medicine, 4(7), e201.
US Department of Veterans Affairs (2017) Bile Duct Cancer (Cholangiocarcinoma) and Liver Fluke Infection.
Watanapa, P. (2002) Liver fluke-associated cholangiocarcinoma. British Journal of Surgery. Volume 89, Issue 8. Pages 962–970. | <urn:uuid:5fc70cb9-6792-477f-8c83-af1df84e5ca7> | CC-MAIN-2022-49 | https://www.gallbladderattack.com/the-link-between-liver-flukes-and-bile-duct-cancer/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711637.64/warc/CC-MAIN-20221210005738-20221210035738-00186.warc.gz | en | 0.902768 | 2,502 | 3.28125 | 3 |
In 1978, the Supreme Court opened the doors of America's elite campuses to a generation of minority students when it ruled that universities' admissions policies could take applicants' race into account. But the decision, by a narrowly divided court drawing a hair-splitting distinction between race as a "plus factor" (allowed) and numerical quotas (forbidden), did not end an often bitter and emotional debate. A quarter of a century after the ruling in Regents of the University of California v. Bakke, affirmative action is still being challenged by disappointed applicants to selective colleges and graduate schools, and still hotly defended by civil-rights groups. Now that two such cases, both involving the University of Michigan, have reached the Supreme Court, the issue can no longer be evaded: when, if ever, should schools give preferential treatment to minorities, based solely on their race?
It's a measure of how far we've come that the desirability of improving opportunities for black and Hispanic students is a given in the debate. But the fundamental question of where "fairness" lies hasn't changed, and the competition keeps growing. Each year, more students apply to the top universities, which by and large have not increased the sizes of their classes in the past 50 years. The court will have to decide who deserves first crack at those scarce resources. (Right now, about one sixth of blacks get college degrees, compared with 30 percent of whites and 40 percent of Asians.) And if the court allows affirmative action to continue in some form, it will only set the stage for future debate over even more perplexing questions. Do all minorities deserve an edge or just those from disadvantaged backgrounds? What about white students from poor families? And how do you balance the academic records of students from the suburbs and the inner cities? As the controversy heats up, here's a 10-step guide to sorting out the issues at stake:
1. What is affirmative action?
When President Kennedy first used the term in the early 1960s, "affirmative action" simply meant taking extra measures to ensure integration in federally funded jobs. Forty years later, a wide range of programs fall under this rubric, although all are meant to encourage enrollment of underrepresented minorities--generally blacks, Hispanics and Native Americans. Schools vary in how much weight they assign to the student's race. For some, it's a decisive consideration; for others, it's just one among a number of factors such as test scores, grades, family background, talents and extracurricular activities. After the Bakke decision emphasized the importance of campus diversity as a "compelling" benefit to society, colleges quickly responded with efforts not just to attract minorities but to create a broader geographic and socioeconomic mix, along with a range of academic, athletic or artistic talent.
In 2003, the debate over the merits of affirmative action essentially boils down to questions of fairness for both black and white applicants. Critics say it results in "reverse discrimination" against white applicants who are passed over in favor of less well-qualified black students, some of whom suffer when they attend schools they're not prepared for. But Gary Orfield, director of Harvard University's Civil Rights Project, argues that emphasizing diversity has not meant admitting unqualified students. "I have been on the admissions committees of five different universities," he says, "and I have never seen a student admitted just on the basis of race. [Committees] think about what the class will be like, what kind of educational experience the class will provide." Opponents also say that with the expansion of the black middle class in the past 20 years, these programs should be refocused on kids from low-income homes. "It just doesn't make sense to give preference to the children of a wealthy black businessman, but not to the child of a Vietnamese boat person or an Arab-American who is suffering discrimination," says Curt Levey, director of legal affairs at the Center for Individual Rights, which is representing the white applicants who were turned down by the University of Michigan.
Despite the public perception that affirmative action is rampant on campuses, these programs really only affect a very small number of minority students. It's a legal issue mainly on highly selective public campuses, such as Michigan, Berkeley or Texas. Even at these schools, the actual numbers of minority students are still small--which is why supporters of affirmative action say race should still matter. Blacks account for 11 percent of undergraduates nationally; at the most elite schools the percentage is often smaller. For example, fewer than 7 percent of Harvard's current freshman class is black, compared with 12.9 percent of the overall population.
2. How did the University of Michigan become the test case?
Both sides say it was really a matter of chance more than anything else. "It's not like we studied 1,000 schools and picked them out," says Levey. To have the makings of a test case, the suit had to involve a public university whose admissions information could be obtained under the Freedom of Information Act. It also had to be a very large school that relied on some kind of numerical admissions formula--unlike the more individualized approach generally used by private colleges with large admissions staffs.
In fact, Michigan is just one of a number of public universities that have faced legal challenges in recent years. In 1996, the U.S. Court of Appeals for the Fifth Circuit banned the use of race in admissions at the University of Texas Law School. The Supreme Court declined to hear the law school's appeal, but by that time, the university had changed its admissions procedures anyway. The University of Georgia dropped race as a factor after a similar suit. But when Michigan's admissions policy came under challenge in the mid-1990s, university officials decided to fight back--all the way to the Supreme Court.
3. How does the Michigan system work?
Although President George W. Bush reduced Michigan's complex admissions process to a single sound bite--comparing the relative values given to SAT scores and race--a student's academic record is actually the most important factor. For undergraduate applicants, decisions are made on a point system. Out of a total of 150 possible points, a student can get up to 110 for academics. That includes a possible 80 points for grades and 12 points for standardized test scores. Admissions counselors then add or subtract points for the rigor of the high school (up to 10) and the difficulty of the curriculum (up to 8 for students who take the toughest courses). Applicants can get up to 40 more points for such factors as residency in underrepresented states (2 points) or Michigan residency (10 points, with a 6-point bonus for living in an underrepresented county). Being from an underrepresented minority group or from a predominantly minority high school is worth 20 points. So is being from a low-income family--even for white students. The same 20 points are awarded to athletes. Students also earn points for being related to an alumnus (up to 4 points), writing a good personal essay (up to 3 points) and participating in extracurricular activities (up to 5 points). Admissions officials say the scale is only a guide; there's no target number that automatically determines whether a student is admitted or rejected. Michigan also has a "rolling" admissions policy, which means that students hear a few months af-ter they apply. The number of spaces available depends on when in this cycle a student applies.
At the law school, there's no point system, but the admissions officers say higher grades and standardized test scores do increase an applicant's chances. Those factors are considered along with the rigor of an applicant's courses, recommendations and essays. The school also says that race "sometimes makes the difference in whether or not a student is admitted."
4. Does the Michigan system create quotas?
This is an issue the court will probably have to decide. Awarding points could amount to a quota if it resulted in routinely filling a fixed number of places. Levey claims that the fact that the number of minority students admitted is relatively stable from year to year proves there is a target Michigan tries to hit. Michigan's president, Mary Sue Coleman, is adamant that that's not the case. "We do not have, and never have had, quotas or numerical targets in either the undergraduate or Law School admissions programs," she said in a statement issued after Bush's speech last week. At the law school, the most recent entering class of 352 students included 21 African-Americans, 24 Latinos and 8 Native Americans. The year before, there were 26 African-Americans, 16 Latinos and 3 Native Americans. The university says that over the past nine years, the number of blacks in the entering class has ranged from 21 to 37. On the undergraduate level, the university says that blacks generally make up between 7 and 9 percent of the entering class.
In general, few outright quota systems exist anymore. "The only legal way to have quotas today is to address a proven constitutional violation," says Orfield. "For instance, if you can prove that a police or fire department intentionally did not hire any blacks for 25 years, and you can prove discrimination, a judge can rule that there can be a quota for the next five years."
On campuses, some education experts say that what appear to be quotas may actually just reflect a relatively steady number of minority applicants within a certain state. "I don't know of a public or private institution that uses quotas," says Alexander Astin, director of the Higher Education Research Institute at UCLA. "That's a red herring. There is always a consideration of merit given." Nonetheless, admissions officers at public and private universities admit that they are always very conscious of demography--and work hard to make sure that the number of minority students does not decline precipitously from one year to the next.
5. How can the court rule?
The short answer is: the Supreme Court can do whatever it wants. The options range from leaving the Bakke decision intact to barring any use of race in college admissions. Or the court could issue a narrowly tailored opinion, one that would affect only Michigan's point system and perhaps only the number of points the university assigns to race. "I think it's a good guess that they may say that they cannot give minorities a specific number of points, or say points are fine, but they can only award 10," says Levey.
The experts agree that the key vote will belong to Justice Sandra Day O'Connor. Some court watchers predict that she will try to find a very specific solution that will leave affirmative action largely intact. "She probably won't buy anything that's open-ended," says Sheldon Steinbach, general counsel of the American Council on Education, a consortium of the nation's leading research universities. "Maybe she will say that it can be done in some narrowly defined way." Steinbach doesn't think the court will order schools to disregard everything but the supposedly objective criteria of grades and test scores. Such a ruling "would tie the hands of admissions officers from shaping the kind of class they want to fulfill the academic mission of the institution," Steinbach says. Another possibility is that the court will order schools to give preference to students who are economically disadvantaged, which would cover many minority applicants.
6. Will the decision affect private universities and colleges?
The answer really depends on what the justices rule, but legal experts generally agree that private institutions would have to follow the court's guidelines because virtually all receive some federal funding. However, the ruling would have a noticeable impact only at elite institutions since most colleges in this country accept the vast majority of applicants. And the elite schools--no more than several dozen around the country--generally employ multistep admissions procedures that leave plenty of room for subjective judgments. Unlike the numerical formulas used by large public universities, these would be difficult to challenge in court.
Already, several landmark state cases have pushed private schools to make changes. In the wake of the Texas decision, officials at highly selective Rice University in Houston, on the advice of the state attorney general, banned the use of race in all admissions decisions. Clerks were told to strip any reference to a student's race or ethnicity from admissions and financial-aid applications before they were forwarded to the admissions committee. Although the proportion of minorities dropped right after the change, it's now back up to the levels before the ruling, officials say--about 7 percent black and 10.5 percent Hispanic. That was accomplished through "significant" recruiting, a Rice spokesman said.
7. How would an anti-affirmative-action ruling affect other preferences for legacies and athletes?
Some educators think legacies (the children or grandchildren of alumni) could become unintended victims of an anti-affirmative-action ruling. On the face of it, providing preferential treatment to these applicants does not violate the Constitution, but as a matter of fairness--and politics--legacies would be hard to defend, since they are usually white and middle class. However, many colleges would probably resist the change because legacies bring a sense of tradition and continuity to the school. (They also are a powerful inducement to alumni donations.) Athletic preferences are a different story. They don't disproportionately favor whites so they're probably not as vulnerable.
8. Whom does affirmative action hurt and whom does it help?
Opponents of affirmative action claim it actually hurts some minority students, particularly those who end up struggling to compete in schools they're not prepared for. And, they say, it unfairly tars well-qualified minority students with the suspicion that they were admitted because of their race. Supporters say that's a spurious argument because race may sometimes be the deciding factor between qualified applicants, but it is never the only reason a student is admitted.
The more obvious potential victims, of course, are white students who have been denied admission--like the plaintiffs in the Michigan suit. But there's no guarantee that these students would have been admitted even if there were no black applicants. In their 1998 book "The Shape of the River," William Bowen and Derek Bok (former presidents of Princeton and Harvard, respectively) analyzed the records of 45,000 students at elite universities and found that without race-sensitive admissions, white applicants' chances of being admitted to selective universities would have increased only slightly, from 25 to 26.2 percent. But Bowen and Bok also found that black applicants' chances were greatly enhanced by affirmative action, and the vast majority of black students went on to graduate within six years--even at the most selective institutions. The black graduates were more likely to go to graduate or professional school than their white counterparts and more likely to be leaders of community, social service or professional organizations after college.
Supporters of affirmative action say both white and black students benefit from living in a diverse academic environment, one that closely resembles the increasingly diverse workplace. Opponents say schools don't need affirmative action to create a diverse campus; instead they say that other admissions strategies, such as "affirmative access," can accomplish the same goals.
9. What is "affirmative access"?
In the wake of lawsuits, several states have adopted alternative ways to bring minority students to campus. Modern political marketing seems to require a label for everything, and "affirmative access" has emerged as the label for these plans. Each operates differently. In California, the top 4 percent of students at each in-state high school is guaranteed admission to the University of California (although not necessarily to the most prestigious campuses, Berkeley and UCLA). For the University of Texas, it's the top 10 percent, and in Florida, the top 20 percent. The success of these new initiatives varies. California's plan was enacted after the passage of Proposition 209, which forbids using race in admissions. In 1997, the last year before the use of race was banned, 18.8 percent of the class consisted of underrepresented minorities. Last year that number was 19.1 percent systemwide. But some individual campuses, like Berkeley and UCLA, have not returned to pre-1997 levels. At the University of Texas, the percentage of black and Hispanic entering freshmen has remained fairly steady, but officials say the 10 percent law alone isn't enough. "You have to add some targeted procedures that work in tandem with the law," says University of Texas president Larry Faulkner. "And for us that's been pretty aggressive recruiting programs aimed at top 10 percent students in areas where minority students live, and carefully tailored scholarship programs aimed at students in areas or schools that have not historically attended UT."
Opponents of affirmative access like lawyer Martin Michaelson, who specializes in higher-education cases, say these programs rest on the dubious premise that "residential segregation patterns are a better method for choosing a college class than the judgment of educators" and create, in effect, a built-in constituency for continued segregation. Critics also worry that a program that mixes schools of widely different qualities may reward less-qualified students than more-traditional programs. At the University of Texas, Faulkner says no; he believes that class rank is a better predictor of collegiate success than test scores, even at high schools with large numbers of disadvantaged students. But Orfield, who is in the final stages of completing a formal study of these programs, disagrees; he says that less-qualified students are being admitted under the percentage programs. Often, Orfield says, 60 percent of kids at suburban high schools have better credentials than the top 10 percent of kids at inner-city schools (sidebar). The affirmative-access approach would also be hard to apply in nonstate colleges and graduate schools that draw students from all over the country.
Another approach would be to target students from low-income homes, regardless of race. That would eliminate the problem of giving middle-class blacks an edge. But Orfield says that being middle class does not protect black students from the effects of racism, and they are still often at a disadvantage in the admissions process. "Race still matters," he says. "It's fine with me if we apply affirmative action to poor people, but I think we need it for middle-class blacks as well."
10. So what is the most equitable way to select the best-qualified applicants?
In judging admissions policies, it's important to remember that schools aren't just looking to reward past achievement. They want to attract students who will create the richest academic and social communities, and who have the best odds of success in college and later life. As a result, admissions officers say, what they really look for are signs of intellectual energy and personal enthusiasm--qualities that can show up in grades, scores, essays, recommendations, extracurricular activities, or a mix of all these. "Merit" has become particularly difficult to define in an era when elite colleges are getting many more well-qualified applicants than they can possibly accept, and when distrust of standardized admissions tests is growing. And making hard and fast distinctions based on race isn't going to get any easier as the growing trend toward racial mixing increases over the next century and people choose to identify with more than one group. The only thing educators who have struggled with these issues agree on is that there is no magic formula, not even for the Supreme Court.
In a caption accompanying a photo of the 1941 University of Michigan football team in our Jan. 27 issue, we said that 4.3 percent of the players on the team were black ("What's at Stake"). The correct figure (for the varsity team) is 1.7 percent. We also said that 45 percent of the 2002 team was black; the correct number is 42 percent. | <urn:uuid:ac9021a3-171a-429c-a297-1b75e1ce8179> | CC-MAIN-2017-09 | http://www.newsweek.com/whats-stake-135259 | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00633-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965081 | 4,002 | 3.03125 | 3 |
Teachers' uses of the target and first languages in ...
|Title||Teachers' uses of the target and first languages in the classroom|
|Author(s)||Miles Turnbull, Katy Arnett|
|Journal||Annual Review of Applied Linguistics|
|Abstract||This chapter reviews recent theoretical and empirical literature regarding teachers' uses of the target (TL) and first (L1) languages in second (SL) and foreign (FL) language classrooms. Theoretically, the article explores several issues related to teachers' use of the L1 and the TL in the classroom: exposure to TL input, student motivation, cognitive considerations, code-switching, and appropriate teacher use of the L1. A review of recent discourse analysis studies examines how much, when, and why FL and SL teachers use the L1 and TL in their pedagogy. The article also presents findings from studies that have considered teachers' self-reports and teachers' and learners' beliefs and attitudes regarding the use of the L1 and the TL in FL and SL classrooms. The paper concludes with recommendations for future research.|
Using APA 6th Edition citation style.
Times viewed: 230 | <urn:uuid:8ff4c614-61bc-4fc6-b38c-bbf5037e0442> | CC-MAIN-2014-35 | http://www.islandscholar.ca/scholartest/fedora/repository/ir%3Air-batch6-1972 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834883.60/warc/CC-MAIN-20140820021354-00428-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.85423 | 246 | 2.734375 | 3 |
A summer course, Natural History of the Chihuahuan Desert, was offered for teachers by the Department of Biological Sciences, University of Texas at El Paso (UTEP), in the summer of 2006. Inasmuch as it provides an introduction to the desert with little background knowledge necessary, it seems appropriate to offer it on the Chihuahuan Desert pages of the Centennial Museum. It may be utilized as a self-taught course or an organized course. It will work best if there is access to the desert itself, but we have tried to supply sufficient images and links to other sources to give a feel for this desert no matter where one is located. The course as taught included a number of hours learning desert plants on the campus of UTEP and, especially, in the Chihuahuan Desert Gardens. Many of the subjects introduced here were expanded upon in class, so this should be considered as a skeleton to be fleshed out with further study.
There are numerous facets to any region, and the shortness of a 4-week summer session and limitations of any one instructor insures that many facets will go unpolished. Probably the most critical shortcoming is the superficial consideration of invertebrates, but many other areas are likewise given but a lick and a promise.
Natural History has various meanings, but at one time included the study of what we often think of as Nature: animals and plants and their place in the physical world. This is pretty much the sense that we are using the term here: to look at the natural world of the Chihuahuan Desert.
A northern Chihuahuan Desert view. The location is south-central New Mexico and the view is approximately north. The Organ Mountains are just to the left of center, and the Sacramento Mountains can be seen on the distant right. The Hueco Bolsón is in the foreground, just north of El Paso, Texas.
The general approach of these pages is to first look at what characterizes deserts in general: the definitions and types of deserts, their characteristics, where they occur, why they are deserts. After this overview, we'll go on to look at where the Chihuahuan Desert fits into the picture: its various definitions, its physical characteristics, why it is a desert, its internal variability, its geographic and climatic boundaries, etc.
We'll then review a bit on biological classification and related subjects to make sure everyone is up to snuff before we begin to look at the Chihuahuan Desert biota [words in green are links to the glossary].
To survive in an arid region, organisms must either find habitats where aridity is not a problem or must have adaptations that allow them to withstand low levels of moisture. Thus we'll spend a little time looking at habitats and microhabitats within the desert region that allow organisms to avoid water-deficient conditions.
Since animals are in large part dependent upon vegetation, we'll start with plants and consider ways that these taxa have adapted to aridity. Following this, we'll look at some of the major plants and plant groups of the Chihuahuan Desert.
Once we have a reasonable understanding of desert vegetation, we'll look at some of the prominent and/or interesting invertebrates and then go on to study the groups of vertebrates represented in the region.
Much material will be presented through links to sites on the internet. Hopefully, such links will add up to a database of Chihuahuan Desert resources that can be easily accessed for reference and teaching.
Last Update: 21 Feb 2007 | <urn:uuid:027d98c5-c0e8-4e66-8206-4e1349c7ae24> | CC-MAIN-2015-11 | http://museum2.utep.edu/chih/NHCD/introduction.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462762.87/warc/CC-MAIN-20150226074102-00058-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.957553 | 732 | 3.40625 | 3 |
Students at Butterfield Canyon Elementary are very well behaved and seek to behave in ways that demonstrate that they value Respect, Responsibility, and Safety (The BIG 3).
We explicitly teach what these values look like in each area of the school to students (i.e. what does respect look like in the office, what does safety look like on the playground). You can view a printable version of what we call the Big 3 Matrix which details behavior expectations in each area of the school.
Students are expected to follow the behavior expectations detailed in the matrix. Reminder signs are posted at various locations throughout the building to serve as a reminder of what the BIG 3 looks like in that particular area. The Big 3, become the "Why" behind other specific rules.
Students who demonstrate the BIG 3 are being good examples to their peers. Leaders are examples. So students caught being leaders are positively reinforced by the intrinsic benefits, verbal praise, and may receive a "Caught Being a Leader" ticket. They will be able to turn that into the office for a small prize along with a chance to win an activity with the principal, by getting their name on one of the 200 slots on the "Principal's 200 Club" board. | <urn:uuid:171fa69a-d923-4017-ade9-d6b487803fe1> | CC-MAIN-2023-50 | https://butterfieldcanyon.jordandistrict.org/schoolinfo/big3/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00070.warc.gz | en | 0.965814 | 249 | 2.796875 | 3 |
An 8.0 kg crate is pulled up a 30 degree incline by a person pulling on a rope that makes an 18 degree angle with the incline. The tension in the rope is 120 N and the crate's coefficient of kinetic friction on the incline is 0.25. If the crate moves 5.0 m, what is the work done by a.) friction and b.) the normal force? I calculated the work done by tension in the rope to be 571 J and the work done by gravity to be -196 J. How do I find the friction and normal force? | <urn:uuid:4ac6332e-1a97-442b-847f-5b06dd83e313> | CC-MAIN-2016-44 | https://www.physicsforums.com/threads/work-problem.56644/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00090-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.928484 | 119 | 2.71875 | 3 |
- Main Menu
- Sub Menu
Geschichte des alten Mesopotamien
The civilization of ancient Mesopotamia spanned more than 3000 years; together with that of ancient Egypt, its record constitutes nothing less than the first half of history. Hundreds of thousands of cuneiform texts, found throughout modern Iraq, Iran, Syria, and Turkey, offer detailed glimpses into the achievements of the ancient Sumerians, Akkadians, Babylonians, and Assyrians. Even though certain aspects of their civilization seem rather alien to us, these people have shaped, in indirect ways, numerous features of our modern world. This book aims to make the long and complex history and culture of Mesopotamia accessible to the modern reader. | <urn:uuid:9e31e54e-ce1f-4f19-a0ff-4b727aa7ea09> | CC-MAIN-2017-26 | http://nelc.yale.edu/publications/geschichte-des-alten-mesopotamien | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320666.34/warc/CC-MAIN-20170626013946-20170626033946-00450.warc.gz | en | 0.90335 | 152 | 3.21875 | 3 |
Earlier today we introduced you to some of the words you can learn in the French section of Oxford Language Dictionaries Online, which are freely available through the 21st. But perhaps French isn’t your thing. Well, how about German? Take the quiz below to see how much you know and if you get stuck turn to OLDO for help. Be sure to check back this afternoon for me Dictionary Day fun from OLDO!
Question 1: Your German friend tells you in conversation, “Das ist nicht mein Bier.” But you’re not drinking beer! What does he mean?
Question 2: English speakers say “kill two birds with one stone”. What do German speakers say?
Question 3: If a German offers you Himmel und Erde, what should you expect?
Question 4: English speakers say “it’s no picnic”, but how would you say this in German?
Question 5: What do Germans see instead of “pink elephants”?
Question 1: The phrase means “That’s not my business” or “That’s nothing to do with me.” You can find this out through typing bier or the phrase das ist nicht mein Bier into G-E.
Question 2: Zwei Fliegen mit einer Klappe schlagen, which literally means “to hit two flies in one go”. You can find this out by typing the phrase kill two birds with one stone into E-G.
Question 3: : This literally means “Heaven and Earth”, it is a dish of puréed potato and apple with fried blood sausage and liver sausage, which they you can find out on typing Himmel und Erde into G-E.
Question 4: : Kein Zuckerlecken od. Honig[sch]lecken sein, which literally means “to not be like licking sugar or licking honey”. You can find this by typing picnic into E-G.
Question 5: weiße Mäuse or white mice. Users can find this out by typing pink elephants into E-G. | <urn:uuid:aea60d1e-afcc-4f3a-bfc1-e2b3d4244174> | CC-MAIN-2018-47 | https://blog.oup.com/2007/10/german/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746110.52/warc/CC-MAIN-20181119192035-20181119214035-00085.warc.gz | en | 0.857339 | 470 | 2.765625 | 3 |
Finnish study finds that gentle stroking changes opioid levels, which helps form lasting bonds
Researchers have shed light on the chemistry that bonds one person to another by taking brain scans of men being stroked while in their underpants.
The Finnish study found that gentle stroking – which was not in sexually arousing areas – changed levels of opioid brain chemicals which work behind the scenes to form lasting bonds in animals.
The findings suggest that opioids might be the critical chemicals that enables human brains to distinguish between strangers and people who are closer to us, such as friends, families and lovers.
“We know this is hugely important for humans because we have these strong, lasting bondings with friends and relatives and so on. But what kind of system maintains these bonds, and makes them last?” said Lauri Nummenmaa who studies the neural circuitry of emotions at Aalto University in Finland.
Studies in animals have shown that opioids can play a crucial role in pairing up. Prairie voles are monogamous in the wild, but when given a drug that blocks opioid in their brains, they seek out other partners. If opioids are blocked in monkeys, they groom others less and neglect their babies.
To see whether opioids were important in human bonding, the researchers invited nine couples into the lab. The men stripped off to their underpants and lay under a blanket in a PET scanner. The first scan was taken while the men were alone. For the second, their partners touched them gently all over, but avoided anywhere likely to arouse them sexually.
“I’m really proud of the Finnish general public,” said Nummenmaa. “We had no problem whatsoever in recruiting people for the experiment.”
When the researchers compared the men’s scans, they noticed that gentle stroking caused a drop in natural opioids in brain areas called the ventral striatum and the anterior cingulate cortex, which are mainstays of the brain’s reward circuitry. This was counter to expectations: they had expected levels to rise.
Nummenmaa said that opioid might work in a similar way to a painkiller, with the body needing less the more comfortable it was. “The opioid system is typically engaged during pain, so you get a boost in painful situations.
The social touching might be doing exactly the opposite. You can think of it as pain alleviation. That might be the underlying mechanism for why hooking up with others makes us feel so good in the first place,” said Nummenmaa. Details of the study were given at the Society for Neuroscience meeting in San Diego.
Opiate drugs have the same effect as the body’s natural opioids, and just as people build up tolerances to drugs, develop cravings, and suffer withdrawal symptoms, similar processes play out with relationships.
“If something similar happens when you are establishing social bonds that would make perfect sense. You would need your daily fix, or at least a fix now and then, and unless you got that you would start to feel pain,” said Nummenmaa.
[Image: "Topless Young Adult Man Wearing Feminine Funky Yellow Prop Spectacles" via Shutterstock] | <urn:uuid:c92166be-736c-491e-ae9a-bb7c01c26514> | CC-MAIN-2014-35 | http://www.rawstory.com/rs/2013/11/14/researchers-people-can-stroke-their-way-into-better-chemistry-with-others/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917663.12/warc/CC-MAIN-20140901014517-00322-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.957483 | 665 | 3.1875 | 3 |
The microcirculation consists of blood vessels with diameters less than 150 µm. It makes up a large part of the circulatory system and plays an important role in maintaining cardiovascular health. The retina is a tissue that lines the interior of the eye and it is the only tissue that allows for a non-invasive analysis of the microvasculature. Nowadays, high-quality fundus images can be acquired using digital cameras. Retinal images can be collected in 5 min or less, even without dilatation of the pupils. This unobtrusive and fast procedure for visualizing the microcirculation is attractive to apply in epidemiological studies and to monitor cardiovascular health from early age up to old age.
Systemic diseases that affect the circulation can result in progressive morphological changes in the retinal vasculature. For example, changes in the vessel calibers of retinal arteries and veins have been associated with hypertension, atherosclerosis, and increased risk of stroke and myocardial infarction. The vessel widths are derived using image analysis software and the width of the six largest arteries and veins are summarized in the Central Retinal Arteriolar Equivalent (CRAE) and the Central Retinal Venular Equivalent (CRVE). The latter features have been shown useful to study the impact of modifiable lifestyle and environmental cardiovascular disease risk factors.
The procedures to acquire fundus images and the analysis steps to obtain CRAE and CRVE are described. Coefficients of variation of repeated measures of CRAE and CRVE are less than 2% and within-rater reliability is very high. Using a panel study, the rapid response of the retinal vessel calibers to short-term changes in particulate air pollution, a known risk factor for cardiovascular mortality and morbidity, is reported. In conclusion, retinal imaging is proposed as a convenient and instrumental tool for epidemiological studies to study microvascular responses to cardiovascular disease risk factors.
22 Related JoVE Articles!
Associated Chromosome Trap for Identifying Long-range DNA Interactions
Institutions: Stanford University School of Medicine.
Genetic information encoded by DNA is organized in a complex and highly regulated chromatin structure. Each chromosome occupies a specific territory, that may change according to stage of development or cell cycle. Gene expression can occur in specialized transcriptional factories where chromatin segments may loop out from various chromosome territories, leading to co-localization of DNA segments which may exist on different chromosomes or far apart on the same chromosome. The Associated Chromosome Trap (ACT) assay provides an effective methodology to identify these long-range DNA associations in an unbiased fashion by extending and modifying the chromosome conformation capture technique. The ACT assay makes it possible for us to investigate mechanisms of transcriptional regulation in trans, and can help explain the relationship of nuclear architecture to gene expression in normal physiology and during disease states.
Molecular Biology, Issue 50, Associated chromosomal Trap, DNA long-range interaction, nuclear architecture, gene regulation
An Allele-specific Gene Expression Assay to Test the Functional Basis of Genetic Associations
Institutions: University of Oxford.
The number of significant genetic associations with common complex traits is constantly increasing. However, most of these associations have not been understood at molecular level. One of the mechanisms mediating the effect of DNA variants on phenotypes is gene expression, which has been shown to be particularly relevant for complex traits1
This method tests in a cellular context the effect of specific DNA sequences on gene expression. The principle is to measure the relative abundance of transcripts arising from the two alleles of a gene, analysing cells which carry one copy of the DNA sequences associated with disease (the risk variants)2,3
. Therefore, the cells used for this method should meet two fundamental genotypic requirements: they have to be heterozygous both for DNA risk variants and for DNA markers, typically coding polymorphisms, which can distinguish transcripts based on their chromosomal origin (Figure 1). DNA risk variants and DNA markers do not need to have the same allele frequency but the phase (haplotypic) relationship of the genetic markers needs to be understood. It is also important to choose cell types which express the gene of interest. This protocol refers specifically to the procedure adopted to extract nucleic acids from fibroblasts but the method is equally applicable to other cells types including primary cells.
DNA and RNA are extracted from the selected cell lines and cDNA is generated. DNA and cDNA are analysed with a primer extension assay, designed to target the coding DNA markers4
. The primer extension assay is carried out using the MassARRAY (Sequenom)5
platform according to the manufacturer's specifications. Primer extension products are then analysed by matrix-assisted laser desorption/ionization time of-flight mass spectrometry (MALDI-TOF/MS). Because the selected markers are heterozygous they will generate two peaks on the MS profiles. The area of each peak is proportional to the transcript abundance and can be measured with a function of the MassARRAY Typer software to generate an allelic ratio (allele 1: allele 2) calculation. The allelic ratio obtained for cDNA is normalized using that measured from genomic DNA, where the allelic ratio is expected to be 1:1 to correct for technical artifacts. Markers with a normalised allelic ratio significantly different to 1 indicate that the amount of transcript generated from the two chromosomes in the same cell is different, suggesting that the DNA variants associated with the phenotype have an effect on gene expression. Experimental controls should be used to confirm the results.
Cellular Biology, Issue 45, Gene expression, regulatory variant, haplotype, association study, primer extension, MALDI-TOF mass spectrometry, single nucleotide polymorphism, allele-specific
Right Ventricular Systolic Pressure Measurements in Combination with Harvest of Lung and Immune Tissue Samples in Mice
Institutions: New York University School of Medicine, Tuxedo, Vanderbilt University Medical Center, New York University School of Medicine.
The function of the right heart is to pump blood through the lungs, thus linking right heart physiology and pulmonary vascular physiology. Inflammation is a common modifier of heart and lung function, by elaborating cellular infiltration, production of cytokines and growth factors, and by initiating remodeling processes 1
Compared to the left ventricle, the right ventricle is a low-pressure pump that operates in a relatively narrow zone of pressure changes. Increased pulmonary artery pressures are associated with increased pressure in the lung vascular bed and pulmonary hypertension 2
. Pulmonary hypertension is often associated with inflammatory lung diseases, for example chronic obstructive pulmonary disease, or autoimmune diseases 3
. Because pulmonary hypertension confers a bad prognosis for quality of life and life expectancy, much research is directed towards understanding the mechanisms that might be targets for pharmaceutical intervention 4
. The main challenge for the development of effective management tools for pulmonary hypertension remains the complexity of the simultaneous understanding of molecular and cellular changes in the right heart, the lungs and the immune system.
Here, we present a procedural workflow for the rapid and precise measurement of pressure changes in the right heart of mice and the simultaneous harvest of samples from heart, lungs and immune tissues. The method is based on the direct catheterization of the right ventricle via the jugular vein in close-chested mice, first developed in the late 1990s as surrogate measure of pressures in the pulmonary artery5-13
. The organized team-approach facilitates a very rapid right heart catheterization technique. This makes it possible to perform the measurements in mice that spontaneously breathe room air. The organization of the work-flow in distinct work-areas reduces time delay and opens the possibility to simultaneously perform physiology experiments and harvest immune, heart and lung tissues.
The procedural workflow outlined here can be adapted for a wide variety of laboratory settings and study designs, from small, targeted experiments, to large drug screening assays. The simultaneous acquisition of cardiac physiology data that can be expanded to include echocardiography5,14-17
and harvest of heart, lung and immune tissues reduces the number of animals needed to obtain data that move the scientific knowledge basis forward. The procedural workflow presented here also provides an ideal basis for gaining knowledge of the networks that link immune, lung and heart function. The same principles outlined here can be adapted to study other or additional organs as needed.
Immunology, Issue 71, Medicine, Anatomy, Physiology, Cardiology, Surgery, Cardiovascular Abnormalities, Inflammation, Respiration Disorders, Immune System Diseases, Cardiac physiology, mouse, pulmonary hypertension, right heart function, lung immune response, lung inflammation, lung remodeling, catheterization, mice, tissue, animal model
Ultrasound Assessment of Endothelial-Dependent Flow-Mediated Vasodilation of the Brachial Artery in Clinical Research
Institutions: University of California, San Francisco, Veterans Affairs Medical Center, San Francisco, Veterans Affairs Medical Center, San Francisco.
The vascular endothelium is a monolayer of cells that cover the interior of blood vessels and provide both structural and functional roles. The endothelium acts as a barrier, preventing leukocyte adhesion and aggregation, as well as controlling permeability to plasma components. Functionally, the endothelium affects vessel tone.
Endothelial dysfunction is an imbalance between the chemical species which regulate vessel tone, thombroresistance, cellular proliferation and mitosis. It is the first step in atherosclerosis and is associated with coronary artery disease, peripheral artery disease, heart failure, hypertension, and hyperlipidemia.
The first demonstration of endothelial dysfunction involved direct infusion of acetylcholine and quantitative coronary angiography. Acetylcholine binds to muscarinic receptors on the endothelial cell surface, leading to an increase of intracellular calcium and increased nitric oxide (NO) production. In subjects with an intact endothelium, vasodilation was observed while subjects with endothelial damage experienced paradoxical vasoconstriction.
There exists a non-invasive, in vivo
method for measuring endothelial function in peripheral arteries using high-resolution B-mode ultrasound. The endothelial function of peripheral arteries is closely related to coronary artery function. This technique measures the percent diameter change in the brachial artery during a period of reactive hyperemia following limb ischemia.
This technique, known as endothelium-dependent, flow-mediated vasodilation (FMD) has value in clinical research settings. However, a number of physiological and technical issues can affect the accuracy of the results and appropriate guidelines for the technique have been published. Despite the guidelines, FMD remains heavily operator dependent and presents a steep learning curve. This article presents a standardized method for measuring FMD in the brachial artery on the upper arm and offers suggestions to reduce intra-operator variability.
Medicine, Issue 92, endothelial function, endothelial dysfunction, brachial artery, peripheral artery disease, ultrasound, vascular, endothelium, cardiovascular disease.
Assessment of Vascular Function in Patients With Chronic Kidney Disease
Institutions: University of Colorado, Denver, University of Colorado, Boulder.
Patients with chronic kidney disease (CKD) have significantly increased risk of cardiovascular disease (CVD) compared to the general population, and this is only partially explained by traditional CVD risk factors. Vascular dysfunction is an important non-traditional risk factor, characterized by vascular endothelial dysfunction (most commonly assessed as impaired endothelium-dependent dilation [EDD]) and stiffening of the large elastic arteries. While various techniques exist to assess EDD and large elastic artery stiffness, the most commonly used are brachial artery flow-mediated dilation (FMDBA
) and aortic pulse-wave velocity (aPWV), respectively. Both of these noninvasive measures of vascular dysfunction are independent predictors of future cardiovascular events in patients with and without kidney disease. Patients with CKD demonstrate both impaired FMDBA
, and increased aPWV. While the exact mechanisms by which vascular dysfunction develops in CKD are incompletely understood, increased oxidative stress and a subsequent reduction in nitric oxide (NO) bioavailability are important contributors. Cellular changes in oxidative stress can be assessed by collecting vascular endothelial cells from the antecubital vein and measuring protein expression of markers of oxidative stress using immunofluorescence. We provide here a discussion of these methods to measure FMDBA
, aPWV, and vascular endothelial cell protein expression.
Medicine, Issue 88, chronic kidney disease, endothelial cells, flow-mediated dilation, immunofluorescence, oxidative stress, pulse-wave velocity
Isolation of Pulmonary Artery Smooth Muscle Cells from Neonatal Mice
Institutions: Northwestern University Feinberg School of Medicine.
Pulmonary hypertension is a significant cause of morbidity and mortality in infants. Historically, there has been significant study of the signaling pathways involved in vascular smooth muscle contraction in PASMC from fetal sheep. While sheep make an excellent model of term pulmonary hypertension, they are very expensive and lack the advantage of genetic manipulation found in mice. Conversely, the inability to isolate PASMC from mice was a significant limitation of that system. Here we described the isolation of primary cultures of mouse PASMC from P7, P14, and P21 mice using a variation of the previously described technique of Marshall et al.26
that was previously used to isolate rat PASMC. These murine PASMC represent a novel tool for the study of signaling pathways in the neonatal period. Briefly, a slurry of 0.5% (w/v) agarose + 0.5% iron particles in M199 media is infused into the pulmonary vascular bed via the right ventricle (RV). The iron particles are 0.2 μM in diameter and cannot pass through the pulmonary capillary bed. Thus, the iron lodges in the small pulmonary arteries (PA). The lungs are inflated with agarose, removed and dissociated. The iron-containing vessels are pulled down with a magnet. After collagenase (80 U/ml) treatment and further dissociation, the vessels are put into a tissue culture dish in M199 media containing 20% fetal bovine serum (FBS), and antibiotics (M199 complete media) to allow cell migration onto the culture dish. This initial plate of cells is a 50-50 mixture of fibroblasts and PASMC. Thus, the pull down procedure is repeated multiple times to achieve a more pure PASMC population and remove any residual iron. Smooth muscle cell identity is confirmed by immunostaining for smooth muscle myosin and desmin.
Basic Protocol, Issue 80, Muscle, Smooth, Vascular, Cardiovascular Abnormalities, Hypertension, Pulmonary, vascular smooth muscle, pulmonary hypertension, development, phosphodiesterases, cGMP, immunostaining
Echocardiographic Assessment of the Right Heart in Mice
Institutions: Vanderbilt University Medical Center, Vanderbilt University Medical Center.
Transgenic and toxic models of pulmonary arterial hypertension (PAH) are widely used to study the pathophysiology of PAH and to investigate potential therapies. Given the expense and time involved in creating animal models of disease, it is critical that researchers have tools to accurately assess phenotypic expression of disease. Right ventricular dysfunction is the major manifestation of pulmonary hypertension. Echocardiography is the mainstay of the noninvasive assessment of right ventricular function in rodent models and has the advantage of clear translation to humans in whom the same tool is used. Published echocardiography protocols in murine models of PAH are lacking.
In this article, we describe a protocol for assessing RV and pulmonary vascular function in a mouse model of PAH with a dominant negative BMPRII mutation; however, this protocol is applicable to any diseases affecting the pulmonary vasculature or right heart. We provide a detailed description of animal preparation, image acquisition and hemodynamic calculation of stroke volume, cardiac output and an estimate of pulmonary artery pressure.
Medicine, Issue 81, Anatomy, Physiology, Biomedical Engineering, Cardiology, Cardiac Imaging Techniques, Echocardiography, Echocardiography, Doppler, Cardiovascular Physiological Processes, Cardiovascular System, Cardiovascular Diseases, Echocardiography, right ventricle, right ventricular function, pulmonary hypertension, Pulmonary Arterial Hypertension, transgenic models, hemodynamics, animal model
Experimental Protocol for Manipulating Plant-induced Soil Heterogeneity
Institutions: Case Western Reserve University.
Coexistence theory has often treated environmental heterogeneity as being independent of the community composition; however biotic feedbacks such as plant-soil feedbacks (PSF) have large effects on plant performance, and create environmental heterogeneity that depends on the community composition. Understanding the importance of PSF for plant community assembly necessitates understanding of the role of heterogeneity in PSF, in addition to mean PSF effects. Here, we describe a protocol for manipulating plant-induced soil heterogeneity. Two example experiments are presented: (1) a field experiment with a 6-patch grid of soils to measure plant population responses and (2) a greenhouse experiment with 2-patch soils to measure individual plant responses. Soils can be collected from the zone of root influence (soils from the rhizosphere and directly adjacent to the rhizosphere) of plants in the field from conspecific and heterospecific plant species. Replicate collections are used to avoid pseudoreplicating soil samples. These soils are then placed into separate patches for heterogeneous treatments or mixed for a homogenized treatment. Care should be taken to ensure that heterogeneous and homogenized treatments experience the same degree of soil disturbance. Plants can then be placed in these soil treatments to determine the effect of plant-induced soil heterogeneity on plant performance. We demonstrate that plant-induced heterogeneity results in different outcomes than predicted by traditional coexistence models, perhaps because of the dynamic nature of these feedbacks. Theory that incorporates environmental heterogeneity influenced by the assembling community and additional empirical work is needed to determine when heterogeneity intrinsic to the assembling community will result in different assembly outcomes compared with heterogeneity extrinsic to the community composition.
Environmental Sciences, Issue 85, Coexistence, community assembly, environmental drivers, plant-soil feedback, soil heterogeneity, soil microbial communities, soil patch
Telomere Length and Telomerase Activity; A Yin and Yang of Cell Senescence
Institutions: Albert Einstein College of Medicine , Albert Einstein College of Medicine , Albert Einstein College of Medicine .
Telomeres are repeating DNA sequences at the tip ends of the chromosomes that are diverse in length and in humans can reach a length of 15,000 base pairs. The telomere serves as a bioprotective mechanism of chromosome attrition at each cell division. At a certain length, telomeres become too short to allow replication, a process that may lead to chromosome instability or cell death. Telomere length is regulated by two opposing mechanisms: attrition and elongation. Attrition occurs as each cell divides. In contrast, elongation is partially modulated by the enzyme telomerase, which adds repeating sequences to the ends of the chromosomes. In this way, telomerase could possibly reverse an aging mechanism and rejuvenates cell viability. These are crucial elements in maintaining cell life and are used to assess cellular aging. In this manuscript we will describe an accurate, short, sophisticated and cheap method to assess telomere length in multiple tissues and species. This method takes advantage of two key elements, the tandem repeat of the telomere sequence and the sensitivity of the qRT-PCR to detect differential copy numbers of tested samples. In addition, we will describe a simple assay to assess telomerase activity as a complementary backbone test for telomere length.
Genetics, Issue 75, Molecular Biology, Cellular Biology, Medicine, Biomedical Engineering, Genomics, Telomere length, telomerase activity, telomerase, telomeres, telomere, DNA, PCR, polymerase chain reaction, qRT-PCR, sequencing, aging, telomerase assay
Mesenteric Artery Contraction and Relaxation Studies Using Automated Wire Myography
Institutions: North Carolina Central University, Durham, North Carolina Central University, Durham, Wake Forest University School of Medicine.
Proximal resistance vessels, such as the mesenteric arteries, contribute substantially to the peripheral resistance. These small vessels of between 100-400 μm in diameter function primarily in directing blood flow to various organs according to the overall requirements of the body. The rat mesenteric artery has a diameter greater than 100 μm. The myography technique, first described by Mulvay and Halpern1
, was based on the method proposed by Bevan and Osher2
. The technique provides information about small vessels under isometric conditions, where substantial shortening of the muscle preparation is prevented. Since force production and sensitivity of vessels to different agonists is dependent on the extent of stretch, according to active tension-length relation, it is essential to conduct contraction studies under isometric conditions to prevent compliance of the mounting wires. Stainless steel wires are preferred to tungsten wires because of oxidation of the latter, which affects recorded responses3
.The technique allows for the comparison of agonist-induced contractions of mounted vessels to obtain evidence for normal function of vascular smooth muscle cell receptors.
We have shown in several studies that isolated mesenteric arteries that are contracted with phenylyephrine relax upon addition of cumulative concentrations of extracellular calcium (Ca2+e
). The findings led us to conclude that perivascular sensory nerves, which express the G protein-coupled Ca2+
-sensing receptor (CaR), mediate this vasorelaxation response. Using an automated wire myography method, we show here that mesenteric arteries from Wistar, Dahl salt-sensitive(DS) and Dahl salt-resistant (DR) rats respond differently to Ca2+e
. Tissues from Wistar rats showed higher Ca2+
-sensitivity compared to those from DR and DS. Reduced CaR expression in mesenteric arteries from DS rats correlates with reduced Ca2+e
-induced relaxation of isolated, pre-contracted arteries. The data suggest that the CaR is required for relaxation of mesenteric arteries under increased adrenergic tone, as occurs in hypertension, and indicate an inherent defect in the CaR signaling pathway in Dahl animals, which is much more severe in DS.
The method is useful in determining vascular reactivity ex vivo
in mesenteric resistance arteries and similar small blood vessels and comparisons between different agonists and/or antagonists can be easily and consistently assessed side-by-side6,7,8
Medicine, Issue 55, cardiovascular, resistant arteries, contraction, relaxation, myography
Laser-Induced Chronic Ocular Hypertension Model on SD Rats
Institutions: The University of Hong Kong - HKU.
Glaucoma is one of the major causes of blindness in the world. Elevated intraocular pressure is a major risk factor. Laser photocoagulation induced ocular hypertension is one of the well established animal models. This video demonstrates how to induce ocular hypertension by Argon laser photocoagulation in rat.
Neuroscience, Issue 10, glaucoma, ocular hypertension, rat
A Laser-induced Mouse Model of Chronic Ocular Hypertension to Characterize Visual Defects
Institutions: Northwestern University, Northwestern University.
Glaucoma, frequently associated with elevated intraocular pressure (IOP), is one of the leading causes of blindness. We sought to establish a mouse model of ocular hypertension to mimic human high-tension glaucoma. Here laser illumination is applied to the corneal limbus to photocoagulate the aqueous outflow, inducing angle closure. The changes of IOP are monitored using a rebound tonometer before and after the laser treatment. An optomotor behavioral test is used to measure corresponding changes in visual capacity. The representative result from one mouse which developed sustained IOP elevation after laser illumination is shown. A decreased visual acuity and contrast sensitivity is observed in this ocular hypertensive mouse. Together, our study introduces a valuable model system to investigate neuronal degeneration and the underlying molecular mechanisms in glaucomatous mice.
Medicine, Issue 78, Biomedical Engineering, Neurobiology, Anatomy, Physiology, Neuroscience, Cellular Biology, Molecular Biology, Ophthalmology, Retinal Neurons, Retinal Neurons, Retinal Ganglion Cells, Neurodegenerative Diseases, Ocular Hypertension, Retinal Degeneration, Vision Tests, Visual Acuity, Eye Diseases, Retinal Ganglion Cell (RGC), Ocular Hypertension, Laser Photocoagulation, Intraocular pressure (IOP), Tonometer; Visual Acuity, Contrast Sensitivity, Optomotor, animal model
Driving Simulation in the Clinic: Testing Visual Exploratory Behavior in Daily Life Activities in Patients with Visual Field Defects
Institutions: Universitätsmedizin Charité, Universitätsmedizin Charité, Humboldt Universität zu Berlin.
Patients suffering from homonymous hemianopia after infarction of the posterior cerebral artery (PCA) report different degrees of constraint in daily life, despite similar visual deficits. We assume this could be due to variable development of compensatory strategies such as altered visual scanning behavior. Scanning compensatory therapy (SCT) is studied as part of the visual training after infarction next to vision restoration therapy. SCT consists of learning to make larger eye movements into the blind field enlarging the visual field of search, which has been proven to be the most useful strategy1
, not only in natural search tasks but also in mastering daily life activities2
. Nevertheless, in clinical routine it is difficult to identify individual levels and training effects of compensatory behavior, since it requires measurement of eye movements in a head unrestrained condition. Studies demonstrated that unrestrained head movements alter the visual exploratory behavior compared to a head-restrained laboratory condition3
. Martin et al.4
and Hayhoe et al.5
showed that behavior demonstrated in a laboratory setting cannot be assigned easily to a natural condition. Hence, our goal was to develop a study set-up which uncovers different compensatory oculomotor strategies quickly in a realistic testing situation: Patients are tested in the clinical environment in a driving simulator. SILAB software (Wuerzburg Institute for Traffic Sciences GmbH (WIVW)
) was used to program driving scenarios of varying complexity and recording the driver's performance. The software was combined with a head mounted infrared video pupil tracker, recording head- and eye-movements (EyeSeeCam, University of Munich Hospital, Clinical Neurosciences).
The positioning of the patient in the driving simulator and the positioning, adjustment and calibration of the camera is demonstrated. Typical performances of a patient with and without compensatory strategy and a healthy control are illustrated in this pilot study. Different oculomotor behaviors (frequency and amplitude of eye- and head-movements) are evaluated very quickly during the drive itself by dynamic overlay pictures indicating where the subjects gaze is located on the screen, and by analyzing the data. Compensatory gaze behavior in a patient leads to a driving performance comparable to a healthy control, while the performance of a patient without compensatory behavior is significantly worse. The data of eye- and head-movement-behavior as well as driving performance are discussed with respect to different oculomotor strategies and in a broader context with respect to possible training effects throughout the testing session and implications on rehabilitation potential.
Medicine, Issue 67, Neuroscience, Physiology, Anatomy, Ophthalmology, compensatory oculomotor behavior, driving simulation, eye movements, homonymous hemianopia, stroke, visual field defects, visual field enlargement
Training Synesthetic Letter-color Associations by Reading in Color
Institutions: University of Amsterdam.
Synesthesia is a rare condition in which a stimulus from one modality automatically and consistently triggers unusual sensations in the same and/or other modalities. A relatively common and well-studied type is grapheme-color synesthesia, defined as the consistent experience of color when viewing, hearing and thinking about letters, words and numbers. We describe our method for investigating to what extent synesthetic associations between letters and colors can be learned by reading in color in nonsynesthetes. Reading in color is a special method for training associations in the sense that the associations are learned implicitly while the reader reads text as he or she normally would and it does not require explicit computer-directed training methods. In this protocol, participants are given specially prepared books to read in which four high-frequency letters are paired with four high-frequency colors. Participants receive unique sets of letter-color pairs based on their pre-existing preferences for colored letters. A modified Stroop task is administered before and after reading in order to test for learned letter-color associations and changes in brain activation. In addition to objective testing, a reading experience questionnaire is administered that is designed to probe for differences in subjective experience. A subset of questions may predict how well an individual learned the associations from reading in color. Importantly, we are not claiming that this method will cause each individual to develop grapheme-color synesthesia, only that it is possible for certain individuals to form letter-color associations by reading in color and these associations are similar in some aspects to those seen in developmental grapheme-color synesthetes. The method is quite flexible and can be used to investigate different aspects and outcomes of training synesthetic associations, including learning-induced changes in brain function and structure.
Behavior, Issue 84, synesthesia, training, learning, reading, vision, memory, cognition
Design and Construction of an Urban Runoff Research Facility
Institutions: Texas A&M University, The Scotts Miracle-Gro Company.
As the urban population increases, so does the area of irrigated urban landscape. Summer water use in urban areas can be 2-3x winter base line water use due to increased demand for landscape irrigation. Improper irrigation practices and large rainfall events can result in runoff from urban landscapes which has potential to carry nutrients and sediments into local streams and lakes where they may contribute to eutrophication. A 1,000 m2
facility was constructed which consists of 24 individual 33.6 m2
field plots, each equipped for measuring total runoff volumes with time and collection of runoff subsamples at selected intervals for quantification of chemical constituents in the runoff water from simulated urban landscapes. Runoff volumes from the first and second trials had coefficient of variability (CV) values of 38.2 and 28.7%, respectively. CV values for runoff pH, EC, and Na concentration for both trials were all under 10%. Concentrations of DOC, TDN, DON, PO4
, and Ca2+
had CV values less than 50% in both trials. Overall, the results of testing performed after sod installation at the facility indicated good uniformity between plots for runoff volumes and chemical constituents. The large plot size is sufficient to include much of the natural variability and therefore provides better simulation of urban landscape ecosystems.
Environmental Sciences, Issue 90, urban runoff, landscapes, home lawns, turfgrass, St. Augustinegrass, carbon, nitrogen, phosphorus, sodium
Development of a Virtual Reality Assessment of Everyday Living Skills
Institutions: NeuroCog Trials, Inc., Duke-NUS Graduate Medical Center, Duke University Medical Center, Fox Evaluation and Consulting, PLLC, University of Miami Miller School of Medicine.
Cognitive impairments affect the majority of patients with schizophrenia and these impairments predict poor long term psychosocial outcomes. Treatment studies aimed at cognitive impairment in patients with schizophrenia not only require demonstration of improvements on cognitive tests, but also evidence that any cognitive changes lead to clinically meaningful improvements. Measures of “functional capacity” index the extent to which individuals have the potential to perform skills required for real world functioning. Current data do not support the recommendation of any single instrument for measurement of functional capacity. The Virtual Reality Functional Capacity Assessment Tool (VRFCAT) is a novel, interactive gaming based measure of functional capacity that uses a realistic simulated environment to recreate routine activities of daily living. Studies are currently underway to evaluate and establish the VRFCAT’s sensitivity, reliability, validity, and practicality. This new measure of functional capacity is practical, relevant, easy to use, and has several features that improve validity and sensitivity of measurement of function in clinical trials of patients with CNS disorders.
Behavior, Issue 86, Virtual Reality, Cognitive Assessment, Functional Capacity, Computer Based Assessment, Schizophrenia, Neuropsychology, Aging, Dementia
Getting to Compliance in Forced Exercise in Rodents: A Critical Standard to Evaluate Exercise Impact in Aging-related Disorders and Disease
Institutions: Louisiana State University Health Sciences Center.
There is a major increase in the awareness of the positive impact of exercise on improving several disease states with neurobiological basis; these include improving cognitive function and physical performance. As a result, there is an increase in the number of animal studies employing exercise. It is argued that one intrinsic value of forced exercise is that the investigator has control over the factors that can influence the impact of exercise on behavioral outcomes, notably exercise frequency, duration, and intensity of the exercise regimen. However, compliance in forced exercise regimens may be an issue, particularly if potential confounds of employing foot-shock are to be avoided. It is also important to consider that since most cognitive and locomotor impairments strike in the aged individual, determining impact of exercise on these impairments should consider using aged rodents with a highest possible level of compliance to ensure minimal need for test subjects. Here, the pertinent steps and considerations necessary to achieve nearly 100% compliance to treadmill exercise in an aged rodent model will be presented and discussed. Notwithstanding the particular exercise regimen being employed by the investigator, our protocol should be of use to investigators that are particularly interested in the potential impact of forced exercise on aging-related impairments, including aging-related Parkinsonism and Parkinson’s disease.
Behavior, Issue 90, Exercise, locomotor, Parkinson’s disease, aging, treadmill, bradykinesia, Parkinsonism
Measuring Oral Fatty Acid Thresholds, Fat Perception, Fatty Food Liking, and Papillae Density in Humans
Institutions: Deakin University.
Emerging evidence from a number of laboratories indicates that humans have the ability to identify fatty acids in the oral cavity, presumably via fatty acid receptors housed on taste cells. Previous research has shown that an individual's oral sensitivity to fatty acid, specifically oleic acid (C18:1) is associated with body mass index (BMI), dietary fat consumption, and the ability to identify fat in foods. We have developed a reliable and reproducible method to assess oral chemoreception of fatty acids, using a milk and C18:1 emulsion, together with an ascending forced choice triangle procedure. In parallel, a food matrix has been developed to assess an individual's ability to perceive fat, in addition to a simple method to assess fatty food liking. As an added measure tongue photography is used to assess papillae density, with higher density often being associated with increased taste sensitivity.
Neuroscience, Issue 88, taste, overweight and obesity, dietary fat, fatty acid, diet, fatty food liking, detection threshold
Mapping Bacterial Functional Networks and Pathways in Escherichia Coli using Synthetic Genetic Arrays
Institutions: University of Toronto, University of Toronto, University of Regina.
Phenotypes are determined by a complex series of physical (e.g.
protein-protein) and functional (e.g.
gene-gene or genetic) interactions (GI)1
. While physical interactions can indicate which bacterial proteins are associated as complexes, they do not necessarily reveal pathway-level functional relationships1. GI screens, in which the growth of double mutants bearing two deleted or inactivated genes is measured and compared to the corresponding single mutants, can illuminate epistatic dependencies between loci and hence provide a means to query and discover novel functional relationships2
. Large-scale GI maps have been reported for eukaryotic organisms like yeast3-7
, but GI information remains sparse for prokaryotes8
, which hinders the functional annotation of bacterial genomes. To this end, we and others have developed high-throughput quantitative bacterial GI screening methods9, 10
Here, we present the key steps required to perform quantitative E. coli
Synthetic Genetic Array (eSGA) screening procedure on a genome-scale9
, using natural bacterial conjugation and homologous recombination to systemically generate and measure the fitness of large numbers of double mutants in a colony array format.
Briefly, a robot is used to transfer, through conjugation, chloramphenicol (Cm) - marked mutant alleles from engineered Hfr (High frequency of recombination) 'donor strains' into an ordered array of kanamycin (Kan) - marked F- recipient strains. Typically, we use loss-of-function single mutants bearing non-essential gene deletions (e.g.
the 'Keio' collection11
) and essential gene hypomorphic mutations (i.e.
alleles conferring reduced protein expression, stability, or activity9, 12, 13
) to query the functional associations of non-essential and essential genes, respectively. After conjugation and ensuing genetic exchange mediated by homologous recombination, the resulting double mutants are selected on solid medium containing both antibiotics. After outgrowth, the plates are digitally imaged and colony sizes are quantitatively scored using an in-house automated image processing system14
. GIs are revealed when the growth rate of a double mutant is either significantly better or worse than expected9
. Aggravating (or negative) GIs often result between loss-of-function mutations in pairs of genes from compensatory pathways that impinge on the same essential process2
. Here, the loss of a single gene is buffered, such that either single mutant is viable. However, the loss of both pathways is deleterious and results in synthetic lethality or sickness (i.e.
slow growth). Conversely, alleviating (or positive) interactions can occur between genes in the same pathway or protein complex2
as the deletion of either gene alone is often sufficient to perturb the normal function of the pathway or complex such that additional perturbations do not reduce activity, and hence growth, further. Overall, systematically identifying and analyzing GI networks can provide unbiased, global maps of the functional relationships between large numbers of genes, from which pathway-level information missed by other approaches can be inferred9
Genetics, Issue 69, Molecular Biology, Medicine, Biochemistry, Microbiology, Aggravating, alleviating, conjugation, double mutant, Escherichia coli, genetic interaction, Gram-negative bacteria, homologous recombination, network, synthetic lethality or sickness, suppression
Inducing Plasticity of Astrocytic Receptors by Manipulation of Neuronal Firing Rates
Institutions: University of California Riverside, University of California Riverside, University of California Riverside.
Close to two decades of research has established that astrocytes in situ
and in vivo
express numerous G protein-coupled receptors (GPCRs) that can be stimulated by neuronally-released transmitter. However, the ability of astrocytic receptors to exhibit plasticity in response to changes in neuronal activity has received little attention. Here we describe a model system that can be used to globally scale up or down astrocytic group I metabotropic glutamate receptors (mGluRs) in acute brain slices. Included are methods on how to prepare parasagittal hippocampal slices, construct chambers suitable for long-term slice incubation, bidirectionally manipulate neuronal action potential frequency, load astrocytes and astrocyte processes with fluorescent Ca2+
indicator, and measure changes in astrocytic Gq GPCR activity by recording spontaneous and evoked astrocyte Ca2+
events using confocal microscopy. In essence, a “calcium roadmap” is provided for how to measure plasticity of astrocytic Gq GPCRs. Applications of the technique for study of astrocytes are discussed. Having an understanding of how astrocytic receptor signaling is affected by changes in neuronal activity has important implications for both normal synaptic function as well as processes underlying neurological disorders and neurodegenerative disease.
Neuroscience, Issue 85, astrocyte, plasticity, mGluRs, neuronal Firing, electrophysiology, Gq GPCRs, Bolus-loading, calcium, microdomains, acute slices, Hippocampus, mouse
An Affordable HIV-1 Drug Resistance Monitoring Method for Resource Limited Settings
Institutions: University of KwaZulu-Natal, Durban, South Africa, Jembi Health Systems, University of Amsterdam, Stanford Medical School.
HIV-1 drug resistance has the potential to seriously compromise the effectiveness and impact of antiretroviral therapy (ART). As ART programs in sub-Saharan Africa continue to expand, individuals on ART should be closely monitored for the emergence of drug resistance. Surveillance of transmitted drug resistance to track transmission of viral strains already resistant to ART is also critical. Unfortunately, drug resistance testing is still not readily accessible in resource limited settings, because genotyping is expensive and requires sophisticated laboratory and data management infrastructure. An open access genotypic drug resistance monitoring method to manage individuals and assess transmitted drug resistance is described. The method uses free open source software for the interpretation of drug resistance patterns and the generation of individual patient reports. The genotyping protocol has an amplification rate of greater than 95% for plasma samples with a viral load >1,000 HIV-1 RNA copies/ml. The sensitivity decreases significantly for viral loads <1,000 HIV-1 RNA copies/ml. The method described here was validated against a method of HIV-1 drug resistance testing approved by the United States Food and Drug Administration (FDA), the Viroseq genotyping method. Limitations of the method described here include the fact that it is not automated and that it also failed to amplify the circulating recombinant form CRF02_AG from a validation panel of samples, although it amplified subtypes A and B from the same panel.
Medicine, Issue 85, Biomedical Technology, HIV-1, HIV Infections, Viremia, Nucleic Acids, genetics, antiretroviral therapy, drug resistance, genotyping, affordable
5/6th Nephrectomy in Combination with High Salt Diet and Nitric Oxide Synthase Inhibition to Induce Chronic Kidney Disease in the Lewis Rat
Institutions: University Medical Center Utrecht.
Chronic kidney disease (CKD) is a global problem. Slowing CKD progression is a major health priority. Since CKD is characterized by complex derangements of homeostasis, integrative animal models are necessary to study development and progression of CKD. To study development of CKD and novel therapeutic interventions in CKD, we use the 5/6th nephrectomy ablation model, a well known experimental model of progressive renal disease, resembling several aspects of human CKD. The gross reduction in renal mass causes progressive glomerular and tubulo-interstitial injury, loss of remnant nephrons and development of systemic and glomerular hypertension. It is also associated with progressive intrarenal capillary loss, inflammation and glomerulosclerosis. Risk factors for CKD invariably impact on endothelial function. To mimic this, we combine removal of 5/6th of renal mass with nitric oxide (NO) depletion and a high salt diet. After arrival and acclimatization, animals receive a NO synthase inhibitor (NG-nitro-L-Arginine) (L-NNA) supplemented to drinking water (20 mg/L) for a period of 4 weeks, followed by right sided uninephrectomy. One week later, a subtotal nephrectomy (SNX) is performed on the left side. After SNX, animals are allowed to recover for two days followed by LNNA in drinking water (20 mg/L) for a further period of 4 weeks. A high salt diet (6%), supplemented in ground chow (see time line Figure 1
), is continued throughout the experiment. Progression of renal failure is followed over time by measuring plasma urea, systolic blood pressure and proteinuria. By six weeks after SNX, renal failure has developed. Renal function is measured using 'gold standard' inulin and para-amino hippuric acid (PAH) clearance technology. This model of CKD is characterized by a reduction in glomerular filtration rate (GFR) and effective renal plasma flow (ERPF), hypertension (systolic blood pressure>150 mmHg), proteinuria (> 50 mg/24 hr) and mild uremia (>10 mM). Histological features include tubulo-interstitial damage reflected by inflammation, tubular atrophy and fibrosis and focal glomerulosclerosis leading to massive reduction of healthy glomeruli within the remnant population (<10%). Follow-up until 12 weeks after SNX shows further progression of CKD.
Medicine, Issue 77, Anatomy, Physiology, Biomedical Engineering, Surgery, Nephrology Kidney Diseases, Glomerular Filtration Rate, Hemodynamics, Surgical Procedures, Operative, Chronic kidney disease, remnant kidney, chronic renal diseases, kidney, Nitric Oxide depletion, NO depletion, high salt diet, proteinuria, uremia, glomerulosclerosis, transgenic rat, animal model | <urn:uuid:99556f84-a463-4a2c-8edb-938a54ab5b32> | CC-MAIN-2016-50 | http://www.jove.com/visualize/abstract/23152860/effect-environmental-lifestyle-factors-on-hypertension-shimane-cohre | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542695.22/warc/CC-MAIN-20161202170902-00116-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.906926 | 9,593 | 3.3125 | 3 |
One hundred and fifteen years ago today, Wilhelm Röntgen discovered that certain electromagnetic rays – X-rays – could form images on fluorescent plates. They turned out to be one of the most significant medical advances in history. Our gallery takes a look at some of their uses.
Hand with wedding ring
On 8 November 1895, Wilhelm Conrad Röntgen, a professor of physics at the University of Würzburg, Bavaria, discovered that X-rays could be used to form images.
In experiments with beams of electrons inside a covered vacuum tube, Röntgen noticed that a nearby fluorescent screen glowed when the current was passed. He attributed the glowing to an unknown type of radiation passing through the tube's cover, which he called "X radiation", hence the term X-rays.
A week after his discovery, Röntgen took this X-ray of his wife's hand, substituting a photographic plate for the fluorescent screen to capture the image. Her wedding ring can be seen clearly.
(Image: Radiology Centennial)
X-ray diffraction picture of DNA
Rosalind Franklin took this famous image of DNA while working at King's College London in 1952.
X-rays passing through a DNA sample get deflected by its atoms and scatter in different directions, and a piece of photographic film behind the sample will record this diffraction pattern. According to the laws of diffraction, X-rays moving through a helical shape diffract at angles perpendicular to the helix, creating the "X" shaped pattern of Franklin's photograph.
When Franklin's boss, Maurice Wilkins, showed this photo to James Watson, Watson instantly recognised the telltale X shape. The photo led him to discover with Francis Crick that DNA is a double helix.
For Egyptologists, X-rays are a valuable non-destructive method of peering inside ancient mummies to reveal the anatomy beneath the bindings.
As well as people, animals were mummified in Egypt for thousands of years – as offerings to gods with an animal form, or to allow a favourite pet into the afterlife with their owner.
This mummified dog would have been intended as an offering to the jackal-headed god Anubis, who was associated with the process of mummification and the afterlife.
(Image: Thierry Berrod/Mona Lisa Production/SPL)
A bullet in the foot
A Mauser bullet is lodged between the metatarsal bones of the big and second toes of a soldier's foot in this X-ray, taken during the Boer war of 1899 to 1902. Though the bullet didn't break any bones, the soldier did suffer from other foot problems. The deformed phalanges were possibly the result of long marches or tight boots.
The soldier would have placed his foot above a photographic plate while an open electric discharge tube emitted X-rays to form the image.
The Boer war saw the wide application of modern surgical, medical and nursing procedures. X-rays were used to locate bullets and shrapnel and to diagnose fractures, and antiseptics saved the lives of many wounded soldiers who would previously have died of infections.
(Image: Barcroft Media/Getty Images)
This Rapiscan Secure 1000 scanner at Manchester airport, UK, uses backscatter X-rays to reveal what's under a person's clothes. The image is then used to detect concealed, potentially dangerous objects.
Conventional scanners transmit X-rays through the target to detect hard and soft materials by the variation in transmission, but backscatter X-ray scanners detect only radiation that reflects back from the target. As the backscatter pattern depends on the material reflecting it, the technology can discern organic material from metal, for example.
Widespread introduction of the scanners was delayed this year amid fears for personal privacy.
(Image: Rii Schroer/Rex Features)
Artist Nick Veasey uses X-rays to reveal what the world is like under the surface. He creates most of his images in a bespoke radiation-proof concrete structure which contains several X-ray machines. If an object is too large to appear on one piece of film, he uses several.
This image is composed of 500 separate exposures.
(Image: Untitled X-Ray/Nick Veasey/Getty)
Artist Hugh Turvey first used X-rays in 1996 to image a human skull as a favour to a musician friend who needed an image for an album cover. Here, Turvey has X-rayed a row of hyacinth plants at various stages of development and flowering, colouring them to form this image.
Turvey, who trained as a designer before studying photography, continues to experiment with modern X-ray and medical imaging technologies to form images of everyday objects.
(Image: Hugh Turvey/GustoImages/SPL) | <urn:uuid:5cf303dd-2c51-484b-b3d0-080e0371bfd1> | CC-MAIN-2022-27 | https://www.newscientist.com/gallery/happy-birthday-x-rays/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103940327.51/warc/CC-MAIN-20220701095156-20220701125156-00072.warc.gz | en | 0.952246 | 1,025 | 3.984375 | 4 |
In the early months of 1941, Australian and other Imperial forces were defeated in Greece and Crete. At the same time, German troops landed in North Africa and began pushing back the allies from Bardia and other bases they had recently captured from the Italians. In April, large-scale German air raids were launched against London and other major British cities. At this stage of the Second World War, the German Army had many victories to its credit and no major losses. An invasion of Britain seemed imminent.
On April 7, 1941, the Sydney Morning Herald carried two headlines side-by-side on its first news page. One read “Germany Invades Greece and Yugoslavia” and its story said Australian troops were about to come up for the first time against the fearsome Panzer tanks and Stuka dive bombers. The other headline read “Railway Repair Shops to Strike. 2000 Men Affected”. Its story carried reports of rail and gas strikes in New South Wales and strikes by ironworkers making machinery for ship building in Victoria. The month before, workers at the Footscray Munitions Factory began a go-slow campaign that reduced production of metal for shell and cartridge cases by 20 per cent. There was another strike by ironworkers in the munitions annex of Amalgamated Wireless Ltd and the unions in the Lithgow Small Arms factory threatened to down tools.
On April 18, 1941, the Germans launched the heaviest air raid of the war on London. They also advanced in North Africa and captured Belgrade. In Greece, outnumbered Australian and allied troops were pushed into the sea. By the end of the month, German forces entered Athens. “All this,” writes Hal Colebatch, “was being reported in detail in Australia and it was obvious the allies were involved in major military disasters.” Nonetheless, back in New South Wales, the whole gas industry came out on strike on April 16, involving 3000 men. This had a direct effect on the manufacture of iron, steel and munitions. At the same time, the New South Wales Combined Unions Strike Committee enforced a ban on all coke made at the Mortlake Sydney works, going so far as to ban hospitals from using it to produce hot water.
In short, irrespective of the danger to Australian troops, naval ships and national security in these, the darkest days of the war, before the United States entered and when Britain stood alone in Europe facing Nazi Germany, there was a major conflict on the home front between unions and their employers, or, more accurately, between unions and the rest of Australian society, especially the Australian armed forces and the Australian government, which in October 1941 became a Labor government.
When some people hear such anecdotes recounted from Colebatch’s book Australia’s Secret War they nod and say they knew that the Communist Party of Australia and the unions it controlled, especially the seamen’s and waterside workers, supported the Nazi-Soviet Non-Aggression Pact signed in 1939, and were against the war until Hitler broke the pact and invaded the USSR in June 1941. Colebatch shows, however, there was much more to it than this.
For a start, while the number of working days lost in strikes did fall between 1941 and 1942—from 984,174 to 387,195 days—the count then rose sharply to 990,151 in 1943, 912,752 in 1944, and to an all-time record of 2.12 million days lost in 1945. Moreover, it wasn’t just the communist-controlled unions that were involved. A number of other key unions affiliated with the Labor Party and the ACTU were also prominent in their activism. Indeed, Colebatch argues that the opportunities to strike in many industries increased as the industries grew in size during the progress of the war, especially in strategically vital industries such as coal-mining, thereby directly affecting electricity generation, blast furnace operations and the whole of Australia’s productive, munitions-making and defence capacity. The unions in those industries eagerly exploited their position—irrespective of the cost to the national interest or to the defence of their country. He writes:
The policy of maximum possible strikes and obstruction, as well as not being limited in place, was not limited in time and went on from the beginning of the war to the end, and beyond. The strikes were not the work of a handful of men, but appear frequently to have been nationally co-ordinated and involved many thousands.
Many who observed the militant unionists’ behaviour, especially on the waterfront, could not understand them: their actions were patently putting at risk not only the men and women of the fighting services, but also themselves and their own families, as well as damaging what was plainly the global cause of democracy against the tyrannies of Nazi Germany and Japan. They could not have been simply after more money because, as Colebatch points out, others from a similar socio-economic background behaved with self-sacrificing heroism and, for minimum wages, offered their lives to defend their country, their families, democracy and their civilisation. “The high quality and courage of Australian servicemen—many from similar backgrounds [as the unionists]—was recognised all over the world.”
The behaviour of the striking unionists cannot be explained in terms of class war or class solidarity—the direct and obvious victims were ordinary servicemen, largely fellow members of what used to be called the working classes. This was not only pointed out again and again by Menzies, Curtin and other leaders, but was obvious to everybody, including the women at the Orange small arms plant who refused to go on strike and pelted union leaders with tomatoes and eggs.
So why would so many stoop to jeopardising the ability of their own country to defend itself, since it was not only bosses and employers whose lives were at risk from military defeat, but every member of the society, not least themselves? Colebatch canvasses no fewer than twelve different reasons for the incidence of wartime strikes—from a long-term pacifist element in the Labor Party to the growing power of communist union officials during the war—and finds they all contain some elements of truth, and that different factors were important at different times. However, he devotes his final chapter to examining a factor that, far from being confined to the generations of the first half of the twentieth century, remains alive and well today, especially when the politics of the Left now depends so greatly on constructing coalitions of groups bound together by a sense of victimisation.
Adapting some recent writings by the late Kenneth Minogue on modern gender politics, Colebatch argues the members of militant unions in the Second World War persuaded themselves they were a victimised, and therefore morally privileged group, exempt from ordinary obligations of moral behaviour. This form of politics, he argues, operates at the level of psychic collectiveness to exploit indignation and cultivate righteousness. In the case of those unions in Australia with communist or far Left leadership this was reinforced by the discipline and praxis of a highly organised political party with a comprehensive ideology—“political ideology and psychic collectiveness are virtually made for one another”, Colebatch observes. “When it becomes entrenched, ‘identity’ politics acts as a form of fundamentalism in which every judgment must begin from a supposedly essential self-identification as a member of a supposedly oppressed group.”
It may be that the strikers saw themselves as a kind of aristocracy and the servicemen and women as a kind of helot class or puppets of capitalism whose lives were of no consequence—which is really to say in slightly different terms that they saw the world, and political issues of life and death, entirely from the point of their unionist identity.
Overall, the Australian industrial experience in the Second World War and its aftermath is an illustration of the danger of identity politics when invoked by politicians to build constituencies based on race, ethnicity, gender or some other distinct and fundamental “identity”. Identity politics has, at its centre, a moral relativism that not only gives members a sense of moral superiority but also approves them doing to others what they would hate being done to themselves. In short, fundamentalist identity politics based on “victim” groups is inimical to civic culture. Colebatch concludes:
Such politics appear to produce human beings with a defective ethical sense and incomplete conception of the world, who, furthermore, if they perceive any challenge to their “identity”, are easily capable of acting in ways incompatible with the long-term well-being of their community, their families and themselves.
* * *
I am pleased to report that Quadrant published this book in October and since then our office has been overwhelmed with sales, so much so that in early November we ordered a reprint. We were fortunate to have some valuable publicity from Miranda Devine and Alan Jones, but the majority of sales, both online and in bookshops, have come from word of mouth, suggesting these events have long been a deep-seated burning issue in the folk memory of many Australians. We are glad to have helped bring them to the surface. | <urn:uuid:5a19ba07-96de-46a3-9e39-4b6285db9aa2> | CC-MAIN-2020-24 | https://quadrant.org.au/magazine/2013/12/war-home/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388758.12/warc/CC-MAIN-20200525130036-20200525160036-00248.warc.gz | en | 0.976365 | 1,876 | 3.21875 | 3 |
Genetic modification of food has come under severe criticism from the scientific community as new health risks are being discovered. Do genetically modified vaccines carry any less risk? The study below outlines just a few of the unanswered questions about one of the genetically engineered vaccines currently in use, namely Gardasil®.
Dr. Sin Hang Lee of Milford Hospital recently published an article in The Journal of Inorganic Biochemistry entitled, Detection of human papillomavirus (HPV) L1 gene DNA possibly bound to particulate aluminum adjuvant in the HPV vaccine Gardasil®.
According to Dr. Lee’s research (sponsored by SaneVax Inc.), during the manufacture of Gardasil, Merck may have inadvertently created a new chemical compound composed of HPV L1 gene fragments chemically bound to the aluminum nanoparticles of the AAHS adjuvant used in the vaccine.
If this is true, the toxicity of this chemical has not been tested. No one knows what the potential health consequences the injection of this ‘ingredient’ may be.
A total of 16 samples of Gardasil® received from Australia, Bulgaria, France, India, New Zealand, Poland, Russia, Spain and the United States were found to contain fragments of HPV-18-L1 gene DNA which was readily detected in 15 of 16 samples tested, or HPV-11-L1 gene DNA, or a mixture of both. After submission of the manuscript, HPV-16-L1 gene fragments were also detected among these samples by a special protocol, Dr. Lee noted in his report.
Dr. Lee stated:
Although the U.S. Food and Drug Administration recently announced that Gardasil® indeed does contain recombinant HPV L1-specific DNA fragments, the physical condition(s) of these HPV DNA fragments in the final vaccine product has not been characterized.
Dr. Lee presented experimental evidence to assert that the binding mechanism between the HPV L1 gene DNA and the amorphous aluminum hydroxyphosphate sulfate (AAHS) nanoparticles in Gardasil® is of a chemical nature through ligand exchange of phosphate for hydroxyl, independent of the electrostatic forces. When aluminum (Al3+) and DNA interact, the binding site for Al3+ on the DNA chains is the phosphate groups on the DNA backbones.
For the average medical consumer, if the bond between the DNA and aluminum were electrostatic, it would be much like when you rub a balloon against your head until the static electricity builds up to the point where you can stick the balloon to a wall. As you may have noticed, given a short period of time, the balloon loses the static electric charge and falls off the wall. This is much the same as a vaccine in which the bond between the antigen and adjuvant is electrostatic. Once the vaccine is injected, the recipient’s normal pH level reduces the electrostatic attraction making the antigen and adjuvant separate from each other.
On the other hand, if the bond between the DNA and aluminum is chemical, it is more like taking a blob of super-glue and sticking the balloon to the wall. In this instance, no one knows how long the bond will remain intact.
The short-term and long-term impact of the residual fragments of HPV L1 gene DNA, or plasmid DNA, if chemically bound to the mineral aluminum of AAHS nanoparticles is largely unknown and warrants further investigation.
In Sept 2011, the SaneVax Team informed the FDA that HPV DNA fragments had been found possibly attached to the aluminum adjuvant in 100% of Gardasil samples tested by Dr. Sin Hang Lee of Milford Hospital.
The FDA response included the following statement with no references to back it up:
Recombinant technology has been used for many years to manufacture medicinal products. Gardasil does contain HPV L1-specific DNA fragments. This is expected, since DNA encoding the HPV L1 gene is used in the vaccine manufacturing process to produce the virus-like particles. The presence of these expected DNA fragments, which are inevitable in vaccine production, is not a risk to vaccine recipients, is not harmful, and this DNA is not a contaminant.
Counter Markets Newsletter - Trends & Strategies for Maximum Freedom
As you can clearly see, there is no mention whatsoever about these fragments possibly being attached to the aluminum adjuvant. The SaneVax Team as well as many eminent scientists and medical professionals around the world believe this ‘tiny’ detail should not be ignored.
If this ‘ingredient’ is indeed an ‘inevitable’ component of recombinant technology, medical consumers have a right to know when, for how long and under what circumstances it was tested for safety.
After an entire year of multiple communication attempts receiving no scientific documentation from the FDA that this ‘ingredient’ did not pose a health threat, the SaneVax Team sent another letter to the FDA Commissioner with one simple request.
This letter asked for copies of documents from the FDA showing:
Surely, considering the fact that these fragments are an ‘inevitable’ component of recombinant technology, they have requested safety studies to determine any potential health impact. After all, they are responsible for the health and safety of medical consumers – aren’t they?
One more critical point:
Why did Merck not detect the residues of HPV-18-L1 gene DNA during the production of Gardasil®?
Dr. Lee offered the following explanation:
…all HPV-18 isolates can be classified into 3 subtypes based on alignments of the DNA sequences of the variants, (i.e. the European, the Asian-American and the African subtypes). In Europe, it has been reported that all of the HPV-18 isolates from patients are found to be of the European or Asian-American variants. In the U.S., 91% of the HPV-18 isolates from white women are reported to be of the European and Asian-American variants, and 64% of the HPV isolates from African American women belong to the African variant.
Since the prevalence of the African variants of HPV-18 among European patients is negligible, the Dutch researchers who originally developed the HPV INNO-LIPA kit naturally selected an HPV-18 probe targeting a homologous sequence shared by all European and Asian-American HPV-18 variants for the testing.
However, the HPV-18 L1 protein-coding gene chosen by the manufacturer for Gardasil® closely related to an African subtype. Failure to detect a target sequence of an African variant HPV-18 DNA in the vaccine Gardasil® with a hybridization probe specifically designed for the European and Asian-American DNA variants may simply reflect the diversity of the L1 protein amino acid sequences within the genotype of HPV-18.
For medical consumers, this brings additional questions. Has Gardasil® been tested for efficacy against all three HPV-18 variants?
Are families in the United States and Europe putting their children at risk of unknown health consequences resulting from the injection of a new chemical with untested toxicity in order to obtain ‘protection’ against only one type of oncogenic HPV?
The time has come for medical consumers to hold their national health ‘authorities’ accountable. These questions must be answered before any more children become ‘one less.’
(Note: Dr. Lee’s study was commissioned and sponsored by SaneVax Inc. for a future payment not to exceed one U.S. dollar.)
This press release was submitted to Activist Post, and first appeared at SaneVax.org Here: | <urn:uuid:8202ace0-ef8a-403b-9d0f-263f9fd91904> | CC-MAIN-2019-18 | https://www.activistpost.com/2012/10/genetically-engineered-gardasil-vaccine.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578633464.75/warc/CC-MAIN-20190424054536-20190424080536-00199.warc.gz | en | 0.932315 | 1,596 | 2.953125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.