text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Systematic review suggests video games can improve psychological and physical therapy outcomes
MONDAY, May 28 (HealthDay News) -- Although additional rigorous clinical trials are warranted, the literature suggests that video games can be useful in improving a variety of health outcomes, particularly those in the areas of psychological and physical therapy, according to research published online in the June issue of the American Journal of Preventive Medicine.
Brian A. Primack, M.D., Ph.D., of the University of Pittsburgh, and colleagues conducted a systemic review of the literature to identify 1,452 journal articles describing randomized controlled trials that evaluated the effect of video games on a positive, clinically relevant health consequence.
A total of 195 different health outcomes were evaluated from 38 randomized controlled studies that met the authors' criteria for inclusion. The researchers deemed the majority of studies to be of poor quality, with no blinding of study researchers and follow-up periods less than 12 weeks. Overall, however, video games were shown to improve outcomes associated with psychological therapy, physical therapy, physical activity, clinician skills, health education, pain distraction, and disease self-management.
"Despite these limitations, this comprehensive systematic review demonstrates that video games may have potential for improving health in a wide variety of areas, for a variety of sociodemographic groups," the authors conclude. "This is a valuable finding, particularly given the growing popularity and ubiquity of video games worldwide." | <urn:uuid:01651c4c-4797-4a01-87b3-85b1c6421f3e> | CC-MAIN-2014-23 | http://www.nursingcenter.com/lnc/HealthdayArticle?Article_id=665113 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00351-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.934547 | 289 | 3.015625 | 3 |
Module 5: Evaluation Tools for Rural Health Promotion and Disease Prevention Programs
Evaluation in health promotion and disease prevention programs can be used to document a program’s effectiveness
and impact by assessing quality, cost, and outcomes. Evaluation can also be used to determine what is or is not
working, or to identify areas of improvement, by gathering information throughout program implementation to
determine if program objectives are being met. Evaluation can provide a level of transparency and accountability
that encourages community support and informs policy decisions.
For a detailed overview of program evaluation, see Evaluating Rural Programs in the Rural Community
In this module: | <urn:uuid:5b2efc6e-1602-4053-bb13-423984ad58f6> | CC-MAIN-2024-10 | https://www.ruralhealthinfo.org/toolkits/health-promotion/5/evaluation-tools | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00359.warc.gz | en | 0.864155 | 129 | 2.96875 | 3 |
Contributed by Natalie Taylor, Fall 2013
Context: In the analysis unit, we were using Amy Tan’s “Mother Tongue’ and Richard Rodriguez’s “Aria: Memoir of a Bilingual Childhood’ to think about language, identity, and contexts. We had also watched John McWhorter’s TED talk “Txting is killing language. JK!!!’
They were working on argumentative papers using a critical analysis of either Rodriguez or Tan. I asked them to bring their working thesis statements to class and we did the following activity.
- Write your thesis statements on a separate sheet of paper. Make sure you put your name on it.
- Pass that sheet of paper to the person on your right.
- Take that person’s sentence and translate it into a text message. How would you write that person’s argument in a text? I’m not just talking about abbreviations and leaving out punctuation, though that may be part of it. Think about it this way: If somebody was to ask you what this person’s paper was arguing, what would you text them?
- Fold the page over so the original sentence is invisible. Your text message should be the only thing visible to the next person. Pass it to the right.
- Attempt to translate the text version back into an academic thesis statement. Don’t look at the original. Don’t cheat.
- Fold it over so only your new sentence is visible and pass it again.
- Translate the new thesis into a text message.
- Fold it over again and pass it.
- Translate into academic language again.
- Give it back to the author.
Response: By this point, they had five different versions of their thesis statement, which seemed like a good place to stop. We read many of them out loud and talked about how things changed or didn’t change. Some of the text message translations were really creative with emoticons and lols and made the writers think about their arguments in a different way. The new academic thesis statements gave the original writers new ideas about word choice and sentence construction.
While reluctant at first to do the activity, students found it fun and really helpful in the end. Many of them asked if we could to this for every paper. They were surprised that parts of their arguments were lost in translation, so they saw the weaknesses and how to make their statements stronger. Other students were pleased when the four translations were pretty similar to what they had started with, taking it to mean they had a solid argument. The activity also opened up a lively discussion about translation, word choice, connotations, and different Englishes.
I think I’ll try this next week. I’m having them create a digital e-portfolio which illustrates a specific writing strategy they learned in the class–I want them to highlight its development over the semester. My thinking is that this will be generative for them. I want them to be VERY clear about what it is they are working to illustrate AND also to show them the many different ways we can say something.
Leave a comment | <urn:uuid:e739156e-2497-40ef-b73b-3cc881b433b5> | CC-MAIN-2023-14 | https://write.alaska.edu/unit-framework-and-resources/analysis/analysis-lessons-prompts-and-handouts/lesson-thesis-statement-translation-workshop/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00686.warc.gz | en | 0.967904 | 659 | 3.296875 | 3 |
Topic: Love Passage: Luke 10:25–10:37
1. In the passage the lawyer had two categories of people in mind when he asked, “And who is my neighbor?” Describe both categories of people (neighbors vs. non-neighbors).
2. Are there any people that you would define as non-neighbors? Are there any people you are justified in not loving?
3. The first two men on the scene (A priest and Levite) are both “religious.” How do they respond to the staggering needs of the man who fell into hands of robbers? How might “religion” get in the way of meeting the practical needs of those in our sphere of influence?
4. What was the word that was described as the difference maker? (Hint it is the last word of v.33) Describe what that word really means, and how it is best exemplified.
5. Take opportunity to discuss how the Samaritan proved to be a neighbor to the man in need. How can this passage inform our discussion of unleashing love on our culture?
6. What is a love bank? Do you have one? What is it filled with? How do you keep it full? | <urn:uuid:b928dd3e-813d-4565-a306-f8bcdd295218> | CC-MAIN-2020-24 | https://www.firewheelfellowship.com/sermons/sermon/2015-09-13/love-bank | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347394756.31/warc/CC-MAIN-20200527141855-20200527171855-00219.warc.gz | en | 0.971312 | 265 | 2.96875 | 3 |
Internet bots which are also known as "web robots" and simply just "bots" are mainly software applications that run automated tasks over the internet. These bots perform at a much faster rate than a human editor could and so therefore are very important.
A large use of bots is web "spidering", in which a script, a "spider", analyzes and caches information from web servers, and at a speed much faster than a human could.
As with all scripts on the internet, bots can be used for malicious purposes. They can be used to attack a server with spam (known as spambots) or to cheat on online video games. | <urn:uuid:b21821a6-98c3-4ef3-aa36-ca002bd6566d> | CC-MAIN-2016-26 | http://www.afterdawn.com/glossary/term.cfm/bots | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00108-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.960455 | 134 | 2.875 | 3 |
The history of yoga is shrouded in mystery. Is it 10,000 yrs old, 5,000 yrs old, or 2,000 years old? It may all depend on your definition of yoga. What most people in the West consider to be yoga is only one part of the science of yoga. Asana, or the physical practice, is the third limb of the complete eight-limb path of yoga (called Ashtanga Yoga).
There is a myth about the origin of yoga. The story begins in a remote jungle location where Lord Shiva was giving a secret discourse on yoga to his wife Uma. When Shiva was finished he heard a noise nearby. After some investigation, he discovered Ananta, the thousand-headed serpent trying to get away. After he caught Ananta, Shiva dealt out a punishment for his spying. Ananta was to go to the humans and teach them all that he had overheard. Of course, when Ananta approached a village, the residents ran away screaming from the sight of the thousand-headed serpent. Ananta returned to Shiva and explained what had happened. Shiva suggested that Ananta take on the form of a human in order to complete his task. Ananta took the shape of Pantanjali, who is the author of the Yoga Sutras, and considered the father of yoga. The humans readily accepted Pantanjali and his teachings, and from that moment yoga was brought to the human race.
Timeline of yoga:
The reason it is so hard to track the origins of yoga and asana, is that yoga has long been an oral tradition. The teachings were learned directly from a teacher or guru, not from a book. The first written mention of yoga is in the ancient Rig Veda, which was composed approximately 5,000 years ago. Asana is first mentioned in Pantanjali’s Yoga Sutra, which was written approximately 2,200 – 2,400 years ago. In one of the most famous verses (2.46) Pantanjali writes, “Sthira Sukham Asanam”, which is translated as, “the postures must have both the qualities of firmness and ease”. But Pantanjali makes little more mention of the third limb of the eight-limb path. As we get to the 15th century, Swatmarama writes the Hatha Yoga Pradipika mentioning 15 asanas. In the 17th and 18th centuries the Gheranda Samhita and the Shiva Samhita are written. Each adding to the number of asanas described with the written word. In the 19th century the Maharaja of Myosore compiled the Sritattvandhi, which details 122 asanas. By the time B.K.S. Iyungar published his renowned Light on Yoga in 1966, over 360 asanas are explained in detail. In 1984 Dharma Mittra began assembling his book, Asanas – 608 Yoga Poses. Although no one can pinpoint the exact beginning of yoga, it is an ever-growing science that will continue to change and develop into an even greater system of not only physical practice, but also internal practices as well.
When yoga came to the West:
At the end of the 19th century through the beginning of the 20th century several Indian masters began traveling to the United States. Two of theses masters, Swami Vivekananda and Parahamsa Yogananda, impressed attendees of their lectures in the U.S., and word began to spread of the eastern science called yoga. In India, in the early 20th century, Sri Krishnamacharya began teaching several students who would become renowned teachers sharing their passion for yoga with the world. They are: Indra Devi, who opened the first yoga studio in Hollywood in 1947 and was the first westerner to study with Krishnamacharya; Pattabhi Jois, who developed the Ashtanga Vinyasa System; B.K.S. Iyengar, author of many books, including Light on Yoga, and the founder of the Iyengar Yoga; and T.K.V. Desikachar, Krishnamacharya’s son and founder of the Krishnamacharya Yoga Mandiram. As word spread of these great teachers and students of Krishnamacharia, Westerners began to travel to India to study yoga with them, and bring it back to the United States. In the mid 1950’s two students of Parahamsa Yogananda, opened a studio in San Francisco. Their son Baron Baptiste is the founder of Baptiste Power Vinyasa Yoga. As students began seeking out teachings from the Indian masters, they began creating their own forms of yoga. Today there are more forms, styles and names of yoga than anyone could have ever imagined. Just to name a few: Anusara, Ashtanga Vinyasa, Baptiste, Bikram, Flow, Jivamukti, Power, Subtle Yoga, Universal Yoga, Viniyoga, and Yin. And although yoga is continuously evolving and changing, the basic tenets go back to the Yoga Sutras written by Pantanjali.
In the end does it matter when it all began? Truly we should be grateful for the masters who have passed this wonderful gift on to us through the ages.
Burgin, Timothy. “History of Yoga.” November 26, 2007. www.yogabasics.com/learn/articles
Cushman, Ann. “New Light on Yoga.” www.yogajournal.com/wisdon/266
Hammond, Holly. “Yoga’s Trip to America.” www.yogajournal.com/wisdom/467
Lappa, Andey. Universal Yoga Level One Teacher Training. October 1, 2010.
Maehle, Gregor. Ashtanga Yoga, Practice and Philosophy. Novato, CA: New World Library, 2006. | <urn:uuid:687177a0-42d7-4809-b97d-39ece4ad0437> | CC-MAIN-2017-51 | http://beyogaandwellness.com/2017/04/history-yoga-shona-baldoni/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948599156.77/warc/CC-MAIN-20171217230057-20171218012057-00220.warc.gz | en | 0.963788 | 1,246 | 3.09375 | 3 |
|Scientific Name:||Dasyurus geoffroii|
|Species Authority:||Gould, 1841|
|Taxonomic Notes:||Mitochondrial control region DNA evidence indicates that the subspecies, Dasyurus geoffroii fortis, is very closely related to the Bronze Quoll, D. spartacus, of southern New Guinea, with less divergence evident between these two taxa than is seen within species between populations of both D. maculatus and D. hallucatus (Firestone 2000).|
|Red List Category & Criteria:||Near Threatened ver 3.1|
|Assessor(s):||Morris, K., Burbidge, A. & Hamilton, S.|
|Reviewer(s):||Lamoreux, J. & Hilton-Taylor, C. (Global Mammal Assessment Team)|
Listed as Near Threatened because there are still fewer than 10,000 individuals. It was declining in the wheat belt when last assessed, but translocations seem to have reversed this trend in the last few years despite a continued decline in a few populations. The species can survive in a fragmented landscape. There is fox control and better awareness among public. However, the stability of populations currently depends on active management. Threats to the species are still present, but at lower levels than in the past. Almost qualifies as threatened under criterion C.
|Range Description:||The Western Quoll, or Chuditch, formerly occurred as two subspecies over approximately 70% of the Australian continent, being found in every mainland state and the Northern Territory; museum specimens from the east of Australia of D. geoffroii geoffroii are known from Peak Downs in eastern Queensland (Thomas 1888), the Liverpool plains of New South Wales (Gould 1840), and Mildura New South Wales (Kreft 1857). The western subspecies, D. g. fortis, is now restricted to the south-west of Western Australia, occurring at low densities throughout the Jarrah forest and more patchily in the drier woodlands and mallee shrublands of the central and southern Wheatbelt (Maxwell et al. 1996). The Julimar population is translocated.|
Native:Australia (Western Australia)
|Range Map:||Click here to open the map viewer and explore range.|
The total population of Western Quolls is probably under 10,000 individuals. Some populations are under 100 individuals (as in Julimar). The species probably naturally occurs in small populations. The Western Quoll is very wide ranging. There is some fluctuation within populations. The species has suffered declines in the past, but due to active management and translocations, it seems to be recovering.
Western Quoll are known from 25 of the 57 fauna monitoring sites in the south-west of Western Australia, in 15 of these, the species has increased in abundance (as measured by trap success rates) or remained unchanged since fox control was implemented in 1996 (K. Morris pers. comm.). In the other 10 sites this species has declined; the reason for this is unclear at present, however, in at least one of these sites (Honeymoon Pool, Collie River) management practices have changed so that rubbish bins are no longer left at the picnic and camping sites (Western Quolls are well known scavengers) (K. Morris pers. comm.). A study into the impact of introduced predators on native fauna, including native predators such as the Western Quoll, is currently underway and reintroduction of captive breed D. g. fortis to former areas of its range in the arid zone of Western Australia is planned for the period 2009-2012 (K. Morris pers. comm.).
Whilst no substantiated evidence has been found to support the continued presence of the eastern subspecies D. g. geoffroii in Queensland, New South Wales or Victoria, there are three unconfirmed reports cited in the Threatened Species of Western New South Wales folder (1996) of this species from far western New South Wales. Specifically, these sighting are from 1996 at North of Broken Hill, in 1990 from "Myall" NW of Tilpa, and "Albermarle" between Broken Hill and Menindee in 1988. The latter record was chased out of a tree but escaped into a rabbit warren. Known and unconfirmed occurrences of D. maculatus from the central and far west of New South Wales make it hard to verify reports of D. geoffroii made by the public (as distinguishing the two species can be difficult). A live D. geoffroii was confiscated by New South Wales Department of Conservation and Climate change staff in 1983 from a chicken pen on a property in Central West New South Wales - it was presumed to have been a captive individual/pet that had originated from a from Western Australia stock, however, its origins were never verified and there was no further consideration or exploration of the possibility of a wild population persisting in the area, despite being within its former range (S. Hamilton pers. comm.). It is generally accepted that mammal survey techniques in most areas of the former eastern range of D. g. geoffroii have not been targeted towards D. g. geoffroii, being neither adequate in magnitude or duration to detect the presence of this species if it does indeed persist at all.
|Habitat and Ecology:||The former wide range of the Western Quoll suggests the capability of occupying a variety of habitats, including deserts, woodlands, mallee shrublands, sclerophyll forests, and coastal areas. The species can be found in degraded areas. Western Quolls are generally nocturnal and solitary. Females construct burrows during pregnancy and maintain non-overlapping core areas in their home range (Maxwell et al. 1996). It is an opportunistic species that mainly eats invertebrates.|
|Major Threat(s):||Habitat alteration due to clearing, grazing, and frequent wildfire (especially extensive, hot wildfires) may have detrimentally impacted the population; after fires, there is often an incursion of foxes, which can be detrimental. Competition for food and predation from cats and foxes, hunting, and poisoning have also contributed to its decline.|
Recovery objectives for this species (Maxwell et al. 1996) include: ensuring that the species persists within its present (1992) range, and increasing population numbers by expansion into former range.
Management actions completed or underway (Maxwell et al. 1996): habitat management research into the impact of prescribed burning and timber harvesting in the Jarrah forest is under way. Western Quoll habitat requirements are considered during rehabilitation after bauxite mining; impact of fox control programs completed research has shown that Western Quolls have benefited from fox control programs using 1080 meat baits. A broad-scale fox baiting program is now under way in the Jarrah forest; Western Quoll populations are being monitored at several sites within the Jarrah forest as part of the Department of Environment and Conservation (Western Australia) faunal management programs and as part of ongoing research into fox control, prescribed burning, and timber harvesting. A monitoring site in the Wheatbelt has not yet been established; distribution and requirements in the semi-arid zone increase over the next few years. An extensive survey for Western Quolls in the southern Wheatbelt failed to detect any. Populations may have continued to decline over the last 10 years and restocking of suitable areas is probably required; captive breeding program ongoing and successfully undertaken at Perth Zoo since 1989. Over 60 Western Quolls have been bred, with most being used for translocation to Julimar Conservation Park; a successful translocation has been undertaken at Julimar Conservation Park. Translocations to Wheatbelt reserves and Shark Bay have been proposed.
A study into the impact of introduced predators on native fauna, including native predators such as the Western Quoll is currently underway (K. Morris pers. comm.).
Firestone, K. 2000. Phylogenetic relationships among quolls revisited: The mtDNA control region as a useful tool. Journal of Mammalian Evolution 7(1): 1064-7554.
IUCN. 2008. 2008 IUCN Red List of Threatened Species. Available at: http://www.iucnredlist.org. (Accessed: 5 October 2008).
Maxwell, S., Burbidge, A. A. and Morris, K. 1996. The 1996 Action Plan for Australian Marsupials and Monotremes. Australasian Marsupial and Monotreme Specialist Group, IUCN Species Survival Commission, Gland, Switzerland.
Orell, P. and Morris, K. 1994. Chuditch Recovery Plan. Wildlife Management Program No. 13. Department of Conservation and Land Management, Perth, Australia.
Serena, M., Soderquist, T. R. and Morris, K. 1991. The Chuditch: Dasyurus geoffroii. Wildlife Management Program. Department of Conservation and Land Management, Perth, Australia.
Thomas, O. 1888. Catalogue of the Marsupialia and Monotremata in the collection of the British Museum, London.
Thomas, O. 1906. On mammals collected in south-west Australia for Mr W.E. Balston. Proceedings of the Zoological Society of London 1906: 468-478.
|Citation:||Morris, K., Burbidge, A. & Hamilton, S. 2008. Dasyurus geoffroii. The IUCN Red List of Threatened Species. Version 2014.3. <www.iucnredlist.org>. Downloaded on 01 March 2015.|
|Feedback:||If you see any errors or have any questions or suggestions on what is shown on this page, please provide us with feedback so that we can correct or extend the information provided| | <urn:uuid:5796351a-2648-4d24-b842-09e93b2a4cab> | CC-MAIN-2015-11 | http://www.iucnredlist.org/details/full/6294/0 | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00150-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.914477 | 2,053 | 2.796875 | 3 |
This is a quick test on your understanding of spoken European Portuguese.
Don’t feel too bad if you can’t get much right, these are challenging test.
Follow this process:
- Fill all the gabs you can, even if you’re not sure, just right down what you think you hear
- Go over it a few times if need be
- Check the correct answers while listening
- try to test over one more time from scratch
0 of 1 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to pass the previous Module’s quiz in order to start this quiz:
0 of 1 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
|Table is loading|
|No data available|
Márlon – Let us interview Ida. Ida, what are you doing now?
Ida – I am hanging the clothes.
Márlon – Hanging clothes.
Ida – Yes, putting the clothes in the sun so as to dry.
Márlon – Very well. And hanging the clothes what do you use?
Ida – I use pegs to secure them and a rack.
Márlon – Very well, a rack. And you secure…secure the pegs…
Ida – …secure the clothes with the pegs so the wind doesn’t take (doesn’t sound correct in english)
Márlon – Oh is it? And as they are shirts, you secure them where?
Ida – Oh that depends on your tast. Secure them at the bottom or the collar, on the collar (she uses synonyms).
Márlon – On the collar. Very well, on the collar. And the trousers, you secure where?
Ida – The trousers I secure them to the waistband.
Márlon – And what is the waistband?
Ida – It’s what tightens the waist.
Correct 10 / 10PointsIncorrect / 10 Points
Márlon – Vamos fazer uma entrevista aqui à Ida. Dona Ida, o que é você está /tá/ a fazer ?
Ida – Estou a estender a roupa.
Márlon – Está a estender .
Ida – Sim, a colocar a roupa ao para secar.
Márlon – Muito bem. E a a roupa usa o quê?
Ida – Uso molas para as /prás/ prender e um estendal.
Márlon – Muito bem, um estendal. E prende…prende as molas…
Ida – …a roupa com as molas para não levar
Márlon – Ai é? E como são , prende aonde?
Ida – Ah isso depende do gosto. Ou prende em baixo ou na gola, no colarinho.
Márlon – No colarinho. Muito bem, no . Então e as calças, prende aonde?
Ida – As calças prendo-as no cós.
Márlon – e o cós é o quê?
Ida – É o que aperta a cintura. | <urn:uuid:fe44301b-7074-4cbd-9701-12f7e200cbea> | CC-MAIN-2017-47 | https://portuguesewithcarla.com/quizzes/audio-quiz-4-level-advanced/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807650.44/warc/CC-MAIN-20171124104142-20171124124142-00420.warc.gz | en | 0.686965 | 810 | 2.78125 | 3 |
Study shows smartphones harm the environment
March 5, 2018
At the end of winter term in 2014, Lotfi Belkhir was approached by a student taking his Total Sustainability and Management course who asked, “What does software sustainability mean?”
The Entrepreneurship and Innovation Associate Professor at the W Booth School of Engineering Practice and Technology didn’t have an answer.
Belkhir teaches students to think creatively about sustainability tools that can be applied to their entrepreneurial ventures. But his tools, at the time, mainly applied to hardware startups, not software.
The student’s question sparked Belkhir’s latest research on the global emissions footprint of information and communications technology (ICT).
Belkhir, along with Ahmed Elmeligi, a recent W Booth grad and co-founder of the startup, HiNT (Healthcare Innovation in NeuroTechnology), studied the carbon footprint of consumer devices such as smartphones, laptops, tablets, desktops as well as data centres and communication networks as early as 2005. Their findings were recently published in the 2018 Journal of Cleaner Production.
Not only did they discover that software is driving the consumption of ICT, they also found that ICT has a greater impact on emissions than we thought and most emissions come from production and operation.
“We found that the ICT industry as a whole was growing but it was incremental,” Belkhir explains. “Today it sits at about 1.5%. If trends continue, ICT will account for as much as 14% for the total global footprint by 2040, or about half of the entire transportation sector worldwide.”
“For every text message, for every phone call, every video you upload or download, there’s a data centre making this happen. Telecommunications networks and data centres consume a lot of energy to serve you and most data centres continue to be powered by electricity generated by fossil fuels. It’s the energy consumption we don’t see.”
Among all the devices, trends suggest that by 2020, the most damaging devices to the environment are smartphones. While smartphones consume little energy to operate, 85% of their emissions impact comes from production.
A smartphone’s chip and motherboard require the most amount of energy to produce as they are made up of precious metals that are mined at a high cost.
Smartphones also have a short life which drives further production of new models and an extraordinary amount of waste.
“Anyone can acquire a smartphone, and telecommunications companies make it easy for people to acquire a new one every two years. We found that by 2020 the energy consumption of a smartphone is going to be more than that of PCs and laptops.”
Belkhir has made policy recommendations based on his findings.
“Communication and data centres have to go under renewable energy now. The good news is Google and Facebook data centres are going to run on renewable energy. But there needs to be a policy in place so that all data centres follow suit. Also, it’s not sustainable to have a two-year subsidized plan for smartphones.”
With his latest research, Belkhir hopes to help students in his Total Sustainability and Management course expand their worldview.
“When they start the course, many students don’t know what sustainability means. When the course ends their worldview has changed and they realize what they want to do and why they want to do it.” | <urn:uuid:7e03c189-c25b-49f3-b3f9-fb7720179c52> | CC-MAIN-2020-45 | https://brighterworld.mcmaster.ca/articles/study-shows-smartphones-harm-the-environment/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107905965.68/warc/CC-MAIN-20201029214439-20201030004439-00211.warc.gz | en | 0.966547 | 716 | 3.234375 | 3 |
East Africa (MNN) — The East Africa famine has already cost hundreds of thousands of people their lives. Numbers range from 12 to 13 million who have been "affected" by the disaster.
But the consequences of such a wide-scale crisis go much deeper than just starvation or even death. While it is easy to believe that things will settle down once the food situation gets back to normal, Pat Melancon with Baptist Global Response says the damage done by this catastrophe will far outlast today's hunger.
"The side effects are just astronomical, and they don't go away once people have food in their stomachs," Melancon, Managing Director of Disaster Response and Training for BGR, tells Mission Network News. "Some of the long-term side effects can be devastating, I think, to a community for probably a decade or more."
The list of "side effects" is miles long. Entire nations will be rearranged by the end of the crisis.
For one thing, notes Melancon, there has been a massive migration of people within the affected nations. People have left their homes to find food, but even those in "food secure" areas are moving to areas with no food security when they hear that organizations are handing out meals elsewhere.
When people choose to migrate, their land is often seized by others. This, says Melancon, results in a loss of livelihood. People who, up until the crisis, had been pastoral herders or agriculturists suddenly have no land with which to continue their work. On top of that, there has been a significant loss of livestock in drought-affected areas, robbing pastoralists, in particular, of their livelihood.
Those losses encompass entire families, who also will have to struggle with the loss of family members, and, indeed, entire generations.
"Even if you could go back to a perfect situation, where they're back in their home environment, they still have their land and still have their livelihood," notes Melancon, "in many cases, they've lost two generations of people: the older generation who were there to teach the younger generation how to live off the land; and the younger generation who should be coming up to learn from those in that middle age group, and who have actually lived through it."
Many children who have survived have lost their opportunity for education–a way to a better life. Melancon reports as high as 80% drop out rates in available education venues since the famine struck.
Children, in particular, are at an even higher risk now of inhumane treatment. "People begin to resort to things that are going to enable them to survive," Melancon explains. "So you'll have an increase in the amount of prostitution. You'll have an increase in the amount of trafficking of children. You'll have an increase in the number of child soldiers. When you have children who are starving and you offer them food if they're willing to join your ranks, then it increases the number of children that are available."
Add to that the economic troubles that nations are sure to face as a result of migrations and a responsibility to aid relief. Without Christ, the situation is utterly hopeless.
BGR knows the Truth, though, and is working tirelessly to share it with those suffering in these nations. Currently, BGR is focusing on addressing the immediate need of hunger, but the ministry has been developing self-sustaining programs in that part of the world for 40 years. In the days, months, and years to come, BGR will work to create more of these programs, while spreading the message of Christ–the only One who can truly redeem such a tragic situation.
Melancon encourages you to do the same. "The way that Christians can get involved is, of course, to look at what the needs truly are, and then try either to contribute to or participate in projects that will address the needs that are there right now–but in such a way that it will allow the people to be self-sustained."
In the meantime, pray. Pray for access–which can be difficult in a complex crisis and in nations that have warring factions–for BGR. Pray for safety for distribution workers, who face more danger from desperate people than do even UN peace keepers. And most importantly, pray that Christian workers can effectively share Christ's love in word and deed with people who need that message of hope now more than ever.
If you would like to give to this crisis through BGR, visit www.baptistglobalresponse.com. | <urn:uuid:857e9887-597b-4883-8d17-3af031f89c95> | CC-MAIN-2021-49 | https://www.mnnonline.org/news/effects-of-famine-stretch-far-further-than-hunger/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363515.28/warc/CC-MAIN-20211208144647-20211208174647-00199.warc.gz | en | 0.973015 | 941 | 2.640625 | 3 |
The anhinga is a large bird with a long S-shaped neck and a long pointed bill. The male has grayish-black feathers with a greenish shine to them. They have large wings with silver-white feathers on the top side. Females have a light tan head, neck and chest and a black stomach. Both the male and the female have long fan- shaped tail feathers and sometimes the anhinga is known as the water turkey. The anhinga has poorly developed oil glands and its feathers aren't as waterproof as other water birds are. It will perch in a tree with its wings open to dry its feathers and warm its body. Using their sharp bills, anhingas spear fish, flip them in the air and swallow them head-first. Sometimes they spear them so hard they have to return to shore with the fish still on their bill, and bang the fish off on a rock. When anhingas are in their breeding plumage they have a blue ring around their eyes. The female lays three to five light blue eggs. The nest is in a tree and it is made of sticks and lined with leaves. The chicks hatch in about a month. The anhinga is also known as the snakebird. When it swims, its body is submerged under the water. It stretches its head and neck flat out on the surface of the water. Its head and neck look like a snake gliding through the water.
Anhingas breed off the Gulf Coast and the Atlantic Coast from North Carolina to Texas and in the Mississippi Valley north to Kentucky and Missouri. They winter along the Gulf Coast north to North Carolina. Anhingas can be found in freshwater ponds and swamps where there is thick vegetation and tall trees.
Lat: 26.08, Long: -80.77
Spotted on Apr 23, 2012
Submitted on Apr 23, 2012 | <urn:uuid:9048d046-9ec6-45ca-aebd-91d059bda46a> | CC-MAIN-2018-39 | http://www.projectnoah.org/spottings/10468206 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156613.38/warc/CC-MAIN-20180920195131-20180920215531-00333.warc.gz | en | 0.970634 | 384 | 3.21875 | 3 |
Guided Rd. Level U
Interest Level 2-6
Seismologists have an important job. These scientists study earthquakes. Why is it so important to study earthquakes? By studying quakes, seismologists can help protect people from injury and death. Learn about the men and women who study quakes with this high-interest text!
Featuring a topic based on Smithsonian content, this book builds students' literacy skills while fostering curiosity, creativity, and innovation. It features a hands-on STEAM challenge that guides students through each step of the engineering design process and is ideal for makerspace activities. This book features:
- Real-world examples provide insight into how the engineering design process is used to solve real-world problems
- Content that highlights every component of STEAM: science, technology, engineering, the arts, and mathematics
- Career advice from Smithsonian employees working in STEAM fields
- Dynamic images and text features enhance the reading experience and build visual literacy
California Early Years Spanish 6-Book Set
Changing California Spanish 6-Book Set
In this section you can find reviews from our customers, or you can add your own review for this particular product.
Customer reviews help other visitors to read feedback from users who have already purchased and are using TCM’s products. | <urn:uuid:591c0d28-cad7-4be7-a136-bdb5ffcd6609> | CC-MAIN-2022-40 | https://www.teachercreatedmaterials.com/librarians/p/predicting-earthquakes1/28903/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333455.97/warc/CC-MAIN-20220924182740-20220924212740-00303.warc.gz | en | 0.88219 | 341 | 3.6875 | 4 |
This ‘Adobe Fresco Line Portrait with Experimental Surfaces’ is a unit of work where students draw digitally and then create surfaces with different media and then print their digital drawing onto the exciting surfaces. Students will:
This download includes:
There is also another version of this resource that looks at Fernand Léger instead of experimental surfaces. You can see it here.
I just went to a workshop this summer and learned this technique as a mixed media technique, but it was geared toward visual arts teachers. We had to draw art and use paint, etc. There was not a digital component to the workshop. So imagine my surprise when I looked in here and saw this. I really want my students to not only use digital art, but to realize that they can manipulate it and use it with other media. I’m so glad I found this website!! Everything I have bought so far has been extremely professional, looks beautiful, and will be helpful to me in the classroom.
55 of 108 people found this review helpful.
Help other customers find the most helpful reviews
Did you find this review helpful?
You must log in and be a buyer of this download to submit a review.
Register and you can download 3 of the Free Resources Every Month!
Save money and get 10 resources of your choice every month, and save even more with a yearly subscription.
For departments with 2 or more members. Subscribe for a total of 2 teachers to download 10 resources each month.
I set up The Arty Teacher because I have a passion for my subject that I want to share with other art teachers around the world.
I have been a high school art teacher for over 20 years, so I understand what it’s like to be in front of a class of students, often with very different abilities and attitudes.
I wanted to develop resources that would help teachers to bring out the best in every student in every class. I also wanted to free-up staff from time-consuming lesson preparation to let them focus instead on delivering exciting, motivating, dynamic lessons, supported by excellent resources. | <urn:uuid:e556b430-b03d-432a-b754-152006725c0c> | CC-MAIN-2023-40 | https://theartyteacher.com/downloads/adobe-fresco-line-portrait-with-experimental-surfaces/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00562.warc.gz | en | 0.95906 | 430 | 2.53125 | 3 |
PIKETON, Ohio -- Cover crops, if planted at the right time and used with the proper crop rotation, can be biomass workhorses.
Based on the results of five years of Ohio State University research, cover crops supply ample nitrogen and recycle phosphorus for fertilizers while maintaining soil quality and suppressing weeds, insects and diseases.
Rafiq Islam, a soil scientist with the South Centers at Piketon in Piketon, Ohio, studied 32 different cover crops on field crops and a variety of vegetables to evaluate their biomass production and nutrient management capabilities. He found nine varieties that generated the minimum nitrogen requirements and recycling for crop production: cow peas, hairy vetch, crimson clover, red clover, green bean, annual ryegrass, radish, cereal rye, buckwheat and winter peas.
"Our main goal was to provide enough nitrogen through cover crop residues so that commercial application was not needed, while using cover crops to recycle nutrients like phosphorus and to enhance soil carbon sequestration," said Islam. "Basically, what we found is that these cover crops, especially cow peas and winter peas, produced enough nitrogen to support crop production without the need to add commercial fertilizer, or very little of it. The minimum these cover crops were producing is equal to 100 to 150 pounds per acre of commercial nitrogen fertilizer, which is what is generally needed to maintain a good crop. That's saving farmers money."
Islam said that cover crops offer a myriad of benefits for field crops, especially in no-till production systems. They are excellent sources of nitrogen, have almost a 15:1 carbon-to-nitrogen ratio essential for maintaining soil quality, and produce chemicals (allelochemicals) that are antagonistic to soil-borne diseases and pests. Cover crops also fit in well with field crops because of their short rotation and winter cover, and many cover crops are killed off by winter weather, eliminating the need to use chemicals for burn-down.
But few farmers make use of cover crops and their benefits because of the overall lack of knowledge of what cover crops can offer, their moderate-to-high seed prices, availability, and the challenges of getting them established in the field, said Islam.
"If seed costs more than fertilizer prices, no one will use the crop. But with fuel prices continuing to rise, many can now make a case for trying cover crops for their nitrogen needs," said Islam. "A cover crop is not an immediate magic bullet, but over time it will produce magic results. Cover crops won't replace nitrogen fertilizer completely, and they are difficult to establish. In some cases, farmers may face initial lower crop yields. But if a farmer is willing to tackle the challenges, a cover crop can be a good alternative to commercial nitrogen fertilizer over time."
Out of the nine cover crops that performed well in the studies, the two varieties that produced the most consistent and best results were winter peas and cow peas. Winter peas produced over 135 pounds per acre of total nitrogen fertilizer, while cow peas produced nearly 150 pound per acre of nitrogen fertilizer.
Islam said that the performances of the cover crops are impressive, but for farmers to get the most out of their benefits, it's important to know when to plant and what cover crops to use with what agronomic crops is important.
"Being knowledgeable about each cover crop and its capabilities, and what to plant when is essential," said Islam. "Know what cover crops are grasses and what are legumes, and whether they are a winter crop or a summer crop. Like cover crops impact the performance of like agronomic crops, and some cover crops immobilize nitrogen so crops can't use it."
The following are just some examples of the most effective cover crop/agronomic crop combinations:
• Use winter peas in corn/soybean rotations immediately after harvesting soybeans.
• Use winter peas in continuous corn rotations.
• Use cow peas in corn/soybean/wheat rotations after harvesting wheat.
• Cereal rye, which is effective in suppressing diseases, can be added to a cow pea/corn/soybean/wheat rotation after harvesting corn, or a winter pea/corn/soybean/wheat rotation after harvesting corn. The rye is grown between corn and soybeans.
• Annual ryegrass is very effective in uptaking and accumulating nitrogen into biomass from dairy or swine manure application in the early fall.
• Hairy vetch is effective in a corn/rye/soybean/wheat rotation. Hairy vetch is integrated between the wheat and corn crops.
For more information on Ohio State's research on cover crops, contact Rafiq Islam at (740) 289-2071, or e-mail [email protected]. | <urn:uuid:7ad72fa2-db36-43bd-badd-c4a6130d05ae> | CC-MAIN-2019-47 | https://news-archive.cfaes.ohio-state.edu/news-release/worried-about-fuel-prices-grow-cover-crops-fertilizer-needs | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667442.36/warc/CC-MAIN-20191113215021-20191114003021-00349.warc.gz | en | 0.949506 | 991 | 3.1875 | 3 |
Spend a few minutes reading any health magazine or browsing a food trend website, and it soon becomes obvious that the vegetarian and vegan lifestyle is not only hot, but shows absolutely no sign of slowing down.
In fact, a recent, marketing data report found that in 2017, almost half of German consumers reported following a diet that was low in meat, which was significantly higher than only a quarter of all consumers in 2014.1 Furthermore, the number of Americans who reported following a vegan lifestyle increased from 1 percent in 2014 to 6 percent in 2017.
Odds are good that you are nodding along with this trend, as you are already well aware of the health benefits that your patients can obtain from increasing their daily intake of fruits and vegetables. In fact, odds are quite good that a significant portion of your patients who see you for regular wellness visits may already be following a vegetarian or vegan diet.
While you should certainly encourage your vegetarian and vegan patients to keep to a healthy diet, it is important to make certain that they are still getting the nutrients that usually come from animal protein sources through proper vitamin and mineral supplementation.
Vitamin B12 is an excellent example of a nutrient that is rarely found outside of animal protein sources, so can be difficult for vegetarian and vegans to obtain in sufficient amounts.2,3
What does vitamin B12 do?
Vitamin B12 is crucial for a number of functions in the human body, including formation of red blood cells, creation and regulation of DNA, neurological function and energy production. Studies have shown that proper vitamin B12 levels may improve cognitive function, cardiovascular health and energy levels.2,3
In essence, the body depends on vitamin B12 for all metabolic function.
Symptoms of vitamin B12 deficiency
Without proper vitamin B12 levels, red blood cells will not reproduce properly, so their production will reduce, leading to anemia. Symptoms of anemia can include fatigue, shortness of breath, and an irregular heartbeat. Patients may also experience weight loss, pale skin and diarrhea.
Low levels of vitamin B12 can also affect proper neurological function. You may see symptoms such as depression, memory problems, confusion and fatigue.2,3 While these neurological symptoms alone may not be enough to pinpoint a vitamin B12 deficiency, a combination of neurological difficulty with anemia may well point to a deficiency.
Treatment of Vitamin B12 deficiency
Treatment for vitamin B12 deficiency should include a combination of supplementation and changes in diet to include more foods that contain adequate levels of vitamin B12. The National Institute of Health (NIH) recommends that adults and teens over the age of 14 consume 2.4 micrograms (mcg) of vitamin B12 per day, which can be obtained through supplements.
Pregnant women should have 2.6 mcg, and those nursing infants should take in 2.8 mcg daily.2 Good food sources for vitamin B12 include meat, fish (particularly tuna), eggs, dairy, and fortified grain products.3 Milk, cheese, and yogurt are good options for your vegetarian patients who will consume dairy products.
Your vegan patients, however, should get most of their vitamin B12 from supplements, as fortified grain products alone will not provide recommended daily levels.
While it is true that eating mostly fruits and vegetables is a healthier way to eat, it is also vital to obtain enough of the vital nutrients that are usually only found from animal protein sources. Helping your vegetarian and vegan patients get enough vitamin B12 in their diet can allow them to optimize their diet for maximum benefit.
- Top Trends in Prepared Foods 2017: Exploring trends in meat, fish and seafood; pasta, noodles and rice; prepared meals; savory deli food; soup; and meat substitutes. Accessed 11/22/2017.
- Vitamin B12. National Institutes of Health. Accessed 11/22/2017.
- Vitamin B12 deficiency: Causes, symptoms and treatments. Medical News Today. Accessed 11/22/2017. | <urn:uuid:4625c402-2196-46fa-ac9b-b2b6f44bd296> | CC-MAIN-2019-04 | https://www.chiroeco.com/signs-vitamin-b12-deficiency/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662893.38/warc/CC-MAIN-20190119095153-20190119121153-00005.warc.gz | en | 0.938456 | 817 | 2.796875 | 3 |
It’s not uncommon for your dentist in Bakersfield to have patients say; “I brush my teeth twice a day every day, so how can flossing actually make that big of a difference?” The truth is, flossing is a crucial part of any home oral hygiene routine and can help keep your teeth and gums healthy. There’s a joke among dentists that you really don’t have to floss, but you do have to floss the teeth that you want to keep.
Flossing Gets What Brushing Can’t
First and foremost, flossing every day is important because brushing alone can’t reach every side of each and every tooth. This means that when you pass on the floss you’re not thoroughly cleaning your teeth. Actually, if you skip flossing, you’re leaving about 35% of each tooth’s surface uncleaned. That means a lot of plaque and bacteria are left lingering around and can cause some serious damage.
What Happens If You Don’t Floss?
The long story short is that if you don’t floss, you will have unwanted side effects that will often require treatment from your Bakersfield dentist. Some ways not flossing can hurt your oral health include:
We Can Tell
You may think flossing the night before you visit your dentist in Bakersfield is enough to remove any buildup between teeth and up under the gums. However, we can tell if you don’t floss regularly. How? During your cleaning, your gums may bleed. Bleeding gums is the number one indicator of gingivitis, and it doesn’t take long for gingivitis to form. If not caught and treated early, gingivitis can quickly turn into irreversible gum disease that can lead to tooth loss and other whole-body health concerns. For this reason, we always encourage our patients to be honest about their habits. This helps us provide the best preventive dentistry and cater care to the individual.
You’re Not Alone
There is no need to feel embarrassed about not flossing — over 30% of Americans don’t floss every day, so your dentist in Bakersfield is used to talking with patients about the importance of flossing. Discuss your flossing habits with your dentist and work on finding the right flossing product for you. Flossing products can include:
The best floss for you is the floss you will use, so try out a few different kinds of floss to find what’s right for your needs.
One of the best ways to have great dental checkups is to brush and floss your teeth every day. Not to mention, these habits work wonders in protecting your teeth, gums, and overall oral health. | <urn:uuid:171cabbf-ddf6-47b0-8fab-539e96d46ca9> | CC-MAIN-2021-49 | https://www.frankdds.com/do-i-really-need-to-floss/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363135.71/warc/CC-MAIN-20211205035505-20211205065505-00177.warc.gz | en | 0.931264 | 600 | 2.5625 | 3 |
“Meet and confer” is a process that is designed to allow unions, non-represented staff, school boards, and administrators the opportunity to discuss important issues concerning topics related to working conditions. “Meet and Confer” opportunities are not required by law nor do they provide a mechanism for employee groups or unions to insist upon particular proposals or to resolve disputes. The “Meet and Confer” meetings may not necessarily lead to a decision on a particular topic. What they will provide is an opportunity to share information, exchange ideas, receive input, and ask questions. The outcomes of the “Meet and Confer” meetings are increased awareness and greater understanding for all parties involved including those who have the authority to make decisions.
Meet and Confer meetings are posted as Open Session meetings. This means that anyone can attend the meeting. However, it is important to note that the meetings are not open forum. There are individuals invited to represent groups and to act as a spokesperson for those groups. There may be times in the meeting that public comments will be accepted.
If you do not know who the representative is for a specific group, please contact the Superintendent’s office at 743-5055. Meet and Confer meetings are one of many ways the Superintendent and the School Board are using to communicate with employees. | <urn:uuid:1d6e14f0-7f28-44ef-a8da-45a26108fa7f> | CC-MAIN-2017-22 | http://sdjsuper.blogspot.fr/2013/04/meet-and-confer-what-does-it-mean.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463614620.98/warc/CC-MAIN-20170530085905-20170530105905-00237.warc.gz | en | 0.960898 | 272 | 2.6875 | 3 |
If your baby’s teeth are growing in crooked, check out this article to know more about crooked baby teeth and the causes.
Crooked teeth are generally the misaligned teeth that occur in people of all age groups. At the end of this article, you would know about the reasons behind the misalignment of teeth and the precautions that you can take at a very young age for your baby’s teeth growing in crooked.
We generally use the word ‘crooked’ to define something that is not in the proper place. Hence, crooked teeth are misaligned teeth due to irregular and inappropriate tongue movements that a child makes unintentionally. In other words, crooked teeth are the teeth that erupt and start growing to overlap, twist, rotate, or angle to other teeth. There are many reasons that can give rise to the teeth being crooked, some of the causes are listed below.
Causes of Crooked Teeth
If your child has ever been exposed to some facial injury while playing or performing any other physical activity, the teeth might get misaligned. The trauma need not have an intense force but it can still impact the teeth.
Proper diet and nutrition are crucial needs during the early stages of life. This way the body gets enough nutritional elements to facilitate the growth of the child. Malnutrition hinders the normal growth pace of the body and can lead to diseases and issues like crooked teeth.
3. Thumb Sucking
If your child has a habit of sucking his/her thumb while sleeping or sucking on toys, then crooked teeth are likely to arise as the child continues this habit for long.
4. Poor Oral Hygiene
Dentists always advise following strict oral hygiene routines like brushing the teeth twice a day and avoid eating sweets too much. Bad oral hygiene can render the teeth weak and might as well make them crooked and misaligned.
If crooked teeth are visible in the most initial stages of your child’s development where eating habits and oral hygiene are not the reasons, it might be genetic. Dentists advise pregnant women to maintain good dental hygiene to ensure that the baby grows up with healthy teeth.
6. Thrusting the Tongue
Many babies have a habit of making inappropriate tongue movements which shifts the teeth slightly. These slight movements misalign the teeth, thus making them crooked.
7. Mouth Breathing
Babies are prone to minor diseases like common cold and cough, making them breathe via the mouth. Such activities can cause a shift or misalignment in the teeth.
1. Say NO to Thumb Sucking
Refrain your child from sucking their thumb in order to rule out this cause of crooked teeth. Either cover your child’s hand with a mitten so that they don’t get to suck their thumb or apply turmeric on the fingers. When your baby finds that the thumb tastes bitter, they’ll stop sucking eventually. Keep a close check on your child and whenever they start sucking their thumb, try giving them a pacifier or your breasts to suck on.
2. Oral Hygiene
Maintain good oral hygiene of your child to prevent them from developing crooked teeth. Practice brushing the teeth twice every day and eat healthy food with less pH level so that it doesn’t interfere with oral hygiene.
3. Preventive Methods
It is pretty standard for a child to break his teeth during an accident or physical activity. In this case, you can visit a dentist and ask for possible solutions to prevent any adult teeth from growing asymmetrically.
What comes along with crooked teeth?
The issue of crooked teeth never comes alone. It brings along a lot of other things which are harder to cure.
1. The child may experience periodontal issues in which they may face difficulty in cleaning between the teeth. This indirectly leads to the plague.
2. The child might face speech problems as they grow, and the misalignment in the jaw becomes more evident than ever.
3. Many children get an inferiority complex as they feel that others with aligned teeth will make fun of them.
Observing a baby growing into a child and then into an adult is a beautiful experience. There are ups and downs, out of which one is the issue of crooked teeth. It may be a sign that the baby might face specific problems in the future. It would be the best thing if you were very cautious about the growth of teeth in your child to be symmetrical and aligned. If it is not so, then there is nothing to panic about. The first and foremost thing that you can do is consult a dentist. The dentist will guide you with the correct age to begin the treatment.
What, as per the dentists, is the best time to get braces?
It is said that braces are one of the best solutions if the child has misaligned teeth. Different types of braces like metallic, ceramic, etc., are suitable for different kinds of misalignments in children of varying age groups. It ultimately depends upon the severity of the situation and the reason behind the misalignments. As per the doctors, the best age to get braces is between 8 to 14 years.
The last lines
The growth and development of children are pretty unpredictable for the parents. They come across many changes in the body. You should be strong enough to know that everything will not be as per your expectations. There will be times when the child has to undergo certain painful things for their own good. All you require to do is to stand firm and encourage them to inherit good habits. | <urn:uuid:60436511-ab18-40fc-9c4b-d9174b729b4b> | CC-MAIN-2024-10 | https://easydiapering.com/babys-teeth-growing-in-crooked-crooked-baby-teeth/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00666.warc.gz | en | 0.94346 | 1,136 | 2.890625 | 3 |
Scientific Classification of Springhare: Pedetescapensis
Kingdom of Springhare: Animalia
Phylum of Springhare: Chordata
Class of Springhare: Mammalia
Order of Springhare: Rodentia
Family of Springhare: Peditidae
Genus of Springhare: Pedetes
Species of Springhare: P.Capensis
The Springhare belongs to the category of Pedetus genus. These species essentially do not signify hares and originally come from the southern parts of Africa. These species are also called as Springhaas. We explore these queer mammals in detail in this article.
Picture of Springhare
Here we put a few choicest pictures to have a glimpse of the Mammalia class specie.
Some Interesting Facts about Springhare
- As suggested by their name, these species can cover a great distance. They have sensory organs so strong that they can sense the smallest of the vibrations very quickly.
- These species don’t drink water much rather. They rather collect the required moisture from the dew and rain.
- They form a favorite diet for the African Bushmen.
Range Of Springhare
These species are commonly found in Southern Africa, parts of Tanzania, Kenya and South western Africa.
Characteristics of Springhare
Size of Springhare: These species ranges from 14 – 19 inches in length. The tail is almost as large as the body with its size ranging from 14 – 19 inches.
Weight of Springhare: The average weight of these species is 3 kg.
Color of Springhare: The body color of the upper portion varies from cinnamon to reddish brown while the lower portion of the body can be found in colors ranging from white to orange. Their tails are almost always black.
Head of Springhare: These species have large ears and eyes. They also have a muscular neck that provides support the small sized head.
Feet of Springhare: These species have 4 clawed toes on either foot. The claws almost look like the hoofs. The hind feet claws are broader than the forefeet.
Behavior of Springhare
Each leap these species can cover a distance of 2m with assistance from their kangaroo like hind legs and remain active mostly at nights. During the period of extreme droughts, these species can travel for long distance for instance each night they can cover 5 – 12 miles.
They spend the day in the tunnels and usually lock the entrance of the tunnel with sand and soil to protect their privacy as they like to stay isolated. When they wish to leave the tunnel they give large jumps.
They emit a noise after sensing any threat. These species use the four feet for hunting. For feeding purposes they use the forefeet. While resting, they stretch their hind legs forward.
Food Habits of Springhare
These species like to have grass roots, rhizomes, seeds, corns, stems, leaves in their diet. They generally prefer grasses with high water content and love fruits and berries. They can also be spotted having wheat, barley, and oats or sometimes, small insects like grasshoppers.
Habitat of Springhare
One can spot these species in the dry savannas and the arid regions of Africa. They prefer living in plain areas as the presence of rocks & bushes make their movement very difficult. They are found in sandy soil devoid of rocks and bushes or in the grazing fields.
Mating Season of Springhare
These hares mate almost all the year round.
Reproduction of Springhare
These species attain sexual maturity by the age of one. The female counterparts usually give birth to one offspring at a time can produce thrice in a year. The maternity period lasts for 77 to 82 days. Between 2 litters, there is a difference of 101 days. The offspring is found in the burrows.
Life Cycle of Springhare
As compared to other species, these are born covered in fur wrapping their whole body. Usually their eyes open just after the three days of their birth. These species leave the security of their parents only within seven weeks of age.
Predators of Springhare
The known predators of these species are the following:
- Serval cats
- Wild cats
- Large birds like owls.
Adaptations of Springhare
Take a tour of the adaptive features of these species:
- These species are known to keep their head & ears indirect contact with the earth in order to detect the slightest vibration from. They can detect any kind of threat in and around them with their eyes, ears and nose. The springhare has a tragus ahead of the ear that prevents sand from entering their ear.
- In order to defend themselves from their predators they run very fast with assistance from their hind legs. The front legs help them in digging soil.
Caring of Springhare
One can definitely keep these species as pets. Make sure to go through the requisites.
- Proper Housing: One should keep these species in big areas so that they can roam about freely. They should be kept within the house and their personal place should be well equipped with natural habitats. Furniture should be well away.
- Proper Food: These species can have fruits, tubers, grains and seed. They also like to have the seeds of the flowers. In addition to this, they like to have sweet potatoes, potatoes and carrots as well. One should also provide them with ample protein supplement but only after consultation with physician.
- Proper Temperature: Temperature should not be very low.
- Proper Handling: These species do not like to be touched and pampered.
- Temper: These species like to stay isolated. However, one can put 2 or 3 more hares in the same coop.
Life Span of Springhare
The average life span of these species is 8 to 14 years.
Conservation Status of Springhare
In 1996 the population of these species had reduced drastically by 20 % because of foraging. Again, in 2011 these species came in the category of those less important. | <urn:uuid:183ab9f5-125f-46f8-aed3-6f08aa646d95> | CC-MAIN-2020-34 | http://www.animalplace.net/mammals/springhare-facts-characteristics-habitat-and-more/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735860.28/warc/CC-MAIN-20200804043709-20200804073709-00039.warc.gz | en | 0.941159 | 1,248 | 3.125 | 3 |
These are the most primitive of land plants. Most of the liverworts have thalli like those of the wracks, but lying flat on the ground, to which they are anchored by unicellular hairs called rhizoids which are similar tohairs of higher plants. The mosses have bearing and multicellular rhizoids, but have no true . Both types of plants are called gatnetophytes and produce sperm and eggs. The sperm are produced in antheridia while the eggs are retained in flask-shaped structures called archcgonia, to which the sperm swim when the plants are covered with dew. The fertilized egg develops into a different kind of plant called a sporophyte, which is parasitic on the gametophyte and which produces spores that are dispersed by the wind. On germination these spores give rise to new gametophyte plants. The liverworts and mosses, therefore, alternation of generations, the gametophyte generation alternating with the sporophyte generation in the life-cycle.
The Male Fern
The male fern is found in damp and shady woods, and is often grown in gardens. The large leaves or fronds grow to a height of 2 or 3 ft. and spring from a short, thick, horizontal, underground, termed a rhizome. The rhizome is covered with bases which remain as stumps after the upper parts of the leaves have died down. The rhizome grows obliquely upwards, and its growing point is covered by the young leaves, which are rolled inwards from the tip and gradually unfold as they grow. Each frond has a long central stalk from which lateral branches are given off on each side. These lateral branches are termed pinna?, and are also divided into small segments which are pointed and slightly toothed. The young leaves and also the main stalk of the fully grown fronds are covered with small brown scales termed ramenta. Slender brown adventitious roots spring from the bases of the leaves.
The mature leaves become sporophylls, I.e. leaves producing spores. On the under sides of the pinnae of the fronds appear kidney-shaped patches overlying the side veins. Each is known as a sorns and consists of a stalked umbrella-shaped structure called the indusium beneath which develop a number of sporangia arising from the swollen base of the stalk of the indusium , A. Each sporangium is a stalked body with a flattened oval head. Running round two-thirds of the edge of the head is the annulus whose cells have much thicker inner walls, all the outer walls being thin. When the spores within the sporangia are ripe, during dry weather, the indusium dries and shrivels, while the sporangia turn brown. As the sporangia become exposed, their cells lose water and a state of tension is set up in each annulus, the thin outer cell walls of which become drawn in by the remaining water. As a result the annulus straightens out, splitting the wall of the sporangium transversely across the middle region and exposing the spores for dispersal by the wind , C. When completely dry, the thin outer walls of the annulus snap and the annulus flies back into its original, jerking out any remaining spores , D; since the spores are very light they are widely dispersed, and those which alight in damp places germinate in warm weather. Each produces a flat, heart-shaped structure about in. long, which is known as a prothallus. Springing from the under side of the prothallus are many hair-like processes termed rhizoids, which attach it to the ground and act as roots. The cells of the prothallus are thin-walled and contain chloroplasts, so that the plant is able to make its own food.
The sexual organs are borne on the under side, where they lie in the surface film of moisture present between the plant and the soil. Archegonia develop near the apex, whilst the antheridia lie among the rhizoids near the base. The archegonia are simple flask-shaped structures which ripen sucoessively, each one containing a single large female gamete, the ovum, lying in the body of the flask. The antheridia are spherical, and when ripe shed their gametes or antherozoids into the surface film. Each is a spiral with a tuft of short flagella at one end, and swims towards the archegonia, being attracted by a secretion of malic acid. One passes down the neck of a ripe archegonium and fuses with the ovum, forming a zygote. This develops a foot which bores its way into the prothallus,parasitically upon it. A primary grows down into the soil, a grows horizontally, and a simple frond grows upwards to the light to make food. For some time the young plant is dependent on the prothallus for its nourishment, but as the roots and leaves of the fern plant develop, it gradually becomes independent and the prothallus withers and dies.
Alternation of Generations
In the life history of the fern, therefore, there is a regular alternation of the two different structures, namely, the fern plant and the prothallus. Since the fern plant produces the spores it is termed the sporophyte generation, while the prothallus, which gives rise to the gametes, is termed the gametophyte generation. The spore develops into the prothallus, which forms the gametes. From the union of male and female gametes a zygote is produced, which grows into the fern plant. As in the Bryophyta, this regular alternation of sporophyte and gametophyte is termed the alternation of generations. The fern sporophyte is a much larger and more complicated structure than the gametophyte. It is adapted for life on land and requires dry conditions for the dispersal of the spores. The prothallus, on the other hand, is a small simple plant which requires a moist environment in order that the essential process of fertilization may take place. | <urn:uuid:e81b8c35-2ff9-4e2d-b2a9-db71aee1c019> | CC-MAIN-2017-51 | http://www.houseplantsguru.com/biology-of-ferns-liverworts-and-mosses | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948537139.36/warc/CC-MAIN-20171214020144-20171214040144-00464.warc.gz | en | 0.954421 | 1,311 | 3.765625 | 4 |
[ US /ˌənˈɹoʊɫ/ ]
[ UK /ʌnɹˈəʊl/ ]
[ UK /ʌnɹˈəʊl/ ]
unroll, unfold, or spread out or be unrolled, unfolded, or spread out from a furled state
unfurl a banner
reverse the winding or twisting of
unwind a ball of yarn
How To Use unroll In A Sentence
- This brushpot typifies the pictorial quality characteristic of so many later vessels, which were often worked as if the surface of the jade were a sheet of paper or a scroll to be unrolled.
- When you're ready to assemble the canapés, unroll the ballottines and cut each into 2cm-thick slices. Times, Sunday Times
- I used to stay until Claudette Colbert was unrolled from the Persian carpet, then I left.
- Unrolling it with a few clacks, he revealed the map's contents.
- She unrolled the cloth, laid it on the floor, and, after a few seconds 'study, selected a pick and a tensioner. The Empress File
- When I opened my razor case on the following morning, I found a paper, upon unrolling of which I found a ringlet of hair, with the word Felice on the envelope. Travels through the South of France and the Interior of Provinces of Provence and Languedoc in the Years 1807 and 1808
- But in most parts of it, the red carpet so eagerly unrolled for me is swiftly jerked out from under his feet.
- The group showed its appreciation of Mr. Haden by playing his tunes, which unrolled like scenes in a classic film: The bright and optimistic "Hello My Lovely" could have underscored a scene of boy-meets-girl; the romping calypso "Child's Play" belonged under a dance sequence; and the excruciatingly haunting ballad "First Song" clearly represented a moment of heartbreak. Getting Down to Brass Tacks
- Ataren said nothing but got to work on opening and unrolling the old scroll.
- Unrolling his bedroll, Muammar made himself as comfortable as possible, dreams of power and glory still filling his head. | <urn:uuid:43f72f1f-f31d-4bb1-8cf9-ec54ff8f21d2> | CC-MAIN-2022-05 | https://linguix.com/english/word/unroll | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302706.62/warc/CC-MAIN-20220120220649-20220121010649-00654.warc.gz | en | 0.953166 | 501 | 2.796875 | 3 |
Chinese Jade refers to the jade mined or carved in China from the Neolithic onward. It is the primary hardstone of Chinese sculpture. Although deep and bright green jadeite is better known in Europe, for most of China's history, jade has come in a variety of colors and white "mutton-fat" nephrite was the most highly praised and prized. Native sources in Henan and along the Yangtze were exploited since prehistoric times and have largely been exhausted; most Chinese jade today is extracted from the northwestern province of Xinjiang.
Jade was prized for its hardness, durability, musical qualities, and beauty. In particular, its subtle, translucent colors and protective qualities caused it to become associated with Chinese conceptions of the soul and immortality. The most prominent early use was the crafting of the Six Ritual Jades, found since the 3rd-millennium BC Liangzhu culture: the bi, the cong, the huang, the hu, the gui, and the zhang. Although these items are so ancient that their original meaning is uncertain, by the time of the composition of the Rites of Zhou, they were thought to represent the sky, the earth, and the four directions. By the Han dynasty, the royal family and prominent lords were buried entirely ensheathed in jade burial suits sewn in gold thread, on the idea that it would preserve the body and the souls attached to it. Jade was also thought to combat fatigue in the living. The Han also greatly improved prior artistic treatment of jade.
These uses gave way after the Three Kingdoms period to Buddhist practices and new developments in Taoism such as alchemy. Nonetheless, jade remained part of traditional Chinese medicine and an important artistic medium. Although its use never became widespread in Japan, jade became important to the art of Korea and Southeast Asia.
The Chinese character 玉 (yu) is similarly broad as the English word and denotes several similar types of stone. Jadeite is now known as 硬玉 (lit. "hard jade") and nephrite correspondingly as 軟玉 (lit. "soft jade"). Other varieties and uses are similarly distinguished by various compounds, such as 玉器 ("jadewares"), although Classical Chinese employed numerous separate characters for distinct grades. Jadeite, for instance, was first known as 翡翠 (feicui, "kingfisher jade").
The jade radical appears in other words to denote "precious" or "treasured": the simplified characters 宝 and 宝宝 are "treasure" and "baby", respectively. It similarly appears in various chengyu and other Chinese idioms: 玉容 ("pretty face"), 玉立 ("slim and graceful"), 抛砖引玉 (pāozhuān yǐnyù, one of the Thirty-Six Stratagems.)
Jade has been used in virtually all periods of Chinese history and generally accords with the style of decorative art characteristic of each period. Thus, the earliest jades, of the Neolithic Period, are often quite simple and unornamented ritual and impractical versions of the tools and weapons that were in ordinary use, often much larger than normal examples. These are presumed to have been symbols of political power or possibly religious authority. The bi and cong are types of objects only found in jade in early periods, and probably had religious or cosmic significance. The bi is a circular disk with a hole, originally usually plain, but increasingly decorated, and the cong is a vessel, square on the outside but circular inside. In later literature the cong represents the earth and the bi the sky.
Jades of the Shang, Zhou, and Han dynasties are increasingly embellished with animal and other decorative motifs characteristic of those times, and craftsmen developed great skill in detailed small relief work in objects such as the belt-hooks that became part of elite costume. In later periods ancient jade shapes, shapes derived from bronze sacrificial vessels, and motifs of painting were used, essentially to demonstrate the craftsman's extraordinary technical facility.
During Neolithic times, the key known sources of nephrite jade in China for utilitarian and ceremonial jade items were the now depleted deposits in the Ningshao area in the Yangtze River Delta (Liangzhu culture 3400–2250 BC) and in an area of the Liaoning province in Inner Mongolia (Hongshan culture 4700–2200 BC). As early as 6000 BC, Dushan Jade has been mined. In the Yin Ruins of the Shang Dynasty in Anyang, Dushan Jade ornaments were unearthed in the tombs of the Shang kings.
Jade was used to create many utilitarian and ceremonial objects, ranging from indoor decorative items to jade burial suits, reflecting the ancient Chinese belief that jades would confer immortality or prolong life and prevent decay. From about the earliest Chinese dynasties until the present, jade was sourced from deposits in western regions like Khotan and other parts of China like Lantian, Shaanxi. In Lantian, white and greenish nephrite jade is found in small quarries and as pebbles and boulders in the rivers flowing from the Kun-Lun mountain range northward into the Takla-Makan desert area. River jade collection was concentrated in the Yarkand, the White Jade (Yurungkash) and Black Jade (Karakash) Rivers. From the Kingdom of Khotan, on the southern leg of the Silk Road, yearly tribute payments consisting of the most precious white jade were made to the Chinese Imperial court and there transformed into objets d'art by skilled artisans as jade was considered more valuable than gold or silver, and white more valuable than green. Jade became a favorite material for the crafting of Chinese writing materials, such as rests for calligraphy brushes, as well as the mouthpieces of some opium pipes, due to the belief that breathing through jade would bestow longevity upon smokers who used such a pipe.
Jade objects of early ages (Neolithic through Zhou) fall into five categories: small decorative and functional ornaments such as beads, pendants, and belt hooks; weapons and related equipment; independent sculptural, especially of real and mythological animals; small objects of probably emblematic value, including the han (ornaments, often carved in the shape of a cicada, to be placed in the mouth of the dead), and many examples of larger objects — such as the cong (a hollow cylinder or truncated cone)
Six Ritual and Six Ceremonial Jades
The Six Ritual Jades originating in pre-history were the bi (a flat disk with a hole in its center), the cong, the huang (a flat, half-ring pendant), the hu, the flat, bladelike gui, and the zhang. The original names, value and functions of these objects have invited much speculation. The Zhou Li, itself probably compiled in the Han Dynasty, ascribes the circular bi as representing the heavens, the cong as representing the earth, the gui the east, the zhang the south, the hu the west and the huang the north. Although over two millennia old these names and symbolism were given to these objects by much later writers, who interpreted the objects in a way that reflected their own understanding of the cosmos.
The original use of the "Six Ritual Jades" became lost, with such jades becoming status symbols, with utility and religious significance forgotten. The objects came to represent the status of the holder due to the expense and authority needed to command the resources and labour in creating the object. Thus it was as the "Ceremonial Jades" that the forms of some of these jades were perpetuated. The "Zhou Li" states that a king (wang) was entitled to gui of the zhen type, dukes (gong) to the huang, marquis to gui of the xin type, earls (bo) to gui of the gong type, viscounts (zi) to a bi of the gu type and barons (nan) to a bi of the pu type.
Gallery of Chinese jades
Dragon belt clasp
Liu Song Dynasty
Belt plaque with dragon
Belt plaque with dragon
(15th or 16th century)
Brushwasher in the form of a peony
|Wikimedia Commons has media related to Chinese jade.|
- Fiero, Gloria K. The Humanistic Tradition 6th Ed, Vol. I. McGraw-Hill, 2010.
- Pope-Henessey, Chapter II.
- Howard, 19-22
- Pope-Henessey, Chap. IV.
- Watson, 77.
- Liu, Li 2003:3-15
- Martin, Steven. The Art of Opium Antiques. Silkworm Books, Chiang Mai, 2007
- Howard, Angela Falco, Chinese sculpture, Yale University Press, 2006, ISBN 0-300-10065-5, ISBN 978-0-300-10065-5. Google books
- Pope-Hennessy, Una, Early Chinese Jades, reprint edn. READ BOOKS, 2008, ISBN 1-4437-7158-9, ISBN 978-1-4437-7158-0 Google books
- Scott-Clark, Cathy and Levy, Adrian. (2002) The Stone of Heaven: Unearthing the Secret History of Imperial Green Jade. ISBN 0-316-52596-0
- Watson, William, & Ho, Chuimei. The arts of China after 1620, Yale University Press Pelican history of art, Yale University Press, 2007, ISBN 0-300-10735-8, ISBN 978-0-300-10735-7
- Laufer, Berthold, 1912, Jade: A Study in Chinese Archeology & Religion, Reprint: Dover Publications, New York. 1974.
- Rawson, Jessica, 1975, Chinese Jade Throughout the Ages, London: Albert Saifer, ISBN 0-87556-754-1
- Art in Quest of Heaven and Truth: Chinese Jades through the Ages. Taipei: National Palace Museum.
- Between hell and the Stone of Heaven: Observer article on Jade Mining in Burma
- Old Chinese Jades: Real or Fake?
- BOOK REVIEW, The Stone of Heaven: The Secret History of Imperial Green Jade by Adrian Levy and Cathy Scott-Clark | <urn:uuid:8ef4120a-4885-4b08-8483-f4d3a12d1742> | CC-MAIN-2015-35 | https://en.wikipedia.org/wiki/Chinese_jade | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645195983.63/warc/CC-MAIN-20150827031315-00202-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.928303 | 2,227 | 3.703125 | 4 |
Children come from all over the world to attend Rainbow Day Camp in El Cerrito, California.
They come to this San Francisco Bay-area day camp from Los Angeles, Washington, D.C., and even Africa. Parents are drawn to it because it’s a place where their children can be themselves. In particular, their children can be whatever gender they think they are.
Rainbow Day Camp is designed specifically for transgender and “gender fluid” children ages 4 to 12, making it one of the only camps of its kind open to preschoolers.
Since the camp opened three summers ago, enrollment has tripled to about 60. The skyrocketing interest has organizers planning to open a branch in Colorado next summer, and parents and organizations in Seattle, Atlanta, Louisiana and elsewhere have contacted the camp about setting up similar programs.
Each morning at check-in, campers make a nametag with their pronoun of choice, where it’s “he,” “she,” “he/she,” “they,” something else or no pronoun at all. Some children change their name or pronouns each day as if changing shirts to find the one that feels most comfortable.
The Associated Press quoted Molly Maxwell, mother of a 6-year-old boy now participating in camp as Gracie.
“Once she could talk, I don’t remember a time when she didn’t say, ‘I’m a girl.’ Then it grew in intensity: ‘I’m a sister. I’m a daughter. I’m a princess,’ We would argue with her. She was confused. We were confused,” Maxwell said.
So the Maxwells acquiesced to their child at the age of 4, finding a transgender play group and letting Gracie grow her hair, dress as a girl and change her name.
“I see her now, compared to before. I watch her strut around and dance and sing and the way she talks about herself. If she was forced to be someone else,” Molly Maxwell said, trailing off, “I don’t even want to think about that.”
Specialists say the camp is merely a reflection of a nationwide trend: More and more children are coming out as transgender at a young age. One of the reasons is more parents are paying attention when their children express confusion about their gender.
The AP quoted camp founder Sandra Collins: “I didn’t know you could be transgender at a very young age. But my daughter knew for sure at two.”
Award-winning journalist and columnist David Kupelian, who serves as WND’s vice president and managing editor, said children who believe they are the opposite gender are usually just going through a phase.
“It’s indisputable – and multiple peer-reviewed studies prove this – that the vast majority of children who experience gender confusion in their early years will totally outgrow it by late adolescence and develop just fine in accord with their immutable biology and genetics,” asserted Kupelian, author of “The Snapping of the American Mind.” “In other words, boys will grow up to become men, and girls will grow up to become women, even if they went through a phase of strongly identifying with the opposite sex.
Kupelian noted the former top psychiatrist at Johns Hopkins Hospital, Paul R. McHugh, M.D., confirms this, saying, “When children who reported transgender feelings were tracked without medical or surgical treatment at both Vanderbilt University and London’s Portman Clinic, 70 to 80 percent of them spontaneously lost those feelings.”
Studies show transgender adults suffer from higher rates of suicide and depression than the general population. This leads Kupelian to ask why so many parents, along with the LGBT movement and seemingly the entire Democratic Party, push children toward a gender transition when the feelings they are experiencing now will likely go away in time.
“Little children are wonderful, innocent and even brilliant in many ways, but they don’t know a whole lot and have a tenuous relationship with reality at so tender a young age,” Kupelian said.
“The line between reality and imagination is not yet solid, and they need parents to lovingly establish those boundaries between reality and fantasy,” he said. “A little boy’s idea that he is a girl, or can become a girl, is a fantasy, not reality. Instead of encouraging our children toward a lifetime of conflict, confusion and misery, we would do much better just to be calm, stable parents and patiently wait for our kids to naturally outgrow what is almost always a temporary phase, so they can mature into the beautiful people they were created to be.”
Michael Brown, president of FIRE School of Ministry, said he doesn’t think it’s good for society when more and more children are concerned about their gender identity.
“I read an article in which specialists in the field were speculating as to why there was a threefold spike in kids going to clinics to help with gender issues,” Brown told WND.
“The specialists suggested that part of this was due to transgender messaging in the schools, which adds to the children’s confusion. How many girls who are tomboys will become convinced that they’re really boys, leading them down a dangerous path? And why make gender distinctions into some kind of antiquated concept, an enemy to be resisted? As I argued in my book ‘Outlasting the Gay Revolution,’ we play with these things at our own societal risk.”
Brown, a WND columnist, said his hope for outlasting the “gay revolution” ultimately rests in God, not people, and he is looking to God for a gospel-based moral and cultural revolution no matter how far society falls.
“I do have compassion on kids who struggle with their gender identity,” Brown said. “But I honestly believe that LGBT activists will overplay their hand, and that’s what we see happening now, as the same society that so easily embraced homosexual activism is having a pause (and even pushback) when it comes to transgender activism.”
Today, many experts at gender clinics take a “gender affirmative” approach with their child patients, focusing on helping transgender children to live as the gender they identify with until they’re old enough to decide whether they want to pursue medical options such as puberty blockers or hormone treatments.
Scarlett Reinhold, the 9-year-old transgender child of camp director Sandra Collins, was quoted as saying, “I feel comfortable for being who I am and who I want to be.”
Scarlett was born a boy but now believes he is a girl.
International journalist and educator Alex Newman believes the gender confusion among children is a natural outgrowth of an American education system that has gone off the rails.
“This is an extraordinarily sad development,” Newman told WND. “But as [Samuel Blumenfeld and I] show in ‘Crimes of the Educators,’ after so many generations of having government schools dumb down and indoctrinate children, it was to be expected. In fact, this is the obvious and inevitable fruit of brainwashing public school kids into the religion of secular humanism.
“This self-evidently false faith denies even the very existence of the Creator, thereby denying the existence of objective truth, either in morals, biology, or anything else,” he said. “And yet, in a seeming contradiction, this false religion is taught as truth in every government school in America under the guise of secularism and even ‘science,’ while merely mentioning God is enough to bring down the wrath of the lawless federal courts. That is why we have explosive growth in gender confusion among children.” | <urn:uuid:c0583fe1-5df1-4be0-bc35-8288d4074b24> | CC-MAIN-2017-51 | http://mobile.wnd.com/2017/08/transgender-day-camp-caters-to-kids-as-young-as-4/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948592846.98/warc/CC-MAIN-20171217015850-20171217041850-00352.warc.gz | en | 0.96942 | 1,673 | 2.671875 | 3 |
- Series: Pioneer Portraits II: 1875-1899
- City: Toledo
- Team: Blue Stockings
- League: American Association
Moses Fleetwood Walker (1857-1924) was likely not the first African-American to play major league baseball. For that distinction, historians have made a case for William Edward White, who played a game with the Providence Grays on June 21, 1879. Subbing for injured first baseman Joe Start, Bill White hit a single in four at bats, stole two bases, scored a run and recorded 12 putouts without an error, contributing to a 5-3 win for the title-bound Grays and a 19 year old pitcher named John Montgomery Ward. By the next game, White had been replaced at the position by regular right fielder and Hall of Famer Jim O’Rourke, who continued to man first base until Start returned. The historic event established a one game career in the major leagues for Bill White that predates Fleet Walker’s appearance by five years.
Fleet Walker became the second African-American major leaguer when he played for the Toledo Blue Stockings of the American Association in 1884. Toledo’s star pitcher was Tony Mullane, who considered Fleetwood “the best catcher I ever worked with.” Sadly, Mullane succumbed to the bigotry of his own and his day and, despite the negative consequences his maladaptive behavior bequeathed his team, repeatedly crossed Walker up by ignoring his signs. Mullane’s dangerous deceit led to a series of injuries for Fleetwood, including a season ending broken rib. Despite the difficulties and indignities, Fleet hit .263 on the year, which was a few ticks higher than league average.
Toledo went 46-58 in 1884, finished 8th in the league and folded at the end of the season. The graceful and talented Walker returned to minor league ball in 1885 and, when his playing days were past, led a noble life as an inventor, author and educator.
- Moses’ brother, Weldy Wilberforce Walker joined him in Toledo mid-season, becoming the third and last black player in the major leagues until Jackie Robinson appeared 63 years later. Weldy got into five games, played the outfield and hit .222 in 18 plate appearances.
- Hank O’Day was Toledo’s other pitcher in 1884, going 9-28 with a 3.75 ERA in 327 innings. Mullane was clearly the ace, going 36-26 with a 2.52 ERA in 567 innings. Ars Longa alumni on the team: Tony Mullane, Hank O’Day, Curt Welch, Tom Poorman & Deacon McGuire.
- Playing with the Newark Little Giants in 1887, Fleet Walker caught George Stovey, perhaps the best African-American pitcher of the 19th century. It was the first African-American battery in non-segregated professional baseball history. Ars Longa alumni on the team: John Henry, Mickey Hughes, John Irwin & Tom McLaughlin.
- On April 7, 1887, Walker caught Stovey in an exhibition game against the New York Giants, losing 3-2 to Tim O’Keefe. The 1887 Giants were a 19th century juggernaut, featuring Keefe, John Montgomery Ward, Roger Connor, Buck Ewing, Mickey Welch & George Gore among a host of other excellent players. John Ward was so impressed by the battery (and by Stovey in particular) that he convinced manager Jim Mutrie to sign the two. Legend has it that Mutrie did make an attempt to purchase the players’ contracts, and it’s not entirely clear why the transaction failed to materialize, but later that year the Sporting Life reported that the Brooklyn Bridegrooms were also trying to purchase Stovey’s contract.
- Just one year later in 1888, Fleet joined the Syracuse Stars and formed non-segregated professional baseball’s second African-American battery with pitcher Robert Higgins. Higgins was great, going 17-7 with a 2.76 ERA en route to an International League title for Syracuse. Ars Longa alumni on the team: Billy Serad, Con Murphy, Frank Gilmore & Cupid Childs.
- Walker endured the venom of Reconstruction Era racism. He resorted to alcohol to soothe the rage and the pain, contributing to a downward spiral that left him in despair of racial reconciliation. | <urn:uuid:2b2edc19-32c8-4534-b65d-ea31a8253cf3> | CC-MAIN-2021-31 | http://arslongaartcards.com/city/toledo/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154158.4/warc/CC-MAIN-20210801030158-20210801060158-00164.warc.gz | en | 0.965383 | 924 | 2.6875 | 3 |
This is a guide to some of the methods I used to create the animated particle system shown above, it is not a full step by step tutorial for anyone to use. It should however, easily show you the steps used and some of the ways you can apply this same set of tools in your own animation projects.
The first thing I did was to pick an audio clip so I could do some audio processing. I used several audio tools (from my video editor) to audacity to produce three separated audio tracks, each from the source track I selected. I created:
- a bass track that was a low pass filter below 400Hz
- a midrange for the vocals with a band pass filter from around 1KHz to 3Khz
- a treble track, high pass filtered above 5KHz
I added some smoothing and noise filters to get the audio with a bit more definition and not all noise so it would be more distinguished. This gave me separate audio to use in modo, which I imported in along with the original track. I also created one more smoothed audio track (which I called my cleaned track in the screenshot below)
Next, I create a subD cage of what I wanted to use as the emitter source for my particle animation. I made this simply by subdividing a cube a couple times, selecting and beveling just the edges, then selecting the boundary of those edges, converting them to polys, deleting the unselected holes and then thickening and adding edges to give it some width.
I had done some testing using different surface generators and determined that I did not have enough control over the particle emission from the surface, so I added a series of emitters for each of my audio tracks. I added them as children to a locator so I could easily keep things symmetrical. My midrange consisted of 4 emitters, all on the XZ plane around the sphere at its four sides. My treble I put four emitters all facing up at 45 degrees angle and offset by 45 degrees on the Y axis. I mirrored that hierarchy to have the same treble emitters out the bottom at 45 degrees so the midrange emitters. Then lastly, I put in some base emitters, 4 on the horizontal plane, 45 degrees from the midrange and one out the top and one out the bottom for more emphasis.
Next I started building my schematic with the audio track, starting with the base track. Here I wanted to easily control the output level and to capture an absolute value of the amplitude to get a more consistent particle stream (I’m not sure this is necessary) since I was seeing negative output values from the audio track.
Next, I did some work to get better animation control of the audio tracks with some simple user channels. To my top level locator, I added cutoff_base, cutoff_midrange and cutoff_treble, each are used to control the amplitude cutoff point for each emitter so that they can easily be animated and controlled during the animation for when each track gets emphasized. I planned on putting only the vocals, then only some treble and then powering up the base in the portion of the track where this is obvious. The audio tracks I had still had enough base to be emitting, so these new user channels allow me to animate the cutoff amplitude. The cutoff is done with a channel modify using if greater than, and the user channel is in that comparison. You can see the settings I used here:
The rest of the particle system then needs to be driven by these audio channels and modifiers. I’ve connected mine up through my main locator (to a user channel) and then that locator channel drives each of the emitter rates on the base emitters. You can hook them up directly if you want as well, I just had this method to start from some previous key frame animation testing. You should have your base track all driving your particle system emitters now.
I had a replicator setup to visually the particles when I started this, but the final animation was all done with sprites rendering, which will be covered later in this article. You don’t have to hook that up, just make sure you feed your particle simulation for your base track. So, this same process needs to be done very similarly now for your midrange and treble tracks and you will end up with a large connected schematic to drive everything, but its mostly duplicates.
OK, you should have everything driven from your audio tracks, make sure you use the proper audio media track for each particle system and the emitters should each be connected to the appropriate particle simulation, since you should have one for each audio track (base, mid, treble). You can also see from my schematic that I had added the assembly, Scale by Age, to each particle system but this was not needed for the sprite rendering I used, it was needed when I activate the replicators and want those replicators to scale with age.
Also, the bottom left of my schematic view above, you can also see I had one more audio track connected to the intensity channel of my point source. You can either scale it up from the audio channel itself or add an expression modifier as I did to control the amplitude scaling, similar to the base track described above. So, I added a simple locator display to make the root locator easy to grab and channel haul for some animation setup. The user channels in it are for my cutoff amplitudes. This allows me to make my animation have easy to keyframe segments that emphasize different levels in base, mid and treble from the audio.
Then I setup my animation keyframes to test out different levels on the amplitudes to get the emission rates I wanted. My graph editor ended up with this kind curves for my three audio tracks.
You can see the base starts out in the song with a very high cutoff for the amplitude so you don’t get any of the base emitting until late in the animation. The end shows how I cutoff the base and midrange earlier and then left a very steep cutoff for the treble which you see at the end of the animation ending on some high frequencies fading off from the emitters.
So, then I used the playback of modo’s audio timeline to scrub along, find points of interest and change the animation of the main emitter ball to move, rotate and scale to some of the beat changes and effects in the song. The spinning effects and size changes produce a nice particle effect since everything now follows the emitters. Here’s a quick view of the keyframing I did for the animation above. I hope you can come up with something you like for your own creation. This part was pretty straight forward, using the simulation to watch a few seconds at a time and check that I liked it.
Finally, I wanted more variation to the particles themselves without having to have more motion with the emitter, so I added a couple forces, one to the treble and one to the base track, leaving the midrange to emitted without turbulence. The settings I applied with separate seeds for randomness are shown below:
On to rendering your now sweet particle system. I chose to use sprites for this animation for fast rendering and because I’ve had some issues (I think it is to be fixed in SP1) with particle age shading gradients not working with replicators. Anyway, sprites work great and render really fast so here is the sprite setup I’m using for my base-sprites.
In that sprite setup gradient, the yellow curve is the age size fallup and it falls off to zero size after 3 seconds since my particles cull at 90 frames (3 sec). The color burns with age as well so you can pick the colors you want, just remember to set the age to the time in seconds you use for your culling on the particles. Cache a few areas of your simulation so you can render it in preview, otherwise the sprites won’t show in preview. With some areas cached, you can setup your colors, timing, test the fades. Any changes to your audio cutoffs, you will have to recache the particle simulation to see it in preview again which should be VERY fast for just a few seconds.
I set some spotlights with a slight color around my scene and the point light in the middle of the emitter, I oscillated up and down within the emitter so it would cast shadows out with changing rays. To accomplish this I had to enable volumetrics on the point light as the screenshot below.
So, that should get you something very close to the animation above or at least helped you with your own particle creations in MODO701. I’m loving the new version and have to say, particles are very robust and powerful, I know I’ll be using them on many future projects, so this project was a lot of fun to explore them and the new audio system to see what I could do with it. I help the tutorial has helped. Enjoy. | <urn:uuid:f6230110-4f24-47de-9533-b37ea759afbb> | CC-MAIN-2021-31 | https://www.ethereal3d.com/2013/04/using-audio-to-drive-particle-systems-in-modo701/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151641.83/warc/CC-MAIN-20210725080735-20210725110735-00139.warc.gz | en | 0.951347 | 1,859 | 2.796875 | 3 |
The Alantropa plan does sound absurd today to many, but in the 1920s, it was taken seriously by engineers, politicians, architects, and even the United Nations, at one point. There were hundreds of articles in the German and international press supporting the project, and currently, thousands of publications and lectures about Alantropa can be found in a special section in the archive of the Deutsches Museum in Munich. The grandiose plan involved partially draining the Mediterranean Sea and uniting Europe and Africa into one supercontinent.
German architect Herman Sörgel, who was the brain behind the project, believed his plan was the only way to prevent another conflict. World War I had at the time plunged Europe into crisis. Europe’s future was uncertain. After having lost a lot of lives in the war, it was now faced with mass unemployment, poverty, overpopulation while an energy crisis was imminent.
Having experienced all these, Sörgel was convinced that his Alantropa project, which would among others create more land to develop more infrastructure, would help curtail these European problems while ensuring peace. Here’s how.
In 1927, having been inspired by other gigantic engineering projects like the Suez Canal, a 42-year-old Sörgel developed his plan for Atlantropa, which he originally called Panropa. The plan involved building a network of dams. The biggest would be built across the Straits of Gibraltar between Spain and Morocco, separating the Mediterranean from the Atlantic Ocean. A second dam would be built across the Dardanelles which would shut off the Black Sea. A third dam would also be placed across the Strait of Sicily, linking Italy to Tunisia and cutting the Mediterranean in two, with different water levels on either side.
These dams would together link Europe to Africa via roads and railways, facilitating the transportation of African minerals and oil to European processing and production centers, a report noted. What’s more, each of the dams would provide hydroelectric energy, supplying Europe with all the power it needed. With a total of 660,200 km2 of new land expected to be reclaimed from the sea, Europe would also have an abundant supply of food from new farmland while Europe’s nations would also have space to expand.
Sörgel maintained that the scale of the Alantropa project, which requires cooperation between countries in terms of money and people power, would put aside the thoughts of getting involved in future conflicts. Again, labor would be needed for the project, giving jobs to the many unemployed at the time.
The German architect believed in Alantropa so much so that he did not only promote it vigorously through the press, films, talks, exhibitions, and poetry, but he also founded the Atlantropa Institute to make his plans known to all. Yet, he failed to talk about the “racist underpinnings” of his project. As part of Alantropa, the Congo River would be blocked, flooding Central Africa and its inhabitants. Ultimately, Alantropa would see Europeans ruling as the dominant race with Africans being a source of labor. Africa’s resources and land would also be at their disposal.
Fortunately, no one gave Sörgel any signs of wanting to invest in his project, despite its popularity. The Nazis, who believed in the concept of Lebensraum (territory to provide space to its members), thought the initiative was impossible and preferred to invade occupying countries to achieve their aim. World powers were also during the time more interested in nuclear power than in hydroelectricity. Thus, Alantropa was never realized. However, following Sörgel’s death in 1952, his idea lived on in science fiction as seen in Phillip K. Dick’s The Man in the High Castle and Grigory Grebnev’s novel, The Flying Station. | <urn:uuid:1fe7c6b9-1996-4584-9d7d-9a4177e607b3> | CC-MAIN-2021-43 | https://howafrica.com/the-bonkers-real-life-plan-to-drain-the-mediterranean-and-merge-africa-and-europe-into-one-super-continent/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585522.78/warc/CC-MAIN-20211022212051-20211023002051-00542.warc.gz | en | 0.978278 | 806 | 3.765625 | 4 |
What Factors Influence the Function of a Greenhouse?
A simple greenhouse consists of nothing more than a translucent material stretched over a frame. Sun enters the structure and warms the inside and the enclosure traps the heat. A gardener can use this additional heat to grow plants that normally wouldn't grow in the cool air outdoors. Beyond this simple basic theory, however, are several factors that can improve the function of a greenhouse.
Location and Orientation
The location and orientation of a greenhouse determine the amount of light that enters it. If you build your greenhouse in the shade of trees or other buildings, the limited light will not only mean less light for the plants, it will also mean less heat. When orienting a greenhouse, make sure to track the sun against all its sides throughout the entire growing season. Strong, even light on the longest sides of the greenhouse will give your plants the light and heat they need and will decrease the cost of supplemental lighting and heating.
Glass is the traditional covering for a greenhouse. New materials, however, offer advantages over glass. John M. Dole, Assistant Professor of Floriculture at Oklahoma State University, recommends comparing durability, insulation, care and cost when choosing a greenhouse covering. Glass lasts a long time unless it is broken in a storm or accident. Synthetic materials like polyethylene or polycarbonate are less likely to be broken accidentally, but they don't last as long and they tend to attract dust, so they require more cleaning and maintenance. Double panes of any material insulate better than single panes, but double panes are both more expensive and heavier. Choosing a greenhouse covering is always a compromise between competing functional factors.
If you use your greenhouse to extend the growing season or to provide a bit more warmth than your part of the world offers, you may be able to get by without additional heat. If, however, you want to grow plants during a cold winter or a winter without much sun, you will need a heater. David S. Ross, Extension Agricultural Engineer at West Virginia University recommends a 220-volt circuit electric heater for a small home greenhouse. Larger professional greenhouses require larger and more elaborate systems.
Ventilation serves a number of functions inside a greenhouse. Venting hot air to the outside can keep the greenhouse from getting too hot. Circulating air within the greenhouse can keep hot air from accumulating near the ceiling and cool air from pooling near the floor. Exchanging air with the outside can keep moisture from building inside the structure. Too much moisture creates an environment in which diseases thrive and also causes condensation on the glass, which cuts down on the amount of light entering the greenhouse. Ventilation can be as simple as opening roof or wall panels. In a larger greenhouse, fans encourage additional circulation.
- West Virginia University Extension Service: Planning and Building a Greenhouse
- North Carolina State University: A Small Backyard Greenhouse for the Home Gardener
- Oklahoma Cooperative Extension: Greenhouse Structures and Coverings
- University of California: Year-Round Gardening With a Greenhouse
- University of Alaska, Fairbanks: Controlling the Greenhouse Environment
Susan Peterson is the author of five books, including "Western Herbs for Martial Artists and Contact Athletes" and "Clare: A Novel." She holds a Ph.D. in text theory from the University of Texas at Arlington and is an avid cook and gardener. | <urn:uuid:01ae09a8-05c5-4965-afc0-4593493ec33f> | CC-MAIN-2022-21 | https://homeguides.sfgate.com/factors-influence-function-greenhouse-47550.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663021405.92/warc/CC-MAIN-20220528220030-20220529010030-00286.warc.gz | en | 0.919347 | 722 | 3.671875 | 4 |
SpaceX brings home Dragon with 2,700 pounds of cargo
BY STEPHEN CLARK
Posted: March 26, 2013
A suite of refrigerated biomedical research samples and other equipment traveled from the International Space Station back to Earth on Tuesday, nestled inside a commercial Dragon spaceship completing a 25-day resupply flight to the orbiting scientific laboratory.
Designed, built and operated by SpaceX, the California-based space firm founded by Elon Musk, the capsule arrived on Earth less than six hours after departing the space station with nearly 2,668 pounds of cargo strapped inside the craft's shirtsleeve-environment cabin.
Recovery boats were on hand to retrieve the floating capsule and hoist the gumdrop-shaped spaceship on deck to sail to the Port of Los Angeles, where it was supposed to arrive as soon as Wednesday.
NASA plans to take charge of the most sensitive experiment samples in Los Angeles and fly the cargo back to laboratories in Houston. The rest of the equipment will be handed over to NASA once SpaceX transports the capsule to its facility in McGregor, Texas.
SpaceX has a $1.6 billion contract with NASA for at least 12 unmanned resupply missions to the space station. Tuesday's splashdown ended the second of the dozen contracted missions, coming five months after the first operational flight in October 2012.
Before the Dragon spacecraft left the space station, astronauts packed biological specimens, including bags of blood and urine, into freezers to preserve the samples for scientists on Earth. Researchers will use the samples from space station crews to study how the human body reacts to long-term spaceflight.
A SpaceX spokesperson said all the cargo was in good shape, including the refrigerated specimens, which were kept at cold temperatures throughout the descent, splashdown and recovery procedures. A freezer lost power on the Dragon's last flight in October, but no such problems occurred Tuesday, the spokesperson said.
Other science payloads returned inside the Dragon spacecraft focused on the growth of plants in space, solar power generation, the formation of crystals in metal alloys, medical diagnoses aboard the space station, and scores of other investigations.
The space station astronauts closed the hatch leading into the Dragon spacecraft Monday, and the lab's robotic arm removed the capsule from a berthing port on the complex early Tuesday. Controlled by ground controllers and then astronaut Tom Marshburn, the 58-foot arm let go of the resupply vehicle at 6:56 a.m. EDT (1056 GMT).
"Sad to see the Dragon go," Marshburn radioed mission control in Houston. "Performed her job beautifully heading back to her lair."
A deorbit burn beginning at about 11:42 a.m. EDT (1542 GMT) put the craft on course for re-entry. Shielded by an envelope of carbon ablator, the Dragon fell through the atmosphere about a half-hour later, encountering temperatures as hot as 3,000 degrees Fahrenheit as it streaked across the Pacific Ocean toward the splashdown zone southwest of San Diego.
Parachutes unfurled to stabilize the craft as the capsule plunged into the stratosphere, then three main chutes opened at an altitude of about 10,000 feet to slow the Dragon's descent to less than 15 mph.
Recovery teams spotted the capsule before it hit the water and were alongside the spacecraft within a half-hour to begin safing operations.
The Dragon cargo carrier launched March 1 on SpaceX's Falcon 9 rocket and almost immediately encountered trouble. Three-fourths of the spacecraft's thrusters failed to activate after deployment from the Falcon launcher, leaving SpaceX engineers scrambling to salvage the mission.
Working in a control center at SpaceX's headquarters in Hawthorne, Calif., engineers commanded the Dragon's propulsion system to open and close a series of pressurization valves, a procedure known as "pressure slamming," to resolve the problem, which Musk attributed to possible blockage in helium pressurant lines.
The Dragon spacecraft's propellant tanks were supposed to pressurize shortly after arriving in orbit, but with one of four thruster pods activated normally, the unmanned freighter was left drifting around Earth while controllers tried to fix the glitch.
SpaceX convinced NASA it had a handle on the problem, and the space agency cleared the Dragon spacecraft to approach the space station March 3, one day later than scheduled because the capsule missed a maneuver to catch up to the complex while SpaceX struggled with the propulsion system malfunction.
The Dragon delivered 1,869 pounds of supplies to the space station when it arrived March 3.
After the retirement of the space shuttle, the Dragon spacecraft is the only vehicle capable of returning large amounts of cargo from the space station to Earth. Russia's crewed Soyuz capsule can only accommodate limited cargo when landing with a three-person crew.
Space station managers value the capacity to return cargo to Earth. Some experiments require the hands-on attention and analysis of researchers on the ground, and broken components from the space station's extensive power, life support and other systems could be examined and refurbished for launch on a later mission, helping engineers understand failure modes and avoid unnecessary purchases of new hardware.
The space station's fleet of logistics vehicles also includes the Russian Progress freighter, the European Space Agency's Automated Transfer Vehicle, and Japan's H-2 Transfer Vehicle.
NASA partnered with SpaceX and Orbital Sciences Corp. to design and test commercial cargo spacecraft to pick up some of the station resupply duties of the space shuttle. The space agency provided technical support and funding to support the privately-led effort.
Orbital Sciences plans to start flying its Cygnus spacecraft to the space station as soon as this summer. The first test launch of Orbital's Antares rocket is scheduled for mid-April from the Mid-Atlantic Regional Spaceport at Wallops Island, Va.
Free shipping to U.S. addresses!
The crew emblem for the final space shuttle mission is now available in our store. Get this piece of history!
Free shipping to U.S. addresses!
The final planned flight of space shuttle Endeavour is symbolized in the official embroidered crew patch for STS-134. Available in our store!
Ares 1-X Patch
The official embroidered patch for the Ares 1-X rocket test flight, is available for purchase.
This beautiful one piece set features the Apollo program emblem surrounded by the individual mission logos.
The Orion crew exploration vehicle is NASA's first new human spacecraft developed since the space shuttle a quarter-century earlier. The capsule is one of the key elements of returning astronauts to the Moon.
Fallen Heroes Patch Collection
The official patches from Apollo 1, the shuttle Challenger and Columbia crews are available in the store.
INDEX | PLUS | NEWS ARCHIVE | LAUNCH SCHEDULE
ASTRONOMY NOW | STORE
© 2014 Spaceflight Now Inc. | <urn:uuid:810c752b-bbca-4c7d-9491-b3a3d6fe2ca9> | CC-MAIN-2014-49 | http://www.spaceflightnow.com/falcon9/005/130326splashdown/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379512.32/warc/CC-MAIN-20141119123259-00100-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.923376 | 1,408 | 2.5625 | 3 |
Effective Rat Removal - About Rats
- The common brown rat can measure up to 40cm in length including the tail, which is thick and scaly.
- Reddish brown/dark grey in colour with small ears and a blunt nose, their weight varies from 150 to 300grams but can be up to 500grams.
- Rats have upper and lower incisor teeth that continue to grow throughout their life.
- Females breed throughout the year and can have up to 5 litters producing on average 5 to 8 young, although up to 14 is not uncommon.
- A rat can pass up to 40 droppings a day which are concentrated in one area (12mm in size and tapered at both ends).
- Mainly active at night, rats live where they can find food, water and shelter.
- A healthy rat can live up to 2 years - the average life span is 1 year.
- The rat is a carrier of many serious diseases.
- The latin name for the Common Brown Rat is Rattus norvegicus
|Rats Can Live up to 2 Years|
|Rats cause damage by gnawing|
|Rats congregate around waste|
- Droppings, smell, hairs, smear marks, swing marks, tail marks, footprints, rat runs, noises in the roof space and wall cavities at night time.
- Chewed and damaged food and stored stock. Gnawing damage to electric cables, plastic pipes, roof timbers and to door bases (to wear down their front teeth).
- Burrows - entrance holes 7-10cm in diameter evident at the side of sheds, log piles and the edges of paving stones.
- Rodenticide baits installed into lofts, basements, riser cupboards, plant rooms, under-stair cupboards, sheds and any other areas that are necessary or safe to do so.
- Weekly follow up visits are included until the rat infestation has been cleared.
- Any dead bodies found will be removed and disposed of through our controlled waste management system.
- We use heavy duty metal locked bait boxes. These are installed into rat runs and areas where rats are foraging for food.
- Rats are very cautious of new objects and it can take several days for the rats to become used to the bait boxes and to start feeding inside the boxes.
- If rat burrows are found, bait is applied directly into the burrows and we would ensure the burrows are covered. Our risk assessment will always choose the safest method of control, even if it is not the quickest.
- Weekly follow-up visits are included until the infestation has been cleared.
- Good management of waste food and rubbish in bin areas is recommended as rats seen by the public will cause an instant bad reputation due to humans having a general fear because of their size, speed of movement and the diseases they spread. Heavy duty bait boxes will prevent rats becoming established in these areas.
Rodent Control Essex, Essex Rodent Control, Pest control Essex, Essex Pest Control, Rat Control Essex | <urn:uuid:a4ac7dec-b664-4384-9b3b-a26eea2c9411> | CC-MAIN-2014-52 | http://www.stgeorgespestcontrol.co.uk/page_21.php?pgenme=rats | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768089.153/warc/CC-MAIN-20141217075248-00164-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.938283 | 639 | 3.28125 | 3 |
- LAST REVIEWED: 05 May 2017
- LAST MODIFIED: 31 August 2015
- DOI: 10.1093/obo/9780199756797-0151
- LAST REVIEWED: 05 May 2017
- LAST MODIFIED: 31 August 2015
- DOI: 10.1093/obo/9780199756797-0151
The term food systems refers to the complex of institutions, actors, and actions that take place across the spheres of food policy regulation, production, distribution, marketing and exchange, consumption, and, more recently, the postconsumption activities of waste disposal and recycling. Within each of the spheres there are multiple activities—for example, production involves plant seed and animal genetic development; fertilizer, pesticide, and veterinary medicine manufacture; on-farm growing and harvesting activities; commodity sale negotiations with wholesalers or retailers; and environmental management to ensure consistent production capacity. Food systems also have a spatial dimension, being manifest at the household and community or local level, and at the national, regional, and global levels. One of the major changes in food systems over the last two hundred years has been the transition from household subsistence activities, with minimal commercial relationships, to highly complex, multilevel systems, with participation from international agencies, transnational corporations, multiple government agencies beyond agriculture and trade, nongovernment agencies, professional bodies, research and policy bodies, and social movements. Within a context of growing malnutrition, civil unrest sparked by food shortages and price rises, and environmental constraints on the food supply, public health researchers now work alongside agricultural economists, environmental scientists, and economists to advocate for transdisciplinary research to advance the case for health-promoting and sustainable food systems. The new perspectives—public health ecology; One Health, which involves equal consideration of animal and human health; and agri-health, which involves equal consideration of agri-environmental health and human health—share a concern that the dominant model of industrial food systems is delivering poor health outcomes, is unsustainable, and is unjust. Industrial food systems adopt a narrow focus of the most efficient production of the highest possible food yields to be distributed via commercial channels to mass consumer markets. This approach to feeding populations has been very successful in increasing the amount of calories available globally, but it has led to numerous population and environmental concerns, prompting civil society to support alternative food systems that stress quality over quantity, fair returns to farmers over corporate profits, environmental protections over food yield maximization, and producer-consumer engagement over a relationship built on price, Through the office of the United Nations Special Rapporteur on the Right to Food, renewed attention is being paid to the human right to adequate nutrition through fair livelihoods for those who are formally engaged in the food system, given that a high proportion of the world’s farmers and fishermen live in poverty. The interrelationship between human security, principally freedom from want and fear, and nutrition security has also come onto the United Nations agenda.
As systems constructed out of a diverse array of nature-society interactions, and with multiple spheres of sociocultural, political, economic, and environmental activity that vary from place to place, food systems are typically examined using an array of mixed methods. Global databases exist—EUROSTAT, FAOSTAT—which permit comparative national examinations of particular food supply issues (including available nutrients and prices) and food consumption trends (including nutrients utilized). There are also opportunities to analyze the impacts on nutrition of natural experiments, such as the Cuban experience of domestic food self-sufficiency, wartime food rationing, and structural adjustment programs. However, assessing cause and effect relationships, understood in the epidemiologic sense, between the operations of a food system and health outcomes is rarely possible. The interdisciplinary nature of food system scholarship means that systematic reviews are not undertaken, although there are an increasing number of special journal issues and edited collections which focus in some detail on an aspect of the system, like retailing, or a specific problem, like aquaculture sustainability. A selection of relevant special journal issues and edited collections is provided below under Journals/Special Issues and Edited Book Collections. The works in this section provide an introduction to the origins of the modern food system as understood from different disciplines: social history, anthropology, development sociology, and economic geography. One social history, Toussaint-Samat 1992, moves from the Paleolithic age, and the evolution of fire, to the present science and technology–based food supply; while Mintz 1985 covers the transition of a single commodity over a period of 500 years, but in a way that sheds light on the types of economic, cultural, and geopolitical considerations lying behind the contemporary food system. Winson 2013 describes how dramatically diets have changed with industrialization over the past 150 years. From economic geography comes a co-edited collection describing the changing nature of pastoral systems (occupying 25 percent of the world’s land area and central to the livelihoods of 200 million households), which traces not only the centuries-old marketization of livestock, but also the more recent pressures on food system livelihoods coming from global supply chains (Gertel and LeHeron 2011). From development sociology, Friedmann and McMichael 1989 explains the modern food system in terms of the dynamics of capitalist economy formations, specifically industrialization. Hawkes, et al. 2010 provides insight into one of the most pressing food system governance issues with a bearing on food security in relation to global food trade. Again from sociology comes Warde 1997, an early empirical study of consumption, including attempts to better understand the adoption of “healthy” foods. This work is regularly cited in more contemporary examinations of sustainable consumption practices. Finally, Pretty 2002 provides an ecosystem treatment of production and consumption within a context of nature-society relations.
Friedmann, Harriett, and Philip McMichael. 1989. Agriculture and the state system. Sociologia Ruralis 39.2: 93–117.
Building on world-system theory, this pathbreaking article argues that contemporary food systems can best be understood as periods of stability and crisis in state-producer-consumer relationships. By adopting this approach, a succession of food regimes involving the deployment of different regulatory mechanisms is illuminated.
Gertel, Jorg, and Richard LeHeron, eds. 2011. Economic spaces of pastoral production and commodity systems. Farnham, UK: Ashgate.
Using rich case studies from postcolonial Africa, Central Asia, and Australia and New Zealand, this book examines an overlooked aspect of food systems: pastoralism. Chapters investigate how market economies are altering the livelihood structures of pastoralists, with consequences for the nature of the meat and dairy foods available in the global market.
Hawkes, Corinna, Chantal Blouin, Spencer Henson, Nick Drager, and Laurette Dubé, eds. 2010. Trade, food, diet, and health: Perspectives and policy options. Oxford: Wiley Blackwell.
Provides an overview of the major ways in which the import and export of foods is contributing to the rise of chronic noncommunicable disease. It contains a useful “Glossary of Trade Terms” and a section devoted to the primary national and international regulatory instruments being adopted to advance the trade in both unhealthy and healthy foods.
Mintz, S. 1985. Sweetness and power: The place of sugar in modern history. New York: Viking Penguin.
Widely regarded as a classic text in economic anthropology and agri-food studies, Mintz links the current fondness for sugary foods, and the advent of cheap calories, to the unfolding of European industrialization built on the natural abundance of sugarcane found in tropical colonies. The book’s multifaceted approach provides a template for the study of food commodity trajectories more generally.
Pretty, J. 2002. Agri-culture: Reconnecting people, land and nature. London: Earthscan.
Based on a mix of empirical evidence of environmental conditions and food yields, farmer narratives, and policy analysis, there are calls for a new agricultural revolution based on what is being learned of farmer, corporate, and regulatory innovation. The book highlights the importance of recognizing farmers as lay scientists who have a deep knowledge and appreciation of biospheric resources.
Toussaint-Samat, Maguelonne. 1992. A history of food. Translated by Anthea Bell. Cambridge, MA: Blackwell Reference.
Part dictionary and part philosophical treatise, this book provides histories of hunting and gathering, followed by sections devoted to histories of staple, luxury, and “sacramental” foods; the rise of urban markets; and the centrality of spices and salt to food trade. A good place to begin any commodity or culinary culture-based research. First published in French in 1987 as Histoire naturelle & morale de la nourriture; expanded edition published in 2009.
Warde, A. 1997. Consumption, food and taste: Culinary antinomies and commodity culture. London: SAGE.
Among the first works to take the study of food consumption seriously, and to locate its different forms within broader social systems, including class and the life stage. Warde links the adoption of novel tastes and consumption habits, including health, to new forms of niche production and marketing.
Winson, A. 2013. The industrial diet: The degradation of food and the struggle for healthy eating. Vancouver: Univ. of British Columbia Press.
This book lays out in some detail what is meant by an industrial food system: stripping natural ingredients out of whole foods, adding chemicals and other additives to increase shelf life and improve flavor, making claims about the qualities of products that are not based in evidence, and shipping foods around the world where they can do as much health harm as good.
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
- Access to Health Care
- Action Research
- Active Aging
- Active Living
- Adolescent Risk-Taking Behavior in the United States
- Advocacy, Public Health
- Agricultural Safety and Public Health
- Air Quality: Health Effects
- Air Quality: Indoor Health Effects
- Alcohol Availability and Violence
- Alternative Research Designs
- Ambient Air Quality Standards and Guidelines
- American Perspectives on Chronic Disease and Control
- Antimicrobial Resistance (AMR)
- Asthma in Children
- Attachment as a Health Determinant
- Behavior Change Theory in Health Education and Promotion
- Behavioral Risk Factor Surveillance
- Bicycling and Cycling Safety
- Birth and Death Registration
- Birth Cohort Studies
- Board of Health
- Built Environment and Health, The
- Business and Corporate Practices
- Cancer Communication Strategies in North America
- Cancer Prevention
- Cancer Screening
- Capacity Building
- Capacity Building for NCDs in LMICs
- Capacity-Building for Applied Public Health in LMIC: A US ...
- Cardiovascular Health and Disease
- Child Maltreatment
- Children, Air Pollution and
- Children, Injury Risk-Taking Behaviors in
- Children, Obesity in
- Citizen Advisory Boards
- Climate Change and Human Health
- Climate Change: Institutional Response
- Clinical Preventive Medicine
- Community Air Pollution
- Community Development
- Community Gardens
- Community Health Assessment
- Community Partnerships and Coalitions
- Community-Based Participatory Research
- Complexity and Systems Theory
- Culture and Public Health
- Definition of Health
- Dental Public Health
- Design and Health
- Dietary Guidelines
- Ecological Approaches
- Enabling Factors
- Environmental Laws
- Environmental Protection Agency
- Ethics of Public Health
- Evidence-Based Public Health Practice
- Family Planning Services and Birth Control
- Food Safety
- Food Security and Food Banks
- Food Systems
- Frail Elderly
- Functional Literacy
- Genomics, Public Health
- Geographic Information Systems
- Geography and Health
- Global Health
- Global Health Diplomacy
- Global Health Promotion
- Guide to Community Preventive Services, The
- Health Administration
- Health Communication
- Health Disparities
- Health Education
- Health Impact Assessment
- Health in All Policies
- Health in All Policies in European Countries
- Health Literacy
- Health Literacy and Non-Communicable Diseases
- Health Measurement Scales
- Health Planning
- Health Promoting Hospitals
- Health Promotion
- Health Promotion Workforce Capacity
- Health Promotion Workforce Capacity
- Healthy People Initiative
- Hepatitis C
- High Risk Prevention Strategies
- Human Rights, Health and
- Immigrant Populations
- Immunization and Pneumococcal Infection
- Indigenous Peoples, Public Health and
- Indigenous Populations of North America, Australasia, and ...
- Indoor Air Quality Guidelines
- Internet Applications in Promoting Health Behavior
- Intersectoral Strategies in Low - Middle Income Countries ...
- Justice, Social
- Knowledge Translation and Exchange
- Knowledge Utilization and Exchange
- Law of Public Health in the United States
- Media Advocacy
- Mental Health
- Mental Health Promotion
- Migrant Health
- Motor Vehicle Injury Prevention
- Multi-Drug-Resistant Tuberculosis
- National Association of Local Boards of Health
- National Public Health Institutions
- Needs Assessment
- Obesity Prevention
- Occupational Cancers
- Occupational Safety and Health
- Oral Health Equity for Minority Populations in the United ...
- Ottawa Charter
- Parenting and Work
- Parenting Skills and Capacity
- Participatory Action Research
- Patient Decision Making
- Pesticide Exposure and Pesticide Health Effects
- Physical Activity and Exercise
- Physical Activity Promotion
- Polio Eradication in Pakistan
- Population Aging
- Population Determinants of Unhealthy Foods and Beverages
- Population Health Objectives and Targets
- Precautionary Principle
- Prenatal Health
- Program Evaluation in American Health Education
- Program Planning and Evaluation
- Public Health, History of
- Public Health Surveillance
- Public-Private Partnerships in Public Health Research and ...
- Public-Private Partnerships to Prevent and Manage Obesity ...
- Quantitative Microbial Risk Assessment
- Radiological and Nuclear Emergencies
- Randomized Controlled Trials
- Real World Evaluation Strategies
- Reducing Obesity-Related Health Disparities in Hispanic an...
- Resilient Health Systems
- Rural Health in the United States
- Safety, Patient
- School Health Programs in the Pacific Region
- Sex Education in HIV/AIDS Prevention
- Skin Cancer Prevention
- Smoking Cessation
- Social Determinants of Health
- Social Epidemiology
- Social Marketing
- Statistics in Public Health
- Systems in the United States, Public Health
- Systems Modeling and Big Data for Non-Communicable Disease...
- Systems Theory in Public Health
- Traditional, Complementary, Alternative, and Integrative M...
- Translation of Science to Practice and Policy
- Traumatic Stress and Post-Traumatic Stress Disorder
- Tuberculosis among Adults and the Determinants of Health
- Unintentional Injury Prevention
- Urban Health
- Vaccine Hesitancy
- Violence Prevention
- Water Quality
- Water Quality and Water-Related Disease
- Weight Management in US Occupational Settings
- Welfare States, Public Health and Health Inequalities
- Worksite Health Promotion
- World Health Organization (WHO) | <urn:uuid:399aac55-4b9a-4c85-b7a0-8b4345da4c23> | CC-MAIN-2018-17 | http://www.oxfordbibliographies.com/view/document/obo-9780199756797/obo-9780199756797-0151.xml | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944677.39/warc/CC-MAIN-20180420174802-20180420194802-00206.warc.gz | en | 0.880806 | 3,248 | 3.09375 | 3 |
Due to budget constraints, Arts programs have been one of the first to be cut. Although the schools still maintain their other curriculum agendas, the loss of the Arts programs leaves a deficit in the lives of many students who could have benefited, both educationally and emotionally, from this form of expression.
A 2012 study published in a report by the US National Endowment for the Arts showed that teenagers and young adults of low socio-economic status who are involved in Arts activities have better academic results, higher career goals and better work opportunities. It was discovered that young adults who had intensive Arts experiences in high school are more likely to show civic-minded behavior than those who did not. Greater self-confidence, motivation and empathy with peers were exhibited by those who participated in Arts programs. When gathering evidence from a wide range of school and community-based Arts programs, studies have reflected that Arts exposure for teens was helpful in resolving conflicts, deterring problems due to disruptive behavior and helpful in building the self-respect, resilience, empathy and collaborative skills of the participating teens.
Many parents find that just talking with a teen does not work, even with the assistance of a guidance or family counselor. The teen seems unable to find real change through merely discussing the emotional, psychological, social or educational issues confronting him or her. Parents, at a loss as to where to go from there, have discovered that a successful alternative is available. A counseling effort that combines the help and structure of a trained therapist with the guidance of an Arts professional can be invaluable as a means of leading a struggling teen to a new way of communicating. Through the Arts, including drama, dance, music, painting and other visual arts, the struggling teen, who was unable to verbally express their fears, confusions and pain, is allowed to engage in a new creative forum for self-expression.
Many young people between the ages of 12 and 18 are benefitting from this focused Arts program. Through the concerted efforts of Arts professionals and a committed therapeutic staff, the teens are finding a means of transforming the vision of their world to one of joyful expression. Whatever Art medium appeals to them is utilized as a forum from which they can reflect their inner conflicts and then better identify solutions.
Distributed by Client Initiatives
Company Name: Lava Height Academy
Contact Person: Dane Shakespeare
Address:730 Spring Drive
Country: United States | <urn:uuid:a10162f6-97fe-46e9-a565-23adc580fa8f> | CC-MAIN-2016-50 | http://www.getnews.info/520744/how-can-the-arts-benefit-teens.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540839.46/warc/CC-MAIN-20161202170900-00102-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.964101 | 481 | 2.859375 | 3 |
Sibling members of Yellowstone National Park's Druid Peak Pack engaged in play.
Credit: Daniel Stahler/NPS
Wolf hunting season has begun in several states, and hundreds of the animals already have been killed. It's the first time in years that wolves have been legally hunted in Wyoming and Minnesota, and the decision has drawn the ire of many conservationists and some scientists.
Gray wolves have long been a point of contention between ranchers, who see them as pests that eat their livestock, and conservationists, who see the critical part the play in the ecosystem. Recently, as state laws changed and the animals were taken off the federal endangered species list, hunters have taken aim.
About 50 wolves have been killed in Wyoming, where they can be shot on sight without a permit in about 85 percent of the state, according to news reports. Seven of the dead wolves once lived in Yellowstone National Park, where wolves are still protected; they wandered outside the park and were legally shot, Reuters reported. (Scientists put collars on the Yellowstone wolves as part of a park research program.)
Wyoming's wolf population was estimated at 328 before the hunt. The state's plan, approved by the U.S. Fish and Wildlife Service, requires that the population of wolves remain above 100 outside Yellowstone and the Wind River Reservation. That figure is cited by conservationists as dangerously low.
In nearby Idaho, 96 wolves have been killed, according to the Coeur d'Alene Press.
During last year's hunting season, 545 wolves in Idaho and Montana were killed. This year both states got rid of their statewide quotas, or upper limit on number of kills, according the Center for Biological Diversity. The center, along with the Natural Resources Defense Council and other environmental groups, is suing the U.S. Fish and Wildlife Service, accusing it of failing to adequately protect the animals. Other suits are pending in various states.
Back from the brink?
Wolves were hunted, trapped and poisoned to the brink of extinction in the 20th century, and they rebounded only after being protected under the Endangered Species Acts of the 1960s and subsequently being re-introduced to Yellowstone. Much of the Northern Rockies sub-population of gray wolves lost federal protections last year following a controversial rider placed in U.S. budget legislation.
The wolf hunt in Minnesota is also under way and has met with opposition. The 147 wolves killed in that state are about twice what the Department of Natural Resources expected, according to the Associated Press. The second phase of the hunting season begins Saturday (Nov. 24), during which wolves can be trapped, a technique that conservationists and some hunters call cruel.
Minnesota's earlier wolf-management plan stated that the animals couldn't be hunted for five years after being removed from the federal protection provided by the Endangered Species Act — which happened in January, 2012. Instead of opening a formal comment period, the DNR offered only an online survey, according to the Center for Biological Diversity. More than 75 percent of people taking the poll opposed the wolf hunt: Of 7,351 responses, only 1,542 people supported a wolf season. Even so, that five-year waiting period was not upheld.
In Wisconsin, hunters had killed 83 wolves as of Nov. 18, according to the Badger Herald. The hunting season there will run through the end of February unless hunters reach the 116-wolf quota before then. | <urn:uuid:e2f9e570-ff53-4e1e-9c2b-d94407f91fb2> | CC-MAIN-2016-18 | http://www.livescience.com/24942-wolf-hunt-begins.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860122420.60/warc/CC-MAIN-20160428161522-00088-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.964369 | 702 | 3.28125 | 3 |
There are a number of researches that have proven the importance of early prevention when it comes to facing any type of cancer.
The best way to lower the risk of this deadly disease is to start changing your habits and lifestyle. According to Carol Baggerly, the founder of GrassrootsHealth, 90 percent of all patients that are suffering from breast cancer are linked to deficiencies of vitamin D, and this fact is supported by numerous studies.
Deficiency of vitamin D can lead to numerous health problems and conditions that can have devastating consequences on your health. We can get this vitamin from two sources, from direct exposure to sunlight (vitamin D3) and from plants (vitamin D2).
How is this vitamin connected to breast cancer?
There was a meta-analysis that was conducted on 4500 breast cancer patients in 2014. According to this analysis, individuals that had high levels of vitamin D had a better survival rate, when compared to the patients who had lower levels of vitamin D. It is important to say that this analysis was not rushed, but it was conducted over the course of 9 years.
Professor Cedric F. Garland is one of the co-authors of the study, and he explained the connection between cancer growth and vitamin D in more detail. He explained that the proliferation and the growth of tumor cells can be prevented by the vitamin D receptors. This means that the patients that have higher levels of vitamin D have increased chances of beating and surviving this disease.
The people that were responsible for this study, are urging health experts and doctors to monitor the levels of vitamin D in their patients because they think that this is one of the most important prevention methods. Another thing that is very important is vitamin D optimization, especially with the patients diagnosed with breast cancer.
A 2011 study shows that just 50 ng/ml of vitamin D level, can lower your chances of beating breast cancer by a whopping 50 percent.
How to increase the levels of vitamin D in your body?
You need to spend more time outside, especially on sunny days. This way, your body will be able to synthesize vitamin D from your direct exposure to sunlight. But, always keep in mind that sunrays are very dangerous and you always need to use sun protection.
You can also take supplements, but before you do that, you need to check the levels of your vitamin D, just to make sure that you really need them. In case you don’t, do not take supplements, because you will risk toxicity. Before taking the supplements, consult with your doctor.
You can also eat food that contains this vitamin, like salmon, sardines, milk, mushrooms, and herring. | <urn:uuid:d2526cea-4796-4ec5-89e1-14c09b4bdc04> | CC-MAIN-2019-39 | https://healthyfitpoint.com/vitamin-doubles-chance-preventing-beating-breast-cancer/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574077.39/warc/CC-MAIN-20190920200607-20190920222607-00048.warc.gz | en | 0.967447 | 546 | 2.734375 | 3 |
- The United States Food and Drug Administration (FDA) might ban soy, almond, and other non-dairy milk producers from referring to their products as "milk."
- Federal standards define milk as the result of the " milking of one or two healthy cows" and the National Milk Producers Federation has said milk must come from mammals.
- The Plant-Based Foods Association, however, asserts that non-dairy milks are clearly labeled as such.
Your favorite non-dairy milk might be getting a permanent new name.
The United States Food and Drug Administration (FDA) might ban soy, almond, and other non-dairy milk producers from referring to their products as "milk."
The FDA abides by "standards of identity" when determining how manufacturers can label their products, according to PBS. Federal standards define milk as the result of the "milking of one or two healthy cows." Soy, almond, and other milks are created without the use of dairy.
Mulhern's organization has been asking the FDA to crack down on non-dairy "milk" products since 2000, AP reported. If the FDA does decide to change the naming standards, it will likely start by notifying companies and requesting public input about a year from now, FDA Commissioner Scott Gottlieb said, according to PBS. It's possible the FDA will face legal action from plant-based milk producers, he added, as the dictionary definition of milk includes anything produced from nuts.
On the other side, the Plant-Based Foods Association argues that the FDA's strict naming guidelines were adopted to prevent lower-quality dairy products from edging out products made entirely with dairy. For example, FDA standards of identity would prevent a carton of watered-down milk product from being labeled as milk. This would prevent cheaper, lower-quality alternatives from edging out real milk.
This is not what plant-based food producers are trying to do with their products, the PBFA argued in a press release. They assert that non-dairy milks are clearly labeled as such and that consumers are specifically seeking out these products because they don't include dairy.
The battle between animal-based producers and their vegan counterparts has raged for years.
For example, in 2015 a controversy erupted when the Association for Dressings and Sauces took umbrage at H ampton Creek's "Just Mayo" product. The trade group complained that an egg-less product such as Just Mayo was, by definition, not mayonnaise. Hampton Creek was allowed to keep the name Just Mayo after it agreed to refer to itself as a "spread and dressing" on its label instead of using the word "mayonnaise."
For more great stories, head to INSIDER's homepage. | <urn:uuid:be0a66ab-9c1b-48d8-8306-abc96ab355ad> | CC-MAIN-2019-13 | https://www.businessinsider.com/fda-wants-ban-on-soy-and-nut-milks-being-called-milk-fda-2018-7?r=UK&IR=T | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202672.57/warc/CC-MAIN-20190322155929-20190322181929-00153.warc.gz | en | 0.965981 | 572 | 3.203125 | 3 |
Measuring only 12 to 15 cm from bill-tip to tail-tip, the Black-capped Chickadee Poecile atricapilla is greenish-grey above with a white underside shading to light brownish buff along its flanks. Its long, dark-grey tail looks like a handle. A black cap, well drawn over sparkling eyes, covers its head from cone-like bill to nape, or back of the neck. Pure white cheek patches and a triangular black throat patch complete its most conspicuous markings. Because chickadees inhabit such a wide variety of climates and habitats, birds from different populations may vary somewhat in size and plumage.
A number of chickadee species resemble the Black-capped Chickadee. The Mountain Chickadee Poecile gambeli is distinguished from the Black-capped by a white line over the eye. In Canada, it lives only in the mountains of British Columbia and Alberta. The Mountain Chickadee is closely related to the Black-capped, and the two species hybridize, or interbreed, occasionally.
The Gray-headed Chickadee Poecile cincta is widely distributed across Asia and Europe. In North America, this brownish-grey chickadee is found in a small corner of the northwestern Yukon and eastern Alaska, where it lives in the willow and spruce woods bordering the treeline.
The Boreal Chickadee Poecile hudsonica has a seal-brown cap, greyish-brown above and dusky white or light grey below with rust-coloured sides. Its cheek patches are often dusky white and the throat patch is black. Like the Black-capped, it lives right across Canada, but resides in the belt of coniferous forest that extends to the northern treeline. Boreal and Black-capped Chickadees overlap at the edges of their breeding ranges, but do not hybridize.
The Chestnut-backed Chickadee Poecile rufescens lives in the coastal forest and southern part of British Columbia. Its brown crown and brownish-black throat match well with its chestnut back and sides.
Signs and sounds
The chickadee makes at least 15 different calls to communicate with its flockmates and offspring. The best known is the chickadee-dee-dee that gives the bird its name. Using this call both male and female chickadees challenge or scold intruders, and send information about the location of food and predators to their partners, their offspring, and members of their flock.
Male chickadees also sing a short ditty of two or three whistled notes (one higher and slightly longer, followed by one or two lower, shorter ones): feee-bee or feee-bee-bee. Males may sing at any time of the year, but do so mostly in the early part of the nesting season, peaking during territory establishment, nest-building, and egg-laying. Males sing only sporadically during the day, but serenade their females with a dawn chorus that can last from 20 minutes to an hour.
Habitat and Habits
In fall and winter, Black-capped Chickadees live in loose flocks of four to 12 birds. Each flock consists of mated pairs that bred locally the preceding summer, plus unrelated juveniles that have immigrated from surrounding populations.
From October to March, the flock flits from tree to tree over an area of 8 to 20 ha, meandering through long-established forest paths at a rate of about half a kilometre an hour. The birds keep in touch with each other by means of soft notes, sit-sit, uttered at intervals. Each flock defends its home range from other flocks using vocalizations and aggressive behaviour.
In the north, the chickadees usually roost in dense evergreen groves sheltered from the wind and snow. At roosting time, some of them disappear into any available hole where they spend the night, one bird to a hole. Others roost in the top branches of evergreens or low down in bushy young spruces. Night after night, the flock may use the same roosting place.
To keep warm the chickadee erects its soft, thick feathers to trap warm air close to its body. This serves as good insulation against the cold.
In early spring, the flock begins to break up, with paired birds spending daylight hours vigorously defending breeding territories from their former flockmates. During this period birds may still roost at night with their flock, especially during cold weather. Once breeding commences, a chickadee rarely strays from the 3 to 7 ha around its nest.
Chickadees establish a dominance hierarchy, or “pecking order,” by which each bird is known to the other according to rank. A bird’s rank is set by its degree of aggressiveness. Thus all the birds in the flock are subordinate to the most aggressive bird; and the lowest ranking is subordinate to all the others. The rest are graded in between. Typically males dominate females, and adults dominate juveniles. The higher ranking birds enjoy best access to food, the safest spots away from predators, and not only survive better but also have more offspring survive. A dominant bird will threaten, chase, and even fight the subordinate bird, which is always on the defensive and gives way to it. Dominant birds rarely need to fight subordinates once the hierarchy is established. Males and females generally pair according to rank — the dominant male pairs with the dominant female, and so on.
The Black-capped Chickadee is found throughout Canada, from the island of Newfoundland to British Columbia (except for the coastal islands) and extends northwards into the southern Yukon and Northwest Territories. It lives in tree-covered areas — including woodlots and orchards — where it digs its nest-holes in the soft or rotting wood of trees and finds the food it prefers.
The chickadee is ordinarily a year-round resident, but from time to time large numbers of birds move long distances, generally south in the fall, and north in the spring. These irregular movements, called “irruptions,” involve mostly young birds less than a year old. Irruptions may occur due to habitat destruction, or in years when there is a shortage of food, combined at times with an unusually successful breeding season.
From sunrise to sunset, the chickadee spends most of its time feeding. The bird hops along a branch, clutches an upright trunk, or hangs upside down at the tip of an evergreen twig, examining every crevice and cranny for tiny hidden creatures.
The chickadee eats large quantities of insect eggs, larvae and pupae (insects in the torpid stage), weevils, lice, sawflies, and other insects, as well as spiders — about 80 to 90 percent of its diet consists of invertebrates during the breeding season, and about 50 percent during the winter. The chickadee is easily one of the most important pest exterminators of the forest or orchard.
When food is plentiful, particularly in the late summer and fall, the chickadee becomes a food hoarder. It carefully tucks a morsel away under a buckled piece of bark, or in a patch of lichens — often only to pull the morsel out again and repeat the tucking-away ceremony in another place. A chickadee may cache hundreds of food items in a single day, and can retrieve these with almost perfect accuracy 24 hours later. Some birds can remember the location of their food hoards for at least 28 days after caching. Black-capped Chickadees remember not only where they have stored different food items but also which caches they have emptied. As it gets colder, chickadees will tend to select caches with seeds that provide more energy.
Hoarding food is important to the northern birds. This habit provides a meal for whoever finds the hidden morsel, and also ensures extra supplies along customary feeding routes when food is scarce.
It is estimated that chickadees, like other small titmice, need about 10 kcal of energy per day to survive. The birds eat plenty of food which is turned into energy. During the short winter day, the rate of feeding is speeded up. Food not needed for the immediate activity of moving around and foraging is stored as fat. The fat provides energy that the chickadee needs to survive while sleeping and fasting through the long, cold night. Chickadees also drop their body temperature at night by 10 to 12°C below daytime body temperature, to conserve energy. It is easy to see how important are the foods — sunflower seeds, peanuts, and suet — offered at a feeding station in winter.
February and March are courtship months. Calling loudly, the chickadees spend much time chasing each other. They whirl around a tree in wild pursuit, suddenly stopping as quickly as they started. The flock gradually breaks up into pairs. Each pair travels alone, the female usually in the lead. Wherever she goes, the male defends a small area around her against other chickadees.
By the end of March, the female begins looking for a nesting place. Once it is chosen, the male defends the surrounding area against intruders. This area of 3 to 7 ha forms the pair’s territory.
Together, they dig out a hole in the rotting wood of a dead stump, usually about 1 to 3 m above ground. They may also nest 9 to 12 m up in the dead parts of live trees, or in hollows abandoned by other hole-nesting birds.
Although the female looks exactly like the male, by late April she is easily recognized by her voice, which takes on a peculiarly raspy quality as she prepares to lay her eggs. The male feeds the female often, and she accepts his offerings, crouching and shivering her wings like a baby bird. This ceremony is called courtship-feeding. The female makes a soft nest bed in the nest hole, using fine fibres, plant down, and hairs, where she lays one egg a day until there are five to 10; clutches of six to eight are most usual. The eggs are white with fine dark spots.
Only the female incubates, or sits on, the eggs for 20- to 30-minute periods during the day, and for the entire night. While she is on the nest, the male feeds her, but she also leaves to look for food.
At this time, the birds are wary and secretive. Should a would-be nest robber darken her nest, the female snarls and hisses in protest. The sound is so startling that it may momentarily disconcert an attacker, making escape possible.
After 13 or 14 days, the young hatch. The female broods, or warms, the young until they are well feathered. Both parents clean the nest by carrying away the droppings, and feed the nestlings from six to 14 times an hour. A study has shown that feeding and looking after six to eight nestlings can so drain the parents’ energy reserve that there are times when they survive only with great difficulty.
After 16 or 17 days, the young are ready to leave the nest. They emerge clean and fluffy images of their parents. Like most other hole-nesting birds, they know how to fly by this time, although their ability increases with practice. For two or three weeks more, the parents continue to feed them, while they gradually learn to feed themselves.
By this time, the parents look worn out. They begin to moult, losing their feathers at a fast rate, and it is easy to tell them apart from the younger generation. The new plumage takes six to eight weeks to grow out fully. After that, young birds can only be told from the older birds by the shape and amount of white on the outer tail feathers. The family may stay together for a short time, but its members soon disperse to join the autumn flocks that tour the woods, feeding and hoarding. Young chickadees typically join flocks from one to several kilometres distant from where they were raised.
Black-capped Chickadees are the most widespread bird species across Canada. The most recent surveys suggest that numbers are increasing: Bird Studies Canada’s 2001–2002 Christmas Bird Count documented 123 000 individuals, a 25 percent increase over the sample counts of 2000–2001. Since the Christmas Count is only a “snapshot” taken at approximately 300 locations, and since Black-capped Chickadees extend into the United States as far south as northern California across to New Jersey, it is probably safe to assume that Black-capped Chickadees number in the millions. Their success partly results from the increase in winter bird feeders, since chickadees readily adapt to these “free handouts.”
The Black-capped Chickadee’s most dangerous predators include bird-hunting hawks and the Northern Shrike. In addition, snakes, weasels, chipmunks, mice, and squirrels enter chickadee nests, or tear them open and eat the eggs or young birds. Adult females are sometimes killed on the nest by weasels.
It is worth our while to encourage and protect the hardy Black-capped Chickadee for the large part it plays in naturally controlling insects and enlivening our forests with its song and movements, even in winter.
Bent, A.C. 1946. Life histories of North American jays, crows, and titmice. U.S. National Museum Bulletin 191:322–393.
Christie, P. 2001. Chatting up chickadees. Seasons (Federation of Ontario Naturalists) 41:17–19
Glase, J .C. 1973. Ecology of social organization in the Black-capped Chickadee. Living Bird 12:235–267.
Godfrey, W.E. 1986. The birds of Canada. Revised edition. National Museums of Canada, Ottawa.
Lawrence, L. de K. 1968. The lovely and the wild. McGraw-Hill Book Co., New York.
Lempriere, S. 1990. Flocks and fat: How Black-caps survive winter. Seasons (Federation of Ontario Naturalists) 30:44–45
Odum, E.P. 1942–43. The annual cycle of the Black-capped Chickadee. The Auk 58:314–333, 518–535; 59:499–531.
Smith, S.M. 1985. The tiniest established permanent floater crap game in the northeast. Natural History 94:42–47.
Smith, S.M. 1991. The Black-capped Chickadee. Cornell University Press, Ithaca, New York.
Smith, S.M. 1993. Black-capped Chickadee. In The Birds of North America, no. 39. A. Poole, P. Stettenheim, and F. Gill, editors. The Academy of Natural Sciences, Philadelphia; The American Ornithologists’ Union, Washington, D.C.
© Her Majesty the Queen in Right of Canada, represented by the Minister of the Environment, 1973, 1989, 2003. All rights reserved.
Catalogue number CW69-4/25-2003E
Text: Louise de Kiriline Lawrence
Revision: B. Desrochers, 1988; L. M. Ratcliffe, S.J. Song, S.J. Hannon, 2003
Editing: Maureen Kavanagh, 2003
Photo: Daniel Mennill | <urn:uuid:549df75c-1329-4159-833d-adc2f45b6990> | CC-MAIN-2022-05 | https://www.hww.ca/en/wildlife/birds/chickadee.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301063.81/warc/CC-MAIN-20220118213028-20220119003028-00630.warc.gz | en | 0.943494 | 3,311 | 3.375 | 3 |
As we prepare to mark World AIDS Day tomorrow, the U.S. government this week announced a blueprint for achieving an AIDS-free generation. The plan to confront AIDS globally outlines goals and objectives that take into account groundbreaking scientific advances in HIV care, treatment, and prevention — many of which would not have been possible without federally funded research supported by Maryland-based institutions and scientists.
These advances in our knowledge of how to treat and prevent HIV infection could be game-changing in our fight against the pandemic, but time to act on this new U.S. blueprint will be short. Our window of opportunity is closing rapidly, threatened by drastic cuts in federal funding scheduled to take effect in January.
Without a strong U.S. commitment to fund continued research and provide the resources needed to deliver lifesaving HIV care, services, and treatment globally and here at home, more lives will be lost, harming communities and public health. Ultimately, the ambitious goal of finally turning the tide against AIDS, more than 30 years into this pandemic, will be in peril.
The science is clear: Identifying people who are infected with HIV and starting them on treatment saves lives. Treatment also drastically reduces transmission: by 96 percent among heterosexual couples in which one partner is infected and the other is not, according to 2011 results from a landmark clinical trial supported by the Bethesda-based National Institutes of Health.
Tragically, the anticipated reductions in federal funding could cut off lifesaving treatment for an estimated 273,000 people globally, potentially leading to 62,000 more AIDS-related deaths and 122,500 more orphans. Approximately 111,000 fewer HIV-infected pregnant women worldwide could receive medications to prevent their babies from becoming infected, leading to more than 21,000 infected infants.
In the U.S., nearly 16,000 people could lose access to lifesaving HIV drugs from the AIDS Drug Assistance Program, which provides HIV medications to patients who cannot afford them. A majority of clinics supported by the federal Ryan White Program, which provide HIV care to the poor and the uninsured, and which are already overwhelmed by growing patient loads and stagnant funding, would be forced to reduce services and cut staffing levels.
The cuts would also threaten the hard-earned progress achieved domestically through the National HIV/AIDS Strategy and expected with the Patient Protection and Affordable Care Act. Fully funding and implementing health reform across all states, including the Medicaid expansion, will be crucial in expanding access to effective HIV care and treatment for those who need it but cannot afford it and do not qualify for current safety-net programs.
The secondary benefits to the economies of Maryland and the nation are also at risk: Nearly 500 bioscience companies and 50 research-intensive federal institutes are based in Maryland, and the state ranks second in the country in federal funding for global health research and development. The life sciences sector supported nearly 72,000 Maryland jobs in 2010, with earnings 76 percent higher than the state average. Nationwide, NIH-funded research supported an estimated 432,000 jobs in fiscal 2011.
Maryland is fortunate to have representatives in Congress who are committed to improving global health and to the fight against HIV/AIDS domestically and around the world. We look forward to their continued leadership on these issues as lawmakers adopt what we hope is a balanced approach to the nation's budget challenges, one that protects investments in research and public and global health.
We still have much work to do to end AIDS: More than 50,000 new infections occur each year in the U.S., where 1.1 million people are living with HIV. Nearly 20 percent of those who are infected, including an estimated 9,000 Maryland residents, are unaware of their HIV status. Globally, nearly 3 million people are newly infected with HIV each year, and only a third who live in poor countries and need treatment have access to it.
Guided by the scientific evidence and continued research, we have the capability to begin to finally end the HIV/AIDS epidemic globally and domestically. We need an ongoing U.S. commitment to provide the necessary leadership, resources and funding to finish what we have started.
Dr. Michael Horberg is chairman of the HIV Medicine Association (HIVMA) and executive director of research with the Mid-Atlantic Permanente Medical Group in Rockville. Dr. Joel Gallant is HIVMA chairman-elect and professor of medicine and epidemiology in the Division of Infectious Diseases at the Johns Hopkins University School of Medicine. | <urn:uuid:2e8111cc-ec43-4184-9671-04f48c52bbd4> | CC-MAIN-2018-22 | http://www.chicagotribune.com/bs-ed-aids-day-20121129-story.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864837.40/warc/CC-MAIN-20180522170703-20180522190703-00127.warc.gz | en | 0.955976 | 905 | 2.765625 | 3 |
In Remembrance: The Fifth Field Company (drawn almost exclusively from Queen’s University) was given the task of turning previously unimproved ground at Valcartier, Quebec, into a camp capable of mobilizing 30,000 men for war. Only ten days after the initial inquiry, mobilization orders were telegraphed to all members of the Company and the majority of the men left Kingston for Valcartier on August 18, 1914. In all 170 Queen’s men worked at Valcartier on a variety of jobs that included road repair, surveys for tent sites, and installation of a water supply system. When other Companies of Engineers arrived at Valcartier, the Fifth was split into overseas and home sections – fifty members of the Queen’s Company signed up to be sent abroad with the First Canadian Contingent for service with No. 2 Company of Engineers. The home service of the Fifth Field Company remained at Valcartier until October 1914, when members returned to Kingston and began recruiting for the second overseas contingent. Also pictured are members of Kingston’s 14th Regiment (Princess of Wales’ Own Regiment) while they were at Valcartier. | <urn:uuid:82f4246a-73b1-426b-b294-cdf0094203a1> | CC-MAIN-2023-40 | https://www.kingstonist.com/culture/fifth-field-company-24794/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511075.63/warc/CC-MAIN-20231003092549-20231003122549-00097.warc.gz | en | 0.964873 | 240 | 3.09375 | 3 |
||This article is written like a personal reflection or opinion essay that states the Wikipedia editor's personal feelings about a topic, rather than the opinions of experts. (March 2013) (Learn how and when to remove this template message)|
Form perception is the recognition of objects in a particular form within a certain environment. An object is perceived by the retina as a two-dimensional image, but the image can vary for the same object in terms of the context with which it is viewed, the apparent size of the object, the angle from which it is viewed, how illuminated it is, as well as where it resides in the field of vision. Despite the fact that each instance of observing an object leads to a unique retinal response pattern, the visual processing in the brain is capable of recognizing these experiences as analogous, allowing invariant object recognition. Visual processing occurs in a hierarchy with the lowest levels recognizing lines and contours, and slightly higher levels performing tasks such as completing boundaries and recognizing contour combinations. The highest levels integrate the perceived information to recognize an entire object. Essentially object recognition is the ability to assign labels to objects in order to categorize and identify them, thus distinguishing one object from another. During visual processing information is not created, but rather reformatted in a way that draws out the most detailed information of the stimulus.
It is not fully understood how the brain completes the process of object recognition; however, there are several notable theories. The Gestalt theory is that form perception does not occur by perception of single objects, but by considering the total configuration. The Gestalt Movement, popular after World War I, is currently thought[by whom?] to be founded on research that was too subjective. Another and more currently popular theory is that perception is derived from the ability of a human to organize his or her total experience, including "physiological growth experiences that precede...the formal experience of learning".
Form perception is a demanding task for the brain because a retina has a significant blind spot and retinal veins that obstruct light from reaching cells that detect light, or photoreceptor cells. The brain handles the blind spots through boundary processes, includes perceptual grouping, boundary completion, and figure-ground separation, and through surface processing, including compensation for variable illumination ( “discounting the illuminant”), and filling blank areas with the surviving illuminant-discounted signals.
In addition to photoreceptors, the eye requires a properly functioning lens, retina, and an undamaged optic nerve to recognize form. Light travels through the lens, hits the retina, activates the appropriate photoreceptors, depending on available light, which convert the light into an electrical signal that travels along the optic nerve to the lateral geniculate nucleus of the thalamus and then to the primary visual cortex. In the cortex, the adult brain processes information such as lines, orientation, and color. These inputs are integrated in the occipito-temporal cortex where a representation of the object as a whole is created. Visual information continues to be processed in the posterior parietal cortex, also known as the dorsal stream, where the representation of an object’s shape is formed using motion-based cues. It is believed that simultaneously information is processed in the anterior temporal cortex, also known as the ventral stream, where object recognition, identification and naming occur. In the process of recognizing an object, both the dorsal and ventral streams are active, but the ventral stream is more important in discriminating between and recognizing objects. The dorsal stream contributes to object recognition only when two objects have similar shapes and the images are degraded. Observed latency in activation of different parts of the brain supports the idea of hierarchal processing of visual stimuli, with object representations progressing from simple to complex.
By 5 months of age infants like adults are capable of using line junction information to perceive 3D images, including depth and shape. However, there are differences between younger infants and adults in the ability to use motion and color cues to discriminate between two objects. Visual information then continues to be processed in the posterior parietal cortex, also known as the dorsal stream, where the representation of an objects shape is formed using motion-based cues. The identification of differences between the infant and adult brain make it clear that there is either functional reorganization of the infant’s cortex or simply age related differences in which the brain completes the process of object recognition. Functional reorganization seems very likely since there is a marked increase in synaptic growth and axon myelination observed early in the life of the infant. Although the infant brain is not identical to the adult brain it is similar in that it has areas of specialization and that a hierarchy of processing exists.
Form perception through optical transformations has been observed to occur as early as sixteen weeks of age. Although learning theories of form perception claim that 3-D understanding is from viewing and manipulating objects at the same time, because four-month-olds are not able to move on their own or skillfully manipulate objects, these learning theories are suspect. More probably infants have an innate perceptual knowledge. However, form perception in stationary views is developed later in life. The identification of differences between the infant and adult brain make it clear that there is either functional reorganization of the infant’s cortex or simply age- related changes that allow the brain to complete the process of object recognition. Functional reorganization is likely since marked increases in synaptic growth and formations of myelin sheaths to serve as electrical insulators to speed impulses have been observed in infants. Although the infant brain is not identical to the adult brain, it is similar with areas of specialization and a hierarchy of processing. However, adult abilities to perceive form from stationary viewing are not fully understood.
Dysfunctions in distinguishing differences in sizes and shapes of objects can have many causes, including brain injury, stroke, epilepsy and oxygen deprivation. Lesions on the brain that develop as a result of injury or illness impair object recognition. Regions that specifically lead to deficits in object recognition when a lesion is present include the right lateral fusiform gyrus and the ventrolateral occipito-temporal cortex. These areas are crucial to the processing of shape and contour information, which is the basis for object recognition. Although there is evidence to support that damage to the areas mentioned leads to deficits in object recognition, it is important to note that brain damage, regardless of the cause, is typically extensive and present on both halves of the brain, complicating the identification of key structures. Although most damage cannot be undone, there is evidence of reorganization in the unaffected areas of the affected hemisphere, making it possible for patients to regain some abilities.
Dysfunctions in form perception occur in several areas that involve visual processing, which is how visual information is interpreted. These dysfunctions have nothing to do with actual vision but rather affect how the brain understands what the eye sees. Problems can occur in the areas of visual closure, visual-spatial relationships, visual memory, and visual tracking. After identifying the specific visual problem that exists, intervention can include eye exercises, work with computer programs, neurotherapy, physical activities, and academic adjustments.
Injury and Illness
Potential injuries to the brain include but are not limited to stroke, oxygen deprivation, blunt force trauma, and surgical injuries. When patients have lesions on their brain that develop as a result of injury or illness, such as multiple sclerosis or epilepsy, it is possible that they may have impaired object recognition which can manifest in the form of many different agnosias. Similar deficits have also been observed adults that have suffered blunt force trauma, strokes, severe carbon monoxide poisoning as well as in adults that have surgical damage following removal of tumors. Deficits have also been observed in children with types of epilepsy that do not lead to the formation of lesions. It is believed that in these cases the seizures cause a functional disruption that is capable of interfering with the processing of objects. Regions that specifically lead to deficits in object recognition when a lesion is present include the right lateral fusiform gyrus and the ventrolateral or ventromedial occipito-temporal cortex. These structures have all been identified as being crucial to the processing of shape and contour information, which is the basis for object recognition. Although people with damage to these structures are not able to properly recognize objects, they are still capable of discerning the movement of objects. Only lesions in the parietal lobe have been associated with deficits in identifying the location of an object. Although there is strong evidence to support that damage to the above mentioned areas leads to deficits in object recognition it is important to note that brain damage, regardless of the cause, is typically extensive and present on both halves of the brain, complicating the identification of key structures. Although most damage cannot be undone, there is evidence of reorganization in the unaffected areas of the affected hemisphere, making it possible for patients to regain some function.
Whether or not visual form learning is retained in older humans is unknown. Studies prove that training causes improvement in form perception in both young and old adults. Learning to integrate local elements is negatively affected by age, however. Advancing age hinders the ability to process stimuli efficiently to identify objects. More specifically, recognizing the most basic visual components of an object takes a lot longer. Since the time it takes to recognize the object-parts is expanded, the recognition of the object itself is also delayed. Recognition of partially blocked objects also slows down as we age In order to recognize an object that is partially obscured we need to make perceptual inferences based on the contours and borders that we can see. This is something that most young adults are able to do, but it slows down with age. In general, aging causes a decrease in the processing capabilities of the central nervous system, which delays the very complex process of form perception.
- Tse, P.; Hughes (2004). "Visual Form Perception". The Encyclopedia of Neuroscience 4.
- Carlson, Thomas; Hogendoorn, Kanai, Mesik, Turret (2011). "High temporal resolution decoding of object position and category". Journal of Vision 10 (9): 1–17. doi:10.1167/11.10.9.
- DiCarlo, James; Zoccolan, Rust (2012). "How does the brain solve visual object recognition?". Neuron 73 (73): 415–434. doi:10.1016/j.neuron.2012.01.010.
- Changizi, Mark (2010). The Vision Revolution. BenBella Books.
- Corrow, Sherryse; Granrud, Mathison, Yonas (2012). "Infants and adults use line junction information to perceive 3D shape". Journal of Vision. 1 12 (8): 1–7. doi:10.1167/12.1.8.
- Wilcox, Teresa; Stubbs, Hirshowitz, Boas (2012). "Functional activation of the infant cortex during object processing". NeuroImage 62 (62): 1833–1840. doi:10.1016/j.neuroimage.2012.05.039.
- Glenyn, B (2009). Zini. Nova Science Publishers. pp. 79–115.
- Konen, Christina; Behrmann, Nishimura, Kastner (2011). "The functional neuroanatomy of object agnosia: a case study". Neuron 71 (71): 49–60. doi:10.1016/j.neuron.2011.05.030.
- karnath, Hans-Otto; Ruter, Mandler, Himmelbach (2009). "The anatomy of object recognition - visual form agnosia caused by medial occipitotemporal stroke". The Journal of Neuroscience. 18 29 (18): 5854–5862. doi:10.1523/JNEUROSCI.5192-08.2009. PMID 19420252.
- Brancati, Claudia; Barba, Metitieri, Melani, Pellacani, Viggiano, Guerrini (2012). "Impaired object identification in idiopathic childhood occipital epilepsy". Epilepsia 53 (4): 686–694. doi:10.1111/j.1528-1167.2012.03410.x. PMID 22352401.
- Pennick, Mark; Kana (2011). "Specialization and integration of brain responses to object recognition and location detection". Brain and Behavior: 6–14.
- Kuai, Shu-Guang; Kourtzi, Z. (2013). "Learning to See, but not Discriminate, Visual Forms Is Impaired in Aging". Psychological Science 24 (4): 412–422. doi:10.1177/0956797612459764.
- Cabeza, R; Nyberg (2005). "Cognitive neuroscience of aging: linking cognitive and cerebral aging". Oxford University Press.
- Danzigera, W.; Salthouseb (1978). "Age and the perception of incomplete figures". Experimental Aging Research 4 (1). | <urn:uuid:2744cabe-8839-4255-a9be-3f82973ba907> | CC-MAIN-2016-30 | https://en.wikipedia.org/wiki/Form_perception | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829972.19/warc/CC-MAIN-20160723071029-00091-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.901962 | 2,710 | 3.515625 | 4 |
M.J. Powell 2007
M.J. Powell 2007
J.L. Li, I.B. Heath & L. Packer
(I.B. Heath 1983) Vavra & Joyon
|Wikispecies has information related to: Neocallimastigomycota|
The fungi in Neocallimastigomycota were first described by Orpin in 1975, based on motile cells present in the rumen of sheep. Although the cells were first believed to be flagellates, it has since been shown that they are fungi related to the core chytrids. Prior to this, the microbial population of the rumen was believed to consist only of bacteria and protozoa. Since their discovery they have been isolated from the digestive tracts of over 50 herbivores, including ruminant and non-ruminant mammals and herbivorous reptiles.
Reproduction and growth
These fungi reproduce in the stomach of ruminants through the use of zoospores that bears a kinetosome but lacks the nonflagellated centriole known in most chytrids, and have been known to utilize horizontal gene transfer in their development of xylanase (from bacteria) and other glucanases. The nuclear envelopes of their cells are notable for remaining intact throughout mitosis.
Neocallimastigomycota play an essential role in fibre-digestion in their host species. They are present in large numbers in the digestive tracts of animals which are fed on high fibre diets. The polysaccharide degrading enzymes produced by anaerobic fungi can hydrolyse the most recalcitrant plant polymers and can degrade unlignified plant cell walls entirely. The polysaccharide degrading enzymes are organised into a multiprotein complex, similar to the bacterial cellulosome
Spelling of name
The Greek termination, "-mastix", referring to "whips", i.e. the many flagella on these fungi, is changed to "-mastig-" when combined with additional terminations in Latinized names. The family name Neocallimastigaceae was originally incorrectly published as "Neocallimasticaceae" by the publishing authors which led to the coinage of the misspelled, hence incorrect "Neocallimasticales", an easily forgiven error considering that other "-ix" endings such as Salix goes to Salicaceae. Correction of these names is mandated by the International Code of Botanical Nomenclature, Art. 60. The corrected spelling is used by Index Fungorum. Both spellings occur in the literature and on the WWW as a result of the spelling in the original publication.
- Hibbett, D.S. et al. (March 2007). "A higher level phylogenetic classification of the Fungi". Mycological Research 111 (5): 509–547. doi:10.1016/j.mycres.2007.03.004. PMID 17572334.
- Li, J.L. et al. (1993). "The phylogenetic relationships of the anaerobic chytridiomycetous gut fungi (Neocallimasticaceae) and the Chytridiomycota. II. Cladistic analysis of structural data and description of Neocallimasticales ord. nov". Can. J. Bot. 71 (3): 393–407. doi:10.1139/b93-044.
- Orpin CG (December 1975). "Studies on the rumen flagellate Neocallimastix frontalis". J. Gen. Microbiol. 91 (2): 249–62. doi:10.1099/00221287-91-2-249. PMID 1462.
- Ljungdahl LG (March 2008). "The cellulase/hemicellulase system of the anaerobic fungus Orpinomyces PC-2 and aspects of its applied use". Ann. N. Y. Acad. Sci. 1125: 308–21. doi:10.1196/annals.1419.030. PMID 18378601.
- Mackie RI, Rycyk M, Ruemmler RL, Aminov RI, Wikelski M (2004). "Biochemical and microbiological evidence for fermentative digestion in free-living land iguanas (Conolophus pallidus) and marine iguanas (Amblyrhynchus cristatus) on the Galápagos archipelago". Physiol. Biochem. Zool. 77 (1): 127–38. doi:10.1086/383498. PMID 15057723.
- C.J. Alexopolous, Charles W. Mims, M. Blackwell, Introductory Mycology, 4th ed. (John Wiley and Sons, Hoboken NJ, 2004) ISBN 0-471-52229-5
- Ho YW, Bar DJS (1995). "Classification of anaerobic gut fungi from herbivores withemphasis on rumen fungi from Malaysia". Mycologia 87 (5): 655–77. doi:10.2307/3760810. JSTOR 3760810.
- Akin DE, Borneman WS (October 1990). "Role of rumen fungi in fiber degradation". J. Dairy Sci. 73 (10): 3023–32. doi:10.3168/jds.S0022-0302(90)78989-8. PMID 2178175.
- Selinger LB, Forsberg CW, Cheng KJ (October 1996). "The rumen: a unique source of enzymes for enhancing livestock production". Anaerobe 2 (5): 263–84. doi:10.1006/anae.1996.0036. PMID 16887555.
- Wilson CA, Wood TM (1992). "Studies on the cellulase of the rumen anaerobic fungus Neocallimastix frontalis, with special reference to the capacity of the enzyme to degrade crystalline cellulose". Enzyme and Microbial Technology 14 (4): 258–64. doi:10.1016/0141-0229(92)90148-H.
- Suprafamilial Names | <urn:uuid:7864d28d-858c-4e06-8a8b-ab4838c74c37> | CC-MAIN-2015-32 | https://en.wikipedia.org/wiki/Neocallimastigomycota | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986625.58/warc/CC-MAIN-20150728002306-00045-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.686661 | 1,332 | 2.75 | 3 |
by Richard Wike, Associate Director, Pew Global Attitudes Project
With parliamentary elections approaching, Hungarians are in a funk. Nearly unanimously, they say the economy is in bad shape, and a stunning 72% say most Hungarians are actually worse off now economically than they were under communism. But Hungary’s malaise is not all about economics — most are frustrated with politics too. Overwhelmingly, Hungarians are dissatisfied with the way democracy is working and discontent with political elites, with about three-in-four saying political corruption is a major problem. A fall 2009 survey by the Pew Research Center’s Global Attitudes Project highlights the degree to which, even in a region where disillusionment is common, Hungarians stand out.
All of this bodes well for the electoral prospects of Fidesz, the right-of-center opposition party, which is expected to soundly defeat the incumbent social democrats in the upcoming elections.1 However, these findings do not mean Hungarians are rejecting democratic values. In fact, as the survey illustrates, they are more likely than other former Eastern bloc publics to say it is very important to live in a country with democratic rights and institutions. But few believe Hungary currently has these democratic freedoms.
Widespread Economic Discontent
Prior to the revolutions of 1989, Hungary was an economic pioneer among Eastern bloc countries, practicing “goulash communism,” which mixed aspects of the free market with a planned economy. As a result, Hungarians enjoyed somewhat better living standards than their Iron Curtain neighbors. Two decades later, however, Hungarians give their economy dismal ratings, and they are generally less enthusiastic about the free market than others in the region.
The global economic crisis had a powerful effect across much of Central and Eastern Europe, and it hit especially hard in Hungary, which was forced to seek a financial bailout from the IMF, World Bank and European Union. The fall 2009 survey revealed the extent of Hungarian economic gloom: 94% described the country’s economy as bad, nosing out Lithuania (93%) and Ukraine (91%) for the most negative assessment among the countries included in the poll.
When asked to evaluate their nation’s switch to capitalism, Hungarians are divided — 46% said they approve of the move from a state-controlled economy to a market economy, while 42% disapproved. In 1991, when the Times Mirror Center (the forerunner of the Pew Research Center) asked this same question, 80% had approved of the change. In another sign that support for the free market is relatively weak in Hungary, only 31% in the 2009 poll agreed with the statement “Most people are better off in a free market economy, even though some people are rich and some are poor,” a lower percentage than in any other former Eastern bloc country surveyed.
Remarkably, 72% said most people in Hungary are actually worse off today economically than they were under communism, while only 8% said most people are better off and 16% said things are about the same. Again, Hungary stands apart from the other post-communist societies surveyed — in no other country did so many believe that economic life is worse now than during the communist era.
As in much of the region, many Hungarians had hoped that accession to the European Union would result in major economic benefits and improved living standards. However, most have been disappointed. Roughly seven-in-ten (71%) say their country’s economy has been weakened by the economic integration of Europe. Bulgaria (63%) is the only other post-communist EU member in which a majority held this view.
Disillusionment With Politics Too
But Hungarians are not only disappointed with the economic transition their country has experienced — they are also disappointed with the transition to democratic politics. The 1991 Times Mirror poll found that 74% of Hungarians approved of the change from a one-party system to a multiparty system; by 2009 a slim 56%-majority expressed this view.
In the 2009 poll, more than three-in-four (77%) said they were dissatisfied with the way democracy is working in Hungary, the highest percentage on the survey. In the other former Eastern bloc nations, there were notable generation gaps on this question, with people under age 40 — essentially, the “post-communist” generation — more likely to be satisfied than older respondents. Not so, however, in Hungary, where old and young alike tended to give the current state of democracy a grim assessment.
As in much of Central and Eastern Europe, Hungarians are clearly disenchanted with political elites. Nearly nine-in-ten (89%) said politicians have benefited a great deal or a fair amount from the changes since 1989, but only 17% believed ordinary people have benefited. And concerns about corruption are common — 76% said corrupt political leaders are a very big problem in Hungary.
However, when reviewing these gloomy findings about the state of democracy in Hungary, it is worth remembering that they do not mean Hungarians are abandoning democratic values. To the contrary, Hungarians continue to want democratic rights and institutions — in fact, they place a higher premium on these things than their post-communist neighbors. When asked to rate the importance of six key features of democracy, Hungarians stand out for their strong embrace of democratic values.
Among the eight Central and Eastern European publics surveyed, Hungarians are the most likely to say it is very important to live in a country with honest multiparty elections, freedom of religion, free speech, and civilian control of the military (tied with Czech Republic). Meanwhile, only Bulgarians are more likely to say it is very important to live in a country with a fair judiciary; and the Czech Republic and Bulgaria are the only countries more likely to rate a free media as very important. Overall, across the six values tested, a median of 66% in Hungary rated these features of democracy as very important. By this measure, Bulgaria is next, with a median of 60%, followed by the Czech Republic (52%), Poland (52%) and Ukraine (50%). Lithuania (43%) and Slovakia (43%) rate somewhat lower, while Russians (39%) are less likely than others to consider these elements of democracy very important.
The challenge for Hungary is that, while most Hungarians want democratic values and institutions, few think they have them. For instance, 70% think it is very important to live in a country with honest multiparty elections, but only 17% believe this describes Hungary very well. Taking the median percentage saying these values are very important in each country and comparing it with the median percentage saying these values describe their country very well gives us an overall “democracy gap” for each country. The gap is large throughout Eastern Europe, but is widest in Hungary — evidence that Hungarians, who once pioneered the transition away from communism, are not turning their backs on democracy. Instead, they are frustrated by the fact that democracy has yet to fully flourish in their country. | <urn:uuid:4423b8ae-15e9-4403-bf32-f9487ce13f68> | CC-MAIN-2023-40 | https://www.pewresearch.org/global/2010/04/07/hungary-dissatisfied-with-democracy-but-not-its-ideals/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00095.warc.gz | en | 0.971044 | 1,435 | 2.515625 | 3 |
Historically, Canada was positioned as a dairy exporter, particularly of cheese. In the period following World War 2, a confluence of factors (including improved milking technology and competition from margarine) created chronic surpluses and depressed prices. As the public costs of mitigating this situation increased, supply management was conceived as a way to address the surpluses and
low farm prices. The system has had to evolve to address a range of domestic and trade changes. The current milk supply management operates under three “pillars”: production controls (quota), administered pricing, and import controls. As conditions have changed, regulations under supply management have changed. As it has evolved, this regulation has extended beyond the necessary and created unintended operating costs and burdens. The challenge for the Canadian dairy industry and policy-makers is to retain the elements of supply management that maintain its functions and purpose, while allowing changes in other elements. | <urn:uuid:aa29a828-7fe3-4746-850a-17f9742ecd84> | CC-MAIN-2014-35 | http://www.conferenceboard.ca/e-library/abstract.aspx?did=4980 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00403-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.959376 | 188 | 2.890625 | 3 |
A bear's sense of smell is said to be even better developed than a dog's. Like most large-muzzled carnivores, bears rely on their sense of smell more than any other. Their large muzzles have a huge inner surface area covered tens of millions of olfactory nerves.
These are just a collection of my thoughts, they can't be proven scientifically, but I imagine that to have such an immensely sensitive nose as a bear, a sense of smell must be to them almost like touch is to us, a smell would be so powerful it would feel almost like a fluid flowing through your nose. From a distance you could know just about everything you need to know about someone or something you're curious about through smell, like being able to touch and feel something at a distance.
Imagine if we perceived our world mainly through smell like bears and most other carnivores- what would things be like? It is possible we could have developed a written language in scent, or any other visual or audio media we are familiar with might be instead in the form of some sort of complex array of scents. Most carnivores are smell-oriented animals, and they experience their world differently than we do, through their noses.
Bears, like dogs, have superior hearing that is very sensitive, especially to high-pitched sounds. Their ears are almost periscopic, able to rotate and focus on different sounds. They are unique among carnivores in that they have rounded, mouse like ears instead of triangular shaped ears that most of their procyonid and canid cousins have.
A few more notes on their ears, most people don't realize that a bear's ears are actually an effective way to recognize a bear's emotions and thoughts! Unlike primates like humans, bears do not have expressive faces like ours. Bears instead have more subtle expressive displays, in the movement of their ears and the position of their head. If a bear's ears are pointing forward, the bear is usually at ease, and may feel curious or playful about something or someone. However, if a bear's ears are pointing back and are flattened against the head, this often means that the bear may feel miffed or annoyed, or even angry and aggressive.
Contrary to popular belief, bears can see in full color, and have binocular vision that allows them to judge distance accurately. They are not myopic, or nearsighted, but have binocular vision that allows them to judge distance accurately. Their eyesight is about as keen as ours. Even as large as most bears are, their eyeballs are smaller in size than ours. Bears have the largest body size in comparison to eye size of any land mammal, and yet this doesn't seem to affect their vision in any negative way.
Little is known about a bear's sense of touch, but their paws can very dexterously manipulate a wide range of objects, from lifting huge boulders to picking tiny berries off a branch with their claws, and bears often touch their noses, lips and tongue up to objects to feel them. These areas are sensitive areas of flesh, and most likely to contain many neurons. Their paws may be quite sensitive to touch too.
ABOUT US (about the organization's founders and our goals)
ABOUT BEARS (bear facts, biology, behavior, physiology, etc.)
BEARS AND HUMANS (all about bear human relations, from pre-history to today and into the future)
WHAT CAN I DO TO HELP? (campaigns and causes)
BEAR DISCUSSION (bear forum)
LINKS (links to other related organizations)
Your comments and questions are welcome
This site is hosted and maintained by
The Mary T. and Frank L. Hoffman Family Foundation
Thank you for visiting all-creatures.org. | <urn:uuid:82b9746c-b5e0-4d3a-bfb9-221015f840e2> | CC-MAIN-2014-15 | http://www.all-creatures.org/bear/b-bearsenses.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205137.4/warc/CC-MAIN-20140423032005-00547-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.973312 | 779 | 3.5 | 4 |
Causes of Cerebral Palsy
There are many causes of cerebral palsy—some of which are preventable, and some which are not. In general, it is the result of a problem in the brain—either an injury or a malformation of some kind.
There are four types of brain injury that may result cerebral palsy:
Periventricular Leukomalacia (PVL)
Periventricular Leukomalacia is a particular type of injury to the areas around the ventricles in the brain. The death of brain cells can be caused by insufficient amounts of oxygen and blood to the brain. The damage to the brain is progressive—the early death of brain cells causes the body to respond with an inflammatory response, which causes a cascade reaction by damaging other areas of the brain.
The extent of the brain damage and the degree of impairment is determined on a child-by-child basis. Ultrasounds early after birth can help to determine the extent of brain damage, but only time will reveal the actual effect of that damage.
Children with PVL injuries are 20 to 60% more likely to suffer from cerebral palsy and other injuries. Much recent research has focused on cooling the brain to prevent that inflammatory reaction. See Hypothermia Therapy Reconsidered.
Intraventricular Hemorrhage (IVH)
This is essentially bleeding in the ventricles of the brain. It can be caused by blood clots, trauma, high blood pressure, and infection, among others. Like other forms of brain injury, the bleeding can cause damage or death to parts of the brain, which can impair motor function and development. A significant risk in brain bleeds is a hematoma, which is swelling that can kill surrounding tissue and cause further damage.
Cerebral Dysgenesis is abnormal brain development, making it unlike the other three causes of cerebral palsy because they are injuries. Cerebral dysgenesis can be caused by a brain that does not fully develop, or that develops abnormally. Genetic mutation, fever, infection, and trauma can cause these difficulties in the developing brain.
Hypoxic Ischemic Encephalopathy (HIE)
This is a medical term for oxygen deprivation or reduced blood flow to the brain, which can be total or partial. The cause can be a complete cut-off of oxygen/blood flow , or it can be a lengthy period of reduced oxygen or blood flow. The area of damage to the brain depends in large part on how developed the baby is at the time of injury. Particularly in premature babies, it can cause periventricular leukomalacia (PVL).
The number of causes of HIE are too numerous to state, but some of the main causes include umbilical cord complications, trauma, uterine rupture, placental abruption and medical negligence.
Cerebral palsy is a condition that affects people in varied ways, from mild to severe. If you have questions about cerebral palsy—it’s causes, effects or treatments, contact us at (440) 252-4399. | <urn:uuid:d8783096-7da7-4b2d-9cbe-a44055d53886> | CC-MAIN-2018-47 | https://www.beckerjustice.com/blog/2016/march/causes-of-cerebral-palsy/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742117.38/warc/CC-MAIN-20181114150002-20181114172002-00529.warc.gz | en | 0.916191 | 638 | 3.53125 | 4 |
- Find an Item
- About Us
- About the Library
- Suggestion Box
- Adult Volunteer Application
- Board of Trustees
- Friends of the Library
- Library Policies
- Library Affiliations
- Library Financial Audit 2015
- What's New
- Local History
Traditional study and homework has evolved with the development of the internet. It can be an invaluable resource that turns a dreaded task into alot of fun. Many websites offer activities that help children learn skills and reinforce concepts through flashcards, practice tests, interactive games, worksheets, and much more. Below are a few suggestions for math websites:
www.aplusmath.com Practice math skills using the game room, flashcards, word finds, and printable worksheets. Students can also input a problem and it will determine if your answer is correct or not. Topics include addition, subtraction, multiplication, division, square root, rounding, time, money, geometry, algebra, fractions, and decimals.
www.mathcafe.com 1st- 4th graders can build worksheets, print premade worksheets, use flashcards and play games. Topics include addition, subtraction, multiplication, division, time, and money.
www.coolmath4kids.com Students learn using prepared lessons, a math dictionary, games, math art, and puzzles. Addition, subtraction, division, multiplication, fractions, decimals, algebra, calculus, and trigonometry are covered.
www.freerice.com Students can practice basic math skills. For every problem that is solved correctly, ten grains of rice is donated to the World Food Programme of the United Nations.
www.aaamath.com Kindergarteners through 8th graders can practice addition, subtraction, multiplication, division, estimation, fractions, geometry, graphs, measurement, money, ratios, and statistics. | <urn:uuid:0f70755e-77df-4679-afad-99f01112a2a1> | CC-MAIN-2016-18 | http://newcitylibrary.org/node/1443 | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860106452.21/warc/CC-MAIN-20160428161506-00045-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.894181 | 396 | 3.859375 | 4 |
- Part 1: Exploring Nmap
- Part 2: Scanning for Open Ports
Background / Scenario
Port scanning is usually part of a reconnaissance attack. There are a variety of port scanning methods that can be used. We will explore how to use the Nmap utility. Nmap is a powerful network utility that is used for network discovery and security auditing.
- CyberOps Workstation Virtual Machine
- Internet access
Part 1: Exploring Nmap
In this part, you will use manual pages (or man pages for short) to learn more about Nmap.
The man [ program |utility | function] command displays the manual pages associated with the arguments.
The manual pages are the reference manuals found on Unix and Linux OSs. These pages can include these sections: Name, Synopsis, Descriptions, Examples, and See Also.
a. Start CyberOps Workstation VM.
b. Open a terminal.
c. At the terminal prompt, enter man nmap.
[[email protected] ~]$ man nmap
What is Nmap?
Nmap is a network exploration tool and security / port scanner.
What is nmap used for?
Nmap is used to scan a network and determine the available hosts and services offered in the network. Some of the nmap features include host discovery, port scanning and operating system detection. Nmap can be commonly used for security audits, to identify open ports, network inventory, and find vulnerabilities in the network.
d. While in the man page, you can use the up and down arrow keys to scroll through the pages. You can also press the space bar to forward one page at a time.
To search for a specific term or phrase use enter a forward slash (/) or question mark (?) followed by the term or phrase. The forward slash searches forward through the document, and the question mark searches backward through the document. The key n moves to the next match.
Type /example and press ENTER. This will search for the word example forward through the man page.
e. In the first instance of example, you see three matches. To move to the next match, press n.
Look at Example 1. What is the nmap command used?
Nmap -A -T4 scanme.nmap.org
Use the search function to answer the following questions.
What does the switch -A do?
-A: Enable OS detection, version detection, script scanning, and traceroute
What does the switch -T4 do?
-T4 for faster execution by prohibiting the dynamic scan delay from exceeding 10 ms for TCP ports. -T4 is recommended for a decent broadband or ethernet connection.
f. Scroll through the page to learn more about nmap. Type q when finished.
Part 2: Scanning for Open Ports
In this part, you will use the switches from the example in the Nmap man pages to scan your localhost, your local network, and a remote server at scanme.nmap.org.
Step 1: Scan your localhost.
a. If necessary, open a terminal on the VM. At the prompt, enter nmap -A -T4 localhost. Depending on your local network and devices, the scan will take anywhere from a few seconds to a few minutes.
[[email protected] Desktop]$ nmap -A -T4 localhost Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-01 17:20 EDT Nmap scan report for localhost (127.0.0.1) Host is up (0.000056s latency). Other addresses for localhost (not scanned): ::1 rDNS record for 127.0.0.1: localhost.localdomain Not shown: 996 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.0.8 or later | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_-rw-r--r-- 1 0 0 0 Apr 19 15:23 ftp_test 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: | 2048 f1:61:50:02:94:ba:f2:bd:be:93:cf:14:58:36:b8:32 (RSA) |_ 256 94:33:25:a5:0e:02:d7:bc:c8:b0:90:8a:a2:16:59:e5 (ECDSA) 23/tcp open telnet Openwall GNU/*/Linux telnetd 80/tcp open http nginx 1.12.0 |_http-server-header: nginx/1.12.0 |_http-title: Welcome to nginx! Service Info: Host: Welcome; OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.81 seconds
b. Review the results and answer the following questions.
Which ports and services are opened?
21/tcp: ftp, 22/tcp: ssh, 23/tcp: telnet, 80/tcp: http
For each of the open ports, record the software that is providing the services.
ftp: vsftpd, ssh: OpenSSH, Telnet: Openwall, http: gninx
What is the operating system?
Step 2: Scan your network.
Warning: Before using Nmap on any network, please gain the permission of the network owners before proceeding.
a. At the terminal command prompt, enter ifconfig to determine the IP address and subnet mask for this host. For this example, the IP address for this VM is 192.168.1.19 and the subnet mask is 255.255.255.0.
[[email protected] ~]$ ifconfig enp0s3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.19 netmask 255.255.255.0 broadcast 192.168.1.255 inet6 fe80::997f:9b16:5aae:1868 prefixlen 64 scopeid 0x20<link> ether 08:00:27:c9:fa:a1 txqueuelen 1000 (Ethernet) RX packets 34769 bytes 5025067 (4.7 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 10291 bytes 843604 (823.8 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 device interrupt 19 base 0xd000
Record the IP address and subnet mask for your VM. Which network does your VM belong to?
Answers will vary. This VM has an IP address of 192.168.1.19/24 and it is part of the 192.168.1.0/24 network.
b. To locate other hosts on this LAN, enter nmap -A -T4 network address/prefix. The last octet of the IP address should be replaced with a zero. For example, in the IP address 192.168.1.19, the .19 is the last octet. Therefore, the network address is 192.168.1.0. The /24 is called the prefix and is a shorthand for the netmask 255.255.255.0. If your VM has a different netmask, search the Internet for a “CIDR conversion table” to find your prefix. For example, 255.255.0.0 would be /16. The network address 192.168.1.0/24 is used in this example
Note: This operation can take some time, especially if you have many devices attached to the network. In one test environment, the scan took about 4 minutes.
[[email protected] ~]$ nmap -A -T4 192.168.1.0/24 Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-01 17:13 EDT Nmap scan report for 192.168.1.1 Host is up (0.0097s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp Bftpd 1.6.6 53/tcp open domain dnsmasq 2.15-OpenDNS-1 | dns-nsid: | id.server: |_ bind.version: dnsmasq-2.15-OpenDNS-1 80/tcp open tcpwrapped | http-auth: | HTTP/1.0 401 Unauthorized\x0D |_ Basic realm=NETGEAR WNR3500Lv2 |_http-title: 401 Unauthorized 5000/tcp open tcpwrapped Service Info: Host: 192.168.1.1 Nmap scan report for 192.168.1.19 Host is up (0.00016s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.0.8 or later | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_-rw-r--r-- 1 0 0 0 Apr 19 15:23 ftp_test 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: | 2048 f1:61:50:02:94:ba:f2:bd:be:93:cf:14:58:36:b8:32 (RSA) |_ 256 94:33:25:a5:0e:02:d7:bc:c8:b0:90:8a:a2:16:59:e5 (ECDSA) 23/tcp open telnet Openwall GNU/*/Linux telnetd 80/tcp open http nginx 1.12.0 |_http-server-header: nginx/1.12.0 |_http-title: Welcome to nginx! Service Info: Host: Welcome; OS: Linux; CPE: cpe:/o:linux:linux_kernel <some output omitted> Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 256 IP addresses (5 hosts up) scanned in 34.21 seconds
How many hosts are up?
Answers will vary.
From your Nmap results, list the IP addresses of the hosts that are on the same LAN as your VM. List some of the services that are available on the detected hosts.
Answers will vary.
Step 3: Scan a remote server.
a. Open a web browser and navigate to scanme.nmap.org. Please read the message posted. What is the purpose of this site?
This site allows users to learn about Nmap and test their Nmap installation.
b. At the terminal prompt, enter nmap -A -T4 scanme.nmap.org.
[[email protected] Desktop]$ nmap -A -T4 scanme.nmap.org Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-01 16:46 EDT Nmap scan report for scanme.nmap.org (22.214.171.124) Host is up (0.040s latency). Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f Not shown: 992 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 ac:00:a0:1a:82:ff:cc:55:99:dc:67:2b:34:97:6b:75 (DSA) | 2048 20:3d:2d:44:62:2a:b0:5a:9d:b5:b3:05:14:c2:a6:b2 (RSA) |_ 256 96:02:bb:5e:57:54:1c:4e:45:2f:56:4c:4a:24:b2:57 (ECDSA) 25/tcp filtered smtp 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-server-header: Apache/2.4.7 (Ubuntu) |_http-title: Go ahead and ScanMe! 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 9929/tcp open nping-echo Nping echo 31337/tcp open tcpwrapped Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 23.96 seconds
c. Review the results and answer the following questions.
Which ports and services are opened?
22/tcp: ssh, 9929/tcp: n ping-echo, 31337/tcp: tcpwrapped, 80/tcp: http
Which ports and services are filtered?
135/tcp: msrpc, 139/tcp: netbios-ssn, 445/tcp: microsoft-ds, 25/tcp: smtp
What is the IP address of the server?
IPv4 address: 126.96.36.199 IPv6 address: 2600:3c01::f03c:91ff:fe18:bb2f
What is the operating system?
Nmap is a powerful tool for network exploration and management. How can Nmap help with network security?
How can Nmap be used by a threat actor as a nefarious tool?
Nmap can be used to scan an internal network for specific open ports to identify the extent of a security breach. It can also be used to inventory a network to ensure that all the systems are probably patched against security concerns. On the other hand, nmap can be used for reconnaissance to determine open ports and other information about the network. | <urn:uuid:5862c2c2-1b31-4f1f-9808-f07fb6391dfc> | CC-MAIN-2021-21 | https://itexamanswers.net/4-5-2-10-lab-exploring-nmap-instructor-version.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988882.7/warc/CC-MAIN-20210508121446-20210508151446-00204.warc.gz | en | 0.751899 | 3,106 | 3.21875 | 3 |
Fish can be injured when weighed with portable scales. To estimate the weight of your fish, simply take a length and girth measurement (in inches), and use the following formulas. Remember, these are only estimates! Example: A 30-inch striped bass weighs approximately 12 pounds (30″ x 30″ x 30″)/2,200 = 12.3 pounds.
How do you weigh fish without a scale?
Measure the fish from the tip of the nose to the fork of the tail then around the fish in front of the pectoral fins. Now take the girth measurement and square it, then multiply this by the length measurement and divide the product by 800. This gives the fish it’s weight.
How do you measure the size of a fish?
The best way to obtain this length is to push the fish’s snout up against a vertical surface with the mouth closed and the fish laying along a tape measure, then pinch the tail fin closed and determine the total length. Do NOT pull a flexible tape measure along the curve of the fish.
What are fish weighed in?
Fishing scales including washdown scales and checkweighing scales for selling fish by weight, are commonly used by fishmongers and commercial fishermen who supply retail market chains and other vendors.
How heavy is a 28 inch catfish?
Video That May Interest You
|20 in||2.86 pounds|
|26 in||6.79 pounds|
|27 in||7.69 pounds|
|28 in||8.67 pounds|
|29 in||9.73 pounds|
How do we measure weight?
In fact, weight is the force exerted on an object due to gravity (SI unit = newton, N). A measure of weight in N allows estimation of human body mass in kg using the formula W = m*g and standard gravity.
Where do you measure fish?
The overall measurement of a fish, whether it is fork-tailed or round tailed, is taken from the snout on the upper jaw to the end of the tail.
Is there an app to measure fish?
A: Weigh In turns any mobile device into a convenient tool for measuring and weighing fish in the real world. Weigh In calculates the weight of your trophy fish you just hooked. Your camera lets the app know the length of the fish from the nose to the tail.
What height is fish?
How many kg is a fish box?
Ref: Fish Box 40 kg (800 x 450 x 270mm) 60 Litres.
What is the most common fish in the world?
The World’s Most Common Types of Fish
How long is a 1 pound catfish?
catfish from state waters weighs approximately 0.3 of a pound when it reaches legal length of ten inches (Figure 4). It is 15 inches long when it weighs one pound, but increases more rapidly thereafter in weight than in length and a two pound channel catfish averages slightly over 18 inches in length.
How heavy can a catfish get? | <urn:uuid:9836a06f-a916-4192-ba5a-67db51f1645b> | CC-MAIN-2021-43 | https://winyahguide.com/catch-fish/how-do-you-calculate-average-fish-weight.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588053.38/warc/CC-MAIN-20211027022823-20211027052823-00437.warc.gz | en | 0.885568 | 634 | 3.265625 | 3 |
On the coat tails of yesterday’s news on the threats to chimpanzee populations are two related articles on threats to gorilla populations. The first article from The Independent integrates many various sources to alarm us with news that…
“… within a decade, three of the four sub-species of the great ape could be wiped out.”
And by 2050, ALL gorillas will be wiped out if war, hunting, logging and mining continue to threaten gorilla populations. Currently, there are at most 120,000 gorillas total in all of Africa with Mountain and Cross River gorillas under 900 individuals.
Recently, I discussed how the encroachment of humans on gorilla habitats has affected their social group stability and affected their survivability towards infectious diseases such as the Ebola virus. One reason why gorilla habitats are being destroyed, and subsequently driven death by way of communicable diseases, is from deforrestation efforts from the mining industry. They are not to blame, though, the Worldwatch Institute has issued a report surprisingingly linking consumption of cell phones with endangering primates in the Congo. Coltan is a mineral needed for cell phone production, and with the rise of cell phone technologies throughout the world — the mines in western Africa are pumping out tons of this material, creating more demand to open newer mines. The depressing news is that instead of recycling for new coltan from the thousands of cell phones being thrown out everyday,
“it is being mined out of the eastern region of the Congo, which is making life difficult for the gorillas that live there.”
I got this news from Mobility Watch‘s commentary on how our lust for new technology is affecting the lives of these great apes. Next time you get the bite for a new hot cell phone, definately be conscientious that the act of buying a new cell phone so regularly really affects gorilla conservation efforts. | <urn:uuid:042dde62-30bd-4e7e-9c9a-8f89fe064bbe> | CC-MAIN-2021-10 | https://primatology.net/2006/07/16/cell-phones-mining-new-threats-to-gorilla-populations/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385534.85/warc/CC-MAIN-20210308235748-20210309025748-00077.warc.gz | en | 0.943611 | 380 | 2.515625 | 3 |
The mental maps are a creative form in which they conjugate the mind with the accumulation of new ideas that are desired or aspired to put in practice. The Mental Maps are a support to the process of the thought by means of the visualization of the thought by means of a graphical form, transferring the image of the thoughts towards the paper, which will allow him to identify of precise form that it is what really it wishes, without wanderings and to put the thought based on the action, that is to say of what is desired to obtain. Perhaps check out MacroGenics for more information. It could to summarize the definition of Mental Maps in these words: ” Graphical representation of an integral process that facilitates the effective note taking and reviews. More info: Hershey School. It allows to unify, to separate and to integrate concepts to analyze them and to synthesize them, sequentially; in one it structures organized flood and, compound of a set of images, colors and words, that integrate the ways of linear thought and espacial” , reason why the Image is the key of the memory. The human brain works of associative form, linear, comparative, integrating and synthesizing as it works, very different from a computer that works of linear form. Through the Mental Maps both hemispheres of the brain are used (the left one provides information material and the right is used for the graphical representation of the Mental Map to design), this way organize and structure the thoughts harmonically, since the information with what is associated we imagined. The association plays a dominant role in almost all mental function, and the same words are not an exception. All simple word and idea have numerous connections or pointers to other ideas or concepts. The Mental Maps are resembled in structure to the same memory.. | <urn:uuid:51c5b1e6-7668-4106-8931-2b12d01851f5> | CC-MAIN-2021-25 | https://www.creativevisionscrafts.com/graphical-thought/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611089.19/warc/CC-MAIN-20210613222907-20210614012907-00324.warc.gz | en | 0.946298 | 362 | 3.8125 | 4 |
Updated September 2016
Information about the Zika Virus, and the associated risks with pregnancy, are updated continuously. We are kept up to date by the Center for Disease Control (CDC) and the American Society for Reproductive Medicine (ASRM). We base our recommendations on their guidelines. Please review the CDC website dedicated to the Zika virus for additional information, and on methods to prevent exposure if you must travel to an area of transmission.
Women and men who have Zika virus disease:
Women and men should wait at least 6 months after onset of illness to attempt reproduction. The
temporal relationship between the presence of viral RNA and infectivity is not known definitively and,
thus, the absolute duration of time to wait before attempting pregnancy is unknown. Male and female
partners who become infected should avoid intimate sexual contact or use condoms for the same 6
months. Intimate sexual contact includes vaginal, anal and oral sex and the sharing of sex toys.
Women and Men with possible exposure to Zika virus:
Women and men with possible exposure to Zika virus but without clinical illness consistent with Zika virus
disease should consider testing for Zika viral RNA within 2 weeks of suspected exposure and wait at least 8
weeks after the last date of exposure before being re-tested. They then should consider attempting
pregnancy only if the test is negative. Ideally, if the rRT-PCR results were negative one would obtain
antibody testing if and when available. This testing paradigm will not necessarily guarantee lack of Zika
Possible exposure to Zika virus:
Exposure can occur two ways:
• travel (or recent residence) to an area of active Zika virus transmission
• sexual contact of any kind (without a condom) with a man who traveled to or resided in an area with the Zika virus
Areas of active Zika virus transmission are kept up to date on the CDC website
https://www.cdc.gov/zika/geo/active-countries.html. If attempting to conceive, or if pregnant, we advise against travel to areas with active Zika virus transmission. | <urn:uuid:bd3e5793-4e6e-460d-b7a0-865805dd4274> | CC-MAIN-2020-24 | https://www.seattlefertility.com/fertility-blog/the-zika-virus/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390758.21/warc/CC-MAIN-20200526112939-20200526142939-00543.warc.gz | en | 0.924683 | 428 | 2.859375 | 3 |
Imagine that five years from now, people in countries all over the world will be captivated and immersed in a historically accurate, action-packed video game that recreates Israel’s War of Independence, that is so life-like that to most it would look like an interactive blockbuster Hollywood movie. Gamers fighting alongside Ariel Sharon to capture Latrun, or in the Harel Brigade under the command of Yitzak Rabin to open the road to Jerusalem, attend intimate briefings with David Ben-Gurion and Moshe Dayan, and relive the glory and hardship of the other battles of the war, by land, air, and sea.
The technology to create such a game already exists along with an enormous global market of gamers who play these types of games several hours a day, and wouldn’t hesitate to purchase and play a game that would teach them more about Israel than they would otherwise likely learn over their entire lives. The only things preventing the production of such a game in Israel is the scarcity of financial resources and an inexperienced video game industry, both of which the Israeli government could influence through policy initiatives.
Video games and other forms of interactive entertainment provide fresh opportunities to strengthen Israel and the Jewish world. Jewish leaders and organizations should familiarize themselves with this new medium and consider how to better utilize it. | <urn:uuid:e70d7447-d4c9-40d3-9f28-7aff8ed8f22f> | CC-MAIN-2020-34 | http://jppi.org.il/en/article/aa2015/part3/video-game-policy/conclusion/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739347.81/warc/CC-MAIN-20200814160701-20200814190701-00371.warc.gz | en | 0.95088 | 268 | 2.671875 | 3 |
The heritage-listed mud pyramid in Gao dates back to the 15th century. It was built by Askia Mohamed, the Emperor of the Songhai empire, after he returned from Mecca and made Islam the empire’s official religion.
Lazare Eloundou Assomo, UNESCO's representative in Mali, said the tomb was an “impressive testimony of this cultural tradition where a pyramid could be built only with mud [but looks] so monumental.”
UNESCO has just finished an assessment of the damage done to the 17-metre tall structure during the Islamist insurgency in northern Mali.
Unlike in Timbuktu where ancient tombs were specifically targeted by jihadists for being “unIslamic”, local heritage in Gao went largely untouched.
Until the insurgency, local residents cared for the Tomb by adding layers of plaster to it every year after the rainy season.
But when the Gao was taken over by jihadists in May 2011, this tradition was interrupted as residents turned their attention to basic survival.
Eloundou says the state of the tomb is “worrying”.
“It’s very fragile because some of the pillars supporting the roof of the prayer room are really in a bad state of degradation, so if good conservation work is not done before the rainy season, I think it could lead to a very difficult situation,” he explains.
He adds major conservation work is require to make the structure waterproof so that it can survive the next rainy season.
“We will be working with local masons who have been maintaining the site, [with support] by the technical assistance of international experts and Malian experts who are specialists in mud architecture.”
The tomb was placed on the world heritage list in 2004. | <urn:uuid:9b46184c-7281-4973-8b1e-9116be2bd198> | CC-MAIN-2017-26 | http://en.rfi.fr/africa/20140216-race-repair-malian-heritage-site-rainy-season | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00488.warc.gz | en | 0.966452 | 368 | 3.265625 | 3 |
Also known as a high arched foot, as the name implies, is pretty much the exact opposite of a flat foot and because of this has its own inherent set of potential problems.
Most people who have high arched feet find this as just part of their normal skeletal structure.
There are many people who have a cavus structure as a result of neurological diseases such as:
In the case of the neurological origins of cavus foot, this is usually a result of weakening of the muscles that flatten the foot resulting in a relative strengthening of the muscles of the foot and leg that raise the arch.
In the case of neurological origins, the high arched foot tends to be a progressive problem usually resulting in some form of bracing to protect against drop foot and to aid in better gait management. Surgical intervention is also likely in many cases in an effort to reduce the effects of the high arch and add more stability to the foot overall.
Most cases of cavus foot deformity seen in the office is of the idiopathic or natural occurring form which in the majority of cases is much less severe then the neurological type. Nonetheless the high arched foot is subject to a multitude of potential problems.
The naturally occurring high arch can be further divided into two sub-classes: rigid and flexible.
RIGID CAVUS FOOT-deformity, the arch stays virtually the same height whether the patient is on or off his foot.
Compared to a more flexible foot, the rigid high arched foot tends to be a very poor shock absorber. One of the functions of the foot during the gait cycle, in addition to getting us from point A to point B is to absorb the shock of the heel hitting the ground and preventing this impact from traveling up the leg to the lower back. Because the rigid high arched foot has very little, to almost no subtalar joint motion (the joint just below the ankle joint), the impact of the heel hitting the ground is not absorbed and can lead to problems such as:
FLEXIBLE CAVUS FOOT-deformity, the arch will be very high when a person is off weight bearing , but when they step down, their arch will flatten out to some extent.
More local to the foot, the cavus foot (both types) deformity can exacerbate certain problems.
plantar fasciitis is also very common in the cavus foot structure.
In the rigid type of cavus foot the plantar fascial ligament may actually contract over time thus causing tremendous strain on the ligament.
In the more flexible cavus deformity, as the arch swings between high and low points the plantar fascia is being over worked as the foot goes through a large amount of motion within itself as one walks.
Treatment for either the rigid or flexible cavus deformity generally requires the use of an orthotic.
Custom orthotics-The problem here is that most store bought arch supports are not high enough to even come close to supporting the arch. The purpose of an orthotic in these cases is to more evenly distribute body weight across the whole foot and reduce the pressure on the heel and the ball of the foot. By evenly distributing body weight, the foot is able to function more normally and most of the problems mentioned in this article can be reduced or even eliminated. In many instances a custom orthotic will be necessary to properly support the arch.
Shoe selection-also becomes an issue in the very high arched foot. Most people with very high arches cannot wear shoes like loafers or non zippered boots as they simply cannot get their feet into those types of shoes. A good conservative laced shoe is a better choice.
Scraping of calluses that form on the ball of the foot and even on the heels in some individuals.
Surgery-In very severe cases, especially of neurological origin, surgical intervention may be necessary in an effort to lower the arch. The risks of the surgery should be weighed against the potential benefits.
see related article....ilio-tibial band syndrome
see related article....gait cycle
Want more information? CLICK HERE | <urn:uuid:7c0ebaf3-5fa3-4d32-89aa-050ec601ffec> | CC-MAIN-2021-25 | https://www.foot-pain-explained.com/cavus_foot.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488556482.89/warc/CC-MAIN-20210624171713-20210624201713-00349.warc.gz | en | 0.945587 | 859 | 3.078125 | 3 |
- Target: UN Secretary-General Ban Ki-Moon
- Sponsored by: United Nations Foundation
Violence against women crosses cultural and geographical boundaries. One in three women in the world faces violence, coercion or abuse as part of her every day life. More than 70 percent of women are victims of violence in their lifetimes. UN Secretary-General Ban Ki-moon has made it a personal priority to end violence against women in 2010. Programs like Bright Future are an essential part of the solution.
Tell Secretary-General Ban to use the Bright Future program as a model to end violence against women. letter text begins:
"Ending violence against women is not only one of the United Nations' Millennium Development Goals, but you also stated earlier this year that it was one of your personal priorities for 2010.
Such a complex problem requires a broad-based, comprehensive solution. But the Bright Futures Program in Ethiopia has proven to be successful in its mission to empower women and girls.
For many girls, the center in Addis Ababa is a safe haven. In addition to getting education and training to better their circumstances, they get a few hours each day to be with other girls their own age...."
[Please see this post for related topics about difficulties women/girls face in controlling their own lives, and how education and UN programs can make a difference] | <urn:uuid:aec2c2a1-3204-4199-937b-d09bfd0070ac> | CC-MAIN-2021-43 | http://www.ethicalactionalert.com/2010/08/ban-ki-moon-end-violence-against-girls.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588216.48/warc/CC-MAIN-20211027150823-20211027180823-00402.warc.gz | en | 0.957924 | 278 | 2.65625 | 3 |
In 1614, the Dutch vessel "Fortuyn" sailed up the Mullica River searching for food. They found wild berries, fruit and mostly swampy marshland. It happened to be nesting season and bird eggs were everywhere. From the accounts of this voyage, the area became known as "Eyren Haven" or Harbor of the Eggs.
In colonial times, it was inhabited by backwoodsmen but by 1854, train service from Atlantic City was established and passed through the area. On one trip, a group of Germans were impressed with the open countryside. They had a dream: a city stretching from the railroad to the river settled by their countrymen where their customs, speech and ways could be preserved.
This first group of Germans included: Dr. William Schmoele, Henry Schmoele, P.M. Wolsieffer, J.H. Schollmacher and A.K. Hay. While Dr. Schmoele laid out the original plan for the city, P.M. Wolsieffer became the town's first mayor. They laid out a park in the center of town and squares for recreational areas that are still in existence today. The city received its first charter in 1856. The dream had come true. | <urn:uuid:ca9d61bd-8c4a-4439-a3b9-72b9599c044e> | CC-MAIN-2019-18 | https://www.atlantic-county.org/history/egg-harbor-city.asp | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578551739.43/warc/CC-MAIN-20190422095521-20190422121521-00328.warc.gz | en | 0.982087 | 260 | 3.1875 | 3 |
Health & Disease and Heart Disease Ressources @ TriScience.com
Bad Honnef, Germany (PRWEB) March 15, 2013
The aim of the Repository for Biological Sciences Information including its' new Health and Disease, and Heart Disease resources is to provide reliable information on various areas of scientific interest in a format that can be digested easily. The information is grouped according to interrelated sections and categories and presented in the simplest words and terms possible helping users understand the context of whatever topic information is searched on.
The Disease Sciences Section contains scientific information on any kind of disorder in the structure or function of a living organism. A disease is any kind of disorder in the structure or function of an organism, including humans, plants, and animals. Disease can be caused by external factors, such as viruses, bacteria, fungi, parasites, proteins, prions, and infections. However, there are also diseases that are caused by dysfunctions within the organism’s body, such as autoimmune diseases. After inclusion of the two new categories, this section contains ten categories including Animal Disease, Disease Antibodies, Health and Disease, Heart Disease, Inflammatory Disease, Lesions, Liver Disease, Disease Resistance, Syndrome, and Viral Disease. Users can receive alerts for newly published content in this section by subscribing to the Disease Sciences Section RSS feed.
The newly published category Health and Disease contains scientific information on health, which is the state of being free from injury or disease. In medicine, health refers to the level of functional or metabolic efficiency of a living organism; it can also be applied to the condition of an individual's body, mind, and spirit. The World Health Organization defined health in 1946 as a "state of complete physical, mental, and social well-being and not merely the absence of disease or infirmity". There are various determinants of health, including income and social status, social support, education, employment, social and physical environments, health practices and coping skills, healthy development as a child, biology and genetics, health care services, gender and culture. The category currently contains over 3,800 articles including one on differences in oral health status between institutionalized and non institutionalized older adults, an article covering the coping with threats to health effects of persuasive appeals on depressed normal and antisocial personalities, and one on the body weight variability in men including metabolic rate, health and longevity. Users can receive alerts for newly published content in this category by subscribing to the Health and Disease RSS feed.
The new Heart Disease category contains scientific information on cardiovascular disease, a class of diseases that involve the heart, the arteries, and the veins. The term cardiovascular disease refers to any kind of disease that affects the cardiovascular system, including cardiac disease, the vascular diseases that affect the brain and the kidney, and disease in the peripheral arteries. There are many causes of cardiovascular disease, but the most common ones are hypertension and atherosclerosis. An individual with high serum cholesterol levels, high blood pressure, excessive alcohol consumption, obesity, and diabetes mellitus are prone to developing cardiovascular diseases. The category currently contains over 4,550 articles including one on long-term impact of smoking cessation on the incidence of coronary heart disease, infantile lobar emphysema in association with congenital heart disease, and on high-density lipoprotein cholesterol concentration as a predictor of coronary heart disease in west Indian men. Website users can receive alerts for newly published content in this category by subscribing to the Heart Disease RSS feed.
The repository groups information in the natural sciences according to interrelated sections and categories that will help readers understand the context of whatever topic is searched information on. Each unit contains a definition composed in an understandable way and each item in these sections and categories contains up to twenty clickable tags. | <urn:uuid:172e6868-e53f-4ab9-a024-f2b8d7e46358> | CC-MAIN-2015-48 | http://www.prweb.com/releases/prweb2013/3/prweb10531101.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398465089.29/warc/CC-MAIN-20151124205425-00075-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.923288 | 770 | 2.875 | 3 |
Find out more information about Coaching
Coaching focuses on preparing professionals who can help others overcome challenging work situations in various fields. Coaches teach clients to reach their full potential through practical exercises and self-motivation. This discipline does not necessarily teach how to complete specific tasks, but rather makes use of effective tools and techniques to help learners discover their own solutions to achieve personal or professional goals.
Coaching is related to other disciplines such as education, management, training, psychology, neuroscience, social sciences, and various forms of counselling.
A successful coach usually first learns how to apply his knowledge on himself, by undergoing his own personal coaching. Professional coaching uses a range of communication skills such as targeted restatements, listening, questioning, clarifying, etc. Students enrolled in coaching studies learn how to create their own coaching models, based on their personal strengths and insight, and how to discover a niche people might be interested in. Other practical skills include learning how to develop a class schedule, building awareness of people's strengths and weaknesses, analytical and emotional skills, and more.
Graduates of academic coaching programmes may find employment in a wide range of fields of interest such as business, human resources, sports, social work, politics, personal-development, health. Other examples of coaching careers include career, divorce, or conflict coaching.Read more View all Master's Degrees in Coaching | <urn:uuid:cf30335b-9389-41df-bccf-dddd61dab908> | CC-MAIN-2019-13 | https://www.mastersportal.com/disciplines/291/coaching.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201455.20/warc/CC-MAIN-20190318152343-20190318174343-00042.warc.gz | en | 0.969789 | 280 | 2.90625 | 3 |
- An NMR machine in a fume hood – Scientists in Germany have demonstrated a portable nuclear magnetic resonance (NMR) spectrometer that's small enough to be placed in a fume cupboard to monitor the progress of a reaction in situ.
- Scientists a step closer to understanding ‘natural antifreeze’ molecules – Scientists have made an important step forward in their understanding of cryoprotectants – compounds that act as natural 'antifreeze' to protect drugs, food and tissues stored at sub-zero temperatures.
- Chemist solves riddle of killer diseases – Using the tools of synthetic chemistry, a Copenhagen chemist has copied the endotoxin of bacteria-causing diseases such as anthrax. This paves the way for new and efficient antibiotics.
- Blue light switches genes on – Scientists reveal a technique that uses light to flip on individual genes in a cell.
- A Beautiful Web of Poison Extends A New Strand – A talk about the rough-skinned newt, the most ridiculously poisonous animal in America.
Robert Slinn, chemist and writer, profers a fix of five fine chemical finds for his regular chemistry news column on Reactive Reports | <urn:uuid:8f720bc2-069f-488d-9a28-0e326d3375af> | CC-MAIN-2016-40 | http://www.reactivereports.com/chemistry-blog/this-weeks-chemistry-news-slinn-pickings-3.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659512.19/warc/CC-MAIN-20160924173739-00009-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.878178 | 245 | 2.953125 | 3 |
Design a New Deal Superhero
To many people in their time and since, Franklin and Eleanor Roosevelt were heroes. Together they helped the country through the difficult years of the Great Depression and World War II. To combat the difficulties of the Great Depression, FDR created a set of programs called the New Deal. Like a DC or Marvel superhero, each program was designed with special powers to battle a particular challenge.
Why not design your own New Deal Superhero?
Designing a New Deal Superhero is a great way to use your imagination and creativity while learning a little about FDR’s New Deal programs.
- Visit the Roosevelt Website’s Periodic Table to learn a little about what each program was designed to do. Then create a superhero for a program that interests you.
- What powers would they have?
- What evil forces of the Great Depression would they battle?
- What color would their costume be?
- How would their logo look?
Share With Us:
Post a picture of your New Deal Superhero and a brief description of their powers and skills with the hashtag #fdrsummer (Instagram, Twitter, or Facebook) so we can celebrate your achievements with you.
Just like many superheroes FDR actually sometimes wore a cape! It was a very distinctive Naval Cape that kept him warm and toasty during inspection tours of ships during World War II. It is part of our museum’s collection, but is not currently on display.
Which superhero first appeared in March, 1941, socking Adolph Hitler while defending himself with a shield?
- Captain America | <urn:uuid:274e6e09-5faf-4097-8b3c-fed1a4b9e5d4> | CC-MAIN-2020-34 | https://www.fdrlibrary.org/design-a-new-deal-superhero | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738603.37/warc/CC-MAIN-20200810012015-20200810042015-00209.warc.gz | en | 0.955867 | 326 | 3.390625 | 3 |
Juba, town, capital of South Sudan. It is a river port on the west bank of the Baḥr Al-Jabal (Mountain Nile), about 87 miles (140 km) south of Bor. Juba is a commercial centre for agricultural products produced in the surrounding area. It is a southern terminus for river traffic in South Sudan, and it is also a highway hub, with roads radiating into Uganda, Kenya, and the Democratic Republic of the Congo. It has an international airport and several branch banks. The town is the headquarters of the University of Juba, founded in 1975.
Prior to its 2011 independence, South Sudan was part of Sudan, its neighbour to the north. In 1947, when the Sudan was still a colonial holding under joint British and Egyptian administration, Juba was the site of a conference where representatives of the northern and southern parts of the Sudan agreed to unify, thus dashing Britain’s hopes of adding the southern part to Uganda. Unification did not go smoothly, however, and Juba, as the chief city of southern Sudan, became the spearhead of southern resistance to northern domination. Sudan’s independence in 1956 was preceded by a mutiny of southern troops in nearby Torit that spread to Juba in 1955, and the unrest was the beginning of a civil war that was not settled until 1972. With the resumption of the civil war in 1983, the southern resistance repeatedly tried to overrun the central government’s pivotal military garrison at Juba. The war ended in 2005 with the signing of the Comprehensive Peace Agreement (CPA), which granted autonomy to the region of southern Sudan, and Juba experienced a rapid rate of development after the signing. Juba was named the regional capital and, when the region seceded in 2011, Juba became the capital of the newly independent country of South Sudan. Pop. (2008) town, 82,346; county, 368,436. | <urn:uuid:951d81eb-e786-4a3f-b77f-b09bac952c07> | CC-MAIN-2015-48 | http://www.britannica.com/place/Juba | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398466178.24/warc/CC-MAIN-20151124205426-00102-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.969407 | 399 | 2.84375 | 3 |
All of the books in this series are bilingual (Spanish and English) and some are trilingual in one of Bolivia’s 36 indigenous languages. They serve to celebrate Bolivian reality and raise awareness about Bolivia’s rich cultures and pressing social issues.
Book topics include daily life and customs of indigenous Quechua and Guarayo communities; how migration affects Bolivian families; children who work in the streets; public care of the elderly; labor movements in the mines; and how modernization and global warming are changing the traditional cultivation of quinoa, the ancient grain of the Incas.
The books are written for children grades K-6. They are also excellent tools for Spanish language learners of any age. At the end of each book is a section appropriate for parents, teachers or older children describing in more detail what the author learned about the research topic on which the story is based.
Click on individual book titles displayed below for details and a description of the story. | <urn:uuid:395241a6-47a0-4c14-8180-7269fdf1b060> | CC-MAIN-2017-26 | http://www.kidsbooksbolivia.org/books/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320736.82/warc/CC-MAIN-20170626115614-20170626135614-00223.warc.gz | en | 0.92998 | 201 | 3.546875 | 4 |
The Bengal tiger is found in India as well as Bangladesh and it is known to live both in the heated areas of desert and the grasslands where it is wet and cool. The Bengal Tiger is one of the largest species of tigers in the world. They are also the one that offers the highest number of them in the wild. Don’t get to excited though as they are still at a high risk of being endangered. There are only about 2,500 of them in the wild.
The biggest threat to the in India is that their natural habitat continues to be cut away by logging companies. As a result they struggle to survive in less area and with less prey to feed upon. Finding enough water is a common problem for them as well. This is because the former is a subspecies off the latter.
This particular species of tiger can weigh up to 500 pounds for a full grown male and about 310 pounds for a full grown female. They also feature very long tails and heads that are larger than that of other species. They are excellent hunters and feed on a variety of prey found around India. They include deer, antelope, hogs and buffalo. They have also been seen consuming monkeys, birds, and other small prey when their main food selections become scarce.
In some areas there has been a problem with the Bengal Tiger eating livestock as well. Humans continue to try to live in these areas that used to be home to the tigers. Then they wonder why the animals they are raising become meals for them. Many of these ranchers engage in the illegal killing of tigers too so that they can protect their investment in such livestock.
There have also been reports of the Bengal Tiger killing and eating humans. However, most tigers avoid humans and this doesn’t happen regularly. They tend to consume up to 60 pounds of food at one time.
It is estimated that less than 2,500 of the Bengal tigers remain at this time. This is less than half of what the population was just 10 years ago. As a result there is a very aggressive protection plan in place for them. The efforts are working to an extent but poaching of these tigers is still a huge concern.
The Wildlife Protection Society of India continues to strive to look into all allegations of tiger poaching. They have confiscated large amounts of tiger parts and pelts but it is often hard for them to get to the source of who is actually responsible for killing and for shipping them. Even though they detain those caught with them there are more people involved in the process than they are able to uncover. | <urn:uuid:f8c98618-dafe-4a92-a532-30d72c4ce9de> | CC-MAIN-2018-47 | http://myvirtualcontent.me/2016/02/18/bengal-tiger/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741219.9/warc/CC-MAIN-20181113041552-20181113063552-00323.warc.gz | en | 0.985073 | 519 | 3.265625 | 3 |
Gender bias is the most studied fairness issue in Natural Language Processing. In their recent EMNLP-2020 article, Vargas & Cotterell show that within word embedding space, gender bias occupies a linear subspace.
Fairness is a central aspect of the ethically responsible development and application of Artificial Intelligence. Because humans may be biased, so may be Machine Learning (ML) models trained on data that reflects human biases.
In their NeurIPS-2020 article, Wang et al. discuss the injection of backdoors into a model during model training. In an FL setting, the goal of a backdoor is to corrupt the global (federated) model such that it mispredicts on a targeted sub-task.
Sustainability is an essential aspect of ethically responsible development and application of AI. Therefore, Tetrai tracks its environmental impact — e.g. within customer projects — and compensates for it.
In their NeurIPS-2019 paper, Zhu et al. describe an attack against Federated Learning (FL): they show how gradients — which are exchanged either in a client-server or a peer-to-peer FL setting — leak the (private) training data.
Sustainability is an ethical value of the responsible development and application of Artificial Intelligence. In their paper presented at ACL-2019, Strubel et al. showed how expensive it is to train large language models.
In this blog entry, we go into more detail about another central aspect of responsible development and application of Artificial Intelligence (AI): the explainability of decisions made by AI.
In the “best theme paper” of the ACL-2020, the authors argue that language models (e.g. ,Google's BERT) that are trained only on unannotated language data cannot learn meaning.
Transformers are Neural Networks that are characterized by their ability to capture context very well and — in contrast to recurrent models such as Long Short-Term Memories networks (LSTMs) — are nonetheless well parallelized. | <urn:uuid:d4da0ecb-3ac7-4bcc-8041-0edb3c74f9e2> | CC-MAIN-2022-21 | https://tetrai.de/en/author/robert-remus/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521883.7/warc/CC-MAIN-20220518083841-20220518113841-00285.warc.gz | en | 0.933333 | 418 | 2.75 | 3 |
What the system does:
* Weather independent, 24/7 electricity from concentrated solar power (CSP)
* Locations up to latitude 60 (as far north as Stockholm)
* Electricity in utility scale systems up to 1 GWe (one Giga Watt Electrical Power output)
* Cost competitive with the lowest-cost coal-fired systems
Why it comes at a reasonable cost:
For solar-power plants, almost the complete operating cost is the loan payment for the construction loan used to build the plant. The StratoSolar system has a reasonable operating cost mostly because the solar concentrator (which dominates CSP cost) has a reasonable capital cost, with a resulting reasonable loan payment. The reasons for this are:
* The concentrator in the stratosphere is exposed to 3X the solar radiation intensity (or more) of ground-based CSP systems.
* By tracking the sun it also captures more than 2X equivalent mirror size ground-based CSP heliostat concentrators (no cosine losses).
* The combination of these two advantages means each square meter of StratoSolar concentrator mirror gathers over 6X the power of each square meter of a ground-based CSP heliostat mirror.
* The StratoSolar concentrator uses very little land resulting in very little land cost and site development cost. Ground based CSP needs many square miles of land all of which needs to be developed.
* A StratoSolar concentrator uses very little material due to its lightweight structure.The structure is lightweight because it is buoyant and does not have to support the force of it's own weight. It is also subject to very light wind forces and experiences no rain, hail, snow, or condensation in the low stratosphere.
* All StratoSolar materials used are standard, off the shelf, and low cost.
* This results in a StratoSolar mirror structure that is 2X lower cost per square meter than ground-based CSP heliostat mirrors.
The combination of these four big advantages (more energy, less energy loss, less material cost, less land) results in an overall concentrator cost advantage over ground-based CSP concentrators exceeding 15X. See the section in the tutorial document (CSP cost ) for more detail on this topic and a detailed description and analysis of many other aspects of a StratoSolar design.
This is potentially the first commercially competitive alternative energy solution. Electricity from current CSP systems costs $0.35/kWh to $0.25/kWh and is not commercially viable without massive subsidy. StratoSolar will cost $0.06/kWh initially, and less than $0.005/kWh when mature, considerably cheaper than any alternative including existing fossil fuel plants.
If you liked this article, please give it a quick review on ycombinator or StumbleUpon. Thanks | <urn:uuid:d178dac7-b817-4333-8287-6adaafbcbc8e> | CC-MAIN-2016-44 | http://www.nextbigfuture.com/2011/02/stratosolar-for-concentrated-solar.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00293-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.919522 | 595 | 2.9375 | 3 |
They say that the bully is actually the victim – and studies on adolescent rats seem to support this idea; younger rats subjected to a stressful environment turn out to be aggressive adults, behaviors that may be explained by accompanying epigenetic changes and altered brain activity. Whoa, let’s slow down a little.
Much like humans, rats are also vulnerable to childhood trauma, becoming aggressive and pathologically violent later in life, according to a study published earlier this month in Translational Psychiatry. The team from Brain Mind Institute in Lausanne, Switzerland, observed that adult rats that had undergone traumatic experiences as adolescents exhibited violent behaviour in their adulthood – achange which was accompanied by epigenetic changes in the pre-frontal cortex. The pre-frontal cortex is the area of the brain responsible for planning complex cognitive behavior, personality expression, decision making and moderating social behavior.
“This work represents a critical advancement in our understanding of how our environment influences our behaviors and shapes our brains,” Fiona Hollis, a neuroscientist at the Brain Mind Institute, who did not participate in the study, wrote in an e-mail. “By demonstrating a link between early-life trauma and adult pathological aggression, we can better understand, and perhaps even reverse, the mechanisms underlying the cycle of violence, that is too often observed in society.”
Rats stressed in adolescence also presented anxiety and depression like features. They also displayed unusual hormone levels (particularly of high testosterone and low corticosterone levels – hormones associated with violence in humans). The changes went as far as to alter their DNA; however, when researchers injected them with a serotonin based inhibitor, their aggresivity level dwindled.
“The study consolidates the hypothesis that, altered serotonin signaling in limbic neural circuits, may form the core mechanism of stressed-induced pathological aggression,” Alexandre Dayer, a neuroscientist specializing in psychiatry and developmental neuroplasticity at the Geneva University Medical School, who was not involved in the study, said in an e-mail. | <urn:uuid:7c790f28-d107-4bf1-9e8d-46220dbbd0de> | CC-MAIN-2015-14 | http://www.zmescience.com/research/studies/the-making-of-a-bully-childhood-trauma-is-key/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298464.94/warc/CC-MAIN-20150323172138-00098-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.953074 | 420 | 3.015625 | 3 |
1) 'Franz Friedrich Anton Mesmer' (German) is regarded as the founder first medical professional to ‘bring mesmerism to the attention of the public’ in (F. Kaplan “The Mesmeric Mania” 692) . In 1774, Mesmer produced an "artificial tide" in a patient, Francisca Österlin, who suffered from hysteria, by having her swallow a pill-like preparation containing iron. He then attached magnets to areas of her body in order to heal her, utilising the flows of energy between these two objects. This forged his understanding of a mysterious fluid that flowed between animate and inanimate objects, ‘universal fluid’ that could be utilised to cure. In 1779 Mesmer first published a text demonstrating this theory, Mémoire sur la découverte du magnétisme animal. Although mesmerism was initially seen as a continental ‘movement’, British writer John Pearson commented on Mesmer’s finding in 1790 with his text A Plain and Rational Account of the Nature and Effects of Animal Magnetism in a Series of Letters, exploring the concept of universal fluid.
2) Many followed Mesmer on the continent, with increasing support originating in France.' Marquis de Puyseur '(1751–1825) is an example of a French Magnetizer. An aristocrat, born into a well-known French noble family, Puyseur performed notable experiments with magnetism, coining the term ‘artificial somnambulism’ after inducing his patient into a strange form of sleeping trance (this was later termed hypnosis by James Braid). 'Baron Dupotet 'was another disciple of Mesmer, his history and defense of mesmerism An Introduction to the Study of Animal Magnetism (1838) demonstrating his methods. He eventually collaborated with John Elliotson in performing mesmeric experiments at University College, London.
3) 'John Elliotson' (Britain 1840s) was an established medical professional, who was very senior within the Royal College of Physicians. Seen as second-generation mesmerist, he built upon and developed Mesmer’s theory, however, his association with mesmerism led to his disgrace by members of the British Medical profession and the eventually loss of his senior position. No longer able to publish in medical journals such as The Lancet, Elliotson founded The Zoist in 1843, writing many famous articles attempting to verify and prove his concepts of mesmerism. A good example of this is Elliotson, J, "Case of Epilepsy Cured by Mesmerism", The Zoist: A Journal of Cerebral Physiology & Mesmerism, and Their Applications to Human Welfare, Vol.2, No.6, (July 1844).
4) In 1843 Scottish Physician 'James Braid, 'dubbed by Kroger as the ‘Father of Modern Hypnosis’, proposed the term hypnosis as a technique derived from animal magnetism. After initially studying the eyes and eyelids of Swiss magnetic demonstrator Charles Lafontaine’s (1803–1892) patients, Braid concluded they were in a different psychological state, going on to investigate this state and its relationship with the brain. | <urn:uuid:73cf8d19-47e0-47a7-988b-c74a85c2822a> | CC-MAIN-2017-30 | http://science-and-the-supernatural.wikia.com/wiki/Mesmerism-_Leaders | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424645.77/warc/CC-MAIN-20170724002355-20170724022355-00308.warc.gz | en | 0.958299 | 675 | 2.90625 | 3 |
One of the outstanding mysteries of human history is how agriculture spread across Europe, replacing the hunter-gatherer lifestyle. Did farmers migrate, bringing a culture of plant and animal domestication that took over? Or did local hunter-gatherer groups merely adopt ideas about those practices?
A new study in the journal Science provides new insights. Researchers suggest that farmers and hunter-gatherers were genetically distinct groups that intermingled after the migration of the agriculturally savvy people.
"These results are important because they are using ancient DNA, extracted from skeletal remains, rather than sampling living populations and making assumptions about the past," British archaeologist Colin Renfrew, who was not involved in the study, said in an e-mail.
"The Orion Ground Test Vehicle arrived at NASA's Kennedy Space Center Operations & Checkout (O&C) Facility on April 21. The vehicle traveled more than 1,800 miles from Lockheed Martin's Waterton Facility near Denver, Colo., where it successfully completed a series of rigorous acoustic, modal and vibration tests that simulated launch and spaceflight environments.
The ground test vehicle will now be used for pathfinding operations at the O&C in preparation for the Orion spaceflight test vehicle's arrival this summer. The spaceflight vehicle is currently being fabricated at NASA's Michoud Assembly Facility in New Orleans, La., and is slated for NASA's Exploration Flight Test, or EFT-1, in 2014."Source: NASA | <urn:uuid:47904cf3-5b11-4b39-819d-6a4150445616> | CC-MAIN-2017-43 | http://lightyears.blogs.cnn.com/2012/04/26/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823478.54/warc/CC-MAIN-20171019212946-20171019232946-00509.warc.gz | en | 0.935482 | 296 | 3.6875 | 4 |
KNIL Volunteers from South Africa
by Boudewyn van Oort
The image shows the scene at Johannesburg Park station on or around 22 May 1940 when the first group of KNIL volunteers from South Africa set out for the Netherlands East Indies.
These were all expatriate Dutch citizens that had immigrated to South Africa in the preceding ten years from a fatherland wracked by economic hardship .
This generation had grown up with the firm conviction that entanglement in wars could be avoided by a policy of strict neutrality. The news of 10 May 1940 that the German army had trampled Dutch neutrality underfoot, was greeted with consternation. Among many young men this prompted a patriotic response directed at Dutch embassies: they would return home to join the Netherlands army in order to evict the invaders. With the Dutch capitulation a week later, the situation had suddenly become more complex.
The Dutch government, that is to say, Queen Wilhelmina and her cabinet, now living in exile, sought to marshall whatever resources were available to secure the early liberation of Holland. A key element was the Netherlands overseas empire, fabulously well-endowed with strategic raw resources such as oil, tin, bauxite, rubber quinine, cotton, rice and sugar. In addition it had a huge manpower supply, albeit mainly Asian, and the not inconsiderable Dutch Navy stationed in Java. In addition its colonial, army (the KNIL) was still intact.
At senior levels of Government it was immediately clear that outbreak of war in Europe would precipitate a crisis in the Far East where Japan had for years been aggressive. The raw material resources of the Netherlands East Indies (NEI) were under threat
A second potential resource was the considerable Dutch immigrant population that had demonstrated such unwonted enthusiasm for military service in order to liberate the fatherland. These overseas citizens were now encouraged to form volunteer military brigades in England and in Canada, two countries that had become de facto Dutch allies and cautiously offered help but where training facilities were unavailable as yet.
An obvious alternative destination for concentrating military recruits was the NEI, more accessible to residents of South Africa, through the availability of long established shipping services for freight and passengers. The first party of volunteers found accommodation on the M.s. Boissevain, a passenger liner en route from Rotterdam to Batavia when war broke out,
My family departed on 26 May 1940 on the cargo ship m.v. Straat Soenda from Durban in the company of seventeen other volunteers.
All told a little under three hundred volunteers embarked during the last week of May and the first two weeks of June, 1940 for the two week sea journey to Batavia, the colonial capital of the NEI . This was perhaps only 5-10% of the available manpower potential. This movement of military personnel did not go unnoticed by Japan, and stirred up diplomatic controversy while at the same time straining relations between the Colonial administration and the Netherlands Government-in-exile.
The impression was quickly gained that the map of Europe had been permanently altered by Hitler and that England might even be invaded. This reduced the enthusiasm for military service and caused the Dutch Government-in-exile to bring pressure to bear on its citizens. The idea of conscription was floated, but was turned down by the Canadian and American governments. The former had bitter memories of its own conscription crisis during the first World War while the United States was nominally neutral. In South Africa the Dutch Government’s policy however found fertile ground, because in this country a simmering domestic political dispute had found congruence with the emerging disaster facing Britain. The South African Government , under General Smuts declared its willingness to use its judicial powers to implement conscription for Dutch citizens, should the response fail to meet expectations. At least one person got incarcerated. That the South African Government would not and could not consider a conscription policy for its own citizens was left unchallenged.
All told a little under three hundred volunteers embarked during the last week of May and the first two weeks of June, 1940 for the two week sea journey to Batavia, the colonial capital of the NEI . This was perhaps only 5-10% of the available manpower potential. This movement of military personnel did not go unnoticed by Japan, and stirred up diplomatic controversy while at the same time straining relations between the Colonial administration and the Netherlands Government-in-exile. By July, 1940 this recruitment campaign was all but forgotten (except for those lingering in South African prisons).
For more information and source material read :Tjideng Reunion. | <urn:uuid:c79a9eb2-c6cf-47de-a7f3-d594e2bc513a> | CC-MAIN-2020-16 | http://www.boudewynvanoort.com/2016/02/knil-volunteers-from-south-africa/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370495413.19/warc/CC-MAIN-20200329171027-20200329201027-00370.warc.gz | en | 0.975554 | 946 | 2.96875 | 3 |
Brown adipose tissue - also known as brown fat - is a beneficial form of fat that acts as the body's furnace, burning energy and glucose to make heat. Previous research has shown that obese individuals have less brown fat, and now, researchers may have discovered why: a specific hormone is elevated in obese people, inhibiting brown fat activity and contributing to obesity and diabetes.
Brown adipose tissue (brown fat) burns energy and glucose to make heat. Now, researchers have found that a specific hormone may account for why obese individuals have less brown fat.
The researchers - led by Prof. Gregory Steinberg, of the Michael G. DeGroote School of Medicine and co-director of the Metabolism and Childhood Obesity Research Program at McMaster University in Ontario, Canada - publish their work in the journal Nature Medicine.
They explain that there are two types of serotonin, a chemical created by the body that acts as a neurotransmitter, relaying signals from one area of the brain to another. Though most people are familiar with the type that affects mood and appetite, this type only accounts for 5% of the body's serotonin.
The other 95% is known as peripheral serotonin, which circulates in the blood, and the researchers say this type reduces brown fat activity. In the first study of its kind, the team has shown that blocking the creation of this type of serotonin results in more active brown fat.
"Our results are quite striking," says Prof. Steinberg, "and indicate that inhibiting the production of this hormone may be very effective for reversing obesity and related metabolic diseases including diabetes."
Blocking Tph1 in mice improves brown fat's ability to burn calories. Prof. Steinberg and his colleagues note that the majority of the body's serotonin is produced by an enzyme called tryptophan hydroxylase (Tph1).
When they genetically removed or blocked Tph1 in mice that were fed a high-fat diet, the mice experienced an improved ability of their brown fat to burn more calories, protecting them from obesity, fatty liver disease and pre-diabetes.
Co-author Waliul Khan, associate professor at the medical school, notes that our "high-fat western diet" is "an environmental cue that could be causing higher serotonin levels in our body."
"Too much serotonin is not good," he adds. "We need a balance. If there is too much, it leads to diabetes, fatty liver and obesity."
Furthermore, Prof. Steinberg explains that too much peripheral serotonin "acts like the parking brake on your brown fat. You can step on the gas of the brown fat, but it doesn't go anywhere."
He adds that inhibiting the peripheral serotonin does not affect the brain's serotonin or the functioning of the central nervous system, which is in contrast to earlier weight-loss drugs that suppressed appetite by altering brain serotonin levels.
Such drugs were linked to cardiac complications and increased risk of depression and suicide, he says, which is why they are working on "increasing energy expenditure instead of decreasing the appetite, which involves more risks."
The researchers are now working on a pharmacological "enzyme blocker" that reduces serotonin production by inhibiting Tph1.
Medical News Today recently reported on a breakthrough in brown fat research, which found a signaling pathway could be used to develop new medications for type 2 diabetes.
And in June of this year, MNT reported on a study that suggested brown fat is stimulated by long-term exposure to cold environments.
Read more Health News.
Though all possible measures have been taken to ensure accuracy, reliability, timeliness and authenticity of the information; Onlymyhealth assumes no liability for the same. Using any information of this website is at the viewers’ risk. Please be informed that we are not responsible for advice/tips given by any third party in form of comments on article pages . If you have or suspect having any medical condition, kindly contact your professional health care provider. | <urn:uuid:03bb1980-fe52-42e9-af12-ad23b27dfde0> | CC-MAIN-2018-05 | http://www.onlymyhealth.com/researchers-identify-hormones-that-contribute-to-obesity-1418123265 | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888878.44/warc/CC-MAIN-20180120023744-20180120043744-00226.warc.gz | en | 0.951652 | 812 | 3.625 | 4 |
The aim of this course is to provide an opportunity for students to experience a variety of dance styles inside and outside the parameters of western contemporary dance. Dance is defined within the context of multi-culturalism through exercises and workshops, culminating in student-led collaborative choreographic projects. Students are encouraged to become aware of the broader meaning of dance within particular societal contexts by focusing folkloric, religious and theatrical dance traditions. Social, historical and technical aspects of world dance are studied, encouraging students to broaden their awareness of the influence of cultural diversity on contemporary dance.
To explore and experience different ways of moving.
To develop a vocabulary for describing and discussing dance.
To develop skills for observing dance through the viewing of live and videotaped performances.
To develop personal creativity, performance and choreographic skills through the completion of a choreographic project to be performed in class.
To learn about different cultures through their dances.
To demonstrate an ability to compare and contrast cultural contexts in dance and to relate that knowledge to contemporary dance. | <urn:uuid:736d9d7d-cdc4-4bad-b20f-c9566405949c> | CC-MAIN-2018-05 | http://gregsonnentag.weebly.com/dance.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891316.80/warc/CC-MAIN-20180122113633-20180122133633-00275.warc.gz | en | 0.919442 | 206 | 2.859375 | 3 |
The discussion of population is often pinned as being ‘anti-human’. I disagree with this judgement and think quite the opposite. In recognition of the dangers of overpopulation, I would instead say that it is anti-human not to discuss population. Population is an inherently controversial topic, complicated by religion, culture, and economics. It is understandable why most politicians and social scientists avoid the topic outright, though it is to our society’s own detriment. To begin solving overpopulation, it must first be stated: our planet is overpopulated, and it is a threat to our survival as a species. Overpopulation is a key player in resource depletion, climate change, and violent conflict. The Syrian Civil War is a notable example, as the Center for Climate and Security (CCS) emphasizes a clear link between extreme drought and armed conflict. Specifically, the research group posits that a 3-year drought that decimated crops in the countryside resulted in mass migration to the already overcrowded cities, which subsequently resulted in armed conflict. The United States military has similarly described climate change as a “threat multiplier” that may lead to greater instability. Not to mention that unmitigated population growth is inversely proportional to quality of life. In overcrowded places around the world, people are forced to live in slums without access to education and other opportunities. These are people who are easily exploited by wealthy nations and/or corporations for what is essentially low-cost labor. Unfortunately, debates over population are often in control by biased institutions. Economists oversimplify the issue and externalize the cost of natural resources and ecosystem services to render an unrealistic portrayal of resource availability and value. Conversely, religious institutions emphasize the sacred value of human life and encourage procreation without inhibition. I understand that our society is unwilling to take the perspective that an ecologist might in terms of population, though I think that this scientific perspective is better equipped to handle the complexity of the issue better than others. Population threatens to destabilize our ecosystems and societies alike. The longer we delay the discussion, the more devastating our legacy will be. It is an uncomfortable subject that is fraught with racist and classist undertones, but it must be discussed, nonetheless. Paul R. Ehrlich, Anne Ehrlich, and E.F. Schumacher are a few of the social scientists whose work can inform these discussions moving forward.
– Genevieve Tarino | <urn:uuid:52ffa7c9-66ed-4d05-a7a8-4f02befed288> | CC-MAIN-2021-43 | https://www.overshootday.org/genevieve-tarino-population/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585737.45/warc/CC-MAIN-20211023162040-20211023192040-00108.warc.gz | en | 0.95465 | 495 | 2.546875 | 3 |
LRO has a GIS Analyst. What is GIS?
GIS is an acronym for Geographic Information Science or Systems. GIS describes both the analysis of spatial data and the software used for this analysis. Analysis of spatial data looks at how points, lines, and polygons (representing real things, places, and people) relate to each other and allows us to try and explain the “how” and “why” to find solutions. Think of anything with a place (i.e. school, city, or business) or space (i.e. district, park, parcel of land) as being spatial.
What questions can GIS answer?
• Where is a service provided?
• What are the demographics in a community?
• Which communities would be impacted by a new policy?
• Where are the communities with opportunities for growth?
• How does Nebraska compare to other states?
How is GIS used in the Legislature?
Since 1990, LRO has assisted with the redistricting process. In 2001 and 2011, LRO provided all of the legal, administrative, and GIS support for redistricting. Approved maps from 2011 are accessible online. GIS is also used to respond to research requests from senators and staff. GIS can help explain the impact of legislation by showing visually the people or places impacted by a policy. | <urn:uuid:35857022-754f-4852-aea7-9b067e530ba8> | CC-MAIN-2017-26 | http://news.legislature.ne.gov/lrd/gis-services/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00147.warc.gz | en | 0.935582 | 283 | 3.03125 | 3 |
The purpose in creating classrooms with strong cultures is to enable rigorous and engaging academic instruction to thrive. Our goal is to always make students feel safe, successful, and known in our classrooms and to train teachers to do the same.
This Plug and Plays breaks Strong Voice into two sections–Part 1 focuses on using body language and positioning and Part 2 explores how to use words and language to convey confidence, clarity, and warmth. This Plug and Play can be delivered all at once or in discrete sessions. Guidance on how best to sequence and break the Plug and Play into multiple sessions is included.
- Shift Your Register: In this section of the Plug and Play, teachers will study different voice registers (casual, formal, and urgent) and reflect on when to use each type. Teachers then practice how to transition between casual and formal register when asking for follow through from students.
- Show Both Shoulders / Stand Still: This section of the Plug and Play explores how to pair a shift in body language with Shift Your Register. Teachers watch and reflect on a video of a first-grade teacher shifting between a joyous dance and song and her directions for the next task, in which she Shows Both Shoulders / Stands Still. They then practice doing the same with directions from their own classroom.
- Quiet Presence: Part 1 of the Plug and Play ends with a video study of three teachers using Quiet Presence—dropping their voices to a lower volume and speaking quietly, slowly, and calmly—to ensure students listen and follow through on an important direction.
- Economy of Language: In this portion of the Plug and Play, teachers learn about using the fewest words possible to communicate composure and preparation, and to ensure students know that what their teacher is saying is worth listening to. Teachers will then have an opportunity to engage in layered practice, trying out Quiet Presence and Economy of Language at the same time.
- Self–Interrupt: Teachers will again study video of classrooms and then practice using Self-Interrupt, where they pause mid-sentence to show that they do not have full attention.
- Time and Place: In this final section, teachers will study how to redirect students when it’s not the appropriate time or place to discuss something. They will have the opportunity to script responses to potential classroom scenarios and then practice delivering their responses with Quiet Presence, Economy of Language, and the other previous techniques in mind.
Our goal is for you to save time that you would otherwise spend creating a PD session from scratch and to dive deep into the small concrete actions that can take your teachers’ skills from good to great. The Plug and Play provides you with:
✓ A fully customizable PowerPoint presentation with embedded videos of Strong Voice in action
✓ Facilitator notes for what to say and do for each slide
✓ Detailed analysis of 7 video clips spanning all grade bands
✓ Carefully designed practice activities, plus 5 video models to support effective practice
✓ Participant handouts for interactive note taking
✓ Next steps to ensure what is learned in the session carries over to classrooms | <urn:uuid:96549984-6abe-4549-b85d-2ca10e7cac51> | CC-MAIN-2023-14 | https://teachlikeachampion.org/plugandplay/strongvoice | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00126.warc.gz | en | 0.924988 | 651 | 3.265625 | 3 |
Each school year brings new concepts to learn; ACSI's math textbook will introduce your middle school student to algebra, equations, integers, ratio, geometry, rational numbers, probability, statistics, polynomials and more. Word problems, biblical applications, and illustrated concepts provide a thorough math education. 335 indexed pages, hardcover. Grade 8.
ACSI Jr. High Intermediate Maths Book B (Grade 8) Student Edition 7224
- Product Code:
- Availability: 2
- Ex VAT: R262.28 | <urn:uuid:224ecf7a-5769-4072-a177-c781c8285478> | CC-MAIN-2018-05 | https://booksale.love2learn.co.za/index.php?route=product/product&path=4&product_id=54 | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887849.3/warc/CC-MAIN-20180119085553-20180119105553-00791.warc.gz | en | 0.830325 | 108 | 2.671875 | 3 |
First Time User? Sign Up Now
First Time User? Enroll now.
Home > Health Library > Colds and Flu
You're sneezing, coughing, aching, and tired. Having a cold or the flu is miserable! But you can treat the symptoms. Cold symptoms tend to get worse over a few days. Flu symptoms are more severe than cold symptoms and come on faster. For either illness, it is important to rest and drink plenty of fluids to feel better.
Cold and flu viruses spread easily in the late fall and winter. Wash your hands often to protect yourself from catching and spreading a cold or the flu. You can lower your risk of catching the flu by getting the flu vaccine every year. If you do catch a cold or the flu, try to stay away from others to avoid spreading the disease.
Get the information you need in our cold and flu topics, such as:
Current as of: August 22, 2019
Author: Healthwise Staff
Medical Review:Adam Husney, MD - Family Medicine & Martin J. Gabica, MD - Family Medicine
To learn more about Healthwise, visit Healthwise.org.
© 1995-2020 Healthwise, Incorporated. Healthwise, Healthwise for every health decision, and the Healthwise logo are trademarks of Healthwise, Incorporated.
4420 Lake Boone Trail
Raleigh, NC 27607
1515 SW Cary Parkway
REX Healthcare of Cary, Suite 200
Cary, NC 27511
37 Pineville Blvd.
Clayton, NC 27527
1059 Beaver Creek Commons Drive
Apex, NC 27502 | <urn:uuid:611557b3-4e9b-4b32-92a8-195f769a2558> | CC-MAIN-2020-34 | https://www.rexhealth.com/rh/health-library/document-viewer/?id=center1046 | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739134.49/warc/CC-MAIN-20200814011517-20200814041517-00250.warc.gz | en | 0.874022 | 335 | 2.828125 | 3 |
The figure of Gamal Addul Nasser towers over modern Egyptian history. As president between 1956 and 1970 he stood firm against imperialism and transformed Egypt (see page 10).
Despite years of repression and the rise of Islamist opposition to imperialism, Nasser’s brand of secular Arab nationalism still has many supporters inside Egypt.
They constitute a small but important voice of opposition to the Mubarak regime.
But they do not have the organisation on the ground to match that of the Muslim Brotherhood, or even sections of the left.
But the Nasserites’ influence remains strong.
They run the main opposition newspaper that has been among the most courageous voices against Mubarak. Among their ranks are key figures who have become prominent in the movement for change.
But the Nasserites suffer from contradictions. They are deeply hostile to neoliberalism—not because they oppose capitalism, but because they believe all industry should be under state control.
They support some peasants’ and workers’ demands, yet believe these should be limited by the needs of national unity.
This means that the role they will play in the coming period remains unclear.
The 6 April movement
The 6 April Movement, which helped initiate Egypt’s revolt, was founded after a wave of strikes shook Egypt in April 2008—notably in the textile factories of the Nile Delta city of Mahalla.
The Movement grew out of frustration that the strikes, despite their popularity, failed to trigger a wider rebellion.
The Movement is often seen as more concerned with Facebook and Twitter.
Boasting some 70,000 online followers, it has helped galvanise a generation.
It has organised protests and is part of an online news network that has become a main source of information.
Its members, and founder, have faced intimidation and prison. The Movement played a crucial role in the first days of the protests but it is not clear whether it will continue to provide leadership.
It has backed Mohammed ElBaradei’s move to be the negotiator with the regime. | <urn:uuid:94e34857-689f-4eeb-a0a0-b93e041840d9> | CC-MAIN-2020-29 | https://socialistworker.co.uk/art/23314/The+hold+of+Nasser+and+nationalism+remains+a+strong+force | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655911896.73/warc/CC-MAIN-20200710175432-20200710205432-00228.warc.gz | en | 0.95804 | 414 | 2.78125 | 3 |
Orbit is a term which is used to describe the flightpath of an object in space which has repetitive motion and a distinct center with respect to its flight path.
There are several different forms of orbit, some of which are commonly referred to as "standard orbit" or "high orbit" by Starfleet personnel:
- Synchronous orbit: This form of orbit is used by a starship to maintain its position towards a specific point on the objects surface. In this circumstances, the starship's rotational velocity will be equal to the object it is orbiting. (TNG episode & novelization: Relics)
- High orbit: This form of orbit means that a starship maintains a large distance from an objects surface for safety reasons, but would still allow the use of transporters. (VOY episodes: "Ex Post Facto", "The Omega Directive")
- Geostationary orbit: This form of orbit is where a starship remains stationary above a certain point of the object it is orbiting. During the Cardassian Occupation of Bajor, Terok Nor was positioned in geostationary orbit of Bajor. (DS9 episodes: "Emissary", "Necessary Evil", "Wrongs Darker Than Death or Night"; TNG - Double Helix novel: Vectors) | <urn:uuid:bed50d15-3205-43a7-a902-893174af9026> | CC-MAIN-2020-05 | https://memory-beta.fandom.com/wiki/Orbit | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593937.27/warc/CC-MAIN-20200118193018-20200118221018-00550.warc.gz | en | 0.94437 | 268 | 3.53125 | 4 |
Recognizing an urgent and substantial need among its business clients, Intel Corporation is actively working with such familiar names as Facebook to develop a new chip that will enable and encourage continued advances in artificial intelligence. In particular, the chip can support deep learning, the sort of artificial intelligence that is able to identify specific elements, such as particular objects in a photograph, that thus far has eluded the ability of computers.
In developing the chip, Intel has relied on its own expertise but also the input of key customers, most of which see vast potential for deep learning. By enabling computers to study vast amounts of data, learn from them, and then apply that knowledge to new tasks, the new chip, called the Nervana neural network processor, promises new advancements in various goals that these companies have set. For example, it could increase the accuracy and precision of automated medical diagnoses, enhance the capacities of driverless cars, produce more accurate weather forecasts, and allow investigators to spot and prevent fraud in financial transactions. Today, these sorts of predictions, involving innumerable variables, are difficult to make with any confidence. But most technology companies hope deeply to change that, such that estimates indicate that the artificial intelligence market will be worth $9 billion by 2020. Intel plans to be a part of these efforts and the resulting market.
With the Nervana processor, Intel promises that computing can take place faster, because it takes shortcuts, similar to those that the human brain follows. Furthermore, it designed the chip to be able to collaborate with other chips, so that companies can “stack” their computing power by leveraging the capacities of multiple Nervana processors at the same time.
It is not the only entrant to this market, of course. Google reportedly is working on developing its own chips to facilitate deep learning. In addition, a company called Nvidia designed chips to review and process graphics, then realized that they functioned well and efficiently on various deep learning tasks as well. Thus far, Nvidia dominates the market for deep learning hardware and software, but clearly Intel hopes to change that position. By leveraging its connections with and knowledge of some of its best business clients, it may be able to do just that.
- How is Intel attempting to ensure that its chips appeal to its business customers?
- In what stage of the buying process are business customers such as Facebook, when it comes to deep learning tools?
Source: Ted Greenwald and Jack Nicas, “Facebook Pitches In on Intel’s Coming Artificial Intelligence Chip,” The Wall Street Journal, October 18, 2017 | <urn:uuid:f754606f-3d12-4b54-a08b-5124bab4911b> | CC-MAIN-2019-18 | https://grewallevymarketing.com/2017/12/08/intel-inside-ai-the-deep-learning-artificial-intelligence-chip-being-developed-in-collaboration-with-facebook/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528523.35/warc/CC-MAIN-20190420040932-20190420062932-00492.warc.gz | en | 0.956106 | 522 | 2.78125 | 3 |
- 08/08/2019 at 10:05 pm #1623298EduGorillaKeymasterSelect Question Language :Direction: Study the information given below and answer the questions based on it.There are 10 shelves numbered 1, 2…..10. They are arranged in two rows one above the other. The shelves 1, 2…….5 are in row 1 and rest in row 2 which is above row 1. The shelves are arranged in increasing order of number given to them. Like the shelf number 1 is placed on extreme left of row 1, then shelf number 2 and so on. Similarly the shelf number 6 is placed on extreme left of row 2, and so on. Each shelf contains a certain number of glass slabs and photo frames. There is at least one glass slab in each shelf. The length of each glass slab is 10cm and that of each photo frame is 4cm.The shelf 4 has length 38cm. Yellow shelf is just above the shelf 4. One shelf is between shelf 4 and the Red shelf. The Green shelf has 3 glass slabs. Shelf 7 has 5 photo frames. The total length of shelf 7 and shelf 8 is 78cm. Green shelf is just above the Blue shelf. One shelf is between the Green shelf and the Orange shelf. The Orange shelf is not adjacent to the Yellow shelf. The length of the shelf 8 is equal to the length of the Black shelf. Two shelves are between the Black shelf and the White shelf. The Black shelf is not at any end. The Brown shelf is shelf numbered 10. The length of the Blue shelf is 14cm. The total length of the shelf 1 and shelf 3 is 42cm. The total number of photo frames in Black shelf is less than 4. The Orange shelf has 3 glass slabs and 6 photo frames. The Pink shelf has 2 glass slabs and 1 photo frame. The total length of Row 1 is 150cm. The Red shelf has 4 photo frames. The Brown shelf has 3 photo frames and the Yellow shelf has 3 glass slabs. The total length of Yellow shelf is 4cm less than that of the Green shelf. The total length of the Brown shelf is 6cm more than that of Red shelf. Silver shelf is to the immediate right of the shelf opposite to the white shelf.
Which of the following shelf is just above the Red shelf?
Post your Training /Course EnquiryAre You looking institutes / coaching center for
- IIT-JEE, NEET, CAT
- Bank PO, SSC, Railways
- Study Abroad | <urn:uuid:3e70bbe6-8b57-4b35-89eb-3e8d057d87eb> | CC-MAIN-2022-05 | https://forum.edugorilla.com/forums/topic/direction-study-the-information-given-below-and-answer-the-questions-based-on-it-there-are-10-she-7/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302622.39/warc/CC-MAIN-20220120190514-20220120220514-00179.warc.gz | en | 0.919921 | 553 | 2.625 | 3 |
Driving in snow and adverse winter weather can be frightening for many people especially if you’ve never experienced it before. According to the AAA Foundation for Traffic Safety, driving conditions caused by winter weather are a factor in nearly half a million crashes and more than 2,000 road deaths every year.
Winter weather can cause roadways to be hazardous due to snow and ice, which means you need to prepare yourself and your vehicle for safety. If you must travel in the winter during potentially adverse conditions, there are a number of things you can do to make it as safe as possible.
Driving in Snow for Beginners
If you’re new to driving in snow, don’t fret! Just take it nice and slow and ideally you can avoid busy highways until you get used to it a little more. Here are some extra tips for snow newbies:
- Don’t underestimate even a little snow. Many people will worry about driving in a foot of snow, but that’s not all you need to worry about. A thin layer of snow can easily melt and refreeze, creating dangerous, icy conditions.
- Don’t panic. If you hit a slick, icy spot, don’t slam on your brakes. Turn your wheel into the spin to straighten your vehicle and take your foot off the gas until you regain control.
- If you’re stuck, don’t try to accelerate your way out. If you do get stuck, don’t attempt to free your vehicle by accelerating too much because you will probably get even more stuck or you might lose control of your vehicle.
- Clean the snow off the top of your car. If you have snow on top of your vehicle and have to suddenly brake or turn while driving, the snow could fall onto your windshield and block your vision for a split second — long enough to cause an accident.
Extra Tips for Driving in the Snow
Here are a few more helpful winter safe driving tips direct from the experts at the AAA:
- Stay home. Only go out if necessary. Even if you can drive in bad weather, it’s better to avoid taking unnecessary risks by venturing out unless you need to.
- Drive slowly. Always drive at a slower speed to account for slippery conditions and lower traction when driving on snow or ice.
- Accelerate and decelerate slowly. Apply the gas slowly to regain traction and avoid skids. Try not to be in a hurry and give yourself plenty of time to come to a complete stop. Remember, it takes longer to slow down on snowy or icy roads.
- Increase your following distance to at least five or six seconds. Slowing down on the snow takes longer, so be sure to give yourself and any vehicle ahead of you extra space. If the car ahead of you needs to stop quickly, you could slide off the road if you have to brake too quickly.
- Know your brakes. Threshold braking is the best way to stop, regardless of the type of brakes on your vehicle. Keep the heel of your foot on the floor and use the ball of your foot to apply firm, steady pressure on the brake pedal. If a wheel locks, release the brake and reapply.
- Don’t stop on hills. Your car won’t be able to start again if you come to a stop on a hill in snowy conditions, so be sure to always keep the car going on any hills.
- Don’t power up hills. Try to get a little extra momentum before reaching a hill, and let that slight increase in speed carry you to the top. Reduce your speed at the top of the hill so that you don’t lose control on the way down.
- Keep rolling. Don’t stop if you can avoid it. If you can slow down enough to keep rolling until a traffic light changes, do it.
What Gear Is Best for Driving in Snow?
Most modern vehicles are automatic drive, so you won’t need to adjust anything other than your speed. It’s best to not drive too fast, and definitely don’t accelerate or break very hard or fast.
If you do have a manual vehicle, you’ll probably want to keep your vehicle in 1st, 2nd, or 3rd gear on ice or snow, depending what type of road you’re driving on. A slower, lower gear gives the tires more power and more traction, which is absolutely necessary on snowy or icy roads.
A lower gear also powers your vehicle more slowly, which is always recommended when driving conditions or less than ideal. When turning, always remember to shift into a lower gear when there’s ice or snow on the road.
How to Prepare for Driving in Snow
Properly preparing your vehicle for traveling in winter weather can keep you safe. From the tires to the battery, knowing what to check before you head out is essential to preparing for your trip out in adverse weather.
- Check your tire tread. Good tire tread depth is 6/32 or deeper. If your depth is 4/32 or less, you should think about replacing your tires. If your depth is 2/32, you need new tires as soon as possible.
- Fill up your tires. Check your tire pressure. Most passenger vehicles will recommend a tire pressure of 32 to 35 psi. This information is commonly on a sticker on the inside of the driver’s door and in the manual. Extreme temperatures can cause tire pressure to fluctuate.
- Consider snow tires. Snow tires are most commonly used during the winter months, from late November to early April.
- Change your oil and antifreeze. Make sure your fluids are at the proper level. Cold temperatures cause the fluids to thicken, so start your car several minutes prior to leaving in below-freezing temperatures.
- Fix your heater. If you know that your heater needs to be serviced, have it done prior to winter so you don’t get caught stranded without heat.
- Inspect your battery. Below-freezing temperatures cause the battery to lose starting capacity, making it work harder to start your vehicle. Have your battery capacity checked by a mechanic.
Can Driving in Snow Damage Your Car?
The salt from snow can damage your car by causing rust and corrosion. Salt can stick to the metal components of the vehicle and cause corrosion if it's left there. This is especially true of the undercarriage, brakes, and wheel wells.
Washing your vehicle frequently during the winter months can help to eliminate the salt. Be sure to wash the undercarriage once a month and don’t use a cloth to wipe off the salt, because this could scratch the paint.
Condensation can accumulate and turn to ice around the power steering, brake, and engine transmission systems. This ice could cause potentially hazardous leaks in these systems.
Driving with too much or too little tire pressure can lead to uneven wear and shorten the life of your tires. It could even lead to a potentially dangerous blowout on the road.
If you can, just stay home and enjoy watching the snow from the safety of indoors. And remember, even if you are an expert in snow driving, other drivers may not be, so strong caution is always advised when there’s snow on the road.
If your car is damaged in the snow, you’ll want to have the right type of car insurance coverage in place so that you'll only have your deductible to worry about if you have a claim. It’s also a good time to add roadside assistance to your policy in case your car has problems out in the middle of the road.
So before the next snowfall comes, whether it’s just a few snowflakes or a full-on blizzard, be sure to discuss your auto insurance with a local independent insurance agent.
©2020, Consumer Agent Portal, LLC. All rights reserved. | <urn:uuid:36ea715e-b65d-468b-8bd7-d65e8e8316c0> | CC-MAIN-2021-04 | https://www.trustedchoice.com/insurance-articles/driving-in-snow-go-nice-and-slow/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514046.20/warc/CC-MAIN-20210117235743-20210118025743-00561.warc.gz | en | 0.926513 | 1,648 | 2.671875 | 3 |
Knotwork History & Symbolism
The first version of this article was posted on a
newsgroup and wound up on the Frequently Asked Questions page of the
Soc.Culture.Scottish Newsgroup. I must point out that the original contains
several errors that are corrected below. From the FAQ page it has been cut and pasted into
many web pages, errors and all. Sometimes I am recognized as the author and sometimes not. If
you have read other web pages on the subject of Celtic interlace and what is
written below sounds too familiar, be assured this is not just another plagiarism. I
am the original author. Stephen Walker 24 March 2000.
Celtic knots or Celtic interlace are ornamental patterns
that first became associated with Celtic people in the early Celtic Church where they were
used to decorate Bible manuscripts, monuments (notably Celtic crosses
and cross slabs) and jewelry. They probably were used in other media such as wood
carving and textiles but these have not survived.
Knotwork tradition in manuscript painting
possibly came to
Ireland in the middle of the 7th century in manuscripts illuminated by Coptic monks from Egypt or
Syria. This is not a settled issue as
far as the art historians are concerned but the best evidence of style, coloring and
methods of construction I have seen points to Middle Eastern prototypes. From Ireland the style
spread to Scotland (in those days Pictland and
Dalriada), Wales and Northumbria and with
missionaries of the Celtic Church to Europe. Viking raiders later appropriated some of the
design concepts into a more chaotic style of animal interlace.
Celtic knots are complete loops with no end or beginning.
Celtic animal interlace is similar in construction but the cords terminate in feet, heads,
tails ect. The animal designs are very much influenced by older Saxon and Pictish
traditions of abstract beast forms that when combined with the new more sophisticated
knotwork of the Celtic designers became known as 'Hiberno-Saxon'. A good Celtic artist
will never leave a loose end on a strand unless it is stylized into a zoomorphic element
or spiral. Pure knots should always be unending. On this point of ornamental grammar you
can distinguish much that is made to look like Celtic design by designers who do not
really know the tradition. The Coptic examples of knotwork that pre-date the early Irish
work are consistent this way while the Roman and Germanic examples of knotwork that
sometimes are cited as possible sources often have loose ends. The way that ribbons are
colored in some of the early Irish work, particularly the BOOK OF DURROW is the same as
the Coptic preference and there is a parallel evolution in Moorish design.
The Book of Kells is the best known source of Celtic knots
as well as other types of Celtic ornament. The Book of Kells is a fantastic collection of
paintings that illuminate the four Gospels in Latin, penned circa 800 AD The incredible
degree of ornament and detail caused Giraldus Cambrensis in the 13th century to call it:
"the work not of men, but of angels" or as Umberto Eco wrote in 1990: "the
product of a cold-blooded hallucination"
In recent years Celtic Knots have enjoyed a revival
however way too much of this has amounted to copies of historical knots used in tourist
type craft goods. Fortunately there are a few artists who take the subject more seriously
and are creating new and exciting knots. Check out:
Patrick Gallagher at http://www.celtart.com
Michael Carroll at http://www.mccelticdesign.com
Jeff Fitzpatrick Adams
Alexander Ritchie made quite a lot of very good silver
jewelry incorporating knotwork on the Isle of Iona from 1899 to his death in 1941. George
Bain wrote an excellent book titled CELTIC ART THE METHODS OF
CONSTRUCTION that is great if anyone is serious about learning how to create new knots
in the Celtic tradition. Bain's book was first published in 1951 but appeared as a series
of booklets before that. Aidan Meehan has a series on Celtic design
an entire volume titled KNOTWORK.
As for symbolism:
knotwork designs are emblematic in
modern times of the Celtic nationalities. The symbolism that has come down through the
ages is as obscure and indirect as much of the speech and literature of the Celtic people.
How then can we understand it?
If that which is not prose must be poetry, knotwork's
meaning defies literal translation and should be sought at a deeper level. the repeated
crossings of the physical and the spiritual are expressed in the interlace of the knots.
The never ending path of the strand represents the permanence and the continuum of life,
love and faith.
here for a more scholarly article about the symbolism of Celtic design | <urn:uuid:8814b7ea-bf7a-4a50-996e-03ee01e05a6c> | CC-MAIN-2019-30 | https://celtarts.com/history.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527828.69/warc/CC-MAIN-20190722072309-20190722094309-00069.warc.gz | en | 0.945844 | 1,047 | 3.0625 | 3 |
7 Ways to Take Care of Your Ornamental Plants
Between severe storms and extreme temperatures, summer time in Atlanta can have damaging effects on your ornamental plants if you don’t provide proper care. Your grass benefits greatly from local lawn treatment services, but don’t forget that your ornamental trees and shrubs need attention too! A landscape management program that includes fertilization, proper watering, staking, pruning, mulching, weed prevention and insect control goes a long way towards supporting healthy ornamentals.
- Fertilizing– Just like you give your lawn fertilizer, you need to provide your plants with the appropriate fertilizers for strong growth. There are a variety of fertilizers on the market for you to choose from. You’ll want to not only consider cost, but also the nutrient content in relation to the needs of the plants you’re fertilizing.
- Watering– Take the same watering approach with most ornamentals as you would with your lawn. Water deeply, giving a good soaking weekly rather than shallow, infrequent watering. Watering in the morning will also help avoid evaporation so the water can penetrate the roots. Be cautious that some ornamentals are very drought tolerant and overwatering can be a concern. The amount of water will depend on the type of plant and the soil it’s planted in. Look to your plants for signs of dehydration. Any wilting or yellowing is a good indication your ornamentals need water.
- Stabilizing– Use stakes to support taller plants and protect them from severe summer thunderstorms that bring heavy winds. Without staking, tall annuals and perennials, like lilies, can droop to the soil after a heavy rain.
- Pruning– Maintain the shape of your ornamental plants and remove dead or diseased branches by pruning. Most plants can benefit from some summer thinning to help increase air circulation and encourage new growth.
- Mulching- If you haven’t freshened up your beds with a new layer of mulch in the past year, now is the time. Plants really benefit from the root insulation that mulch provides in the extreme summer heat. Mulch will also discourage weed growth and retain moisture in the soil for the plants.
- Weed Prevention– Keeping weeds out is another part of effectively caring for your ornamentals. Weeds can compete with plants for water and nutrients in the soil. Mulching is one approach towards weed prevention, but landscape fabric, ornamental bed treatments and hand pulling weeds are other effective options from stopping weeds from growing out of your ornamental beds.
- Disease and Pest Control– When implementing the above measures as part of your ornamental care regimen, you will encourage healthy plants to grow and diminish the chance of damage from pests or diseases. But it’s not a zero chance! Be alert to signs of damage like discoloration or holes in the foliage. If you have concerns, contact us and we will be happy to outline a treatment plan for you.
After all this hard work, don’t forget to reap the rewards of caring for your ornamentals. Enjoy the blooms or shade of your garden this summer or bring some freshly cut flowers indoors from your rose bushes or azaleas to brighten up your day! | <urn:uuid:222fb996-58b4-4a6b-846d-ce256bb381ef> | CC-MAIN-2023-23 | https://www.arbor-nomics.com/takecareofyouratlantaornamentals/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00253.warc.gz | en | 0.901064 | 682 | 2.578125 | 3 |
As the threat of cyber attacks across the world continues to rise, the International Data Corporation (IDC) has released new insights that show how organizations are struggling to implement the basic safeguards to protect their data.
It’s an urgent concern to be sure, as a lack of internet security can lead to a data breach, system lockout, or even an unauthorized collection of client data.
In a recent article from Tech Writer Darryl Linington, project researchers gave their input on the new data:
“Organisations are at risk all the time because hacking can come from anywhere, and for that reason IDC encourages businesses of all sizes to put practical security measures in place so as to ensure the safety of their data,” says Jon Tullett, a research manager at IDC Sub-Saharan Africa. “A system hack can come from an external source or, sometimes unknowingly, your own employees. A deliberate hacker will also try multiple ways of getting into the company’s system. Therefore, CIOs need to invest more in educating the organisation about security, rather than just the products and applications of security.”
“There are numerous ways in which organisations can protect themselves,” says Tullett. “First, they must learn which cybercrimes are currently most common, and familiarise themselves with the vulnerabilities that cybercriminals are trying to exploit. The different techniques include phishing, malware, and system hacking, and if IT leaders know which cybercrime attempts are most frequently made on their networks, it becomes much easier to educate employees on the matter.”
With no protection against threats, even the simplest hacking methods can derail an otherwise stable business operation. Companies need to have a multiple-layer security system in place to keep invaders out, and they need to implement a response strategy in the event that their infrastructure is infected. Lastly, and perhaps most importantly, employees need to be educated on the intricacies of internet security. With employees knowing what to avoid on a daily basis, plenty of potential risks can be eliminated from the get-go.
You can view the rest of the article and its findings here. | <urn:uuid:12de0d9c-1ce9-4801-9b11-f7613f82043d> | CC-MAIN-2024-10 | https://www.osgusa.com/cybersecurity-education-becoming-a-critical-investment-for-cios/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473558.16/warc/CC-MAIN-20240221202132-20240221232132-00166.warc.gz | en | 0.956635 | 441 | 2.578125 | 3 |
What's happening in 5th grade
We are continuing our unit of study called Argument and Advocacy. This unit goes with our writing unit. Students will be reading nonfiction texts on an issue to debate and write an evidence-based essay on the topic. We will also be learning about character development in fiction, and cause/effect within both fiction and nonfiction.
In math, we will continue our geometry unit with quadrilaterals by subdividing, combining, and transforming these shapes. Next, we will be describing the parts of a circle. Lastly, we will be finding the mean, median, mode, and range of a set of data while plot the data points on a stem and leaf plot.
We will explore the Midwest and Southwest regions of the United States. We will be learning about their climate, their resources, their history, and their tourism. We will create a presentation on a specific culture found in the Southwest, and we will choose a song that coincides with the Midwest Region.
We will be continuing our Argument and Advocacy unit of study. We will be taking positions on topics and researching both sides of the argument in order to write a persuasive piece.
This month we are beginning our next homework project on Plants! Presentations will be at the end of the month. In class, we will begin our final two units for the yer on properties of light and sound. Please continue to review study guides sent home.
March 20th - Paint a Tile Day
Saif 3/10, Maily 3/10, Samya 3/24, Michelle 3/26 | <urn:uuid:dff574fa-8282-41f9-a0cb-c2cfa8282e93> | CC-MAIN-2021-10 | https://www.smore.com/ygk1z-march-newsletter | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350717.8/warc/CC-MAIN-20210225041034-20210225071034-00421.warc.gz | en | 0.919241 | 327 | 3.453125 | 3 |
This page lists a feature story graphic, podcasts, print materials, and videos related to tetanus (Clostridium tetani).
People of All Ages Need Tetanus Vaccinesimage icon (in Spanishimage icon)
This graphic highlights CDC’s tetanus vaccination recommendations for young children, preteens, and adults.
Preventing Tetanus after a Disaster
When cleaning up after a disaster, be careful of cuts and wounds. To prevent infection, including tetanus, clean all cuts and wounds with soap and clean water, use antibiotic ointment, and cover…
Preteen and Teen Podcasts
Although most vaccinations are given early in childhood, teenagers have immunization needs as well.
Adult Immunizations [3:59 minutes, Date Released: 8/13/2010]
The specific immunizations you need as an adult are determined by factors such as your age, lifestyle, high-risk conditions, type and locations of travel, and previous immunizations. Throughout your adult life, you need immunizations to get and maintain protection.
Get The Picture: Childhood Immunizations [6:27 minutes, Date Released: 4/13/2009]
After talking with parents across the country, CDC put together this short video to help answer the tough questions that real moms had about childhood immunizations. Understanding the importance of vaccines is crucial for you to protect your children’s health.
Preteen and Teen Videos
These fun ads, in English and Spanish, remind you that shots aren’t just for babies—preteens and teens need vaccines, too.
Tdap Vaccine for Preteens and Teens: Information for Parents
Printed size: 8-1/2″x 11″
This fact sheet answers general questions about the booster shot that protects preteens and teens from tetanus, diphtheria, and pertussis (whooping cough). | <urn:uuid:1e656889-db8a-4d45-af6a-7b178ab365cc> | CC-MAIN-2020-29 | https://www.cdc.gov/tetanus/pubs-tools/multimedia.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882934.6/warc/CC-MAIN-20200703184459-20200703214459-00584.warc.gz | en | 0.880163 | 392 | 3.109375 | 3 |
Wisconsin residents backed a controversial proposal to allow hunters to stalk and kill feral cats, and some naturalists say pet owners should treat the vote as a wake-up call to be more responsible about their furry friends.
The issue of whether to make feral cats an unprotected species, meaning they could be hunted and killed, was put Monday night before the Wisconsin Conservation Congress, an independent organization created by the state 70 years ago to take public input on conservation issues. More than 13,000 residents attended meetings held in all 72 counties around the state.
The state Department of Natural Resources said 51 counties supported the proposal, 20 rejected it and there was no vote in one county. The vote was 6,830-5,201.
The vote doesn't make it open season on cats in Wisconsin, but it does mean the Conservation Congress will consider the proposal at its annual meeting in May. The congress will send its recommendations to its board and the DNR, but any further action would have to be carried out by the Legislature. DNR Secretary Scott Hassett said there were still too many unanswered questions to let the measure go forward.
The proposal, which was raised five years ago and voted down by the Conservation Congress, was revived after a 2004 University of Wisconsin study that found non-native feral cats were a threat to native animals such as lovebirds.
Estimates of the number of songbirds killed each year by feral cats in Wisconsin alone range from 8 million to 217 million, though the number is actually believed to be around 39 million, said Steven Oestreicher, the chairman of the congress.
"When you're talking about millions and millions of songbirds in state, you've got take a harder look at this," he said.
It was raised by a resident again during last spring's Conservation Congress hearing in La Crosse County, after the university's report, and the resolution passed 53-1, which put it on the agenda for this year's congress.
Under the proposal that was discussed Monday night, even domestic cats without a collar could be considered wild and unprotected, which upset many cat owners at some meetings.
"This sort of crosses the line from wildlife management to people's pets," said one person who opposed the idea during a meeting in Madison.
In Brown County, several hundred people filled an auditorium and the crowd was not the meeting's usual mix of outdoors enthusiasts and hunters. The controversial cat issue took center stage.
"Those cats are no different than someone else's children. They're my children," cat owner Denise Servais said at the Brown County meeting.
The issue of feral cats is biggest in rural areas, where some hunters and residents consider the animals a nuisance, not a harmless pet. Studies estimate there could be 2 million feral cats roaming Wisconsin. Though cat owners may consider them a native species, biologists say they are not, and they kill native rodents and birds.
While cat owners rallied to the defense of felines, some outdoorsmen said those people do not have a clear perspective on a problem that cannot be ignored.
"I think anyone who spends time in the outdoors away from your feeders in the city will know that feral cats do pose a clear danger to native species," Tom Tilkens of De Pere in Brown County said.
Simply killing these cousins of the housecat, though, wasn't an acceptable solution for some. | <urn:uuid:c81df862-ad5b-4207-a884-0705c230bbad> | CC-MAIN-2013-48 | http://abcnews.go.com/US/LegalCenter/story?id=662272&page=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164645800/warc/CC-MAIN-20131204134405-00094-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.972152 | 686 | 2.65625 | 3 |
The deadly coronavirus has encircled the whole world. In this time of utmost adversity, there are few Hadiths that can act as a panacea. Apparently, there is no cure to the deadly virus that exists, which is soaring; nevertheless, in Islam, there is always a cure.
Islam, which is a complete way of life, exhibits that death and life are in the hands of Allah. However, religion also says there is no disease that cannot be cured.
Prophet Muhammad about a Viral disease
Narrated `Aisha: (the wife of the Prophet) that she asked Allah’s Apostle about the plague and Allah’s Apostle informed her saying, Plague was a punishment which Allah used to send on whom He wished, but Allah made it a blessing for the believers. None (among the believers) remains patient in a land in which plague has broken out and considers that nothing will befall him except what Allah has ordained for him, but that Allah will grant him a reward similar to that of a martyr. SAHIH BUKHARI HADITH NO. 5734.
In light of the above Hadith, Plague (plague here refers to any pandemic disease) is a blessing for the believers and the one who dies owing to the viral disease is a martyr.
Moreover, according to Islam, everything comes from the Almighty; death is written, a believer must not fear anything as his life is in the hands of Allah. Notwithstanding, the Prophet Muhammad (S.A.W) has forbidden people from going to an area where an epidemic has broken out. This means, undoubtedly life and death are in the hands of Allah but taking protective measures is necessary. Therefore, we must take precautionary steps regarding coronavirus, and on the other hand, we must not fear anything except Allah.
Cure of Diseases (Coronavirus) In the light of Hadith
Narrated `Aisha: During the Prophet’s fatal illness, he used to recite the Mu’auwidhat (Surat An-Nas and Surat Al- Falaq) and then blow his breath over his body. When his illness was aggravated, I used to recite those two Suras and blow my breath over him and make him rub his body with his own hand for its blessings. (Ma`mar asked Az-Zuhri: How did the Prophet use to blow? Az-Zuhri said: He used to blow on his hands and then passed them over his face.) SAHIH BUKHARI HADITH NO. 5735.
As per the above hadith, (Surat An-Nas and Surat Al- Falaq), can cure any grave illness.
Narrated Ibn `Abbas: (The Prophet said), Healing is in three things: A gulp of honey, cupping, and branding with fire (cauterizing). But I forbid my followers to use (cauterization) branding with fire. SAHIH BUKHARI HADITH NO. 5680.
As per this Hadith, honey, cupping and cauterizing, have healing powers. Therefore, they can be used to fight against deadly coronavirus.
It was narrated from Abu Hurairah that the Messenger of Allah ﷺ said: “Whoever eats honey three mornings each month, will not suffer any serious calamity.”
Again the Prophet mentioned honey as an agent of healing. Thus, one must eat honey in the morning.
Abu Hurairah narrated that the Messenger of Allah ﷺ said: “Use this black seed. For indeed it contains a cure for every disease except As-Sam” And As-Sam is death.
There are certain healing properties in the black seeds. As per annals of medicine, the seed is being used in medicine for the last 2000 years. In the black seed exists various antioxidant, anti-bacterial and anti-viral properties. Hence, black seeds can fight against coronavirus.
How a Muslim should react to the COVID-19
There is no disease, which has no cure. Narrated Abu Huraira: The Prophet (ﷺ) said, “There is no disease that Allah has created, except that He also has created its treatment.”
In the Quran, Allah has stressed upon “Taqwah” (god-fearing) and “Tawakal” (reliance upon god). This is because a human can’t control certain things. There are a plethora of things, which are beyond the control of a Homosapien; at this time what one should do? As per, Islam one should strengthen one’s beliefs regarding death, calamity, happiness, respect honer, disrespect as all of them come from Allah Almighty.
As per Islamic sayings, Allah loves a person much more than his mother does. Islam is the religion of love and peace. Therefore, how can the one who loves you will make you suffer? Allah is love and He loves His creation. Now the question arises if He Loves us then why we face predicaments, such as coronavirus? Well, a human has limited knowledge. We do not know what is beyond the wall. We are hasty, we do not puzzle out what is Sabr (patience).
But perhaps you hate a thing and it is good for you, and perhaps you love a thing and it is bad for you. And Allah Knows, while you know not. Surah Al Baqra (216). As per this verse, a human being does not know what’s good and what’s bad. At certain junctures in life, a man cannot perceive what is right; rationality and logics fail at such junctures due to the limited perspective of a human.
Above all, a Muslim should believe in Allah and accept what is destined for him. On the other hand, he should also take rational and precautionary measures in any adversity just like the pandemic of coronavirus. Moreover, recite “Bismillah-ir-Rahman-ir-Rahim” (In the name of Allah the most merciful and most gracious) before eating or doing any work. Trust Allah and strengthen your piety by reading and understanding Quran, Besides, a Muslim can recite “Ayat-ul-Kursi” and third “Kalimah” for protection from coronavirus and any calamity. After reciting and implementing all the above Ayahs and Hadiths of Prophet Muhammad (S.A.W) leave yourself upon Allah and stay placid. | <urn:uuid:a213a057-0b81-4b49-b0fe-db41cd3c00e2> | CC-MAIN-2020-24 | https://www.parhlo.com/cure-of-coronavirus-as-per-islam/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347426956.82/warc/CC-MAIN-20200602224517-20200603014517-00295.warc.gz | en | 0.956899 | 1,392 | 2.546875 | 3 |
The Kaw City Newspaper appeared shortly after the small Oklahoma town was established. News didn’t travel as fast in those days. Every letter of every word had to be set in place by hand. Typesetters labored for hours getting each page ready for print. They had to figure out where the “copy” would go and what size font they needed to use. Once the stories and designs were complete, they were locked into the bed of the press which was then inked. Paper was pressed against the inked type to make the impression which became the newspaper. This photo from circa 1902 shows the typesetters and printers at work.
The Kaw City Museum has some of the city’s old newspapers on display in the Brill building. The style of news writing was quite different in the early 1900’s and it’s fun to read some of the stories. You get a genuine peek into the past, reading about the Kaw City people and all the activities they were involved in. | <urn:uuid:e503c3df-ee6f-41bd-ab23-d7a1334f105f> | CC-MAIN-2023-06 | https://kawcitymuseum.com/2017/05/10/kaw-city-newspaper/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499470.19/warc/CC-MAIN-20230128023233-20230128053233-00249.warc.gz | en | 0.992272 | 206 | 3.078125 | 3 |
What is inventory in FMCG?How Can Retail Firms Increase Their Sales Through Inventory Control?
Definition of Inventory
Inventory refers to the total number of items, goods or materials that a company has in stock. Various types of companies keep inventory. These include restaurants, retail stores and manufacturing companies. The type of inventory a company keeps varies and depends primarily on the nature of its business. For example, a restaurant’s inventory will include food items and food supplies. A retail store’s inventory might consist of shoes, clothing and accessories.
Companies typically use computer spreadsheets to keep inventory records. Proper inventory management is essential to avoid a product surplus or shortage. The individual responsible for overseeing the company’s stock or inventory must keep track of the current inventory.
This includes tracking product sales and receipts and the shipment of new products. Stock rotation is also a crucial process in inventory management. This involves moving older items to the front of a store or shelf to increase visibility and ultimately sell the product quicker.
Fast-moving consumer goods (FMCG) are products that are sold in a very short span of time at low-cost and are high in-demand. These products have a high consumption rate with consumers. FMCG covers beverages, food products, household products, cosmetics (oral care, skincare, and hair care), toiletries, dairy products, bakery products, tobacco products, and natural products. FMCG is the 4th largest sector that contributes to the GDP of India, growing from 57.75 billion US$ in 2017-18 to 103.7 billion US$ by 2022.
These products have a high volume of movement of goods in the market as they are frequently purchased by consumers. To facilitate the purchase of these products a well-designed downstream supply chain network is needed in the growing Indian market. Structured supply chain reduces operation cost, improves customer accessibility, and increase the return of investment (ROI).
Supply chain logistics has a vital role in managing the supply and demand for providing efficient and effective delivery. Possessing the entire synergy of goods movement, supply chain logistics has become the fundamental focus of any business. The key objectives of a growing business are optimizing and re-engineering inventory management for effective maintenance of local inventories to reduce the delivery times. The empirical needs of optimizing the finished goods
inventory add value to the business providing a competitive advantage.
Need for inventory management.
Finished goods inventories are the current assets in the statement of financial position of any firm. Post GST the warehouse can be consolidated as there is no longer a need for a warehouse in respective states. The input tax credit is applicable only when products leave the warehouse. As a result, maintaining and managing optimal inventory becomes more crucial.
Indian manufacturers are struggling with challenges in cost of inventory, demand management and process standardization as their market is very diverse.
Lean supply chain management (LSCM) helps in formulating the finished
goods inventory by observing the oscillations from the demand. Such alignment is brought by cost and waste reduction, process standardization, and adaptation to industrial standards. Efficiency of an inventory handling increases with LSCM by Lean shop floor practices is achieved.
Retail businesses rely on sales to earn revenue and increase profits. These companies purchase merchandise and resell it to customers. Inventory control involves considering which items to buy and the quantity of each. Styles change, and so do customer tastes. The company needs to anticipate the amount of sales it can make at a profitable price. When the inventory becomes obsolete, the company can no longer sell it profitably and loses money. Retail firms increase their total sales when they use effective inventory control.
How inventory management helps improve Fmcg Sales? Why Is Inventory Control Important?
India remains to be a potential market for the Fast-Moving Consumer Goods (FMCG) due to its high population. These goods have high volume and cycles of sales with the customers. Consumption of consumer goods has grown to 57.75 billion US$ in 2017-18 from 31.6 billion US$ in 2011 and is expected to grow to 103.7 billion US$ by 2022.
The market is segmented into three segments as follows:
Food and beverages account for 19%,
Health care for 31%,
Household and personal care for 50%
Accommodating 55% of urban market share and 45% of the rural market in India is a mental jigsaw. On comparison of the north Indian markets to south Indian FMCG’s, the marketplace on the north has local producers as well the organised companies with smooth goods movement. But in order to penetrate the south Indian market, companies preferably go with the Mergers & Acquisition strategy
However, the market is hard to penetrate, south Indian FMCG market has the ‘higher per capita consumption’, says Kurush Gant, Executive director, FMCG business.
Consumer package goods or FMCG has the maximum number of sales in a
given period of time. There exist various methods to manage their inventory.
RFID (Radio-frequency identification) is state-of-art technologies that enhance the visibility of downstream supply.For their ability to reduce the bullwhip effect (the phenomenon of increase in the amplification of demand from retail end to the distributor end), maintaining buffer levels of inventory can be considered as a form of lean inventory management.
Effective inventory management is key skills that business today needs to master to increase the performance and efficiency of SC. Such parameter
(inventory control) is influenced by various factors and size of the firm.
Safety stock, speculated stock, pipe-line or in-transit stock and distribution behavior. Where all these are internal factors. The major external factors are customer behavior, external demand, market size and brand analysis . Stockout is external factors that affect the performance of the business, which is caused by paying low attention towards external demand and market size. Market size
and external demand are equal and competitive forces in deciding the
inventory holding in the warehouse.
Why Is Inventory Control Important?
If your business requires maintaining an inventory, you might sometimes feel like you’re walking a tightrope. Not having enough inventory means you run the risk of losing sales, while having too much inventory is costly in more ways than one. That’s why having an efficient inventory control system is so important.
Not having enough inventory means you run the risk of losing sales, while having too much inventory is costly in more ways than one.
Avoiding Item Stockouts
One of the worst things you can do in business is to turn away customers – people who are ready to give you their money – because you’ve run out of the item they want. “Stockouts” not only cost you money from missed sales, they can also make you lose customers for good, as people resolve to take their business somewhere that can satisfy their needs. An efficient inventory control system tracks how much product you have in stock and forecasts how long your supplies will last based on sales activity. This allows you to place orders far enough ahead of time to prevent stockouts.
Inventory Overstock Hazards
When inventory isn’t managed well, you can also wind up with overstock – too much of certain items. Overstock comes with its own set of problems. The longer an item sits unsold in inventory, the greater the chance it will never sell at all, meaning you’ll have to write it off, or at least discount it deeply.
Products go out of style or become obsolete. Perishable items spoil. Items that linger in storage get damaged or stolen. And excessive inventory has to be stored, counted and handled, which can add ongoing costs.
Working Capital Issues
Inventory is expensive to acquire. When you pay, say, $15 for an item from a supplier, you do so with the expectation that you will soon sell the item for a higher price, allowing you to recoup the cost plus some profit. As long as the item sits on the shelf, though, its value is locked up in inventory. That’s $15 you can’t use elsewhere in your business.
So inventory control isn’t just about managing the “stuff” going in and out of your company; it’s also about managing your working capital, keeping you from having too much precious cash tied up in operations.
Manufacturers’ Inventory Management
Inventory control isn’t just a concern for companies that deal in finished goods, such as retailers and wholesalers. It’s also critical for manufacturers, who maintain three types of inventory: raw materials, works in process and finished goods. If you run out of an essential ingredient or component, production will halt, which can be extremely costly. If you don’t have a supply of finished goods on hand to fill orders at they come in, you risk losing customers. Staying on top of inventory is essential if you’re to keep the line running and keep products moving out the door.
One way to use inventory control for increasing sales involves not purchasing more inventory than necessary. Purchasing too many items leads to excessive inventory levels. As consumers purchase newer versions of the products, the company sells its remaining inventory at reduced prices. The company loses money by selling the products at the reduced prices. With effective inventory control, the company reduces the amount of inventory it needs to sell at reduced prices.
Another way of using inventory control to increase sales involves creating demand by acquiring a limited quantity of a product. By offering a limited supply of items, the company creates an increased demand among consumers. Each customer wants to purchase the item before the company runs out. The company can charge a higher price for the item because of the higher demand. This increases the company’s total sales.
Inventory control involves balancing between purchasing too many products and purchasing too few. A company can increase sales by ensuring that it maintains enough products in inventory to fill customer orders. When the company maintains a smaller inventory level, it runs the risk of shortages for customers. Those customers often shop at competitor stores, and the company loses its sale. As long as the company maintains enough inventory items to fill customer orders, it records the sales.
Increase Complementary Sales
Companies can also increase sales by maintaining a sufficient level of complementary products in inventory. For example, a retail store that sells vacuums should keep a supply of vacuum cleaner bags in inventory. Customers who purchase the vacuums also purchase vacuum cleaner bags.
Reasons for Inventory Control
According to the Service Corps of Retired Executives (SCORE), inventory costs result in 45 to 90 percent of all business expenses. Therefore, properly controlling your company’s inventory is an essential component to the success of your small business. Carrying excess inventory results in an additional expense for your business, which reduces your bottom line. Not carrying enough of the right products causes lost sales and gives customers the impression that your business is poorly managed.
As a small business owner, you probably have limited storage space in your business location. According to SCORE, inventory control allows you to maximize your space by identifying the faster and slower sellers in your product mix. As a result, you can provide for space for better sellers while weeding out slow-moving items.
Room for New Merchandise
In a competitive business environment, being the first to carry the newest products on the market gives you an edge over your competitors. By effectively managing and controlling your inventory, you’re continuously eliminating the outdated and obsolete products in your mix, which means you’ll always have room for the newest, latest thing. Customers will look to your business first when searching for new items.
Turning Over Stock
SCORE also indicates that proper inventory control ensures increased speed in turning over your stock. This reduces the costs associated with carrying excess inventory and keeps merchandise moving through your operation instead of collecting dust in your stockroom. As a result, you’ll run a leaner, more efficient operation, which can lead to higher profits.
According to SmallBusinessTown.com, by controlling your inventory, you’ll know when it’s time to remove an item from your product mix. Perhaps an item only sells well on a seasonal basis, or no longer meets the needs of your customers. By removing the item from your shelf or stockroom and displaying it at a reduced price, you’ll generate some revenue while getting rid of a slow seller.
Avoiding Lost Sales
Just as carrying too much inventory can lead to higher expenses for your business, not carrying enough of the right products can also pose a problem. If you don’t control your inventory, you run the risk of missing out on sales due to running out of a key item. If customers can’t find what they’re looking for at your business, they’ll probably go someplace else. They may even decide not to patronize your business in the future.
How does inventory management help predict the future of a SKU in a brand portfolio ?
The Advantages of Low Inventory Levels.
Maintaining low inventory levels is a common logistics and inventory objective for companies. Inventory requires management and incurs costs. Companies typically try to achieve a balance whereby they have just enough inventory to meet current and near-term demand, but not so much that they have excess.
Reduced Holding Costs
Holding inventory has costs. Typical costs include utilities for the space used and labor costs involved in managing the inventory. A grocer, for instance, may have significantly lower utilities costs by using less freezer or cooler space to store refrigerated and frozen inventory. A distributor or retailer would need less labor to manage a smaller level of inventory holdings than it would to manage higher inventory levels.
Smaller inventory levels are also easier to manage. It takes less time to organize and retrieve inventory when there is less of it to put away and get out. This makes the process of replenishing short inventory much simpler and more efficient. This is especially important for companies that have high inventory turnover rates and need to quickly get new products onto the shelves.
More Usable Cash
Acquiring inventory is also costly. In industries with high-priced products, it can get very expensive to carry significant levels of inventory. Instead, by maintaining moderate inventory levels and quickly replenishing as needed, your company frees up cash in the short term to meet other expenses and short-term debt obligations. Plus, if you are replenishing inventory in close parallel to selling it, you are bringing in cash at a similar rate to what you pay it out in for inventory.
Less inventory means more space. Retailers are very concerned with inventory turnover per foot of shelf space. By maintaining lower levels of inventory in each product, they have more room to market and sell more products. Retailers that maintain low inventory levels do not need to allocate as much storage space in the building for extra inventory. This means they have more floor space in which to merchandise and sell products.
How Does Having a Low Inventory Affect Cost?
Achieving profitability is the underlying goal of every small business, which requires generating income in excess of your costs. Businesses can increase profitability by increasing income or by decreasing costs. Companies involved in selling physical goods usually have inventory, which are goods the company keeps on hand that are available for sale. Keeping inventory levels low can have several positive and negative impacts on costs and profitability.
One of the primary costs associated with inventory is the cost of storing goods before selling them. Businesses may store excess inventory in storage rooms and warehouses, both of which cost money to rent, maintain and manage. Keeping inventory levels low limits the amount of storage space needed for inventory, which can cut down on storage-related costs. For example, a retailer who decides to keep low inventory levels might require less square footage for his store than a competitor who keeps more inventory.
Spoilage and Damage
Another cost associated with keeping inventory is the potential for spoilage, damage and other issues that can destroy inventory or cause it to depreciate. For instance, an electronics retailer who keeps a large inventory of flat-screen TVs might discover that its old inventory drops in value when new TV models are released. Keeping low inventory levels reduces costs associated with the depreciation of inventory.
Low inventory levels can potentially be costly to businesses due to shipping costs and other logistical and organizational costs. For example, if a company is about to run out of a high-demand product, it might have to pay a premium for fast shipping to make sure that it has enough inventory to meet demand. Companies with low inventory levels need to monitor the levels closely to ensure that there is enough stock to avoid running out of inventory.
Keeping inventory levels low can reduce certain costs, but it also increases the risk of running out of a product. Companies that run out of products may miss out on sales that they would have been able to make had they kept more goods on hand. That said, if a company has too much of its money tied up in inventory, it might not have much cash left over to spend on current expenses and make investments.
The Disadvantages of Holding Too Much Inventory on Hand
Reduces Available Cash Flow
The more money you have tied up in inventory, the less you’ll have to cover essential daily expenses such as rent and payroll. You might be able to get better prices on inventory by buying in volume, and your production may be more efficient when you produce more inventory and achieve economies of scale.
But cash-flow shortfalls can easily wipe out these advantages. If you end up short of cash, you might need to borrow money, and then you’ll need to pay interest and finance charges just to make ends meet. And if you then become short on capital because you’ve spent it all on excess inventory, you might then be unable to take advantage of opportunities that require capital outlay.
Shifting Customer Demand
The inventory you have on hand today may not be the inventory your customers want tomorrow. There’s no way to forecast demand with complete accuracy, because tastes and circumstances constantly change. Clothing goes out of style and economic climates shift, making customers more likely to buy pricier or less-costly items, depending on the economy. Innovations render established products obsolete, such as you can see with the example of digital photography that has put a very serious dent in the 35mm-film industry.
The more inventory you have on hand, the more you’re likely to lose when your customers no longer want what you have.
Inventory Takes Up Space
The more inventory you have, the more you must store. If your storage space is limited, you may find it difficult to find space for items you need because you’ve purchased other products in volume. With perishable inventory that needs to be rotated, if you have more inventory than you can manage, it will be more difficult to keep track of dates. Handling excess inventory takes additional labor hours, which can cancel out the savings you get with volume discounts.
Striking a Balance
Of course, it’s also a disadvantage to not have enough inventory and to not have what your customers need – when they need it. Successful inventory is a matter of finding the sweet spot between having what your customers want, when they want it, but not having so much that it costs you additional money to manage it or reduce it for clearance.
Inventory Control Guidelines
Inventory control is a delicate balance of carrying the optimal amount of inventory. Carry too little inventory, and you risk not having enough goods on hand to meet your customer’s demands. Carry too much inventory, and you risk tying up your money and hurting your cash flow. Establishing inventory control guidelines helps you keep track of your inventory inflows and outflows. You can identify which inventory items sell quickly and which ones stay on your shelves for too long. You can adjust your inventory buying habits so you keep less on hand while still meeting your customer needs.
Frequent Inventory Counts
Inventory control starts with knowing how much of each item you already have on hand. You can make the counting easier by grouping similar items together in your storeroom or warehouse. Have your employees take an accurate count of your inventory items. Look for counting errors that could result in an incorrect inventory count. Make frequent counts to better gauge your inventory flow. Compare the actual count with your book count and make the adjustments so that your book count reflects the actual inventory on hand.
Control Purchase Costs
Keeping your inventory costs low is more than just buying from the cheapest supplier. It also includes handling costs, return and restocking charges, and added shipping or freight costs. Another overlooked aspect is the supplier’s on-time delivery history. Buying from a vendor that always delivers your orders on time eliminates the need to keep large supplies on hand. By considering all the factors, you may find that switching to a more efficient supplier lowers your total inventory purchase costs.
Eliminate Excess Inventory
Inventory that sits gathering dust on your shelves or growing obsolete in a warehouse drains your business profits. Investigate if the cause of your excess inventory stems from placing orders out of habit or if sales have slowed. If you routinely place inventory orders, cut back or eliminate any new orders until you sell your backlogged items. If sales are slow and you have other outlets, consider selling the inventory at another store. If you have customers who previously purchased your overstocked inventory, let them know you have a supply on hand and are willing to make a deal.
Set Reorder Limits
You can avoid being under- or overstocked on inventory items by establishing maximum and minimum reorder limits. The maximum limit is the greatest amount of an inventory item you keep on hand that meets your customer needs without becoming overstocked. The minimum limit is the point where your supply becomes so low that you must reorder or risk running out. You can analyze your past sales to set your maximum and minimum reorder points. Adjust these limits based on seasonal demands and changes in customer ordering and purchasing habits.
Advantages & Disadvantages of Just-in-Time Inventory
Just-in-time inventory management works by keeping stock levels low; you order just what you need, as closely as possible to when you need it. This approach to inventory management is an essential element in the philosophy of lean manufacturing, which is based on using information and strategy to run a business as efficiently as possible.
Advantage: Cash Flow Management
Just-in-time inventory helps you to manage cash flow. When you stock up and buy inventory in bulk, you may get better prices, but you’re likely to buy more than you need for your present purposes. Your working capital will then be tied up in materials that just sit on the shelf for the foreseeable future and you may not have the cash you need for day-to-day expenses such as rent and payroll.
Advantage: Reduces Clutter and Waste
Just-in-time inventory reduces the clutter that is an inevitable result of keeping too much stock on hand. With reduced clutter, you’ll have space to operate more efficiently. Just-in-time inventory management also reduces waste because the farther out you predict demand and purchase inventory, the greater the likelihood you’ll buy items that won’t be used. Customer tastes shift, products are discontinued and stock can deteriorate in storage, especially if it is perishable. Buying just what you need for present purposes helps you to sync more accurately with demand.
Disadvantage: Requires Thought and Strategy
If you cut it close on inventory purchasing, you may be unable to take advantage of an exciting unexpected opportunity because you have insufficient stock on hand and it’ll take too long to get the parts you need. Because just-in-time inventory cuts it close on purchasing, it increases the likelihood of running out of items and losing sales. If a manufacturer doesn’t have sufficient quantity of an item you need, you won’t have much time to find an alternative. Just-in-time inventory requires more thought and strategy than traditional inventory management.
Proactive Management Helps
Many of the disadvantages of just-in-time inventory management can be tempered with finesse and careful planning. Develop relationships with suppliers who can get you the parts you need as quickly as possible. Create systems that provide the most current possible information about what you have in stock, so you can make sure you always reorder on time. Inventory records should be updated every time a part is used or a piece of merchandise is sold, and should also indicate the critical points at which your inventory will drop too low and you’ll lose money due to missed sales.
Factors That Can Lead to Poor Inventory Control
A challenge faced by many small business owners is the maintenance of a proper product inventory. Unlike large chains, small businesses rarely have the luxury of abundant storage space, so owners must be vigilant to ensure they don’t run out of key items or carry too much inventory. Business owners should also be aware of factors that can lead to poor inventory control.
Failure to Plan
A failure to plan can lead to poor inventory control, especially in seasonal businesses. For example, a gift shop that does not order merchandise far enough in advance for the Christmas season may find itself without key products during a critical sales period. Another planning error is to not make an effort to get rid of older or slow-moving merchandise to make room for new products.
Failure to Keep Track
Small businesses that don’t use computerized inventory tracking methods may not always take necessary steps to manage inventory levels. Walking the aisles each morning to perform a visual inspection, keeping track of items sold by using tick sheets or saving portions of price tags can be effective inventory tracking methods, but these actions must be done by all employees on a consistent basis to be of any real benefit.
Buying Too Much
A small business may be tempted to take advantage of a special price on an item by purchasing it in bulk. However, if there is limited storage space or the item doesn’t sell rapidly, any cost savings can be more than offset by the additional costs of carrying the excess inventory. When purchasing in bulk, the business owner needs to be sure she can display the item for maximum sales appeal as well as offer special pricing.
Failure to Monitor Vendors
Some business owners may rely on outside vendors to stock and reorder products, such as potato chip vendors who order and transport their own products and stock them in retail stores for sale. This saves the business time and labor costs. However, if the owner does not monitor the vendor’s orders properly, it could result in excess inventory or loss due to shrinkage, which is loss of inventory due to factors such as theft, miscounting or paperwork errors. The vendor also may not be doing a good job of rotating products on the shelf or removing outdated merchandise.
Not Keeping Up with Trends
Small business owners who don’t keep up with changes in the marketplace can find themselves sitting on obsolete merchandise that no longer meets the needs of customers. They may also miss out on sales by not carrying the “latest thing.” Businesses such as small electronics stores need to constantly evaluate their product mix to keep up with rapid changes in technology.
What is supply chain management in Fmcg industry?How Does Improving Supply Chain Management Increase the ROA or Return on Assets?
Supply chain Analytics: In FMCG, the supply chain is one of the crucial parts of the business. One way that FMCGs are using big data in supply chain analytics is to optimize delivery networks. Organizations across the sector have been using analytics to merge multiple delivery networks to create a faster, more streamlined process. This not only helps to enhance service accuracy, but it also removes the tedious wait times between stations. Furthermore, having big data analytics in FMCG industry can create a more efficient supply chain through leading on the management of warehouses. Thanks to advances in technology, analysis of warehouse facilities and processes can be carried out in real-time. This includes identifying delivery mismatches, inventory levels, and income deliveries.
Effective vendor management and collaboration
Agile demand fulfillment
Reverse logistics diagnostics and improvements
Return on assets, or ROA, is a fundamental gauge of efficiency, measuring how well your business is using its assets to generate profit. Supply chain management, meanwhile, is all about improving efficiency — gaining a competitive advantage by streamlining the way you get products into your company and then out to your customers. Improving supply chain management boosts ROA through its effect on both profit and assets.
The basic formula for return on assets is as follows: ROA = Profit / Total Assets. If you have profit of, say, $50,000, and $400,000 in total assets, then your ROA is 0.125 — or 12.5 cents of profit for every $1 of assets. From the formula, you can see that if you generate more profit with the same amount of assets, ROA will rise. If you can produce the same profit with fewer assets, then ROA will rise, too. Even if assets and profit both grow, as long as profit rises at a faster rate than assets, your ROA will increase.
For a small business, the biggest benefit of effective supply chain management is inventory and order control. You want to always have enough product on hand and in the delivery pipeline to satisfy demand. Selling out of a product — a “stockout” — means turning away customers. So eliminating stockouts boosts revenue, which in turn boosts profits. At the same time, you don’t want to carry more inventory than necessary. Excess inventory is expensive to store, requires more labor to manage and increases the chances of having to write off goods that spoil or become obsolete while in your stock. Eliminating excess inventory reduces costs, and that, too, boosts profits. Higher profits, higher ROA.
Quality and Costs
Supply chain management isn’t just about moving products around; it’s also about monitoring the quality and costs of the products you’re offering your customers. It means identifying and developing relationships with suppliers who offer higher quality at comparatively low prices. Having better products available generates more revenue, boosts customer loyalty (meaning more repeat business) and reduces customer service costs. And lowering your wholesale costs further increases your profit margin, adding even more to ROA.
The assets portion of the ROA formula also feels the effects of good supply chain management. Inventory is an asset, so the less excess inventory you have sitting around unsold, the lower your total assets and the higher your ROA. Inventory also requires fixed assets to manage — warehouse space, transportation equipment and so on. Effective inventory control can reduce your need for these fixed assets and thus increase ROA. Reviewing your supply chain expenses might even reveal that you could save money by outsourcing some inventory management tasks — for example, allowing your vendors to handle the work of stocking shelves and ensuring adequate supply. In addition to boosting profit, this could allow you to reduce assets by disposing of fixed assets, increasing ROA in two ways at once.
What are the methods of competitive analysis used in the global Fmcg industry? How does data analysis help increase sales in Fmcg sector?
Presently, FMCG organizations have an opportunity to revamp their marketing and operations. Having data analytics techniques in place, FMCG companies can move beyond simple reactive operations and take proactive decisions.
Numerous factors such as – (marketing, inventory, seasonal changes, returns, out-of-stock, raw material availability, localized pricing, and so on) drive the FMCG industry. In these unstable times, the FMCG industry can depend on data analytics to identify trends, gaps, and opportunities in customer behavior and supply chains.
Forecast Optimization: Organizations need to forecast sales to trickle-down effect across departments. The process of generating a forecast needs combining FMCG analytics with business and product knowledge, as well as a continuous focus on improving results to keep up as the business evolves. With leading analytical capacities in place, companies can approach each problem from the different angles required—from the product perspective, customer perspective, retail structure and complexity, and supply chain interdependencies.
Analytics-driven outcomes include:
Build knowledge of product group behaviors based on historical tendencies.
Understand the effect of product forecast
Understand the forecasting accuracy leading to reductions in excess inventory, better manpower utilization, lower expedite costs, and reduced stock-outs.
Price and promotion analytics: With such large investments in trade promotion processes, FMCG companies find it challenging to make informed decisions that trigger appropriate actions and equip them to win in both emerging and developed markets. In such scenarios, FMCG Analytics can help manufacturers become more sophisticated in managing pricing across the value chain. This would include shelf-based pricing, price to distributor and price to the retailer as well as optimization of promotional spend-a massive expenditure for CPG companies.
Analytics-led outcomes include:
Balance the sales and marketing investment mix to increase sales.
Enable control and visibility on trade spend investment.
Improve sales and demand forecast accuracy
Leveraging analytics to increase Customer Retention and Loyalty: In an increasingly hyper-competitive market, the ability to retain customers and gain their loyalty can determine whether a business succeeds or fails. Organizations are turning to data analytics to retain the valuable customers they already have by avoiding weak points. Companies can analyze customer behavior and experience, taking advantage of key opportunities to improve influence buying behavior, customer experience, and increase customer retention.
Timely promotions and offers to retain or upsell customers
Engagement and gamification
Data management and efficient and transport reporting of the various fraud incidents results in improved fraud risk management processes. Moreover, the FMCG industries use integration as well as the correlation of data throughout the enterprise. This data helps offer a unified idea of fraud across different business lines, transactions, and products. Besides, data analytics provide accurate fraud trend analysis, the anticipation of any upcoming future modus operandi.
Helps to deliver relevant products
It is important to understand that the products are like oxygen for any organization and the biggest investment for every industry. FMCG industries appoint product management teams who use various data analytics methods. Their role is to find out the new trends, which helps drive strategic maps to bring out innovation, services, and features. Data collation using third party sources combined with analytics helps the FMCG industries to stay in the competition, especially when demand changes or new technology develops.
Innovation is the only way towards bringing success, and with data analytics, you can get a rough idea of the upcoming trends in consumer behavior. Once you understand the trend, you will be able to make futuristic inventions. Thus, the FMCG industries manufacture products and make services to put them on top of the industry. These innovations are effective enough to maintain a sharp edge advantage over the competitors.
As FMCG industries have to face huge competition, data analytics helps in understanding the market. Also, it helps about what new trends can keep companies ahead of their competitors. The best thing about these innovations is that they are easy to patent and getting the best from them.
Lowers the operation cost
Data analytics are quite useful for the FMCG industries since the only target of the industries is to run the business smoothly. With modern data analytic methods, it is easy to find out various business sectors utilizing unnecessary finances. Hence, data analytics are transforming FMCG industries following these parameters. Almost every sector of the FMCG industry utilizes the benefits of data analytics.
What Is Value Chain Analysis? Porter’s Concept of Value Chain Analysis
Value chain analysis focuses on analyzing the internal activities of a business in an effort to understand costs, locate the activities that add the most value, and differentiate from the competition. To develop an analysis, Porter’s model outlines primary business functions as the basic areas and activities of inbound logistics, operations, outbound logistics, marketing and sales, and service. The model also identifies the discrete tasks found in the important support activities of firm infrastructure, human resources management, technology, and procurement.
The overall goal of value chain analysis it to identify areas and activities that will benefit from change in order to improve profitability and efficiency. For more on Porter’s value chain model and a detailed description of the goals, functions, and tasks of a value chain, read The Art of Value Chain Analysis. Here you will learn about Porter’s primary and supporting value chain activities and how to apply value chain analysis to your business.
What are the Cost Drivers of Value Chain Analysis?
Cost advantage results from a reduction in costs associated with activities in a value chain. After the value chain has been defined, it’s important to associate costs to the activities and then make adjustments for efficiency. Porter’s 10 cost drivers are factors that can impact the cost of an activity. An organization can aim to control these cost drivers in order to improve efficiency, add value, and differentiate.
- Economies of scale
- Learning and spillovers
- Pattern of capacity utilization
- Organization policies
- Location and Institutional factors
Value chain analysis is more than a straightforward cost-to-profit model. It expands on the principles of economies of scale and capacity. There are limits to lowering costs and increasing capacity that can inhibit business growth. Value chain analysis stresses that competitive differentiation can also focus on the perceived value to the customer that justifies a product’s price tag. Finding these perceived values could mean the difference between getting a consumer to spend three dollars on a cup of Starbuck’s coffee rather than one dollar on a competitor’s discount brand.
Examples of Value Chain Analysis by Industry
Food and Beverage: Selecting and sourcing high-quality coffee beans, developing loyalty through excellent customer service, and aggressively marketing their brand were key elements in Starbucks’ creation of a unique identity and a robust competitive edge. Rather than focusing on premium pricing, Pizza Hut outpaced the competition by offering fast delivery of a less expensive product.
Delivery Service: To increase market share and brand loyalty, FedEx’s value chain emphasizes and invests in employee development through excellent human resources initiatives and infrastructure improvements.
Retail: Walmart is constantly performing value chain analysis in order to keep costs low for their customers. From regularly evaluating suppliers and integrating in-store and online shopping experiences to remaining innovative in order to differentiate, Walmart is driven by their commitment to helping people save money.
Implementing and Using Value Chain Analysis
Identifying primary and supporting activities
Rating the importance of each activity in providing value to the product or service
Identifying the cost drivers that cause a change in the activity cost
Identifying linkages and dependencies
Identifying cost reduction and value improvement opportunities
Approaches with a focus on finding differentiation include:
Identifying activities that create value for your customers
Identifying differentiation activities that improve customer value
Identifying the best opportunity for differentiation
Value chain analysis as a tool also concentrates on finding activity links or, as Porter called them, bridges between both the primary and secondary functions of a department, business unit, or enterprise. Although the model is clear in defining general, discrete functions, there are numerous areas of interactions and cross-functionality that can identify cost opportunities, areas of greater efficiencies, and methods to distinguish a brand.
Factors that can influence the value you provide include finding and utilizing the right people, motivating the team, remaining relevant, incorporating technology, and listening to customer feedback.
When analyzing the value chain, it is important to include many stakeholders, and to study the entire market to find areas for competitive opportunities. It is also vital to provide clarity and information, and to define goals. There are thousands of activities varying in importance in the primary and supporting areas of the chain, and opportunities are discovered through cooperative research and analysis, brainstorming, surveying, and observation.
Today’s Impact on Value Chain Analysis
Many companies manage both physical and virtual value chains. The differences in approaches are best illustrated by comparing the consumer experiences of utilizing the services of a brick and mortar bank and those of online banking. Customer service experiences, infrastructure and technology needs, and personnel and training are a few of the many factors to consider when analyzing and adapting these value chains.
In reimagining the basic value chain, you should also study rapid technological advances. The Consumer Goods Forum Board findings recognize that the consumer is now more involved in product development. And, as society onboards new and unknown technologies, value chains need to be continuously reengineered. Societal questions about increased urbanization, the rapid rise of online shopping, and the changing expectations of the consumer are all considerations as valuable as the cost of raw materials, warehousing, and the delivery of any product or service. As companies adapt the basic value chain to the 21st century, many look at this methodology as a journey of transformation rather than a destination. As such, value chain analysis will continue to be a relevant and useful tool to develop and maintain a sustainable, competitive advantage.
Retailers need to ensure that their real-time inventory systems can survive seasonal peaks, maintain data consistency, and deliver instant results. Redis Enterprise uniquely provides the capabilities to modernize real-time inventory—performance at massive scale, data consistency across channels, and multiple modern data models | <urn:uuid:8dbe0f63-af3b-48c6-873c-5587d95ab966> | CC-MAIN-2021-43 | https://www.digitalgumma.com/how-inventory-of-fmcg-goods-helps-everyone-predict-an-awesome-future-in-business/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585281.35/warc/CC-MAIN-20211019202148-20211019232148-00215.warc.gz | en | 0.940075 | 8,554 | 2.609375 | 3 |
We Read about Brave Women
This practice is something we do well at Miquon, as with the Nursery’s recent study of women aviators, which included Fearless Flyer: Ruth Law and her Flying Machine — the tale of the first woman to fly from Chicago to New York, despite the critics who thought should could not — and Nobody Owns the Sky: The Story of Brave Bessie Coleman, the first licensed African-American aviator. Teachers helped children think through what it might be like to be the first person to do something that no one has done before — even in the face of doubt, based on factors like gender and the color of one’s skin. Through this practice, Miquon children gain the understanding that it is not only okay, but beneficial, to stand up for something they believe in.
In the older grades, the counterstory comes out when students grapple with what it might be like to be a child in a region different from our own. Recently, for instance, third and fourth graders learned more about the refugee experience, reading books like The Sky of Afganistan and The Lost Boys of Sudan. They wondered, “How are their lives different from ours and what can we find that is similar? What are their hopes and dreams? What do they wish for?”
Through conversation and thinking about experiences of other children, we are also providing a counter-narrative. Moreover, we hope to give students the opportunity to see connections with others whose experiences may differ from our own. | <urn:uuid:972a4524-12aa-40d3-9378-81878bde5f9a> | CC-MAIN-2018-17 | https://miquon.org/we-read-about-brave-women/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936914.5/warc/CC-MAIN-20180419110948-20180419130948-00480.warc.gz | en | 0.961599 | 318 | 3.546875 | 4 |
Deep-water aerobics is a fun exercise option for older children, teens and adults who have mastered basic swimming skills. Aerobics at the deep end of the pool is also an effective aerobic exercise for individuals working through physical therapy for minor injuries. Some aerobic exercises may use kickboards or water weights to increase resistance and your heart rate for a more intense workout. Make sure you talk with your primary care physician before embarking on a new exercise regimen.
Water Weight Exercises
For an aerobic exercise to work your arms, hold water weights out at your side so your arms form a “T.” You are in the deep end of the pool, so your feet should not be touching the bottom. Slowly bring the water weights down by your side, then raise them back up. Perform 10 to 15 repetitions and for three to four sets.
For an exercise that works your abdominal muscles, start by floating on your back with the weights at your side so your body forms a “T.” Gaze up at the ceiling. Slowly bring both of your legs into your chest using your abdominal muscles. Try not to sit up in the water when you are doing this. Straighten out your legs. Complete three to four sets of 10 to 15 repetitions each.
Kick lengthwise or the width of the pool by holding a kickboard out in front of your body, your arms on top with your fingers curled around the arch. Arms should be straight and the kickboard should be in front of your body, not underneath your chest. When kicking, make sure your legs are not stiff, like boards, but more flexible like noodles. Kick with straight legs by using your whole leg. Use your hamstring muscles to kick, but avoid making big splashes by only kicking from your knees. If you are kicking correctly, your feet should make bubbles just below the surface of the water. Complete as many laps as possible to increase your heart rate. Beginning swimmers should start by kicking 100 meters, which is equivalent to four lengths of a 25-meter pool. You can work your way up to kicking 400 to 500 meters and increase your intensity by kicking faster.
Pool Edge Exercises
Perform pushups using the side of the pool. Place your hands shoulder-width apart on the edge of the pool. Use your arms to push your body up. Your body should be facing outward away from the center of the pool. Try doing this exercise in reverse. Place hands shoulder-width apart on the deck of the pool, but have your body and hands facing toward the pool. Use your arms and shoulder muscles to push your body up.
Treading Water Exercises
Tread water at the deep end of the pool by having your arms almost parallel to the surface of the water and in front of your body in a “Y” position. Your hands should not be cupped, and you should have a little space between your fingers. Stay relaxed. Sweep your hands inward with palms facing toward each other like you are going to clap your hands together, and then outward with palms facing toward opposite sides of the pool. Each of your hands should make a small figure eight. Use a breaststroke kick to keep your body up. This is a frog-like kick. Keep your legs together and pull them toward your chest. Kick out and apart with your legs and then bring them back together. Repeat to stay afloat. For a more intense exercise, use only your legs to keep you afloat while you hold your hands above your head. Start at one minute and work your way up to three, five, 10 and 15 minutes.
If the exercises are too difficult, many water aerobic instructors have flotation devices called waist belts that are secured around your waist with a plastic clip to help keep you afloat. If you want a more intense exercise, complete the exercises without the waist belt. Make sure you start slowly and work your way up to more intense exercises. You will find doing the exercises gets easier with consistent practice at least a few times per week.
- MayoClinic.com: Aquatic Exercises How-Tos
- Arthritis Foundation: Water Exercises
- Fitness Magazine: Slim Down in a Splash: Water Aerobic Exercises
- Sport Fitness Advisor: Dumbbell Exercises for Every Major Muscle Group
- American Red Cross Water Safety Instructor's Manual; American Red Cross
- Jupiterimages/Pixland/Getty Images | <urn:uuid:507f13b0-7315-427f-9a23-295a2f3ae9c9> | CC-MAIN-2014-23 | http://healthyliving.azcentral.com/instructions-deepwater-aerobics-routines-2186.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997888216.78/warc/CC-MAIN-20140722025808-00166-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.935882 | 912 | 2.765625 | 3 |
According to erc721.org, “ERC-721 is a free, open standard that describes how to build non-fungible or unique tokens on the Ethereum blockchain.” While most of the tokens are fungible in nature, all ERC721 tokens are unique and often treated as collectibles.
But, what are tokens?
A “token” can be defined as a representation of any fungible good which can be traded for eg, currency, frequent flyer points, gold certificates and more. Blockchain or Ethereum is not the first platform to use tokens as a part of their design. A token is really an abstraction that represents who owns the underlying tradeable asset.
Crypto Tokens reside on their own blockchain network and represent an asset or utility, they are kind of special virtual currency tokens. For eg, one can own a crypto token that represents he/she is the owner of 10,000 frequent flyer points on a blockchain which is managed by an airline.
There can be another token which allows accessing 200 podcasts on a specific podcast network. Such crypto tokens on blockchain platforms like Ethereum that are created using standard templates often serve as the transaction units on the blockchain.
The cryptocurrencies and altcoins are specific virtual currencies that are primarily used as a medium for digital payments and have their own dedicated blockchains. On the other side, crypto tokens are created on top of a blockchain using its own pre-designed templates and used in the execution of smart contracts, decentralizes applications and facilitate transactions. Such crypto tokens are usually created, bought, distributed and circulated through ICO (Initial Coin Offering), a process that involves crowdfunding to create working capital for the project.
There are various types of tokens being used across the cryptocurrency industry and there are different ways to differentiate between tokens. Some of them are outlined below:
Usage Tokens: A token that is required to use be used as a service for eg, Bitcoin and Ether.Work Tokens: A token that gives users the right to contribute work to a decentralized network and get incentive/direct benefits based on their contribution.Intrinsic, Native or Built-in Tokens: These types of tokens are exclusive to one blockchain and used to serve as validation and spam prevention toolsApplication Tokens: These tokens are created on the application layer itself using smart contractsAsset-backed Tokens: These tokens are issued against real assets onto a blockchain for later redemption.
Collectible items have always attracted Humans. From the era of literally collecting rare coins to our time of Pokemon cards and Tamagotchi. It’s a hobby having a foundation of rare interest in rare items. Similarly, ERC721 emulate rare, collectible items in the form of Ethereum tokens as each of these tokens is known to be different from each other. Ethereum Request Comments 721 or ERC721 is an improvement proposal for Ethereum which was proposed by Mr Dieter Shirley in late 2017’s. These new proposed standards will allow smart contracts to be traded in the form of tokens and are nothing short of a cryptocurrency revolution. Since every token has a unique form and non-fungible in nature enhances the overall integrity of the smart contract ecosystem powered by blockchain.
What is fungible? Fungible means, being something (such as money or a commodity) of such a nature that one part or quantity may be replaced by another equal part or quantity in paying a debt or settling an account. Source: Merriam-Webster
For example, if you go to a convenience store with $10 in your hand, you can buy a soda and some chocolates. The $10 note has a value which can be used at the convenience store to buy products of the same or lesser value. On the other side if you carry a collectible basketball card to the same store it won’t be accepted by the owner. This is because the dollar bill and the basketball card have different characteristics value which is different for different people.
ERC721 tokens can be used in any exchange exercise but their value is different from each other. Their value is defined by the uniqueness and rareness associated with each token and the standards that defined the value of the token are as below:
NameSymbolTotal SupplyBalanceOfownerOfapprovetake ownershiptransfertokenOfOwnerByIndextokenMetadata
Note: All the above-mentioned parameters are a part of ERC721 contract and the image below is a template of ERC721 contract
ERC721 has been predominately famous for successful adoption of CryptoKitties which is being loved by many. But there are many other usability applications for ERC721 contracts.
WePower a platform supporting renewable energy production uses tokens to act as a certain amount of electricity on their grid networkERC721 can be used to guarantee anti-piracy, privacy, and transferability for software titles or software licensesERC721 also have some very interesting prospects of being used in the betting in real-time for the video games being streamed online. Like the world championship for DOTA 2
ERC721 Vs ERC20
There are many differences between ERC20 and ERC721 on the structural level but all those differences account to the major difference between these two types of tokens and that if “Fungibility”.
ERC20 is a fungible token, which simply means it is interchangeable with another ERC20 token. Without having any distinction between two ERC20 tokens it similar to having two 10 dollars notes.
But with ERC721 which is a non-fungible token, every token will have a distinct form which makes it unique to every other ERC721 token. | <urn:uuid:ce2e659c-8b48-43cc-a3c2-459d6c439ea8> | CC-MAIN-2019-35 | https://hackernoon.com/everything-you-need-to-know-about-erc721-tokens-b4b232h4 | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315750.62/warc/CC-MAIN-20190821022901-20190821044901-00160.warc.gz | en | 0.938287 | 1,165 | 2.734375 | 3 |
When 19 University of Maryland students in a class about traffic safety issues were asked to raise their hands if they had ever texted someone while driving, nearly everyone did.
Dawn Couch, senior public relations manager at AT&T, saw this poll firsthand when she visited the class — called HLTH374: Drugged, Drowsy and Distracted Driving: Traffic Safety Issues for the New Millennium — on Feb. 13. The course was first offered last spring by the public health school to address distracted driving.
"You can apply a lot of social psychological principles to traffic safety," said Kenneth H. Beck, the behavioral and community health professor teaching the class. "It's such a social behavior. You don't drive the roads alone, we drive with other people. There's that mutual interdependence with whatever the drivers are doing that I find kind of interesting."
AT&T hosts community and educational events in the area promoting its "It Can Wait" campaign, which discourages texting while driving. Couch learned about the class through the public health school's behavioral and community health coordinator, Tracy Kennedy, whose husband works for AT&T. Couch is one in a series of presenters on impaired driving that will address the class this semester.
According to AT&T research, about 49 percent of people have texted or used social media while driving, and 4 in 10 use social networks while driving, resulting in 200,000 distracted driving accidents each year. To augment this point, Couch's presentation included a 3-D virtual reality simulation delivered through Samsung Gear VR, allowing participants to experience the consequences of glancing at a phone while driving. Students had the option to download the DriveMode phone application and use Google Cardboard to experience the simulation.
"I noticed a few people here, once the impact of the crash [occurred], I saw a few people jump," Couch said. "That's going to impact you more than a billboard you see on the side of the road."
The university developed the course in response to an initiative Barbara Curbow, chairwoman of the behavioral and community health department, put out to the department's faculty last year promoting innovative and relevant courses that could appeal to students, Beck said. This class involves numerous presentations as well as a project where students conduct their own original research.
"[Distracted driving] and drowsy driving are going to be emerging issues, the new form of impaired driving," Beck said. "It's something that we need to look at publicly, and get people engaged like they got engaged with drinking and driving."
Couch also presented advertisements for the "It Can Wait" campaign, which tap into behavioral economics in an attempt to make the audience understand why people they make the choices they do on the road.
"I have family members that text while they drive and I'm usually with them," said Marianna Molina, a junior community health major in the class. "Having seen that now, I definitely feel called to intervene now. It's definitely really scary to think about losing someone because of distracted driving."
Couch said spreading and sharing this message can help to save lives.
"Tell your friends, take the pledge," Couch said. "My hope is that this time next year, when I come back with the statistics, that those numbers have gone down." | <urn:uuid:fc7b5f5e-8649-4c70-b136-02517c85480b> | CC-MAIN-2019-09 | http://www.dbknews.com/2017/02/14/umd-virtual-reality-texting-driving/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249495888.71/warc/CC-MAIN-20190223082039-20190223104039-00326.warc.gz | en | 0.972155 | 675 | 2.546875 | 3 |
What’s the Time? Does the Artificial Pancreas Need to Know?
- Department of Endocrinology and Metabolism, Academic Medical Center, University of Amsterdam, Amsterdam, the Netherlands
- Corresponding author: Susanne E. la Fleur, .
The development of a closed-loop artificial pancreas (AP) represents a major technological effort that aims to improve glucose control, prevent complications, and decrease disease burden for patients with diabetes. An AP consists of three components: 1) a subcutaneous glucose monitor, 2) a subcutaneous insulin pump, and 3) an automated control algorithm (Fig. 1) (1,2). Until recently, clinical trials investigating AP function were limited to controlled, in-hospital settings (1,3). However, several recent studies showed that an AP can maintain (4) or even improve (5) glycemic control outside of the hospital.
Several types of control algorithms have been developed. On the one hand, proportional-integrative derivative algorithms use a classical … | <urn:uuid:193d6c9c-3df0-48f0-8da5-98043f4a0f53> | CC-MAIN-2016-07 | http://diabetes.diabetesjournals.org/content/62/7/2173.extract | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146550.16/warc/CC-MAIN-20160205193906-00283-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.889882 | 212 | 2.734375 | 3 |
On behalf of the Organizing Committee of
Emerging Infections and Pandemic Risk,
Paris, June 21-22, 2018
100 years after the deadliest influenza pandemic in human history – the 1918 Spanish flu – emerging and re-emerging infectious diseases continue to pose a threat to public health around the world. Recent illustrations include the SARS, H1N1, MERS-CoV, Ebola and Zika epidemics, all associated with direct health and wider economic burdens and social instability.
Rapid urbanisation, increased mobility and global economic interdependence exacerbate this threat and add to the challenge of containment. Further, 75% of emerging infectious diseases that have affected humans over the past three decades are known to be of zoonotic origin. Human health is now not only affected by an increasingly interconnected world, but human health, animal health and the health of the surrounding ecosystem are inextricably linked. Being adequately prepared to detect, manage and respond to emerging infectious diseases outbreaks has never been so imperative.
On 21-22 June 2018, the Institut Pasteur, in collaboration with SCOR, will bring together leading international scientists and public health professionals for an inaugural conference on the latest evidence for understanding the emergence, spread, detection and control of infectious diseases with pandemic potential.
The program includes plenary and panel sessions with invited speakers from 20 partner institutions around the world, all focusing on emerging infectious diseases and pandemic risk. Major topics for the conference include: zoonotic spillover, methods and approaches for predicting emergence and spread, genetic sequencing in the context of outbreaks, wider impact of pandemics, and new tools and technologies for detecting and managing emerging infectious diseases outbreaks. Specific subjects addressed include: influenza, HIV, arboviral diseases, viral haemorrhagic fever, digital epidemiology, mathematical modelling and precision public health. | <urn:uuid:2722b5c3-5fa3-4d83-b95e-ba4a4749f030> | CC-MAIN-2019-51 | http://www.modele.conferences-pasteur.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540543850.90/warc/CC-MAIN-20191212130009-20191212154009-00281.warc.gz | en | 0.917618 | 379 | 2.828125 | 3 |
School lunch rules have changed since you were a child, even for small kids like kindergarteners. Instead of packing things like a peanut butter sandwich and chips, many parents now have to follow various school rules on what's allowed in a child's lunch. If your first child is going off to kindergarten this year, be sure to ask the school administration about these items because if you don't, you could end up getting some rather stern rebukes from the school.
So many articles on packing lunches for students include foods that need to be refrigerated, like cold cuts and cut fruit. However, not all schools have refrigerators in each classroom. Some schools still rely on leaving the child's lunch in his or her backpack in the coat closet. If you send a lunch that requires refrigeration with the child, even with cold packs inside, you might be sending a risky lunch because there's no guarantee the child will be able to eat it within a safe amount of time. Always check if there is a refrigerator or if the lunch period will happen soon enough for an ice pack to keep everything suitably cold.
Food allergies have become a major issue in schools, with some going as far as banning the problem foods from all lunches brought by all students. You've got to find out if your child's school has banned any foods so that you don't accidentally put another student's life at risk.
No Candy/Cookies Rules
In an effort to make students eat healthier foods, lots of schools have also instituted rules banning cookies, candy, and other sweet foods except on certain school-approved occasions. These rules can vary in scope (for example, one school might ban cookies outright while another allows a certain amount per day), so ask specifically about what your child's school will do.
Also check if the school provides any foods. Whether or not the school has a cafeteria, it can also provide things like milk cartons during recess or juice during lunch. Take advantage of these opportunities if they are there. But ask ahead if the school does anything like this so that you don't make your child lug a bottle of milk to school only to find it would have been provided anyway.
Each school will be different, and rules can change year to year. Contact your child's school to find out what rules the kindergarteners have to abide by to ensure lunchtime doesn't become stress time.Share | <urn:uuid:cf86089c-84aa-46d2-8abc-dbff14efba02> | CC-MAIN-2017-51 | http://stephremparish.com/2016/08/17/ask-these-questions-so-you-know-what-to-pack-for-your-childs-lunch/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948550199.46/warc/CC-MAIN-20171214183234-20171214203234-00625.warc.gz | en | 0.975025 | 484 | 2.609375 | 3 |
|Name: _________________________||Period: ___________________|
This test consists of 5 short answer questions, 10 short essay questions, and 1 (of 3) essay topics.
Short Answer Questions
1. What is RHAPAW?
2. What does Q say he and Margo have been doing all night?
3. What does Q say knowing Margo Roth Spiegelman is?
4. Where is one of the places Q and Margo stop?
5. Who is Otis Warren?
Short Essay Questions
1. What do Q and Margo talk about concerning the book Margo had started writing in fourth grade?
2. What does Margo ask Q when they are driving around, and where do they go?
3. Why is Q relieved when they find a raccoon?
4. What does the prologue say about miracles?
5. What significant conversation do Ben and Q have in hour twelve?
6. Where do they find Margo and how does she seem?
7. How does Q vacillate about his search for Margo, but what does he do instead of the prom concerning her?
8. How does Q handle the problems with the school bullies?
9. What do Margo and Q do to Chuck Parson?
10. Describe Ben Starlling and his relationship to Q.
Essay Topic 1
Oftentimes, a book has more of a character-driven plot rather than action driven, and oftentimes the other way. Some books seem to balance the two. Discuss the following:
1. What do you think it means to say that a plot is character driven? Action driven?
2. How do you think a plot differs if it is character driven versus action driven?
3. Which type of plot do you find more interesting? Why?
4. Do you think it is possible to have a plot where action and character development share equal time? Why or why not.
5. What type of plot do you think Paper Towns is? Explain your response.
Essay Topic 2
Discuss the following:
1. Who is/are the protagonists of the story and why?
2. Who is/are the antagonists of the story and why?
3. Which 3 secondary characters have the greatest impact on the plot?
4. Are any of the characters dispensable and which ones? Why or why not?
5. Do you think this is a character-driven plot or an action-driven plot? Explain.
Essay Topic 3
Many novels, and perhaps a majority, of novels ends on a happy note. Discuss the following:
1. Why do you think many (most?) people want what they perceive as a happy or good ending to a novel? Explain your opinion. Do you? Why or why not?
2. What are three reasons to read fiction? Discuss each one in light of Paper Towns and whether or not it fulfills all three, two or one of the reasons you mention. Give examples as to why Paper Towns is or is not successful in fulfilling the reasons you discuss.
3. Do you think reading solely for entertainment is as good a reason to read as any other? Why or why not? Can any work of fiction or non-fiction, no matter how poorly written, enlighten, teach, stimulate thought? Why or why not?
This section contains 1,054 words
(approx. 4 pages at 300 words per page) | <urn:uuid:6abd073b-d977-4c0c-ac19-57bd6e77b4cb> | CC-MAIN-2015-11 | http://www.bookrags.com/lessonplan/paper-towns/test5.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00311-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.946624 | 721 | 2.671875 | 3 |
tell me the difference between the first and second chapters and the first and the second chapter
Style is the only difference between the two. Either way is grammatically correct in any instance; however, you may wish to use one or the other depending on context. The first method suggests that the chapters agree or go together somehow. Such as:
The first and second chapters contain background information on the diabolical history of wild ducks in Saskatchewan.
The second method might suggest the differences between the chapters rather than their similarities. Like this:
The first chapter and the second chapter, written from the perspectives of the two main protagonists, disagree on the fundamental nature of the universe in general and the nature of wild ducks in particular.
--- Having written all this, I just realized that I didn't quite read your question correctly. You wrote "the first and the second chapter", not "the first chapter and the second chapter". In this case, I believe "the first and the second chapter" is wrong and you need to make "chapter" plural. I could be mistaken.
|link comment||answered Sep 15 '12 at 15:59 mysticete Contributor|
Hero of the day
Person voted on the most questions. | <urn:uuid:8396604d-61ac-45a2-80ef-2ff8d01fd0fd> | CC-MAIN-2017-17 | https://www.grammarly.com/answers/questions/7662-for-learning/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119361.6/warc/CC-MAIN-20170423031159-00560-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.933701 | 249 | 3.203125 | 3 |
One is pleased to
present the source code for Norman White's interactive
robotic project, The Helpless Robot.
The Helpless Robot is an artificial personality
that responds to the behavior of humans by using its electronic voice which
speaks a total of 512 phrases. The speech that is delivered depends on its
present and past experience of "emotions" ranging from boredom,
frustration, arrogance, and overstimulation.
Since 1987 The Helpless Robot has been exhibited
in numerous galleries both in Canada and internationally. By sharing and
publishing The Helpless Robot script, Norman
White invites fellow creative individuals to collaborate on a software
project aimed at: >> creating more
powerful and varied simulations of an emotional entity. >>
translating the code into Java or another web language, so as to create
a net-based version of The Helpless Robot.
This might involve re-writing parts of the existing Delphi code, or starting
all over from scratch.
Norman White started out as a
painter, but in the late 60's, he taught himself electronics and began
to create electrical machines in order to better model behavior, particularly
that of living organisms. He has exhibited his electrical work widely
in North America and Europe. In 1978, he helped to initiate, at the Ontario
College of Art and Design a programme dedicated to teaching electronics,
mechanics, and computer programming to artists. He teaches at OCAD to
He now lives in Durham, Ontario.
The Helpless Robot Source Code
Robot Artist Statement
GNU General Public License | <urn:uuid:8c2265ac-75d5-46e1-99b5-9769340838a2> | CC-MAIN-2015-48 | http://www.year01.com/archive/helpless/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398451744.67/warc/CC-MAIN-20151124205411-00180-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.905467 | 330 | 2.671875 | 3 |
But what happened to Ahithophel? Why would he choose Absalom over David? What would lead a wise, godly man to not only choose wrongly here - but also to offer very godless advice to Absalom as one of his first acts as his counselor? In 2 Samuel 16 he encouraged Absalom to commit adultery and rape with 10 of David’s concubines in broad daylight before all of Israel in Jerusalem. That is not godly counsel! What would lead a man who once was seen as a source of godly wisdom to give such unwise, unholy counsel?
Something we know only by examining the genealogies of Scripture is that Ahithophel had a granddaughter who was well known in the annals of Scripture. We read in 2 Samuel 23:34 that Ahithophel’s son was named Eliam. What we don’t see, unless we examine the records closer, is who Eliam’s daughter and Ahithophel’s granddaughter was. Her name was Bathsheba, the daughter of Eliam. Bathsheba was Ahithophel’s granddaughter. This was how a godly man began to descend down a path of bitterness that eventually destroyed not just his wisdom, but eventually destroyed him in the end.
What a blow it had to be to learn of David’s betrayal to him and his family. Ahithophel had served with honor and distinction - had given his son to the fight - had even given his son-in-law as well (for Uriah was one of the mighty men of David too). David repented of his sin in the end - even writing publicly sung Psalms that spoke of his betrayal and wickedness. But something happened to Ahithophel in the process. We are warned in the New Testament to beware of any root of bitterness that may spring up in us that will defile us and many around us. David bears responsibility for his sin and for being a stumbling block to Ahithophel, but it was also this man’s responsibility to forgive as well - even when it was excruciating to do so. But it is evident that he did not - but began to nurse bitterness and a grudge against David.
Then the day came that an opportunity arose for Ahithophel. David’s passivity toward his son was costing him the kingdom. Absalom had effectively stolen the hearts of many in Israel and a rebellion was begun. One of the early things Absalom did was to ask Ahithophel to be a part of the rebellion - and Ahithophel gladly rose to the task. His ungodly advice to begin Absalom’s rule by invading and then raping the 10 concubines left to care for the house was shocking. But it had its desired results in that it burned any bridge left between David and Absalom. Then Ahithophel counseled Absalom to let him had a large strike force he would take and use to chase down and kill David. He was not focused on winning a battle - but on making sure David was dead. These were the actions of a man who was consumed with destroying David - as he had destroyed Ahithophel’s family.
In a strange twist, David’s close friend, Hushai - stayed behind at David’s request to thwart the counsel of Ahithophel. When Hushai disagreed with Ahithophel’s counsel and prevailed - the disgraced royal counselor knew that Absalom would not prevail. With a hurt pride - and a crushed spirit that would no longer be able to see David killed - Ahithophel went home. Unforgiveness turned to bitterness and now bitterness had led to ungodly counsel to murder God’s anointed. He saw his own demise coming - and unable to see forgiveness as a possibility (probably due to his own inability and unwillingness to give it to others) - Ahithophel set his house in order - and hung himself.
What do we learn from the sad story of Ahithophel? First, I want to make sure that everyone who reads this knows that what David did was sin - and he was responsible before God for being a stumbling block to many. It brought great damage to his own family and also among his friends. So we do learn that sin has a horrific price to it that we usually do not see in the moment we consider it and act in an ungodly manner. Hopefully we see a reminder to ask ourselves, “Who is going to be hurt by the fallout of my sin?” This is a question we most definitely should ask - and allow its answer to warn us and frighten us so that we fear God and run from sin. But there is a second lesson we need to learn. Stumbling blocks will come - and anyone who has lived on this fallen earth knows that there will be many many times we will be hurt in one lifetime. The lesson we need to take from Ahithophel is to realize that nursing those hurts instead of giving them to God and forgiving others will destroy us. I do not want to minimize the pain and hurt Ahithophel felt. I do not want to given anyone the impression that such pain is easy to deal with in life. But the truth is that our pain, when not dealt with, will lead us toward unforgiveness and bitterness. Left to grow into a malignancy in our hearts - bitterness and unforgiveness will hurt us. The damage it will do within us is only going to grow over time. Ahithophel’s hurt and pain did turn into unforgiveness and bitterness in the end. It smoldered within his heart and turned a wise man into a fool who gave very wicked advice. It turned a man who served God early in his life into a man who lived with an unholy vendetta to kill the one who hurt him - and when that opportunity was taken from him - he killed himself.
To those who have been hurt badly by another - even possibly a leader in a church - I do not want to minimize your pain. It is very real. But remember that our Lord was betrayed and left alone at the cross. He knows every ounce of venom the world can try to inject with its bite into our hearts. He did not succumb to it - and even prayed, “Father, forgive them for they do not know what they are doing,” toward those who impaled him upon the cross. He even forgave Peter who denied Him and cursed vehemently as he did. He forgave the others who ran and left Him and who did not even stand with Him for one hour of prayer in the garden. Our Lord Jesus Christ has been betrayed an untold amount of times since then - even by our own indifference and unwillingness to speak and stand out for Him. And He forgives - and forgives - and forgives again. He has even given us His Spirit, by which He empowers us to draw on His life and power to forgive others. Bitterness and unforgiveness destroyed Ahithophel. Let us not learn or draw from him and his example when hurt - but rather let us die to ourselves and draw upon our Lord Jesus Christ and His life to forgive. | <urn:uuid:2bb9a3a6-6454-4fce-9263-c904f5f85f9c> | CC-MAIN-2020-45 | https://www.calvarychapeljonesboro.org/articles/category/root-of-bitterness | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894759.37/warc/CC-MAIN-20201027195832-20201027225832-00225.warc.gz | en | 0.985906 | 1,509 | 2.671875 | 3 |
The Internet of Things (IoT) is one of the hottest IT buzzwords of the moment. Yet the term is actually almost two decades old already. If IoT is not actually a new idea, what is the concept's history? And why is it suddenly trending now? Keep reading for an overview of the history of the Internet of Things, and what makes it a bigger deal today than ever.
Inventing the Internet of Things
Although you probably haven't heard much about IoT until recently, the terminology dates back to 1999. Kevin Ashton, co-founder of MIT's Auto-ID Center, is credited by most sources with coining the phrase "Internet of Things." (The acronym, IoT, appears to be a considerably later innovation; Wikipedia did not use the abbreviation until starting in 2009, although it contained an entry for Internet of Things since July 2007.) Once introduced, the term quickly entered widespread use, as this Google Ngram shows. (The result there suggesting that the term was used once in 1979 is an anomaly apparently based on erroneous metadata; the publication in question actually appeared later than Google thinks.)
The history of the phrase is significant because it shows that, although the concept of IoT may only have reached the masses in the last few years, it had a wide following among experts that stretches back to the early 2000s.
Also interesting is the fact that Ashton's idea of IoT focused on using radio frequency identification (RFID) technology to connect devices together. That was similar to but significantly different from today's IoT, which relies primarily on IP networking to let devices exchange a broad range of information. RFID tagging allows much more limited functionality.
Of course, Ashton's concept of an RFID-based IoT was not surprising at the time. In 1999 wireless networking as we know it today was still in its infancy, and cellular networks had not yet switched to a fully IP-based configuration. Under those conditions, it would have been much harder to conceive of an IoT in which all devices had unique IP addresses. (Plus, in the absence of IPv6, there weren't enough IP addresses to go around if all devices joined the Internet.) Because RFID would not have required IP addresses or actual direct Internet connectivity for each device, it would have seemed like a much cheaper and more feasible solution.
Building the IoT
In the event, device manufacturers put little stock in an RFID-based IoT. Instead, by June 2000, the world's first Internet-connected refrigerator, the LG Internet Digital DIOS, had appeared featuring a LAN port for IP connectivity. (The fridge had been under development since 1997, showing that the idea if not the name for IoT existed well before Ashton introduced the term in 1999.)
The concept expanded and saw more real-world implementation as the 2000s continued. In 2008 the IPSO Alliance formed as a collaboration of industry partners interested in promoting connected devices. That was a sign that big businesses, not just entrepreneurs and researchers, were growing interested in implementing IoT in production environments.
Today's IoT: Breaking with the Past, and the Importance of the Cloud
But it has only been in recent years that IoT has really become a reality on a massive scale. The IoT is no longer just about a handful of high-end Internet-connected appliances. Now, it's common for all types of devices, from TVs to thermostats to cars, to connect to the Internet.
What has changed since the 2000s to make this all possible? There are several key factors. They include the expansion of networking capabilities, the introduction of large-scale data analytics tools (which make it easier to manage and interpret data from IoT devices) and the creation of new standards, such as the Allseen Alliance's AllJoyn, which make it simpler for IoT hardware and software from different vendors to interact.
Perhaps more than anything else, however, the growth of the cloud has played a crucial role in making modern IoT possible. That's because the cloud provides a low-cost, always-on place for storing information and crunching numbers. Cheap, highly available cloud infrastructure makes it easy to offload storage and compute tasks from IoT devices to cloud servers. In turn, IoT devices can be cheaper, leaner and meaner.
Thanks to the cloud, your smart thermostat doesn't have to do much beyond upload some very basic data to your utility company's cloud, and download instructions you send it through the cloud for managing your home's temperature. It doesn't have to store the data itself. It does not even have to have a local management interface (although most thermostats do) if the manufacturer doesn't want. You can control the device solely through the cloud -- provided, of course, it has Internet connectivity.
Things were not so easy when LG was building an IoT refrigerator a decade ago. Then, the company could not count on an always-on, hugely scalable cloud to help manage the device. Instead, the fridge had to act more like a traditional computer.
Remaining IoT Challenges
For all the challenges that the cloud and other advances have helped to solve for IoT vendors, issues remain. One is a lack of universal standards. The AllJoyn framework is only one IoT standards framework; competing solutions exist, and without consensus standards are not very useful.
Another challenge is lack of infinite bandwidth and networking infrastructure. The more devices you place on the network, the more traffic your network pipes have to handle, and the more connections your switches have to manage. It's possible to expand network infrastructure, and that is what service providers are doing all the time. But it's a slow and costly process. In the absence of faster ways of expanding the network's capacity, this will remain a limiting factor for IoT's rate of growth.
Power is a problem, too. Since part of the advantage of IoT is the ability to manage a large number of devices spread over a wide area without building them into traditional infrastructure, being able to untether IoT hardware from a permanent power source is a requirement for realizing IoT's full potential. But the technology for doing that is not yet here. It's on its way, but it will take time before batteries in IoT devices can last for years, or local solar cells suffice to power a device indefinitely.
Last but certainly not least, security and privacy remain huge issues for IoT. IoT devices introduce a whole new degree of online privacy concerns for consumers. That's because these devices not only collect personal information like users' names and telephone numbers, but can also monitor when you are in your house or what you eat for lunch. Following the never-ending string of disclosures about major data breaches, consumers are wary of placing too much personal data in public or private clouds, with good reason. IoT vendors will need to work through these security issues before IoT devices reach their full potential.
Article by Talkin' Cloud, via The Var Guy: http://thevarguy.com/var-guy/iot-past-and-present-history-iot-and-where-its-headed-today?page=1 | <urn:uuid:67c7452e-aeb1-4343-8ef5-aed6cb8bc758> | CC-MAIN-2021-21 | https://www.datacenterknowledge.com/archives/2016/04/29/iot-past-and-present-the-history-of-iot-and-where-its-headed-today | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988955.89/warc/CC-MAIN-20210509032519-20210509062519-00447.warc.gz | en | 0.963287 | 1,444 | 2.890625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.