text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Democracy involves constant struggles for the principle of publicity and against the secretive policies of various autocrats and oligarchs. Public opinion requires that citizens can form a reasoning public and have access to all relevant information.
Asymmetric relations of power are typically justified in terms of superior knowledge: those who “know better” should have a right to make decisions independently of what ordinary people want – and even act on their behalf without their knowing. But how do these autocrats know that they really “know better”? The only way to explain and justify the basis of their better knowledge is to make public validity claims that can be criticised and refuted by others. This means, however, that they are already committed to the core principle of publicity.
Citizens of democracies have the right to assemble and express and publish their opinion on any common issue or matter, on any res publica. By definition, the actions of the government and of all parts of the state have public significance. The fundamental precondition of both freedom of speech and principle of publicity is that citizens know what the authorities are doing and why. Therefore all relevant documents must be public.
It is possible to justify some exceptions to the principle of publicity on moral grounds, but these exceptions must be defined in a narrow and specific way. Secrecy may be justified only in terms that can be contested by citizens or their representatives at any time. Moreover, those who categorise something as “confidential” or “secret” must be legally responsible for their actions. Unjustified secrecy must be punishable.
In other words, documents should be “confidential” or “secret” only under very specific circumstances. The burden of proof lies always on those trying to conceal information from the citizens. It is the task of democratic media to make public everything that has been concealed from the citizens without adequate justification – and simultaneously make the authorities morally and legally responsible for their actions.
Since its founding in 2006, Wikileaks has used the World Wide Web in an ingenious way in its struggle for transparency. Wikileaks has globalised the struggle against secretive practices; it has contributed to the emergence of global publicity and democracy.
Many of those revelations and disclosures that have been of most interest to the media have concerned the United States. It is thus not surprising that Americans and many of their close allies have been agitated by Wikileaks. In the past the Russian tzar could send dissidents to Siberia, but the leaders of liberal-democratic states cannot avoid respecting, at least in public, the rule of law (which secrecy of course makes it possible to sidestep). It is often said that Lenin and Stalin were the last tzars.
The best known spokesperson of Wikileaks, Julian Assange, is an Australian citizen. Hence, the actions of the US, UK or Swedish authorities against Assange are delicate and sensitive to all kinds of diplomatic and legal considerations. Worldwide persecution is nonetheless quite plain to see. Tom Flanagan, a former adviser to the Canadian prime minister, went as far as to declare in late November 2010 that Julian Assange should be assassinated. A number of American politicians and media-gurus have demanded legal actions against Assange – without specifying the laws Assange would have breached – on the grounds that “this is a matter of national security and those guilty must be punished.” The tzars of the past would have understood this logic very well.
Even before the most recent wiki-disclosures, the situation had been so aggravated that, in the summer of 2010, Assange felt he could no longer travel safely to the US. Meanwhile, the Swedish police have opened an investigation on Assange in connection with sexual encounters with two women.
The Swedish legal process raises questions. The way charges were laid, investigated and dropped, only to be picked up again by a different prosecutor, seems strange, especially in the overall context of late 2010. Moreover, the allegations are so light and vague that the Interpol “red notice” appears rather odd (these red notices allow the warrant to be circulated worldwide with the request that the wanted person be arrested with a view to extradition).
Are the Swedish authorities acting impartially? We now know that parts of the allegedly neutral Swedish state, especially security and military organs, co-operated intimately with the Americans already during the cold war. Whatever the truth, it seems clear that the peculiar way the Swedish allegations have been managed – especially in the current context of worldwide controversies over Wikileaks – amounts to de facto persecution.
In November 2010 Assange told the media that he was considering applying for asylum in Switzerland. In December 2010, it was reported that the US ambassador to Switzerland, Donald S Beyer, had warned the Swiss government against offering asylum to Assange. Also the authorities of Ecuador probably faced strong pressure from the US following the deputy foreign minister Kintto Lucas’s comments about giving Assange residency with “no conditions... so he can freely present the information he possesses and all the documentation, not just over the internet but in a variety of public forums.”
Political asylum is an ancient juridical notion, under which a person persecuted for political opinions or activities or religious beliefs in his or her own country may be protected by another country. In Europe, the EU has set up a common policy on asylum; it would be a matter of some importance if an EU member state gave asylum to a person facing persecution on political grounds within Europe.
The best way to support the democratic principle of publicity in Europe and in the world as a whole is to offer asylum to Assange. It would be equally important to ensure the operational preconditions for Wikileaks, although Wikileaks itself must of course remain non-governmental in all senses of the term. Finland is not an ally of the US, through Nato or otherwise. It is time to turn Finnish perseverance into the service of global transparency and democracy, against foreseeable US arm-twisting. | <urn:uuid:d1db5002-aac1-4912-b954-98ef48523f55> | CC-MAIN-2014-49 | http://mondediplo.com/openpage/wikileaks-finland-should-offer-asylum-to-julian | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379555.49/warc/CC-MAIN-20141119123259-00046-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.964787 | 1,200 | 2.703125 | 3 |
Learn how to combine strumming and single note picking, not only for our arrangement of Green Day’s “Good Riddance (Time of Your Life)” but for any song you play.
Guitar Strumming Lessons
When you’re just starting out on guitar it can seem like your hands have a mind of their own. Maybe even two minds, since you have two hands. Take heart that beginners aren’t the only ones who sometimes have trouble with strumming patterns. These lessons and podcasts help simplify the question of rhythm patterns.
Nick Minnion concludes his three-part series on solving timing and rhythm problems with a look at playing various eighth note, triplet and sixteenth note rhythms.
In Part 2 of “The Learning Curve of Various Styles of Guitar,” Jamie Andreas looks at the skills needed to become a “strum and sing” guitar player.
While everyone will agree that using a metronome can help you develop and improve your rhythm, it is far more important for any musician to learn how to internalize the rhythm of a song or musical piece. Nick Minnion examines ways to help you do just that in Part 2 of “Solving Timing and Rhythm Problems.”
Whether you are a guitar teacher or a self-taught guitar player you are likely to come across problems related to playing in time and interpreting rhythm. In this series of articles TeachGuitar.com’s Nick Minnion looks at where these problems spring from and what can be done to address them.
If you know how to read notation, specifically the rhythm values of notation, you never have to worry about figuring out strumming patterns because everything is spelled out for you. In this lesson, we’ll use the main guitar parts from Jack Johnson’s song “Taylor” to demonstrate how easy strumming can be. | <urn:uuid:ca119bb9-30f8-4865-bd1c-e95b9e0413cd> | CC-MAIN-2018-43 | http://www.guitarnoise.com/topics/strumming/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513548.72/warc/CC-MAIN-20181021010654-20181021032154-00392.warc.gz | en | 0.951498 | 400 | 3.0625 | 3 |
Old Master Drawings: Guercino, Rubens, Tintoretto
22 October 2010 – 2 May 2011. A new exhibition explores why artists have drawn over the centuries – from copying other works to making life studies – and the role of sketching in the creation of artworks. Features 31 drawings from the Old Master collections of the Lady Lever and Walker Art Galleries.
Works by some of the great Italian Renaissance and Northern European artists between 1500 and 1800 are used to examine the reasons for producing drawings.
Some artists use drawing to loosen their wrists before starting painting or sculpting – rather like limbering up before taking part in sport. Others see drawings as a key part of the creative process, where ideas are expressed then retained or discarded. Others are simply doodling or amusing themselves and others.
Artists use drawing as a teaching medium and several examples are in this exhibition. Many artists enjoy the freedom that drawing gives compared to the demands of producing more formal works of art.
Sandra Penketh, head of the Lady Lever Art Gallery, says: “Throughout the centuries drawing has been at the heart of art. Drawing was the language of lines and tones that young artists were taught to use before being allowed to paint or sculpt.
“This exhibition shows how artists made use of drawing for different reasons. We see how artists approached their work, from a humorous sketch to a highly-finished altar design.”
Among the drawings are: Monster animal and peasant, by Giovanni Francesco Barbieri known as Guercino (1591 – 1666). He liked to show off his inventive imagination by drawing bizarre or fantastical creatures, to amuse himself and his friends. Guercino depicts an odd animal – part chicken, part human foot with dog’s ears – watched by a terrified peasant.
God creating Adam and Study for the circumcision are both by Peter Paul Rubens (1577 – 1640).
Rubens was just 23 when he copied God creating Adam painted on the ceiling of the Sistine Chapel in Rome by Michelangelo. His interpretation is more naturalistic and animated than the original.
Study for the circumcision was done five years later. This differs in details from the huge finished painting now on the High Altar of Genoa’s Church of the Gesu.
Study of the head of Giuliano de Medici by Michelangelo is by Jacopo Tintoretto (1518 – 1594). The artist admired Michelangelo’s Florentine Medici tomb statues so much that he kept a full-size copy of one in his Venetian studio. This drawing was made from the statue.
Other artists in the exhibition include Luca Signorelli, Giorgio Vasari (author of the Renaissance classic Lives of the Artists), Guido Reni, Claude Lorraine and François Boucher.
Fifteen of the works were bought in 1995 from the Weld Blundell Collection, formerly at Ince Blundell Hall, near Liverpool.
Old Master Drawings is the first of National Museums Liverpool’s Liverpool and the World exhibition series part-funded by the European Union. | <urn:uuid:d44c7e2c-574f-49c4-9794-6ac7863ac8ca> | CC-MAIN-2018-30 | http://www.artinliverpool.com/lady-lever-old-master-drawings/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591719.4/warc/CC-MAIN-20180720174340-20180720194340-00257.warc.gz | en | 0.957358 | 647 | 3.03125 | 3 |
Definition - What does Oechsle mean?
Oechsle is the name for the scale used in Germany to measure the amount of sugar and other solid particulates in grape juice. It helps determine the ripeness and potential alcohol during crush. It is based on specific gravity and the density of the must, similar to the hydrometer scale.
WineFrog explains Oechsle
When the Oechsle scale is used, it is able to measure the amount of dissolved sugar in grape juice (must).
The Oechsle scale is also the most basic form for classifying German wines. All German (and most Austrian) wines are categorized according to the original sugar density of the grape must during harvest. The wines are ranked as follows:
- Kabinett - 67-82o Oe
- Spätlese - 76-90o Oe
- Auslese - 83-100o Oe
- Beerenauslese and Eiswein - 110-128o Oe
- Trockenbeerenauslese - 150-154o Oe | <urn:uuid:39663d31-d352-437c-9332-14d5c87bec6b> | CC-MAIN-2020-50 | https://www.winefrog.com/definition/499/oechsle | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141186414.7/warc/CC-MAIN-20201126030729-20201126060729-00386.warc.gz | en | 0.902278 | 229 | 3.359375 | 3 |
In spring, it’s not uncommon for a cloak of thick fog to cover the Yellow Sea. The shallow sea, which has a number of busy ports, usually sees 50 foggy days a year; some weather stations in the area have measured fog on up to 80 days.
One of those days was March 28, 2012, when the Moderate Resolution Imaging Spectroradiometer (MODIS) on the Aqua satellite captured this natural-color image (top) of a fog bank hugging the Korean coast. The low-lying cloud formation covered an area roughly the size of the Korean Peninsula, stretching nearly 900 kilometers (400 miles) from Korea Bay to the Chinese city of Shanghai.
The fog is generally thickest along the edges, where the cloud surface appears quite smooth in the satellite image. Closer to the middle, the surface has a more textured appearance (see lower image), indicating possible convection and the possible presence of stratocumulus clouds. These clouds form higher in the atmosphere than fog and do not affect visibility at the sea surface. An aerosol plume, likely haze emanating from industrial areas in China, is also visible and has caused the lower half of the cloud to appear slightly grayer than the upper half.
Atmospheric scientists Peter Norris and Gary Partyka of NASA’s Goddard Space Flight Center simulated the meteorological conditions that might create such a cloud formation with the Goddard Earth Observing System (GEOS-5) model. They found that it was likely advection fog.
This type of fog generally forms when warm, moist air is pushed by winds over a cooler surface. In this case, northeasterly winds pushed a tongue of warm air out over the cooler Yellow Sea. (The water is cooler because sunlight warms it less quickly than the land surfaces surrounding it, and because ocean currents off the west coast of Korea tends to bring cold water to the surface).
According to research conducted by scientists at the Ocean University of China, the season for advection fog usually starts in early April and ends in August as a result of shifting regional wind patterns. Generally the fog lasts about two days; but once in 1977, an exceptionally long-lasting fog event spanned 10 days.
Sea fog can pose a significant hazard to ships around the Yellow Sea, with low visibility leading to accidents. About half of the collisions at the large Chinese port of Qingdao are caused by fog, according to statistics compiled by the Chinese government.
The sharp western edge of the fog cloud is another compelling aspect of the image. According to Shang-Ping Xie, an atmospheric scientist at the University of Hawaii, MODIS images of sea fog in the Yellow Sea often show sharp edges, but the mechanism that causes them to form isn’t clear. “It’s an area for future research that requires in situ observations and would be a good topic for future field campaigns,” Xie noted in an email.
- Zhang, S. (2009, April 26) Seasonal Variations of Yellow Sea Fog: Observations and Mechanisms. Journal of Climate. 22 (6758)
- Zhang, S. (2006) Sea Fog Research of China: A Review (pdf). China National Report on Physical Sciences of the Oceans.
- Cho, Y. (2000, March 20) Fog Around the Korean Peninsula. Journal of Applied Meteorology. (39) 2473-2479. | <urn:uuid:1f4a6fce-8f36-408a-82b8-7bd5a6b0d3f9> | CC-MAIN-2016-26 | http://visibleearth.nasa.gov/view.php?id=77608 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00083-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.913988 | 701 | 3.890625 | 4 |
Birds choose to lay their eggs in a phenomenal variety of places—from bare rocks and ground to twig platforms to hanging baskets sewn together with spider silk. In forested areas, another option is the cavity nest. Around 85 North American bird species raise their young in tree cavities. In some cases, the bird itself makes […]Share
Subscribe to PostsGet email notifications when a new post is published on this site. | <urn:uuid:826f46d8-ee09-4c76-a6bb-ab913b86e94f> | CC-MAIN-2017-13 | http://songbirdphoto.com/wordpress/2012/05/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190134.67/warc/CC-MAIN-20170322212950-00565-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.922006 | 86 | 3.046875 | 3 |
Encyclopedia of Indian Natural History: Centenary Publication of the Bombay Natural History Society, 1883-1983
R. E. Hawkins, Doris Norden, Bittu Sahgal
Bombay Natural History Society by Oxford University Press, 1986 - Nature - 620 pages
To mark their centenary, the Bombay Natural History Society has compiled a one-volume encyclopedia devoted to the teeming plant and animal life of the entire subcontinent: India, Pakistan, Bangladesh, Sri Lanka, Burma, Bhutan and Nepal. Written in an easily accessible style, the encyclopedia includes over 550 articles by 96 contributors in 22 subject categories, each edited by a well-known authority. There are richly illustrated entries on general topics such as altruistic behavior, mating systems, animal communication and parasites; on the more commonly known flora and fauna of India, including tigers, pythons, rubber trees, bamboos and elephants; and on exotica such as Bandicoot rats, dugongs, skinks, mudskippers and flying snakes. Revealing the vast range and complexity of life forms and all their wonderful adaptations, the Encyclopedia of Indian Natural History provides general readers, students and conservationists with a fascinating and informative survey of one of the most exotic natural habitats in the world.
76 pages matching female in this book
Results 1-3 of 76
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Indian subcontinent and neighbouring areas Inside front cover 1 A moist deciduous forest facing page
Amphibians and reptiles
36 other sections not shown
adapted adult animals aquatic Assam bamboo Bangladesh bark bats bees beetles behaviour belong birds body breeding brown Burma burrows called carnivorous cells chital cm long coast colour common covered crabs crustaceans deer developed dhole dorsal fin eggs elephant feed female fish flies flowering plants flowers forest frogs fruits genera genus glands grass grow habit habitat Hanuman langur hills Himalaya host hunting Hymenoptera India Indian species Indian subcontinent insects known langur large numbers larvae leaf leaves legs live lizards males mammals mating molluscs monsoon moths mountain mouth natural nest occur organs pair Pakistan parasites pests plants predators prey produced range region river rocks rodents roots sand season seeds shell snakes soil spiders Sri Lanka stem subcontinent surface tail temperature termites tiger tree tropical usually vegetation wasps Western Ghats wild wildlife wings yellow young | <urn:uuid:bd259352-60c3-44e0-9732-825000002b97> | CC-MAIN-2017-39 | https://books.google.com/books?id=Hfc9AAAAYAAJ&q=female&dq=related:LCCN2005310198&source=gbs_word_cloud_r&hl=en | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689471.25/warc/CC-MAIN-20170923033313-20170923053313-00137.warc.gz | en | 0.826585 | 492 | 3.21875 | 3 |
Mothercraft: Building Connections Manual
The Building Connection: Supporting Community-Based Programs to Address Interpersonal Violence and Child Maltreatment toolkit has been developed by Mothercraft with funding from the Public Agency of Canada, primarily as a support to CAPC, CPNP and AHSUNC programs. It has been designed to also have wider application for other community-based programs and service providers, as well.
The toolkit has been developed to support service providers in community-based programs who work with women and children who may be living with Interpersonal Violence (IPV). It is directed specifically towards work with women and children, and has been designed to work from a trauma-informed perspective and to develop trauma-informed relationships that cultivate safety, trust, and compassion. For programs who serve men and boys, Section 9 (Online resources) includes links to specific resources for engaging and providing support to them.
The toolkit starts from the premise that “violence in adult relationships is often connected to violence and abuse in other relationships. Mothers who experience violence in adult relationships have often experienced childhood abuse and trauma, or have witnessed violence as they grew up in their own families. The trauma of IPV often begins in childhood, and continues in adult relationships.”
Section 1: Setting the Stage for understanding IPV
The toolkit points out that “IPV is complex and multi-faceted, just as responses to IPV by community-based services need to be.” The authors point out that:
- IPV can and does occur in all ages, races, cultures, and socioeconomic, education, occupation and religious groups. But it is more likely to occur with certain groups of women.
- It can happen in heterosexual or same sex relationships.
- It is linked to social beliefs, attitudes and stereotypes about men and women, and is a result of the abuser’s actions. It is not the fault of the woman or the relationship.
- Many people (both men and women) in IPV relationships have never had the opportunity to experience healthy relationship, as children or as adults.
The authors explain that IPV can take many forms, including emotional abuse, economic abuse, sexual abuse, spiritual abuse, physical abuse, criminal harassment/stalking, and digital (or electronic or technological) abuse. They note that, whilst IPV is different from conflict between partners, “it is important to treat conflict as a red flag for the possibility of violence and abuse. Look for signs that conflict is escalating into power and control issues that are abusive and can lead to violence. Let a woman know you are willing to listen and support her if she chooses to disclose IPV.” They also note that, whilst research findings on prevalence of IPV can be difficult to interpret as “it depends on who is conducting the research and how the questions are asked”, what is known for sure is that:
- Half of all women in Canada have had at least one incident of physical or sexual violence since the age of 16, so it is a common experience for women.
- Most women with abusive partners do not involve the police, meaning that reported rates of IPV do not give an accurate picture.
- Children are often affected. About half of women going to a shelter bring children with them, and two thirds of those children are under 10 years of age.
- The most serious form of IPV is intimate partner homicide. Most victims are women. Also, death threats against women are common.
- The research findings indicate that, whilst both men and women experience IPV, “the research shows that women experienced more severe forms of IPV and women are more afraid of the harm that abusers cause”.
The toolkit cites research evidence that some women are more likely than others to experience IPV, including:
- young women (under 25 years old) with young children
- women recently separated or in the process of ending a relationship
- women who witnessed IPV in childhood
- women in common-law (rather than legal) marriages
- Indigenous women
- women from cultures when men’s power over women is the norm
- poor women, unemployed women, and marginalized women
- women who live with partners who have heavy alcohol/substance use
- lesbian, bisexual, transgender and two-spirited women
- women with disabilities
- pregnant women
Youth (under 25), lower education/income, history of childhood abuse/childhood experience of IPV, heavy alcohol/substance use, negative/violent role models, past history of abusiveness, and acceptance of traditional gender roles are violence risk indicators for men in relationships.
The toolkit notes that IPV is a form of trauma, and is connected to mental health problems for women, including depression, anxiety disorders, and PTSD. IPV can also be a causal factor in poor self-esteem, sleep disorders, eating disorders, phobias and panic disorders, and misuse of alcohol and other drugs.
Impacts of trauma and IPV can include:
- avoiding situations that bring the IPV to mind
- feeling detached from others
- focusing on behaviours to cope and ensure survival, including minimizing the violence/protecting the abuser/problematic alcohol or drug use/using aggression as self-defence/remaining in the abusive relationship
Section 2: Impacts of IPV on mothering and on child development
The toolkit points out that there are many ways that IPV impacts on a woman’s ability to parent, including:
- The woman comes to believe she is an inadequate mother.
- The abuser threatens to report the mother to child protection services.
- The woman comes to believe the abuser’s excuses for IPV and reinforces them with her children.
- The woman loses the respect of her children.
- The woman changes her mothering style in response to the abuser’s parenting style.
- The mother-child bond is compromised.
- A mother’s ability to manage is thwarted or overwhelmed.
- Many women use survival strategies that can have negative impacts on children.
- The woman is forced to compete for her children’s loyalties.
They note that, when partners separate, the violence can continue or escalate. The continued abuse can include:
- Undermining her mothering
- Threats to obtain custody
- Abusive behavior during child exchanges
- Physical/sexual abuse of the children during visitation
- In extreme cases, abduction or homicide
For service providers working with women and children, the toolkit identifies the following ‘red flags’:
- She defends, excuses, minimizes, or apologizes for the inappropriate actions and words of her partner.
- She seems strenuously resistant to the suggestion that her partner be involved in any activities at your program.
- A mother lacks confidence in her ability as a parent, perhaps needing far more reassurance than other parents in your program.
- She describes herself as overly permissive or indulgent to compensate for the authoritarian parenting style of her partner
- She describes being overly strict with her children to keep them from annoying her partner
- She seems overwhelmed in her role as a mother, and is often fatigued, depressed, jumpy or constantly angry with her children
- You have reason to believe she is abusing substances
- You have reason to believe she is using harsh discipline or perhaps maltreatment
- Her children display disrespectful behavior towards her and/or her children seem to take the caregiver role with her
(Adapted from Professor’s Resource Guide to Teaching About Woman Abuse and its Effects on Children).
The toolkit discusses Adverse Childhood Experiences (ACEs) and how children experience IPV, and the impacts, challenges and risks faced by children who live with IPV, noting:
- Children under 5 are more likely to live in a household where IPV occurs than are children in any other age category.
- The longer children live with IPV, the more likely this trauma will affect brain development and their ability to learn.
- Children who live with IPV are usually aware of it, even though adults often think children don’t know.
- Infants and toddlers have reactions to living with IPV, too.
- Older children might try to protect their mother.
- Abusers might use children as a control tactic against mothers.
- Children often experience strong mixed feelings toward the abuser.
- Many (although not all) children who live with IPV can have a greater possibility of physical, behavioural, and social problems.
- Children who live with IPV have twice as many mental health issues (especially PTSD) as children from non-violent homes.
- Some children who live with IPV don’t have higher rates of problems (however, “the ACE Study suggests, the impact of IPV is cumulative. This means that the longer a child lives with IPV or lives with other adverse experiences, the more likely it will harm the child’s development.”)
- Children can be supported to become resilient: “Most children who live with IPV can recover and heal from their experience with early intervention and support. For children living with IPV, one of the most important things that helps them do well is a strong relationship with a caring, non-abusive mother. Remember: helping mothers helps children.”
- Service providers can promote resiliency in children: “There’s a lot service providers can do to promote resilience. One way is to support women in their mothering capability. By supporting women with their mothering, service providers will also be helping their children. And providing a caring, consistent and structured environment within community-based programs helps children feel safe and supported….In particular, service providers can support mothers to form secure attachment bonds and develop positive mothering strategies. This will help improve the lives of children who live with IPV.”
Section 3: Identification of IPB and prevention of trauma responses
This section addresses in detail the following areas:
- Understanding why mothers experiencing IPV stay in the relationship
- Parenting by mothers living with IPV
- Understanding a mother’s actions and behaviours
- How service providers can respond to women living with IPV, including:
- Emphasize confidentiality
- Ensure privacy
- Remain supportive
- Avoid judging
- Allow women to tell their stories at their own pace
- Assist women to make safety plans
- Help women access information about resources
- Begin with the assumption that her behavior is logical
- Tell her you understand how difficult it can be to mother while living with IPV
- Reassure her
- Ask what she’s been doing to keep herself and her children safe
- Let her know how important she is to her children’s resiliency
- Help her identify and connect with social supports
- How organizations can respond to women living with IPV, including:
- Develop and implement referral procedures
- Ensure that staff are educated about and trained in appropriate responses to IPV
- Support staff to be alert to the cues and signs
- Ensure women are asked about IPV in sensitive, safe and appropriate ways
- Be alert to the high rate of substance use and/’or mental health issues
- Ensure that program space is physically and emotionally safe for women and children
It also looks at ways of supporting children through identification of IPV and prevention of trauma responses, looking at ways children are affected by living with IPV, signs a child might be living with IPV, how service providers can support children identified as living with IPV, and ways of building resilience and preventing trauma responses in children.
Section 4: Supporting safety for women and children living with IPV
This section addresses ways in which community-based programs can support safety for women and children living with IPV.
Laying the groundwork for supporting safety, including:
- Positive messages about mothering
- Positive messages for mothers about their children
Ways to support a woman who makes a disclosure:
- Make sure you know and understand the reporting requirements
- Let the woman know the limits of confidentiality
- Allow the woman to tell her story
- Reassure and validate her feelings
- Do not criticize or speak negatively about the abuser
- Do not make commitments or promises you can’t keep
- Let the woman know what you’re going to do
Safety planning for women, recognizing that she is the expert on her life, every woman is unique, and the need to proceed with caution:
- Let her know she is not alone
- Listen and don’t offer advice
- Safety is the priority
- Encourage her to develop a safety plan
- Reinforce key messages:
- Abuse is never warranted and it is not her fault
- Her safety and the safety of her children is always the most important issue
- She is not responsible for changing her partner’s behavior
- Apologies and promises will not end the abuse
- It is a crime to physically or sexually abuse or stalk a partner
The toolkit gives information on how to understand the situation from a child’s perspective, and outlines the reporting responsibilities and requirements for all service providers.
Section 5: Developing trauma-informed responses that support women and children living with IPV
This section outlines trauma and immediate and prolonged reactions to trauma, and identifies why trauma-informed practices are so important in responding to IPV. The toolkit reinforces that “trauma-informed practices are recognized as a best practice approach for working with women and children living with IPV.” Trauma-informed practices:
- Acknowledge the impact of trauma on women and children….
- Are an overall good practice….
- Enhance the conversation and the practice of service providers….”
The toolkit emphasizes that trauma-informed practices help service providers destigmatize women, and points out that “there are two important points for community-based organizations to remember when they are trying to become trauma-informed:
- Service providers do not need to be specialists in trauma-specific treatment in order to implement trauma-informed practices.
- Trauma-informed practices do not require disclosure of details about a woman’s experiences of trauma. “The focus of trauma-informed practice is on stabilization, safety, and understanding the links between trauma and mothering – not on inquiring or questioning the details of the woman’s experience.”
The toolkit states that, when trauma-informed practices are not implemented, services are less effective. “When service providers don’t use trauma-informed practices or don’t understand the impact of trauma, this can:
- Interfere with the way they respond to women who are seeking help…
- Hamper engagement…
- Inadvertently re-traumatize women….”
The toolkit stresses: “Becoming trauma-informed creates less, not more, work for service providers.”
Detailed advice is given on how to enhance emotional safety for women through a variety of means:
- Understand emotional safety
- Provide a safe and soothing space
- Help women manage their feelings
- Provide information about how early experiences of trauma have impacted their mothering
- Provide clear information and avoid surprises
- Help women feel comforted and in control
Some of the ways listed through which community-based service organizations can provide trauma-informed support to children who live with IPV include:
- Create calm, stable, and predictable environments
- Support mothers to help their children manage their emotions
- Be a role model
- Work collaboratively with other services for children in your community
This section gives suggestions on how to take steps to make community-based programs trauma-informed, including:
- Reflect on your program’s practices and polices
- Create an environment with regular opportunities to reflect
- Engage with co-workers to recognize the ways in which tensions that arise within your programs (among women receiving services and among program staff) can be related to staff feelings about, and reactions to, trauma, and develop ways to safely and respectfully address these issues with each other when they arise.
- Reflect on the impact of the work that you do on your own life, remembering that vicarious trauma can interfere with the ability to support and engage with women and children.
- Examine personal biases and experiences.
Section 6: Role of community-based programs
Noting that IPV is a complex issue that requires a multi-faceted approach, this section looks at some ways community-based programs can respond to mothers and children living with IPV, including:
- Developing positive practices using a trauma lens
- Understanding that IPV can be transmitted from generation to generation
- Developing collaborative relationships with women
- Building collaborative community partnerships
- Developing culturally relevant referrals and linkages
- Advocating with service providers and systems
- Above all, listening to and believing in women
The toolkit outlines specific ways in which community-based programs can develop practices to work with child protection services to support the safety of both children and mothers, and gives a list of questions for organizations to utilize to develop practices that support women and children living with IPV.
The toolkit ends with the following statement:
“Community-based programs that provide a caring, consistent, and structured environment help mothers and children feel safe and supported. Anything that service providers can do to support women who live in, or have left, situations of IPV to form secure attachment bonds and to develop positive mothering strategies can improve the lives of mothers and children who live with IPV. Similarly, when community-based organizations are able to develop strong and effective relationships among a wide array of helping services, the system as a whole becomes supportive of and responsive to mothers and children who live with IPV.”
Sections 7, 8 and 9 provide a detailed list of references used in compiling the manual, a bibliography for the literature review, and a selected list of online references. | <urn:uuid:5f1623e0-06d6-4a10-8372-3f2a9e6c1941> | CC-MAIN-2019-43 | https://www.keepingintouchbc.com/blog/2018/1/3/mothercraft-building-connections-manual | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986666959.47/warc/CC-MAIN-20191016090425-20191016113925-00025.warc.gz | en | 0.953996 | 3,754 | 2.515625 | 3 |
Sukkot Theology and Themes
One of the more poignant images is viewing the lulav and etrog as symbolic of different Jews within our community, each of value yet each expressing their Judaism differently. On Sukkot we symbolically unite all these Jews together and celebration that although as individuals we are so different, as a nation we are unified. We joyously share our celebration with God.
Another name for the holiday of Sukkot is zeman simchateinu, “the time of our rejoicing.” Clearly one rejoices over the harvest just completed, but more than that, there is a sense of priorities that are being established through the images of the holiday.
Dwelling in a sukkah forces us to remove ourselves from the materialistic things that normally fill our environment. Most people try to fill their homes with the most beautiful and expensive articles within their reach. We surround ourselves day to day with our materialistic accomplishments and dwell in their midst. Sukkot forces us to leave those behind and return to a much simpler, almost nomadic existence. Our priorities refocus onto affirmations of nationhood and spirituality while we are reminded how fleeting wealth can be.
Sukkot returns us to a time in Jewish history when the entire nation was homeless and wandering. In the desert, the ancient Israelites often asked neighboring nations for assistance in their travels, but were often turned down. To show that we have learned form the travails of the past, it is traditional to invite others to share a meal in our sukkah as we remember how central compassion must be in a world where material things so easily come and go.
In a modern world it can sometimes be difficult to remember how dependent each part of nature is on the other. The holiday of Sukkot reinforces the notion that all of nature relies on a relationship with the Divine Creator and that humanity must play its part in securing favourable decrees and harmony within nature. From the individual to the community to the world at large, the holiday of Sukkot broadens our perspectives and reminds us to check our priorities.
Did you like this article? MyJewishLearning is a not-for-profit organization. | <urn:uuid:aaeea378-5f26-40a6-8f7d-0dc4fd13a4fd> | CC-MAIN-2013-48 | http://myjewishlearning.com/holidays/Jewish_Holidays/Sukkot/Themes_and_Theology.shtml?p=2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164019123/warc/CC-MAIN-20131204133339-00018-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.953636 | 454 | 3.59375 | 4 |
Sweet potatoes are beneficial for women both during and after pregnancy. Here are two recipes just in time for Thanksgiving.
Why Eating Sweet Potatoes is Healthy for Pregnancy
There are a handful of vitamins and minerals contained in a sweet potato. The health benefits that it provides can help you and can be passed onto your developing embryo. For instance, iron from a sweet potato can help your body make more blood for you and your baby. It can also assist your cells in transferring oxygen back and forth. The potassium contained in sweet potatoes will reduce muscle soreness in your legs and back as the baby grows, as well as any muscle contractions. A gradual increase in the consumption of fiber can reduce constipation, help with proper digestion and assist in weight control during pregnancy. It has also proven to help decrease the chances of your child developing asthma and allergies early on.
The vitamins contained in a sweet potato include A, C and B6. Vitamin A plays a significant role in embryonic growth. It is used to develop parts of the body like the eyes, lungs and bones. It is important to consume Vitamin A right before giving birth, because it is needed for postpartum tissue repair. This health benefit can help strengthen your immune system while also fighting infections. Vitamin C is used to help you and your baby develop collagen. Collagen is needed for bones, skin, cartilage and tendons. Lastly, Vitamin B6 is necessary to help both you and your child metabolize carbohydrates and proteins. It does even more for your baby by playing a big role in the development of the brain and nervous system.
Why Eating Sweet Potatoes are Healthy Postpartum
A sweet potato is helpful in promoting a healthy pregnancy, but it can also be beneficial after giving birth. It’s normal to feel depressed and drained of energy following your baby’s arrival. Consuming sweet potatoes can help you feel healthier. It also helps to increase the production of breast milk.
Sweet Potato Recipes
Now that you know how beneficial a sweet potato can be, here are a couple of recipes that allow you to prepare them just in time for Thanksgiving.
- 3 tbsp flour
- 2 1/2 cups low-fat milk
- 1 cup shredded Gruyere cheese
- 1/4 tsp white or black pepper
- 1 sweet potato or 6, depending on serving size, cut into 1/4″ slices
- 1/2 tsp salt
- 1 cup of a finely chopped small onion
- 2 tsp chopped fresh rosemary
- 3 tbsp extra virgin olive oil
1. Put oven racks on the highest and lowest third positions. Preheat to 425°F.
2. Take your pieces of sweet potato, beneficial for a healthy pregnancy, and put them in a bowl. Add 1 tbsp of oil and toss around until the pieces are thoroughly coated. Spread and divide the pieces over two pans. Put them in the oven for 20 to 25 minutes. Switch the pans halfway through.
3. While those pieces are roasting, put the last 2 tbsp of oil in a saucepan over medium heat. Add the chopped onion and stir it periodically for 5 to 8 minutes. Add the salt, pepper and flour. Stir for another minute. Add the milk. While stirring, scrape up any brown pieces sticking to the bottom of the pan. Raise the heat to medium-high. Stir for 3 to 5 minutes.
4. Take out the cooked pieces of sweet potato once the time is up. Get your broiler, and put one pan of pieces in a broiler-safe dish. Cover them with half of the sauce and cheese. Top that with the other half of the sweet potato pieces, then the rest of the sauce and cheese. Broil while staying close by. You must watch it until the sauce bubbles and the cheese starts browning. This could range from 1 to 5 minutes. Turn off the broiler and let it stand for 10 minutes. Top the meal with rosemary and it’s ready to be served.
- pinch of ground nutmeg
- extra salt and cinnamon or sugar for topping
- 1 sweet potato or 6, depending on serving size (any amount is beneficial for a healthy pregnancy)
- 1 cup unsweetened apple sauce
- 2 tsp ground cinnamon
- 1 tsp sea salt
- 1 cup chopped pecans
- 3 tbsp coconut oil or melted butter
- Preheat the oven to 450°F.
- Take each sweet potato and wrap them in aluminum foil. Leave them in the oven for 1 to 1 1/2 hours. For a healthy pregnancy, it’s important to eat sweet potato cooked rather than raw. This is because you get more nutrition from it compared to eating it immediately after it’s been picked.
- Remove each sweet potato from the oven. Lower the oven heat to 375°F.
- Cut the potatoes in half. Let them cool.
- Peel off the skin.
- Put the potatoes and applesauce in a blender. Blend until the mixture is smooth.
- Add the coconut oil or butter, salt, cinnamon and nutmeg to the mixture. Blend together until everything is combined.
- Put the mixture in a 9″ baking dish. Add the extra salt and cinnamon or sugar as well as the pecans.
- Leave the pan in the oven for 25 to 30 minutes. When the potatoes start to bubble, take the pan out of the oven.
- Let it stand for 10 minutes, and then serve.
The most common foods people look forward to eating for Thanksgiving is stuffing and turkey. Now, you can add sweet potatoes to that list because you can make one of the two deliciously healthy dishes. These dishes will supply you and your baby with a nice dose of vitamins and minerals. Feel free to share your cooked sweet potatoes with other expecting mothers. Talk to your family at Thanksgiving about why your dish encourages healthy pregnancies. | <urn:uuid:b4ce516f-4db5-4ebe-afd5-5b11bb764a80> | CC-MAIN-2018-51 | https://www.healthypregnancy.com/sweet-potato-recipes-for-a-healthy-pregnancy/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827963.70/warc/CC-MAIN-20181216165437-20181216191437-00046.warc.gz | en | 0.924227 | 1,213 | 2.59375 | 3 |
One of the first children in Britain to receive pioneering gene therapy for an immune system disorder has developed leukemia as a result of his treatment.
The boy, 3, is the first gene therapy patient in Britain to fall ill with leukemia, a known risk of the treatment. A similar gene therapy program in France has caused four cases of the blood cancer, and one death.
The child, who has not been named, was born with X-linked severe combined immunodeficiency (X-SCID), a genetic condition in which the immune system fails to develop. It is often known as “bubble baby syndrome," as sufferers are shielded against germs in a sterile pouch.
Two years ago, he became the eighth patient to be treated with the gene therapy program at the U.K.'s Great Ormond Street Hospital. The program uses a genetically modified virus to correct the faulty DNA that causes X-SCID.
His immune system responded “extremely well” to the procedure but leukemia was diagnosed last month, the hospital said. This is an acknowledged risk of gene therapy, as inserting the replacement DNA can trigger another gene that promotes cancer.
None of the other 14 children to have had gene therapy for X-SCID and a similar condition, known as ada-SCID, has developed leukemia so far, the hospital said. The cancer, however, has been diagnosed in four of the 11 patients involved in a French trial, one of whom has died while three are in remission.
Professor Adrian Thrasher and professor Bobby Gaspar, who treated the boy, said in a statement: “Our first thoughts are to secure the best treatment for this child and to support his family at this very difficult time. This unfortunate event is the first such development on our program. As with any medical treatment there are associated side-effects. The development of leukemia is now a recognized side-effect in this study, though the risks are balanced by the severity of the condition and the lack of good alternative treatments for X-SCID.
They pointed out that 80 percent of children with leukemia made a full recovery, and there was every chance that the child would survive the cancer and be cured of X-SCID.
The immune system disorder is always fatal without treatment. The only alternative to gene therapy is a bone marrow transplant, which rarely achieves satisfactory results unless a fully matching donor is available. | <urn:uuid:95f82e3c-ffc5-446b-a355-8e8a352af492> | CC-MAIN-2017-22 | http://www.foxnews.com/story/2007/12/18/boy-living-in-bubble-develops-leukemia-from-experimental-therapy.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607649.26/warc/CC-MAIN-20170523183134-20170523203134-00142.warc.gz | en | 0.978957 | 490 | 3.0625 | 3 |
Presentation on theme: "Measures of Impact 18 th EPIET/EUPHEM Introductory Course September-October 2012 Lazareto, Menorca, Spain Ioannis Karagiannis."— Presentation transcript:
Measures of Impact 18 th EPIET/EUPHEM Introductory Course September-October 2012 Lazareto, Menorca, Spain Ioannis Karagiannis
2 Objectives To define measures of impact To calculate the attributable risk -among the exposed -in the population Eventually, make sense of stuff
3 Scenario You are in charge of health promotion Preventing automobile-related deaths Limited budget best reduction of deaths Evidence: retrospective cohort study: causes of automobile-related deaths
4 Relative Risks Best reduction of deaths? Prevent drink & drive? Prevent speeding? Relative Risk Driving too fast5 Driving while drunk11
6 Measures of Impact Provide information about the public health impact of an exposure Contribution of an exposure to the frequency of disease Several concepts -Attributable risk (AR) -Attributable risk among exposed (AR%) -Attributable risk in the population (PAR) -Preventable fraction among exposed (PF)
7 Attributable Risk (AR) (synonyms: Risk Difference) Quantifies disease burden in exposed group attributable to exposure in absolute terms AR = R e - R u Answers: -what is the risk attributed to the exposure? -what is the excess risk due to the exposure? Only use if causality exposure outcome
8 Attributable Risk (AR) AR = R e - R u Outcome a cd yes no exposed not exposed b Attributable Risk = a a+b c c+d a+ba+b c+dc+d a a+b c c+d - Attributable Risk = R e – background risk = R e = R u
9 Attributable Risk (AR) Risk 0.01 0.05 Risk of death by speeding Risk of death by driving below the speed limit How high is the added risk of dying caused by the exposure speeding? Added risk ? exposure: speeding 0.00
10 AR Speeding Outcome DeadAlive Risk Risk Ratio Risk Difference Speeding Yes10019002000 0.05 50.04 No8079208000 0.01 180982010000 AR (speeding) = 0.05 - 0.01 = 0.04 speeding increases the risk of dying by 0.04. Four out of 100 speeding drivers will die in addition to normal (=background) because they drove too fast.
11 AR Drunk driving Outcome DeadAlive Risk Risk Ratio Risk Difference Drunk Driving Yes 452553000.15 110.14 No 135956597000.01 180982010000 AR (drunk driving) = 0.15 - 0.01 = 0.14 drunk driving increases the risk of dying by 0.14. Fourteen out of 100 drunk drivers die in addition to normal (background) death by driving because they were drunk while driving."
12 Summary so far MeasureSpeedingDrunk driving Relative Risk511 Attributable Risk0.040.14
13 Attributable Risk Percent (AR%) (synonyms: Attributable Fraction) Attributable risk expressed as a percentage of risk in the exposed population Proportion of disease among the exposed which: -can be attributed to the exposure -could be prevented by eliminating the exposure AR% looks at exposed population, not the total population
14 Attributable Risk Percent (AR%) Example speeding: What proportion of all speeding deaths (denominator) died because they drove too fast (numerator)? deaths caused by speeding deaths of all who drove too fast AR% = x 100
16 AR% Speeding drivers Outcome DeadAlive RiskAR% Speeding Yes10019002000 0.05 0.05-0.01 = 80% No8079208000 0.01 0.05 180982010000 AR% (speeding) = 80% 80% of all people who died while driving too fast, died because they drove too fast.
17 AR% Drunk drivers Outcome DeadAlive RiskAR% Drunk Driving Yes 452553000.15 0.15-0.01 = 93% No 135956597000.01 0.15 180982010000 AR% (drunk driving) = 93% 93% of all people who died while being drunk, died because they were drunk.
18 Summary so far MeasureSpeedingDrunk driving Relative Risk511 Attributable Risk0.040.14 Attributable Risk%80%93%
19 AR & AR% in Case-Control Studies No direct risk estimates in case-control study -AR (risk difference) and AR% calculation IMPOSSIBLE! Relative Risk - 1 Relative Risk AR%= x 100
20 AR & AR% in Case-Control Studies No direct risk estimates in case-control study -AR (risk difference) and AR% calculation IMPOSSIBLE? If odds ratio approximates relative risk, then Relative Risk - 1 Relative Risk AR%= x 100 Odds Ratio - 1 Odds Ratio AR%= x 100
21 Population Attributable Risk (PAR%) Proportion of cases in the total population attributable to the exposure Proportion of disease in the total population that could be prevented if we could eliminate the risk factor Determines exposures relevant to public health in community Only use if causality exposure outcome
22 Population Attributable Risk (PAR%) Example speeding: What proportion of all people who died (denominator) died because they drove too fast (numerator)? deaths caused by speeding total deaths in the population PAR% = x 100
23 Population Attributable Risk (PAR%) Risk (total pop) - Risk (unexposed) Risk (total pop) x 100 PAR% = p (RR - 1) p (RR - 1) +1 x 100 PAR% = p = proportion of population exposed PAR% = p(cases) x AR% p(cases) = proportion of cases exposed
PAR(%) according to the relative risk for various level of exposure frequency among cases 0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0% 90.0% 100.0% 12345678910 Relative risks Population attributable fraction Pe 10% Pe 25% Pe 50% Pe 75% Pe 100% (AFe)
25 PAR% Speeding Outcome DeadAlive Risk Speeding Yes10019002000 0.050 No8079208000 0.010 1809820100000.018 Risk (total) - Risk (not exposed) Risk(total) PAR% = = = 0.44 0.018 - 0.01 0.018 = 44% risk in total population risk in unexposed
26 PAR% Speeding 100 807920 2000 8000 10000 deadalive 1809820 speeding not speeding 1900 Risk 100/2000 = 0.05 80/8000 = 0.01 Attributable Risk (AR) = 0.05 - 0.01 = 0.04 AR Risk(exposed) AR% =x 100 = (0.04/0.05) x 100 = 80% p(cases) = % cases exposed = 100/180 = 0.55 PAR% = p c x AR% = 0.55 x 80% = 44%
27 PAR% Drunk driving Outcome DeadAlive Risk Drunk Driving Yes 452553000.150 No 135956597000.014 1809820100000.018 Risk (total) - Risk (unexposed) Risk(total) PAR% = = = 0.22 0.018 - 0.014 0.018 = 22% risk in total population risk in unexposed
28 Summary MeasureSpeedingDrunk driving Relative Risk511 Attributable Risk0.040.14 Attributable Risk%80%93% Pop. attributable risk%44%22% % drivers with risk factor in population 20%3% Best reduction of deaths? Prevent drinking or speeding?
29 PAR% in Case-Control Studies proportion of controls exposed proportion of population exposed PAR% = P controls – (OR – 1) x 100 P controls (OR – 1) + 1 P controls = Proportion of controls exposed PAR% =P cases ( OR – 1 ) x 100 OR Where P cases = proportion cases exposed
30 Summary MeasureMeaningQuestion answered RR, OR Strength of association (between exposure and outcome) Is the exposure associated with the risk of getting ill/ the outcome? AR Excess risk of exposed (in absolute terms) What is the difference in risk between exposed and not exposed? AR% Proportion of risk of exposed attributed to exposure, potential prevention of exposed What proportion of those who are exposed and ill is likely due to the exposure? PAR% Proportion of risk of population attributed to exposure, potential prevention of population, Public Health relevance What proportion of those who are ill in the population is likely due to the exposure?
Take-home message There is more death and disability from frequent exposure to lower risks than to rare exposures to higher risks Examples: More people die from marginally elevated blood pressure (common) than from seriously elevated blood pressure (uncommon) More people acquire HCV from unsafe injection (common exposure, lower risk) than from unsafe blood products (rare exposure, high risk)
32 Preventable fraction (PF) Exposure associated with decreased risk Where RR < 1, exposure is protective Proportion of cases that would have occurred if exposure hadnt been present
33 RR < 1 protective exposure (protective factor) Proportion of cases that were prevented because of the exposure Risk (unexposed) - Risk (exposed) Risk (unexposed) Preventable fraction (PF) PF = Risk (unexposed)Risk (exposed) Risk (unexposed) Risk (unexposed) PF = - PF = 1 - Relative Risk
35 Preventable Fraction (PF) Vaccine efficacy How many people would have been ill without the vaccine? 200/100,000 cases of unvaccinated In population of 200,000 we expect 400 cases Only 100 cases occurred; 300 cases were prevented (by vaccine) 300/400 = 75% of hypothetical cases were prevented
True or false? The relative risk of lung cancer and smoking is 9 Therefore, if nobody smoked, the incidence of lung cancer would be nine times lower than it currently is False Measures of association are not measures of impact. The prevalence of smoking in the population also matters!
True or false? 90% of patients with lung cancer are smokers Therefore, if nobody smoked, the incidence of lung cancer would be reduced by 90% False The proportion of a disease that may be explained by a specific exposure does not depend on the proportion of cases exposed. It also depends on the strength of the association (90% of patients with lung cancer also eat fresh salad for lunch every day) | <urn:uuid:734bd578-f199-4b8c-a4a5-a5b65e0b7ff8> | CC-MAIN-2018-13 | http://slideplayer.com/slide/741716/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645550.13/warc/CC-MAIN-20180318071715-20180318091715-00398.warc.gz | en | 0.88464 | 2,258 | 2.9375 | 3 |
Tornadoes are one of the most destructive weather events, with winds as high as over 200 miles per hour and leaving a trail of destruction a mile or wider. Around 1,000 tornadoes form in the U.S. each year; and while most occur in the spring or summer, they have been known to happen at any time of year.
If you live in an area where tornadoes are common, consider building a concrete reinforced safe room in the center of your home or an underground storm cellar. The next best place of refuge in a storm is in a basement, followed by an interior room without windows.
Automobiles and mobile homes are the worst places to be during a tornado, so get out and seek shelter in either a building or a low spot or ditch.
Educating your family is the first step toward preparing for a tornado outbreak. Get to know the most volatile and active seasons (usually springtime), and become familiar with the histories of tornado touchdowns in your area.
In a home or a building, move to a pre-designated shelter, preferably the basement or the lowest floor of your home. Don’t worry about opening your windows first – that would be a mistake, just get to the basement, and get under a sturdy piece of furniture or workbench. Grab blankets to cover yourself with, which will protect you from flying debris.
If an underground shelter (basement) is not available, move to an interior room or hallway on the lowest floor, and crouch down close to the floor. Again, grab extra blankets to protect yourself from flying debris. Stay away from windows – as they can shatter due to flying debris and the force of the wind.
To survive a tornado, do not believe in false alarms. This means you should treat every watch and warning as the real deal. Seek shelter and don’t drive thinking it’s a false alarm. Here’s the deal Just because you don’t hear the sirens, doesn’t mean there isn’t a tornado headed your way. As is the case many times, the tornado has wiped out the siren communications!
Tornadoes come with an average warning time of around fifteen minutes. Take every warning seriously and be on alert.
How to prepare for a tornado prepper-style is different from tornado preparedness for the average person. Before a twister heads, your way grab a helmet, a whistle, and ear plugs. Discover more thoughtful preparedness ideas for surviving tornadoes.
Thankfully F5 Tornadoes are extremely rare! Somewhere under the rainbow, blue birds will fly again after a tornado strikes. Like any natural disaster, there’s no place like home when you’re prepared!
The number one thing you can do to prepare for a tornado is to get some first aid knowledge under your belt. Take some classes, buy a book, stock up on first aid essentials so you can respond to neighbors and friends who may need your assistance.Like they say, knowledge weighs nothing and you can learn to improvise even if the damage is so great you’ve lost all your first aid supplies.
Preparing for a tornado and other natural disaster is important because the odds of a natural disaster affecting you are far greater than one of these SHTF scenarios we read about all the time. Also, by preparing for a tornado or other natural disasters you will find that you are becoming more prepared for the larger disaster scenarios. This is because the basic supplies are for the most part the same.
Now that we have done everything we can to prepare for the unfortunate event of a tornado hitting our home, it doesn’t mean we are out of the woods. Just like earthquakes, volcano’s and hurricanes, there is no way to fight Mother Nature, we just need to do our best to stay out of her way. | <urn:uuid:be5ebea3-b819-4ad8-b6a2-e76422aa01f7> | CC-MAIN-2018-22 | https://heavensharvest.com/garden-tips-and-tricks/dont-get-blown-away/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794871918.99/warc/CC-MAIN-20180528044215-20180528064215-00126.warc.gz | en | 0.929241 | 792 | 2.96875 | 3 |
On the 1861 home front, President Abraham Lincoln authorized the formation of the United States Sanitary Commission to raise private funds for the medical care of the Union Troops wounded in Civil War battles. In February 1864, a group of Albany women organized the Albany Relief Bazaar and raised $17,189. This three-week event included ethnic booths, art exhibitions, tableaux, souvenir shops, and lotteries, all well-documented with detailed photographs.
Meanwhile, on the battle front, Dr. Albert and Garrett Vander Veer kept detailed accounts of their experiences on Civil War battlefields. Albert, a doctor who served as a surgeon for the Sixty-Sixth at Gettysburg, kept detailed records of each of the soldiers he treated. He also used his battlefield experiences to advance the quality of medical practices when he returned to Albany. He would later go on to become an influential professor and internationally known surgeon at Albany Medical College and Hospital – an association that lasted for more than 60 years. Garret Vander Veer, who was killed in action, wrote numerous poignant letters home describing his battlefield experiences.
The exhibition, supported by Albany Medical Center, will be open through February 26, 2011 and will be displayed in the Albany Institute’s entry gallery.
Photo: Garrett Vander Veer, Vander Veer Family Photographs, Albany Institute of History & Art Library. | <urn:uuid:8b32765c-456c-401a-b2d6-096e87833554> | CC-MAIN-2019-22 | http://www.newyorkhistoryblog.com/2011/08/albany-in-the-civil-war-exhibit-opens-saturday.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257316.10/warc/CC-MAIN-20190523164007-20190523190007-00314.warc.gz | en | 0.95873 | 279 | 2.59375 | 3 |
Could there be any truth to this? I’m guessing it’s a hoax but what would the Earth be like if it were true? Would there be enough noticable differences that it would be obvious if this actually happened?
It would be obvious. For one thing there would be a 50[sup]o[/sup] region of 24 hour a day darkness around the south pole in the southern hemisphere’s winter.
But…But… Maybe this explains my dizziness?
26 degrees? No way.
But the earth does shift on occasion. Especially after earthquakes. I learned this when I visited a government facility that monitors the position of the North Star. (FYI, the government spends millions of dollars every year measuring the precise position of the North Star. There is a good reason for it, but I’m not sure if I’m allowed to tell you.)
Well, for starters, every single celestial body (the Sun, the Moon, all the stars and planets) would appear in the sky in a completely different position than they ever had before. Anyone with any passing familiarity at all with the sky would notice. Folks at high latitudes would notice the Sun not setting or rising at all, and folks at low latitudes would notice the Sun getting directly overhead (a condition which can only occur within the tropics).
Not to mention that any phenomenon which could shift the Earth’s rotation by that much that abruptly would have cataclysmic effects in its own right, on the order of melting the entire surface, or so.
Even the largest US and Soviet nukes, detonated simultaneously, at the poles, only caused a tilt of 11°. Expecting a bigger shift from the mere melting of polar ice is the stuff of Science Fiction.
Right, but surely no one would notice that for obvious reasons.
I particularly like this bit from the web page the OP cited:
Excuse me?! Reading that makes me wonder if our confused friend thinks that “down” is toward the south pole; otherwise what in h–l does he mean by “slipping downward”??
Except maybe a few astronauts.
Perhaps he’s forgotten that the ice at the North Pole is free-floating?
Funny no one noticed the loss of the entire GPS system last December. Notice there were no links on the claims.
I’m sure people in Washington state, for example, would have noticed not only the sun being directly overhead at noon on the summer solctice, but also the sun not setting that day, either.
And folks in Australia might have missed the sun that same day.
At 49.5 degrees, the Arctic Circle would be farther south than the Tropic of Cancer. :rolleyes: (But shhhhhhh… only the gubmint knows about this.)
[spoiler]Apart from TimeCube, why does every whack-a-doodle-doo site have a black background with BIG COLORFUL LETTERS?
It’s like they all went to training courses at Nutjob Web Design, Inc. [/spoiler]
(And is there any truth to the received wisdom that most letters received by celebs from loonies use green ink?)
And Earth’s melting ice causes solar flares. Okaaaay…
Of course you guys hadn’t noticed.
THE SILENCE IS DEAFENING!!!
There is no way we could not notice this happening. The seasons are a consequence of the Earth’s axial tilt. You’d get much longer summer days and much shorter winter days in the US and Europe if the axial tilt was increased.
As an aside, the Earth does wobble a bit on it’s axis over long periods of time.
If anyone is interested a friend of mine has a theory about the Earths tilt actually being less than 23.5 degrees. (and has always been). The 23.5 degrees that we see is the total of two angles one being the tilt of the earth itself I think he has calculated it at 18.5 and another angle made up by the earth moving faster and slower then the sun as it maintains a heliocentric orbit.
I’m not mentally equipped to present the theory in its entirety. He is an MIT graduate and has been arguing this theory for a number of years now and has yet to find anyone to disprove it. If this happens to fall into anyone’s area of expertise let me know and I could send a paper copy summery. He is against publishing it on the internet and it is copyrighted material.
Earthquakes cause a shift measured in tiny fractions of an arcsecond, though. As for the reason the government spends money on measuring the precise position of the North Star (and other stars as well) I think they’ve already spoiled the ‘secret’ by naming a certain ballistic missile system after it. The specifics of the celestical system are likely classified but the general scheme is the same used by scientific and commercial satellites and probes for stellar orientation. Kayton and Fried’s Avionics Navigation Systems is the classic reference on spacecraft navigation avionics including stellar/inertial systems, and if I recall correctly Spacecraft Attitude Determination and Control has a treatment of this topic as well.
To be far, Dr. Gene Ray (“Cubic and Wisest Human”) also goes for the wacky fonts and a subtle but still less-than-spartan graph paper background. I can’t say as I understand the reasoning behind it, as compared to, say, John Baez’ no-frilled Usenet Physics FAQ, except that it’s a way for loonies to attract one another, or perhaps to compete like opposing peacocks.
Back to the o.p.'s question, you’d see some drastic effects from such a shift, not only on the climate change (which would likely kill off all complex life) and the change in position of the Sun and stars, but also from the vast quantity of energy it would take to suddenly alter the Earth’s rotational momentum. You would literally shear or shatter tectonic plates, open up divergent boundaries, and generally muck things up quite a bit. It’s a nonsensical claim at best.
I’d say that your friend is on crack, but I suspect that he is misunderstanding what the axial tilt is in reference to. The 23.45 degree axial tilt of the Earth is the angle between the the axis of the Earth’s rotation and the eliptic plane of the Sun and Earth; that is, the plane in which Earth’s orbit with respect to the Sun lies, or if you want to be pedantic, their orbit about their common barycenter. The Sun’s axial tilt with respect to the Sun-Earth ecliptic is about 7.25 degrees, so their compound angle as the bodies go through their orbital motion varies roughly between 16.2 and 30.7 degrees. Note that this has nothing to do with the Earth’s velocity, nor does the Sun’s axis being out of the ecliptic plane have any significant effect on the Earth’s orientation or orbital characteristics. We proles stuck here on planet Earth are not primarily concerned with the axial tilt of the Sun; there are some modest differences in the Sun’s magnetic field and coronal emissivity relative to axial tilt, but we have a protective magnetosphere and a nice thick atmosphere as a radiation shield so it’s not a big deal for us. We’re more concerned with how the overall visible and near-visible radiation which penetrates Earth’s atmosphere is impingent upon the Earth’s surface; the more extreme the angle, the more extreme the termperature and climate behavior, or what most people call “weather”.
The earth’s current axial tilt of about 23.5 degrees is not permanent. It changes naturally in a range of about 22-24.5 degrees in a 41000-year cycle. | <urn:uuid:ef32e92f-d309-4e82-b86b-b3030a5ccdb7> | CC-MAIN-2020-45 | https://boards.straightdope.com/t/the-earths-degree-of-tilt-has-changed/416859 | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107916776.80/warc/CC-MAIN-20201031062721-20201031092721-00240.warc.gz | en | 0.94109 | 1,709 | 2.796875 | 3 |
What is Agoraphobia?
Agoraphobia is a complex anxiety disorder. It’s a condition that affects millions and one that’s often misunderstood. If you’re living with this condition, you may find the associated feelings difficult to explain. This is due in part to agoraphobia’s ties to other anxiety disorders.
Like many others, you might be searching for answers about how to overcome agoraphobia. In order to do this, you must fully understand its intricacies.
A person living with agoraphobia is greatly affected by his or her surroundings. The disorder can be defined as one or more of the following:
- Fear of crowded spaces
- Fear of being alone in any situation
- Fear of unfamiliar places
- Fear of being in areas that lack easy escape routes
- Fear of leaving home
- Overdependence on others
There is no clear-cut way to convey what it feels like to have agoraphobia. While some with the disorder struggle with being in public parks, others have difficulty simply leaving their homes. The effects are different for everyone.
Agoraphobia has a tendency to develop by adolescence or during early adulthood, before the age of 35. Some are more likely to develop the disorder than others, including girls and women, middle-aged people, Native Americans, people with low income, and those who are widowed or divorced. It’s not uncommon for people who have recently gone through a stressful event to develop symptoms of agoraphobia. These types of stressful events can include abuse, the death of a loved one, or being the victim of an attack. Being the blood relative of someone with agoraphobia is also a risk factor for developing the disorder.
Although agoraphobia is an anxiety disorder on its own, it’s most commonly the byproduct of one or more separate anxiety disorders. Like other disorders, it can have a substantial effect on quality of life from social isolation to difficulties maintaining mental and physical health. The results can be especially devastating if you’re suffering from a severe case that prevents you from leaving your house.
Symptoms Associated with Agoraphobia
Although it is a distinct disorder, agoraphobia has been known to mimic symptoms commonly associated with anxiety attacks. In fact, agoraphobia can trigger an anxiety attack when a person finds him or herself in an uncomfortable environment or situation. While these anxiety attacks can range from mild to severe, for some, they can be debilitating, preventing them from leaving their homes.
Agoraphobia symptoms can include the following:
- Rapid heartbeat
- Feelings of helplessness
- Feelings of need to escape
- Upset stomach
- Fear of dying
- Shortness of breath
- Severe trembling
- Chest pain
While similar in some instances, agoraphobia differs from social phobia, which can be described as a fear of social situations. Agoraphobia is deeper than that; it is most commonly a feeling of impending danger or panic when faced with no clear escape. If you have agoraphobia, you may feel fear traveling on trains or planes.
What Causes Agoraphobia?
Phobias are complex. These irrational fears often lack a clear cause, and, while it is also possible to develop a disorder like agoraphobia without a specific cause, there usually is one. Agoraphobia is most commonly caused by anxiety disorders such as…
- Post-traumatic Stress Disorder (PTSD),
- Panic Disorder, and
- Social Phobia & Other Phobias.
PTSD is often associated with agoraphobia because a person can develop agoraphobia after undergoing major trauma. The fear that the trauma will reoccur is what drives many people with agoraphobia to stay sheltered within the confines of their own homes, minimizing the risks of danger.
Since panic disorders and agoraphobia are so closely linked, panic disorders are often classified as “with” or “without” agoraphobia when diagnosed. Understanding this classification is an important part of learning how to overcome agoraphobia. Without treatment, agoraphobia can trigger other issues, like depression and addiction.
Agoraphobia may occur in those with panic attacks due to a fear of embarrassment or shame at having a panic attack in public or not having access to help if faced with one. Behavioral conditioning is also responsible for agoraphobia in those who suffer from panic attacks. Often, a person experiencing a panic attack in a public place with associate that place with panic attacks in the future, causing them to avoid it altogether. It they have a panic attack in another place, they may avoid it, too, which can spiral into a cycle that makes the threat of going out in public very real.
How to Overcome Agoraphobia
In order to find an effective method of managing your agoraphobia, it’s important to pinpoint the cause. Treatment can also be affected by whether your agoraphobia causes panic attacks. In the absence of associated panic disorder, agoraphobia is commonly treated with specialized cognitive behavioral therapy treatments, including exposure therapy, which involves using a series of steps to help you acclimate to the idea of venturing out into public. Certain medications are also effective at treating anxiety, though these should be taken with the assumption that you will make an effort to spend more time in public or in the outdoors.
While similar treatments can still be effective for agoraphobia accompanied by panic disorder, it’s important to combine them with those that tackle panic attacks as well. Exposure therapy is effective for panic attacks as it ultimately pinpoints triggers, which can reduce symptoms if avoided. Some medications may be less effective for agoraphobia paired with panic disorder as they provide only temporary relief from symptoms. Certain relaxation techniques or anxiety breathing exercises can also help alleviate symptoms. These techniques can include deep breathing, yoga, meditation, and rhythmic exercise.
Like most other anxiety disorders, agoraphobia can be hard to cope with. Your social life, your career and your relationships may suffer as a result of your agoraphobia. For these reasons, many people are turning to natural ingredients to deal with their symptoms. While it may be hard for others to understand what you are going through, know that you are not alone in your struggle. There is help available. To learn more about how to overcome agoraphobia, click here.
What is your experience with agoraphobia? Share your methods for coping in the comment section below. | <urn:uuid:edd0e9c8-0216-4960-bb0c-42fe2f3a1e18> | CC-MAIN-2019-26 | https://healthyhempoil.com/how-to-overcome-agoraphobia/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998605.33/warc/CC-MAIN-20190618023245-20190618045245-00555.warc.gz | en | 0.956414 | 1,372 | 3.40625 | 3 |
Disability Support Services
Epilepsy is a neurological condition. It is sometimes called a seizure disorder. It takes the form of brief, temporary changes in the normal functioning of the brain's electrical system. These brief malfunctions mean that more than the usual amount of electrical energy passes between cells. This sudden overload may stay in just one small area of the brain, or it may swamp the whole system.
Epileptic seizures can have unusual body movements, effects on consciousness, and changed behavior produced by malfunctioning cells. Epileptic seizures may be convulsive or non-convulsive in nature, depending on where in the brain the malfunction takes place and on how much of the total brain area is involved.
- Convulsive seizures are the ones which most people generally think of when they hear the word "epilepsy". In this type of seizure, the person undergoes convulsions which usually last from two to five minutes with complete loss of consciousness and muscle spasms.
- Non-convulsive seizures may take the form of a blank stare lasting only a few seconds, an involuntary movement of an arm or leg, or a period of automatic movement in which awareness of one's surroundings is blurred or completely absent.
- Rescheduling of a test or assignment due to a seizure. | <urn:uuid:abe63d4f-509d-4e6c-a570-b816c25defcc> | CC-MAIN-2018-22 | http://www.mineralarea.edu/students/studentresources/Access/epilepsy.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869272.81/warc/CC-MAIN-20180527151021-20180527171021-00452.warc.gz | en | 0.918538 | 262 | 3.625 | 4 |
The Project could provide a range of electricity generation capabilities from 400 megawatts in the first phase and other possible phases depending on the need for clean renewable energy in the future.
There have been major advances in offshore wind technology and engineering in the past decades, ensuring the project today can be delivered as efficiently and at a greatly reduced cost.
Experts in Engineering, Design and Construction
Northland is a recognized international expert in procuring, financing, building and operating large-scale renewable energy projects. This expertise will ensure the most cost effective and innovative solutions are available for the construction and operation of their Project.
The Project is at an early stage of development but has completed considerable preliminary layout work. The Project would be located off the coast of Haida Gwaii in Hecate Strait, an area known for strong, consistent and reliable wind, where approximately to 30-12 MW to 15 MW wind turbines could be installed to provide approximately 400 megawatts of clean, renewable energy to serve B.C. homes and industry.
Considerable geophysical survey of the Project site has been completed, which includes detailed mapping of the seabed, water depth, topography and other related information that will support the development of the most efficient project layout and engineering.
“During its entire lifecycle the wind power plant produces 23 times more energy than it consumes.”Siemens, 2014
Location – Why Offshore?
Wind over the water is generally stronger and more consistent than wind over land. With fewer obstructions such as hills, man-made structures or even trees, offshore wind produces more energy, more efficiently and more consistently than onshore wind.
Wind, wave and climate data collected from the meteorological station in Hecate Strait, together with data from the nearby Rose Spit weather station has yielded more than 19 years of correlated wind data. All data confirms the Hecate Strait’s wind resource to be “world-class in nature”.
How Will the Electricity Generated get to Homes and Businesses?
Submarine cables are used to transmit electricity from the offshore wind turbines to a transformer station on land. Here the voltage is converted, and electricity is transmitted to homes, businesses and industrious within the BC Hydro electricity transmission grid. In British Columbia, BC Hydro is the main purchaser of power for redistribution to residential and business customers. | <urn:uuid:44bbd3b3-496a-41ce-bfd3-5cf73789e0dd> | CC-MAIN-2022-40 | http://oceanicwind.ca/the-project/engineering/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337531.3/warc/CC-MAIN-20221005011205-20221005041205-00192.warc.gz | en | 0.937503 | 486 | 3.390625 | 3 |
Traditionally, in Wales, the 1st of November was regarded as the start of winter: Calan Gaeaf. Nos Galan Gaeaf, the preceding night is an ‘Ysbrydnos’ when spirits are abroad. People avoid churchyards, stiles, and crossroads, since spirits are thought to gather there.
This ancient tradition was found across the UK & survives in various forms. Until recently (when commercial marketing processes changed habits) turnips were hollowed to make candle-lit masks, ‘guisers’ roamed the streets creating a variety of chaos, ‘Mischief Night’ (4th November) had & has adolescents creating, at times, some considerable damage to property
Romantics like to call it ‘pagan’ or use the invented term ‘celtic’ as a means of giving it ancient depth. It has no need of either. It is naturally ‘elemental’. We all face death.
In the northern hemisphere the time of year works its own magic in any age – darkness is increasing, the land seems to be dying & these natural occurrences still work deep inside humans.
The need to remember and celebrate remains strong. Fears created by the return of the dank, dark & gloom of winter, had people engage in acts of ‘divination’ – which included ‘apple-bobbing’.
The long-established tradition of apple-bobbing has, inevitably, received criticism from Health and safety ‘experts’:
In recent times (for example in the 1980s at Chirbury on the Shropshire -Welsh Border) beliefs remained that at midnight on 31st October if in or near the Parish Church, one could hear the names of all who will die during the year.
In many countries that maintain Catholic traditions All Saints Day is still a time for remembering mortality & graves & cemeteries are attended to.
“Every year on November 1, Todos Los Santos (“All Saints’ Day”), millions of Filipinos gather at the cemeteries to honor their dead beloved family and friends. Many actually go to the cemeteries the night before and camp out next to the graves. So the night is spent on singing karaoke, playing cards, drinking, and even dancing! Next to Christmas and Good Friday, Todos Los Santos is the biggest holiday of all.”
One ancient tradition associated with the Christian Festival days of All Saints’ and All Souls’ was that of begging. Of asking for charity in remembrance of the souls of the departed & as a means of speeding them through purgatory.
In UK the traditions associated with feast days became downgraded following the Protestant Reformation. However some survived and other traditions with appealing elements were created (such as 5th November with its bonfires, fireworks & ‘penny for the guy’ traditions). The older traditions continued, almost unnoticed, in certain areas of the north and west of Britain.
One such surviving tradition was that of begging for ‘Soul Cakes’.
On 1st & 2nd November 2013 a small group, celebrating the season, travelled on foot through some of the smaller parishes on the Welsh – English Border. A two day journey covering more than 40 kms.
They were damp pilgrims, linking communities, singing (not always tunefully) in each parish, in return for which they were provided with a seasonal food.
Through their efforts became | <urn:uuid:444d713e-1791-41ef-8721-63dfd9ab2221> | CC-MAIN-2021-43 | https://inspirationalpathways.org/other-activities/celebratory-soul-searching/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585522.78/warc/CC-MAIN-20211022212051-20211023002051-00464.warc.gz | en | 0.969051 | 738 | 2.765625 | 3 |
Tubal factor infertility at a glance
- Tubal factor infertility occurs when diseases, damage, scarring or obstructions in the fallopian tubes prevent sperm from reaching the ovary to fertilize an egg, or prevents a fertilized embryo from reaching the uterus for pregnancy.
- Tubal factor infertility is most commonly caused by pelvic inflammatory diseases, sexually transmitted diseases or other diseases such as endometriosis.
- The American Society for Reproductive Medicine (ASRM) says that 25 to 35 percent of female infertility is due to tubal factors.
- Tubal factor infertility can be treated surgically to repair the tubes.
- Women with tubal problems that can not be surgically corrected, or who do not want the surgery, can undergo in vitro fertilization (IVF).
Ready to get started with treatment?
We're here to help. Contact us today at (401) 441-5336 or request an appointment online.
What is tubal factor infertility?
Tubal factor infertility occurs when the fallopian tube(s) prevent sperm from reaching the ovary to fertilize an egg or prevents a fertilized embryo from reaching the uterus for pregnancy. The fallopian tubes on either side of the uterus connect the ovaries to the uterus.
In a normal pregnancy, an ovary releases an egg into the fallopian tube where it meets with a sperm that fertilizes the egg. The fertilized egg then travels to the uterus and attaches to the uterine lining for nine months.
In the event that the fallopian tube is damaged, misshapen or blocked in some way, a sperm and an egg cannot meet, resulting in infertility. A blockage can also be small enough to allow the sperm in, but not to allow the embryo to get to the uterus.
A tubal blockage is usually identified by its location:
- A tubal blockage located close to the uterus is called a “proximal” tubal blockage. According to ASRM, proximal tubal blockage accounts for 10 to 25 percent of tubal disease and is generally a relatively easy condition to treat.
- Mid-segment tubal blockage occurs when the middle of the fallopian tube is damaged or scarred, typically as a result of permanent sterilization (tubal ligation) or the reversal of that sterilization (tubal ligation reversal).
- A blockage that is located further from the uterus is called a distal tubal blockage. In addition, the fallopian tube can be completely blocked. The tubes can also be partially blocked or narrowed due to scarring, which can also cause problems getting pregnant.
- Fimbria are the finger-like fringes of tissue that help to sweep an unfertilized egg into the fallopian tube. Damage to the fimbriae can prevent the egg from travelling from the ovary into the fallopian tubes.
The most common cause of tubal factor infertility is infection. Additional causes of blocking and scarring include:
- Endometriosis, a disease in which the tissue that normally lines the uterus grows outside the uterus.
- Pelvic inflammatory disease (PID), an infection of the female reproductive organs.
- Sexually transmitted disease (STD), most commonly chlamydia and gonorrhea.
- Ectopic pregnancy.
- Previous surgery.
Patients have a high risk of tubal factor infertility if they’ve had a ruptured appendix or previous abdominal surgeries, including surgeries for ectopic pregnancies, a condition in which the embryo grows outside of the uterus. Due to the location of these conditions, tubal issues are more likely to occur.
Symptoms and diagnosis of tubal factor infertility
The main symptom of tubal factor infertility is the inability to become pregnant. Many women do not realize that they have fallopian tube damage until they have consulted a doctor for infertility.
In addition, when infertility is accompanied by signs of a pelvic inflammatory disease, such as chronic lower abdominal pain, tubal infertility may be present. The two tests used to diagnose tubal factor infertility are a hysterosalpingogram and a laparoscopy.
- Hysterosalpingogram (HSG) is an X-ray in which a dye is passed through the cervix into the uterus. The dye can be followed through the fallopian tubes to see if they are open. It is important to note that if the tubes are open, it does not mean that they are functioning normally. There may be extreme scarring or blockage inside the lining of the tube that cannot be detected with this test.
- Laparoscopy is a minimally invasive surgical procedure involving a small incision just below the belly button with insertion of a small surgical instrument, called a laparoscope, to view the fallopian tubes. The laparoscope can determine whether or not the tubes are blocked or if there are other issues such as scar tissue adhesions.
Treatment of tubal factor infertility
The two main treatments for tubal factor infertility are surgical and nonsurgical procedures to repair the damaged tube(s). If these attempts fail, IVF can be done to achieve pregnancy.
There are several ways to repair a tube, including:
- Tubal cannulation involves inserting a catheter guided by a wire and attached to a balloon into the fallopian tubes in order to unblock them. This option is an outpatient procedure. Tubal cannulation should only be done if an imaging test shows a proximal blockage in one or both fallopian tubes.
- Fimbrioplasty is a laparoscopic procedure that rebuilds the fimbriae, or finger-like ends of the fallopian tube, by sewing the fimbriae back together. This option is only a good choice for patients with minimal distal tubal blockage.
- Salpingectomy refers to the surgical removal of the damaged or diseased fallopian tube.
- Salpingostomy refers to the the surgical creation of an opening into the fallopian tube, often to remove an ectopic pregnancy. However, the tube itself is not removed in the procedure.
As success rates have improved over the past few years, IVF has become a mainstay treatment for tubal factor infertility. Instead of attempting to repair, the physician will avoid surgery and the problem of tubal damage altogether. The success rates of IVF for tubal factor infertility are usually good in women younger than age 39 because these women are unlikely to have other infertility problems.
Tubal factor infertility treatment considerations
The advantages and disadvantages of IVF and tubal surgery should be reviewed with the patient to provide assistance in decision making. The main advantages of IVF are good per-cycle success rates and the fact that it is less surgically invasive. Its disadvantages include cost (especially if more than one cycle is required) and the need for frequent hormone injections and monitoring for several weeks.
If the woman has a hydrosalpinx, a form of tubal damage where the distal fallopian tube is blocked and fluid accumulates in the tube, the fluid may leak back into the uterine cavity from the fallopian tube. Even if a good embryo from IVF is placed into the fallopian tube in a woman with hydrosalpinx, the patient has a lower pregnancy rate because the fluid may wash the embryo away. It is for this reason that providers may wish to remove or block the fallopian tubes so that the fluid does not leak back into the uterine cavity.
The most significant risks include the occurrence of multiple pregnancy (twins or more, which carries risks for mother and babies) and ovarian hyperstimulation syndrome (a condition that occurs when patients are exposed to too much of a fertility hormone, which can lead to swelling of the ovaries and other severe symptoms including abdominal pain, vomiting and shortness of breath). IVF has also been associated with a higher incidence of adverse perinatal outcomes in infants, such as low birth weight, intrauterine growth restriction and congenital malformations.
In addition, several patient factors should also be considered when choosing between the two treatment options, including:
- Ovarian reserve (the number of eggs the patient has).
- Prior fertility outcomes.
- Number of children desired.
- Site and extent of tubal damage.
- Presence of other infertility factors.
- Experience of the surgeon.
Patient preference, religious beliefs, cost and insurance reimbursement also figure into the equation. A semen analysis can also be performed early in the infertility investigation, as these results may influence the decision between tubal surgery and IVF.
Patients opting for tubal surgery should know that these procedures increase the risk of scar tissue and adhesions. There is also a chance of recurrent blocked tubes after surgery, pelvic infection or an ectopic pregnancy. The chance of conceiving naturally after surgery is greater if the patient is young and has a minimal amount of scar tissue blocking the fallopian tubes. | <urn:uuid:dac03f66-08fa-470f-940a-0421e46cf738> | CC-MAIN-2019-35 | https://fertility.womenandinfants.org/services/women/tubal-damage | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317516.88/warc/CC-MAIN-20190822215308-20190823001308-00185.warc.gz | en | 0.936425 | 1,852 | 2.921875 | 3 |
A hand switch / Pushbutton switch is exactly what the name implies: an electrical switch actuated by a person’s hand motion. These may take the form of toggle, pushbutton, rotary, pull-chain, etc.
A common form of industrial pushbutton switch looks something like this:
The threaded neck inserts through a hole cut into a metal or plastic panel, with a matching nut to hold it in place. Thus, the button faces the human operator(s) while the switch contacts reside on the other side of the panel.
When pressed, the downward motion of the actuator breaks the electrical bridge between the two NC contacts, forming a new bridge between the NO contacts:
The schematic diagram symbol for this type of switch looks much like the real thing, with the normally-closed contact set on top and the normally-open contact set below:
Connecting two of the terminals together makes this form of switch electrically identical to a Form C:
This switch contact arrangement is sometimes referred to as a form-C contact set, since it incorporates both a form-A contact (normally-open) as well as a form-B contact (normally-closed).
Most industrial hand switches are available in modular form, where sets of switch contact blocks may be “stacked” together to be actuated by the same pushbutton or rotary knob. This allows an almost unlimited number of switch contacts to be simultaneously actuated by a single actuating mechanism.
Different actuator types such as pushbuttons, rotary selectors, knobs, and key switches may also be interchanged with contact modules for maximum flexibility:
An electrical switch is any device used to interrupt the flow of electrons in a circuit. Switches are essentially binary devices: they are either completely on (“closed”) or completely off (“open”). There are many different types of switches, and we will explore some of these types in this chapter.
Though it may seem strange to cover this elementary electrical topic at such a late stage in this book series, I do so because the chapters that follow explore an older realm of digital technology based on mechanical switch contacts rather than solid-state gate circuits, and a thorough understanding of switch types is necessary for the undertaking.
Learning the function of switch-based circuits at the same time that you learn about solid-state logic gates makes both topics easier to grasp, and sets the stage for an enhanced learning experience in Boolean algebra, the mathematics behind digital logic circuits.
The simplest type of switch is one where two electrical conductors are brought in contact with each other by the motion of an actuating mechanism. Other switches are more complex, containing electronic circuits able to turn on or off depending on some physical stimulus (such as light or magnetic field) sensed.
In any case, the final output of any switch will be (at least) a pair of wire-connection terminals that will either be connected together by the switch’s internal contact mechanism (“closed”), or not connected together (“open”).
Any switch designed to be operated by a person is generally called a hand switch, and they are manufactured in several varieties:
Toggle switches are actuated by a lever angled in one of two or more positions. The common light switch used in household wiring is an example of a toggle switch.
Most toggle switches will come to rest in any of their lever positions, while others have an internal spring mechanism returning the lever to a certain normal position, allowing for what is called “momentary” operation.
Pushbutton switches are two-position devices actuated with a button that is pressed and released. Most pushbutton switches have an internal spring mechanism returning the button to its “out,” or “unpressed,” position, for momentary operation.
Some pushbutton switches will latch alternately on or off with every push of the button. Other pushbutton switches will stay in their “in,” or “pressed,” position until the button is pulled back out. This last type of pushbutton switches usually have a mushroom-shaped button for easy push-pull action.
Selector switches are actuated with a rotary knob or lever of some sort to select one of two or more positions.
Like the toggle switch, selector switches can either rest in any of their positions or contain spring-return mechanisms for momentary operation.
A joystick switch is actuated by a lever free to move in more than one axis of motion. One or more of several switch contact mechanisms are actuated depending on which way the lever is pushed, and sometimes by how far it is pushed. The circle-and-dot notation on the switch symbol represents the direction of joystick lever motion required to actuate the contact. Joystick hand switches are commonly used for crane and robot control.
Some switches are specifically designed to be operated by the motion of a machine rather than by the hand of a human operator. These motion-operated switches are commonly called limit switches, because they are often used to limit the motion of a machine by turning off the actuating power to a component if it moves too far. As with hand switches, limit switches come in several varieties:
These limit switches closely resemble rugged toggle or selector hand switches fitted with a lever pushed by the machine part.
Often, the levers are tipped with a small roller bearing, preventing the lever from being worn off by repeated contact with the machine part.
Proximity switches sense the approach of a metallic machine part either by a magnetic or high-frequency electromagnetic field. Simple proximity switches use a permanent magnet to actuate a sealed switch mechanism whenever the machine part gets close (typically 1 inch or less).
More complex proximity switches work like a metal detector, energizing a coil of wire with a high-frequency current, and electronically monitoring the magnitude of that current. If a metallic part (not necessarily magnetic) gets close enough to the coil, the current will increase, and trip the monitoring circuit.
The symbol shown here for the proximity switch is of the electronic variety, as indicated by the diamond-shaped box surrounding the switch. A non-electronic proximity switch would use the same symbol as the lever-actuated limit switch.
Another form of proximity switch is the optical switch, comprised of a light source and photocell. Machine position is detected by either the interruption or reflection of a light beam. Optical switches are also useful in safety applications, where beams of light can be used to detect personnel entry into a dangerous area.
In many industrial processes, it is necessary to monitor various physical quantities with switches. Such switches can be used to sound alarms, indicating that a process variable has exceeded normal parameters, or they can be used to shut down processes or equipment if those variables have reached dangerous or destructive levels. There are many different types of process switches:
These switches sense the rotary speed of a shaft either by a centrifugal weight mechanism mounted on the shaft, or by some kind of non-contact detection of shaft motion such as optical or magnetic.
Gas or liquid pressure can be used to actuate a switch mechanism if that pressure is applied to a piston, diaphragm, or bellows, which converts pressure to mechanical force.
An inexpensive temperature-sensing mechanism is the “bimetallic strip:” a thin strip of two metals, joined back-to-back, each metal having a different rate of thermal expansion. When the strip heats or cools, differing rates of thermal expansion between the two metals causes it to bend. The bending of the strip can then be used to actuate a switch contact mechanism.
Other temperature switches use a brass bulb filled with either a liquid or gas, with a tiny tube connecting the bulb to a pressure-sensing switch. As the bulb is heated, the gas or liquid expands, generating a pressure increase which then actuates the switch mechanism.
A floating object can be used to actuate a switch mechanism when the liquid level in an tank rises past a certain point. If the liquid is electrically conductive, the liquid itself can be used as a conductor to bridge between two metal probes inserted into the tank at the required depth.
The conductivity technique is usually implemented with a special design of relay triggered by a small amount of current through the conductive liquid. In most cases it is impractical and dangerous to switch the full load current of the circuit through a liquid.
Level switches can also be designed to detect the level of solid materials such as wood chips, grain, coal, or animal feed in a storage silo, bin, or hopper.
A common design for this application is a small paddle wheel, inserted into the bin at the desired height, which is slowly turned by a small electric motor. When the solid material fills the bin to that height, the material prevents the paddle wheel from turning. The torque response of the small motor than trips the switch mechanism.
Another design uses a “tuning fork” shaped metal prong, inserted into the bin from the outside at the desired height. The fork is vibrated at its resonant frequency by an electronic circuit and magnet/electromagnet coil assembly. When the bin fills to that height, the solid material dampens the vibration of the fork, the change in vibration amplitude and/or frequency detected by the electronic circuit.
Inserted into a pipe, a flow switch will detect any gas or liquid flow rate in excess of a certain threshold, usually with a small paddle or vane which is pushed by the flow.
Other flow switches are constructed as differential pressure switches, measuring the pressure drop across a restriction built into the pipe.
Also Read: Switches Terminlology
- Switch Types
- Define Normal Status of a Process Switch ?
- What is a Limit Switch ?
- Basics of Limit switches
- Overview of Proximity Switches
- Normally-open and Normally-closed Switch Contacts
- How to Connect Proximity Switch (Sink Type) to Make LED ON ?
- How to Connect Proximity Switch (Source Type) to Make LED ON ?
- Flow Switch : What is it ?
- Motor Controllers | <urn:uuid:c3d1a4b1-ec16-46f9-bd41-22e030d3417d> | CC-MAIN-2019-04 | https://instrumentationtools.com/hand-switches/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660175.18/warc/CC-MAIN-20190118151716-20190118173716-00398.warc.gz | en | 0.918327 | 2,102 | 3.84375 | 4 |
Constipation is defined as having three or fewer bowel movements per week. When waste moves too slowly through the digestive tract or won’t vacate the rectum, causing it to become dry and hard, constipation can result. When constipation occurs, bowel movements become more difficult and less frequent.
It’s a common condition across all age groups, affecting 16 of 100 adults and one-third of those ages 60 and older.
The causes of constipation are wide ranging. Sometimes it is a side effect of medications, including narcotics and antidepressants. It could be a symptom of a condition, such as pelvic floor dysfunction, pregnancy, or irritable bowel syndrome with constipation. Frequently, constipation is simply the result of lifestyle behaviors that are easy to change.
Occasional constipation is normal, especially among pregnant women and those who have undergone changes in activity (such as travel). When constipation becomes chronic, or lasts a few months, the signs may include:
- Making fewer bowel movements, and then straining to go.
- Hard and/or small stools.
- Feeling as if the bowel won’t fully vacate (incomplete movements).
The general rule of thumb for detecting constipation is going three days or more without a bowel movement. If the constipation is sudden and the patient is unable to even pass gas and experiences pain and cramping, call a doctor. Tests for diagnosing the underlying cause may include:
- Blood, urine, or stool exams – These samples would be analyzed for underlying conditions including infections, inflammation, diabetes, and colorectal cancer.
- Imaging tests– X-rays may be taken to reveal potential blockages and stool throughout the colon.
- Sigmoidoscopy – This test seeks blockages in the last two feet of the colon using a camera-equipped, flexible tube (sigmoidoscope) that is inserted through the anus.
- Colonoscopy– The gastroenterologist examines the entire colon using a tiny camera. Click here for prep instructions.
- Anorectal manometry– Used to measure the anal sphincter muscles, sensation, and neural reflexes that contribute to having a normal bowel movement.
- Colonic transit study – Used to detect slowed emptying of the colon or difficulty at the rectum.
Remedying constipation requires increasing the speed in which waste is digested. Usually, home remedies will do the trick, including:
- Modifying the diet – Fresh vegetables, fruits, and other fiber-rich foods, accompanied by plenty of fluids, make waste heavier and faster-moving.
- Exercising more often – Physical activity strengthens the digestive muscles and should be practiced most days of the week.
- Digestive aids – Fiber supplements, digestive stimulants, stool softeners, and suppositories will soften the stool and/or help the digestive system better contract.
- Don’t ignore the urge – No one should put off the need to go.
In persistent cases of constipation, the doctor may prescribe:
- Medications – Drugs can help draw water into the intestine, move the stool, or reverse the side effects of other medications.
- Biofeedback – This therapy employs a device, inserted into the rectum, that measures how well the patient tightens and relaxes the pelvic muscles, to improve these actions.
- Surgery – Depending on the cause if the constipation, surgery may be required to remove a blockage or part of the colon.
It is important to recognize alarm signs to seek further evaluation by a gastroenterologist. If you note blood in your stools, weight loss, changes in stool caliber, or chronic symptoms, you should make an appointment. | <urn:uuid:1ba5f54b-3a8d-4955-97f4-218465cfe0a0> | CC-MAIN-2022-40 | https://cincinnati-gi.com/all-conditions/general-gastroenterology/constipation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00292.warc.gz | en | 0.899342 | 770 | 3.34375 | 3 |
What the Pandemic Has Taught Us About Transforming CitiesÁlvaro Cuéllar Jaramillo
In the face of debilitated environmental health, worsened by the spiralling climate crisis and an unsettling production, energy and consumption system, the current health crisis adds another strike to this growing tally.
In the Mediterranean urban model, dense and compact, these problems are exacerbated due to a lack of open space. Compared with garden cities, the difficulties in guaranteeing social distancing and avoiding contagion become all too evident.
This model falls short when it comes to generating more green spaces that help reduce pollution; it also fails to offer alternatives that help compensate the psychological consequences of a city under lockdown, and nor does it facilitate the creation of urban allotments and other spaces reserved for inner-city food production.
Nonetheless, the current pandemic could serve as a catalyst for a new generation of urban transformations that complement existing ideas, such as the composition of ‘superblocks’ or low-emission zones.
These are very useful strategies for helping to offer healthy spaces and thus improving the urban habitat. Even so, it may be easier said than done due to the arduous planning and management process required. | <urn:uuid:c3913fa9-9301-46b2-a718-c88cb88a2eb4> | CC-MAIN-2021-25 | https://urbannext.net/what-the-pandemic-has-taught-us/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487634616.65/warc/CC-MAIN-20210618013013-20210618043013-00492.warc.gz | en | 0.912412 | 247 | 3.015625 | 3 |
🔥🔥🔥 How Did Colonial Government Treat The Native Americans
Survivor accounts Compare And Contrast The French And Indian War Essay haunting details. At least one source must be authored by a member Fssp Reflection that tribe. We beg you would prevent its coming Avocado And Globalization such Quantities, by regulating the Traders JSTOR Contemporaries compared the guerrilla-style warfare in challenging and unfamiliar terrain to the American Augustines The Confessions Of St. Augustine in the so-called Indian Wars of Lyndon B Johnson Political Courage late nineteenth century. Statistically, the How Did Colonial Government Treat The Native Americans of alcohol misuse among survivors of trauma is significantly elevated, and survivors How Did Colonial Government Treat The Native Americans physical, emotional and sexual abuse How Did Colonial Government Treat The Native Americans childhood have among the highest rates of alcohol How Did Colonial Government Treat The Native Americans.
Native Americans: Conflict, Conquest, and Assimilation During the Gilded Age
Christopher Columbus. Learn More. Additional Resources for you to Explore. Columbus sailed the ocean blue in fourteen hundred and ninety two with the Nina, the Pinta and the Santa Maria. While this part of history may be true, there is always more to the story. Have you ever wondered about the validity of a history lesson? Many people have pondered why Columbus Day is a federal holiday and have asked, why DO we celebrate Columbus Day when Columbus actually landed in the Bahamas?
Watch this History Channel video and find out about this controversy and get some answers to your questions. Why do Native Americans protest the arrival of Europeans to America and feel offended by our celebration of Columbus? Read more at the same History Channel site and find out. Has this changed your opinion about why we celebrate this holiday? Should we rethink why we celebrate Columbus Day? How would Italian people feel? As you peruse the listed sites, think about all the sides in this story, gather information and make an argument for each! Has the truth been overlooked for too long?
What role did she have in causing wars and slavery? How did Columbus treat the indigenous people he and his men encountered? Read more about this story at this site. Think about how you would have felt if you had been taken as a slave to another country, and watched those around you die and suffer. What adjectives would you use to describe Columbus or the Queen of Spain now? The act was the result of a national debate that began decades earlier. Led by President Andrew Jackson, those in favor saw Indian nations as an obstacle to economic development and a threat to national security. Opponents, including Native leaders, argued that the act went against democratic values.
Ultimately removal presented a moral test to the new nation. Could the United States stay true to its ideals? Could it bring prosperity to the South and also treat American Indians with justice and respect? The nation tried to accomplish both goals. It succeeded at only one. Today we remember removal as a tragedy. True enough. But it was also part of a massive, nationwide transformation. In creating wealth, the law was a spectacular success. Soon Mississippi and Alabama had more millionaires per capita than any other states. That wealth was generated by the enslavement of millions, which led to the Civil War. What was supposed to be a relatively quick and manageable project spanned nine U. In and , removal constituted a full 20 percent of the federal budget.
The boom enriched contractors, who provided cattle, pork, coffee, sugar, corn, flour, salt, wagons, teamsters, pack horses, boats, ferrymen, road builders, rifles, and ammunition. Removal was also brutal, and a catastrophe for Indians. Poor planning, incompetence, bad weather, and unforeseen circumstances contributed to extraordinary suffering. About 68, Native people were exiled from their southeastern homelands. Even after they rebuilt in Oklahoma, Indian nations endured devastating assaults on their rights of self-government.
Against all odds they are thriving today. Entire books about Andrew Jackson barely mentioned it, and no one learned about it in school. But in the early s, a handful of Cherokee activists began to popularize the phrase trail of tears. First, the term described only the Cherokee removal of Later it included the removals of all southeastern Native nations. It then became shorthand for policies toward all American Indians. The core meaning of the phrase, though, still refers to a moment of national shame and a betrayal of American values. Trail of tears resonates in American conversation because the country is still coming to terms with what happened and what it means.
A railroad connected the Atlantic and the Pacific. The telegraph blasted information in minutes instead of days. Manifest destiny, the so-called inevitable fate that all of North America would belong to the United States, was largely achieved. Indian conflicts still existed, but they were a distant problem, not an existential threat to an industrializing nation of thirty million. Custer and of his men. The whole country went through shared disbelief, grief, and rage. For Americans of that time, the U.
The Lakota and Northern Cheyenne won the battle. But eight months later the United States won the Great Sioux War and confined to reservations nearly all their Plains Indian adversaries. Little Bighorn, however, never really ended. It was replayed over and over through official hearings, staged presentations, elaborate reenactments, and later in movies and on TV. After , generations of Americans were destined to grow up playing cowboys and Indians.
Little Bighorn was a way for the country to begin to understand the cost of westward expansion. The military defeat of Indians required a story of epic sacrifice against some of the bravest and most brilliant fighters any army had ever faced. The crushing loss at Little Bighorn sanctified the idea of manifest destiny. The annual quotas limited immigration from any country to 3 percent of the number of people from that country who were living in the United States in The effect was to exclude Asians, Jews, blacks, and non-English speakers.
In the s, the country was going through the Great Depression, a terrible period of economic hardship. People were out of work, hungry, and extremely poor. Few immigrants came during this period; in fact, many people returned to their home countries. Half a million Mexicans left, for example, in what was known as the Mexican Repatriation. Unfortunately, many of those Mexicans were forced to leave by the U.
It still exists today. America was again concerned about protecting itself. Fears about foreign-born people continued to grow. As a result of the turmoil in the s, immigration figures dropped dramatically from where they had been in previous decades. In the s, approximately 4,, immigrants came to the United States; in the s, fewer than , arrived.
During the war, immigration decreased. There was fighting in Europe, transportation was interrupted, and the American consulates weren't open. Fewer than 10 percent of the immigration quotas from Europe were used from to In many ways, the country was still fearful of the influence of foreign-born people. Resident aliens are people who are living permanently in the United States but are not citizens.
Oftentimes, there was no reason for these people to be detained, other than fear and racism. Beginning in , the government even detained American citizens who were ethnically Japanese. The government did this despite the 14th Amendment of the Constitution, which says "nor shall any State deprive any person of life, liberty or property without the due process of law. Also because of the war, the Chinese Exclusion Act was repealed in China had quickly become an important ally of the United States against Japan; therefore, the U.
Chinese immigrants could once again legally enter the country, although they did so only in small numbers for the next couple of decades. Many people wanted to leave war-torn Europe and come to America. President Harry S. Truman urged the government to help the "appalling dislocation" of hundreds of thousands of Europeans. In , Truman said, "everything possible should be done at once to facilitate the entrance of some of these displaced persons and refugees into the United States.
I believe that the admission of these persons will add to the strength and energy of the Nation. It allowed for refugees to come to the United States who otherwise wouldn't have been allowed to enter under existing immigration law. The Act marked the beginning of a period of refugee immigration. It also allowed non-Europeans to come to the United States as refugees. The Refugee Relief Act also reflected the U. The Soviet Union was also controlling the governments of other countries. The Act allowed people fleeing from those countries to enter the United States. When he signed the Act, President Dwight D. Eisenhower said, "This action demonstrates again America's traditional concern for the homeless, the persecuted, and the less fortunate of other lands. It is a dramatic contrast to the tragic events taking place in East Germany and in other captive nations.
In , there was a revolution in Hungary in which the people protested the Soviet-controlled government. Many people fled the country during the short revolution. They were known as "fifty-sixers". About 36, Hungarians came to the United States during this time. Some of their countrymen also moved to Canada. In , Cuba experienced a revolution, and Fidel Castro took over the government. His dictatorship aligned itself with the Soviet Union. More than , Cubans left their country in the years after the revolution; many of them settled in Florida. In , President Lyndon B. This act repealed the quota system based on national origins that had been in place since This was the most significant change to immigration policy in decades. Instead of quotas, immigration policy was now based on a preference for reuniting families and bringing highly skilled workers to the United States.
This was a change because in the past, many immigrants were less skilled and less educated than the average American worker. In the modern period, many immigrants would be doctors, scientists, and high-tech workers. Because Europe was recovering from the war, fewer Europeans were deciding to move to America. But people from the rest of world were eager to move here. Asians and Latin Americans, in particular, were significant groups in the new wave of immigration. Within five years after the act was signed, for example, Asian immigration had doubled. During the s and s, America was involved in a war in Vietnam.
Vietnam is located in Southeast Asia, on the Indochina peninsula. From the s into the s there was a great deal of conflict in the area. After the war, Vietnamese refugees started coming to the United States. During the s, about , Vietnamese came, and hundreds of thousands more continued to arrive during the next two decades. In , the government passed the Refugee Act, a law that was meant specifically to help refugees who needed to come to the country. Refugees come because they fear persecution due to their race, religion, political beliefs, or other reasons. The United States and other countries signed treaties, or legal agreements, that said they should help refugees.
The Refugee Act protected this type of immigrant's right to come to America. During the s, waves of immigrants arrived from Central America, the Caribbean, and South America. Hundreds of thousands of people came just from Cuba, fleeing the oppressive dictatorship of Fidel Castro. This was a significant new wave of immigrants: During the s, 8 million immigrants came from Latin America, a number nearly equal to the total figure of European immigrants who came to the United States from to , when European immigration was at a high point. The new immigrants changed the makeup of America: By , Latinos in the United States were about Since , immigration has been increasing. It is at its highest point in America's history.
In both the s and s, around 10 million new immigrants came to the United States. The previous record was from to , when around 8 million immigrants arrived. In , the foreign-born population of the United States was Also in that year, California became the first state in which no one ethnic group made up a majority. By comparison, as recently as the s, two-thirds of all immigrants to the United States came from Europe or Canada. The main countries of origin for immigrants today are Mexico, the Philippines, China, Cuba, and India.
About 1 in 10 residents of the United States is foreign-born. Today, the United States is a truly multicultural society. The immigration process began on the winding stairs that led to the Registry Room. Doctors stood on the second floor and watched each person. They looked for people who had trouble walking or breathing or showed signs of other health problems. Immigrants climb the steps to the Registry Room. When the Ellis Island station was built, officials thought no more than half a million immigrants would pass through in a year.
In , more than a million arrived. The highest number for a single day was 11, people. The immigration process on Ellis Island usually took three to five hours. This wasn't because the medical and legal inspections were lengthy, but because there were probably a thousand or more people in line ahead of you. A New Land The major European powers including England, Spain, and France established colonies, which are lands controlled by a faraway government. Learn More. Mayflower in Expanding America Total U. Immigration from to by Continent of Origin. Source: U. Department of Homeland Security. Harper's Weekly. The American Dream Total U. A Place of Refuge Total U. From to , the world underwent a great deal of strife, conflict, and change.The agent in How Did Colonial Government Treat The Native Americans, Indian Territory Arkansasreported "the opening of beer saloons How Did Colonial Government Treat The Native Americans every village in the How Did Colonial Government Treat The Native Americans, almost without How Did Colonial Government Treat The Native Americans. Even after they rebuilt in Oklahoma, Indian nations endured devastating assaults on Self Reflection: Personality Analysis rights of self-government. Posters should provide a basic description How Did Booker T Washington Fight For African American Rights the disease including symptoms and how it is spread. Did the history from their tribal sources conflict with what they read in How Did Colonial Government Treat The Native Americans textbook? | <urn:uuid:df840106-3a14-4fbe-b63c-429ec25f081b> | CC-MAIN-2022-05 | http://college-essay.essaysprowriting.info/cheap-college-papers/page-484-2021-10-16.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303747.41/warc/CC-MAIN-20220122043216-20220122073216-00415.warc.gz | en | 0.972851 | 2,894 | 3.765625 | 4 |
April 11th, 2011
11:21 AM ET
By Jessica Ravitz, CNN
The question arose early in British academic A.C. Grayling’s career: What if those ancient compilers who’d made Bibles, the collected religious texts that were translated, edited, arranged and published en masse, had focused instead on assembling the non-religious teachings of civilization’s greatest thinkers?
What if the book that billions have turned to for ethical guidance wasn’t tied to commandments from God or any one particular tradition but instead included the writings of Aristotle, the reflections of Confucius, the poetry of Baudelaire? What would that book look like, and what would it mean?
Decades after he started asking such questions, what Grayling calls “a lifetime’s work” has hit bookshelves. “The Good Book: A Humanist Bible,” subtitled “A Secular Bible” in the United Kingdom, was published this month. Grayling crafted it by using more than a thousand texts representing several hundred authors, collections and traditions.
The Bible would have been “a very different book and may have produced a very different history for mankind,” had it drawn on the work of philosophers and writers as opposed to prophets and apostles, says Grayling, a philosopher and professor at Birkbeck College, University of London, who is an atheist.
“Humanist ethics didn’t claim to be derived from a deity," he says. "(They) tended to start from a sympathetic understanding of human nature and accept that there’s a responsibility that each individual has to work out the values they live by and especially to recognize that the best of our good lives revolve around having good relationships with people.”
Humanists rely on human reason as an alternative to religion or belief in God in attempting to find meaning and purpose in life.
Determined to make his material accessible, Grayling arranged his nearly 600-page "Good Book" much like the Bible, with double columns, chapters (the first is even called Genesis) and short verses. And much like the best-selling King James Bible, which is celebrating its 400th year, his book is written in a type of English that transcends time.
Like the Bible, "The Good Book," opens with a garden scene. But instead of Adam and Eve, Grayling's Genesis invokes Isaac Newton, the British scientist who pioneered the study of gravity.
"It was from the fall of fruit from such a tree that new inspiration came for inquiry into the nature of things," reads a verse from "The Good Book's" first chapter.
"When Newton sat in his garden, and saw what no one had seen before: that an apple draws the earth to itself, and the earth the apple," the verse continues, "Through a mutual force of nature that holds all things, from the planets to the stars, in unifying embrace."
The book's final chapter features a secular humanist version of the Ten Commandments: "Love well, seek the good in all things, harm no others, think for yourself, take responsibility, respect nature, do your utmost, be informed, be kind, be courageous: at least, sincerely try."
Grayling, reached Friday at a New York hotel just as he began his U.S. book tour, has been dubbed by some a “velvet atheist” or an “acceptable face of atheism,” he says, in contrast to more stridently anti-religious writers like Christopher Hitchens and Richard Dawkins, both of whom he counts as friends.
In other contexts, Grayling - who will soon take over as president of the British Humanist Association - admits he’s written critically about religion. But not in "The Good Book."
“It’s not part of a quarrel,” he says of his latest work. “It’s a modest offering… another contribution to the conversation that mankind must have with itself,” and one he says he wrote for everyone, Bible lovers included.
Given where society is today, inviting that conversation is all the more important, he says.
More than 16% of Americans say they are unaffiliated religiously, according to the Pew Forum on Religion and Public Life. Even so, Grayling says the hunger for a spiritual connection continues. That yearning, he argues , can be satisfied for many by taking a walk in the country, curling up with a beautiful book of poetry or even in falling in love.
“In all different ways, we can celebrate the good in the world,” he says.
While many intellectual traditions – religious and otherwise – teach that there’s “one right way to live,” Grayling says he hopes “The Good Book” will encourage people to “go beyond your teachers, your text” to understand that “we have to respect and relate to one another.”
Early sales indicate that people are open to what this new "Bible" teaches. On Monday, Grayling’s book was number 41 on Amazon’s UK bestseller list and number 1 in the philosophy and spirituality categories.
About this blog
The CNN Belief Blog covers the faith angles of the day's biggest stories, from breaking news to politics to entertainment, fostering a global conversation about the role of religion and belief in readers' lives. It's edited by CNN's Daniel Burke with contributions from Eric Marrapodi and CNN's worldwide news gathering team. | <urn:uuid:17d95ffe-f518-4a54-954c-3859990164c5> | CC-MAIN-2017-09 | http://religion.blogs.cnn.com/2011/04/11/leading-atheist-publishes-secular-bible/?iref=NS1 | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00564-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963164 | 1,155 | 2.796875 | 3 |
The framers designed a constitutional system in which the government would play a vigorous role in securing the liberty and well-being of a large and diverse population. They built a political system around a number of key elements, including debate and deliberation, divided powers competing with one another, regular order in the legislative process, and avenues to limit and punish corruption. America in recent years has struggled to adhere to each of these principles, leading to a crisis of governability and legitimacy. The roots of this problem are twofold. The first is a serious mismatch between our political parties, which have become as polarized and vehemently adversarial as parliamentary parties, and a separation-of-powers governing system that makes it extremely difficult for majorities to act. The second is the asymmetric character of the polarization. The Republican Party has become a radical insurgency – ideologically extreme, scornful of facts and compromise, and dismissive of the legitimacy of its political opposition. Securing the common good in the face of these developments will require structural changes but also an informed and strategically focused citizenry.
From Federalist No. 1 on, the framers of the American political system showed a deep concern about the role of government as a trustee of the people, grappling with questions about the power, structural stability, and credibility of government. In that first Federalist paper, Alexander Hamilton defended a vigorous role for government: “[It] will be equally forgotten that the vigor of government is essential to the security of liberty; that, in the contemplation of a sound and well-informed judgment, their interests can never be separated; and that a dangerous ambition more often lurks behind the specious mask of zeal for the rights of the people than under the forbidding appearance of zeal for the firmness and efficiency of government.1
In Federalist No. 46, James Madison wrote, “The federal and state governments are in fact but different agents and trustees of the people, constituted with different powers and designed for different purposes.”2 And in Federalist No. 62, Madison, outlining and defending the special role of the Senate, reflected at length on the need for stable government and the danger of mutable policy: “[G]reat injury results from an unstable government. The want of confidence in the public councils damps every useful undertaking, the success and profit of which may depend on a continuance of existing arrangements.”3
Stable government, to Madison, included an underlying and enduring legitimacy in the legislative process. This meant both a disciplined government that did not spew out a plethora of unnecessary and careless laws, and a government that did not produce contradictory laws or reversals of laws so frequently that citizens questioned the content and legitimacy of the standing policies affecting their lives. Madison wrote in Federalist No. 62 of mutable policy: “It will be of little avail to the people, that the laws are made by men of their own choice, if the laws be so voluminous that they cannot be read, or so incoherent that they cannot be understood; if they be repealed or revised before they are promulgated, or undergo such incessant changes that no man, who knows what the law is today, can guess what it will be tomorrow.”4
Madison ended Federalist No. 62 with a warning that resonates today: “But the most deplorable effect of all is that diminution of attachment and reverence which steals into the hearts of the people, toward a political system which betrays so many marks of infirmity, and disappoints so many of their flattering hopes. No government, any more than an individual, will long be respected without being truly respectable; nor be truly respectable without possessing a certain portion of order and stability.”5
The actions and functions of government, a vibrant political process and system, were thus essential for the common good of a society. The framers saw several challenges peculiar to the new American country. It was, as they wrote, an “extended republic,” a huge geographic expanse and a society containing dramatically diverse populations, including people living in rural areas so remote that they literally might not see other human beings for months, and others living in urban areas far more densely packed than today’s Manhattan. How could the new government build consensus and legitimacy around policies that would affect all citizens, in light of their different interests, lifestyles, and backgrounds? The demands of the American political system differed from those in Britain, a much smaller and far more homogeneous culture and society. Instead of a parliamentary system, the framers carefully constructed a system that would be practicable and desirable for their nation, built around the following elements:
Debate and deliberation. The legislative branch was called Congress – not parliament. This was not simply a different word, but reflective of a different approach to governance. The word congress comes from the Latin word congredi, meaning to come together; parliament comes from the French word parler, meaning to talk. In a parliament, the legislators vote on a program devised by the government; the majority members reflexively vote for it, the minority members reflexively vote against. Citizens accept the legitimacy of the actions, even if they do not like them, because within four or five years, they have the opportunity to hold the government accountable at the polls. The minority expresses its power by publicly questioning government actions and intentions during regular periods of “Question Time.”
In contrast, the American framers wanted a system in which representatives of citizens from disparate regions would come together and meet face to face, going through extended periods of debate and deliberation across factional and partisan lines. This model would enable the representatives to understand each other’s viewpoints and ultimately reach some form of consensus in policy-making. Those who lost out in the deliberative process would be satisfied that they had been given ample time to make their case, adding to the likelihood that they would accept the legitimacy of the decisions made, and communicate that acceptance back to their constituents. Of course, in contrast to a parliament, it was a process that made swift action extremely difficult. But the trade-off was that government power would be constrained and that Americans would be more likely to accept the decisions and implement them fairly and smoothly.
Debate and deliberation could not be limited to governmental actors. For the system to work and be perceived as legitimate, there had to be debate and deliberation among citizens, via local and national “public squares,” and in campaigns, where candidates and their partisans could press their cases and voters could weigh the viewpoints and preferences of their alternatives for representation.
Divided powers competing with one another. America’s unusual system of the separation of powers did not offer a clean and pure division between the executive, legislative, and judicial branches, nor between the House of Representatives and Senate. Instead, as constitutional scholar Edward Corwin put it, it was an “invitation to struggle” among the branches and chambers. But that invitation to struggle, which anticipated vibrant, assertive, and proud branches, also was infused with the spirit of compromise, as eloquently analyzed by Amy Gutmann and Dennis Thompson in this volume and in their recent book on the subject.6 A political system with separation of powers and separate elections for House, Senate, and president could easily have institutions at loggerheads. The system, and the culture supporting it, required safeguards to enable the government to act when necessary and desirable, without getting caught in stalemate or gridlock.
Regular order. To make the processes work and to foster legitimacy, legislative and executive procedures had to be regularized and followed. This would in turn enable real debate by all lawmakers, opportunity for amendments, openness and reasonable transparency, and some measure of timeliness. Executive actions, including crafting and implementing regulations to carry out policy, would also require elements of transparency, responsiveness to public concerns, and articulated purpose. Similarly, judicial actions would have to allow for fairness, access to legal representation, opportunities for appeal, and a parallel lack of arbitrariness.
Avenues to limit and punish corruption. Public confidence in the actions of government – a sense that the processes and decisions reflect fairness and enhance the common good – demands that the cancer of corruption be avoided or at least constrained. If small groups of special interests or wealthy individuals can skew decisions in their favor, it will breed cynicism and destroy governmental legitimacy. Thus, it is necessary to find ways to constrain the role of money in campaigns, to build transparency around campaign finance and lobbying, to discourage “old boy networks” and revolving doors, to investigate and prosecute bribery, and to impeach and remove government officials who commit high crimes and misdemeanors, which include corrupt behavior.
On all these fronts, there is ample reason to be concerned about the health and function of America’s current political institutions. Of course, no political system operates exactly as intended. Politics and policy-making are inherently messy, occurring at the intersection of power, money, and ambition, and leading to temptations and imperfections. We have been immersed in these processes in Washington for more than forty-three years, and we have observed frequent governmental failures, deep tensions, and challenges to the political system – from profound societal divisions over wars like Vietnam to the impeachment proceedings against two presidents. But those challenges were modest compared to what we see today: a level of political dysfunction clearly greater than at any point in our lifetimes.
Fundamentally, the problem stems from a mismatch between America’s political parties and its constitutional system. For a variety of reasons, all recounted in our book It’s Even Worse Than It Looks: How the American Constitutional System Collided With the New Politics of Extremism, the two major political parties in recent decades have become increasingly homogeneous and have moved toward ideological poles.7 Combined with the phenomenon of the permanent campaign, whereby political actors focus relentlessly on election concerns and not on problem-solving, the parties now behave more like parliamentary parties than traditional, big-tent, and pragmatic American parties.
Parliamentary parties are oppositional and vehemently adversarial, a formula that cannot easily work in the American political system. The parliamentary mindset has been particularly striking in recent years with the Republican Party, which has become, in its legislative incarnation especially, a radical insurgent, dismissive of the legitimacy of its political opposition. Of course, substantial majorities in the House and Senate, along with the presidency, can give a majority party the opportunity to behave like a parliamentary majority. But that phenomenon, which occurred for Democrats in the first two years of the Obama administration, resulted in major policy enactments but not a smoothly functioning political system. It featured neither a widespread sense of legitimacy nor deep public satisfaction.
Why? The processes of debate and deliberation were disrupted first by the Republicans’ unprecedented use of the filibuster and the threat of filibuster as purely obstructionist tools. This deluge was designed to use precious floor time without any serious discussion of the reasons behind the filibusters, or any real debate on differences in philosophy or policy. Second, when Democrats were able to pass legislation, it was against the united and acrimonious opposition of the minority. America’s political culture does not easily accept the legitimacy of policies enacted by one party over the opposition of the other – much less the continued, bitter unwillingness of the minority party to accept the need to implement the policies after lawful enactment. But this dynamic, which accompanied the economic stimulus package in 2009, the health care reform law of 2010, and the financial regulation bill in 2010, among others, resulted in greater divisions and public cynicism, not less.
The approach of the minority party for the first two years of the Obama administration was antithetical to the ethos of compromise to solve pressing national problems. The American Recovery and Reinvestment Act of 2009, a plan which included $288 billion in tax relief, garnered not one vote from Republicans in the House. The Affordable Care Act, essentially a carbon copy of the Republican alternative to the Clinton administration’s health reform plan in 1994, was uniformly opposed by Republican partisans in both houses. A bipartisan plan to create a meaningful, congressionally mandated commission to deal with the nation’s debt problem, the Gregg/Conrad plan, was killed on a filibuster in the Senate; once President Obama endorsed the plan, seven original Republican co-sponsors, along with Senate Republican Leader Mitch McConnell, joined the filibuster to kill it. McConnell’s widely reported comment that his primary goal was to make Barack Obama a one-term president – a classic case of the permanent campaign trumping problem-solving – typified the political dynamic.
The succeeding midterm election brought a backlash against the status quo – which meant divided government once Republicans captured a majority in the House of Representatives. As a result, the 112th Congress had the least productive set of sessions in our lifetimes, enacting fewer than 250 laws, more than 40 of which were concerned with naming post offices or other commemoratives.8 The major “accomplishment” of the 112th Congress was the debt limit debacle, which marked the first time the debt limit had been used as a hostage to make other political demands. The result was not just the first-ever downgrade in America’s credit, but another blow to the public’s assessment of its government’s capacity to act on behalf of the common good.
The 2012 elections were in most respects a clear expression of public will. President Obama earned reelection with a majority of popular votes, as did Democrats in elections for the House and in the thirty-three contests for the Senate. But in the House, a concentration of Democratic voters in high-density urban areas, contributing to a more efficient allocation of Republican voters across congressional districts, and a successful partisan gerrymander in the redistricting process left Republicans with a majority of seats, and hence control. Despite the election, the dysfunction in the policy process continued in the succeeding lame duck session of Congress, as efforts to resolve America’s fiscal problems before January 1, 2013, deadline were thwarted until after the deadline had passed. House Speaker John Boehner was himself undermined by members of his own party when he tried to devise an alternative to the president’s plan. In this case, a substantial share of safe House Republican seats were immune to broader public opinion and to their own Speaker, but were more sensitive to threats from well-financed challenges in their next primaries – from the Club for Growth and other ideological organizations – and to incendiary comments from radio talk show hosts and cable television commentators popular among Republican voters in their districts.
Tribal politics and vehement adversarialism has also led to deterioration of the regular order. In recent years, there have been more and more closed rules in the House, denying opportunities for amendments from the minority, and more uses of a majority tactic in the Senate called “filling the amendment tree,” in which the majority leader precludes amendments, usually as a way to forestall or limit the impact of filibusters. There have been more omnibus bills, pooling action across areas because of the increased difficulty in getting legislation enacted; and fewer real conference committees to iron out differences between bills passed by each house of Congress. There have been fewer budget resolutions adopted and appropriations bills passed; fewer authorizations of programs and agencies; and less oversight of executive action. Fewer treaties have gained the two-thirds vote needed for ratification in the Senate, leading to more executive actions. There have been more holds and delays in the Senate in executive nominations. All of these pathologies lead to more acrimony inside Congress and between Congress and the executive, and a diminished sense of confidence by Americans in their political and policy institutions.
At the same time, the administration of elections has been politicized. Partisan legislatures have passed stringent voter ID laws to narrow the vote; several of these laws have been thrown out by courts for targeting or unfairly affecting minorities. In other cases, shortened voting hours and restrictions on early voting, in states such as Florida and Ohio, were also aimed at constraining minority voters. Fortunately, the 2012 election was not close; had it been more like the 2000 election, it is very likely that it would have further reduced public trust in the fundamentals of democratic elections.
The world of money and politics has also taken an alarming turn toward at least the appearance of corruption, of democracy driven by big money and large interests. A combination of factors – the Supreme Court’s Citizens United decision, an appeals court decision called SpeechNow, a Federal Election Commission that is unable or unwilling to enforce campaign finance laws, and an Internal Revenue Service that allows the operation of faux social-welfare organizations set up to influence elections but not required to disclose donors – has given wealthy individuals, corporations, and other entities an overweening influence on elections and on the policy process. If super PACs did not determine the outcome of the presidential election, their impact did expand as one moved down through Senate and House elections and on to state, local, and judicial elections. In states like Kansas, North Carolina, and Arkansas, large donations from a handful of individuals and groups targeted moderate Republicans and replaced them with reactionary conservatives, creating more division and polarization, not to mention politicians beholden to those whose money put them in power.
Organizations such as the American Legislative Exchange Council (ALEC) have used large and often anonymous contributions from corporations and individuals to write laws, including the voter ID laws and laws favoring the corporate sector, that many state legislatures have simply enacted as written, obviating their independent role. And inside Congress, many lawmakers have told us about the intimidating effect that occurs when a lobbyist tells them that if they do not support a bill or amendment, they might face a multimillion-dollar independent attack days or weeks before the election, which they will be unable to counter due to a lack of time or fundraising limitations. Such threats can result in the passage of bills or amendments without any money even being spent. By any reasonable standard, this is corruption.
All of this exhibits a level of dysfunction in American political institutions and processes that is dangerous to the fundamental legitimacy of decisions made by policy-makers, not to mention the ability of those policy-makers to act at all. Tribal politics at the national level has metastasized to many states and localities, and has affected the broader public as well. The glue that binds Americans together is in danger of eroding. What can be done about these problems?
There is no easy answer, no panacea. The problems are as much cultural as structural. But if structural change inside and outside Washington cannot solve the problems, it can ameliorate them, and perhaps also begin to change the culture.
One strategy for structural change is to accept the emergence of parliamentary-style polarized parties and try to adapt our political institutions to operate more effectively in that context. This is easier said than done. Eliminating or constraining the Senate filibuster would give unified party governments a better shot at putting their campaign promises into law.9 But separate elections for the presidency and Congress, as well as the midterm congressional elections, often conspire to produce divided party government, which has become more a basis of parliamentary opposition and obstruction than consensus-building and compromise. Shifting more power to the presidency, which is already underway, may produce more timely and coherent policies but at a considerable cost to deliberation, representation, and democratic accountability. A president is, of course, elected by the entire nation. Especially on national security issues, Americans are willing to tolerate and even embrace many unilateral presidential actions; think Grenada and Abbottabad. But America’s political culture has ingrained in the public a sense that legitimate policies more often call for some form of broad leadership consensus and institutional buy-in. A series of unilateral actions by the president would not necessarily result in public acceptance of the decisions as being made for the common good. The same can be said for other forms of delegation, from Congress to fed-like independent agencies, or boards that encourage more expert and evidence-based decision-making that is at least somewhat removed from the clash of polarized parties. Each of these ideas has some limited promise, but none can be the basis of constructively reconciling a fundamental mismatch between parliamentary - like political parties and the American constitutional system.
Another approach emphasizes trying to bring the warring parties together: by reaching for consensus through increased social interaction (the House experiment with civility retreats); encouragement of or pressure on politicians to come together to make a deal (Fix the Debt); the mobilization of centrists in the citizenry to create political space for more collegial and collaborative policy-making (No Labels); the use of outside bipartisan groups to map policy solutions that split the differences between the polarized parties (Committee for a Responsible Federal Budget); and the support of independent presidential candidates or third parties to lay claim to the allegedly abandoned political “center” (Americans Elect). These efforts by and large seek to create a spirit of compromise, an atmosphere of civility and mutual respect, and a focus on problem-solving – outcomes which are indeed commendable.
But we believe that these well-intentioned efforts are limited by the strength and reach of party polarization, which is buttressed not only by genuine ideological differences among elected officials, but also by like-minded citizens clustered in safe districts, committed activists, a partisan media, a tribal culture, interest groups increasingly segregated by party, a party-based campaign funding system that now encompasses allegedly independent groups, and a degree of parity in party strength that turns legislating into strategic political campaigning. Most of these efforts also suffer from an unwillingness to acknowledge the striking asymmetry between today’s political parties, which in the process gives a pass to obstructionist and dysfunctional behavior.
A more promising strategy of reform is to bring the Republican Party back into the mainstream of American politics and policy as the conservative, not radical, force. Ultimately, this is the responsibility of the citizenry. Nothing is as persuasive to a wayward party as a clear message from the voters. The 2012 election results and the widespread speculation of the diminishing prospects of the Republican coalition in presidential elections may be the start of that process. But it can be boosted and accelerated by the groups discussed above speaking clearly and forthrightly about the damage caused to constructive public policy by tax pledges, debt limit hostage-taking, the abuse of the filibuster, climate change denial, the demonization of government, and ideological zealotry. The mainstream press could also do its part by shedding its convention of balancing the conflicting arguments between the two parties at the cost of obscuring the reality. Voters cannot do their job holding parties and representatives accountable if they do not have the necessary information. Some in the media think it is biased or unprofessional to discuss the many manifestations of our asymmetric polarization. We think it is simply a matter of collecting the evidence and telling the truth.
More significant, for both parties, would be to enlarge the electorate to dilute the overweening influence of narrow, ideologically driven partisan bases that dominate party primaries. As a result, these bases have an outsized role in choosing candidates, who often do not reflect the views of their broader constituencies; and as a means of heading off primary challenges, the bases can intimidate lawmakers searching for compromise or a common good into moving away from solutions. Meanwhile, the enlarged influence of party bases pushes campaign operatives and candidates away from broader appeals and toward strategies to turn out one’s own base (often by scaring them to death), and to suppress the other side’s base. The politics of division trump the politics of unity.
To counter this set of problems, we propose adoption of the Australian system of mandatory attendance at the polls, where voters who do not show up (they do not have to vote for specific candidates, but can cast unmarked ballots) and do not have a written excuse are subject to modest fines, the equivalent of a parking ticket. This system moved Australian turnout from around 55 percent, similar to the United States, to over 90 percent.10 Most important, it changed Australian campaign discourse. Politicians of all stripes have told us that when they know that their own base will turn out en masse, and will be balanced by the other party’s base, they shift their efforts to persuading voters in the middle. That means talking less about wedge issues, like abortion or guns, and more about larger issues like education and jobs; and it means using less of the fiery or divisive rhetoric that excites base voters but turns off those in the middle.
Another option is to expand the use of open primaries and combine them with preference voting. Several states, including California, now use open primaries, in which all candidates from all sides run together; the top two finishers go on the ballot for the general election. Add in preference voting, whereby voters rank their choices in order of preference (something also done in Australia), and it reduces the chances of an extreme candidate winning a top-two finish because multiple non-extreme candidates divide the votes of the more populous, moderate electorate. Another advantage of an open primary is that lawmakers who cast contentious votes would be less intimidated by threats of a primary challenge funded by ideological organizations if they knew the primary electorate would be expanded beyond a small fringe base. If we could combine these changes with redistricting reform, using impartial citizen commissions to draw district lines as we have seen operate in states like Iowa and California, we might get somewhere.
Of course, the enhanced leverage that smaller groups possess over the sentiments of the larger populace has other roots, including especially the post–Citizens United campaign finance world. When groups like the Club for Growth, wealthy individuals, or “social welfare” organizations funded by anonymous sources threaten lawmakers with massive negative campaigns sprung in the final weeks of the election season, or threaten to finance primary opponents against them, it gives immense leverage to the well-heeled few against the viewpoints of the many. Absent a new Supreme Court, a multiple public match for contributions from small donors would give additional leverage to the broader population.
The pull toward tribal politics and away from a focus on the common good has also been shaped by the emergence of tribal media, via cable television and talk radio. The tribal media have established lucrative business models built on apocalyptic rhetoric and divisive messages that guarantee regular audiences within select demographics. These business models have emerged in large part because of the dramatic technological changes that have created hundreds or thousands of alternative information outlets, which are amplified by the emergence of social media. All of this has devastated the concept of a public square, where most Americans could get their information, share a common set of facts, and debate vigorously what to do about common problems. Having real debate and deliberation at the public level, much less the governmental level, depends on sharing a common set of facts and assumptions.
Re-creating a public square is a Herculean task given the contemporary media and technology landscape. But it must be attempted. Public media would be the best venue; finding a way to fund a public/ private foundation that would focus on innovative ways to use public media for straightforward analysis and discourse, including vigorous debate based on common understanding of the facts, should be a priority here. One way to do so would be to apply a rental fee to broadcasters and others for their use of the public airwaves, in return for erasure of the public-interest requirements that now have little impact.11
Most of these changes will be hard to implement in the short run. The best we can hope for is a more tempered Republican Party willing to do business (that is, deliberate, negotiate, and compromise without hostage-taking or brinksmanship) with their Democratic counterparts. Over the long haul, both political parties in the United States need to depolarize to some degree. The parties may maintain clear differences in philosophy and policy, to be sure, but they must also cultivate enough agreement on major issues to permit the government to work as designed. The parties must also serve an electorate that shares a common vision and common facts, even with sharp differences in philosophy, lifestyles, and backgrounds. Despite the obstacles, we must think big about changing the structures and the culture of our partisan government and populace; the stakes are high.
- 1Alexander Hamilton, “Federalist No. 1,” The Federalist Papers, http://thomas.loc.gov/home/histdox/fed_01.html.
- 2James Madison, “Federalist No. 46,” The Federalist Papers, http://thomas.loc.gov/home/histdox/fed_46.html.
- 3James Madison, “Federalist No. 62,” The Federalist Papers, http://thomas.loc.gov/home/histdox/fed_62.html.
- 6See Amy Gutmann and Dennis Thompson, The Spirit of Compromise: Why Governing Demands It and Campaigning Undermines It (Princeton, N.J.: Princeton University Press, 2012).
- 7See Thomas E. Mann and Norman J. Ornstein, It’s Even Worse Than It Looks: How the American Constitutional System Collided With the New Politics of Extremism (New York: Basic Books, 2012).
- 8Amanda Terkel, “112th Congress Set To Become Most Unproductive Since 1940s,” The Huffington Post, December 28, 2012,http://www.huffingtonpost.com/2012/12/28/congress-unproductive_n_2371387.html.
- 9For more on this topic, see Norman J. Ornstein, “A Filibuster Fix,” The New York Times, August 27, 2010, http://www.aei.org/article/politics-and-public-opinion/legislative/a-filibuster-fix/.
- 10Australian Electoral Commission, “Who Voted in Previous Referendums and Elections,” October 26, 2012, http://www.aec.gov.au/Elections/Australian_Electoral_History/Voter_Turnout.htm. Compulsory voting was implemented in Australia in 1924.
- 11For in-depth discussion of the re-creation of a public square, see Norman J. Ornstein with John C. Fortier and Jennifer Marsico, “Creating a Public Square in a Challenging Media Age: A White Paper on the Knight Commission Report on Informing Communities: Sustaining Democracy in the Digital Age,” American Enterprise Institute White Paper, June 23, 2011, http://www.knightcomm.org/wp-content/uploads/2011/06/CreatingaPublicSquare.pdf. | <urn:uuid:e1e61fcf-e695-4674-8443-4ba557fc32ec> | CC-MAIN-2023-50 | https://www.amacad.org/publication/finding-common-good-era-dysfunctional-governance | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00289.warc.gz | en | 0.957217 | 6,304 | 3.171875 | 3 |
Table of Contents (click to expand)
Nuclear missiles are decommissioned by dismantling them. This process is overseen by the National Nuclear Security Administration in the United States. The nuclear missile is taken to a specific underground bunker where it is disarmed. During the disarmament metals such as copper and gold are recycled and sold. The hardest part of the process though as you might have already guesses is the handling of the explosive materials.
Dismantling a nuclear missile is no small feat it is one of the most important geopolitical challenges which we as humans face. To give some rough figures, there are 3750 active nuclear warheads and 14485 total nuclear warheads in the world. Now, what if would it take if you wanted to dismantle just one warhead? Now although the numbers stated till now might look very high, there was a point when the world had close to 70000 nuclear warheads in total. Now an interesting question did cross my mind when seeing these figures. But how did the numbers drastically come down?
Recommended Video for you:
Cutting The Missiles Down
There have been numerous treaties signed during the post-cold war era on the non-proliferation of these missiles. After the dissolution of the Soviet Union President George H.W Bush was responsible for the laying down of close 9500 warheads during his long term of presidency. He cut down 5300 warheads in the year 1992 alone. Which stands as the most number of nuclear missiles put out of action by any President till date. His son George Walker Bush who cut the nuclear stockpile to more than half to 5270 warheads.
But coming towards the present time the New START treaty between the United States and Russia is the most important non-proliferation treaty in the world right now. But it’s supposed extension seems to be in a precarious state of limbo. To give some perspective as to why these treaties are important. Let us take the case example of India and Pakistan. Now the number of warheads in total between India and Pakistan is around 250 warheads. If all these warheads were used between the two countries due to regional conflict, it would be enough to destroy the entire atmosphere of the earth.
Stripping A Missile Down
Now keeping the political issues aside let’s take a look at how a nuclear missile is stripped down. The prime components in a nuclear missile are the exterior, the fuel (which may either be plutonium or uranium), a deuterium boost gas (used for starting the explosive reaction) and other elements which have been stated by the Union of Concerned Scientists. In the United States, the National Nuclear Security Administration is the government body which oversees the disarmament of nuclear missiles. It is present in the Pantex Plant in Panhandle of Texas. The facility is responsible for the construction and the disarmament of nuclear missiles. The nuclear missile is taken to a specific underground bunker where it is disarmed.
During the disarmament metals such as copper and gold are recycled and sold. The hardest part of the process though as you might have already guesses is the handling of the explosive materials. The handling of the explosive materials Uranium and Plutonium cannot be done in the same manner.
Also Read: Would A Nuclear Missile Cause A Nuclear Explosion If It’s Shot In Mid-Air?
Differences In Uranium And Plutonium
For fuel both Uranium and Plutonium can be used as successful candidates. But the difference lies in the fact that you need much lesser of the latter as fuel, and hence plutonium is more preferred as the most favorable fuel source for nuclear missiles. Bomb-ready Uranium as it is commonly referred to as is easier to extract. The easiest way of making a Uranium bomb is with U-235. But as it is a very rare natural isotope of Uranium, it is mixed in trace quantities with U-238.The extraction of the trace amount of U-235 is done most commonly by spinning it in massive centrifuge assemblies that are capable of separating the uranium by weight.
The funny thing about Plutonium is that it is a naturally occurring element but a man-made one. The isotope of plutonium most commonly used is Plutonium-239 in plutonium-based nuclear warheads. After extraction Uranium may be used as fuel to run in nuclear reactors for a few years. But plutonium can’t be used for much else besides nuclear weapons. And this is one of the reasons why non-proliferation treaties strictly condemn the spread of nuclear warheads.
Also Read: Why Is Thorium, A Potentially Safer Alternative To Uranium, Not Used In Nuclear Reactors?
How well do you understand the article above! | <urn:uuid:4ff722aa-e9db-4e56-a2c3-314ea2cea9dc> | CC-MAIN-2023-23 | https://www.scienceabc.com/eyeopeners/nuclear-missiles-decommissioned.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652184.68/warc/CC-MAIN-20230605221713-20230606011713-00738.warc.gz | en | 0.948548 | 961 | 3.359375 | 3 |
The recent decision by the Chicago Public Schools system to reinstate recess, effectively reversing years of optional recess policy (an option that was exercised less and less), is a step in the right direction. It’s also a stark reminder not to lose sight of the basics.
If you spend a few minutes at a playground watching recess, you’ll see the full range of human behavior — from friendship and sharing to conflict and cruelty. This is why, for nearly a century, child behaviorists have chosen sandboxes, hopscotch boards and jungle gyms as their observation sanctuaries. Not surprisingly, the results of their work have been very clear: recess is really, really important for kids. It is the only place schoolchildren have for free choice, free play and the chance to interact. There are the obvious health benefits of physical fitness, but there are more subtle benefits to be gained, like social intelligence, morality and ethical behavior. There’s also good evidence that learning inside the classroom actually comes more easily when children have a chance to let loose outside the classroom. Olga Jarrett at Georgia State University, for example, showed in her 2002 report that students focused better with recess than without recess and that this effect was even stronger for hyperactive children.
Despite this support, the truth is that we are in a recess recession. Growing up, most of us benefited from three recess periods per day; today kids are lucky to get one or two. And if you are a child attending a poor, urban or mostly minority school, the problem is worse for you: according to the Department of Education and National Center for Education Statistics, you have, on average, 10 to 15 minutes less playground time per day than your affluent counterpart. You are also much more likely to have no recess at all.
So what pushes cities and towns to the recess-cutting point in the first place? The most accepted answer is that the U.S. has witnessed an unprecedented preoccupation with academic standards over the past 20 years. More testing means more test preparation, and recess is always the first to go to make up for the time.
Lately, however, another antirecess argument has hit the scene. It stems from a nationwide consciousness and fear of bullying. Essentially the idea (albeit mistaken) is that without recess, bullies will have less opportunity to victimize their peers. Bullying, of course, isn’t eliminated when recess is banned — instead it just goes underground, metastasizing in hallways, bathrooms, buses and on the Internet. What’s perhaps more provocative, although it hasn’t been extensively studied, is whether we are overdiagnosing bullying on the playground; are we mislabeling, for instance, harmless (and probably beneficial) play-fighting? Anthony Pellegrini, a psychologist at the University of Minnesota, has often cited in his research that adults are not very good at distinguishing play-fighting from aggression — children are much better at this. The untrained adult has a hard time knowing exactly when to step in, and probably steps in too quickly. To make matters worse, in many schools a common punishment for perceived misbehavior (including perceived bullying) is recess deprivation. Never mind that these highly spirited and physically oriented children usually need recess the most.
The real solution to bullying on the playground is to train recess supervisors to know the difference between playing and aggression, and to recognize and respond appropriately to escalating situations. This, at its most basic level, means learning how to feel comfortable with children arguing about the rules of a game or about whether the ball was in or out. When this happens, recess becomes a wonderful working laboratory for children to develop their social competence, leadership abilities and conflict-resolution skills.
The Robert Wood Johnson Foundation, dedicated to improving the health and health care of all Americans, has reported that funding for physical education and after-school programming is strong, but recess funding is desperately lacking. This is the next frontier: putting the money where we know it will help children thrive in school. Imagine a world where we get as excited about funding access to recess as we do about funding access to computers. Sure, we want our children to be ready for the digital future, but we also want them to be leaders, creative thinkers and entrepreneurs — skills that they will develop on the playground as much as in the classroom. | <urn:uuid:bb70c153-f317-4eea-bf03-7c1cdbf9cc6b> | CC-MAIN-2018-17 | http://ideas.time.com/2011/11/29/have-we-gone-overboard-about-bullying/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945448.38/warc/CC-MAIN-20180421203546-20180421223546-00226.warc.gz | en | 0.969423 | 891 | 2.984375 | 3 |
Kalamazoo|Battle Creek International Airport History
The inspiration of an airport in Kalamazoo began in 1925. In May of 1926, the City of Kalamazoo bought 383 acres of land near Portage and Kilgore Roads. Scheduled air service began between Kalamazoo and Grand Rapids shortly thereafter, and the first regular air mail service started in July, 1928. In February 1929, the field was licensed as the first municipal airport in Michigan. It was named Lindbergh Field in honor of famous aviator, Charles Lindbergh.
In 1958 a new terminal was constructed to replace the old building that had housed passengers since the 1920’s. In 1961, an air traffic control tower and additional runways were built. Year after year, the number of passengers using the facility and the number of flights in and out of Kalamazoo continued to grow. The consistent growth necessitated a terminal expansion in 1979 and the building increased from 12,000 to 30,000 square feet.
In 1982, the Core Council decided that the City of Kalamazoo should no longer bear the full cost of operating the airport, and in 1984, the City transferred ownership to the County of Kalamazoo. The County recognized the need to increase service at the Kalamazoo County Airport. The terminal was completely renovated in 1989, with the addition of a new concourse, an enlarged boarding area, a new baggage claim area, and a ramp expansion. This expansive project doubled the size of the terminal, and passenger traffic grew from 200,000 per year to over 500,000 per year by 1993. In 1994, passenger volume dictated the need for a parking lot expansion, during which time, over 300 long-term spaces were added.
Today, the Kalamazoo|Battle Creek International Airport is served by 2 major airlines that fly hundreds of passengers each day to major hubs with worldwide connections. The airport is self-sufficient and has a significant economic impact on Southwest Michigan. The goal of the Kalamazoo|Battle Creek International Airport staff is to continue to provide a variety of safe, reliable commercial air transportation services to our customers and to adequately adapt and expand to meet their needs. | <urn:uuid:438850cc-38b1-4f10-a6d6-26ee1ee88700> | CC-MAIN-2014-10 | http://azoairport.com/about/azo-history/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010451932/warc/CC-MAIN-20140305090731-00042-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.968485 | 441 | 2.53125 | 3 |
Cooking / Events / Nutrition / Our story / Sustainability
Top 5 Reasons Why We Should Eat Insects
January 8, 2018
5: A Healthier Alternative:
Insects are a complete protein! They contain all nine essential amino acids and include important minerals like iron and calcium…not to mention, they can be up to 69% protein depending on how they are prepared.
4: Great Tasting:
Over 2 billion people worldwide enjoy insects as part of their diet. They are most commonly eaten in Africa, Asia and South America, often as a delicacy.
3: Less GHGs:
Traditional livestock farming produces more greenhouse gas emissions worldwide than cars do. Insect farming is a far more efficient way to get our protein fix!
2: Smart Land Utilisation:
Traditional meat production uses 70% of the planet’s cultivable land. Rearing insects can be a far more efficient alternative as they can be farmed vertically.
1: Sustainable Protein:
Insects require just a fraction of the land, water and feed in comparison to traditional livestock, for the same amount of protein. They can also be farmed in virtually any climate or environment! | <urn:uuid:08d03c57-530d-4bbf-8c1d-f917da803394> | CC-MAIN-2019-30 | https://www.eatgrub.co.uk/top-5-reasons-for-edible-insects/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527907.70/warc/CC-MAIN-20190722092824-20190722114824-00242.warc.gz | en | 0.908598 | 246 | 2.59375 | 3 |
Has the state been cleansed of the exciting but freakish-looking cosmic mythology we find in the ancient Near East? Drastic shifts in form and political economy, intertwined with critiques such as those of Aristotle, Machiavelli, Hobbes and Spinoza, seem to have left this gory political theology far behind. But there is something to Schmitt’s leering suggestion that Hobbes did nothing but reanimate the Leviathan and give it a new role.
Today, states can now seem more human than actual people. Logistically, it is easier for mass media to portray a state as a person than to portray groups of actual stateless people this way. After all, they can communicate, spend, save, and fight on far larger scales than, say, refugees. This explains much of the struggle to mediate pictures of victims; the injuries and deaths of the stateless become harder to believe since they lack a home address.
But if states are cast in daily news dramas as unassuming persons with a natural, even God-given set of rights, a look at the history of this figure can disrupt the naturalness of such assumptions. Ernst Kantorowicz’s The King’s Two Bodies shows that in the European Middle Ages, states were very different kinds of persons, providing a powerful contrast as well as analogy to ancient and modern notions. The king was thought of as two entirely different kinds of persons that met temporarily in any specific king: he had a human body but like Jesus Christ he embodied something that was in reality entirely nonhuman and eternal. The medieval political theology of Christendom flowed from Christology. Unlike modern idealizations of the state, the king’s eternal body did not, for example, include the people, and was perfectly capable of being opposed to his physical body, as in the famous case when Parliament, acting on behalf of the eternal royal body, convicted the physical instance of the king of treason and sentenced his body to death (a moment of acute interest to Hobbes).
Personification of the state as a body–with its purest example in fascism’s unity of people as hierarchically placed organs and limbs– is very old. There seems to be an Indo-European myth of the ordered world as sacrificed body, which needs a priest to repeat the killing. But this state was only personified as an agent–it did not feel or hurt; it only took victims.
A set of new myths and practices around the individual, no less than developments in technology and the social organization of media, suggests a great modern innovation. This is the state as patient: feeling, sensitive, even hurt., The State That Takes Selfies.
An old story in anthropology has it that in the 20s’ a Native Canadian went knocking door-to-door in Ottowa because he wanted to meet the State, who he’d heard so much about. The personhood of states is probably the most powerful modern myth. It’s not just that it lets the different groups using the state as a forwarding address (as it were) get away with so much, as that it encourages everyone to act as if they really live there.
Naturally hypersensitive to the mythology of state power, Carl Schmitt put the problem succinctly: is it any accident that Hobbes chose the giant monster God created and defeated, the Leviathan, as his personification of the state?
Alex Golub conceptualizes the historical arc of this myth succinctly: in the famous old political myths of dragonslaying, God’s defeat of the enemy Leviathan is the original act of sovereignty, allowing him to found his kingdom. After the early modern dethronement of God’s monopoly over the right to violence, the state itself becomes Leviathan.
In Iron Age and later Near Eastern myths, God gained the right to rule by defeating the cosmic dragon and sacrificially carving her body–logic that interestingly correlates with cross-cultural patterns of hierarchy and sacrifice. But the myth’s political meaning lay in God’s conferring his powers of sovereignty and violence on his microcosmic correlate, the king. Different versions of this act are narrated in the Babylonian Enūma Elish epic and Psalms 74 and 89. But Aaron Tugendhaft shows that earlier versions–in the diplomatic correspondence of Old Babylonian Mari and the Ugaritic Baal epic–already manipulate or question the neat correspondence between God and his mortal mini-me.
It is this logic that explains a series of strange biblical texts. In both Exodus 32 and the archaic poetry of Psalm 68, a remarkable level of violence is directed at a calf. It is defeated in some of the same ways the war-goddess Anat triumphs against cosmic enemies like Death and the “divine young bull” in Ugaritic myth. Cristiano Grotanelli’s “The Enemy King is a Monster: A Biblical Equation” showed that each is an instance of a larger mythic motif, in which a monstrous non-human creature must be dismembered to protect the cosmos.
Most striking was Grotanelli’s demonstration of how this old myth was transferred to human enemies: in both Judges 3 and 1 Samuel 15 a human king–Eglon of Moab and Agag, King of Amalek, are dismembered with similar cosmic significance. As Dumézil writes, explaining the absence of myths about gods and the presence in early Roman historical writing of themes typical of Indo-European myth,
The myths have been transferred from that great (macrocosmic or divine) world to this (Roman) world, and the protagonists are no longer the gods but great men of Rome who have taken on their characteristic traits. | <urn:uuid:e6c20d53-90e7-4df8-a0e4-9fc9395043d6> | CC-MAIN-2017-26 | https://sethlsanders.wordpress.com/2014/07/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00383.warc.gz | en | 0.962771 | 1,187 | 3.078125 | 3 |
Chronic Venous Insufficiency
Learn about chronic venous insufficiency (CVI) and with what treatments our vein doctors can provide you.
What is chronic venous insufficiency (CVI)?
Chronic venous insufficiency occurs when there is disruption of the normal flow of blood within the veins over a long period of time. Veins carry deoxygenated blood, with all the by-products of metabolism (the ‘used blood’), back into the body, where the blood is then cleaned in organs such as the liver and kidney. Then, they carry the blood back to the lungs to be reoxygenated. Ultimately, veins carry blood back to the heart. When the veins are not working properly, blood is not carried back into the body as quickly as it should be, and may pool in the lower parts of the body. This happens when the vein walls stretch too much (i.e. with varicose veins) or when the valves within the veins are not working properly (i.e. varicose veins, damaged valves from blood clots, congenital issues). Overtime, when the “used” blood is pooling within the veins, the tissues around the veins start to get damaged. This happens because of inflammation in and around the vein due to the stretching of the vein and the contents of the blood itself, as well as due to the increased pressure within the vein since more blood is collecting within that vein. Typically, the damage due to the chronic inflammation of venous insufficiency is seen in the lower legs.
What are the symptoms of CVI?
The symptoms of CVI in the legs are very similar to the symptoms of varicose vein disease:
- aching, pain
- itching, burning
If chronic venous insufficiency is not treated early, the pressure and swelling increase until (often irreversible) damage to the skin and soft tissues occur. This is seen as:
- progressive, worsening swelling or edema
- discoloration of the skin of the lower leg (red or brown appearing)
- changes in the texture of the skin/soft tissue – becoming tight or leathery
- rashes or dermatitis may occur
- venous stasis ulcers or sores may occur
Prevention of CVI:
Prevention of chronic venous insufficiency revolves around preventing or managing the causes. If you have varicose veins, or you have a family history of varicose veins, seeing a vein specialist to determine how much of a risk you have for developing CVI is important. Treatment of varicose veins BEFORE the skin and soft tissue changes of CVI occur is the best way to prevent irreversible damage that is likely to affect your quality of life and activity level in the future. Contact our vein clinic for CVI prevention if:
- You have a history of a blood clot, or DVT, taking steps to avoid post thrombotic syndrome or developing a second DVT in the same leg is important. Our vein doctors at Center for Advanced Vein Care can help provide further insight into prevention.
- You have a family member with symptoms or signs (changes to the skin or soft tissue of the legs as described above) of CVI, you may want to be evaluated to see if you are at risk of developing CVI. Many aspects of vein disorders are hereditary. You do not need to see varicose veins on your legs to have venous insufficiency that will eventually worsen to the point that you DO see them, or develop CVI. Coming into our vein clinic to catch this early may help you prevent more serious vein problems down the road.
What can I do today to decrease my risk?
Exercise, eat a healthy diet, lose weight (if you are overweight), avoid long periods of sitting or standing, and wearing properly fitted compression stockings will all help decrease your risk of CVI and/or slow down the progression of CVI if it has already started. If you are concerned about CVI, come into our vein clinic to consult with a vein specialist today. | <urn:uuid:ff37586e-4823-4216-aed3-a825a7676db4> | CC-MAIN-2018-39 | https://www.yourhealthyveins.com/services/chronic-venous-insufficiency/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160842.79/warc/CC-MAIN-20180924224739-20180925005139-00367.warc.gz | en | 0.944475 | 849 | 2.828125 | 3 |
Mate Selection and Marriage
Mate Selection and Marriage
Matrimony. Following the Han dynasty (206 B.C.E.-220 C.E.), Chinese society developed in distinctly aristocratic directions. Family status and dowries were two determining factors of the institution of marriage during the Tang dynasty (618-907). A relatively small number of families were preeminent in social and political life. People also celebrated the top-ranking families of the aristocracy, or Wang Zhu (esteemed families), in preceding dynasties. Even when descendants of these families were poor and of low political rank, they were esteemed for their pedigree of the past. In elite marriages, family status and pedigree became the basic criteria for the selection of a potential spouse.
Finance. Marriage in imperial China normally involved some financial outlay by both the husband’s and wife’s families and therefore caused some redistribution of wealth. Starting from the Han dynasty, but being well established throughout China by the Tang dynasty, the status of a man’s family could be established by the value of gifts given to the family of the bride, who normally prepared a dowry for her as well. Moreover, along with the admiration for aristocratic pedigrees came an inflation in the value of the betrothal gifts the highest-ranking families could expect to receive when they married off their daughters. During this period betrothal gifts could include fields and animals.
Individual Talent. Sometime in the second half of the Tang dynasty, along with systematic efforts by the state to formalize the civil service examination system, marriages that had solely emphasized family status and financial standing were gradually replaced by ones that focused on an individual’s talent. Thereafter, this quality, rather than family status, carried more weight in mate selection, although the latter criterion remained an important consideration to some families. In a relatively open society such as Tang China, not only was a man’s intelligence appreciated in society, but a woman’s talents also attracted educated men, though women were barred from taking the civil ser-vice examinations.
Transition. A further decline of marriages arranged by family status occurred during the Song dynasty (960-1279). There was a social trend that “where you come from is no longer the basis of official appointment, neither your family status is for match-making in marriage.” If a girl was a descendant of an esteemed family but was poor, she might not be able to marry in her prime. It became possible, however, for wealthy merchant families, though not having glorious aristocratic roots, to marry their children into noble houses and to attract men who passed the civil service examinations in the top group as their sons-in-law. Many high-ranking Song officials married their daughters to talented young officials who came from modest family backgrounds. Two factors contributed to this transition: an improved agrarian economy that helped produce more wealth and thus reduced the economic gaps among social groups and, on the other hand, an open, merit-based civil service examination system that allowed men of lower social class to obtain governmental positions. A story recorded in the Song Shi Zhuoxing Zhuan (History of the Song Dynasty) indicates that in Northern Song times (960-1125) a young man named Liu was engaged to a girl from a poor family. After Liu obtained \htjinshi, the highest degree awarded in the national civil service examination, he changed his social status overnight. The girl’s parents asked Liu to break the engagement with their daughter because they thought she no longer matched his status, but he refused to do so and married the girl.
Dowries. While the family pedigree stopped being a top priority in determining a suitable partner in Song times, marriage practices changed again when society demanded that a bride’s family provide a sizable dowry. Those families that presented large dowries became socially admired, a trend not seen in previous dynasties, when the groom’s family was largely responsible for providing gifts. Prior to this time, a bride’s family was not obliged to present gifts to the groom’s family, although the bride would be sent with clothes and personal items such as jewelry packed in cases, and she could be supplied with female attendants who might serve as her maids or her husband’s concubines (especially in unions between aristocratic families). There were many stories about both upper- and lower-class fami-lies that searched for daughters-in-law who could bring larger dowries. In upper-class marriages, however, this motivation was by no means a simple economic need; it also came with political connotations. Marriages sealed with transfers of wealth and property brought prestige and connections. It became a distinctive tradition that tangible wealth and intangible benefits of honor and connections worked well together in elite marriages.
Patricia Buckley Ebrey and James L. Watson, eds., Kinship Organization in Late Imperial China, 1000-1940 (Berkeley: University of California Press, 1986).
Maurice Freedman, Rites and Duties, Or Chinese Marriage: An Inaugural Lecture Delivered 26 January 1967 (London: London School of Economics, Bell, 1967).
Rubie S. Watson and Ebrey, eds., Marriage and Inequality in Chinese Society (Berkeley: University of California Press, 1991).
"Mate Selection and Marriage." World Eras. . Encyclopedia.com. (April 14, 2019). https://www.encyclopedia.com/history/news-wires-white-papers-and-books/mate-selection-and-marriage
"Mate Selection and Marriage." World Eras. . Retrieved April 14, 2019 from Encyclopedia.com: https://www.encyclopedia.com/history/news-wires-white-papers-and-books/mate-selection-and-marriage
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
- Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
- In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list. | <urn:uuid:f952a639-dd7c-4eb9-a87a-982e7a2fb497> | CC-MAIN-2019-18 | https://www.encyclopedia.com/history/news-wires-white-papers-and-books/mate-selection-and-marriage | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528702.42/warc/CC-MAIN-20190420060931-20190420082931-00421.warc.gz | en | 0.953068 | 1,502 | 3.53125 | 4 |
Spanish and Mexican Heritage Sites
The following are historic properties located in California State Park System units that are related to the Spanish Colonial and Mexican Republic eras of California history, or have other associations that may be of interest to people concerned with the Hispanic/Mexican heritage of California. At present, we are simply providing a list of these properties, in alphabetical order by park unit name.
State park unit classifications are abbreviated as follows in the listings:
SB = State Beach
SHP = State Historic Park
SP = State Park
SR = State Reserve
SRA = State Recreation Area
SVRA = State Vehicular Recreation Area
Andrew Molera SP Rancho El Sur
J.B.R. Cooper, a Yankee married to Encarnacion Vallejo, played a major role in pre-statehood California political, social, and commercial affairs. The cabin on his Mexican-era rancho El Sur was central to the early day occupation of the rancho.
Ano Nuevo SR Mission Santa Cruz Rancho Site
Mission Santa Cruz built a rancho outpost here with a corral and threshing floor. This rancho located at the northern most extent of the Mission's influence. Trusted Native American neophytes occupied the rancho tending the herds and crops.
Anza-Borrego Desert SP Fages/DeAnza Trail
Colonel Pedro Fages crossed the Colorado Desert in 1772, ultimately reaching the San Joaquin Valley and Mission San Luis Obispo. This route was later used by Anza's colonizing expedition of 1775, and is also known as the Old Emigrant Trail.
Atascadero SB Moro y Cayucos Rancho
Beach of Moro y Cayucos Rancho, granted to Martin Olivera and Vicente Feliz in 1842.
Auburn SRA Fandango House Cellar
Name, location suggests Spanish/Mexican historic associations with gold mining, but more research is needed to verify this assumption.
Bean Hollow SB Arroyo de Los Frijoles
This beach, originally known as Arroyo de Los Frijoles, marked the southern extent of Rancho Butano, which was granted in 1838 to Ramona Sanchez and patented to Manuel Rodriguez in 1866.
Big Basin Redwoods SP Canada de la Salud
Portola's land exploration of 1769 to settle the Monterey Bay area named the Waddell Creek valley "Canada de la Salud." Costanso, engineer for the party, noted that Ano Nuevo was near their campsite.
Big Basin Redwoods SP Fremonts' Campsite
Fremont and his men camped in Big Basin during his marauding on behalf of the US government in the Mexican War. A tree in the park was named for him.
Bodie SHP Gold Mining
Portions of one adobe building and remains of several stone "arrastras" (gold milling devices) at this famous gold mining ghost town suggest Spanish/Mexican influence, although historic associations with these features have not been researched.
Border Field SP US/Mexico Boundary
This is the western-most point of the US/Mexican border. The border was defined by the Treaty of Guadalupe Hidalgo, which ended the Mexican War in 1848. Prior to the war, the border divided the Mexican provinces of Alta and Baja California.
Carlsbad SB La Playa del Rancho Agua Hedionada
This section of coast was part of Rancho Agua Hedionada, which included 13,311 acres granted to Juan Mana Marron in 1842. There was apparently an adobe building associated with this rancho within park boundaries.
Carnegie SVRA Corral Hollow; El Arroyo de Los Buenos Aires
"El Arroyo de Los Buenos Aires" (now Corral Hollow) was traversed by an old Spanish trail, "El Camino Veijo," which was used by the Anza expedition in 1776. Later in the Mexican Republic era, it was used by vaqueros driving cattle.
Carpenteria SB Tarpit
This may have been a source of tar for "brea" roofs of early adobes. Friar Crespi, with the Portola Expedition, named it San Roque, but noted that the soldiers called it "Carpenteria" because Indians seen building a wooden canoe used the tar to caulk it.
Columbia SHP Tamale House
Apparently this was a Mexican restaurant in gold mining town of Columbia in Sierra foothills (more research needed to establish historic context).
Corona del Mar SB La Playa del Rancho San Joaquin
This beach was part of Rancho San Joaquin, granted to Jose Sepulveda in 1842.
Crystal Cove SP Rancho Niguel
This area appears to be part of Rancho Niguel, granted to Juan Avila and others in 1842; the grant included 13,316 acres.
Cuyamaca Rancho SP Cuyamaco Rancho Lands
Explorer Fages passed through this area in 1782, on his way to San Gabriel Mission. During the Mexican Republic era, it was part of the rancho that Don Augustin Olvera obtained in 1845.
Dockweiler SB Rancho La Ballona
This was the beach (playa) of Rancho La Ballona, granted to Machador Talamantes in 1839. It was also known as Paso de Las Carretas, and included 13,920 acres.
Doheny SB Rancho Niguel
This beach may be part of Rancho Niguel, which included 13,316 granted Juan Avila and others in 1842. Apparently there was an adobe building associated with this rancho in the park.
El Presidio de Santa Barbara SHP El Presidio de Santa Barbara
This is the site of the Spanish Presidio of Santa Barbara, now being reconstructed. Established in 1782, it was the last of four Spanish colonial military bases in Alta California. Surviving buildings include El Quartel and the Canedo Adobe
Emma Wood SB Ranch San Miguel/Mission Buenaventura
These beaches on the Ventura Coast may have been used by residents of Mission Buenaventura or Ranch San Miguel.
Forest of Nisene Marks SP El Bosque (Forest) del Rancho Soquel Augmentation
This park includes a small part of Rancho Aptos, 6,686 acres that were granted to Rafael Castro in 1833. Most is part of Rancho Soquel Augmentation, which was granted to Rafael Castro's sister, Martina Castro Lodge.
Fort Ross SHP Fort Ross
Fort Ross was settled by Russians from Alaska in 1812. The Russian presence in Alaska was a key factor encouraging the Spanish to colonize Alta California in 1769. There was much commercial and social interaction between the Russians and Mexicans.
Fort Tejon SHP Fort Tejon
Athough established by US military, the buildings of Fort Tejon (1854-1864) are constructed of adobe, a traditional Hispanic construction method. Acting Spanish Governor Fages first went through the Tejon
Gaviota SP Las Cruces Adobe
This was a residence of Miguel Cordero family members, probably constructed in the 1850s or earlier. Cordero was the former majordomo of La Purisima Mission, and grantee of Rancho Las Cruces. The adobe was later used as a stage stop/inn.
Gazos Creek Angling Access Portola Expedition Campsite
Portola's expedition camped near the mouth of Gazos Creek on October 23, 1769. The objective of the expedition was to relocate the harbor of Monterey, which had been observed and described by Viscaino during an earlier expedition in 1602.
Gray Whale Cove SB El Corral de Terra Rancho
This property may be part of El Corral de Terra Rancho north of Montara. The rancho of 7,766 acres was granted to Francisco Guerrero y Palomares in 1839.
Half Moon Bay SB Portola Expedition Camp
The Portola Expedition camped near Pilarcitos Creek on Oct. 28 and 29, 1769. Portola was sick at the time.
Henry Coe SP Canada de San Felipe Ranch
Part of this park was formerly Charles Weber's Canada de San Felipe Ranch.
John Marsh Home John Marsh Home
This 1850s building is located on property that was part of Rancho Los Medanos, granted to Jose Noriega in 1835 and sold to John Marsh in 1837. Marsh, a "doctor" who became a naturalized Mexican citizen in 1844, was murdered by 3 Californios in 1856.
La Purisima Mission SHP La Purisima Mission (second site)
La Purisima Mission was moved to this location after the devastating earthquake of 1812 destroyed the original establishment. One building survived into the 20th century, and the complex was largely reconstructed by the CCC during the 1930s.
Lake del Valle SRA Del Valle Family?
Del Valle is an early Californio family name. More research is needed to establish origin of park's name and to determine if it has associations with the Del Valle family.
Las Tunas SB San Vicente y Santa Monica Concession
Park name refers to "tunas," the fruit of the nopal cactus. Property was part of Spanish-era San Vicente y Santa Monica concession, and may be part of Boca de Santa Monica, 6,657 acres that were granted to Isidro Reyes in 1839.
Leo Carrillo SB Leo Carrillo (movie star)
Beach is named for Mexican-American movie star, Leo Carrillo. His grandparents Josefa Bandini and Pedro Carrillo were members of prominent families from Old Town San Diego. He is commemorated at the Carrillo Ranch, owned by the City of Carlsbad.
Los Encinos SHP De La Osa Adobe; Rancho Los Encinos
This park was the center of Rancho Los Encinos. It features the Mexican era adobe home of the De La Osa family, built ca.1849 by Don Vicente de Osa. The Portola expedition reportedly camped at the warm springs here on Aug. 5, 1769.
Los Osos Oaks SR Canado de los Osos
Canada de los Osos, at the lower end of Los Osos Creek, was named by Portola's men in September 1769. In the Mexican era, the canada was part of Rancho Canada de los Osos y Peche y Islay.
Malibu Creek SP Sepulveda Adobe
Adobe home of a member of the Sepulveda family who made part of his living making charcoal. Charcoal was a traditional form of fuel in Mexico; Sepulveda sold his product in El Pueblo de los Angeles.
Mandalay SB La Playa del Rancho Rio de Santa Clara
This beach appears be part of Rancho Rio de Santa Clara, which consisted of 44,883 acres granted to Valentine Cota in 1837.
Manhattan SB La Playa del Rancho Sausal Redondo
Appears to be beach of Rancho Sausal Redondo, granted to Antonio Ignacio Avila in 1822, 1837, and 1849 (22,459 acres).
Manresa SB La Playa del Rancho San Andres
Part of Rancho San Andres, which was granted to Jose Joaquin Castro by Governor Arguello in 1833. This was also a Mexican era embarcadero (port) for shipping lumber.
McGrath SB La Playa
This property appears to have been part of either Rancho El Rio de Santa Clara (granted to Valentine Cota in 1837) or Rancho San Miguel (granted to Olivas and Lorenzana, date unknown).
Montana de Oro SP Rancho Canada de los Osos
Appears to be part of Rancho Canada de los Osos, which was granted to Victor Linares in 1842, 1843, and 1845.
Montara SB Portola Expedition Campsite; El Rincon de las Almejas
The Portola Expedition camped here in October 30,1769, on its journey to relocate Monterey Bay.
Monterey SB La Playa del Pueblo de Monterey
This was the public beach of the Pueblo of Monterey, the capital of Spanish and Mexican Alta California. It was the site of much commercial and political activity; all landings were made at the beach, as the pueblo had no wharf.
Monterey SHP Alvarado Adobe
Governor Alvarado owned this adobe home. It was occupied by his mistress, Raimunda Castillo, who bore several of his children before she married Mariano de Jesus Soberanes and moved to Rancho Los Ojitos in South Monterey County.
Monterey SHP Boston Store; Casa del Oro
This adobe building was built on land owned by Thomas Larkin in the 1840's, undoubtedly using Native American labor. It was used as a store by Joseph Boston in the 1850's.
Monterey SHP Casa Gutierrez
Two adjoining adobe buildings are believed to have been built by Nicolas Gutierrez, who served as governor of Alta California in 1836.
Monterey SHP Casa Soberanes
This adobe residence was built by Rafael Estrada in the 1840s, and was later occupied by the Soberanes and Serrano families.
Monterey SHP Cooper-Molera Adobe
The oldest part of this adobe may have been built by the Vallejo family in the 1820s. J.B.R. Cooper, Yankee ship captain, married Encarnacion Vallejo, acquired the property, and played a significant role in pre-statehood political and business affairs.
Monterey SHP Customs House
This is purportedly the oldest public building in California; portions were built as early as 1814. It was here in 1846 that Commodore Sloat officially took possession of Alta California for the United States as part of the spoils of the Mexican War.
Monterey SHP Diaz Adobe
This portion of the Cooper-Molera complex was built in the 1830s and sold to Manuel Diaz in the 1840s. Diaz was a prominent Mexican merchant and alcalde (mayor) of Monterey at the time of the American takeover in 1846. He was bankrupt by 1855.
Monterey SHP Larkin House
Thomas Larkin (later US Consul to California) had this house built in 1834. It is often cited as reflecting major Yankee influences on traditional Mexican architecture, but new studies suggest many similar early buildings exist throughout Latin America.
Monterey SHP Pacific House
This traditional Californio adobe was built in 1835 for Thomas O. Larkin, probably by Hispanic and Indian labor. It was intended for use as a hotel, and was later sold to Jas. McKende and David Jacks.
Monterey SHP Stevenson House
Portions of this building are of traditional adobe construction; the rear section was the residence of Rafael Gonzales, an official during the Mexican Republic era. It was renamed for Robert Louis Stevenson, who stayed there briefly in 1879.
Monterey SHP Swan Adobe; California's First (American) Theatre
This traditional adobe, owned by Jack Swan, was originally built as a boardinghouse and saloon in 1843, probably by Hispanic and Indian labor. It was later used by Stevenson's Regiment during the Mexican War for theatrical productions.
Monterey SHP Viscaino-Serra Landing Place
This site commemorates discovery of Monterey Bay by Viscaino in 1602, the landing of missionary Junipero Serra in 1770, and founding of Mission San Carlos (Carmel) and the Presidio of Monterey at what became the Spanish capital of Alta California.
Monterey SHP Whaling Station
Constructed in 1855, this building was used as a boarding house for Portuguese whalers. While its primary historical associations are not Spanish or Mexican, it attests to the longevity of the older building traditions well into the American period.
Morro Bay SP Portola Expedition Campsite
Portola expedition camped in the valley of Morro Creek September 8, 1769.
Moss Landing SB Rancho Bolsa Nueva y Moro Cojo
This appears to be the beach of the Mexican rancho Bolsa Nueva y Moro Cojo, granted to Francisco Soto in 1829 and 1836.
Mount Diablo SP Mount Diablo
The name "Monte del Diablo" first appeared on a map of the Mission San Jose ca. 1824, although the mountain apparently had earlier Spanish names. The name appears again in the Monte del Diablo land grant petitioned by Salvio Pacheco in 1827.
Mount San Jacinto SP Mount San Jacinto
May be in the San Jacinto Viejo-Estudillo Rancho, although there are a number of ranchos with San Jacinto in their names. Further study is needed to resolve relationship of park land to early ranchos.
Natural Bridges SB La Playa de la Mission Santa Cruz
This property was not part of a known Spanish/Mexican rancho, but was near Mission Santa Cruz. The beach may have been used for shipping access, or by Native American neophytes who continued traditional gathering activities while living in the mission.
Old Town San Diego SHP Casa de Cota (site)
Site of the adobe residence of Juan or Ramon Cota, built ca. 1835 in the Mexican Period. The site is now a parking lot.
Old Town San Diego SHP Casa de Juan Bandini
Adobe residence of Juan Bandini, prominent Californio merchant from Peru. The original house was built ca. 1827, with the 2nd floor (wood) added in the American era. The building was heavily remodeled in the 20th century, and is now used as a restaurant.
Old Town San Diego SHP Casa de Juana Machado y Silvas
Adobe residence of Jose Nicasio Silvas and Maria Antonia Machado, built between 1830 and 1843. The building is now used for park interpretation.
Old Town San Diego SHP Casa de Machado-Stewart
Adobe residence built by Jose Manuel Machado in 1830s for his daughter, who married John C. Steward, an American. The building is now used for park interpretation.
Old Town San Diego SHP Casa Estudillo
Adobe residence of Captain Jose Maria de Estudillo (presidio commandant), built ca.1827. Restored about 1910 by architect Hazel Waterman, this building was influential in increasing popularity of Mission Revival architecture and the "Ramona" legend.
Old Town San Diego SHP Old Town San Diego
Settlement that developed on the terrace below Presidio de San Diego after ca. 1821. While a few Mexican-Republic era buildings survive (listed separately), many others are reconstructed or present only as archeological remains beneath modern features.
Old Town San Diego SHP Pedrorena Adobe
This adobe was constructed in 1869 for Miguel de Pedrorena, attorney whose father was a member of the Constitutional Convention of 1849. Although it has earthen walls, in design terms it was a Greek Revival cottage, not a traditional vernacular adobe.
Old Town San Diego SHP Plaza de Pueblo San Diego Viejo
The plaza was the center of the pueblo in 1846, when the American flag was raised there during the Mexican War. Prior to ca. 1835, the layout of the pueblo was probably more informal, with buildings oriented to the nearby river rather than the plaza.
Old Town San Diego SHP Silvas-McCoy Property
Maria E. Silvas owned 3 adobe buildings here prior to 1851. Plans to reconstruct the later McCoy House rather than older adobes recently caused a public controversy regarding treatment of Mexican Republic era interpretation and resources at the park.
Old Town San Diego SHP Wrightington Adobe
> Home of Thomas and Juana Machado Wrightington, reportedly built ca. 1830 by Juana's first husband, Damasio Alipas. Building has been reconstructed based on extensive archeological work, and is now used as a retail concession.
Olompali SHP Camilo Ynitia Adobe
Ruins of an adobe built ca. 1837 stand in the burned ruins of a later mansion. It belonged to Miwok leader Camilo Ynitia, who traded with Russians and Mexicans, and received a Mexican land grant. A skirmish took place here during the Bear Flag Revolt.
Oxnard SB La Playa del Rancho Rio de Santa Clara
Beach of Rancho Rio de Santa Clara, granted to Valentine Cota in 1837 (44,883 acres).
Pacifica SB La Playa del Rancho San Pedro
Beach of Mexican period Rancho San Pedro, granted to Francisco Sanchez in 1839. This was also the site of a rancho outpost of Mission Dolores, where a large number of Native American neophytes lived and worked as farmers.
Pescadero SB La Playa del Rancho Pescadero
Beach of Mexican era Rancho Pescadero, granted to Juan Gonzales, former majordomo of Mission Santa Cruz, in 1833.
Petaluma Adobe SHP Petaluma Adobe
This was the headquarters (hacienda) of M. G. Vallejo's Rancho Petaluma (granted 1842), and was probably the largest such complex in the state. Hundreds of Indians live there after secularization, working at trades they had learned in the missions.
Picacho SRA Picacho Peak
Padre Font saw this peak and called it "La Campana" on Dec. 4, 1775. Friar Garces called it "Penon de la Campana." Gold was discovered there by an Indian in 1860, and Mexican miners prospected there in 1862.
Pigeon Point Light Station Pigeon Point
Spanish name for the Point was "Punta de las Ballnas, " but it was also referred to as Punta Falsa de Ano Nuevo on a map of 1785. It was part of Rancho Punta de Ano Nuevo.
Pio Pico SHP Pio Pico Mansion
Adobe rancho residence of Pio Pico, referred to by the last Mexican governor as "El Ranchito". He built the house in 1852 and lived there until 1892, when he lost the property to foreclosure. The actual name of the 8,891 acre rancho was Paso de Bartolo.
Pismo Dunes SVRA La Playa del Rancho Pismo
Beach at Rancho Pismo, granted to Jose Ortega in 1840.
Pismo SB La Playa del Rancho Pismo
Beach of Mexican Rancho Pismo, granted Nov. 18, 1840 to Jose Ortega. According to Fages, "Pismo" was the Indian word for tar or brea.
Placerita Canyon SP Gold Discovery Site
Site of Francisco Lopez' discovery of gold while gathering onions in the mountains near Mission San Fernando in 1842. It created a short-lived local prospecting boom, and yielded the first California gold sent to the US mint.
Point Dume SB Point Dume
Point was named by Vancouver on November 24, 1793, after Fr. Francisco Dumetz of San Buenaventura Mission. It was a navigational landmark of long standing. Point Lobos SR Point Lobos
This was part of Rancho San Jose y Sur Chiquito, granted to Marcelino Escobar in 1839. No Mexican Republic era buildings survive, although there may be archaeological remains of mission or rancho period tanning vats or other structures.
Point Montara Light Station Point Montara
Part of Rancho El Corral de Terra, formerly El Pilar or Los Pilares. It was a horse and oxen ranch of Mission Dolores as early as 1790's. It was later granted to Francisco Guerrero y Palomares.
Point Sal SB Point Sal
Point Sal was part of Rancho Guadalupe, granted to Diego Olivera and Teodoro Arellanes in 1840 (43,682 acres).
Point Sur SHP Point Sur
Point of Rancho El Sur, sold to J.B.R. Cooper during the Mexican era. It was originally granted to Juan Bautista Alvarado, who later served as governor of Alta California, in 1834.
Pomponio SB Pomponio Creek
The creek and park were named for former mission Indian Chief Pomponio. He was a famed rebel against the mission system who hid out in this vicinity and was captured in 1824.
Pomponio SB Pomponio Creek
The creek and park were named for former mission Indian Chief Pomponio. He was a famed rebel against the mission system who hid out in this vicinity and was captured in 1824.
Portola SP Gaspar de Portola
Named for Gaspar de Portola, Governor of Baja California who was sent to Alta California in 1769 to rediscover and occupy the Port of Monterey, thereby creating a bastion against threatening encroachment on Nueva Espana by Russians and British.
Redondo SB Old Salt Lake (salt source)
This beach is located at the boundary between Rancho San Pedro and Rancho Sausal Redondo. Old Salt Lake at the north end of the beach is a prehistoric and historic salt source.
Refugio SB Embarcadero del Rancho El Refugio
The embarcadero (landing) at Rancho El Refugio was occupied by Jose Francisco Ortega as early as 1794. It was the site of smuggling while trade was restricted in the early 19th century. The pirate Bouchard landed there in 1818 and burned Ortega's adobe.
Rincon Point Rincon Point
Portola camped at Rincon Point on August 16, 1769 at an Indian village near the creek before going on to Carpenteria. Cabrillo anchored off this point in October 1542.
Royal Palms SB La Playa del rancho Palos Verdes
This beach was part of the 31,629 acre Palos Verdes Rancho, granted to Jose L. Sepulveda in 1827 and 1846. It was formerly part of the Spanish land concession of San Pedro to Dominguez in 1784.
Salinas River SB La Playa del Rancho El Rincon de las Salinas
Rancho El Rincon de las Salinas was granted to a Native American woman, Christine Delgado, in 1833 and later confirmed to Rafael Estrada. It was a profitable source of salt used in the Spanish and Mexican eras for livestock.
San Buenaventura SB La Playa
Southern portion appears to be the beach of Rancho San Miguel (4,694 acres granted to Olivas and Lorenzana in the Mexican era). This portion was also known as Los Cerritos. The northern part may be the mission beach.
San Clemente SB Boca de la Playa Beach
Beach of Boca de la Playa Rancho, which was granted to Emigidio Vejar in 1846. Apparently there was an adobe building associated with this property.
San Elijo SB San Elijo Lagoon
Portola passed San Elijo Lagoon on July 16 or 17, 1769, on his way north to relocate Monterey Bay.
San Gregorio SB La Playa del Rancho San Gregorio
The Native American village on San Gregorio Creek was the Portola Expedition campsite from October 24 to 26, 1769. Rancho San Gregorio was granted to Antonio Buelna in 1839.
San Gregorio SB Portola Expedition Campsite
Portola expedition camped near the creek at San Gregorio on Oct. 26 and 27, 1769. Fr. Crespi proposed it for a mission site because of the large number of Native Americans there.
San Juan Bautista SHP Castro-Breen Adobe
Home of interim military commandant Jose Castro during the 1846 Fremont stand at Hawk (Fremont) Peak in the nearby Gabilan Mountains. It is possible that some portions of the structure were originally mission buildings.
San Juan Bautista SHP Plaza
San Juan Bautista Mission Plaza is central to the mission complex and the town that later grew up there. It has buildings around three sides, with the fourth side open to the adjacent valley.
San Juan Bautista SHP Plaza Hotel
Much of the lower story of this building was part of the mission quartel, quarters built in the early 19th century for Spanish soldiers assigned to the mission. A second floor was added and the building converted to a hotel during the American period.
San Juan Bautista SHP Plaza Stable
This was probably the site of the Ursua family facing the San Juan Bautista Mission plaza. The stable was later erected by Zanetta, who had another adobe residence nearby.
San Juan Bautista SHP Zanetta House; Plaza Hall
This building was built from materials and is on the site of the San Juan Bautista Mission convento, where young Indian women and widows were housed during the mission era.
San Luis Reservoir SRA Rancho San Luis Gonzaga
This is the site of Rancho San Luis Gonzaga, granted to Juan Perez Pacheco y Jose Maria Mejia in 1843.
San Onofre SB La playa del Rancho Santa Margarita y Las Flores; San Onofre, village
Portola camped at an Indian village north of San Onofre on July 22, 1769 on his way north to Monterey Bay. This area was part of Rancho Santa margarita y Las Flores, which was granted to Pio Andres Pico in 1841. The grant consisted of 133,441 acres.
San Pasqual Battlefield SHP San Pasqual Battlefield
Site of December 6, 1846 Mexican War battle between US forces under General Kearny and Californios under General Andres Pico. The later won the battle, killing 22 Americans. Apparently there was an adobe building associated with this site.
San Simeon SB Rancho Piedra Blanca
Rancho Piedra Blanca (48,806 acres) was granted Jose de Jesus Pico in 1840. He was a former Monterey soldier, was Administrator of San Miguel Mission, and played a role in 1845 Treaty of Cahuenga. There were several adobe buildings on the property.
Santa Cruz Mission SHP Santa Cruz Mission Adobe
Part of a row house for Native American neophytes, built 1822-24. This restored building is the best preserved Native American residence at any of the Alta California missions. It was later occupied by Roman Rodriguez and Felipe Armas families.
Santa Monica SB Rancho La Ballona
Scouts with the Portola expedition visited here August 4, 1769. It was probably later part of Rancho La Ballona, granted to Machado and Talanantes in 1839.
Santa Susana Mountains De la Ossa Stage Way Station
The family of Vincente de la Ossa owned and lived at what is now Los Encinos SHP. Their home may have been a wayside station for stages in the late 1850's. In 1861 (or 1867), probably after Vincente's death, the family moved to present day Chatsworth.
Seacliff SB La Playa del Rancho Aptos
This was the beach of Ranch Aptos. Rafael Castro received Rancho Aptos in 1833.
Seccombe Lake SVRA Martin Adobe
Although built of adobe, this building was constructed by Mormons who immigrated here in the 1850s. The property was probably once part of the San Bernardino Rancho, which was granted to the Lugo brothers in 1842.
Silver Strand SB San Diego Bay
Beach on San Diego Bay. Spanish passed this area to enter the bay in 1769 to establish Alta California's first presidio and mission. May have been part of Rancho de la Nacion, granted to John Forster in 1845 (26,632) acres.
Sonoma Coast SB Rancho Bodega
Park appears to be part of Rancho Bodega, originally granted to Victor Prudon in 1841 and later re-granted to Stephen Smith in 1844 (35,487 acres). Rancho Bodega's northern limit was the Russian River.
Sonoma SHP Blue Wing Inn (Sonoma House)
Two-story adobe building used as a hotel called the "Sonoma House." Seems to represent 1840s-1850s expansion of an earlier mission mayordomo's house. It was owned by Englishmen Jas. Cooper and Thomas Spriggs in the Gold Rush era.
Sonoma SHP Sonoma Barracks
Adobe building erected ca. 1837 by Mariano G. Vallejo, Mexican general of Alta California. It housed his troops, and was the occupied by Americans insurgents in the 1846 Bear Flag Revolt, just prior to American military takeover during the Mexican War.
Sonoma SHP Sonoma Mission (Archeological Site)
Only the priests' quarters survive from the original Mission San Francisco Solano (founded 1823). There are, however, extensive archeological remains of buildings and other structures that once formed the original mission settlement.
Sonoma SHP Sonoma Mission (Parish Church)
Adobe parish church dating from ca. 1840, believed built by Mariano G. Vallejo on the site of the first mission church. It was restored/reconstructed during the 20th century. The main mission church, which collapsed in 18__, was located to the east.
Sonoma SHP Sonoma Mission (Priests' Quarters)
This is a portion of the priests' quarters of Sonoma Mission (Mission San Francisco Solano), built ca. 1825 and restored in the 1940s. The original mission church was at the west end of this building, with the 2nd larger church to the east.
Sonoma SHP Vallejo's Casa Grande (Archeological Site)
Gen. M.G. Vallejo built a large 2-story adobe home on the plaza after he took control of Sonoma in the 1830s. After the Mexican War, he moved to his estate on the edge of town. Casa Grande was used as a girls' school after 1854, and burned in 1867.
Sonoma SHP Vallejo's Casa Grande (Servants' Quarters)
Long, narrow 2-story adobe building said to have been the kitchen and servants quarters at Vallejo's Casa Grande in downtown Sonoma. This is the only surviving building of the complex, which originally included extensive courtyard walls and outbuildings.
Sonoma SHP Vallejo's Estate
M. G. Vallejo moved from his Casa Grande to this estate on the edge of Sonoma in the early 1850s. He named it "Lachryma Montis" (weeping mountain) after a spring on the property. It was part of Rancho Agua Caliente, granted to Lazaro Pina in 1840.
Sonoma SHP Vallejo's Estate (El Delirio)
El Delirio is a small, ornate wooden building in the garden next to the main Vallejo home. It is decorated in the same Gothic Revival style as the main house, and served as a retreat for the Vallejo family members and guests.
Sonoma SHP Vallejo's Estate (Napoleon's Cottage)
M.G. Vallejo built this small, simple cottage on the grounds of Lachryma Montis in 1865 for his youngest son, Napoleon, who moved into his new quarters at the age of 15.
Sonoma SHP Vallejo's Estate (Swiss Chalet)
Half-timbered building of fired brick and wood on the grounds of the Vallejo estate. The timbers were reportedly cut and numbered in Europe and shipped to California, where the building was erected in 1852 for use as a warehouse (almacen).
Sonoma SHP Vallejo's Estate (Vallejo Residence)
After the Mexican War, M.G. Vallejo and his family lived in an ornate "Carpenter's Gothic" Victorian house, prefabricated in the eastern US, shipped around the Horn, and assembled in 1851-52. Adobe was placed inside the wood frame walls for insulation.
South Carlsbad SB La Playa del Rancho Agua Hedionda
Part of Rancho Agua Hedionda, granted to Juan Marron in 1842 (13,311 acres).
Sunset SB La Playa
May be part of Rancho Bolsa del Pajaro, granted Sebastian Rodriguez in 1837 (5,497 acres). One survey suggests beach was public and not included in the grant, however. Portola's men found a large stufffed bird (pajaro) in this vicinity in 1769.
Sutter's Fort SHP Sutter's Fort
Headquarters of John A. Sutter's 1841 New Helvetia settlement. The central building, completed in 1844 using Indian labor, is a traditional adobe. Sutter played a prominent role in the business and politics of Mexican California in the 1840s.
Tomales Bay SP Rancho Punta de los Reyes
Discovered by Spanish lieutenant Juan Francisco de la Bodega y Cuadro, commander of the schooner "Sonora," in 1775. He was greeted by Indians and exchanged gifts with them. It was probably later part of Rancho Punta de los Reyes.
Twin Lakes SB La Playa
This beach may have been part of grants to Miguel Villagrana or Francisco Rodriguez, although more research is needed.
Wilder Ranch SP Bolcoff Adobe
Adobe and rammed earth building, roofed with tiles taken from Santa Cruz Mission by mission administrator Jose Bolcoff ca. 1839. He may have used part of the building as a creamery or cool house. There was an earlier mission outpost here as well.
Will Rogers SHP Rancho Boca de Santa Monica
Appears to be part of the Rancho Boca de Santa Monica, granted to Isidro Reyes et al. in 1839 (6,657 acres). It was part of the Spanish era land concession of San Vicente y Santa Monica.
William B. Ide Adobe SHP Ide Adobe
The adobe building attributed to William B. Ide uses Hispanic style building materials.
William Randolph Hearst Memorial SB Rancho San Simeon
This beach was probably part of Rancho San Simeon, granted to Jose Ramon Estrada, son of Jose Mariano Estrada, in 1842 (4,469 acres).
Zmudowski SB Potrero de Moro Cojo
This beach may be part of Potrero de Moro Cojo grant. | <urn:uuid:9869fdf5-7e71-4937-bc58-46d721737f3d> | CC-MAIN-2016-18 | http://parks.ca.gov/?page_id=22678 | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861718132.40/warc/CC-MAIN-20160428164158-00109-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.944252 | 8,291 | 3.0625 | 3 |
Sometimes Fungi Are Good!
Bald cypress is a deciduous conifer in the family Cupressaceae that grows on saturated and seasonally inundated soils in the lowlands of the Southeastern and Gulf Coastal Plains of the United States. Like most tree species it has several common names (baldcypress, bald-cypress, cypress, southern-cypress, white cypress, tidewater red-cypress, sinker cypress, Gulf-cypress, red-cypress, or swamp cypress) but only one scientific (Latin) name: Taxodium distichum.
Cypress wood is without an odor and closely resembles that of other Cupressus species. It has long been valued for its natural decay resistance. However, the cypress that is harvested today does not have the same heartwood decay resistance of cypress of the early 1900s. This fact has been well documented but the reasons for this difference are less clear. I personally have seen ax cut cypress logs recovered from lakes and rivers. The lumber cut from these logs is absolutely beautiful. Bald cypress was designated the official state tree of Louisiana in 1963. Some consider it to be a symbol of the southern swamps of the United States and it is often featured in many swamp paintings and pictures along with Spanish moss. The early settlers used cypress to produce shakes and shingles for their houses.
Cypress has long been a favorite wood species for furniture and other value-added uses. It has a unique grain pattern that often includes missing and false rings due to local environmental conditions (i.e., flooding). A missing ring occurs when no ring is produced in a year and a false ring occurs when multiple rings are produced in one year. So, be careful when trying to age a cypress log based on visual ring count. The rings need to be closely examined to distinguish true and false rings.
My favorite feature of cypress is not the false rings but “peck.” This is a very rare condition and has a high demand and limited supply. Therefore, if you do find it, be prepared to pay dearly. I did a quick internet search and found 1×8 tongue and grove pecky cypress selling for $7.50 per linear foot. I recall years ago talking to a man that recovered “sinker cypress” from rivers, bayous, and swamps in south Louisiana. This wood was prized for its beautiful color and grain and had little to no peck. He was cutting the logs into 4/4 (1 in.) boards and selling it for $10 per board ft (green) to contractors in Houston, TX. He had open orders to provide as much as he could supply!
Peck is actually a condition caused by a fungal attack that leaves long, narrow burrows or cavities in the wood. The fungus attacks mostly older cypress trees from the tree canopy down to the roots. Once the tree is harvested, the fungal attack stops, leaving the beautiful, unique pecky patterns. Many fungi attack T. distichum trees. The main fungi is Stereum taxodii which attacks the heartwood of living trees. A few other fungi species and insects will attack cypress heartwood and sapwood but are not responsible for peck. Perhaps the biggest threat to pecky cypress is nutria which eat young cypress seedlings so they never have a chance to become a merchantable tree – with or without peck.
Todd Shupe is the President of DrToddShupe.com and is a well recognized expert on wood-based housing and wood science. Shupe worked as a professor and lab director at LSU for 18 years and Quality Manager for Eco Environmental (Louisville, KY) for 2 years. He is active in several ministries including his Christian blog ToddShupe.com. Todd is the Secretary of the Baton Rouge District of United Methodist Men, Database Coordinator for Gulf South Men, and volunteer for the Walk to Emmaus, Grace Camp, Iron Sharpens Iron, Open Air Ministries, HOPE Ministries food pantry. Todd is currently preparing to be a Men’s Ministry Specialist through the General Commission of United Methodist Men. | <urn:uuid:d00c19e8-4e5c-4cee-9e57-cbd87749b99f> | CC-MAIN-2018-22 | https://drtoddshupe.com/pecky-cypress-an-american-favorite/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864837.40/warc/CC-MAIN-20180522170703-20180522190703-00565.warc.gz | en | 0.963527 | 871 | 3.515625 | 4 |
Grounding techniques for PTSD are incredibly important in living with post traumatic stress disorder. It is never easy to be diagnosed with PTSD after experiencing a traumatic event in your life. The flashbacks, discomfort, uneasiness, and oftentimes sheer terror can leave lasting detrimental impacts on one’s quality of life. As devastating as this condition can be, the good news is that with PTSD targeted therapy, optimal support, and grounding, you can overcome this hurdle.
What Is Grounding?
Grounding, sometimes called “earthing,” is a therapeutic method that gives people the ability to reconnect with their surroundings. It calms and balances physical, mental, and emotional energies and helps you stay in the present moment instead of fearing what happened in the past. This is especially helpful for people who have PTSD who frequently find themselves reliving their trauma.
Why Grounding Is Used
Grounding is a fundamental element to learn coping skills and finding safety, a key stage in recovering from PTSD, after being triggered.. It illuminates self-awareness and gives people the ability to realise their surroundings using their senses, reinstating the fact that they are no longer in the past. This method is so powerful that it is typically implemented in the first stages of trauma focused cognitive-behavioural therapy (CBT-TF) and eye movement desensitisation and reprocessing (EMDR).
An optimal position is to use these techniques to be grounded 24/7 so that flashbacks are much less likely to happen. However grounding techniques are also used for PTSD in helping pull someone out of a flashback episode and gives them the ability to take control back. With effective grounding techniques, they will be able to remove themselves from the past trauma and remember where they are now, safely in the present.
Ways to Implement Grounding
When it comes to grounding, there are many ways people and therapists go about it. When feeling triggered the most common ways of implementing specific grounding actions is to use on the senses: smell, touch, sound, taste, and sight. Some examples of that include:
- Smell – Wherever you are, look for something that has a prominent scent, such as the citrus of a lemon, or a scented candle.
- Touch – Try holding onto an ice cube, touching a soft piece of clothing, or even popping bubble wrap can do the trick.
- Sound – Sounds work wonders at snapping you out of a trauma trigger. Put on some soft music, or open your window to listen to either the birds or cars going by. You can also call a family member or friend.
- Taste – Remember smelling that lemon? Try taking a bite into it. You can also go with something sweeter like chocolate and let it melt in your mouth to raise present-day awareness.
- Sight – Take a look around you and point out five things you see and describe in detail. You can also pick a color, such as blue, and count how many items in your home you see that are that color.
Getting Your Life Back
First off, if you are seeking help for your PTSD, that is a great start. Knowing that you need help and utilising the resources around you to better your life is admirable and worth celebrating. With that being said, when you seek therapy for your PTSD, do not be surprised when you go over grounding methods in the first stage. This sets the tone and the ability for you to control your triggers so you can get on the best track for a full recovery. We need to be sure that you can do this in the moment to safely be able to proceed with later parts of the therapy that process the trauma.
Quest Psychology Services are specialists in PTSD Treatment within Salford, Manchester. To discuss getting help yourself call us on 07932737335 | <urn:uuid:80b9762e-08a1-4f47-92a7-2dd23342a7dd> | CC-MAIN-2022-21 | https://questpsychologyservices.co.uk/the-powerful-effects-of-grounding-for-ptsd/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00006.warc.gz | en | 0.955858 | 779 | 3.21875 | 3 |
|Location:||Monticello, Charlottesville, VA, United States|
|Occupation Dates:||Last quarter 18th/first quarter 19th century. Phasing and mean ceramic dates can be found on the Chronology page.|
|Excavator(s):||William Kelso and Douglas Sanford.|
Building s is the best preserved of the three, single-family log cabins built in the mid-1790s at the eastern end of Mulberry Row. A large portion of its 12′ X 14′ stone foundation (F02), stone chimney base (F02), packed-earth floor (F03), and wood-lined sub-floor pit (F01) survived the 20th-century roadwork that graded the sites of Buildings r andt. Because of the documented similarity among these three structures, features uncovered in 1983 from the 1240 square foot excavation area of Building s have been used to determine the appearance of the other two. However, each had its own depositional history reflecting the conditions and activities of the enslaved families who inhabited them, as is becoming evident from the data provided by the DAACS recataloguing initiative.
On the 1796 Mutual Assurance Declaration, Jefferson described three buildings edging Mulberry Row between the new log stables and the extant 1770s stone Workmen’s House, now referred to as the Weaver’s Cottage:
r. which as well as s. and t. are servants houses of wood with wooden chimnies, & earth floors, 12. by 14. feet, each and 27. feet apart from one another. from t. it is 85 feet to F. the stable [a wooden structure subsequently replaced by the extant stone stables]
These three log cabins had been built within the previous two years and were part of the rebuilding campaign Jefferson undertook during his first retirement from public life (1794-1801) (Hill 2002a and b). Jefferson wrote his overseer Minoah Clarkson from Washington in September of 1792 with instructions that:
Five log houses are to be built at the places I have marked out, of chesnut logs, hewed on two sides and split with the saw, and dove tailed…They are to be covered [i.e., roofed] and lofted with slabs…Racks and mangers in three of them for stables [Building f]. (Boyd at al. 1950, vol. 24:412-414)
The following spring, Jefferson told his son-in-law and steward Thomas Mann Randolph to move all the enslaved house servants out of the stone Workmen’s House into “…the nearest of the new log-houses, which were intended for them; Kritty [Critta Hemings] taking the nearest of the whole, as oftenest wanted about the house” (Boyd et al. 1950, vol. 26:665), that is, the structure in the location of Building r on the 1796 Mutual Assurance Declaration. Several months later, in August of 1793, Randolph reported to Jefferson that construction of the cabins had not yet begun but assured him that the work would be accomplished that winter (Boyd et al. 1950, vol. 26:667), during the slack period of the agricultural cycle. If not by the spring of 1794, Buildings r, s, and t were evidently in place by 1796—three dwellings rather than the two originally planned and, based on the archaeological evidence of a surviving sill fragment, of Southern yellow pine, rather than chestnut.
It is possible that Sally Hemings may have lived in Building s, but the evidence is inconclusive. Stanton (2000) suggests that Sally probably lived at the Workmen’s House with her sister Critta after she returned from France in 1789 (p. 112). If Critta did move to Building r as Jefferson intended in 1793, then Sally may have occupied the neighboring Building s, the next “nearest of the new log-houses.” A French delft medicine jar found at the Building ssite lends some credence to this story . By 1808, both sisters and their families may have relocated to the quarters in the new south dependencies of the Monticello mansion (Stanton 2000:113). Documentary evidence suggests that their brother John Hemings subsequently moved into Building r, but the succeeding resident of Building s is unknown.
Excavation history, procedure, and methods
Excavation of the sites of Buildings r, s, and t began in the spring of 1983 with mechanical removal of the modern overburden (Sanford 1995:196). This included a paved roadway and parking lot laid down in 1934; an underlying level of furnace by-products dating to the early years of the Thomas Jefferson Foundation; and fill from a 1925 parking lot. Activity related to the roadwork impacted the Building s site, but not to the same extent as the flanking house sites of r and t.
Kelso and his crew discovered that three of the features (F01-03) exposed at the Building s site closely matched the predicted location, dimensions, and characteristics of the log dwelling Jefferson described in 1796, Building s. Most of the dry-laid stone foundation (F02) had been removed; a large portion of the packed-earth floor (F03) had been graded away; and a 20th-century posthole (F15) had been punched through the wood-lined sub-floor pit (F01). Subfloor pit at Building s with metal objects in situ. However, enough survived to make possible inferences about the appearance and use of Building s (Sanford in Kelso et al. 1985:26).
In addition to the evidence for Building s, exposure of the site revealed the remains of a second, previously unknown structure. Two brick piers (F22-23) mark the location of a building that straddled the sites of Building r and Buildings. (See Building r site, F02-05.) A search of the Foundation’s photographic archives located a c.1912 photograph providing a glimpse of a white-washed wooden building with a brick chimney in this location. No analysis of its associated assemblages has yet been undertaken, but it likely dates to the period when Monticello belonged to the Levy family (1834-1923).
Initially a grid of twelve 10′ X 10′ excavation units was laid out, within which 8′ X 8′ quadrats were opened, leaving 2′ intervening balks. Subsequent removal of the balks resulted in the excavation of units of varying sizes, from 2’ X 2’ to 2’ X 10’. Within units, excavation proceeded in natural levels with recorded beginning and ending elevations, but any relationship to a fixed datum point has been lost. Artifacts were recovered by a method of careful troweling without screening.
Summary of research and analysis
Good preservation of the Building s site combined with surviving documentation has made it possible to determine an unusual degree of detail about the manner of construction and history of use of the Building s site. Analysis of the assemblage associated with the 19th-century pier building at the Building s site has not yet been accomplished.
Kelso presented his conclusions about the appearance of Building s in a published isometric drawing (1997:60, fig. 21). It shows a cabin crafted of squared-off logs. The sides are sheathed with clapboards and the roof is covered with horizontally laid slabs. A single door, opening onto Mulberry Row, opposes a wattle-and-daub chimney on the southern gable end.
The archaeologically recovered portion of the foundation (F02) corresponds with Jefferson’s 1796 measurements of 12′ X 14′. A scatter of stone (F02) and two small postholes (F19-20) indicate the base of an external chimney, roughly 6′ 6″ X 2′ 6″. The paling fence (F24-27), constructed in 1809 to enclose the vegetable garden, passed so closely along the back side of the structure that the wattle-and-daub chimney rose up between two of its posts. In front of the hearth, a 3′ 8″ X 3′ 8″ sub-floor pit (F01) had been inserted into the packed-earth floor. Fragments of its pre-formed, Southern yellow pine wood lining were preserved in the clay soil.
Kelso concluded that Building s was built in 1792-93, and persisted after the 1809 fence was installed, perhaps as late as Jefferson’s death in 1826. He argued that a comparative analysis of the assemblages from slave housing on Mulberry Row revealed a pattern of social and economic hierarchy within the slave community (1986a and b; see also Gruber in Kelso et al. 1985).
Gruber (in Kelso et al. 1985; 1990; 1991) addressed the issue of the source of the assemblage recovered at Building s and what, if any, conclusions could be drawn about the preferences and behavior of Jefferson’s slaves. She argued that Jefferson determined the form, appearance, and placement of the buildings in which enslaved people lived and worked but probably with some consideration of the preferences of his slaves. The objects used and discarded by slaves at Buildings r, s, and t, as at all slave quarters, had been provided by Jefferson and, therefore, expressed more overtly his paternalism than slave preferences. The superior quality of ceramics and cuts of meats bespoke the advantages of living and working close to Jefferson’s mansion.
Sanford (1995) estimated the period of occupation of the Building s site to be ca. 1790 to 1830. He based the beginning date on mean ceramic dates as well as documentary evidence. He derived the terminal date from the artifact assemblage alone (p. 201). He observed that the area underlying the structure had been prepared by using large greenstone cobbles (F02) to level the surface. The floor (F03) was built up on the interior of the foundation using clay, gravel, and cobbles. (Sanford 1995:204; Sanford in Kelso et al. 1985:27-28). Sanford thought that postholes (F17, F21, F28) off to one side of the structure could be the remains of a 3′ x 5′ addition (Sanford 1995:25; Sanford in Kelso et al. 1985:30).
DAACS completed recataloguing of the Building s site assemblage in 2002. Several papers presented at the 2003 Society for Historical Archaeology conference used this data (Arendt 2003, Galle and Neiman 2003, Heath 2003, Olson 2003). These preliminary studies of ceramics, buttons, and tools demonstrate the utility of recording more fine-grained observations of artifacts. The greater temporal and stylistic sensitivity of the database yields insights into the variability among enslaved households in the selection of available consumer goods and the conditions informing their choices.
Thomas Jefferson Foundation
Things you need to know about Building s before you use the data:
- The entire site was carefully hand-troweled and screens were not used for artifact recovery.
- Measurements are in feet and tenths of feet.
- Building s was excavated using the “Wheeler Box” excavation system of 8-by-8 foot quadrats with 2-foot balks. Unit size varies from 8-by-8 foot and 2-by-2 foot quadrats to 2-by-8 foot quadrats.
- The Building s site was impacted by activity related to the installation of 20th-century parking lots, but not to the same extent as the adjacent Building r and Building t sites. The northern portion of the foundation and floor surface of Building s was destroyed by construction, but a significant part of the foundation remained in the southern section of the structure.
The original excavators of the Building s site did not assign numbers to individual features. DAACS staff has assigned feature numbers using the original excavation records. Feature Numbers assigned by DAACS have a F-prefix, which precedes the number (i.e. F01 equals Feature 1).
Excavated contexts that belong to the same depositional basin (e.g. a posthole and postmold or the layers in a single pit) have been assigned a single feature number. In addition, single contexts have been given feature numbers when the original field records indicate that the excavators recognized a context’s spatial distinctiveness from surrounding contexts.
Feature groups are sets of features whose spatial arrangements indicate they were part of a single structure (e.g. structural postholes, subfloor pits, and hearth) or landscape element (e.g. postholes that comprise a fenceline). Feature Groups assigned by DAACS have a FG-prefix, which precedes the number (i.e. FG01 equals Feature Group 1).
|F01||Pit, subfloor(< 28 sq.ft)||838J2, 838D, 838E, 838F, 838G, 838J, 797G1, 797Y, 797H1, 797J1, 797H2, 797J2, 797K2, 797K1, 797V, 797G2, 797UNPROV|
|F03||Floor, clay||838C1, 797N1, 798K, 838C2|
|F22||Pier, brick||747D, 747K|
|F23||Pier, brick||756G, 756H, 756B|
|F04||Ditch, other||826B, 827B, 836B, 798D, 799D|
DAACS Seriation Method
This page summarizes a frequency-seriation based chronology for the Building s site that was developed by DAACS staff (see Neiman, Galle, and Wheeler 2003 for technical details). DAACS seriated ceramic assemblages, with more than 5 sherds, from individual excavated contexts and from stratigraphic groups — groups of contexts that field records indicate were part of a single stratigraphic layer or deposit. DAACS assigned such contexts to the same stratigraphic group. Stratigraphic groups have a SG-prefix, which precedes the group number (e.g. SG01 equals Stratigraphic Group 1). For example, at Building s, a single deposit, interpreted by the excavators as “occupation zone east of structure s”, spanned 3 adjacent quadrats (827, 828, and 839). This zone was excavated in 10 contexts (827C1, 827C2, 827C3, 827C4, 828D1, 828D2, 828D3, 828D4, 839B1, and 839B2). DAACS assigned these contexts to a single stratigraphic group (SG10). Not all contexts have stratigraphic group assignments.
DAACS chose to base the seriation chronology for the Building s site on ceramic assemblages aggregated at the level of contexts and stratigraphic groups, and not at the level of features. This is because most contexts and stratigraphic groups on the site were not parts of features. For the relatively few cases where seriated contexts and stratigraphic groups were parts of features, the relevant feature numbers and descriptions are included in the seriation chronology table below.
DAACS computed the frequency of mean-ceramic-date (MCD) types in each stratigraphic group and each individual context that had no stratigraphic group assignment. The seriation chronology is derived from a correspondence analysis of these MCD-type frequencies. Seriated stratigraphic groups and contexts were assigned to 4 phases. Phases are groups of assemblages that have similar correspondence-analysis scores and are therefore inferred to be broadly contemporary. Phases assigned by DAACS have a P-prefix that precedes the phase number (e.g. P01 equals Phase 1).
The stratigraphic relationships among stratigraphic groups and unassigned contexts are summarized in the Harris Matrix for the site. Phase assignments from the seriation are shown on the Harris Matrix in color, facilitating comparison of the seriation chronology and the stratigraphic chronology of the site.
Building s Site Phases
Based on the correspondence analysis, DAACS divided the Building s site occupation into 4 phases. Mean ceramic dates for the 4 phases are given in the table below. The table also includes two estimates of the ceramic TPQ for each phase. The first TPQ estimate is the usual one – the maximum beginning manufacturing date among all the MCD types in the assemblage. The second estimate — TPQp90 — is the 90th percentile of the beginning manufacturing dates among all the shreds in the assemblage, based on their MCD-type. This second TPQ estimate is more robust against excavation errors and taphonomic processes that might have introduces a few anomalously late sherds in an assemblage. As the table reveals, all 4 phases at Building s contain post-Jefferson material (note the 1840 TPQ’s for all phases). But the mean ceramic date and TPQp90 estimates indicate the first three phases are dominated by Jefferson-era material.
Phase 1, which contains the majority of the material at the site, represents the early occupation of Building s, as shown as the Mutual Assurance Plat of 1796. The stratigraphic groups assigned to this phase include fill layers (SG01, SG02, SG03, SG04) in the small subfloor pit (F01) beneath Building s. One of the postholes (F15) associated with construction of a parking lot fence in the 1930’s yielded a small assemblage that fell in Phase 1. Phases 2 and 3 are comprised of successively later assemblages to which Jefferson-era occupation was the most important contributor. Only two assemblages from features were assigned to these phases. The assemblage from a second posthole associated with the 1930’s fence line (F16) fell in Phase 2, while the assemblage from a ditch at the northern edge of the site (F04) fell in Phase 3. Phase 4 is dominated by post-Jefferson deposition, perhaps associated with the later Brick Pier Structure (FG05: F22,F23) that sits on the western edge of the site and extends onto the adjacent Building r site.
A Seriation Chronology for the Building s Site
The following table presents a seriation chronology for the Building s site. We use the indefinite article to signify that it is not the only chronology possible, nor the best. DAACS encourages users of Archive data to help explore improvements.
|747AB2, 747AB1, 747AF, 747AB4, 747AD3, 962E2, 831H|
|840D, 800G, 837D2|
|798E2, 798E4, 798E3, 798E1|
|800K, 800E, 799E1, 799E2, 797P3, 799E3, 799E4, 797P4, 840B, 837C2, 826C2, 826C1, 840C|
|987G2, 968E, 986H2, 987G1, 988F2, 986H1, 988F1, 830H, 972E, 973D, 975B, 998G, 831J, 996D, 995G, 758E, 967D2, 986H, 994F, 967D1, 757G2, 962F, 831K4, 831K3, 757G, 831K2, 831K1, 964D1, 832E, 964D2, 962F1, 962F2, 961G|
|995E, 995F, 986G2, 986G1, 988E2, 987E1, 757F3, 988E1, 832F2, 758D, 987F2, 830G, 757F, 987F1, 832F1, 757F4, 987E2|
|996C, 757E4, 831F, 830F, 757E3, 961F, 998F, 988D2, 986F2, 987D2, 987D1, 758C2, 757E, 832D2, 994E, 832D1, 968D, 995D, 988D1, 986F1|
|756AH4, 968C2, 757D3, 831E4, 830E2, 972D2, 756AH3, 971A, 987C2, 972D1, 998E, 961E2, 975A, 988C2, 832C2, 988C1, 964C1, 832C1, 962D2, 964C2, 961E1, 832C3, 986E2, 832C4, 967C1, 962D1, 973C, 831E1, 831E2, 757D4, 995C, 965C, 987C1, 986E1, 831E3, 830E3, 830E4, 994D, 967C2, 968C1, 830E1, 758B4, 757D|
|986D1, 756AG4, 998D, 961D, 756AG3, 830D, 986D2|
|747AC3, 747AC, 747AA2, 747AA, 747AA1|
|F01||Pit, subfloor(< 28 sq.ft)||838F, 797J1, 797J2|
|F01||Pit, subfloor(< 28 sq.ft)||797H1, 797H2, 838E|
|F01||Pit, subfloor(< 28 sq.ft)||797G2, 797G1, 838D|
|797F1, 838B2, 800F, 829D, 864B, 838B1, 836C1, 836C2, 797F2|
|964B2, 962C1, 964B1, 757C4, 961C2, 831D1, 831D4, 962C2, 965B, 831D3, 986C2, 986C1, 994C, 995B, 987B2, 987B1, 961C1, 831D2, 996B, 830C3, 968B2, 972B2, 757C3, 830C2, 973B, 988B2, 988B1, 830C1, 967B2, 830C4, 832B4, 998C, 832B3, 832B1, 757C, 756AF4, 756AF3, 832B2, 968B1, 972B1, 967B1|
|782E, 783B, 756D|
|839B2, 839B1, 828D4, 827C1, 828D3, 827C2, 827C3, 827C4, 828D2, 828D1|
|988A2, 830B3, 830B4, 988A1, 996A, 995A, 998B, 994B, 758A1, 831B, 757B2, 832A4, 757B3, 757B4, 972A, 967A, 832A1, 962B, 965A, 757B1, 830B2, 831B4, 830B1, 831B3, 831B2, 831B1, 973A, 756AE3, 987A2, 986B2, 964A, 987A1, 986B1, 758A4, 832A, 832A2, 961B, 756AE4, 758A2, 832A3, 758A3|
|988TPS, 965TPS, 781TPS, 967TPS, 758TPS, 837TPS, 826TPS, 828TPS, 968TPS, 747TPS, 832TPS, 827TPS, 829TPS, 864TPS, 797TPS, 782TPS, 971TPS, 972TPS, 973TPS, 994TPS, 975TPS, 978TPS, 757TPS, 996TPS, 998TPS, 961TPS, 995TPS, 836TPS, 798TPS, 840TPS, 987TPS, 964TPS, 783TPS, 799TPS, 756TPS, 962TPS, 839TPS, 800TPS, 838TPS, 830TPS, 831TPS, 986TPS|
|F04||Ditch, other||827B, 799D, 798D, 836B, 826B|
|799A2, 798A, 826A2, 826A1, 797D4, 827A1, 829B, 798A2, 798A1, 838A1, 864A, 829C, 837A2, 836A1, 836A2, 840A, 839A2, 797D3, 839A1, 798A3, 798A4, 827A4, 799A4, 799A3, 799A1, 827A3, 828C1, 828C2, 828C3, 828C4, 827A2, 800C, 838A2|
|830A, 800B, 994A, 797C, 986A, 756A4, 998A, 756A, 829A, 828A, 757A, 747E, 961A, 781A, 782C, 831A, 783A, 962A|
|756E4, 756E3, 756E2, 756F3, 747J, 756F, 747J3, 781B, 756F1|
|839C1, 756AD1, 756C, 830, 832, 831, 964, 962, 781D, 747G, 994, 972C, 987, 961D1, 756AD4, 782AA, 962G, 747AG, 996E, 829G, 968F, 747L, 986J1|
|840E, 800H, 837E2|
|800A, 797A, 747A|
|F01||Pit, subfloor(< 28 sq.ft)||838J, 797Y, 797UNPROV, 797V, 838J2|
|F01||Pit, subfloor(< 28 sq.ft)||797K1, 797K2, 838G|
|F03||Floor, clay||838C1, 797N1, 798K, 838C2|
|F22||Pier, brick||747K, 747D|
|F23||Pier, brick||756G, 756H, 756B|
Building s Harris Matrix
The Harris Matrix summarizes stratigraphic relationships among excavated contexts and groups of contexts that DAACS staff has identified as part of the same stratigraphic group. Stratigraphic groups and contexts are represented as boxes, while lines connecting them represent temporal relationships implied by the site’s stratification, as recorded by the site’s excavators (Harris 1979).
Stratigraphic groups, which represent multiple contexts, are identified on the diagram by their numeric designations (e.g. SG09), followed by the original excavator’s descriptions of them (e.g. “Occupation zone west of Bldg. s”). Contexts that could not be assigned to stratigraphic groups are identified by their individual context numbers (e.g. 747L).
Boxes with color fill represent contexts and stratigraphic groups with ceramic assemblages large enough to be included in the DAACS seriation of the site (see Chronology). Their seriation-based phase assignments are denoted by different colors, to facilitate evaluation of the agreement between the stratigraphic and seriation chronologies. Grey boxes represent contexts that were not included in the seriation because of small ceramic samples.
This Harris Matrix is based on data on stratigraphic relationships recorded among contexts in the DAACS database. It was drawn with the ArchEd application. See http://www.ads.tuwien.ac.at/arched/index.html.
See Building s Chronology for stratigraphic and phase information.
For a printable version, download the Harris Matrix [124.21 KB PDF].
PDF of composite excavator's plan compiled by DAACS from original field drawings.
CAD site plan in .dxf format.
Arendt, Beatrix , Fraser D. Neiman , and Jillian E. Galle
2003 Model Consumers? Clues to Ceramic Acquisition at Slave Quarter Sites in the Greater Chesapeake. Poster presented at the annual meeting of the Society for American Archaeology, Milwaukee, Wisconsin. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
2003 Acquire This: A Study of Ceramic Stylistic Variability at Monticello, Mount Vernon, and Stratford Hall. Unpublished paper presented at the annual meeting of the Society for Historical Archaeology, Providence, Rhode Island. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
Boyd, Julian , Barbara Oberg , John Cantanzariti , Charles T. Cullen , and Lyman Henry Butterfield
1950-2008 The Papers of Thomas Jefferson. [35 volumes to date]. Princeton University Press, Princeton, New Jersey.
Galle, Jillian E., and Fraser D. Neiman
2003 Patterns of Tea and Tableware Consumption of Late Eighteenth-Century Slave Quarter Sites. Unpublished paper presented at the annual meeting of the Society for Historical Archaeology, Providence, Rhode Island. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
1990 The Archaeology of Mr. Jefferson. Unpublished M.A. thesis, Winterthur Program, University of Delaware, Wilmington, Delaware.
1991 The Archaeology of Slave Life at Thomas Jefferson. In Quarterly Bulletin of the Archeological Society of Virginia 46(1): 2-9.
Harris, Edward C.
1979 Principles of Archaeological Stratigraphy. Academic Press, London, England.
Heath, Barbara J.
2003 A Comparative Analysis of African-American Adornment Practices in the Chesapeake. Unpublished paper presented at the annual meeting of the Society for Historical Archaeology, Providence, Rhode Island. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
2002a Summary of Archaeological Excavations by Site. Mulberry Row Project. Unpublished report on file at the Jefferson Library, Thomas Jefferson Foundation, Charlottesville Virginia.
2002b Summary of Archaeological and Documentary Evidence for Excavated and Standing Buildings on Mulberry Row., Mulberry Row Project. Unpublished report on file at the Jefferson Library, Thomas Jefferson Foundation, Charlottesville Virginia.
Kelso, William M., Diana C. Johnson , Ann M. Smart , Anna Gruber , and Douglas W. Sanford
1985 Monticello Black History/Craft Life Archaeological Project, 1984-1985. Progress report. Submitted to the National Endowment for the Humanities. Manuscript on file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
Kelso, William M.
1986a The Archaeology of Slave Life at Thomas Jefferson’s Monticello: “A Wolf by the Ears.” In t Journal of New World Archaeology 6(4): 5-20.
Kelso, William M.
1986b Mulberry Row: Slave Life at Thomas Jefferson’s Monticello. In t Archaeology 39(5): 28-35.
Kelso, William M.
1997 Archaeology at Monticello: Artifacts of Everyday Life in the Plantation Community. Monticello Monograph Series. Thomas Jefferson Foundation, Charlottesville, Virginia.
Neiman, Fraser D., Jillian E. Galle , and Derek Wheeler
2003 Chronological Inference and DAACS. Unpublished paper presented at the annual meeting of the Society for Historical Archaeology, Providence, Rhode Island. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
Neiman, Fraser D.
1998 Modeling Social Dynamics in Colonial and Antebellum Slave Architecture: Monticello in Historical Perspective. Unpublished paper presented at the Slavery Housing Conference at the International Center for Jefferson Studies, Thomas Jefferson Foundation, Charlottesville, Virginia. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
Neiman, Fraser D.
1997a Sub-Floor Pits and Slavery in 18th- and Early 19th-Century Virginia. Unpublished paper presented at the annual meeting of the Society for Historical Archaeology, Corpus Christi, Texas. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
Neiman, Fraser D.
2008 The lost world of Monticello: an evolutionary perspective. Journal of Anthropological Research 64(2):161-193.
Olson, Heather L.
2003 ‘Constantly Employed’: Chronological and Regional Differences in Tool Use at Seven Slave Sites in the Virginia Chesapeake. Unpublished paper presented at the annual meeting of the Society for Historical Archaeology, Providence, Rhode Island. On file at the Department of Archaeology, Thomas Jefferson Foundation, Charlottesville, Virginia.
Sanford, Douglas W.
1995 The Archaeology of Plantation Slavery at Thomas Jefferson’s Monticello: Context and Process in an American Slave Society. Unpublished Ph.D. dissertation, Department of Anthropology, University of Virginia, Charlottesville, Virginia.
Shumate, M. Scott
1992 Georgian Worldview: Its Definition, History, and Influence on the Material World of Thomas Jefferson. Unpublished M.A. thesis, Department of Anthropology, University of Tennessee, Knoxville, Tennessee. | <urn:uuid:812c1d9c-1351-44d0-8a86-c9f5f4195abb> | CC-MAIN-2016-40 | http://www.daacs.org/sites/building-s/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663010.9/warc/CC-MAIN-20160924173743-00001-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.853547 | 7,489 | 2.53125 | 3 |
Cubic skutterudite materials of the form (Co,Ni,Fe)(P,Sb,As)3, have a potential for high ZT values due to their high electron mobility and high Seebeck coefficient. Unfilled CoSb3-based skutterudites are disadvantaged by their inherently large thermal conductivity, which lowers their ZT value. However, these materials contain voids into which low-coordination ions (usually rare earth elements) can be inserted. These alter the thermal conductivity by producing sources for lattice phonon scattering and decrease thermal conductivity due to the lattice without reducing electrical conductivity. This makes these materials behave like a PGEC (phonon-glass, electron crystal). It is proposed that in order to optimize ZT, phonons which are responsible for thermal conductivity must experience the material as they would in a glass (high degree of phonon scattering– lowering the thermal conductivity) while electrons must experience it as a crystal (very little scattering – maintaining the electrical conductivity).
Lattice Thermal Conductivity and Figure of Merit of La0.9CoFe3Sb12
The effect of introducing a nanoparticle layer in La0.9CoFe3Sb12 in order to reduce the thermal conductivity is investigated up to 550°C. The thermal conductivity (l)was calculated by using the heat capacity (cp) predetermined in the DSC 404 F1 Pegasus®. The lattice thermal conductivity was found by calculating the electrical thermal conductivity using the Wiedemann-Franz relationship and subtracting it from ltotal.
At 452°C, the ZT exhibits its maximum, and the 5 wt.-% nanocomposite shows the highest ZT with an improvement of nearly 15% over that of the control sample that contains no nanoparticles (orange dots). These results show that nanoparticles introduced in already optimized skutterudite systems can further reduce the thermal conductivity and therefore improve ZT within a broad temperature range. | <urn:uuid:f8235c32-f4ec-41c2-aa81-3128dec23134> | CC-MAIN-2020-16 | https://www.netzsch-thermal-analysis.com/ja/%E6%9D%90%E6%96%99%E3%81%A8%E5%BF%9C%E7%94%A8/%E7%86%B1%E9%9B%BB%E6%9D%90%E6%96%99/skutterudite/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370525223.55/warc/CC-MAIN-20200404200523-20200404230523-00114.warc.gz | en | 0.89546 | 417 | 2.59375 | 3 |
USA — California’s logging policy may hang on the fate of the black-backed woodpecker if environmental advocates have their way, a petition says.
The Center for Biological Diversity and the John Muir Project of the Earth Island Institute recently filed a petition to protect the woodpecker under the state Endangered Species Act, the Sacramento (Calif.) Bee reported.
They say salvage logging, the practice of harvesting burned trees, threatens the bird’s survival because it depends on a habitat of burned forests. The woodpecker prefers to nest in burned trees, and feeds on insects that attack trees after a fire. It also is part of a whole ecosystem that is essential to the life cycle of California forests.
That cycle was interrupted by a century of misguided fire suppression, and now by salvage logging, said Chad Hanson of the John Muir Project.
California currently allows salvage logging under streamlined regulations so property owners can harvest the wood before it rots.
Bob Mion of the California Forestry Association responded that protecting burned trees would be a hardship on property owners who need salvage logging to recover some of the value lost in a forest fire and that leaving dead trees also may increase future fire risk. | <urn:uuid:1fc1349b-0f6d-43dc-b7b0-f98d1b6dd098> | CC-MAIN-2022-40 | https://gfmc.online/media/2010/10-2010/news_20101017_us2.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00078.warc.gz | en | 0.922594 | 244 | 2.875 | 3 |
Scoliosis neck and shoulder pain are interrelated and this is the reason why physicians look at the neck when you are experiencing shoulder pain. Our shoulders are made up of muscles, tendons, ligaments and bones.
Shoulder pain usually starts from damage to the structure of the shoulders but there are instances in which you feel both neck and shoulder pain. This condition may be due to disc problems with either the nerves or bones in the neck.
Most people have scoliosis yet don’t realise it this is a major cause of neck and shoulder pain. The long back muscle on one side of the body becomes extended in a locked state. This is due to the Gait reflexes not functioning well. This now sets up a set of reactive muscles going from the back to the legs, then to the abdominal muscles and up to the neck muscles.
A part of this chain of muscles associated with scoliosis is the upper trapezius muscle on the side of the body with the highest shoulder and the long back muscle on that side of the body. This upper trapezius muscle connects with the shoulder and vertebrae of the neck on that same side and is locked in a contracted state. To have scoliosis neck and shoulder pain relief requires a special treatment known as N.O.T.
Causes of Neck and Shoulder Pain
The common cause is injury to the soft tissues that happens after an accident or whiplash. An injury or trauma to the neck can damage the nerves to your shoulders and cause the pain.
The presence of tumors in the cervical spine can trigger pain in the neck, shoulders and arms. The more the tumor grows the more it pressures the nerve.
Meningitis, a life-threatening condition that affects the central nervous system, has the primary symptom of neck and shoulder pain accompanied by lethargy, vomiting and fever.
The Pain Experience
Those experiencing neck and shoulder pain describe the pain as sharp, but there are times it can feel dull and stabbing. Pain can cause involuntary stiffening of the neck and shoulder muscles to limit the pain but it also limits range of motion.
Coolness may also be felt since because when the nerves are compressed there will not be enough blood to supply other extremities causing the skin to turn white or blue. There may also be swelling due to muscle spasms or deformities from fractures, if that is the injury type.
Tests For Neck and Shoulder Pain
X-rays are usually the first test done if there is tenderness on the spine and shoulders, deformities, history of injury or when the physician thinks that the condition is associated with any lung or heart diseases.
Electrocardiographs and blood tests may also be performed for those experiencing difficulty of breathing or chest pain and for those who are at risk of heart attacks. These tests are also done if the doctor suspects that there are underlying conditions causing the pain.
Treatments For Neck and Shoulder Pain
The initial treatment for neck and shoulder pain is usually conservative and consists of taking medications, such as acetaminophen for pain and anti-inflammatory medications for swelling and inflammation.
Determining which medications you should take will depend on the cause of the pain, so it’s always wise to visit your doctor for a proper treatment plan.
Prescribed exercises may be helpful for neck and shoulder pain. Another non-surgical treatment is warm and cold compresses applied alternatingly on the affected area. This can help by reducing both the pain and swelling. | <urn:uuid:a7b6de80-9117-4009-948d-426a56b3f671> | CC-MAIN-2017-13 | http://www.neck-pain.org/scoliosis-neck-and-shoulder-pain/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190134.25/warc/CC-MAIN-20170322212950-00140-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.941314 | 720 | 2.875 | 3 |
Your puppy's urinary tract consists of his bladder, kidneys, ureters and urethra, which expels the urine from his body. Ideally, the organs and channels that make up the urinary tract are relatively sterile environments, but occasionally, bacteria from your puppy's genital area makes its way into the urethra or bladder, causing a bacterial urinary tract infection.
Symptoms of Urinary Tract Infection in a Puppy
If you've noticed your puppy straining or yelping when she urinates, or if her urine appears unusually dark, rust-colored or bloody, she may be suffering from a urinary tract infection. Puppies are especially susceptible to urinary tract infections because their immune system is still undeveloped, and bacteria from their feces may enter their urethra when they groom themselves. Other symptoms of a UTI include excessive thirst, frequent urination, a fever, weight loss or a foul odor emanating from her urine. If your puppy exhibits any of these symptoms, take her to the vet right away. Without prompt treatment, a UTI can travel into the bladder or kidneys and become life-threatening.
Testing for a UTI
Your vet most likely will ask you for a verbal history of symptoms as she performs a physical examination on your puppy. If she suspects a possible UTI, she'll order a urinalysis to measure the levels of white blood cells, chemicals and proteins in your puppy's urine and to check his pH balance and screen for a possible infection. If the test results indicate a possible infection, she may perform a urine culture and sensitivity test to check for bacterial growth in the separated sediment of your puppy's urine. If bacteria is found, another urine test will estimate the concentration of bacterium and identify the specific type so your vet can prescribe the correct antibiotic for your pet's infection.
You may be asked to collect a urine sample from your puppy prior to the veterinarian visit. Ideally, you will do this by catching the puppy's urine in a sterile cup, midstream. It is possible to collect a urine sample after your puppy has deposited it on a surface, but it may contain bacteria other than those causing the UTI, which can complicate diagnosis and the treatment plan. Your vet can get a cleaner urine sample by using a catheter to withdraw urine from your puppy, but there is still a slight chance of transferring the bacteria from the urethra to the bladder via the catheter. The preferred method of urine collection is a cystocentesis, in which the vet uses a needle to draw urine directly from your puppy's bladder. This method ensures a clean sample and eliminates the possibility of bacteria contamination.
Treating a UTI
Before treating your puppy's UTI, your vet will first have to determine the type, location and extent of his infection. An infection that has traveled to the kidneys can be life-threatening and may require between four to six weeks of antibiotic medication. If his infection has caused your puppy to develop painful bladder or kidney stones, he may need to have them surgically removed to prevent a blockage of his urine flow. Infections caused by blockages or tumors of the bladder or kidneys may require surgery, antibiotics and possible chemotherapy or radiation treatments.
A male puppy who has not been neutered may develop prostatits, an infection of the prostate gland. He will need to be neutered and treated with antibiotics to clear the infection. Female puppies can develop vaginal strictures, or narrowing in the vagina, which creates a breeding ground for bacteria. Your vet may enlarge the opening manually while your puppy is sedated. | <urn:uuid:ce507fe8-00cb-403e-8715-1d26e01839df> | CC-MAIN-2021-10 | https://www.cuteness.com/article/tell-puppy-uti | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369721.76/warc/CC-MAIN-20210305030131-20210305060131-00425.warc.gz | en | 0.946745 | 730 | 2.828125 | 3 |
Back in 2009, as the 2008 global financial meltdown unfolded, cryptocurrencies - and by extension, the Blockchain technology - made their first appearance.
Positioned from the outset as an alternative to traditional banking mechanisms, Blockchain raised the possibility of a revolution in the world of financial technology, and the way money was controlled. Nine years on, we see different economies and industries across the globe still trying to understand and adopt the technology.
In India, Bitcoin – one of the most popular cryptocurrencies - has caught the fancy of investors, startups and users alike, spurred at least in part by the recent demonetisation drive.
However, while Bitcoin remains a different ball-game, Blockchain technology, in particular, may hold the answers to India’s widening financial divide. With an objective outlook, different public and private players in the financial domain can adopt Blockchain technology to reduce the cost of operations and remittances, and enable financial inclusion.
Demystifying Blockchain Technology
Bitcoin has shone the spotlight on the potential of blockchain technology and in particular its use in allowing the transfer of digital currency between individuals without needing an intermediary to validate or permit the transaction.
The core of the technology is governed by a software protocol that efficiently maintains records of every transaction. The records thus created are decentralised, immune to any external tampering, and can be accessed and used to verify transactions.
The technology not only eliminates the need for intermediaries but also creates secured data that is readily accessible. These attributes put Blockchain tech as the frontrunner solution to expand financial inclusion without surging costs.
Finland has been leading by example when it comes to leveraging Blockchain technology for providing legal and financial identities to individuals.
When greeted with a huge influx of refugees seeking political asylum, Finland leveraged Blockchain technology to help find an identity and access MONI cards to send or receive payments, pay bills and more.
Following this precedent, the United Nations is also exploring the idea of deploying Blockchain tech to provide legal entities to over one billion people without any authorised documents.
Serving the Un-served with Digital Identities
India has an incredible opportunity to spread financial inclusion across the length and breadth of the nation. According to a joint study released by ASSOCHAM and EY, 19 percent of the population continues to remain unbanked, or financially excluded, despite the best efforts of banks and financial services providers.
While the Government of India and the Reserve Bank of India have taken several steps to spread financial inclusion, the infrastructure at present is not sufficient to reach out to the myriad sections of the country
The most significant barrier to accessing financial services for individuals at the base of the pyramid is the lack of required documents.
The use of Blockchain technology helps resolve this mismatch by establishing digital identities for individuals. For immediate means, the Government can leverage the potential of cryptography technologies to create online profiles, taking account of an individual’s identity and family associations.
Another way is to create usernames with an open space for the name, and directly embedding the user data in the Blockchain. This way, individuals can self-identify and access the available financial services – from opening bank accounts to sending or receiving money, applying for loans and more.
Blockchain will also be able to facilitate a greater flow of remittances into the country from Indian workers overseas – again, the degree of access to financial services that Blockchain provides through its identity management will enable hitherto unbanked workers overseas to send funds directly back home, with a very clear positive knock-on effect for local economies.
Citizens hitherto excluded from access to financial services will enjoy greater financial freedom and security through Blockchain technology. Digital identities created in the process offer greatly improved privacy by restricting them to specific devices or by granting privileged access to individuals, in line with their authority.
A financial institution can access the same digital identities to reissue documents or access data whose paper versions may have gone missing. By integrating these solutions into other external services, we stand to reduce instances of fraud or error in the delivery of financial services to the under-served or unbanked sections of society.
While financial inclusion is paramount for India to continue her growth trajectory, its nature tends to be complex and challenging.
The shift in paradigm requires collaboration between the private and public sector, for not only trailblazing innovations but also creating a holistic, robust ecosystem.
With the growing adoption of Blockchain technology, the two billion unbanked people spread across the globe stand a chance of financial inclusion. Lowered risks and costs, along with increasing innovation, means that blockchain technology is going to be integral to financial services in times to come.
(Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the views of YourStory.) | <urn:uuid:a823f987-51c6-4743-b692-b1baa6d90f64> | CC-MAIN-2019-43 | https://yourstory.com/2018/01/financial-inclusion-leapfrog-blockchain-technology | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987836295.98/warc/CC-MAIN-20191023201520-20191023225020-00247.warc.gz | en | 0.92196 | 962 | 3.0625 | 3 |
Caldwell 44, or NGC 7479, is a barred spiral galaxy discovered in 1784 by astronomer William Herschel. A barred spiral galaxy is a disc of stars with a bar at its core and arms which begin from the edges of this core and spiral outward. The denser core is made up of older stars, and the outer edges are made up of hotter stars that formed more recently and don't last long. There are also often dust lanes in the galaxy that create patterns of blocked light. This particular barred spiral galaxy is approximately 105 million lightyears away, and found in the the Pegasus constellation.
This image of Caldwell 44 is taken more or less face on, so the full disc can be seen. The distance to the object, as previously mentioned, was found to be 105 million lightyears; we find a maximum angular size of 152 arcseconds, which corresponds to a linear size of 77,000 lightyears. As mentioned above, there is a core of older stars, which are not as hot, as can be seen by their yellow color. The outer edges of the arms, coming out from the core and spiraling westward are blue. The blue color of the stars in the arms indicates that the stars in the arms are younger, hotter, more recently formed stars. The image does not clearly show any dust lanes, but if it did, they would appear as darker patterns on the image.
"Spiral Galaxies." Sloan Digital Sky Server. <http://cas.sdss.org/dr5/en/proj/basic/galaxies/spirals.asp>.
Frommert, Hartmut and Kronberg, Christine. "NGC 7479." Students for the Exploration and Development of Space. <http://messier.seds.org/xtra/ngc/n7479.html>
|Right Ascension (J2000)||23:04:56.70|
|Filters used||B (Blue), C (Clear), R (Red), V (Green)|
|Exposure time per filter||B, V, and R (6.0s x 5); C (60s x 1)|
|Date observed||October 19, 2012| | <urn:uuid:6136db38-0df6-4fc0-8300-a2b3aac1a07a> | CC-MAIN-2015-18 | http://www.calvin.edu/academic/phys/observatory/images/Astr111.Fall2012/VanderHaak.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656887.93/warc/CC-MAIN-20150417045736-00164-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.924826 | 456 | 3.4375 | 3 |
How did the Nazis attempt to dehumanize the villagers? Was it gradual ? What was there ultimate goal?
Answers 1Add Yours
The Nazis would disrupt weddings, target Jewish businesses, deport Jews to Russia and other places....At one point in the book, an officer instructs them to lie on the ground so that his officers can move among them and take their jewelry and papers for "safekeeping." It began as gradual but rapidly got worse. The Nazis ultimate goal was to de-humanize the Jews and leave them without hope. Hitler's ultimate goal was ethnic cleansing. | <urn:uuid:f6c36eb0-d44d-4d88-9502-a76c2869d5f9> | CC-MAIN-2017-39 | http://www.gradesaver.com/the-devils-arithmetic/q-and-a/the-devils-arithmetic-240292 | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696182.97/warc/CC-MAIN-20170926141625-20170926161625-00591.warc.gz | en | 0.980222 | 118 | 2.625 | 3 |
Daniel's prophecies introduce the mysterious time period of the
"time, times, and a half," in Daniel 12:7. This is identified with
three and a half years, and it is expressed in various ways, and can be
understood by referring to the prophecy of the 70 weeks of the 9th
chapter, and to part of the 70th week in that prophecy.
The same time period is mentioned in some of the prophecies of Revelation. The equivalent in days or months occurs in Revelation 11:2-3. In verse 2 it is "forty and two months," and in verse 3 it is "a thousand two hundred and sixty days." These time periods both refer to Daniel's "time, times, and a half."
The correct interpretation of this period of time is a key to understanding prophecies such as this prophecy about the two witnesses, described in Revelation 11:1-13, which otherwise remains locked up or sealed. As interpreted below, this prophecy presents the divine perspective on the two witnesses of God, which remain in the world, one of which represents the scriptures, and the other representing the Spirit of God.
The prophecy outlines, in symbol, the history, and purpose of the holy scriptures in the world, and the Spirit. These are identified within the New Testament as "two witnesses," which testify to Christ and to the truth in the world.
Daniel's time period of a time, times and a half or three and a half years is identified with the last half of the final "week" in the prophecy about the 70 Weeks, in Daniel 9. This final week is a figurative period of seven years. It is during this "week" that Christ "confirms the covenant with many," as stated in Daniel 9:27. The first half of this prophetic "week" was the three and a half year ministry of Christ on the earth in the first century. The second half of the final "week" is symbolic, and represents the entire period of the Church.
The final three and a half years, also referred to as a period of 1,260 days, and as forty two months, or any other reference to a time period associated with the number "three and a half," may be taken as a figure or symbol of the period in which the scriptures and the Holy Spirit are in the world, from the coming of the Holy Spirit to the Church in the first century, on the day of Pentecost, after the crucifixion of Christ, to the return of Christ to the earth. The phrase can also refer to a portion of this period.
The scriptures have a crucial role in this period. Along with the Spirit of God, they bear witness to Christ. Their significance and history is clearly a suitable topic for biblical prophecy.
John was given a reed like a rod, and was told to measure the temple. The reed or measuring stick was compared with a rod because it was to be a means of correction. This measuring reed was the prophecy he set forth in this chapter, and in the chapters following. It was intended for discipline. For a Christian, the correction and guidance God provides in his word is a comfort. If we recognize the truth conveyed by the prophecy, it will correct us, but it will also comfort the Saints, to receive an accurate description of the state of the Church, because such a description reveals that Christ is in control, and things are working out according to His plan. David wrote: "Yea, though I walk through the valley of the shadow of death, I will fear no evil: for thou art with me; thy rod and thy staff they comfort me." (Psalm 23:4)
John was told to measure the temple [Revelation 11:1-2]; not the physical temple in Jerusalem, but the spiritual temple, the Church. To "measure" is to describe, and that is what the prophecy in this chapter does. It describes the role of the scriptures and the Holy Spirit in the Church in symbolic terms. The message contained in the prophecy is learned by interpretation of its symbolic language. To measure the temple means, in this prophecy, describe the Church. But the court outside the temple was to be excluded. That is, the prophecy applies to Christians only, and is not intended for correction of unbelievers.
The Apostle Peter refers to Christians as "lively stones" built up as a spiritual house, with Christ the chief cornerstone. He wrote: "Ye also, as lively stones, are built up a spiritual house, an holy priesthood, to offer up spiritual sacrifices, acceptable to God by Jesus Christ." (1 Peter 2:5)
Similarly, Paul wrote to the Corinthian Christians: "Know ye not that ye are the temple of God, and that the Spirit of God dwelleth in you?" (1 Corinthians 3:16) Paul wrote to the Ephesians: "Now therefore ye are no more strangers and foreigners, but fellow citizens with the saints, and of the household of God; And are built upon the foundation of the apostles and prophets, Jesus Christ himself being the chief corner stone; In whom all the building fitly framed together groweth unto an holy temple in the Lord: In whom ye also are builded together for an habitation of God through the Spirit." (Ephesians 2:19-22) These scriptures show plainly that the temple is a symbol or figure of the Church.
John was also told to measure the altar. In Revelation 8:3 the altar in heaven is mentioned in connection with the prayers of the saints. The phrase, "them that worship therein" must refer to the saints. Peter said Christians are to offer up "spiritual sacrifices," consisting of prayers of thanksgiving, praise, and good works, and the altar mentioned in the prophecy could be a figure of these. In Hebrews we read: "Through him, then, let us continually lay on the altar a sacrifice of praise to God, namely, the utterance of lips that give thanks to His Name. And do not forget to be kind and liberal; for with sacrifices of that sort God is greatly pleased." (Hebrews 13:15-16, Weymouth translation.)
The description of the state of the Church in this prophecy is one which reveals the great needs of the Church in our age. There is a need for all Christians to consider the state of the Church in the present age, so they can effectively pray that God would revive and heal it by revealing His truth. If Daniel's prayer about the desolate state of the city of Jerusalem, which consisted of heaps of stones and rubble, could lead to the revelations recorded in Daniel chapter 9, how much more would the earnest prayers of the saints today, and their concern about the overall state of the Church, the people for whom Christ gave his life, move God to send forth His Spirit? But few Christians today have the vision to even comprehend what the Church is. The prophecies of Revelation 11-12 provide insight into this important question.
The holy city mentioned in verse 2 is another figure of the Church. It was to be trodden under foot for 42 months. This indicates the saints were to be subjected to others. There is a parallel between this scripture and Daniel 7:21. This prophecy does not refer to the nations taking control of the literal city of Jerusalem, for three and a half years, although Christ referred to the city of Jerusalem being trodden down by the nations "until the times of the Gentiles be fulfilled." (Luke 21:24) It refers to Jerusalem as a figure of the Church. Paul uses the expression "Jerusalem which is above" in Galatians 4:25 to represent the Church. The Church, according to this prophecy, has been trodden down, dominated by unbelievers. The court outside the temple represents the world. The Gentiles mentioned in the prophecy are a figure of the world, or unbelievers.
The prophecy speaks of two witnesses since two is the number of witness. The law of Moses required that more than one witness was needed for a man to be sentenced to death for murder or idolatry. Christ counselled his disciples to take along two or three witnesses when settling a dispute: "Moreover if thy brother shall trespass against thee, go and tell him his fault between thee and him alone: if he shall hear thee, thou hast gained thy brother. But if he will not hear thee, then take with thee one or two more, that in the mouth of two or three witnesses every word may be established." (Matthew 18:15-16)
The two witnesses are identified as two olive trees, and two candlesticks, which is similar to the vision described in Zechariah 4. In this prophecy, two olive trees stood one on each side of a golden candlestick. On top was a bowl, and pipes led from the bowl to seven lamps. Two olive branches provided golden oil through two golden pipes, the oil being the fuel for the candlestick. The olive trees were the source of the oil, which provided light when it was burned in the candlestick.
In scripture, light represents truth and understanding. Proverbs 6:23 says: "For the commandment is a lamp; and the law is a light..." Psalm 119:105 says: "Thy word is a lamp unto my feet, and a light unto my path." Many other scriptures use light and a lamp as a symbol of truth and insight. In Psalm 119:130 we read, "The entrance of thy words giveth light; it giveth understanding to the simple." The two witnesses are called two candlesticks because they are the source of light and truth in the world.
Zechariah 4:14 says the two olive trees are "the two anointed ones, that stand by the Lord of the whole earth." Adam was given dominion over the earth, at Creation. The Lord of the whole earth, then, is man. The anointing refers to the Spirit of God. In the Garden of Eden, God planted the tree of life, and the tree of the knowledge of good and evil. (Genesis 2:9) The two olive trees of prophecy can be identified with the two trees God had planted in the Garden of Eden, which figure prominently in God's purpose for the destiny of man. They represent the truth God has revealed in His Word, and the Spirit of God which is available to man.
The book of Zechariah was written at the time of the rebuilding of God's temple. The prophecies show the role of the scriptures and the Holy Spirit in the construction of God's spiritual temple, the Church. When Zechariah asked the meaning of the vision of the two olive trees beside the golden candlestick, the angel mentioned the word of God, and the Spirit of God. He answered: "This is the word of the Lord unto Zerubbabel, saying, Not by might, nor by power, but by my Spirit, saith the Lord of hosts." (Verse 6) The olive trees represented the word of God, and the Spirit of God.
The light produced by the candlesticks is a symbol of truth and understanding. The olive trees in Revelation 11 along with the two candlesticks, represent the scriptures, and the Holy Spirit which was given to the Church. In Zechariah's prophecy, only one candlestick is mentioned. John may have spoken of two candlesticks because the scriptures today consist of the Old and New Testaments. Both bear witness to Christ.
In the first chapter of John's gospel, Christ is identified with the Word, and He is called "the true Light, which lighteth every man that cometh into the world." (John 1:9) In verse 5, we read, "And the light shineth in darkness; and the darkness comprehended it not."
Can we really know that Revelation chapter 11 is meant to be interpreted, and is not to be taken literally? How can we be sure it has to be understood figuratively? One reason is because it is prophecy. The book of Revelation is full of symbolic language. It cannot refer to two Christians, or any two humans, since fire came from their mouth, and killed their opponents. They "smite the earth with plagues." There are no Christians who can, or should behave in such a fashion. It is not language which should be taken literally. The mouth of man was not designed to project fire! Christians do not have a mandate to take vengeance on those who would do them wrong. Christ said we should "turn the other cheek."
The identification of the two witnesses is not merely a matter of guessing. Christ identifies two things which would testify of him: the scriptures, and the Spirit. The first is found in John 5:39. Christ said to the Jews, "Search the scriptures, for in them you think ye have eternal life: and they are they which testify of me." One who testifies is a witness.
John recorded Christ's promise to his disciples that the Spirit would come: "I will pray the Father, and he shall give you another Comforter, that he may abide with you for ever; Even the Spirit of truth; whom the world cannot receive, because it seeth him not, neither knoweth him: but ye know him; for he dwelleth with you, and shall be in you." (John 14:17) Jesus referred to the Holy Spirit as the other witness. He said, "But when the Comforter is come, whom I will send unto you from the Father, even the Spirit of truth, which proceedeth from the Father, he shall testify of me: and ye shall also bear witness, because ye have been with me from the beginning." (John 15:26-27)
There are several indications the two witnesses are identified with Moses and Elijah, who are figures of the Bible and the Holy Spirit. Like Moses, the witnesses called down plagues, and they turned waters to blood. Like Elijah, they held back rain.
Moses wrote of a future prophet who was to appear in Israel: "The LORD thy God will raise up unto thee a Prophet from the midst of thee, of thy brethren, like unto me; unto him ye shall harken." (Deuteronomy 18:15) This was fulfilled in Christ. Also Elijah was predicted to come, and "turn the hearts of the fathers to the children, and the hearts of the children to the fathers." Both Moses and Elijah were mentioned in the final few verses of Malachi.
A future coming of the prophet Elijah, before the "day of the Lord," was promised in the Old Testament prophecies. The prophecy of Revelation 11 explains what this means. The words of scripture have been available since Old Testament times. They were completed when the New Testament was compiled by the Apostles. The "spirit of Elijah" is same Spirit of God which was given to the Church on the day of Pentecost, 31 A.D. The Spirit inspired the writers of the New Testament. It has remained with the saints until now. It will be with the Church till the end of the world. It was to lead the saints to "all truth."
The two witnesses are depicted as clothed in sackcloth, representing humility. Sackcloth, when used as clothing, is a means of expression. It is not particularly attractive, and is seldom worn. Similarly, the scriptures are not widely believed or understood. The truth in the scripture has been presented in symbolic language, as with the parables of Jesus. This was not to make the message plain, but to conceal it from the world, and preserve it.
Moses and Elijah represent the scriptures, and the Spirit of God. Moses led the children of Israel out of Egypt, and throughout all their wanderings in the wilderness. So the scriptures and the Holy Spirit lead the saints out of this world, and the bondage of sin. Egypt is a figure of the world in prophecy. They guide the saints in the wilderness of this present life, in which we are being prepared to enter a "promised land." The wilderness represents the present partial spiritual understanding that the saints have in this life. As the people of Israel collected the manna, and ate it, the saints are nourished spiritually by the words of the scriptures. We receive the Holy Spirit from Christ, typified by the people of Israel drinking water from the rock in the wilderness.
Moses compared his words to rain: "My doctrine shall drop as the rain, my speech shall distil as the dew, as the small rain upon the tender herb, and as the showers upon the grass" (Deuteronomy 32:2).
Elijah was unique among the Old Testament prophets. He had the Spirit of God, typified by the "still small voice," which came after the earthquake, wind, and fire. (1 Kings 19:12) Elijah seems to represent the Spirit of God especially. He prayed that there would be no rain in Israel for a period of three years and six months. He told the Israelite king Ahab, "As the Lord liveth, before whom I stand, there shall not be dew nor rain these years, but according to my word." (1 Kings 17:1)
In the prophecy of the two witnesses, the Spirit and the scriptures have "shut heaven" and caused the cessation of prophetic revelation and other "signs" to the Church. At least it is not evident nearly so much as in the early first century church. There are no dramatic miracles occurring today, for example, such as those performed by the apostles. This has been true since the days of the apostles in the first century.
The "rain" is a symbol of the outpouring of God's spirit. The word of God comes to us only through the scripture, not the book of Mormon or the Koran or St. Augustine or any other source. None of the early church fathers, or any Christians today, have the authority of the scriptures.
The writing of scripture has ceased, since the New Testament scriptures were compiled in the days of the Apostles. Although the Apostles had prophetic revelations, no such inspired writings have been afforded to the Church since. Scripture is the only source of revelation to the Church, and much of it has not yet been understood. Why would God give new revelations, when we have not understood what he has already revealed?
If any man would hurt the two witnesses, fire proceeded from their mouth, and devoured their enemies, a figure of the words of scripture which warn of the judgment in store for the enemies of the truth. Jeremiah 5:14 says: "I will make the words in thy mouth fire, and this people wood, and it shall devour them." The fire from the mouth of the two witnesses is a figure of the words of scripture that describe the fate of their enemies. Jesus especially warned against speaking evil of the Holy Spirit. He said to the Pharisees who suggested he was casting out demons by the power of Satan: "Wherefore I say unto you, All manner of sin and blasphemy shall be forgiven unto men: but blasphemy against the Holy Spirit shall not be forgiven unto men. And whosoever speaketh a word against the Son of man, it shall be forgiven him: but whosoever speaketh against the Holy Spirit, it shall not be forgiven him, neither in this world, neither in the world to come." (Matthew 12:31-32)
The fire represents the fire of future judgment, when offenders will be killed by fire. Jesus said of this judgement that is to come: "The son of man shall send forth his angels, and they shall gather out of his kingdom all things that offend, and them which do iniquity; and shall cast them into a furnace of fire: there shall be weeping and gnashing of teeth." (Matthew 13:41-42)
The first of the ten plagues pronounced upon Egypt by Moses was turning the waters to blood. The waters of the Nile, and streams and pools in the land were turned to blood.
The scriptures speak of God as "the fountain of living waters." (Jeremiah 2:13) Isaiah wrote, "With joy shall ye draw water out of the wells of salvation." (Isaiah 12:3) Jesus said to the woman of Samaria, who came to draw water from Jacob's well, "Whosoever drinketh of this water shall thirst again: But whosoever drinketh of the water that I shall give him shall never thirst; but the water that I shall give him shall be in him a well of water springing up into everlasting life." (John 4:13-14) And when Jesus was at the feast of tabernacles in Jerusalem, he said: "If any man thirst, let him come unto me, and drink. He that believeth on me, as the scripture hath said, out of his belly shall flow rivers of living water. (But this spake he of the Spirit, which they that believe on him should receive: for the Holy Spirit was not yet given; because that Jesus was not yet glorified.)" (John 7:37-39)
Clearly, the waters are identified with God's Spirit. The power of
the two witnesses to turn the water to blood seems like a dramatic
sign, as that was one of the plagues sent when Moses stood before
Pharaoh; the waters of the rivers in Egypt became blood. But nothing
like that has occurred in the history of the church. There is another
account in the OT of waters appearing like blood, to the enemies of
Israel, in the days of Elisha.
In 2 Kings 3, there is an account of a battle in which the outcome hinged on people mistaking water for blood. The kings of Israel, Judah and Edom went out into the wilderness with their armies in order to punish the king of Moab, who had stopped paying tribute to the Israelite king. But they ran short of water. So they called for the prophet Elisha.
Elisha advised them to make ditches in the valley. During the night, the ditches filled up with water. In the morning the Moabite army looked over the valley, and the reflection of the red sky on the water appeared to them like pools of blood.
2 Kings 3:21-23
And when all the Moabites heard that the kings were come up to fight against them, they gathered all that were able to put on armour, and upward, and stood in the border.
And they rose up early in the morning, and the sun shone upon the water, and the Moabites saw the water on the other side as red as blood:
And they said, This is blood: the kings are surely slain, and they have smitten one another: now therefore, Moab, to the spoil.
Assuming there had been a battle, the Moabites approached the camp of the Israelites, expecting to find them wasted, but instead were slaughtered themselves.
Atheists and skeptics, who reject the gospel, are much like those unfortunate Moabites, who mistook water for blood. They view the truths of the gospel which Christians accept, as notions unfit for human consumption! The gospel, which is as cool, clean, fresh drinking water to believers, is as distasteful as blood to them. Several facts make the scriptures unpalatable for people in the modern age, such as the stories of bloody battles of conquest by the Israelite armies when they took possession of the promised land, the flawed cosmology in Genesis, and the flood of Noah, for example.
I suggest the flawed cosmology likely resulted from changes introduced into the OT, initiated by the hellenistic king Antiochus IV, in the 2nd century BC. The intent was to make the scriptures conform to the geocentric cosmology of the Greeks.
Another stumblingblock for many is that the scriptures record miracles and prophecies. A literal approach to passages in the Bible that are poetic, and symbolic, contributes to this perception of the gospel as unpalatable, like blood. Thus, many view the Bible, and the message of the gospel, not as refreshing, life-giving water, but as blood that they cannot bring themselves to drink!
This could be what is pictured by a prophecy about the 2 witnesses. Jesus identified the Spirit of God and the scriptures as two things which testify of him, and one who testifies is a witness. Jesus referred to the gospel as "living water" (John 4:10). This is the water that has seemed more like blood to many. Like the Moabites, who were Israel's enemies they "see blood," but it is an illusion. What is really there is water.
The two witnesses have the power to "smite the earth with all plagues, as often as they will." This kind of power can only belong to God. It cannot reasonably apply to any two men. It is a reference to the prophecies of sripture. Just as the plagues announced by Moses came upon Egypt, the events foretold in sripture will come to pass.
The sriptures have been printed in almost every language and dialect, and are distributed around the world. But to many people, they seem to have little relevance to modern life. The history in the bible, the stories of the creation, Adam and Eve, and the Noachian flood, seem like myths. Miracles that are related in the New Testament are disbelieved, and it appears such things do not happen today. The prophecies of the Bible are obscure. To the ordinary person, the Bible is a dead book. It has only historical interest.
This is all spelled out symbolically by the description of the war with the beast from the bottomless pit, (Satan) which overcame the two witnesses, and killed them. Satan has made war against the scriptures, and caused Christians to doubt. His efforts to deceive men have succeeded. The attitude of many Christians to the sriptures has become not much different to that of the world.
The war between Satan and the two witnesses is about the authority and reliability of the sriptures, and our faith in them. It is fought in the minds of people, rather than physical warfare. Paul wrote: "For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places." (Ephesians 6:12) In this war, the two witnesses were overcome.
This explanation of the prophecy of the war between the beast from the abyss and the two witnesses is supported by comments of Howard Rand in his book "Study in Revelation." He wrote:
The power of the Witnesses is in the testimony of the Word and the Spirit. So long as men believed and accepted the Word, Satan was powerless to overcome the Witnesses or silence their testimony. It was necessary in his new plan of attack that the Word be brought into disrepute. Men must be made to doubt its message and accuracy.
The rise of modern science and materialism has been a major factor in this war against the Bible. This was recognized by C.A.L. Totten in 1890, in his description of the effect of the biblical criticism that overwhelmed seminaries and other educational institutions in the last century. His comments were cited by Rand:
Most religious people are literally afraid to investigate the Bible, and well they may be if the canons of the 'Higher Criticsm' are to guide their study. Most of the laity consider it to be beyond their sphere, and so far as 'Moses and the Prophets' are concerned, even the clergy almost entirely neglect them. We readily grant that Sin, Repentance, and the Gospel of a Saviour are the vital 'end' of apostolic work. Nevertheless we hold that Christ and the Resurrection cannot be successfully preached in this age upon the undermined foundation left by the Higher Critics. It is well for them if they can hold their own souls within the fold: we question it; but be this as it may, it is the rest of men that are the ones whom Christ desires to save, and they have logic left, and cannot be savingly reached by any other means than a logical exegisis of the whole Bible, and a satisfactory explanation of its inspiration as such, upon the basis that it is 'the truth, the whole truth, and nothing but the truth.' For, not though one rose from the dead will men believe, unless they likewise are taught to believe implicitly, and are made to understand, 'Moses and the Prophets.'
It is the Bible that Atheists and Infidels attack - the Old Testament chiefly - for they are logical, and perceive that if the foundation goes, the superstructure cannot stand, no matter how eloquently it can be clothed in Agnostic sermons. Hence this Old Testament is our one and only bulwark of defense. It will not do to preach Christ and deny Moses. It will not do to doubt the universality of the Flood, and ask men to accept a Saviour who alludes to it! ...If the story of Eden and the Deluge, of Jerico and Joshua, are myths, or fables, and not literal facts, then, to the still rational mind, all that follows them is equally so, and faith, lost in those who foretold His advant, can never be savingly and logically found again in Christ and His apostles.
Here is the Bible's evaluation of much of the biblical scholarship in religious books and periodicals and seminaries and universities in the world today: it has "killed" the two witnesses, the scriptures and the Spirit! Many Christian people have vague and confused ideas about the message of salvation contained in scripture. It is not difficult to see how this war has been waged. Along with many discoveries of modern science, belief in the Bible has waned. The biblical criticism of the last century, acceptance of long ages of historical geology and the theory of evolution among Christians are examples of the battles in this war. Science and modern scholarship have been used to blind people to the truth of the sriptures. Gradually, faith and scripture have been cast aside, even in many churches.
The dead bodies of the two witnesses lie in the street of a great city, called "Sodom" and "Egypt." This "great city" is a symbolic reference to the world. Christ was crucified outside Jerusalem, as required by the law. (Hebrews 13:12) The city of Jerusalem is a symbol of the Church, and the reference to the place of Christ's crucifixion represents the world. Modern society in any city or country is called spiritually Sodom and Egypt. It is the worldly society that Christians are called out of, like the Israelites were freed from Egypt, and Lot was rescued from Sodom.
Many interpreters have identified the "city where our Lord was crucified" as referring to Jerusalem, but this ignores the symbolic significance of Christ's death occurring outside the city. The great city John refers to is later on identified with Babylon, as a type of this world. Rand has also recognized this:
The reference to "Where also our Lord was crucified" has led many students astray as they immediately think of the city of Jerusalem, or the land of Palestine. In doing so they have overlooked the fact that the Great City is none other than the mystical city which John later names Babylon.
The "dead bodies" of the two witnesses is a figure representing Bibles which are readily available in our society, but are not read, believed or understood. This figure may also apply to those Christian institutions readily found in the world today, which are called "dead bodies" in the prophecy because the Holy Spirit of God is not present!
The Bible and its message appears to be useless and unimportant to many people today. There are "three days and a half" in which these corpses are seen in the world, in the "street," or in public. The three days an a half means a part of the present age in which the Church remains in the world, before Christ returns.
People of various nations, languages, and races of the world are acquainted with the Bible, and with Christians. Bibles are a persistent best seller. Most people have a Bible or two in their home. Most people know a few Christians, too. Although discredited, Bibles are kept around, and people who profess belief in Christ are tolerated. They "do not suffer their dead bodies to be put in graves."
The phrase "And they of the people and kindreds and tongues and nations" in verse 9 refers to people of every nation and tribe and language who have been exposed to the Bible and Christianity. This verse shows the Bible would be distributed worldwide, and translated into every language.
Many people today consider themselves "liberated" from the teachings of scripture. The virtuous living it requires is viewed as outdated. The constraints on behaviour that previous generations endured, which seemed to cause so much "torment," are gone. Many have devoted themselves to just having a good time, and making merry, since they are no longer worried about what the Bible says, or God's purpose for their lives. Reports and jokes which depict the Bible as untrue, and the church corrupt or inept, are circulated in the world today with glee. The decline in the influence and authority of Christian teachings and of the Bible is a cause for rejoicing, because "these two prophets tormented them that dwelt on the earth." (Revelation 11:10)
A similar explanation was supported by Rand. He wrote:
Since modernism has overcome the Witnesses and brought their message into disrepute, the ridicule and contempt for the things for which they stood and to which they testified have been evidenced on every hand. This statement is borne out in that the warnings of the past from the mouth of the Witnesses are no more heeded, and there is great rejoicing because of the passing of old beliefs. The Bible is considered as folklore and fable and no longer needed or heeded as the Word of God, while the Holy Spirit is entirely ignored.
Rand's explanation of the death of the two witnesses seems to be in harmony with the prophecy, and with the history of the Bible and God's Spirit in this present century. Rand anticipated the "death" and the subsequent "resurrection" of the two witnesses in the twentieth century. The "three days and a half" is a symbolic period of indefinite duration. It would indicate a period which is a fraction of the symbolic 1,260 days also mentioned in the prophecy. Rand wrote:
What is to happen that will revive the power of the Witnesses, enabling them to testify with an authority that will again bring men under conviction? It is certain that whatever produces this will have effectively destroyed the doctrinal teachings that the Bible is folklore and fable. It will completely answer the higher critic and destroy the arguments of all the modernists.
According to the prophecy of the revival of the two witnesses, a dramatic "great rain" may be ahead for the Church. In the story of Elijah on Mount Carmel, found in 1 Kings 18, rain is sent from above, in abundance. The "rain", since it comes from above, represents the Holy Spirit of God. Similarly, a resurrection of the corpses of the two witnesses probably depicts the Spirit of God restoring faith and courage to believers, and scripture being understood and believed. This prophecy of the two witnesses, and other prophecies, will be understood and taken to heart. Fulfilled prophecy will show scripture to be the word of God.
In the time of Elijah there was no rain, and famine in Israel for three years and six months. (James 5:16-17) This time period is also a figure of the entire age in which the Church is in the world. Elijah predicted it would not rain, until he gave the word. His purpose was to turn the hearts of the people back to the true God. This period of three and a half years of famine corresponds to the symbolic 42 months, and the 1260 days mentioned in the prophecy of the two witnesses. It represents the period that the Church exists in the world.
After the three and a half years of drought, Elijah's prayer brought rain in abundance. This appears to be a type of what is to happen in the future. The Spirit is to be revived in the Church and the scripture will come alive. This means it will be understood. The scriptures and the Spirit will "stand on their feet," which will cause great fear to those who become aware of it. This will fulfil the role of Elijah which was foretold in Malachi 4:5-6: "Behold, I will send you Elijah the prophet before the coming of the great and dreadful day of the Lord: And he shall turn the heart of the fathers to the children, and the heart of the children to the fathers, lest I come and smite the earth with a curse."
The proper interpretation of key prophecies will allow an understanding of scripture as never before. Christians who have long thought this prophecy of the two witnesses referred to two men, who are to appear in the future, and who will preach in Jerusalem for three and a half years, causing terror or "torment" to men around them, will be enlightened. They will realize this scripture is figurative. The language of symbol can be understood, since the scriptures explain these symbols. Christ gave us lessons on the symbolic language of the Bible in the parables.
We should not expect another return of Moses or Elijah in person until the resurrection of the saints. But they will return figuratively. Christ said, "Elias truly shall first come, and restore all things. But I say unto you, That Elias is come already, and they knew him not, but have done unto him whatsoever they listed. Likewise shall also the Son of man suffer of them." (Matthew 17:11-12) The disciples understood he meant John the Baptist, who prepared the way for Christ at his first coming.
Moses and Elijah also returned in vision. This vision of the transfiguration of Christ before three of the disciples, and the reason Moses and Elijah appeared was significant. Perhaps this was because they were to symbolize the scriptures and God's Spirit in John's prophecy.
But what of the Elias who was to prepare the way for Christ's return at the end of the age? This must refer to the work of the Spirit of God, and the scriptures. They would do what Moses and Elijah were predicted to do; "turn the heart of the fathers to the children, and the heart of the children to the fathers," and prepare the way for the Christ's coming. This would occur when the scriptures were understood, and the meaning of the symbols in scripture was realized.
The prophecy found in the second chapter of Joel also depicts the Holy Spirit being "poured out upon all flesh." The Apostle Peter connected this prophecy with the "last days," before the return of Christ, when he quoted from this passage when the Holy Spirit was first given to the Church (Acts 2:15-21). Joel wrote: "And it shall come to pass afterward, that I will pour out my spirit upon all flesh; and your sons and your daughters shall prophesy, your old men shall dream dreams, your young men shall see visions: And also upon the servants and upon the handmaids in those days will I pour out my spirit."
Elijah was carried up into heaven by a whirlwind, 2 Kings 2:11. He dropped his mantle, which was picked up by his successor Elisha. The two witnesses, also, are described ascending to heaven.
The spirit of life from God enters the corpses of the two witnesses, reviving them, and they stand on their feet. Can the Bible and the Spirit become alive? Indeed, words can be alive, according to Jesus, in John 6:63:
It is the spirit that quickeneth; the flesh profiteth nothing: the words that I speak unto you, they are spirit, and they are life.
What makes the words of the Bible come alive? They are "alive" when they are understood, and believed, and acted upon. The words of God live in the minds of believers, while the same words are "dead" to those who do not believe.
The new covenant which God makes with His people is that His laws will be "written in their hearts," Jeremiah 31:31-33, and Hebrews 8:10:
For this is the covenant that I will make with the house of Israel after those days, saith the Lord; I will put my laws into their mind, and write them in their hearts: and I will be to them a God, and they shall be to me a people:
The saints are those who are in Christ, having been anointed with Christ's Spirit which provides understanding of the scriptures.
What is the great voice, that calls the two witnesses up to heaven? Some have thought it must refer to the time of the resurrection of the saints, and the return of Christ, described by the apostle Paul. But the voice could also be a voice from the church, as thit could also be . This event will be visible to those remaining in the earth, Matthew 24:30-31:
And then shall appear the sign of the Son of man in heaven: and then shall all the tribes of the earth mourn, and they shall see the Son of man coming in the clouds of heaven with power and great glory. And he shall send his angels with a great sound of a trumpet, and they shall gather together his elect from the four winds, from one end of heaven to the other.
The ascent of the two witnesses is also observed by their enemies.
Of course it does not mean literal, printed Bibles will ascend to the clouds, but it is those who believe the word of God, and have it written in their hearts, who will be in the first resurrection, which occurs when Jesus returns. 1 Thess 4:17:
Then we which are alive and remain shall be caught up together with them in the clouds, to meet the Lord in the air: and so shall we ever be with the Lord.
At that time the word of Isaiah about the word of God not returning unto him void will be fulfilled. The word of God, like the seed that is sown in the ground, will bring forth its harvest. The scriptures were given for a specific purpose by God, and they will accomplish this purpose., Isaiah 55:10-11:
For as the rain cometh down, and the snow from heaven, and returneth not thither, but watereth the earth, and maketh it bring forth and bud, that it may give seed to the sower, and bread to the eater: So shall my word be that goeth forth out of my mouth: it shall not return unto me void, but it shall accomplish that which I please, and it shall prosper in the thing whereto I sent it.
The two witnesses are pictured returning to God, in much the same way Christ ascended to heaven, (Acts 1:9), when they have fulfilled their role in God's plan of redemption, and accomplished all that God had intended. They will have produced a "harvest", like the seed which fell in good ground, in the parable of the sower. The saints will be that harvest. The resurrection of the saints will vindicate the scriptures.
Revelation 11:13 says:
And the same hour there was a great earthquake, and the tenth part of the city fell, and in the earthquake were slain of men seven thousand: and the remnant were affrighted, and gave glory to the God of heaven.
Jesus said, "Heaven and earth shall pass away, but my words shall not pass away." (Matthew 24:35)
The Bible and its promises are to remain in force. Psalm 119:89 says, "For ever, O LORD, thy word is settled in heaven."
1. Rand, Howard B. 1962. Study in Revelation. (4th edition) Destiny Publishers, Haverhill, Mass.
Copyright © 2001 by Douglas E. Cox
All Rights Reserved. | <urn:uuid:ce2eb67b-3926-406a-be5c-ebdd9fa3f0ed> | CC-MAIN-2013-20 | http://www.sentex.net/~tcc/rev11.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382450/warc/CC-MAIN-20130516092622-00070-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.970938 | 9,157 | 3.0625 | 3 |
A new research conducted at University of Waterloo has examined that young people are just as likely to try electronic cigarettes as smoking.
The study reveal that approximately 20% of youth between the ages of 15 and 19 experiments with vaping, the same number who try cigarettes.
David Hammond, lead author on the report and a professor in the School of Public Health and Health Systems at Waterloo, said that e-cigarettes have become increasingly popular among Canadians and one in five youth will try vaping before graduating high school.
Professor Hammond, who testified to the House of Commons Standing Committee on Health in November, said that there is no question that e-cigarettes are a harmful consumer product because of the entire chemicals users inhale. However, because they don't produce smoke, they are significantly less harmful than smoking.
Currently, several provinces are developing policies for the sale and marketing of e-cigarettes both with and without nicotine.
In total, more than 2.5 million Canadians have tried e-cigarettes, with smokers and young people making up the largest demographic of ongoing users.
The report is published today in Tobacco Use in Canada: Patterns and Trends | <urn:uuid:761320da-bcf7-466f-8c2e-1de54077bca5> | CC-MAIN-2017-34 | http://www.medindia.net/news/e-cigarettes-have-become-increasingly-popular-among-canadian-teens-in-high-schools-148845-1.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102967.65/warc/CC-MAIN-20170817053725-20170817073725-00122.warc.gz | en | 0.966093 | 228 | 2.96875 | 3 |
Videos are available in MyMathLab (www.pearsonmylabandmastering.com) for each section of material that we cover. You may access them in the etext or the homework problems.
Additional videos for each section are also listed below:
R.5 Factoring Polynomials
1.2 Applications of Linear Equations
1.5 Applications of Quadratic Equations
1.6 Other Types of Equations (We do not cover the radical equations.)
1.8 Absolute Value Equations (We do not cover the absolute value inequalities.)
3.3 & 3.4 Piecewise Functions and Graphing Functions (The directions for the last example on this video should ask for a reflection across the x-axis, not the y-axis.) | <urn:uuid:9b08991c-77da-4daf-b357-26b0cc467ec6> | CC-MAIN-2016-22 | http://blog.ecu.edu/sites/math1065/videos/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051165777.47/warc/CC-MAIN-20160524005245-00041-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.825481 | 162 | 2.859375 | 3 |
“Live as if you were to die tomorrow. Learn as if you were to live forever.” Mahatma Gandhi
Don’t underestimate your baby’s ability to read – and mirror – your negative emotions.
When you’re distracted, upset, or depressed, you might think your baby doesn’t notice. But research suggests otherwise.
Studies show that babies – even newborns -- get distressed when their caregivers become emotionally unresponsive (Yoo and Reeb-Sutherland 2013). By 6 months, many babies can distinguish between happy and angry body language (Zeiber et al 2013), and they seem to be very sensitive to “background" hostility:
Babies exposed to the sights or sounds of angry, bickering adults are more likely to develop abnormal stress response systems (Towe-Goodman et al 2012; Graham et al 2013).
Moreover, a compelling experiment hints that babies can tell when we feel stressed, even when it’s about something that doesn’t concern them. Researchers temporarily separated mothers from their infants and then asked the mothers to perform a public speaking task. Some mothers completed a version of the task that was particularly stressful; others were assigned an easier job.
When the mothers were reunited with the babies, the researchers measured everyone’s stress responses. The results? Infants in the high-stress condition mirrored their mothers’ stress reactivity, paralleling changes in heart rate and showing more anxiety towards other people (Waters et al 2014). The takeaway lesson may be this: Managing your own stress – by seeking social support or other remedies – could make an important difference to your baby’s behavior and well-being.- See more at: http://www.parentingscience.com/stress-in-babies.html#sthash.N2Ihs82Y.dpuf
© 2015 Gwen Dewar, Ph.D., all rights reserved | <urn:uuid:971b13e3-1244-49b6-a2a3-f29c33cfeca6> | CC-MAIN-2017-22 | http://tgouard.blogspot.com/2016_02_22_archive.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608669.50/warc/CC-MAIN-20170526163521-20170526183521-00130.warc.gz | en | 0.935013 | 400 | 3.03125 | 3 |
As an illustrator, you’ll know that you have your own process that you use to create your designs. You’ll be familiar with a range of tools and techniques that you’ve developed over time. You’ll have developed your own style and learned to bring your own interpretation to your work.
This article isn’t here to show you how to be a perfect illustrator. Instead, it’s here to highlight a bunch of tips and techniques you could incorporate into your work. All illustrators have good days and bad days. A true master is defined by the ability to create consistent results. Below are some tips which we hope will help you to develop a consistent practice as an illustrator.
Creating a palette
Before you start working on an illustration, you’ll probably plan your colors. You’ll have your dominant color selection, your secondary colors and a couple of accent colors to add interest to your designs.
You’ll also use a range of different stokes in order to produce your design. Some of these strokes will give you broad impact and others will be used to create texture or shading.
Mark off the different colors and strokes you will be using in order to create a consistent palette. You could also add the different brush strokes and capping that you will use when you begin to work. This will help you to work more efficiently and assist you with developing consistency throughout your illustrations.
Shading gives your illustration depth and detail, allowing it to emerge from the screen with substance. This is never easy when you’re presented with a palette of flat colors. By selecting a consistent range of colors to use for both shading and highlighting, you’ll have everything you need at hand when adding detail to your illustrations.
Your shading color should be an opacity of the stroke you’ve selected, and represent the darkest version of that color. This will help you to add depth.
Monitoring your stroke widths
When you plan you’re illustration, your brush strokes will play a crucial role in achieving the results you want. Your stroke widths will create the overall feel of your illustration. By planning the level of detail you’d like, you’ll be able to assess the different strokes and sizes that you want.
Creating a palette for your brush strokes will help you to keep them consistent as your illustration starts to emerge. This will help your illustration to develop consistency. When you can control your strokes, you’ll be free to work on the details or shadings within your illustration. Turning off scale strokes will enable you to keep your strokes consistent throughout.
Make use of Pathfinder
If you’re not interested in using your pen tool to draw and map out your illustration, you could always use Pathfinder. Pathfinder will assist you with merging and forming shapes until you get the design you want. You can then cut out your design and use it in its newly emerged form.
Pathfinder is an extremely powerful tool if you don’t enjoy drawing. It allows you to create the shape you need without having to design it from scratch.
By learning how Pathfinder works, you’ll be able to manipulate shapes which take you in the design direction you most want. If drawing does not appeal to you, then Pathfinder could be the most powerful tool you own.
Learn the shortcuts
By learning the shortcuts you’ll be able to work more efficiently. Many people don’t set out to learn the shortcuts in Illustrator. Instead, they learn them along the way until they seem to be an intuitive way of working.
Although there are many different shortcuts and the instructions can feel intimidating at first, they will eventually become second nature. As every illustrator works differently, it might be helpful to use the shortcuts for your most frequent tasks.
By getting to know your way around Illustrator and how you can use it most effectively you’ll be able to concentrate more on your designs and less on the software. The computer program which provides a barrier between you and your work will all but disappear. You’ll be able to enjoy all the efficiency a digital design program brings.
Select your style
You might already have an idea of the atmosphere you’d like to create or the colors you’d like to use. However, you could begin by creating a mood board of inspiring designs before you begin. Find images which inspire you and put them together to form a collection. You can then examine these choices and see how they have constructed their designs. You could also draw on aspects of their designs and incorporate this into your overall plan.
If you have an idea of what you’d like to do, it is time to create a plan. Have a look at the meanings you’d like to recreate and the brand you want to represent through visual imagery. Once you have your basic concept you can experiment until it starts to take the shape you would like best.
Follow the brief
Although you might be able to provide an illustration which goes beyond your client’s imagination, you will still need to follow your brief. Working together in collaboration will ensure that your clients get what they need while you still have the opportunity to use artistic interpretation.
If you have a very tight brief, you’ll know from the outset exactly what your client requires from you. This can provide you with a roadmap which will result in an effective result.
Take into account the various elements your client is looking for and work out how to fit them into your clients’ needs while still using your creativity to influence the end result.
Use a drawing pad
Using a mouse will place a barrier between you and your designs. This will have a huge impact on your results. By acquiring a drawing pad and pen, you’ll be able to work naturally. Although they might look intimidating, a drawing pad is actually very easy to use. If you practice, you’ll be able to use it in no time at all. It will feel as familiar to you as drawing on a page. There is a wide range of drawing pads and pens which will suit both your needs and your budget.
Focus on your outline
Before you color in your drawing, you’ll need to ensure that the basic structure is as you want it to be. Your drawing or sketch will provide the basic framework of your concept. Until this is correct, it will be impossible to move on. Getting your basic sketch right might take up a lot of time. If you’re working on a tight deadline give yourself enough time to work on your sketch before you plan out your colors and brush strokes.
Use layers to your advantage
If you’re a new designer, you may fear to make a mistake in your design. You might also be familiar with the eraser tool. However, you don’t have to keep erasing any mistakes you make. Digital art is formatted in layers. By using multiple layers you’ll be able to paint over any errors that you make.
As you use layers to improve upon your work, you’ll notice that you become increasingly efficient. You’ll also start to see your confidence grow as you produce the results you want time and time again.
Draw on photo references
As an artist, you’ll focus on detail. However, most people do not have a photographic memory. As a result, a photograph will be your best friend. When you use photographs as a reference point, you’ll be able to access all the details you need in order to produce an incredible image.
Start collecting a range of different reference photographs to store on your computer. This will give you to have a range of different choices when you need inspiration for a design.
You can also use your photo collection to learn about color, light and anatomy. This will help you to learn how the foundations of your designs fit together in real life.
Just keep drawing
If you want to be a great illustrator remember that practice makes perfect. Malcolm Gladwell estimates that it takes almost ten years of constant practice to fully master a skill. The more you draw, the more you’ll be able to expand your knowledge, gaining more complex skills as you go along.
The more you practice your drawing, the more you’ll see your talent develop. Eventually, your drawing will feel like second nature to you. You’ll train your arm and your hands to create the movements you want and you’ll be able to put all of your goals into practice.
You can also familiarize yourself with the ins and outs of digital programs so that you can use them intuitively. Don’t let digital design intimidate you. Once you’ve got the hang of it you’ll open up a whole new world of opportunity.
So there you go! No matter where you are in your illustration career, follow these tips and you’ll soon develop a consistent practice which will bring you the results you want. | <urn:uuid:244c1bbf-ab5a-4e33-8843-0167b0636082> | CC-MAIN-2020-45 | http://designbeep.com/2018/04/30/how-to-design-better-illustrations/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878633.8/warc/CC-MAIN-20201021205955-20201021235955-00013.warc.gz | en | 0.943039 | 1,861 | 3.03125 | 3 |
Christmas is getting closer and closer to us! Every year in December, the streets are full of Christmas atmosphere. Christmas decorations and small lights have been hung on the road, and the shops sell Christmas-related things. Even friends around them always discuss where to go and what to eat at Christmas. Everything about Christmas appears before our eyes and echoes in our ears.
Origin of Christmas
Every year on December 25th, Westerners celebrate the birth of Jesus Christ. The word Christmas is an abbreviation of "Christ's mass". It is derived from Old English and means "to celebrate Christ". There is another story about Jesus' birthday: According to the Bible, Maria was engaged to the carpenter Joseph. However, before they lived together, Joseph discovered that Maria was pregnant. Because Joseph was a decent person, and he didn't want to talk about it to make her lose face, he wanted to quietly break up with her. While he was thinking about it, God's sent messenger appeared in his dream and said to him, "Don't hesitate, marry Maria home. The child she carries is from the Holy Spirit. She will give birth to a boy and name him Jesus because he will save people from sin. "
The exact date of Jesus' birth is not recorded, it is said that this date was designated by the church in the western part of the Roman Empire in the early 4th century. Some scholars believe that the reason for choosing December 25 was that this day happened to be the Winter Solstice of the Roman Empire. This day is the longest night of the year, and the sunshine time will be longer and longer from this day. At the same time, December 25th turned out to be the birth of Mithra, the Persian sun-god (the god of light). The Sun God is also one of the Roman gods, and according to the Old Testament, Jesus has always been regarded as the God of the Sun. Because the Bible records that Jesus was born at night, the night of December 24 is traditionally called "Christmas Eve" or "Christmas Eve." Although Christmas is a Christian holiday from a religious perspective, people around the world now celebrate this grand holiday in their way.
Now let's take Christmas in Britain as an example, let's take a look at the story about Christmas.
The first Christmas event was Christmas Lights. From about mid-November each year, Christmas lights around the UK will be lit one after another. During the lighting ceremony, not only the street lights with unique Christmas designs will be lit, but there will also be song and dance performances, and some places will also have fireworks. In addition to the Christmas decoration on the street, don't miss the window decoration of major department stores, you can see a lot of very delicate and unique scenes! Then with the lighting of Christmas street lights, the most popular Christmas markets will be opened one after another.
During Christmas, visiting the Christmas market is the most essential Christmas custom! Every Christmas, various Christmas Markets are set up across the UK. When you visit the Christmas market, you will find that many are called "German Christmas Market", which is the most suitable place to buy Christmas baubles and souvenirs. The reason why it is called "German Christmas Market" is that the form of the Christmas market popular in Britain now originates from Germany, so the name has continued.
Winter Ice Rink
In addition to the Christmas Market, another popular event during Christmas every year is another popular winter ice rink (Ice Rink)! Because they will only be open when the weather is near Christmas, it has become one of the activities that everyone must experience at Christmas.
Before Christmas, there is also a tradition to buy Advent Calendar for children. This calendar is very delicate and special. Generally, 24 or 25 small doors will be designed on it (they can be opened in sequence from December 1st). There will be surprises behind the small doors, either hiding pictures, chocolates and so on. But now, the types of Christmas calendars are very diverse. Beginning in October each year, major beauty brands and websites will release the annual "Advent Calendar", such as Harrods, Liberty and other established British skincare Christmas calendars are very popular. Besides, major supermarkets in the UK also display Christmas calendars with chocolates or toys hidden. In some cities, there are even buildings that have date numbers affixed to the windows of the buildings and transformed into physical calendars.
During Christmas, some Christian elementary school children will perform a musical about the birth of Jesus called "Nativity". This is a tradition of celebrating Christmas, so Nativity is also one of the must-see repertoires every Christmas. But in addition to the classic Nativity, there are also many unmissable Christmas repertoires during the Christmas season. Taking a family to watch a warm Christmas show at Christmas can be said to be a traditional event for many British families!
On Christmas Day, the British family will get together for a big meal. The main meal is roasted turkey, served with different side dishes, and drank Christmas special drinks like Eggnog, Mulled Wine. After eating, you will have some desserts. The more traditional and famous ones are Mince Pie, Christmas Pudding and Christmas Cake.
Traditionally, the Christmas tree must use real trees. One of my British friends said: "The Christmas tree must use real trees, do not feel the real tree!" For this reason, once you enter December every year, you can see them everywhere. To the words "Christmas Tree for Sale". Except for plastic trees sold in supermarkets, pine trees are commonly used for Christmas trees. The family will sit together in a circle to decorate the Christmas tree, so Christmas is a good day to promote family harmony!
For children, Christmas is a day full of joy. In addition to having delicious food, the main thing is to have gifts! Gifts are usually piled under the Christmas tree and opened early in the morning on Christmas Day. After Christmas, everyone will play some games, the most common one is called "Christmas Cracker", also known as "Bon-Bons". Two people should hold the two ends together and pull them apart. After the break, there will be a "Bang" sound and there will be a small gift or a joke falling out.
Besides, if someone is standing under Mistletoe (a traditional Christmas decoration) and having a kiss while they are playing games or chatting, it is a romantic Christmas practice. "If you meet under mistletoe, the boy will kiss the girl, and the girl must not refuse (at least heralds friendship and good luck). If a couple kisses under the mistletoe, it means that the relationship will go to marriage and always be happy."
Christmas Movies & Songs
In addition to eating and playing, Christmas music and watching classic movies related to Christmas are also an indispensable part of Christmas day. Famous Christmas songs are "Silent Night", "We Wish you a Merry Christmas" and "Jingle Bells". The classic Christmas movies you must not miss are "Love Actually", "The Polar Express", "A Christmas Carol", "Home Alone", "The Snowman" and "The Nightmare Before Christmas". The stage play "Nativity" of various performances mentioned above was also made into a movie of the same name, starring "Watson" Martin Freeman, super funny and especially recommended!
Christmas carols can never be missed in British traditional Christmas. Christmas carols are Christians singing hymns to God, accompanied by beautiful music, sung by the church choir, and played by the organ. Although singing in a church full of seriousness and sacredness, it feels solemn, but most of the Christmas carols are based on cheerful rhythms to set off the joyous atmosphere of Jesus' coming. So when you listen to Christmas carols, you don't have to worry about being serious enough to make you feel depressed. Instead, you feel a positive, positive and happy spirit.
Queen ’s Speech
Britain's unique Christmas “tradition” is probably the Queen ’s Speech that has attracted worldwide attention. Every year, the Queen will broadcast live Christmas greetings to all her Commonwealth people on BBC One at around 15:00 on December 25th. Every year, the British turn on the television on time and the family listen to the Queen's blessing together.
In addition to visiting the Christmas market, one other thing you can't miss is watching Christmas advertisements in various shopping malls. Every Christmas, major supermarket department stores in the UK will launch Christmas ads that warm the heart and stomach. Like the old British department store John Lewis, the annual Christmas ad follows the warm heart route; and Waitrose, Marks & Spencer, Boots and other British brands will launch Christmas ads that are touching or funny during Christmas.
How can Christmas be without Santa Claus? Santa Claus is a virtual fairy tale character. He is slightly fat, with curly white hair and a beard, wearing a red dress. On Christmas day, a sleigh pulled by a group of Reindeer descends from the sky and climbs from the chimney to the children's home to give Christmas gifts. So the elk is also an animal image often seen during Christmas. Most children in the West believe in Santa ’s existence. If you tell a child that “Santa is fake,” it may ruin his entire childhood! So in front of children, you must maintain a good image for Santa Claus.
Don't miss Boxing Day if you do not receive a satisfying gift during Christmas. Boxing Day is a statutory holiday in the United Kingdom and it is a holiday for all. Boxing Day on December 26 is also a unique "discount day" in the UK. On this day, all stores will be discounted, and it is also the day when the discount is the strongest! Many stores open at 5 or 6 in the morning, and shoppers rush into the door to "grab" something.
Finally, let's talk about a Christmas tradition unique to Britain! Every year, a large Christmas tree is erected in Trafalgar Square in the first week of December. It is not an ordinary Christmas tree. It was a gift from Norway to Britain. In commemoration of the siege of Norway by the Germans during World War II, the British people extended their assistance. To express thanks, the city of Oslo (the capital of Norway) sent a 25-meter-high London Christmas tree filled with thanks and blessings from the Norwegian people in 1947. | <urn:uuid:66b4cdba-1d58-4436-bdb7-02e873bc9f85> | CC-MAIN-2021-25 | https://shinymod.com/blogs/news/how-much-do-you-know-about-christmas | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488519735.70/warc/CC-MAIN-20210622190124-20210622220124-00322.warc.gz | en | 0.957049 | 2,149 | 2.625 | 3 |
Paleontology is the study of past life, mostly through fossils, which are the preserved remains of ancient life forms.
This category includes resources related to the science of paleontology, as well as for collectors of fossils.
Article by Petr Kacha and Vaclav Petr discussing this subject in depth.
A web portal offering information primarily of use to professional paleontologists, including links to news, articles, job openings and field class opportunities.
Provides articles summarising research findings in archaeology, anthropology and paleontology, written for a general audience.
Information on research being undertaken by Timothy H. Heaton of the University of South Dakota.
Provides a large number of cladograms (phylogenetic trees) and taxonomic listings.
Provides information about the diversity of organisms on Earth and their phylogeny, and the geological timescale in which each group lived.
Explore Earth through a unique mix of natural history displays, interactive science features, and art exhibitions. Located in Ithaca, New York.
Summary of a 1997 meeting which outlined the current state of paleontology, and the areas which the science will encompass in the future.
Information about fossils, book reviews, photographic images, and Paleolist, a free email-based discussion list.
Interactive tour through the collections of the Paleontological Museum at the University of Oslo, Norway. Includes areas for plants, mammals, man, dinosaurs, fish, invertebrates, and background information.
Shows photos of fossils of different types. Browse by location, time period or type.
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us | <urn:uuid:b4c53844-0522-49e6-a261-7def88a0c39a> | CC-MAIN-2021-04 | http://odp.org/Science/Earth_Sciences/Paleontology | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703518240.40/warc/CC-MAIN-20210119103923-20210119133923-00618.warc.gz | en | 0.831146 | 352 | 2.828125 | 3 |
IPsec L2TP VPN server
Many operating systems support an L2TP/IPsec VPN out-of-the-box. By combining the confidentiality- and authentication services of IPsec (Internet Protocol security), the network tunneling of the Layer 2 Tunnel Protocol (L2TP) and the user authentication through pppd, administrators can define VPN networks across multiple, heterogeneous systems. This allows setting up a VPN across Android, Windows, Linux, MacOS and other operating systems without any commercial software requirements.
IPsec/L2TP is a commonly used VPN protocol used in Windows and other operating systems. All version of Windows since Windows 2000 have support built-in, not requiring an external client (like OpenVPN does) making it very convenient. However, it is significantly harder to set up on the server side on Linux, as there's at least 3 layers involved: IPsec, L2TP, and PPP.
- The IPsec setup provides the confidentiality of the network communication and the client (system) authentication
- With L2TP a tunnel is set up so that the VPN traffic goes over IPsec in a transparent manner
- The PPP (Point-to-Point Protocol) setup manages the authentication of the users
This guide will not cover setting up DHCP, RADIUS, Samba or a Public Key Infrastructure (PKI). It also does not really cover how to configure Linux clients, although the step to do so can be derived from the guide pretty easily. It does cover some Windows client configuration for the purpose of troubleshooting the server setup.
Assumptions and example settings
For the purpose of this guide, the following assumptions (or sample settings) are used:
- Domain is example.com
- Server name is vpn.example.com
- CA file is called ca.crt
- Server cert is vpn.example.com.crt
- Server key is vpn.example.com.key
- Client cert is client.example.com.crt
- Client key is client.example.com.key
The first layer - and most difficult one - to set up is IPsec. Note IPsec is peer-to-peer, so in IPsec terminology, the client is called the initiator and the server is called the responder.
Windows uses IKEv1 for the process. There are 2 implementations of IPsec in Portage: LibreSwan and strongswan.
In the next sections, the different configurations are explained. For each option, we document
- how to use PSK for authentication, and
- how to use certificates for authentication
Make sure to pick one (either PSK or certificates). When using certificate based authentication, we assume that the necessary certificates are already available.
Option 1: LibreSwan
LibreSwan is a fork of Openswan (which itself a fork of FreeS/WAN). It is actually forked by the remaining original developers of Openswan, however after the original developers left Xelerance, a dispute about the "Openswan" name escalated to a lawsuit, after which the name LibreSwan was taken.
It is desirable to have each VPN configuration on it own file, which can be done by uncommenting the last line in /etc/ipsec.conf:
# Configuration (.conf) files can also be placed in the "/etc/ipsec.d/" directory # by uncommenting this line #include /etc/ipsec.d/*.conf
NAT traversal is enabled by default in the LibreSwan config file, so no special configuration steps are needed.
PSK setup for LibreSwan
A shared key must be created. It may either be specified by a quoted string or by a hex number. Based on the next example,
PUT_VPN_SERVER_IP should be replaced by the server's IP address. The domain name can be used, but it is not recommended by the LibreSwan developers. The
%any setting allows any client to use this PSK.
PUT_VPN_SERVER_IP %any : PSK 0x87839cfdab5f74bc211de156d2902d128bec3243 # Or to use a plain text key instead of hex: # PUT_VPN_SERVER_IP %any : PSK "password_pass"
Then create /etc/ipsec.d/vpn.example.com.conf:
conn vpnserver type=transport authby=secret pfs=no rekey=no keyingtries=1 left=%defaultroute leftprotoport=udp/l2tp [email protected] right=%any rightprotoport=udp/%any auto=add
Certificate based setup for LibreSwan
LibreSwan requires Network Security Services (NSS) to be properly configured and used for the certificate management. To make things easy, a PKCS#12 bundle should be created containing the server's secret key, the server's certificate and the CA certificate.
openssl pkcs12 -export -certfile ca.crt -inkey vpn.example.com.key -in vpn.example.com.crt -out /etc/ipsec.d/vpn.example.com.p12
The bundle can then be imported into the NSS database:
pk12util -i somewhere/vpn.example.com.p12 -d .
The LibreSwan configuration files will refer to the nickname for the imported objects. Use certutil -L -d . and certutil -K -d . to see what they are.
: RSA "vpn.example.com"
vpn.example.com is used for the nickname obtained through the certutil -K -d . command.
conn vpnserver type=transport authby=rsasig pfs=no rekey=no keyingtries=1 left=%defaultroute leftprotoport=udp/l2tp leftcert=vpn.example.com [email protected] right=%any rightprotoport=udp/%any rightrsasigkey=%cert auto=add
vpn.example.com was the nickname obtained via the certutil -L -d . command.
Option 2: strongSwan
strongSwan is a fork of FreeS/WAN (although much code has been replaced).
As of strongSwan 5.0, NAT traversal is automatic, no configuration is needed.
strongSwan does not create an ipsec.secrets file, thus one must be created:
touch /etc/ipsec.secrets && chmod 664 /etc/ipsec.secrets
PSK setup for strongSwan
A shared key must be created. It may either be specified by a quoted string or by a hex number. In the next example,
PUT_VPN_SERVER_IP should be replaced by the server's IP address. The
%any means that any client selector can authenticate using the given PSK.
PUT_VPN_SERVER_IP %any : PSK 0x87839cfdab5f74bc211de156d2902d128bec3243 # Or to use a plain text PSK instead of hex code: # PUT_VPN_SERVER_IP %any : PSK "password_pass"
Next edit /etc/ipsec.conf as follows:
conn vpnserver type=transport authby=secret pfs=no rekey=no keyingtries=1 left=%any leftprotoport=udp/l2tp [email protected] right=%any rightprotoport=udp/%any auto=add
When both left and right are set to
%any, then strongSwan assumes the local machine is left.
Certificate based setup for strongSwan
The certificates and keys must be copied to the appropriate directories:
cp ca.crt /etc/ipsec.d/cacerts
cp vpn.example.com.crt /etc/ipsec.d/certs
cp vpn.example.com.key /etc/ipsec.d/private
chown -R ipsec: /etc/ipsec.d
Next, tell strongSwan to use public keys for the authentication:
: RSA vpn.example.com.key
Finally update the /etc/ipsec.conf file as follows:
conn vpnserver type=transport authby=rsasig pfs=no rekey=no keyingtries=1 left=%defaultroute leftprotoport=udp/l2tp leftcert=server.crt [email protected] right=%any rightprotoport=udp/%any rightrsasigkey=%cert auto=add
As before, when both left and right are
%any, strongSwan assumes the local machine is left.
IPsec pass-through / broken NAT
In previous strongSwan versions, IPsec pass-through does not seem to work. It returns "cannot respond to IPsec SA request because no connection is known" or (which heavy editing of the config file) an INVALID_HASH_INFORMATION error. This may not be true anymore with strongSwan 5.0 or higher.
Troubleshooting generic IPsec
IPsec is not the easiest to deal with. This section gives some pointers to common problems and errors.
Server behind NAT
When the server is behind NAT (Network Address Translation), which is usually the case when the server is hosted after a home router, some specific attention pointers can help in ensuring the IPsec connection is stable and working.
2 port need to be open:
- UDP port 500 (for ISAKMP)
- UDP port 4500 (for NAT Traversal)
Make sure to forward those to the VPN server.
Also the following Internet Protocols (not ports) need to be allowed as well:
- 50 (ESP)
- 51 (AH)
This might need to be configured on the router side if the router has protocol specific settings (most don't though).
IPsec passthough / broken NAT
Many routers have an "IPsec pass-through" option, which can mean 1 of 2 things:
- Mangle IPsec packets in broken way not compatible with IPsec NAT Traversal
- Allow all IPsec packets through the router unmodified
If it means (1), disable IPsec pass-through. If it means (2), then enable IPsec pass-through.
Unfortunately, there are routers that will discard all IPsec traffic, even if the ports are forwarded, and only support method (1). For those with such a router, there are 3 options:
- Upgrade the firmware, if a newer version is available that behaves properly
- Open a bug/defect report with the make of the router, if it is not EOL/Legacy
- Get a different router. Linksys and D-link routers are reported behave properly.
This tutorial was initially being written with such a router (a Zyxel P-330W) - and (3) was the only option available.
Windows Vista/Server 2008 clients
These operating systems do not automatically support IPsec/L2TP servers behind NAT. See KB926179 for the registry edit to make them support it.
There is no provision within the IPsec protocol to negotiate PSKs. The only information available to choose which key to use is based on the source and destination IP addresses. Since, in the usual scenario, the responder won't know the initiator's IP in advance, everyone must use the same pre-shared key. Therefore, certificates (PKI) are highly recommended over pre-shared keys (PSK), even for only a single connection. However generating certificates and creating a PKI is a rather complex process and out of scope of this document.
The second layer, Layer 2 Tunneling Protocol (L2TP), is much easier to setup. Like IPsec, L2TP is a peer-to-peer protocol. The client side is called the L2TP Access Concentrator or LAC and the server side is called the L2TP Network Server or LNS.
L2TP is totally insecure, and should not be accessible outside the IPsec connection
When using iptables, use the following rules to block all L2TP connection outside the ipsec layer:
iptables -t filter -A INPUT -p udp -m policy --dir in --pol ipsec -m udp --dport l2tp -j ACCEPT
iptables -t filter -A INPUT -p udp -m udp --dport l2tp -j REJECT --reject-with icmp-port-unreachable
iptables -t filter -A OUTPUT -p udp -m policy --dir out --pol ipsec -m udp --sport l2tp -j ACCEPT
iptables -t filter -A OUTPUT -p udp -m udp --sport l2tp -j REJECT --reject-with icmp-port-unreachable
If the local firewall is ufw then get ufw to accept incoming and outgoing connections on ports 500 (IPSec) and 4500 (NAT-T) using the ESP protocol to allow IPsec authentication and to block all L2TP connections outside the IPsec layer. This can be accomplished by adding these lines to the following file:
# Allow L2TP only over IPsec -A ufw-before-input -p udp -m policy --dir in --pol ipsec --dport l2tp -j ACCEPT -A ufw-before-input -p udp -m udp --dport l2tp -j REJECT --reject-with icmp-port-unreachable -A ufw-before-output -p udp -m policy --dir out --pol ipsec --sport l2tp -j ACCEPT -A ufw-before-output -p udp -m udp --sport l2tp -j REJECT --reject-with icmp-port-unreachable # Allow IPsec authentication using ESP protocol -A ufw-before-input -p udp -m multiport --dport 500,4500 -j ACCEPT -A ufw-before-input -p esp -j ACCEPT -A ufw-before-output -p esp -j ACCEPT
Unlike other L2TP servers, xl2tpd can maintain an IP address pool without a DHCP or RADIUS server. This is a layering violation, but for a small setup it is extremely convenient:
[global] port = 1701 access control = no [lns default] ip range = 172.21.118.2-172.21.118.254 local ip = 172.21.118.1 require authentication = yes name = LinuxVPN pppoptfile = /etc/ppp/options.xl2tpd
To use a RADIUS or DHCP server, leave off the
ip range and
local ip parts. If the connection is unstable, try adding
length bit = yes to the
lns default section. To not use PPP authentication, change
require authentication = yes to
refuse authentication = yes.
Create the options file as well:
The final layer to configure is the Point-to-Point Protocol (PPP) layer. The package to install here is net-dialup/pppd.
emerge --ask net-dialup/pppd
PPP is used to perform authentication. Unlike the certificate based or PSK authentication, the PPP layer is more for authenticating (and authorizing) the end users' access to the VPN.
Not recommended unless you are testing. Typically used in "site-to-site" configuration, pure IPSec is a better choice.
Authentication via chap.secrets
For small users (typically, those wanting to connect their home network from elsewhere), authentication can be done through the chap.secrets file:
# Secrets for authentication using CHAP # client server secret IP addresses avatar * unontanium *
When authenticating with domains, the client name will need to be mangled appropriately, in this case,
/etc/ppp/chap-secrets contains unencrypted passwords, so make sure only root can read or write it
Authentication via Samba
When the machine is part of (or hosting) an MS Domain or AD forest, and the clients are using winbind, then Samba can do the authentication. Add
plugin winbind.so to the ppp options. Setting up Samba and pppd to do this is beyond the scope of this document.
Authentication via RADIUS
When a RADIUS server is running on the same machine, pppd can use RADIUS. Ensure the
radius USE flag is set on net-dialup/ppp. Then add
plugin radius.so to the PPP options. Setting up RADIUS and pppd to do this is beyond the scope of this document.
Authentication via EAP-TLS
If individual users have certificates (which is not the same as the machine certificate above), then setup pppd to authenticate via EAP-TLS. It is recommended that the users authenticate via smartcards or RSA secureID. Ensure the
eap-tls USE flag is set on net-dialup/ppp. RADIUS needs to be setup (see above). The
require-eap option might need to be included in the PPP options file as well. Setting up pppd to do this is beyond the scope of this document.
Windows: Correctly installing the certificate (for PKI users)
The certificate should be packaged in a PKCS12 package. This can be done through openssl or gnutls:
openssl pkcs12 -export -certfile ca.crt -inkey client.example.com.key -in client.example.com.crt -out client.example.p12
certtool --load-ca-certificate ca.crt --load-certificate client.example.com.crt --load-privkey client.example.com.key --to-p12 --outfile client.example.com.p12
Once a .p12 file is created, import it into Windows. However, the method is not obvious. Do not double-click the key and follow the instructions, that won't work. That imports the key into a personal certificate store, but in Windows, it is the local computer that needs to do the authentication, so the certificate needs to be added to the local computer's key store. To do that, use the Microsoft Management Console (mmc). Administrator privileges are needed for this to work.
Start -> Run -> mmc File -> Add/Remove Snap-in -> Certificates -> Add Computer Account -> Local Computer -> Finish -> OK.
Expand the Certificates. Choose any folder (doesn't matter which), right-click, choose "All Tasks", then "Import". Only now follow the wizard, but on the last step, make sure to choose "Automatically select the certificate store based on the type of certificate".
Windows: RAS networking errors
Error 766: A certificate could not be found
If this error occurs, then this means the certificate was not imported correctly. Make sure to import it though MMC, and not by double-clicking the file.
XP SP2 and above: Error 809: Server not responding (Server behind NAT)
Windows XP SP2 and Vista not, by default, connect to server behind a NAT. A registry hack is required. Separate fixes are required for Windows XP and Windows Vista.
Vista: Error 835 Could not authenticate
This one occurs only when using PKI. It means the subjectAltName does not match the server that the client is connecting to. This often occurs when using dynamic DNS - the certificate has the internal name rather than the external name. Either add the external name to the certificate, or disable "Verify the Name and Usage attributes of the server's certificate" in the connection definition, under Security -> Networking -> IPsec.
Error 741: The local computer does not support required encryption type
Windows will try to negotiate MPPE, a (weak) encryption. When
- the system is not using PPP authentication, or
- the system does not have a pppd with MPPE support, or
- MPPE is supported but not compiled into the kernel (or a module)
then this error occurs.
If PPP authentication is used, it is recommended to fix the pppd or kernel (which are minimal configuration changes) even though there's no point to have double encryption. If the system does not use PPP authentication, or the double encryption is definitely not wanted, then disable it by unchecking "Require data encryption" on the Security tab.
The connection is still protected by IPsec encryption either way, this just disable the requirement for MPPE.
Mac OS X
Mac OS X clients appear to be picky on the proposals they will negotiate with. In particular:
- dh_group must be
- my_identifier must be an address, not a fully qualified domain name (address is the default, so just leave that line out from racoon.conf).
Mac OS X won't connect if subjectAltName does not match the server the client is connecting to. Unlike Vista this check cannot be disabled.
Also, Mac OS X won't connect if the server certificate contains any "Extended Key Usage" (EKU) fields (except for the deprecated ikeIntermediate one). In particular, when using certificates from the OpenVPN easy-rsa utility, it adds the "TLS WWW Server" or "TLS WWW Client" EKU, so such certificates will not work. However, such certificates can still be used on the Mac OS X client, as it doesn't care what is on the client certificate - only the server.
- a Linux L2TP/IPsec VPN server from Jacco de Leeuw | <urn:uuid:bdbd409b-2ae6-4aea-8526-df8629295823> | CC-MAIN-2022-49 | https://wiki.gentoo.org/wiki/IPsec_L2TP_VPN_server/en | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710690.85/warc/CC-MAIN-20221129064123-20221129094123-00186.warc.gz | en | 0.810013 | 4,891 | 2.84375 | 3 |
The internet is a group of computers, called a network, that links them throughout the United States and also to other countries around the world. It was developed originally as a method of communication between research scientists. During the mid 1990s, it became popular with personal computer users and it was becoming a common form of telecommunication.
Since the introduction of television in the late 1940s, this was the most important change in telecommunications due to the dramatic growth in the number of persons using this network.
The communications technology was unregulated, and this sudden popularity caused various issues for the USA law.
The Net (Internet), was developed in 1969 for the US defense department.
The researchers experimented with different methods to communicate with each other using computers. It was used originally to link only four separate sites at research institutes and universities in the US. Primarily the first users were scientists. At that time, it was known as the ARPANET (Advanced Research Projects Agency Network).
Other countries, in the early 1970s, began to join the network. Within ten years, administrators, researchers and students throughout the world had easy access. The ARPANET was dismantled in 1990 as the National Science Foundation (NSF) became the NSF Network (NSFNET) and is now the technical body for all the United States Internet communications.
As the general population discovered the power of this new medium during the 1990s, the Internet grew at a fast pace. The communications started out in the form of written text in an electronic forum (Usenet news groups.) These were articles and electronic mail (e-mail).
The World Wide Web appeared mid 1990s, and this increased the popularity of the Internet
With its multimedia interface, resembling pages in a magazine, it put pictures, audio, and video together, now known as web pages.
The Internet in now the most common communication method, to search and find data on almost any topic.
The Internet caught the legal system unprepared. There was little legislation from Congress before 1996 regarding this type of telecommunication.
In an effort to make it illegal to read private e-mail, the (ECPA) Electronic Communications Privacy Act was passed by Congress in 1986.
This act was an extension of the protection that existed with conventional mail.
Although the Post office is restricted in reading private letters, the ECPA allows companies to read their staff emails.
Although this act was intended to provide protection against industrial spying, it has caused lawsuits from those who considered this to be an invasion of privacy. However, Employers, with the support of the Federal courts, can secretly monitor all e-mail, therefore, personal e-mail has no privacy.
If You have any concerns with privacy on your computers we suggest you contact Newmarket Computer Repairs on
0800 PC ONSITE | <urn:uuid:9ef262ac-f18a-4a23-a8ba-736946006e2c> | CC-MAIN-2018-47 | http://www.erikasdeli.net/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745761.75/warc/CC-MAIN-20181119105556-20181119131556-00121.warc.gz | en | 0.969791 | 576 | 3.484375 | 3 |
An instant-read thermometer is a must-have tool for checking temperatures and gauging the doneness of all sorts of things. Because you rely on your thermometer for accuracy, it’s a good idea to check its calibration occasionally and adjust it as need be. To check the calibration, bring a small pan of water to a rolling boil and take the water’s temperature; it should be 212ºF or a few degrees less, depending on your altitude and air pressure. (For the boiling point in your location, visit www.virtualweberbullet.com.) If the calibration is off, you can adjust a standard (analog) thermometer by turning the hex nut under the thermometer’s face with pliers. If the nut resists, use a second set of pliers to grip the sides of the face and turn the tools in opposite directions. There are only a few models of digital thermometers that can be adjusted. Some calibrate automatically, and others need manual adjustment; follow the manufacturer’s instructions for your model. | <urn:uuid:74fc8b3a-6efb-4ae6-aa58-13bd800e7a84> | CC-MAIN-2018-05 | http://www.finecooking.com/article/calibrate-your-instant-read-thermometer | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886237.6/warc/CC-MAIN-20180116070444-20180116090444-00274.warc.gz | en | 0.873066 | 218 | 2.53125 | 3 |
“Manage your time like money.”
A Roman philosopher named Lucius Annaeus Seneca wrote that 2,000 years ago.
Recently I stumbled across Seneca’s essay “On the Shortness of Life.” It’s a short read, and a great one.
Seneca talks about how many people reach the end of their lives and bemoan the fact that there is “not enough time” to live fully. Seneca rejects this idea completely. He says:
It is not that we have a short space of time, but that we waste much of it. Life is long enough, and it has been given in sufficiently generous measure to allow the accomplishment of the very greatest things if the whole of it is well invested. But when it is squandered in luxury and carelessness, when it is devoted to no good end, forced at last by the ultimate necessity we perceive that it has passed away before we were aware that it was passing. So it is — the life we receive is not short, but we make it so, nor do we have any lack of it, but are wasteful of it.
He also suggests that we should manage time like money and not spend it foolishly:
Men do not suffer anyone to seize their estates, and they rush to stones and arms if there is even the slightest dispute about the limit of their lands, yet they allow others to trespass upon their life…No one is to be found who is willing to distribute his money, yet among how many does each one of us distribute his life! In guarding their fortune men are often closefisted, yet, when it comes to the matter of wasting time, in the case of the one thing in which it is right to be miserly, they show themselves most reckless.
And he comments of the need to take action right NOW because we never know when time will run out:
“Why do you delay,” says he, “Why are you idle? Unless you seize the day, it flees.” Even though you seize it, it will still flee; therefore you must vie with time’s swiftness in the speed of using it, and, as from a torrent that rushes by and and will not always flow, you must drink quickly.
It’s humbling to realize that human beings were grappling with issues of mortality and living a meaningful life 2,000 years ago. And they didn’t even have iPhones. | <urn:uuid:c7fa9ee8-db59-41e3-b990-bfd8f152b47d> | CC-MAIN-2023-23 | http://www.chrisfharvey.com/2013/02/manage-your-time-like-money/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00201.warc.gz | en | 0.977086 | 526 | 2.828125 | 3 |
|PISCES : PERCIFORMES : Blenniidae||BONY FISH|
Description: The shanny can easily be distinguished from other blennies in Britain and Ireland by its lack of any head tentacles. It has a large, rounded head and older fish also have a fleshy ridge on their foreheads. The dorsal fin has a conspicuous dip in it, separating the front half from the back half. They are usually yellowish-brown to greenish-brown in colour with darker blotches and there is a dark spot between the first and second dorsal fin rays. Adult fish can grow to 16cm long.
Habitat: It is mainly found in rockpools or beneath boulders on the mid and low shore and sublittorally amongst pier pilings, boulders and wrecks down to a depth of approximately 30m. It feeds on barnacles, small crabs and other crustaceans.
Distribution: The shanny is common and widespread all around the coasts of Britain and Ireland.
Similar Species: This species is unlikely to be confused with other blennies since all the others have head tentacles.
Key Identification Features:
Distribution Map from NBN: Grid map (fast) : Interactive map (slower, requires login to view records) : National Biodiversity Network mapping facility, data for UK.
|Picton, B.E. & Morrow, C.C. (2015). Lipophrys pholis (Linnaeus, 1758). [In] Encyclopedia of Marine Life of Britain and Ireland. |
http://www.habitas.org.uk/marinelife/species.asp?item=ZG6320 Accessed on 2016-2-10
|Copyright © National Museums of Northern Ireland, 2002-2015| | <urn:uuid:50f0571d-7bc3-488a-b909-7eb94b9e2c14> | CC-MAIN-2016-07 | http://www.habitas.org.uk/marinelife/species.asp?item=ZG6320 | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158609.98/warc/CC-MAIN-20160205193918-00110-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.885071 | 373 | 2.84375 | 3 |
I have a heart condition. Am I at more risk of getting COVID-19 than somebody who doesn’t have a heart condition?
No – the infection can be caught by anyone. However, people with underlying heart conditions might be more likely to show symptoms of the infection or to have a more severe infection than others.
So far, most people that get COVID-19 have a mild viral illness including sore throat, cough and aches and pains and a fever, but some (up to 5%) people develop a chest infection/pneumonia. We are not yet certain if people with heart conditions are more likely to get a chest infection with COVID-19, but this is likely since this is the case with other viruses like flu.
There is a lot of discussion in my patient support group about which heart patients are at high risk to develop severe COVID-19 symptoms. Is the risk similar for all patients with a heart condition or are there differences?
- Heart failure, including heart transplant (immune compromised), cardiomyopathies
- Valvular heart disease
- Cardiac arrhythmias (specifically atrial fibrillation, but also pacemaker patients, etc.)
- Coronary heart disease (chronic, stable/unstable)
- Congenital heart disease
The basis of contracting the infection is the same for all individuals. The virus is transmitted via droplets from the respiratory tract (nose and lungs) from an infected person. Once the virus enters the system it causes direct damage to the lungs and triggers an inflammatory response which places stress on the cardiovascular system by (i) infecting the lungs and dropping blood oxygen levels and (ii) dropping the blood pressure through its inflammatory effects. In such cases the heart has to beat faster and harder to supply oxygen to major organs.
Individuals who are immunocompromised (have a weak immune system) , such as patients who have had an organ transplant (e.g. kidney, liver, heart), patients with cancer who have received chemotherapy or radiotherapy as well as the elderly and pregnant women with heart disease are theoretically at greatest risk of contracting and succumbing to the effects of the virus. The full list of high-risk clinical conditons is present in the following link. (https://www.gov.uk/government/news/major-new-measures-to-protect-people-at-highest-risk-from-coronavirus). These individuals should receive a letter from NHS England, followed by text and phone call by Sunday 29 March 2020.
Individuals with precarious heart conditions, such as heart failure, dilated cardiomyopathy, advanced forms of arrhythmogenic right ventricular cardiomyopathy and patients with congenital cyanotic heart disease are at highest risk. Patients with the obstructive form of hypertrophic cardiomyopathy and affected patients with reduced function of the left ventricle (main pumping chamber) may also be placed in the same high-risk category.
Based on the inflammatory effects of the virus, there are theoretical risks that the viral infection could cause rupture of atherosclerotic plaques in the coronary arteries (blood vessels of the heart), leading to acute coronary syndromes (minor or major heart attacks). In this respect, individuals who develop severe chest pain during symptoms of COVID-19 infection, should contact the emergency services.
Severe systemic inflammatory conditions may aggravate arrhythmias or even precipitate atrial fibrillation in some individuals.
Patients with Brugada syndrome are particularly vulnerable to fatal arrhythmias in situations where the body temperature exceeds 39oC. Such patients must treat fever aggressively with paracetamol and cool tepid sponging. There have been suggestions that non- steroidal anti-inflammatory drugs may reduce the body’s cytotoxic response to the virus, however this is not proven as yet.
Patient with long QT syndrome who contract the virus and are ill enough to be admitted to hospital for treatment will have to be treated with care because some of the experimental drugs being used to treat the virus such as chloroquine can prolong the QT interval and cause serious electrical disturbances.
There are emerging reports that the virus may directly cause problems with the heart such as acute inflammation, heart failure and arrhythmias. Current reports suggest that approximately 7% of patients admitted to hospital develop cardiac problems. This does NOT mean that many individuals with mild symptoms who do not warrant hospital admission will have the same risk of heart problems.
There is no evidence that the virus infects implanted devices such as ECG loop recorders (REVEAL or LINQ), pacemakers and cardioverter defibrillators or causes infective endocarditis in those with valvular heart disease. Interrogation or these devices (when required) should be performed remotely during the pandemic.
Are cardiac patients who also have diabetes and/or hypertension at greater risk and, if so, why?
Data from China, where the disease emerged, indicate that a significant proportion of non survivors and those who developed severe disease had comorbidities such as diabetes and hypertension. The exact reason for this remains unclear. It is likely that both hypertension and diabetes are prevalent in the general population particularly in the age group (over 70 years) where the mortality from COVID-19 infection is highest.
There have been articles linking this observation to the use of Angiotensin converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (A2RB). The theory is that COVID-19 virus binds to ACE2 on epithelial cells to enter the respiratory system. Most patients with diabetes and a large proportion of patients with hypertension are treated with ACEI and A2RB which increase ACE2 levels. It is important to emphasise that this is a theory and has yet to be substantiated by evidence, and major health organisations such as the European Society of Cardiology, British Cardiac Society and the American Heart Association recommend to continue with these medications but to monitor the progress of patients with hypertension and diabetes who have become infected with COVID-19.
There are reports that COVID-19 may induce myocarditis or pericarditis. If you have had myocarditis/pericarditis previously, are you more vulnerable to contracting it a second time? If so, since myocarditis can be asymptomatic, what should I look out for if I contract COVID-19?
There is no evidence that an individual who has suffered from myocarditis or pericarditis in the past is at higher risk of developing the same complication with COVID-19. It is recognised that some cases of myocarditis have a relapsing and remitting course and it is unclear whether patients who do develop myocarditis as a result of COVID-19 will show the same pattern or develop worse heart failure and scarring of the heart. If you have had myocarditis recently, then there is a risk that contracting COVID-19 infection could result in worse consequences for the heart.
Myocarditis may not cause any symptoms, or, maybe masked by the symptoms of the inflammatory response to the virus such as fever, aches and pains and breathing difficulty. Sharp central chest pain, radiating to the neck, the back or the arms, worsening breathlessness, being unable to lie flat due to breathing difficulty and an erratic pulse would be suggestive of myocarditis.
Are there any additional measures that I should take to limit my risk of getting sick, as I have a heart condition?
There are things that everyone should do to limit their risk. If you have a heart condition, the following are important:
- Limit the time you are outdoors and follow Government regulations.
- Avoid people who are sick.
- Keep a minimum of 2-meter (6.6 feet) distance from each other, except for household members who do not have symptoms or a positive COVID-19 test.
- Wash hands thoroughly with soap and warm water for at least 20 seconds after going outdoors or touching foreign surfaces. The virus can survive on cardboard for up to 1 day and on steel surfaces for up to 3 days.
- Cover your mouth with a tissue when you cough or use the inside of your elbow
- Cover your nose with a tissue you sneeze or use the inside of your elbow
- Avoid touching your eyes, nose, and mouth.
- Clean often touched surfaces like doorknobs, handles, steering wheels, or light switches, with a disinfectant to remove the virus.
- Importantly stay at home as much as possible (see government advice https://www.gov.uk/coronavirus).
Should I consider self-isolating to avoid catching the virus?
Self-isolating means staying indoors as much as possible and avoiding contact with others. The advice on self-isolation is summarised below and can be found online. https://www.nhs.uk/conditions/coronavirus-covid-19/self-isolation-advice/
- If you have symptoms of fever, cough or a chest infection you should self-isolate.
- If you do not have symptoms, avoid contact with anyone who is sick, even if they “just have a mild cold”.
- Stay at home as much as possible, including working from home if this is feasible as recommended by the government.
- In some countries, you may be asked to follow stricter isolation (such as is the case with Italy, France, Spain, Belgium).
- Individuals with established cardiovascular disease should be extra vigilant with self-isolation.
Am I safe outside of the house, provided I avoid crowded areas e.g. can I go to the park or walk outside?
Yes, to some extent. The virus is caught from people who have the infection and so there is no problem in going outside by yourself. What is important is to avoid contact with anyone who might be ill. Events outside that bring together a large number of people have been cancelled around Europe, so you should not be attending any events or meetings with friends where large numbers of people are gathering. Similarly, you should not allow visitors except one or two individuals who are specifically providing domestic assistance for you if you are ill or fragile.
Are people with heart disease more likely to die of COVID-19 than those without?
So far, older age and the presence of underlying conditions – including heart conditions – have been risk factors for death. Nevertheless, it is important to emphasise that most patients, even those with underlying heart disease, have had mild infections and have fully recovered.
Should I wear a mask to protect myself from the virus?
For the general population wearing a mask is only recommended in people who are experiencing symptoms, such as a cough or a fever, or if they are caring for someone with these symptoms.
Wearing a mask in people with a heart condition is not recommended as this may make breathing more difficult. If you have a heart condition and are concerned about catching COVID-19, please note the high-risk conditions above and discuss this with your doctor if you have further queries.
To prevent shortages of face masks it is important to use them only if needed. When wearing a mask, it is important to use and dispose of it correctly. The World Health Organization has useful information about this.
Can I catch COVID-19 from my pet?
There is currently no evidence that humans can catch the disease from common household animals such as cats and dogs.
Can people catch COVID-19 more than once?
The current research suggests that immunity to COVID-19 develops after the first infection, so it is not possible to catch it again. There are examples of viruses, like flu and the common cold, which can be caught more than once because of the way the virus changes over time. We won’t know for a while whether this can happen with COVID-19.
Should I change any of my heart medication doses?
What is clear, is that stopping or changing your medication could be very dangerous and could make your condition worse. These drugs are very effective for heart failure, and to control high blood pressure to help prevent a heart attack or stroke, and so on. Any changes to your treatment that have not been recommended by a healthcare professional could put you at higher risk of a flare-up of your heart condition.
There have been reports in the media suggesting that some commonly used drugs to treat high blood pressure (so-called ACE-Inhibitors and Angiotensin Receptor Blockers) may increase both the risk of infection and the severity of an infection with the Coronavirus. However, this warning does not have a sound scientific basis or evidence to support it. Therefore, it is strongly recommended that you continue to take your blood pressure medication as prescribed.
Patients who are on immune compromising medications, for instance after a heart transplant, should continue to take these medications as prescribed. Reducing the doses is associated with a high risk of suffering a rejection of the transplanted heart.
Please take all your medications exactly as prescribed. If in doubt, please contact your doctor or nurse but do not make any changes before having spoken to them.
The news says that the worst affected by COVID-19 are the older age population and people with pre-existing conditions. Are ‘people with pre-existing conditions’ also older or does this refer to people of any age?
Most people dying from COVID-19, in the reports from China and other countries, have been aged over 80 years and have had advanced heart and lung conditions. They have had a combination of older age and severe pre-existing conditions. The majority of older people and people with pre-existing conditions have had a mild viral illness and have fully recovered.
I know that I should not go to the hospital if I think I am infected, but when should I seek medical attention if I have a pre-existing heart condition?
If you think you have COVID-19 infection, ask yourself if you can manage the symptoms at home. Fever can be managed with paracetamol and drinking lots of fluids.
There are news reports, especially on social media, suggesting that medications such as ibuprofen (so-called non-steroidal anti-inflammatory medicines or short: NSAIDs) to lower fever and treat pain could worsen COVID-19. Based on currently available information, the World Health Organization (WHO) and the European Medicines Agency (EMA) do not recommend against the use of ibuprofen as there is, at the moment, no scientific evidence establishing a link between ibuprofen and worsening of COVID 19.
If you experience worsening shortness of breath, palpitation, fainting or chest pain you should call your emergency services provider who will make an assessment based on your symptoms and general examination before making a decision to transfer you to hospital. .
Should I go ahead with scheduled appointments or should I avoid going to medical centres or hospitals?
Most hospitals and GP surgeries have cancelled routine appointments or conducting them over the phone or via video online chat wherever possible. There are certain conditions such as severe heart failure where face-to-face visits are still required, and you should not miss a visit without first consulting your consultant, doctor, nurse or another healthcare provider.
I had the flu vaccine this year, am I protected from this virus?
The flu vaccination only protects against the flu (influenza virus) and does not protect against COVID-19. There is no vaccine for COVID-19 and it is not likely that one will become available during the current pandemic.
Should I be worried about medication shortages?
Everything is being done to ensure that the supplies of essential medications are maintained. There is no cause for concern. The European Medicines Agency are monitoring the situation and to date have reported no shortage of essential medications.
Can I still travel or use public transport?
Please pay attention to guidelines published by your national and local authorities. In many countries, all non-essential travel has been forbidden and citizens have been asked to stay at home. In many places, it is recommended to avoid using public transport, if possible, or to keep at least a distance of 1.5 m from other passengers.
I feel very anxious. Is there anything I can do to feel better?
This is an anxious time for everyone, and we are providing tips to help you cope with the uncertainties surrounding a pandemic that none of us were prepared for only a few months ago.
- Eat well, regularly and healthily. You need to keep your bodily strength up, but good food also gives you vital vitamins and minerals which help to combat anxiety. Whole grains, fruit and vegetables (all the colours) will work away like magic on your anxiety levels and help to reduce them. I know cakes, biscuits and chocolate are delicious, but the extra sugar hit really isn’t good for anxiety. A little now and then is a good thing, but in fact eating sweet stuff can make you feel psychologically worse. The same goes for alcohol; keep it to a minimum.
- Drink plenty of water, and some tea and coffee if you like tea and coffee. A nice cup of tea or coffee and a sit down quietly is surprisingly helpful for calming and soothing anxious thoughts.
- Exercise. Although we all have to keep a safe distance from each other now, this doesn’t mean that you can’t go out. In fact, going out in the daylight (even if it’s cloudy) will be beneficial for your mental health. If you have a garden, walking round the garden, performing gentle (or not so gentle, depending on your ability) aerobic exercises, skipping with a rope, stepping up and down on a low step to music, all these are examples of exercise you can perform which will help alleviate anxiety. If you haven’t got a garden think of a route you can take from your home where you will not have to be in close proximity to others and go for a walk. Every day. (If you need advice on how much exercise you can do in relation to your heart condition please do email me and I will check with Professor Sharma). Indoors- got an exercise CD sitting in the back of the cupboard? Now’s the time to get it out, put it on and have a go. It will take your mind off your anxiety, raise your heart rate positively, and help you to feel good. Dance- put some upbeat music on, sing along and dance.
- Use virtual methods of socialising. If you are able to Facetime/Skype friends and family do this, even once a day, to the same or a different person each day, to take your mind off your anxiety. Or ring them. It will give you a plan- something to look forward to- and will keep you in touch with your world. Thinking of others, listening to what’s happening for them and offering support works surprising well in helping to reduce our own anxiety.
- Stay busy with important chores. Make a list of things you can do. i.e. Clear out that cupboard, rearrange the room, declutter the wardrobe, weed the garden, etc. You do not have to do everything on the list, and not all at once, but it gives you further plans for you to tackle when you are feeling anxious. The feel-good factor when you have achieved something on your list is priceless.
- Recreational activity. Listen to music, read a book, tackle crosswords, knit, sew, paint, draw, etc., etc. Any of the things which you enjoy doing but often haven’t the time to do. Anything which will either provide an escape from anxious thoughts or will require concentration will help you.
- Avoid excessive negative messaging. Listen to the news, watching the news on TV or phone/laptop just once a day. Whilst we all need to know the latest advice regarding coronavirus and self-isolation, it is seriously anxiety-provoking to have it constantly in our ear. All you need to know will be available in one news-read. Please do not put yourself through more than this daily.
- Breathing. This simple exercise really can help when you are feeling anxious. Sit or stand in a relaxed position (tighten and untighten your muscles so that you can feel the difference between relaxed and unrelaxed). Concentrate on the breath and breath in deeply for a count of 5 and breathe out slowly for a count of 10. Do this several times, until you start to feel the anxiety subside enough for you to do one of the above activities.
The NHS also provides guidance in the following link. https://www.nhs.uk/oneyou/every-mind-matters/ | <urn:uuid:25b3ccac-58d8-4f05-8bbf-737db875c881> | CC-MAIN-2021-31 | https://www.c-r-y.org.uk/covid-19-faqs-for-heart-patients-by-professor-sanjay-sharma/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153931.11/warc/CC-MAIN-20210730025356-20210730055356-00251.warc.gz | en | 0.948758 | 4,321 | 3.078125 | 3 |
What if your phone or tablet could be charged by just leaving it out in the sunlight with no additional equipment required? Such technology is on its way, thanks to a new miracle material called perovskite, discovered by scientists at Nanyang Technological University to have properties that allow it to absorb solar energy while also acting as a light display with full color capabilities.
Perovskite is a mineral that contains calcium titanium oxide. It was discovered in Russia in the 1800’s, but has also been found in the U.S. and Europe and is commonly found in meteorites. Recently, it’s been found to have great conventional solar energy conversion properties, almost twice as good as traditional silicon solar cells. It’s also useful in making lasers. Now, we’ve discovered something even more amazing about perovskite: it can not only act as a solar cell, but it can also generate light.
Like many great scientific discoveries, this one was a happy accident. While the Nanyang team studied the mineral for its laser-creating properties, they discovered that it emitted bright light when a laser fired at it. This is a surprise, because other materials used for solar cells just don’t do this. So not only can perovskite capture light and turn it into energy, it also doubles as a semi-translucent light display. The scientists also discovered that they could create multiple colors with the light display by altering the perovskite’s composition. Even better, creating solar cells from perovskite is cheap and easy: its manufacturing process is simpler than that of other materials.
The applications for the use of pervoskite in technology are multifold: not only can we use this for displays on mobile devices (along with powering them), but we could also use it on buildings, allowing the material to generate electricity during the day and lighting up as an advertising display at night. | <urn:uuid:e09ef5be-272a-42cc-8bc9-59a24ac0d05d> | CC-MAIN-2014-42 | http://www.dvice.com/2014-3-25/new-solar-cell-material-also-acts-display | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507445190.43/warc/CC-MAIN-20141017005725-00030-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.961877 | 400 | 3.671875 | 4 |
SBA Hydro is just one of the many companies starting to bring clean energy to India’s rural poor.
This post is the first of a series by WRI and CDF-IFMR on the market for clean energy for the base of the pyramid in India.
Just over a year ago, I was sipping tea at a roadside stall near the village of Thatulkod, in Himachal Pradesh, India. This small farming community lay far from the tourist trail in the Kullu valley, almost a hundred kilometers from the nearest town. I listened to Subhash Chand, a local apple farmer talk about the quality of electricity in his village:
Most houses have electrical connections, but what is the use? We have power for a few hours a day. Even when there is electricity, it is barely enough to operate one or two light bulbs. We cannot rely on it.
Over more cups of tea, other villagers told their stories – a college student trying to study under the dim light of a kerosene lantern, a small hotel that relied on an expensive diesel generator because of the frequent power outages, and farmers who had no alternative but to use conventional fuels like kerosene, diesel and firewood for their energy needs. In addition to exposing these households to dangerous toxins and pollutants such as carbon monoxide, these fuel sources also contributed to pollution and environmental degradation. Not only did they suffer from the poor quality of electricity, but the residents of Thatulkod were also beginning to raise concerns about changes in the climate – many farmers complained about the warmer winters negatively affecting their apple harvests in recent years.
Villagers from Thatulkod. Photo credit: Saurabh Lall
These stories repeat across thousands of Indian villages with little or no access to electricity. According to analysis from our forthcoming report, India’s energy shortage is most acutely felt by its rural poor – the 114 million households that spend less than US$75 on goods and services per month (known as ‘Base of the Pyramid.’) About 40 percent of India’s rural households do not have access to electricity, and more than 85 percent must depend on “dirty” kerosene for lighting and firewood for cooking.
The people of Thatulkod are more fortunate than many of these households – over the next year, a company called SBA Hydro will construct a small hydro-electric power plant nearby, which will supply sustainably generated electricity to Thatulkod and several neighboring villages. These power plants are constructed along the run of the river and range in size from 100 kW to 1000 kW –sufficient to generate electricity for local needs with minimal impact on the environment. SBA Hydro currently operates two similar power plants near the towns of Sainj and Raskat in Himachal Pradesh which supply electricity to over 2500 rural households.
SBA Hydro founder S.K. Sharma (right) reviews plans for a new 100KW micro hydro plant. Photo credit: Saurabh Lall
As India struggles to provide cleaner and more reliable sources of energy to its rural poor, a growing number of innovative small companies, like SBA Hydro, are selling clean energy products and services directly to India’s rural ‘Base of the Pyramid’ (BoP) population. These new technologies include solar-based home electricity systems and lanterns, energy efficient cookstoves and decentralized electricity services generated from micro hydro and biomass gasifiers. However, most of these companies remain small and face considerable challenges penetrating the market because of poor rural distribution and retail networks.
In late 2008, India’s Centre for Development Finance at the Institute for Financial Management and Research (CDF-IFMR) and my team at the World Resources Institute’s New Ventures Program recognized the immense potential of this market and began analyzing the investment outlook for the clean energy industry serving India’s rural poor. To ensure we captured successful practices from other parts of the world, we also looked at clean energy companies serving rural markets in other countries that could provide valuable lessons to their Indian counterparts.
SBA Hydro's other power plant in nearby Sainj provides 1MW of renewable energy. Photo credit: Saurabh Lall
Together with colleagues from CDF-IFMR, we conducted field research with 15 clean energy companies (11 Indian and 4 global), across seventeen cities and twenty-six small towns and villages in India and four other countries: Bangladesh, Brazil, Cambodia, and Kenya. We interviewed company staff, including executives, middle managers, and field staff, as well as their distribution, retail and financial partners and also organized forty focus groups made up of more than 240 rural BoP users, and nonusers, of clean energy products and services.
The result is our forthcoming report Power to the People: Investing in Clean Energy for the Base of the Pyramid in India. The report analyzes the challenges as well as the market opportunities to help investors – both in India and abroad – better understand the enormous potential of this market. Despite the barriers companies face, the report details significant opportunities for growth in the BoP market.
The next few posts will dive deeper into our methodology, the sectors we profiled as well as consumer insights gained from our focus group discussions with BoP users. We believe that increased, patient capital can greatly expand the reach of companies like SBA Hydro, and provide clean energy solutions for the villagers in Thatulkod, and beyond, in a profitable and sustainable manner.
Santosh Singh is a Senior Researcher and Sreyamsa Bairiganjan is a Researcher in CDF-IFMR's Rural Market Insight Group. | <urn:uuid:f5e693d4-d505-44a3-ae87-866d4ea69147> | CC-MAIN-2020-29 | https://www.wri.org/blog/2010/09/expanding-market-clean-energy-rural-india | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896932.38/warc/CC-MAIN-20200708093606-20200708123606-00072.warc.gz | en | 0.954565 | 1,156 | 3.03125 | 3 |
In "Riddle and Mystery," a Tapestry of Faith program
"This Little Light of Mine"
Hymn 118 in Singing the Living Tradition has a strong association with the Civil Rights movement, sung at many 1960s anti-segregation demonstrations by Fanny Lou Hamer, Pete Seeger and others. Originally written by evangelical composer Harry Dixon Loes (1895-1965), the song joined the American folk music tradition after John Avery Lomax, Honorary Consultant and Curator of the Archive of American Folk Song, and his wife, Ruby Terrill Lomax, included it in a collection of field recordings for the Library of Congress in 1939.
The Dictionary of Unitarian and Universalist Biography offers an in-depth article on Adlai Stevenson.
For more information contact web @ uua.org.
This work is made possible by the generosity of individual donors and congregations.
Please consider making a donation today.
Last updated on Thursday, October 27, 2011.
Sidebar Content, Page Navigation
More Ways to Search
Donate to Support This Program and the Ongoing Work of the UUA
Read or subscribe to UUA.org Updates for the latest additions to our site.
Learn more about the Beliefs & Principles of Unitarian Universalism, or read our online magazine, UU World, for features on today's Unitarian Universalists. Visit an online UU church, or find a congregation near you. | <urn:uuid:1942cedc-7def-474a-8444-46269db965ae> | CC-MAIN-2014-42 | http://www.uua.org/re/tapestry/children/riddle/session12/sessionplan/157449.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119661285.56/warc/CC-MAIN-20141024030101-00068-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.889623 | 303 | 3.0625 | 3 |
Chapter 2. File System Structure and Maintenance
- Shareable versus unshareable files
- Variable versus static files
2.1. Overview of Filesystem Hierarchy Standard (FHS)
- Compatibility with other FHS-compliant systems
- The ability to mount a
/usr/partition as read-only. This is especially crucial, since
/usr/contains common executables and should not be changed by users. In addition, since
/usr/is mounted as read-only, it should be mountable from the CD-ROM drive or from another machine via a read-only NFS mount.
2.1.1. FHS Organization
126.96.36.199. Gathering File System Information
dfcommand reports the system's disk space usage. Its output looks similar to the following:
df command output
Filesystem 1K-blocks Used Available Use% Mounted on /dev/mapper/VolGroup00-LogVol00 11675568 6272120 4810348 57% / /dev/sda1 100691 9281 86211 10% /boot none 322856 0 322856 0% /dev/shm
dfshows the partition size in 1 kilobyte blocks and the amount of used and available disk space in kilobytes. To view the information in megabytes and gigabytes, use the command
df -h. The
-hargument stands for "human-readable" format. The output for
df -hlooks similar to the following:
df -h command output
Filesystem Size Used Avail Use% Mounted on /dev/mapper/VolGroup00-LogVol00 12G 6.0G 4.6G 57% / /dev/sda1 99M 9.1M 85M 10% /boot none 316M 0 316M 0% /dev/shm
/dev/shmrepresents the system's virtual memory file system.
ducommand displays the estimated amount of space being used by files in a directory, displaying the disk usage of each subdirectory. The last line in the output of
dushows the total disk usage of the directory; to see only the total disk usage of a directory in human-readable format, use
du -hs. For more options, refer to
gnome-system-monitor. Select the File Systems tab to view the system's partitions. The figure below illustrates the File Systems tab.
Figure 2.1. GNOME System Monitor File Systems tab
/boot/directory contains static files required to boot the system, for example, the Linux kernel. These files are essential for the system to boot properly.
/boot/directory. Doing so renders the system unbootable.
/dev/directory contains device nodes that represent the following device types:
- devices attached to the system;
- virtual devices provided by the kernel.
udevddaemon creates and removes device nodes in
/dev/directory and subdirectories are defined as either character (providing only a serial stream of input and output, for example, mouse or keyboard) or block (accessible randomly, for example, a hard drive or a floppy drive). If GNOME or KDE is installed, some storage devices are automatically detected when connected (such as with a USB) or inserted (such as a CD or DVD drive), and a pop-up window displaying the contents appears.
Table 2.1. Examples of common files in the
|/dev/hda||The master device on the primary IDE channel.|
|/dev/hdb||The slave device on the primary IDE channel.|
|/dev/tty0||The first virtual console.|
|/dev/tty1||The second virtual console.|
|/dev/sda||The first device on the primary SCSI or SATA channel.|
|/dev/lp0||The first parallel port.|
/etc/directory is reserved for configuration files that are local to the machine. It should contain no binaries; any binaries should be moved to
/etc/skel/directory stores "skeleton" user files, which are used to populate a home directory when a user is first created. Applications also store their configuration files in this directory and may reference them when executed. The
/etc/exportsfile controls which file systems export to remote hosts.
/lib/directory should only contain libraries needed to execute the binaries in
/sbin/. These shared library images are used to boot the system or execute commands within the root file system.
/media/directory contains subdirectories used as mount points for removable media, such as USB storage media, DVDs, and CD-ROMs.
/mnt/directory is reserved for temporarily mounted file systems, such as NFS file system mounts. For all removable storage media, use the
/media/directory. Automatically detected removable media will be mounted in the
/mntdirectory must not be used by installation programs.
/opt/directory is normally reserved for software and add-on packages that are not part of the default installation. A package that installs to
/opt/creates a directory bearing its name, for example
/opt/packagename/. In most cases, such packages follow a predictable subdirectory structure; most store their binaries in
/proc/directory contains special files that either extract information from the kernel or send information to it. Examples of such information include system memory, CPU information, and hardware configuration. For more information about
/proc/, refer to Section 2.3, “The /proc Virtual File System”.
/sbin/directory stores binaries essential for booting, restoring, recovering, or repairing the system. The binaries in
/sbin/require root privileges to use. In addition,
/sbin/contains binaries used by the system before the
/usr/directory is mounted; any system utilities used after
/usr/is mounted are typically placed in
/srv/directory contains site-specific data served by a Red Hat Enterprise Linux system. This directory gives users the location of data files for a particular service, such as FTP, WWW, or CVS. Data that only pertains to a specific user should go in the
/var/www/htmlfor served content.
/sys/directory utilizes the new
sysfsvirtual file system specific to the 2.6 kernel. With the increased support for hot plug hardware devices in the 2.6 kernel, the
/sys/directory contains information similar to that held by
/proc/, but displays a hierarchical view of device information specific to hot plug devices.
/usr/directory is for files that can be shared across multiple machines. The
/usr/directory is often on its own partition and is mounted read-only. The
/usr/directory usually contains the following subdirectories:
- This directory is used for binaries.
- This directory is used for system-wide configuration files.
- This directory stores games.
- This directory is used for C header files.
- This directory is used for Kerberos-related binaries and files.
- This directory is used for object files and libraries that are not designed to be directly utilized by shell scripts or users. This directory is for 32-bit systems.
- This directory is used for object files and libraries that are not designed to be directly utilized by shell scripts or users. This directory is for 64-bit systems.
- This directory contains small helper programs called by other programs.
- This directory stores system administration binaries that do not belong to
- This directory stores files that are not architecture-specific.
- This directory stores source code.
- This directory stores temporary files.
/usr/directory should also contain a
/local/subdirectory. As per the FHS, this subdirectory is used by the system administrator when installing software locally, and should be safe from being overwritten during system updates. The
/usr/localdirectory has a structure similar to
/usr/, and contains the following subdirectories:
/usr/local/differs slightly from the FHS. The FHS states that
/usr/local/should be used to store software that should remain safe from system software upgrades. Since the RPM Package Manager can perform software upgrades safely, it is not necessary to protect files by storing them in
/usr/local/for software local to the machine. For instance, if the
/usr/directory is mounted as a read-only NFS share from a remote host, it is still possible to install a package or program under the
/usr/as read-only, any programs that write log files or need
lock/directories should write them to the
/var/directory. The FHS states
/var/is for variable data, which includes spool directories and files, logging data, transient and temporary files.
/var/directory depending on what is installed on the system:
lastlog, go in the
/var/lib/rpm/directory contains RPM system databases. Lock files go in the
/var/lock/directory, usually in directories for the program using the file. The
/var/spool/directory has subdirectories that store data files for some programs. These subdirectories may include: | <urn:uuid:86770846-a202-4d29-8dea-7531d6f70be9> | CC-MAIN-2021-25 | https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/storage_administration_guide/ch-filesystem | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611445.13/warc/CC-MAIN-20210614043833-20210614073833-00065.warc.gz | en | 0.818021 | 1,950 | 2.6875 | 3 |
Aim: This article focuses on the genetic mechanisms, with an aim to provide certain theoretical and experimental foundation for the future diagnosis and treatment of diabetic nephropathy. Five common genes were selected in this article including ACE, Klotho, MicroRNA, CERS and VDR.
Methods: To learn about the newest study trends on this topic through searching numerous international and domestic databases (such as CNKI, CBMdisc, PUBMED, EBMase) aiming to obtain meaningful conclusions in order to write a valuable summarization.
Results: These five genes both play important roles in the pathogenesis of diabetic nephropathy: â The I allele of ACE gene is the protective gene that prevents type 2 diabetes mellitus patients from developing diabetic Nephropathy; â¡ In diabetic nephropathy, the level of Klotho mRNA and Klotho protein is decreased by the RAAS, TGFβ, PPAγ, and Wnt signaling pathways; ⢠miR-29c, which is involved in the regulation of the Spry1/Rho signaling pathway, can be used as a new target for the treatment of diabetic nephropathy; The SNP (rs267734) in the CERS2 gene is associated with an increase in albuminuria among patients with diabetes; The occurrence of diabetic nephropathy is associated with vitamin D receptor gene genetic polymorphisms.
Conclusion: With an ever-increasing access to this subject, we can further our understanding of the pathogenesis of DN and broaden the research field until accomplishing the target of prevention of DN through the creation of new target drug and accurate prediction of disease. Further study about the genetic mechanism of DN especially T1DN remains a vital task.
Miao Ti, Lingyu Xue, Qiao Yin, Shan Shao, Jiao Cai and Wen Zhang
All Published work is licensed under a Creative Commons Attribution 4.0 International License
Copyright © 2017 All rights reserved. iMedPub Last revised : August 20, 2017 | <urn:uuid:1c675448-9515-4bbf-80e6-2025c965be88> | CC-MAIN-2017-34 | http://clinical-experimental-nephrology.imedpub.com/abstract/research-advances-on-the-genetic-mechanism-of-diabetic-nephropathy-18695.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108268.39/warc/CC-MAIN-20170821114342-20170821134342-00697.warc.gz | en | 0.900386 | 425 | 2.828125 | 3 |
Activity: Talk or presentation types › Invited talk
In 1896, the English explorer, writer and photographer Isabella Lucy Bird (b.1831) set sail from Shanghai to explore China along the Yangtze River. The interior of China had recently been opened up to foreigners, forced by the invading western imperial powers and their advanced weaponry. Taking advantage of this, Bird sailed westward until she navigated through the treacherous Three Gorges. From there she left the ‘beaten track’ and went north, reaching Chengdu before turning west towards Tibet. At the Tibetan border she was finally turned away. She then sailed on the Min River, rejoining the Yangtze at Yibin before returning to Shanghai. Bird was one of the first independent (women) travellers and photographers operating in China and its western borderland with Tibet. In 1898, Bird published her book ‘The Yangtze Valley and Beyond’, in which she documented and reflected on her experiences in China, and unusually for the time, with much sympathy towards the country. From among the 116 photographs in Bird’s book, one image, of the historical Zhangfei Temple, which she reached just after the 1897 Chinese New Year, is of particular relevance for the purposes of this paper.
In 2014, the Chinese-born, British photographer Yan Wang Preston (b. 1976) set off for the last road trip for her Mother River project, for which she was photographing the entire Yangtze River at precise 100km intervals since 2010. She was 5-months pregnant and had already covered most of the river, including the challenging terrains on the Tibetan Plateau at the river source. On the 23rd May she reached the same Zhangfei Temple visited by Bird over a century ago. An additional historical resonance is provided by the fact that Preston photographed the Temple with a large-format film camera, not dissimilar to the one used by Bird. Finally by the 1st June she reached and photographed the last pre-determined photo location for her project. Preston’s photobook ‘Mother River’, published in 2018 by Hatje Cantz, contains 64 photographs documenting the landscapes and lives along the Yangtze River across the entire width of China, and is the most systematic photographic record along the Yangtze produced by one person since the first photograph in China was produced in 1842.
This paper presents Preston’s Mother River project and contextualises it within the field of women photographers who have travelled to and explored areas beyond the reach of many but the most determined adventurers. While acknowledging the often contested social, cultural and political backgrounds of such photographers, the paper attempts to downplay issues normally associated with gender and politics. Instead, the paper suggests that women are just as capable as men in the field of adventurous travelling before asking the ultimate question: why are there so few women photographers in this field? | <urn:uuid:07df6d65-d565-4f29-a5fb-32db26b7b548> | CC-MAIN-2020-34 | https://pure.hud.ac.uk/en/activities/compasses-cameras-ladies-case-studies-of-women-photographers-and- | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738425.43/warc/CC-MAIN-20200809043422-20200809073422-00550.warc.gz | en | 0.970221 | 593 | 3.03125 | 3 |
Daylight Saving Time is one of the hardest, worst and most tiring times of the year. Twice a year, we either make the clock go an hour forward or an hour backwards. The day after daylight savings when the clock goes backwards is probably one of the most difficult days of the year for me and for many other students. We get up at a time in the morning for School that feels way too early and then have to sit in our classes exhausted. When the clock is pushed an hour forwards, it is so hard to focus and sleep well and get your body back on a schedule. For example, when this time change started, the first morning my dad woke me up, I had thought I had slept for a while, but I lost an hour. That entire day, I just lost track of time. I checked the clock and it was already 3 p.m., and I STILL needed to eat lunch, therefore making the time change mess up my food schedule also. I was not hungry when it became time for dinner. This all eventually affected my sleep schedule. Why do we even have a time change? Time changes seem so pointless. They seem like an excuse for me to be even more tired. Arizona and Hawaii both do not have Daylight Savings Time, and they are fine because of it, so why do we need to have daylight savings? It only makes a more tired, more stressed student.
The Gloom of Daylight Saving
More from BlogsMore posts in Blogs »
More from The MMore posts in The M » | <urn:uuid:be38f10e-56a3-48f6-a8fb-16f52358b4e5> | CC-MAIN-2022-27 | https://theultraviolet.com/2013/05/the-gloom-of-daylight-saving-time/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103945490.54/warc/CC-MAIN-20220701185955-20220701215955-00410.warc.gz | en | 0.967775 | 315 | 2.515625 | 3 |
How to Build a Cooler City
CHICAGO | On a sweltering day in July 1995, Luxora Coleman returned to her Chicago home to find her husband, Oliver, unmoving on his living room couch. With a weak heart and only a ceiling fan to battle temperatures that had soared to 106 degrees, the heat wave had proved too much for him. He was pronounced dead later that day.
Coleman’s husband was one of thousands of residents left without air conditioning over the four days that summer when the heat index reached 120 degrees. Roads buckled, cars broke down and many areas lost power. And by the time it was over, more than 700 people, mostly the elderly and ill who live alone, had died due to heat-related causes.
Since that devastating heat wave, the city has been working to prevent such a tragedy from occurring again by improving heat emergency warnings, opening summer cooling centers and stepping up efforts to monitor seniors during extreme heat events.
But they’re also working to engineer a city that can stay cooler even as temperatures rise.
Watch the full broadcast report.
Global climate data shows the Earth has been warming increasingly over time.
Chicago is part of that trend. The city’s annual average temperature has increased by 2.5 degrees since 1945, according to this climate assessment created by a consortium of scientists and commissioned by the city.
Like many urban areas, Chicago is also victim to something called the urban heat island effect. Simply, concrete and pavement, which absorb and trap heat, make cities like Chicago hotter than surrounding rural areas. Buildings soak up the sun’s rays during the day and release that heat into the night.
Joseph Fernando of University of Notre Dame has been studying the urban climate in both Chicago and Phoenix. He’s also been studying the influence of climate change on the urban heat island effect. Fernando’s research shows that Chicago is about four to five degrees warmer than the neighboring rural town of DeKalb, Ill., for example. That’s partly due to continued urban development as well as global temperature rise, he said.
The heat island effect, climate scientists are quick to point out, does not skew the global trends that indicate climate change is occurring. After all factors that impact temperature at different locations are accounted for, research has shown that urban sites are warming at about the same rate as rural sites, said Thomas Peterson, chief climatologist for the National Oceanic and Atmospheric Administration.
“Climate change basically exacerbates the effect at night,” Fernando said. As the global temperature increases, a city’s developed areas will retain even more nighttime heat than other areas.
To battle the heat, city officials have undertaken an ambitious $7 billion plan to build a “new Chicago,” said Karen Weigert, the city’s chief sustainability officer. That means renovating citywide infrastructure from sidewalk to rooftop.
Central to the city’s plan is adding green space and vegetation wherever they can, which has a natural cooling effect
Chicago’s City Hall, for example, contains a spectacular rooftop garden. From native woodland grasses to sunflowers and asters, plants arranged in radiating bands of color bloom throughout the seasons in a sunburst pattern. The roof, 12 stories high, contains 23,000 square feet of more than 100 plant species.
“It’s really the Rolls-Royce of green roofs.” said Michael Berkshire who administers green projects for the city. Some areas of the roof have rolling terrain with an added 18-inch layer of soil to support trees and shrubs. A rainwater collection system irrigates the roof and several bee hives pollinate the many flower varieties.
The plants on the rooftop soak up the sun’s heat to evaporate water, keeping both the buildings underneath and the air above it cooler. One half of City Hall’s roof used to be black like most roofs, and on a hot day when they measured the difference between the two sides, the surface temperature was nearly 80 degrees hotter on the black top side than the green side. Chicago estimates that this green roof saves City Hall about $3,600 a year in heating and cooling savings.
“If every rooftop in Chicago was covered with a green roof, the city could save $100 million in energy every year,” said Jason Westrope, a developer for Development Management Associates, who has overseen the building of green roofs in the city.
See images of some of Chicago’s most impressive green roofs.
Green roofs also help absorb stormwater runoff. That’s important because the city’s stormwater drains through its sewers, and if the system gets overloaded after a big storm, that wastewater is in danger of backflowing into the river, the lake, and even into people’s basements.
Chicago already has 359 green roofs covering almost 5.5 million square feet — that’s more than any other city in North America. But city planners are pushing for even more.
Chicago has mandated that all new buildings that require any public funds must be “LEED” Certified — designed with energy efficiency in mind — and that usually includes a green roof. Any project with a green roof in its plan gets a faster permitting process. That combined with energy savings is the kind of green that incentivizes developers.
“We’re looking at placing landscape wherever we can, and it’s so much more difficult when you have a densely developed city.” Berkshire said. “Rooftops are one of the last frontiers.”
But the city is looking beyond buildings — they’re hitting the streets too.
“Our streets represent 23 percent of the land area here in Chicago.” said Janet Attarian, project director for the city’s transportation department, “And it needs to be more than just a place where we move vehicles and goods. It needs to be our front doors.”
That’s why they’re designing new streetscapes that integrate technology and design elements from widened sidewalks for increased pedestrian traffic to tree and plant landscaping that provide shade. The pavements are made of a light reflecting material mix that includes recycled tire pieces and lanes coated with a microthin concrete layer that keep the street from absorbing so much heat.
Chicago’s 1,900 miles of alleyways traditionally absorb heat and cast away potentially cooling rainwater. But new ‘green alleys’ use permeable pavement that absorb rainwater. As that underground water evaporates that also keeps the alley and air around it cool.
“We need to make sure that people can get from A to B safely, that the streets aren’t flooding, and that they’re not buckling because of the heat,” Attarian said.
A version of this report will air on NewsHour’s broadcast on Oct 9, 2012.
Videography by Michael Werner and Saskia de Melker.
You can see more from our series on the Coping with Climate Change page. | <urn:uuid:822e2f18-499a-4bf6-a37a-77733c08212f> | CC-MAIN-2017-26 | http://www.pbs.org/newshour/updates/climate-change-july-dec12-chicago_10-09/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00436.warc.gz | en | 0.948909 | 1,480 | 3.359375 | 3 |
Global warming caused by CFCs, not carbon dioxide, new study says
From: Phys Org
Chlorofluorocarbons (CFCs) are to blame for global warming since the 1970s and not carbon dioxide, according to new research from the University of Waterloo published in the International Journal of Modern Physics B this week.
CFCs are already known to deplete ozone, but in-depth statistical analysis now shows that CFCs are also the key driver in global climate change, rather than carbon dioxide (CO2) emissions.
"Conventional thinking says that the emission of human-made non-CFC gases such as carbon dioxide has mainly contributed to global warming. But we have observed data going back to the Industrial Revolution that convincingly shows that conventional understanding is wrong," said Qing-Bin Lu, a professor of physics and astronomy, biology and chemistry in Waterloo’s Faculty of Science. "In fact, the data shows that CFCs conspiring with cosmic rays caused both the polar ozone hole and global warming."
Chlorofluorocarbons are to blame for global warming since the 1970s and not carbon dioxide, according to new research from the University of Waterloo published in the International Journal of Modern Physics B this week. This graph shows the predicted path of global temperatures is set to continue their decline as a result of depletion of CFC’s in the atmosphere.
"Most conventional theories expect that global temperatures will continue to increase as CO2 levels continue to rise, as they have done since 1850. What’s striking is that since 2002, global temperatures have actually declined – matching a decline in CFCs in the atmosphere," Professor Lu said. "My calculations of CFC greenhouse effect show that there was global warming by about 0.6 °C from 1950 to 2002, but the earth has actually cooled since 2002. The cooling trend is set to continue for the next 50-70 years as the amount of CFCs in the atmosphere continues to decline."
The findings are based on in-depth statistical analyses of observed data from 1850 up to the present time, Professor Lu’s cosmic-ray-driven electron-reaction (CRE) theory of ozone depletion and his previous research into Antarctic ozone depletion and global surface temperatures.
"It was generally accepted for more than two decades that the Earth’s ozone layer was depleted by the sun’s ultraviolet light-induced destruction of CFCs in the atmosphere," he said. "But in contrast, CRE theory says cosmic rays – energy particles originating in space – play the dominant role in breaking down ozone-depleting molecules and then ozone."
Chlorofluorocarbons are to blame for global warming since the 1970s and not carbon dioxide, according to new research from the University of Waterloo published in the International Journal of Modern Physics B this week. The graph demonstrates the near perfect correlation between observed temperature data and Professor Qing-Bin Lu’s cosmic-ray-driven electron-reaction (CRE) theory of ozone depletion.
Lu’s theory has been confirmed by ongoing observations of cosmic ray, CFC, ozone and stratospheric temperature data over several 11-year solar cycles. "CRE is the only theory that provides us with an excellent reproduction of 11-year cyclic variations of both polar ozone loss and stratospheric cooling," said Professor Lu. "After removing the natural cosmic-ray effect, my new paper shows a pronounced recovery by ~20% of the Antarctic ozone hole, consistent with the decline of CFCs in the polar stratosphere."
By proving the link between CFCs, ozone depletion and temperature changes in the Antarctic, Professor Lu was able to draw almost perfect correlation between rising global surface temperatures and CFCs in the atmosphere.
"The climate in the Antarctic stratosphere has been completely controlled by CFCs and cosmic rays, with no CO2 impact. The change in global surface temperature after the removal of the solar effect has shown zero correlation with CO2 but a nearly perfect linear correlation with CFCs - a correlation coefficient as high as 0.97."
Data recorded from 1850 to 1970, before any significant CFC emissions, show that CO2 levels increased significantly as a result of the Industrial Revolution, but the global temperature, excluding the solar effect, kept nearly constant. The conventional warming model of CO2, suggests the temperatures should have risen by 0.6°C over the same period, similar to the period of 1970-2002.
The analyses indicate the dominance of Lu’s CRE theory and the success of the Montreal Protocol on Substances that Deplete the Ozone Layer.
"We’ve known for some time that CFCs have a really damaging effect on our atmosphere and we’ve taken measures to reduce their emissions," Professor Lu said. "We now know that international efforts such as the Montreal Protocol have also had a profound effect on global warming but they must be placed on firmer scientific ground."
"This study underlines the importance of understanding the basic science underlying ozone depletion and global climate change," said Terry McMahon, dean of the faculty of science. "This research is of particular importance not only to the research community, but to policy makers and the public alike as we look to the future of our climate."
Professor Lu’s paper, Cosmic-Ray-Driven Reaction and Greenhouse Effect of Halogenated Molecules: Culprits for Atmospheric Ozone Depletion and Global Climate Change, also predicts that the global sea level will continue to rise for some years as the hole in the ozone recovers increasing ice melting in the polar regions.
"Only when the effect of the global temperature recovery dominates over that of the polar ozone hole recovery, will both temperature and polar ice melting drop concurrently," says Lu.
The peer-reviewed paper published this week not only provides new fundamental understanding of the ozone hole and global climate change but has superior predictive capabilities, compared with the conventional sunlight-driven ozone-depleting and CO2-warming models.
Article from: phys.org
Tune into Red Ice Radio:
Rosa Koire - Hour 1 - Behind the Green Mask: U.N. Agenda 21
Alex Newman - Rio+20, UN Conference on "Sustainable Development"
Eric Karlstrom - Hour 1 - Behind The Green Curtain
G. Edward Griffin - The Collectivist Conspiracy
Jerry E. Smith - The "Green" Conspiracy
James Corbett - Transhumanism, Neofeudalism & the Green Movement
Peter Taylor - The Corporatization of the Environmental Movement
Elevated carbon dioxide making arid regions greener
Global warming debunked: NASA report verifies carbon dioxide actually cools atmosphere
Carbon Dioxide Levels Continue To Rise, But Global Temperatures Are Not Following Suit
Climate Change in 12 Minutes - The Skeptic’s Case
Latest News from our Front Page
Pegida's Multi - Culti (state) Agenda!
This guy raises some very interesting points regarding the recent PEGIDA launch in the UK and around Europe.
Make sure to check out the videos below. The focus on the criticism descends into a Nazi accusation contest. "No no THEY are the REAL Nazi's."
Pegida UK is fronted by Tommy Robinson, Paul Weston and Anne Marie Waters. They held a demo in ...
Sweden plans to expel up to 80,000 asylum-seekers (that didn't seek asylum)
Sweden intends to expel up to 80,000 migrants who arrived in 2015 and whose application for asylum has been rejected, Interior Minister Anders Ygeman said Wednesday.
Ed: Wait, so they are in the country despite being rejected asylum? How did that happen and who let them in then?
"We are talking about 60,000 people but the number could climb to 80,000," the ...
What Happened to Roosh and Why Did the International Media Run With the "Pro-Rape" Allegation Lie?
In the past few days there has been a slew of articles coming out of the garbage pile that is the mainstream media, detailing how "Roosh V" of Return of Kings, not only is a "Pro-rapist," but how he also was going to teach men how to rape, at their planned international meetups.
Roosh did a press conference in Washington DC, ...
An Occupied Country
When people refer to occupation governments or occupied countries, the first thought is often of military occupation—the garrisoning of foreign troops in one’s cities and civil administration by their military executives. The other vision is the trope of a cabal of Haredim sitting in a darkly-lit boardroom with a map of the world on the wall, a dated reading of ...
Immortal Symbols 1941
Youtube description: Dutch film "Eeuwig Leevende Tekens" by Hamer - "Volksche Werkgemeenschap" (Folkish Study Group) - ancestral heritage, solar wheel, sun cross, tree of life, etc.
Subs by Otharus - http://fryskednis.blogspot.com
|More News » | | <urn:uuid:96fec9cd-d3d4-476c-8194-080e23cf988e> | CC-MAIN-2016-07 | http://www.redicecreations.com/article.php?id=25408 | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152959.66/warc/CC-MAIN-20160205193912-00043-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.925428 | 1,898 | 3.0625 | 3 |
Going to a kindergarten is the first step a child takes outside the safe space of a family. It works as a year of building a strong foundation for their years of formal learning. It offers a comfortable pitstop in their transition from their home to the school. They become accustomed to the idea of having an outside person playing the authority figure. Your child learns to work in an environment with children of their age around. They learn to make friends without any adult interference.
Teachers in kids schools in Ahmedabad support and endorse their social development by making them work in groups. All children are included in each other’s activities, the teacher resolves any disagreements. They not only learn to make new friends but also how to maintain their friendships as well.
All these skills are taught in kindergarten schools for kids, but as a parent of a toddler, you can contribute too. Here are some of the life lessons you must teach your child in their formative years:
- Good Manners: Your child needs to learn their manners from the start. Good manners not only make your child a more likable individual but also helps in improving their social IQ. Your child learns by mimicking your actions the most. So, use words such as ‘Please’ and ‘Thank You’ in your general conversation at home. Conduct yourself rightfully with the people around you. Constant and consistent modeling of good manners may assist your child in adopting them so that they become an integral part of his life.
- Respect: Respecting not only elders but also their peers and especially, oneself is one of the most important life lessons you can teach your child. Teaching respect helps them build empathy for others and self-worth for themselves. It teaches children to peacefully coexist and accept people as they are irrespective of their differences. Important qualities like cleanliness, obedience, self-control, kindness, determination may follow if there is basic human respect.
- Healthy Competition: You would always want your child to win in even small games at home because of their happy faces, but you should also teach them to lose gracefully. Children usually don’t take losing very well. They may cry or throw a fit, especially, in a kids kindergarten school environment. So, teach your kids the importance of losing and learning from their loss. Teaching your kids the correct way to behave in this situation is not ideal. Learning these key principles early on can help them face inevitable failures of life healthily.
- Responsibility: You may see your child as a child, but they learn responsibility from the beginning. Parents can model responsible behaviour by showing kids how to do things that one is supposed to and then accept the outcome of that action. It may help the kids to develop a healthy attitude towards work and take pride in all that he does. For example, ask your child to be responsible for their stationary. Tell them that they are responsible for cleaning their work-desk and putting their supplies in order. These small tasks will not only build responsibility but also ownership.
- Compassion: Your child needs to learn to be kind. Ingrain the fact that there are always people who are less fortunate than them. It is their responsibility to offer a helping hand if the opportunity arises. They can water the neighbour’s plants, carry a light grocery bag for the elderly, offer their seat to their grandparents, or feed stray dogs and cats. Inspire them to care for others from the formative years to help them become compassionate individuals in the future. Encourage your child to harbour feelings of forgiveness towards others. The ability to forgive others is important for peace of mind and for being happy in life.
- Positivity: While it is important to teach your child the importance of failure, teaching them that the next time Is going to be better is even more needed. Teaching your kids to have a positive outlook will help them to endure grief or strenuous amounts of stress. The life lesson that “there is always a tomorrow” can feel encouraging when life gets tough.
- Health and Hygiene: Your kids are never too young to begin learning about health and hygiene. We’re always telling our kids to take a bath, brush their teeth, wash their hands, and change their underwear. We never tell them why, though. Explain why health and hygiene are always going to be crucial parts of their days. As your children begin learning about this life skill, set up a chart that allows them to check off each task as they complete it.
In the end, teach your kids the importance of respecting and loving themselves. Help them grow up to be confident and responsible individuals by teaching them these life skills. | <urn:uuid:b51e2acb-f666-4881-81fb-e5566e309fa3> | CC-MAIN-2022-21 | https://dailydialers.com/education/teach-your-child-in-kindergarten/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662631064.64/warc/CC-MAIN-20220527015812-20220527045812-00094.warc.gz | en | 0.972972 | 951 | 3.390625 | 3 |
Travel Vaccines for Children
When we travel, I don’t wipe down restaurant tables or whip out the hand sanitizer every ten minutes. I know that most germs we might encounter can be knocked out quickly by a healthy immune system. But a few viruses and bacteria, those dangerous enough to have warranted the arduous process of vaccine research and development, give me pause.
Japanese encephalitis, for example, kills 25% of the people who catch it. Hepatitis A can make you seriously ill for months. Polio is still lurking in some corners of the world. Fortunately, vaccines are available to help prevent these infections. For me, vaccines are an easy way to make travel with children safer and less worrisome.
How Travel Vaccines are Classified
The Centers for Disease Control and Prevention (CDC) designates travel vaccines as either routine, recommended, or required.
Routine vaccines are the standard vaccines and booster shots that are recommended for children (and adults) in the United States. For children, these vaccines are given on a dosage schedule that begins at birth (with the hepatitis B vaccine) and continues into adulthood. Most of these vaccines are given to children in their first few years of life, to create immunity before they might be exposed to a disease.
Recommended vaccines are the vaccines that a traveler might want to get if they visit certain countries or regions. A Japanese encephalitis vaccine is recommended for certain types of travel to parts of Asia, for example, and a typhoid vaccine might be recommended for a trip to India. Even if you don’t get these recommended vaccines, though, you can still travel in these areas.
Countries that have required vaccines will need to see written proof of vaccination or vaccination exemption before you are allowed to enter the country. Currently only two vaccines, the yellow fever vaccine and the meningococcal vaccine, are required for entry into certain countries. If a vaccine is required, you will need to show either written proof of vaccination, or a doctor’s note exempting you or your child from the vaccine.
The world is not a static place, though, and the vaccines that are recommended or required for travel to certain countries can change. Some diseases are seasonal, with outbreaks more common at certain times of the year. Other diseases increase or decrease in a country when a large population migrates due to civil war, a natural disaster, or even a religious pilgrimage.
Once you know where you plan to travel, check a trusted travel resource, such as the CDC’s Travelers Health website, to find out what vaccines your family might need.
Occasionally, a routine, recommended, or required vaccine is temporarily unavailable in the United States due to a manufacturing problem or other issue. If a vaccine you want is not available, talk to you health care provider about what your options are.
This article provides information, not medical advice, about the vaccines your child might need to travel more safely to different areas of the world. To find out what vaccines are best for your family’s unique health needs, make sure you talk to a health care provider.
When and Where to Get Travel Vaccines
Vaccines contain a modified form or piece of a bacteria or virus, which your immune system responds to by destroying it with specialized cells. Your body then retains some of these battle-hardened cells so that they can quickly stop any future infections with that germ before it can sicken you. This process creates immunity to a disease.
Depending on the vaccine, it can take weeks to months after the vaccination for your body to create this immunity; meanwhile, you could still catch the disease if you are exposed to it. Some vaccines also require multiple doses over time in order for your body to create adequate immunity to the disease.
For these reasons, if you need travel vaccines, it’s important to plan ahead. Once you know your travel itinerary, it’s best to start any vaccinations your family needs at least four to six weeks before you leave – several months before is best. If you are leaving in less than a month and need travel vaccinations, talk to your health care provider about an accelerated vaccination schedule and other options that can provide some protection against disease.
In many cases, your health care provider can give your family and you the travel vaccinations that you need. If you need a lot of different vaccinations, though, it’s best to find a local travel medicine clinic. These clinics can also give you the paperwork you need for any required vaccinations. To find a travel medicine clinic near you, contact your local health department, visit the CDC’s Vaccines website, or visit the website for the International Society of Travel Medicine (see Resources for links).
Routine Vaccinations for Travel
Infants and young children are normally vaccinated against a wide range of diseases, such as hepatitis B, tetanus, pertussis (whooping cough), seasonal influenza, and measles, with a series of single and combination vaccines given during well-child health care visits. These vaccines often require multiple doses, spaced out over months or years, to create adequate immunity to a disease. By the time a child turns 18, he or she has completed all the doses and booster shots for vaccines against 16 different diseases listed on the current vaccination schedule. The routine vaccination schedule is updated every January on the CDC’s website (see Resources for link).
Parents in any state can opt out of vaccinating a child for medical reasons (for example, if a child has a serious immune system problem that could make certain vaccinations dangerous for them). Most states also allow parents to opt out of recommended vaccines for religious or philosophical reasons.
Opting out of a routine vaccination can be risky when you travel abroad, though. Many vaccine-preventable diseases are more common in other countries than in the United States. Vaccine researchers like to remind people that these diseases are “just a plane ride away” in today’s world.
Before your trip, make sure that your child’s routine vaccinations (and your own) are up to date. Also ask your health care provider whether your child needs to start some routine vaccinations early, or finish some vaccination series on an accelerated schedule, to help protect them from disease when you travel.
Recommended and Required Travel Vaccinations
Six different vaccines are sometimes recommended or required for international travelers. In most cases, these vaccines are not recommended for children under 1 year old. If you’re taking an infant to an area where a vaccine is recommended or required, you will need to take precautions to protect them from exposure to disease, and (if the vaccine is required to enter the area) provide a doctor’s note explaining that the child is too young to receive the vaccine.
The CDC’s online Vaccine Information Statements provide more details on the symptoms of each vaccine-preventable disease, vaccine doses, and potential vaccine side effects and allergic reactions (see Resources for link).
You might need a typhoid vaccination if you are traveling to South Asia (where the risk of infection is much higher than other areas), Asia, Central or South America, the Caribbean, or Africa. The bacteria that cause typhoid fever are spread by contact with infected human feces, and travelers often catch typhoid fever through food or drinks contaminated with feces. True to its name, typhoid fever usually causes a high fever, along with stomach pain and other problems. Untreated typhoid fever can be fatal.
The typhoid vaccine is recommended if you’re visiting a smaller town or rural area where typhoid fever is common, or visiting friends or relatives in an area where typhoid fever is common. Children age 2 and older can receive the typhoid vaccine as a one-dose injection, which provides protection for two years (get the vaccine at least two weeks before you leave). Children age 6 and older can receive the vaccine as a series of four pills, each spaced two days apart, which provides protection for five years (finish the series at least one week before you leave).
Japanese Encephalitis Vaccine
Japanese encephalitis, common in rural areas of South and Southeast Asia, is caused by a virus spread by mosquitoes. Infection can cause brain inflammation and other problems; a quarter of people infected with Japanese encephalitis die, and brain damage is common in survivors.
Outbreaks of Japanese encephalitis (sometimes referred to as “JE”) are often seasonal, so check your travel dates against the most updated vaccination recommendations online. You might need to get this vaccine if you’re planning to spend a month or more in South or Southeast Asia, if you plan to spend time in rural areas, or if you plan to spend a lot of time outdoors (such as camping).
The three-dose vaccine is given over 30 days, although that timing can be halved if needed with an accelerated vaccination schedule. You should finish the series of shots at least ten days before you leave. Children should be one year or older to receive the vaccine, which probably provides protection for two years.
Hepatitis A Vaccine
Because hepatitis A is extremely common worldwide, it is both a routine childhood vaccination and an often-recommended travel vaccination for children and adults. Like typhoid, the hepatitis A virus is spread by contact with infected human feces, or food or drink contaminated with infected feces.
Children who catch Hepatitis A often have no symptoms, but they can pass on the infection to adults, who become seriously ill. Hepatitis A affects the liver, causing problems such as nausea and stomach pain. An infection can take months to go away, and in some cases the infection can be fatal.
The routine hepatitis A vaccine is given to children after they turn one year old. They receive two doses at least six months apart. One dose of the vaccine, given at any time before you leave, can also provide protection if you do not have time to get the second dose before your trip. The vaccine is believed to provide protection from hepatitis A for 20 years or longer.
Rabies is a fatal virus spread by the saliva of an infected animal, usually through a bite. The symptoms of rabies infection include hallucinations and seizures. Rabies is rare in the United States, but it is a concern in Asia, Africa, and Central and South America. In these countries, rabies is most often spread by infected dogs, monkeys, bats, and cats.
Although most people get a series of rabies shots only if they are bitten by a rabid animal, travelers who might encounter rabid animals when they are far from medical care can get a pre-exposure (prophylactic, or preventative) rabies vaccine. Children are at special risk for rabies because they often want to play with animals. A pre-exposure rabies vaccine can provide some protection to a child bitten by a rabid animal until you can find medical help.
The pre-exposure vaccine can be given to infants (under 1 year old) or children, in three doses over three to four weeks. If a vaccinated child or adult is bitten by a rabid animal, clean the wound well. Then get another dose of the vaccine as soon as possible, and a final dose three days later.
This five-dose vaccine series can prevent rabies if it is completed before symptoms of rabies appear. Rabies symptoms usually do not begin until weeks or months after exposure.
Yellow Fever Vaccine (Required)
Like Japanese encephalitis, yellow fever is a virus that can occur in seasonal epidemics and is spread by mosquitoes. The virus, which affects your liver and blood, can cause jaundice, fever, and flu-like symptoms. Yellow fever, which can be fatal, is a concern in tropical South America and sub-Saharan Africa.
The one-dose yellow fever vaccine is approved for children 9 months and older; if necessary, it can be given to children as young as 6 months old. You should get the vaccine at least 10 days before you leave. The vaccine provides immunity for 10 years.
Some countries require an International Certificate of Vaccination or Prophylaxis (ICVP), which proves you have been vaccinated against yellow fever, before you can enter the country. You can get the vaccination and certificate (which is good for ten years) at a yellow fever vaccination clinic (see Resources).
Some of the countries that require an ICVP for entry will waive these vaccination requirements for infants. If you cannot receive the yellow fever vaccination for medical reasons, a doctor’s letter explaining the reason might be accepted.
Meningococcal Vaccine (Recommended or Required)
The meningococcal vaccine is a routine childhood vaccination, usually given to children around age 11 or 12. The meningococcal vaccine prevents infection with bacteria that can cause disabling or fatal meningitis (brain infection), blood infections, or pneumonia. These infections can develop quickly and spread easily among people who are living or working in crowded conditions.
Since meningococcal outbreaks can occur seasonally in sub-Saharan Africa, the vaccine is often recommended for travelers to that region. Outbreaks also occur in Saudi Arabia during the Hajj, or pilgrimage to Mecca. If you travel to Saudi Arabia during the Hajj (the date of each year’s Hajj is based on the Islamic calendar), the meningococcal vaccine is required for entry; you must provide written proof of vaccination.
The one-dose vaccine is licensed for children as young as age 2. It can also be given to children under age 2 if they need the vaccination to enter Saudi Arabia. It should provide protection for three to five years.
Staying Well on Your Trip
It’s important to understand that no vaccine is guaranteed to protect you from a disease. Standard childhood vaccines, for example, are about 75% to 99% effective at preventing disease, depending on the vaccine. The typhoid vaccine for travelers is 50% to 80% effective.
Even if you get the vaccinations you need for your family, you could still catch a disease you were vaccinated against. Following healthy travel trips can help protect you from infectious diseases as well.
Research the health risks for the areas you plan to visit. As a baseline, be sure to keep your children’s pacifiers, toys, and hands clean while you travel. Ask your health care provider whether you need to bring any extra medical supplies to stay healthy on your trip.
When you look at your travel itinerary, ask yourself:
Is it safe to eat raw foods or should I only eat hot, fully-cooked foods?
Is it safe to drink the water and consume ice, or should I stick to bottled water?
Is it safe to consume unpasteurized milk and cheese?
Do I need to protect myself from insect-borne disease with DEET-based insect repellent or mosquito netting for sleeping?
How else can I protect my family on this trip?
The U.S. State department’s website has many healthy travel tips available online (see Resources for link).
Travel Health Resources
The routine vaccination schedules for children, adolescents, and adults are listed on the CDC’s website at http://www.cdc.gov/vaccines/recs/schedules/default.htm
The CDC’s Vaccine Information Statements provide detailed and updated information about routine, recommended, and required vaccines. They are available online at http://www.cdc.gov/vaccines/pubs/vis/default.htm
Look up what vaccines you need to visit certain countries or regions on the CDC’s Traveler’s Health website at http://wwwnc.cdc.gov/travel/destinations/list.aspx
Find links to both private and state-run travel health clinics in your area on the CDC’s website at http://wwwnc.cdc.gov/travel/content/travel-clinics.aspx
Find a local travel health clinic through the search tool of the International Society of Travel Medicine at http://www.istm.org/WebForms/SearchClinics/Default.aspx?SearchType=Advanced
Yellow fever vaccination clinics provide yellow fever vaccinations and ICVP certificates. The CDC lists locations for these clinics at http://wwwnc.cdc.gov/travel/yellow-fever-vaccination-clinics-search.aspx
The U.S. Department of State’s Tips for Traveling Abroad includes health tips and resources. It is available online at http://travel.state.gov/travel/tips/tips_1232.html
About the author: Laurie Bouck is an award winning writer focused primarily on health and medicine. She has co-authored a book on vaccines and written for a variety of well respected journals and magazines. She blogs at MedFly.
- See Also: Preventing Malaria When You Travel | <urn:uuid:dad89fef-f7fe-49f9-a798-f79ed5a449ed> | CC-MAIN-2016-18 | http://mylittlenomads.com/travel-vaccinations | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111455.18/warc/CC-MAIN-20160428161511-00188-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.929328 | 3,492 | 3.203125 | 3 |
Today I was walking down the street, thinking about how barbaric it was that many women were forbidden to learn to read and write in the 19th century in England (some people felt that illiterate women made better wives). Then it struck me:
Preventing women from learning to code is the moral equivalent of preventing women from learning to read and write in the 19th century.
Now, I don’t believe that everyone should learn to code, any more than everyone should learn to repair cars, or write a legal opinion. But I do think everyone should have an equal opportunity to learn to code. Perhaps a better analogy is that access to computer programming is the modern-day equivalent of access to higher education.
I co-founded the Ada Initiative in part to address the stunning gender disparity in open source software: 2% women at the last measurement. And it’s working – as a community, we’ve made more progress for women in open tech/culture in the 2 years the Ada Initiative has been in operation than in the previous 10.
During the month of August, we are running our annual fundraising drive to raise money for our next year’s work: running AdaCamps, teaching Allies Workshops, and working for codes of conduct in online communities. You can help by donating now and by spreading the word about our work. Thank you so much!
Software is changing the world. Women should be one half of the people writing that software. | <urn:uuid:bb9f3f3e-b68f-40a5-96ab-baad42064104> | CC-MAIN-2019-26 | https://blog.valerieaurora.org/2013/08/05/coding-is-a-human-right/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999066.12/warc/CC-MAIN-20190619224436-20190620010436-00182.warc.gz | en | 0.965201 | 302 | 2.546875 | 3 |
【heavy mineral group】-SCIdict …
【heavy mineral group】:; 【heavy mineral group】:heavy mineral combinations ; light and heavy mineral ; heavy mineral combination ; index of the heavy mineral ;
A guide to rapid identification of heavy minerals and highlights of …
· heavy minerals has sometimes been used to locate the source rocks more categorically. The distribution pattern and mineral assemblages can also help in understanding the transport and direction of dispersal. The geomorphologic changes, tectonic implication
Heavy mineral analysis
Heavy minerals (minerals with a density greater than 2.89 g/cm 3) have highly variable stabilities with respect to transport/weathering but the combined effects of chemical weathering, transport and diagenesis (and overall maturity) tend to decrease their percentage in the whole rock.
heavy mineral ore definition
Define heavy mineral ore. means any rock soil or sand bearing heavy minerals mined from the Mining Lease; Contracts Browse A-Z Browse by Tag: Contract Type Country Jurisdiction Industry Company Person Law Firm Filing ID SEC Filing Type SEC Exhibit ID ...
The Heavy Mineral Sand deposits in Kerala contain an assemblage of Ilmenite, Rutile, Leucoxene, Monazite, Zircon and Sillimanite. The State possesses one of the world class deposits of mineral sands in the coastal tracts. between Neendakara and Kayamkulam. This, commonly known as the Chavara deposit, after the main locality, covers a total ...
Sample location data. This dataset displays the location of …
· Sample location data. This dataset displays the location of each of the sample selected for heavy mineral, geochemical and geochronological analysis. The location is given as Eastings and Northings (UTM Zone 40, WGS84). The geological unit they were sampled from (based on geological mapping, see Farrant et al., 2012) is also shown, and which analyses (optical mineral counting, heavy mineral ...
Heavy-mineral zones in the Modelo Formation of the …
A detailed heavy mineral study was made of a portion of the Modelo formation in the Santa Monica Mountains, near Los Angeles. It was found that the heavy minerals varied both vertically in the formation and laterally within single lithologic units. Four distinct mineral ...
THE PALEOGENE HISTORY OF THE PELAGONIAN ZONE S.L. …
The heavy mineral assemblages indicate that in this source area ophiolitic complexes are tectonically incorporated to a lesser extent. Blueschists seem to be absent, as no detrital blue amphibole was found. Keywords: Hellenides, Pelagonian Zone, Paleogene
On the provenance of mid-Cretaceous turbidites of the …
· Two heavy mineral populations characterize the siliciclastic material of the mid-Cretaceous turbidites of the Katafito Formation (''First Flysch'') of the Pindos zone: a stable, zircon-rich group and an ophiolite-derived, chrome spinel-rich one. U/Pb and Pb/Pb dating on ...
Heavy-mineral zones in the Modelo Formation of the Santa …
A detailed heavy mineral study was made of a portion of the Modelo formation in the Santa Monica Mountains, near Los Angeles. It was found that the heavy minerals varied both vertically in the formation and laterally within single lithologic units. Four distinct mineral zones were recognized.
Heavy minerals; IMSF, CU
· Heavy Mineral Extraction Mining is the process of extracting valuable minerals or other geological minerals form the earth crust. Mining in broad sense means extracting of non- renewable resources water petroleum and natural gas. Mineral sands mining involves both dry mining and wet (dredge) mining operation.
Heavy minerals are sorted out by a running water near the coastline at Pfeiffer Beach, California. A closer look at the Pfeiffer Beach sand. Main heavy mineral species are garnet, epidote, zircon, magnetite, spinel, staurolite, etc. Width of view 8 mm. It is a very
An orientation study of the heavy mineral signature of the …
An orientation study around the NICO Co-Au-Bi deposit in the Great Bear magmatic zone of NW Territories, Canada, was initiated in 2007 to establish a practical guide to geochemica
heavy mineral sand on sale
Quality heavy mineral sand on sale - you can find heavy mineral sand from the most reliable suppliers on China.cn. Heavy Duty Wear-Resisting Industrial Mining Mineral Process Processing Horizontal Single-Suction Cantilever Gravel Dredging Sand Centrifugal Slurry Pump Mud Pump Pulp Slurry Pump Slurry Mine Tailing Pump
· Lifting Operation. Lifting operation generally occurs on construction sites, in factories and other industrial undertakings. This operation helps to move large objects efficiently and reduce manual handling operations. However, unsafe lifting operation can lead to disastrous accidents, causing injury or fatality and loss of work time and property.
GEOLOGY AND GEOGRAPHY OF THE NEW YORK BIGHT
Heavy mineral sands were collected from the upper intertidal zone from each beach during the month of April, 1996. Heavy mineral sand samples from Westhampton Beach and Jones Beach are dominated by garnet and magnetite with relatively little or no glauconite.
MRQ extends Koko Massava Heavy Mineral Sands zone …
· MRQ extends Koko Massava Heavy Mineral Sands zone with "significant" auger results May 15, 2020 By Staff Writer Heavy Mineral Sands specialist MRQ Metals (ASX Code: MRQ) has received "significant" laboratory assay results from extension auger drilling on the Koko Massava deposit within the Corridor Central tenement (6620L) in Mozambique.
Heavy Metal Zone
Heavy Metal Zone. 1 like. A Page for heavy metal fans where they can find awesome music and variance of heavy metal genres from across the world !! See more of Heavy Metal
Selected Heavy Mineral Placer Deposits An Economic …
An Economic Reconnaissance of Selected Heavy Mineral Placer January 1987 Deposits in the U.S. Exclusive economic Zone 6. ~ Staff, Bureau of Mines tPflnfl4''COn*~de,ft.ctna. U. Paifonn~nc Orn n*an Mama a"d Addtta 10. Pn,aaftna/Wcr~ Uwdt Ita. Office of
Metamorphic Rock Identification | Physical Geology
Metamorphic Rocks. Metamorphic rocks (changed rocks) are made when existing rocks are subjected to high temperatures and high pressures for long periods of time. Metamorphism (meta = change, morph = form) happens when molten rock intrudes other rocks and bakes the contact zone where the molten rock touches the preexisting rock.
heavy mineral sand on sale
Quality heavy mineral sand on sale - you can find heavy mineral sand from the most reliable suppliers on China.cn. We find 35 products about heavy mineral sand from 8 manufacturers & suppliers.
HM - Heavy Mineral Crd Cordierite OSLI Oil Sands Leadership Initiative SIF Share Insurance Fund CDIC Canadian Deposit Insurance Corporation EFAA Expedited Funds Availability Act ETA Electronic Transfer Account ERCB Energy Resources and Conservation ...
Heavy Mineral Sampling on the Red Cliff Project …
· Results indicate that the wide shear zone hosting the mineralization on the Crown Granted portion traced for over 2 kilometres of the project extends north beneath scree and alder covered slopes. Based on past drilling and recent geochemical results, the gold bearing shear zone has been traced over 4 kilometres of strike length.
5.4.12 Heavy Mineral Survey. Heavy minerals like ilmenite, sillimanite, garnet, zircon, rutile, monazite, magnetite, titanium, chromite, cassiterite, diamond, gold, and platinum-palladium have a tendency to form onshore beach and offshore placer/ocean floor deposits.
Stability of heavy minerals | Semantic Scholar
Semantic Scholar extracted view of "Stability of heavy minerals" by H. Fücht Provenance of the Ottnangian Sands as Revealed by Statistical Analysis of their Heavy Mineral Content (Austrian Molasse Zone, Upper Austria and Salzburg)
Specific Gravity is a measure of the density of a mineral. At times it is such a useful property that it is the only way to distinguish some minerals without laboratory or optical techniques. Gold (pictured) can easily be distinguished from "fool''s gold" by specific gravity …
An Economic reconnaissance of selected heavy mineral …
An Economic reconnaissance of selected heavy mineral placer deposits in the U.S. exclusive economic zone by, 1987, The Bureau edition, in English Hooray! You''ve discovered a title that''s missing from our library.Can you help donate a copy? If you own this book ...
Strandline Resources Limited
Strandline Resources is an Australian Stock Exchange listed mining company (ASX : STA) that is focused on mineral exploration and development in Tanzania and Australia. Coburn Mineral Sands Project, WA - construction commenced, key approvals in place FID
An orientation study of the heavy mineral signature of the …
The development of indicator mineral methods, together with till geochemistry, will be tested with further sampling over the Great Bear magmatic zone. An orientation study of the heavy mineral signature of the NICO Co-Au-Bi deposit, Great Bear magmatic zone, NW Territories, Canada | Geochemistry: Exploration, Environment, Analysis
Heavy-Mineral Concentrations Associated with Some Gamma
Title Book Heavy-Mineral Concentrations Associated with Some Gamma-Ray Aeroradiometric Anomalies Over Cretaceous Sediments in North Carolina: Implications for Locating Placer Mineral Deposits Near the Fall Zone: Usgs Open-File Report 92-396
Deposit model for heavy-mineral sands in coastal …
This report provides a descriptive model of heavy-mineral sands, which are sedimentary deposits of dense minerals that accumulate with sand, silt, and clay in coastal environments, locally forming economic concentrations of the heavy minerals. This deposit type is ...
NIOSHTIC-2 Publications Search
An Economic Reconnaissance of Selected Heavy Mineral Placer Deposits in the U.S. Exclusive Economic Zone. Authors Anonymous Source NTIS: PB 87-172920 :122 pages ...
Heavy Metal Contamination of Soils: Sources, Indicators, and …
Heavy metals are elements with metallic properties and an atomic mass of > 20. The most common contaminants of heavy metal are Cd, Cr, Hg, Pb, Cu, Zn, and As. Heavy metal contamination to soil and the environment has been accelerated in modern society
Sheffield Resources extends heavy mineral sand zone at …
· Sheffield Resources (ASX: SFX) has intersected heavy mineral bearing sand (HMS) at the Yandanooka Project in Western Australia, extending the size and... BlackEarth Mineral…
Heavy Metal Definition and List
· Learn about the definition of heavy metal as used in chemistry and other sciences. Plus, see a full list of heavy metals and their characteristics. Most heavy metals have a high atomic number, atomic weight and a specific gravity greater than 5.0 Heavy metals include some metalloids, transition metals, basic metals, lanthanides, and actinides.
MAJOR ZONE OF HIGH GRADE HEAVY MINERAL SAND MINERAL…
Valuable Heavy Mineral (VHM) found in the east of Corridor Central from Koko Massava drilling and the east of Corridor South from Nhacutse drilling (refer ASX Announcements 26 August and 31 August 2020). MRG Metals Chairman, Mr Andrew Van Der Zwan ...
Heavy Mineral Concentrate definition
Define Heavy Mineral Concentrate. means a concentrate of heavy mineral where waste and other impurities have been almost completely removed, therefore incorporating only valuable heavy minerals (mostly zircon, rutile andilmenite) and some residual waste.
Heavy mineral sands ore deposits
Heavy minerals are high-density components of siliciclastic sediments. They comprise minerals that have specific gravities greater than the two main framework components of sands and sandstones, quartz (s.g. 2.65) and feldspar (s.g. 2.54–2.76).
Kensington completes heavy mineral separation
· May 21, 2020 | Canada Nickel extends nickel strike and discovers PGM zone at Crawford, Ontario May 21, 2020 | Caldas Gold to acquire Juby project in Ontario May 21, 2020 | US uranium output shrinks 89% in 2019 Search for: Kensington completes heavy ...
- stone crushing naxal
- anodizinganswer and question for an interview in instrument engineer
- gravel crusher foreman jobs near me
- install stone crusher and plant mining crushing grinding
- how to calculate the crusher in civil engineering
- which rock crusher is better
- thailand used crusherthailand vibrating screen
- used jaw crusher uk price
- how to pulverized line
- what is the process of mining hematite 39
- how to screen 2mm gravel measure
- 23519 jaw crusher plant price
- shanxi jiezhou crusher factory
- 20x36 eagle jaw crusher
- stone river include
- coal separation plants
- rock grinders regarding
- xxsx company xjnzd brand ya hot jaw crusher vibrating screen
- high efficiency jaw crusher pe 400 600 for sale
- south african quarry tianyu construction machinery co
- artificial stone color | <urn:uuid:13703868-28d3-48dc-a334-b6a9495bf0ad> | CC-MAIN-2022-49 | https://asia.net.pl/Tue_13_Jul_49653.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00700.warc.gz | en | 0.84041 | 2,998 | 2.765625 | 3 |
What with the Olympics being in 北京, reporters are pronouncing it in various ways and the question of how to pronounce it is in the news again. Our local paper has an AP article by David Bauder which, Google reveals, is being carried all over the place. Here's one version.
The article is right about the correct pronounciation: [beʤɪŋ] (using the voiced symbols for what are, strictly speaking, voiceless unaspirated consonants); bayjing would be a pretty good English folk spelling. It also gives the correct explanation for the common mispronounciation [bejʒɪŋ], where the <j> is pronounced like the <s> of measure, namely that the sound [ʒ] is somewhat exotic in English, which I explained here four years ago. The article mistakenly asserts that the sound [ʒ] does not occur in English. It is indeed found in English, not only in measure but in such words as azure, pleasure, leisure, and treasure. What is true is that all of the words in which it occurs are loans from French, so the sound apparently has an exotic flavor even though it has existed in English for centuries.
The AP article also addresses the related question of why Beijing used to be called Peking. Although I explained this in some detail in this post, the AP article doesn't get this quite right. It explains that:
It officially changed in 1949, when the new Communist government adopted the pinyin transliteration method for proper names…
This oversimplifies the matter and falsely suggests that Peking and Beijing are different renderings of the same Chinese form in different systems of transliteration, which is not the case: they are different renderings of different Chinese forms. Moreover, the chronology is wrong. pinyin was first promulgated within China in 1958; it became an international standard (ISO-7098:1991) in 1979. | <urn:uuid:b5ed393e-f9bf-4ed4-a0f7-942d98a84e01> | CC-MAIN-2015-06 | http://languagelog.ldc.upenn.edu/nll/?p=493 | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115926735.70/warc/CC-MAIN-20150124161206-00041-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.965743 | 407 | 2.5625 | 3 |
Two species of antechinuses, a group of mouse-like marsupials with arguably the weirdest sexuality lives of any mammals, have just been classified as imperiled, merely five years after their discovery.
In 2013, Dr Andrew Baker of the Queensland University of Technology discovered two new species, the black-tailed dusky antechinus and the silver-headed antechinus. “It is pretty rare to uncover new mammals in developed countries such as Australia. These two new species were discovered on misty mountain summits. They have likely retreated there as the climate has warmed, and there is now nowhere left for them to go, ” Baker said in a statement.
“Australia has the worst mammal extinction rate anywhere on earth, ” Baker added, but he hopes the Australian Government’s decision this week to categorize the pair as officially imperiled will help.
Antechinuses( pronounced anti-kinus for anyone struggling) have achieved cult status for their sex behavior. Most animals take risks for sexuality, but some construct the process of get laid so arduous it is universally fatal. Salmon and spiders are both instances but among mammals, it is restricted to the Phascogalini, including antechinuses and tuans( basically larger antechinuses with delightfully silly tails ).
Come mating season, the males abandon feeing and sleeping for a 24/7 quest for sex, which then lasts for hours. Eventually, all this chasing, and the energy required for the act itself, takes a toll and the males die, sometimes of total organ failure. In most species of phascogales, by the end of the mating season, there are no males left- merely a lot of pregnant females.
This might not seem like the smartest of survival strategies but all but one of the 15 known antechinus species have adopted it- it seems a few hardy Antechinus swainsonni males survive to do it all again the following year. For millions of years it worked for them, that is until Europeans arrived on the continent, destroying their habitats, and bringing with them predators such as cats and foxes that not only love to eat them, but refuse to wait until late mating season to do so.
Baker co-discovered another two species in 2015, whose preservation status is currently undetermined. There are probably more members of the genus undiscovered, but Australia’s miserly approach to funding taxonomy means we may not find them before they run extinct.
What is now recognized as the black-tailed dusky antechinus was first seen in the Border Ranges national park in the 1980 s, but misidentified. Baker now has plans to seek it there, telling IFLScience the listing should set the plucky critters in line when threatened species funding is allocated. He hopes management schemes will shortly be put in place for the known colonies and the national parks in which they are found. | <urn:uuid:e2006aae-9d0d-4bc4-8754-fb3d17001c8e> | CC-MAIN-2022-27 | https://catinfofacts.com/marsupials-famous-for-deadly-sex-life-officially-endangered-just-five-years-after-discovery/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104655865.86/warc/CC-MAIN-20220705235755-20220706025755-00125.warc.gz | en | 0.955296 | 605 | 3.203125 | 3 |
A fairy or færie (Old English spelling) is a supposed magical being that flies in the air. They are usually depicted as small girls or women. Some færies have certain jobs, such as the Tooth fairy, who gives money or treats under the pillow of small children who have had a tooth fall out. A fairy tale is a story with a plot involving fairies. These stories are usually for children. Fairies can also be found in folklore, for instance, in Ireland and Scotland, fairies are still held as creatures that were defeated by the human race thousands of years ago and now live in caverns in the world of faerie. These mystical creatures are believed to be made after a kind of angel. Fairies come up in many fictional books such as "Peter Pan" and "The Spiderwick Chronicles". | <urn:uuid:ef8bc007-3df7-44d3-b3ed-a01fa89c34f0> | CC-MAIN-2016-44 | https://simple.wikipedia.org/wiki/Fairy | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00272-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.98758 | 168 | 2.765625 | 3 |
Eastern game grass (United States).
Densely clumped grass with short, fibrous, woody rhizomes.
Culms oval, stout, woody, solid, to 3-4 m tall, 3-5 cm thick at base, branching
erect at centre of clump, geniculate peripherally, stilt-rooting from lower
nodes, with a single ring of purple or mauve roots at the node, often growing
through the persistent culm sheath; nodes glabrous, 5-14 cm long. Leaf-sheaths
overlapping at base, clasping when young, lax and papery when old, often
persistent, about 20 cm long; leaf-blades lanceolate-acuminate, to 1.5
m long and 10 cm wide, widest at about two-thirds of its length. Inflorescence
to 30 cm long, terminal and axillary, of one to six racemes of unisexual
spikelets, female basally for one-third to one- eighth of the length of
the raceme, male distally (Gilliland et al., 1971). It differs from T.
laxum in that the inflorescence is stiff, and the male spikelets are longer
Western Hemisphere, United States to Brazil; Malaysia.
Season of growth
About 1 000-1 500 mm annually.
It grows best on moist, well-drained, fertile soils.
Number of seeds per kg.
15 000 (United States).
Vigour of growth and growth
It makes major growth in early spring and stays green until
frosts. It seeds from July to September in the United States.
Response to defoliation
This grass should not be cut closer than 25 cm from the ground.
It can be grazed during spring and summer, but deteriorates
after frost and provides little winter grazing. Grazing is best if deferred
at least 90 days every two to three years, to enable plants to produce
Cattle have difficulty in biting through the tough midribs of the leaves,
and the shallow-rooted stools are easily uprooted. It makes very little
growth in dry weather. It is persistent, and stands can be maintained almost
indefinitely under sound management (Whyte, Moir & Cooper, 1959). Inter-
row shallow cultivation helps control weeds but deep cultivation destroys
the shallow roots. It is seldom grazed, but generally cut for soilage or
silage at six- to ten-week intervals at a height of 25 cm; it is fertilized
with nitrogen as necessary. Generally less productive than elephant grass
(Pennisetum purpureum) and lower in nutritive value.
Despite the above remarks, workers in Suriname found that, after the
pasture was grazed for three years with rest periods of two months, a year
without grazing put the pasture into excellent condition (Appelman &
Dry-matter and green-matter
In Suriname it yielded 25 000 kg/ha of green matter in the
first year without fertilizer, and 10 000 kg/ha in the second year (Appelman
& Dirven, 1972).
Suitability for hay and
It is a choice hay plant and is usually managed for hay production
in the United States, although no more than 50-60 percent of the current
season's growth should be removed at any time during the growing season.
For quality hay, it is cut at 15-20 cm when the seed-heads start appearing
(Leithead, Yarlett & Shiflet, 1971).
It is susceptible to frost.
Response to photoperiod
Flowering is accelerated by short days (Evans, Wardlaw &
Tolerance to flooding
It does not tolerate standing water for long periods.
Compatibility with other
grasses and legumes
It is usually grown as a pure stand, and inclusion of legumes
Genetics and reproduction
2n=54, 70, 72 (Fedorov, 1974). It is a diplosporous apomict.
The grass is being quite extensively planted on rubber estates
in Malaysia as a soil conditioner in drained swamps, and for mulching.
It provides good fodder (Gilliland et al., 1971).
Leithead, Yarlett & Shiflet, 1971. | <urn:uuid:24947bad-a33d-4007-ac62-5f92e9632f0c> | CC-MAIN-2016-50 | http://www.fao.org/ag/AGP/AGPC/doc/GBASE/DATA/PF000335.HTM | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541220.56/warc/CC-MAIN-20161202170901-00144-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.895144 | 926 | 2.71875 | 3 |
The Foundations of Western Civilization course, offered by The Great Courses, can be the core resource for a one-semester high school level world history course. It consists of 48 video lectures running about 30 minutes each along with two short-essay questions for students to answer after each lecture.
The course’s 293-page guidebook, a downloadable PDF file, is essentially the script for the lectures, although there are minor changes or omissions in the guidebook. There are maps and a glossary at the back of the guidebook along with an extensive bibliography.
The guidebook should be very helpful if students need to go back to the course information as they answer questions. There is no answer key and there are no exams.
I envision students spending no more than two days per lecture watching the video and writing their answers to the questions. Since students should be dedicating about 60 hours to earn a half credit, some students will need to invest time in supplemental reading or other work to invest enough hours. You might consider having them tackle an in-depth research paper which would require sufficient hours while also providing something besides the questions for evaluation purposes.
The presenter for this course is Professor Thomas F. X. Noble, a teacher at University of Notre Dame. It seems almost certain from his language and familiarity with Catholicism, that he, himself, is Catholic. His presentation is somewhat classical in its outlook and treatment of ideas which isn’t surprising in a course that is about “western civilization.”
What makes this course especially good is that Noble makes connections between events, movements, philosophies, religions, culture, and technological advances that have shaped western civilization. He discusses underlying ideas, competing ideologies, and influences from both antiquity and religion. Particular emphasis is placed on the roots of western civilization in both the classical and Judeo-Christian worlds.
His treatment of religious topics might work for anyone who wants the inclusion of religion (Christianity) without either Catholicism or Protestantism being advanced. Professor Noble avoids polemics, instead providing a balanced treatment of Catholicism and Protestants, especially in his treatment of the Reformation era. The only exception might be his somewhat dismal view of Calvin’s teachings, although this is a very minor point in the course. Also, some Christians might take issue with what seems a liberal understanding of the Bible as he discusses the Old Testament. In spite of the fact that The Great Courses are supposed to be suitable for a broad audience that is largely secular, this course is likely to have much greater appeal for Christians rather than for a secular audience because of its extensive coverage of religious events.
The course covers up through around 1600 A.D., a point at which point Professor Noble says the “essential traditions of the western tradition have anchored themselves.” He lists those traditions as the Renaissance, the Reformation, a divided Christendom, interlocking political power relationships, and the scientific revolution.
This is a lecture-based course, probably very much like courses Professor Noble teaches in the classroom. It is filmed with at least two cameras, and Professor Noble moves around as he teaches. He occasionally inserts visuals, but not often. The content is very interesting even though the presentation is not exciting.
The course is available for purchase in either audio or video format, but prices range from about $250 to $520. (Click here to verify current prices.) The publisher frequently offers steep discounts that make purchasing courses more affordable. However, as long as you have the ability to stream the course, subscribing through The Great Courses Plus might be the most economical way to use it since the cost might end up costing only about $80 if a student completes it within five months. Subscribing through The Great Courses Plus also gives you access to many other courses at no extra cost. | <urn:uuid:08c58927-fd18-4b09-80c4-ef546b3715f2> | CC-MAIN-2019-09 | https://cathyduffyreviews.com/homeschool-reviews-core-curricula/history-and-geography/world-history-core-curricula/the-foundations-of-western-civilization | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247486936.35/warc/CC-MAIN-20190218135032-20190218161032-00149.warc.gz | en | 0.957761 | 781 | 2.84375 | 3 |
article describes the diseases of the skin, called "microbial eczema."His main symptoms were described in the early 19th century.Today, it is a fairly common skin disease.
What is eczema?It is a chronic pathology of the skin, which has ostrovospalitelnye symptoms and is accompanied by relapses.If a person begins to suffer from the ensuing skin irritation, rash, itchy, then it may be eczema.
especially should consider a visit to the doctor, if the application of an emollient cream relief comes.Eczema can be triggered by neuro-allergic causes.The old name of the disease is "weeping ringworm."About 40% of skin diseases are a variety of eczema.It often occurs in childhood and then becomes chronic.The reason may be inadequate or improper treatment.
Microbial eczema is a kind eczema clinical and divided into varicose, numulyarnuyu, posttraumatic eczema nipples.The emergence of this disease is triggered by weakened immunity with increased susceptibility of the human organism to staphylococcus or streptococcus.It microbial eczema is now widespread.What caused this?Medical experts explain this phenomenon by the fact that people today are more often exposed to various stressful situations.
This skin disease is usually accompanied by the appearance of a large number of bubbles.Merging together, they burst.At the same time the defeat of exposed skin, including the scalp.However, the main locations of disease - it arms and legs.If a person is careless about hygiene, sweating heavily, the foci of the disease may occur in the skin folds.
more likely to suffer lower extremity.Plots are located lesions on the skin that is inflamed.On it there weeping erosions, vesicles, purulent or serous papules.Outbreaks tend to blend into each other, they are not separated by areas of healthy skin.The emergence of this kind of rash accompanied by severe itching.Inflammatory foci, which provokes microbial eczema, developing, covered multiple purulent crusts.They are surrounded by areas periodically rejects layer.
above mentioned varieties of this pathology.If we talk about them in more detail, we can describe the following symptoms.
Varicose. is being developed in the presence of varicose veins, which accompanies chronic insufficiency of the veins.Microbial eczema this species may be triggered by factors such as trauma to the skin in areas of varicose veins, trophic ulcer and infected others.
Numulyarnaya (patchy, coin-like).Available rounded pockets (10-30 mm), having a distinct edge.Surface gipermirovannaya, weeping and edema.Her layers cover serrozno-purulent crusts.Usually localized to the skin of hands.
Posttraumatic. development going on around the different skin injuries.The pathology of this species may be due to the fact that the processes of healing and protective functions of the human body are too low.
Microbial eczema nipples .It appears due to frequent injuries of women's nipple during breastfeeding.Some patients get sick because of constant scratching scabies.
Treatment of the disease depends on its etiology, but, first of all, directed to the infectious focus and its elimination.In parallel, the therapy background process.
should be excluded from the use of sharp and salty dishes, as well as alcohol, bee products, citrus, and preservatives.Medications administered individually.As a general rule, apply antiseptics may be prescribed antibiotic agents. | <urn:uuid:9fb776de-a261-42c1-9539-ca11b1a070c5> | CC-MAIN-2021-21 | https://healthtipsing.com/en/pages/139713 | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991557.62/warc/CC-MAIN-20210517023244-20210517053244-00053.warc.gz | en | 0.937985 | 757 | 3.296875 | 3 |
Definition - What does Deprecate mean?
Deprecate is to criticize something or to express a disapproval over a subject. It is legal to deprecate something as long as it is based on truth and in a way that does not stand in the way of the ongoing free movement of another person.
Justipedia explains Deprecate
Deprecating behavior can be against civil law if it is done in a way that is public and is based on untruth. | <urn:uuid:defa3e0d-7fb3-41cf-8e27-12023ca3227f> | CC-MAIN-2019-39 | https://www.justipedia.com/definition/15552/deprecate | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572491.38/warc/CC-MAIN-20190916060046-20190916082046-00447.warc.gz | en | 0.937 | 97 | 2.859375 | 3 |
Food for Performance
Robert Luis provides advice on nutrition for optimal athletic efficiency.
Nutrition is critical for an athlete's overall health as well as their training requirements. A proper diet offers adequate energy and nutrients for an athlete to satisfy the requirements of training and activity. It aids in not only maximum performance but also recuperation.
Nutrition can help athletes perform better. The greatest approach to keep fit is to have an active way of life with an exercise regimen, as well as eat healthily. A healthy diet can help an athlete have the strength he/she needs to compete in a contest or simply enjoy a recreational sporting activity. When you are short on adequate rest, you are much more likely to feel weary and not perform well in sports. Also, if there is a deficiency in:
The optimum diet for any athlete is similar to the diet suggested for anybody in good health. However, they may need additional macronutrients and calories to sustain their power and energy levels to be at their competitive best.
Since athletes must consume appropriate calories and macros as well as additional vitamins, minerals, and micronutrients for optimal recovery and efficiency, they could also need more food overall. Additionally, they may be required to think about mealtime and hydration.
The following factors determine the quantity of each food category you require:
Because athletes tend to misjudge how many calories they burn each workout, it's critical to avoid consuming more calories than you burn exercising. Avoid strenuous exercise on an empty stomach to improve your performance. Because everyone is different, you will need to know:
Carbs or carbohydrates are given a lot of emphasis in sports nutrition because of their importance in athletic performance. Several athletes, particularly those involved in intensified and long time exercise, prefer to feed themselves with carbohydrates. This is because they provide sufficient glycogen reserves and blood sugar to meet the demands of the activity.
Athletes will require various quantities of carbohydrates based on their workout intensity to sustain muscle and liver glycogen reserves. Whole-grain bread, bagels, pasta and rice, are examples of complex carbs. Fibre, vitamins, energy, and minerals are all found in them. These foods have a low-fat content.
The overall amount of carbs you consume each day is the most important factor. Carbohydrates should account for slightly more than 50% of your total calories.
If you are going to be exercising for longer than an hour, you should consume carbs first. If you are going to perform longer than an hour of severe aerobic activity, you will also need carbs. If you have worked out hard, you will need to eat carbs afterwards to replenish your muscle's energy reserves.
Protein is also important in sports nutrition since it supplies the person with the amino acids it needs to create and restore muscle tissues. Carbohydrate reserves are utilised before the body using protein for energy. However, it is also a misconception that eating a high-protein intake would help you gain muscles. Athletes who engage in high-intensity exercise may profit from consuming more than double the RDA of protein in their daily diet.
An essential energy source while exercising is carbohydrates, not protein. Supplementing with amino acids and eating a high protein diet are not advised.
Protein sources that are good for you include:
Fats are required in the diet to keep physiological functions such as neurotransmitter activity and hormone synthesis running smoothly. Incorporating healthy fats into one's diet can also aid contentment and act as a targeted source of fuel for athletes who require a lot of stamina and energy. Some athletes may opt for a keto diet that includes a greater fat intake. However, the International Sports Sciences Association assessment concludes that there is insufficient data to support the diet's efficacy. Olive oil, oily fishes, avocados, nuts, and seeds are all good sources of healthy fats.
Supplements and micronutrients
A diverse, well-balanced diet may generally provide enough amounts of vital vitamins and minerals. Players should make sure they get the essential minerals and vitamins they require to stay healthy and perform well on the field. Certain athletes may use vitamin and mineral supplementation, as well as ergogenic enhancers like creatine. It's worth noting that certain sporting organisations prohibit the use of specific dietary supplements.
Fluids and water
Water is the greatest and most vital nutrient for athletes yet is constantly ignored. One of the most important things to hydrate the system and maintain at the proper temperature is fluids and water. In an hour of hard activity, your body might shed several litres of perspiration. When you have completely rehydrated, your urine will be completely clear. Some suggestions for maintaining enough fluid levels in the body involve:
Timing of meals
Meal and snack time can have a significant impact on athletic performance. Meal timing and composition can help you achieve your training objectives, minimise tiredness, and improve your body mass. Based on the style of athlete you are, the time and quantity of nourishment will differ. Many sports associations also emphasise the significance of ingesting protein before and after physical activity for athletes who participate in strength training.
On the other hand, stamina athletes would need to eat primarily carbs with a modest quantity of protein one to four hours before exercising. ACSM and ISSN point to the importance of meal timing in helping athletes recuperate and perform well, and they advise athletes to consume nutrients all through the day, each three to four hours. Some athletes may have stomach pain if they eat too soon to the start of their workout. As a result, it's critical to eat in moderation and avoid exercising too soon after meals.
Adapting nutrition to the style of sport
Athletes' dietary needs vary based on the sport they participate in. Although strenuous exercise might result in stomach discomfort, especially shortly before an essential exercise or race, those who do it at a high level can find it hard to eat adequate food to support their energy demands without experiencing GI distress.
For competitive swimmers, hydration and carb-loading are very important.
Simultaneously, it highlights the importance of eating readily digested carbs like bananas and spaghetti before events to minimise GI distress.
Hiring a sports nutritionist is as common and popular as sports betting nowadays. An athlete may require a sports nutritionist, and this person should be a certified dietitian. This will ensure that they follow a proper nutrition regime according to their sports requirement, consume adequate nutrients and chalk out a strategy as per their schedule and physical needs.
Achieving desired body weights through nutrition
You may change your current weight to increase your productivity, but you should do it carefully. Maintaining unhealthy body weight, reducing weight too rapidly, or avoiding weight growth in an artificial method can all have significant health consequences. Setting a reasonable target weight is critical. A licensed dietitian should be consulted by younger athletes who are attempting to shed weight. Developing bad eating habits by experimenting with your diets might lead to insufficient or excess consumption of essential nutrients.
Athletes must organise their food to achieve optimal productivity and fitness. They should think about their calories and macro as well as micronutrient requirements and consume a well-balanced diet rich in minerals and vitamins.
It is also important to stay hydrated and eat at the right times all through the day if you want to perform effectively. Certain athletes may use nutritional supplements. However, they must be aware of safety and effectiveness concerns and ensure that their athletic organisation permits use. You may speak with a sports nutritionist to get the guidance you need to have the best diet possible to support your objectives as an aspiring or pro athlete.
If you quote information from this page in your work, then the reference for this page is:
About the Author
Robert Luis is a Nutritional counsellor and writer. He writes about nutrition and its various facets. He contributes to news and research publications regarding health and nutrition. He is a firm believer in balanced diets as well as a holistic approach to wellness. He enjoys making nutritious meals and encourages others to explore a proper-rounded diet. | <urn:uuid:c9db29e9-b441-422a-b842-14a8bda7fd05> | CC-MAIN-2022-05 | https://www.brianmac.co.uk/articles/article655.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303868.98/warc/CC-MAIN-20220122164421-20220122194421-00080.warc.gz | en | 0.957321 | 1,681 | 3.25 | 3 |
- Subject index
Public opinion theory and research are becoming increasingly significant in modern societies as people’s attitudes and behaviors become ever more volatile and opinion poll data becomes ever more readily available. This major new Handbook is the first to bring together into one volume the whole field of public opinion theory, research methodology, and the political and social embeddedness of polls in modern societies. It comprehensively maps out the state-of-the-art in contemporary scholarship on these topics.
Chapter 17: Public Opinion and the Third-Person Effect
Public Opinion and the Third-Person Effect
Much contemporary theoretical research on public opinion is concerned not with actual but rather with perceived public opinion—that subjective form embodied in individuals' perceptions of the attitudes and beliefs of others. In many ways, perceived public opinion is the form that matters most. It is important because people will do many things—decide to vote, buy a new blouse, stop smoking, argue about politics, trade in that SUV, sell stock, cut down on pasta—at least partially in response to their perceptions of the opinions of others.
But where do perceptions about the opinions of others arise? How and why do people form these perceptions? Among the many possible answers to these questions is a communication phenomenon, ... | <urn:uuid:3eb766fb-c760-45ba-892f-381634da6871> | CC-MAIN-2021-04 | http://sk.sagepub.com/reference/hdbk_pubopinion/n18.xml | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506832.21/warc/CC-MAIN-20210116165621-20210116195621-00538.warc.gz | en | 0.94064 | 256 | 2.703125 | 3 |
The EPA and the Department of Transportation announced the rules in August. In 2021, vehicle manufacturers will start phasing them in. The rules require emissions be reduced by 25 percent by 2027. They apply to semi-trucks, large pickup trucks and vans, and all types and sizes of buses and work trucks.
The EPA expects the rules will lower carbon emissions by about 1.1 billion metric tons. And while they will add $27 billion in upfront costs, the agency says they will save vehicle owners fuel costs of about $170 billion, and reduce oil consumption by up to 2 billion barrels over the lifetime of the vehicles sold under the program.
The publication of the standards in the Federal Register starts a 60-day countdown to the date the rule takes effect.
The second-phase Clean Truck standards build on the first-ever first phase of GHG reduction and fuel efficiency standards for heavy-duty vehicles finalized in in 2011. These standards apply to model years 2014-2018. | <urn:uuid:027eea62-6353-48ab-accb-af510b23f668> | CC-MAIN-2017-43 | https://www.environmentalleader.com/2016/10/heavy-duty-vehicle-emissions-standards-published-in-federal-register/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824471.6/warc/CC-MAIN-20171020230225-20171021010225-00229.warc.gz | en | 0.940471 | 200 | 2.671875 | 3 |
The introduction to an essay provides the foundation for the entire paper, and it is imperative to write a well-structured introduction. Structure When writing an essay, you should start from a general idea or concept and work toward something specific. How To Write an Essay Introduction: Structure, Tips | EssayPro The best way is to start writing an essay with a broad explanation and lead your readers to something specific. At first, give general information and gradually narrow it down to your specific points. Part 2: Connections. After you have provided some background information, use your introduction to outline what you are going to talk about. 15 Ways to Write Your Introduction - Cengage nects to the thesis. Your goal is to introduce your thesis in a manner that is meaningful, engaging, and appropriate to your audience and purpose. 1. Analogy Artists are to their studios as scientists are to their labs. Artists experiment with color, texture, and medium to discern the different effects these elements have on the eye and mind. How to Start a Personal Statement | Gradschools.com
Even when you read different articles how to do your work successfully, you still can have some questions. Probably most popular one is "How to introduce my essay" or "How to get a good hook." And this question is smart enough because the introduction will make the first impression of your work. Writing an essay is an art.
How to Write Introduction for Assignment- Thesis, Essays ... Guidance to the students for writing their introduction of the different assignments is given by the Students Assignment Help. You can write best introduction for research paper, term paper, essay and thesis with these tips. Introduction Sentences for Essays: Examples & Overview ... Sometimes it is hard to know how to start an essay, but capturing a reader's attention is very important. In this lesson, we will explore various effective ways to begin essays, and also look at ... How to Write an Introduction for a Synthesis Essay Fast ... Use Examples to Learn How to Write an Introduction for a Synthesis Essay A synthesis essay uses a fairly standard format that consists of an introduction, a body and a conclusion. It is a format common to many essays, and one that should be familiar to most students. How To Start An Autobiography | eNotes
When you submit your essay, remember to include your name, contact information, and ID number if your college provided one, especially if you send it to a general admission email account. Nothing is worse than trying to match an application essay with no name (or, worse, an email address such as [email protected]) to a file.
Afterward, your informative essay introduction should reveal any background context that will be necessary for the reader to understand while reading through the essay. This is an essential part of your informative essay outline. These sentences should pay the way for an excellent thesis statement. Thesis Statement Introduction paragraphs - aso-resources.une.edu.au Introduction paragraphs are usually about 5% of your essay word count. In clearly-written sentences, the writer gives some background on the main topic; explains the academic problem and tells the reader what to expect in the rest of the essay. You can follow a basic pattern (recipe) for writing introduction paragraphs to help you get started. How to Write a Compelling Introductory Paragraph Don't let your essay start with a whimper. Instead, put it on the fast track to success with these four tips for writing compelling introductory paragraphs: 1. Don't write your introduction first. Maybe you have the perfect anecdote in mind for your introduction, or maybe you're experiencing the anguish of a stubbornly blank computer screen. How to write an introduction to the essay in FCE exam ... Writing an introduction to the essay in your FCE exam might be quite complicated, especially if you have no clue how to start, what to write, what words to use. On top of that you're even more puzzled when you see the prompts/notes, as you're probably not sure if you should write about them in the introduction or main body.
Starting Off A Reflective Essay Introduction - iWriteEssays
How to Write a Descriptive Essay on any Topic | ScoolWork Sticking to a recommended essay structure is the only way to properly outline and write it, paragraph by paragraph from the introduction to conclusion, without mistakes. Depending on the type of descriptive approach, your essay can be organized spatially, chronologically or by importance. How to Write an Introduction (College Essay or Paper) How to Write an Introduction (College Essay or Paper) Step 1 - Make It Part of Your Outline. The introduction often isn't included as you are... Step 2 - The First Sentence. The first sentence is often the most difficult for any writer. Step 3 - Plant the Hook. There are several different ways ... How To Write "Leadership" Essay (Writing Guide)
Every essay or assignment you write must begin with an introduction. It might be helpful to think of the introduction as an inverted pyramid. In such a pyramid, you begin by presenting a broad introduction to the topic and end by making a more focused point about that topic in your thesis statement.
Your entire essay will be a response to this question, and your introduction is the first step toward that end. Your direct answer to the assigned question will be your thesis, and your thesis will likely be included in your introduction, so it is a good idea to use the question as a jumping off point. An Essay Introduction Example | Scribendi The beginning of an essay sets the tone for the reader and is also used to get the reader interested in your work. Having a well-written introduction is critical to a successful essay. Some academics find the introduction to be the most difficult part of writing an essay, so our editors have written this example to help guide you. Profile Essay: Writing Guide With Examples The Introduction. This serves as a reflection of your whole essay. It does not require to be presented using many lines or paragraphs. It uses phrases and words that will make your introduction intriguing so that the reader can be engaged. Start with verifiable information then follow it with a brief explanation. How to Write a Basic Five-Paragraph Opinion Essay
How To Write A Scholarship Essay Introduction (w/ Example) Nov 27, 2018 · You must make your essay stand out. Your introduction should include the following three things: Attention-grabbing first sentence ; A short explanation for what you will talk about in your essay; The thesis statement in which you address the essay prompt; Your introduction should be short, sweet, and to the point. How to Write a Good Introduction - The Writing Center at MSU Mar 31, 2014 · Start your introduction broad, but not too broad. When I first started writing formal essays, I didn’t really know how broad to go with my intros. A brief paragraph on Hamlet would suddenly include irrelevant details about Shakespeare’s childhood, then grow out to be a history of Western literature, and then a history of the universe itself. | <urn:uuid:a6a487b5-bb0e-4019-853f-9fb417190ee4> | CC-MAIN-2021-21 | https://writezqkv.firebaseapp.com/thrash55199baz/how-to-start-your-essay-introduction-vyc.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991648.40/warc/CC-MAIN-20210514060536-20210514090536-00628.warc.gz | en | 0.924612 | 1,452 | 2.9375 | 3 |
According to Albert Einstein's theory of general relativity, black holes are uninhabitable chasms of spacetime that end in a "singularity," or a mass of infinite density. It's a place so bleak that even the laws of physics break down there. But what if black holes aren't so forbidding? What if they are instead some kind of intergalactic stargate, or maybe even a passageway into a whole other universe?
It may sound like the premise for a clever science-fiction movie, but new calculations by quantum physicists now suggest that the stargate idea might actually be the better theory. According to the startling new results, black holes do not culminate in a singularity. Rather, they represent "portals to other universes," reports New Scientist.
This new theory is based on a concept known as 'loop quantum gravity' (or LQG). It was first formulated as a way of merging standard quantum mechanics and standard general relativity, in order to remedy incompatibilities between the two fields. Basically, LQG proposes that spacetime is granular, or atomic, in nature; It is made up of miniscule, indivisible chunks about the same size as the Planck length — which roughly amounts to 10-35 meters in size.
Researchers Jorge Pullin from Lousiana State University, and Rodolfo Gambini from the University of the Republic in Montevideo, Uruguay, crunched the numbers to see what would happen inside a black hole under the parameters of LQG. What they found was far different from what happens according to general relativity alone: there was no singularity. Instead, just as the black hole began to squeeze tight, it suddenly loosened its grip again, as if a door was being opened.
It might help to conceptualize exactly what this means if you imagine yourself traveling into a black hole. Under general relativity, falling into a black hole is, in some ways, much like falling into a very deep pit that has a bottom, only instead of hitting the bottom, you get pressed into a single point — a singularity — of infinite density. With both the deep pit and the black hole, there is no "other side." The bottom stops your fall through the pit, and the singularity "stops" your fall through the black hole (or at least, at the singularity it no longer makes sense to say you're "falling").
Your experience would be much different traveling into a black hole according to LQG, however. At first you might not notice the difference: gravity would increase rapidly. But just as you were nearing what ought to be the black hole's core — just as you're expecting to be squashed into the singularity — gravity would instead begin to decrease. It would be as if you were swallowed, only to be spit out on the other side.
In other words, LQG black holes are less like holes and more like tunnels, or passageways. But passageways to where? According to the researchers, they could be shortcuts to other parts of our universe. Or they could be portals to other universes entirely.
Interestingly, this same principle can be applied to the Big Bang. According to conventional theory, the Big Bang started with a singularity. But if time is rewound according to LQG instead, the universe does not begin with a singularity. Rather, it collapses into a sort of tunnel, which leads into another, older universe. This has been used as evidence for one of the Big Bang's competing theories: the Big Bounce.
Scientists don't have enough evidence to decide whether this new theory is actually true, but LQG does have one thing going for it: it's more beautiful. Or rather, it avoids certain paradoxes that conventional theories do not. For instance, it avoids the black hole information paradox. According to relativity, the singularity inside a black hole operates as a sort of firewall, which means that information that gets swallowed by the black hole gets lost forever. Information loss, however, is not possible according to quantum physics.
Since LQG black holes have no singularity, that information need not be lost.
Related on MNN: | <urn:uuid:546c471a-adf0-45cf-b063-8a7851475324> | CC-MAIN-2018-09 | https://www.mnn.com/earth-matters/space/stories/black-holes-are-portals-to-other-universes-according-to-new-quantum | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816841.86/warc/CC-MAIN-20180225170106-20180225190106-00627.warc.gz | en | 0.958583 | 866 | 3.203125 | 3 |
Methods for analyzing the hydrogeological characteristics of the aquifiers in the vicinity of the Chornobyl nuclear power plant
The monograph contains results of the coordinated research project conducted by the International Atomic Energy Agency with the purpose to explore the use of new isotope techniques together with conventional ones to better assess the hydrogeological conditions in the geological settings of nuclear power plant sites and to provide basic information that may be used for predicting the fate of radioactive contaminants, such as tritium, released into groundwater in case of a radiological accident and/or during normal operations. To this end, research projects were conducted in ten countries to characterize the groundwater system in the vicinity of NPPs which are at different stages of development. The monograph contains the reports of these ten research projects and a summary of the achievements of the individual projects. The results of the determination of isotopes 18O, 2H, 13C, 14C, 3H, 3Hе, 4Hе and noble gases in water were used. The results of traditional hydrochemical analyzes and distributions of 90Sr, uranium, and transuranic elements in groundwater were also used. This CRP aims to develop guidelines for studying the hydrogeological characteristics of groundwater in local and regional groundwater systems in the vicinity of nuclear power plants using environmental isotopes and conventional techniques.
For scientists and engineers working in the field of hydrogeology, radioecology, and safety in nuclear energy, as well as for students and graduate students of geological and physical faculties of universities.
M. I. Panasiuk
I. O. Kovalenko
N. V. Sosonna
M. G. Buzynnyi
This post is also available in: Ukrainian | <urn:uuid:342c52b0-78ae-4502-93ee-86e059ef4764> | CC-MAIN-2023-14 | https://www.ispnpp.kiev.ua/en/methods-for-analyzing-the-hydrogeological-characteristics-of-the-aquifiers-in-the-vicinity-of-the-chornobyl-nuclear-power-plant/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948765.13/warc/CC-MAIN-20230328042424-20230328072424-00658.warc.gz | en | 0.920512 | 358 | 2.84375 | 3 |
An 1851 Colt “Navy” revolver wielded by Owen Brown, son of abolitionist guerilla John Brown, at the 1859 raid on the Harpers Ferry armory was stolen from the Chicago History Museum in 1948.
The revolver was part of a group of artifacts donated to the Chicago History Museum in 1917 by Frank Logan, a memorabilia collector who bought the weapon from Owen Brown’s sister.
“The pistol represents this very important moment in American history when slavery became the most divisive issue tearing the nation apart,” said Libby Mahoney, chief curator of the Chicago History Museum. “It’s not just your ordinary revolver.”
Someone swiped the gun from a museum display in 1948, she said. The museum still owns the gun’s holster and kept records of Logan’s donation and the gun’s serial number, she said.
He had no idea of its provenance. He bought it because the serial number indicated that it was an early issue revolver, one of the first guns purchased by the U.S. Army to arm its first two regiments, the first and second U.S. cavalry.
A decade after he bought, Hassinger read an article about the lost Owen Brown Colt in Man at Arms magazine. The article included the serial number, so he realized then and there that he had a weapon of even more historic import that he thought. He immediately accepted that he had to give it back, but he wasn’t sure how to go about it so he didn’t turn it in right away.
Eventually, a friend of Hassinger’s at the Soldiers & Sailors Memorial Hall and Museum in Pittsburgh connected him with officials at the Chicago History Museum and they arranged a handover. Last Tuesday, Robert Hassinger returned the Owen Brown revolver to Libby Mahoney.
The museum has no immediate plans to put it on display. | <urn:uuid:e4c53df9-0f9b-4a52-be24-da63405281ab> | CC-MAIN-2013-48 | http://www.thehistoryblog.com/archives/5382 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164972407/warc/CC-MAIN-20131204134932-00087-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.960696 | 400 | 2.59375 | 3 |
Polyphosphates for scale and corrosion control are among the few recognized substances which can be safely added to potable water to produce a significant improvement in many water quality parameters.
Bimetallic Zinc Polyphosphates Less Aggressive, Moderately Hard Waters
Zinc polyphosphates offer a variety of benefits. In addition to some of the traditional benefits offered by zinc orthophosphates, the polyphosphate component prevents scale and stabilizes soluble iron, manganese and calcium by sequestering these ions. Limited lead protection is obtained through hydrolysis of the polyphosphate to orthophosphate ion. Products in this category consist of a zinc salt combined with hexametaphosphate in a dry state.
Ortho Polyphosphate Blends Aggressive and Scaling Waters
These formulations consist of orthophosphates and polyphosphates blended together with approximately 30 to 70 percent orthophosphate content on a typical basis. The products are stabilized to ensure that the product maintains the ortho poly blend ratio as manufactured and require a somewhat lower treatment dosage compared to traditional applications used primarily for colored water and scale control.
Linear Chain Polyphosphates Scaling Waters
The linear chain types are the most effective sequestering agents and at sufficient dosages can "scour" a distribution line and remove existing deposition.
Silicate Phosphate Blends Aggressive and Scaling Waters
Primarily used in corrosive Eastern U.S. waters when use of zinc and phosphate is limited, silicate phosphate blends provide sequestering, moderate corrosion control, and limited lead and copper protection.
Orthophosphates Aggressive Waters
Used exclusively in aggressive waters, straight orthophosphates can be considered somewhat an extension of the zinc ortho's in that the blend ratio is so high that zinc has virtually been eliminated.
Zinc Orthophosphates Aggressive Waters
Zinc Orthophosphates as a technology provide the most effective and comprehensive corrosion inhibition. Zinc orthophosphates have traditionally been used to stop colored water caused by bleeding tuberculation and have a long history of success. This technology is very effective in aggressive waters with no source iron and manganese to sequester and where calcium stabilization and scaling are not a concern. Zinc orthophosphates have demonstrated particular effectiveness in providing effective lead and copper protection. Zinc orthophosphates reduce asbestos fiber counts and protect cement pipe.
These formulations consist of a zinc salt (either chloride or sulfate) combined with orthophosphate formulated in a wide variety of zinc to phosphate ratios ranging from 2:1 to 1:10. They function by two distinct mechanisms - film formation and electrochemical passivation. Zinc orthophosphates should never be fed to a water with a pH above 8.1 due to premature zinc precipitation. | <urn:uuid:701af7d8-bdef-4fc5-9bfc-89272e23c16e> | CC-MAIN-2014-15 | http://www.tramfloc.com/polyphosphates_scale_corrosion_control_2.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203422.8/warc/CC-MAIN-20140423032003-00035-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.911931 | 585 | 2.546875 | 3 |
In Chinese there is a phrase, which roughly translates into “Golden Walls Shine like Glory of the Sun”. I’ve used it many times before in school to describe ancient temples of China. As I stepped into the Royal Grand Palace in Bangkok, I knew, for the first time, what that phrase really meant.
Every visible inch of the exterior walls was covered with mosaic of shiny metals, gems, and ceramic tiles. The interior was painted with endless murals. Shiny and colorful, just like the city noise in Bangkok that overwhelmed one’s hearing; here, one’s vision was overloaded with intensity. It was dazzling and exotic.
Strange creatures emerged into legendary statues: a bird’s beak plus human torso, human hands, but with a pair of bird’s claws as feet, it was holding on to a three-head snakes. Flowing figures of women’s torso but with lion’s lower body and a elongated tail curved into an elegant wave. The Buddha¡¯s from Hindu culture, the statues of Chinese Gods, and even “farang” (foreigners) with bowler hats, they all guaranteed an equal footing in this holy land. It¡¯s a melting pot for Asian Culture. It is one tolerant nation. Gui said she had within one block distance saw a Hindu Temple, a Masque, and a Church. They were able to live peacefully together.
It reminded me of Tang Dynasty of China, when China was strong and confident enough to open its doors to foreign influence and allows all kinds of people and culture to pour in and then assimilated them all. As the only nation in Southeast Asia that had never been colonized, and nowadays slowly gaining back its economy stability after the glorious Asian Tiger years, Thai has its reason to be confident.
After experienced the tourists packed Grand Palace, it was such a welcoming relief to walk into this quiet temple a few blocks away.
The Gaudi-styled ceramic mosaic was enchanting. I wonder if we should’ve called Gaudi’s architecture back in Barcelona “Thai-like” stuff? This was the location of the original capital. In 17th century, Thai’s original capital in Ayutthaya was invaded, for the second time, by the Burmese who burned and looted Ayutthaya to the ground. Seven months later, a young Thai general Taksin who gathered enough military power, expelled Burmese occupier and established a new capital in Thonburi, where Wat Arun locates today. The next King Rama I who moved the capital to today’s Bangkok, on the other side of Chao Phraya river.
Here are more pictures… | <urn:uuid:9cd1b0b4-6beb-42a4-b161-1a2338da07cb> | CC-MAIN-2019-26 | https://jqzheng.org/weblog/?p=161 | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998808.17/warc/CC-MAIN-20190618163443-20190618185443-00143.warc.gz | en | 0.964152 | 573 | 2.640625 | 3 |
Elementary Grade 4 Curriculum
Grade 4 Curriculum
Students express an understanding of God’s goodness and gifts through the study of the Doctrine, Scripture, Ten Commandments, Beatitudes, and Sacraments. They will explore the role of prayer in their lives, learn the ways they can live their faith, and work together in their communities and their homes to make a difference in their everyday lives.
Language Arts consists of reading, writing, grammar, and spelling. The students are exposed to a variety of genre through the reading series, as well as trade books. There is a strong focus on the development of writing skills. Practice continues in the areas of grammar usage, spelling, vocabulary, as well as speaking, listening, and organizational skills.
The program consists of units in Life Science (the interactions of living and non-living things to their environments), Earth Science (the changes our planet undergoes and the effects), and Physical Science (a basic introduction to Chemistry and the Periodic Table Of Elements). Students are introduced to a variety of concepts, the Scientific Method, and hands on lab experiments. Study skills are also an important part of the curriculum. Note taking, reading for content, and organizational skills, in the form of maintaining a working binder, are imperative to student success.
Students will focus on success through incremental learning and continual review. Using this approach, students retain content and develop deeper understanding of concepts and how to apply them. Students are exposed to, and will comprehend, numeration, operations, fraction concepts, estimation, number theory, number sets, number systems, intensive word problem solving strategies, as well as an introduction of pre-algebra and pre-geometry. Daily facts practice, supplemental reviews, nightly practice, and weekly study groups ensure student success.
Students study the geography and the people of the United States. Using the textbook, directed lessons and research, students will gain an understanding of how to use and read globes, and various maps. They will identify the five regions of the United States, be proficient in United States geography and each of the region’s major natural features, resources, and climate. | <urn:uuid:46a10979-9c56-4a21-919e-9aeaed42e0d3> | CC-MAIN-2020-16 | https://stmaryschooldanvers.org/scholarship/elementary-education-grade-4/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371662966.69/warc/CC-MAIN-20200406231617-20200407022117-00146.warc.gz | en | 0.9381 | 439 | 3.8125 | 4 |
Tutorials Shared by the Internet Community
|Top Tutorials||New Tutorials||Submit||Login||Register|
Tutorial Basic Detail
Total Hits: 17001
Total Votes: 148 votes
Average Rating: 2.82 out of 5
Category: Python/Getting Started
Description:Python for Beginners. Learn to program in Python the easy way. This website is aimed for beginners of Python, but there is also content for the more advance programmer. | <urn:uuid:2a873d72-677e-42bc-b3bb-677beb330765> | CC-MAIN-2014-35 | http://www.tutorialspoint.com/rate/4240 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909034906-00256-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.66322 | 95 | 2.640625 | 3 |
Most municipalities have quite a few challenges on the agenda. Several categories play an important role. Many smart cities or smart cities to be are focused on improving the quality of life for the residents while also keeping up with technological advancements and sustainability.
There are environmental topics like climate change, waste processing, and air quality. Internet of Things devices and sensors help to measure statistics. They also serve to keep track of progress in both real-time and historical records. In the end, they intend to improve the quality of life for residents, the environment, and all other living things in the municipality.
Mobility represents another topic with challenges like traffic jams, parking challenges, and safety. Here, smart (IoT) applications like connected traffic lights, parking space counters, and many other connected applications provide insight into bottlenecks and areas to improve. It also provides (real-time) insight into current situations and helps with event management.
Many sensor technologies are employed to measure information which means large quantities of connected devices. They can swiftly become a costly and complicated infrastructure. The impact on residents can be huge. Related topics are access to renewable energy or internet access. Examples are endless in today’s fast-changing society.
A municipality is not ultimately responsible for all these matters. However, it does have a crucial directing power. The world, its cities, and residents are becoming increasingly digital, which strengthens the management function. A picture of the (near) future is provided by combining the correct data sources and executing analysis of existing data. The process could either be (partly) automated or fully manual.
In addition to their applications and data sources, a municipality is gaining more and more access to all kinds of data sources, whether public or not. A good example is citizen science, where residents actively participate in shared goals. Citizen science projects increase the amount of relevant data from external sources. Unlocking additional or multiple data sources at once is often quite a challenge. Not to mention using this data for predictions to timely act upon or embarking on technologies like artificial intelligence and machine learning.
With the modular and open-source solution 1OPTIC, a municipality can advance through the steps of the data maturity model.
Data access, data warehousing, data lakes, dashboarding, reports, automatic follow-up of notifications, geographical views, predictions, and much more are possible with 1OPTIC. Keep in mind that every journey of a thousand miles begins with a single step. In this case, to successfully take the first step of the data maturity model, the extraction of data itself should be in order.
See it for yourself
Discover how we can help your municipality thrive by using data in this digital age. | <urn:uuid:f49c31ae-36f1-4b5f-8db3-6172e913c763> | CC-MAIN-2023-50 | https://1optic.io/industries/smart-cities/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100448.65/warc/CC-MAIN-20231202172159-20231202202159-00658.warc.gz | en | 0.933433 | 553 | 3.203125 | 3 |
The web gives a demonstration of Bragg's diffraction Law in Java Applets written by Paul J. Schields. It illustrates scattering angles for interactive learning and an example of a diffraction pattern. It also describes what the Bragg's diffraction Law is, how it is derived and its application into the determination of crystal structure.
Paul J. Schields
Center for High Pressure Research
Department of Earth & Space Sciences
State University of New York at Stony Brook
Stony Brook, NY 11794-2100.
Summary by 何莉 on 2004-01-02
Last updated by 何莉 on 2004-01-02 | <urn:uuid:1c97c035-7ba3-4fa3-a883-2171c57f9b1c> | CC-MAIN-2020-45 | http://chemport.ipe.ac.cn/cgi-bin/chemport/getfiler.cgi?ID=P0idGNHZVRwry9Vj2PE5Db0vi7h1AirkRYWOZiyTnPzGDWGB47XtnlfE5oJKzJ9Y&VER=C | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107872686.18/warc/CC-MAIN-20201020105000-20201020135000-00461.warc.gz | en | 0.825885 | 142 | 3 | 3 |
This is bad news for biodiversity, the Amazon being one of the richest areas of the world in terms of wildlife. It’s also bad news for climate change. The Amazon is the world’s largest carbon sink, and the cooling effect can be felt in weather patterns around the world. As things currently stand, we’re not only losing that carbon capture capacity, but contributing inordinate amounts of CO2 into the atmosphere as well. 20% of global CO2 emissions are from deforestation.
While some Amazonian deforestation is for timber, the primary cause is cattle ranching. Brazil’s beef industry is really quite formidable, as a Greenpeace report exposed earlier this year. They are the world’s largest exporters of beef and leather, an industry worth $7 billion a year. With that kind of money being made, cattle ranching enjoys full government support. The Brazilian government is a key investor in cattle products, and they intend not just to continue, but to expand production. A third of the world’s internationally traded beef already comes from Brazil, and it is their stated aim to raise that to two thirds by 2018.
To feed this massive industry, ranchers burn off sections of the forest. The newly exposed land is either used for grazing, or to plant soya for use as a feed crop. Cattle ranching itself is a polluting business – around 10% of global greenhouse gas emissions (pdf) are from livestock, a fact often overlooked because the emissions are methane rather than CO2. If deforestation carries on at this rate, the Amazon will be leveled and climate change will be unstoppable… for hamburgers.
The driving force behind all of this is the world’s growing appetite for meat. In the West, meat was reserved for special occasions, Sunday lunch and so on. As standards of living have risen, so too has meat consumption. It has gone from luxury to necessity, and you can now enjoy meat products in every meal, and even snack on it in-between. At the same time, countries that have not traditionally eaten meat are westernizing. In 1980, the average Chinese person ate 20kg of meat a year. Today that figure stands at 54kg, and across the developing world meat consumption is rising at around 5% per year. To those two factors we need to add a rising global population – 28.5 million new mouths to feed per year. Put it all together and you have a runaway meat wagon.
Our only real option then is to eat less meat, but we could also eat different meats. Chicken and pork are both more efficient sources of protein than beef, but we could a step further than that, and that brings me to the turtles. I know what you’re thinking – aren’t turtles endangered already? But there’s more than one kind of turtle. I’m talking about Amazonian river turtles. Already eaten by local people, river turtle is considered very tasty. They can grow up to a metre long and weigh 50kg a full size, and while they are currently hunted unsustainably, they can also be farmed.
Kept in ponds or large concrete tanks along the Amazon’s floodplains, there is no reason why turtle farming couldn’t become a pretty large-scale industry. Biologist E O Wilson, in his book The Diversity of Life, estimates that turtle farming could yield 25,000 kg of meat per hectare (22,000 pounds per acre). That’s 400 times more meat than beef in the same amount of space.
Will turtleburgers save the Amazon? No, not really, but it illustrates the kind of solutions that we will need to solve our unsustainable meat-eating habits. Farming the turtle would protect the wild ones and conserve the seven different species. It would also work with, rather than against, local customs. People need jobs, and limiting cattle ranching and making the forest off-limits would be met with serious opposition or encourage illegal activity. It’s better to create attractive alternatives, and work in partnership with existing communities and their traditions. Thirdly, it would diversify exports, which is good for the economy, and good for global food security too.
There’s no one answer to how we will provide the world’s growing population with enough protein, but dozens of potential solutions. We don’t all need to be vegetarians, but eating less meat is a good starting point. Then there are uncommon meats that can be scaled up to commercial production, such as kangaroo. Community chicken farms could become more common, or the small-scale fish farming of species like tilapia. Fans of wild meat often say there is spare capacity in the game market, if more people ate rabbit or pheasant. If consumers can be persuaded, locusts are eaten across Africa and Asia, and insects could be a useful food source. One thing’s for certain - the menu of the future looks pretty interesting. One McTurtle to go please.
More cool stuff on Celsias: | <urn:uuid:617c3d95-705b-4638-bb80-9c81916a11cd> | CC-MAIN-2015-35 | http://www.celsias.com/article/could-turtleburgers-save-amazon/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644062760.2/warc/CC-MAIN-20150827025422-00205-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.958383 | 1,046 | 3.03125 | 3 |
From: Stephen Hardy MBE, Trustee, CPRE Sussex, George Close, Robertsbridge
A new report published this Monday by the UN Intergovernmental Panel on Climate Change (IPCC) warns that the world is completely off track to keep global temperature rises to the preferred target of 1.5 C.
The report highlights that without drastic and urgent changes to energy systems, the way we manage land, the food we eat and the transport we use, the world is instead heading towards a temperature rise of 3 C and disaster.
CPRE Sussex warns that the countryside will be on the front line against issues caused by rising temperatures. We call for rural communities and businesses to lead the way to a zero carbon countryside – to ensure that everyone who lives, works and enjoys, and that includes town and city dwellers, its beauty and benefits are able to do so for generations to come.
From fracking to farming, transport to landscape, climate change is the greatest threat facing the countryside.
This report from IPCC is crystal clear – there can be no opt-outs from tackling climate change and tackling it urgently. Especially relevant is the recent decision by Government to making fracking easier.
East Sussex with its Areas of Outstanding Natural Beauty is under serious threat to be fracked. The warnings in the IPCC report demonstrate absolutely why this ill-thought out Government policy must be changed and changed immediately. We must speed up the transition to renewable energy – we simply cannot be creating a whole new carbon-emitting fossil fuel industry.
Drastic measures are needed, but there is still a window of opportunity if we act fast, focus on investment in renewables, energy efficiency and decarbonising the farming sector, we can ensure rural communities play their part in achieving the level of change required.
We owe it to future generations to ensure the countryside they inherit is sustainable, biodiverse and thriving.
CPRE Sussex urges policymakers, that means our local MPs and councillors, to take note of the ‘unprecedented nature of the changes’ described in the report, and act swiftly to ensure that the Sussex countryside is protected into the future and we can hand on a legacy of a sustainable, economically active and still precious countryside to our children and grandchildren. | <urn:uuid:bf9e05b3-b5ce-41e0-920e-8cdb99f63294> | CC-MAIN-2018-51 | https://www.ryeandbattleobserver.co.uk/news/your-say/sussex-is-under-serious-threat-with-climate-change-1-8666533 | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823236.2/warc/CC-MAIN-20181210013115-20181210034615-00092.warc.gz | en | 0.922634 | 452 | 2.78125 | 3 |
Many people think that asthma is a respiratory problem which affects the lungs, throat and nose, exercise or any physical activity rise the heart rate and may cause them to suffer from number of asthma symptoms and cannot be used as asthma cure.
That’s why people think that asthma and exercise do not go together.
The main symptoms of asthma include difficulty in breathing and tightness in the chest.
It is necessary to experiment how much exercise you can tolerate for asthma cure.
Asthma and exercise:
- Exercise is important for asthma cure, but you must start off gently. You start with gentle walk on fine weather as exercise in cold weather may do harm than good. Slowly you can increase the distance and try to walk faster so that your heart rate increases slightly each time.
- If you have mild asthma, you can swim or jog rather than walk and you can add minutes to your daily work routine until you begin to feel that it is affecting your breathing. Exercise helps to stay in shape and helps in asthma cure.
- Perform some kind of physical activity daily in order to keep your lungs in the best proper form for asthma cure. Even though your airways are affected by allergies and irritants, you need proper medication to work them properly for asthma cure and your lungs need to be kept in the proper function.
- If you are suffering with asthma, include exercises such as swimming, jogging, cycling and light aerobics which can help for asthma cure. Before starting any exercise, consult your doctor and discuss the problems you may face with asthma and exercise.
- Yoga can be done without any strain which tones your muscles and teaches to breathe properly and is the best asthma cure. It relaxes your body and improves your breathing. It is a great stress reliever and practicing yoga can control your emotions.
- Breathing exercises are great for asthma cure which strengthens the lungs and the airways that lead to the lungs. Practice breathing exercises regularly to help improve the condition of lungs and preparing them for physical activity.
Strengthening the lungs is the main part of the asthma cure as you feel the physical activity easier with strengthening of lungs. Don’t force yourself with too much exercise as it can make the problem worse.
If you don’t want to perform exercises, play with your kids or walk with your dog as it is one of the steps of asthma cure. What ever you do, it should work on your lungs to make them strong.
Exercise helps you to feel better and helps to stay in shape. It also makes you confident and makes it easier for asthma cure. Exercise is important for everyone and particularly for asthma patients as it keeps you in shape and helps in reduction of weight. If you are in good shape with proper weight, your body can withstand illnesses including asthma.
Asthma and exercise should go hand in hand for controlling the condition and for asthma cure. | <urn:uuid:f64f9d59-a8eb-4c9b-9039-ede834d78b41> | CC-MAIN-2018-47 | http://www.allergyasthmazone.com/controlling-and-living-with-asthma/exercise-and-stay-in-shape-for-asthma-cure/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039750800.95/warc/CC-MAIN-20181121193727-20181121214804-00002.warc.gz | en | 0.961943 | 590 | 3.015625 | 3 |
The Meaning of Advent
Advent is the season in the Christian year of preparing to celebrate the birth of Jesus Christ. It begins four Sundays before Christmas and ends on Christmas Eve. Advent is a time to remember our longing and need for a Messiah, as well as look forward to our Savior's second coming. The word "advent" comes from the Latin word adventus, meaning "coming." During the Advent season we wait and hope in prayerful expectation, crying out together, "O Come, O Come, Emmanuel."
In the midst of holiday celebrations, Christmas carols, and exchanging gifts, Advent is meant to be a time of remembrance. In Advent we remember that we live in darkness and exile. We remember that we are crying out to God to save us. We remember that God promised us a Messiah and a new reign. We remember that the promise to us is Jesus Christ who has come and will come again.
Some people grow up with Advent traditions. For others, the concept of Advent may be new. Observing Advent can not only enrich your celebration of Christmas, but it can also be a powerful, shaping experience in your spiritual growth and relationship with God.
How to Observe Advent
As you prepare for Christmas, you may want to consider observing Advent through the practice of using an Advent wreath. For hundreds of years, Christians have used an Advent wreath and candles to inspire their anticipation and hope for the coming of Christ at Christmas. Through lighting candles, reading from the Bible, and praying, we remember the meaning of Christ's birth, and allow God to prepare our hearts to welcome Christ into our lives.
There is no set meaning for the candles of the Advent wreath, except for the center "Christ candle," which always signifies the birth of Christ. Some people see the candles as pointing to peace, joy, hope, and love. Others may have the candles symbolize key figures in the birth story of Jesus, such as Mary and Joseph, the angels, the wise men, and the shepherds.
I've created a guide for personal, family, or corporate worship that can accompany the lighting of the candles of the Advent wreath. You can use a real Advent wreath and candles, or simply make your own. In the center of the wreath, a white pillar candle like this one can be used. I encourage you to adapt the guide in whatever way fits you and your community best.
Weekly Advent Readings
Click on the links below to print and download. Or click here to sign up and have them sent to your inbox.
Advent Readings and Prayers Week 1: Waiting
Advent Readings and Prayers Week 2: Forgiveness
Advent Readings and Prayers Week 3: Joy
Advent Readings and Prayers Week 4: Coming of Christ
Advent Readings and Prayers: Christmas Celebration
Lord, help us to celebrate the season of Advent, and prepare for the coming of Jesus into our lives.
How do you celebrate Advent? Are there other ways that you prepare for Christmas? Please share in the comments.
Sign up for my Weekly Notes sent to your inbox.
Plus you get my FREE printable Traveler's Prayer Guide! | <urn:uuid:ad8adea9-58f8-4690-a903-6f8f65d5ef49> | CC-MAIN-2020-05 | http://www.larissamarks.com/blog/archives/11-2016 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594333.5/warc/CC-MAIN-20200119064802-20200119092802-00380.warc.gz | en | 0.921185 | 662 | 2.8125 | 3 |
That’s a dismal statistic, for the healthy characteristics examined in this study play a key role in reducing the risk of heart disease, type 2 diabetes and some cancers — leading causes of premature death and disability in the United States
Those four characteristics are 1) 150 minutes a week of moderate or vigorous exercise, 2) a diet that scores in the top 40 percent of the Healthy Eating Index, 3) a body fat percentage under 20 percent (for men) and 30 percent (for women), and 4) not smoking.
Not exactly onerous.
“This is pretty low, to have so few people maintaining what we would consider a healthy lifestyle,” she added. “This is sort of mind boggling. There’s clearly a lot of room for improvement.”
How the number was reached
For the study, Smit and her colleagues used data collected from a nationally representative sample of 4,745 adults, aged 20 to 85, who participated in the National Health and Nutrition Examination Survey between 2003 and 2006.
All four healthy characteristics were objectively measured. Participants wore an accelerometer for a week to measure their physical activity. They filled out two 24-hour food diaries to determine their dietary score. Their body fat was measured with X-ray absorptiometry, which is considered a more accurate measurement tool than body mass index (BMI). And their smoking status was determined not by the participants’ say-so, but by the levels of cotinine — a marker for exposure to tobacco smoke — in their blood.
That data revealed that 71.5 percent of the participants were nonsmokers, 46.5 percent received enough exercise and 37.9 percent followed a healthy diet, and 9.6 percent had a “normal” body fat percentage.
It also revealed that only 2.7 percent of the survey’s participants had all four healthy lifestyle characteristics, and 11 percent had none. As for the rest, 16 percent had three characteristics, 37 percent had two, and 34 percent had one.
Different demographic groups were more likely to have particular characteristics. Women, for example, were more likely to not smoke and to eat a healthy diet than men, but were less likely to be sufficiently active. People aged 60 and older were more likely to not smoke and eat a healthy diet than younger individuals, but they were less likely to not be overweight and to get enough exercise.
The study also broke the data down by three ethnic/racial groups: non-Hispanic whites, non-Hispanic blacks and Mexican Americans. Mexican Americas were found to be more likely than whites or blacks to consume a healthy diet. The study also found that blacks, particularly black men, tended to have the fewest number of healthy lifestyle habits.
Impact on markers for heart disease
The researchers also compared the healthy characteristics to 13 biomarkers for cardiovascular disease, such as blood pressure and levels of cholesterol, glucose and homocysteine. (The presence of a biomarker for a disease doesn’t mean that someone has the disease; it simply suggests that they person may be at an increased risk of developing the disease.)
The data revealed, perhaps not surprisingly, that the greater the number of healthy characteristics people had, the more they were likely to have biomarkers with favorable measurements.
But they also found that some healthy characteristics appear to be more important for specific risk factors. The strongest characteristic linked to favorable high-density lipoprotein (HDL) cholesterol levels was body fat percentage, for example, while for homocysteine levels, it was a healthful diet and not smoking.
‘A million dollar question’
So, why do so many of us — despite all the public health campaigns — fail to adopt all four of these basic characteristics of a healthy lifestyle?
“That is the million dollar question,” Smit told Huffington Post Erin Schumaker.
Smit cited a long list of possible contributing factors, including not having enough time to exercise or to cook healthful meals, not having a safe environment for exercising, needing a car to commute, and the marketing of unhealthful food.
Interestingly, that list suggests that if we truly want to help people get healthier, we need to not only encourage individuals to adopt healthier behaviors, but also to instigate major changes in how our society and communities are organized and run.
FMI: The study can be read in full at the Mayo Clinic Proceedings website. | <urn:uuid:447b5f4f-8931-4a04-8f15-0b00d998990f> | CC-MAIN-2019-39 | https://www.minnpost.com/second-opinion/2016/03/only-27-americans-meet-all-four-basic-healthy-living-goals-study-finds/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572516.46/warc/CC-MAIN-20190916080044-20190916102044-00056.warc.gz | en | 0.970174 | 917 | 3.328125 | 3 |
This classic image of the USS Los Angeles shows what would happen when a gust of wind caught the backend of a moored airship. It could literally turn a 656-foot big blimp vertical. Amazingly, no one was hurt.
It looks like a laughably ginormous bomb was about to be dropped on top of a radio tower, doesn't it? But more seriously, it happened because a cold air front lifted the airship's tail before the airship could swing around the mast. This 1927 incident showed the risks involved with high mooring masts, risks that the Navy eventually would address and make safer. [Naval History via Flickr via BoingBoing] | <urn:uuid:a353c58d-b7b3-4da2-bc8d-ec9dc80e960a> | CC-MAIN-2014-10 | http://gizmodo.com/5706011/an-airship-probably-shouldnt-look-like-this-right?tag=imagecache | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642168/warc/CC-MAIN-20140305060722-00082-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.969029 | 141 | 3.125 | 3 |
Psychological illnesses are underestimated and oftentimes, ignored by our society.
In fact, due to a lack of education about mental disability, we have developed a stigma that it's ''all in your head''. Despite this sentiment being commonplace, people normally make fun of mental illness as though it’s a commonplace, nothing-to-worry about type of situation.
However, it's actually one major issue that needs a solution - a concrete one.
In fact, the World Health Organization (WHO) discovered some surprisingly alarming facts - about 450 million worldwide are experiencing some sort of psychological illnesses.
And to put it in greater perspective, around 1 in 4 people will experience a psychological condition at some point in their life.
This makes it one of the leading causes of disability across the globe. And it’s not just a personal issue, but also a business one as well. The American Journal of Psychiatry noted that serious mental illnesses cost the United States $192.2 billion lost income annually.
Through today, many individuals suffering from mental illness have desperately battled to find relief.
Could cannabis be a catalyst?
Many believe it to be so.
There are many testimonies and inspirational stories surrounding cannabis use and relief of mental illness.
For example, some individuals say that cannabis provides relief from anxiety by way of a soothing effect helping ease their minds.
Interested in learning more about how cannabis can help relieve symptoms of mental illness? We’ve put together a list of the top 6 psychological illnesses that can benefit from cannabis use.
Depression is a feeling of constant, inconsolable sadness and is one of the most common psychological illnesses (often left unseen).
Affecting approximately 300 million people across the globe, depression is a severe feeling of sadness and lack of energy, oftentimes resulting in self-harm. About 800,000 people die from suicide annually, with depression being the second leading cause of death among 15-29 year-olds.
People who have gone through huge, unexpected changes in their lives can suffer from depression. These can include unemployment, loss of a loved one, traumatic events, dropping out of school, or even other illnesses that affect a person's capacity to interact with others.
Depression can also lead to other illnesses, whether psychological or physical.
While the medical sector provides treatments to counteract and repel depressive episodes, fewer than 10% of those suffering from depression receive treatment.
Some even claim that these treatments are unable to help them cope with depressive episodes. From a study published in the journal, “Frontiers of Psychology”, 25% of people taking medication to ease depression suffer from a relapse. And for those who have stopped taking anti-depressents, 42% will suffer from a relapse.
Looking for an alternative to traditional treatment has led more people to turn to cannabis for depression relief. A 2016 study by Linge reported that CBD (cannabidiol) exerts quick and maintained effects relieving depression - similar to the effects created through use of antidepressants which explains CBD's ability to ease depressive episodes.
Research conducted by Denson and Earleywine back in 2006 aimed to dichotomize patients with depression that frequently used marijuana versus those who who didn’t.
Over 4,400 adult internet users completed this survey - many of whom were severely-depressed marijuana users.
Weekly users of cannabis reported a lighter mood and improved depressive episodes when compared to those who did not. These individuals who used cannabis once or twice had lesser somatic complaints and better “psychological harmony” than those that did not smoke cannabis.
Want to learn more about depression and how CBD can help? Click here
Post Traumatic Stress Disorder
Also termed manic-depressive illness, this disorder is a roller-coaster ride between extreme happiness and excitement (mania or hypomania) and rock-bottom, dreadful sadness (depressive).
People experiencing the depressive episode of bipolar feel incredibly sad and hopelessness, losing interest in their hobbies and dissociating from others. When their mood shifts to mania or hypomania, these individuals feel incredibly happy and enthusiastic. They usually are full of energy, but can get agitated easily.
These unpredictable mood swings can strike anytime affecting the patient’s sleep pattern, energy levels, judgement, and their behavior.
With 5.7 million American adults suffering from this disorder, it’s not an illness that society can just ignore. Contrary to the myth that it is a rare condition, a study from the Columbia University showed that those diagnosed with bipolar disorder are rapidly growing in number, especially in children and adolescents.
Mood stabilizers, anti-depressants, antipsychotics, and psychotherapy are some of the most used treatments to eradicate and neutralize bipolar disorder. While these treatments are readily available in the market, as with other mental health conditions, some patients still struggle to find the “right” cure.
As you may guess, cannabis is one such cure that many have turned to, and for good reason.
One study, examining 74 adults with bipolar I disorder, found that marijuana had the ability to alleviate symptoms of mood changes for those suffering from the condition. Another such study, led by Gruber in 2012 had similar findings. Examining 43 adults, Gruber’s team found that marijuana use led to significant improvement in participants’ mood and significantly reduced mood disturbance within the group.
One individual we spoke with, Kathy, experienced similar positive results when using cannabis to help with her PTSD, bipolar & anxiety disorders, and weight loss.
And that brings us to…
Borderline Personality Disorder
Characterized by an intense fear of being alone and having rapid, intense mood changes, Borderline Personality Disorder (BPD) is one psychological illness that often looks normal to others.
However, people with BPD often feel as though they aren’t good enough, and hold an intense, unrealistic fear of being abandoned.
These individuals are usually impulsive and easily angered. However, most people that are unaware of this psychological illness presume that the individual is suffering from an ordinary “mood swing”. And underneath it all, these individuals diagnosed with BPD can suffer from periods of stress-related paranoia that leads to a desire for self-harm.
This lesser-known psychological illness affects more than 14.7 million adult Americans in about one point in their lives, with around 1.6% of America’s population suffering from BPD. Though it might sound smaller in number when compared to other disorders, 70% of individuals diagnosed with BPD have attempted at least one suicide in their lifetimes.
Behavioral therapies and prescription drugs that help with calming BPD sufferers are given to address symptoms that can lead to the worst effects, but can also lead to many negative side-effects. While some are able to tolerate high dosages of prescription drugs typically used to treat this disorder, not all can, and this is where cannabis can come into play.
Cannabidiols (CBD), found in cannabis, provide people with the ability to calm down. CBD, when introduced to a BPD patient, can reduce symptom severity without too many of the side-effects found in normal prescription drugs.
Psychosis includes symptoms such as paranoia, delusions, hallucinations and violence, paired with disoriented thoughts and speech. Patients suffering from psychosis can find themselves at a total disconnect from reality, making it hard for them to live a normal life.
These individuals often have fewer chances to socialize as they can become violent.. Symptoms can range from having unusual, surreal beliefs and changes in perception and behavior, to a range of hallucinations and delusional thinking. Untreated and severe depression can also be considered a mild form of psychosis.
Recently, CBD has caught the eye of researchers studying psychosis. Philip McGuire, of King’s College of London’s Institute of Psychiatry, found that prescription anti-psychotic drugs mainly alleviate psychosis through blocking of dopamine receptors. However, Philip has emphasized that the industry is in need of new treatments that target other neurotransmitter systems which are also responsible for causing psychosis.
In one blind clinical trial, 88 randomized schizophrenia patients were observed within a six-week period. Half of the group received their prescription drugs, while the other half received their every day dose of 1000mg CBD extract in combination with their prescription medication.
The study showed that the patients who have been given CBD along their usual prescription medication performed better. Their psychotic symptoms were more often found to have subsided and were thus labeled to be “not severely unwell”.
McGuire elaborated that CBD represents a different class of treatment as shown in the study. The study indicated that CBD might be a treatment for psychosis, contrary to the common stigma that cannabis worsens the mental condition.
Psychological disorders are prevalent throughout society, but often overlooked as a condition of minor significance easily overcome.
However, as the world has become increasingly aware of the needs of those with these disorders, there has been a realization that traditional prescription drugs might not be enough for some.
For many, cannabis and CBD have provided for much needed relief, and even might have saved their lives.
We’ve put together a list of the top 6 mental illnesses that benefit from cannabis use, including:
- Anxiety Disorder
- Post-Traumatic Stress Disorder
- Bipolar Disorder
- Borderline Personality Disorder
Many individuals diagnosed with these disorders have reported that cannabis and CBD usage have benefited their lives.
Could cannabis be what’s needed to combat these mental illnesses?
The world is increasingly saying, “yes it is”.
Let us know how cannabis usage has affected you or someone you know in a comment below! | <urn:uuid:249752b9-40ec-43cc-a40c-36e647b63f3a> | CC-MAIN-2019-09 | https://aspengrowbox.com/blogs/blog/top-6-mental-illnesses-that-benefit-from-cannabis-use | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247496694.82/warc/CC-MAIN-20190220210649-20190220232649-00522.warc.gz | en | 0.953098 | 2,003 | 2.75 | 3 |
Explanation of SWOT
Businesses analyze SWOT -- strengths, weaknesses, opportunities and threats -- for strategic planning. Performing a SWOT analysis of your own business helps you better understand your business and market conditions, and can help you clarify your future course of action.
Meaning and Purpose
The four elements of a SWOT analysis represent the environment that a business operates in. The purpose of a SWOT analysis is to recognize how the firm is positioned according to these elements. This allows a business to develop a strategy that emphasizes strengths and opportunities while minimizing weaknesses and threats.
Strengths and Weaknesses
Strengths and weaknesses are the internal elements of a SWOT analysis, meaning they are elements under the business' control. Strength is an internal element that gives the business an advantage over its competitors, such as a superior product, a highly trained staff or excellent brand recognition. Weaknesses are internal elements that place the business at a competitive disadvantage, such as poor product quality, incompetent employees and poor brand recognition.
Opportunities and Threats
Opportunities and threats are the external elements in the SWOT analysis. They are the elements outside of the business' control and include changes to the economy, actions by competitors and changes in consumer demand. An opportunity is an external advantage on which the business should capitalize. For example, a growing demand for eBooks presents a new opportunity for a small publisher. A threat is an external element that poses a risk to the business; a competitor launching a superior product poses a threat to your business.
Responding to SWOT
A SWOT analysis gives you a picture of how your business fits into the market, but you shouldn't stop there. Once you understand your position, create a plan to deal with it. Plan to use your strengths to take advantage of opportunities. If your strength is product design, use it to design a product that the market is demanding. Aim to minimize threats where you have weaknesses. If your competitor launches a high-quality product to compete with your low-quality product, improve your product quality to eliminate that weakness. | <urn:uuid:76c3d7c8-38b6-42fd-8258-aa7ea52cf757> | CC-MAIN-2022-49 | https://smallbusiness.chron.com/explanation-swot-55156.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708010.98/warc/CC-MAIN-20221126144448-20221126174448-00432.warc.gz | en | 0.946137 | 434 | 3 | 3 |
Clusters and Availability
One or more instances of Couchbase Server constitute a cluster, which replicates data across server-instances, and across clusters; and so ensures high availability.
A Couchbase cluster consists of one or more instances of Couchbase Server, each running on an independent node. Data and services are shared across the cluster.
When Couchbase Server is being configured on a node, it can be specified either as its own, new cluster, or as a participant in an existing cluster. Thus, once a cluster exists, successive nodes can be added to it; each node running Couchbase Server. When a cluster has multiple nodes, the Couchbase Cluster Manager runs on each node: this manages communications between nodes, and ensures that all nodes are healthy. The Cluster Manager provides information on the cluster to the user interface of Couchbase Web Console.
Services can be configured to run on all or some nodes in a cluster. For example, given a cluster of five nodes, a small dataset might require the Data Service on only one of the nodes; a large on four or five. Alternatively, a heavy query workload might require the Query Service to run on multiple nodes, rather than just one. This ability to scale services individually promotes optimal hardware-resource utilization.
Data is automatically distributed across a cluster by Couchbase Server: applications are not involved. Each defined bucket is stored by the Data Service as 1024 vBuckets (virtual buckets), which are spread evenly across all available Data Service nodes. Documents are stored intact within vBuckets. vBuckets can also be replicated, across the cluster, by means of the Database Change Protocol; with each replica always existing on a node different from that of its original.
Couchbase Server automatically handles the addition and removal of nodes, and the failure of nodes; such that no data-loss occurs. vBuckets and their replicas are redistributed across available nodes whenever a change of configuration is detected.
High Availability is achieved by means of Cross Datacenter Replication (XDCR); whereby the contents of a bucket can be selectively replicated to a bucket maintained on a remote cluster. Additionally, Server Group Awareness allows groups of nodes to be defined, within the cluster, to protect the cluster against significant infrastructure-failure. | <urn:uuid:b32a3548-a0ac-4a8b-8a73-a6ad4078d06c> | CC-MAIN-2022-49 | https://docs.couchbase.com/server/7.0/learn/clusters-and-availability/clusters-and-availability.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710534.53/warc/CC-MAIN-20221128171516-20221128201516-00139.warc.gz | en | 0.893944 | 465 | 2.875 | 3 |
New Delhi: While 40 per cent of Indian parents allowed their children to access the internet before age 11, 54 per cent of them fear that their children are more likely to be bullied online than on a playground, a Norton by Symantec study revealed the report.
The findings from the “2016 Norton Cyber Security Insights Report: Family Edition,” shed light on parents’ perceptions of cyber bullying and the preventative measures to protect their children.”A concern for many parents is that cyber bullying doesn’t stop when their child leaves school – as long as your child is connected to a device, a bully can connect to them,” said Ritesh Chopra, Country Manager, Norton by Symantec.
The report also pointed out that 71 per cent parents thought their children would download malicious programmes or a virus, 69 per cent think their kids would disclose too much personal information to strangers and 65 per cent thought a stranger could lure their children in the physical world.
Parents were also concerned that their kids might do something online that could make the whole family vulnerable (62 per cent) or embarrassed (60 per cent). Nearly 61 per cent believe the children could be lured into illegal activities like hacking.
In what can be called a silver lining, the report also showed that Indian parents are starting to recognise how damaging cyber bullying can be for children and are putting preventative measures in place.
“Nearly 57 per cent parents chose to check their child’s browser history, 46 per cent only allow access to certain websites, 48 per cent allow internet access only with parental supervision,” the report said.
Also, 37 per cent parents review and approve all apps before they are downloaded, 36 per cent enable internet access only in household common areas and 35 per cent limit information their child can post on social profiles. The survey also revealed that seven per cent of parents fail to take any action to protect their children online. | <urn:uuid:c92b2843-b7fb-4f2e-8145-123f4a4b4eef> | CC-MAIN-2020-16 | https://www.freepressjournal.in/cmcm/50-parents-fear-their-children-might-fall-prey-to-cyber-bullying | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371883359.91/warc/CC-MAIN-20200410012405-20200410042905-00155.warc.gz | en | 0.955851 | 397 | 2.875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.