text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Resources for Education
The Federal Reserve Bank of Philadelphia and the Federal Reserve System provide resources to aid teachers in educating K-12 students about economics and personal finance.
- The Federal Reserve and You: Designed with classroom flexibility in mind, The Federal Reserve and You is a free video composed of seven segmented chapters that will walk your students through the purposes and functions of the Federal Reserve System and give them overviews of money and banking and the history of central banking in the United States. Our on-screen hosts explain it all with the help of detailed animation and interviews with Federal Reserve leaders.
- The Second Bank of the United States: A Chapter in the History of Central Banking: Outlines the origins and operations of the second Bank of the United States, the nation’s second attempt at central banking. (PDF, 3.80 MB, 14 pages)
- Benjamin Franklin and the Birth of a Paper Money Economy: Tells readers about Benjamin Franklin’s role in the debate about devising a system of paper money in the colonies and his monetary philosophy. (PDF, 4.24 MB, 12 pages)
- A Day in the Life of the FOMC: Learn more about the FOMC and the inner workings of the Federal Reserve's monetary policymaking body.
- History of Central Banking: Describes the history of central banking in the United States from 1791 through deregulation.
- Intersections: The Federal Reserve Bank of Philadelphia’s periodic newsletter, which includes lesson plans and timely information about resources and programs offered by the Reserve Bank.
- Keys to Financial Success: A comprehensive high school personal finance program.
- Lesson Plans: Lesson plans to assist K-12 teachers teach economics and personal finance in their classrooms.
- Money in Colonial Times: Describes the development of money in the American colonies and early national period.
- Symbols on American Money: This 16-page booklet looks at the various images and symbols that have been used on U.S. currency over the years. (PDF, 5.34 MB, 16 pages) | <urn:uuid:de8fd12f-b14c-4aaa-b0fa-5c131c2923ab> | CC-MAIN-2017-30 | https://www.philadelphiafed.org/education/teachers/resources/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424549.12/warc/CC-MAIN-20170723102716-20170723122716-00177.warc.gz | en | 0.901168 | 425 | 3.671875 | 4 |
This news release is available in German.
The common bacterium Streptococcus pyogenes is responsible not only for scarlet fever, a childhood disease presenting with characteristic skin rash, but also for many suppurative infections of the skin. The infection can be associated with serious consequences such as acute rheumatic fever and inflammation of the kidneys. In Germany, physicians usually prescribe penicillin, an antibiotic. In less-developed countries, penicillin is not always an option though. Firstly, penicillin is often not available and secondly, co-infections, i.e. concurrent infections, by another bacterium called Staphylococcus aureus occur and this microorganism is often no longer susceptible to the action of penicillin.
A group of scientists directed by Dr Patric Nitsche-Schmitz of the HZI entered into cooperation with the German National Reference Center for Streptococci in Aachen, Germany, to investigate if the antibiotic trimethoprim can be helpful in these scenarios. Trimethoprim inhibits an enzyme of folic acid metabolism called dihydrofolate reductase, which plays an important role in bacterial growth. Trimethoprim thus prevents bacteria from proliferating in the body. In the past, doctors advised against the use of this medication for treatment of streptococcal infections. The underlying reasoning was the wide-spread belief that the bacteria are already resistant to this agent, a misconception, as is becoming increasingly more evident. The reason for this mistake is that early studies used a culture medium that reduces the anti-microbial effect of trimethoprim.
The scientists from Braunschweig investigated samples from infected patients from Germany and India for resistance to trimethoprim. The majority of the samples were sensitive to the agent. "This shows that trimethoprim is indeed effective in many cases of Streptococcus pyogenes infection," Nitsche-Schmitz said.
The focus of his team was also on samples, in which the bacteria failed to respond to the agent. They discovered two types of resistance. "Spontaneous mutations can occur in the gene for dihydrofolate reductase rendering trimethoprim no longer able to attack the changed enzyme, which means it becomes ineffective," Nitsche-Schmitz explained. The team from Braunschweig detected a specific mutation in this gene in many samples, which renders streptococci resistant. In addition, bacteria can transfer copies of changed variants of the dihydrofolate reductase gene to other bacteria. This process called horizontal gene transfer allows resistance to spread very rapidly. The scientists found two genes of this type to be further causes of insensitivity.
The study shows that the antibiotic trimethoprim is a therapeutic option for Streptococcus pyogenes infections in some geographical regions of the world. The frequency of resistance is much lower than previously believed and the medication is inexpensive, stable and effective in Staphylococcus aureus co-infections. "However, it is like a sword that can loose its sharpness quickly," Nitsche-Schmitz said. "We found three causes for the rapid spread of resistance. It is important that trimethoprim, like all antibiotics, is not prescribed without need and that patients take the agent in accordance with the instructions given."
René Bergmann, Mark van der Linden, Gursharan S. Chhatwal and D. Patric Nitsche-Schmitz
Factors that cause trimethoprim resistance in Streptococcus pyogenes
Antimicrobial Agent and Chemotherapy, 2014, doi: 10.1128/AAC.02282-13
The research group "Microbial interactions and processes" investigates the interplay of micro-organisms in complex communities made up of millions of cells and hundreds or even thousands of species. The group employs new methods for the identification of bacteria and the characterisation of bacterial activities in its work.
The Helmholtz Centre for Infection Research (HZI)
Scientists at the Helmholtz Centre for Infection Research in Braunschweig, Germany, are engaged in the study of different mechanisms of infection and of the body's response to infection. Helping to improve the scientific community's understanding of a given bacterium's or virus' pathogenicity is key to developing effective new treatments and vaccines. | <urn:uuid:ff9f3f41-5539-4d00-a5c7-a6b0a8116578> | CC-MAIN-2018-39 | https://www.eurekalert.org/pub_releases/2014-03/hcfi-coa031914.php | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159938.71/warc/CC-MAIN-20180923232129-20180924012529-00225.warc.gz | en | 0.9333 | 916 | 3.625 | 4 |
Elliot's Monographs: A Magnificent Legacy
by AMNH on
The following excerpt from Natural Histories: Extraordinary Rare Book Selections from the American Museum of Natural History Library (Sterling Signature, 2012), edited by Tom Baione, the Museum Library’s director, highlights the role of rare 19th- and 20th-century monographs in advancing science. It was written by Joel L. Cracraft, chair of the Division of Vertebrate Zoology.
Daniel Giraud Elliot was one of the most important American ornithologists and naturalists of the nineteenth century. Despite his importance and stature, there is remarkably little recorded about his life’s details other than what he wrote and spoke about his professional life in 1914, in an unpublished reminiscence and an address to the Linnean Society of New York.
Elliot’s professional accomplishments were anything but obscure, however. He was a scientific founder of the American Museum of Natural History in 1869, and his personal collection of North American birds included the first specimens accessioned into the Museum. Elliot made numerous trips across the globe for study and collecting, generally being away for multiple years at a time, with his longest absence being a decade.
Based on these travels, he published hundreds of papers, including multiple folio-size monographs on groups of mammals and birds.
In his day, few, if any, of his peers had his knowledge and experience with the birds and mammals of the world. Elliot became famous as a monographer of families of birds and mammals. He synthesized previous taxonomic knowledge about the species in each group and added observations and new interpretations based on specimens housed in major museums.
Elliot’s first love was birds, and he produced large synthetic works on pittas, pheasants, grouse, hummingbirds, and birds of paradise. Along the way he also published a folio-size monograph on cats. In 1894, he moved to the Field Museum of Natural History in Chicago as its curator in the Department of Zoology, shifting his attention to mammals. After he left that museum in 1906, he spent the next two years traveling in Europe and Asia studying primates, both in collections and in the field.
Next, back in New York at the American Museum of Natural History, his investigations eventually culminated in his 1913 three-volume taxonomic monograph A Review of the Primates. During Elliot’s time, folio-size, lavishly illustrated scientific monographs were primarily for the well-to-do and not meant for general distribution. They were funded by the wealthy and published for them.
Elliot did not invent the monograph—indeed, in his youth, he was influenced by the works of John James Audubon—but he elevated its importance, combining the emerging field of wildlife art with contemporary science. Illustrative of that was A Monograph of the Paradiseidae [or Birds of Paradise], published in London in 1873. It was “printed for the subscribers, by the author,” and among those 49 patrons were many dukes, counts, earls, bankers, such as Baron A. de Rothschild, and a handful of institutional libraries.
In 1887, Elliot’s large ornithological library was purchased for the American Museum of Natural History by Cornelius Vanderbilt and Percy Pyne, and it was presumably at this time that this volume came to the Museum. Through a gift by Elliot’s daughter Margaret in 1927, the American Museum of Natural History is also indeed fortunate to have the original watercolors by [Joseph] Wolf [1820–1899], along with many of his original wash drawings of these magnificent birds.
A version of this story appears in the Spring 2013 issue of Rotunda, the Member magazine. | <urn:uuid:55d9adda-f0cf-4022-bcf1-1d7b02806ad5> | CC-MAIN-2016-44 | http://www.amnh.org/explore/news-blogs/research-posts/elliot-s-monographs-a-magnificent-legacy/(tag)/5968 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00549-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.974838 | 787 | 2.734375 | 3 |
Tree to 4 m tall, trunk to 30 cm in diameter Leaves: opposite, 4 - 9 cm long, 3 - 4.5 cm wide, elliptic to narrow egg-shaped with arching (arcuate) veins, non-toothed, hairs rough above and soft beneath. Flowers: borne in loose, round-topped clusters, each with four thin, white petals. Fruit: fleshy with one or two center seeds (drupe), borne on red stalks, white, 6 - 8 mm wide. Bark: reddish brown, shallowly furrowed and scaly. Twigs: brown to purplish or gray, smooth or slightly hairy. Buds: egg-shaped, flattened, pointed, hairy.
Similar species: Cornus drummondii has the arching leaf venation characteristic of the genus. It can be distinguished from other dogwoods because it is a tree that blooms from late June to early July, has brown to purplish or gray stems, leaves with rough hairs above and soft hairs beneath, and clusters of white fruit on red stalks.
Flowering: late June to early July
Habitat and ecology: Fields, meadows, and along the edges of woods and prairies. This species used to be rare in the Chicago Region. It is planted in landscapes to prevent soil erosion, and now many spontaneously occurring specimens are actually escapes.
Occurence in the Chicago region: native
Notes: Tool handles are made from the strong wood. Birds and small mammals use the tree for food and shelter.
Etymology: Cornus comes from the Latin word, cornu, meaning horn, referring to its hard wood. Drummondii is named after Scottish plant explorer, Thomas Drummond (1780 - 1835).
Author: The Morton Arboretum
From Flora of Indiana (1940) by Charles C. Deam
Infrequent throughout the state except in the northern tier of counties where it may be absent or rare. Banks of streams, borders of ponds and lakes, in wet woods, and along moist roadsides.
Shrubs or occasionally small trees to 6 m; twigs scabrous, olive to pinkish-brown, with white or tan pith; old bark gray, sometimes fissuring; lvs lance-ovate to elliptic or broadly ovate, mostly 5-8 cm, commonly abruptly acuminate, broadly cuneate to subcordate at base, scabrous-strigose above and evidently rough to the touch, minutely papillose-whitened beneath and with appressed or spreading hairs often 0.5 mm; lateral veins 3 or 4(5) on a side, tending to arise from the lower half of the blade; infl flat or convex; fr white (light blue), 4-8 mm, on red pedicels; 2n=22. Wet woods and streambanks; O. and s. Mich. to s. Wis., Io., and Neb., s. to Ga. and Tex. May, June. (C. priceae)
Gleason, Henry A. & Cronquist, Arthur J. 1991. Manual of vascular plants of northeastern United States and adjacent Canada. lxxv + 910 pp. | <urn:uuid:71d901dc-c958-4ea6-bfb5-d7601633926b> | CC-MAIN-2020-29 | http://swbiodiversity.org/seinet/taxa/index.php?tid=79004&taxauthid=1&clid=18 | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657151761.87/warc/CC-MAIN-20200714212401-20200715002401-00180.warc.gz | en | 0.906398 | 681 | 3.09375 | 3 |
Segmental Pavers Career Video
Description: Lay out, cut, and place segmental paving units. Includes installers of bedding and restraining materials for the paving units.
Building with materials that are both beautiful and sturdy, masonry workers create structures that last. Masonry workers, also known as masons, use weatherproof bricks, stones, and concrete to build new homes and buildings, and to maintain the historic structures we want to preserve. Masons specialize in different materials and structures: Brickmasons and blockmasons build and repair walls, chimneys, and other structures. Some specialize in brickwork for industrial facilities that can tolerate intensely high temperatures. Cement masons and concrete finishers lay walls and sidewalks, and form the pieces that make up heavily-used roads and buildings. Segmental pavers install interlocking brick walkways, patios, and walls. Stonemasons carefully cut and select stone to create patterns as they build walls, unique fireplaces, and building exteriors. Terrazzo workers add fine marble chips into the finish of cement or resin to create decorative walkways and floors. Masonry work is fast paced and strenuous. It includes heavy lifting, using sharp tools, and working from scaffolds. In addition to strength and stamina, masons need the ability to see subtle color variations and envision how stones will fit together to build attractive and stable structures. Work hours are generally full time, with some overtime to meet deadlines. Cold or rainy weather can stop work. After completing a high school education, most masons learn on the job or through a 3- to 4-year apprenticeship. | <urn:uuid:916bb47b-858c-4b90-986c-6329d57396cc> | CC-MAIN-2018-39 | https://www.careeronestop.org/videos/careeronestop-videos.aspx?videocode=47409100 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156513.14/warc/CC-MAIN-20180920140359-20180920160759-00479.warc.gz | en | 0.91675 | 332 | 3.15625 | 3 |
There are health risks linked to other chemicals found in vaping products. Vaping substances have fewer and different chemicals than in tobacco products. We are still learning more about how vaping affects health. The long-term health impacts of vaping are unknown. However, there is enough evidence to justify efforts to prevent the use of vaping products by youth and non-smokers.
Can you spot the ten (10) hidden danger words related to vaping? Here’s a hint – fill in the blanks in the text below:
Did you know vaping can cause l__g _a__g_? It can expose you to _ar_f__ _he___al_ like _or___d__y_e and ac____i_ or metal particles like ___k__, t__ and al_____m. You don’t want any of these in your lungs. The majority of vaping liquids available in Canada contain n__o___e. The long-term safety of inhaling substances like p_o_y__n_ __y___ and _____rol are unknown and continues to be assessed.
Did you know vaping can cause lung damage? It can expose you to harmful chemicals like formaldehyde and acrolein or metal particles like nickel, tin and aluminum. You don’t want any of these in your lungs. The majority of vaping liquids available in Canada contain nicotine. The long-term safety of inhaling substances like propylene glycol and glycerol are unknown and continues to be assessed. | <urn:uuid:53cc0006-c789-46d1-aba7-99e3cad6b20f> | CC-MAIN-2019-43 | https://considertheconsequences.ca/online-activities/hidden-dangers/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986684425.36/warc/CC-MAIN-20191018181458-20191018204958-00079.warc.gz | en | 0.894453 | 310 | 2.875 | 3 |
5 edition of Women"s Periodicals in the United States found in the catalog.
November 30, 1996
by Greenwood Press
Written in English
|Contributions||Kathleen L. Endres (Editor), Therese L. Lueck (Editor)|
|The Physical Object|
|Number of Pages||560|
Historical womens periodicals provide an important resource to scholars interested in the lives of women, the role of women in society and, in particular, the development of the public lives of women as the push for womens rightswoman suffrage, fair pay, better working conditions, for examplegrew in the United States and England Author: Melanie Thorn. Historical women's periodicals provide an important resource to scholars interested in the lives of women, the role of women in society and, in particular, the development of the public lives of women as the push for women's rights--woman suffrage, fair pay, better working conditions, for example--grew in the United States and England.
In commemoration of Women’s History Month and Suffrage , our series will offer informative and inspiring presentationsfrom various perspectives about the Suffrage Movement that led to the ratification of the Nineteenth Amendment on Aug This event will take place on Zoom. Co-sponsored by the League of Women Voters SF. Women and Social Movements in the United States, Women, Enterprise & Society. Women in America, Women in History at the Clements Library, University of Michigan, Ann Arbor. Women in the United States in the 19th Century. Women of Color Web Sites. Women Pioneers in American MemoryAuthor: Lisa Bier.
An address on woman's rights: delivered before the people's Sunday meeting, in Cochituate Hall, on Sunday afternoon, Oct. 19th, No. 3 in a vol. with binder's title: Miscellaneous speeches. Also available in digital form on the Library of Congress Web site, and on microfilm (Microfilm O reel , noE). LAC tnb update (1. The book that set off the women's movement in the s was written by Betty Friedan subject(s): Womens' periodicals, Mexican, Womens' .
Modeling in clay (Fun to do)
Racing round the island
Directory Obsolete Secur-97
Tracer-dilution experiments and solute-transport simulations for a mountain stream, Saint Kevin Gulch, Colorado
pressure transducer handbook.
geology of Ben Nevis and Glen Coe and the surrounding country
benefit-cost analysis of urban redevelopment
Cooperative long term finance
Consumer redress mechanisms
Home Alone 2
Railways and roads in pioneer development overseas
Humble remonstrance to the Kings most excellent majesty
sufferings of our Lord Jesus Christ
Someone, no one
Women's Periodicals in the United States: Social and Political Issues (Historical Guides to the World's Periodicals and Newspapers) [Endres, Kathleen L., Lueck, Therese] on *FREE* shipping on qualifying offers.
Women's Periodicals in the United States: Social and Political Issues (Historical Guides to the World's Periodicals and Newspapers)Cited by: 8. This reference book is a guide to women's consumer magazines published in the United States. Included are profiles of 75 magazines read chiefly by women.
Each profile discusses the publication history and social context of the magazine and includes bibliographical references and a summary of publication : Hardcover. Women's periodicals have a long history of treating social, political, and economic issues.
Through alphabetically arranged entries on individual publications, this reference traces the rich diversity of approaches that these periodicals have taken.
KATHLEEN L. ENDRES is a professor in the School of Communication at the University of Akron. She is the editor of Trade, Industrial, and Professional Periodicals of the United States () and coeditor of Women's Periodicals in the United States: Consumer Magazines (), both published by Greenwood Press.
THERESE L. LUECK is an associate professor in the School. Get this from a library. Women's periodicals in the United States: consumer magazines. [Kathleen L Endres; Therese L Lueck;] -- Throughout the 19th and 20th centuries, women created numerous periodicals to address social, political, and economic issues.
Many of these were short-lived newsletters, while others continue to be. This reference book is a guide to women's consumer magazines published in the United States. Included are profiles of 75 magazines read chiefly by women.
Each profile discusses the publication history and social context of the magazine and includes bibliographical references and a summary of publication statistics. COVID Resources. Reliable information about the coronavirus (COVID) is available from the World Health Organization (current situation, international travel).Numerous and frequently-updated resource results are available from this ’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle.
This is a list of United States magazines. This is a dynamic list and may never be able to satisfy particular standards for completeness.
You can help by expanding it with reliably sourced entries. This article is part of a series on the. United States of America. Race and ethnicity. Arts and literature. World Heritage Sites. United States portal. : Women's Periodicals in the United States: Consumer Magazines (Historical Guides to the World's Periodicals and Newspapers) () by Endres, Kathleen L.; Lueck, Therese and a great selection of similar New, 5/5(1).
Women's rights -- United States -- Periodicals Filed under: Women's rights -- Periodicals The Amazon (Milwaukee-based feminist magazine, ) (partial serial archives). Encompassing more than 55 individual periodical titles from libraries in the United States and Europe, this collection provides an in-depth view of women's history over years.
The periodicals covered major issues, including equal rights, women in business, women in the military, reproductive freedom, the world peace movement and more. Women's Periodicals in the United States: Consumer Magazines: Endres, Kathleen L., Lueck, Therese: Books - or: Kathleen L. Endres, Therese Lueck.
Women’s Periodicals in the United States: Social and Political Issues is a collection of alphabetical entries written by different scholars on various women’s publications that existed in the 19th and 20th centuries.
For each periodical that it covers, this book provides history and background information, circulation numbers, and a. Filed under: Women -- United States -- Periodicals. The Lady's Friend, ed. by Henry Peterson (partial serial archives) Filed under: World War, -- Women -- Periodicals.
War Work Bulletin, by Young Women's Christian Association of the U.S.A. (partial serial archives). As the first in the Women’s Studies archive, this collection traces the path of women’s issues from past to present—pulling primary sources from manuscripts, newspapers, periodicals, and more.
It captures the foundation of women’s movements, struggles and triumphs, and provides researchers with valuable insights. A Black Women's History of the United States reaches far beyond a single narrative to showcase Black women's lives in all their fraught complexities.
Berry and Gross prioritize many voices: enslaved women, freedwomen, religious leaders, artists, queer women, activists, and women who lived outside the law. The women's health movement has origins in multiple movements within the United States: the popular health movement of the s and s, the struggle for women/midwives to practice medicine or enter medical schools in the late s and early s, black women's clubs that worked to improve access to healthcare, and various social movements.
This innovative volume presents for the first time collective expertise on women's magazines and periodicals of the long eighteenth century. While this period witnessed the birth of modern periodical culture and its ability to shape aspects of society from the popular to the political, most studies have traditionally obscured the very active role women's voices and women readers.
United States About Blog Granta is one of the world's most respected literary magazines, acclaimed for the quality of its writing and for its mix of established and emerging authors. Published quarterly in book form Granta is respected around the world for its eclectic mix of journalism, fiction, memoir and photography.
Women's magazines have long posed a mystery to me. I first became intrigued when I reviewed issues of Good Housekeeping and Delineator from the s and s for a project concerning investigative reporter Vera Connolly, who published her articles in mass circulation women's journals. Some items in these early twentieth-century titles seemed familiar (advice columns.
SERBIB/SERLOC merged record Woman's journal and suffrage news (DLC)sn (OCoLC) LAC tnb update (2 .History of publishing - History of publishing - Magazine publishing: Though there may have been published material similar to a magazine in antiquity, especially perhaps in China, the magazine as it is now known began only after the invention of printing in the West.
It had its roots in the spate of pamphlets, broadsides, ballads, chapbooks, and almanacs that printing made possible.Explore our list of Women's History - Teens Books at Barnes & Noble®. Receive FREE shipping with your Barnes & Noble Membership.
Due to COVID, orders may be delayed. | <urn:uuid:e6601bf8-bbfc-4cfc-a2f5-e03b298a032b> | CC-MAIN-2020-45 | https://lepasetisy.hotellewin.com/womens-periodicals-in-the-united-states-book-7840ea.php | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880038.27/warc/CC-MAIN-20201022195658-20201022225658-00356.warc.gz | en | 0.919436 | 1,982 | 2.6875 | 3 |
The language of love, expressed in lockets: as articulated, for example, by Queen Victoria, Queen of the United Kingdom of Great Britain and Ireland from 1837 to 1901, and her prince consort, Albert. Numerous items of jewellery containing miniature portraits and locks of hair document the “royal love affair”. Another famous locket wearer was Eugénie, wife of Napoleon III, from 1853 to 1870 Empress and the last Queen of France. Lockets also possessed a highly private character in earlier times and must be sought out in both the description of paintings and in literature. The artistic miniature pictures inside – the tiny portraits were painted prior to the invention of photography – were personal testaments to love and bonds and consequently remained unmentioned. Locks of hair obtained from loved ones and worn at the breast in reminiscence are also an intimate pledge. | <urn:uuid:945a0902-c7e4-451f-8b08-ffb9092102c6> | CC-MAIN-2022-05 | https://www.victor-mayer.com/en/lockets/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304835.96/warc/CC-MAIN-20220125130117-20220125160117-00627.warc.gz | en | 0.961057 | 177 | 2.65625 | 3 |
Mead may conjure up images of Renaissance fairs or Germanic folk tales, but it is enjoying renewed popularity among imbibing aficianados. Also known as honey wine, this tipple is made from fermented honey and water, sometimes with added yeast. You can produce countless style and variations—from dry to sweet and anything in between, including sparkling—by tinkering with the ingredient proportions and the fermentation process. And just as a wine’s notes are dependent on the terroir of its grapes, the flavor of a mead changes based on the flowers that honeybees use to pollinate. What else makes mead so special?
1. Some claim that mead was the first alcoholic drink, predating wine and beer. The earliest evidence of mead production dates back to 7000 BC from pottery vessels in northern China. Historically, mead was something of a global beverage: it was consumed by Greek gods on Mt. Olympus, Vikings, and African bushmen. In fact, mead was drank before men knew how to harness the meadmaking process; mead fermented naturally on its own when a beehive combined with rainwater and yeast in the air. Mead was a tipple of choice from these ancient times through the Late Middle Ages, when honey was supplanted by cheaper sugars, which led to a rise in ales.
2. Norse mythology tells of a “Mead of Poetry” that turned anyone who drank it into an instant scholar, able to recite items from memory and solve intractable quandaries. The legend goes that after a war between two rival factions, the gods sealed a truce by spitting into a bowl. This spit formed a new god, Kvasir, who was renowned for his intelligence. Enemies later killed Kvasir, mixed his blood with honey and let it ferment to form a mead that was said to provide poetic inspiration to anyone who drank it.
3. Mead halls play a prominent part in the epic poem Beowulf. The monster Grendel terrorized one of these noisy, communal gathering places, which prompted the warrior Beowulf to set off and confront Grendel, finally killing him after a battle.
4. The term ‘honeymoon’ can be traced to the medieval tradition of drinking this honey wine for a full cycle of the moon after marriage. Mead was thought to be an aphrodisiac, and if it was consumed by newlyweds, offspring would hopefully soon follow. A bride’s father would often include enough mead in her dowry to last for a month.
5. Though mead faded from prominence after the Middle Ages, many European monasteries continued to make it, most famously the Holy Island of Lindisfarne off the coast of England. Craft mead is now poised to make a comeback, although it hasn’t yet been commercialized on a large scale. There are at least 165 meaderies in the U.S., according to the American Mead Makers’ Association (AMMA). Why is mead so alluring now? It possesses a mysterious, ancient aura, and it’s also not widely available in bars, making it more of an exclusive drink for those in the know. | <urn:uuid:bf192d96-e56e-41c9-a1b0-54e490546ef0> | CC-MAIN-2017-17 | http://style.time.com/2013/08/02/5-essential-things-you-should-know-about-mead/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.60/warc/CC-MAIN-20170423031202-00559-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.971966 | 670 | 3.109375 | 3 |
Konxa are thin and strong, with bronze skin and long curly hair only on their heads. This hair is bleached by the sun, sand, and salt, being light on top and darker underneath. While not very tall, they are swift and strong, and the risk in attacking them is often underestimated.
Konxa are the sea people, at home in the waves and shores. They are artists and artisans, carvers and builders. They can communicate in whistles over long distances, and across the waves. When they are attacked, they coordinate by their whistling language to great effect.
Attempts to trick or confuse are at -1.
Diver - You have practised breath holding, and can dive deep to find the natural and unnatural treasures beneath the water's surface. Your vision underwater is nearly as good as on land. Your knowledge of the creatures of the deep can help you, and even roughly communicate with the most intelligent of them on occasion. Constitution +1
Skimmer - You excel at the canoes and waveboards that the Konxa use to survive and prosper. You use a barbed spear with a rope to hunt water creatures and bring them to the surface. You know and can predict the weather and the tides. Attack +1
Speaker - Among the Konxa, your whistle is prominent. You are the one you calls to the others across the water, and to other tribes along the coast. Your 'words' are tru and clear. You hear the others and communicate the news from afar to your people. Derivation +1 | <urn:uuid:e7c40f46-3cc9-46a1-bfe9-c37c1c48894c> | CC-MAIN-2020-34 | http://www.gadgeteer.net/twilightsrise/doku.php?id=konxa | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738878.11/warc/CC-MAIN-20200812053726-20200812083726-00332.warc.gz | en | 0.953543 | 320 | 2.671875 | 3 |
Logic and cost have never been, and should never be, considerations for sending man into space on public dime. As with creative works, the value of placing a man on the moon cannot be seen through a pragmatist’s lens.
In 1924, mountaineer George Mallory perished while summiting Mount Everest. When asked why he was attempting to climb Everest before his fatal effort, Mallory famously responded, “Because it is there.” If you were to ask the several hundred climbers who attempt the climb each year if logic were a motivating factor, you’d encounter hundreds of blank stares.
Man’s desire to do the illogical, absurd and impractical has purchased a fair number of grave plots and one-way tickets. Our desire to venture into space has, combining flight and testing incidents, resulted in well over 100 fatalities—some broadcast before millions, others engrained in the memory of a few.
In a March 1 column, Michael Hiltzik of the Los Angeles Times took President Trump to task for his commitment to send humans back into space and eventually to Mars. Hiltzik made compelling arguments to support his case. Aside from the traditional economic rationale, Hiltzik relied on scientific reasoning, suggesting “placing humans on a space mission makes it so much more expensive than an unmanned flight that some elements of the mission get jettisoned — and those are almost always scientific projects.”
It is very sad to see what @BarackObama has done with NASA. He has gutted the program and made us dependent on the Russians.
— Donald J. Trump (@realDonaldTrump) August 27, 2012
Looking at public expenditures for manned space flight will never result in support. In 1998, each launch of a U.S. space shuttle cost taxpayers $420 million. In 2014 NASA had actual expenditures of $17.6 billion, with the 2016 budget earmarking $8.51 billion of an $18.5 billion budget for “Human Exploration Operations”. For perspective, in 2014, the Department of Defense had a budget of $501.7 billion, up from $384.5 billion in 2000.
Clearly, programs for manned space flight cannot be funded at significant cost to national defense or in favor of programs for the study of climate change and natural science. Yet, if the federal budget is untangled and clarified, it seems unlikely that the funds needed to make a concerted effort to return to space would be nonexistent.
This would be part of a larger shift from a defense-centric budget toward one aiming to protect the ecosystem, promote scientific gains and celebrate arts and creation. Putting our taxpayer dollars behind these ventures instead of machoism and posturing would pay dividends for world stability.
Some would argue if man is to return to space in a revolutionary way, it should be up to private corporations to fund the venture. While private corporations, such as Elon Musk’s SpaceX have taken over much of the unmanned and cargo missions left by the vacuum of NASA’s budgetary restrictions, Musk has repeatedly alluded to his desire to send humans to space as well. Last month the entrepreneur announced plans to have human passengers orbit the moon by next year.
Though Musk and perhaps Jeff Bezos have deep enough coffers to fund these operations, manned space flight should be a public effort. Fields where loss is guaranteed and gain is intangible most often belong to the public. Why? Because without public backing, space travel would struggle to gain support.
To physicists, many in the scientific community and Hiltzik, these are only public relations campaigns meant to engage the public in NASA’s work. Isn’t that valuable? When President Kennedy announced his intention to send a man to the moon, he spoke of not only the space race but also the need to attempt the impossible. We don’t grow up hoping to control the rover wandering around Mars looking for samples and sending back grainy pictures. We aspire to be the astronauts aboard the space shuttle.
Moving forward, the myth of manned space flight as a grand scientific endeavor should be scrapped in favor of reality. Why are we sending humans into space, to the moon and on to Mars? Because we want to. Because we can. Because these things inspire. Inspiration is invaluable in this morbid, death-spiral of a world.
Genuine inspiration, whether in art or the image of a human conquering the dark abyssal reaches of our solar system, is essential to our existence. | <urn:uuid:169d5887-839e-450a-bcd5-f5cf61dd7e58> | CC-MAIN-2021-25 | https://dailycampus.com/2017/03/07/2017-3-7-funding-space-flight-for-the-sake-of-exploration-and-inspiration/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487630081.36/warc/CC-MAIN-20210625085140-20210625115140-00406.warc.gz | en | 0.948668 | 919 | 2.71875 | 3 |
Geographical, cultural, and monetary barriers that keep people from receiving health care are like ’toxic cloud,’ speaker says
Thursday, September 15, 2005
TYLER -- Imagine a toxic cloud smothering parts of the United States, killing people. But those dying are poor, are black or Hispanic or Native American, don’t speak or understand English very well, can barely read, or live in small rural communities without reliable transportation.
Geographical, cultural, and monetary barriers to receiving adequate health care in the United States have the same effect as such a toxic cloud, said Marsha Regenstein, Ph.D., vice president for research at the National Association of Public Hospitals in Washington, D.C. She spoke Thursday during the first day of "The ABCs of Health Disparities: Access, Behavior, Costs," a conference sponsored by The University of Texas Health Science Center at Tyler at the TASCA Ornelas Activity Center in Tyler.
A recent study showed that, if African-Americans in the United States had enjoyed the same improvements in health care that whites did from 1991-2000, more than 886,000 lives could have been saved, Dr. Regenstein said. Because of racial health disparities, the study estimated just 176,633 lives were saved during the decade, she said. The study’s results were published in 2004 in the American Journal of Public Health.
"I think that what’s happened in New Orleans is a health disparity," Dr. Regenstein said, referring to the death and devastation wreaked by Hurricane Katrina and the inadequate response to that disaster. Many residents left behind in the flooded city were African-Americans who lived in low-income neighborhoods that were the most vulnerable to flooding.
"Health disparities are pervasive. They affect all parts of the country and all types of services," Dr. Regenstein told the crowd of about 100 people. Still, there’s not a lot of information about how much money the unequal delivery of health care costs the United States.
"I think there’s a lot of bang for the buck when you address chronic conditions, especially those such as diabetes, asthma, and HIV/AIDS" she said. But there’s no guarantee ending health disparities would reduce the total amount of money spent on health care.
While most medical professionals recognize that health disparities exist, they don’t acknowledge their role in them. "I think the individual provider has not made the leap that he or she might individually contribute to these disparities, because that’s an uncomfortable position to be in," Dr. Regenstein said.
Christie Osuagwu, director of Community Outreach and Health Disparities at UTHSCT, said minorities aren’t the only people affected by unequal access to health care.
"There are many whites who face health disparities because they live below the poverty line. Poverty is a baseline for health disparities," said Osuagwu, a nurse practitioner who has a master’s degree in public health.
Dr. Paul McGaha, regional director of the Texas Department of State Health Services (TDSHS), spoke of the health care needs of Hurricane Katrina evacuees.
"We have a new health disparity in our own back yard. Our population has increased by thousands. These are people who came (to East Texas) without a medical history, without medications," Dr. McGaha said, praising the volunteers who have mobilized to take care of evacuees.
"UT Health Science Center has stepped up to the plate and helped enormously. That kind of response has been happening all over East Texas, in Gregg County, in Nacogdoches County," he said.
The increase in the number of economically disadvantaged people using public health care will strain local resources, Dr. McGaha said.
"It will take a major investment by all, including the medical and health-care providers, to address this. Our population in Tyler increased 2 or 3 percent. That’s going to cause some issues. This is a good opportunity to help our friends in need, and to assess the delivery of health care, not only to these displaced people, but also to our local population," he said.
Dr. McGaha and Osuagwu spoke in place of Kimberly McCoy-Daniels, director of the Office for the Elimination of Health Disparities at the TDSHS. McCoy-Daniels was unable to attend the conference due to a sudden illness.
Today, UTHSCT President Dr. Kirk A. Calhoun and UT System Executive Vice Chancellor for Health Affairs will speak on, respectively, geriatric health disparities and health disparities in America. | <urn:uuid:8533ea31-c03e-4897-8787-a316b0abbd0b> | CC-MAIN-2015-14 | http://www.uthct.edu/newsinfo/release.asp?id=56 | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296169.46/warc/CC-MAIN-20150323172136-00242-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.968101 | 969 | 2.71875 | 3 |
Risk factors for injuries in young children in four developing countries: the Young Lives Study
Objective: To assess the occurrence of child injury in four developing country settings and to explore potential risk factors for injury.
Methods: Injury occurrence was studied in cohorts of 2000 children of age 6–17 months at enrolment, in each of Ethiopia, Peru, Vietnam and India (Andhra Pradesh). Generalized estimating equation models were used to explore potential risk factors for child injury.
Results: Occurrence of child injury was high in all countries. Caregiver depression emerged as a consistent risk factor for all types of injury measured (burns, serious falls, broken bones and near-fatal injury) across all countries. Other risk factors also showed consistent associations, including long-term child health problems, region of residence and the regular care of the child by a non-household member.
Conclusions: This report provides further evidence of the importance of childhood injury in developing countries and emphasizes the importance of including infants in injury research and prevention strategies. It provides strong evidence of an association between caregiver mental health and child injury risk and contributes to the limited knowledge base on risk factors for child injury in developing countries.
Tropical Medicine and International Health (2006) 11 (10): 1557–1566 [DOI: 10.1111/j.1365-3156.2006.01708.x] | <urn:uuid:b95fa80d-f572-48e3-a56c-f32a279dc029> | CC-MAIN-2017-22 | https://www.gov.uk/dfid-research-outputs/risk-factors-for-injuries-in-young-children-in-four-developing-countries-the-young-lives-study | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607998.27/warc/CC-MAIN-20170525044605-20170525064605-00592.warc.gz | en | 0.944864 | 287 | 2.65625 | 3 |
WASHINGTON (CBS WASHINGTON) — Less than one-in-four American teens has proficient writing skills – even with use of spell check and computers.
According to the National Assessment of Educational Progress writing test, only a quarter of eighth and 12th grade students had solid writing abilities. For the 2011 exam, more than 50,000 students were tested to get a nationally representative sample. Laptops were brought into public and private schools across the US as it was the first year the test was administered via computer.
Twenty-four per cent of students at each grade level were able to write essays that were well developed, organized and had proper language and grammar. Three per cent scored as advanced and the remaining students had just partial mastery of these skills.
“It is important to remember this is first draft writing,” Cornelia Orr told The Daily Mail. She is the executive director of the National Assessment Governing Board, which administers the Nation’s Report Card tests.
“They did have some time to edit, but it wasn’t extensive editing,” she added in comments to the Associated Press.
Students who took the writing test inn 2011 had an advantage that previous test takers did not: a computer with spell-check and thesaurus.
Previously, students taking the National Assessment of Educational Progress (NAEP) writing test had to use pencil and paper, but with changes in technology, and the need to write across electronic formats, the decision was made to switch to computers.
Orr said students use technology and tools like spell-check on a daily basis. “It’s as if years ago we had given them a pencil to write the essay and took away the eraser,” she said.
Orr told the Daily Mail that word processing tools alone wouldn’t result in significantly better writing scores if students didn’t have the core skills of being able to organize ideas and present them in a clear and grammatical fashion.
The results at both grade levels showed a continued achievement gap between white, black, Hispanic and Asian students.
At the eighth grade, Asian students had the highest average score, which was 33 points higher than black students on a 300-point scale. At the 12th grade, white students scored 27 points above black students.
There was also a gender gap, with girls scoring 20 points higher on average than boys in the eighth grade and 14 points higher in 12th grade.
The NAEP is a congressionally authorized project of the National Center for Education Statistics (NCES) within the Institute of Education Sciences of the U.S. Department of Education. | <urn:uuid:b1268abe-ccf3-4565-807a-31fc6e6cba3a> | CC-MAIN-2017-09 | http://washington.cbslocal.com/2012/09/18/despite-spell-check-less-than-a-quarter-of-teens-are-proficient-writers/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00014-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.97763 | 545 | 2.703125 | 3 |
This is a must-have book to study, learn and revise using various innovative techniques, including mind mapping. Teaching is often delivered in a way that best suits the learning style of those teaching rather than the recipient. This book provides a first step to understanding your own unique and most effective learning strategies. It includes illustrations on how to use and PowerPoint training tools. Easy to understand, comprehensive and rigorously tested. Includes: how to discover how you learn best; the importance of mind mapping - a powerful learning tool; and How to boost memory. The author introduces a range of strategies to achieve the goal of becoming a more effective learner, for example steps: select strategies and tips that appeal to you; try out each one, ideally a few times; evaluate their effectiveness (see whether they work); practise the ones that work; and savour your success! Part one of the book deals with understanding that each person is unique and it is important therefore to understand that learner styles will differ, but all are valid. It provides methods to examine and understand personal and emotional strengths and then apply that to identifying study skill strengths. There are activities that identify learning preferences and how to maximise on this discovery. Clearly understanding yourself is the first step to working out the very best way to work. How to use the mind-mapping tool to good effect is explored in detail with many examples and clear illustrations. The second part of the book explores how to apply this new found knowledge and challenges the reader to really examine their attitude to themselves and to learning; how to use this knowledge in a positive way to improve and really enjoy the learning experience. Activities for motivation, attention, creating a suitable learning environment, avoiding distraction and removing stress. This unique book focuses exclusively on learners and their learning. It includes a range of activities especially designed to empower the learner with knowledge about the variety of ways in which people learn, taking the reader on a positive and rewarding journey of self-discovery. | <urn:uuid:b45b431b-a01a-4490-926e-d1a0ba9d1df2> | CC-MAIN-2019-13 | https://www.routledge.com/Discover-Your-Learning-Intelligence/Hoffman-Hoffman/p/book/9780863889721 | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202523.0/warc/CC-MAIN-20190321112407-20190321134407-00232.warc.gz | en | 0.950779 | 397 | 2.84375 | 3 |
30 The Cost of Living: A Working Autobiography Lessons
180 Multiple Choice Questions
60 Short Essay Questions
20 Essay Questions
Pre-Made Tests and Quizzes
The Cost of Living: A Working Autobiography Overview
The Cost of Living is an autobiography by Deborah Levy following the time period after the dissolution of her 20-year marriage and her mother's death. Tying the two griefs together, Levy explores the in-between space of her old self in the Patriarchal Story of marriage and family she had occupied, and the new major female character she is writing, seeing in the world around her, and learning to become. The autobiography covers themes of death, loss, grieving, sense of self, storytelling, and feminist struggles.
The The Cost of Living: A Working Autobiography Study Pack contains: | <urn:uuid:ab8a7ddb-739a-4c25-afe8-316a7992edba> | CC-MAIN-2023-40 | http://www.bookrags.com/The_Cost_of_Living:_A_Working_Autobiography/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00805.warc.gz | en | 0.91336 | 180 | 2.953125 | 3 |
The idea of evolutionary descent with modification holds that all the various kinds of living organisms arose through some natural step-by-step process—a concept that many have believed since Charles Darwin popularized it in 1859. That story has become less believable, however, since scientists discovered molecular machines.
The existence of these vital machines, each with its complement of necessary interacting parts, has proved too tough a hurdle for 19th-century concepts of evolution. Even modern researchers have difficulty explaining the machines' specified complexity within a completely naturalistic context. Since all their parts are needed in order for the organism to function, they could not have developed gradually over time. So, some scientists have suggested that Darwin's idea of "natural selection" does not answer how molecular machines came about.1
Publishing in Science, a team of international researchers wrote, "For the addition of some of these proteins, selection probably did drive increased complexity, but there is no basis to assume that this explains all, or even most, of the increased complexity of these machines" (emphasis added).1 One big problem is that, although natural selection is assumed to generate new features, there have been few rigorous studies to pin down exactly which new traits have "emerged" as a result of which environmental factors.
The results of even those few studies have been equivocal. Also, "increased complexity" is not observed to occur in nature, even among populations of fruit flies and bacteria that are purposefully stressed in genetic experiments.2 The flies never sprout incipient infrared detectors or flippers, and the bacteria never generate new molecular paddles or motors, regardless of what selection may or may not be involved. So, if "selection" is out, then what is in?
In the recent Science report, the researchers proposed as an alternative that the various parts of molecular motors assembled together "fortuitously" by chance.1 Thus, two proteins came together and formed an initial bond. Afterward, the genes for the two new protein partners supposedly developed mutations that permanently linked them together. Then, since it is likely that mutations would occur in places other than just the initial linkage point, further mutations would add more attachment points for other proteins.
But how likely is it that just the right protein fragments happened to link by accident, that further accidents caused them to bond more tightly, and that even more accidents linked just the right additional protein parts together to eventually build the protein machines which the cell would have needed all along?3
The researchers referred to this "process" as a one-way ratchet, which they propose would explain the interdependence between two or more protein machine parts. They wrote, "Much of the bewildering intricacy of cells could consist of originally fortuitous molecular interactions that have become more or less fixed by constructive neutral evolution."1
"Neutral evolution" is the idea that just the right parts happened to get together and stay together, even in the absence of the environmental pressures that Darwin invoked to explain the origin of new traits.4
The study's authors speculated that some molecular machines "might" have been assembled by an "accident" that happened between proteins. Though originally used for one task, the new accidental arrangement was "fortuitous" because it led to the assemblage of a new protein complex that could now perform a different task.
However, there is no evidence of this occurring in the past or present! It is merely the logical consequent of a list of assumed premises, including the assumption that life was not created by God. Now, without "natural selection" to rely on, big-picture evolution must rest on the foundation of "fortuitous" accident.
With each passing month, new scientific investigations reveal unforeseen functionality for cellular machine parts that had been erroneously considered superfluous. If this trend of discovery continues, eventually there will be no nonfunctional parts or inefficiency found anywhere inside the cell. And that would leave no setting for the imaginative story of "neutral evolution" to even take place.
And that would lead to the most natural conclusion of all—that the design evident in life must have originated from a Designer.
- Gray, M. W. et al. 2010. Irremediable Complexity? Science. 330 (6006): 920-921.
- Thomas, B. 2010. No Fruit Fly Evolution Even after 600 Generations. ICR News. Posted November 6, 2010, accessed December 1, 2010.
- Thomas, B. 2009. ATP synthase: majestic molecular machine made by a mastermind. Creation. 31 (4): 21-23.
- Thomas, B. 2009. Preadaptation: A Blow to Irreducible Complexity? Acts & Facts. 38 (11): 15.
* Mr. Thomas is Science Writer at the Institute for Creation Research.
Article posted on December 2, 2010. | <urn:uuid:0f0ac894-70e8-4ad1-ad4d-eb2ca9946de8> | CC-MAIN-2019-43 | https://www.icr.org/article/latest-explanation-for-design-pure/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987756350.80/warc/CC-MAIN-20191021043233-20191021070733-00437.warc.gz | en | 0.953493 | 993 | 3.953125 | 4 |
A novel glucose-sensing technology promises a better quality of life for people who suffer from type 1 diabetes. The conventional monitoring devices often lead to disrupted glucose levels but this will not be the case with FreeStyle Libre manufactured by the pharmaceutical giant, Abbott.
Comparisons with the self-monitored glucose testing have shown that the use of this innovative device led to a hypoglycemia reduction by about 38%.
Funded by Abbott Diabetes Care, this randomized study conducted in 23 European diabetes centers ran from 2014 to 2015, while the significant findings were published today on 12th September, in The Lancet journal.
With enrolling 328 participants during the trials, the prime objective of the study was to analyze the effect of blood glucose level monitoring on the incidence rate of hypoglycemia.
During this masked trial, all the participants had to wear the FreeStlye Libre device for 14 days and the sensor glucose was not made visible to them. After randomization, the participants were divided into an intervention group and a control group for the next 6 month. In the control group, the participants were told to measure their blood glucose levels by self-monitoring, while the intervention group made use of the device under trial.
The duration and number of episodes marked by hyperglycemia was effectively reduced from 3.38 h/day to 2.03 h/day in the intervention group. On the contrary, the change, a minute reduction of 3.27 h/day from 3.44 h/day, was of no statistical significance in the control group.
Researchers are of the opinion that with this device, the monitoring can be of help for clinicians to also reduce the likelihood of nocturnal hypoglycemia which is often followed by serious harm to health.
With a prevalence rate of 9.3% in the US alone, type 1 diabetes accounts for 5-10% of all diabetes cases worldwide. Marked by the absence of glucose regulatory hormone, insulin; the occurrence of this chronic condition is particularly common in children and young adults.
In the absence of this hormone, the body breaks down the complex sugars and starches in the food into simpler monosaccharide, glucose which is absorbed in the bloodstream leading towards high blood glucose levels.
Years ago, living with diabetes type 1 was a challenge, it still is but now medication interventions help people with type 1 diabetes to manage their health condition in a better way. With regular monitoring of blood glucose levels, insulin therapy (with insulin injections or insulin pumps), exercise and watching what you eat, the quality of life has been greatly improved.
However, certain health risks are also present for a diabetic patient and hypoglycemia is one of them. Hypoglycemia is a condition encountered by the diabetes patients who often continue to take a certain volume of insulin while their blood glucose level remains ill-monitored.
Characterized by low blood glucose levels, having a mean glucose level of 70 milligram per deciliter of blood or less can lead to vascular complications in diabetes patients.
These vascular complications are stratified in two categories, namely, macrovascular and microvascular complications. The injurious effects of diabetes elicit over years and these macrovascular complications include coronary artery diseases, stroke and peripheral arterial disease.
On the other hand, microvascular complications in the diabetic patients comprise of diabetic nephropathy, retinopathy and neuropath.
Surprisingly, retinopathy is the most common complication, marked by the damage of blood vessels in the retina, it contributes towards nearly 10,000 new cases of blindness in the US annually.
Therefore, it is crucial for the clinicians to understand the association of diabetes with these complications to counteract their increasing prevalence.
For this very purpose, the researchers delved into the working of this sophisticated blood glucose monitoring device, which uses a sensor that monitors glucose for every 15 minutes and stores the data for 90 days. It comes with software from which the recorded data can be used to generate a summary of glucose report.
Innovating the field of diabetes management has become a focus of scientists for a while now and with this particular device formulation, the ultimate goal of improved diabetes management isn’t far from achieving.
The device which consistently monitors the blood glucose level is a flash sensor-based device which is worn by the patient and its pre-calibrated scale helps make glucose-level profiles which help the patient and clinician to monitor glucose reports and recommend an improved treatment.
Despite the presence of few side effects, the study outcomes look promising to change the paradigm of blood glucose monitoring and diabetes management. It will not only help clinician with adjusting the insulin dosages for individuals but also help the patients to be better informed about their health.
However, the patients will require some time to adjust to this novel technology. | <urn:uuid:348f3ed2-76f8-4e95-a845-b5b37384f29a> | CC-MAIN-2020-34 | https://healthunits.com/news/a-new-way-to-manage-diabetes-type-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739048.46/warc/CC-MAIN-20200813161908-20200813191908-00311.warc.gz | en | 0.945497 | 988 | 2.90625 | 3 |
Marine snails and slugs: a great place to look for antiviral drugsJournal of Virology
AbstractMolluscs, one of the most successful phyla, lack clear evidence of adaptive immunity, yet thrive in the oceans, which are rich in viruses. There are thought to be nearly 120,000 species of Mollusca, most living in marine habitats. Despite the extraordinary abundance of viruses in oceans, molluscs often have very long lifespans (10-100s yrs). Thus, their innate immunity must be highly effective at countering viral infections. Antiviral compounds are a crucial component of molluscan defenses against viruses, and have diverse mechanisms of action against a wide variety of viruses, including many that are human pathogens. Antiviral compounds found in abalone, oyster, mussels and other cultured molluscs are available in large supply, providing good opportunities for future research and development. However, most members of the phylum Mollusca have not been examined for the presence of antiviral compounds. The enormous diversity and adaptations of molluscs implies a potential source of novel antiviral compounds for future drug discovery.
Dang, VT, Benkendorff, K, Green, T & Speck, P 2015, 'Marine snails and slugs: a great place to look for antiviral drugs', Journal of Virology. | <urn:uuid:857f3ff2-f322-4bd1-bb4d-d4b2247d1388> | CC-MAIN-2018-26 | https://works.bepress.com/kirsten_benkendorff/105/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864919.43/warc/CC-MAIN-20180623015758-20180623035758-00323.warc.gz | en | 0.927564 | 287 | 3.3125 | 3 |
She is missing one of her first molar teeth and the bone has shrunk because it has been a long time since she lost the tooth. She came to me for a dental implant, but was also interested in removing the bumpy nodules next to her tongue. The plan was do have one surgery where the tori on each side would be removed and that same bone used to rebuild the area that is going to have the implant!
After removal and healing bone graft:
Mandibular tori are a bony growth (bumps) in the lower jaw along the surface nearest to the tongue. Mandibular tori are usually present near the premolars (middle teeth) and above the location of the mylohyoid muscle's attachment to the mandible. In 90% of cases, there is a torus on both the left and right sides.
Tori are slow-growing and vary in size. Most of them do not interfere with
eating or speech. Many people have tori without knowing it. Look in the mirror; you might notice them in your own mouth!
Many people who notice tori are concerned about oral cancer. Tori are not cancerous. They also do not turn into cancer. A torus is normal bone covered with normal tissue. However, other types of growths in the mouth can turn out to be oral cancer.
The prevalence of mandibular tori ranges from 5% – 40% and are less common than bony growths occurring on the palate, known as torus palatinus. They will not disappear unless surgically removed. Tori cannot be prevented.
It is believed that mandibular tori are caused by several factors. They are more common in early adult life and are simetimes associated with grinding. The size of the tori may fluctuate throughout life, and in some cases the tori can be large enough to touch each other in the midline of mouth!
Mandibular tori are usually a clinical finding with no treatment necessary. It is possible for ulcers to form on the area of the tori due to trauma. The tori may also complicate the fabrication of dental implant or regular dentures. If removal of the tori is needed, surgery can be done to reduce the amount of bone.
Because they are on the roof of your mouth, tori palatini can be irritated by some foods. Hard foods, such as crusty bread, or hot foods, such as pizza, are most likely to cause problems. Large upper and lower tori can interfere with speech. Tori on the roof of the mouth can also be used for dental implant grafting, but there are other, easier areas to obtain your own bone if needed
Surgery can be done under IV sedation in the office.
So…do you have tori?
Feel free to comment below or join the conversation on my Facebook page.
Ramsey A. Amin, D.D.S.
Diplomate of the American Board of Oral Implantology /Implant Dentistry
Fellow of the American Academy of Implant Dentistry | <urn:uuid:8d844043-878e-4665-b444-c01a70461aca> | CC-MAIN-2015-11 | http://www.burbankdentalimplants.com/mandibular-tori-used-as-bone-graft-source-for-dental-implants/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00209-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.955397 | 641 | 2.796875 | 3 |
On Monday, June 17, at 10pm WGBY airs the documentary The Revolutionary Optimists about some of the poorest slums of Kolkata. Amlan Ganguly, a lawyer-turned social entrepreneur, sows hope in the poorest neighborhoods of Calcutta by empowering children to become leaders in improving health and transforming their communities. Preview.
Inspired by The Revolutionary Optimists, which profiles “The Daredevils” in one of Kolkata’s most notorious squatters’ colonies, Map Your World is a multi-platform project in development that puts the power of new technologies into the hands of young change agents, enabling them to map, track, and improve the health of their own communities and share their stories.
When you search subjects like “children in poverty” on PBS LearningMedia, you’ll find hundreds of resources. Here are just a few:
Protect Your Health and Environment (Grades 3 – 4) In this media-rich self-paced lesson, students explore health hazards in their environment and learn how to make their environment safer.
Poverty (Grades: 6-12) shows children in unclean conditions and asks students to write a description of what they think life is like for these children.
Teens Fight for Toxic Waste Cleanup (Grades 9-12) Meet a student who successfully lobbied her state legislature about waste sites in her neighborhood in this video adapted from Earth Island Institute’s New Leaders Initiative. | <urn:uuid:9ecd2987-45d6-488a-a703-e7cfb59215e1> | CC-MAIN-2016-18 | https://wgbyeducation.wordpress.com/2013/06/17/empowering-children-independent-lens-the-revolutionary-optimists/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111838.20/warc/CC-MAIN-20160428161511-00038-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.938742 | 306 | 2.8125 | 3 |
What Electrical Outlet Do I Plug My Hybrid Car Into?
From fuel-efficient gas engines to all-electric cars and spanning SUVs to two-seaters, you now have a wide selection when shopping for a green vehicle. Hybrid vehicles run on both an electric battery and gasoline, with different processes for charging. Most hybrids on the road today don't need to be plugged in, but some newer models, both hybrid and electric, can be plugged into a home outlet to power up the battery.
Hybrid engines run on both electric and gas-powered motors. The on-board computer tells the engines when to switch from gas to electric depending on the driving conditions. In standard gas-electric hybrids, you don't need to and should never plug in the car to charge the battery. Instead, friction from the brakes and a small amount of power from the gas engine do the job. (See Reference 1)
Plug-in hybrids use similar technology to standard hybrid vehicles, but you can also plug the battery into a home outlet to charge it. These cars can run longer using only electricity and are more fuel efficient than standard hybrids. A common 120-volt household outlet can be used to charge your plug-in hybrid. However, this outlet must be on its own 15-amp circuit. Using a smaller circuit will keep your vehicle from charging properly; using a shared circuit will trip the circuit breaker. (Ref 3, 5)
Electric vehicles use only electricity to run their engines, so you never need to buy gas. To charge the battery in an all-electric vehicle, plug it into a standard 120-volt household outlet that is on a dedicated 20-amp circuit. However, to charge the car faster, install a home charging station that runs on 208 to 240 volts at 40 amps. (References 2, 4) Contact your power company for advice prior to installing a home charging station.
Cities around the United States are beginning to install charging stations for electric vehicles. These stations deliver 480 volts and can charge an electric car in about 30 minutes (References 2, 4). In some cities such as Portland, Oregon, the stations are free to use. Some plug-in hybrids can also use these stations, but check your vehicle's owner manual to verify that the battery can handle the voltage.
Based in Portland, Ore., Tammie Painter has been writing garden, fitness, science and travel articles since 2008. Her articles have appeared in magazines such as "Herb Companion" and "Northwest Travel" and she is the author of six books. Painter earned her Bachelor of Science in biology from Portland State University. | <urn:uuid:ca7c7811-b149-4847-bec1-e6f14f4e8ab7> | CC-MAIN-2020-50 | https://homeguides.sfgate.com/electrical-outlet-plug-hybrid-car-into-79772.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141746320.91/warc/CC-MAIN-20201205044004-20201205074004-00378.warc.gz | en | 0.942677 | 532 | 3.109375 | 3 |
The Australian Government is providing a new round of funding for the establishment of Maker Spaces in schools with up to $5000 available for primary or secondary schools.
Maker Projects aims to foster creativity and inquiry based learning in Australian schools and communities through the establishment of:
- maker spaces in schools where students can apply their STEM knowledge, develop entrepreneurial skills, and gain experience in working with emerging and advancing technologies (Stream A)
- STEM-related events and education activities delivered in partnership with industry for youth under 18 years of age. These will build capability and leverage off the skills gained by organisations who have previously participated in delivering innovation, entrepreneurship and enterprise focused education activities for young people
The program is extremely popular and likely to be well subscribed. Please be ready to apply when applications open on 8 November and submit your application as soon as possible to avoid disappointment.
Applications will be processed in the order they are received. Applications close when the funding for this year runs out.
To register your interest please click HERE. | <urn:uuid:0c028761-2af6-4461-8855-19f24d3ab29f> | CC-MAIN-2019-26 | https://stemx.edu.au/new-round-of-makerspace-funding-available/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998813.71/warc/CC-MAIN-20190618183446-20190618205446-00299.warc.gz | en | 0.958362 | 202 | 2.640625 | 3 |
For several years, meteorologists have been carefully studying varying circulating air patterns worldwide. However, a new variation was just discovered.
Known as the SETIO Cyclone, because they form in the South-East Tropical Indian Ocean (SETIO), they are relatively short-lived and occur frequently during austral winter/spring, to keep the ocean's surface warm. More research is to be done, but this new type of tropical cyclone is certainly a unique finding.
"For something as chaotic as the wind, meteorologists tend to have a pretty good grip on the kinds of circulating air patterns we might expect to see whipping up storms around the globe," Carly Cassella of Science Alert writes.
"One, it seems, has until now slipped under the radar. In an effort to better understand contrasts in ocean temperature in the Indian Ocean, scientists have uncovered a new kind of tropical cyclone that occurs several times a year off the coast of Sumatra."
"Researchers are fairly familiar with the sloshing about of large volumes of air close to the westerly equatorial winds through the summer months, specifically known as the Boreal Summer Intra-Seasonal Oscillation," she continued.
"But the periodicity of these oscillations didn't quite match the storms' patterns, inviting scientists to dig further."
What to know about the newly discovered type of tropical cyclone:
Oceanographers from Flinders University in South Australia have discovered a new type of tropical cyclone just off the Sumatran coast. According to Phys, experts were examining regional satellite surface winds, to see what triggers the Indian Ocean Dipole (IOD). The IOD causes climate and rainfall to vary in nearby nations, such as Australia.
What they found was the existence of the SETIO cyclone, which evidently compromises winds along Sumatra's coast.
As previously mentioned, SETIO cyclones don't last very long, but they are common in winter and spring, keeping the water temperatures warm. These findings were published in Journal of Southern Hemisphere Earth Systems Science.
"Dramatic changes happen in some years when SETIO cyclones fail to develop, and ambient winds trigger the appearance of cold seawater in a vast area strongly disturbing both winds and rainfall patterns over the Indian Ocean," Associate Professor Kaempf stated, via Phys.
"In the natural sciences, it is of uttermost importance to identify so-called trigger processes, such as SETIO cyclones, that link the cause to an effect," he continued.
"This is a rare new discovery that sheds new light into the functioning of the IOD."
How is a tropical cyclone different from a hurricane?
While you've likely heard varying terminology, hurricanes and tropical cyclones tend to refer to the same exact weather event.
According to Zurich, each is a major tropical storm system, which is caused by low air pressure above the ocean. As a result, they produce large amounts of rain and high winds, which can exceed 74 miles per hour.
And evidently, typhoons are the same thing as hurricanes and tropical cyclones — like soda and pop or sprinkles and jimmies, they merely vary by region. | <urn:uuid:543aef32-e7b6-4d35-bcda-9e5e070b73ef> | CC-MAIN-2023-06 | https://www.greenmatters.com/weather-and-global-warming/new-tropical-cyclone | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501407.6/warc/CC-MAIN-20230209045525-20230209075525-00722.warc.gz | en | 0.960249 | 650 | 3.765625 | 4 |
The Prevention of Aggression Resource Center (PARC) at Penn State Behrend is focused on promoting positive developmental outcomes by providing cutting-edge research, education, training, and resources to educators, social service providers, students, and parents in the area of bullying prevention and prosocial behavior development. Research-based multilevel mentoring is the primary delivery system used to positively affect school climate by enhancing students' protective resources and reducing students' at-risk factors. PARC also conducts research and program evaluations of aggression reduction and prevention initiatives.
Some statistics show that 80% of children are victimized by relational and/or physical aggression by their peers. Sadly, many children are not equipped with effective coping strategies to use in response to bullying, which further exacerbates the problem and leaves children increasingly vulnerable. PARC aims to improve school culture and resolve peer victimization in our schools. PARC’s services include research (e.g., survey services), presentations to parents, educators, and professionals, and developmentally appropriate student programming specifically addressing relational and physical aggression and cyberbullying.
To contact PARC, e-mail [email protected].
In this eagerly anticipated book, Youth Voice Project, authors Stan Davis and Charisse L. Nixon add youth voices to the national debate about bullying and peer mistreatment. | <urn:uuid:a32eee15-331f-4cb1-85e4-a08239c9efd8> | CC-MAIN-2016-26 | https://psbehrend.psu.edu/school-of-humanities-social-sciences/research-outreach-1/parc | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00133-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.93369 | 269 | 2.875 | 3 |
The most common form of pipe band consists of a section of bagpipe players, a section of snare drummers, assisted by tenor drummers and usually one, though occasionally two, bass drummers. The entire drum section is known collectively as the drum corps. The tenor drummers and bass drummer are referred to collectively as the ‘bass section’
The music played by pipe bands generally consists of music from the Scottish tradition, the Irish tradition and the Breton tradition, either in the form of traditional folk tunes and dances or music from the Western tradition that has been adapted for pipes. Examples of typical pipe bands forms include marches, slow airs, up-tempo jigs and reels, and strathspeys. In conventional pipe band music, each section of instruments has a different role in the music. The bagpipers are responsible for providing all of the melodic material in the music.
Generally speaking, all of the pipers play a unison melody on their chanters, with their drones providing the harmonic support and filling out the sound. These unison melodies are often quite complex and demanding. It is this complexity that provides much of the musical interest. The snare drummers provide a rhythmically interactive accompaniment, while the tenor drummers provide the fundamental rhythmic pulse and the bass drummer anchors the rhythms, providing a strong and steady beat. | <urn:uuid:ac5dbc6f-04f4-4120-869f-1de242269b48> | CC-MAIN-2021-10 | https://perthhighlandgames.co.uk/events/pipe-band/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178375529.62/warc/CC-MAIN-20210306223236-20210307013236-00127.warc.gz | en | 0.955132 | 280 | 3.046875 | 3 |
Today — March 22, 2018 — is World Water Day 2018. Water is a precious resource and much of the world is facing a water crisis. Today is a great day to bring awareness to this issue and think about how we can help. It's also important to remember that these conditions shouldn't only be thought about on World Water Day 2018... we must think about water conservation all year long.
WHAT IS WORLD WATER DAY 2018?
The global community recognizes World Water Day each year and is a day to focus on the importance of water. The theme for World Water Day 2018 is "Nature for Water" — exploring water-based solutions to the water challenges we are facing in the 21st century.
There are so many water challenges going on in the world currently, including the U.S., like the Flint Water Crisis.
WHAT CAN I DO TO HELP?
One way you can help donate to organizations working to improve water around the world is by purchasing a 99 Cent Razor subscription. With your order, you are able to choose a charity you would like your order to benefit, and one of the choices is charity: water. charity: water is a non-profit organization dedicated to bringing clean and safe drinking water to people in developing countries.
What better day to help donate to this organization than World Water Day 2018?
Click here to shop at 99 Cent Razor — remember to choose charity: water as your charity of choice during checkout!
Go to charity: water's website to find out more ways to help! | <urn:uuid:91deb1cd-baf8-4d91-829d-7a7aed233388> | CC-MAIN-2021-04 | https://99centrazor.com/world-water-day-2018/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703515235.25/warc/CC-MAIN-20210118185230-20210118215230-00130.warc.gz | en | 0.956377 | 309 | 2.65625 | 3 |
While it’s only winter for half the world, and even then, it doesn’t snow everywhere, there are still an abundance of words that you can use for the coldest part of the year.
Winter Vocabulary Words in English:
Use these words to help you grow your English vocabulary when talking about winter.
black ice – a very thin coating of ice found on roads and sidewalks that is difficult to see, and therefore quite dangerous
ex: Irina said that the black ice on her street caused 3 car accidents.
cold snap (n.) – a sudden arrival of cold weather
ex: Emily wasn’t prepared for the cold snap – all of her coats were still in storage.
to hibernate (v.) – to sleep through the winter in order to reserve energy
ex: Whenever December arrives, I just want to hibernate like a bear until spring!
snow drift (n.) – a deep pile of snow that builds up because of wind
ex: I couldn’t see my car because of the giant snow drift outside the window.
to be snowbound (v.) – to be stranded or unable to leave a place because of heavy snowfall
ex: We were snowbound at the ski chalet for the whole weekend.
snowfall (n.) – the amount of snow that comes down within a period of time
ex: What was the average snowfall over the country in the last storm?
whiteout (n.) – to be unable to tell the difference between things because of an overabundance of snow
ex: After the whiteout, looking outside was like looking at a sheet of paper.
Winter Idioms in English:
There are lots of idioms that use winter words in order to make a point. Many of these phrases don’t have much to do with winter, though, which can make them more confusing. Here are some winter themed idioms that will help your English sparkle like freshly fallen snow.
snowball’s chance in hell – to be very unlikely to succeed at something
ex: The small boat had a snowball’s chance in hell of surviving the storm.
dead of winter – the coldest, darkest part of winter
ex: It feels like the dead of winter out there.
to be on thin ice – to be in a risky situation
ex: If you keep asking him about his ex-girlfriend, you’ll be on thin ice.
pure as the driven snow – to be innocent and chaste (frequently used ironically)
ex: I never thought Madonna was pure as the driven snow, but the book she wrote is crazy!
to break the ice – to create a more friendly and relaxed atmosphere
ex: Charmaine was great at breaking the ice, she always knows what to say to people.
to run hot and cold – to be unable to make up one’s mind
ex: Alexi’s feelings about her run hot and cold, one minute he loves her, and the next, he’s bored of her.
the snowball effect – when something small keeps growing in importance or significance
ex: Gangnam Style’s popularity was such a snowball effect.
put something on ice – to stop doing something
ex: Herbert is going to put the project on ice until he gets a response from his supervisor.
snowed under – to be overwhelmed, usually with responsibilities
ex: I’m sorry I can’t go to the party tonight, I’m snowed under with homework.
If you like talking about the weather, check out our weather idioms illustration. Click the link to see eight different examples of weather idioms!
Did you see any challenging words in the above blog post? Learn their meanings!
to be stranded - to be unable to leave a certain place
significance – importance, distinction
abundance – a large amount of something | <urn:uuid:39279130-66a3-4480-97b0-ce13953d7f01> | CC-MAIN-2015-06 | http://kaplaninternational.com/blog/winter-idioms-vocabulary-english-lesson/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122034298.3/warc/CC-MAIN-20150124175354-00001-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.942511 | 827 | 3.15625 | 3 |
7 August - The Ebola epidemic which is ravaging West Africa is all over the daily news. The deadly disease often strikes Sub-Saharan Africa. In the past, not more than a thousand people were affected yearly. But the current outbreak in Sierra Leone, Liberia, Nigeria and Guinea is having a much bigger impact than the previous ones in 2007 or 2012. This is why the World Health Organization (WHO) is intervening in different ways to combat the disease locally, and to prevent it from spreading any further.
A mysterious illness
Ebola is transferred to humans through contact with wild animals, such as monkeys, bats or pigs. Despite extensive research, the exact source of Ebola remains a mystery. Currently, the medical world is looking into the possibility of the disease being carried by fruit flies.
Ebola is transmitted through direct contact with bodily fluids. When infected bodily fluids come into contact with damaged skin or mucosa of another person, the disease can quickly spread. Typical symptoms are fever, weakness, headache and a sore throat. Later on, the patient may begin to vomit, have diarrhea, rashes, failing kidneys and a failing liver. In some cases, there are internal and external bleedings.
The regions of Western Africa affected by the disease
There is currently no vaccine against Ebola. Patients receive extra fluids and minerals, such as salt and sugar, to strengthen them while their body fights off the disease. The mortality rate for Ebola is very high; sometimes as high as 90 percent.
A possible treatment is the experimental vaccine currently being used to treat two American doctors. However, the use of this vaccine is controversial. WHO will convene a panel discussion next week to discuss the ethical consequences of the experimental treatment. Can a vaccine which has never thoroughly been tested on humans be used? And if so, who would receive the treatment?
Prevention can save lives
A thorough prevention campaign is essential in the fight against Ebola. It is crucial to inform the local population about the do’s and don’ts when brought in contact with the disease. Health workers often do this through information gatherings at markets or door-to-door visits - an important tool in an area with high illiteracy rates.
Another tool in the prevention campaign is the media. In Guinea, the capital Conakry and the countryside are full of radio- and television messages in French and in local languages. This way of communicating is often hindered by bad connections in rural areas and by the fact that many of the poorer population often do not own their own radio or television.
Because of the great risk of infection, all contact with infected animals, raw meat or blood has to be avoided. When a person is infected, physical contact is out of the question. One reason why the disease is spreading so rapidly is because many people take care of the sick at home without the necessary protective clothing or hygiene.
The burial culture in the region also plays a significant role. In some cultures, it is a tradition to touch the deceased before he or she is buried, a practice strongly discouraged by Ebola-specialist. Family members even hide their deceased from the authorities, causing new infections in the close family.
Everyday, new cases of Ebola are registered. Fadela Chaïb, WHO spokesperson, declared that the infection count on the 4th of August was as high as 1.711, of which 932 have already died.
Health workers informing the population in a local marketplace
Besides the support of local doctors and sections of the Red Cross, the affected regions also receive international aid to combat the epidemic. Doctors sent by the World Health Organization cooperate with other organizations, such as Doctors Without Borders. They have a great expertise on the issue since they have been involved with fighting Ebola-outbreaks over the past 15 years. Recent infections of several doctors and hospital staff, however, have shown that the treatment of patients is not entirely without risk.
“There is a great need of more personnel and material,” emphasized Gregory Hartl of the WHO in a recent interview. “We need the aid of everyone who can give it, we need the help now and we need a lot of it.” Besides creating a 100 million dollar plan to combat Ebola, the General Director of the WHO, Margaret Chan, has created a disaster plan with the political leaders of Guinea, Sierra Leone and Liberia, to make sure that residents of the affected regions are urged not to leave their area of residence. This will combat the spread of the disease.
An emergency committee of the WHO is convening this week to discuss the question of whether or not the Ebola outbreak should be treated as a threat to international public health. If this is necessary, measures will have to be taken to prevent the global spread of the virus.
When the Security Council approaches the final stage of negotiation of a draft resolution the text is printed in blue... What's in Blue helps interested UN readers keep up with what might soon be "in blue".
The Brussels based United Nations Regional Information Centre for Western Europe - UNRIC provides information on UN activities to the countries of the region. It also provides liaison with institutions of the European Union in the field of information. Its outreach activities extend to all segments of society and joint campaigns, projects and events are organized with partners including the EU, governments, the media, NGOs, schools and local authorities.
United Nations Regional Information Centre for Western Europe (UNRIC Brussels)
Residence Palace, Rue de la Loi/Wetstraat 155, Block C2,7th and 8th floor, Brussels 1040, Belgium
Tel.: +32 2 788 8484 / Fax: 32 2 788 8485 | <urn:uuid:25f93bd2-ee68-4b85-bee1-588b39659545> | CC-MAIN-2015-27 | http://www.unric.org/en/latest-un-buzz/29357-ebola-the-harsh-reality-in-western-africa | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095632.21/warc/CC-MAIN-20150627031815-00176-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.952355 | 1,159 | 3.78125 | 4 |
Living with feline family members brings a lot of joy to cat owners. However, it’s not always easy to understand a cat’s behavior. Normal cat body language is often quirky, making it difficult to work out whether your cat is doing something odd because they’re unwell, or just because they’re a cat!
Lip-smacking can be accompanied by dribbling, vomiting, or pawing at the mouth, along with other symptoms. Lip-smacking may be due to stress, fear, or irritation, rather than a medical problem. If your cat starts lip-smacking excessively, you should see a veterinarian.
Lip-smacking can be accompanied by dribbling, vomiting, or pawing at the mouth, along with other symptoms.
Lip-smacking may be due to stress, fear, or irritation, rather than a medical problem.
If your cat starts lip-smacking excessively, you should see a veterinarian.
Lip-smacking is an example of one of those quirky feline behaviors. Like many cat behaviors, there are times when it’s perfectly normal, but then there are times that it could also be a symptom of various health issues and injuries. Let’s take a look at the possible reasons for your cat’s lip-smacking so you can determine if your cat needs to see a veterinarian.
Why Cats Smack Their Lips
Lip-smacking refers to when cats move their mouths, causing a smacking sound when their lips come together. While lip-smacking, your cat might also move and flick their tongue. You might also notice the tip of their tongue poking out in a rather cute-looking gesture known as ‘blepping.’
Here are some common reasons why your cat may be lip-smacking.
Often, cats smack their lips when they are in pain. This is their way of letting us know they don’t want to be approached for a fuss or a cuddle. However, if the pain is in their mouth, they might move their lips and tongue to try to find a comfortable position, which can produce extra saliva.
This drooling could cause them to move their lips more too. Causes of mouth pain include dental problems like tartar buildup, gingivitis, broken teeth, ulcers due to kidney disease, toxin ingestion, or stomatitis.
If your cat isn’t feeling sociable, they might lip-smack to warn you off. You might notice them lip-smacking after petting them or picking them up. This is a sign that you’re doing something they don’t like, so it’s a good idea to stop and give them some space.
Just as your cat smacks their lips when they are upset, they might also do so if they’re feeling afraid or insecure. You might notice them hiding away or withdrawing, and if you try to follow or find them, you could certainly hear them smack their lips.
Also Read: Can Cats See Spirits, Ghosts, And Angels?
When your cat coughs up furballs, they might be smacking their lips because they have a hairball or some fur in their mouth after a grooming session.
Also Read: The 5 Best Hairball Remedies For Cats
Nausea and vomiting are major causes of lip-smacking. Nausea can lead to excessive saliva production and dribbling. With all that saliva pooling in their mouths, they’re bound to move their lips more than normal. You can read more about nausea in cats by following the link.
Also Read: The 6 Best Cat Food To Stop Vomiting
Aside from nausea and mouth pain, excessive salivation can be caused by mouth tumors, bad teeth, or ingesting caustic substances,
Just like your cat’s ears, paws or tail might twitch when they’re snoozing, you might also notice them smacking their lips. This could mean that they’re dreaming, or that they’re trying to get more comfortable and relaxed.
Also Read: Why Do Cats Sleep With Their Head Up?
When cats see food or think about food, they might dribble a bit. This is the same as when we feel our mouth start to water when we imagine eating a tasty snack. So, if it’s dinnertime and your cat smacks their lips, it might be because they’re hungry!
If your pet is thirsty or has a dry mouth, you might notice them smacking their lips or moving their tongue. You could try offering them some fresh water, especially if they’re not drinking as much as usual.
10. Foreign Body
If your cat has a grass blade, fishing line, or other object lodged in their mouth or at the back of their throat, you might notice them moving their lips and tongue a lot. Gulping and retching are also common.
Also Read: Pica In Cats: Causes, Symptoms, & Treatment
Other Symptoms Associated With Lip-Smacking
In some circumstances, your cat might show other symptoms alongside smacking their lips. These symptoms could give you clues about what’s going on.
1. Lip-Smacking Due To Pain
If your cat is lip-smacking due to pain in their mouth, you will likely notice them dropping food when they eat or turning their nose up at food altogether. They might paw at their mouth or dribble, and you might notice some blood or an unpleasant smell. If this is the case, it could be a sign of dental disease. It is best to see your veterinarian.
If the pain isn’t in their mouth, but elsewhere, your cat might be limping or hunched, depending on where the pain is. They might vocalize or you might see them licking their sore spots. Check out 12 warning signs your cat is in pain.
2. Lip-Smacking Due To Nausea
If nausea is the cause of your cat’s lip-smacking, they may show other signs of an upset tummy, like vomiting and diarrhea. They might not be interested in eating or drinking, and be lethargic. Read about what you can give your cat for an upset stomach.
3. Lip-Smacking Due To Fear Or Irritation
When cats smack their lips because they are unhappy or afraid, they might growl or hiss. They might even lash out with their claws or give you a quick nip to let you know that they want to be left alone. In some situations, lip-smacking is your cat’s way of saying ‘stop’.
What You Should Do If Your Cat Keeps Lip-Smacking
Cats smack their lips for lots of reasons, but if they suddenly start to noticeably lip-smack more often, it’s worth trying to work out why. If the cause isn’t clear, or your cat seems unwell, or is experiencing a loss of appetite, it’s always best to take them to the vet for a checkup.
Underlying medical causes could include oral ulcers, renal failure, or an oral infection. However, if you’ve noticed the behavior more since your newly mobile toddler discovered chasing the cat, or since you brought a new pet home, it’s more likely to be a sign that your cat is feeling irritated or afraid due to the change in their environment.
Of course, it’s still important to work to make life more comfortable for your cat, even if the cause is behavioral. If you’re struggling with a stressed and anxious cat, or if your cat is showing other behavioral problems, contact a veterinary behaviorist for help and advice.
It might be tricky to decide why your cat is lip-smacking, but if it’s something new for them it’s not a good idea to ignore it. Look out for other symptoms and book a veterinarian appointment to make sure your cat isn’t in pain or feeling unwell.
Frequently Asked Questions
Why do cats smack mouths?
Cats might smack their mouth or lips because they are feeling grumpy or frustrated, unwell, or in pain. If the cause isn't clear or you're worried that your kitty is unwell, speak to a veterinarian.
Why does my cat smack his lips when he sleeps?
Cats twitch their lips when they sleep, especially if they’re dreaming. They might also swallow and open and close their mouth as they're getting comfortable and ready for a snooze.
Why does my cat lick his lips when he looks at me?
If your cat is hungry, they might lick their lips and look at you, especially if you’re the feeder of the family. On the other hand, if your cat is swishing their tail or they run away when you tried to pick them up, they might be lip-smacking to tell you to leave them alone.
Why does my cat make weird noises with her mouth?
Cats can make lots of noises with their mouths, from meowing and purring to growling and hissing. But if you notice them smacking their lips, especially if they are dribbling or have other symptoms, contact a veterinarian for advice. | <urn:uuid:980f1c37-4558-4620-abc2-334ea9218edd> | CC-MAIN-2023-06 | https://cats.com/reasons-why-cats-smack-their-lips | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500151.93/warc/CC-MAIN-20230204173912-20230204203912-00655.warc.gz | en | 0.949629 | 2,002 | 2.640625 | 3 |
A tragedy that we swore would never happen again, is happening right now. The caribou are going the way of the American bison and our bathroom preferences are having something to do with it.
Most people are familiar with the tragedy of the American bison. It’s the story of how the once great herds of these magnificent animals were reduced to minuscule numbers. The population of bison went from approximately 30 million before European settlement to around 1,000 in the 1800s. Help came just in time, and through protections of the animals and their habitat, the species was able to rebound from the brink.
We’d like to think that with our current environmental consciousness, such a tragedy couldn’t occur in modern times. Under this line of reasoning, we have learned from our mistakes and are more careful with how we manage and use natural resources that either come from animals or from their habitats. But, unfortunately, a similar tragedy is occurring right now, directly to the north of where the extinction of the American bison nearly happened.
We are witnessing the tragedy of the caribou.
Photo Credit: This and all photos are by Kent Miller for National Park Service, Public Domain
The story of the caribou has many parallels with the bison’s tale. Both are held sacred by indigenous people, both travel in massive flowing herds, and both have faced drastic reductions in population due to humans. For example, before the widespread expansion of industry into Canada’s boreal forest, the caribou populations were astounding.
Descriptions of the migratory herds, with some numbering up to hundreds of thousands in total, recall the imagery of the early American West, when buffalo existed in similar abundance. The range of the five North American subspecies of caribou stretched from Alaska’s Bering Sea coast to Labrador’s Atlantic Coast in Canada, and down to northern Idaho and Washington.
Sadly for the caribou, there is a big difference between them and the buffalo. Caribou herds no longer live in the continental U.S.
The extinction of the lower 48 states’ caribou population did not occur in the 19th century, when unregulated and expansive industry was changing the landscape of the American West. Nor did it happen before the 1970s, when the Endangered Species Act and other laws came into effect to protect our natural world and its dwindling inhabitants.
It happened last year.
The populations in Canada are in a similar dire situation as herds are rapidly declining, mainly from habitat destruction due to logging and other resource extraction. The protection of the boreal caribou does not lie solely with our neighbors to the north. Our consumer preferences have a big impact on the caribou’s habitat as well. Tissue products that are made out of forest fibers consist, in part, from wood pulp sourced from the Canadian boreal.
By continuing to purchase 100 percent virgin fiber toilet paper, we are quite literally wiping the caribou out of a home. There are plenty of alternative fibers and recycled papers that are not sourced from vital caribou habitat but can still be used in our toilet and paper towel products. Many of these products exist and are sustainable alternatives to brands that rely on boreal forests. A guide to what toilet paper and tissue products are the most sustainable and consequently have minimal impact on the boreal and caribou can be found in this chart from a Natural Resource Defense Council report.
From “The Issue with Tissue” (2019) by Jennifer Skene & Shelley Vinyard, NRDC
Clearcutting contributes to the decline of boreal populations in many different ways. For one, heavy machinery use drives caribou from their home and fragments their habitat. Segmented forests provide clear paths for wolves to hunt caribou more easily, decimating their populations even further.
Even restoring the forest after clearing it is not enough to help bring back caribou populations. Notably, caribou rely on lichen during the winter months as their main food source. These lichen only grow on mature trees rather than new growth. This is one of the reasons that caribou don’t return or respond well to restored forests.
The lesson of the American bison teaches us that we cannot take our natural world for granted. Focusing on the short term use of our resources can lead to the destruction of animal populations that take decades or even centuries to recover. The wounds of the bison are still healing, and we are inflicting the same damage on the caribou. The inhabitants of our world should not be flushed away, and there is no need to do it by decimating the valuable forests that caribou rely on. | <urn:uuid:1f786f55-f82e-47f6-bece-1cd625940a2f> | CC-MAIN-2023-06 | https://environmentamerica.org/arizona/center/articles/will-the-lesson-of-the-american-bison-be-enough-to-save-the-caribou/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494986.94/warc/CC-MAIN-20230127132641-20230127162641-00681.warc.gz | en | 0.951954 | 973 | 3.3125 | 3 |
Synonyms and other taxonomic changes
- new name according to Minno et al, 2005 (1)
Explanation of Names
Papilio troilus Linnaeus, 1758
Wing span: 3 - 4 inches (7.5 - 10 cm).(1)
Adult: Upper surface of forewing is mostly black with ivory spots along margin. Upper surface of hindwing has orange spot on costal margin and sheen of bluish (female) or bluish-green (male) scales. Underside of hindwing with pale green marginal spots.(1) Median spotband on underside of hindwing missing one orange spot.(2)
Caterpillar: First three instars resemble a bird dropping. Last two instars are green with large eyespots - the two largest on third thoracic segment have black "pupils", two smaller ones on first abdominal segment do not. The larva changes color to orange or yellow just prior to pupating.
e. US, se CAN - Map
(southern Canada to Florida; west to Oklahoma and central Texas). Occasionally strays to North Dakota, central Colorado, and Cuba.(1
Deciduous woodlands, fields, roadsides, yards, pine barrens, wooded swamps, and parks.(1)
2 generations per year from April-October. In Florida, several generations between March-December.(1)
Caterpillar hosts: Spicebush (Lindera benzoin), Sassafras trees (Sassafras albidum), Pondspice (Litsea aestivalis) Red, Swamp and Silk Bays (Persea spp.); perhaps prickly ash (Zanthoxylum americanum), Tulip tree (Liriodendron tulipifera), Sweetbay (Magnolia virginiana), and Camphor (Cinnamomum camphora).
Adult food: Nectar from Japanese honeysuckle, jewelweed, thistles, milkweed, azalea, dogbane, lantana, mimosa, and sweet pepperbush.(1)
Males patrol in woods, roads and woodland edges to find receptive females. Females lay single eggs on underside of host plant leaves. Caterpillars live in shelters of folded-over leaves and come out to feed at night. Some chrysalids from each generation hibernate.(1)
The first instar caterpillar measures 4-5 mm. It reaches approximately 50 mm. when mature. The cycle from egg to adult takes about 6 weeks unless the chrysalis hibernates
1. egg. 2. first instar caterpillar. 3. third or fourth instar. 4. final instar. 5. final instar, ready to pupate. 6 pupa or chrysalis. 7. adult female. 8. adult male
The Palamedes and Spicebush Swallowtails may face problems over the next several years associated with the introductions of the Redbay ambrosia beetle (RAB), Xyleborus glabratus, and the fungus causing laurel wilt.
Redbay ambrosia beetle (RAB),Xyleborus glabratus, and laurel wilt, caused by the fungus Raffaelea lauricola, together constitute an insect-and-disease threat. The redbay ambrosia beetle serves as an insect vector for the fungus causing laurel wilt, a destructive disease of redbay (Persea borbonia) and other trees in the laurel family, including swampbay (Persea palustris), sassafras (Sassafras albidium), spicebush (Lindera spp.), and pondspice (Litsea aestivalis). Lindera melissifolia is a federally listed endangered plant, and Litsea aestivalis is listed as a threatened plant in multiple states.
The non-native redbay ambrosia beetle was first detected in Georgia in 2002; the associated pathogen, a highly virulent, invasive, wilt-inducing fungus, is believed to have arrived in the United States along with the beetle. Investigators believe that RAB was introduced into the United States in wooden crating material from Southeast Asia. Both RAB and laurel wilt have been observed as far north as Myrtle Beach, South Carolina. Mortality has been documented to spread about 20 miles per year on average.
Redbay and swampbay are prominent species in North Carolina’s coastal plain. In addition, pondspice and spicebush are found in the coastal plain and sassafras is found throughout the state. Laurel wilt has the potential to extirpate (cause local extinction) of any of these species in the Lauraceae family from much of the coastal plain. As the insect and pathogen go through an area, all affected plants eventually wilt and die. Dead foliage persisting on plants in areas with high densities of bay species will create fire hazards due to dead, dry aerial fuels. Because redbay trees resemble young live oaks, they are popular choices for retention during development in urban areas along the coast.
Various species of wildlife would also be impacted by the reduction or elimination of laurel wilt host species. Songbirds, bobwhite quail, and turkeys often feed on the fruit, while deer and bears frequently feed on foliage and fruits of redbay and sassafras. Several rare species of swallowtail butterflies rely heavily on redbay, sassafras, and spicebush for completion of their life cycle. At this time, no reliable controls exist for either the Raffaelea lauricola fungus or the Xyleborus glabratus insect vector.
This is notification (March 2011) that redbay ambrosia beetles and the fungus that causes laurel wilt have been identified and isolated/confirmed in North Carolina - the Colly area of eastern Bladen County. There are indications that it may also be present in as many as four other nearby counties, but at this time we are awaiting confirmation before we can say for sure. However, even without proper confirmation we are sure that near future natural spread to nearby counties is imminent. Laurel wilt has been found to move about 20 miles/year naturally, but can move faster with assistance from humans moving redbay/swampbay firewood, wood chips, tree trimming debris and wood products.
RAB and laurel causes mortality in all Lauraceae species including bays (Persea spp.), Sassafras, pondspice and pondberry. Information about the insect/disease can be found at the bottom of this email. In addition, a comprehensive website about laurel wilt can be found at: www.fs.fed.us/r8/foresthealth/laurelwilt/index.shtml
Adults are very similar to the Black Swallowtail
, but may be distinguished by missing one orange spot in the median spot-band on the hind wing (underside). Above, this species might be confused with Pipevine Swallowtail
: both have blue on the hind wing, but the latter species has fewer and smaller markings on the front wing.
Late instar larvae are similar to those of the Palamedes Swallowtail, but the underside of that species is rusty-brown or maroon beneath, this one is gray. Both have a blue spot on the first abdominal segment, which on Palamedes is adjacent to the eyespot but on Spicebush is within it. | <urn:uuid:4fa2241c-41da-4f35-a9f1-2abf650c1b24> | CC-MAIN-2021-43 | https://bugguide.net/node/view/2648 | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585460.87/warc/CC-MAIN-20211022052742-20211022082742-00477.warc.gz | en | 0.909516 | 1,567 | 3.125 | 3 |
As Piaget consistently acknowledges, all learning is an active process. Reading, then, is an activity, a proecess of confrontation between an individual and a text (3). For both Piaget and Chomsky, language is highly strcutured. In Chomsky's terms, there is a linguistic relationship between the surface structure and the phonological aspects of language.
Craig, R. P. (1984). Developing a Philosophy of Reading: Piaget and Chomsky. Reading Horizons, 25 (1). Retrieved from https://scholarworks.wmich.edu/reading_horizons/vol25/iss1/7 | <urn:uuid:a5d77c7b-9a2f-49a0-ae1b-fb70065474bd> | CC-MAIN-2018-13 | https://scholarworks.wmich.edu/reading_horizons/vol25/iss1/7/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646189.21/warc/CC-MAIN-20180319003616-20180319023616-00115.warc.gz | en | 0.852761 | 129 | 3.5 | 4 |
Jan 21, 2021
We mentioned John Locke in the episode on the Scientific Revolution. And Leibniz. They not only worked in the new branches of science, math, and philosophy, but they put many of their theories to use and were engineers.
Computing at the time was mechanical, what we might now think of as clockwork. And clockwork was starting to get some innovative new thinking. As we’ve covered, clockworks go back thousands of years. But with a jump in more and more accurate machining and more science, advances in timekeeping were coming. Locke and Huygens worked on pendulum clocks and then moved to spring driven clocks. Both taught English patents and because they didn’t work that well, neither were granted. But more somethings needed to happen to improve the accuracy of time.
Time was becoming increasingly important. Not only to show up to appointments and computing ever increasing math problems but also for navigation. Going back to the Greeks, we’d been estimating our position on the Earth relative to seconds and degrees. And a rapidly growing maritime power like England at the time needed to use clocks to guide ships. Why?
The world is a sphere. A sphere has 360 degrees which multiplied by 60 minutes is 21,600. The North South circumference is 21603 nautical miles. Actually the world isn’t a perfect sphere so the circumference around the equator is 21,639 nautical miles. Each nautical mile is 6,076 feet. When traveling by sea, trying to do all that math in feet and inches is terribly difficult and so we came up with 180 lines each of latitude, running east-west and longitude running north-south. That’s 60 nautical miles in each line, or 60 minutes. The distance between each naturally goes down as one gets closer to the poles - and goes down a a percentage relative to the distance to those poles. Problem was that the most accurate time to check your position relative to the sun was at noon or to use the Polaris North Star at night.
Much of this went back to the Greeks and further. The Sumerians developed the sexagesimal system, or base 60 and passed it down to the Babylonians in the 3rd millennium BCE and by 2000 BCE gave us the solar year and the sundial. As their empire grew rich with trade and growing cities by 1500 BCE the Egyptians had developed the first water clocks timers, proved by the Karnak water clock, beginning as a controlled amount of water filling up a vessel until it reached marks. Water could be moved - horizontal water wheels were developed as far back as the 4th millennium BCE.
Both the sundial and the water clock became more precise in the ensuing centuries, taking location and the time of the year into account. Due to water reacting differently in various climates we also got the sandglass, now referred to as the hourglass.
The sundial became common in Greece by the sixth century BCE, as did the water clock, which they called the clepsydra. By then it had a float that would tell the time. Plato even supposedly added a bowl full of balls to his inflow water clock that would dump them on a copper plate as an alarm during the day for his academy.
We still use the base 60 scale and the rough solar years from even more ancient times. But every time sixty seconds ticks by something needs to happen to increment a minute and every 60 minutes needs to increment an hour. From the days of Thales in the 600s BCE and earlier, the Greeks had been documenting and studying math and engineering. And inventing. All that gathered knowledge was starting to come together.
Ctesibius was potentially the first to head the Library of Alexandria and while there, developed the siphon, force pumps, compressed air, and so the earliest uses of pneumatics. He is accredited for adding a scale and float thus mechanics. And expanding the use to include water powered gearing that produced sound and moved dials with wheels.
The Greek engineer Philo of Byzantium in the 240s BCE, if not further back, added an escapement to the water clock. He started by simply applying a counterweight to the end of a spoon and as the spoon filled, a ball was released. He also described a robotic maid who, when Greeks put a cup in her hand, poured wine.
Archimedes added the idea that objects displaced water based on their volume but also mathematical understanding of the six simple machines. He then gets credited for being the first to add a gear to a water clock. We now have gears and escapements. Here’s a thought, given their lifetimes overlapping, Philo, Archimedes, and Ctesibius could have all been studying together at the library. Archimedes certainly continued on with earlier designs, adding a chime to the early water clocks. And Archimedes is often credited for providing us with the first transmission gears.
The Antikythera device proves the greeks also made use of complex gearing. Transferring energy in more complex gearing patterns. It is hand cranked but shows mathematical and gearing mastery by choosing a day and year and seeing when the next eclipse and olympiad would be. And the Greeks were all to happy to use gearing for other devices, such as an odometer in the first century BCE and to build the Tower of the Winds, an entire building that acted as a detailed and geared water clock as well as perhaps a model of the universe.
And we got the astrolabe at the same time, from Apollonius or Hipparchus. But a new empire had risen. The astrolabe was a circle of metal with an arm called an alidade that users sighted to the altitude of a star and based on that, you could get your location. The gearing was simple but the math required to get accurate readings was not. These were analog computers of a sort - you gave them an input and they produced an output. At this point they were mostly used by astronomers and continued to be used by Western philosophers at least until the Byzantines.
The sundial, water clocks, and many of these engineering concepts were brought to Rome as the empire expanded, many from Greece. The Roman Vitruvius is credited with taking that horizontal water wheel and flipping it vertical in 14 CE. Around the same time, Augustus Caesar built a large sundial in Campus Martius. The Romans also added a rod to cranks giving us sawmills in the third century. The larger the empire the more time people spent in appointments and the more important time became - but also the more people could notice the impact that automata had. Granted much of it was large, like a windmill at the time, but most technology starts huge and miniaturizes as more precision tooling becomes available to increasingly talented craftspeople and engineers.
Marcus Vitruvius Pollio was an architect who wrote 10 books in the 20s BCE about technology. His works link aqueducts to water-driven machinations that could raise water from mines, driven by a man walking on a wheel above ground like a hamster does today but with more meaning. They took works from the Hellenistic era and put them in use on an industrial scale. This allowed them to terraform lands and spring new cities into existence. Sawing timber with mills using water to move saws allowed them to build faster. And grinding flour with mills allowed them to feed more people.
Heron of Alexandria would study and invent at the Library of Alexandria, amongst scrolls piled to the ceilings in halls with philosophers and mechanics. The inheritor of so much learning, he developed vending machines, statues that moved, and even a steam engine. If the Greeks and early Roman conquered of Alexandria could figure out how a thing work, they could automate it.
Many automations were to prove the divine. Such as water powered counterweights to open doors when priests summoned a god, and blew compressed air through trumpets. He also used a wind mill to power an organ and a programmable cart using a weight to turn a drive axle. He also developed an omen machine, with ropes and pulleys on a gear that caused a bird to sing, the song driven by a simple whistle being lowered into water. His inventions likely funding more and more research.
But automations in Greek times were powered by natural forces, be it hand cranked, fire, or powered by water. Heron also created a chain driven automatic crossbow, showing the use of a chain-driven machine and he used gravity to power machines, automating devices as sand escaped from those sand glasses.
He added pegs to pulleys so the distance travelled could be programmed. Simple and elegant machines. And his automata extended into the theater. He kept combining simple machines and ropes and gravity into more and more complex combinations, getting to the point that he could run an automated twenty minute play. Most of the math and mechanics had been discovered and documented in the countless scrolls in the Library of Alexandria.
And so we get the term automated from the Greek word for acting of oneself. But automations weren’t exclusive to the Greeks. By the time Caligula was emperor of the Roman Empire, bronze valves could be used to feed iron pipes in his floating ships that came complete with heated floors. People were becoming more and more precise in engineering and many a device was for telling time. The word clock comes from Latin for bell or clogga. I guess bells should automatically ring at certain times. Getting there...
Technology spreads or is rediscovered. By Heron the Greeks and Romans understood steam, pistons, gears, pulleys, programmable automations, and much of what would have been necessary for an industrial or steampunk revolution. But slaves were cheap and plentiful in the empire. The technology was used in areas where they weren’t. Such as at Barbegal to feed Arles in modern France, the Romans had a single hillside flour grinding complex with automated hoppers, capable of supplying flour to thousands of Romans. Constantine, the first Christian Roman emperor, was based there before founding Constantinople.
And as Christianity spread, the gimmicks that enthralled the people as magic were no longer necessary. The Greeks were pagans and so many of their works would be cleansed or have Christian writings copied over them. Humanity wasn’t yet ready. Or so we’ve been led to believe.
The inheritors of the Roman Empire were the Byzantines, based where Europe meets what we now think of as the Middle East. We have proof of geared portable sundials there, fewer gears but showing evidence of the continuation of automata and the math used to drive it persisting in the empire through to the 400s. And maybe confirming written accounts that there were automated lions and thrones in the empire of Constantinople. And one way geared know-how continued and spread was along trade routes which carried knowledge in the form of books and tradespeople and artifacts, sometimes looted from temples. One such trade route was the ancient Silk Road (or roads).
Water clocks were being used in Egypt, Babylon, India, Persia, Greece, Rome, and China. The Tang Dynasty in China took or rediscovered the escapement to develop a water powered clockwork escapement in the 700s and then in the Song Dynasty developed astronomical clock towers in the 900s. By now the escapements Su Sung is often credited for the first mechanical water clock in 1092. And his Cosmic Engine would mark the transition from water clocks to fully mechanical clocks, although still hydromechanical. The 1100s saw Bhoja in the Paramara dynasty of India emerge as a patron of the arts and sciences and write a chapter on mechanical bees and birds. These innovations could have been happening in a vacuum in each - or word and works could have spread through trade.
That technology disappeared in Europe, such as plumbing in towns that could bring tap water to homes or clockworks, as the Roman Empire retreated. The specialists and engineers lacked the training to build new works or even maintain many that existed in modern England, France, and Germany. But the heads of rising eastern empires were happy to fund such efforts in a sprint to become the next Alexander. And so knowledge spread west from Asia and was infused with Greek and Roman knowhow in the Middle East during the Islamic conquests. The new rulers expanded quickly, effectively taking possession of Egypt, Mesopotamia, parts of Asia, the Turkish peninsula, Greece, parts of Southern Italy, out towards India, and even Spain. In other words, all of the previous centers of science. And they were tolerant, not looking to convert conquered lands to Islam. This allowed them to learn from their subjects in what we now think of as the Arabic translation movement in the 7th century when Arabic philosophers translated but also critiqued and refined works from the lands they ruled.
This sparked the Muslim golden age, which became the new nexus of science at the time. Over time we saw the Seljuks, ruling out of Baghdad, and Abbasids as Islamic empires who funded science and philosophy. They brought caravans of knowledge into their capitals. The Abbasids even insisted on a specific text from Ptolemy (the Almagest) when doing a treaty so they could bring it home for study. They founding of schools of learning known as Madrasas in every town. This would be similar to a university system today.
Over the centuries following, they produced philosophers like Muhammad Ibn Musa Al-Khwarizmi, who solved quadratic equations, giving us algebra. This would become important to make clockwork devices became more programmable (and for everything else algebra is great at helping with). They sent clockworks as gifts, such as a brass automatic water clock sent to Charlemagne between 802 and 807, complete with chimes. Yup, the clogga rang the bell.
They went far past where Heron left off though. There was Ibn-Sina, Al-Razi, Al-Jazari, Al Kindi, Thābit ibn Qurra, Ridwan, and countless other philosophers carrying on the tradition. The philosophers took the works of the Greeks, copied, and studied them. They evolved the technology to increasing levels of sophistication. And many of the philosophers completed their works at what might be considered the Islamic version of the Library of Alexandria, The House of Wisdom in Baghdad. In fact, when Baghdad was founded about 50 miles north of ancient Babylon, the Al-Mansur Palace Library was part of the plan and over subsequent Caliphs was expanded adding an observatory that would then be called the House of Wisdom.
The Banu Musa brothers worked out of there and wrote twenty books including the first Book of Ingenious Devices. Here, they took the principles the Greeks and others had focused on and got more into the applications of those principles. On the way to their compilation of devices, they translated books from other authors, including A Book on Degrees on the Nature of Zodiacal Signs from China and Greek works.The three brothers combined pneumatics and aerostatics. They added plug valves, taps, float valves, and conical valves. They documented the siphon and funnel for pouring liquids into the machinery and thought to put a float in a chamber to turn what we now think of as the first documented crank shaft. We had been turning circular motion into linear motion with wheels, but we were now able to turn linear motion into circular motion as well.
They used all of this to describe in engineering detail, if not build and invent, marvelous fountains. Some with multiple jets alternating. Some were wind powered and showed worm-and-pinion gearing.
Al-Biruni, around the turn of the first millennia, came out of modern Uzbekistan and learned the ancient Indian Sanskrit, Persian, Hebrew, and Greek. He wrote 95 books on astronomy and math. He studied the speed of light vs speed of sound, the axis of the earth and applied the scientific method to statics and mechanics. This moved theories on balances and weights forward. He produced geared mechanisms that are the ancestor of modern astrolabes.
The Astrolabe was also brought to the Islamic world. Muslim astronomers added newer scales and circles. As with in antiquity, they used it in navigation but they had another use, to aid in prayer by showing the way to Mecca.
Al-Jazari developed a number of water clocks and is credited with others like developed by others due to penning another Book of Knowledge of Ingenious Mechanical Devices. Here, he describes a camshaft, crank dive and reciprocating pumps, two way valves, and expanding on the uses of pneumatic devices. He developed programmable humanoid robots in the form of automatic musicians on a boat. These complex automata included cams and pegs, similar to those developed by Heron of Alexandria, but with increasing levels of sophistication, showing we were understanding the math behind the engineering and it wasn’t just trial and error.
All golden ages must end. Or maybe just evolve and migrate. Fibonacci and Bacon quoted then, showing yet another direct influence from multiple sources around the world flowing into Europe following the Holy Wars.
Pope Urban II began inspiring European Christian leaders to wage war against the Muslims in 1095. And so the Holy Wars, or Crusades would begin and rage until 1271. Here, we saw manuscripts copied and philosophy flow back into Europe. Equally as important, Muslim Caliphates in Spain and Sicily and trade routes. And another pair of threats were on the rise. The plague and the Mongols.
The Mongol invasions began in the 1200s and changed the political makeup of the known powers of the day. The Mongols sacked Baghdad and burned the House of Wisdom. After the mongols and Mughals, the Islamic Caliphates had warring factions internally, the empires fractured, and they turned towards more dogmatic approaches. The Ottomon empire rose and would last until World War I, and while they continued to sponsor scientists and great learners, the nexus of scientific inquiry and the engineering that inspired shifted again and the great works were translated with that shift, including into Latin - the language of learning in Europe. By 1492 the Moors would be kicked out of Spain. That link from Europe to the Islamic golden age is a critical aspect of the transfer of knowledge.
The astrolabe was one such transfer. As early as the 11th century, metal astrolabes arrive in France over the Pyrenees to the north and to the west to Portugal . By the 1300s it had been written about by Chaucer and spread throughout Europe. Something else happened in the Iberian peninsula in 1492. Columbus sailed off to discover the New World. He also used a quadrant, or a quarter of an astrolabe. Which was first written about in Ptolemy’s Almagest but later further developed at the House of Wisdom as the sine quadrant.
The Ottoman Empire had focused on trade routes and trade. But while they could have colonized the New World during the Age of Discovery, they didn’t. The influx of wealth coming from the Americas caused inflation to spiral and the empire went into a slow decline over the ensuing centuries until the Turkish War of Independence, which began in 1919.
In the meantime, the influx of money and resources and knowledge from the growing European empires saw clockworks and gearing arriving back in Europe in full force in the 14th century.
In 1368 the first mechanical clock makers got to work in England. Innovation was slowed due to the Plague, which destroyed lives and property values, but clockwork had spread throughout Europe. The Fall of Constantinople to the Ottomons in 1453 sends a wave of Greek Scholars away from the Ottoman Empire and throughout Europe. Ancient knowledge, enriched with a thousand years of Islamic insight was about to meet a new level of precision metalwork that had been growing in Europe.
By 1495, Leonardo da Vinci showed off one of the first robots in the world - a knight that could sit, stand, open its visor independently. He also made a robotic lion and repeated experiments from antiquity on self driving carts. And we see a lot of toys following the mechanical innovations throughout the world. Because parents.
We think of the Renaissance as coming out of Italy but scholars had been back at it throughout Europe since the High Middle Ages. By 1490, a locksmith named Peter Hele is credited for developing the first mainspring in Nurnburg. This is pretty important for watches. You see, up to this point nearly every clockwork we’ve discussed was powered by water or humans setting a dial or fire or some other force. The mainspring stores energy as a small piece of metal ribbon is twisted around an axle, called an abror, into a spiral and then wound tighter and tighter, thus winding a watch.
The mainspring drove a gear train of increasingly smaller gears which then sent energy into the escapement but without a balance wheel those would not be terribly accurate just yet. But we weren’t powering clocks with water.
At this point, clocks started to spread as expensive decorations, appearing on fireplace mantles and on tables of the wealthy. These were not small by any means. But Peter Henlein would get the credit in 1510 for the first real watch, small enough to be worn as a necklace.
By 1540, screws were small enough to be used in clocks allowing them to get even smaller. The metals for gears were cut thinner, clock makers and toy makers were springing up all over the world. And money coming from speculative investments in the New World was starting to flow, giving way to fuel even more investment into technology.
Jost Burgi invented the minute hand in 1577. But as we see with a few disciplines he decided to jump into, Galileo Galilei has a profound impact on clocks. Galileo documents the physics of the pendulum in 1581 and the center of watchmaking would move to Geneva later in that decade. Smaller clockworks spread with wheels and springs but the 1600s would see an explosion in hundreds of different types of escapements and types of gearing. He designed an escapement for a pendulum clock but died before building it.
1610 watches got glass to protect the dials and 1635 French inventor Paul Viet Blois added enamel to the dials. Meanwhile, Blaise Pascal developed the Pascaline in 1642, giving the world the adding machine.
But it took another real scientist to pick up Galileo’s work and put it into action to propel clocks forward. To get back to where we started, a golden age of clockwork was just getting underway. In 1657 Huygens created a clock driven by the pendulum, which by 1671 would see William Clement add the suspension spring and by 1675 Huygens would give us the balance wheel, mimicking the back and forth motion of Galileo’s pendulum. The hairspring, or balance spring, then controlled the speed making it smooth and more accurate. And the next year, we got the concentric minute hand.
I guess Robert Hooke gets credit for the anchor escapement, but the verge escapement had been in use for awhile by then. So who gets to claim inventing some of these devices is debatable. Leibniz then added a stepped reckoner to the mechanical calculator in 1672 going from adding and subtracting to multiplication and division. Still calculating and not really computing as we’d think of it today.
At this point we see a flurry of activity in a proton-industrial revolution. Descartes puts forth that bodies are similar to complex machines and that various organs, muscles, and bones could be replaced with gearing similar to how we can have a hip or heart replaced today. Consider this a precursor to cybernetics. We see even more mechanical toys for the rich - but labor was still cheap enough that automation wasn’t spreading faster.
And so we come back to the growing British empire. They had colonized North America and the empire had grown wealthy. They controlled India, Egypt, Ireland, the Sudan, Nigeria, Sierra Leone, Kenya, Cyprus, Hong Kong, Burma, Australia, Canada, and so much more. And knowing the exact time was critical for a maritime empire because we wouldn’t get radar until World War II.
There were clocks but still, the clocks built had to be corrected at various times, based on a sundial. This is because we hadn’t yet gotten to the levels of constant power and precise gearing and the ocean tended to mess with devices. The growing British Empire needed more reliable ways than those Ptolemy used to tell time. And so England would offer prizes ranging from 10,000 to 20,000 pounds for more accurate ways to keep time in the Maritime Act in 1714. Crowdsourcing.
It took until the 1720s. George Graham, yet another member of the Royal Society, picked up where Thomas Tompion left off and added a cylinder escapement to watches and then the deadbeat escapement. He chose not to file patents for these so all watch makers could use them. He also added mercurial compensation to pendulum clocks. And John Harrison added the grid-iron compensation pendulum for his H1 marine chronometer. And George Graham added the cylinder escapement.
1737 or 1738 sees another mechanical robot, but this time Jacques de Vaucanson brings us a duck that can eat, drink, and poop. But that type of toy was a one-off. Swiss Jaquet-Droz built automated dolls that were meant to help sell more watches, but here we see complex toys that make music (without a water whistle) and can even write using programmable text. The toys still work today and I feel lucky to have gotten to see them at the Museum of Art History in Switzerland. Frederick the Great became entranced by clockwork automations. Magicians started to embrace automations for more fantastical sets.
At this point, our brave steampunks made other automations and their automata got cheaper as the supply increased. By the 1760s Pierre Le Roy and Thomas Earnshaw invented the temperature compensated balance wheel. Around this time, the mainspring was moved into a going barrel so watches could continue to run while the mainspring was being wound. Many of these increasingly complicated components required a deep understanding of the math about the simple machine going back to Archimedes but with all of the discoveries made in the 2,000 years since.
And so in 1785 Josiah Emery made the lever escapement standard. The mechanical watch fundamentals haven’t changed a ton in the past couple hundred years (we’ll not worry about quartz watches here). But the 1800s saw an explosion in new mechanical toys using some of the technology invented for clocks. Time brings the cost of technology down so we can mass produce trinkets to keep the kiddos busy. This is really a golden age of dancing toys, trains, mechanical banks, and eventually bringing in spring-driven wind-up toys.
Another thing happened in the 1800s. With all of this knowhow on building automations, and all of this scientific inquiry requiring increasingly complicated mathematics, Charles Babbage started working on the Difference Engine in 1822 and then the Analytical Engine in 1837, bringing in the idea of a Jacquard loom punched card. The Babbage machines would become the precursor of modern computers, and while they would have worked if built to spec, were not able to be run in his lifetime.
Over the next few generations, we would see his dream turn into reality and the electronic clock from Frank Hope-Jones in 1895. There would be other innovations such as in 1945 when the National Institute of Standards and technology created the first atomic clock. But in general parts got smaller, gearing more precise, and devices more functional. We’d see fits and starts for mechanical computers, with Percy Ludgate’s Analytical Machine in 1909, the Marchant Calculator in 1918, the electromechanical Enigma in the 1920s, the Polish Enigma double in 1932, the Z1 from Konrad Zuse in 1938, and the Mark 1 Fire Control Computer for the US Navy in the World War II era, when computers went electro-mechanical and electric, effectively ending the era of clockwork-driven machinations out of necessity, instead putting that into what I consider fun tinkerations.
Aristotle dreamed of automatic looms freeing humans from the trappings of repetitive manual labors so we could think. A Frenchman built them. Long before Aristotle, Pre-Socratic Greek legends told of statues coming to life, fire breathing statues, and tables moving themselves. Egyptian statues were also known to have come to life to awe and inspire the people. The philosophers of the Thales era sent Pythagoras and others to Egypt where he studied with Egyptian priests. Why priests? They led ascetic lives, often dedicated to a branch of math or science. And that’s in the 6th century BCE. The Odyssey was written about events from the 8th century BCE.
We’ve seen time and time again in the evolutions of science that we often understood how to do something before we understood why. The legendary King Solomon and King Mu of the Zhao dynasty are said to have automata, or clockwork, or moving statues, or to have been presented with these kinds of gifts, going back thousands of years. And there is the chance that they were. Since then, we’ve seen a steady advent of this back and forth between engineering and science.
Sometimes, we understand how to do something through trial and error or random discovery. And then we add the math and science to catch up to it. Once we do understand the science behind a discovery we uncover better ways and that opens up more discoveries. Aristotle’s dream was realized and extended to the point we can now close the blinds, lock the doors, control the lights, build cars, and even now print cars. We mastered time in multiple dimensions, including Newton’s relative time. We mastered mechanics and then the electron and managed to merge the two. We learned to master space, mapping them to celestial bodies. We mastered mechanics and the math behind it.
Which brings us to today. What do you have to do manually? What industries are still run by manual labor? How can we apply complex machines or enrich what those can do with electronics in order to free our fellow humans to think more? How can we make Aristotle proud? One way is to challenge and prove or disprove any of his doctrines in new and exciting ways. Like Newton and then Einstein did. We each have so much to give. I look forward to seeing or hearing about your contributions when its time to write their histories! | <urn:uuid:29e1b20d-0eef-4c35-a8fa-f0c9e6d06a6c> | CC-MAIN-2023-14 | https://thehistoryofcomputing.net/a-steampunks-guide-to-clockworks-from-the-cradle-of-civilization-to-electromechanical-computers | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00127.warc.gz | en | 0.967606 | 6,407 | 3.578125 | 4 |
On your journey to become a full stack software developer you will have to learn about databases. You may have already began thinking about different database technologies like mySQL or Oracle 12c, and different techniques for utilizing these databases. You have to start thinking about how to interact with a database to store and retrieve data, and you also have to think about how to structure that information. In this blog I will discuss how to extract data out of a database utilizing SQL queries. But, first I will talk about a planning technique that many developers use to map out their data storage, by creating a schema.
What do I mean when I say schema? A schema is how you describe the technique of organizing a database and connecting the relationships between its different pieces or "entities." It will tell you how certain data relates to other data. I have been taught to think of a schema as a "blueprint for your database." A schema is something that you will design and plan during the starting stages of a project. This will give you a visual picture of your data before you begin writing code.
Let us imagine that we have been given the task of designing a database for a movie collection. For the purpose of this blog, we are only going to keep track of basic information about the movies: their genre and their director. A real life application of a movie database will require much more information, but for this demonstration I have chosen to keep things simple.
The schema in this blog was designed in dbdiagram.io an easy to use tool for drawing entity-relationship diagrams.
When you see or hear the term 'entity' while dealing with database diagrams, it is referring to a distinct unit in our diagram that has data associated with it.
In our movie collection diagram we have a movie entity, a director entity, and a genre entity. Our entities in our schema are each being represented by a table. In the table we list each of the attributes that are related to that table name.
We are discussing relational database systems and working with multiple tables. So we will need to make connections to show relationships between the tables. The connections shown on the diagram below represent a one to many relationship. Each movie will only have one director or one genre, but each genre can be related to many movies, and a director could have made many movies. Those connections are shown below with the line.
The dir_id from our director table will be connected to the id_director in our movie table, and the gen_id in our genres table is connected to our id_genre in our movie table. You will see how we can utilize those connections later to display data from our table.
Let us create our table, you use SQL commands to make your table in the database, the CREATE TABLE statement will tell the database to name the table accordingly. In our movie, director, and genres tables we stating the names of our rows and declaring what data type they will be. The ALTER TABLE commands will establish connections between our tables. Since the director and genre tables will be related to many different movies, we will add a foreign key to them and make a reference to our main movie table.
Now that our tables are designed we can fill them with some movies. We can use INSERT INTO to state the table we would like to enter data into. The we can enter the column name in parentheses and their VALUES after.
Now if we would like to view all the data from our movie table we can use the SELECT statement and the all * to select all the data of that table from the database.
This is what the data will look like. You can see in id_genre and id_director the corresponding number to the genre and director they are related to.
Lets look at similar syntax to grab all of the data from our other tables.
Now if we would like to see our movie table and include the genre and director. We can utilize our connections to the other tables and join the data to our main table. In the code below, the LEFT JOIN keyword returns all movies from the left table (movie), and the matched genre from the right table (genres). The same is done for the related data in the directors table.
You can see below that we have all the data on our movies. It is important to learn how to display data in your mySQL database because you may need to grab just the right kind of information for a website you are communicating with. Let us take a final look at our movies and all of their properties.
The journey to becoming a full stack developer can be long and sometimes it can seem overwhelming. But the accomplishment of learning a concept of computer science that has been around your whole life can be empowering. I hope you learned a little more about database planning and building a schema. I also hope you continue to learn more about different data storage/retrieval techniques. | <urn:uuid:c2a59a1e-ddb9-4675-8211-3fc4ed16ac5a> | CC-MAIN-2020-29 | https://dev.to/jerrymcdonald/journey-to-full-stack-the-schema-of-things-la0 | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655894904.17/warc/CC-MAIN-20200707173839-20200707203839-00559.warc.gz | en | 0.934964 | 1,002 | 3.28125 | 3 |
The new face of addiction is staring into a smartphone and looking for something crazy to do with a skateboard.
It lurks below the surface of Facebook. It dwells within the heart of any great video game.
It's just not classified as an official disease -- yet.
Medical authorities are considering whether to designate Internet addiction as a disease in the upcoming fifth edition of the Diagnostic and Statistical Manual of Mental Disorders. Other researchers, meanwhile, claim that extreme sports may cause similar addictive behaviors.
"With this boom in technology, with smartphones and Facebook, with our access to the Internet being so easy, environmental risk factors for addiction have gone up like crazy, making our world a more scary place, maybe," says Dipon Ghosh, a Yale University doctoral student doing research on neural pathways.
Ghosh and other Yale University post-doctoral students took up the issue at a recent event at the New Haven Free Public Library, sponsored by the Yale Science Diplomats program. They say it's a topic certain to spark intense discussion in the coming months.
"New reports are showing that as a form of stress management, more and more people are turning to the Internet, where there's a proven reward," Ghosh says.
"Normally, in the reward circuits of the brain, Facebook leads to some sort of reward. But as you become addicted, or as you become more and more stressed, these rewards become stronger and stronger.
"In a certain population of individuals, who are stressed and continually turning to the Internet, this overcomes all other behaviors."
Age also plays a role. Yale third-year doctoral student Lu Jin says there are critical periods in life when the brain is particularly sensitive to changes caused by exposure to the Internet. The teenage years is one such period.
Furthermore, we also know that certain chemicals in the brain spike during online social networking -- just as they do when people interact in person. The question, Jin, Ghosh and colleague Kenneth Buck say, is whether the constant bombardment of digital interaction is "hijacking" our neural circuitry.
To answer that, you need to understand more about that complex circuitry, according to Buck.
"There are 100 trillion synaptic connections in a human brain," Buck explains. "A single neuron can have thousands of synaptic connections."
And what sets those connections in motion? A chemical called dopamine, says Jin, that transmits pleasurable feelings in synapses.
In addiction, she explains, dopamine molecules are not able to return to their original positions to be reused by the brain. Increasingly, an addict needs higher levels of dopamine release to achieve the same feeling of pleasure.
"What's happening when we do these extreme activities is cause a lot of dopamine release," Jin says. Excessive Internet exposure is similar.
Ghosh identifies an even more specific culprit: A polypeptide hormone called corticotropin-releasing factor or CRF, that regulates our behavior when we're under stress and causes a surge in dopamine to be released.
Ghosh furnishes a typical scenario.
"You are three weeks before the biggest final exam of your life," he says. "You have two choices. You can study, or you can procrastinate by going on Facebook."
Initially, Ghosh says, a normally functioning brain juggles the pros and cons of short-term pleasure from checking Facebook, versus long-term benefits of studying.
"Now, imagine time passes and you're closer and closer to the exam," Ghosh continues. "You're getting more and more stressed. Now studying becomes something of an intense activity, whereas procrastination is starting to look more and more fun.
"In fact, with CRF, it's increasing dopamine levels in your brain. That actually makes Facebook more and more rewarding. The more stressed out you are, the more dopamine is released, and the more inclined you're going to be to look at Facebook instead of studying.
"This is the hallmark of what goes on in an addiction," he concludes.
Ghosh and his colleagues say they're convinced more biological research is necessary to develop effective treatment for Internet addiction. Such work is being conducted right now with flies, monkeys, worms and sea slugs.
"Yes, they don't look very much like you at all, but it turns out all of these guys share the same biological machinery that we use," Ghosh says.
And for now, at least, they don't have Facebook accounts.
Call Jim Shelton at 203-789-5664 or visit his blog at www.thejimbolist.com. To receive breaking news first, simply text the word nhnews to 22700. *Msg & data rates may apply. Text HELP for help. Text STOP to cancel. | <urn:uuid:45a8de03-87f3-4b30-b547-90bec2fc908a> | CC-MAIN-2014-23 | http://www.nhregister.com/general-news/20120310/hi-im-insert-name-here-and-im-a-facebook-addict-video?viewmode=2 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274866.27/warc/CC-MAIN-20140728011754-00150-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.950775 | 977 | 3.140625 | 3 |
RLE investigators Qing Hu, Marin Solijacic, and David Perreault are honorees of the 2013 Invented Here! Program. Hu, one of four featured honorees, was awarded the honor along with RLE visiting engineer, Alan Lee, for their invention – “Terahertz lasers and amplifiers based on resonant optical phonon scattering to achieve population inversion”. Hu was honored at the annual Invented Here! event hosted by the Museum of Science on September 19th. Soljacic et. al. are 2013 Program honorees for their patent – “Wireless Energy Transfer Across Variable Distances” – and Perreault et. al. were also named as honorees for their contribution – “Method and Apparatus for a Resonant Converter”.
The Invented Here! program aims to educate the public about New England innovators, their inventions, and the stories behind their innovations. As part of the selection criteria, the innovation must have been developed in New England or by an inventor who resides in New England, and represent a technology that can be described or demonstrated to the general public at the Museum. | <urn:uuid:a29b51f8-52f5-49bc-80bb-435f825b9ee7> | CC-MAIN-2020-16 | https://www.rle.mit.edu/hu-soljacic-and-perreault-named-2013-invented-here-honorees/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496330.1/warc/CC-MAIN-20200329232328-20200330022328-00395.warc.gz | en | 0.96706 | 246 | 2.578125 | 3 |
Will Joel Friedman, Ph.D. is a seasoned clinician with experience working with adults, couples, families, adolescents and older children since 1976. His aim ...Read More
“God wisely designed the human body so that we can neither pat our own backs nor kick ourselves too easily.” —Author Unknown
Recognizing common social defenses is vital to living in the present. Common social defenses can be understood as cognitive mechanisms used to seek relief from conflicting emotions and anxiety that are usually outside of our conscious awareness. The ego-mind or imaginary self is thought to use defenses to protect us from being overwhelmed and not being able to function to meet the needs of survival and life. Illustrations of more impairing psychological challenges are immature defenses, including regressive behavior, dissociation, hypochondria, somatization and fantasizing disconnected from human interaction.
Within the range of normal behavior are everyday social defenses by which people protect themselves from change, emotional vulnerability, relationships and difficult aspects of reality. Unfortunately, they are prone to dysfunction by reinforcing the very unworkable life conditions in which people get stuck. Although each of the following common defenses can apply to feelings, thoughts, behavior or situations, behavioral examples are offered in most instances as ones most people can readily relate to. Here are seven classic forms worth noticing:
PROJECTION is the attribution of emotionally unacceptable behavior inside yourself and project or attribute this to others; for example, condemning another for selfishness when you won’t face your own selfish behavior or to praise someone else while rejecting praise for yourself. Projection is very common. Psychologist Fritz Perls, one never prone to use hyperbole or overstate matters, was attributed to have said on his deathbed, “Everything is projection.”
RATIONALIZING makes a behavior appear reasonable and rational when it is clearly not so, for example, telling your partner that it is good that the garbage pick-up was missed because it is more efficient to have all the garbage picked up next week.
INTELLECTUALIZING seeks to analyze and interpret behavior on the mental level, often disregarding emotional and practical considerations; for example, assigning calculated motives to the performance of the simplest act of kindness.
QUALIFIERS tend to soften communication, indicating permission for not following through on commitments, appearing in conversation as maybe, perhaps, possibly, kind of, a little bit, I guess, and so on. While the motive may be to preserve the relationship when giving hard news, qualifiers often negate the force of communication and undercut personal power.
DISPLACEMENT is the transference of feelings from their true cause to a more acceptable or less threatening substitute, such as chewing out a co-worker instead of expressing anger directly to a manager, or lashing out at a child or pet after a stressful day.
COMPENSATION OR OVERCOMPENSATION is exaggerated behavior intended to make up for real or imagined deficiencies, such as extreme confidence after a show of no-confidence or an act of generosity after stinginess. Acting super confident can aim to mask or cover up feelings of little or no confidence, while acting superior can also be a smokescreen for feeling inferior.
EXCUSES are a form of denying reality and then giving reasons, like “That’s just the way I am” or “You can’t teach old dogs new tricks.” Far-fetched reasons are used to excuse hurtful behavior, such as “I really didn’t lie, I didn’t want to hurt your feelings” or “I was just testing the car brakes when the tree ran into me!!” Excuses are sometimes considered to be of three varieties: (1) “I didn’t do it”; (2) “I did it, but it isn’t so bad”; and (3) “Yes, but. . . ” (with one or more reason(s) or explanation(s) offered that, again, is a rationalization or intellectualization).
Each common social defense offers unbelievable explanations that act as a smokescreen for a lack of personal responsibility. Used in these dysfunctional ways, explanations are self-justifying and excuse irresponsible behavior. Under such conditions, advice to ‘consider the source’ makes sense. In these cases what a friend once told me hits the nail on the head: you don’t have to explain to your friends and your enemies won’t believe you anyway!
Of course, explanations can also help you make sense or understand the purpose for some feeling, thought, behavior or situation. Responsible explanations are helpful in enlisting people to cooperate and follow through in actions. In this sense, explanations may help someone comply with a task or create some order out of confusion. Usually, a little goes a long way.
Some defenses, like denial and dissociation, are necessary at times for our emotional and psychological survival. To prevent a worse outcome, like death or psychosis, very intelligent and creative individuals dissociate or go blank during episodes of shock, abuse, or terror.
More commonly, it takes some period of time for you to adapt to major changes, like the loss of a loved one, of a job or a home. Sometimes “healthy denial” serves the purposes of protection, balance and release in situations with little possibility of control, such as taking off in a plane or being anesthetized for surgery. Practically speaking, necessary defenses serve you best when they are used as a temporary shield, until you can make effective adaptations. Consciously let go of a defense only when you can replace it with a healthier one, as you mature and develop.
The first step in developing more mature defenses is to progressively release your preferred, but unworkable, defenses. This can be realistically accomplished over time in a process that begins with your identifying and buying out of each defense. To buy out means to let go of an emotional, cognitive and behavioral pattern you had the habit of doing automatically that is no longer needed as you more and more use healthier defenses like those that follow.
The second step is to acknowledge and further develop your mature defenses. These are essential to prevent being overwhelmed by over-stimulation, work duties, emotional demands in relationships in addition to high levels of stress or change. Mature defenses include:
1. Relaxation, such as deep breathing, visualization, meditation and prayer
2. Anticipating and planning to productively use life resources, (so long as this is balanced with responsible follow through in actions)
3. Briefly postponing and even suppressing the expression of a feeling until timing or conditions are ripe (and processing it later)
4. Redirecting or sublimating your energies into work or play (so long as this isn’t avoidance of responsibilities)
5. Honest or real equanimity or keeping emotional balance in reality with minimal reactivity by cultivating patience and compassion, perspective and understanding
6. Acts of kindness, altruism, service and contribution
7. Humor, wit, irony and paradox at no one’s expense.
As you gradually release immature defenses, and wean yourself from common social defenses and replace these with mature defenses, the prospect of letting go and surrendering all defenses, at least most of the time, is a vision worth considering. As you see through the false self or ego-mind that does not even exist, what would the point of having any defenses be? While you can call upon these mature defenses as apparent “old friends” when difficulties and challenges arise that may throw you for a loop, do these really have any place, interest or importance for you, to “have to” engage any of them in your life? Does being who you truly are, your True Self or authentic liberated self, require any defenses at all? Or, is being you enough? Pause, look and see for yourself. | <urn:uuid:5cfb1039-98c2-48dc-b538-5e27f971782a> | CC-MAIN-2018-43 | https://www.mentalhelp.net/blogs/common-and-mature-defenses-and-beyond/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00314.warc.gz | en | 0.94604 | 1,641 | 2.65625 | 3 |
It is common to have your dog stung by bees if you live in a garden setting. Dogs are very adventurous, curious and very playful. Depending on the affected area, bee stings can range from being just painful to life-threatening. Here is more on what to do in case your dog is stung by bees.
Dog Stung by Bees
- Dog Stung by Bees
- Common Places Where Dogs are Vulnerable to Bees Sting
- Signs of a Bee Sting on a Dog
- Steps To Follow When Treating Bee Sting on Dogs
- Step 1: Remove the Stinger
- Step 2. Apply Ice on the Affected Area
- Step 3. Apply Bicarbonate Soda Or Meat Tenderizer On The Wound.
- How to apply bicarbonate soda on a bee sting?
- Meat tenderizer paste and how to apply
- Give the Dog Antihistamine
- The Allergic Reaction Caused By Bee Stings
- Signs of Severe Allergic Reaction/ Anaphylaxis
- How Long Does a Bee Sting Last on a Dog
- Anaphylaxis State Caused By a Bee Sting
- Precaution Measures to Take to Make the Garden Less Exposed to Bee’s Presences
Animals are renowned for their playful activities especially dogs who are very curious and adventurous. Dogs enjoy when they chase and run after every moving item using the nose and paws.
Most especially animals such as bees, wasps, and hornets which are very protective of their territory and space. The dog’s inquisitiveness to exploit usually puts them in a life threating situation. Bees are defensive and protect themselves by stinging what they perceive as a threat.
Common Places Where Dogs are Vulnerable to Bees Sting
- Dogs use their noses and paws to Bee stings on dog paw and noses are very common. This is where the bees usually strike first.
- The face and the lips can also be stung this result in swelling.
- The tongue and the dog’s throat can be affected as a result of the dog swallowing the bee.
Signs of a Bee Sting on a Dog
- Itchiness of the skin on the affected area.
- Severe pain.
- Redness of the wound.
- Body swelling especially the stung area.
Steps To Follow When Treating Bee Sting on Dogs
It is often inevitable to train the dog to stay away from the bee presences. Thus it is important for dog owners to understand first aid techniques that can prevent the loss of life.
Medication depends on the type of bee as African bees are considered more dangerous, the location of the bee sting and the number of times the dog has been stung. If the dog has a bee stung the following medical steps should be followed:
Step 1: Remove the Stinger
The first step is usually very important as it helps in reducing the amount of venom the bee has injected the dog. One can do this by using a credit card to scrap over the dog skin surface so as to remove the stinger. Credit cards are more efficient compared to tweezers.
Tweezers can tear the dog skin effectively squeezing the venom glands which pumps more poison onto the dog’s skin. Take precaution while removing the stinger and if the dog starts to be irritated weak or vomits it is important that you seek the services of the vet.
Step 2. Apply Ice on the Affected Area
After successfully removing the bee sting and the dog is a little bit sore but bright applying ice gently on the affected area while gently massaging is very critical. Alternatively, you can soak a piece of cloth in water and wrap it around the affected area.
Ice and water are useful as it aids in reducing swelling of the local tissues and stops any further spread of the poison. Massaging will take off the pain inflicted on the dog’s skin as it freezes the nerves of the skin.
Step 3. Apply Bicarbonate Soda Or Meat Tenderizer On The Wound.
Both bicarbonate soda and meat tenderizer as useful in neutralizing the acid of the bee’s poison on the dog skin and faster healing of the wound. Both of this solution are widely used for their disinfectant properties as they reduce the risk of developing a fresh infection on the wound.
How to apply bicarbonate soda on a bee sting?
When baking soda is mixed with water, an endothermic reaction takes place which converts the baking soda into a warm antiseptic.
- On a clean bowl mix baking soda with water and dip a dry cotton wool until it is saturated,
- Gently and lightly massage the wound with the saturated cotton wool until the swelling stops and pain is
Meat tenderizer paste and how to apply
- Mix a tenderizer with clean and distilled water to form a paste.
- Use a dry cotton wool and apply the paste gently while massaging the affected area lightly.
Meat tenderizer contains rich sources of essential papain enzyme which breaks down the body tissues and provides a protective gear against the toxic protein which causes body reaction.
Leave the paste for roughly 25-30 minutes so as to relieve the pain and clean the wound. Leaving the wound with a meat tenderizer for more than 30 minutes can cause irritation and an allergic reaction.
It is important that you do not allow the dog to lick both the paste before you have thoroughly cleaned with as it may cause stomach upset.
Give the Dog Antihistamine
Over the counter medication such as Benadryl is very useful as it aids in reducing the swelling of the wounds. Even though the medicine is safe for animal use.
It is very important that you consult with the veterinary to determine the accurate dosage, most vets recommend a Benadryl dosage depending on the dog’s size and weight.
The Allergic Reaction Caused By Bee Stings
Dogs are allergic to the bee sting same way humans are. Severe and multiple bee stings can cause the dog to go into an anaphylactic state of shock which is life threating if proper medical attention is not performed.
Dogs may react differently to bee sting which is pre-determined with the location and number of bee stings. Therefore, it is important that the owner takes precaution after a bee sting and be vigilant of symptoms that cause an allergic reaction.
Signs of Severe Allergic Reaction/ Anaphylaxis
- Prolonged whining and crying.
- Heavy swelling of the skin beyond the sting surface.
- Difficulty while breathing.
- Pumping heart rate.
- General weakness and lack of energy sometimes the dog may collapse.
- The gums become pale.
How Long Does a Bee Sting Last on a Dog
Normally, if the dog starts vomiting within 10 minutes after a bee stung this is an indication that it is going into an anaphylactic shock, therefore, take the dog to a veterinarian immediately.
Anaphylaxis State Caused By a Bee Sting
Anaphylaxis is described as the sudden and severe allergic reaction caused by a bee stung. Normally what the bee does is inject poison into the dog’s skin and elicits substantial discharge of histamine. The sting of a bee is very poisonous as it contains;
- Hyaluronidase which aids in spreading the venom into the local tissue.
- The protein melittin which causes an allergic
- Phospholipase A which prevents the body from stopping and neutralizing the spread of the venom. It is also responsible for causing pain.
In general, anaphylaxis results in a significant drop in the dog’s blood pressure which leads to body reaction resulting in a state of shock. In most case when in an anaphylaxis state the dog’s body attempts to reimburse the drop of pressure with a faster thrusting heart. As a result, the veins are overloaded and collapse.
Precaution Measures to Take to Make the Garden Less Exposed to Bee’s Presences
The predator sense of dogs makes them want to exploit the outside garden. Thus it is next to impossible to teach dogs no matter the number of times they are stung by a bee it is difficult for them to stay away from the bees.
Usually fruit and flower garden need bees for pollination. The safety of the dogs is left upon the owners to make the garden that is vulnerable of bee less attractive. it is therefore imperative that you reduce the chance the dog may encounter such as dreadful experience.
First and foremost, you can barricade the area surrounded by plants that summon bees. This not only prevents bees from hoovering it also restricts the movement of dogs around the garden.
Alternatively, renowned gardeners recommend that you can grow jasmine plant whose flowers blossom at night or the plant zinnias which usually draws the attention of butterflies more compared to bees. | <urn:uuid:56ca4f58-8925-4d13-a0d2-f1b426ff9c4f> | CC-MAIN-2019-18 | http://www.dogscatspets.org/dogs/dog-stung-bees-paw-limping-vomiting-benadryl/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530527.11/warc/CC-MAIN-20190421100217-20190421122217-00252.warc.gz | en | 0.929353 | 1,854 | 2.71875 | 3 |
I am using an app called Duolingo to practice learning German through assimilation techniques however I have come across something that is a bit confusing to me in a a way, regarding the way that words should be placed. In the following example you will see what I am talking about:
Translate Into German
The dog is strong although he is old.
I end up putting in:
Der Hund ist stark, obwohl er ist alt.
However the actual translation that they are looking for is:
Der Hund ist stark, obwohl er alt ist.
Would anyone know the proper rules for this so I can I figure out why this is and when? Thanks! | <urn:uuid:d8461325-949c-4c14-9174-83f0751cacd9> | CC-MAIN-2015-35 | http://german.stackexchange.com/questions/8582/why-is-the-adjective-placed-before-a-conjoined-verb | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644068749.35/warc/CC-MAIN-20150827025428-00022-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.89986 | 146 | 2.78125 | 3 |
Pap clearly feels threatened by the good fortune Huck has had in Widow Douglas’s care. … Pap’s anger here may also arise from shame, since he knows he could never provide for Huck as well as the Widow. Pap worries that Huck will look down on him, and so he asserts himself with threatening words.
Why does Pap kidnap Huck in Chapter 6?
When Pap loiters around the Widow’s estate too much, the Widow reprimands him. Pap vows to show her who Huck’s boss is, so one day he kidnaps Huck and takes him to an isolated log hut in the woods near the river. Pap is with Huck at all times, so that Huck has no chance for escape.
Why did PAP kidnap Huck?
His physical abuse and his greed put Huck in constant fear for his physical safety and for his financial security. When Pap reappears in St. Petersburg, he uses the courts to try to get Huck’s money, and he kidnaps Huck and holds him prisoner.
Where does Pap take Huck when he kidnaps him?
Terms in this set (33) Pap kidnaps Huck. Where does he take him? Pap takes Huck to a deserted cabin in the woods on the Illinois side of the Mississippi River.
Why is Huck afraid of Pap?
Huck is scared at first to see the old, greasy, pale Pap sitting in his room because Pap “tanned,” or beat, him so often, but soon is not scared at all. Pap reprimands Huck for wearing nice clothes, and says that because Huck has learned to read and write he must think he’s better than his own father.
How did Huck get 6000 dollars?
We learn that Tom Sawyer ended with Tom and Huckleberry finding a stash of gold some robbers had hidden in a cave. The boys received $6,000 apiece, which the local judge, Judge Thatcher, put into a trust The money in the bank now accrues a dollar a day from interest.
What does Huck do to escape?
Tired of his confinement and fearing the beatings will worsen, Huck escapes from Pap by faking his own death, killing a pig and spreading its blood all over the cabin. Hiding on Jackson’s Island in the middle of the Mississippi River, Huck watches the townspeople search the river for his body.
What disease does Huck tell them his dad has?
They feel sorry for him because they have “bought” his story implying that his dad and sister are on the raft, suffering from smallpox. Huck has made this story up to prevent them from going to investigate the raft.
Why was Pap so angry with the government?
Why is Pap angry with Huck? Pap is angry that Judge Thatcher has been putting off the Trial to prevent him from taking Huck’s money. He’s also angry that Huck lives a better life than him and is educated.
What happened to Huck Finn’s dad?
In the novel, Huck and Jim find the body of Huck’s father in a floating house on the river, shot in the back, but the identity of his murderer is never revealed.
What did Pap do with Huck each time he left the cabin?
Huck finds a canoe drifting in the river and hides it in the woods. When Pap leaves for the day, Huck finishes sawing his way out of the cabin. He puts food, cookware, and everything else of value from the cabin into the canoe. … Once Pap has passed, Huck quietly sets out downriver.
How did Huck know Pap wasn’t drowned?
How did Huck know that his ‘Pap’ waasn’t drowned? Huck determins that the body was not his father by listening to details about the body.
What did Pap do after Judge Thatcher refused to give him Huck’s money?
Pap then takes the dollar that Huck got from Judge Thatcher and leaves to buy whiskey. … The Judge and Widow Douglas try to get custody of Huck but give up after the new judge in town refuses to separate a father and son. Pap eventually lands in jail after a drunken spree.
What did Pap rip up and why?
What did Pap tear up and why? Pap tore up one of Huck’s picture to show that he does not advocate for him going to school. … Pap, angry at Judge Thatcher and Widow Douglas, takes Huck away to an island and hold him there.
What does Pap symbolize in Huck Finn?
Pap is one of the only characters with no redeeming qualities. He symbolizes a path that could potentially be Huck’s, given that Huck was raised by him. Pap represents the ignorance of society and its reluctance to accept change.
What did Huck learn from Pap?
Huck only knows how to use and manipulate another—the lesson he learned from Pap—or how to evade responsibility, the lesson he taught himself when trying to get away from the Widow Douglas and Miss Watson. … Through the time they spend together, Huck learns what it’s like to have companionship and even love. | <urn:uuid:173ac6a4-2b94-4b3a-9faf-b9614b5690ea> | CC-MAIN-2023-06 | https://www.deerfootreview.com/does-pap-care-about-huck/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500074.73/warc/CC-MAIN-20230203185547-20230203215547-00591.warc.gz | en | 0.977516 | 1,072 | 3.234375 | 3 |
Because charter schools are relatively new institutions — the first American charter school opened in 1992 — little research has been done on the long-term outcomes for students who attended a charter school relative to those who attended a traditional public school.
But with many former charter-school students now in their twenties, Mathematica Policy Research has conducted a study on long-term educational and earning achievements, finding that charter-school students are more likely to have greater educational success and higher earnings than their traditional public-school peers.
Mathematica found that attending a charter high school leads to a ten to eleven percentage point increase in the probability of attending college and between a 6.6 and 12.6 point increase in the probability of persisting in college at least two consecutive years. The study also found that charter high schools may increase their students’ earnings in their mid twenties by 12.7 percent relative to the earnings that would have been expected had the student attended a traditional public high school.
In order to account for the possibility that only certain types of students are accepted to charter schools, Mathematica studied only students who had attended charter schools up to the eighth grade, comparing those who continued in charter schools through high school and those who went from eighth grade to a traditional high school. They also controlled for race, gender, family income, and test scores.
Notably, when controlling for test scores, charter-school students still outperform their public-school peers post–high school. “Charter high schools seem to be endowing their students with skills that are useful for success in college and career but that are not captured by test scores,” the study found.
Mathematica’s study is by no means conclusive. As Kevin Drum notes, it did not compare students who attended charters with those who wanted to but lost out in the lottery (which is the best way to eliminate the possibility of self-selection bias). As more charter school students come of age, more robust empirical studies are expected. | <urn:uuid:0cfbc794-8d90-4d68-8f17-0516d340de73> | CC-MAIN-2017-26 | http://www.nationalreview.com/corner/370245/study-charter-school-grads-earn-more-public-school-peers-alec-torres | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320707.69/warc/CC-MAIN-20170626101322-20170626121322-00710.warc.gz | en | 0.983366 | 409 | 3.125 | 3 |
After clicking "Book Now" and submitting your email address, you will be redirected to the GE Healthcare website for registration and payment. ACOG certificates are available directly from GE Healthcare website after successful course completion.
Disease prevalence increases substantially about 10 years after menopause and provides an opportunity to institute prevention strategies at the onset of menopause. The Women’s Health Initiative was largely misinterpreted and many women have been denied appropriate hormone therapy. Hormone therapy in younger women decreases mortality, a finding consistent with the data from older observational trails. Hormone therapy is efficacious for menopause symptoms and the prevention of osteoporosis. Compelling evidence points to the possibility of considering hormone therapy as part of the strategy for prevention.
After completing this course, you should be able to:
• Describe the changes that occur after menopause and the long-term consequences.
• Identify the current indications for hormone therapy.
• Define the findings of the Women’s Health Initiative studies and their current interpretation.
• Describe the true risks and benefits of hormone therapy symptoms and prevention of osteoporosis.
• Identify alternatives to the use of hormones for menopausal symptoms and prevention of osteoporosis.
• Describe the risk-to-benefit equation in younger women at the onset of menopause (compared to older women) and the possibility of the role of hormone therapy as a prevention therapy.
• Epidemiology and Care for the Postmenopausal Women
• Vasomotor Symptoms and Bone Loss at Menopause
• Indications for Hormonal Therapy After Menopause and the Women’s Health Initiative Studies
• Putting the Current Results of the Women’s Health Initiative into Perspective
• Risks and Concern with Hormone Therapy
• Hormone Options for Vasomotor Symptoms
• Alternatives to Estrogen for Vasomotor Symptoms
• Hormone Therapy and Alternatives for the Prevention of Osteoporosis
• Consideration of Hormone Therapy as Part of the Strategy for Preventive Healthcare | <urn:uuid:79779013-8b84-4e6f-94bf-e2d70587182c> | CC-MAIN-2021-21 | https://medicallearninghub.com/course/management-of-menopause | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988858.72/warc/CC-MAIN-20210508091446-20210508121446-00419.warc.gz | en | 0.89183 | 432 | 2.703125 | 3 |
was born in about the year 4BC in the town of Bethlehem. Each of His four Biographies, the four Gospels written by Matthew, Mark, Luke and John, give us slightly different details about His birth. However they all agree that He was no ordinary baby and that He was born to be the Christ - the King and saviour the Jewish people had long been hoping for.
None of the Gospels tell us much about Jesus’ early years. However they do tell us that around age 30 He begins a teaching tour of Israel, attracting great crowds who are amazed by His wisdom and wowed by His miraculous signs. Some of Jesus sayings continue to be well known in our culture 2000 years later – ‘Blessed are the meek,’ ‘Turn the other cheek,’ and ‘Why do you look at the speck of sawdust in your brother’s eye and pay no attention to the plank in your own eye?’
Again, while the four Gospels of Jesus record slightly different parts of Jesus’ teaching and miracles, they all agree that Jesus was much more than a wise teacher. He had the authority and power of God Himself and He had not just come to teach and heal, He had come to save the world.
The central events in Jesus life were His death on the cross and His resurrection to life three days later. These events set Jesus apart from other religious teachers such as Mohammed or Buddha. They mean that Jesus offers much more than simply wise advice. He actually fixes the biggest problems humanity faces – sin and death.
Jesus death pays the penalty for sin (humanity’s rebellion against God), and his resurrection defeats death and paves the way for all His followers to one day rise with Him. According to the Bible Jesus is alive today and has been crowned as God’s King and Saviour. He is going to return to judge the world with justice and take His people to a new creation.
Jesus and Us
Jesus Christ is the only reason Cairns Presbyterian Church exists. We’re here because Jesus has forgiven us and given us the hope of rising with Him and we exist to help one another become more like Him, and to help others meet Him.
Whatever background you’re from we hope you’ll meet Jesus too, and we are happy to help you in any way we can. | <urn:uuid:798d6a44-f71c-4952-b13b-994f27e84d1c> | CC-MAIN-2018-09 | http://cairnspc.org.au/about-jesus/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812938.85/warc/CC-MAIN-20180220110011-20180220130011-00620.warc.gz | en | 0.978629 | 494 | 3.109375 | 3 |
From Cluster Documentation Project
- Sage is a free open-source mathematics software system licensed under the GPL. It combines the power of many existing open-source packages into a common Python-based interface. The Sage Mission is to create a viable free open source alternative to Magma, Maple, Mathematica and Matlab.
- NumPy is the fundamental package for scientific computing with Python. It contains among other things:
- a powerful N-dimensional array object
- sophisticated (broadcasting) functions
- tools for integrating C/C++ and Fortran code
- useful linear algebra, Fourier transform, and random number capabilities
Besides its obvious scientific uses, NumPy can also be used as an efficient multi-dimensional container of generic data. Arbitrary data-types can be defined. This allows NumPy to seamlessly and speedily integrate with a wide variety of databases. Numpy is licensed under the BSD license, enabling reuse with few restrictions.
- R is a language and environment for statistical computing and graphics. R provides a wide variety of statistical (linear and nonlinear modeling, classical statistical tests, time-series analysis, classification, clustering, ...) and graphical techniques, and is highly extensible. One of R's strengths is the ease with which well-designed publication-quality plots can be produced, including mathematical symbols and formulae where needed. Great care has been taken over the defaults for the minor design choices in graphics, but the user retains full control.
- Julia is a high-level, high-performance dynamic programming language for technical computing, with syntax that is familiar to users of other technical computing environments. It provides a sophisticated compiler, distributed parallel execution, numerical accuracy, and an extensive mathematical function library. The library, mostly written in Julia itself, also integrates mature, best-of-breed C and Fortran libraries for linear algebra, random number generation, FFTs, and string processing. More libraries continue to be added over time. Julia programs are organized around defining functions, and overloading them for different combinations of argument types (which can also be user-defined).
- Erlang Erlang is a programming language used to build massively scalable soft real-time systems with requirements on high availability. Some of its uses are in telecoms, banking, e-commerce, computer telephony and instant messaging. Erlang's runtime system has built-in support for concurrency, distribution and fault tolerance.
- Haskell is an advanced purely-functional programming language. An open-source product of more than twenty years of cutting-edge research, it allows rapid development of robust, concise, correct software. With strong support for integration with other languages, built-in concurrency and parallelism, debuggers, profilers, rich libraries and an active community, Haskell makes it easier to produce flexible, maintainable, high-quality software.
These enhancements are used with Fortran and C/C++ compilers.
- OpenMP is a standard for parallel programming on shared memory systems, continues to extend its reach beyond pure HPC to include embedded systems, multicore and real time systems. A new version is being developed that will include support for accelerators, error handling, thread affinity, tasking extensions and Fortran 2003. Note: OpenMP is not a cluster programming tool. It works for multi-core cluster nodes and is supported by virtually all compilers.
- OpenACC is an Application Program Interface (API) that describes a collection of compiler directives to specify loops and regions of code in standard C, C++ and Fortran to be offloaded from a host CPU to an attached accelerator (e.g. GPUs), providing portability across operating systems, host CPUs and accelerators.
Lower Level Parallel Programming Libraries
These are programming libraries that can be used with Fortran, C/C++, and Java.
- MPICH2 is a freely available, portable implementation of MPI, the Standard for message-passing libraries.
- MVAPICH2 enhanced MPICH2 version that delivers best performance, scalability and fault tolerance for high-end computing systems and servers using InfiniBand, 10GigE/iWARP and RoCE networking technologies.
- Open MPI is a project combining technologies and resources from several other projects (FT-MPI, LA-MPI, LAM/MPI, and PACX-MPI) in order to build the best MPI library available. Support runtime selection of interconnect.
- The Java Parallel Processing Framework is a suite of software libraries and tools providing convenient ways to parallelize CPU-intensive processing. It is written in the Java programming language and is platform independent.
- PVM (Parallel Virtual Machine) is a software package that permits a heterogeneous collection of Unix and/or Windows computers hooked together by a network to be used as a single large parallel computer.
- Jumpshot is a Java-based visualization tool for doing postmortem performance MPICH2 analysis.
- mpiPis a lightweight profiling library for MPI applications. Because it only collects statistical information about MPI functions, mpiP generates considerably less overhead and much less data than tracing tools. All the information captured by mpiP is task-local. It only uses communication during report generation, typically at the end of the experiment, to merge results from all of the tasks into one output file.
- Open|SpeedShop is explicitly designed with usability in mind and is for application developers and computer scientists. The base functionality include, Sampling Experiments, Support for Callstack Analysis, Hardware Performance Counters, MPI Profiling and Tracing,I/O Profiling and Tracing, and Floating Point Exception Analysis. In addition, Open|SpeedShop is designed to be modular and extensible. It supports several levels of plug-ins which allow users to add their own performance experiments.
- AMD CodeAnalyst Performance Analyzer helps software developers to improve the performance of applications, drivers and system software. Well-tuned software delivers a better end-user experience through shorter response time, increased throughput and better resource utilization.
- IPM is a portable profiling infrastructure for parallel codes. It provides a low-overhead performance profile of the performance aspects and resource utilization in a parallel program. Communication, computation, and IO are the primary focus. While the design scope targets production computing in HPC centers, IPM has found use in application development, performance debugging and parallel computing education.
- HPCToolkit is an integrated suite of tools for measurement and analysis of program performance on computers ranging from multicore desktop systems to the nation's largest supercomputers. By using statistical sampling of timers and hardware performance counters, HPCToolkit collects accurate measurements of a program's work, resource consumption, and inefficiency and attributes them to the full calling context in which they occur. HPCToolkit works with multilingual, fully optimized applications that are statically or dynamically linked. Since HPCToolkit uses sampling, measurement has low overhead (1-5%) and scales to large parallel systems. HPCToolkit's presentation tools enable rapid analysis of a program's execution costs, inefficiency, and scaling characteristics both within and across nodes of a parallel system. HPCToolkit supports measurement and analysis of serial codes, threaded codes (e.g. pthreads, OpenMP), MPI, and hybrid (MPI+threads) parallel codes.
- Padb is a Job Inspection Tool for examining and debugging parallel programs, primarily it simplifies the process of gathering stack traces on compute clusters however it also supports a wide range of other functions. Padb supports a number of parallel environments and it works out-of-the-box on the majority of clusters. It's an open source, non-interactive, command line, script-able tool intended for use by programmers and system administrators alike. | <urn:uuid:947c1543-4d33-4a1a-b7cd-d8fafc68e1e0> | CC-MAIN-2015-22 | http://tweaks.clustermonkey.net/index.php/Programming_Tools | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928102.74/warc/CC-MAIN-20150521113208-00134-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.883223 | 1,611 | 2.53125 | 3 |
Directed evolution teaches bacteria to eat carbon dioxide
Researchers at the Weizmann Institute of Science have created a new breed of bacteria that can effectively “eat” air. By carefully directing the evolution of E. coli in the lab, the team managed to wean them off their preferred diet of sugar, and make the switch to carbon dioxide in the air around them.
All life on Earth builds its biomass out of carbon. Broadly speaking, there are two types of organisms on Earth, which differ based on where they get their carbon from. Autotrophs absorb carbon dioxide from the air and convert it into usable carbon – plants are the most obvious example. Heterotrophs, on the other hand, get their carbon from eating other organisms – this includes all animals, fungi and most bacteria.
Normally an organism is one or the other, but the Weizmann researchers have now reported the first instance of something changing its diet that drastically.
“Our lab was the first to pursue the idea of changing the diet of a normal heterotroph (one that eats organic substances) to convert it to autotrophism (‘living on air’),” says Ron Milo, lead researcher on the study. “It sounded impossible at first, but it has taught us numerous lessons along the way, and in the end we showed it indeed can be done. Our findings are a significant milestone toward our goal of efficient, green scientific applications.”
To start with, the team edited E. coli to add certain genes that plants use to fix carbon from CO2, as well as a gene that let the bacteria get energy from formate. The team then attempted to force the E. coli to evolve in a particular direction, by carefully manipulating their environment.
The bacteria were given just enough sugar so they wouldn’t starve to death, but had access to plenty of CO2 and formate. The process of evolution says that life finds a way to cope with stressful conditions like these, and some of the bacteria soon turned to the CO2 as a food source. Since this is plentiful and sugar is rare in this environment, that gives these bugs the evolutionary upper hand.
Over time, the researchers gave the new generations of bacteria less and less sugar. After about 200 days, some of the E. coli had completely switched to eating CO2. To make sure the bugs hadn’t somehow found other nutrients to eat, the team fed some of them CO2 with a heavier isotope, then weighed them. And sure enough, the weight they gained exactly matched the mass expected if they’d eaten the CO2.
So what can we actually do with these diet-switching bacteria? Currently, bacteria can be farmed to produce things like antibiotics, graphene, and fuels, but these usually need to be fed lots of sugar in the form of corn syrup. The researchers say that these new bacteria could be fed nothing but atmospheric CO2 and given energy from renewable electricity sources, making any end products and fuels they produce essentially carbon neutral.
The research was published in the journal Cell.
Source: Weizmann Institute | <urn:uuid:70c6f024-2bf5-487f-834b-052f7d948261> | CC-MAIN-2022-21 | https://newatlas.com/biology/directed-evolution-bacteria-eat-co2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545548.56/warc/CC-MAIN-20220522125835-20220522155835-00306.warc.gz | en | 0.953286 | 645 | 3.6875 | 4 |
California Rides a Wave of Solar Power…Like Sustainable
HOUSTON—September 25, 2002—Researched by Industrialinfo.com (Industrial Information Resources Incorporated, Houston, Texas). The incremental growth of electrical power generated from being marginal experiments into necessary options in the power mix. Due to sustained and informed lobbying and the practical development of ways and means, California has now enable the state and regions within the state to develop localized sources of non-carbon based generation which, when aggregated, will form significant portions of main electricity supply within targeted budgets under incentive payment schemes. Earlier this year the Californian Power Authority (CPA) put forward its energy resource investment plan ‘Clean Growth: Clean Energy for California’s Economic Future.’
The San Francisco Solar Power Plan will provide enough power to serve 60,000 homes. Photovoltaic panels placed on the roofs of city buildings and facilities, commercial buildings, and private homes will cover a total of 140 to 250 acres and will produce 50MW. A second mixed wind and solar generating scheme will generate another 42 MW of power and cost $100 million. This plant will be six times larger than the world’s current largest photovoltaic panel solar facility in the Sacramento Municipal Utility District
The San Francisco scheme will cut greenhouse emmissions from the area by about 1% and provide 10% of the city’s electricity during the day and 5% of nighttime peak load. Local Power (California) will design, build, operate, and maintain the ‘peaker’ planer and transfer the power through an agreement with the CPA. The San Francisco plan will nearly double the amount of solar power produced in the USA.
The attractions of solar and wind power to the city include the phasing out of polluting natural gas power plants and having alternative power sources available in earthquake territory. Other towns and cities such as Berkeley, Oakland, and Marin County are developing locally generated renewable energy sources.
The Board of Commissioners approved this month an increase and expansion of the Los Angeles Department of Water and Power (LADWP) Solar incentive program. Incentive payment limits will be increased and extended and the program will be expanded by allowing large customers to participate in both the LADWP incentive program and a rebate effort of another local utility. Incentive payment limits for commercial and industrial customer were doubled from $1 million to $2 million per project and increased from $50,000 to $60,000 per project for residential customers. These incentives can provide up to 75% of total system costs. The highest incentive payments of $4.50 per watt and $6.50 per watt for systems manufactured in Los Angeles were extended for an additional year until the end of 2003. The overall solar program was extended to 2010.
Major photovoltaic (PV) manufacturers Shell Solar (LSE:SHEL) (London, United Kingdom) and Powerlight Corporation (Berkeley, California) have located assembly facilities in Los Angeles as a result of the LADWP’s Solar Incentive program and over 200 contractors have participated in LADWP’s solar training program.
The increased use of PV cell technology is bringing the unit price down and the LA incentives alone reduce the costs of going solar by more than half. The program aims to add the equivalent of 100,000 residential solar rooftops by 2010 and increase the number of large commercial and institutional users.
Promotion and education are part of the program including ‘Cool School,’ which provide shade trees and instruction to students while lowering campus energy costs.
The overall CPA Energy Resource Investment Plan details a strategy to prevent future energy crises by meeting California’s energy supply shortfalls through energy efficiency, conservation, and renewable generation. In total, the CPA will generate $5 billion in revenue bond financing that will leverate over $12 billion in clean energy investment by 2007. The plan envisages generating the equivalent power that could be obtained from 5 big coal-fired plants with largely non-polluting sources. This is equivalent to taking one million cars off the road over the next twenty years.
The global market for PV technology is expected to be $1.5 billion by 2005. The U.S. Department of Energy plans to have one million homes with solar roofs by 2010. By 2020 the PV industry expects to employ over 150,000 people.
While California moves on the green energy front, neighboring Nevada could steal history’s Energy Innovator title. First the wise guys came and made the desert bloom with dollars and neon. Then the really wise guys drove a railroad into a mountain to dump inexhaustible nuclear fuel waste. Now some visionary wise guys have figured that if 9% of Nevada was covered with solar parabolic trough systems, the total electricity needs of the USA could be met. It would be good for them to check just where they build. Capiche?
Established in 1983, Industrial Information Resources Incorporated (IIR) is a leading source for industrial market information covering the industrial process, manufacturing and energy markets. IIR has developed a unique Power Generation Database, which incorporates New Build Tracking, Combustion Turbine Profiles, and Maintenance Outage Tracking into a single source dynamic database format.
© 2002 ALL RIGHTS RESERVED. Industrial Information Resources, Inc.
Email this page to a friend
If you speak another language fluently and you liked this page, make
a contribution by translating
it! For additional translations check out FreeTranslation.com
(Voor vertaling van Engels tot Nederlands)
(For oversettelse fra Engelsk til Norsk)
(Для дополнительных переводов проверяют FreeTranslation.com ) | <urn:uuid:ed7ecdf8-4d43-4581-913f-6ebf2f4f0dbc> | CC-MAIN-2018-05 | http://geni.org/globalenergy/library/media_coverage/industrialinfo-com/california-rides-a-wave-of-solar-power/index.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889325.32/warc/CC-MAIN-20180120043530-20180120063530-00008.warc.gz | en | 0.908481 | 1,207 | 2.65625 | 3 |
FACTS ABOUT TAMIL LANGUAGE
Tamil is a Dravidian language spoken predominantly by Tamil people of South India and North-east Sri Lanka. It has official status in the Indian states of Tamil Nadu, Puducherry and Andaman and Nicobar Islands. Tamil is also a national...
Tamil /ˈtæmɪl/ (தமிழ், tamiḻ, [t̪ɐmɨɻ] ?) is a Dravidian language spoken predominantly by Tamil people of South India and North-east Sri Lanka. It has official status in the Indian states of Tamil Nadu, Puducherry and Andaman and Nicobar Islands. Tamil is also a national language of Sri Lanka and...
The Tamils are nature lovers and their relation to the religion is based on the nature. Currently, 88% of the population in Tamil Nadu are Saivam, Vainavam, Ayya Vazhi & Non believers, 6% are Christians, 5.57% are Muslims and the rest consists of different religions including Buddhists. This could largely...
tamil Nadu has been ranked No 1 by the Economic Freedom Rankings for the States of India
Possessing the fifth largest economy (2004–2005) among states in India, Tamil Nadu is also the second most industrialised state next to Maharastra.
It ranks second in per capita income (2004–2005) among...
TAMIL TYPING METHOD (According To Tamil Keyboard)
jkpo; ilg;gpq; topfhl;b (jkpo; fP NghHl;)
A. Tamil Alphabets Chart / jkpo; vOj;Jfspd; gl;bay;
Special letters / tpNr\ vOj;Jfs;
• Aydham (sound - Ahk) - /
• Sri (sound - Sri) - =
B. Tamil Keyboard Layout / jkpo; fzpdp fP NghHl;
July 2015) was the 11th President of India from 2002 to 2007. A career scientist turned reluctant politician, Kalam was born and raised in Rameswaram, Tamil Nadu, and studied physics and aerospace engineering. He spent the next four decades as a scientist and science administrator, mainly at the Defence...
Designation and Address : : Dr. K.R.Sundaravaradarajan Professor & Head, Department of Agrl. Economics, Faculty of Agriculture, Annamalai University, Tamil Nadu, India 3. Date of Birth 4. Father’s Name 5. Experience in Years 6. Residential Address : : : : 30-07-1962 T. Ramachandran 20 years 36,Kamaleshwar...
Sinhalese, became the official Sri Lankan language. The Tamils had hoped that the island’s independence would bring equality to the country, but the cultural differences were just too great. Rioting broke out in 1958, followed by some compromises with the Tamils. The Sinhalese prime minister was assassinated...
writing. His stereotypical comments aimed at both Tamil and Malay communities as well. In his autobiography, Growing, he says Jaffna “is inhabited by Tamils who are Hindus and generally darker and dourer than the Sinhalese”(149)and also the word “Tamil” has been used consecutively in The Village in the...
contrast with Chola meaning "new country", Pandiya meaning "old country" and Chera meaning "hill country" in Sangam Tamil lexicon
The Cholas 300s BC–1279
The Tamil kingdom that enjoyed the most uninterrupted prosperity was that of the Cholas. As in case of all other polities...
of moving image
Filmmaking, the process of making a film
Movie theater, a building in which films are shown
Cinema (2008 film) or Bommalattam, a Tamil film
Cinema (TV channel), a defunct Scandinavian movie channel
Cinema 4D, a 3D graphics applicationCinema may refer to:
Film, a series of still...
As a result, many Indian Tamils found themselves stateless.
Though the Indian Tamils have lived in Sri Lanka for many years, they do not have basic rights such as education, jobs, housing and voting.
In 1964, India decided to help the Indian Tamils who were stateless.
It was agreed that...
professionals in Tamil Nadu, India. An actor, Mr Suriya Sivakumar in the year of 2005, started this foundation with the help of his family and friends. The reason behind the establishment of this foundation was to help illiterate children and also overcome child labour, child poverty in Tamil Nadu The students...
movement was launched in a bid to slowly phase out English, replacing it with Sinhala or Tamil. However, shortly after the departure of the British the campaign, due to various political reasons, evolved from Sinhala and Tamil to replace English to just Sinhala replacing English.
In 1956, the first election...
Lakshadweep and Mahé. It is spoken by 35.9 million people. Malayalam is also spoken in the Nilgiris district, Kanyakumari district and Coimbatore of Tamil Nadu, Dakshina Kannada, Bangalore and Kodagu districts of Karnataka. Overseas it is also used by a large population of Indian expatriates...
desire to protect and build upon a minority language or religion and the feeling or being mistreated due to being an ethnic minority for example the Tamil Tigers in Sri Lanka. Separatism can lead to a wide range of consequences that range from the collapse of governments and civil wars to, more political...
Avul Pakir Jainulabdeen Abdul Kalam born October 15, 1931, Tamil Nadu, India, usually referred to as Dr. A. P. J. Abdul Kalam^, was the eleventh President of India, serving from 2002 to 2007. Due to his unconventional working style, he is also popularly known as the People's President. Before...
section took the lead in
initiating efforts to abolish laws and customs, which suppressed the women in society. If
the girls today outshine the boys in Tamil Nadu, in academic excellence, the credit
should go to E. V. R. Periyar and others. This chapter highlights the contribution of
Periyar to women’s...
The Liberation Tigers of Tamil Eelam (Tamil: தமிழீழவிடுதலைப்புலிகள், ISO 15919: tamiḻ iiḻa viṭutalaip pulikaḷ; commonly known as the LTTE or the Tamil Tigers) is a militant organization based in northern Sri Lanka. Founded in 1976, it has since actively waged a violent secessionist campaign that seeks...
Variation in Tamil
Tamil is one of the ancient languages of the world with records inthe language dating back over two millennia. Its origins are notprecisely known, but it developed and flourished in India as a language with a rich literature. With an estimated 30,000inscriptions, Tamil has the largest...
citizenship rights responsible for the conflict between Sinhalese and Tamils?
The Sinhalese and the Tamils have been having conflict in Sri Lanka. Most of the issues revolve around the discriminatory policies against the Tamils practiced by the Sri Lankan government which prefers Sinhalese, the majority...
of 6 Indian states have crossed 70 year mark. And of those six, 3 have crossed the 80th 'milestone'. Kerala CM A S Achuthanandan is 86 followed by Tamil Nadu CM K Karunanidhi (85) and Punjab CM Prakash Singh Badal (82). The members of 70-club are Uttarakhand CM Dr B C Khanduri (75), Assam CM Tarun Gogoi...
funded with 70% loan assistance from HUDCO with 13% interest per annum repayable over the period of 15 years. The remaining 30% is provided by the Tamil Nadu Government as margin money. The TNSCB makeS sure that the temporary shelter put up earlier to resettle the slum families are cleared soon after...
perception towards Pondicherry literature in a chronological form.
Literature on Voyages :
The French literature projected its reflection in the Tamil literature by 17th century, with the help of La Foutaine’s, acquaintance with Francois Bernier, philosopher and scholar of the period and brought out...
The Tamil Sangams were assemblies of Tamil scholars and poets that, according to traditional Tamil accounts, occurred in the remote past. Some scholars believe that these assemblies were originally known as kooṭal or gathering...
long, 45-65 million years old mountain range which extends from south of the Tapti River in the border of Gujarat and Maharshtra to Kanyakumari in Tamil Nadu, covering six states ( Gujarat, Maharashtra, Goa, Karnataka and Kerala) in India.
The rich biodiversity of the region has made it an important...
Sari (This one I guess everyone knows already)
Hi! Nanbaa! (Read as Machan/Machi)
Evv alavu ( try not to say it like love)
How are you?
Eppadi irukkinga? (or) Nalamaa?
I'm fine, thanks!
its rice; it has three crops a year. Musiris was the first Indian emporium, and it was mentioned that even Apostle Thomas was there. Tamil Nadal is the Roman Empire. Tamil Nadal was the world’s last classical civilization. The city capital is Madurai. Indians worshiped the cities goddess, Meenakshi. Ancient...
have more flops.
Wanted, Ghajini, Bhool Bhulaiya apart from being blockbuster hits, they were remakes of regional movies, not just them but also many Tamil – Telugu movies in the period of 1992-1996 were either dubbed or remade in Hindi.
Bollywood has become synonymous with the Indian Film Industry. But...
Translation services :
Eng ( Tamil
Post Graduate Diploma in Translation,
Institute of Translation Studies
“Segregation of sexes in Mosque : a historical...
and initiatives. 19. Developed nation : the vision. 20. Current events. Index.
"Born on 15 October 1931 at Dhanushkodi in the Rameswaram district of Tamil Nadu, Abdul Kalam’s father had to rent boats out to fishermen to pay this genius’ school fees. He received secondary education at the Schwartz School...
thumbs upthumbs down
They had submarines, battleships, and war planes
thumbs upthumbs down
More comments about Liberation Tiger of Tamil Eelam
The deadliest terrorist group of Srilanka, LTTE was founded by Velupillai Prabhakaran in May 1976, possessing a sophisticated military. However...
life there. In boarding school, where not all the caretaking staff or shop keepers and taxi drivers knew English, learning Tamil, the ethnic language, was a survival skill. In Tamil, I can still recite the three crucial phrases that got me through boarding school life, the most repeated being, “Anna (big...
Karnataka alleges that these agreements have been unfairly made and demanded a review. Tamil Nadu says it has developed 3,000,000acres of land and any change would destroy the lives of millions of farmers History of the dispute It has been on since 1807 but somehow the British mediated and silenced...
| | | |
| |Angelo Matriculation Hr Sec School, |Tamil Nadu State Board |2009 |73.12 |
| |Tirunelveli | ...
5. Which is the most ancient Dravidian language?
6. Which university had its own laboratory and furnaces?
activity in the north and east, which essentially were the Tamil areas. Successive governments cultivated a historical myth after the colonial powers had left that the British had practised communal favouritism towards Christians and the minority Tamil community for the entire 200 years they had controlled...
Year 2013 was looked upon as the milestone for Indian cinema as the industry celebrated 100 years of entertainment and establishment. Hindi, Bhojpuri, Tamil, Telugu, Kannada, Malayalam, Gujrati, Punjabi, Haryanvi, Bengali etc are some of the main contributors in the process and have provided certain legendary...
The Sri Lankan Tamils fought back against their oppressors, but the Negroes in Mississippi Burning did not fight back. The Tamils in Sri Lanka had started the Liberation Tigers of Tamil Eelam (LTTE) to fight against the injustice the Sinhalese were giving them, but the Negroes did not start anything...
The Chola Dynasty (Tamil: சோழர் குலம், IPA: ['ʧoːɻə]) was a Tamil dynasty that ruled primarily in southern India until the 13th century. The dynasty originated in the fertile valley of the Kaveri River. Karikala Chola was the most famous among the early Chola kings, while Aditya I, Parantaka I, Rajaraja...
in the BJP led by Shankersinh Vaghela, who has won most of the subsequent polls.
Gujarat has 13 universities and four agricultural universities.
Tamil Nadu's population grew by 11.19% between 1991 and 2001, the second lowest rate for that period (after Kerala) amongst populous states (states whose...
There are lots of temples in Tamil Nadu where Siva is worshipped as Nataraja.
Lord Siva, as the god of dance is known as Nataraja. There are lots of temples in India and especially in Tamil Nadu where Siva is worshipped as Nataraja. But, there are mainly five places in Tamil Nadu where the cult of Nataraja...
|College |: |KLN College of Engineering, Madurai, Tamil Nadu |
|UNIVERSITY |: |Anna University ...
World's Poetry Archive
A. K. Ramanujan (16 March 1929 - 13 July 1993)
Attipate Krishnaswami Ramanujan (Kannada: ್್್್್್್್್
್್್್್್್್್್್ ್್್್್್್್್) (Tamil: ್್್್್್್್್್್್
್್್್್್್್್್್್್ ್್್್್್್್್) also known as A. K.
Ramanujan, was a scholar of Indian literature who wrote in both English and
is non-greasy lightly spiced and a gourmet’s delight. Pepper chops, chicken curry, keema vadas, meatball curries are some of the exotic fare of the Tamils. In the old days, ragi was popular and cooked ragi balls were eaten with hot curries. Indeed, eating ragi (made into, balls with the fingers) are dipped...
Brihadeeswara Temple, also called RajaRajeswara Temple at Thanjavur in the Indian state of Tamil Nadu, is a Hindu templededicated to Shiva. It is an important example of Tamil architecture achieved during the Chola dynasty. The temple is part of theUNESCO World Heritage Site known as...
Ar Rahman Biography
Allah Rakha Rahman (Tamil: ஏ.ஆர்.ரகுமான்; born January 6, 1967 as A. S. Dileep Kumar in Chennai, Tamil Nadu, India) is an Academy award winning Indian film composer, record producer and musician. His work has garnered considerable acclaim and a large global fan base since his film...
including colored rice, dry flour, (colored) sand or even flower petals. Similar practices are followed in different Indian states: in Tamil Nadu, there is Kolam in Tamil Nadu; Mandana in Rajasthan; Chowkpurna in Northern India; Alpana in West Bengal; Aripana in Bihar; Chowk pujan in Uttar Pradesh; Muggu...
4 South India
4.2 Andhra Pradesh
4.3 Tamil Nadu
5 Indian Railways
6 Air India Flight 182
7 Chronology of major incidents
10 See also
11 External links
India, including the cinematic culture of Andhra Pradesh, Assam, Gujarat, Haryana,Jammu and Kashmir, Karnataka, Kerala, Maharashtra, Orissa, Punjab, Tamil Nadu, and West Bengal. Indian films came to be followed throughout South Asia and the Middle East. The cinema as a medium gained popularity in the country...
specifications are diversified.
Impact stone crusher uses new concept crushing technology with innovative design principle,project for sand manufacturing in Tamil fully meets the crushing of different material specifications and the new technology requirements of "more crushing less grinding". This machine...
The Tamils are an ethic group and lives in southern India and on Sri Lanka (mainly in the state of Tamil Nadu); it is an island of 21 million people odd the southern tip of India. According to a 2001 government census, most Tamils live in the eastern and the northern Sri Lanka, and they comprise approximately...
Tamil Tigers of Sri Lanka
The Tamil Tigers immigrated to Sri Lanka from southern India and made up ten to fifteen percent of the population. The Tigers were the minority when compared to the Sinhalese, who represented seventy-five percent of the population. Right away there was ethnic conflict due...
between the two neighbouring States of Tamil Nadu and Karnataka has reached a flashpoint with the issue before the Supreme Court. Despite court orders and the Prime Minister’s mediation on the issue, Karnataka has stopped the flow of Cauvery river water to Tamil Nadu on the ground that the farmers on...
irrespective of boards.
Tamil Nadu claims to rank as one of the most literate states in the country with wide spread availability of schools and colleges. Under the present system our students are examined in such a way that they score 100% marks even in subjects like English and Tamil. Through this book...
History of Sri Lanka
People from the Tamil region of India emigrated to Ceylon (this was Sri Lanka’s name before 1972) in between 3 BC and 1200 AD. Upon their arrival, the Tamil rulers fought the Sinhalese rulers for control of Sri Lanka. This resulted in the Tamils, who were mostly Hindus, to claim the...
Discourse On the Tamil Tigers
“I would prefer to die in honour rather than being caught alive by the enemy” (Towards Liberation 83). V. Prabakaran, leader and founder of the LTTE (Liberation Tigers of Tamil Eelam), said this during an exclusive interview with the magazine the “Sunday.” This statement...
Lanka became a democratic socialist republic, (1978)the Tamils of the north wanted to be an independent state and acted out through violence The first efforts toward peace were in 1985 at the Thimpu Talks which consisted of Tamil Delegation and Sri Lanka Delegation trying to sort out their...
today dominates two-thirds of the global diamond
trade. The Nadar caste runs over three-fourths of the retail trade,
match works, and fireworks in Tamil Nadu. In Tirupur, Goundar caste
entrepreneurs, 80 per cent of whom are not even matriculates, compete
at the global level, exporting knitwear garments...
Educational Platform of Tamil Nadu
Introduction of Samacheer Kalvi
Samacheer Kalvi is a new education system which has brought about noticeable changes. It was formed with the great vision of providing equal education to all students of different classes. This system is also known as Tamil Nadu Uniform System... | <urn:uuid:c4281890-c99d-4fa8-8721-2424a643d8b8> | CC-MAIN-2017-09 | http://www.brainia.com/topics/tamil/0 | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00111-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946411 | 4,466 | 2.921875 | 3 |
What is the J-Curve Effect
The J-curve effect in economics is the phenomenon where a country’s balance of trade initially worsens following a devaluation or depreciation of its currency, before it recovers to a higher level than where it started. J-curves are also observed in other fields, such as medicine, political science and in private equity, where an initial loss is followed by a significant gain.
BREAKING DOWN J-Curve Effect
The J-curve effect is observed in trade balances because the weaker currency initially translates into more costly imports and cheaper exports, leading to a bigger initial trade deficit or a smaller surplus. However, because the affected country's exports are now cheaper in currency terms, they start to rise as foreign demand for the lower-priced option increases. Local consumers also purchase fewer of the now more expensive imports and substitute them with comparable local goods which have now become more affordable. As a result, the trade balance eventually recovers and bounces back to a higher level than it was at before the exchange rate dropped. The lag is caused by the fact that importers and exporters have to honor preexisting contracts, so the trade volumes initially remain unchanged even though the exchange rate and relative prices have changed.
When a country’s currency appreciates, a reverse J-curve may occur. This happens because the country’s exports initially become more expensive for importing countries than they were before. If other countries are able to offer the good at a more affordable rate, the stronger currency will reduce its export competitiveness may see demand for its exports fall. Additionally, local consumers may switch to imported versions of goods if they are suddenly cheaper.
J-Curves in Private Equity Funds
In private equity, funds tend to experience negative returns in the first few years, when there are upfront investment costs and management fees and underperforming portfolios are often written off. There are often capital drawdowns and the internal rate of return of an investment drops until it stabilizes and then in the later years posts increasing returns as the investments mature. If the fund is well managed, it will eventually recover from its initial losses and the returns will form a J-curve.
The J Curve effect is quite pronounced in the United States, as private equity funds tend to carry their investments at a lower market value. The funds tend to write down the carrying value of any underperforming investments, more than they write up performing investments. The value of the profitable investments is only recognized when the private firms go public or are sold in an M&A deal. | <urn:uuid:de4f2edb-32f1-457d-994f-32fc7e02d58c> | CC-MAIN-2019-13 | https://www.investopedia.com/terms/j/j-curve-effect.asp | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203438.69/warc/CC-MAIN-20190324103739-20190324125739-00311.warc.gz | en | 0.956105 | 523 | 2.921875 | 3 |
Finally lose those extra pounds by simply shifting the way we think about our food choices – No calorie counting required.
By Emily C. Harrison MS, RD, LD.
If you are one of the many people who have had a hard time losing a few pounds using traditional approaches of counting calories and fat grams, then it’s time for a new approach. New Year’s resolutions give us an enthusiastic opportunity to seize the day, but how do we really make change happen and stick to it in a sustainable way? “Sustainability” has become such a buzzword that can all too easily lose its impact or become cliche. But making choices that are sustainable for our bodies, our busy lives, and the environment is exactly what we have to do to make a lasting difference. The beauty of the sustainability approach, is that when you stop obsessing over calories, fat grams, and carbs, you open yourself up to making delicious food choices based on more positive criteria.
#1 Eat Real Food
Before you make a food choice, ask yourself if it’s real food. “Eat food, not too much, mostly plants”. Michael Pollan’s famous quote sounds so simple, but in this day of ultra processed food, we have to actually define “real food”. This means fresh, unprocessed fruits, vegetables, beans, seeds, nuts and whole grains. If the food label is longer than a typical tweet, or if you don’t recognize some of the ingredients, then rethink eating it. This doesn’t have to be hard. Instead of a pop tart for breakfast, grab overnight oats out of the fridge. Instead of cheese puffs from the vending machine, pack almonds and a clementine. Instead of chicken nuggets for lunch, have a hummus, cucumber, spinach sandwich on whole grain bread with lentil soup. Don’t stress about calories, simply plan ahead to aim to get a fruit or veg at each meal and snack.
#2 Eat Clean
Eating real food (not from packages, boxes, cans, or plastic) automatically limits your exposure to some substances that have been linked to weight gain, learning challenges, and even sometimes cancer. Packaged, conventional products often have more sugar, salt, fat, additives, preservatives, colors, dyes, GMOs, pesticides, herbicides, and nasty chemicals like BPA. Bisphenol A (BPA) is a chemical found in the lining of canned foods, plastic packaging, and some drink bottles. There are numerous studies linking BPA and the rising rates of obesity 1,2,3,9. The obesity epidemic is multifaceted and bigger than just our over consumption of calories, but chemicals, hormones, and antibiotics in our food are thought to be contributing factors 1,2,3,10.
When you consider what else could be in your food besides calories and fat you automatically begin to make choices that support a healthy weight. Don’t be misled by healthwashing claims that your bag of chips are “natural”4. The word “natural” on your food package isn’t clearly defined in the U.S.. Instead, take 15 minutes to boil some quinoa, toss with dried fruit, nuts, and some olive oil dressing and presto you have dinner without any packages going to landfill. Throw some beans, onion, and green pepper in the slow cooker, serve with rice, and dinner will be waiting for you when you get home from a long day. Make extra to save. No packages required, the calories will naturally be lower than something from a box, and you limit your exposure to obesogenic substances. The Centers for Science in the Public Interest and The Environmental Working Group have wonderful tools that allow you to know more about how substances can affect the human body 3,4,8,9.
#3 Your Food Choices Affect More Than Just Your Waistline
Your food choices affect others. When you make the decision to buy a burger and soda you choose food products that come from a very unhealthy system. Sodas and even bread contain high fructose corn syrup which is genetically modified to withstand spraying of industrial herbicides. The meat is likely from a factory farm that routinely uses antibiotics which contribute to antibiotic resistant infections in people (in the U.S.). It is estimated that 90,000 people die each year from antibiotic resistant infections and resistance is a major public health crisis10. Children who live near factory farms have higher rates of asthma and farm animal waste runoff has been linked to e. coli outbreaks10. Red meat production contributes heavily to pollution5,6,9,10. Choose a veggie burger instead, you’ll get less calories and fat but you also positively impact others on the planet.
Ultimately you are voting with your fork to decide what kind of future you want. This New Year, instead of worrying about calories, make a real sustainable difference by eating clean, eating less meat and dairy, and eating with the seasons. You just might be surprised how sustainable eating affects your waist line (and waste line) well after January’s burst of motivation has worn off.
Emily Cook Harrison MS, RD, LD
Emily is a registered dietitian and holds both a bachelor’s and master’s degree in nutrition from Georgia State University. Her master’s thesis research was on elite level ballet dancers and nutrition and she has experience providing nutrition services for weight management, sports nutrition, disordered eating, disease prevention, and food allergies. Emily was a professional dancer for eleven years with the Atlanta Ballet and several other companies. She is a dance educator and the mother of two young children. She now runs the Centre for Dance Nutrition and Healthy Lifestyles. She can be reached at [email protected]
1. Association Between Urinary Bisphenol A Concentration and Obesity Prevalence in Children and Adolescents. JAMA. 2012;308(11):1113-1121. jama.jamanetwork.com/article.aspx?articleid=1360865
2. BPA in food packaging tied to childhood obesity: http://contemporarypediatrics.modernmedicine.com/contemporary-pediatrics/news/modernmedicine/modern-medicine-feature-articles/bpa-food-packaging-cont?page=full
CDC.gov, Overweight an Obesity: www.cdc.gov/obesity/childhood/index.html
3. Center for Science in the Public Interest: Chemical Cuisine, Learn about Food Additives: www.cspinet.org/reports/chemcuisine.htm
4. Center for Science in the Public Interest: Eating Green. www.cspinet.org/EatingGreen/
5. Live Science: www.livescience.com/22050-heat-waves-high-death-tolls.html
6. Years of Living Dangerously: http://yearsoflivingdangerously.com/topic/heat/
7. Healthwashing: www.huffingtonpost.com/andy-bellatti/healthwashing_b_4101450.html
8. CSPI Food Day: Food Impact Quiz: www.foodday.org/14questions
9. Environmental Working Group. ewg.org
10. Industrial Farm Animal Production in America: a report of the Pew Charitable Trusts and Johns Hopkins Bloomberg School of Public Health. 2010. | <urn:uuid:61b37e85-0d09-4fb9-977f-bc18ffeb08aa> | CC-MAIN-2019-43 | https://www.danceinforma.com/2015/01/06/making-healthy-changes-sustainable-new-year/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987836295.98/warc/CC-MAIN-20191023201520-20191023225020-00481.warc.gz | en | 0.911633 | 1,567 | 2.890625 | 3 |
Welcome! We’re glad you landed at Oakland Schools’ Teaching Research Writing site. This site supports middle and high school teachers across the disciplines engaged in teaching research writing. So if you’re teaching students in grades 6-12 how to research and present their findings in an essay-based or multimedia format, you’ll find plentiful resources here. The site addresses both informational and argument writing.
The Common Core State Standards‘ focus on research spurred the creation of this site. In our work with districts and teachers, the project team recognized the need to provide a student research independence continuum, research writing skills progression, and lessons to support teachers as they implement the new literacy standards. The lessons on the site are intended to support existing research-related units you teach by focusing on particular skills in the research writing process.
We hope you’ll stay awhile and return often! The site will continue to evolve.
Using This Site
Ideally, research writing is taught throughout the year via smaller tasks and projects, as the Common Core stipulates. This approach allows for continued reinforcement of these all important skills. By examining the skills progression and lessons on this site, you can make decisions about which skills you would like to focus on in the existing units and writing tasks you teach.
We suggest perusing the site in the following order to move from the big picture to the more granular lesson level:
- Student Research Independence Continuum – This framework outlines increasing degrees of student responsibility in the research writing process.
- Research Writing Skills Progression – This interactive table charts skill development from grade 6 to 12; key skills in the progression are linked directly to ready to use lessons.
- Lessons – These ready to use interactive lessons were created in Google Docs to allow for easy download and adaptation/revision by teachers. They include handouts, Powerpoint presentations, suggested cloud-based tools, and visible thinking routines.
- Other Resources | <urn:uuid:6967006d-e5f8-4768-a554-f5dbbdea9271> | CC-MAIN-2017-17 | http://www.osteachingresearchwriting.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118851.8/warc/CC-MAIN-20170423031158-00430-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.917828 | 396 | 3.09375 | 3 |
Tinnitus Symptoms Are Confusing
First off, your tinnitus isn’t a disease. Rather, it’s a set of symptoms arising as a direct result of some underlying problem or condition that you may, or may not, know that you have. I suppose you could call it a condition, but it’s a condition that has several root causes.
Tinnitus symptoms are the noises a sufferer hears in their ears when there is no external source for those noises, i.e. they are produced, or at least perceived, internally. Different sufferers will hear different sorts of noise depending to a large extent on the underlying cause of the tinnitus and how severe the condition is.
Tinnitus symptoms are rarely severe. Some people may not even realize they have tinnitus. However, there are approximately two million cases of tinnitus where tinnitus symptoms are so severe that they completely disrupt lives. Tinnitus can affect people of all ages.
Tinnitus symptoms can be very disturbing. This is particularly true for people who live alone. The symptoms of tinnitus, the sound of silence and the sound of silence known as. This signal can be confused with other signs of illness are a sudden buzz. In many cases, mental illness and schizophrenia symptoms are similar to tinnitus, associated with some common symptoms of psychosis and multiple personality disorder and bipolar disorder.
Tinnitus And Head Injuries
Different sort of head injuries can also result in developing tinnitus symptoms. Many football players are likely to develop this condition as they usually suffer more head injuries than any other game.
In general, hypnosis cannot completely eliminate the symptoms of tinnitus for a long time. However, studies have revealed that it can reduce the volume of tinnitus sound and can diminish anxiety induced by the condition. In fact, over eighty percent of tinnitus patients who have undergone hypnosis have started experiencing lesser tinnitus symptoms.
Other Tinnitus Symptoms
Aside from its physical symptoms, tinnitus may also have an effect on the cognitive ability and psychological well being of a patient. For instance, people who experience ringing in the ears may also suffer from anxiety and difficulties with concentration and attention.
Taking ginkgo-biloba can alleviate the symptoms of tinnitus. Ginkgo has shown to greatly improve impaired mental performance and clarity, can help alleviate depression, and can significantly improve symptoms associated with tinnitus.
Migraine Originated By Tinnitus
The initial migraine attack of tinnitus is usually characterized by severe constriction of blood vessels. So this led to a reduction in blood circulation in some areas of the brain. Furthermore, the constriction is replaced by the dilation of blood vessels of the head and scalp. This event triggers a chain reaction that makes one a migraine headache and tinnitus. As for the main symptoms of a migraine, tinnitus is usually the patient will have experience headaches on one side of the head. And this headache is usually almost unbearable for some patients within a few hours. | <urn:uuid:15a4dd58-7d91-4c07-911b-53e510c6257e> | CC-MAIN-2020-40 | https://justnotinnitus.com/tinnitus-symptoms/tinnitus-symptoms-are-confusing/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401598891.71/warc/CC-MAIN-20200928073028-20200928103028-00243.warc.gz | en | 0.947426 | 632 | 2.796875 | 3 |
Runners on the Field
When we look at runners on the field, several aspects can be considered:
- Where they line up for a play
- Changing directions
- Running in an open field
When we look at the positions of the backs, both offensive and defensive, we see that they typically line up away from the line of scrimmage on either side of the offensive and defensive linemen. Their positioning allows them room, or time, to accelerate from a state of rest and reach a high speed, to either run with the ball or pursue the ball carrier. Notice that the linebackers have far more room to accelerate than the linemen, and the wide receivers have far more room than the linebackers. So linebackers can reach higher speeds than linemen, and wide receivers can reach the highest speeds of all.
Changing Directions on the Field
Let's look at an example of a running play in which the quarterback hands the ball off to a running back. First, the running back starts from the set position, at rest, and accelerates to full speed (22 mi/h or 9.8 m/s) in 2 s after receiving the ball. His acceleration (a) is:
a = (vf - vo)/(tf - to)
a = (vf - vo)/(tf - to)
- vf is final velocity
- vo is initial velocity
- tf is final time
- to is initial time
a=(9.8 m/s - 0 m/s)/(2 s - 0 s)
a= 4.9 m/s2
As he runs with the flow of the play (e.g. to the right), he maintains constant speed (a = 0). When he sees an opening in the line, he plants his foot to stop his motion to the right, changes direction and accelerates upfield into the open. By planting his foot, he applies force to the turf. The force he applies to the turf helps to accomplish two things:
- Stop his motion to the right
- Accelerate him upfield
To stop his motion to the right, two forces work together. First, there is the force that he himself applies to the turf when he plants his foot. The second force is the friction between his foot and the turf. Friction is an extremely important factor in runners changing direction. If you have ever seen a football game played in the rain, you have seen what happens to runners when there is little friction to utilize. The following is what happens when a runner tries to change his direction of motion on a wet surface:
- As he plants his foot to slow his motion, the coefficient of friction between the turf and him is reduced by the water on the surface.
- The reduced coefficient of friction decreases the frictional force.
- The decreased frictional force makes it harder for him to stop motion his to the right.
- The runner loses his footing and falls.
The applied force and the frictional force together must stop the motion to the right. Let's assume that he stops in 0.5 s. His acceleration must be:
- a = (0 m/s - 9.8 m/s)/(0.5 s - 0 s)
- a = -19.6 m/s2
*The negative sign indicates that the runner is accelerating is in the opposite direction, to the left.
The force (F) required to stop him is the product of his mass (m), estimated at 98 kg (220 lbs), and his acceleration:
- F = ma = (98 kg)(-19.6 m/s2) = 1921 Newtons (N)
- 4.4 N = 1 lb
- F = ~500 lbs!
To accelerate upfield, he pushes against the turf and the turf applies an equal and opposite force on him, thereby propelling him upfield. This is an example of Isaac Newton's third law of motion, which states that "for every action there is an equal, but opposite reaction." Again, if he accelerates to full speed in 0.5 s, then the turf applies 1921 N, or about 500 lbs, of force. If no one opposes his motion upfield, he will reach and maintain maximum speed until he either scores or is tackled.
Running in an Open Field
When running in an open field, the player can reach his maximum momentum. Because momentum is the product of mass and velocity, it is possible for players of different masses to have the same momentum. For example, our running back would have the following momentum (p):
- p = mv = (98 kg)(9.8 m/s) = 960 kg-m/s
For a 125 kg (275 lb) lineman to have the same momentum, he would have to move with a speed of 7.7 m/s. Momentum is important for stopping (tackling, blocking) runners on the field. | <urn:uuid:1f7b1f02-3abb-4920-8800-270b91972316> | CC-MAIN-2019-43 | https://entertainment.howstuffworks.com/physics-of-football3.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986649841.6/warc/CC-MAIN-20191014074313-20191014101313-00221.warc.gz | en | 0.963265 | 1,018 | 3.328125 | 3 |
During the seventies and eighties, Piedmont was one of the largest airline
s in the United States of America
, but its success story
didn't last for long.
In 1947, the Civil Aeronautics Board awarded Piedmont Aviation with a route contract to fly from Wilmington, North Carolina to Cincinnati, Ohio. Piedmont Airlines made its inaugural flight on February 20, 1948; by the end of that year, it served twenty cities in six states around the route. In 1952, when the contract was up for renewal, the CAB was so impressed with Piedmont's performance that it granted the airline an unheard-of seven year extension, eventually giving them a permanent license in 1955.
Piedmont's fleet transformed from Douglas DC-3s in the fifties to Fokker F.27s and Martin 404s in the sixties to NAMC YS-11s in the seventies, and their route network stretched from Washington, DC to Chicago, Illinois to Charleston, South Carolina by 1970: in 1978, they began flying to Florida as well. The first Boeing 737 jets were delivered to Piedmont in 1968, and Piedmont soon became the world's largest 737 operator.
Airline deregulation pushed Piedmont even higher, even though they had lobbied against it. They evaded a takeover bid from Air Florida but ended up selling a 20% stake to the Norfolk and Western Railway, which gave them capital for an incredible phase of expansion. In 1981, they opened a hub at Charlotte Douglas International Airport in Charlotte, North Carolina, followed by hubs in Dayton, Ohio (1982) and Baltimore Washington International Airport (1983). In 1986, they bought Empire Airlines and its hub in Syracuse, New York, and entered a cooperative marketing agreement with Trans World Airlines to feed its transatlantic flights from John F. Kennedy International Airport in New York City.
In the meantime, Piedmont was lobbying heavily for a Charlotte-London route award, and placed orders for new Boeing 767's that would spread Piedmont's network from California to the United Kingdom. The Department of Transportation approved the London route in 1987, and Piedmont became a transatlantic carrier.
However, Piedmont's future was to be cut off prematurely. A number of companies and corporate raiders were looking to acquire the company in those bad old days of Wall Street. USAir (now US Airways), TWA (then under the control of Carl Icahn), and Norfolk Southern were the three big bidders, but by March 1987, USAir had won. The speculation had caused Piedmont's stock to skyrocket from $40 a share to $70 a share in just one year. After several regulatory hurdles were cleared, the DOT approved the USAir-Piedmont merger, and Piedmont was fully absorbed into USAir on August 5, 1989.
At that point, Piedmont was bringing in profits of $200 million on revenues of $2 billion a year, carrying 25 million passengers on 197 aircraft to 96 airports in four countries and 29 U.S. states. | <urn:uuid:530c814a-b553-425b-be12-c15dbd1bcebe> | CC-MAIN-2017-04 | http://everything2.com/title/Piedmont+Airlines | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281492.97/warc/CC-MAIN-20170116095121-00269-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.969046 | 637 | 2.796875 | 3 |
Pythagoras of Samos (born between 580 and 572 BC, died between 500 and 490 BC) was an Ionian Greek mathematician and founder of the religious movement called Pythagoreanism. He is often revered as a great mathematician, mystic and scientist; however some have questioned the scope of his contributions to mathematics and natural philosophy. He is best known for the Pythagorean theorem, which bears his name. Known as â¿¿the father of numbersâ¿¿, Pythagoras made influential contributions to philosophy and religious teaching in the late 6th century BC. He was the first man to call himself a philosopher, or lover of wisdom, and Pythagorean ideas exercised a marked influence on Plato. Unfortunately, very little is known about Pythagoras because none of his writings have survived. Many of the accomplishments credited to Pythagoras may actually have been accomplishments of his colleagues and successors. | <urn:uuid:d7e49709-2312-4655-a1c9-ebe0a6ba1384> | CC-MAIN-2017-22 | https://www.moluna.de/buch/4119693-the+golden+verses+of+pythagoras+and+other+pythagorean+fragments/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608633.44/warc/CC-MAIN-20170526032426-20170526052426-00338.warc.gz | en | 0.99079 | 188 | 3.578125 | 4 |
Wearable technology is often useful for improving daily productivity and even has applications in posture adjustment/physio rehab, but comfort can be an issue. Recent research from MIT CSAIL has led to the development of smart clothes which feel no different than comfy basics — except these garments track your body movements with “tactile electronics.”
Stretchable and breathable smart-wear is comprised of conventional material along with piezoresistive fibers that hug the body while detecting pressure. Further adjusted by machine learning, the sensors within the clothing ensure accurate and consistent reactions. Data is later put into “frames,” then converted into pose prediction. The system can collect non-invasive data to anticipate posture without an all-over body stimulating receptor. Constructed with affordable materials, this new definition of techwear could easily be adapted for mass production at low price points.
This technology could even be applied to other facets of daily life and scientific research. For example, athletes could track their performance and maximize efficiency based on posture. Even thinking further ahead, this new tech could be used on tactilely-blind robots for a sensation that is comparable to human skin, enabling them to perform more sophisticated tasks.
What if socks on your feat could measure your body’s movements?
— MIT CSAIL (@MIT_CSAIL) March 26, 2021 | <urn:uuid:5320f3ea-4846-4b75-abdc-14067af24ce8> | CC-MAIN-2022-05 | https://truthunmuted.org/mit-has-invented-smart-clothes-that-predict-your-posture/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302740.94/warc/CC-MAIN-20220121071203-20220121101203-00522.warc.gz | en | 0.939399 | 285 | 3.09375 | 3 |
History and visit the Rue de la Harpe in Paris
This street Ve arrondissement of Paris is used to connect the boulevard Saint-Germain Boulevard Saint-Michel, continuing until Huchette street, formerly called Vielle-buckles. This street takes its name from a sign that was there once after wearing the name rue de l’Ecole de Medecine, St. Cosmas and Hoirs Harcourt.
Tourists who go exploring the rue de la Harpe apercevront how easily this street derives its unrivaled beauty of the presence of a large number of buildings that make up the palace of Thermes. The corner of Two Doors housed a hotel built in the sixteenth century, inhabited by the abbots and Crebillon Choisy. After welcoming Chaumette, Hégésipe Moreau, the hotel was destroyed in 1840. The No. 171 was once the printer Momoro, one of the party leaders Hébertist.
Between No. 110 and 123 was the Saint-Michel which gave access to the house of Philip Augustus. This gate was built in l200 and had been visible at that location until the mid-seventeenth century. In 1684, the gate was demolished to make way for a fountain in the desire to serve Bullet decor.
Historically, the No. 85 is known by the College of Seez which was built there in 1427 by Gregory Langlois, Bishop of Seez. Rebuilt in 1730, then in 1763, the college incorporates thereafter the University.
Any width of the highway was initially set at 10 m by a ministerial decision dated 3 Germinal X, then increased to 13 m by the Royal Decree of 25 November 1836.
Transfer to the Rue de la Harpe in Paris
Rue de la Harpe is 19.2 km from Orly airport, 33.4 km from Charles de Gaulle airport and 100 km from Paris Beauvais airport. | <urn:uuid:8010ab9a-666d-472b-8dca-8d2cbb7b8e54> | CC-MAIN-2022-40 | https://www.shuttle-paris-airports.com/night-private-car-transfer-from-rue-de-la-harpe-to-paris-charles-de-gaulle-airport/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00178.warc.gz | en | 0.942171 | 418 | 2.75 | 3 |
Search Results: ''
The Days That Went Before Us: Stories & Accounts of Lowell's Early Irish
Prints in 3-5 business days
THE DAYS THAT WENT BEFORE US recounts the lives of the early Irish who settled in Lowell, Massachusetts in the first part of the nineteenth century. It's the story of how a community of immigrants... More > overcame adversity and by the turn of the twentieth century evolved into the city's leading political, religious, and social force. They did all this while attempting to maintain their cultural identity. From the arrival of Lowell's first Irish immigrant, Hugh Cummiskey, in 1822 to today's celebrations of St. Patrick's Day, the Irish have maintained a cultural presence for almost two hundred years. Using the most current research and primary source documents, their story is carried on for others to share.< Less
Top 10see more >
Organize for Innovation
Watch the Lilies How...
50 Fabulous Zany...
ADDRESSING ATHEISM: Is...
National Old School...
The page you are attempting to access contains content that is not intended for underage readers.
Please verify your birth date to continue. | <urn:uuid:79dd0c37-9958-4401-a140-9de128a1e0c3> | CC-MAIN-2018-39 | https://www.lulu.com/shop/search.ep?contributorId=1551609 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160454.88/warc/CC-MAIN-20180924125835-20180924150235-00196.warc.gz | en | 0.897643 | 240 | 3.265625 | 3 |
A. Situation analysis
Description of the disaster
A massive population movement, known as a caravan, departed from San Pedro Sula, Honduras, on 14 January 2020. These migration flows have been occurring in the Central American Northern Triangle since October 13, 2018, when the first caravan of 8,500 people originating in Honduras and caused a humanitarian crisis at the Guatemala-Mexico border.
Some 2,000 people, including men, women, young people, pregnant women, members of the LGBTIQ community and children, departed from San Pedro Sula on 14 January 2020. On 15 January, Guatemala's Migration Institute registered 662 individuals entering the country through the Customs Office at Corinto, Izabal and 1,612 individuals through the Customs Office at Agua Caliente, Chiquimula, both in north-eastern Guatemala. During the following days, the number of migrants crossing the country has increased to an estimated amount of 4,000 people, according to The Guatemalan Migration Authorities.
This caravan has once again made Guatemala a high-transit country. Migrants are using two main routes: one starting at the Agua Caliente border crossing in Chiquimula, continuing through Guatemala City, and ending at the southern Guatemala-Mexico border in the city of Tecún Umán in the municipality of Ayutla, San Marcos, using the CA-2 highway; and the second starting at the Corinto border crossing in Izabal department, continuing along the PET-15 highway at Km 243 to the municipality of Santa Elena, Petén and ending at the border crossing at Técnica and El Ceibo (Petén- Guatemala-Tenosique-Mexico). | <urn:uuid:e45276f5-9089-4dde-9cc8-26c2d8c9217f> | CC-MAIN-2020-40 | https://m.reliefweb.int/report/3496643/guatemala/guatemala-population-movement-mdrgt016-dref-plan-action | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198213.25/warc/CC-MAIN-20200920125718-20200920155718-00581.warc.gz | en | 0.908378 | 343 | 2.734375 | 3 |
Abstract: Microscopes are age-old technology which let us visualize and research phenomena too small to be perceived by the human eye. Macroscoopes, by contrast, are systems designed to reveal spatial and temporal patterns which are so big or slow that they escape normal human perception. We can get some sense of these when we fly, or when we look at time-lapse imagery. But to really make progress requires both the ability to collect planetary-scale information over time, and to harness modern compute technologies to support interactive visualization and interrogation of such data.
The convergence of three technologies is finally allowing the construction of macroscopes, and making them practical for daily use in both scientific and business contexts. First, we have the advent of LIDAR, GPS cell phones and ‘cube’ sats. These supply raw observation data from nearly everywhere, capturing both human and natural activities. Then we have machine learning methods which can classify patterns of movement or pixels. As applied to geodata, we call this “geoML.” Last but not least we have modern computing architectures which move algorithms to data and stream highly-distilled information to client applications.
In this presentation, we explore three applications of the macroscope concept, applying it to the monitoring of individual tree health for hundreds of millions of trees, the exposure of static and moving assets to weather, and the analysis of ship movement patterns.
Bio: Abhishek Damera’s work as a Data Scientist at OmniSci involves using the state of art machine learning algorithms to capture the underlying trends in the geospatial data. Prior to this, he has done his Master’s at UC Berkeley in Transportation Engineering, where most of his work is focused on classifying the roads according to vehicular speed profiles.
Data Scientist | Omnisci | <urn:uuid:fffe6b1d-2b25-4b52-8a12-f0f0c3dd7a34> | CC-MAIN-2023-23 | https://staging6.odsc.com/speakers/the-macroscope-initiative-building-planetary-geoml-with-omnisci-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650201.19/warc/CC-MAIN-20230604161111-20230604191111-00349.warc.gz | en | 0.924575 | 385 | 2.703125 | 3 |
Wireless Home Networking, Part III - Wi-Fi Security
November 06, 2002
How do you protect your home WLAN from prying eyes? We'll explain to you just what WEP, why it isn't secure, and why you need to use it anyway. Plus other security you can use and what WEP's replacement will do at home.
Security is an important concern on any network, but it's especially so for a wireless one where information travels back and forth through the air and is open to eavesdrop and intercept by anyone within range. As a result issues surrounding security come up in almost any discussion of implementing a WLAN.
New security techniques and standards are constantly under development, and a comprehensive discussion of security is beyond the scope of this tutorial, but we'll outline some of the security features you can take advantage of to help safeguard your data and protect against unauthorized access to your network.
The method by which WLANs protect wireless data streams today is called Wireless Equivalent Privacy, or WEP. Despite the implication of its name, WEP doesn't really provide privacy equivalent to that of a wired network. As mentioned earlier, a wireless network is inherently less secure than a wired one because it eliminates many of the physical barriers to network access.
The way WEP attempts to overcome this is by encrypting the data transferred between two wireless devices. This could be for example a computer and an access point, two access points, or two computers. A data stream encrypted with WEP can still be intercepted or eavesdropped upon, but the encryption makes the data unintelligible to the interloper, at least in theory. The principle behind WEP is similar to that used by SSL (Secure Sockets Layer) which encrypts data sent between a computer and a Web server, say, when you order something from an online store.
There are different levels of WEP available, depending on the type of hardware you are using. The strength of WEP is measured by the length of the key used to encrypt the data. The longer the key, the harder it is to crack (in terms of the time and computing power required).
The earliest 802.11b implementations provided 40-bit WEP, which was generally regarded as too weak to afford any real protection. Later 802.11b products (like the ones on the market today) strengthened WEP to use 64-bit (which is actually the same as 40-bit) or 128-bit keys.
802.11a products offer those same WEP levels but add a yet higher level--152-bit, while the some of the latest 802.11b+ products often feature 256-bit WEP.
To maximize your security, you should always utilize the highest level of WEP that your hardware supports. Sometimes, if you use hardware from several different vendors, you may find that they support varying levels of WEP. In these cases, you should use the highest level common to both devices. Although generally WLAN products from different vendors communicate with each other just fine, enabling WEP is often a way to expose interoperability problems. If security is your paramount concern, consider getting all of your hardware from a single vendor.
Although the calculations required to encrypt data with WEP can impact the performance of your wireless network, it's generally seen only when running benchmarks, and not large enough to be noticeable in the course of normal network usage. The performance penalty on enabling WEP will generally be a little higher when using a router that incorporates a built-in WLAN access point, because of the added load of WEP encryption on a CPU that is already handing routing and switching functions for Internet sharing. When using a stand-alone access point, the performance penalty is usually imperceptible.
Enabling WEP on your WLAN equipment is not very difficult. Any WEP-enabled router, access point, or NIC will have a WEP configuration section that lets you specify the type of key you want to use as well as the key itself. Most devices let you specify your key using either ASCII (alphanumeric characters) or hex numerals (0-9 and A-F). If you'd rather let the computer do the work for you, you can usually input a plain-text passphrase (like "monkeyboy") which the device will use to automatically generate the WEP key.
Whichever level of WEP you decide to use, it's crucial to use identical settings--the key length, and the key itself, obviously-- on all devices. Only devices with common WEP settings will be able to communicate. Similarly, if one device has WEP enabled and another doesn't, they won't be able to talk to each other.
When considering security on a WLAN, WEP is not the whole story. WEP may obscure the true nature of your data to eavesdroppers, but it doesn't prevent unauthorized computers from getting on your network via your access point. (In fact, WEP encrypts only the data portion of a TCP/IP packet, not the headers, which means that source and destination address of every packet is clearly identifiable.) The job of a WLAN access point is to always broadcast its presence. By default, it grants access to any computer that requests it.
The feature that deals with the issue of unauthorized access is MAC filtering.
Every piece of network hardware ever made has a MAC (Media Access Control) address
Wi-Fi routers and access points that support MAC filtering let you specify a list of MAC addresses that may connect to the access point, and thus dictate what devices are authorized to access the wireless network. When a device is using MAC filtering, any address not explicitly defined will be denied access.You can almost always find a device's MAC address on a label physically affixed to it. If not, go to the computer you need a MAC address from, get a DOS command prompt up by going to the Start Button, selecting Run, then typing "command'. At the prompt type "ipconfig /all" (without the quotes).
In Windows 95/98/ME, you can type "winipcfg" in the Run dialog box to get a list the MAC address of each network card in the system.
Some products take MAC filtering a step further and let you grant or deny access to either the LAN or the WAN (or both). This added flexibility comes in handy if you're trying to control internal computers-- for example, to allow a particular computer access to your internal network but not to the Internet, such as your kid's computer.
Unfortunately, not all WLAN routers and access points provide MAC filtering capabilities, so be sure to check before buying. Some devices let you filter access by IP address, but because IP addresses are not always unique, can be changed, and are easily spoofed, they're not a good basis to control network access.
Security -- Why Bother?
Like the WLAN standards themselves, the security features within them are new and far from foolproof. That doesn't mean, however, that they're worthless and should not be implemented.
Think of it in the following terms-- do you typically leave your car unlocked with the keys in the ignition? Probably not; more likely, you take the keys, lock the doors, and maybe even use a supplemental security feature like an alarm or steering wheel lock. This doesn't guarantee that your car won't be stolen, but it does greatly reduce the chances that it will.
You should approach security on your WLAN the same way. The security features currently available will probably not stop a determined hacker who wants to access your network, but they likely will thwart just about everyone else.
The worst thing you can do is set up your wireless network, leave all the default settings in place, and leave security features turned off. Even in business environments where the wireless networks were set up by supposedly knowledgeable IT people, you'd be surprised how often people do exactly that. Don't be one of them.
Wi-Fi Protected Access
Although it is far, far better than nothing, WEP has been roundly criticized for providing both insufficient and incomplete security. For example, the encryption key used by WEP, regardless of its length, is static and never changes unless it is periodically and manually changed by the administrator on all devicesa daunting task one even a small network, to say the least.
This means that an intruder eavesdropping on wireless transmissions could theoretically monitor network traffic over time and possibly gather enough information to decipher the key and decrypt the data. The heavier the network traffic and the more computing power the intruder had at his or her disposal, the less time it would take.
The second major weakness of WEP is that it does nothing to authenticate users on the network, which is why schemes like MAC address filtering were developed. Remember though, that the MAC address is a property of a network device, not a user or even a computer. Therefore, if an intruder stole a wireless NIC whose MAC address was in the allow list of an access by an access point they would be granted network access.
In response to these criticisms, the Wi-Fi Alliance recently announced a new wireless security protocol that will be available in early 2003. Its called Wi-Fi Protected Access (WPA), and is designed to take the place of WEP and address many of its shortcomings.
For starters, WPA requires the user to provide a master key, but this does not become a static encryption key. Instead, the master key is simply a password used as a starting point through which WPA derives the key it will use to encrypt network traffic. Moreover, the key is regularly and automatically changed (and never reused), reducing the likelihood that it will be compromised. The master key also serves as a password by which users can be authenticated and granted network access.
WPA was designed to be a software upgrade to WEP, so most existing wireless
devices should be upgradeable to WPA via a firmware
The first WPA-enabled products are expected in the early Spring of 2003, and upgrades for existing products should be available at around the same time or shortly thereafter.
Coming in Part IV: Placing your Equipment
Need more security info? Join us at the 802.11 Planet Conference & Expo, Dec. 3-5 in Santa Clara, CA. One of our workshops will be a WLAN Security Tutorial. | <urn:uuid:62f1f695-2d96-4c63-bf67-8ab830021b1b> | CC-MAIN-2018-05 | http://www.wi-fiplanet.com/tutorials/article.php/1495811/Wireless-Home-Networking-Part-III---Wi-Fi-Security.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887832.51/warc/CC-MAIN-20180119065719-20180119085719-00755.warc.gz | en | 0.946991 | 2,131 | 2.703125 | 3 |
A popular reality TV show features 16 people living in a house together for the summer. In a recent episode, a few houseguests were cooking dinner when someone in the outside yard had an accident. Everyone abandoned the kitchen to run to the aid of the injured person. When they returned to the kitchen, the oven was on fire! With smart and quick thinking, they closed the oven door and ran to get a fire extinguisher. One person reopened the oven while another extinguished the flames. It was perfect teamwork and fantastic response, which prevented the fire from escalating into a disaster.
October has several National Days and National Weeks to encourage fire safety in the home. The first weekend of October is designated as the National Fallen Firefighters Memorial Weekend. The United States flag will be lowered to half-staff on all federal buildings on that Sunday. A ceremony is held in Maryland as the official national tribute to America’s fallen firefighters. The ceremony includes a traditional honor guard and bagpipe procession. Each family of a fallen firefighter receives an American flag.
The first week of October is National Chimney Safety Week to teach people about chimney and venting safety. As we fire up our chimneys in Wisconsin this fall, there are some important safety tips to remember. While wood-burning chimneys can certainly be hazardous, other gas and fuel-burning appliances can create unsafe chimneys, too. External factors also cause dangerous situations, including weather, animals residing in the flue, an aging or damaged structure, and obstructions.
Here are some tips to prevent a chimney fire in your home:
- Before you light up the fireplace for the season, hire a professional chimney sweeper to inspect and clean your chimney. Have the professional inspect your chimney structure for holes or cracks where sparks or embers can escape.
- Use only dry, seasoned wood in your fireplace, and don’t burn trash or other items.
- Remember to open the flue and make sure your fireplace gets sufficient air to allow proper burning.
- Use a fireguard in front of your fireplace to protect against hot embers popping into the room.
- Extinguish all hot embers before leaving the house or going to bed.
- Wait until ashes are cool to clean them out, and then deposit them into a metal container.
- Install a carbon monoxide detector near your fireplace and working smoke detectors on every level of your home.
The 2021 National Fire Prevention Week starts on October 9. Its purpose is to remind us to take precautions to prevent fires in the home and make a safety plan for emergencies. Making a home fire safety plan includes installing smoke detectors in multiple locations around the house. Check them regularly to be sure they are working correctly and replace the batteries often. Purchase a fire extinguisher and place it in the kitchen or in a location you can access quickly. Read the instructions for the extinguisher and watch videos on how to properly operate it so that you will be able to use it when needed.
In the case of our reality show houseguests, they were most likely dealing with a grease fire in the oven. Never leave cooking food unattended in the kitchen. If a grease fire starts, cover the flames with a metal lid or cookie sheet and turn off the heat source. If it’s small and manageable, pour baking soda or salt on it to smother the fire. Do not try to extinguish the fire with water because grease makes water splatter and will burn you or spread the fire. If necessary, spray the fire with a Class B dry chemical fire extinguisher, which is used to smother and extinguish flammable liquids such as alcohol, ether, oil, gasoline, and grease.
For more great tips and suggestions for your home fire safety plan, visit the Turnkey Homes, LLC blog at turnkeyhomesllc.com/blog. Turnkey Homes is the Appleton-Green Bay area’s premier custom home builder. Talk to us about building your custom home or renovating your property. Call us at (920) 470-4315 or contact us through our website at turnkeyhomesllc.com/contact-us. | <urn:uuid:b9030482-270d-4f98-81c6-c5eef577c68c> | CC-MAIN-2021-43 | https://turnkeyhomesllc.com/2021/09/home-fire-safety/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585171.16/warc/CC-MAIN-20211017082600-20211017112600-00213.warc.gz | en | 0.93475 | 856 | 2.78125 | 3 |
Leo Kanner's ideas about autism have been widely misunderstood. Recent media accounts and books report that he blamed parents for causing autism. But Kanner did not blame parents. In fact, his astute observations of parents gave him deep sympathy for them, and led to his fundamental insights about their behavior that fueled important advances in the genetics of autism.
Kanner's classic 1943 paper on 'early infantile' autism was the first systematic description of this unique neurodevelopmental condition1. His conclusion that autism is an innate disorder set the stage for later studies in identical twins that confirmed the condition's genetic basis2. In his paper, Kanner also described the parents of these children and their behavioral traits. He wrote that, overall, the parents seemed perfectionistic and preoccupied with abstractions, rather than showing a genuine interest in people.
Kanner addressed the question this observation raises: Are parents in some way to blame for their child's condition? On the contrary, he wrote: "The children's aloneness from the very beginning of life" suggests that parents' behavior is not a causative factor. He went on to state that scientists must assume "that these children have come into the world with the innate inability to form the usual, biologically provided affective contact with people1."
Kanner published his paper at a time when support for eugenic genetic engineering as a way to improve society was prevalent among scientists, making the diagnosis of an innate condition a serious matter. This was a time in the U.S. when sterilization of people with intellectual disability was legal. Moreover, in 1942, Foster Kennedy, a prominent neurologist from New York, proposed a "mercy death" for children with severe intellectual disability3.
Kanner publicly opposed Kennedy and offered a spirited defense for those with severe, innate developmental disorders. He insisted that all lives matter and that "we should extend the democratic ideal" to these individuals because much could be learned by studying their unique qualities4.
In Defense of Mothers
Despite Kanner's many publications and public statements, his views on the causes of autism have been widely misinterpreted. His attempts to distance himself from eugenic views, along with his descriptions of parents' behavior, led others to mistakenly believe that Kanner had changed his mind about autism being innate and instead assigned parents much of the blame for their child's autism.
On the contrary, Kanner held tightly to his original proposal that autism was an innate condition, which was widely understood to mean it had a genetic basis. His behavioral observations of parents contributed to a breakthrough concept that is wholly consistent with genes being a key part of the autism story. Instead of parenting causing autism, Kanner's idea -- which has since been validated -- was that autism (and its genetic roots) underlies some of the behavior in a subset of parents.
From the 1940s through the 1960s, the negative behavioral view (in this case, aimed at parents) had strong adherents, in part because it seemed to offer some hope. Psychoanalysis -- and the notion that treating people for psychological trauma in early life has broad benefits -- held sway among the clinical and scientific establishment. In the case of autism, if parents were in some way to blame for their child's condition, the parents could be treated psychoanalytically.
Unlike Kanner, Bruno Bettelheim, who then directed the University of Chicago's Sonia Shankman Orthogenic School for emotionally disturbed children, although he was an art historian by training, believed that autism wasn't innate, but rather the result of maternal aloofness. The press and Bettelheim popularized the idea of a parent who displayed such emotional detachment as a 'refrigerator mother.' Research at this time had shown that an extreme lack of social stimulation and emotional deprivation could severely affect development, which lent itself to the blame-the-parent 'theory' of autism5.
But Kanner saw through this idea. His subsequent research on children with autism showed there was no evidence for parental "mistreatment, overt rejection, or abandonment" as a factor in a child's having autism. In addition, Kanner had long fought against psychoanalytic theories that blame mothers. Even before he published his seminal description of autism, he expressed this view in his widely read 1941 book, "In Defense of Mothers: How to Bring Up Children in Spite of the More Zealous Psychologists6."
The book opens with a sympathetic letter to mothers who have come to him with "heavy hearts" and in despair, saying, "It's all my fault," believing themselves to be to blame for their child's problems. Kanner instead made clear his view that mothers are inundated with conflicting advice on child-rearing. He advised them to close the "door to the din from pseudopsychological markets" and encouraged them to regain their self-confidence and trust their own feelings in the face of a barrage of parent-blaming.
Kanner went on to respond directly to accusations that parents were to blame. He was appalled at Bettelheim's theory that so-called 'cold mothers' were the cause of autism. At the first meeting of the parent advocacy group the National Society for Autistic Children (now called the Autism Society) in 1969, he said, "From the very first publication until the last, I spoke of this condition in no uncertain terms as 'innate.' But because I described some of the characteristics of the parents as persons, I was misquoted often as having said that 'it is all the parents' fault.'"
Then in his typical warm, wry, jovial manner, he announced to the parents in attendance: "Herewith I especially acquit you people as parents." Many of the parents in the audience rose and tearfully cheered him. The society awarded Kanner an official citation for his contributions to children with autism and their families.
But despite Kanner's open denial that he had ever blamed parents, the specter of the 'refrigerator mother' theory continues to haunt popular histories of his work. Some recent histories relate that Kanner eventually gave in to others' views and came to agree with professionals who blamed the parents, just as they did. Critics often add that, after recanting much later, Kanner went back to his original proposal that autism was innate -- but that by then, it was too late and the damage was done. This version of events, however compelling, is not accurate.
We revisited Kanner's historical contributions on autism, seeking to clarify the confusion about how Kanner's descriptions of parents' behavior have been interpreted. We conclude that Kanner, in describing the parental behavior he observed, was describing the features of the broad autism phenotype -- a genetic predisposition for autism-related traits that are thought to be an expression of autism's genetic causes. Kanner's observations may in fact constitute the first descriptions of a broad autism phenotype, a concept that has been widely studied and validated.
In his evaluations of children with autism, Kanner recognized that some parents have characteristics that are milder but qualitatively similar to the defining features of autism. In particular, these parents were overly focused on detail and had limited interest in social interactions.
In 1956, Kanner and his collaborator at Johns Hopkins University, Leon Eisenberg, published a paper describing autism as a psychobiological disorder that both genetic background and the environment contribute to
7. "If one considers the personalities of the parents who have been described as successfully autistic, the possibility suggests itself that they may represent milder manifestations and that the children show the full emergence of the latent structure," they wrote.
In the nearly 75 years since Kanner's first publication on autism, his recognition of the broad autism phenotype in a subset of parents set the stage for later family-genetic studies demonstrating that autism is a genetic disorder. Rigorous behavioral measures and brain imaging studies now support the existence of a broad autism phenotype among some parents of children with autism8,9,10.
In their 1956 publication, Kanner and Eisenberg acknowledged that although the psychological environment does not cause autism, it does affect child development. "It is difficult to escape that the emotional configuration of the home plays a dynamic role" in the development of children with autism, they wrote7. If parents had difficulty recognizing their children's social cues, they could inadvertently adversely affect their child's development -- just as any parent could if they failed to find a way to emotionally engage with their child.
Child-rearing strategies, behavioral interventions, and home environment make a difference in both typical and atypical neural development in children. Ample evidence exists for the idea that enriched social environments lead to better outcomes for children at risk of autism, and current early intervention research focuses on optimizing the dynamic engagement of the children with their parents11. This ongoing research may lead to more successful early behavioral interventions for children with autism, helping to improve their language skills and ability to attend to social cues.
As founding director of child psychiatry at John Hopkins University from 1930 to 1959, Kanner was very much a pioneer in providing clinical support to families of children with developmental disorders. In 1935, he wrote the first textbook of child psychiatry, one that defined child psychiatry as a medical discipline. His passion for social justice is a potent reminder of the importance of finding appropriate services for all children.
To those who knew him, Kanner was a wise and compassionate physician who cared about all children and supported their parents. His career continues to be an inspiration to us all.
1. Kanner L. Acta Paedopsychiatr. 35: 100-136 (1968)
2. Folstein S. and M. Rutter J. Child Psychol. Psychiatry 18: 297-321 (1977)
3. Kennedy F. Am. J. Psychiatry 99: 13-16 (1942)
4. Kanner L. Am. J. Psychiatry 99: 17-22 (1942)
5. Spitz R.A. Psychoanal. Study Child 1: 53-74 (1945)
6. Kanner L. (1941). In defense of mothers: How to bring up children in spite of the more zealous psychologists. Springfield, IL: Charles C. Thomas.
7. Kanner L. and L. Eisenberg Psychiatr. Res. Rep. Am. Psychiatr. Assoc. April: 55-65 (1957)
8. Piven J. et al. Am. J. Psychiatry 154: 185-190 (1997)
9. Losh M. et al. Arch. Gen. Psychiatry 66: 518-26 (2009)
10. Yucel GH. et al. Cereb. Cortex 25: 4653-4666 (2015)
11. Green J. et al. Lancet Psychiatry in press
This story was originally posted on Spectrum News.
James Harris, MD, was Leo Kanner's student during his residency training and was a successor to Kanner as director of the child and adolescent psychiatry division at Johns Hopkins University School of Medicine. Harris gave the memorial tribute to Kanner at the plenary session of the American Academy of Child Psychiatry in 1981, the year of Kanner's death. He is a professor of psychiatry and behavioral sciences at Johns Hopkins University School of Medicine in Baltimore, where he is founding director of the Developmental Neuropsychiatry Clinic.
Joseph Piven, MD, is Thomas E. Castelloe Distinguished Professor of Psychiatry and director of the Carolina Institute for Developmental Disabilities at the University of North Carolina at Chapel Hill. | <urn:uuid:fade5bc4-8ef0-41c1-a4fc-87476ff28050> | CC-MAIN-2019-35 | https://www.medpagetoday.com/Neurology/Autism/57565 | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313501.0/warc/CC-MAIN-20190817222907-20190818004907-00004.warc.gz | en | 0.970715 | 2,376 | 3.390625 | 3 |
The Canadian city of Toronto has unveiled a garbage truck that is capable of being fueled by biogas created by the waste it collects. The new model of garbage truck is the latest addition to the city’s green fleet, which aims to reduce the Toronto’s fuel consumption and protect the air quality.
The new garbage truck comes equipped with a Cummins Westport ISL G engine, which can run on biogas or compressed natural gas and meets 2010 emission standards without the need for the complex emission-control technology (such as diesel particulate filters and selective catalytic reduction) required for diesel trucks. The ISL G engine uses exhaust gas re-circulation and a three-way catalyst to achieve the required emission reductions.
An added bonus is that the city of Toronto is investigating ways to power the truck using organic materials collected from waste. In essence, the truck would be powered by what it picks up, creating a constant supply of fuel. Geoff Rathbone, General Manager of Solid Waste Management Services, said, “Pending results from a pilot program, the City hopes to convert biogas produced from digesting Green Bin organic material into compressed natural gas for distribution across Enbridge’s system. In essence, Toronto will be making its own natural gas. Our two Green Bin processing facilities have the potential to produce enough natural gas to take our entire fleet of 300 waste trucks off diesel. Creating natural gas from kitchen waste will be the first operation of its kind in North America.”
The green garbage truck will be part of Toronto’s medium- and heavy-duty truck fleet that, according to the city’s Green Fleet Plan 2008-2011, will make greatly reduce emissions of greenhouse gases and smog pollutants. “It is important to the City to pilot test vehicles with alternative fuel technologies before making a long-term commitment,” said Gerry Pietschmann, the City’s Fleet Services director. “The natural gas engine will allow the City to realize improved fuel efficiency and reduce emissions of greenhouse gases and air pollutants. We consider these important factors when making additions to our fleet.”
Via Clean Break | <urn:uuid:bacf5712-363d-4939-ae74-d9786a4eddf3> | CC-MAIN-2017-51 | https://inhabitat.com/toronto-waste-truck-runs-on-natural-and-bio-gas/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948551162.54/warc/CC-MAIN-20171214222204-20171215002204-00517.warc.gz | en | 0.917571 | 442 | 2.65625 | 3 |
4 Vaccines for a Healthier Teen
I know, it's still summer. It's too early to be thinking about back to school! But it's the perfect time to take care of some of your children's health needs, before the pressure of school, sports, and extracurricular activities begin.
When our children are small, there are a lot of vaccinations on the schedule. Hepatitis, rotavirus, diphtheria, measles, mumps, rubella — when our children are little, they're vulnerable to so many things. But once they are in school, they're done with all of that, right?
Not true! There are several vaccines preteens and teens need to stay healthy. Here's the list of four vaccines recommended for almost all adolescents:
- Tdap. All 11- and 12-year-olds should get this vaccine. It protects them from three diseases: tetanus, diphtheria, and pertussis (Tdap). Tetanus is a toxic bacteria you can get when a cut or wound gets infected (like stepping on a rusty nail). Diphtheria and pertussis (also known as whooping cough) are spread through the air with coughs and sneezes. Whooping cough can be especially deadly for babies. If your child babysits or has a younger sibling, Tdap can keep her from passing the pertussis bacteria on to them.
The Tdap vaccine acts as a booster for the DTaP kids get as babies, since its protection wears off over time. While your child is getting her Tdap, talk to your doctor about getting a Tdap or Td booster for yourself — adults need a booster shot every 10 years.
- HPV. All adolescents (girls and boys) should receive the human papillomavirus (HPV) vaccine at age 11 or 12. This vaccine protects against the virus that causes cervical cancer and several other cancers including cancers of the penis, vulva, vagina, anus, and throat. The vaccine also protects against genital warts. Vaccinating boys and girls helps keep them healthy, and it makes them less likely to spread the virus to others. For full protection, your child needs three doses of the vaccine over six months. If you have teenagers, it's not too late to protect them. Talk to your health care provider about catch-up vaccination (PDF, 229 KB). Have more questions about the HPV vaccine? Watch this video.
- Meningococcal meningitis. The meningococcal vaccine protects against diseases like meningitis, a rare but very serious illness where illness strikes quickly and unexpectedly and deaths can occur in as little as a few hours. Teens and young adults are at increased risk of infection, so children should receive the first dose of the vaccine at 11—12 years and a booster dose at age 16. If your teenager missed getting the meningococcal vaccine when she was younger, you can do a catch-up vaccination. Children with certain conditions should be on a modified dose schedule. Talk to your health care provider about which schedule is right for your child. Watch this video for more information about protecting your kids from meningitis.
- Flu. Everyone needs a flu vaccine every year. The flu vaccine is the single best way to prevent flu, for kids and adults. It not only protects against influenza, it can also prevent complications like dehydration and pneumonia. If your child has asthma or diabetes, it can help keep her from getting worse if she does get the flu. Watch this video to learn more.
- Additional shots. If your child has long-lasting health problems, is getting some kinds of medical treatment, or will travel abroad in the coming months, she might need different vaccines than others her age. Talk to your child's doctor about what other vaccines she may need.
OK, now you know which vaccines your preteens and teens need. What about cost? Well, thanks to the Affordable Care Act, insurance plans must cover many of the vaccinations adolescents need, without any extra cost to you. That includes Tdap, HPV, meningococcal, and flu vaccines. Check with your insurance provider to find out exactly what is included in your plan. If you don't have health insurance, your child might qualify for free vaccinations through the Vaccines for Children Program. You can also contact your state health department to learn more about where to get free or low-cost vaccines in your area.
Visit WebMD today to test your vaccine knowledge, learn more about the vaccines your child needs, and learn what to do when one vaccine isn't enough. Vaccines keep us safe and healthy, so make sure your child gets all the vaccines she needs before school starts this fall.
Are vaccines safe?
Yes! Vaccines are tested for many years before they're licensed and put into use. Even after a vaccine is approved, it's monitored closely for safety and effectiveness. If there are any reports of health problems, the recommendations may change. Learn more about vaccine safety.
What should I expect after my child gets a vaccine?
Most children have no apparent side effects following vaccines. Sometimes you'll see minor reactions such as pain at the injection site, a rash, or a mild fever. Very rarely are there more serious reactions, like an allergic reaction. Before your child gets a shot, be sure to tell her doctor about all of her allergies. | <urn:uuid:6959affa-d135-41f8-a987-9100450af550> | CC-MAIN-2018-51 | https://www.womenshealth.gov/blog/4-vaccines-healthier-teens | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823348.23/warc/CC-MAIN-20181210144632-20181210170132-00134.warc.gz | en | 0.955427 | 1,118 | 3.328125 | 3 |
ALTHOUGH WE DO NOT RELEASE SODIUM HYPOCHLORITE INTO THE ENVIRONMENT, THESE ARE SOME INTERESTING FINDINGS:
A Risk Assessment Report (RAR) conducted by the European Union on sodium hypochlorite conducted under Regulation EEC 793/93 concluded that this substance is safe for the environment in all its current, normal uses. This is owed to its high reactivity and instability. Disappearance of hypochlorite is practically immediate in the natural aquatic environment, reaching in a short time concentration as low as 10-22 μg/L or less in all emission scenarios. In addition, it was found that while volatile chlorine species may be relevant in some indoor scenarios, they have negligible impact in open environmental conditions. Further, the role of hypochlorite pollution is assumed as negligible in soils. | <urn:uuid:3414e111-14fb-426c-9e77-66c8171a4bfe> | CC-MAIN-2019-13 | https://www.pacificexterior.com/does-chlorine-or-bleach-damage-the-environment/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203462.50/warc/CC-MAIN-20190324145706-20190324171706-00463.warc.gz | en | 0.937073 | 173 | 2.9375 | 3 |
Hinduism is considered the world’s oldest religion. With roots in the Vedic culture of ancient India, Hinduism is a complex religion with many variations and different schools of thought. However, several beliefs are shared by most Hindus, including the belief in one Supreme God, reincarnation and karma — the cosmic law of cause and effect.
Hindu funeral traditions
In Hinduism, death is considered a great departure. Hindu funeral traditions serve as both a celebration of life and a remembrance of the person who has passed away.
Shortly after someone passes away, it is the traditional Hindu custom to light a lamp at the deceased’s head. This symbolizes a light to guide the soul as loved ones gather around to pray. It’s not customary to touch the deceased, so Hindu families typically want to move their loved one to a funeral home as quickly as possible. At the funeral home, the body will be washed, sanitized and dressed in white.
Hindu cremation and Hindu mourning period
In Hinduism, it is thought that the body can impede the soul from moving on to the next journey. For this reason, funerals typically take place rather quickly. Ideally, the family will want to hold the funeral right away so the body can be cremated in order to liberate the soul.
In India, the cremation ritual takes place on a pyre. A member of the family lights the pyre to start the cremation process. Hindu cremation in the United States may be accommodated by allowing a family member to start the cremation process.
Hindu funeral services may be held in a funeral home chapel or sometimes at the crematory. These Hindu funeral ceremonies are typically conducted by a Hindu priest, and songs, chants and scripture readings may be part of the service. At the end of the service, guests file past the casket and leave a single flower to pay final respects. After the conclusion of the ceremony, the cremation will occur.
After the cremation, the family usually has a meal and offers prayers in their home. This is the beginning of a 13-day Hindu mourning period during which friends and loved ones will visit to offer condolences. Sometimes the Hindu mourning period includes another ceremonial memorial within the month after the deceased has passed away. This Hindu funeral ritual is meant to support the spirits of the dead on their journey to the next life. In some instances, it’s also used to provide the community with another opportunity to say goodbye. The timing of this memorial can be determined by the family and their Hindu faith tradition.
Planning a Hindu funeral ceremony
Dignity Memorial® professionals are equipped with the knowledge and experience necessary to help plan and facilitate a Hindu funeral and Hindu cremation ceremony. Our funeral homes offer cremation services, and many include a private a witness room where your family can gather to pay respects to the body before cremation.
Whether you need guidance honouring Hindu funeral traditions, planning a funeral in a short amount of time or finding a Hindu priest to lead the service, we can help. Find a location near you to get started today. | <urn:uuid:401c0930-a2ec-480b-88ba-97f6ed422464> | CC-MAIN-2019-26 | https://www.dignitymemorial.com/en-ca/support-friends-and-family/hindu-funeral-traditions | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999218.7/warc/CC-MAIN-20190620125520-20190620151520-00505.warc.gz | en | 0.955648 | 636 | 3.09375 | 3 |
Scientists have finally explained why the appearances of Uranus and Neptune are so different, despite having a lot in common between them.
According to RT, the mass of Uranus is about 15 times the mass of the Earth, while the mass of Neptune is 17 times, with almost identical atmospheric compositions of hydrogen (more than 80% each), helium and methane.
The new study, led by Professor Patrick Irwin at Oxford University, suggests the presence of a layer of haze on both planets, which explains the different colors of Uranus and Neptune.
The study suggests that both would appear almost equally blue if there was no fog in the atmosphere, and using observations from the Hubble Space Telescope, the NASA Infrared Telescope Facility and the Gemini North Telescope, an international team of scientists developed a model to describe the layers of aerosols in the atmospheres of both planets. .
Professor Irwin, lead author of the research paper, said: ‘This is the first model that synchronously fits observations of reflected sunlight from ultraviolet to near infrared.
He added, “He is also the first to explain the difference in visible color between Uranus and Neptune.” The model includes three layers of fog at different altitudes in the atmospheres of the two planets.
Scientists say that the middle layer of fog particles is thicker on Uranus than on Neptune, which affects the visible color of the two planets.
The study showed that embedded in the inner layers of the atmosphere, it consists of more haze than previously thought, rather than just icy clouds of methane and hydrogen sulfide.
The scientists said this is the first time that a study has taken into account wavelengths from ultraviolet to near infrared, rather than focusing on a handful of light waves.
Previously, scientists suggested that Neptune’s methane is what makes this planet so blue, as the gas absorbs a lot of red light and reflects blue colors. But scientists were at a loss to explain what was happening in Uranus, given that it contained more methane (2.3% of the mass of the atmosphere, compared to 1.9% in Neptune).
This discrepancy indicates that something else must be responsible for the color difference. But other major differences between the two planets revealed few clues to the mystery.
In fact, both planets have not been well studied, and each was visited by only one spacecraft, NASA’s Voyager 2 in the 1980s. Since then, scientists have relied on telescopic check-ins to spot these blue celestial objects.
The new study shows that on both planets, methane ice condenses on particles in the middle layer, forming a shower of methane ice that pulls fog particles deeper into the atmosphere.
Neptune has a more active and turbulent atmosphere than Uranus, which indicates that its atmosphere is more efficient in converting gas into a layer of fog where it can condense on the fog particles and produce this ice. This removes more haze and keeps the Neptune haze layer thinner.
Therefore, Neptune appears bluer, while excess haze accumulates on Uranus in the planet’s stagnant and sluggish atmosphere, giving it a lighter hue.
The study also showed a second, deeper layer in the model. And when it darkens, this could be why dark spots appear more occasionally on Neptune and more intermittently on Uranus, like the famous GDS-89 Great Dark Spot on Neptune, spotted by Voyager 2 in 1989. | <urn:uuid:cb5bf987-6773-4cc4-80ba-09cb9b5fcf19> | CC-MAIN-2023-14 | https://time.news/scientists-finally-determine-the-reason-for-the-blue-color-difference-in-uranus-and-neptune/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00230.warc.gz | en | 0.946898 | 692 | 3.578125 | 4 |
A world’s leading producer
The Australian minerals sector is in the top five producers of most of the world’s key minerals commodities. Mine production has been increasing steadily during the last decades and went up by 20% from 2002 to 2007.
Australia is the world’s leading producer of bauxite and alumina, ilmenite, rutile and zircon, synthetic rutile and tantalum. It is the second largest producer of gold, iron ore, lead, uranium, diamonds (by weight) and zinc; the third largest producer of silver and nickel; the fourth largest producer of black coal and manganese; and the fifth largest producer of aluminium, copper and lignite.
An overview of advanced minerals and energy projects (April 2007). Source: Minerals industry factsheet
Mining is a key contributor to Australian economy
In the 1900’s, mining contributed to 10% of the Gross Domestic Product (GDP) and was dominated by gold production with smaller contributions from copper, lead and coal. It declined at the end of the gold rush and began to increase again in the late-1960s.
Between 1961 and 1971, production of iron ore increased from 5 to 57 million tons while production of coal increased from 41 to 73 million tons.
Production of iron ore and coal continued to grow through the 1980s, principally driven by export demand. Today mining contributes about 5.6% of Australia's GDP.
Australia is the world's largest exporter of coal, aluminia, iron ore, lead, zinc and the second largest of uranium. About two thirds of exportations head towards Asian countries. In 2007, mineral resource exports contributed around 60% of Australia's total commodity trade. From 2002 to 2007, minerals industry exports have totalled over A$300 billion.
Most major Australian commodities can sustain current rates of mine production for many decades.
Australian mineral exploration is still growing: spending in 2007 rose by 41% to A$2061 million. This increase reflected strong growth in prices for many commodities on the back of anticipated strong and growing demand, particularly from China.
The environmental cost
All mining extraction obviously involves altering the natural environment in some way. Several aspects of mining affect the immediate environment while others have a more global effect such as contributing to greenhouse gases emissions.
Soil pollution and biodiversity
Firstly, the waste materials which are produced from the mine may flow into waterways or leach into soil, heavily polluting the ecosystem. Many tailings deposits are not built as engineered structures, but simply through piling up of tailings slurries. Depending on the nature of the mining operation and extractive processes, these tailings may contain acidic or caustic material, heavy metals or cyanide, generally rendering the land unsuitable for any other future land use. Mine pits may become contaminated due to acidic water, potentially carrying high levels of dissolved heavy metals, infiltrating the pit. They are likely to remain contaminated in the absence of extensive rehabilitation measures.
Secondly, mining activities can be a threat to biodiversity. The removal of both flora and fauna from the mine site leads to gaps in the food chain for those fauna remaining, as well as problems with succession of plants after the mining has ceased.
Landscape impact of mining at the Argyle Diamond Mine, Kimberley, Australia - Source
Environmental Impacts Statements and rehabilitation measures
To minimise the damage mining companies are now required to conduct Environmental Impact Statements (EIS) and look towards rehabilitation of the site.
An EIS is a report aimed at decision makers outlining the predicted environmental effects of a planned action or project. Any action which endangers the existence or would impede the recovery of a native species is considered to be undesirable.
Rehabilitation of a mined site is generally a multi-step process. First, extensive research has to be conducted prior to mining. Seeds need to be collected for replanting at a later stage. After the mining phase, the regrowing vegetation is removed and landscape is mechanically reshaped to contours similar to those before mining. Topsoil is often respread, treated with fertilisers and planted with a cover crop of graminaceous plants and endemic legumes. Once the topsoil is deemed stable, dominant native trees and shrubs can be planted at densities related to pre-mining densities.
If rehabilitation is successful, there will be little visual evidence that mining ever took place. However, a long natural development will always be required to ensure that abundance and richness of plant species fully resemble the unmined areas.
Greenhouse gas emissions per capita for selected industrialised countries,
measured in millions of tonnes of carbon dioxide equivalent.
Data source: Turton (2004) - Source: State of the environment
Mining contribution to greenhouse gas emissions
Australia contributes around 1.5% of global greenhouse gas emissions, but it is the greatest emitter in the industrial world on a per capita basis.
Although mines account for less than 0.02% of total area, the mining sector contributes around 8.40% to the total greenhouse emissions in Australia.
This figure is worse in the state of Western Australia where mining is a major economy contributor. In 2002, the mining and resources sector contributed around 17.5% to the total greenhouse emissions of the state. This is due to a number of new mines, mine expansions and the opening up of new offshore gas fields in the North West.
Most of the state's emissions (74% in 2004) came from the energy sector - which includes a large number of energy-intensive industries linked to the mining and resources sector, such as oil and gas, minerals, bauxite refining, and iron and steel production. Emissions from the energy sector increased by 58% between 1990 and 2005.
As a result of the anticipated continued growth in the sector, the total contribution of the Australian mining and resources sectors to greenhouse gas emissions is likely to rise in the next few years despite government policy to reduce greenhouse emissions.
Australia's Identified Mineral Resources 2008 (AIMR 2008)
Year Book Australia, 2005 - 100 years of change in Australian industry
Minerals industry factsheet , Australian Bureau of Agricultural and Resources Economics, 2007
National Land Use Summary Statistics 2001/2002
National inventory by economic sector (2006)
Australian mineral statistics (quarterly) June 08
State of the environment, Western Australia, report 2007
HSC CSU Earth and Environmental Science | <urn:uuid:f211bccf-bd54-4e8a-8425-86fc7129340e> | CC-MAIN-2018-51 | https://eo.belspo.be/en/mining-and-environment | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823618.14/warc/CC-MAIN-20181211104429-20181211125929-00459.warc.gz | en | 0.931161 | 1,323 | 3.171875 | 3 |
Innovations in microfluidic modelling of the human body have enabled medical researchers to study pathology to a level of accuracy and efficiency that was previously unattainable.
These ‘disease-on-chip’ models build on previous advances in organ-on-chip technology, creating devices that can model disease processes specific to each modelled organ. Notable disease-on-chip innovations include Kambez Benam and colleagues’ model of human lung inflammation, and the device mimicking arterial thrombosis created by Pedro Costa and collaborators at the Universities of Twente and Utrecht. The key advantage of disease-on-chip technology over conventional disease models is that it facilitates assays that are both physiologically relevant and high-throughput.
One particular area in which such advantages promise to have enduring and significant impact is cancer biology, thanks to pioneering work done in modelling cancerous disease processes. Metastasis-on-chip is one such advance.
The majority of cancer-related deaths are due not to the formation of a single tumour, but rather the metastatic spread of cancerous cells around the body. Nonetheless, the processes underlying metastasis are still not well understood, despite the volumes of money contributed to cancer research (the National Cancer Institute in Washington alone has an operational budget of just under $5.4 billion). One major problem that has contributed to these failings is the ineffectiveness of current models. In vitro models are too abstracted and oversimplified to be reliable; a change as simple as altering the substrate on which cells are grown can produce contradictory data. Dish-based models also fail to provide physiological relevance, as accurately recreating the tumour microenvironment in two dimensions is challenging. Three-dimensional in vitro models are more complex, using scaffolds or matrices to form structures that more accurately replicate tumour structure. These models still struggle to recreate important environmental factors, such as surrounding vasculature. In vivo studies, which most commonly use rodent models, solve some of these problems, but throw up issues of their own, being extremely expensive and laborious. They also, more importantly, have a poor record of translation to clinical trials (roughly 8% of studies translate successfully).
Microfluidic devices have shown a potential to overcome these widespread problems. As the field is in its infancy, there remains a heterogeneity in the devices used to study metastasis, but the device created by Hossein Eslami Amirabad and colleagues to examine tumour cell migration is a representative example of devices commonly used (see below).
This device consists of two blocks, one studded with chambers representing organ sites, and a second block with a microfluidic channel running through it, representing a blood vessel. A porous PDMS membrane is placed between these blocks to act as a culture substrate, and tumour cells are then co-cultured into one of the organ chambers, alongside cells native to the organ being modelled. The invasion of neighbouring organs through the bloodstream can then be observed by tracking the tumour cells’ progress from the top block to the bottom block, and then back into the top block in a separate chamber. A similar system, modelling colonic cancer metastasis to the liver, was developed by Alexander Skardal and colleagues. This system was constructed using a hyaluronic acid-based hydrogel system, which could not only demonstrate the migratory capabilities of the tumour cells but also proved highly dynamic, allowing both pharmacological and mechanical manipulation. This introduction of extra layers of complexity and the easy modulation of such systems means that microfluidic devices have immense potential in this field of research. Devices investigating this process in more detail, focussing on individual tumour interactions, have also been created. This means that metastasis can be examined to a degree of precision simply not possible without microfluidic innovation.
With such potential, one may ask what the next innovations in on-chip models will be. In a recent review, David Caballero and colleagues at the University of Minha suggest that integration with other technologies will allow the full benefits of microfluidics to be seen in tumour modelling. Integration of models with advanced imaging techniques, such as fluorescence or live-cell microscopy, could permit spatial and temporal modelling of tumours to a level of detail never before achieved. This integration has already shown potential in applications as broad as imaging vesicle trafficking and C. elegans larvae development. Microfluidics also will have a role to play in the emergence of personalised medical research. The genetic heterogeneity between metastatic tumours, even within a single patient, will require high-throughput but clinically relevant analysis techniques. Microfluidic pharmacological screening against these variable cancers will not only speed up care but will make the research process far more efficient and accurate.
Obstacles to achieving such lofty goals still remain. To make microfluidic devices more attractive as an alternative to current techniques, costs must be lowered, and links with existing technologies must be strengthened, with the aim of making microfluidics a technology that can be used across the healthcare industry, and that healthcare researchers actively seek out over more traditional and familiar techniques. Mohammed, Haswell, and Gibson argue in an excellent review of this area that innovators in microfluidic technology must consider the whole design and engineering process instead of simply the functionality of the end product. It is well and good to develop a device that allows superior tumour diagnostics, but if it is not cost-effective and not made will healthcare industry clients in mind, it will struggle to survive outside the lab of those who created it. Metastasis-on-chip technology, like many other medical microfluidic applications, has immense potential, but practicality and creativity are now required to realize that potential.
RJ is a science communicator and writer based in Glasgow, Scotland.
Enjoy this article? Don’t forget to share. | <urn:uuid:aeff5413-99e7-4d46-9f06-cb3a6adfab00> | CC-MAIN-2018-43 | http://circle.ufluidix.com/metastasis-on-chip-and-the-future-of-medical-microfluidics/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515564.94/warc/CC-MAIN-20181023002817-20181023024317-00233.warc.gz | en | 0.946018 | 1,223 | 3.09375 | 3 |
By Dr. Mercola
You probably don't think of noise in terms of colors, but there is a rainbow of noise out there — from the familiar white noise that occurs when a TV turns to static to the higher-pitched blue noise, which sounds similar to a hissing spray of water.1
Somewhere in the middle is pink noise, gentle sound similar to that of rushing water or wind blowing through leaves on a tree.
Pink noise contains frequencies from 20 hertz to 20,000 hertz, just like white noise, but the lower frequencies are louder and more powerful than the higher frequencies (white noise, in contrast, has equal power in all of its frequencies).2
However, pink noise has equal power per octave (a range of frequencies whose upper frequency limit is twice that of its lower frequency limit), which is why most people hear it as an even noise.3
To an untrained ear, pink noise may sound quite similar to white noise, but the former, it seems, may have particular promise for helping you sleep and improving other areas of human health, including that of your brain.
Pink Noise at Night May Help You Sleep Better and Improve Memory
Research published in Frontiers in Human Neuroscience revealed that listening to pink noise could improve sleep and memory among 60- to 84-year-olds, a population that tends to have reduced slow wave sleep, or deep sleep, compared to younger individuals.4 Slow wave sleep is also associated with memory consolidation.
While spending the night in a sleep lab, participants listened to pink noise one night and no noise the next. Notably, the pink noise was played in bursts to match the timing of participants' slow wave sleep.
Not only did the pink noise enhance slow wave sleep, it also was linked to better scores on memory tests. The participants scored about three times better on memory tests the morning after listening to pink noise in their sleep.5
Senior study author Dr. Phyllis Zee, professor of neurology at Northwestern University Feinberg School of Medicine, told Time, "The noise is fairly pleasant; it kind of resembles a rush of water … It's just noticeable enough that the brain realizes it's there, but not enough to disturb sleep."6
Does the Timing of Pink-Noise Exposure Matter?
Zee and her team are working on developing a device you can use to deliver pink noise at home, although there are many apps already available that claim to do so.
Zee said that the memory benefits, however, may depend on the pink noise enhancing slow wave sleep, which means the noise may need to be administered at appropriate times to be most effective.7 She said in a press release:8
"This is an innovative, simple and safe non-medication approach that may help improve brain health … This is a potential tool for enhancing memory in older populations and attenuating normal age-related memory decline."
Past research also found that steady pink noise helped to regulate brain waves and led to more stable sleep and improved sleep quality in adults, both during the night (a 23 percent improvement with pink noise) and during naps (a 45 percent improvement).9
Seventy-five percent of the study participants also said they experienced more restful sleep when exposed to pink noise.10
Sleeping Too Much or Too Little Linked to Higher Weight
Sleep influences far more than your energy level; it's intricately involved in virtually every aspect of your health, including your weight. Among people genetically predisposed to obesity, the amount you sleep may also make a difference.
A study published in The American Journal of Clinical Nutrition found that those who slept less than seven hours or more than nine hours a night weighed more, on average, than those who slept the recommended seven to nine hours.11
The short sleepers weighed about 4.5 pounds more while the long sleepers weighed nearly 9 pounds more than the normal sleepers.12
The association persisted regardless of diet, and it was also found that shift work and daytime napping was associated with higher weight among this population. Study co-author, research associate Carlos Celis-Morales, BHF Cardiovascular Research Centre at Glasgow, said:13
"It appears that people with high genetic risk for obesity need to take more care about lifestyle factors to maintain a healthy body weight. Our data suggest that sleep is another factor which needs to be considered, alongside diet and physical activity."
In this study, there was not as strong a link between sleep duration and weight among people with low genetic obesity risk; however, other studies have shown links between weight and sleep.
For instance, people who typically slept five hours or less a night showed a 32 percent gain in visceral fat (a dangerous type linked to heart disease and other chronic diseases) versus a 13 percent gain among those who slept six or seven hours per night, and a 22 percent increase among men and women who got at least eight hours of sleep each night.14
Night Owls May Eat Less Healthy Than Morning People
There are various reasons why sleep affects weight. Lack of sleep also decreases levels of the fat regulating hormone leptin while increasing the hunger hormone ghrelin. The resulting increase in hunger and appetite can easily lead to overeating and weight gain.
In addition, according to a study in the journal Sleep, later bedtimes correlate to greater weight gain even in healthy, non-obese people.15
Late-night snacking further increases that risk. In fact, avoiding food at least three hours prior to bedtime is one of my standard recommendations as it helps to make sure that your body is burning fat as its primary fuel which will keep you lean.
A recent study published in the journal Obesity further revealed that the types of foods chosen by morning and evening types of people differ, with night owls tending to eat less healthy, perhaps as a consequence of "living against their internal biological time."16
Specifically, on weekdays the night owls tended to choose breakfast foods that were higher in sugar and lower in fiber compared to those chosen by the morning types. In the evening, the night owls also tended to eat more sugar.
"On weekends, the differences were even greater," The New York Times reported. "Evening people ate significantly more sugar and fats, had more irregular mealtimes, and ate meals and snacks twice as often as morning people."17
Since "our society is pretty much structured to suit morning types better," the study's lead author Mirkka Maukonen of the Finnish National Institute for Health and Welfare told the Times, "awareness of one's own chronotype [when you are naturally predisposed to sleep and wake] may encourage paying more attention to overall healthier lifestyle choices."18
Sleeping More Than Nine Hours a Night Linked to Dementia
Your brain is also affected by how much you sleep, and research again shows that there appears to be a "Goldilocks" zone that's best — neither too much nor too little.
Those who sleep for more than nine hours a night consistently, for instance, had a six-fold greater risk of developing dementia in the next 10 years compared to those who slept less.19
Long sleep duration was also associated with smaller brain volume and poorer executive function, which suggests prolonged sleep duration may be a marker of early neurodegeneration, the researchers said. Too little sleep has also been linked to dementia.20 As Newsweek reported:21
"Missing out on deep non-REM (rapid eye movement) sleep may allow proteins linked to dementia to have easier access to the brain.
Beta-amyloid, a protein suspected of triggering Alzheimer's, aggregates in higher concentrations in the brains of those who chronically suffer from poor sleep. As beta-amyloid accumulates, the protein further inhibits the ability to sleep, which feeds into a terrible cycle linked to dementia."
The Link Between Sleep and Mental Health
Episodes of insomnia may also be predictive of mental illness, while addressing sleep problems may support mental health. Russell Foster, professor of circadian neuroscience at the University of Oxford, wrote in Epoch Times:22
"To date a surprisingly large number of genes have been identified that play an important role in both sleep disruption and mental illness. And if the mental illness is not causing disruption in sleep and circadian rhythm, then sleep disruption may actually occur just before an episode of mental illness under some circumstances.
Sleep abnormalities have indeed been identified in individuals prior to mental illness. For example, we know that sleep disruption usually happens before an episode of depression. Furthermore, individuals identified as 'at risk' of developing bipolar disorder and childhood-onset schizophrenia typically show problems with sleep before any clinical diagnosis of illness."
In the case of schizophrenia, for instance, up to 80 percent of those affected have sleep disturbances such as insomnia.23 Separate research found that 87 percent of depression patients who resolved their insomnia had major improvements to their depression, with symptoms disappearing after eight weeks whether the person took an antidepressant or a placebo pill.24
Interestingly, exposure to dim light at night, which can also interfere with your sleep, has also been linked to depression. The link could be due to the production of the hormone melatonin, which is interrupted when you're exposed to light at night.
There are many studies that suggest melatonin levels (and by proxy light exposures) control mood-related symptoms, such as those associated with depression. For instance, one study about melatonin and circadian phase misalignment (in which you are "out of phase" with natural sleeping times) found a correlation between circadian misalignment and severity of depression symptoms.25
Does Daylight Saving Time Affect Your Health?
Daylight Saving Time (DST), the practice of moving clocks ahead one hour in the summer months and returning them back an hour in the winter, may not seem like a big deal in the scheme of things, but it's enough of a shift to throw off your body's sensitive circadian rhythm. As such, there are consequences to both health and productivity.
One study found that the shift to DST results in a "dramatic increase in cyberloafing behavior," or the tendency to waste time surfing the web while at work.26 This drop in productivity was linked to lost sleep (quality and quantity wise) the night before.27 Night owls also fared worse following the DST switch, feeling more fatigued during the day for up to three weeks compared to those who went to sleep earlier.28
Your heart health may also suffer. One 2012 study found that heart attacks increased by 10 percent on the Monday and Tuesday following the time change to DST.29 Heart attacks decreased by 10 percent on the first Monday and Tuesday after clocks are switched back in the fall. Other consequences include an increase in workplace accidents and injuries, increases in traffic accidents and a compromising effect on immune function.
While some studies have suggested a slight benefit to the extra hour of daylight for people suffering from seasonal affective disorder (SAD), as well as the potential to burn more calories during exercise (because it stays light outside later),30 it's likely not enough to compensate for the negative effects.
Pink Noise and Other Tips for Improving Your Sleep
Taking steps to improve your sleep quality is crucial for optimal health. Adding soothing noise to your bedroom, such as pink noise, soothing music, nature sounds, white noise or a fan, is one simple tip that helps many people sleep better.
If you're having trouble sleeping, I also suggest reading my Guide to a Good Night's Sleep for 33 tips on improving your sleep. Getting back to the basics of improving your sleeping environment is important. No. 1 on my list? Avoid exposure to blue light, including LEDs, after sunset. Wearing blue-blocking glasses is a simple way to achieve this. Further:
✓ Avoid watching TV or using your computer/smartphone or tablet in the evening, at least an hour or so before going to bed.
✓ Make sure you get BRIGHT sun exposure regularly. Your pineal gland produces melatonin roughly in approximation to the contrast of bright sun exposure in the day and complete darkness at night. If you are in darkness all day long, it can't appreciate the difference and will not optimize your melatonin production.
✓ Get some sun in the morning. Your circadian system needs bright light to reset itself. Ten to 15 minutes of morning sunlight will send a strong message to your internal clock that day has arrived, making it less likely to be confused by weaker light signals during the night.
✓ Sleep in complete darkness, or as close to it as possible. Even the tiniest glow from your clock radio could be interfering with your sleep, so cover your clock radio up at night or get rid of it altogether. Move all electrical devices at least 3 feet away from your bed. You may want to cover your windows with drapes or blackout shades, or wear an eye mask when you sleep.
✓ Install a low-wattage yellow, orange or red light bulb if you need a source of light for navigation at night. Light in these bandwidths does not shut down melatonin production in the way that white and blue bandwidth light does. Salt lamps are handy for this purpose, as are natural, non-toxic candles.
✓ Keep the temperature in your bedroom no higher than 70 degrees F. Many people keep their homes too warm (particularly their upstairs bedrooms). Studies show that the optimal room temperature for sleep is between 60 to 68 degrees F.
✓ Take a hot bath 90 to 120 minutes before bedtime. This increases your core body temperature, and when you get out of the bath it abruptly drops, signaling your body that you are ready to sleep.
✓ Avoid using loud alarm clocks. Being jolted awake each morning can be very stressful. If you are regularly getting enough sleep, you might not even need an alarm, as you'll wake up naturally.
✓ Be mindful of electromagnetic fields (EMFs) in your bedroom. EMFs can disrupt your pineal gland and its melatonin production, and may have other negative biological effects as well.
A gauss meter is required if you want to measure EMF levels in various areas of your home. If possible, install a kill switch to turn off all electricity to your bedroom. If you need a clock, use a battery-operated one. | <urn:uuid:85c51940-d19f-48c9-9b74-d9ae03d8b3ad> | CC-MAIN-2018-22 | https://articles.mercola.com/sites/articles/archive/2017/03/23/amp/pink-noise-improves-sleep.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868316.29/warc/CC-MAIN-20180527131037-20180527151037-00023.warc.gz | en | 0.952381 | 2,948 | 2.96875 | 3 |
Unsustainable palm oil is bad news. Approximately every hour, the equivalent to 300 football fields is cleared to make way for palm oil plantations and, in the last decade, orangutan populations decreased by 50% due to habitat loss due in part to the construction of palm oil plantations.
Palm oil is an increasingly popular ingredient but it comes at an enormous cost, not just to the environment but also to humans. The U.S. Department of Labor ranks the palm oil industry as one of the top four worst industries for forced child labor.
So how do we avoid palm oil when it sneaks its way into so many products? Knowing which products certainly helps and ultimately, checking the ingredients label will give you all the information you need.
Here are 10 surprising products that may contain palm oil.
Sweets are often blamed for containing palm oil, but did you know that laundry soap also contains palm oil? Palm oil can be refined to make some soaps and other cleaning products.
Why on Earth would palm oil end up in lipstick? It turns out, palm oil holds color well and won’t melt at higher temperatures, making it ideal for lipstick. Plus it has no taste!
This is an awesome guide for picking out palm oil-free lipstick
Picking up a fresh or frozen premade pizza from the store? Check the ingredients. Palm oil sometimes sneaks into the dough. Palm oil is used to enhance the dough’s texture and prevent sticking.
The best way to avoid palm oil in your pizza dough is to make the dough yourself! This is a good recipe.
Palm oil is now a common ingredient in store-bought bread because it is a solid at room temperature. It’s also cheap and easy to bake with.
If you want to eat a lot of palm oil, grab yourself some instant noodles. Palm oil can be up to 20% of the total weight of a package of instant noodles! Yuck.
King Soba instant noodles are a good option when looking for a palm oil-free instant noodle. They’re also gluten-free, wheat-free, and USDA certified organic.
How green biodiesel is is probably debatable, but when it’s made from palm oil, there is no debate! Palm oil can be made into biodiesel and other biofuels.
Bans on trans fats have made palm oil an attractive choice for makers of margarine. Palm oil contains no trans fats and remains solid at room temperature.
The best and most widely-available alternative to palm oil-laden margarine is to simply use butter instead. Extra points if you can find local, organic butter.
Like laundry soap, palm oil sneaks its way into your shopping cart through your shampoo. Palm oil is great for restoring the natural oils in your hair, but it’s terrible for the environment.
This is an awesome guide to finding the right palm oil-free shampoo.
Many vegans look to products that avoid animal products in an effort to be more ethical and avoid causing harm to the environment. Unfortunately, some vegan cheese contain palm oil. Before you buy, check the label to ensure that palm oil is not an ingredient.
Palm oil sometimes disguises itself as ‘vegetable oil’ when listed on chip ingredients. Sadly, most chips use palm oil. Your best bet for avoiding palm oil in your chips is by finding brands that use other oils, like sunflower, olive, or coconut oil.
Identifying palm oil on ingredients lists
Looking at a product’s label is one of the best ways to avoid purchasing a product that contains palm oil, but it can be difficult to identify what products contain palm oil because manufacturers of these products often intentionally do not clearly label their products. Palm oil operates under the following names:
- Vegetable oil
- Vegetable fat
- Palm kernel
- Palm kernel oil
- Palm fruit oil
- Stearic acid
- Palmitoyl oxostearamide
- Palmitoyl Tetrapeptide-3
- Sodium laureth sulfate
- Sodium lauryl sulfate
- Sodium kernelate
- Sodium palm kernelate
- Sodium luryl lacylate/sulphate
- Hydrated palm glycerides
- Etyl palmitate
- Octyl palmitate
- Palmityl alcohol | <urn:uuid:2ae0878e-963c-46da-a387-da835920f616> | CC-MAIN-2021-31 | https://blog.tentree.com/10-surprising-products-that-contain-palm-oil/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154099.21/warc/CC-MAIN-20210731172305-20210731202305-00636.warc.gz | en | 0.926084 | 908 | 2.515625 | 3 |
Hepatitis: What Is It?
Hepatitis is the term used to describe a nonspecific inflammation of the liver. The causes of hepatitis can be many, such as viral, parasitic, infiltrative, drug or alcohol induced, or non-specific. The initial clinical presentation of the acute phase of hepatitis may range from asymptomatic (without any noticeable signs) to severe fatigue, jaundice (yellow looking eyes or skin), nausea, vomiting, or diarrhea.
All patients whose laboratory values are monitored will have increases in their liver enzymes. This article will provide information about the pathophysiology, specific causes and treatments that are available both commercially or in current clinical trials for viral hepatitis A, B, and C, and drug/alcohol induced hepatitis.
So what is the liver and what does it do?
The liver is located in the right upper section of your abdomen, underneath your ribs. When the liver is enlarged (hepatomeglia) it can protrude below the rib cage and be tender to touch. The liver plays an important role as a detoxifier, by processing potentially harmful agents into chemicals that are safe for the body. The liver is also responsible for glucose metabolism, which is a source for energy, that our cells need (including the brain) to sustain life. Another function of the liver is to help control a portion of the pathway to allow our blood to clot when it needs to. The liver is considered to be part of the digestive system and controls the secretion of bile, an important enzyme that breaks down fats and starches from the foods that we eat.
What is hepatitis?
Hepatitis is a non-specific term that is used to describe an inflammation of the liver. It can be diagnosed after blood is obtained and shows an elevation in liver enzymes (also referred to as ALT and AST). Normal values for liver enzymes may vary from laboratory to laboratory.
Hepatitis A (HAV) is transmitted through oral-fecal contact. Acute HAV usually has an acute phase that lasts from 4-6 weeks with or without jaundice, fatigue and hepatomeglia. During this acute phase, individuals with a co-infection of human deficiency syndrome (HIV) may have a considerable drop in T-cell counts that will rebound in 6-12 weeks after acute infection. HAV is generally cleared from the body after 6 weeks. It may take months to recover from acute HAV.
Treatment for HAV is usually supportive care with rest, discontinuation of drug therapy until the acute phase is completed, at which time therapies may be restarted. Drinking plenty of water, bed rest and good nutrition are all essential for a complete recovery.
During the last year, a vaccination for HAV has become available and can be considered as preventive therapy in those patients with chronic terminal infections such as HIV infection. This may prevent potential infections for those individuals who may be immuno-compromised. Some insurance companies, health care facilities or studies may offer the vaccination free of cost to patients. Check with your health care provider.
Hepatitis B virus (HBV) infection remains a considerable health problem worldwide and a significant cause of liver disease and liver cancer in humans. HBV is readily transmitted via parenteral (sharing needles or a blood transfusion) and sexual routes, and as such, it commonly found in individuals who are coinfected with HIV. For the patient with HIV infection, a frequent outcome of HBV is becoming a chronic carrier. Chronic HBV occurs after an acute infection. Approximately 20% of the patients are unable to clear the virus. The infection may continue to develop an enlarged liver, liver failure and/or primary liver cancer.
Certain population groups are considered to be at high risk of HBV infection, including Native Alaskans, Pacific Islanders and infants born to women who are first generation immigrants from regions where HBV is very common. The risk for acquiring HBV through sexual contact is highest among homosexual men, those with multiple sexual partners and years of sexual activity. Unprotected heterosexual contact has also been linked to HBV transmission.
All blood and body fluids are considered to be potentially infectious. In infected patients, HBV particles have been found in saliva, semen and cervical secretions. Common modes of transmission include: accidental puncture of the skin with an infected needle, blood splashed in the eye or sharing of un-sterilized needles. Other modes include exposure to instruments while receiving tattoos, ear piercing or acupuncture as well as sharing razors or toothbrushes. It is believed that insects may also serve as vectors by either biting or contaminating food.
Hepatitis B can be found in any age group. The normal incubation period is 28 - 160 days. Patients may present with insidious symptoms such as, joint pain, rash, nausea, vomiting and less commonly jaundice.
Suppressive therapy for HBV becomes extremely important to prevent progression to cirrhosis, deterioration of the liver, liver cancer. Little data is available about HIV-infected patients with chronic HBV.
Data from several studies suggests that 3TC (Epivir) shows promise as an effective treatment for chronic HBV. Most of the data that is available addressing chronic HBV response with 3TC has been done in HIV negative patients. Little data is available in patients who are co-infected with human immunodeficiency virus (HIV) and chronic HBV.
Several reports have found early resistance to 3TC in non-HIV infected patients. Data from a study done on immunocompromised adults with chronic HBV showed a high incident of 3TC resistance. This may have implications for the concept of long-term virus-suppressive therapy of chronic HBV using 3TC monotherapy. Adefovir has shown activity against HBV in clinical trials.
Little data is available about hepatitis C. It has only been in the last several years that we could test for the presence of HCV through the use of PCR RNA testing. Many patients do not have the antibodies present to test positive on a HCV antibody testing and must be diagnosed by PCR. The route of transmission is still unclear. Several researchers believe it may be transmitted through blood exposure during recreational drug use. A co-infection in an HIV-infected patient with both HCV and HBV increases illness and/or death.
Several studies have evaluated the use of alpha interferon subcutaneously without a significant improvement in the patients disease status. However, a new clinical trial using alpha interferon and ribaviron is showing promise, but the results are still not known.
Hepatitis can be a direct result of taking drugs that may be required to treat another illness. Prompt evaluation of an increase in liver enzymes can lead to a diagnosis. Once diagnosed, further evaluation, discontinuation of the offending drug and close follow-up can be conducted.
Prevention is still the best intervention. Condom use during sexual encounters will help to decrease the risk of hepatitis B and has been shown to be effective. Thorough handwashing is an important first line prevention to protect transmission of most viruses. Little information is available about other causes of hepatitis. Studies need to be done to evaluate effective treatment for those individuals who are already infected with chronic disease.
What should I do?
1) When you have sex use a condom (male or female should protect you).
2) Wash your hands frequently.
3) Have regular visits to you health care practitioner to discuss safe sex, symptoms of hepatitis and have regular check ups.
Rostaing, L Henry S, Cisterne J-M, Duffaut M, et al. Efficacy and safety of lamivudine on replication of recurrent hepatitis B after cadaveric renal transplantation. Transplantation. Vol. 64. No11, Dec.15, 1997.
Honkoop P, Niesters H. De Man R. , et al. Lamivudine resistance in immunocompetent chronic hepatitis B. Journal of Hepatology. '97; 26: 1393-1395.
Back to the Women Alive Summer 1999 Contents Page.
This article was provided by Women Alive. It is a part of the publication Women Alive Newsletter. | <urn:uuid:f222c5e4-99c6-4b9a-a8d2-0686be32a9a0> | CC-MAIN-2015-40 | http://www.thebody.com/content/art132.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737898933.47/warc/CC-MAIN-20151001221818-00169-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.929509 | 1,709 | 3.859375 | 4 |
There are many ways that the socioeconomic status and education level of parents relates to the cognitive outcomes of their children, and an achievement gap could be seen when schools return to face-to-face learning because of it, according to Pamela Davis-Kean, professor of psychology at the College of Literature, Science, and the Arts, and a research professor at the Institute for Social Research.
In this episode of Michigan Minds, Davis-Kean explains that with schools closed, it falls to parents to provide learning opportunities for their children, but many families are unequipped to do so.
“The achievement gap is defined by socioeconomic differences, and often presents itself in homework,” Davis-Kean says. “Higher-educated parents provide a more enriched learning environment for their children and are more connected to resources. Some people have set times for their kids to do schoolwork. Other kids don’t have that,” she says, adding that since some parents have jobs where they are considered “essential workers,” they may not be home and therefore not available.
Davis-Kean says there is a well-known phenomenon called the “summer achievement gap,” in which children who participate in cognitively stimulating camps or similar activities over the summer have an easier time adjusting back to school in the fall than those who aren’t involved in those types of activities.
Read the full article and listen to the interview at U-M Public Engagement and Impact. | <urn:uuid:6d508975-2ca1-4fde-ae85-b7469d5fa61e> | CC-MAIN-2024-10 | https://prod.lsa.umich.edu/psych/news-events/all-news/faculty-news/how-covid-19-is-impacting-the-student-achievement-gap.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00530.warc.gz | en | 0.969716 | 307 | 3.484375 | 3 |
Necessity breeds invention, which is why the U.S. military has historically been a leader in logistics innovations. That tradition continues today, as the deployment of new transport technology in Afghanistan clearly demonstrates.
After stateside tests late in 2011, the U.S. Marine Corps deployed two unmanned K-Max helicopters to Afghanistan, the first unmanned helicopters to deliver cargo and resupply troops in a combat zone. In one four-month stretch, the two helicopters—jointly developed by Lockheed Martin and Kaman Aerospace—delivered more than 1 million pounds of supplies in support of the U.S. Marines in Afghanistan. They will remain in theater until September 2012.
Marine Corps Maj. Kyle O'Connor, who is overseeing the deployment, would like to put more of the unmanned craft into service. "We are moving cargo without putting any Marines, soldiers, or airmen at risk. If we had a fleet of these things flying 24-7, we could move cargo around and not put people in jeopardy," he said in a Lockheed Martin press release.
The helicopter initiative has been on the military's radar for several years. (See "Military tests unmanned helicopters to reduce supply risks," DC VELOCITY, October 2010.) In 2011, the U.S. Army awarded the Lockheed Martin-Kaman Aerospace team a $47 million contract to develop, demonstrate, and deliver technologies for unmanned air systems in support of in-theater unmanned cargo resupply missions. | <urn:uuid:82f45e61-a48e-41a9-8dd7-dfa5dc52ce04> | CC-MAIN-2020-34 | https://www.dcvelocity.com/articles/26010-cargo-carrying-robocopters-earn-their-stripes | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738425.43/warc/CC-MAIN-20200809043422-20200809073422-00305.warc.gz | en | 0.955023 | 304 | 2.515625 | 3 |
Bremerhaven Airport at Luneort
Local aviation history dates back to the early days of flying. In the park of Speckenbüttel (northern part of Bremerhaven), a plane took off in 1910 and some demonstration flights were organized. A real airfield was opened at Speckenbüttel on May 1st 1926. In the same year, construction work on an airfield in Weddewarden commenced and one year later Lufthansa used it as a base. From there, sea-planes flew to the island of Heligoland. In addition, a service between Hamburg and Bremerhaven and the islands of Wangerooge, Norderney and Borkum was provided by Junkers aircraft. The airfield was extended in 1935 and used by the German Air Force after 1936. The famous airship GRAF ZEPPELIN also flew over Bremerhaven, as depicted in some old photos.
After World War II, modest air sport made a new start. An airclub was founded on 12th October 1952. Gliders first took off from Luneort airfield in 1956. Another airclub was founded for motor plane pilots in 1957. In this way Luneort could be licensed for motor planes in 1959 and for helicopters in 1964. A company to run the airport was founded on June 15th 1964. A commercial airline (OLT) began serving Luneort in 1965. Finally, the former airfield developed into a regional airport. Construction works began in September 1991. A new 920-metre-runway went into operation in October 1992, a new tower and a service building started in August 1994. The new regional airport officially went into service on July 21st 1995.
Further construction work continued until 2002. The runway was extended to 1200 metres, operation was now possible round-the-clock, so night take-offs and landings could take place with instrument assistance.
Some firms such as OLT airline set up in the vicinity of the airport, as well as an aerial photography and survey service and (since December 1996) a repair yard for airplanes. Scientific work also benefits from Bremerhaven airport. The two polar airplanes POLAR 2 and POLAR 4 (type Do 228) of the Alfred Wegener-Institute for Polar and Ocean Research (AWI) are based at Luneort.
The airfield Bremerhaven is a German trafficland place in Bremerhaven, which was closed. It is located in the district of the Fishery Harbor on a small island in the south of the town between the port in the east, the lune in the west and southwest as well as the river Weser in the north.
First of all, the Airport served individual traffic. The OFD Bremerhaven combined with Heligoland in the demand traffic after fixed times, ie linear flight.
In addition, the Alfred Wegener Institute used the Airport as a home base for its Polar Airplane POLAR 5 of the Basler BT-67 type.
Instrumental air traffic (IFR) at the Airport was discontinued on 30 November 2015 (see NfL 1-605-15). Until February 29, 2016 restricted VFR operation was still possible; Since 1 March 2016 the place has been closed. | <urn:uuid:3678ea5a-1a76-4cf3-be43-baaa8a419afe> | CC-MAIN-2019-26 | https://www.bremerhaven.de/en/tourism/architecture-monuments/city-history/fishery-harbors/bremerhaven-airport-at-luneort.56623.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999273.79/warc/CC-MAIN-20190620210153-20190620232153-00507.warc.gz | en | 0.972583 | 677 | 2.640625 | 3 |
Inadequate infant feeding practices are determined by economic, cultural, social, and educational factors. Cruz et al. reported that some women, when they are expecting a new product, suspended BF of the previous son because they considered that their milk could be a poison this child; another study found that some mothers associated BF with diarrhea and weight loss in children. As in other publications, the women in the present study stop breastfeeding because they considered that milk production was insufficient for the baby (Zaragoza Cortes et al., 2019).
The introduction of solid foods at three months of age coincides with other studies (Lindsay et al., 2008; Mennella et al., 2005; Zaragoza Cortes et al., 2019). The criterion of indigenous mothers for the early introduction of complementary foods agrees with other studies where women started complementary feeding when the child showed interest in the food that someone eats. Heinig et al. reported that women with Mexican-American children responded to feeling about the moment to introduce new foods (Heinig et al., 2006; Heinig et al., 2009). Studies in the Latino population mention that mothers introduce foods other than milk when they perceive that the supply of breast milk is insufficient and children lose weight (Sacco et al., 2006) (Lindsay et al., 2008). The present work shows that some health professionals, especially doctors, indicated complementary feeding before three months.
With respect to the preparation of complementary foods, indigenous women preferred hot or crushed preparations, which differs with other studies where thick preparations are preferred due that represent more food, and so a greater caloric intake (Zaragoza Cortes et al., 2019). Although it is recommended not to season foods at this stage (Alvisi et al., 2015; Romero-Velarde et al., 2016), most of the indigenous women added salt or sugar to the children's food, considering that it improved the taste, and therefore the acceptance. In addition, indigenous mothers offered high-sugar commercial foods such as soft drinks and yogur to drink, as well as Hispanic women in other countries who provide their children with more sugary foods compared to other ethnic groups (Mennella et al., 2006). This study has some limitations, first of all the complexity of data collection due to the lack of standardized and validated instruments, coupled with language difficulties.
In conclusion, although the indigenous women had received nutritional guidance, it did not induce a correct infant feeding. This study suggests developing programs focused on indigenous Mexican populations to improve the nutritional status of children; Government interventions for minorities that respect cultural diversity, making proper use of available resources and food. | <urn:uuid:a8740fb7-8bfd-4e27-a96c-7b5b668a6cf3> | CC-MAIN-2024-10 | https://www.researchsquare.com/article/rs-914085/v1 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00871.warc.gz | en | 0.944912 | 531 | 3.40625 | 3 |
High blood pressure, also known as hypertension, is commonly found in men and women after 60. Since it is a chronic disease, it cannot be cured entirely, but various measures can control it. Most people rely entirely on blood pressure medications and neglect their daily habits and lifestyle. Blood pressure can be controlled in a much more efficient way when medication is accompanied by regular exercise, a nutritionally sound diet, and other essential habits.
This write-up will help you develop a greater understanding of blood pressure and how it can be controlled. Here’s a carefully curated list of some of the best ways of controlling high blood pressure.
One of the most important and impactful lifestyle changes that can lower your blood pressure is weight loss. Being overweight gives rise to several breathing issues while sleeping, which increases blood pressure and may also result in heart ailments. There is a direct relationship between weight loss and lowering blood pressure. You will be able to see a practical difference after losing just a couple of pounds. Studies have shown that you can lower your blood pressure by 1 mm hg by losing 1 kg.
Along with shredding weight, keep a check on your waistline; extra weight around the stomach raises your blood pressure. Check with a doctor to know the right waistline measurement as per your age, gender, and physique.
Exercising 4-5 times a week for at least 30 minutes can help lowering blood pressure by 5 to 8 mm Hg. Incorporating cardio workouts in your routine will improve the cardiovascular system’s overall functioning, ensuring healthy blood flow in all parts of the body. Aerobic exercises like cycling, walking, jogging, or swimming can significantly affect your blood pressure level.
Exercise can also be done in dance and Zumba as it will increase your activity level and keep you from getting bored. When you exercise regularly, your heart rate increases, making the heart stronger and pumping effortlessly over time. This reduces the pressure on the arteries and lowers blood pressure.
Ensure a Healthy Diet
It has been said that your body is what you eat. Your diet plays a significant role in controlling blood pressure. Incorporating whole grains, fruits, and vegetables in your diet and ditching high cholesterol and fatty food can lower your blood pressure by 11 mm hg. Such a dietary plan is known as the DASH diet; DASH stands for Dietary Approaches to Stop hypertension. Cut down on processed food consumption as they are high in salt, sugar, fat, and other preservatives. Sometimes we see packaged food labeled as “low fat,” and we end up adding it to the cart.
We fail to realize that such food is high in sugar and salt, which is harmful to your health. Therefore, cut down on processed food and increase vitamins, minerals, and other nutrients.
Less Sodium and More Potassium
The above-mentioned DASH diet emphasizes the lower consumption of salt. This is because salt is basically sodium, and when you consume too much salt, your body requires more water content to wash off the salt. Such a condition often increases blood pressure as the exceeding amount of water puts the heart and blood vessels under pressure. Therefore, people with elevated blood pressure are advised to reduce salt from their diet.
On the contrary, potassium is considered to be an excellent element as it lowers the effect of salt, keeps your vessels free from pressure, and your heart healthy. Food items like yogurt, fish, banana, avocado, sweet potato and spinach are rich in potassium. It is better to consume this mineral in the form of fruits and vegetables rather than supplements.
Put an End to Smoking
There is no surprise in the fact that people who do not smoke live longer and healthier. But the negative impact of smoking is relatively more remarkable in people with elevated blood pressure. Smoking a cigarette increases your blood pressure instantly, but for a short period. However, it leaves a long-lasting impact on the heart and lungs. The chemical content in tobacco damages the blood vessels narrows down the arteries, and causes inflammation.
Such an adverse effect increases the heart’s pressure and, ultimately, results in high blood pressure. Besides, when you smoke, it does not just affect your health but also that of others in the surrounding. A survey has shown that children who grow up in a house with a smoking parent(s) have a higher blood pressure than other children. Quit smoking to ensure the health of yourself and others.
Cut Down on Caffeine and Alcohol
People who are habitual to caffeine may show a relatively lower effect on blood pressure, but those newly introduced to caffeine may increase their blood pressure by 11 mm hg. To check its effect, measure your blood pressure after consuming caffeine, and if it increases by 5 to 10 mg hg, you may be sensitive to caffeine and consider getting rid of it or at least controlling its intake.
Along with caffeine, alcohol brings up your blood pressure, and its overall impact on health is undoubtedly harmful. Just 1 gram of alcohol can raise your blood pressure by 1 mm hg, and on average, a drink contains nearly 14 grams of alcohol; the math is simple. Consuming more than a modest amount of alcohol adds to your blood pressure and reduces medications’ effect.
Stress is almost inevitable sometimes, especially in current times, considering the current pandemic. However, it is essential to manage your stress level by taking active measures. A high-stress level can directly increase blood pressure, or sometimes it may lead to smoking and drinking, which, again, negatively impacts your blood pressure level. To reduce stress:
- Practice various breathing exercises and accompany it with meditation for better relaxation.
- Stay away from stress triggers and ensure a happy and positive vibe in your house and workplace.
- Do not worry about things that you cannot change or control and adjust your expectations to avoid unnecessary stressors.
- Devote your time and energy to activities that make you feel happy and free of stress.
Generally, your blood pressure drops while sleeping. Not sleeping well or sleeping long enough can have an adverse effect on your blood pressure and overall health. Encountering sleep deprivation often increases blood pressure and is at a higher risk of heart disease. The Sleep Heart Health Study has shown that people who sleep for less than seven hours or more than nine hours regularly are prone to hypertension for an extended period.
Getting a restful, eight hours long sleep will ensure a controlled blood pressure level as well as a healthy heart. If you find it difficult to fall asleep at night, avoid naps in the daytime and exercise for at least 30 minutes as it will make you feel tired and, thus, fall asleep quickly and easily.
Try out Medicinal Herbs
Several cultures make use of medicinal herbs to treat several diseases. To control the level of blood pressure, certain herbs have been found to have a positive impact. Some of these herbs are black beans, celery juice, ginger root, umbrella tree bark, Indian Plantago, river lily, sesame oil, tomato extract, maritime pine bark roselle. Trying out these herbs may help relax the body, reduce blood pressure levels, and improve your overall health. However, make sure that before you consume any such herbs, check with your doctor because it may so happen that these herbs can interfere with your medication.
Now that we know about some of the best ways to tackle high blood pressure let us look at the following list of food items known for their high blood pressure relieving properties.
- Citrus fruits (lemon, orange, grapefruit, etc.)
- Fatty fish
- Pumpkin seeds
- Dark chocolate
- Green leafy vegetables
- Berries (blueberry, raspberry, strawberry)
- Greek yogurt
- Chia seeds, flax seeds
- Beet juice, beet greens
Supporting your blood pressure with a healthy lifestyle will significantly improve your blood pressure level. Along with the measures to lower blood pressure, it is equally important to know which components increase blood pressure to make the necessary changes and alterations in your daily life. Your blood pressure should always be kept in check and under control. Otherwise, it may result in heart ailments such as heart attack, chest pain, Coronary artery disease (CAD), etc.
Controlling your blood pressure will keep your heart healthy, which will, in turn, keep the entire body healthy. Ensure that you exercise regularly, lose weight if you are overweight, eat healthy and nutritious food, cut down on alcohol, caffeine, sodium, quit smoking, and sleep well. Considering these aspects of your lifestyle will bring about practical results and help you develop a positive relationship with your body. | <urn:uuid:4b10e573-26c2-49e4-b8c8-712ada46a5b4> | CC-MAIN-2021-17 | https://aginghealthytoday.com/2020/11/29/best-ways-to-lower-blood-pressure/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039536858.83/warc/CC-MAIN-20210421100029-20210421130029-00057.warc.gz | en | 0.934891 | 1,770 | 2.78125 | 3 |
constant rate compensated-clogging filter - videoReading time:
At the same time, the aim is to ensure that the water level over the filters remains fixed or only fluctuates slightly and that the filtered water delivered 2 to 3 metres lower maintains a flow rate that is constant and equal to the total incoming flow rate, divided by the number of filters.
A filter rate controller mounted on each filter’s outlet, maintains a constant flow rate, regardless of the filter’s level of fouling, whether this filter rate controller is a flow rate controller or a level controller; the system includes an equal distribution mechanism. This device generates a secondary head loss that becomes significant when the filter is clean and which is cancelled out when the filter is completely fouled; in this way, the filter rate controller compensates for filter bed fouling.
Compared with constant rate variable head filters, constant rate compensated-clogging filters have the advantage of a stable treated water quality and of reliable operation, even in cases involving sudden flow rates fluctuation .
filter battery control
In general, two types of control are used: control with flow rate measurement and control in association with the maintenance of a constant level.
control with flow rate measurement
Each filter is equipped with a flowmeter and with a flow regulation device (butterfly valve, air plug valve, siphon) installed on the filtered water outlet. A filter rate controller receives a signal from the flowmeter and actuates the regulating unit which adjusts the output to a set point value.
The inevitable discrepancies between the sum of filter set point flow rates and the overall flow rate applicable to battery will be seen as changes in the water level over the filters. Therefore, additional control will be required to adjust this level by altering individual flow rate set points based on the level measured upstream from the battery (when the flow rate imposed is the incoming flow rate) supplemented by a downstream level measurement (when the flow rate imposed is the outlet flow rate).
In both cases, changes in water sheet level in the channel and in the filters can be as high as 30 cm.
control with constant level maintenance
A constant flow rate can also be obtained from each filter through constant level. In this case, start by evenly distributing the entire flow between the filters whose outlet unit is controlled by the upstream or, if necessary, downstream constant level measurement used as a reference.
Using upstream control (figure 19), the flow entering into the plant is first evenly distributed to the inlet of each filter which thus receives a flow rate equal to the incoming flow rate divided by the number of filters.
Each filter is equipped with a filter rate controller unit that detects the upstream level that it keeps constant by acting on the outlet flow rate adjustment unit. Because the upstream level is kept constant, the outlet flow rate will be equal to the incoming flow rate, compensating for fouling.
In this constant level control mode, an evenly distributed flow is achieved easily and reliably using static mechanisms (diaphragms, weirs). This mode avoids discrepancies that could occur between the total filtered flow rate and the incoming flow rate that happen with control systems that use a flow rate measurement. It is on these grounds that we prefer this type of control. Additionally, when a filter is shut down, the incoming flow is automatically distributed over the filters remaining in service.
filter rate controllers
level control using siphons
The degremont® concentric siphon and its partialisation unit (figure 20) are used for level control. The partialisation unit constitutes a measuring and control unit and the siphon is a control unit.
This unit consists of two concentric tubes. Flow goes from the inner branch to the outer branch.
When air is injected into the top, it is drawn by the water into the downstream branch where the air-water mixture density is lowered, this reducing the vacuum in the neck. Without partialization air, the vacuum at the neck is equal, to within the pressure drop in the downstream branch, to the height “H” which is the difference between the filtered water level and the downstream filtered water chamber level. With air partialisation, this void is reduced to height " h1 ", equal to the product of “H” by the waterair mix density. The difference H – h1 = h2 represents the pressure drop thus created by the air input (figure 21).
If h1 represents the pressure drop, with a clean filter, caused by the passage of the flow to be filtered through the filtering bed, the floor and the filtered water outlet pipe to the siphon neck, h2 represents the fouling depth available for the filtering bed.
All we need to do is, with a clean filter, to inject enough air to create a pressure drop h2 and, as the filtering bed becomes fouled up, to reduce the air flow down to zero so that h1 increases up to H.
partialisation unit (photo 10)
This is the control mechanism used to inject air into the top of the siphon to control its flow rate. The air flows through an opening. The section of this opening is altered by a moving component comprising a float and a return spring (figure 21).
level control using a valve: the Regulazur
The Regulazur (figure 22) is a control system developed by SUEZ using a programmable logic controller: the programmable logic controller actuates a butterfly valve (2) mounted on the filter water discharge pipe, creating a secondary head loss that compensates for filter fouling. The Régulazur regulates valve movements according to the signals delivered by the level sensor (6) and valve positionning sensor (8) so that :
- under stabilised operating conditions, the level of water in the filter remains close to its set point, irrespective of the flow rate;
- during restarts after a wash, or in the event of a change to the flow rate, the filter gradually comes up to speed, without any surges, in order to minimise outlet turbidity peaks.
A sensor (7) also informs the Régulazur of filter bed fouling levels and can actuate a backwash accordingly when maximum fouling has been reached.
Each filter is equipped with a Régulazur; the Régulazurs on the battery of filters are usually connected to a communication system (Unitelway, Modbus…); the main programmable logic controller is also connected to this communication system.
In this case :
- equipment specific to each filter (valves, sensors …) is connected to the relevant Regulazur that transmits data delivered by the sensors to which it is connected, to the main programmable logic controller via the system;
- valves and sensors on washing equipment and on auxiliary equipment common to the filter battery are connected to the main programmable logic controller.
The main programmable logic controller is responsible for managing the operation and the washing of the entire filter battery: it actuates the control mechanism and the valves for each filter by transmitting its signals via the Régulazur which in turn controls the controller valve setting.
The Regulazur combines all the principles that are characteristic of good filter control and, consequently, constitutes the most advanced solution in this field :
- stable instantaneous output and slow flow rate fluctuations each time the plant operating conditions change, thus resulting in a consistent filtered water quality;
- constant level, upstream control: the stable water depth over the filter bed avoids the danger of occasional vacuums forming within the filter bed;
- reliability: use of a few, simple and reliable sensors and of networked, proven technology, programmable logic controllers;
- optimized battery management, incorporating backwash management and control.
Video presentation or the operating principle of the Regulazur™ III | <urn:uuid:d84ce1c6-e013-4e4f-a4f9-5982621be6b4> | CC-MAIN-2023-50 | https://www.suezwaterhandbook.com/processes-and-technologies/filters/filter-control-and-regulation/constant-rate-compensated-clogging-filter-video | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00233.warc.gz | en | 0.922609 | 1,603 | 2.828125 | 3 |
COMP-3300 Operating Systems Fundamentals
Winter 2020 — Course Project
This project consists of writing a program that translates logical to physical addresses for a
virtual address space of 216 = 65,536 bytes. Your program will read from a file containing logical
addresses and, using a TLB as well as a page table, will translate each logical address to its
corresponding physical address and output the value of the byte stored at the translated physical
address. The goal behind this project is to simulate the steps involved in translating logical to
physical addresses. Make sure your program uses fast operations like left/right shift operators.
Your program will read a file containing several 32-bit integer numbers that represent logical
addresses. However, you need only be concerned with 16-bit addresses, so you must mask the
rightmost 16 bits of each logical address. These 16 bits are divided into:
(1) an 8-bit page number, and
(2) an 8-bit page offset.
Hence, the addresses are structured as shown in the figure below:
Other specifics include the following:
• 27 = 128 entries in the page table
• Page size of 28 bytes
• 16 entries in the TLB
• Frame size of 28 bytes
• 128 frames
• Physical memory of 32,768 bytes (128 frames x 256-byte frame size)
• Virtual memory of 65,536 bytes = twice the size of physical memory
Additionally, your program needs only be concerned with reading logical addresses and
translating them to their corresponding physical addresses. You do not need to support writing
to the logical address space.
Your program will translate logical to physical addresses using a TLB and page table as outlined
in Section 8.5 of the textbook (the Paging section). First, the page number is extracted from the
logical address, and the TLB is consulted. In the case of a TLB-hit, the frame number is obtained
from the TLB. In the case of a TLB-miss, the page table must be consulted. In the latter case,
either the frame number is obtained from the page table or a page fault occurs. A visual
representation of the address-translation process appears in the figure below:
Handling Page Faults
Your program will implement demand paging as described in Section 9.2 of the textbook (the
Demand Paging section). The backing store is represented by the file BACKING_STORE.bin,
a binary file of size 65,536 bytes. When a page fault occurs, you will read in a 256-byte page
from the file BACKING_STORE and store it in an available page frame in physical memory. For
example, if a logical address with page number 15 resulted in a page fault, your program would
read in page 15 from BACKING_STORE (remember that pages begin at 0 and are 256 bytes in
size) and store it in a page frame in physical memory. Once this frame is stored (and the page
table and TLB are updated), subsequent accesses to page 15 will be resolved by either the TLB
or the page table.
You will need to treat BACKING_STORE.bin as a random-access file so that you can randomly
seek to certain positions of the file for reading. We suggest using the standard C library functions
for performing I/O, including fopen(), fread(), fseek(), and fclose().
Specific for the Three-Students-Project: The size of the physical memory is smaller than the
size of the virtual address space —65,536 bytes— so you need to be concerned about page
replacements during a page fault. Since there are only 128 page frames rather than 256, you are
therefore required to keep track of free page frames as well as implementing a page-replacement
policy using either FIFO or LRU; see Section 9.4 of the textbook (the Page Replacement
We provide the file addresses.txt, which contains integer values representing logical addresses
ranging from 0 to 65535 (the size of the virtual address space). Your program will open this file,
read each logical address and translate it to its corresponding physical address, and output the
value of the signed byte at the physical address.
How to Begin
First, write a simple program that extracts the page number and offset (based on the first figure
above) from the following integer numbers:
1, 256, 32768, 32769, 128, 65534, 33153
Perhaps the easiest way to do this is by using the operators for bit-masking and bit-shifting.
Once you can correctly establish the page number and offset from an integer number, you are
ready to begin.
Initially, we suggest that you bypass the TLB and use only a page table. You can integrate the
TLB once your page table is working properly. Remember, address translation can work without
a TLB; the TLB just makes it faster. When you are ready to implement the TLB, recall that it
has only 16 entries, so you will need to use a replacement strategy when you update a full TLB.
You may use either a FIFO or an LRU policy for updating your TLB.
Alternatively, you may (1) first complete the project Project-For_One_Student, then modify it
to complete the project Project-For_Two_Students, and then modify it to complete your course
How to Run Your Program
Your program should run as follows:
Your program will read in the file addresses.txt, which contains 1,000 logical addresses ranging
from 0 to 65535. Your program is to translate each logical address to a physical address and
determine the contents of the signed byte stored at the correct physical address. (Recall that in
C, the char data type occupies a bye of storage, so we suggest using char values.)
Your program should output the following values:
1. The logical address being translated (the integer value being read from addresses.txt).
2. The corresponding physical address (what your program translates the logical address
3. The signed byte value stored at the translated physical address.
We also provide the file correct.txt, which contains the correct output values for the file
addresses.txt. You should use this file to determine if your program is correctly translating
logical to physical addresses. | <urn:uuid:e38b76e1-ae89-45cb-8240-3bc3370ebc1c> | CC-MAIN-2022-49 | https://www.bestdaixie.com/c%E8%AF%AD%E8%A8%80%E4%BB%A3%E5%86%99-comp-3300-operating-systems-fundamentals/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711108.34/warc/CC-MAIN-20221206124909-20221206154909-00606.warc.gz | en | 0.862999 | 1,496 | 3.390625 | 3 |
The monastery outside Moscow was officially named "Object 110,"
and known to prisoners as "Sukhanovka".
The annex acquired a horrific reputation for torture.
OBJECT 110 WAS ROOM 101
There were no rules of internal order,
and no defined rules for the conduct of investigations either.
Beria himself maintained an office there,
and personally supervised torture sessions
of the Sukhanovka prisoners.
GULAG: A HISTORY, by Anne Applebaum
Chapter 8 - Prison
....Their arrests and interrogations wore prisoners down, shocked them into submission, confused them, and disoriented them. But the Soviet prison system itself, where inmates were kept before, during, and often for a very long time after their interrogations, had an enormous influence on their state of mind as well...
As a rule, provincial prisons were filthier and more lax, Moscow prisons cleaner and more deadly. But even the three main Moscow prisons had slightly different characters.
The infamous Lubyanka, which still dominates a large square in central Moscow (and still serves as the headquarters for the FSB, the NKVD's and KGB's successor), was used for the reception and interrogation of the most serious political criminals. There were relatively few cells -- a 1956 document speaks of 118 -- and 94 were very small, for one to four prisoners....
By contrast, Lefortovo, also used for interrogation, had been a nineteenth-century military prison. Its cells, never intended to hold large numbers of prisoners, were darker, dirtier, and more crowded. Lefortovo is shaped like the letter K, and at its center, recalled the memoirist Dmitri Panin, "an attendant stands with a flag and directs the flow of prisoners being led to and from interrogation."
In the late 1930s, Lefortovo became so overcrowded that the NKVD opened an "annex" in the Sukhanovsky monastery outside Moscow. Officially named "Object 110," and known to prisoners as "Sukhanovka," the annex acquired a horrific reputation for torture: "There were no rules of internal order, and no defined rules for the conduct of investigations either." Beria himself maintained an office there, and personally supervised torture sessions of the Sukhanovka prisoners....
Butyrka prison, the oldest of the three, had been constructed in the eighteenth century, and was originally designed to be a palace, although it was quickly converted into a prison. Among its distinguished nineteenth-century inmates was Feliks Dzerzhinsky along with other Polish and Russian revolutionaires. Generally used to house prisoners who had finished interrogation and were awaiting transport, Butyrka was also crowded and dirty...
ORWELL 2 + 2 = 1984
Traitors in family: Stalin's informers (new book about life in Russia) & Putin's youth groups defend Kremlin (just like Stalin's did). DailyMail/GlobeMail, Oct 17, 2007
20.Thought Police and 37.We Are The Dead and 38.Cellars and 39.Interrogation & Torture and 40.Electric Shock Brainwashing and 44.Room 101
TV SHOW "24" DENIGRATES AMERICA
Horror movie HOSTEL tops USA charts (shows torture as sport in pay-for-killing Soviet club using American boys as victims; sadistic sex, drugs, gore). Scotsman, Jan 10, 2006
ORWELL DIED & HISS JAILED
RUSSIAN REVOLUTION READING
RICH RUSSIANS LIKE LENIN
STASI GERMANY ROOM 101
OF ALL HORRORS - A RAT!
LAOGAI IS CHINESE GULAG
GULAG BONES UNCOVERED
CANADA FORCED LABOUR CAMPS?
ORIGINS OF ROOM 101
COMMUNISM'S TRUE BELIEVERS
NO ESCAPE FOR GULAG PRISONERS
COZY DAYS IN STALIN'S KREMLIN
SPYING FOR STALIN WAS BAD, RIGHT?
SOVIET GULAG'S HAUNTING LEGACY
SOVIET DEFECTOR IGOR GOUZENKO
RUSSIA IS HELL'S INFERNO
STALIN'S LIAR IN NEW YORK
COMMUNIST CRIMES EXPOSED
STALIN: KOBA THE DREAD II
STALIN: KOBA THE DREAD I
DARK SIDE OF RED ARMY'S LIBERATION OF GERMANY
CANADA'S SOVIET SCHOOL
~ an independent researcher monitoring local, national and international events ~ | <urn:uuid:758135e0-d92b-46c8-8011-bade15b912bf> | CC-MAIN-2019-04 | http://orwelltoday.com/room101object.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657867.24/warc/CC-MAIN-20190116195543-20190116221543-00137.warc.gz | en | 0.935221 | 972 | 2.609375 | 3 |
A quick video explaining why "fact families" are an inefficient and confusing way to help children memorize and understand addition and subtraction facts. Number bonds, or the whole/parts method, is much more understandable and easy to remember.
I remember feeling overwhelmed in elementary school by fact families. It seemed like so much to remember! I was seeing them as lots of separate pieces of information. Number bonds would have made it so much easier!
Symbols are very abstract and can be confusing to children. Pictures are much more easily stored in our minds. Take advantage of this knowledge by using Cuisenaire Rods to help teach addition and subtraction.
Please see educationunboxed.com for more videos!
Loading more stuff…
Hmm…it looks like things are taking a while to load. Try again? | <urn:uuid:6ec487b2-0cbf-48c3-b8b1-85178ea19676> | CC-MAIN-2014-23 | http://vimeo.com/42307819 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270877.35/warc/CC-MAIN-20140728011750-00366-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.959355 | 168 | 3.265625 | 3 |
The following pages explain popular expressions for talking about tourism and travel. These are great for building your vocabulary for exams such as IELTS or TOEFL, but they might also help in everyday conversation and even in job interviews.
To ‘travel light’ means to travel with very little luggage or to bring only what you need somewhere.
Go off track/off the beaten track
To ‘go off track’ means to go away from the main route or road. To go ‘off the beaten track’ means to take a different route or path than everybody else. You might want to go ‘off the beaten track’ to see areas when you travel that are not touristic and to get an authentic experience.
Watch your back
If someone tells you to ‘watch your back’ they mean ‘be careful’ or ‘pay attention’. In some cities and places you might need to watch your back to avoid being scammed or to avoid crime.
Mind your belongings
You will often see signs or hear announcements reminding you to ‘mind your belongings’ in busy tourist areas. This means you have to look after your bag, wallet and money in case someone steals them or to warn you that pickpockets are around.
Get up bright and early
When you ‘get up bright and early’ you wake up in the morning soon after sunrise, so you can make the most of your day.
If you say you are going to do something ‘first thing', it means you intend to do it in the morning as soon as you wake up; or that it is the first thing on your list to do.
Drop someone off
When you ‘drop someone off’ you take someone by car and leave them at their destination. Your friend might ask you to ‘drop them off’ at the airport if they have an early flight, for example.
Thumb a lift
When you ‘thumb a lift’, it means ‘to hitchhike’ or to stick your thumb out in the hope that a car will stop and offer you a lift or a ride in a car or vehicle.
To ‘pick somebody up’
When you ‘pick someone up’ it means to collect them by car: “I can pick you up after work, if you give me a call.” Be careful, some people use this phrasal verb incorrectly and say ‘I will pick you’ - this is incorrect. The phrasal verb is ‘to pick up’. So:
Pick me up
Pick you up
Pick him/her up
Pick us up
Pick you up
Pick them up
To get away
Informally, English speakers use ‘get away’ to talk about going on holidays. So you could say, “Will you get away this year?”, or you could say, “I am planning to get away in July”. | <urn:uuid:bf8e78bf-15f8-4681-a7de-2b25dabf4b3c> | CC-MAIN-2021-31 | https://englishlogica.com/themed-vocab/vocabulary-for-exams-to-talk-about-tourism-and-travel-ka3tz8lmlkf | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152000.25/warc/CC-MAIN-20210726031942-20210726061942-00700.warc.gz | en | 0.960644 | 629 | 3 | 3 |
It's one of the biggest concerns for parents of school-age children and now new statistics have confirmed what we knew in our hearts - Australia has some of the highest rates of bullying in the world. Research shows that today roughly one in four of our kids falls victim to bullying.
So how to deal with it?
First, you'll need to know it's happening. Not all little ones will tell their parents they're being bullied but there are signs to look out for.
According to Dr Carr-Gregg, these include the following: a change in your child's demeanour, sadness, an increase in anxiety, clingy behaviour, unexplained bruising, changes in sleeping or eating habits and a significant one - not wanting to talk about school. If you spot any or all of these symptoms your child may be a victim of bullying. So what to do?
First of all, try role play, said Dr Carr-Gregg, who suggests you play the role of the bully and your child practise responding. He or she should look the bully in the eye, sand up straight, maintain eye contact, hold a neutral expression and wait to hear what the bully has to say. Then, your child can respond by saying, 'Maybe' or 'If you say so' before turning on their heel and walking away.
This will ensure the bully gets no satisfaction, said Dr Carr-Gregg.
"Bullies bully because they want a response," he said.
"If you respond or react with stress that feeds the bully. It's a little like feeding the trolls online. "
So how to provide your kids with the confidence to stand up to bullies in this way, particularly if they're vulnerable, shy or anxious? Well, there's the role play. Next up, work on their self confidence and also encourage a wide social network.
That way, if they have a falling out at school there's a secondary social network to help soften the blow. Letting feelings out, particularly via writing, is also a positive thing, said Dr Carr-Gregg.
If the trouble does not appear to be diminishing however it's time to talk to your child's teacher and explain what's going on. Next stop, the deputy principal and finally, the principal. If you're still not getting anywhere, step it up a notch, said Dr Carr-Gregg.
"If you still don't get a good response you need to go to the local minister of education and complain," he said. | <urn:uuid:9c2e4c20-ab3d-44f1-a550-6de1f5904a9d> | CC-MAIN-2018-51 | https://honey.nine.com.au/2017/06/14/12/08/how-to-bully-proof-your-kids-fight-back-stay-safe-not-get-picked-on-kids | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825098.68/warc/CC-MAIN-20181213193633-20181213215133-00091.warc.gz | en | 0.968081 | 512 | 3.09375 | 3 |
You may not have heard of Frederick Law Olmstead, but you have most definitely heard of some of his more famous works, such as NYC's Central Park.
Olmstead was a landscape architect active in the US during the late 1800's. He firmly believed that "common green space" should be beautiful and available to everyone (a rather unusual notion at the time).
His landscapes have stood the test of time as beautiful and usable spaces. USE SATELLITE VIEW for maximum effect. Enjoy!
Created by Chasmosaur | <urn:uuid:33097aea-bbeb-4d07-9e14-278cc8fd3c78> | CC-MAIN-2019-51 | https://www.terraclues.com/(X(1)A(8CToHU79OOKgrYIsCJx7yCFSwBSXeYHUa6qzA1tUR2TKQCTmjy6u7ICyVsNIvB6wY47XdT594G5a67vs-yEYI2toDII52KehhNUROTzbep0gDIk7kQDTR15e1QP7G7yoeNsTtw2))/PlayHunt?HuntID=323 | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308149.76/warc/CC-MAIN-20191215122056-20191215150056-00536.warc.gz | en | 0.98189 | 110 | 2.703125 | 3 |
Many foods pose choking hazards for our little ones, even when you least expect it. Sometimes certain foods can also be difficult for toddlers to fully enjoy as we do as adult—for example, when eating sliced oranges. My daughter is very independent these days, insisting on biting foods whole rather than having pieces cut for her. With this in mind, plus in an effort to minimize waste, I’ve engineered a pretty successful method of cutting oranges for my little girl to enjoy. Hope this works for you as well!
Oranges are a healthy snack chock-full of Vitamin C and other nutrients. They are a great choice for a child’s balanced diet, but they can be a bit messy and let’s be honest, don’t you hate all the fruit that goes to waste when your little one asks for orange wedges for a snack?
Oranges tend to spray juice everywhere, making our kids sticky up to their elbows! What once was a pretty, colorful wedge soon becomes a piece of fruit that got more squished than it did eaten. We’re all far too familiar with this result when feeding our kids orange slices:
Instead, give them oranges cut just right so that they can enjoy every bite!
Here’s a quick video to give you the basics on my effective orange cutting technique:
As a short summary in case you prefer text-based instructions, follow these steps to cut oranges so that your little ones get the most out of the fruit as well as the experience in feeding themselves.
- Cut an orange into wedges as you would for yourself.
- Using a steak knife or other sharp knife, cut between the rind and the fruit at both points of the wedge, exposing the orange flesh a little better.
- Use the knife to trace around and gently free the fruit along the long edges of the orange slice.
- From the top of the slice, cut down into the fruit to make little bite-sized pieces that are still attached.
- If your orange wedges are too thick, you can also cut straight down the middle to create smaller pieces of orange that your toddler can bite off of the rind.
When you use my special orange slicing technique to cut easy bites for your toddler, your result should look something like this:
Sliced oranges are a wonderfully healthy snack for your little ones to enjoy at home or at school. You can even pack up orange slices for a picnic!
If your kid is anything like mine, you will probably be rushing to finish up cutting each slice as she is handing you back the peels, fully devoured except for the rind.
We’ve found this toddler food cutting technique to be very helpful in our home and hope it helps you and your kids as well. If you have any helpful tips and food hacks for parents of toddlers, please send them our way or share them in the comments below! | <urn:uuid:c3323c08-d8ce-4f8a-9217-4bd499a4c562> | CC-MAIN-2019-51 | https://toddlermealtips.com/2016/03/04/food-hacks-the-perfect-way-to-cut-an-orange-for-toddlers/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540530857.12/warc/CC-MAIN-20191211103140-20191211131140-00054.warc.gz | en | 0.943765 | 600 | 2.625 | 3 |
Explore the legendary attic workshop of engineer James Watt, preserved as it was when he died in 1819.
Explore the legendary attic workshop of engineer James Watt, preserved as it was when he died in 1819. The workshop is an astonishing time-capsule containing its original furniture, windows, doors and fireplace, and 8,430 fascinating objects left as they were in Watt’s lifetime.
See some of Watt’s remarkable inventions that have shaped the way we live today and learn why he was heralded the ‘greatest benefactor of the human race’. From steam power to tea services, explore the relationship between Watt’s steam engine and a new age of consumption.
Watt’s improved engines meant steam could be used everywhere, from pumping coal mines to powering textile mills and breweries. Find out more about the renowned engineer and his incredible legacy.
Visit this gallery to discover remarkable objects that helped shape Britain’s industrial past and future. | <urn:uuid:db48afaa-ae2a-4f10-ad55-38e4dccd8da1> | CC-MAIN-2020-50 | https://ageofrevolution.org/news-and-events/events/james-watt-and-our-world/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141177566.10/warc/CC-MAIN-20201124195123-20201124225123-00200.warc.gz | en | 0.975382 | 201 | 2.875 | 3 |
1) The influence of welding current on weld formation
Under certain other conditions, with the increase of arc welding current, the weld penetration depth and remaining height increase, and the penetration width increases slightly. The reasons are as follows:
1. As the arc welding current increases, the arc force acting on the weldment increases, the heat input of the arc butt weldment increases, and the position of the heat source moves down, which is beneficial to the conduction of heat to the molten pool and increases the penetration depth. The penetration depth is approximately proportional to the welding current, that is, the weld penetration depth H is approximately equal to Km×I, where Km is the penetration coefficient (the number of millimeters that the welding current increases by 100A causes the weld penetration to increase), which is related to the arc welding method , Wire diameter, current type, etc.
2. The melting speed of the core or wire of arc welding is proportional to the welding current. With the increase of arc welding welding current, the melting speed of the welding wire increases, and the melting amount of the welding wire increases approximately proportionally, but the melting width increases less, so the weld The residual height increases.
3. As the welding current increases, the diameter of the arc column increases, but the depth of arc penetration into the workpiece increases, and the range of arc spot movement is restricted, so the increase in melting width is small. When gas shielded argon arc welding, the welding current If the welding current is too high and the current density is too high, finger penetration is likely to occur, especially when welding aluminum.
2) The influence of arc voltage on weld formation
Under certain other conditions, the arc voltage increases, the arc power increases accordingly, and the heat input of the weldment increases. The increase of the arc voltage is achieved by increasing the arc length. The increase of the arc length makes the radius of the arc heat source increase, and the arc heat dissipation Increase, the energy density of the input weldment decreases, so the penetration depth is slightly reduced and the penetration depth increases.
At the same time, because the welding current is constant, the melting amount of the welding wire is basically unchanged, so that the weld reinforcement is reduced. In order to obtain a suitable weld formation, that is, to maintain a suitable weld formation coefficient φ, while increasing the welding current, it should be appropriate Increase the arc voltage and require a proper matching relationship between the arc voltage and the welding current, which is more common in molten electrode arc welding.
3) The influence of welding speed on weld formation
Under certain other conditions, increasing the welding speed will reduce the welding heat input, thereby reducing the weld width and penetration. Since the amount of welding wire metal deposition per unit length of the weld is inversely proportional to the welding speed, it also leads to The weld reinforcement is reduced.
Welding speed is an index for evaluating welding productivity. In order to increase welding productivity, the welding speed should be increased. However, in order to ensure the required weld size in the structural design, while increasing the welding speed, the welding current and arc voltage should also be increased accordingly. These three quantities are interrelated. At the same time, it is necessary to consider that when the welding current, arc voltage and welding speed increase (that is, high-power welding arc, high welding speed welding), it is possible to form a molten pool and Welding defects such as undercuts and cracks are generated during the solidification of the molten pool, so there is a limit to increasing the welding speed.
Tips: High-frequency straight seam resistance welded steel pipe (ERW steel pipe) is a hot-rolled coil that is formed by a forming machine and uses the skin effect and proximity effect of high-frequency current to heat and melt the edge of the tube blank. Pressure welding is carried out under the action of squeeze rollers to realize the products produced.
High-frequency resistance welded steel pipes have a different welding process from ordinary welded pipes. The weld seam is formed by melting the base material of the steel strip body, and its mechanical strength is better than that of ordinary welded pipes. Smooth appearance, high precision, low cost and small weld reinforcement, which is conducive to the coating of 3PE anticorrosive coating. The welding methods of high frequency welded steel pipes and submerged arc welded pipes are significantly different. Since welding is completed instantly at high speed, it is much more difficult to ensure welding quality than submerged arc welding.
ASTM A53 ERW steel pipe is a typical carbon steel pipe. It is largely used to convey fluids at low / medium pressures such as oil, gas, steam, water, air and also for mechanical applications. | <urn:uuid:e48b69d3-18f9-4056-a19d-b8a02da0cfcc> | CC-MAIN-2021-21 | https://www.permanentsteel.com/newsshow/analysis-of-the-causes-of-poor-weld-formation.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989526.42/warc/CC-MAIN-20210514121902-20210514151902-00383.warc.gz | en | 0.921748 | 983 | 3.21875 | 3 |
UNITED NATIONS, Oct. 14 (UPI) — For the first time in history, human efforts will have wiped out an animal disease in the wild, the United Nations Food and Agriculture Organization says.
The infectious viral disease rinderpest will soon be officially eradicated in an ambitious worldwide effort, a U.N. release said Thursday.
Smallpox is the only other disease successfully eradicated by human efforts, the FAO said.
Rinderpest, from the German for “cattle plague,” does not directly affect humans, but the swift, massive losses of cattle and other hoofed animals it causes has wreaked havoc on agriculture for thousands of years, resulting in famine and economic destruction.
At one point its spread extended from Scandinavia to the Cape of Good Hope and from Africa’s Atlantic shore to the Philippine archipelago.
Outbreaks have also been reported in Brazil and Australia.
The last known outbreak of rinderpest occurred in Kenya in 2001.
FAO headed a global effort to study the plague to help farmers and others recognize and control the disease, start vaccination campaigns and ultimately eradicate it.
“The control and elimination of rinderpest has always been a priority for the organization since its early days in its mission to defeat hunger and strengthen global food security,” FAO Director-General Jacques Diouf said.
Copyright 2010 United Press International, Inc. (UPI). Any reproduction, republication, redistribution and/or modification of any UPI content is expressly prohibited without UPI’s prior written consent. | <urn:uuid:b7e2fc6a-c301-4c6f-8221-4276d147e528> | CC-MAIN-2016-07 | http://www.ecoworld.com/other/u-n-hails-eradication-cattle-disease.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166739.77/warc/CC-MAIN-20160205193926-00338-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.933203 | 329 | 3.28125 | 3 |
In a precedent-setting case, PETA US, three marine-mammal experts and two former orca trainers are suing SeaWorld on behalf of five orcas who were taken from their home by force, locked up, put to work and never allowed to leave. The case intends to prove that these orcas are being held as slaves in violation of the 13th Amendment to the US Constitution. The suit is one of the most groundbreaking legal cases ever to reach the courts - the first ever to assert that a constitutional right should extend to nonhuman animals.
In the not-too-distant past, newspapers vigorously editorialised in opposition to extending to women the right to own property, gain custody of their children or vote. "What's next?" they wrote, "The right of asses to vote?" The idea of women attending medical school was similarly denounced with bold statements asserting that these "frail creatures" would "faint at the sight of blood." Black men and women were declared "subhuman" and "lacking in the emotions, senses and morals of white people," and those who fought for their rights often found themselves attacked not only in print but also by enraged supremacists.
We can be ashamed of our past shortsightedness and bigotry, but to fail to examine our present treatment of those we see as "different" is to put at risk our society's moral evolution. Our current challenge is to put history's lessons to work today, and PETA US' lawsuit can and will do just that.
Orcas in the wild lead rich, complex lives. They are intelligent animals who work cooperatively, form close relationships, communicate using distinct dialects and swim up to 100 miles every day. Orcas at SeaWorld are forced to toil day after day, repeating the same endless tasks with no choice in the matter and no escape. They have been turned into perpetual breeding machines to provide more performers for SeaWorld's cruel shows.
Attorneys will ask for Tilikum, Katina, Kasatka, Ulises and Corky to be released into a more appropriate environment, such as a coastal sanctuary. Protected sea pens would allow these orcas greater freedom of movement; the ability to see, sense and communicate with their wild cousins and other ocean animals; and the ability to feel the tides and waves and engage in the types of behaviour that define who they are.
Our understanding of animals expands every day. Animals are no longer regarded as "things" to dominate but as breathing, feeling beings with families, intellect and emotions. The UK was the first country in the world to introduce an animal welfare law to prevent the cruel treatment of cattle in 1882, and the European Union officially recognised animals as sentient beings back in 1997. What we should really be asking ourselves is this: why is it taking so long for animals to gain legally recognised rights? Just as we look back with shame at a time when humans were viewed by some as property and less deserving of protection and consideration, we will look back with shame on our current treatment of animals.
Follow Mimi Bekhechi on Twitter: www.twitter.com/@Mimi_Bekhechi | <urn:uuid:eac4148a-32ad-45f7-93c8-e617541bab12> | CC-MAIN-2015-35 | http://www.huffingtonpost.co.uk/mimi-bekhechi/killer-whales-seaworld-lawsuit-peta_b_1261259.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645322940.71/warc/CC-MAIN-20150827031522-00297-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.971456 | 646 | 2.890625 | 3 |
Earth Day 2022: Google Doodle highlights effects of climate change, urges people to live more sustainably – The Indian Express
On Earth Day 2022, which falls on Friday, Google addressed the pressing challenge of climate change through its doodle. “Acting now and together to live more sustainably is necessary to avoid the worst effects of climate change,” the company said.
Today’s Google Doodle uses real time-lapse imagery from Google Earth Timelapse and other sources to showcase the impact of climate change across different regions.
Throughout the day, the doodle images will change to represent different locations of the earth and the impact of global warming in these areas over the years. Each image will remain on the homepage for several hours at a time.
Today’s doodle showcases real imagery from Glacier retreat at the summit of Mt. Kilimanjaro in Africa, Sermersooq Glacier retreat in Greenland, Great Barrier Reef in Australia and Harz Forests in Germany, all having witnessed the impact of climate crisis in some form or another.
Warmer temperatures over time are changing weather patterns and disrupting the usual balance of nature. This poses many risks to human beings and all other forms of life on Earth.
Earth Day is an international event celebrated around the world to pledge support for environmental protection. Several events and campaigns are being held worldwide to demonstrate support for environmental protection. The year 2022 marks the 52nd anniversary of the annual celebrations. | <urn:uuid:daef8d6d-9bae-4733-8cd6-f144579f96d0> | CC-MAIN-2022-21 | https://mothernature.news/2022/04/22/earth-day-2022-google-doodle-highlights-effects-of-climate-change-urges-people-to-live-more-sustainably-the-indian-express/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662512229.26/warc/CC-MAIN-20220516172745-20220516202745-00659.warc.gz | en | 0.907865 | 300 | 3.1875 | 3 |
Drought, famine, and warfare have profound physical and psychological impacts on children, especially those three years old and under. Malnutrition and disease at these vulnerable ages leave a lasting mark that stretch into adulthood. Around 500,000 children in the Horn of Africa are in need of immediate, life-saving help.
Abdi, 1, is beginning his life in a nightmare. He is dangerously malnourished, a condition aggravated by chronic diarrhea. During a brief interview with VOA, he and his mother, Qaali Abdi, 30, cannot stop coughing.
“We are suffering. I’m sick, the children are sick, their father is sick – we have nothing,” said Qaali Abdi. “My husband is now in the hospital.”
The mother of six explains that Abdi and her family’s health woes began when they fled Somalia.
“Where would we sleep? We had no place to sleep. On the road, we were suffering. We have nothing, the wind was blowing heavily, the sun was hot. Many people died along the way,” she added.
Abdi and his brothers and sisters have been living for the past month in the Dadaab refugee camp, where tens of thousands of children like him have been streaming in over the past few months.
Malnourished and sick children are showing up in Dadaab and all across the Horn of Africa, poignant reminders of the cruelty of drought, famine, and war.
The problem is daunting, with malnutrition rates skyrocketing. An estimated half-million children in the Horn of Africa need immediate, life-saving assistance.
Olivia Yambi is a representative of the United Nations’ children’s agency in Kenya.
“The threshold for an emergency is around 15 percent global acute malnutrition,” said Yambi. “In most areas highly affected, we are recording rates of over 35 percent, including in the parts we are visiting in the northern belt of Kenya. Most of the children who are severely malnourished are very young children, children under the age of three.”
And that has serious, long-term implications, says Roselyn Mullo, the European Commission‘s nutrition expert in charge of the Horn of Africa.
“They will have challenges when it comes to academic proficiency in the future,” Mullo explained. “It would even roll down to, when they reach adulthood, governments will not be able to have productive workers. It will also have an impact on them, particularly girls – when they become mothers, they will not be able to give birth to well-nourished children, something known as the low birth weight children.”
Mullo adds that there is need for long-term programs and services to help children develop physiologically and perhaps reverse some of the effects of what they are going through now.
But is it not just malnutrition and other physical calamities that children and their families find debilitating.
Mumino Mohamed and her eight children walked for 18 days to get to Dadaab. The children were separated from their disabled father while fleeing Somalia.
“My children do not have a father – up to now they are looking. They are feeling bad because they are missing their father,” Mohamed said.
The U.N. children’s agency’s Yambi says the loss of family members has a dramatic psychological impact on children.
“During the long distances of walking, some parents die on the way, some children die on the way,” Yambi explained. “And children are directly exposed to these very traumatic experiences. It is something that has to be dealt with – that is why we are recommending support for counseling services, to get a feel of how children relate to these issues.”
Parents, too, are distressed at their inability to provide their children’s basic needs.
Qaali Abdi says she is too weak to even breastfeed Abdi, a basic and key role in a mother’s life.
- Addressing the Horn’s health needs (one.org)
- Somalia Famine Refugees Start Ramadan Despite Hunger (huffingtonpost.com)
- Aid for the food crisis in the Horn of Africa – get the data (guardian.co.uk)
- Somalia:UN gives more to Horn of Africa (laaska.wordpress.com)
- July 26th UN Briefing on the Emergency in the Horn of Africa. (passionistsinternational.wordpress.com)
- AU to hold donor summit on Somalia famine – Aljazeera.net (news.google.com)
- UNFPA Intensifies Lifesaving Support for Mothers’ Needs in Horn of Africa (prweb.com)
- Horn of Africa famine spreads (telegraph.co.uk)
- Horn of Africa Drought, Food Crisis: Agricultural Trade Policies Questioned (agricultureafrica.wordpress.com) | <urn:uuid:5214af16-b9a6-4a2b-ae0d-e33a8c4132a6> | CC-MAIN-2019-22 | https://censorshipinamerica.wordpress.com/2011/07/30/horn-of-africa-children-exposed-to-lifetime-trauma/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256586.62/warc/CC-MAIN-20190521222812-20190522004812-00102.warc.gz | en | 0.963452 | 1,053 | 2.921875 | 3 |
Teens with earlier high school start times may get in more car accidents than those with later start times, according to a study comparing two counties in Virginia.
The authors previously found a similar association in two other Virginia counties, which they published in 2011.
“Our study results suggest that early high school start times are problematic for our teens' ability to drive safely, but they cannot prove a causal relationship between early high school start times and increased teen crashes,” said lead author Dr. Robert Daniel Vorona of the Eastern Virginia Medical School in Norfolk.
But early start times may lead to sleep loss, he and his coauthors write.
Vorona and his coauthors used data from the Virginia Department of Motor Vehicles to compare car accident frequencies in Chesterfield County, Virginia, where high school classes began at 7:20 a.m., with nearby Henrico County, where classes started at 8:45 a.m.
In the 2009-2010 school year, for every 1,000 licensed drivers ages 16 to 18, there were almost 49 crashes in Chesterfield, compared to 38 in Henrico.
The situation was similar for 17 to 18 year old teens in 2010-2011, although there was no difference overall between counties for 16 to 18 year olds.
In total over the two-year period, teens got into 707 crashes in Henrico county and 1074 crashes in Chesterfield, the researchers reported in the Journal of Clinical Sleep Medicine.
Middle and high schools should start at 8:30 a.m. or later to benefit the health and welfare of students, according to a 2014 policy statement from the American Academy of Pediatrics. Poor sleep has been linked to increased risks of depression, anxiety, obesity and motor vehicle accidents, experts noted in an article published alongside the statement in Pediatrics.
American Academy of Sleep Medicine President Dr. Timothy Morgenthaler, a national spokesperson for the Healthy Sleep Project, told Reuters Health that research funded by the Centers for Disease Control and Prevention (CDC) and reported in 2014 showed that for half of communities that instituted a later start time for their high schools, the rate of car crashes for high-school-age drivers dropped by 65 to 70 percent.
“By decreasing the likelihood that teens will be sleep-deprived when getting behind the wheel in the morning, we can help decrease the chance they will be involved in an accident,” Morgenthaler, who was not part of the new study, told Reuters Health in a statement.
Sleep and circadian rhythms change during adolescence, and school start times that aren’t aligned with their sleep needs puts teens at risk for chronic sleep restriction, he said.
“In puberty, a natural shift occurs in the timing of the body’s internal ‘circadian’ clock, causing most teens to have a biological preference for a late-night bedtime,” Morgenthaler said. “Current school start times are asking teens to shine when their biological clock tells them to sleep.”
Scheduling school start times should be a collaboration between parents and local school boards, he said.
“My suggestion would be that high schools should optimally start in the area of 8:30 to 8:45 such as the two later starting jurisdictions in our two studies,” Vorona told Reuters Health by email. “I would expect that they would need to end the school day later.”
Parents should explain how important adequate sleep is to teens, and restrict their driving to and from school and otherwise if their teen has not achieved sufficient sleep, Vorona said.
“Teens are inexperienced and poor drivers and adding sleep deprivation to the mix is asking for trouble,” he said. | <urn:uuid:d6c6bb76-53eb-4419-99d5-b60edabfeee9> | CC-MAIN-2017-51 | http://www.foxnews.com/health/2014/11/19/earlier-school-start-times-may-be-tied-to-teen-driving-accidents.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948593526.80/warc/CC-MAIN-20171217054825-20171217080825-00220.warc.gz | en | 0.96412 | 767 | 2.71875 | 3 |
Do you know kids who would like to create their own online games, stories, animations and more? Who doesn’t!
Then take a look at Scratch – a wonderful free programming tool “designed to help young people (ages 8 and up) develop 21st century learning skills. As they create Scratch projects, young people learn important mathematical and computational ideas, while also gaining a deeper understanding of the process of design.”
Get a bunch of kids together and join in Scratch Day – “a worldwide network of gatherings, where people will come together to meet other Scratchers, share projects and experiences, and learn more about Scratch.”
I heard about Scratch Day through the March 2009 Games in Libraries podcast.
For some examples, see my earlier post on Scratch. | <urn:uuid:cee53f5b-683a-45c6-af17-fcca71ea27b4> | CC-MAIN-2017-09 | https://www.pafa.net/2009/04/scratch-day-may-16-2009/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170609.0/warc/CC-MAIN-20170219104610-00428-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939382 | 167 | 3.328125 | 3 |
Hubble Astronomers Develop a New Use for a Century-Old Relativity Experiment to Measure a White Dwarf’s Mass
Astronomers have used the sharp vision of NASA’s Hubble Space Telescope to repeat a century-old test of Einstein’s general theory of relativity. The Hubble team measured the mass of a white dwarf, the burned-out remnant of a normal star, by seeing how much it deflects the light from a background star.
This observation represents the first time Hubble has witnessed this type of effect created by a star. The data provide a solid estimate of the white dwarf’s mass and yield insights into theories of the structure and composition of the burned-out star.
First proposed in 1915, Einstein’s general relativity theory describes how massive objects warp space, which we feel as gravity. The theory was experimentally verified four years later when a team led by British astronomer Sir Arthur Eddington measured how much the sun’s gravity deflected the image of a background star as its light grazed the sun during a solar eclipse, an effect called gravitational microlensing.
Astronomers can use this effect to see magnified images of distant galaxies or, at closer range, to measure tiny shifts in a star’s apparent position on the sky. Researchers had to wait a century, however, to build telescopes powerful enough to detect this gravitational warping phenomenon caused by a star outside our solar system. The amount of deflection is so small only the sharpness of Hubble could measure it.
Hubble observed the nearby white dwarf star Stein 2051B as it passed in front of a background star. During the close alignment, the white dwarf’s gravity bent the light from the distant star, making it appear offset by about 2 milliarcseconds from its actual position. This deviation is so small that it is equivalent to observing an ant crawl across the surface of a quarter from 1,500 miles away.
Using the deflection measurement, the Hubble astronomers calculated that the white dwarf’s mass is roughly 68 percent of the sun’s mass. This result matches theoretical predictions.
The technique opens a window on a new method to determine a star’s mass. Normally, if a star has a companion, astronomers can determine its mass by measuring the double-star system’s orbital motion. Although Stein 2051B has a companion, a bright red dwarf, astronomers cannot accurately measure its mass because the stars are too far apart. The stars are at least 5 billion miles apart – almost twice Pluto’s present distance from the sun.
“This microlensing method is a very independent and direct way to determine the mass of a star,” explained lead researcher Kailash Sahu of the Space Telescope Science Institute (STScI) in Baltimore, Maryland. “It’s like placing the star on a scale: the deflection is analogous to the movement of the needle on the scale.”
Sahu will present his team’s findings at 11:15 a.m. (EDT), June 7, at the American Astronomical Society meeting in Austin, Texas.
The Hubble analysis also helped the astronomers to independently verify the theory of how a white dwarf’s radius is determined by its mass, an idea first proposed in 1935 by Indian American astronomer Subrahmanyan Chandrasekhar. “Our measurement is a nice confirmation of white-dwarf theory, and it even tells us the internal composition of a white dwarf,” said team member Howard Bond of Pennsylvania State University in University Park.
Sahu’s team identified Stein 2051B and its background star after combing through data of more than 5,000 stars in a catalog of nearby stars that appear to move quickly across the sky. Stars with a higher apparent motion across the sky have a greater chance of passing in front of a distant background star, where the deflection of light can be measured.
After identifying Stein 2051B and mapping the background star field, the researchers used Hubble’s Wide Field Camera 3 to observe the white dwarf seven different times over a two-year period as it moved past the selected background star.
The Hubble observations were challenging and time-consuming. The research team had to analyze the white dwarf’s velocity and the direction it was moving in order to predict when it would arrive at a position to bend the starlight so the astronomers could observe the phenomenon with Hubble.
The astronomers also had to measure the tiny amount of deflected starlight. “Stein 2051B appears 400 times brighter than the distant background star,” said team member Jay Anderson of STScI, who led the analysis to precisely measure the positions of stars in the Hubble images. “So measuring the extremely small deflection is like trying to see a firefly move next to a light bulb. The movement of the insect is very small, and the glow of the light bulb makes it difficult to see the insect moving.” In fact, the slight movement is about 1,000 times smaller than the measurement made by Eddington in his 1919 experiment.
Stein 2051B is named for its discoverer, Dutch Roman Catholic priest and astronomer Johan Stein. It resides 17 light-years from Earth and is estimated to be about 2.7 billion years old. The background star is about 5,000 light-years away.
The researchers plan to use Hubble to conduct a similar microlensing study with Proxima Centauri, our solar system’s closest stellar neighbor.
The team’s result will appear in the journal Science on June 9. | <urn:uuid:dcf1a9a7-68e3-46b5-a620-f7e4150ac58c> | CC-MAIN-2018-30 | https://p4-r5-01081.page4.com/_blog/2017/06/11/8209-astronomie-hubble-astronomers-develop-a-new-use-for-a-century-old-relativity-experiment-to-measure-a-white-dwarfs-mass/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591543.63/warc/CC-MAIN-20180720061052-20180720081052-00558.warc.gz | en | 0.93552 | 1,166 | 3.96875 | 4 |
The picture is a photograph of Hadrian’s Wall, the Wall the Romans built across what is now England.
The Romans built it to protect Roman Britain from raids by the Picts, the tribes that inhabited what would become Scotland. It marked the northern boundary of the Roman Empire in Britain, the dividing point between the unsettled outlands and the area encompassed by the Roman Peace, the Pax Romana.
You’ll note in the photo that this section of Hadrian’s wall is still standing, though it’s eroded a bit, and may not be doing a great job of controlling those sheep. The guy in the photo is apparently applying weed-killer, which I assume is used to keep weeds from further eroding the wall.
This is a blog about cybercrime, not history, so you may be wondering why I’m rattling on about Hadrian’s Wall and the Pax Romana. This post is going to be different: Instead of talking about a case or statute, I’m going to ruminate on an issue I’m trying to sort out.
The issue is the problem of securing cyberspace. That phrase is not really accurate, unless we think cyberspace is a “place” analogous to Roman Britain, or Roman Gaul or Roman Italy or Roman Africa or the Roman Empire. Each of the constituent areas of the Roman Empire (Italy, Gaul, Africa, Britain) was a “place,” a geographical area with clearly defined boundaries. The Roman Empire was also a “place” – a conglomeration of geographical places, to be precise. The Roman Empire’s ability to secure the areas it controlled created and sustained the Pax Romana, at least until the Empire crumbled.
Cyberspace is in one sense analogous to a geographical “place” – like one of the areas that constituted the Roman Empire, or maybe the Empire itself. We tend to describe our experiencing it in spatial terms: We “go into” cyberspace when we’re online (an analogy that is particularly apt when we’re in virtual worlds like Second Life or playing games like WoW). We refer to “sites” and “locations” in cyberspace, and cyberspace has for over a decade been characterized as a “frontier,” an unexplored “place” we are in the process of settling and civilizing. All of these are examples of the spatial analogies we implicitly rely on when we talk about and conceptualize cyberspace. We use those analogies, I think, because we have no other way of conceptualizing purely non-spatial experiences – Gibson’s collective, consensual hallucination.
Cyberspace has definitely become a venue for human activity, and that brings us to the issue of securing cyberspace: As we all know, and as I’ve written about almost 200 times on this blog, cyberspace can be and is being used to commit criminal activity. As I’ve also noted here before, criminal activity undermines social order; social order is the term used to refer to a social system’s need to maintain order among its constituents, to prevent them from preying on each other. As I’ve noted before here and elsewhere, no social system – no tribe, no empire, no nation-state – can survive if its constituents are free to prey upon – to rape, assault, murder, steal from, etc. – each other. Every social system has to maintain a baseline of internal order if it is to survive; order is essential if people are going to produce and distribute food and the other necessities they require to survive and prosper. It’s also essential for stable reproduction and the socialization of children.
Every social system – tribe, empire, nation-state, etc. – also has to maintain external order – it has to fend off attacks from other tribes, empires, nation-states, etc. They do that by relying on their military; Rome used military force not only to fend off its enemies, but to bring other geographical areas under its control. Having done so, it had to protect those areas from external enemies (Hadrian’s Wall) AND preserve internal order, which it, like very other evolved human social system, did with criminal rules and procedures for enforcing those rules.
But so far every human social system – tribe, city-state, empire, nation-state – has been a closed system: It has occupied a bounded geographical area, and used it military to fend off outside enemies and its law enforcement rules and personnel to keep its own citizens from preying on each other (too much). It is for this reason that we tend to refer to the social systems – the nation-states – that are now dominant as “countries.” Their identity and existence are defined by the territory – the “country” – each controls.
Now we have cyberspace: What is it? Is it a new country, to be conquered and put under the control of one or more of our existing nation-states? Do we somehow carve cyberspace up into regions: U.S. Cyberspace, French Cyberspace, Thai Cyberspace, and so on? Or do we make it a “country” in and of itself? If we do that, who runs it and how do they maintain order “in” cyberspace?
Maintaining order “in” cyberspace is, I submit, an oxymoron, as is “securing cyberspace.” Analogizing cyberspace to a geographical “place” may have its uses, but this is not a productive analogy when it comes to talking about threats in cyberspace and how they impact on our lives in the real-world. The Romans could build Hadrian’s Wall and use it to keep the Picts out of Roman Britannia, but we can’t do that with cyberspace; it is not a separate “place” with its own, indigenous population. It’s “occupants,” if we want to use that term, are transients – real-world citizens who drop in and out of cyberspace. Unless and until we develop the technology and the inclination to decant our consciousnesses into an evolved version of cyberspace, we cannot become permanent residents.
What I find most interesting about cyberspace is that it is, IMHO, breaking down the carefully constructed and maintained boundaries that divide the world into nation-states or “countries.” It’s eroding cultural and social barriers, but it’s also eroding geographical boundaries. As I’ve noted here and elsewhere, the defining characteristic of cybercrime is that it tends to be transnational. Unlike traditional crime (which was face-to-face and therefore physically grounded crime), cybercrime is unbounded crime; a cybercriminal can victimize someone halfway around the globe as easily as he/she can someone who is across the street.
That, as I’ve noted here and written about extensively elsewhere, erodes the efficacy of the systems nation-states use to control crime and keep order. Those systems are set up to deal with internal crime: There’s a crime scene, which is local; there are witnesses who can be interviewed who will know the victim, if not the likely perpetrator, and who can be interviewed to provide information that will help police catch the person who committed the crime. All of these law enforcement systems are organized hierarchically, on a quasi-military model; both the systems that are used to maintain internal order (fight crime) and the systems that are used to maintain external order (keep other countries at bay) are hierarchically organized, territorially-based systems.
Law enforcement officers from Country A can’t simply go into Country B, kick down doors, chase suspects and do whatever else they need to catch a cybercriminal (assuming all of that would be effective in doing so). The same is true of the military: If Country A comes under cyberattack in what seems to be cyberwarfare, instead of cybercrime, the military can’t simply invade Country B, from which the attack seemed to originate. Country B may not actually be the source of the attack; and even if it is, the attack may not be warfare launched by Country B. It might be warfare launched by Country C to get Countries A and B going at each other; or it might be warfare launched by a group of non-nation-state actors who either consider themselves capable of waging war on their own or are interested in getting Countries A and B to attack each other.)
I’ve written more about the cumbersome nature of the systems nation-states use to maintain order (and do pretty much everything) elsewhere. You can find a link to one of those articles here, if you’re interested.
My point is that I don’t think the approach we have used is working, and can work, in a world in which computer technology increasingly makes geography irrelevant. Like others, I wonder if we will not see the nation-state disappear as the basic social system . . . to be replaced by . . . what?
I am becoming increasingly convinced that the territorially-based, hierarchically-organized (and often ridiculously huge) agencies we rely on to secure the real-world areas controlled by nation-states are completely unsuited for, and incapable of, dealing with cyberthreats. I keep coming back to a book I read several years ago, as a source of an analogy for what MIGHT be happening.
The book (the title escapes me, sorry) is about a man, a fairly wealthy and powerful man, who lives with his family in Provence (now part of France) in the period when the Roman Empire is beginning to fail. He’s a native of the area, but has become a Roman citizen, and like all the citizens of the Empire he’s used to peace and security. There were dustups at times, but the world was, and had for a long time been, stable.
As you read the book, you realize what it was like to live through the early decline and then disintegration of the Roman Empire, the entity that had kept everyone safe. It’s easy for us, looking back, to point to things and note how obvious it was that the system was beginning to fail. It’s a lot harder to do that when you’re in the system, you’re used to it and you need it, because if it fails, you’re in trouble. As you read the book, the man it’s about slowly begins to realize that his world is ending, and he’s going to have to figure out how to deal with it. The bad guys are becoming bolder, because the systems that used to keep the in check are not working so well, anymore.
I’m not saying we’re Rome, and that everything is going to fall apart in the near future. What I AM saying is that I think we’re a little like the people who closed their eyes when it began to become apparent that what had been Rome wasn’t going to work any more. They may not have had any other choice, but I think we do. And I don’t think endless conferences and press releases touting law enforcement’s success against child pornography and the odd, inept local cybercriminal and all the other “noise” about how well governments are dealing with cybercrime are getting us anywhere. The world is changing, and I don’t see why we can’t accept that and try to adapt to it, instead of letting change happen and reacting to it. | <urn:uuid:6a6d4566-1f09-496d-a390-d9761bf7378b> | CC-MAIN-2017-13 | http://cyb3rcrim3.blogspot.com/2008/08/securing-places.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187206.64/warc/CC-MAIN-20170322212947-00100-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.956572 | 2,477 | 2.53125 | 3 |
A Gazetteer of Illinois In Three Parts Containing a General View of the State, a General View of Each County, and a particular description of each town, settlement, stream, prairie, bottom, bluff, etc.; alphabetically arranged - J. M. Peck. Gazetteers are wonderful, compact encyclopedias that provide detailed information about a specific place at a specific time. For family history researchers, gazetteers can hold the key to an ancestral mystery in their wealth of material relating to dates, settlements, county boundaries, population, and more. First compiled in 1834 and revised in 1837, this gazetteer provides a topographical and historical picture of Illinois in the early days. The author enthusiastically proclaims, "No state in the 'Great West' has attracted so much attention, and elicited so many enquiries from those who desire to avail themselves of the advantages of a settlement in a new and rising country, as that of Illinois; and none is filling up so rapidly with an emigrating population from all parts of the United States, and several kingdoms of Europe." This second edition was considered necessary due to the rapid changes of the state in just three years, including the creation of ten new counties. A new index of places increases the usefulness of this book.
(1834), 2007, 5½x8½, paper, index, 378 pp. | <urn:uuid:ce21a0e0-801d-4baf-b6e8-75a4cae4bcad> | CC-MAIN-2023-40 | https://heritagebooks.com/products/101-p0782 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00104.warc.gz | en | 0.926148 | 299 | 3.21875 | 3 |
Permanence. Permanent is the quality of lasting into the future. In paint, permanence is the length of time a pigment retains its original color. Pigments must not fade when exposed to daylight and must not change by reacting chemically with other pigments and materials used in paintings or the atmosphere. A permanent color observes both conditions. | <urn:uuid:c7c7da94-539b-4c68-85ee-e224f893abd1> | CC-MAIN-2020-24 | http://colorland.net/colorcom/englishbox/questionsbox/answers/permanence.htm | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432237.67/warc/CC-MAIN-20200603050448-20200603080448-00392.warc.gz | en | 0.934684 | 67 | 2.609375 | 3 |
The Igbo traditional wrestling is a very popular sport in the Igbo community. It is a practice and acknowledgement of skill and strength as well as promotion of indigenous language , culture , norms, values, and traditions by young, physically capable Igbo men. In Igbo Land a man is believed to prove his physical strength when he is able to fight off his aggressors and so wrestling shows strength and courage. Before the wresting season young men who will be competing train for months. A young Man who comes out Victorious in a traditional wrestling is admired and respected by all ,He is seen as a Warrior or a distinguished wrestler.
Traditional Wrestling sometimes are used to settle local dispute and conflict between two Villages .It is also Used to determine the right groom in cases where a young woman has many suitors, in such cases a wrestling match is arranged where all the suitors battle it out and whoever emerges victorious marries the woman .It is also a form of entertainment, usually the chief of the village and his chieftains are seated the villagers gather around the village square too to watch.
Wrestling matches take place in traditional rings ,a ring filled with sand which cushions their fall. A flute boy is present to provide special tunes that stir the heart ,this is believed to give added strength to the weak, spectators are also present to cheer the wrestlers on and encourage them. The winner of the contest takes home a prize. | <urn:uuid:a01d0644-eb0d-4a03-8a22-c65e247e2b6e> | CC-MAIN-2022-05 | https://www.facts.ng/culture/igbo-traditional-wrestling/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304760.30/warc/CC-MAIN-20220125035839-20220125065839-00701.warc.gz | en | 0.969191 | 291 | 2.75 | 3 |
Macaws are beautiful, brilliantly coloured members of the parrot family. Many macaws have vibrant plumage. The colouring is suited to life in Central and South American rain forests, with their green canopies and colourful fruits and flowers. The birds boast large, powerful beaks that easily crack nuts and seeds, while their dry, scaly tongues have a bone inside them that makes them an effective tool for tapping into fruits.
Macaws also have gripping toes that they use to latch onto branches and to grab, hold, and examine items. The birds sport graceful tails that are typically very long.
Macaws are playful and very active and have an energetic personality to go along with their size. This makes them a very challenging pet, they are very affectionate and loving birds and in turn require a vast amount of time, love and attention from there carers. These birds are very powerful and should not be taken on by an in experienced person.
Macaws are very clever and will quickly find ways to manipulate their owners with their big powerful beaks.
Noise level between 1 to 10:
Macaws are noisy birds naturally. Their vocalisations are loud and they can screech extremely loudly! The use this massive voice to contact there flock and warn others of danger so with this in mind we give the macaw a 9 on our scale.
Macaws are very big parrots and should not be taken on by the inexperienced keepers. They have big strong beaks and learn quickly that they can control their owners by lunging/biting. Macaws are very playful and need a lot of space to play. They need lots of toys to keep their minds active and to keep their beaks busy. Macaws can learn to speak but are not noted as the best talkers.
Macaws breeding season is early spring into summer, although some pairs can breed all year round in the right environment. The female macaw will lay about 2 – 3 eggs.
Some of the more common illnesses seen in Macaws are Proventricular Dilation disease (Macaw wasting disease); Psittacosis (chlamydiosis or parrot fever); bacterial, viral, or fungal infections; feather picking (results of boredom, poor diet, sexual frustration, lack of bathing); allergies; chewing flight and tail feathers by juveniles, beak malformations in chicks; Papillomas; kidney disease (gout); toxicity, heavy metal poisoning; lipomas in older birds.
Types of Macaws:
There are 17 species of macaws, and several are endangered. These playful birds are popular pets, and many are illegally trapped for that trade. The rain forest homes of many species are also disappearing at an alarming rate.
The most common in captivity are:
Blue & Gold macaw
Macaws as most other parrots need a good quality seed and fresh fruit and veg daily. Macaws also need a higher quantity of fat than most parrots but be sure not to over feed then fatty foods. Macaws will readily accept “human food” but make sure you know what is toxic to your parrot. | <urn:uuid:053d3a23-88c2-4773-bf07-18eb8ab00c77> | CC-MAIN-2018-39 | http://problemparrots.co.uk/parrot-types/macaws | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157569.48/warc/CC-MAIN-20180921210113-20180921230513-00549.warc.gz | en | 0.963484 | 639 | 3.59375 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.