text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
The discussion started with the understanding that developments in transportation have led to a situation in which migration is sometimes easier, and the developments in communications and consumerism have led to raising awareness among populations to the gap between them and the developed countries. All of these are increasing the desire to emigrate. Then, they wrote the headline "Refugees – The Young Generation", and the arrows from the headline point to the words "Poverty", "Connection to Israelis", "Crime", "Overcrowding", "Employment" and "Education". The word "Overcrowding" was associated with the word "Higher Education" (in the context of innovative housing solutions) and the word "Employment" was linked to the words "Robots" and "Unemployment". Then, they figured out that the solution is education, so they had written the word "Education" and the arrows pointed to the words: "Budget," "Socialization", "Language", "Computer Science", "Motivation", "Exact sciences". They also examined various aspects of the question of socialization.
The students of Tel Aviv Summer University took a tour to the south of Tel Aviv city – where a lot of disadvantaged communities live. They learned about problems of the refugee', the newcomers to the neighborhood, and of the host population. Using the future wheel method, which they have practiced while being led by Dr. Tal Soffer, head of the unit for technology and society foresight (TSF) at Tel Aviv University, they tried to understand what would be the expression of the problem in the future. | <urn:uuid:568677e9-362b-4214-a3f2-0f1b91bae967> | {
"date": "2020-01-18T17:51:58",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593295.11/warc/CC-MAIN-20200118164132-20200118192132-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9730651378631592,
"score": 2.75,
"token_count": 322,
"url": "https://wyredproject.eu/2018/10/10/the-refugees-problem-and-the-future/"
} |
The Differences in Intel Processors
Intel processors come with a wide variety of capabilities and performance levels. Which features suit a computer best depends both on the computer itself and on what you plan to do with it. The features within Intel processors also vary, with much of the 2011 range featuring Intel's own Turbo Boost Technology, managing power to suit your activities; Hyper-Threading Technology, maximizing efficiency when multiple programs are running; and HD Graphics, for high definition images in gaming or video playback. The main specifications for comparing processors are cores, threads, clock speeds and the amount of cache memory, all of which, working together, determine your computer's ability to perform reliably and quickly regardless of how many programs are running at any time.
The Intel Core i3 Desktop and Mobile (laptop) processor range, with two cores and four threads, feature clock speeds of 1.2 to 2.66 GHz (gigahertz) for the mobile version, and 2.5 to 3.33 GHz on the desktop. Most of this range has 3MB of cache, although selected desktop models have 4MB. All of the i3 models come complete with Intel's Hyper-Threading Technology and HD Graphics.
The Intel Core i5 processors have a clock speed between 1.2 and 2.66 GHz on mobile; and 2.3 GHz to 3.6 GHz for the desktop version. Cache levels for the i5 vary across the range, with 3MB on laptops and 3MB to 8MB on the desktop. The mobile processors within the i5 range offer two cores and four threads, while some of the desktop series have four cores. All of the processors in the i5 range come with the Hyper-Threading and Turbo Boost Technologies as well as HD Graphics, and selected models feature second-generation, updated and improved Turbo Boost.
The i7 series of Intel processors come in Mobile and Desktop versions. The i7 processors for laptop are duo or quad core, while the desktop versions feature between two and six cores. In terms of threading, the i7s provide anything between four and 12, with the higher levels only available on desktop. For clock speed, mobile i7s offer 1.06 to 2.80 GHz, while the desktop selection have 2.53 to 3.4 GHz. Laptop i7 processors have 4MB to 8MB of cache, and the desktops have 8MB or 12MB. All of the i7s have Intel Hyper-Threading and Turbo Boost technologies (Turbo Boost 2.0 in some cases). Only part of the range features Intel HD Graphics.
The i7 Extreme processors for desktop and laptop computers represent the peak of the brand's home computing performance, as of February 2011. With quad core on laptop and either quad core or six core on desktop, threading ranges between eight and 12. Clock speeds range from 2 Ghz to 2.5 GHz on a mobile, and 3.2 GHz to 3.33 GHz on a desktop. Most of the i7 Extreme processors feature 8MB of cache, although selected models have 12MB. The i7 processors include Intel's Turbo Boost for targeting your computer's power effectively and Hyper-Threading for managing multiple applications, as well as HD Graphics in selected cases. | <urn:uuid:7e8df675-1ce2-400c-9f0c-2b1ad2ef829a> | {
"date": "2020-01-18T17:49:20",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593295.11/warc/CC-MAIN-20200118164132-20200118192132-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9230873584747314,
"score": 2.71875,
"token_count": 666,
"url": "https://yourbusiness.azcentral.com/differences-intel-processors-20541.html"
} |
- This event has passed.
Get More Out of Your Classical Civilisation or Ancient History GCSEs
January 18 @ 11:30 am
Expand your knowledge of your Classical Civilization or Ancient History GCSE subjects.
Join experts who teach and study the ancient world at the University of Cambridge for an inspiring day of talks, tours, and taster sessions which will help you get more out of your Classical Civilization or Ancient History GCSE.
The talks and workshops are tailor-made for your GCSE syllabus and will help you to understand your topics in greater depth and to see how what you study fits into the big picture of the ancient world. Everybody attends the Introduction session. We all meet again for the Conclusions session, which will be based on your responses to the day and will bring together all the different topics you have been exploring. Within each workshop there will be specific questions tailored to the particular options that you are studying for GCSE.
More information coming soon. See the website here. | <urn:uuid:ce53d5f8-cf6a-4b13-bef2-0b5076167283> | {
"date": "2020-01-20T11:35:04",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9014495611190796,
"score": 2.515625,
"token_count": 204,
"url": "http://aceclassics.org.uk/event/get-more-out-of-your-classical-civilisation-or-ancient-history-gcses/"
} |
Alzheimer’s disease affects an estimated 5 million individuals in the US and causes a devastating loss of cognitive function due to the buildup of beta-amyloid and tau proteins in the brain. Previous efforts to combat this disease have focused on developing drugs that target beta-amyloid, but such treatments have been unsuccessful in patients so far. Several exciting new approaches for treating Alzheimer’s are currently being tested in clinical trials in the US and Europe. These trials will assess the efficacy of an anti-viral drug that is normally used to treat herpes, and a new vaccine that generates antibodies against tau protein.
Alzheimer’s disease was first identified in 1906 and is the most common cause of dementia, responsible for an estimated 60–70 percent of dementia cases. Alzheimer’s predominantly affects the elderly, but approximately 5 percent of cases involve early-onset disease (prior to the age of 65). The predominant symptoms of Alzheimer’s are a loss of memory and other intellectual capacities, which must be severe enough to interfere with everyday functioning. Mood swings and behavioral difficulties are also predominant symptoms. As the disease progresses, motor functions can also be impacted, inhibiting the ability of patients to speak, swallow, and even walk. Affected individuals typically survive between 4–20 years beyond the time that their symptoms become noticeable to others, with an average survival time of 8 years.
Research into the causes of Alzheimer’s has revealed that two proteins, beta-amyloid and tau, play a key role in disrupting the neural processes that underlie memory and other cognitive abilities. Beta-amyloid normally acts to combat oxidative stress, regulate cholesterol transport, and fight off bacteria in the brain. In Alzheimer’s, however, beta-amyloid is overproduced. The excess protein forms clumps, or plaques, around neurons that can interfere with the transmission of nerve impulses. Tau is found in abundance in neurons and normally acts to stabilize cell proteins called microtubules in neuronal axons. In Alzheimer’s disease, defective forms of tau are produced, often containing large numbers of attached phosphate groups, termed hyperphosphorylated tau. Defective tau fails to stabilize microtubules, and instead binds together into insoluble aggregates or “tangles” of protein. The buildup of these neurofibrillary tangles inside of neurons, combined with amyloid plaques surrounding neurons, disrupts cell-to-cell communication in the brain.
Current therapies for Alzheimer’s include drugs that treat the symptoms of dementia by regulating neurotransmitter levels; however, none of these treatments directly addresses the cause of the disease. Research efforts have focused on finding a drug that can prevent the buildup of plaques by interfering with beta amyloid synthesis and aggregation. Unfortunately, despite promising preclinical data from animal studies, these drugs failed to produce results in humans or had devastating side effects. For example, one anti-beta-amyloid vaccine caused meningoencephalitis or inflammation of the brain tissue and surrounding membranes. This side effect may have resulted from the reaction of the vaccine with beta-amyloid normally present in the walls of blood vessels. Such serious side effects were cause for cessation of the trial, and researchers have subsequently turned their attention to other possible treatments.
A research team led by Hugo Lövheim from the Department of Community Medicine and Rehabilitation and the Unit of Geriatric Medicine at Umeå University in Sweden is piloting the first clinical study to address the effect of a herpes virus drug on Alzheimer’s disease. Lövheim’s group previously showed that infection with herpes virus was correlated with an increased risk of Alzheimer’s disease. People who tested positive for antibodies associated with the reactivated form of herpes simplex virus type 1 (HSV-1 anti-IgM) had double the risk of developing Alzheimer’s. Thus, the researchers surmised that brain signaling pathways activated by the virus might trigger the disease, and conversely, that anti-viral drugs might reverse disease symptoms.
The VALZ-Pilot study is currently recruiting participants with Alzheimer’s to investigate the effects of Valaciclovir, sold by the brand name Valtrex, a drug typically prescribed to treat genital herpes, cold sores, and shingles. Thirty-six participants will receive four weeks of drug treatment. Markers in the spinal fluid will be examined to assess the effect of the drug on several Alzheimer’s disease parameters, including levels of tau protein. A subset of subjects will also undergo positive emission tomography (PET) brain imaging analysis. By using a tracer that accumulates in cells with active herpes infection, this methodology can potentially detect this infection in the brains of Alzheimer’s patients.
A second new approach for treating Alzheimer’s, spearheaded by Petr Novak and colleagues at the Karolinska Institutet in Sweden, is the generation of a vaccine that targets the tau protein. Previous vaccine treatments for Alzheimer’s, which have thus far proven unsuccessful, focused only on beta-amyloid. The new vaccine, AADvac1, will prompt the body to generate antibodies against tau. The production of anti-tau antibodies will hopefully direct the immune system to clear tau protein from inside brain cells, similar to the way it fights off viruses and bacteria.
Developing a tau vaccine wasn’t easy; tau is a protein also found in healthy brains, and thus the removal of “healthy tau” by a vaccine could have negative side effects. The researchers compared differences in the structure of the healthy and pathological tau proteins, and identified what they call the “Achilles heel” of the abnormal protein. They were then able to create a vaccine that recognizes this feature of the abnormal protein, yielding treatment specificity for the disease-causing tau.
So far the AADvac1 vaccine is in phase 1 of clinical trials, which involves administration of the drug to healthy volunteers to assess side effects, but does not address efficacy. No serious side effects have been observed thus far, and volunteers have experienced only minor reactions at the injection site, similar to other types of vaccines. The lack of side effects is a promising first step. Moreover, the trial has also demonstrated the effectiveness of the drug to elicit an immune response, which is a critical factor for its success. These promising preliminary data provide much-needed hope for Alzheimer’s patients and their families.
Hippius H, Neundörfer G. (2003) The discovery of Alzheimer’s disease. Dialogues Clin Neurosci. 5(1):101-8. PMID: 22034141.
Marciani D. (2016) A retrospective analysis of the Alzheimer’s disease vaccine progress – The critical need for new development strategies. J Neurochem. 137(5):687-700. doi: 10.1111/jnc.13608.
Novak P, RSchmidt R, Kontsekova E, Zilka N, Kovacech B, Skrabana R, Vince-Kazmerova Z, Katina S, Fialova L, Prcina M, Parrak V, Dal-Bianco P, Brunner M, Staffen W, Rainer M, Ondrus M, Ropele S, Smisek M, Sivak R, Winblad B, Novak M. (2016) Safety and immunogenicity of the tau vaccine AADvac1 in patients with Alzheimer’s disease: a randomised, double-blind, placebo-controlled, phase 1 trial. The Lancet Neurology. S1474-4422(16)30331-3. doi: 10.1016/S1474-4422(16)30331-3.
Lövheim H, Gilthorpe J, Adolfsson R, Nilsson L, Elgh F. (2014) Reactivated herpes simplex infection increases the risk of Alzheimer’s disease. Alzheimers Dement. 11(6):593-9. doi: 10.1016/j.jalz.2014.04.522.
Vía Brain Blogger http://ift.tt/2onKK5b | <urn:uuid:28b83ee4-3994-47ba-b04a-707bd57df873> | {
"date": "2020-01-20T13:13:01",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9063790440559387,
"score": 3.734375,
"token_count": 1732,
"url": "http://aharonfried.com/2017/04/"
} |
Achilles tendonitis is a debilitating, painful inflammation of the Achilles Tendon – a cordlike prominence at the back of the heel rising up toward the calf. Symptoms include an extremely piercing pain, a shooting or burning pain at the back area of the heel. The Achilles tendon connects the calf muscle of the leg to the heel bone. The degree of injury ranges from an irritated tendon to a tear or even a complete rupture of the tendon.
Common mitigating factors include:
- Improper training program for athletes
- Wearing footwear that is ill-fitted or badly worn
- improper warmup (or cool-down) for your activity
- lack of flexibility in the calf muscles
- wearing high heels that can shrink the tendon and become more vulnerable to injury
This injury is problematic among athletes especially runners and professional dancers, as both activites stress the achilles tendon quite heavily.
Achilles Tendonitis is a degenerative condition and should not be left untreated, otherwise a complete rupture may eventually result – a condition that is much more difficult to treat. When treating the achilles tendon, rest the area (meaning do NOT workout this area other than stretching), apply cold compression therapy for 10-20 minutes at a time for at least 3 times a day. Do this to the injured area for the first day to 3 days. Blood Flow Stimulation Therapy™ may be used after the acute swelling is improved and rest prevents further muscle injury. Cold will reduce initial inflammation and swelling and the Blood Flow Stimulation Therapy™ circulates blood through the area to speed the healing process.
However, this is not what typical person does; they may ice once or twice and rest a bit, but most often just take some Advil or Tylenol and continue to commence their running or dancing. If the strain was minor, their body may be able to heal the muscle fibers normally. Unfortunately, this is not the usual result because the injured muscle is being used instead of rested. Because of the stress on the muscle, their body heals the injured muscle fibers by binding them together with fibrotic adhesions or scar tissue. This is done in an attempt to prevent further damage to the injured area. It is a normal protective response of their body.
The most common cause of an tendon inflammation (tenosynovitis or tendonitis) is overuse of the affected tendon. Rest of the affected tendon is all that is required in some cases. Other treatments such as anti-inflammatory drugs or a steroid injection are sometimes needed. Infection of a tendon is an uncommon cause but needs treatment with antibiotics if it occurs.
What is tenosynovitis and tendonitis?
* Tendonitis means inflammation of a tendon. (It is sometimes spelled as tendinitis.)
* Tenosynovitis means inflammation of the sheath that surrounds a tendon (the sheath is called the synovium). Tenosynovitis can be caused by calcium deposits, repeated strain or trauma, high levels of blood cholesterol, rheumatoid arthritis, gout, or gonorrhea.
These two conditions often occur together. | <urn:uuid:367ee22e-226e-4c7c-a9ab-622654f5c134> | {
"date": "2020-01-20T11:43:31",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9341961741447449,
"score": 3.0625,
"token_count": 640,
"url": "http://alternativemusculartherapy.com/?page_id=626"
} |
There are also follow up activities in this powerpoint such as loo. Children are visual learners so having a wide range of pictures really helps them to focus on the new words they are learning. It also reinforces introduces age , years in French, in addition to how to express vocab one’ s age when one was born in French. A child in a sheet halloween - treat bag, carrying a trick- with " BOO! 4 boards will print on one sheet of paper for the 3x3 boards. Bat Spelling Jigsaw 2. As soon as the crosses are complete they may be sent in. a jack o' lantern treat, a witch, candy, a ghost, a mummy, a black cat, a haunted vocab house, Frankenstein, a skeleton, a spider, a bat, a spider web, trick , a vampire a.
Our Lent Good Deed Crosses are due Friday, March 22nd ( there was a misprint on the sheet). 2 boards will print on one sheet of paper for the 4x4 boards. This powerpoint looks at numbers from 1- 100 in French. Halloween flashcards printable Halloween games , coloring pages, Halloween worksheets, Halloween lesson plan materials more. Halloween vocab sheet.
Halloween Vocabulary We' ve got colourful posters word cards, flash cards , vocabulary worksheets which you can use with something for all ages. Practica de vocabulario y del tema de Halloween con unos similes. halloween Making masks is always fun colors , is also a good review for parts of the face, witch, monster, names of characters halloween ( Dracula etc. halloween Useful Vocabulary for Halloween lessons at vocab school. Vocabulary Words and Quiz Worksheets For Teachers! FREE Halloween Worksheets. Find and color the halloween Halloween objects- Halloween Bingo ( halloween Sheet A) Bingo Card A for Halloween Objects - Halloween Match- Up : Match the Halloween vocab to Halloween pictures- Halloween Bingo ( Sheet B) Bingo Card B for Halloween Objects - Halloween Word Search : Find the Halloween theme halloween words- Halloween Bingo ( Sheet C). Englisch- hilfen. You can make up to 16 bingo boards per sheet.
Part of a free series of online English halloween lessons about festivals celebrations suiteable for self study, halloween for classroom use with halloween tutor support. Halloween vocab sheet. Here' s a fun halloween spooky way to challenge your student' s vocabulary spelling skills! 1 12, 544 Elem Pre- Int Int. A comprehensive Halloween vocabulary word list simple definitions explaining the meaning of nouns, with clear , verbs adjectives connected with Halloween.
Use the multiplication division word problems in a math journal as stand- alone problem each day. Halloween flashcards 1: preview these cards. de – Learning English Online ©. This multiplication and division word problems unit by problem type is a year- long resource for problem solving. Full access to all resources on ESL KidStuff including lesson plans flashcards, craft sheets, worksheets, song downloads, classroom readers, flashcards app songs app. Check out these zombie- themed vocab words learn their definitions try to use the words in your own zombie story. Movie Worksheet: Friends Season 8 Episode 6- Halloween Party.Flashcards are a great resource for your ESL kids lessons. There are also lots of vocabulary related games and activities that you can use flashcards with. All words are now Common Core aligned. Practice of vocab and the theme. Access Google Sheets with a free Google account ( for personal use) or G Suite account ( for business use). A collection of ESL printable worksheets, EFL downloadable, practice exercises activities to halloween teach about halloween vocabulary.
HOST A VOCABULARY PARADE! A How- To Kit with Classroom Extensions. Prep Time: one day, one month, or as long as you wish! A Costume Design Sheet will be coming home.
halloween vocab sheet
Here you will find over 100 FREE colorful and fun music theory and piano worksheets. From beginner to intermediate, there is a worksheet for everything! | <urn:uuid:fbe1fdfb-fef3-4382-93d6-3769a55d0bfc> | {
"date": "2020-01-20T11:46:36",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8530641198158264,
"score": 2.609375,
"token_count": 876,
"url": "http://anon-done.tk/halloween-vocab-sheet.html"
} |
Three Steps That Help Heighten Your Programming Skills
Programmers are huge income earners. This great earning potential has somehow attracted a lot of people toward this career field. And the truth of the matter is that many people shift careers just to become programmers. Today, you can find a lot of training centers for learning programming. Camps are a help but you can actually learn programming all on your own. There are three steps enumerated below which can help you easily and quickly improve your programming skills.
Three Ways to Improve Your Programming Skills
1. Be Up for Coding Challenges
If you are trying to enhance your programming skills, never spare yourself from coding challenges. The challenges are usually make up and designed to be like the actual programming challenges every programmer has to solve. Two of the most valuable characteristics every programmer must have are persistence and industry. Although it’s a great truth that programming is an eye-catching career due to its pledge of financial wellness, taking on with the career is not easy. A difficult programming work can call for several hours for problem solving. When you try to check out various programming challenges from different websites, you can get the chance to enhance your programming skills.
2. Do Readings on Programming
3. Begin Making Projects
It is usually deemed impossible to perform a programming project without having taken a full grasp of coding and programming. But a lot of programmers had their beginnings by doing so. You can begin with projects that are simple. As you proceed, you will find that it’s easier to remember the codes because you have actually used it in a project and it will be much easier for you to apply the same in a different project. Practice projects side by side with study can make it through making you a good programmer.
Right now, a huge number of people aspire to become programmers. But you know that it never happens overnight. The steps you have learned earlier can help you much as you try to start on with your journey. | <urn:uuid:028615f5-35bd-425e-ac34-f336069120a7> | {
"date": "2020-01-20T12:23:16",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9594977498054504,
"score": 2.546875,
"token_count": 400,
"url": "http://bihoku-illumi.info/the-essential-laws-of-explained-2/"
} |
plant cell coloring pages animal page and diagram worksheet christmas ornaments.
animal cell coloring page the and plant worksheet answers key diagram pages for kids online.
animal cell coloring page elementary new worksheet labeling plant and color lovely agrams to label luxury plus sheet diagram.
coloring sheet animal cell answer key luxury worksheet diagram pages online for kids christmas.
animal cell printable and plant cells worksheet inspirational about worksheets ideas diagram coloring books for teens.
animal cell coloring page luxury worksheet of diagram pages for adults animals.
animal cell coloring page answers ultimate and plant worksheet cells diagram new drawing a pages books for kids.
animal and plant cell labeling coloring worksheet key best of diagram the labeled pages for adults pdf.
cell structure coloring worksheet animal diagram front right view and plant.
animal cell coloring page plant diagram blank best of worksheet printable books for teens.
plant cell coloring page parts blank worksheet checks free animal diagram pages for girls book.
cell coloring animal page answers worksheet elementary diagram books for adults near me.
worksheets plant cell coloring worksheet answers animal sheet ma grade diagram blank and pages for kids christmas.
advanced coloring with cell pages blood answers cells animal diagram worksheet games unblocked.
animal cell coloring page diagram sheet biology worksheet pages christmas.
animal cell diagram coloring sheet page answers pages the left and plant worksheet color christmas tree.
color of animal cell chromosomes diagram coloring worksheet pages for kids.
plant and animal cell diagram worksheet answers coloring color sh games.
animal cell coloring worksheet pages plant page with labels diagram 9 colouring books for adults relaxation.
plant cell coloring worksheet 6 animal and quiz color answer key diagram books for adults target.
label a plant cell worksheet grade diagram coloring sheet animal and worksheets pumpkin life cycle color pages.
plant animal cell diagram coloring worksheet books online.
plant cell coloring page with labels biology corner pages for adults animal diagram worksheet kids winter.
medium size of cell coloring worksheet animal page awesome plant diagram pages for kids pdf.
cell structure coloring worksheet biology animal diagram games for kids.
related post animal cell diagram coloring worksheet books near me.
cell coloring page plant pages animal diagram worksheet books for adults.
animal cell coloring worksheet membrane key fungi of answers to cells diagram books for adults relaxation.
cell anatomy coloring pages human page diagram sheet plant vs animal worksheet for kids online. | <urn:uuid:9c4ea54a-3b25-44e1-a102-2400809f91d9> | {
"date": "2020-01-20T13:09:17",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7154644727706909,
"score": 2.59375,
"token_count": 510,
"url": "http://builddirectory.info/animal-cell-diagram-coloring-worksheet/"
} |
Liquid Chromatography Detectors - The Fluorescence Detector > Page 56
The optical system of most fluorescent detectors is arranged such that the fluorescent light is viewed at an angle to the exciting incident light beam. This minimizes the amount of incident light that can interfere with the fluorescent signal. Under such circumstances, the fluorescent signal is viewed against a an almost black background and thus, furnishes the maximum signal to noise. A filter can be used to reduce the background light still further by the removal of any stray scattered incident light.
The fluorescence signal (If) is given by
|where (f)||is the quantum yields (the ratio of the number of photons emitted and the number of photons absorbed),|
|(Io)||is the intensity of the incident light,|
|(c)||is the concentration of the solute,|
|(k)||is the molar absorbence,|
|(l)||is the path length of the cell.|
Fluorescence detectors can be simple or complex, the simplest consists of a single wavelength excitation source and a sensor that monitors fluorescent light of all wavelengths. For certain samples, this form of fluorescence detector can be very sensitive and relatively inexpensive. However, employing excitation light of a single wavelength and only a broad emission wavelength, it is not very versatile. Conversely, the fluorescence spectrometer fitted with a small sensor cell is far more complex but with both selectable excitation wavelengths and emission wavelengths is extremely versatile. In addition, excitation and emission spectra can be obtained as required. | <urn:uuid:c99bdad9-ac44-4b0b-bdfe-a28e0157193e> | {
"date": "2020-01-20T11:09:18",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9030243158340454,
"score": 3.4375,
"token_count": 325,
"url": "http://chromatography-online.org/Fluorescence/rs_5_56.php"
} |
The Thermodynamics of Chromatography - Other Thermodynamic Methods that are Used for Studying Chromatographic Systems > Optimum Operating Conditions for Chiral Separations in Liquid Chromatography > The Effect of Temperature and Solvent Composition on the Minimum Variance/Unit Column Len
The Effect of Temperature and Solvent Composition on the Minimum Variance/Unit Column Length (Hmin)
Taking the values for the capacity ratios and separation ratios derived from equations (47), (48) and (49) in equation (40) the manner in which (Hmin) changes with temperature and solvent composition can be identified. The minimum variance per unit length of the column is solely a function of the capacity factor of the solute, the particle diameter and the packing factors (see Book 9). Thus, the influence of temperature and solvent composition on (Hmin) can only result from the effect of these variables on the magnitude of (k'). Curves relating (Hmin) to temperature for different solvent compositions are shown in figure 23. The magnitude of (Hmin) is seen to be strongly dependent on the solvent composition. At 50˚C by decreasing ethanol concentration form 50% v/v to 5% v/v the magnitude of (Hmin) is reduced by about 25% (the column efficiency increased by 25%).
The influence of temperature is more complicated. At an ethanol content of 5%v/v the magnitude of (Hmin) is virtually independent of temperature. This is because the magnitude of (k') is large, and the function of (k') in the equation for (Hmin) tends to a constant value of 2.46dp at high values of (k'). At high ethanol concentrations, (k') values are small, and the magnitude of (Hmin) becomes more dependent on the magnitude of (k') and, thus, more dependent on the temperature. It is seen that,, at an ethanol concentration of 50%v/v, the value of (Hmin) is only reduced by about 5% for a temperature change from 5˚C to 50˚C.
Figure 23. Curves Relating (Hmin) to Temperature for Different Solvent Compositions | <urn:uuid:8354b2a1-0d06-450d-89d3-000c486fc7be> | {
"date": "2020-01-20T12:50:46",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8655233979225159,
"score": 2.515625,
"token_count": 450,
"url": "http://chromatography-online.org/Other-Methods/Chiral-Separations/Variance/rs_8_78.php"
} |
Deadly fungus native to Japan and Korea discovered in Australian rainforest
Poison Fire Coral, one of world’s deadliest fungus species, has been found in north Queensland, a long way from its usual home in Japan and Korea. Photograph: Ray Palmer
Poison fire coral, the only known fungus whose toxins are absorbed through the skin, found on the outskirts of Cairns
One of the world’s deadliest species of fungus, previously thought native to Japan and Korea, has been found by a photographer on the outskirts of Cairns in northern Australia.
Scientists say the discovery of poison fire coral in a pocket of rainforest in Redlynch, a Cairns suburb, indicates the fungus likely occurs naturally in other parts of Australia and south-east Asia.
Poison fire coral, typically found on tree roots and in the soil, is the only known fungus whose toxins are absorbed through the skin. There are documented fatalities caused by the species in Japan and Korea.
Matt Barrett, a mycologist from James Cook University who specialises in fungi, said poison fire coral could cause “a horrifying array of symptoms” if eaten, including stomach pain, vomiting and fever. Eventually it can cause death by multiple organ failure or brain nerve dysfunction.
“Of the hundred or so toxic mushrooms that are known to researchers, this is the only one in which the toxins can be absorbed through the skin,” Barrett said.
“Most fungi, even death cap (mushrooms) you can handle them fine without having any symptoms at all. To have a fungus that can cause symptoms on touch ... it’s something we need to be aware of.”
Barrett said the fungus was “much more widespread than it initially was thought to be” and that the Cairns finding matched recent photographs from Papua New Guinea and Indonesia. This was the first time poison fire coral had been sighted in Australia.
Photographer Ray Palmer said he found the fungus in a pocket of rainforest “in a little hidden area but close to suburbia”.
“For anyone to find it they’d have to deliberately be looking for it,” he said.
Palmer, who goes looking for fungi in the rainforest and other areas during the wet season, said he had photographed a similar species a few years ago.
“When I saw it I recognised it,” he said.
“It hasn’t been recorded south of Java, and Java is only a recent discovery.
“It could be more widespread through the rainforest up here, there’s a lot of areas slightly off the beaten track.”
Barrett said there was “so much more to be found” in northern Australia.
“This is really right in suburban Cairns, it’s not a difficult fungus to notice and it’s suddenly turned up. Certainly we’re interested in any more sightings that are made of it.
“The fact that we can find such a distinctive and medically important fungus like poison coral right in our backyard shows we have much to learn about fungi in northern Australia.” | <urn:uuid:1318cf67-82ec-4d82-a621-29a01e0b1dc6> | {
"date": "2020-01-20T12:34:26",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9607469439506531,
"score": 2.84375,
"token_count": 663,
"url": "http://daylinews.eu/en/deadly_fungus_native_to_japan_and_korea_discovered_in_australian_rainforest"
} |
In todays Integrated Circuit� industry understanding of electronic devices is essential for both analog as well as digital electronic circuits. In digital circuits MOSFETs are considered as simple switches but in analog designs detailed understanding of the device is required because many of the second order effects directly impact the performance of circuit.
In the new generation of IC technologies the device sizes are shrinking these non ideal effects becomes more significant. In many of the circuit designs circuit designer has to decide which effects can be neglected in a given circuit, to decide this insight into device operation proves invaluable.
In this section we discuss the physics of electronic devices at elementary level covering the bare minimum that is necessary for integrated circuit designs. The ultimate goal is to develop a circuit model for the devices by formulating their operation. In order to accomplish this, good understanding of the underlying principles is required. Further,� the structure of devices, their operations and derivation of I-V characteristics has been carried out. The capacitance model plays important role in deciding speed and frequency of operation for digital as well as analog integrated circuits. Therefore, detailed understanding of device operation is carried out. | <urn:uuid:e2a2c6b6-29c1-4d61-8926-1d4ca0559087> | {
"date": "2020-01-20T11:15:33",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9595489501953125,
"score": 3.40625,
"token_count": 235,
"url": "http://electronics-tutorial.net/electronic-devices/"
} |
European Union defaults
Defaults of the European Union commission for renewable energy:
With first of the two strategies of the European Union it acts around in March 2000 the decided on ten years Lissabonner put on strategy, which aims at the European Union "the most competitive and most dynamic knowledge-based marketing area in the world to make itself - a marketing area, which is able, a durable economic growth with more and better jobs and a larger social co-operation to obtain." (European advice of Lisbon, conclusions of the presidency, March 2000).
In the year 2001 this target on the conference of the European advice in Göteborg was supplemented by an ecological dimension. The Lissabonner strategy is based on the acceptance that a stronger economy not only the job creation, but also a social politics and an environmental policy, which a lasting development and a social integration ensure, is favorable.
Definition - What is "lastingness"?
"Lasting development is a development, which corresponds to the needs of the today's generation to be satisfied without endangering the possibilities of future generations."– or simply impressed:
„We must build roads, on which next generations can still drive.“
First of all a comprehensive lastingness concept is outlined. The central message of the strategy reads that in the long term the economical, which social and the ecological dimension must go from lastingness hand in hand: "the lasting development offers the positive long-term perspective of a wealthier and fairer society to the European union; she promises a cleaner, safer and healthier environment - a society, us, our children and grandchildren a better quality of life offers."
To second six trends are identified, which are clearly not lasting. In other words: six prioritaere ranges are called, in which problems exist, which represent a serious threat for our well-being being issued - with possibly irreversible consequences
-. It concerns the following topics:
- CLIMATIC CHANGES
- PUBLIC HEALTH
- POVERTY AND SOCIAL EXCLUDE
- OBSOLESCENCE OF THE SOCIETY
- MANAGEMENT OF THE NATURAL RESOURCES
- MOBILITY AND TRAFFIC | <urn:uuid:f295d625-fe37-4d59-a57c-d325939d4794> | {
"date": "2020-01-20T11:41:01",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9140073657035828,
"score": 2.65625,
"token_count": 454,
"url": "http://energieschaustrasse.at/index.php/en/general/eu-defaults"
} |
From Flood Naratives Around the World by Andrewandfillia.com
(This is following up on the question of the Nephelim and as in the Days of Noah).
The Biblical account of the flood is found in Genesis 6:11 to 9:17. As we read:
The Lord saw that the wickedness of man was great in the earth, and that every intention of the thoughts of his heart was only evil continually (Genesis 6:5).
But Noah found favour in the eyes of the Lord… Noah was a righteous man, blameless in his generation. Noah walked with God… And God said to Noah, “I have determined to make an end of all flesh, for the earth is filled with violence through them. Behold, I will destroy them with the earth. Make yourself an ark of gopher wood… For behold, I will bring a flood of waters upon the earth to destroy all flesh in which is the breath of life under heaven. Everything that is on the earth shall die. But I will establish my covenant with you, and you shall come into the ark, you, your sons, your wife, and your sons’ wives with you. And of every living thing of all flesh, you shall bring two of every sort into the ark to keep them alive with you. They shall be male and female” (Genesis 6:8-19).
Noah obeys, and constructs the ark according to God’s precise specifications. He and his family board, along with all the animals that have been called by God. God shuts them inside the ark.
After seven days the waters of the flood came upon the earth. In the six hundredth year of Noah’s life, in the second month, on the seventeenth day of the month, on that day all the fountains of the great deep burst forth, and the windows of the heavens were opened. And rain fell upon the earth forty days and forty nights (Genesis 7:10-12).
The waters increased and bore up the ark, and it rose high above the earth… And the waters prevailed so mightily on the earth that all the high mountains under the whole heaven were covered. The waters prevailed above the mountains, covering them fifteen cubits deep. And all flesh died that moved on the earth, birds, livestock, beasts, all swarming creatures that swarm on the earth, and all mankind… They were blotted out from the earth. Only Noah was left, and those who were with him in the ark. And the waters prevailed on the earth 150 days (Genesis 7:17-24).
But God remembered Noah and all the beasts and all the livestock that were with him in the ark. And God made a wind blow over the earth, and the waters subsided… At the end of 150 days the waters had abated, and in the seventh month, on the seventeenth day of the month, the ark came to rest on the mountains of Ararat. And the waters continued to abate until the tenth month; in the tenth month, on the first day of the month, the tops of the mountains were seen (Genesis 8:1-5).
At the end of forty days Noah… sent forth a raven. It went to and fro until the waters were dried up from the earth. Then he sent forth a dove from him, to see if the waters had subsided from the face of the ground. But the dove found no place to set her foot, and she returned to him to the ark… He waited another seven days, and again he sent forth the dove out of the ark. And the dove came back to him in the evening, and behold, in her mouth was a freshly plucked olive leaf. So Noah knew that the waters had subsided from the earth. Then he waited another seven days and sent forth the dove, and she did not return to him anymore. In the six hundred and first year, in the first month, the first day of the month, the waters were dried from off the earth. And Noah removed the covering of the ark and looked, and behold, the face of the ground was dry (Genesis 8:6-13).
Then God said to Noah, “Go out from the ark, you and your wife, and your sons and your sons’ wives with you. Bring out with you every living thing that is with you… that they may swarm on the earth, and be fruitful and multiply on the earth.” So Noah went out, and his sons and his wife and his sons’ wives with him. Every beast, every creeping thing, and every bird, everything that moves on the earth, went out by families from the ark (Genesis 8:15-19).
Upon leaving the ark, Noah builds an altar and offers a sacrifice to God. God blesses Noah, and makes a convenant with him:
God said to Noah and to his sons with him, “Behold, I establish my covenant with you and your offspring after you, and with every living creature that is with you, the birds, the livestock, and every beast of the earth with you, as many as came out of the ark; it is for every beast of the earth. I establish my covenant with you, that never again shall all flesh be cut off by the waters of the flood, and never again shall there be a flood to destroy the earth” (Genesis 9:8-11).
A Real, Historical Event
There are many today who doubt the historicity of the Genesis account, including the flood narrative. However, the Bible refutes such scepticism. The Bible is very clear that the flood really did happen; it was a real, historical event.
You will note in the biblical account of the flood that there are repeated references to the exact date on which the events occurred (for example in Genesis 7:11). The ESV Study Bible draws our attention to this, stating that “by pinpointing the exact date of the flood within Noah’s life, the text underlines that it was a real event.”
Likewise, in Isaiah 54:9-10, we read: ““This is like the days of Noah to me: as I swore that the waters of Noah should no more go over the earth, so I have sworn that I will not be angry with you, and will not rebuke you. For the mountains may depart and the hills be removed, but my steadfast love shall not depart from you, and my covenant of peace shall not be removed,” says the Lord, who has compassion on you.”
In Matthew 24:37, Jesus says: “For as were the days of Noah, so will be the coming of the Son of Man.”
And Peter writes in 1 Peter 3:20 of: “when God’s patience waited in the days of Noah, while the ark was being prepared, in which a few, that is, eight persons, were brought safely through water.”
Throughout the Bible, Old and New Testaments, and in the teaching of Jesus Himself, the flood is considered a real, historical event. This means that it was a real historical event. To compromise and deny this is to deny the teaching of Scripture. Lloyd-Jones is very clear about this:
“You can’t play fast and loose with these early chapters of Genesis… You cannot hold on to Jesus Christ and the Gospel if you reject this, because He believed this [as] literal history. The whole of this salvation which the Bible has to offer is historical.”
Similarly, some sceptics have attempted to suggest that the flood was just a local event. It is plainly obvious that the Bible does not allow for such views; what is described is a cataclysmic event of spectacular violence and world-wide impact (note in Genesis 6:13 the reference to destroying the earth, along with all flesh). The destructive forces that God unleashed are beyond anything we can imagine.
So what evidence is there for the Christian to support this claim? If there really was a worldwide flood of such magnitude, you would expect evidence of it to show up not just in geology, but also in the history of many cultures around the world. After all, according to the Bible, all mankind is descended from Noah and his sons (Shem, Ham, and Japheth).
First, geology. As Snelling points out, if there was a worldwide flood that wiped out nearly all life on earth, “wouldn’t we expect to find billions of dead plants and animals buried and fossilized in sand, mud, and lime that were deposited rapidly by water in rock layers all over the earth? Of course! That’s exactly what we find.” He goes on to provide six different geological evidences for the flood.
Second, cultural history. Many cultures do indeed have ancient flood narratives, which often bear striking similarities to the Genesis account. As Anderson and Edwards explain, “a primeval catastrophic flood is well embedded in the traditions of nations across the world, including Iran, Egypt, Russia, China, India, Mexico, Peru and Hawaii.”
Here are just a few; note the similarities, and differences, to the Biblical narrative:
The Epic of Gilgamesh; Tablet XI – The Story of the Flood (Mesopotamia)
In this story, the gods decide to wipe out mankind with a global flood. A man named Utanapishtim is warned about this upcoming flood by the god who made mankind, and told to build a huge boat (in the shape of a cube):
“O man of Shuruppak, son of Ubartutu: Tear down the house and build a boat! Abandon wealth and seek living beings! Spurn possessions and keep alive living beings! Make all living beings go up into the boat. The boat which you are to build, its dimensions must measure equal to each other: its length must correspond to its width.”
“It was a field in area, its walls were each 10 times 12 cubits in height, the sides of its top were of equal length, 10 times 12 cubits each. I laid out its (interior) structure… I provided it with six decks, thus dividing it into seven (levels). The inside of it I divided into nine (compartments).
I had all my kith and kin go up into the boat, all the beasts and animals of the field and the craftsmen I had go up… I watched the appearance of the weather – the weather was frightful to behold! I went into the boat and sealed the entry… Just as dawn began to glow there arose from the horizon a black cloud. The land shattered like a pot. All day long the South Wind blew, blowing fast, submerging the mountain in water, overwhelming the people like an attack. No one could see his fellow, they could not recognize each other in the torrent. The gods were frightened by the Flood, and retreated, ascending to the heaven of Anu. The gods were cowering like dogs, crouching by the outer wall.
Six days and seven nights came the wind and flood, the storm flattening the land. When the seventh day arrived, the storm was pounding, the flood was a war struggling with itself like a woman writhing (in labor). The sea calmed, fell still, the whirlwind (and) flood stopped up. I looked around all day long – quiet had set in and all the human beings had turned to clay! The terrain was as flat as a roof.
On Mt. Nimush the boat lodged firm… One day and a second Mt. Nimush held the boat, allowing no sway… When a seventh day arrived I sent forth a dove and released it. The dove went off, but came back to me; no perch was visible so it circled back to me. I sent forth a swallow and released it. The swallow went off, but came back to me; no perch was visible so it circled back to me. I sent forth a raven and released it. The raven went off, and saw the waters slither back. It eats, it scratches, it bobs, but does not circle back to me.
Then I sent out everything in all directions and sacrificed (a sheep)… The gods smelled the savor, the gods smelled the sweet savor, and collected like flies over a (sheep) sacrifice.”
The Bundaba Flood Story (Australian Aboriginal)
“Long, long ago there was a great flood. It originated from the fact of some children who found the “winking” owl in a tree and plucked out all its feathers. They forced a grass reed through its nose and treated the bird most shamefully. The bird flew without wings, into the heavens and showed himself to Ngowungu, the Great Father. Ngowungu became very angry and decided to drown the people.
Later the people saw a small cloud rising which grew bigger and bigger till it spread all over the sky. The thunder began to roll and crash and the people were greatly afraid. With the rain and thunder was a terrible wind… The salt water, the sea, came pouring over the ranges from the north. The flood rose higher and higher till all the land was covered except the tops of two or three mountains.
From further west a man and his wives with a dog were battling their way in a canoe when a bird with a leaf in its mouth flew in front of them showing them the way to Mt. Broome. They eventually reached Mt. Broome and landed there where some other survivors were.
Then Djabalgari, the great left-handed man incised his little finger and let the blood trickle down into the flood waters. The waters began to go down and eventually disappeared off the country. All other people were drowned.”
Hawaiian Flood Story
“Hawaiians have a flood story that tells of a time when, long after the death of the first man, the world became a wicked, terrible place. Only one good man was left, and his name was Nu-u. He made a great canoe with a house on it and filled it with animals. In this story, the waters came up over all the earth and killed all the people; only Nu-u and his family were saved.”
Pawnee (Nebraska, USA) and Miao (China) Tribe Flood Stories
“The Pawnee tribe… has the following tradition: the creator Ti-ra-wa destroyed the first people, who were giants, by water because of his indignation about their corruption and after that he created a man and a woman like present people, who became the Pawnees’ ancestors… The Miao tribe… [tell that] when god destroyed the whole world by the flood because of wickedness of man, Nuah the righteous man and his wife Matriarch, their three sons, Lo Han, Lo Shen, and Jah-hu survived by building a very broad ship and embarked on it with pairs of animals.”
These are just a small representation of the many flood narratives that exist all around the world.
The Truth Behind the Myths
Scoffers, of course, will refuse to accept this as evidence of the truth of the Biblical account, largely because they rule out the supernatural. Many of them demand ‘evidence’, and talk of being ‘people of reason’, but the reality is that no evidence will ever be enough for them. Remember what Jesus said about the sign of Jonah.
As Sarfati states: “It is common to make legends out of historical events, but not history from legends.” All people descend from Noah and those with him on the Ark. Therefore, it is not surprising that many cultures have memories of the flood. These memories, passed down through the generations orally and then written down, became corrupted and embellished over time, which is why there are many variations on the flood story to be found. However, the common themes indicate that they are all based upon true events of history. This is the best explanation for the existence of myriad flood narratives found right across the world, from the Americas to Australia and everywhere in between.
The Bible is God-breathed, and when the Holy Spirit inspired Moses to record the events in Genesis, the result was an accurate record of the true events that took place.
How can we be sure that the Bible’s account is the true account of what really took place? Look at how much more credible and coherent the biblical account is; it is a coherent, detailed historical record that fits perfectly into the historical narrative of the Bible. The details too are much more plausible than those of the other narratives. Let us compare, for example, the Epic of Gilgamesh, and Genesis.
Sarfati states that:
“The Bible teaches that mankind was originally monotheistic. Archealogical evidence suggests the same, indicating that only later did mankind degenerate into idolatrous pantheism.”
Corduan presents a study of the evidence for “original monotheism” in his book, which is well worth reading. As he points out, “virtually every religious culture carries a vestige of monotheism… and the tribes that are least developed in terms of their overall material culture provide some of the strongest support for original monotheism”. The point here is that, because the Genesis account is monotheistic, while the Epic is polytheistic, this shows that the Epic is a corruption of the true account, because polytheism is a later degeneration away from monotheism.
Sarfati presents further proofs:
“In Genesis, God’s judgment is just… [He] shows mercy to Noah, and is sovereign. Conversely, the gods in the Gilgamesh Epic are capricious and squabbling, cower at the flood and are famished without humans to feed them sacrifices.”
The gods of the Gilgamesh Epic do not seem to have any real, concrete motive for sending the flood. The closest it gets is the line “Charge the violation to the violator, charge the offense to the offender”, which is very vague. This is a clear sign that, as time went on, people forgot the true God, and His just reasons for sending the flood; to punish man for turning from Him in sin and rebellion. They persisted in that same rebellion and sin themselves, writing Him out of the flood narrative in favour of gods of their own making and the teaching of demons.
There’s the length of the flood, too. The Gilgamesh Epic tells of just six days and seven nights of rain, and gives no mention of the fountains of the deep. This just does not seem enough water for a global flood. The Genesis flood timeline, however, lasts a whole year, and includes the opening of the fountains of the deep.
Sarfati points out, further, that the shape of the ark in the Gilgamesh Epic is “ridiculous”; a huge cube that would roll and tip in even calm seas. Noah’s ark, meanwhile, was perfectly seaworthy and optimally designed. For arrogant sceptics who doubt that such a ship could be built by ‘primitive’ ancient people, he also references other giant wooden vessels recorded in history, which were of comparable size to the ark.
Osanai states in her thesis studying the two accounts:
“According to the specifics, scientific reliability, internal consistency, the correspondence to the secular records, and the existence of common elements among the flood traditions around the world, the Genesis account seems to be more acceptable as an accurate historical record. If all human races are descendants of Noah’s three sons, the survivors from the universal Flood, and the two accounts had derived from the same historical event, the reason the accounts have many similarities is explicable.”
All the other flood accounts, while having echoes of the Genesis story, share similar problems. They are implausible, and all read very differently to Genesis, which is a coherent historical narrative. Genesis alone has the stamp of authority.
Of course, I must say at this point that my primary reason for believing the biblical account to be true is that I trust the Bible as the authoritative, inerrant and sufficient Word of God. The Holy Spirit has opened my eyes to see and believe. As Paul writes in 1 Corinthians 2:12-13: “Now we have received not the spirit of the world, but the Spirit who is from God, that we might understand the things freely given us by God. And we impart this in words not taught by human wisdom but taught by the Spirit, interpreting spiritual truths to those who are spiritual.”
There is nothing else but the Bible that describes so perfectly the world in which we live, and there is no other message like the Gospel. I can personally testify to that.
In conclusion then, the flood that we read about in Genesis was a real, historical event, just as the Bible describes. Echoes of the true story, though corrupted, can be found in the mythology of diverse people groups from around the globe, along with evidence in the natural world around us. The Bible, from Genesis to Revelation, is authoritative, inerrant, and sufficient. Brothers and sisters, let us have confidence in this Word of God!
I’ve shortened the account somewhat to limit the length of this article; I would recommend that you read the full account also.
T. Desmond Alexander, ‘Genesis’, in the ESV Study Bible (Wheaton: Crossway, 2008), p.63.
Dr. Andrew A. Snelling, ‘Geologic Evidences for the Genesis Flood – Part I: An Overview’, Answers in Genesis, available at: answersingenesis.org/the-flood/geologic-evidences-for-the-genesis-flood, 18th September 2007, accessed 17th April 2018. Sadly, most people, including many Christians, are blind to such evidence because they have been indoctrinated with the theory of evolution since they were children.
Clive Anderson and Brian Edwards, Evidence for the Bible (Leominster: Day One Publications: 2014). This book, a gift from Fillia, was purchased from the gift shop in the British Museum. It may be surprising to some that a book supporting the trustworthiness of the Bible should be found in such a place, but it goes to show that, despite what scoffers might say, the Bible’s history is accurate. God will not allow His truth to be silenced.
The Epic of Gilgamesh, Tablet XI (translated by Maureen Kovacs). Available at: www.ancienttexts.org/library/mesopotamian/gilgamesh/tab11.htm, 1998, accessed 16th April 2018.
Cited in: W. Douglas and Howard Coates, ‘Australian Aboriginal Flood Stories’, Answers in Genesis, available at: answersingenesis.org/the-flood/flood-legends/australian-aboriginal-flood-stories, 1st March 1981, accessed 17th April 2018.
Dr. Monty White, ‘Flood Legends: The Significance of a World of Stories Based on Truth’, Answers in Genesis, available at: answersingenesis.org/the-flood/flood-legends/flood-legends, 29th March 2007, accessed 17th April 2018.
Nozomi Osanai, ‘A comparative study of the flood accounts in the Gilgamesh Epic and Genesis – Chapter 7: A comparison from secular historical records’, Creation Ministries International, available at: creation.com/gilgamesh-epic-v-genesis-thesis-by-nozomi-oaanai-chapter-7-a-comparison-from-secular-historical-records, accessed 22nd April 2018.
Jonathan D. Sarfati, The Genesis Account: A Theological, Historical and Scientific Commentary on Genesis 1-11 (Powder Springs: Creation Book Publishers, 2015), p.506.
This also refutes sceptical suggestions that Genesis is ‘copied’ from pagan myths.
Sarfati, Genesis Account, p.506.
Winfried Corduan, Neighbourhing Faiths: A Christian Introduction to World Religions (Downers Grove: InterVarsity Press, 2012).
Sarfati, Genesis Account, p.508.
As Paul writes in Romans 1:22-25: “Claiming to be wise, they became fools, and exchanged the glory of the immortal God for images resembling mortal man and birds and animals and creeping things. Therefore God gave them up in the lusts of their hearts to impurity, to the dishonouring of their bodies among themselves, because they exchanged the truth about God for a lie and worshiped and served the creature rather than the Creator, who is blessed forever! Amen.” And thus, tragically, it continues to this very day.
Sarfati, Genesis Account, pp.499-506.
Nozomi Osanai, ‘A comparative study of the flood accounts in the Gilgamesh Epic and Genesis – Conclusion’, Creation Ministries International, available at: creation.com/conclusion-of-nozomi-osanais-thesis-gilgamesh-epic-v-genesis, accessed 22nd April 2018. | <urn:uuid:0460d189-98c2-43d2-91c8-bed48583af70> | {
"date": "2020-01-20T11:18:44",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9647605419158936,
"score": 2.859375,
"token_count": 5372,
"url": "http://ffiasiapacific.com/topics/discussion/flood-noah"
} |
WHAT IS REGENERATIVE MEDICINE?
Regenerative Medicine is a form of tissue engineering and molecular biology which deals with the process of replacing, engineering or regenerating human cells, tissues or organs to restore or establish normal function. When injured or invaded by disease, our bodies have the innate response to heal and defend. Harnessing and enhancing the body’s own regenerative powers is a medical practice at the frontier of present day advancements whose properties can seem miraculous to those who benefit from them. The miracle, however, is the result of scientific exploration that has begun to unlock and utilize the body’s extraordinary ability to heal and restore itself.
WHAT ARE AMNIOTIC TISSUE TREATMENTS?
Amniotic Tissue Treatments are a bioactive tissue matrix allograft composed of dehydrated human amnion/chorion membrane (dHACM) that preserves and contains multiple extracellular matrix proteins, growth factors, cytokines, and other specialty proteins. Our Amniotic tissue treatment is the only FDA regulated product on the market!
HOW ARE AMNIOTIC TISSUES USED FOR TREATMENT?
Research shows Amniotic Tissue Treatments encourage positive results in regenerative medicine. Published studies on the benefits and efficacy of amniotic tissue in wounds date back over 100 years. Amnio Technology is focused on optimizing the regenerative potential and clinical use of these unique tissues. Their ability can provide positive outcomes for conditions such as arthritis, tendonitis, tendinopathies and many other painful issues.
WHERE DO AMNIOTIC TISSUES COME FROM?
Amniotic Tissues are donated by healthy, consenting mothers undergoing scheduled Caesarean sections. The amniotic membrane is the cover (membrane) surrounding the baby, and is typically discarded after the baby is born. The recovery of the membrane does not affect the baby or the delivery process.
All tissue donors are tested for infectious diseases, similar to the testing done for blood donation. The amniotic membrane then undergoes a validated proprietary process to thoroughly cleanse and preserve the tissue, called the PURION Process. The steps of the PURION Process include: cleansing the tissue, drying the tissue, and sterilization.
Our allografts are procured and processed in the United States according to the standards and/or regulations established by the American Association of Tissue Banks (AATB) and the United States Food and Drug Administration (FDA).
WHAT ARE STEM CELLS?
A stem cell is an undifferentiated cell that has the potential to change into a very specific kind of cell. A stem cell, for example, might turn into a blood, skin, bone, cartilage or nerve impulse-transmitting cell. As highly adaptable, self-dividing cells, stem cells have an essential role in the body’s growth and repair processes. Because stem cells are full of so much potential, they are extremely helpful in healing patients who are suffering from injury. Some even go far as to say stem cell therapy is the holy grail of regenerative medicine.
HOW ARE STEM CELLS USED FOR TREATMENT?
There is research that shows stem cells show encouraging results in regenerative medicine. As these cells differentiate, they have the ability to grow into muscle, cartilage and other forms of tissue and to enhance the body’s natural ability to heal. Their ability can provide positive outcomes for conditions such as arthritis, tendonitis, tendinopathies and many other painful issues.
WHERE DO STEM CELLS COME FROM?
Mesenchymal stem cells (MSC) can be found in nearly every tissue of the body. MSCs are obtained from amniotic tissue and umbilical cord which allows no harm to the mother or her newborn.
HOW DOES REGENERATIVE MEDICINE WORK?
Cells are the building blocks of tissue, and tissues are the basic unit of function in the body. Generally, groups of cells make and secrete their own support structures, called extracellular matrix. This matrix, or scaffold, does more than just support the cells; it also acts as a relay station for various signaling molecules. Thus, cells receive messages from many sources that become available from the local environment. Each signal can start a chain of responses that determine what happens to the cell. Through medical technology we can now understand how individual cells respond to signals, interact with their environment and organize themselves into a healing process. Scaffolds are created utilizing various Regenerative Medicine therapies allowing the tissue to “self-assemble”.
WHAT CAN REGENERATIVE MEDICINE BE USED FOR?
Regenerative medicine can be used for a multitude of conditions including, but not limited to pain management, sports injuries, spinal condition, podiatry, wound care, aesthetics, anti-aging, male enhancement, vaginal rejuvenation, hair restoration, the list goes on and on.
IS REGENERATIVE MEDICINE SAFE?
Prior to a scheduled cesarean section, consenting mothers are screened and evaluated. Within thirty days of scheduled delivery the mother is serologically tested, per the standards of the FDA and the American Association of Tissue Banks, to rule out any transmissible diseases or other contraindications. Once serology reports and donor chart is reviewed by the Medical Director or designee, the fluid/tissue is aseptically processed in a controlled environment via a gentle filtration and centrifugation cycle to remove tissue debris. Analysis is performed on the final product to analyze growth factors and cytokine content.
WHAT COMPLICATIONS CAN ARISE FROM USING REGENERATIVE MEDICINE?
Very, very few complications exist with regenerative medicine therapy. Products obtained from the amniotic fluid, placenta and umbilical cord are immunologically privileged meaning they do not cause an immune response or graft vs. host reaction (the body will not reject) and adverse reaction is extremely rare.
WHAT CONDITIONS CAN BE TREATED WITH REGENERATIVE MEDICINE?
Due to the nature of birth tissues, regenerative medicine can be used for pain management, osteoarthritis, wound healing, surgical procedures, sports injuries, facial rejuvenation, male enhancement and erectile dysfunction to name a few.
HOW WILL I KNOW WHAT THERAPY WORKS BEST FOR ME?
Based on your condition or injury your physician will customize a treatment plan for you and determine what therapy, or combination thereof, will work best for you.
WILL THE PROCEDURE BE PAINFUL?
In most cases the procedure involves a simple injection and takes very little time. Guided imaging may be used depending on the area of the body being treated.
WHAT IS MY RECOVERY TIME?
Most patients experience little, if any, recovery time from the procedures? Your physician will provide you with the aftercare instructions prior to your returning home.
WILL MY INSURANCE COMPANY PAY FOR MY TREATMENTS?
Insurance coverages varies by state but in most cases no, your treatment is not covered. Your physician may provide you with an itemized statement so you may personally file a claim to your insurance provider.
WHAT IS THE COST OF TREATMENT?
The cost for regenerative medicine therapy is based on the procedure and type of product needed.
WHY REGENERATIVE MEDICINE
The biggest advantage to regenerative medicine therapy is, under the right circumstances, reducing pain, prolonging or eliminating the need for a surgical procedure and going back to living your life the way it was meant to be lived. | <urn:uuid:d154b9b2-a7d5-43a4-81c1-b80bdab9d9de> | {
"date": "2020-01-20T13:03:50",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9175639748573303,
"score": 2.859375,
"token_count": 1593,
"url": "http://floridaregenerativeinstitute.com/regenerative-medicine-faq/"
} |
A "Hello world" program is a computer program that outputs "Hello World" (or some variant) on a display device. The first known version of this program comes from Brian Kernighan's paper A Tutorial Introduction to the Language B from 1972 (chapter 7). In it's first form it was used to show how to use external variables in B but since then it has become pretty much the standard example to show the very basic syntax and most simple program in any given programming language.
On this page you can find a bunch of source code examples in various programming languages. Here is a legend of how the page is built up:
Click to expand and see source code
Download the example source file
Read more about the specific programming language at wikipedia
Buy beginners books about the programming language (optional)
Tutorial on the programming language selected (optional) | <urn:uuid:e2f57a4e-2435-485b-8e9b-867e9062614d> | {
"date": "2020-01-20T12:11:34",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.913199782371521,
"score": 3.25,
"token_count": 175,
"url": "http://helloworld.org/"
} |
Reading and Writing are critical components of academic success at the elementary through high school level. Now your son or daughter can learn to express thoughts clearly and develop written communication skills with the help of highly trained and qualified teachers you can trust.
Your child’s reading tutor will focus on the following building blocks of reading:
- Letter recognition
- Sound knowledge
- Listening comprehension | <urn:uuid:c6c8e91c-b709-47d5-88f5-fd2bf81aa623> | {
"date": "2020-01-20T12:50:30",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9318376779556274,
"score": 3.171875,
"token_count": 77,
"url": "http://lightstutoringcenter.com/portfolio-categories/preparatory-classes?page=4"
} |
The emission of light of higher wavelength after the irradiation of the sample with known specific wavelength within nanoseconds is called Fluorescence.An instrument called fluorescence microscope is an optical microscope which utilizes a specific wavelength of light to study the properties of substances by the principle of fluorescence. Monochromatic light is used to illuminate the specimen which excites the fluorophore molecules. These fluorophore molecules release low intensity light of higher wavelengths during relaxation which passes through dichromatic mirror and emission filter which blocks the excitation light and allows the emitted light to pass, and enhances the intensity of the emitted light. Hence, single colure image can be obtained at a time due to the excitation of single fluorophore. A sample containing different fluorophore are imaged to observed different features present in the sample and these single colored images are merged to obtain the multi-colored images.
(1) The excitation and emission spectra are nearly the mirror image of each other. (2) Emission spectra shifts towards higher wavelengths. (3) The difference between the wavelength is called Stoke's Shift. (4) The intensity of emitted light is generally of 10-6 times of excitation light.
(1) Turn-off the ligths of the room during the fluorescence experiment. (2) Do not expose the fluorophore treated specimen under the specific wavelength of light as the duration of the fluorescence phenomena is of the order of 10-6-10-9 seconds. (3) Always use the UV shield while using the eyepiece.
(1) To view tissue and their sub-microscopic components and changes their in. (2) To study bacteria and pathogens and changes their-in. (3) Protein-protein and protein-cell interaction study. (4) Movement of virus on a bi-layered membrane. (5) Crude drugs. | <urn:uuid:8edcfc6a-ee45-4b57-90a2-77171ef30102> | {
"date": "2020-01-20T11:05:26",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9265580773353577,
"score": 3.796875,
"token_count": 389,
"url": "http://mrmsmtbs-iitk.vlabs.ac.in/flu.html"
} |
TIME DEUM ET
EARLY CHURCH CHRONOLOGICAL NOTES ON THE LITANY
Extracted from the Church History Site and other sites on the www. and cited here for research and educational purposes with some annotations added.
Topical - of Children at the Eucharist:
let the bishop partake, then the presbyters, and deacons, and sub-deacons, and the readers, and the singers, and the ascetics; and then of the women, the deaconesses, and the virgins, and the widows; then the children; and then all the people in order, with reverence and godly fear, without tumult. [Constitutions of the Holy Apostles, 8.2.13 ](see more here)
40 - Altar or Lord's Table. Both terms are used in the New Testament and by the early church Fathers [Heb 13.10, 1 Cor 10.31]. Wood was used by our Lord in the Last Supper. Marble and stone likely began in the catacombs, and followed in churches built over the graves of the martyrs. It was free standing and assessable from all sides. The placing of lamps/candles and cross on the Altar is from the end of the Middle Ages. Flowers even later. In the earliest church discovered, in Megiddo, it is referred to in the mosaic as the "table" and its location in the chapel is so that it may be approached from all sides.
40 - Alms - from the beginning the church collected alms for the poor, and normally made this part of the offertory.
40 - Alleluia - from Hebrew "allelu yah" Praise Jehovah. Adopted in the early Christian worship. Gregory the Great made it part of the Mass.
Mixing of Wine and water for the Eucharist. Mentioned by Justin Martyr. This was common in Jewish households to mix water and wine at about 3to1 ratio. [Westminster]
Unction - from the time of the NT. Mentioned of the apostles in Mark vi.13. Also in James. Is described in the Apostolic Traditions of the beginning of the Third Century. Oil was blessed after the Eucharist Prayer. [Westminster]
100 Around this time St. John died at Patmos. (Eusebius, Irenaeus and Clement of Alexandria agree that John lived into the reign of Trajan, which began in 98.) The Didache, written in this era, indicates worship was on Sunday: ďAssemble on the Lordís day, and break bread and offer the eucharist; but first make confession of your faults, so that your sacrifice may be a pure one.Ē Note also the implication that the communion was regarded as a sacrifice.
160 Justin Martyr: Christians "neither celebrated the Jewish festivals, nor observed their Sabbaths, nor practiced circumcision" (Dialogue with Trypho). In another place he says that they were "all accustomed to meet on the day which is denominated Sunday, for reading the Scriptures, prayer, exhortation and communion. The assemblies met on Sunday, because this is the first day on which God, having changed the darkness and the elements, created the world, and because Jesus our Lord on this day arose from the dead," etc. He laid out the shape of the liturgy with Assembly, Scriptures, Sermon, Prayers, Peace, Anaphora (the Great Thanksgiving Prayer), Communion, and Dismissal
Reservation - Justin Martyr speaks of taking the Eucharisted bread out to those who were sick. In the 200s church fathers wrote of those who would take it home so they could self commune during the week, a practiced that declined after the Church became legal and celebrated daily in the cities. In about the ninth century it begins to be reserved as a viaticum for the dying. Devotional visits to the reserved sacrament began about the 11th century by priests.
190 Turtillian, "We Christians "celebrate Sunday as a joyful day. On the Lord's day we think it wrong to fast or to kneel in prayer." It was a common opinion of the earlier Christians that all public prayers on the Lord's day should be uttered standing, because kneeling is a more sorrowful attitude and inconsistent with the joy and blessedness of Christ's day." This came from Jewish tradition [e.g., 1 Sa i. 26]
190 Clement "A true Christian, according to the commands of the gospel, observes the Lord's day by casting out all bad thoughts and cherishing all goodness, honoring the resurrection of the Lord, which took place on that day." [Clement of Alexandria]
Clement "The East is an image of the day of birth". Prayer facing east was the norm in the Church. At baptism, the candidate would face west and renounce Satan, and then turn to the east to respond to the questions of the creed and be baptized.
198 In a commentary on Daniel, Hippolytus stated that Jesus was born on Wednesday, December 25, in the 42nd year of the Emperor Augustus (2 BC?). He identified March 25 as the date of Christís crucifixion, believing this to have occurred on Nisan 14, following Johnís chronology.
198 A council meeting in Caesarea of Palestine, led by Theophilos of Caesarea and Narcissos of Jerusalem, with Kassis of Akkar and Karos of Akka present, discussed the issue of the Pascha (Easter). They determined to celebrate Pascha on a Sunday, and wrote to other churches to inform them of their decision: “The day we celebrate, those in Alexandria also celebrate. … We have exchanged letters with them so that we may celebrate together on this holy day.” In the early church, it was common in Asia, Cilicia, northern Syria, and Mesopotamia to observe the Lordís crucifixion on the 14th of Nisan (April), using the Hebrew lunar calendar, and his resurrection on the 16th. But churches in Greece, Italy, Africa, Egypt, Palestine, and Pontus commemorated the passion always on a Friday, and the resurrection on a Sunday. (See 190.)
200s - Altar cloth. One large cloth covered the cubical freestanding altar [Gnostic Gospel of Thomas] on Sunday. The altar was bear during the week. The offertory cloth was spread over the altar cloth. Altar curtains hung from the structure supporting the ciborium. Frontal is of Late Middle Ages. [Westminster]
200s - Saints intercessions. In the early church this was every Christian (e.g., Rom 1.7), and every Christian that had passed over and was at rest. There arose in the 2nd Century the extra-biblical belief that those who had been heroically martyred were rewarded by God by being entered directly into heaven without waiting for the resurrection. The Church would mention the names of the martyrs at the Eucharist, and would go to their resting place to pray upon the anniversary of their martyrdom. This practice spread and by 400AD it was found in all Eucharist liturgies. Along with it came the practice of bidding the intercessions of these hero martyrs, believing that they lived in heaven, and that their intercessions were especially efficacious. Much later came the practice of praying to the saints as if they could grant some special favors to the supplicant and cults to certain saints who were given special interests and powers. About 155 Polycarp was martyred, and it was written, "we did gather up his bones - more precious to us than jewels, and finer than pure gold - and we laid them to rest in a spot suitable for the purpose. There we shall assemble, as the occasion allows, with glad rejoicings; and with the Lord's permission we shall celebrate the birthday of his martyrdom. It will serve both as a commemoration of all who have triumphed before, and as a training and preparation for any whose crown may still be to come." Confessors were added to the list in time. The commemoration often included the celebration of the Eucharist. Also came offerings at their shrines, candles, incense, all of which, along with the remembrance of their death date. In the Seventh Eumenical council of the 8th century the service to the saints with lights, prayers, kissing, and veneration of their icons and relics became codified in the church canon.
231 A private house in the city of Dura-Europas on the Euphrates was adapted for Christian worship. This is the earliest known example of a church with religious pictures on the walls. The art appears to have been influenced by similar work in a synagogue in the same city. Depicted on frescoes are Adam and Eve, the Good Shepherd and his flock, the Samaritan woman at the well, Christ walking on the water, the raising of Lazarus, the resurrection of Christ, the healing of the paralytic and David's victory over Goliath.
280? The Chapel of the Centurion of Armageddon in Palestine. Date uncertain. It has a table for the Holy Eucharist set in the middle of the chapel and the names of the Centurion Gaianus who built the chapel, and Akeptus who donated the Holy Table.
301+ During this century, the Eastern Church began singing the Gloria in Excelsis in the Daily Offices. The hymn was originally written in Greek. It was adopted for use in the West, often during Matins. The Gloria was first introduced to Rome by Symmachus (498-514). When the Roman liturgy spread throughout the Western Church during the eighth century, the Gloria came to be used exclusively in the Eucharist.
Kyrie Elieson - Lord have mercy used first in Jerusalem, adopted by Rome by the end of the century. Three fold Kyries for a total of nine.
321 Constantine required all subjects of the Roman Empire to observe the Lord's day as a day of rest and also to honor Friday, the day of Christ's death. He allowed Christian soldiers leave to attend church on Sunday, and even enjoined pagan soldiers to pray on Sunday. (Note that this in no way implies that Constantine invented Christian worship on Sunday.) Prior to this time, the seven day week had not been officially observed by the Roman Empire. Instead, the days of the month were denoted by counting down toward the Kalends, the Nones, and the Ides of each month.
325 Westward celebration: Constantinian basilicas were built with the asp in the west. The misters stood at the west and faced east across the table to the people who faced west. This may have reflected an understanding of building the basilica like the Jewish Temple, and the Altar was in the West [Westminster p420 & 438]
325 1st Ecumenical Council at Nicaea. As a 40-day period (six weeks) Lent was mentioned in canon 5. Canon 20 forbade kneeling on Sundays or during the period of Easter through Pentecost, since these are times of joy.
325 - Churches began to be dedicated to Saints which were built over their resting place. The first was the Basilica of St Peter in Rome built by Constantine. The church adopted the Saint as its Patron and annually celebrated his martyrdom.
325 Eusebius: "The Word" (Christ) "by the new covenant translated and transferred the feast of the Sabbath to the morning light, and gave us the symbol of the true rest, the saving Lord's day, the first of light, in which the Saviour gained the victory over death. On this day, which is the first of the Light and the true Sun, we assemble after the interval of six days, and celebrate holy and spiritual Sabbath; even all nations redeemed by him throughout the world assemble, and do those things according to the spiritual law which were decreed for the priests to do on the Sabbath. All things which it was duty to do on the Sabbath, these we have transferred to the Lord's day, as more appropriately belonging unto it, because it has the precedence, and is first in rank, and more honorable than the Jewish Sabbath. It hath been enjoined on us that we should meet together on this day, and it is evidence that we should do these things announced in this psalm [Eusebius of Cśsarea on Psalm 92 "A Song for the Sabbath Day]
347 Two monks living in Antioch, Flavian and Diodore, promoted the practice of singing the Psalms with short responsory choruses: the first Christian litanies. Diodore later became bishop of Tarsus (378), while Flavian became bishop of Antioch (381).
350 Around this time (348-50) Cyril of Jerusalem (elected bishop in 350) produced the Mystagogical Catecheses for new believers. He described the church service as follows:
Then having sanctified ourselves by these spiritual hymns, we call upon the merciful God to send forth his Holy Spirit upon the gifts lying before him: that he may make the bread the body of Christ, and the wine the blood of Christ, for whatever the Holy Spirit has touched is sanctified and changed. Then after the spiritual sacrifice is perfected, the bloodless service upon that sacrifice of propitiation, we entreat God for the common peace of the Church, for the tranquility of the world, for kings, for soldiers and allies, for the sick, for the afflicted; and in a word for all who stand in need of succour we all supplicate and offer this sacrifice. Then we commemorate also those who have fallen asleep before us, first patriarchs, prophets, apostles, martyrs, that at their prayers and intervention God would receive our petition. Afterwards, also on behalf of the holy fathers and bishops who have fallen asleep before us, and in a word of all who in past years have fallen asleep among us, believing that it will be a very great advantage to the souls, for whom the supplication is put up, while that holy and most awful sacrifice is presented."
Late 300s - Insense is used in the Church. Turtillian spoke against such in 200 relating it to emporer worship. First reported use in holy week. Used in procession first with bishops, then with the Gospel. In the middle ages, when the communion elements began to be elevated it was used. [Westminster]
Jerome refers to the deacons in the Paschal feast singing the Praeconium (Exultet) He normally carried the Pascal Candle in procession into the church to begin the service on Easter Eve
400s Advent initiated as a six-week solemn period of fasting on Monday, Wednesday, and Friday to prepare for the "coming" Christ's Mass. Later five Sunday observed, now four Sundays.
400s - Cross at baptism. - Augustine speaks of the importance of this motion. Before this time, the cross was used on the forehead of the baptized and on the waters of baptism.
400s Sacristy appears first in Syria for the preparation and the ablutions, vesting, etc.
400s Rogation Days began to be observed. Three days before Ascension Sunday. First called for by Mamurtus with fasting and prayer when Vienne was threatened by the enemy.
400s Riddle, a curtain hung between columns of the ciboria about the Altar.
450 - Pre Lent. Septigesima, Sexigesima, Quinqagesima, the three Sundays before the beginning of Lent on Ash Wednesday. Fully observed in the West by the end of the Fifth century.
450 The short "Collect" prayers were introduced as propers for days in the calendar in the west [Barbee and Zahl, The Collects of Thomas Cranmer]
450 - Super Oblata - Prayer over the offerings - Originated in the West - Prayer offered when the wine and bread are set upon the holy table before the eucharistic prayer, with a prayer for acceptance of the offering. In the middle ages became a secret prayer said in a low voice, revived today into a congregational prayer often sung.
471 - Peter Fullo of Antioch orders the Nicene-Constantinople creed to be said at every assembly of the church.
c 480 - Palm Sunday - Jerusalem first, a blessing of palms or olive branches, the reading of the Gospel from the Summit of the Mount of Olives, then a procession into Jerusalem with palms carried by all to worship. There
** The first five centuries marks end of the liturgical development that the Order of Centurions recognizes as "early church" and which it emulates **
500 - Secret prayers by the celebrant in the Eucharist begin to appear for the first time, and become common by the end of the sixth century. [Westminster]
511 - Timotheos of Constantinople orders Nicene-Constantinople creed to be said in liturgy
589 - Council of Toledo orders Nicene-Constantinople creed for every assembly
610 - All Saints - 13 May 610, Mary and All Saints since there were many martyrs not remembered in liturgical prayers. Moved to 1 November in 835.
680 - Agnus Dei introduced at the Fraction, "O Lamb of God that taketh away the sins of the world, have mercy upon us...", probably of Syrian origin. Repeated until completed. Later moved to a period when the peace was exchanged and the last verse changed to be "grant us thy peace."
c750 - Stripping of the Altar. Altar symbolizes Christ, Altar cloths which now remained on the Altar, symbolized his clothing.
900s Trinity Sunday evolves in the West. [Westminster]
1000 - All Souls follows All Saints in the Clunic houses.
1000 - Ablutions introduced into the liturgy. In the early church this was conducted after the liturgy in the sacristy. The use of wine for ablutions was directed in the Western church by Pius V. [Westminster]
1000 - Confession and Absolution entered the liturgy. In the early church there was only the reconciliation of the penitent, but the confession was made in private.
1014 - The church of Rome orders Nicene-Constantinople creed for every assembly
1054 - (or pehaps earlier) The Great schism over the addition to the Creed by the west.
The Apostles Constitution, c380, had a tag on the end of the Sanctus, "Blessed be thou forever", but the Benedictus in the prayers of most churches, "Blessed is he who comes in the name of the Lord," did not appear in western liturgies until the Middle Ages.
Tbe simple bow is used at the words in the nicene creed of the Holy Ghost and also at the Gloria Patri [Westminster p 246]
The church in the west begins to use crossings at the Eucharist, a part of the emerging doctrine of ex opere operato. [Westminster]
1100s Marian Devotion and the Rosary begin to appear. Encourage by the Order of Dominicans. With the loss of the Latin tounge by the illiterate, the Rosary was promoted for their devotion during Latin Eucharist known as the "poor man's Psalter" reciting 150 Our Fathers to replace the psalms that the monks recited, replaced in the "Ave Maria". It evolved to the Creed, and fifteen "decades" with an Our Father, 10 Hail Marys and a Gloria Patri, often with a genuflect or other devotion at each of the 15 decades.
1210 Elevation. First ordered for no higher than breast high by the bishop of Paris. Used to indicate the achievement of the consecration. Closely tied to the medieval doctrine of transubstantiation in the West, and the adoration of the consecrated host. This was an extension and exaggeration of the ancient but modest raising of the bread and wine in the liturgy when the president spoke the words of the institution from the Gospel. At the end of the canon a minor elevation was practiced with a doxology.
Washing of the Altar with wine and water on Maundy Thursday.
The issue of leavened vs. unleavened bread came up in the 11th century [Ladd]
1200 - The west departs from standing in the Eucharist. Before then the people were commanded to kneel for silent confessions and preparation, then commanded to stand. This agreed with the 1st Ecumenical Council and tradition. Then the West dropped the silent individual prayers and then the order to stand. [Westminster p. 439]
The first Eucharists were of joy, lost in the Middle Ages. [Ladd]
Monstance is introduced to show the people the consecrated host due to the cult that developed around the worship of the reserved sacrament in the middle ages in the west. This is unknown in the east. [Westminster]
Early style Crucifix showed the living Lord - Christi rex, later the sorrowful Christ [Ladd] Prayers of the faithful. The deacon would announce the topic of the prayer, people would individually pray, and the President would conclude with a short collect, then on to the next prayer topic. [Ladd 64]
No prayers were made to Christ, all directed to God in the name of Christ through the Holy Spirit.
Even if we dismiss the evidence of the early dating of the Diatesseron as evidence of the earliest lectionary system, the year] 411 AD is without question the date of a calendar system upon which the lessons are ordered (British Museum ms. 12150). The arrangement of the scripture lessons as we know them today (see the Order's Lessons and Homilies that use the old Prayer Book lectionary) with few modifications was arranged by Daniel, a monk of the Monastery of Beth Batin and his disciple Benjamin, Bishop of Edessa. The latter was assisted by the monk Isaac, an industrious pupil of the Bishop. It is believed that Daniel used lessons from the Diatesseron and Peshitto readings from the four Gospels. see more here
1660s - Altar rails introduced in England
The student of early liturgical worship may enjoy reading this Early Eucharist historical summary. I've also included some notes taken from various sources concerning early worship as well as links to source documents concerning the Early Church liturgies.
[Justin Martyr 1st Apology Ch LXV & LXVII]
[Apostolic Teaching and&n bsp;Constitutions LVII]
[Aposto lic Tradition of Hippolytus]< /font>
Powers, Joseph Eucharistic Theology
Spencer, Bonnel A Functional Liturgy
The New Westminster Dictionary of Liturgy and Worship
Copyright. Reviewed 1/21/2014
Tidy 1:03 PM 6/2/2006 | <urn:uuid:b075ddde-d4e7-424d-bc00-5b6dab88a5c6> | {
"date": "2020-01-20T13:37:45",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9635109305381775,
"score": 3.15625,
"token_count": 4823,
"url": "http://orderofcenturions.org/liturgy.html"
} |
For this list, we are embarking on a global bird watching trip. Nature has blessed us with beauty coming in all forms and birds definitely rank high among others. There are estimated to be more than 10,000 bird species around the world and we will be counting down the top 10 most colorful birds. So sit back and appreciate the most beautiful and colorful birds and don’t forget to comment on which one is your favorite,
1. RED-NECKED TANAGER
Considered to be the most colourful bird in the world, the Red Necked tanager is native to Eastern and parts of Southern America. Displaying an incredible array of colours, this bird top our list with its very bright, yellow-orange wings, glistening red chin, a broad blue crown and green body underneath. They make their nests in a canopy of forests and shed their gorgeous feathers once every year. Also, read about the most beautiful white birds in the world.
Talking abuy the appearance, the bird species has a bright grass green underparts with an amazing carlet-red chin that broadens over the cheeks, nape and nape. The crown and that is dark blue with orange-yellow wing coverts. There are three species of Red-necked Tanager that mainly differentiate because of the throat patch and in the details of the colouration of the head. It is mostly seen in the small groups of upto 3 t0 4 individuals and regularly joins midstory and subcanopy mixed-species flocks. Both males and female have are beautifully coloured, however, females are little duller.
One of the most beautiful Indian animals in the world, Peacocks belong to the pheasant family and the male species are one of the most colorful birds in the world. They are famous for exhibiting a fan of a beautiful mixture of sapphire and green feathers to attract its mate. They are found in India, Sri Lanka and other parts of Southeast Asia. A group of peacocks are known as an ‘ostentation’ (which means being showy and impressive) and they have the goods to back that up.
The male species are more colorful and known as the peacock, however, females are known as a peahen. The beautiful and coloured tails are the characteristic only for the males. The largest flying bird can reach upto 5 feet and weighs approximately 8-13 pounds. The bird species are omnivores and loves to eat insects, arthropods, amphibians, flowers, seeds…etc. The peafowl can live upto 20 years both in the wild and in the captivity. The predators of the bird species are mainly tigers, leopards, mongoose and in the sense of danger they fly and hide into the trees.
3. MANDARIN DUCK
Mandarin ducks can be recognized at once because of its unbelievable combination of dazzling colours. The males display more colourful feathers than the females which are predominantly brown in colour with a white eye ring. This duck is native to Japan and is also a symbol of love and marriage.
The medium size bird species can grow upto 8 to 10 inches in length and weigh between 1.5 and 2.5 pounds. The most beautiful and colorful birds have a beautiful plumage with a combination of white, black, grey, creamy, orange and green colours. The beak is red with a white tip and males can be easily distinguished from females because they are brightly coloured. Its love to spend a lot of time into the water and webbed feet helps paddling through the water. The main predators are racoons, minks, otters, eagles and snakes. The bird species can survive 12 years in captivity.
4. GOLDEN PHEASANT
These colorful bird species are found in the dense forest and woodland across Western and Southern China. Golden pheasants are famous for their extravagant plumage. They have a beautiful golden-yellow body with just a hint of red. In this case, the females are considered more beautiful than the males with distinctive breast and flanks and also striking black stripes on its tail. One of the most beautiful birds in the world do not want to fly much and spend most of their time on the ground. This bird is also often hunted for sport due to which they are endangered in the recent past.
Both males and females look different in apperance, however, females are slightly smaller in size with 60 – 80 centimetres in length and males bieng 90 – 105 centimetres in length. The male species can be easily identified by their bright colouring and the golden crest that tipped with red which extends from the top of their heads, down their necks. The female species are less colorful and little duller than males. It mainly create its habitat into dense forests and woodlands and sparse undergrowth and mainly feeds on grain, invertebrates, berries, grubs and seeds as well as other kinds of vegetation.
One of the longest migratory birds in the world is as incredibly beautiful as they are incredibly unique and they probably the most recognizable wading bird in the world. The Flamingos get their trademark pink colour from the food they eat: algae and shrimps. This special colour is what makes them so special. They are 6 different species of Flamingo and are found throughout the world apart from Antarctica. They have special glands in their plumage which help them keep their feathers exquisite and in shape. It is one of the beautiful pink animals in the world.
The bird species lives in shallow lakes, mangrove swamps and sandy islands of Africa, Asia, America and Europe. The adult Flamingocan grow upto 3.3 – 4.6 feet tall and wieghs approximately 3.3 – 9 pounds. The color of featther is a result of pigments in thier food known as carotenoids that is the primary reason for red and pink colors of their feathers. The bird species is monogamous that means they will have just one partner and lay one egg each year. They have a lifespan between 20 and 30 years. | <urn:uuid:531cd65e-65d0-4dfe-99ab-d2de6e513414> | {
"date": "2020-01-20T11:28:40",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9595282673835754,
"score": 3.0625,
"token_count": 1256,
"url": "http://petslife.review/top-5-most-colorful-birds/"
} |
Common Name: Ryegrasses
Description: Tufted annuals or perennials.
Leaves with ligule membranous; blade flat.
Inflorescence a terminal spike of erect spikelets.
Spikelets solitary, sessile, laterally flattened, arranged alternately with one edge appressed to the axis, and partly in concavities of the rachis; bisexual with 3–20 florets; rachilla disarticulating above the glumes and between the lemmas. Lower glume absent on all but the terminal spikelet; upper glume strongly 3–9-nerved, flat or slightly concave; terminal spikelet with 2 equal glumes. Lemmas rounded on the back, 5–9-nerved, firm, with translucent tip, obtuse, acute or awned with a straight, subapical awn. Palea subequal to the lemma, 2-keeled.
Distribution and occurrence: World: c. 10 species, Europe, Mediterranean region, temperate regions of Asia. Australia: 5 species (naturalized), all States.
Perennial Ryegrass was probably the first grass deliberately sown for pastures and, with the Italian Ryegrass, is one of the most widely grown pasture grasses of temperate countries. Annual Ryegrasses are often crop weeds. Identification is difficult because many species hybridize freely, for example L. perenne, L. multiflorum and L. rigidum, the hybrid populations showing a continuum of variation. Lolium is also closely related to broad-leaved species of Festuca, such as F. pratensis, and L. perenne and L. multiflorum will hybridize with the former to give X Festulolium. Key adapted from Wheeler et. al. (1990).
Text by S. W. L. Jacobs & K. L. McClay
| ||Key to the species|| |
|1||Plants annual, will pull up easily when mature||2|
|Plants perennial; cannot be pulled up easily when mature and forming a large tuft||6|
|2||Lemmas swollen at maturity, ovate to elliptic, usually with an awn 0.7–2 cm long; glume equal to or exceeding the spikelets||Lolium temulentum|
|Lemmas not swollen at maturity, lanceolate, awned or awnless; glume length variable|
Back to 1
|3||Lemmas with awns more than 3 mm long; spikelets rarely with less than 10 florets||Lolium multiflorum & hybrids|
|Lemmas awnless or with an awn less then 3 mm long; spikelets with 3–22 florets|
Back to 2
|4||Glume distinctly shorter than spikelet; young leaves folded in bud, leaves narrow, usually less than 4 mm wide||Lolium perenne|
|Glume almost as long as, or exceeding, the spikelet; leaves rolled in the bud, usually more than 3 mm wide|
Back to 3
|5||Rachis rigid and stout, c. 2 mm diam., often oval in cross section; spikelets narrow, often embedded in the rachis; plant usually less than 35 cm high||Lolium loliaceum|
|Rachis thin, c. 1 mm diam. and usually round in cross section; spikelets not as narrow, more or less embedded in rachis; plant usually more than 35 cm high|
Back to 4
|6||Lemmas with an awn longer than 3 mm long; about 20 florets per spikelet; leaves rolled in the bud||Lolium multiflorum|
|Lemmas awnless or with an awn less than 3 mm long; spikelets with about 10 florets; leaves folded in the bud|
Back to 1 | <urn:uuid:5d3f6e65-16e6-4706-9827-95f9c07862e1> | {
"date": "2020-01-20T12:58:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8552846312522888,
"score": 3.09375,
"token_count": 844,
"url": "http://plantnet.rbgsyd.nsw.gov.au/cgi-bin/NSWfl.pl?page=nswfl&lvl=gn&name=Lolium"
} |
Water is the most abundant substance in the human body. Nevertheless, staying hydrated with water is an often overlooked component for improving one’s overall health. When the body is not sufficiently hydrated with water, it cannot function optimally. Every cell in your body requires water to function properly. By ensuring that you drink enough water each and every day, you will gain a number of health benefits.
Dehydrated is the leading cause of digestion problems such as constipation. Chronic constipation can cause diverticulitis, a serious condition that is characterized by bulging, infected pouches in the large intestine. In addition to eating fiber-rich foods, staying hydrated on a regular basis will ensure proper digestive function so that digestive disorders do not develop. Fresh vegetables provide plenty of both fiber and water.
Boost Athletic Performance
If you exercise with Insanity for example, then staying hydrated is imperative to your health. Performing a sport or exercising when dehydrated can lead to greater muscle fatigue and muscle cramps. By drinking enough water before, during, and after a sports event or exercise, you will not only prevent muscle problems but will also improve your coordination. During rigorous physical activities, your body cools itself off by sweating. If you don’t replace liquid lost through sweat by drinking water or other hydration beverages, serious conditions may occur such as heat exhaustion or heat stroke.
Skin is the largest organ in the human body. Just like all of your other organs, your skin also requires water for proper function. When you’re dehydrated, your skin is affected and may become tight, flaky, and dry. When you are properly hydrated, your skin will be less prone to developing fine lines and wrinkles, and will remain supple and resilient.
Removal of Toxins
Water is essential for removing toxins from the body. Proper hydration ensures regular bowel movements, which is important for preventing waste from poisoning the body. Waste is also removed through perspiration and urination. Without proper hydration, toxic buildup in the body occurs causing symptoms such as headaches and fatigue. Drinking enough water will flush out waste products, which will ease the burden on your liver and kidneys.
Energy Levels and Overall Mood
When you haven’t had enough liquids, you may notice that your energy levels decrease. Some people experience feelings of depression when they are dehydrated. Since your body relies on water for so many functions, dehydration can throw your energy levels and emotions off considerably. Rehydrating yourself can restore your sense of emotional balance and give your energy levels a significant boost.
Efficiently Transport Nutrients and Oxygen throughout the Body
Your blood is what carries oxygen and nutrients throughout your body. Since blood is made up of about 92 percent water, proper hydration will assist the blood in your body in doing its job at optimum efficiency. Staying hydrated will ensure that nutrients and oxygen are distributed throughout the body so that all of your organs and cells can maintain proper function. As a result, you will be able to decrease your risk of developing many types of cancer and health disorders.
Be Smart About Hydration
The average American consumes around 400 calories a day in liquid form! This includes soda, sport drinks, energy drinks, juice, and flavored ice teas. You can be smart by making sure any calories you drink are in the form of a meal replacement rather than a hydrator. (Water’s still the best hydrator out there.) Shakeology is a great meal-replacement shake for busy people, because it’s convenient, jam-packed with important nutrients and antioxidants, and low in calories.
Fun Hydration Tip
Instead of going through tons of plastic bottles at your desk, buy yourself a fancy water bottle. Busy people often forget to hydrate properly. In addition, the average American drinks 57 gallons of soft drinks each year! You can avoid the temptation to purchase soda by refilling a beautiful Kleen Kanteen® with water throughout your day. On a budget? Wash out a glass water, juice, or milk bottle and make that your go-to reusable water bottle.
Did you find this post helpful?? Do me a quick favor and share it with your friends! “Tweet it”, “Like it” or “Pin it” to help someone else who may be going through the same struggles as you! . Very much appreciated.
Yours In Success,
Work With Me - Join Us!
WHAT DO YOU THINK? LEAVE YOUR QUESTIONS, COMMENTS, or ideas below in the comments! | <urn:uuid:156d950b-6206-4744-9fe2-a0b99b96387f> | {
"date": "2020-01-20T11:35:13",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9373305439949036,
"score": 3.796875,
"token_count": 947,
"url": "http://pledgetostayfit.com/tag/hydration"
} |
to a new Italian Renaissance Costuming Mini
Challenge. Our mini challenges usually run from the first to the
last day of a month, and this one is no different. From January
1 - 31, 2014, participants will be required to create an item,
or items, made from, or with, fur, in the style of the late Italian
Renaissance (1480 - 1600). Either real (re-purposed or recycled), or faux fur may be used.
The item or items must be started from
scratch no earlier than January 1 2014 (in your time zone). You have
until 31 December 2013 to register as a participant (details
on how to enter, below).
and Types of Fur
Lining - Fur was primarily used as a full lining in
garments. Garments could have their linings replaced when the fur
became too worn, and this was then recycled into garments worn
around the house. Both men's and women's garments were lined with
various furs. These garments were: long loose over-gowns (both for
indoors, and out); short over-gowns, cloaks, sleeved cloaks, and
capes; short mantles; riding capes; maternity gown (short);
dressing gown; ducal gown; Venetian underskirt. In
addition, sleeves are cited in at least one source as possibly
being lined with fur independently of the garment they were to be
attached to, as well as "trousers" (upper hosen).
Facing/trimming - Fur as also used as a facing/trimming, in
both short and long over-gowns.
Accessories - Muffs. Shoes, and boots, as well as gloves,
could be lined with various furs. I have also found a
reference to fans in Venice being made "of lynx and
ermine", prior to being forbidden by the sumptuary laws of
1522. Furs were also carried by women which were made from the
entire pelts, including head and feet, of various animals.
was also used to line bedding - a "bed ensemble",
"bed throw", "blanket", and (bed)
mentioned are: squirrel (variously mentioned as 'fine squirrel',
'squirrel bellies', or even 'squirrel tail'); sable, ermine, wolf,
lynx, marten, pigskin. There are also mentions of black lambskin,
white lambskin, Spanish cat, cat, puppy, suckling animal, and a
"false ermine" made from sheepskin with black tails.
All you need to register as a
participant is to send me an e-mail
(link below) providing your:
name (legal, not SCA name
(state/province and country)
head and shoulders photo, by
no later than 31 December 2013.
The item/s you enter must be started - from scratch - no earlier than
January 1st 2014 (in your time zone).
Your item/s need to be completed by
January 31st 2014 (in your time zone).
I will accept progress
photos - that is photos of the unfinished item/s - of your items
IF you wish to take and send them to me, as these are very
useful for evaluation purposes. However, progress photos are NOT required.
A photo of each completed
item (or several photos if required) MUST be sent no later than
, so please ensure you have your camera, batteries, cables, etc., ready to use when you need them.
A short write-up documenting
your item/s period-accuracy and all hand-work done needs to
accompany the photo/s. Please make sure that
the e-mail address you use to email me is one that you use and
check regularly so that I can contact you if needed.
If I've forgotten to address anything, or if you have any questions please ask before the challenge begins.
Only one winning item
will be chosen, based on the following factors: period-accuracy
(most important) hand-work (second in importance), and aesthetics (very subjective of course). The prize will be a Gift Certificate from the online retailer of the
winner's choice, to the value of $US20, or $AUS20, or £15, or
€15, to be provided by yours truly.
about the challenges. The
inaugural Italian Renaissance Costuming Challenge (IRCC) ran from April to August
2011 in celebration of The Realm of Venus' tenth year online.
It was the first challenge I had ever run, and a lot of fun for
not only the participants, but for me too. I decided that since
the IRCC leaves eight months of the year free, running a
mini-challenge would allow for those who prefer a shorter, more
focused challenge, or for those who want more! Thus was born the
Italian Renaissance Costuming Mini-Challenge: a month-long
challenge, usually on a theme voted on by those who participate on my Facebook Page.
The first Mini-Challenge was the 'Idle
Hands' challenge which ran
in October 2011, followed by 'Over
and Above' in February this year, followed by a special
mini-challenge - Perfectly
Period Pink - in September to October 2012, to raise money for
image taken from: Countess Livia da Porto Thiene, 1551. The
Walters Art Museum, Baltimore, Maryland, USA. | <urn:uuid:1d6b80b7-c3d4-4f21-9a8b-371b7bf1d734> | {
"date": "2020-01-20T13:02:56",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9459280371665955,
"score": 2.578125,
"token_count": 1193,
"url": "http://realmofvenus.renaissanceitaly.net/challenges/IRCMC-Jan2014.htm"
} |
5th - 9th March 2018, St Peter's were very lucky to be given the challenge of STEM week. This was the first year, we have had a STEM week in school and the children were certainly challenged and lots of fun was had by all!
What is STEM?
STEM is the future. It links the subjects of science, technology, engineering and maths together; this gives us the opportunity to greatly enjoy building our knowledge through some amazing activities and projects.
Within this special week children were given a different Easter challenge that would promote their problem solving skills, the children had to use their knowledge of all four subjects and logical thinking to solve challenges.
Nursery's challenge was Easter Slime. Here, the children had to fill different sized plastic eggs with a variety of slime, finding some much more difficult than others.
In Reception, children had to gather up their plastic eggs and see how high they could build a tower, the children then measured their towers, some were amazingly high using up to 30 egg halves!
The children in Year 1 were focusing on jellybean structures! The children were investigating what they could build out of jelly beans and toothpicks – they came up with some fantastic ideas.
Year 2's challenge was plastic egg races! The children had to aswer the question - How well do eggs roll? They used different ramps to race the plastic eggs, testing which one was most successful after changing the angle. The children then challeneged themselves further by seeing what would happen if they added an object into the egg. Year 2 found out that the heavier the egg, the further it rolled.
In Year 3, the children were completing the egg drop challenge, here the children had to design a structure that would keep the egg safe once it was dropped from a height. Some of the designs worked whilst others did not. This allowed Year 3 the opportunity to evaluate their work and decide on the best design to protect their egg.
The children in Year 4 were creating plastic egg eruptions. The children had to fill the halves of plastic eggs with a tablespoon of baking soda, and then they use food colouring and vinegar to make mini eruptions with a dropper. The children recorded their results and made some great recordings, using all of this the children then created their own story board.
Year 5’s challenge, was to create rubber eggs. The children had to see if they could make an egg bounce. They added vinegar to a real egg and recorded the reaction that took place. Over the week, the shell of the egg dissolved and the children were not left with a raw egg but instead a rubber egg that would bounce!
Year 6 had to the challenge of designing an egg catapult. The children used a range of materials to build a catapult that would launch a plastic egg, once built the children found the average distance for each catapult then recorded their findings on graphs, this allowed the children to see which design was the best. Year 6 then experimented further with their catapult designs observing what would happen if there were an object added inside the egg.
All classes took part so please do ask them all about it. The whole school worked so hard to complete all the tasks. We ended the week, with each class presenting their findings in assembly, so please look at our gallery item! | <urn:uuid:70b393dc-939f-49ce-9de0-35bc021dea1c> | {
"date": "2020-01-20T12:57:32",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9867061376571655,
"score": 3.5625,
"token_count": 673,
"url": "http://stpetersce.rochdale.sch.uk/page/stem/42826"
} |
First Map: How James Cook charted Aotearoa New Zealand
Tessa Duder's latest book is a handsomely produced narrative of how Lieutenant James Cook created the first chart of Aotearoa New Zealand. The beautiful illustrations are by the acclaimed Dunedin artist David Elliot.
The hardback large format book has been published by HarperCollins, timed to coincide with Tuia - Encounters 250, the commemorations of Cook's arrival in New Zealand in October 1769 being held nationwide from October to December.
Since it was published in a 1773 book on Pacific exploration and by the Admiralty in 1816, James Cook's chart of New Zealand has long been regarded as one of the most extraordinary achievements in the history of cartography. First Map: How James Cook Charted Aotearoa New Zealand tells the human story behind the creation of the famous chart, following the progress of Cook's six-month circumnavigation of New Zealand over the summer of 1769-70 and piecing the map together as the narrative on H.M.B. Endeavour unfolds.
It is a story of courage and dogged perseverance, demonstrating Cook's extraordinary skills as both cartographer and seafarer and how his encounters with Mãori hapu (disatrous at first, but subsequently ranging from mutually respectful to friendly) taught him much about Mãori life and their rich culture.
First Map: how James Cook charted Aotearoa New Zealand
'From about the 1960s, many Kiwi homes and baches had a print of James Cook's iconic New Zealand chart hanging on a wall,' says Tessa Duder. 'Older Kiwis grew up with this image. I felt that a suitable contribution to the Tuia Encounters 250 events would be to re-introduce adult and younger readers to Cook's great achievement. He literally put the three major islands of New Zealand on the world's maps.'
Sailing across the Tasman on the tall ship Spirit of New Zealand in 2013 gave Tessa a taste of the storms, huge swells and calms experienced by the Endeavour sometimes hundreds of miles from the land. (Go to Resources to see her account of this passage.)
First Map is suitable for family reading, with sections of the chart matching the narrative of Endeavour's six-month passage around the coasts of the three major islands. It was a hazardous journey: Cook knew only the coastline from Hokitika to Cape Reinga drawn by Abel Tasman in 1642, and on seven separate occasions he was exceptionally lucky not to lose the ship, by grounding or being swept onto lee shores. There were also several occasions when Mãori hostility both on the water and on shore could have ended in tragedy for the English visitors; the deaths of maybe eight or ten Maori resulted from mutual misunderstanding and the visitors' superior musket fire power used in self-defence.
The illustrations feature David Elliot's distinctive watercolour style, plus the famous map of Pacific islands drawn by the Tahitian priest Tupaia, who was on board for the circumnavigation and contributed invaluable help to the Europeans as interpreter and diplomat.
Tessa Duder is visiting major New Zealand cities during September, October and November to talk about James Cook, explorer, surveyor and map-maker without peer.
The Alex Quartet back in print
General reaction to the news that the Alex books are coming back into print has been very gratifying, says Tessa Duder. 'There seems to be agreement among teachers, librarians and parents that some of the best novels from the 1970s onwards, when children's literature in this country came of age, should be available to new generations of children. These would include writers like Margaret Mahy, Sherryl Jordan, Jack Lasenby, Joanna Orwin, William Taylor and the early works of Kate De Goldi and Mandy Hagar.'
The Alex books cover her life from early in 1959, vying for selection for the Rome Olympics, her struggles during the winter of 1960, her experiences in Rome in August 1960 and the six months following, when she must make major decisions about her life. She has been described as one of the most memorable characters in all New Zealand literature.
The omnibus edition published by One Tree House will be available from September 2019.
2016 winner of Storylines Tessa Duder Award: Tina Shaw
Tina Shaw has written five novels for adults, plus many short stories published in anthologies, literary journals and magazines. Her work for children includes the award-winning About Griffen's Heart and a number of picture books.
She has held the Buddle-Finlay Sargeson Fellowship, the Creative New Zealand Berlin Writers' Residency and the University of Waikato Writers' Residency.
Open to all New Zealanders who meet the eligibility criteria, the Storylines Tessa Duder Award for a YA manuscript will be offered again in 2020, with a deadline of 31 October 2019. For more details, the entry forms and guidelines, please go to www.storylines.org.nz under Awards.
Meet the 2016 winner of Storylines
Tessa Duder Award
Gareth Ward and his teacher wife came to New Zealand from UK nine years ago and run Wardini Bookshop in Havelock North.
He is also well-known in the Hawkes Bay area as a magician, much in demand for schools and community events for shows which combine a long-time love of magic with storytelling. The Sin Chronicles: New Blood, his first attempt at a full length novel, is a rollicking "steampunk" narrative set in Victorian England, and intended as the first in a trilogy.
'Storylines is very grateful to Walker Books for sponsoring this award for YA writers,' says Tessa, 'particularly after 2015 when we could not find a winner. Our first two winners Hugh Green (Reach) and R.L. Steadman (A Necklace of Souls) had gone on to great success at the New Zealand Post awards, so this was a real disappointment for the judging panel. But now we have the launch of Gareth's novel in 2017 to look forward to. His is a distinctively new voice among Kiwi YA fiction writers.'
Open to all New Zealanders who meet the eligibility criteria, the award will be offered again in 2018, with a deadline of 31 October 2017. For more details, the entry forms and guidelines, please go to www.storylines.org.nz under Awards.
Sarah Mathew: Explorer, Journalist and Auckland's 'First Lady'
Sarah Mathew tells the story of a young Londoner who sailed for Australia in 1831 to join her surveyor cousin Felton Mathew. Married in Sydney, they spent nine years in New South Wales, until Felton accompanied Governor William Hobson to New Zealand in January 1840 to proclaim a new British colony. Sarah followed in March 1840.
'We know a good deal about day-to day settler life in the Bay of Islands at that period, and especially how, in the months following the signing of the Treaty of Waitangi, Auckland came to be chosen as the first capital,' says Tessa. 'That is largely because Sarah wrote wonderful journals and letters which miraculously survived and were returned to New Zealand in 1938.
'The 1840 Journal covers her epic winter journey with Felton, in a 46ft cutter from the Bay of Islands down to the Firth of Thames, to find a suitable site for a capital. Covering hundreds of miles by boat and on foot, they were among the very first Europeans to explore the harbours and rivers of Whangarei, Mahurangi, Waitemata, Tamaki and the Firth of Thames.
'Her accounts of Auckland's real birthday, 18 September 1840, and the first few months of settlement, are especially wonderful, so acutely observed. Sarah was the only European woman ashore for the flag-raising ceremony, an historic moment memorably captured by the painting used for the book's cover.'
Sarah's story tells of her delight in the landscape, her social activities and disappointments during the six years she made Auckland her home. Sadly, she was never to have children. From both her own and Felton's extensive writings, it is clear that couple was deeply in love and committed to building a life in New Zealand, but his career as a surveyor and his health faltered. Finally, in 1847, with Felton ill and both disillusioned, they decided to return to England.
'Sarah's subsequent story is poignant, one of hardship and loneliness, but luckily for us, she had written those wonderful accounts of her New Zealand years and her long voyages under sail. All in all, as a steadfast and clearly stoic wife, she made three round trips from UK to Auckland and back, meaning three trips around Cape Horn. For most pioneers, once was enough!'
Felton Mathew is remembered in Auckland mostly because of a street name in the Glen Innes area. 'I am hoping that with the publication of this book, the name of Sarah Louisa Mathew will be restored to its rightful place in our pioneer narrative,' says Tessa.
'And drawing on my recent experience crossing the Tasman Sea under sail, some years in my thirties as an expatriate wife, along with a long-time interest in early Auckland, I was quite well qualified to tell Sarah's story, with sympathy and understanding, both of her achievements and struggles, and what they cost her.'
The book will be available in bookshops from mid-September.
Out on the Water – Twelve Tales of the Sea
For her first children's fiction in ten years, Out on the Water – Twelve Tales of the Sea, Tessa Duder has chosen a nautical theme: a brand-new collection of sea stories, illustrated by Bruce Potter and published by Peter Dowling of Libro International (an imprint of Oratia Press).
‘I've done lots of different sorts of sailing over the years,’ says Tessa, ‘so there are stories about children learning the ropes of dinghy sailing, or kayaking up rivers, or sailing as crew in their family boats.
Two have historical themes: the longest story explores what the experience of crossing the Tasman in 1882 in a tall ship might be like for a shy 12-year-old boy, and another shares with another boy the challenges of transporting 62 nearly wild cattle in a scow from Great Barrier Island to Auckland in the 1890s.
‘I have always been fascinated by the rich language of the sea, so the book includes useful glossary of sea words and expressions, many of which have passed into general use.’
Each of the twelve stories has a full-page illustration specially created by leading New Zealand illustrator Bruce Potter, well-known for his many picture books (The Whale Rider) and as an entertaining visitor to schools.
The book is being promoted by Yachting New Zealand and will be on sale nationwide from November.
A Treasury of New Zealand Poems for Children, edited by Paula Green, illustrated by Jenny Cooper
Noted Auckland poet Paula Green has edited a marvellous new Treasury for Random House New Zealand, A Treasury of New Zealand Poems for Children – and it includes Tessa Duder's narrative verse ‘The Cat who's Known as Flea’, about a cat who feels unwanted by his family.
‘I was truly delighted to have this piece accepted for this new Treasury,’ says Tessa, ‘as Paula is a noted poet and reviewer, and you only have to look at the extensive list of contributors to see how widely she cast her net: poems by James K. Baxter, Patricia Grace, Joy Cowley, Margaret Mahy, Gavin Bishop, as well as a host of less-well known and young writers.
‘And in Jenny Cooper, Paula found a truly splendid collaborator. It's a beautiful large format hardback publication, with the lovely little touch of three sewn-in bookmarkers for readers to note their favourites. A perfect gift, but also for classroom enjoyment, and I have to say, extraordinary value at $37.99.'
Congratulations to Paula, Jenny and Random House for an important book which should be in every New Zealand family!
Spirit of New Zealand leaves Sydney in October 2013 bound for Opua in the Bay of Islands.
Across the Tasman in tall ship Spirit of New Zealand
In October 2013 Tessa Duder sailed across the Tasman Sea in the tall ship Spirit of New Zealand, taking part in the very first Tall Ships Race from Sydney to Opua.
‘This was an amazing experience,' recalls Tessa. 'I've long been a Trustee of the Spirit of Adventure Trust, but on board I was grandma to 39 young people and a hand-picked Spirit crew of 12.
‘We ran straight into rough weather – 40 knot winds and 5 metre swells – so I was pretty unhappy and perfectly useless for the first four days. After that, it was all pure pleasure: sighting the Poor Knights islands, ghosting around North Cape under a full moon, dropping anchor after nearly eight days in the historic bay off Russell.
‘We took several days to sail down the Northland coast, enjoying activities with ships from other nations (Australia, UK, Holland etc) with the climax a grand entry into the Waitemata harbour at Labour weekend.
‘The 52 crew aboard Spirit of New Zealand were delighted to take third in the race (line honours and on handicap, with several of the ships withdrawing with gear failure), and even more thrilled to be voted the friendliest ship by the crews of the other six ships in the race.’
For Tessa's full account of her amazing voyage, go to Resource pages.
The Story of Sir Peter Blake
The Story of Sir Peter Blake by Tessa Duder – this new biography of New Zealand's most famous long-distance sailor is being published in June by Libro International, an imprint of Oratia Media.
The book has been specially written for younger readers at the request of the Sir Peter Blake Trust, set up in 2002 to honour his name and continue his environmental work.
'The Trust was keen to have a new resource for schools, libraries and families,' says Tessa, 'to inspire a new generation of children with Peter Blake's extraordinary life as a yachtsman, an inspirational leader through five Whitbread Round-the-World races and two America's Cup regattas, and in his last few years, as a tireless worker to raise global awareness of the environment.
‘Much has been written about his achievements and tragic death on the Amazon River, including Alan Sefton's full-length biography, Pippa Blake's memoir and Peter's own books.
‘However, I'd like to think that mine is a particularly useful and accessible summary of his life which will appeal to adults as well as children from about nine or ten on.
‘With the help of the Trust and his family, notably his widow Lady Pippa Blake and younger brother Tony Blake, we've been able to include some new pictures as well as familiar ones taken at key moments in his life.
‘It's a truly inspiring story of a lanky kid who loved to sail with his family around the Waitemata Harbour and Hauraki Gulf to hard-won success in the world's greatest yachting events, both in round-the-buoys contests and epic races against time and other contestants through the world's greatest oceans.’
The book also includes short sections designed to help young readers with background information to put Sir Peter's aspirations and achievements in context – for example, potted histories of long-distance yachting, the Whitbread and America's Cup events and the art of navigation, as well as brief descriptions of differing types of the yachts and rigs.
Among those quoted are Lady Pippa, Tony Blake and famous sailors such as Robin Knox-Johnston, Grant Dalton, Russell Crowe and Mark Orams.
The book, of 144 pages, many black and white pix and 8 pages of colour pix, will be available nationwide from late June at $21.99 | <urn:uuid:d9f38c25-6ba7-42d7-8b82-f953f8654fef> | {
"date": "2020-01-20T13:07:10",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9663554430007935,
"score": 3.203125,
"token_count": 3367,
"url": "http://tessaduder.co.nz/news.html"
} |
One of the challenges of working with earth is that no two sites are the same.
The recipes one learns on one site may not work on another, because the earths found there are composed differently. Most earth building relies on a mix of sand and clay, which may be present in a single earth or need to be blended together.
Sand has many faces
Sand has a particular particle size and is like a rock, only smaller. You go from boulders to rocks to stones to gravel to sand to silt, or something like that. Each is a smaller representation of the one before it and just like you get many sizes of rock so you get a range of sand size. Sand particles range in size between 2mm and 0.0625mm, which is a huge deviation.
The shape of sand in an ideal world should be shattered rather than rounded, such as beach sand. River sand is considered better because it tends to be more fractured so the sand particles do not slip past each other but rather build bridges and lock in together.
Ideally you also want the sand to have a range of particle sizes and not just lumped on the large side, 2mm or the small 0.06mm. This is because when the larger sand particles are packed together you will have spaces in-between and you want those gaps closed with smaller sand particles. Of course as you look closer you will see that there are spaces in-between the smaller particles and it really is like a fractal. The next range down is silt and ranges between 0.06 mm to 0.0039 mm. This particle would be able to close those gaps and so you go. So with sand you are looking for two things primarily, a shattered particle and a good distribution of particle sizes.
Clay: the magic that does the binding
Clay is the magic that does the binding in earth building. Clay is completely different to what has been mentioned above, except that there is some relation to particle size with silt. If you went to the beach and made a sand castle you will find when it was dry and you apply a little pressure, you flatten it, especially with those rounded particles.
Do the same with clay and once it is dry it is immensely strong. This is because clay is not just a smaller sand particle but rather a flat platelet that is held together by electrostatic force. It works in a similar fashion to a drop of water between two pieces of glass – you can slide them apart but you can’t pull them apart. The trick with clay is to work the material until the particles are lined up to allow the electrostatic forces to work. There is always enough humidity in the air and retained in the clay to allow this process to continue, even in very dry conditions.
Clay and silt are often found together in the same deposits and are hard to tell apart if they are mixed together. Mostly what is termed as a clay earth is a mixture with silt. I consider 60% a reasonable clay content . Clays also all behave differently. Some clays swell considerably when water is added and are great for the sealing of dams and the like, but no good for building with cob or mud/adobe brick, as this leads to cracking in the drying process.
You want high percentage of clay, little silt
Really fine clays also tends to be brittle, such as Kaolin, a fine white clay. So with clay you are looking for a nice high percentage with as little silt as possible, not too fine. And one that does not swell to the point of compromising the strength of the material with excessive cracking once dry.
Now to create a building material both sand and clay are blended together, to get the benefits of the structure of the sand with the binding properties of clay. Basically you just want to add enough clay to coat the sand particles and close the last of the gaps left between them and allow the electrostatic force to hold it all together.
You certainly do not want silt as that is competing for the space between the sand particles and is just where you want the clay to be. At around 18% there would be just enough clay to do the job. If there is silt present with the addition of 18% clay you would begin to force the sand particles apart and you would have a more brittle material, as the material is strongest when the sand acts as a bridge over each other, locking together.
What’s available is always less than perfect
But that’s the theory, in reality you are dealing with what is available and that is always going to be less than perfect. Your sand may have only large and small particles and nothing in between or any number of permutations, depending on how nature left its deposits. Your clay may be a mixed bag of various amounts of silt and swell in a less than perfect manner. So what you are looking for is not the ideal, that does not exist, but rather something that is suitable and strong enough for your needs.
Different methods can help with how the material behaves so choice of approach is important. Blending and lining up of the material can be done in essentially two ways and both have their benefits and drawbacks.
1) Adding water lines up particles
The first is to add water and mix the material until well blended to achieve a good lining up of the particles. Different methods allow for different quantities of water, however the addition of too much water can lead to avoidable cracking or a material with less compressive strength.
Cob is often the standard most people refer to and also has some added straw (straw adds to the insulation value and tensile strength of the material) The cob mix needs to be stiff enough to resist slumping when placed on a wall to the height of 300 to 500 mm.
One of the benefits of using water is that different earth can be easily blended and straw can be added, a drawback may be that if the clay is aggressive or of a high overall percentage it could lead to cracking and a weakening of the material.
2. Pressure can also line up particles
The second method of lining up the particles is to put the material under pressure and not to add water beyond just slightly damp. The material can be stamped such as for rammed-earth or compressed such as with a compressed earth block.
A benefit could be that as you are not adding water, there will be less cracking, even if the clay content is high. A drawback is that earths are not easily mixed together without water unless you have other machinery so a single earth is often used and the addition of straw is not possible.
Understanding how earth behaves is key to choosing a method of approach that supports the materials you have on hand.
Earth requires compressive and tensile strength
Earth requires two properties to make it strong enough for building – compressive and tensile strength. In much the same way that steel works in concrete, they can’t be looked at in isolation as they work together. For example, even though concrete when supported can take an enormous amount of pressure or compression without disintegrating, if you were to cast a concrete lintel without steel and suspend it between two points and apply pressure, it would snap. Steel has enormous strength in tension, while concrete has enormous strength in compression.
Compressive strength is measured in Megapascal (MPa). One atmospheric pressure is 101 325 Pascal; a Megapascal is more-or-less one million Pascal, or 10 times atmospheric pressure. In other words, one MPa is 10 times stronger than it needs to be to resist the force of gravity on earth, stand on its own and not be crushed.
A good mud-brick has a MPa strength of around 1.6 to 1.9 MPa, while a clay-fired brick has an MPa strength of around 14. Concrete ranges between 15 and 25 MPa. Obviously these figures vary widely, but these are good averages. A mud-brick at 1.4 MPa is 14 times stronger than gravity, a clay-fired brick at 14 MPa is 140 times stronger than gravity or 140 atmospheric pressures.
Tensile strength is found in all material, just in varying degrees. Concrete as we have seen has high compressive strength, but relatively low tensile strength. The addition of steel (reinforced concrete) increases its tensile strength. Mud bricks can handle 14 atmospheres, but like concrete they have poor tensile strength. However, as clay is somewhat plastic in its behaviour it’s not as poor as one may think.
This is why the addition of straw to a mud brick is essential, as it not only increases the insulation value of the mud brick, but also acts like steel in concrete. (I am told that weight-for-weight straw is stronger than steel or at least in the same realm.)
In short, the tensile strength of a material is its ability to resist snapping and cracking. Increasing the hardness of an earthen material, for example by adding lime, may not increase its tensile strength or resistance to cracking, as it may end up becoming less plastic and more b
rittle. Thus, clay buildings are often more resistant to cracking, because they can absorb the movement that harder more brittle materials may not.
When building with earth, strong enough is what you are aiming for. At 1.3 MPa, a double-storey building is already seven times stronger than it needs to be. However, given window and door openings and the fact that the gravitational forces need to be transferred around them, 1.3 MPa just covers it with a safety margin. It is important to grasp that it does not matter at all if you used clay bricks at 14 MPa, once something is strong enough, the extra strength means nothing at all.
- Make a brick using the cob method (that is using sand, clay and straw ) and a 2 litre ice-cream tub as mould. Number each mix and mark your bricks and balls.
- Allow the bricks to cure for 3 weeks minimum in the sun. A brick is considered cured after 3 months, but I have found that 3 weeks gives you a really good idea, after all it will only get stronger.
- Drop the brick from waist height, onto a very hard and flat surface and observe how it breaks up. If it shatters it is no good; breaking into a few large pieces is acceptable. Often enough it does not break at all, which is fantastic.
Observe the cracking. Surface cracks, no deeper than a cm are fine. Cracks that run deeper compromise the material. They may be due to a very aggressive clay or because there is too much clay in the material. There can be other causes of the cracking, such as the addition of too much water or uneven drying of the material.
Compressive testing – stand on our ball
- Make tennis ball size balls using the cob method and allow to cure, as above. A ball has a point and you are testing the point load. Remember to mark the balls.
- Place the ball on a hard and flat surface. Stand on the ball with your heal and slowly increase your weight on the ball until all your weight is suspended on it.
My weight is around 80 kg and I know that if the ball crushes just before all my weight is suspended the MPa strength is 1.3. If it takes all my weight then the MPa strength is at least 1.4. As you gain more experience and your frame of reference increases you can quite accurately gauge greater MPa strengths by gently bouncing with your heal on the ball. At around 1.8 MPa the balls are very resistant to crushing with the heal, even with repeated bouncing; but then it does not matter because the material is already more than strong enough.
Both the compressive and tensile strength tests need to be passed for the material to be good enough to build with. Of course, if the material fails this tests it does not mean it can’t be used, especially if cracking is the result of failure. You can try excluding water and instead try ramming the material as a way of lining up the particles and see if that will works; or try making compressed earth bricks or even a sand-bag house?
Bottle, tongue and touch are all good indicators of how an earth is composed, but nothing beats compressive and tensile testing.
Test by means of a bottle
Place 4 cm of the earth in a 400ml bottle, add water and a teaspoon of salt to help it settle and shake it all up. It will give you an indication of the particle ranges you are dealing with and their ratios. However beware you will not be able to tell the difference between sand and silt.
To check if clay is present, make the material very wet and rub between your hands, then dip your hands in water, if the material sticks then there is clay present if it falls away then there is mostly or only silt.
Resistance to water erosion is dealt with separately in the plaster stage which will be dealt with later.
Below is a list of tests I made for Magic Mountains retreat as an example of a comprehensive earth test:
- First walk the area you have to source your materials and then collect samples from various sites. Here I located 2 distinct earth types. White building sand was located close to the farm. Make observations of the material so you can begin to make rational choices for you mixes.
- Red earth located in the South East corner of the property. This earth appears to have a high clay content. It is also attractive in colour. Made up of fine sand clay and unspecified amount of silt Brown earth located to the North. This earth appears to have a higher sand content although very fine. Certainly has a lower clay content than the red earth.
- White sand located to the South on a neighbours farm. This sand has a particle range that excludes finer particles and is angular and not rounded.
The following test samples were made to deduce the tensile and compressive strength of the material. Clay content of the red earth, and cracking of the material will also be noted:
- A100: 3 x 2l 100% earth bricks red earth and test balls
- A100: 3 x 2l 100% earth bricks red earth with straw and test balls
- 3 x 300mm x 300mm x 170mm red earth bricks with straw
- B100: 3 x 2l 100% earth bricks brown earth and test balls
- B100: 3 x 2l 100% earth bricks brown earth with straw and test balls
- 3 x 300mm x 300mm x 170mm brown earth bricks with straw
- 50/50: 3 x 2l earth bricks 50%/50% red and brown earth and test balls
- 50/50: 3 x 2l earth bricks 50%/50% red and brown earth with straw and test balls
- 2 x 300mm x 300mm x 170mm 50%/50% red and brown earth bricks with straw
- W80: 2 x 2l earth bricks 20% red earth 80% white sand and test balls
- W66: 2x 2l earth bricks 33% red earth 66% white sand and test balls
- W50: 2 x 2l earth bricks 50% red earth 50% white sand and test balls
- C4: 2 x 2l earth bricks 50% red earth 50% sand and test balls
- C66: 2 x 2l earth bricks 33% red earth 66% sand and test balls
Results of the brick testing above:
- It was established that the red earth has a high clay content. Certainly above 60% as the bricks with 20% red earth and 80% white plaster sand were only just below minimum building strength. As soon as the ratio of red earth reached 33% it was obvious that the bricks passed both a compressive and a tensile strength test. It is estimated that the MPa strength at 33% is 1.4. Above 33% red earth and the bricks harden a lot.
- The brown earth from below the dam could be used as a filler with the red earth, but this was decided against as it is in valuable agricultural land. It is not suitable on its own.
- The addition of straw added to the tensile strength of the material in all cases.
- The red earth bricks displayed deep cracks indicating a high clay content. Once 50% sand was added the cracking was acceptable. The addition of sand will ensure that this does not happen and is a good enough reason to not use the red earth on its own.
- The tests done with the white sand and red earth were strong enough from 33% red earth. A second test was also done with 50% red earth and 50% white sand which delivered a brick over 1.6 MPA.
It was decided that, because the white sand was easy to access with little environmental damage and because it would eliminate cracking, that the addition of 60% sand was the most favourable option; 40% red earth just to remain clear of the 33% mark that we know is good, in case the earth varies slightly.
Strong enough is good enough
Compressed earth bricks using red earth only are strong enough and has no cracking.
It is interesting to note that the red earth was suitable as a building material on its own if it were not for excessive cracking due to the swelling of the clay with water. If one uses compression as a method of lining up the particles and so exclude water, the earth can be used as it is.
In conclusion, often when doing tests with different earths you will find that a number of your samples will pass both compressive and tensile test. This allows you the freedom to make choices affecting sustainability or aesthetics; such as how far the material has to travel, how easy ii is to gather the material and what environmental damage is being done.
Remember that you are not looking for the strongest sample, but rather the one that makes the most sense after it has passed the tests. Strong enough is strong enough.
By Peter McIntosh
In his next blog Peter will look at plastering of a building where the walls are able to resist the erosion of rain and the beauty of the material shines through.
Source: Natural Building Collective | <urn:uuid:4109b022-083d-494d-8c13-4cb0295985ab> | {
"date": "2020-01-20T12:33:10",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9614192247390747,
"score": 3.15625,
"token_count": 3773,
"url": "http://thegreentimes.co.za/natural-building-part-2-understanding-testing-different-earths/?shared=email&msg=fail"
} |
The tower - Scarritt College for Christian Workers, circa 1930
- View Full Item
- Created Date
A postcard of the tower at Scarritt College for Christian Workers. Located on Nineteenth Avenue South, Scarritt College came to Nashville from Kentucky in 1924 as a training school for women Christian missionaries. Like a teaching college prepared teachers, this Methodist Episcopal school set out to prepare religious workers. The soaring Gothic tower shown here is part of the Belle H. Bennett Memorial, which is comprised of the central group of buildings on campus. Belle Harris Bennett co-founded the school along with Dr. Nathan Scarritt. Bennett was a vital member of the women's suffrage movement, and also instrumental in Christian education. The tower, along with the other buildings, is constructed with colored stone from the eastern part of Tennessee, trimmed with cut stone from Indiana and Kentucky. It was constructed to thrust upwards, to inspire reverence and awe of God. Henry C. Hibbs of Nashville designed the tower and the rest of the buildings on campus. The tower was complete in 1928. A year later, Hibbs won a gold medal for his ecclesiastical design. Today the school is used as a conference and retreat center. Then school's name has changed to Scarritt-Bennett Center to reflect both of its co-founders. Forms part of the Nashville Room Postcard Collection. 1 postcard : col. ; 3.5 x 5.5 in.
- Digital Library of Tennessee
- Contributing Institution
- Nashville Public Library
- Capitol News Co. (Publisher)
- Bennett, Belle Harris, 1852-1922--Memorials
Scarritt College for Christian Workers
Colleges and Universities
Universities and colleges
Nineteenth Avenue (Nashville, Tenn.)
Nashville (Tenn.)--Buildings, structures, etc
Nashville (Tenn.)--Intellectual life
- Still imagePostcards
- U.S. and international copyright laws protect this digital content, which is provided for educational purposes only and may not be downloaded, reproduced, or distributed for any other purpose without written permission. Please contact the Special Collections Division of the Nashville Public Library, 615 Church Street, Nashville, Tennessee, 37219. Telephone (615) 862-5782.
- Chicago citation style
- The tower - Scarritt College for Christian Workers, circa 1930. 1930~. Retrieved from the Digital Public Library of America, http://nashville.contentdm.oclc.org/cdm/ref/collection/nr/id/848. (Accessed January 20, 2020.)
- APA citation style
- (1930~) The tower - Scarritt College for Christian Workers, circa 1930. Retrieved from the Digital Public Library of America, http://nashville.contentdm.oclc.org/cdm/ref/collection/nr/id/848
- MLA citation style
- Retrieved from the Digital Public Library of America <http://nashville.contentdm.oclc.org/cdm/ref/collection/nr/id/848>. | <urn:uuid:32609605-e52a-44ed-83aa-c3e21a06af9a> | {
"date": "2020-01-20T12:01:19",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8658323884010315,
"score": 2.734375,
"token_count": 650,
"url": "http://tn.dp.la/item/9dae8afe9109225359590151147018f0?q=postcard*&subject=%22Architecture%22%7C%22Nashville%20(Tenn.)--Buildings%2C%20structures%2C%20etc%22%7C%22Colleges%20and%20Universities%22%7C%22Scarritt-Bennett%20Center%22%7C%22Buildings%22&page=1"
} |
Specialization might be the boogeyman many people believe it to be.
A recent report presented at the American Orthopedic Society for Sports Medicine appears to have found specialization does not increase a young athlete’s chances to eventually reaching elite status in their sport.
The opposite might be true.
Previous studies have indicated specialization also increases the risk of injuries in young athletes.
The study came through a survey of almost 4,000 high school, college and professional athletes prior to their annual physicals.
“Our results noted that current high school athletes specialized, on average, two years earlier than current collegiate and professional athletes, Dr. Patrick S. Buckley of the Rothman Institute at Philadelphia’s Thomas Jefferson University Hospital wrote.
“The results of our study suggest that specialization at a very young age does not increase the likelihood of an athlete achieving elite status within his/her sport.”
Among the numbers the study found were that high school athletes began to specialize in their sport at 12.7 years of age, while the average collegiate athlete began to specialize at 14.8 years old and professional athletes at 14.1 years of age.
The study’s authors noted that only one-quarter of the professional athletes who participated in the study would want their own children to specialize during childhood/adolescence.
Read the entire article at HeraldandNews.com. | <urn:uuid:e32ba34a-1ae9-455f-a8c2-1a7121f6cf1d> | {
"date": "2020-01-20T13:13:03",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9688423275947571,
"score": 2.515625,
"token_count": 285,
"url": "http://topcoachpodcast.com/specialization-not-necessarily-helpful-to-young-athletes-heraldandnews-com"
} |
“In His Chambers”
There are five references to the King in the Song of Solomon. This is the first: “The King hath brought me into His chambers.” “Chambers” is the Hebrew cheder, which denotes the inner apartments, the private parlor of the King. It is a picture of privacy and intimacy, where the Beloved and His Bride enjoy the companionship of one another in an atmosphere of undisturbed love.
Is this the response and answer to the Bride’s request, “Draw me?” She has desired this hallowed communion, and now it has been granted. Is not the longing of every redeemed heart to be drawn nearer to Him whom we love? There are distractions all around in the busy world. There are sights and sounds which would demand our attention, and so, sincerely, the saints sing
Nearer, still nearer, close to Thy heart,
Draw me, my Savior, so precious Thou art.
Fold me, O fold me, close to Thy breast,
Shelter me safe in that haven of rest.
Notice the change in the pronoun. She says, “Draw me,” and adds, “We will run after thee.” The ardent movements of the inividual believer toward Christ have an influence upon others who now also desire the companionship and presence of the King. While it is true, of course, that the Bride enjoys an intimacy which others do not, still, her attachment to the King does draw other hearts to him. It has been pointed out by another that in that other well-known love story, Ruth was not initially attracted to Boaz. It was what she saw of the dealings of the Almighty with Naomi that influenced the girl from Moab and created desires in her heart for the tender El Shaddai, for Bethlehem, and for the people of God.
It is solemn and sobering to think that what I am, and what I do, will have a bearing on other saints. How good it is then that we should ever be in the enjoyment of the King’s presence so that others will be attracted to Him also!
But how then, the exercised younger believer might ask, can I know His presence? How may I know the sweetness of the communion of the inner chambers of the Beloved? In some sense the answer is simple, and yet, in the bustling world in which we live, perhaps it may prove rather difficult. This is a quiet place, the inner apartments, far removed from the restless world around us; but ready access is available to every heart that loves Him through the privilege of prayer and attendance to His Word.
Like the Holiest of all in Israel’s tabernacle, there may indeed be a certain loneliness in that awful presence. With what trepidation the High Priest must have gone within the veil! Thousands of priests on a lower plane than he would draw close to the veil at times but would never see beyond or behind it. It was a solitary privilege granted to one man, once a year, to enter into the glory of the Holiest. But with the believer now it is different. In the sweet privilege of bridal affection we now enter with a holy familiarity, having been invited to come boldly. The spiritual heart may now enter the inner chambers of the King with reverent confidence. This means withdrawal from the world at times, just to commune in quietness with Him. Sometimes it may be just to breathe out our requests to Him, to draw near in our times of need. We do have an invitation to come to find grace at such times.
However, how He must appreciate it when we come there to worship! And what is worship? J. N. Darby’s definition is hard to improve upon. He says, “Worship is the honor and adoration rendered to God for what He is in Himself, and for what He means to those who render it.” It must delight the heart of God when we come near just to speak well of our Beloved, just to say what we have found in Him and what He means to us. This is the privilege of the inner chambers. It is communion with divine Persons.
The blessed quietness of the King’s inner apartments is conducive to meditation, and the Bride says, “We will remember.” So it is that, drawn aside from a busy life and a noisy world, the believer in precious contemplation has time and opportunity to remember. What memories fill our hearts in His presence! Exalted King though He is, we remember the days of His flesh, the lowliness of Bethlehem, the simplicity of His manger-bed, and His swaddling bands. We remember the Boy of Nazareth, living for the Father’s pleasure. We remember the lowly Man of Galilee, who brought fragrance to Cana, to Sychar, to Bethany, dispensing blessing on every hand in His preaching, teaching, and healing. But then, we remember Gethsemane, Gabbatha, Golgotha, and a Garden Tomb. How can we truly remember and not worship?
We will remember Thy love! We have, in wondrous grace, been brought into a circle of love. “The Father loveth the Son” (John 3:35). So it was from eternal ages, the Son in the bosom of the Father. And the Son said, “I love the Father” (John 14:31). Then He said, “The Father Himself loveth you” (John 16:37). And the story continues as He says, “As the Father hath loved Me so have I loved you” (John 15:9). Each individual believer can then say, in the blessed realization of it all, “The Son of God loved me” (Gal 2:20), and together we exclaim, “We love Him because He first loved us” (1 John 4:19). Then at times, when vocabulary fails us, we simply say, “Lord, Thou knowest all things, Thou knowest that I love Thee (John 21:17). A circle of divine love indeed, and in the quietness of the inner chambers of the King we say, “We will remember Thy love more than wine.” His love is sweeter than all the accumulated joys that earth can offer. Those joys are transient. His love abides forever, and we remember. | <urn:uuid:1bc1a27c-d0b5-40f8-9881-322822378f3e> | {
"date": "2020-01-20T11:54:36",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9552938938140869,
"score": 2.59375,
"token_count": 1354,
"url": "http://truthandtidings.com/2004/02/christ-in-the-song-of-solomon-2/"
} |
When the state is weak or governments collapse, restive minorities along the periphery rebel.
It was an unseasonably warm morning, in northwestern Iran, although a fresh snow blanketed the mountains. Civil unrest had persisted in the area for years amidst the backdrop of war and regional unrest. Crowds gathered in the Mahabad town square. They did not have to wait long. Qazi Muhammad, the founder of the Kurdistan Democratic Party of Iraq, ascended a platform and delivered a fifteen-minute speech declaring the Kurds a people apart and sharing the right to self-determination with other nations. When he concluded, 300 supporters each fired five rounds into the air to mark the occasion. On that day, the Iranian central government was nowhere to be seen. Its problems were vast, and its army was riven by defection. At any rate, the Iranian leadership was far more concerned about preserving security and stability in Tehran and defending against external threats than sending its forces to restore order in the countryside.
The anecdote above, of course, refers to the January 22, 1946 declaration of the Mahabad Republic , an entity that continued for nearly a year before the Iranian Army was able to restore Tehran’s control over the region. But, in Iran’s recent history, it is a story that repeated a half dozen times in the twentieth century. And, such separatist outbursts and insurgencies are a scenario that will likely repeat in the aftermath of Supreme Leader Ali Khamenei’s eventual demise. | <urn:uuid:954a8244-a076-476a-8f6a-81d3f82a8247> | {
"date": "2020-01-20T13:26:15",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9662730097770691,
"score": 3.265625,
"token_count": 303,
"url": "http://tundratabloids.com/2018/12/16/what-will-irans-looming-civil-war-look-like/"
} |
Texas Statewide Leadership for Autism Training
Training, support, and resources for educators serving students with autism.
Online Course Library
We’ve got the course for you! We have over 80 courses in 7 different categories including courses in Spanish! Take the lead on your professional development. All our courses are free; you can learn at your own pace; and you can earn CEUs and a certificate for each course you complete.
Timely and purposeful short videos that support educators and parents in their work with children with autism. These videos feature classroom strategies, interviews with autism experts, teachers, and parents.
The Texas Autism Resource Guide for Effective Teaching (TARGET) is designed to assist schools in developing practices from initial referral to program development and implementation with a strong emphasis on evidence-based and peer-reviewed strategies. The TARGET has two sections: one on assessments and one on interventions. Use the search feature to find an evidence-based intervention for your student!
Texas regulations (TAC 89.1055) require ARD committees to consider eleven strategies for students with autism at every ARD meeting. Schools must consider strategies based on peer-reviewed, research-based educational practices to the extent practicable. While all eleven strategies must be considered annually, it is not required that all be implemented. However, if an ARD committee determines one or more of these strategies are not needed at this time, the IEP must include the basis upon which the determination was made.
Download a helpful guidance document developed by TEA and the Texas Statewide Leadership for Autism Training network that explains these eleven strategies.
Important Concepts for Students with Unique Needs
Consideration of non-negotiables for students with disabilities in the educational setting.watch "Important Concepts for Students with Unique Needs"
Parental Needs for Transition Planning
Parents talking about the importance of building a network and thinking ahead.watch "Parental Needs for Transition Planning"
Hopes and Dreams
Parents share their hopes and dreams for their son.watch "Hopes and Dreams"
Want More Information?
Join our mailing list for information on opportunities for autism trainings by TSLAT or by national and local presenters. | <urn:uuid:9dfe3dff-5829-4408-aae5-f9f0b8233cc2> | {
"date": "2020-01-20T13:10:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9280141592025757,
"score": 2.5625,
"token_count": 444,
"url": "http://txautism.net/"
} |
Before I start this tutorial I need to complain about something:
The Pacific Theatre of WWII is a huge pain to map. We were fighting over some SERIOUSLY TINY ISLANDS. Even just finding a vector map that includes them is difficult, and when you go to add labels, well… zoom out wide enough to see where in the world you are, and you can’t see the places you’re trying to pinpoint.
QGIS to the rescue! Yes, it’s finally time to make our own maps.
I’m not gonna get too technical here (I’m still learning this stuff myself), but this will hopefully serve as a useful workflow reference to help animators on their way to becoming DIY cartographers.
So what is GIS, anyway?
You’ve heard of data-driven design? This is some of the stuff that’s driving the data for data-driven design. GIS stands for Geographic Information Systems — basically, all things digital mapping. If you’ve only ever worked with maps designed by someone else before, learning to use GIS software will enable you to go much deeper: not only can you create your own maps from raw data, you can measure exact distances, do all kinds of cool analytical work, go nuts with custom styling and even change map projections on the fly.
There are lots of different GIS applications, but we’ll be using QGIS because it’s free, open-source, and outputs files in a usable format. You can download it here.
Grab some data
To get started, you’ll need to import some map data. Shapefiles (.shp, usually accompanied by additional files with other extensions) are the main way to get outlines into GIS software. These are basically just geographically-linked vectors, and there are tons of them available for you to use.
Here are a couple sources for shapefiles you can use for anything you want:
You can also use OpenStreetMap data freely. If you’re working with a small enough area (think neighborhood, not country), you can even grab the vectors you need right within QGIS. Here’s a nice tutorial using OSM to generate a map of London’s pubs that covers that import process.
Another way to get data into QGIS is to import KML files. This is the way to work with points you’ve mapped using Google Maps Engine or Google Earth. Maps Engine is a lifesaver if someone gives you a giant spreadsheet of poorly labeled locations. You can upload a CSV (100 locations at a time with the free version, but breaking a big dataset into chunks is easy enough), tell it which columns contain the location info, and be amazed when it figures out what the guy who sent you the spreadsheet meant when he abbreviated California as “Calf”.
There are also thousands of maps made by other people whose points you can borrow. Once you get everything correctly positioned on the map, click the folder icon in the top left corner and choose “Export to KML”.
Import your data
Now that you have some data to work with, open QGIS and create a new project.
Add your dataset by choosing the appropriate import button for its file format. The importers are located on left side of the screen as well as in the Layer menu, where they are more helpfully labeled.
Add Vector Layer is likely to be your go-to choice — that’s the right option for shapefiles, KML and CSV data, among others.
If you attempt to import KML from Google Maps Engine and get a blank layer instead, there’s a workaround: open the file you downloaded in Google Earth, resave as KML and try again. (Note: Google Earth may give you a KMZ file, which is a zipped KML. Just change the extension to .zip and unzip to import into QGIS.)
The earth isn’t a perfect sphere, so you’ll need to choose a geographic coordinate reference system (CRS) to make sure your points land in the right place. WGS84 is the standard you’re likely to be working with.
As long as it knows its original format, QGIS can reproject data on the fly. You can set these options in the CRS settings in Project > Project Properties. QGIS ships with a couple thousand options, and if those aren’t enough you can make your own custom projections.
You can also add points directly within QGIS through a process called geocoding. Enable the Geocoding plugin by going to Plugins > Manage and Install Plugins, and you’ll be able to search for locations one at a time and pin them to your map. (If you have a ton of addresses to batch through, you can follow this tutorial instead.)
You can also “reverse geocode” — click on a point and ask QGIS to label it. I’ve had a handful of issues with this plugin, namely that my added points disappear after a program restart, so you’ll probably want to export your Geocoding layer as a shapefile then reimport it. It’s also still using the deprecated labeling engine, so things may scale weirdly — you can switch to the new labeler in the layer settings.
There are a wide variety of other plugins that can be installed the same way as Geocoding. I’ve found a couple especially handy: QGIS doesn’t really do curved paths, but I needed to create a bunch of arcs connecting points to a single city — think airline destination map style — so to get that working, I:
- Exported my locations via MMQGIS‘s Geometry Export to CSV menu, manually added the target city to each with the same ID value…
- Reimported and ran that file through Points2One to generate the connections as straight lines.
- Once I output the lines, I used Illustrator’s Warp:Arch effect to make them into curves, then animated them in After Effects. Convoluted, but it worked nicely.
This “do a thing – export the layer – reimport as a new layer – delete original” process probably sounds weird to you, but it seems to be the primary QGIS workflow and we’ll be using it a lot. Advance warning: you’re going to end up with a lot of fiddly little shapefile files. You should probably decide where you’re going to keep them now, before they end up scattered across your hard drive.
Position and style your map
Moving around in QGIS isn’t that different from, say, Google Maps — with one big exception. Global shapefiles are usually centered on the Atlantic, and if you need to generate something Pacific-centered you can’t just roll the map around to the other side. I followed these instructions, which are tricky but seem to work. (If you know of a better method, please tell me!)
To customize the look of your layers and/or add labels to your points, double-click on the layer name. You’ll find a million options inside. QGIS even supports blend modes, which look great but don’t work with vector export — they’re still super-helpful though for previewing purposes. To change both the line and fill styling, click on Style, then click the default Simple Fill in the Symbol Layers list to get to the full parameter set. From this screen, you can also access more advanced options. Make sure to check out the line and pattern fills; they do some neat things if you’re going for a more abstract look for your map. Here’s Australia with polka dots and kittens:
Get your vectors out of QGIS
And now for an annoying extra step. Once you have a map you’re happy with, you can’t just go “Save as > PDF”. Instead we’re going to be using a tool called the Print Composer for this bit.
Note: If you’re attempting to create a map of the whole world, you should avoid using the highest-resolution land data from Natural Earth. I can’t get it to import properly into Illustrator for the life of me. I can, however, use the high-res shapefiles as long as I’m only exporting a smaller portion of the globe. They’re really nice to work with when you’re dealing with all the aforementioned tiny Pacific islands.
Go to Project > New Print Composer and give your new preset a name.
Click the Add New Map icon (looks like an unrolling sheet of paper), and drag a rectangle the size of the page. If you want to match your current view in QGIS, and it looks like the map’s the wrong size, go to Item Properties and click “Set to map canvas extent.”
Now you can save as a PDF.
If you plan to map your data onto a sphere (either in C4D or with CC Sphere), export your file as an equirectangular projection, with the extents set to X min = -180, Y min = -90, X max = 180, Y max =90. You’ll probably need to crop the resulting file/change the artboard size, too, since QGIS exports documents in the shape of the paper it’s “printing” them on. 3600×1800 is a good choice of final image size, since it’s easy to keep the math consistent if you need to add something later by hand — just multiply your degrees by 10.
Open your map in Illustrator
Here’s where we’re going to turn a flat vector map into something we can use in After Effects.
When you bring the PDF into Illustrator, everything comes in nested within a single layer. You’ll have a lot more design flexibility later on if you take a couple minutes to break up the map components into multiple layers. When there are lots and lots of paths, I find the easiest way to pull the pieces apart is to select one part of one element, go to Select > Same > [Relevant appearance attribute], then cut and paste in place (Ctrl + Alt + V) on a new layer. If you want to be able to link to your points in AE, use the Release to Layers feature, then drag them out to be top-level layers.
You can add additional styling at this point, too. Using the art brushes on country border strokes is an especially nice effect:
Label your layers, and save as an Illustrator file, or export your image in your favorite C4D texture format.
Protip: To import Illustrator paths straight into C4D, you need to save them as Illustrator 8.
Now on to After Effects and/or C4D
This is the easy bit. Well, easy for you, assuming you already know After Effects or C4D. For AE, just import your AI file as a composition, drop the layers in your comp and animate and composite away as you would any other map. Here are stills from two relatively simple variations on the same dataset:
The only real differences between the two are color and texture — you can go much further than this.
Even though QGIS’s text labels aren’t much good for animating directly, I tend to import them anyway (I usually stick them all on one layer). They’re a handy a guide for creating native AE text labels. You can do the same thing with points, or import them as individual layers so they’re easy to alt-replace with precomped animation like the concentric rings above. Having georeferenced guides to refer to even when you’re creating new elements from scratch opens up a lot of possibilities. If someone makes a late change to graphic (never happens, right?), it also makes map additions so much easier: you can go back to QGIS, use your saved Map Composer preset to export new borders or geolocated points, and they should line up exactly.
If you want a little bit of 3D and have either 1) a good enough GPU or 2) enough patience to use the Ray Tracer, you can choose “Create Shapes from Vector Layer”, switch to RT rendering and extrude the shapes. It takes forever to render, but you can do some interesting and/or very weird stuff this way. This also lets you apply Shape Layer effects like Wiggle Paths.
For C4D, you have a couple of options:
Image as texture (those of you with just C4D Lite: you can totally do this in Lite): create a new material, import an image file of your map as a texture, throw it on a sphere, style as desired. Add some splines connecting points and you have a snazzy 3D globe. Alternatively, import the AI paths and do a whole bunch of extruding for a fancy 3D ‘flat’ map that renders faster than with the AE Ray Tracer.
Wrap your vectors around a sphere (you’ll need more than Lite, as this uses the Wrap deformer): follow the instructions here.
Things to watch out for
- When it comes to the shapefiles inside your project, QGIS is a DESTRUCTIVE EDITOR. I learned this the hard way: I accidentally deleted the whole world at one point. If you want to move some borders around, right click on the layer and Save As… before you go into edit mode.
- The QGIS team is in the process of replacing their labeling engine, and as of 2.2.0 the new one automatically converts text to curves on export. If you want to preserve the labels as editable text, you should use the deprecated label system — or wait a few weeks. They’re supposed to be fixing this.
- Don’t get too fancy designing backgrounds in QGIS. They only export for me about a third of the time. Do that stuff in AI or AE — or Photoshop. | <urn:uuid:143f4497-7272-4e40-af31-ab1024771dbf> | {
"date": "2020-01-20T12:20:14",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9140380620956421,
"score": 2.875,
"token_count": 3011,
"url": "http://victorianece.com/category/tutorials/"
} |
In humans, the CCR5 gene that encodes the CCR5 protein is located on the short (p) arm at position 21 on chromosome 3. Certain populations have inherited the Delta 32 mutation resulting in the genetic deletion of a portion of the CCR5 gene. Homozygous carriers of this mutation are resistant to M-tropic strains of HIV-1 infection.
The CCR5 protein belongs to the beta chemokine receptors family of integral membrane proteins. It is a G protein–coupled receptor which functions as a chemokine receptor in the CC chemokine group.
CCR5's cognate ligands include CCL3, CCL4 (also known as MIP 1α and 1β, respectively), and CCL3L1. CCR5 furthermore interacts with CCL5 (a chemotactic cytokine protein also known as RANTES).
CCR5 is predominantly expressed on T cells, macrophages, dendritic cells, eosinophils, microglia and a subpopulation of either breast or prostate cancer cells. The expression of CCR5 is selectively induced during the cancer transformation process and is not expressed in normal breast or prostate epithelial cells. Approximately 50% of human breast cancer expressed CCR5, primarily in triple negative breast cancer. CCR5 inhibitors blocked the migration and metastasis of CCR5 expressing breast and prostate cancer cells, suggesting CCR5 may function as a new therapeutic target. Recent studies suggest that CCR5 is expressed in a subset of cancer cells with characteristics of cancer stem cells which are known to drive therapy resistance and CCR5 inhibitors enhanced cell killing of current chemotherapy. It is likely that CCR5 plays a role in inflammatory responses to infection, though its exact role in normal immune function is unclear. Regions of this protein are also crucial for chemokine ligand binding, functional response of the receptor, and HIV co-receptor activity.
HIV-1 most commonly uses the chemokine receptors CCR5 and/or CXCR4 as co-receptors to enter target immunological cells. These receptors are located on the surface of host immune cells whereby they provide a method of entry for the HIV-1 virus to infect the cell. The HIV-1 envelope glycoprotein structure is essential in enabling the viral entry of HIV-1 into a target host cell. The envelope glycoprotein structure consists of two protein subunits cleaved from a Gp160 protein precursor encoded for by the HIV-1 env gene: the Gp120 external subunit, and the Gp41 transmembrane subunit. This envelope glycoprotein structure is arranged into a spike-like structure located on the surface of the virion and consists of a trimer of three Gp120-Gp41 hetero-dimers. The Gp120 envelope protein is a chemokine mimic. It lacks the unique structure of a chemokine, however it is still capable of binding to the CCR5 and CXCR4 chemokine receptors. During HIV-1 infection, the Gp120 envelope glycoprotein subunit binds to a CD4 glycoprotein and a HIV-1 co-receptor expressed on a target cell- forming a heterotrimeric complex. The formation of this complex stimulates the release of a fusogenic peptide inducing the fusion of the viral membrane with the membrane of the target host cell. Because binding to CD4 alone can sometimes result in gp120 shedding, gp120 must next bind to co-receptor CCR5 in order for fusion to proceed. The tyrosine sulfated amino terminus of this co-receptor is the "essential determinant" of binding to the gp120 glycoprotein. Co-receptor recognition also include the V1-V2 region of gp120, and the bridging sheet (an antiparallel, 4-stranded β sheet that connects the inner and outer domains of gp120). The V1-V2 stem can influence "co-receptor usage through its peptide composition as well as by the degree of N-linked glycosylation." Unlike V1-V2 however, the V3 loop is highly variable and thus is the most important determinant of co-receptor specificity. The normal ligands for this receptor, RANTES, MIP-1β, and MIP-1α, are able to suppress HIV-1 infection in vitro. In individuals infected with HIV, CCR5-using viruses are the predominant species isolated during the early stages of viral infection, suggesting that these viruses may have a selective advantage during transmission or the acute phase of disease. Moreover, at least half of all infected individuals harbor only CCR5-using viruses throughout the course of infection.
CCR5 is the primary co-receptor used by gp120 sequentially with CD4. This bind results in gp41, the other protein product of gp160, to be released from its metastable conformation and insert itself into the membrane of the host cell. Although it hasn't been finalized as a proven theory yet, binding of gp120-CCR5 involves two crucial steps: 1) The tyrosine sulfated amino terminus of this co-receptor is an "essential determinant" of binding to gp120 (as stated previously) 2) Following step 1., there must be reciprocal action (synergy, intercommunication) between gp120 and the CCR5 transmembrane domains
CCR5 is essential for the spread of the R5-strain of the HIV-1 virus. Knowledge of the mechanism by which this strain of HIV-1 mediates infection has prompted research into the development of therapeutic interventions to block CCR5 function. A number of new experimental HIV drugs, called CCR5 receptor antagonists, have been designed to interfere with the associative binding between the Gp120 envelope protein and the HIV co-receptor CCR5. These experimental drugs include PRO140 (CytoDyn), Vicriviroc (Phase III trials were cancelled in July 2010) (Schering Plough), Aplaviroc (GW-873140) (GlaxoSmithKline) and Maraviroc (UK-427857) (Pfizer). Maraviroc was approved for use by the FDA in August 2007. It is the only one thus far approved by the FDA for clinical use, thus becoming the first CCR5 inhibitor. A problem of this approach is that, while CCR5 is the major co-receptor by which HIV infects cells, it is not the only such co-receptor. It is possible that under selective pressure HIV will evolve to use another co-receptor. However, examination of viral resistance to AD101, molecular antagonist of CCR5, indicated that resistant viruses did not switch to another coreceptor (CXCR4) but persisted in using CCR5, either through binding to alternative domains of CCR5, or by binding to the receptor at a higher affinity. However, because there is still another co-receptor available, this indicates that lacking the CCR5 gene doesn't make one immune to the virus; it simply implies that it would be more challenging for the individual to contract it. Also, the virus still has access to the CD4. Unlike CCR5, which the body apparently doesn't really need due to those still living healthy lives even with the lack of/or absence of the gene (as a result of the delta 32 mutation), CD4 is critical in the body's defense system (fighting against infection). Even without the availability of either co-receptors (even CCR5), the virus can still invade cells if gp41 were to go through an alteration (including its cytoplasmic tail), resulting in the independence of CD4 without the need of CCR5 and/or CXCR4 as a doorway.
Expression of CCR5 is induced in breast and prostate epithelial cells upon transformation. The induction of CCR5 expression promotes cellular invasion, migration and metastasis. The induction of metastasis involves homing to the metastatic site. CCR5 inhibitors have been shown to block lung metastasis of human breast cancer cell lines. In preclinical studies of immune competent mice CCR5 inhibitors blocked metastasis to the bones and brain. CCR5 inhibitors also reduce the infiltration of tumor associated macrophages. A Phase 1 clinical study of CCR5 inhibitor in heavily pretreated patients with metastatic colon cancer demonstrated an objective clinical response and reduction in metastatic tumor burden.
CCR5 Δ32 is a 32-base-pair deletion that introduces a premature stop codon into the CCR5 receptor locus, resulting in a nonfunctional receptor. CCR5 is required for M-tropic HIV-1 virus entry. Individuals homozygous (denoted Δ32/Δ32) for CCR5 Δ32 do not express functional CCR5 receptors on their cell surfaces and are resistant to HIV-1 infection, despite multiple high-risk exposures. Individuals heterozygous (+/Δ32) for the mutant allele have a greater than 50% reduction in functional CCR5 receptors on their cell surfaces due to dimerization between mutant and wild-type receptors that interferes with transport of CCR5 to the cell surface. Heterozygote carriers are resistant to HIV-1 infection relative to wild types and when infected, heterozygotes exhibit reduced viral loads and a 2-3-year-slower progression to AIDS relative to wild types. Heterozygosity for this mutant allele also has shown to improve one's virological response to anti-retroviral treatment. CCR5 Δ32 has an (heterozygote) allele frequency of 10% in Europe, and a homozygote frequency of 1%.
Evolutionary history and age of the allele
The CCR5 Δ32 allele is notable for its recent origin, unexpectedly high frequency, and distinct geographic distribution, which together suggest that (a) it arose from a single mutation, and (b) it was historically subject to positive selection.
Two studies have used linkage analysis to estimate the age of the CCR5 Δ32 deletion, assuming that the amount of recombination and mutation observed on genomic regions surrounding the CCR5 Δ32 deletion would be proportional to the age of the deletion. Using a sample of 4000 individuals from 38 ethnic populations, Stephens et al. estimated that the CCR5-Δ32 deletion occurred 700 years ago (275-1875, 95% confidence interval). Another group, Libert et al. (1998), used microsatellite mutations to estimate the age of the CCR5 Δ32 mutation to be 2100 years (700-4800, 95% confidence interval). On the basis of observed recombination events, they estimated the age of the mutation to be 2250 years (900-4700, 95% confidence interval). A third hypothesis relies on the north-to-south gradient of allele frequency in Europe, which shows that the highest allele frequency occurred in the Nordic countries and lowest allele frequency in southern Europe. Because the Vikings historically occupied these countries, it may be possible that the allele spread throughout Europe due to the Viking dispersal in the 8th to 10th centuries. Vikings were later replaced by the Varangians in Russia, which may have contributed to the observed east-to-west cline of allele frequency.
HIV-1 was initially transmitted from chimpanzees (Pan troglodytes) to humans in the early 1900s in Southeast Cameroon, Africa, through exposure to infected blood and body fluids while butchering bushmeat. However, HIV-1 was effectively absent from Europe until the late 1980s. Therefore, given the average age of roughly 1000 years for the CCR5-Δ32 allele, it can be established that HIV-1 did not exert selection pressure on the human population for long enough to achieve the current frequencies. Hence, other pathogens have been suggested as agents of positive selection for CCR5 Δ32, including bubonic plague (Yersinia pestis) and smallpox (Variola major). Other data suggest that the allele frequency experienced negative selection pressure as a result of pathogens that became more widespread during Roman expansion. The idea that negative selection played a role in the allele's low frequency is also supported by experiments using knockout mice and Influenza A, which demonstrated that the presence of the CCR5 receptor is important for efficient response to a pathogen.
Evidence for a single mutation
Several lines of evidence suggest that the CCR5 Δ32 allele evolved only once. First, CCR5 Δ32 has a relatively high frequency in several different European populations but is comparatively absent in Asian, Middle Eastern and American Indian populations, suggesting that a single mutation occurred after divergence of Europeans from their African ancestor. Second, genetic linkage analysis indicates that the mutation occurs on a homogenous genetic background, implying that inheritance of the mutation occurred from a common ancestor. This was demonstrated by showing that the CCR5 Δ32 allele is in strong linkage disequilibrium with highly polymorphic microsatellites. More than 95% of CCR5 Δ32 chromosomes also carried the IRI3.1-0 allele, while 88% carried the IRI3.2 allele. By contrast, the microsatellite markers IRI3.1-0 and IRI3.2-0 were found in only 2 or 1.5% of chromosomes carrying a wild-type CCR5 allele. This evidence of linkage disequilibrium supports the hypothesis that most, if not all, CCR5 Δ32 alleles arose from a single mutational event. Finally, the CCR5 Δ32 allele has a unique geographical distribution indicating a single Northern origin followed by migration. A study measuring allele frequencies in 18 European populations found a North-to-South gradient, with the highest allele frequencies in Finnish and Mordvinian populations (16%), and the lowest in Sardinia (4%).
In the absence of selection, a single mutation would take an estimated 127,500 years to rise to a population frequency of 10%. Estimates based on genetic recombination and mutation rates place the age of the allele between 1000 and 2000 years. This discrepancy is a signature of positive selection.
It is estimated that HIV-1 entered the human population in Africa in the early 1900s, symptomatic infections were not reported until the 1980s. The HIV-1 epidemic is therefore far too young to be the source of positive selection that drove the frequency of CCR5 Δ32 from zero to 10% in 2000 years. In 1998, Stephens et al. suggested that bubonic plague (Yersinia pestis) had exerted positive selective pressure on CCR5 Δ32. This hypothesis was based on the timing and severity of the Black Death pandemic, which killed 30% of the European population of all ages between 1346 and 1352. After the Black Death, there were less severe, intermittent, epidemics. Individual cities experienced high mortality, but overall mortality in Europe was only a few percent. In 1655-1656 a second pandemic called the "Great Plague" killed 15-20% of Europe’s population. Importantly, the plague epidemics were intermittent. Bubonic plague is a zoonotic disease, primarily infecting rodents and spread by fleas and only occasionally infecting humans. Human-to-human infection of bubonic plague does not occur, though it can occur in pneumonic plague, which infects the lungs. Only when the density of rodents is low are infected fleas forced to feed on alternative hosts such as humans, and under these circumstances a human epidemic may occur. Based on population genetic models, Galvani and Slatkin (2003) argue that the intermittent nature of plague epidemics did not generate a sufficiently strong selective force to drive the allele frequency of CCR5 Δ32 to 10% in Europe.
To test this hypothesis, Galvani and Slatkin (2003) modeled the historical selection pressures produced by plague and smallpox. Plague was modeled according to historical accounts, while age-specific smallpox mortality was gleaned from the age distribution of smallpox burials in York (England) between 1770 and 1812. Smallpox preferentially infects young, pre-reproductive members of the population since they are the only individuals who are not immunized or dead from past infection. Because smallpox preferentially kills pre-reproductive members of a population, it generates stronger selective pressure than plague. Unlike plague, smallpox does not have an animal reservoir and is only transmitted from human to human. The authors calculated that if plague were selecting for CCR5 Δ32, the frequency of the allele would still be less than 1%, while smallpox has exerted a selective force sufficient to reach 10%.
The hypothesis that smallpox exerted positive selection for CCR5 Δ32 is also biologically plausible, since poxviruses, like HIV, are viruses that enter white blood cells by using chemokine receptors. By contrast, Yersinia pestis is a bacterium with a very different biology.
Although Europeans are the only group to have subpopulations with a high frequency of CCR5 Δ32, they are not the only population that has been subject to selection by smallpox, which had a worldwide distribution before it was declared eradicated in 1980. The earliest unmistakable descriptions of smallpox appear in the 5th century A.D. in China, the 7th century A.D. in India and the Mediterranean, and the 10th century A.D. in southwestern Asia. By contrast, the CCR5 Δ32 mutation is found only in European, West Asian, and North African populations. The anomalously high frequency of CCR5 Δ32 in these populations appears to require both a unique origin in Northern Europe and subsequent selection by smallpox.
Research has not yet revealed a cost of carrying the CCR5 null mutation that is as dramatic as the benefit conferred in the context of HIV-1 exposure. In general, research suggests that the CCR5 Δ32 mutation protects against diseases caused by certain pathogens but may also play a deleterious role in postinfection inflammatory processes, which can injure tissue and create further pathology. The best evidence for this proposed antagonistic pleiotropy is found in flavivirus infections. In general many viral infections are asymptomatic or produce only mild symptoms in the vast majority of the population. However, certain unlucky individuals experience a particularly destructive clinical course, which is otherwise unexplained but appears to be genetically mediated. Patients homozygous for CCR5 Δ32 were found to be at higher risk for a neuroinvasive form of tick-borne encephalitis (a flavivirus). In addition, functional CCR5 may be required to prevent symptomatic disease after infection with West Nile virus, another flavivirus; CCR5 Δ32 was associated with early symptom development and more pronounced clinical manifestations after infection with West Nile virus.
This finding in humans confirmed a previously-observed experiment in an animal model of CCR5 Δ32 homozygosity. After infection with West Nile Virus, CCR5 Δ32 mice had markedly increased viral titers in the central nervous system and had increased mortality compared with that of wild-type mice, thus suggesting that CCR5 expression was necessary to mount a strong host defense against West Nile virus.
CCR5 Δ32 can be beneficial to the host in some infections (e.g., HIV-1, possibly smallpox), but detrimental in others (e.g., tick-borne encephalitis, West Nile virus). Whether CCR5 function is helpful or harmful in the context of a given infection depends on a complex interplay between the immune system and the pathogen.
A genetic approach involving intrabodies that block CCR5 expression has been proposed as a treatment for HIV-1 infected individuals. When T-cells modified so they no longer express CCR5 were mixed with unmodified T-cells expressing CCR5 and then challenged by infection with HIV-1, the modified T-cells that do not express CCR5 eventually take over the culture, as HIV-1 kills the non-modified T-cells. This same method might be used in vivo to establish a virus-resistant cell pool in infected individuals.
This hypothesis was tested in an AIDS patient who had also developed myeloid leukemia, and was treated with chemotherapy to suppress the cancer. A bone marrow transplant containing stem cells from a matched donor was then used to restore the immune system. However, the transplant was performed from a donor with 2 copies of CCR5-Δ32 mutation gene. After 600 days, the patient was healthy and had undetectable levels of HIV in the blood and in examined brain and rectal tissues. Before the transplant, low levels of HIV X4, which does not use the CCR5 receptor, were also detected. Following the transplant, however, this type of HIV was not detected either. However, this outcome is consistent with the observation that cells expressing the CCR5-Δ32 variant protein lack both the CCR5 and CXCR4 receptors on their surfaces, thereby conferring resistance to a broad range of HIV variants including HIV X4. After over six years, the patient has maintained the resistance to HIV and has been pronounced cured of the HIV infection.
Enrollment of HIV-positive patients in a clinical trial was started in 2009 in which the patients' cells were genetically modified with a zinc finger nuclease to carry the CCR5-Δ32 trait and then reintroduced into the body as a potential HIV treatment. Results reported in 2014 were promising.
Inspired by the first person ever to be cured of HIV, The Berlin Patient, StemCyte began collaborations with Cord blood banks worldwide to systematically screen Umbilical cord blood samples for the CCR5 mutation beginning in 2011.
In November 2018, Jiankui He announced that he had edited two human embryos, to attempt to disable the gene for CCR5, which codes for a receptor that HIV uses to enter cells. He said that twin girls, Lulu and Nana, had been born a few weeks earlier. He said that the girls still carried functional copies of CCR5 along with disabled CCR5 (mosaicism) and were still vulnerable to HIV. The work was widely condemned as unethical, dangerous, and premature.
- Discovery and development of CCR5 receptor antagonists
- Entry inhibitor
- HIV tropism
- Stephen Crohn
- HIV immunity
- de Silva E, Stumpf MP (Dec 2004). "HIV and the CCR5-Delta32 resistance allele". FEMS Microbiology Letters. 241 (1): 1–12. doi:10.1016/j.femsle.2004.09.040. PMID 15556703.
- Hütter G, Nowak D, Mossner M, Ganepola S, Müssig A, Allers K, Schneider T, Hofmann J, Kücherer C, Blau O, Blau IW, Hofmann WK, Thiel E (Feb 2009). "Long-term control of HIV by CCR5 Delta32/Delta32 stem-cell transplantation". The New England Journal of Medicine. 360 (7): 692–8. doi:10.1056/NEJMoa0802905. PMID 19213682.
- Allers K, Hütter G, Hofmann J, Loddenkemper C, Rieger K, Thiel E, Schneider T (Mar 2011). "Evidence for the cure of HIV infection by CCR5Δ32/Δ32 stem cell transplantation". Blood. 117 (10): 2791–9. doi:10.1182/blood-2010-09-309591. PMID 21148083.
- Zhen A, Kitchen S (Jan 2014). "Stem-cell-based gene therapy for HIV infection". Viruses. 6 (1): 1–12. doi:10.3390/v6010001. PMC 3917429. PMID 24368413.
- Kay MA, Walker BD (Mar 2014). "Engineering cellular resistance to HIV". The New England Journal of Medicine. 370 (10): 968–9. doi:10.1056/NEJMe1400593. PMID 24597871.
- Tebas P, Stein D, Tang WW, Frank I, Wang SQ, Lee G, et al. (Mar 2014). "Gene editing of CCR5 in autologous CD4 T cells of persons infected with HIV". The New England Journal of Medicine. 370 (10): 901–10. doi:10.1056/NEJMoa1300662. PMC 4084652. PMID 24597865.
- "CCR5 - chemokine (C-C motif) receptor 5 (gene/pseudogene)". Genetics Home Reference.
- Samson M, Labbe O, Mollereau C, Vassart G, Parmentier M (Mar 1996). "Molecular cloning and functional expression of a new human CC-chemokine receptor gene". Biochemistry. 35 (11): 3362–7. doi:10.1021/bi952950g. PMID 8639485.
- Struyf S, Menten P, Lenaerts JP, Put W, D'Haese A, De Clercq E, Schols D, Proost P, Van Damme J (Jul 2001). "Diverging binding capacities of natural LD78beta isoforms of macrophage inflammatory protein-1alpha to the CC chemokine receptors 1, 3 and 5 affect their anti-HIV-1 activity and chemotactic potencies for neutrophils and eosinophils". European Journal of Immunology. 31 (7): 2170–8. doi:10.1002/1521-4141(200107)31:7<2170::AID-IMMU2170>3.0.CO;2-D. PMID 11449371.
- Miyakawa T, Obaru K, Maeda K, Harada S, Mitsuya H (Feb 2002). "Identification of amino acid residues critical for LD78beta, a variant of human macrophage inflammatory protein-1alpha, binding to CCR5 and inhibition of R5 human immunodeficiency virus type 1 replication". The Journal of Biological Chemistry. 277 (7): 4649–55. doi:10.1074/jbc.M109198200. PMID 11734558.
- Slimani H, Charnaux N, Mbemba E, Saffar L, Vassy R, Vita C, Gattegno L (Oct 2003). "Interaction of RANTES with syndecan-1 and syndecan-4 expressed by human primary macrophages". Biochimica et Biophysica Acta. 1617 (1–2): 80–8. doi:10.1016/j.bbamem.2003.09.006. PMID 14637022.
- Proudfoot AE, Fritchley S, Borlat F, Shaw JP, Vilbois F, Zwahlen C, Trkola A, Marchant D, Clapham PR, Wells TN (Apr 2001). "The BBXB motif of RANTES is the principal site for heparin binding and controls receptor selectivity". The Journal of Biological Chemistry. 276 (14): 10620–6. doi:10.1074/jbc.M010867200. PMID 11116158.
- Velasco-Velázquez M, Jiao X, De La Fuente M, Pestell TG, Ertel A, Lisanti MP, Pestell RG (Aug 2012). "CCR5 antagonist blocks metastasis of basal breast cancer cells". Cancer Research. 72 (15): 3839–50. doi:10.1158/0008-5472.CAN-11-3917. PMID 22637726.
- Sicoli D, Jiao X, Ju X, Velasco-Velazquez M, Ertel A, Addya S, Li Z, Andò S, Fatatis A, Paudyal B, Cristofanilli M, Thakur ML, Lisanti MP, Pestell RG (Dec 2014). "CCR5 receptor antagonists block metastasis to bone of v-Src oncogene-transformed metastatic prostate cancer cell lines". Cancer Research. 74 (23): 7103–14. doi:10.1158/0008-5472.CAN-14-0612. PMC 4294544. PMID 25452256.
- Velasco-Velázquez M, Xolalpa W, Pestell RG (Nov 2014). "CCL5/CCR5 in breast cancer". Expert Opin Ther Targets. 18 (11): 1265–75. doi:10.1517/14728222.2014.949238. PMID 25256399.
- Jiao X, Velasco-Velázquez MA, Wang M, Li Z, Rui H, Peck AR, Korkola JE, Chen X, Xu S, DuHadaway JB, Guerrero-Rodriguez S, Addya S, Sicoli D, Mu Z, Zhang G, Stucky A, Zhang X, Cristofanilli M, Fatatis A, Gray JW, Zhong JF, Prendergast GC, Pestell RG (Apr 2018). "CCR5 Governs DNA Damage Repair and Breast Cancer Stem Cell Expansion". Cancer Res. 78 (7): 1657–71. doi:10.1158/0008-5472.CAN-17-0915. PMID 29358169.
- Barmania F, Pepper MS (2013). "C-C chemokine receptor type five (CCR5): An emerging target for the control of HIV infection". Applied & Translational Genomics. 2 (a): 3–16. doi:10.1016/j.atg.2013.05.004.
- Murphy PM (Feb 2001). "Viral exploitation and subversion of the immune system through chemokine mimicry". Nature Immunology. 2 (2): 116–22. doi:10.1038/84214. PMID 11175803.
- Alkhatib G (Mar 2009). "The biology of CCR5 and CXCR4". Current Opinion in HIV and AIDS. 4 (2): 96–103. doi:10.1097/COH.0b013e328324bbec. PMC 2718543. PMID 19339947.
- "CCR5 Inhibitors and HIV".
- Anderson J, Akkina R (Sep 2007). "Complete knockdown of CCR5 by lentiviral vector-expressed siRNAs and protection of transgenic macrophages against HIV-1 infection". Gene Therapy. 14 (17): 1287–97. doi:10.1038/sj.gt.3302958. PMID 17597795.
- Lieberman-Blum SS, Fung HB, Bandres JC (Jul 2008). "Maraviroc: a CCR5-receptor antagonist for the treatment of HIV-1 infection". Clinical Therapeutics. 30 (7): 1228–50. doi:10.1016/s0149-2918(08)80048-3. PMID 18691983.
- Nazari R, Joshi S (Aug 2008). "CCR5 as target for HIV-1 gene therapy". Current Gene Therapy. 8 (4): 264–72. doi:10.2174/156652308785160674. PMID 18691022.
- "Understanding Genetics". The Tech Museum of Innovation, San Jose, CA.
- Taylor BM, Foulke JS, Flinko R, Heredia A, DeVico A, Reitz M (Jun 2008). "An alteration of human immunodeficiency virus gp41 leads to reduced CCR5 dependence and CD4 independence". Journal of Virology. 82 (11): 5460–71. doi:10.1128/JVI.01049-07. PMC 2395218. PMID 18353949.
- Frankenberger C, Rabe D, Bainer R, Sankarasharma D, Chada K, Krausz T, Gilad Y, Becker L, Rosner MR (Oct 2015). "Metastasis Suppressors Regulate the Tumor Microenvironment by Blocking Recruitment of Prometastatic Tumor-Associated Macrophages". Cancer Res. 75 (19): 4063–73. doi:10.1158/0008-5472.CAN-14-3394. PMID 26238785.
- Halama N, Zoernig I, Berthel A, Kahlert C, Klupp F, Suarez-Carmona M, Suetterlin T, Brand K, Krauss J, Lasitschka F, Lerchl T, Luckner-Minden C, Ulrich A, Koch M, Weitz J, Schneider M, Buechler MW, Zitvogel L, Herrmann T, Benner A, Kunz C, Luecke S, Springfeld C, Grabe N, Falk CS, Jaeger D (Apr 2016). "Tumoral Immune Cell Exploitation in Colorectal Cancer Metastases Can Be Targeted Effectively by Anti-CCR5 Therapy in Cancer Patients". Cancer Cell. 29 (4): 587–601. doi:10.1016/j.ccell.2016.03.005. PMID 27070705.
- Galvani AP, Slatkin M (Dec 2003). "Evaluating plague and smallpox as historical selective pressures for the CCR5-Delta 32 HIV-resistance allele". Proceedings of the National Academy of Sciences of the United States of America. 100 (25): 15276–9. Bibcode:2003PNAS..10015276G. doi:10.1073/pnas.2435085100. PMC 299980. PMID 14645720.
- Stephens JC, Reich DE, Goldstein DB, Shin HD, Smith MW, Carrington M, et al. (Jun 1998). "Dating the origin of the CCR5-Delta32 AIDS-resistance allele by the coalescence of haplotypes". American Journal of Human Genetics. 62 (6): 1507–15. doi:10.1086/301867. PMC 1377146. PMID 9585595.
- Dean M, Carrington M, Winkler C, Huttley GA, Smith MW, Allikmets R, et al. (Sep 1996). "Genetic restriction of HIV-1 infection and progression to AIDS by a deletion allele of the CKR5 structural gene. Hemophilia Growth and Development Study, Multicenter AIDS Cohort Study, Multicenter Hemophilia Cohort Study, San Francisco City Cohort, ALIVE Study". Science. 273 (5283): 1856–62. Bibcode:1996Sci...273.1856D. doi:10.1126/science.273.5283.1856. PMID 8791590.
- Samson M, Libert F, Doranz BJ, Rucker J, Liesnard C, Farber CM, Saragosti S, Lapoumeroulie C, Cognaux J, Forceille C, Muyldermans G, Verhofstede C, Burtonboy G, Georges M, Imai T, Rana S, Yi Y, Smyth RJ, Collman RG, Doms RW, Vassart G, Parmentier M (Aug 1996). "Resistance to HIV-1 infection in caucasian individuals bearing mutant alleles of the CCR-5 chemokine receptor gene". Nature. 382 (6593): 722–5. Bibcode:1996Natur.382..722S. doi:10.1038/382722a0. PMID 8751444.
- Liu R, Paxton WA, Choe S, Ceradini D, Martin SR, Horuk R, MacDonald ME, Stuhlmann H, Koup RA, Landau NR (Aug 1996). "Homozygous defect in HIV-1 coreceptor accounts for resistance of some multiply-exposed individuals to HIV-1 infection". Cell. 86 (3): 367–77. doi:10.1016/s0092-8674(00)80110-5. PMID 8756719.
- Benkirane M, Jin DY, Chun RF, Koup RA, Jeang KT (Dec 1997). "Mechanism of transdominant inhibition of CCR5-mediated HIV-1 infection by ccr5delta32". The Journal of Biological Chemistry. 272 (49): 30603–6. doi:10.1074/jbc.272.49.30603. PMID 9388191.
- Michael NL, Louie LG, Rohrbaugh AL, Schultz KA, Dayhoff DE, Wang CE, Sheppard HW (Oct 1997). "The role of CCR5 and CCR2 polymorphisms in HIV-1 transmission and disease progression". Nature Medicine. 3 (10): 1160–2. doi:10.1038/nm1097-1160. PMID 9334732.
- Laurichesse JJ, Persoz A, Theodorou I, Rouzioux C, Delfraissy JF, Meyer L (May 2007). "Improved virological response to highly active antiretroviral therapy in HIV-1-infected patients carrying the CCR5 Delta32 deletion". HIV Medicine. 8 (4): 213–9. doi:10.1111/j.1468-1293.2007.00455.x. PMID 17461848.
- Galvani AP, Novembre J (Feb 2005). "The evolutionary history of the CCR5-Delta32 HIV-resistance mutation". Microbes and Infection / Institut Pasteur. 7 (2): 302–9. doi:10.1016/j.micinf.2004.12.006. PMID 15715976.
- Libert F, Cochaux P, Beckman G, Samson M, Aksenova M, Cao A, et al. (Mar 1998). "The deltaccr5 mutation conferring protection against HIV-1 in Caucasian populations has a single and recent origin in Northeastern Europe". Human Molecular Genetics. 7 (3): 399–406. doi:10.1093/hmg/7.3.399. PMID 9466996.
- Lucotte G (2001). "Distribution of the CCR5 gene 32-basepair deletion in West Europe. A hypothesis about the possible dispersion of the mutation by the Vikings in historical times". Human Immunology. 62 (9): 933–6. doi:10.1016/S0198-8859(01)00292-0. PMID 11543895.
- Keele BF, Van Heuverswyn F, Li Y, Bailes E, Takehisa J, Santiago ML, Bibollet-Ruche F, Chen Y, Wain LV, Liegeois F, Loul S, Ngole EM, Bienvenue Y, Delaporte E, Brookfield JF, Sharp PM, Shaw GM, Peeters M, Hahn BH (Jul 2006). "Chimpanzee reservoirs of pandemic and nonpandemic HIV-1". Science. 313 (5786): 523–6. Bibcode:2006Sci...313..523K. doi:10.1126/science.1126531. PMC 2442710. PMID 16728595.
- Hahn BH, Shaw GM, De Cock KM, Sharp PM (Jan 2000). "AIDS as a zoonosis: scientific and public health implications". Science. 287 (5453): 607–14. Bibcode:2000Sci...287..607H. doi:10.1126/science.287.5453.607. PMID 10649986.
- Matic S. "HIV/AIDS in Europe: Moving from death sentence to chronic disease management" (PDF). World Health Organization.
- Faure E, Royer-Carenzi M (2008). "Is the European spatial distribution of the HIV-1-resistant CCR5-Δ32 allele formed by a breakdown of the pathocenosis due to the historical Roman expansion?". Infection, Genetics and Evolution. 8 (6): 864–874. doi:10.1016/j.meegid.2008.08.007. PMID 18790087.
- Dawson TC, Beck MA, Kuziel WA, Henderson F, Maeda N (2000). "Contrasting Effects of CCR5 and CCR2 Deficiency in the Pulmonary Inflammatory Response to Influenza A Virus". The American Journal of Pathology. 156 (6): 1951–1959. doi:10.1016/S0002-9440(10)65068-7. PMC 1850091. PMID 10854218.
- Escosteguy Vargas A, Cechim G, Ferraz Correa J, Gomes PA, de Souza Macedo G, de Medeiros RM, et al. (2009). "Pros and cons of a missing chemokine receptor—Comments on "Is the European spatial distribution of the HIV-1-resistant CCR5-Δ32 allele formed by a breakdown of the pathocenosis due to the historical Roman expansion?" by Eric Faure and Manuela Royer-Carenzi (2008)". Infection, Genetics and Evolution. 9 (4): 387–389. doi:10.1016/j.meegid.2009.01.001.
- O'Brien SJ, Dean M (Sep 1997). "In search of AIDS-resistance genes". Scientific American. 277 (3): 44–51. Bibcode:1997SciAm.277c..44O. doi:10.1038/scientificamerican0997-44. PMID 9274039.
- McEvedy C (Feb 1988). "The bubonic plague". Scientific American. 258 (2): 118–23. Bibcode:1988SciAm.258b.118M. doi:10.1038/scientificamerican0288-118. PMID 3055286.
- Galley C (1998). The Demography of Early Modern Towns: York in the Sixteenth and Seventeenth Centuries. London: MacMillan.
- Hatcher J (1977). Plague, Population, and the English Economy 1348-1530. London: MacMillan.
- Gottfried R (1983). The Black Death: Natural and Human Disaster in Medieval Europe. New York: Free Press.
- Keeling MJ, Gilligan CA (Nov 2000). "Bubonic plague: a metapopulation model of a zoonosis". Proceedings of the Royal Society B: Biological Sciences. 267 (1458): 2219–30. doi:10.1098/rspb.2000.1272. PMC 1690796. PMID 11413636.
- Appleby AB (1980). "The disappearance of plague: a continuing puzzle". The Economic History Review. 33 (2): 161–73. doi:10.2307/2595837. JSTOR 2595837. PMID 11614424.
- Russel J (1948). British Mediaeval Population. Albequerque: University of New Mexico Press.
- Twigg G (1984). The Black Death: A Biological Reappraisal. London: Batsfod.
- Chapin C (1913). "Variation in the type of infectious diseases as shown by the history of smallpox in the United States, 1815-1912". J Infect Dis. 13 (2): 171–196. doi:10.1093/infdis/13.2.171.
- Fenner F (1998). "Historical vignette: a life with poxviruses and publishers". Advances in Virus Research. 51: 1–33. PMID 9891584.
- Lalani AS, Masters J, Zeng W, Barrett J, Pannu R, Everett H, Arendt CW, McFadden G (Dec 1999). "Use of chemokine receptors by poxviruses". Science. 286 (5446): 1968–71. doi:10.1126/science.286.5446.1968. PMID 10583963.
- Novembre J, Galvani AP, Slatkin M (Nov 2005). "The geographic spread of the CCR5 Delta32 HIV-resistance allele". PLoS Biology. 3 (11): e339. doi:10.1371/journal.pbio.0030339. PMC 1255740. PMID 16216086.
- Klein RS (Jan 2008). "A moving target: the multiple roles of CCR5 in infectious diseases". The Journal of Infectious Diseases. 197 (2): 183–6. doi:10.1086/524692. PMID 18179384.
- Kindberg E, Mickiene A, Ax C, Akerlind B, Vene S, Lindquist L, Lundkvist A, Svensson L (Jan 2008). "A deletion in the chemokine receptor 5 (CCR5) gene is associated with tickborne encephalitis". The Journal of Infectious Diseases. 197 (2): 266–9. doi:10.1086/524709. PMID 18179389.
- Lim JK, Louie CY, Glaser C, Jean C, Johnson B, Johnson H, McDermott DH, Murphy PM (Jan 2008). "Genetic deficiency of chemokine receptor CCR5 is a strong risk factor for symptomatic West Nile virus infection: a meta-analysis of 4 cohorts in the US epidemic". The Journal of Infectious Diseases. 197 (2): 262–5. doi:10.1086/524691. PMID 18179388.
- Glass WG, Lim JK, Cholera R, Pletnev AG, Gao JL, Murphy PM (Oct 2005). "Chemokine receptor CCR5 promotes leukocyte trafficking to the brain and survival in West Nile virus infection". The Journal of Experimental Medicine. 202 (8): 1087–98. doi:10.1084/jem.20042530. PMC 2213214. PMID 16230476.
- Steinberger P, Andris-Widhopf J, Bühler B, Torbett BE, Barbas CF (Jan 2000). "Functional deletion of the CCR5 receptor by intracellular immunization produces cells that are refractory to CCR5-dependent HIV-1 infection and cell fusion". Proceedings of the National Academy of Sciences of the United States of America. 97 (2): 805–10. Bibcode:2000PNAS...97..805S. doi:10.1073/pnas.97.2.805. PMC 15412. PMID 10639161.
- Schoofs M (2008-11-07). "A Doctor, a Mutation and a Potential Cure for AIDS". The Wall Street Journal. Retrieved 2010-12-15.
- Agrawal L, Lu X, Qingwen J, VanHorn-Ali Z, Nicolescu IV, McDermott DH, Murphy PM, Alkhatib G (Mar 2004). "Role for CCR5Delta32 protein in resistance to R5, R5X4, and X4 human immunodeficiency virus type 1 in primary CD4+ cells". Journal of Virology. 78 (5): 2277–87. doi:10.1128/JVI.78.5.2277-2287.2004. PMC 369216. PMID 14963124.
- "Autologous T-Cells Genetically Modified at the CCR5 Gene by Zinc Finger Nucleases SB-728 for HIV (Zinc-Finger)". U.S. National Institutes of Health. 2009-12-09. Retrieved 2009-12-30.
- Wade N (2009-12-28). "Zinc Fingers Could Be Key to Reviving Gene Therapy". The New York Times. Retrieved 2009-12-30.
- Corbyn Z (July 2012). "Plan launched to find HIV cure". Lancet. 380 (9838): 203–4. doi:10.1016/s0140-6736(12)61199-4. PMID 22826833.
- Gonzalez G, Park S, Chen D, Armitage S, Shpall E, Behringer R (September 2011). "Identification and frequency of CCR5Δ32/Δ32 HIV-resistant cord blood units from Houston area hospitals". HIV Medicine. 12 (8): 481–6. doi:10.1111/j.1468-1293.2010.00911.x. PMC 4021858. PMID 21375684.
- Petz LD, Burnett JC, Li H, Li S, Tonai R, Bakalinskaya M, Shpall EJ, Armitage S, Kurtzberg J, Regan DM, Clark P, Querol S, Gutman JA, Spellman SR, Gragert L, Rossi JJ (2015). "Progress toward curing HIV infection with hematopoietic cell transplantation". Stem Cells and Cloning. 8: 109–16. doi:10.2147/SCCAA.S56050. PMC 4524463. PMID 26251620.
- Begley S (28 November 2018). "Amid uproar, Chinese scientist defends creating gene-edited babies". STAT.
- Collins FS (2018-11-28). "Statement on Claim of First Gene-Edited Babies by Chinese Researcher". National Institutes of Health (NIH). U.S. Department of Health and Human Services.
- Wilkinson D (Sep 1996). "Cofactors provide the entry keys. HIV-1". Current Biology. 6 (9): 1051–3. doi:10.1016/S0960-9822(02)70661-1. PMID 8805353.
- Broder CC, Dimitrov DS (1996). "HIV and the 7-transmembrane domain receptors". Pathobiology. 64 (4): 171–9. doi:10.1159/000164032. PMID 9031325.
- Choe H, Martin KA, Farzan M, Sodroski J, Gerard NP, Gerard C (Jun 1998). "Structural interactions between chemokine receptors, gp120 Env and CD4". Seminars in Immunology. 10 (3): 249–57. doi:10.1006/smim.1998.0127. PMID 9653051.
- Sheppard HW, Celum C, Michael NL, O'Brien S, Dean M, Carrington M, Dondero D, Buchbinder SP (Mar 2002). "HIV-1 infection in individuals with the CCR5-Delta32/Delta32 genotype: acquisition of syncytium-inducing virus at seroconversion". Journal of Acquired Immune Deficiency Syndromes. 29 (3): 307–13. doi:10.1097/00042560-200203010-00013. PMID 11873082.
- Freedman BD, Liu QH, Del Corno M, Collman RG (2003). "HIV-1 gp120 chemokine receptor-mediated signaling in human macrophages". Immunologic Research. 27 (2–3): 261–76. doi:10.1385/IR:27:2-3:261. PMID 12857973.
- Esté JA (Sep 2003). "Virus entry as a target for anti-HIV intervention". Current Medicinal Chemistry. 10 (17): 1617–32. doi:10.2174/0929867033457098. PMID 12871111.
- Gallo SA, Finnegan CM, Viard M, Raviv Y, Dimitrov A, Rawat SS, Puri A, Durell S, Blumenthal R (Jul 2003). "The HIV Env-mediated fusion reaction". Biochimica et Biophysica Acta. 1614 (1): 36–50. doi:10.1016/S0005-2736(03)00161-5. PMID 12873764.
- Zaitseva M, Peden K, Golding H (Jul 2003). "HIV coreceptors: role of structure, posttranslational modifications, and internalization in viral-cell fusion and as targets for entry inhibitors". Biochimica et Biophysica Acta. 1614 (1): 51–61. doi:10.1016/S0005-2736(03)00162-7. PMID 12873765.
- Lee C, Liu QH, Tomkowicz B, Yi Y, Freedman BD, Collman RG (Nov 2003). "Macrophage activation through CCR5- and CXCR4-mediated gp120-elicited signaling pathways". Journal of Leukocyte Biology. 74 (5): 676–82. doi:10.1189/jlb.0503206. PMID 12960231.
- Yi Y, Lee C, Liu QH, Freedman BD, Collman RG (2004). "Chemokine receptor utilization and macrophage signaling by human immunodeficiency virus type 1 gp120: Implications for neuropathogenesis". Journal of Neurovirology. 10 Suppl 1: 91–6. doi:10.1080/753312758. PMID 14982745.
- Seibert C, Sakmar TP (2004). "Small-molecule antagonists of CCR5 and CXCR4: a promising new class of anti-HIV-1 drugs". Current Pharmaceutical Design. 10 (17): 2041–62. doi:10.2174/1381612043384312. PMID 15279544.
- Cutler CW, Jotwani R (2006). "Oral mucosal expression of HIV-1 receptors, co-receptors, and alpha-defensins: tableau of resistance or susceptibility to HIV infection?". Advances in Dental Research. 19 (1): 49–51. doi:10.1177/154407370601900110. PMC 3750741. PMID 16672549.
- Ajuebor MN, Carey JA, Swain MG (Aug 2006). "CCR5 in T cell-mediated liver diseases: what's going on?". Journal of Immunology. 177 (4): 2039–45. doi:10.4049/jimmunol.177.4.2039. PMID 16887960.
- Lipp M, Müller G (2003). "Shaping up adaptive immunity: the impact of CCR7 and CXCR5 on lymphocyte trafficking". Verhandlungen Der Deutschen Gesellschaft Für Pathologie. 87: 90–101. PMID 16888899.
- Balistreri CR, Caruso C, Grimaldi MP, Listì F, Vasto S, Orlando V, Campagna AM, Lio D, Candore G (Apr 2007). "CCR5 receptor: biologic and genetic implications in age-related diseases". Annals of the New York Academy of Sciences. 1100: 162–72. Bibcode:2007NYASA1100..162B. doi:10.1196/annals.1395.014. PMID 17460174.
- Madsen HO, Poulsen K, Dahl O, Clark BF, Hjorth JP (Mar 1990). "Retropseudogenes constitute the major part of the human elongation factor 1 alpha gene family". Nucleic Acids Research. 18 (6): 1513–6. doi:10.1093/nar/18.6.1513. PMC 330519. PMID 2183196.
- Uetsuki T, Naito A, Nagata S, Kaziro Y (Apr 1989). "Isolation and characterization of the human chromosomal gene for polypeptide chain elongation factor-1 alpha". The Journal of Biological Chemistry. 264 (10): 5791–8. PMID 2564392.
- Whiteheart SW, Shenbagamurthi P, Chen L, Cotter RJ, Hart GW (Aug 1989). "Murine elongation factor 1 alpha (EF-1 alpha) is posttranslationally modified by novel amide-linked ethanolamine-phosphoglycerol moieties. Addition of ethanolamine-phosphoglycerol to specific glutamic acid residues on EF-1 alpha". The Journal of Biological Chemistry. 264 (24): 14334–41. PMID 2569467.
- Ann DK, Wu MM, Huang T, Carlson DM, Wu R (Mar 1988). "Retinol-regulated gene expression in human tracheobronchial epithelial cells. Enhanced expression of elongation factor EF-1 alpha". The Journal of Biological Chemistry. 263 (8): 3546–9. PMID 3346208.
- Brands JH, Maassen JA, van Hemert FJ, Amons R, Möller W (Feb 1986). "The primary structure of the alpha subunit of human elongation factor 1. Structural aspects of guanine-nucleotide-binding sites". European Journal of Biochemistry / FEBS. 155 (1): 167–71. doi:10.1111/j.1432-1033.1986.tb09472.x. PMID 3512269.
- Crystal Structure of the CCR5 Chemokine Receptor A rotatable, zoomable 3-D image from rcsb.org
- Video and text from a PBS documentary about the discovery of CCR5
- "Chemokine Receptors: CCR5". IUPHAR Database of Receptors and Ion Channels. International Union of Basic and Clinical Pharmacology.
- HuGENavigator literature on HIV Infections and CCR5[permanent dead link] from CDC - (note, authors may not be CDC employees, and there is no public domain notice on the page, so this cannot be assumed to be public domain)
- Schering-Plough Initiates Phase III Studies with CCR5-Vicriviroc in Treatment- Experienced HIV Patients.
- HIVcoPred A server for prediction of HIV coreceptor usage (CCR5). PLoS ONE 8(4): e61437
- Human CCR5 genome location and CCR5 gene details page in the UCSC Genome Browser.
CCR5 On the Web
American Roentgen Ray Society Images of CCR5 | <urn:uuid:93909c9e-3e6d-4658-8e28-5b3231d02cea> | {
"date": "2020-01-20T11:53:23",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.785456657409668,
"score": 2.671875,
"token_count": 12577,
"url": "http://wikidoc.org/index.php/CCR5"
} |
Living in today’s fast paced world, when is the last time you stopped to assess the state of your mental wellness? If you’re like most, you probably can’t remember. Maintaining strong mental wellness is just as important as staying healthy and physically fit.
We’ve explored exactly why maintaining a strong sense of mental wellness is important to a healthy lifestyle, as well as offer some tips and tricks you can use to boost your mental health and improve your overall sense of wellbeing.
The Importance of Mental Wellness
Mental wellness encompasses a balance of physical, emotional, spiritual, and mental health. It’s about being aware of your emotions, thoughts, behaviors, and knowing how to deal with stress and life’s changes. Suffering from poor mental wellness can negatively affect your life and those around you in a number of ways.
Stress and depression can greatly impact the way you interact with friends and family, as well as diminish your work and personal life happiness. When you let your mental state and sense of wellness get out of control, your appetite and energy levels can be affected as well, which exasperates the problem even further. This negative feedback loop prevents you from feeling your best and having the energy to take on the day.
This is why maintaining strong mental wellness can help you live a full, productive life in which you feel good about yourself and the relationships you have with others.
Tips & Tricks for Strong Mental Wellness
- Do Things You Enjoy
As a busy woman, it’s far too easy to get caught up with work and everyday life. You simply have to make time to do the things that make you happy. The next time you start planning your schedule, be sure to pencil in some personal time to read a book, sketch, meditate, spend time with your pet, or take a relaxing bath.
- Diet is Important
Is your diet as clean as it should be? Eating a healthy, balanced diet goes far beyond looking good. Bringing clean, nutritious food into your body can greatly affect your sense of balance and wellness. When your body doesn’t get all of the nutrients it needs, or you fill up on processed and/or sugary food, the hormones that control your mood and even thoughts can become unbalanced. Fill your diet with healthy vegetables, fruits, unprocessed grains, and high quality protein to keep your body and your brain as happy as possible.
- Set Realistic Goals
Sometimes it just helps to have a roadmap of the goals you want to aim for. By setting your goals, be it career goals, fitness goals, or any other personal goal you want to achieve, in small easy steps, it can help to give you a sense of direction. Not only that, but as you check each bite-sized piece of your goal off, you’ll feel more accomplished and proud. Keep a journal or draw out a road map, and reward yourself as you accomplish each step. Achieving big goals can seem daunting, but breaking big goals up into much smaller, easier goals can put you in control and keep you motivated.
Sometimes You Need More
Sometimes, the worries and strains of life can be too much for one person to handle. Knowing that it’s ok to ask for help when you need it is an important part of protecting your sense of mental wellness. Additionally, some imbalances, like those caused by depression, are not based on any one situation or cause. At Women’s Mental Wellness, we provide you the time, kindness, and expertise you need to feel like your best and most balanced self, both now and for your future.
Feature image source: https://www.gympik.com/articles/happy-womens-day-with-strong-mental-wellness/ | <urn:uuid:0181add0-17b8-44b0-aef8-bc487ea3965b> | {
"date": "2020-01-20T13:05:56",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.947627067565918,
"score": 2.765625,
"token_count": 792,
"url": "http://womensmentalwellness.com/3-tips-tricks-for-maintaining-strong-mental-wellness/"
} |
A note about the definition of the word “carol.” In musical terms a carol is a song that has a refrain that repeats through each verse. Carols pre-1800 were associated with folk-dancing, especial with circle dances done by both men and women. The words to carols could be connected to any season of the year, not just Christmas, but they came to be thought of as Christmas songs because so much singing and dancing took place at all levels of society in the British Isles during the Twelve Days of the Christmas feast. Now, of course, “Christmas Carol” is applied far more widely, however I would say that the term really should be limited to songs that talk about the birth of Christ in some way; “Rudolph the Red-Nosed Reindeer” is not a Christmas carol!
Anyway, I hope and pray that this Advent time will be one of blessing and reflection as you prepare heart and mind to celebrate the birth of Our Lord twenty-five days from now.
+ + + + + + + + +
A Bidding Prayer
“Beloved in Christ, in this season of Advent, let it be our care and delight to prepare ourselves to hear again the message of the Angels, and in heart and mind to go even unto Bethlehem, to see the Babe lying in a manger. Let us read and mark in Holy Scripture the tale of the loving purposes of God from the first days of our disobedience unto the glorious Redemption brought us by his holy Child; and let us look forward to the yearly remembrance of his birth with hymns and songs of praise.
But first, let us pray for the needs of his whole world; for peace and goodwill over all the earth; for the mission and unity of the Church for which he died, and especially in this country and within this city.
And because this of all things would rejoice his heart, let us at this time remember in his name the poor and the helpless; the hungry and the oppressed; the sick and those who mourn; the lonely and the unloved; the aged and the little children; and all those who know not the Lord Jesus, or who love him not, or who by sin have grieved his heart of love.
Lastly, let us remember before God his pure and lowly Mother, and all those who rejoice with us, but upon another shore and in a greater light, that multitude which no one can number, whose hope was in the Word made flesh, and with whom, in this Lord Jesus, we for evermore are one.
These prayers and praises let us humbly offer up to the throne of heaven, in the words which Christ himself hath taught us:
Our Father . . . .
The Almighty God bless us with his grace; Christ give us the joys of everlasting life; and unto the fellowship of the citizens above may the King of Angels bring us all. Amen.”
~ Advent Lessons and Carols, Book of Occasional Services
The Advent Matins Responsory by Palestrina, sung by the Choir of Magdalene College, Oxford.
https://www.youtube.com/watch?v=VLeTryubtQs (copy and paste into your browser). | <urn:uuid:50daa3c0-3d1c-4376-923c-a808b6f3a9e3> | {
"date": "2020-01-20T12:35:32",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.961768388748169,
"score": 3.234375,
"token_count": 675,
"url": "http://www.allsaintsmillington.org/sermons--reflections/eve-of-advent"
} |
2012 Mayan calendar questions are now occupying the minds of many people around the world. Whether you live in the US, Europe or far east Asia you probably have heard of the end of the world theories that have circulated around the web and television. Many people are preparing themselves to deal with the worst 2012 end of the world cataclysmic turnouts others dismiss it as a conspiracy. But what are the main theories behind 2012 “end of the world” events?. We will go over the “Galactic Alignment” and the “Approaching Planet X.” which have created many 2012 Mayan calender questions.
The Galactic alignment and the approaching “Planet X” (or Nibiru) are the two main theories that are being attributed for the much talked about cataclysmic effects of dooms day or end of the world, as we know it.
These two doomsday theories are widely based on the indications of the Mayan calendar, which has “predicted” a galactic season to roll over to a new era on December 21, 2012.
What is proven to happen from 2012 theory?
Similar to how the movement of the earth around the sun causes many different seasonal changes, which we call summer or winter, the galactic movement of the sun around its galaxy will affect the earth in a more intense fashion for longer periods of time. Because of the long duration, which takes for such galactic changes, they are unknown and undetectable to our relatively short human life.
Although such galactic changes may or may not happen in 2012, it is scientifically proven fact that they will take place at some point in the future.
What is the significance of the Mayan Calendar?
December 21 for the ancient Mayans marked a huge celebration period that was recognized as the end of a whole calendar cycle. This calendar was not only based on the solar system (movement of the earth around the sun) or the lunar system (movement of the moon around the earth) but astonishingly it was based on a whole galactic system movement, comprising and including the of movements of the moon around the earth, the earth around the sun, as well as our sun around it’s galaxy.
What is a galactic system and how does it work?
Just as the earth moves around the sun – identical to many other solar systems in the universe – our sun itself is in constant circulation around the black hole of its (our) galaxy. Most people are quite surprised to find out that the sun is moving at a speed of nearly 1,000,000 km every hour and is constantly accelerating. So with its massive gravitational force the sun is also pulling the earth and rest of our neighboring planets along with it – We too, just as everything else on earth, are moving at this enormous speed with the sun.
Did the Mayans get it right?
As explained above, the Mayans with their incredible knowledge of astronomy were able to predict the movements of the moon around the earth, the movements of the earth around the sun and amazingly the movement of the sun (hence our solar system) around the Milky Way galaxy. And as far as our astronomers and scientists have proven prove, they did such prediction flawlessly and exactly to the point, which has given rise to many 2012 Mayan calendar questions these day.
Why should we believe in the Mayan calendar?
The Mayan years were so accurate that it eliminated the need for Leap years, something today’s calendars cannot avoid annually. These ancient people who lived (as far as archaeologists can trace back) nearly 5000 to 7000 years ago kept their solar calendar years to exactly 365.25 days.
The Maya were not just astronomers, but sophisticated astronomers; people in the pre-Classic period whose daily work revolved on their observation of the skies and stars. As a matter of fact, they appear to be the only pre-telescopic civilization to demonstrate knowledge of the Orion Nebula.
What exactly does the Mayan calendar predicts?
The Mayan calendar predicts that the sun will finish its one complete rotation around the Milky Way galaxy, hence rolling over to a new galactic year. For the humankind on the earth, each galactic year takes approximately 26,000 25 million solar years. At this time the sun will cross exactly through the galaxy’s equinox, which could also be considered as the Galaxy’s “equator”. If this prediction is true then it means that during such special galactic alignment the sun and the earth will be exposed to an increase in the gravitational forces that are triggered from the Milky Way galaxy’s center, commonly know as the “Black Hole,” hence disastrous consequences to follow.
As mentioned before, the reason why the 2012 Mayan calendar is so highly regarded is because it is considered to be even more sophisticated than modern day calendars and it so complicated that we still cannot decipher everything the calendar predicts. It consists of a 365-day agricultural calendar, as well as a 260-day sacred calendar. The people of Maya had measured the length of the solar year to a high degree of accuracy and was perfected to a precision that our own Gregorian calendar lacks.
When exactly did the Mayans predict doomsday?
The ancient people of Maya produced a calendar that predicts the galactic alignment and disruption in the gravitational of force of the earth to be exactly on 12/21/2012 at 11:11 p.m. Universal Time. Although it is commonly believed amongst scientists that such disruptions will not occur rapidly, such date and time may very well be the start of a new Galactic seasons and consequent disruptions.
The Mayan calendar’s solar tracking of the earthly days were extremely accurate, which is why many people believe that their early galactic prediction will also prove to be exact. Although there is no doubt that the solar system will eventually cross through the Milky Way’s equinox, there are many scientists engaged in vigorous debates on whether or not the Mayans were correct about their prediction and whether or not this will prove to cause a polar shift on December 2012; something that remains to be witnessed for accuracy.
What has science proven about the Mayan calendar?
There are many people who are fearful about events of 2012 and many that have full doubts. However, scientists have proven that cataclysmic events are destined to take place on earth. However, whether or not the start of a new Mayan year in 2012 is thought to be the start of the cataclysmic disasters is yet to be proven.
What happened to the Mayas?
The Mayas continuously calculated future events through the studying the skies, mostly considerably the Venus cycle, in the observatory named, The Pyramid of Kukulkan. Their work and their living continued until their calendar mysteriously stops on a winter solstices. ( solstice is an astronomical event that happens twice each year, when the tilt of the Earth’s axis is most inclined toward or away from the Sun, causing the Sun’s apparent position in the sky to reach its northernmost or southernmost extreme. – Wikipedia)
The day the Mayan race and their calendar stop is exactly on December 21st, 2012, which is the day winter solstices. Many people who reject the Mayan calendar perdition label this date as being purely coincidental. As a matter of fact, this is exactly what started the whole debate of the 2012 Mayan calendar.
How could a civilization so intelligent, so precise, so devoted, just abruptly stop to exist on a specific day? What is even stranger is the whole civilization seems to have just vanished, with no descendants left behind them. 2012 Mayan calendar questions will continue to get more intensified as we get close and closer to this date. | <urn:uuid:5ba4e006-98d3-45ba-87dd-58b44cef87fb> | {
"date": "2020-01-20T12:47:14",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9637477397918701,
"score": 3.046875,
"token_count": 1588,
"url": "http://www.dangerfunclub.com/2018/10/most-popular-questions-about-2012-mayan-calendar.html"
} |
This is a classic science experiment for small children meant to teach them how water travels up a plants stem.
- A disposable clear drinking glass
- A stalk of celery, with leaves
- Food coloring (dark colors will work more noticeably than yellow)
- A drinking straw (optional)
- A knife
Fill the drinking glass half way with water. Dye the water heavily with food coloring. I used about 10 drops of food coloring per glass. Cut off the bottom of the celery stalk and place it into the glass with leaves intact. If the leaves are intact the colored water will travel all the way up the stalk and color the leaves, but if the leaves are not intact you will still be able to observe the dye traveling up the celery stalks capillaries.
Place the celery stalk in the colored water leaf end up. Allow the celery to drink overnight (at least 12 hours).
After the celery has had its drink, you’ll notice that the leaves (or the top end of the celery stalk, if yours did not have leaves) have begun to change color. Show the child the drinking straw and explain that the celery stalks capillaries (the stringy parts) act like a drinking straw, and allow the celery to carry water from the earth (or the cup) up through the stalk to its leaves.
Next, show the child the end of the straw, and observe that although the straw is shaped like a long cylinder, when viewed from the end it looks like a small circle or dot.
Cut the celery in half and show the child the cross section. The insides of the capillaries will be dyed very dark. Explain that these are the capillaries, or straws, through which the dyed water has traveled.
This experiment can also be done with white carnations or Queen Anne’s lace. The result will be that the white flowers will be dyed the color of the colored water. | <urn:uuid:abced409-8df5-450a-a09c-5bdf9f6e0236> | {
"date": "2020-01-20T12:03:38",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9445885419845581,
"score": 3.6875,
"token_count": 409,
"url": "http://www.designbuildlove.co/thirsty-celery-experiment/"
} |
Goat Milk Ingredients
Goat milk ingredients may be the last thing you think of when you reach for a tall, sweet glass of cold goat milk, or as you're spreading a creamy, soft goat cheese on your cracker.
However, it's those ingredients that give goat milk its unique texture, flavor, and health qualities. So, let's take a look at these overlooked components that work together to make goat milk a nutritional powerhouse.
In overview, roughly 87% of milk ingredients is water, with the remaining 13% broken down as
- lipids (fats) -- approximately 4%
- proteins -- approximately 3.4%
- carbohydrates (lactose) -- approximately 4.8%, and
- minerals -- approximately 0.8%
You can read how the exact composition of milk is influenced by a variety of factors in the article, Goat Milk Composition.
Milk salts, consisting of sodium, calcium and magnesium, in various forms as chlorides, phosphates and citrates, play a minor role in the composition of milk, accounting for less than 1% of the total. Although minor in terms of amount, the salts are an important influence on functional properties of milk, such as coagulation rate.
Vitamins contribute the final factor in the ingredients of milk, almost negligible in terms of actual composition percentage, but vital in terms of health contributions.
Total fat content is higher in goat milk than cow's milk, with roughly 10 g/cup in goat milk versus 8 g/cup in cow's milk. The most significant difference from a health standpoint is not in the amount of fat, however, but in the ratio of fatty acids known as medium chain triglycerides (MCT).
Protein in milk is a known health benefit of drinking milk, and is also found to be higher in goat milk than cow's milk, with comparison values of 8.69 g/cup to 7.86 g/cup. Again, however, the numbers are not the most important aspect to the health benefits of goat milk protein; rather, the unique structures of the proteins are the key attribute.
Goat milk has fewer carbohydrates than cow's milk, at 10.86 g/cup versus 11.03 g/cup. This difference in milk composition is almost exclusively in the levels of lactose.
Goat milk is rich in both vitamins and minerals, with the levels of many exceeding that of cow's milk. The vitamins and minerals, though minor in terms of percentage of the composition of milk, are major players in the area of health benefits.
Summary of the Special Characteristics of Goats Milk Ingredients
The information below is a summary of the importance of the ingredients in goat milk. For more details, visit Milk Nutrition Facts and Information for Goat Milk and check out the detailed articles for each of the individual ingredients in milk.
Proteins and lipids are the two most significant categories in terms of providing important health benefits related to goat milk nutrition.
For protein, the following factors are considered significant:
- higher levels of the essential amino acids
- higher nutritional value due to the structural differences of proteins in goat milk versus cow's milk
- potential for less allergenic reactions
- much lower levels, and potential lack of, the alpha-s1-casein protein, promoting digestibility and less allergenic reaction
- absence of the protein agglutinin, which causes fat globules to stick together
For lipids, the benefits are primarily derived from:
- smaller fat globule size, promoting digestibility
- fat globules remain homogenized, due to lack of agglutinin
- significant proportion of medium chain triglycerides (MCT), which are recognized as highly beneficial to a range of health issues
Regarding vitamins, goat milk is considered a better source than cow's milk for vitamin A, niacin and B6. Commercial goat milk ingredients typically contain added vitamin D, just as cow's milk does.
The minerals in the composition of goat milk are seen as significant in the areas of calcium, phosphorus, potassium, magnesium, manganese and selenium. Levels of other minerals are comparable to those in cow's milk. Minerals in goat milk seem to have better bioavailability, however.
As you can see by now, goat milk ingredients contribute to the special qualities that make it a super food in terms of health benefits and nutritional properties.
Got goat milk? You should!
International Livestock Research Institute, "Milk Chemistry--An Introduction."
USDA Goat Milk Table of Nutrients
USDA Cow's Milk Table of Nutrients
Nutritional studies are ongoing, so check back here for any new information related to goat milk ingredients!
Back to top
of Goat Milk Ingredients
Return to Milk Nutrition Facts and Information for Goat Milk
from Goat Milk Ingredients
Return to Everything Goat Milk
from Goat Milk Ingredients
View complete article list at our Sitemap | <urn:uuid:6cec5c6e-7b2f-46c5-8d02-4d450ad93bb1> | {
"date": "2020-01-20T11:52:10",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9297328591346741,
"score": 2.84375,
"token_count": 1019,
"url": "http://www.everything-goat-milk.com/milk-ingredients.html"
} |
Stroke Diagnosis, Treatments, Recovery, Preventive, Complications
Stroke refers to a condition when blood supply to the brain is interfered or lacks due to congestion (ischemic stroke) or burst (haemorrhagic stroke) of the blood vessels. With no blood the brain gets no supply of oxygen and nutrition, this causing the cells in partial brain die. The condition will cause the part of the body controlled by the brain area to lose its normal function. Stroke is a medical emergency because brain cells can die in a matter of minutes. Quick handling may minimize possible brain damage and complications.
The symptoms of Stroke
Partial body is controlled by different partial brain and therefore stroke symptoms depend on the brain area affected and its damage degree. The symptoms vary individually but happen mostly in a sudden. 3 indications are the most common:
Face. The face looks slanting side way, unable to smile of losing resilience.
Arms. Stroke may cause arms to weaken and lose power of pulling back. Not only the arms but also the legs of the same side weaken.
Speech. Unclear speech, babbling, or even totally losing speech ability.
Other indications of stroke:
Nusea and vomit.
Sudden grave headache, stiff neck, and vertigo.
Hard of swallowing (dysphagia).
Losing balance and coordination.
Sudden losing sight or doubling sight.
Two types of stroke by causes:
Ischemic stroke. This case happens when the arterial blood vessels fail to carry blood and oxygen to the brain due to congestion. It is called ischemia.
This type happens when the blood vessels of the brain burst and bleed. The bleeding may be caused by some conditions affecting the blood vessels as follows:
Weakening blood vessel walls (brain aneurism).
Transient Ischemic Attack (TIA):
TIA has the same stroke symptoms but it lasts usually for five minutes. It is caused by clogging of blood clot, cutting blood supply to the brain.
Stroke risk factors as the following:
Health factors, including
Having historical TIA case.
Life style factors, including
Lacking physical exercise.
Constricted drugs consumption.
Other factors, including
Evaluation on the types of stroke and brain area affected.
Firstly there will be inquiries about the following:
The first symptoms appearing and activities being done.
The medicines being consumed.
Historical injury on head area.
Inquiries about health and family history on heart failure, TIA, and stroke.
Physical check wholly, as blood pressure, heart beat, abnormal noise in the blood vessels.
Further examination including a.o.:
USG doppler carotis.
Stroke treatments usually require a neurologist, depending on the type of the case, ischemic or haemorrhagic.
Ischemic stroke treatment
Firstly the medical action will focus on ensuring stable breathing, controlling blood pressure, and recovering blood flow. The actions cover:
rtPA injection. By rtPA (recombinant tissue plasminogen activator) infusing, recovery of blood flow will be acted upon but after due propriety of the patient.
Antiplatelet drugs. To prevent blood coagulating, this medicine will be prescribed, such as aspirin.
Anticoagulant. To prevent blood clotting, anticoagulant as heparin, will be dispensed, working by manipulating composing factors of blood coagulation.
Antihypertension. On early stroke, the blood pressure may be kept above low level to maintain blood supply to the brain, but on gaining stable pressure the pressure will be kept on optimal level.
Statin. Statin group cholesterol medication as atorvastatin may be given to control high cholesterol, by inhibiting the enzyme producing cholesterol of the liver.
To prevent recurring ischemic stroke an operation may be needed, one being called endarterectomy carotis, by removing the fat, which clogs flow of carotis arterial blood to the brain.
It is operated using catheter inserted into blood vessel of upper thigh directed to the artery carotis, aimed at enlarging the blood vessel.
Haemorrhagic stroke treatment.
The treatment aims at lowering pressure on the brain and controlling the bleeding. Some treatment actions on haemorrhagic stroke:
Medicines. The medication aims at lowering pressure on the brain, blood pressure, and preventing spasm. On consuming anticoagulant or antiplatelet, coagulating factor transfusion may be given to counter effect the anticoagulant.
Operation is done to reduce pressure on the brain and possibly restore broken blood vessel.
TIA (Transient Ischemic Attack).
TIA treatment aims at controlling the risk factor likely to trigger stroke and thus prevent it. Antiplatelet or anticoagulant, cholesterol and antihypertension medicines may be given depending on the risk factor. Endarterectomy carotis operation may be required in case of existing accumulated fat.
Rehabilitation depends on the symptoms and graveness of the case. The sufferers may get the help of specialists as doctors, psychologist, speech therapist, physio therapist, and nurses.
Full recovery will take time but mostly total recovery is hardly rare.
Some effects result from stroke include:
Paralysis of partial body.
Losing body coordination and balance.
Cognitive effects; stroke may also affect cognitive function. It covers:
Verbal as well as non verbal communications.
Demensia vascular. This effect may happen instantly or some time later after the stroke attack.
Psychological effects as depression and anxiety.
Communication abilities as speaking, understanding, reading, writing, all these being called aphasia or disphasia.
Vision ability as losing sight.
Family support is essential in helping the patients get sooner recovery such as:
To motivate for long time improvement.
To adapt to the patient’s condition such as being slow in communication.
Getting involved in physiotherapeutic treatment.
Moral support to ensure the patient of eventual recovery.
Frustation and loneliness may happen with the patients. The following are some suggestions worth attending:
Be prepared for having to face changed behaviour such as being sensitive of feeling.
Try always to give encouragement and applause on any even small improvement.
Do not miss to care for your own health physical as well as psychological.
The primary action as preventive against stroke is healthy life style and recognize the risk factors close around.
Some ways against attack of stroke:
Eating habit. Too much salty and fatty foods may increase blood cholesterol later to trigger hypertension and lead to stroke.
Low fat and fibrous foods are highly recommended.
Regular physical exercises.
Avoid alcoholic drinks.
Keep away from NAPZA.
Some of the complications follow:
Deep vein thrombosis, blood coagulation around the legs to result in paralysis.
Hydrocephalus (accumulated liquid in the brain), suffered by patients of haemorrhagic stroke.
Dysphagia, disorder in swallowing reflex causing foods to enter respiratory tract. | <urn:uuid:07bc5160-baf5-4c45-a769-4b7fa74b6c1f> | {
"date": "2020-01-20T11:13:55",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8888748288154602,
"score": 3.390625,
"token_count": 1515,
"url": "http://www.health99.org/page/2/"
} |
People don’t believe me when I tell them that much of what I have learned about history was from fiction. But let’s be clear - I’m talking about well-researched, factually based, historical fiction. Of course, one must carefully filter the fact from the fiction and do additional research where the separation is difficult, but fiction generally engages this reader more than nonfiction, so I’ll take the lessons where they come.
I could (and should) thank many authors, but here’s a heartfelt thank you specifically for Deborah Wiles for the lessons she’s taught me. First it was the Cuban Missile Crisis in Countdown. Now it’s Mississippi in 1964 - Freedom Summer - in her second of three documentary novels, Revolution.
Revolution takes place in Greenwood, Mississippi. Depending on who you ask, the summer of 1964 was when the invaders came from the north or it was Freedom Summer when volunteers worked diligently to help African-American residents to register to vote.
Sunny is caught in the middle of the disagreement. Her grandmother holds strongly to segregation. Her father runs a grocery store that welcomes and employs numerous African-Americans. Her stepmother sees inequality and injustice. But historical fiction would be, well, nonfiction if it didn’t include some fiction. Sunny also struggles with relationships within her new family. Should she trust and respect her stepmother? What about Gillette, her new stepbrother? How does the extended family accept the new family additions, and what factors in the family’s past affect that acceptance?
Again, like in Countdown, scattered throughout the novel are bits of image-dominated nonfiction. Photographs, pamphlets, song lyrics, newspaper excerpts, and signs are found throughout, usually in 5-10 page chunks every few chapters. Some are meant to specifically support the story such as images of volunteers working with unregistered African-Americans, Freedom Schools, and protesters being arrested. Other nonfiction parts help readers understand more about the time in history like “Whites Only” segregation signs, the Beatles, and soldiers in Vietnam.
There’s much to learn about our country from these three months in Greenwood, Mississippi, but know that the most powerful lessons from Revolution come from Sunny. As she wrestles with the changes happening in her family and her world, so do readers. And both come out changed at the end of Freedom Summer. | <urn:uuid:f82c04d0-e6fc-4f56-b102-cfe1b4e5d2e0> | {
"date": "2020-01-20T13:14:49",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9582697153091431,
"score": 2.59375,
"token_count": 501,
"url": "http://www.helpreaderslovereading.com/2014/07/revolution-by-deborah-wiles.html"
} |
In 219 B.C., Hannibal of Carthage led an attack on Saguntum, an independent city allied with Rome, which sparked the outbreak of the Second Punic War. He then marched his massive army across the Pyrenees and Alps into central Italy in what would be remembered as one of the most famous campaigns in history. After a string of victories, the most notable coming at Cannae in 216 B.C., Hannibal had gained a foothold in southern Italy, but declined to mount an attack on Rome itself. The Romans rebounded, however, driving the Carthaginians out of Spain and launching an invasion of North Africa. In 203 B.C., Hannibal abandoned the struggle in Italy to defend North Africa, and he suffered a devastating defeat at the hands of Publius Cornelius Scipio at Zama the following year. Though the treaty concluding the Second Punic War put an end to Carthage’s status as an imperial power, Hannibal continued to pursue his lifelong dream of destroying Rome up until his death in 183 B.C.
Hannibal’s Early Life and Attack on Saguntum
Hannibal was born in 247 B.C. in North Africa. Polybius and Livy, whose histories of Rome are the main Latin sources regarding his life, claimed that Hannibal’s father, the great Carthaginian general Hamilcar Barca, brought his son to Spain (a region he had begun to conquer around 237 B.C.) at a young age. Hamilcar died in 229 B.C. and was succeeded by his son-in-law Hasdrubal, who made the young Hannibal an officer in the Carthaginian army. In 221 B.C., Hasdrubal was assassinated, and the army unanimously chose the 26-year-old Hannibal to command Carthage’s empire in Spain. Hannibal swiftly consolidated control in the region from the seaport base of Cartagena (New Carthage); he also married a Spanish princess.
In 219 B.C., Hannibal led a Carthaginian attack on Saguntum, an independent city in the middle of the eastern Spanish coast that had shown aggression against nearby Carthaginian towns. According to the treaty that ended the First Punic War, the Ebro River was the northernmost border of Carthage’s influence in Spain; though Saguntum was south of the Ebro, it was allied with Rome, which saw Hannibal’s attack as an act of war. Carthaginian forces besieged Saguntum for eight months before the city fell. Although Rome demanded Hannibal’s surrender, he refused, instead making plans for the invasion of Italy that would mark the beginning of Second Punic War.
Hannibal’s Invasion of Italy
Leaving his brother, also named Hasdrubal, to protect Carthage’s interests in Spain and North Africa, Hannibal assembled a massive army, including (according to Polybius’ probably exaggerated figures) as many as 90,000 infantry, 12,000 cavalry and nearly 40 elephants. The march that followed–which covered some 1,000 miles (1,600 kilometers) through the Pyrenees, across the Rhone River and the snowcapped Alps, and finally into central Italy–would be remembered as one of the most famous campaigns in history. With his forces depleted by the harsh Alpine crossing, Hannibal met the powerful army of the Roman general Publius Cornelius Scipio on the plains west of the Ticino River. Hannibal’s cavalry prevailed, and Scipio was seriously wounded in the battle.
Late in 218 B.C., the Carthaginians again defeated the Romans on the left bank of the Trebia River, a victory that earned Hannibal the support of allies including the Gauls and Ligurians. By the spring of 217 B.C., he had advanced to the Arno River, where despite a victory at Lake Trasimene he declined to lead his exhausted forces against Rome itself. In the summer of the following year, 16 Roman legions–close to 80,000 soldiers, an army said to be twice the size of Hannibal’s–confronted the Carthaginians near the town of Cannae. While the Roman general Varro massed his infantry in the center with his cavalry on each wing–a classic military formation–Hannibal maintained a relatively weak center but strong infantry and cavalry forces at the flanks. When the Romans advanced, the Carthaginians were able to hold their center and win the struggle at the sides, enveloping the enemy and cutting off the possibility of retreat by sending a cavalry charge across the rear.
From Victory to Defeat
The Roman defeat at Cannae stunned much of southern Italy, and many of Rome’s allies and colonies defected to the Carthaginian side. Under the leadership of Scipio’s son-in-law, also named Publius Cornelius Scipio, and his fellow general Quintus Fabius Maximus, the Romans soon began to rally. In southern Italy, Fabius used cautious tactics to gradually push back against Hannibal’s forces, and had regained a considerable amount of ground by 209 B.C. In northern Italy in 208 B.C., Roman forces defeated an army of reinforcements led by Hannibal’s brother Hasdrubal, who had crossed the Alps in an attempt to come to Hannibal’s aid.
Meanwhile, the younger Scipio drew on Rome’s seemingly inexhaustible supply of manpower to launch an attack on New Carthage and drive the Carthaginians out of Spain. He then invaded North Africa, forcing Hannibal to withdraw his troops from southern Italy in 203 B.C. in order to defend his home state. The following year, Hannibal met Scipio’s forces on the battlefield near Zama, some 120 kilometers from Carthage. This time it was the Romans (with the help of their North African allies, the Numidians) who enveloped and smothered the Carthaginians, killing some 20,000 soldiers at a loss of only 1,500 of their own men. In honor of his great victory, Scipio was given the name Africanus.
Hannibal’s Postwar Life and Death
In the peace agreement that ended the Second Punic War, Carthage was allowed to keep only its territory in North Africa but lost its overseas empire permanently. It was also forced to surrender its fleet and pay a large indemnity in silver, and to agree never again to re-arm or declare war without permission from Rome. Hannibal, who escaped with his life from the crushing defeat at Zama and still harbored a desire to defeat Rome, retained his military title despite accusations that he had botched the conduct of the war. In addition, he was made a civil magistrate in the government of Carthage.
According to Livy, Hannibal fled to the Syrian court at Ephesus after his opponents within the Carthaginian nobility denounced him to the Romans for encouraging Antiochus III of Syria to take up arms against Rome. When Rome later defeated Antiochus, one of the peace terms called for the surrender of Hannibal; to avoid this fate, he may have fled to Crete or taken up arms with rebel forces in Armenia. He later served King Prusias of Bithynia in another unsuccessful war against the Roman ally King Eumenes II of Pergamum. At some point during this conflict, the Romans again demanded the surrender of Hannibal. Finding himself unable to escape, he killed himself by taking poison in the Bithynian village of Libyssa, probably around 183 B.C. | <urn:uuid:c1b91d96-9641-4bc0-9c33-9a91887f3f08> | {
"date": "2020-01-20T12:00:56",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9719688892364502,
"score": 4,
"token_count": 1585,
"url": "http://www.history.com/topics/ancient-history/hannibal"
} |
Gardening: can it really help with depression?
With most of us dealing with a lot of pressure in our daily lives, it is no surprise that nearly a fifth of adults in the UK experience depression or anxiety. That is according to the Office for National Statistics (ONS), which states that more women report that they suffer from the conditions than men. With overthinking and major life events, such as family bereavement, leading to depression; anyone can be at risk of the illness. However, certain genetic variations may make some more prone to the condition than others.
If diagnosed with depression, you are usually prescribed anti-depressants because they act as a ‘mood enhancer’. However, they don’t work for everyone. But, can gardening help us battle depression? Many believe so, with reports suggesting 87% of people who garden for more than six hours per week feel happier. But why and how is this the case?
If suffering from depression, gardening is a great habit to start. Tasks such as digging, mowing and planting can keep you occupied for hours on end and always thinking, while being outdoors can increase serotonin in the brain. On top of this, the relaxing ambience provided by being outside can leave you feeling rejuvenated.
Furthermore, Dr Sheri Jacobson has confirmed the health benefits of gardening. She is quoted in Huffington Post saying: “While I haven’t come across anyone claiming that gardening has single-handedly overcome their depression, as part of a wide set of tools, gardening can be beneficial in the battle against depression.
“Being in the outdoors in more natural surroundings can help lift our mood as it brings a sense of simplicity and tranquillity which is therapeutic for many people.”
Gardening as a family can be a great way in which to socialise within your comfort zone. Most kids love the garden — and spending time with you — so you could plant colourful plants, such as crocus bulbs and create fun tasks to improve your garden. This will certainly help build your spirits. Furthermore, friendly bacteria that is found in soil can also work in a similar way to anti-depressants by boosting the immune system, according to scientists.
Try growing your own vegetables
A great way to reconnect with our planet is by growing your own fruit and vegetables. Tending to your crops can also provide enough light exercise — at your own pace — to boost your endorphin levels.
Feeling out of control is one of the main causes of depression, therefore growing your own fruit and veg can help give back some of that power. It’s also thought that folate-rich foods, such as kale and spinach, can help lift your morale. So, what better way to boost yourself than growing it yourself?
Furthermore, by growing your own fruit and vegetables you release the ‘pleasure chemical’ dopamine into the brain, triggering a state of bliss. This release can be caused by sight, smell and actually plucking fruit, so be sure to plant as many different edible options as possible and get that dopamine flowing!
Growing scented flowers
Some Japanese scientist claim that if you inhale scents such as lavender, this can alter gene activity and reduce any stress or depression you may be feeling. Aromatherapy, for example, is used as a form of alternative medicine and relies on scents such as this.
Let’s start with Jasmine for example — its fragrance is supposed to help you sleep — and rosemary, which is said to improve air quality, memory function and banish anxiety.
For the sake of your own health, it is clearly worth trying to get into this hobby. Remember though, you are not alone in your struggle, so be sure to talk to professionals and those closest to you if you are depressed. There are many people out there to discuss your feelings with. | <urn:uuid:d6b7953e-8a1a-43e1-ae34-e761701c061e> | {
"date": "2020-01-20T11:22:52",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9651500582695007,
"score": 2.84375,
"token_count": 804,
"url": "http://www.iliveup.com/blog/gardening-can-it-really-help-with-depression/"
} |
The term “cybersecurity” typically conjures up images of digital warfare between implacable hackers bent on world domination and stalwart IT defenders determined to protect critical national defense and financial systems. Of course, there is some truth to this. All too often, though, security vulnerabilities are much closer to home, much simpler, and in some ways more concerning precisely because they can affect our everyday lives.
Energy management and control systems (EMCS) are seldom top-of-mind for the general public. More than 99 percent of the population will have never heard the term. An EMCS is in some ways a glorified thermostat that ensures the conditions within a building remain comfortable. Normally, there is no cause to worry about it. But EMCS, and similar systems called supervisory control and data acquisition (SCADA), actively control equipment whose proper operation is fundamentally critical to functional buildings.
Any modern office building, school, hospital, data center, university or military facility is served by large, complicated mechanical systems that provide heating, cooling, and ventilation. Shutting down any of these mechanical systems threatens the function of the facility. A data center, for example, cannot operate without air conditioning for more than a few minutes. Sabotaging a building does not necessarily require attacking it directly; it can be as simple as shutting down a fan or a boiler at the right moment.
How we got here
Historically, EMCS security was never an issue. These systems existed out-of-sight, tucked away deep in boiler rooms, isolated from most other operations. Most of them had limited or no connections to the outside world and operated on their own proprietary networks, separate even from the standard ethernets of the IT world. This anonymity was in some ways their best defense, since the level of security designed into the systems themselves was often low, and little attention was given to the issue by system users.
In today’s Internet-of-Things environment, where every device has an IP address and all systems could be connected to any laptop, the security of EMCS, SCADA and similar systems takes on much greater importance. Cyberattacks on industrial systems that control processes like electricity generation, refineries, data centers and gas pipelines are commonplace. In 2015, 295 attacks on such systems were reported to US authorities. By 2017, that number exceeded 1,000. Despite this, all major communication protocols for facility and industrial control systems are vulnerable. Some of them have no data security protocols whatsoever.
The problem is exacerbated by the fact that building and industrial engineers are not IT professionals or cybersecurity experts. Their focus is on ensuring the systems perform their intended tasks with security as a secondary concern. In many cases, specifying engineers, installers and building operators lack the awareness or training needed to ensure the security of these systems.
Ways to increase system security
Broadly speaking, defending these systems can be broken down into two categories: external and internal attacks. External attacks will most likely originate from the Internet. For this reason, all Internet connections should be treated as potentially hostile and secured against intrusion. Several options can be explored:
- No connection – while obviously secure, this severely limits the functionality of modern systems, which need to exchange data with a host of other applications or need to be monitored / controlled from remote locations.
- Remote desktop application – this requires a dedicated software package running on a remote computer. While effective, this in turn creates another point of vulnerability at the remote computer itself, which must likewise be protected.
- Virtual Private Network (VPN) Firewall – similar to a remote desktop but with a more secure connection. The remote computer itself still requires protection.
- Dedicated EMCS / SCADA Web Server – rather than connecting an EMCS directly to the Internet, a separate server is placed behind a firewall and access to the server itself is restricted.
Any of these, or some combination of them, will improve a system’s security. But all of them will prove useless if a hacker obtains authentication credentials from an end user. Guarding against this requires the same policies commonly found in IT departments that mandate strong, frequently changed passwords and active protection against probes such as phishing emails that try to lure users into disclosing their passwords. In addition, physically protecting the system components behind locked access is a must.
Show Comments (0) | <urn:uuid:2b7c9f4f-aef7-4a71-9094-9486e6c37ef5> | {
"date": "2020-01-20T12:28:27",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9473384618759155,
"score": 3.125,
"token_count": 889,
"url": "http://www.inthebigroom.com/2018/08/07/preventing-physical-damage-cyberattacks/"
} |
Introduction to the Old Testament
The Old Testament is an account of God’s dealings with his covenant people from the time of the Creation to a few hundred years before the Savior’s birth. The Old Testament provides powerful examples of faith and obedience. It also shows the consequences of forgetting, disobeying, or opposing God. Its prophecies bear witness of the Messiah’s birth, redeeming sacrifice, second coming, and millennial reign.
Past Sunday School manuals have devoted entire units to what is covered here in two sentences. In 1944, the Gospel Doctrine course “Feed My Sheep” based on the Old Testament reserved an introduction and five lessons to explaining this background statement. Some extracts:
The study material for this year is the Old Testament. It is not the intention to spend much time with the technical details and controversial questions of Old Testament history and theory, but rather to bring out the moral and religious implications of the Old Testament teachings for our own times. For, after all, the fundamental principles taught by the outstanding old Testament characters are timeless in their application. They can, if we allow them to be, of great help in the solution of our present-day religious and social problems. | <urn:uuid:8bcaabeb-f2b3-4939-933e-a4b2af2a4ab3> | {
"date": "2020-01-20T11:19:59",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9210672974586487,
"score": 4.03125,
"token_count": 246,
"url": "http://www.ldsliving.com/How-We-Taught-This-Lesson-in-the-Past-Lesson-1-This-Is-My-Work-and-My-Glory-/s/1376"
} |
Print media are lightweight, portable, disposable publications printed on paper and circulated as physical copies in forms we call books, newspapers, magazines and newsletters.They hold informative and entertaining content that is of general or special interest. They are published either once or daily, weekly, biweekly, monthly, bimonthly or quarterly. If you are running any Printing Industry Click here to apply online.
Broadcast and electronic media today are portable sources of entertainment and information distributed by wired and wireless radio and television stations and networks, sound and video recordings, and the mobile Internet. If you are running any TV media or Radio Media Industry Click here to apply online.
Digital media are Internet sites where people interact freely, sharing and discussing information about each other and their lives, using a multimedia mix of personal words, pictures, videos and audio. If you are running any Web TV or Online e-News Click here to apply online.
Citizen reporter is derived from Citizen Journalism. Citizen reporter take up an initiative to express ideas irrespective of their educational or professional background. In a way this emerging form of journalism is promising a scenario of breaking free from media bias as well as taking local news on a global platform. Click here to apply online | <urn:uuid:11200212-54ec-4022-8971-cdb555b31901> | {
"date": "2020-01-20T11:48:45",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9081788063049316,
"score": 2.921875,
"token_count": 246,
"url": "http://www.naiindia.in/apply-online/"
} |
Winter is here, and the temperatures are dropping. Along with snow, ice, and low temperatures come excessive earwax production. Earwax is a natural part of your body’s defenses, and by trapping dirt, it cleans and protects your ear while slowing the growth of bacteria. A blockage often occurs when earwax accumulates in your ears or becomes too hard to wash out easily.
The signs and symptoms of earwax blockage include the following:
A hearing loss can occur due to genetic causes, listening to loud noises for extended periods of time, aging, and physical damage to the ear. Cold weather can also affect your ability to hear. Cold temperature increases the risk of rogue bones growing in your ears along with hardening of earwax. This bone growth in your ears is known as exostosis or surfer’s ear because surfers spend a great deal of time in cold water. Frigid weather can also result in the hardening of earwax. Hardening of earwax is another way that the body tries to protect the ear canal from freezing temperatures. The hardened earwax becomes trapped in the ear resulting in hearing loss, ringing in the ears and other symptoms.
If home remedies do not loosen the hardened earwax, you may need to see a hearing healthcare specialist to suction your ear or remove the blockage with a curette or other instrument. Once you have experienced an earwax blockage, there is no guarantee that it will not return. You may have to treat an earwax blockage several times throughout your life. However, earwax blockage is only a temporary issue, and your symptoms should disappear after you manage the condition.
Cold weather can affect your hearing. Surfer’s ear and hardening of earwax are common ear conditions when the weather is frigid. Try the home remedies above or make an appointment with a hearing healthcare specialist if your symptoms persist. So stay warm and protect your hearing during these cold winter months. | <urn:uuid:9e238704-0dda-4692-86b9-eb2943ec1b7b> | {
"date": "2020-01-20T13:18:48",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9518292546272278,
"score": 2.890625,
"token_count": 418,
"url": "http://www.oliveraud.com/2018/02/07/winter-weather-and-excessive-earwax-production/"
} |
Note: Originally published on ALALearning blog
Steven Bell (who writes often and well on the topic of usability and customer experience over at the Designing Better Libraries blog) recently turned me on to an thought-provoking video of Jesse James Garrett discussing his ideas on User Experience at the Adaptive Path UX Week 2009 Conference. (Jump to the bottom of this post to see the video)
Garrett’s ideas are simple to understand and elegantly presented. Since watching the video, I find myself increasingly seeing the world through UX (user experience) eyes. It’s occurred to me that Garrett’s ideas on user experience also lay out a simple roadmap for engaging learners. In fact, many teachers and trainers probably already use UX principles effectively, whether they do so consciously or not.
FOUR WAYS TO ENGAGE LEARNERS
Garrett suggests that there are four primary ways that we can engage users:
- Perception (Senses): Engaging through sight, sound, smell, etc.
- Action (body/kinesthetic): Engaging through movement and physical action.
- Cognition (mind): Engaging through thought, reflection, logic, imagination.
- Emotion (heart): Engaging through emotion, feelings.
You’ll notice that two types of engagement (perception/action) involve direct engagement with the external world, while the other two types (cognition/emotion) are internal engagements.
Reflecting on my own experiences I realized that the most successful, effective trainings I’ve been involved with, as both a learner and a trainer, offered a balanced engagement in all four areas.
I think there is an opportunity for trainers and teachers to bring their lessons to the next level by consciously designing learning experiences (LX) that engage learners in all four areas. In other words, I believe that Good UX=Good LX.
USER EXPERIENCE: PUTTING IT ALL TOGETHER
One example of what it looks like when it all comes together (i.e. when people are engaged, internally through emotion and cognition, as externally through their actions, and perceptions) is illustrated beautifully in this video, The Fun Theory in which researchers replace regular stairs with “piano key” stairs. What do you think happens? Click play to find out…
So how were the people in this video being engaged? I observed:
- Perception (sound, music, visual stimulation of piano key stairs)
- Action (jumping, stepping, climbing)
- Cognition (curiosity, decision-making; choosing between stairs/escalator; processing the cause/effect of walking on the stairs)
- Emotion (fun, fun, fun! Joy of the unexpected. Joy of seeing others having fun. Sense of community, and sharing in a novel experience.)
Did you observe any other types of engagement?
Thinking about your own experiences, can you recall ways in which you’ve successfully engaged your learners or been engaged as a learner? Share your suggestions and experiences in the comments section. And if you find these concepts useful in designing future learning experiences please drop a line and let us know!
(see the complete Garrett video on user experience–well worth a watch–below)
Jesse James Garrett on The State of User Experience, UX Week 2009
As the field of user experience grows and evolves, UX practitioners find themselves having to master new techniques to take on new challenges. Adaptive Path’s Jesse James Garrett takes a look at where user experience has been and where it’s going. | <urn:uuid:8a7c17ef-e4a5-4766-9e50-602cbb3bc031> | {
"date": "2020-01-20T13:11:42",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9327061176300049,
"score": 2.78125,
"token_count": 745,
"url": "http://www.peterbromberg.com/2009/12/"
} |
Rand Eye Institute Urges Community to Protect their Eyes from the Solar Eclipse on August 21st, 2017.
As the date nears, it is very important that everyone understand the importance of protecting and even avoiding looking at the partial solar eclipse. It can cause serious eye problems- this is not a myth.
“Here in Florida, we will only experience the partial solar eclipse, and not the totality phase. Therefore, it is not safe to view this phenomenon at any time without properly certified eclipse glasses.* Regular sunglasses, even very dark ones, are not sufficient to prevent eye damage. If there is any concern, it is better to watch the eclipse through an online stream such as www.nasa.gov/eclipselive” cautions Allison L. Rand, MD, ophthalmologist and cornea specialist at Rand Eye Institute.
According to NASA, South Florida will experience about 80% coverage of the moon in front of the sun (partial solar eclipse) around 2:59pm-its peak time. The partial eclipse will be visible from approximately 1:30pm – 4:30pm EST.
Special Note for School-Aged Children, Teachers & Parents
With school back in session, parents and teachers of children should take extra care to protect young children from the sun’s harmful rays in this extraordinary circumstance. The sudden change in illumination would instinctively cause a young child to look up at the eclipse. It is recommended for the younger age group, who might not follow instructions, to completely avoid exposure. For older children, education is key.
Broward County School District has ordered all outdoor activities to be moved inside during the hours of 1:30-4:30 pm.
* The American Academy of Ophthalmology has teamed up with the American Astronomical Society on the recommendations for certified eclipse glasses and other viewing tips, Visit www.aao.org.
For more information, please contact our Community Relations department at 954-782-1700.
Just as it’s warming up for summer, your kids are warming up their sports skills.
So with that in mind, we’ve got our EYE on sports eye safety for your children.
As we pointed out in our last article, more than 90% of all eye injuries can be prevented through the use of suitable protective eyewear. BUT, to help you be on the lookout for possible eye injuries this season, here are the most common eye injuries that kids incur:
1. Water and pool activities rank #1 for eye injuries. More than 1/3rd of all pool and water activities that affect the eyes happen to kids under the age of 15.
2. Basketball accounts for 1/4th of all eye injuries that will happen to kids 14 and under. Hard to imagine that such a large object like a basketball could cause an eye injury. Of course it’s possible, but injuries in basketball are mostly caused by the fingers and hands of opponents, stressing once again, the need for players to wear proper eye protection.
3. Air, gas, spring and BB-guns, though today reclassified as firearms and removed from toy departments, still pose one of the biggest threats percentage-wise to your kid’s eyes. More than half of all eye injuries suffered from “toy guns” happen to kids 14 and under. Always stress to your kids that projectile-firing instruments should only be used under the supervision of a qualified adult and at a monitored and regulated facility, and of course, eye protection is mandatory.
4 – 7. Baseball, football, soccer and martial arts take up the next four categories of the highest-ranking eye injuries for kids 14 and under, with nearly 3,500 kids in that age group affected.
The takeaway here is that with summer approaching, your kids will spend a lot more time outdoors interacting in sports and that’s good. Just be aware of the need to acquire the appropriate eye protection for them, including instruction for use, so that they have an edge in preventing eye injuries while maximizing fun!
Source: AAO and Prevent Blindness
Most people believe that the best money spent is money that saves you from having to spend MORE money. So making a small purchase of just $20 to $40 to guard against eye injury or blindness could be the best EYE-vestment you’ll ever make.
With spring here and crisper weather in the air, the parks are filling up with kids and adults in their evening softball and soccer leagues. But before you slip on that baseball glove or new pair of cleats, don’t run the bases without running to the store first for proper eye protection.
Here are some guidelines to help you choose proper eye guards:
Any eye guard or sports eye protector should be labeled “ASTM F803 approved”. This is the code for eyewear that gives you the highest level of vision protection. Put this code in the notes section of your smart-phone so that you can refer to it when you shop and check the package to see if the eye protection you chose has been approved for sports use.
Don’t scrimp or save on eye guards that don’t have lenses. Only “lensed” protectors are recommended for sports use. Choose eye guards where lenses stay in place or pop out in an accident. Make sure they don’t pop in, which can damage your eyes.
Eye guards should be anti-fogging for clearest vision. Others may have side vents that let air circulate, keeping the lens surface clear.
Padded or cushioned eyewear may cost a bit more, but the more comfortable it is on YOU the more comfortable YOU’LL be, and less likely to toss them to the bench.
Until you get used to playing sports wearing eye protection, it may feel a bit strange or uncomfortable, but hang in there, you only have one set of eyes – SEE that you protect them the best way possible.
And lastly, always try on different brands and sizes of eyewear for comfort and protection. There’s nothing worse than tossing away your eye guards due to discomfort, only to suffer an eye injury without them.
As always, in the event of an eye injury, always see an ophthalmologist or your eye doctor right away, or visit the nearest emergency room at once.
Ah, Spring. What a time to be a sports fan. But while you have your eye on your favorite team’s schedule, don’t drop the ball on Sports Eye Safety. Keep these eye safety tips handy:
While each sport has specific recommendations for equipment that helps prevent bodily injuries, they all, without exception, recommend sports eye guards for every player.
Prescription glasses, sunglasses and even occupational safety glasses do not provide the eye protection one needs* while playing recreational sports.
- Baseball: a batter’s helmet and a faceguard for catchers made of polycarbonate material is a must.
- Basketball: players run the risk of an eye socket fracture or scratches on the cornea without sports eye guards.
- Soccer: players could suffer an inflamed iris or swollen retina if they don’t put on proper eye protection.
- Hockey: players MUST wear polycarbonate masks and sports eye guards to help prevent traumatic injuries.
- Football: wearing a helmet with a polycarbonate shield attached to the faceguard is the best defense.
ALL sports participants run the risk of an opposing player’s finger in the eye without the proper eye protection. So remember, if you or your young ones are playing sports, make sure proper eye safety equipment is a part of the uniform.
*source: Prevent Blindness
**PLEASE NOTE FOR EMERGENCY EYE CARE – OUR OPHTHALMOLOGISTS ARE ON-CALL 24/7
We’ve had a lot of positive feedback on our last article about wearing proper protective eye equipment (PPE) when performing tasks that could be hazardous to your eyes. As we learned, there are only so many things in life that you can control, and wearing eye protection is one of them.
But what happens when you suffer an eye injury that is beyond your control?
The American Academy of Ophthalmology and Rand Eye Institute present some of the ways you can treat various eye injuries.
First step FOR ALL EYE INJURIES:
- Do not touch, rub or apply pressure to the affected eye.
- Do not try to remove the offending object from the eye.
- Do not apply ointment or medication to the eye.
- See an ophthalmologist or a medical doctor as soon as possible.
For a cut or puncture of the eye:
- Do not rinse with water.
- Do not remove the wedged/protruded object from the eye.
- Do not rub or apply pressure.
- Try loosely taping a paper cup or eye shield over the eye for protection; then seek help from a medical professional.
- Do not take aspirin, ibuprofen or other non-steroidal, anti-inflammatory drugs as these thin the blood and may increase bleeding.
For a liquid substance in the eye, or a chemical burn:
- Rinse your eye under a steady stream of warm, fresh water for 15 minutes. Just let it run into your eye and down your face.
- After rinsing, you can put a cool, moist compress or an ice pack on your eye, but don’t rub it.
- Call your eye doctor or emergency clinic to ask what is recommended for your injury. Tell the person what kind of substance got into your eye and what you’ve done about it so far.
A direct hit to the eye, from a ball or hard object:
Apply a small cold compress, gently, to reduce pain and swelling. Do not apply any pressure.
If a black eye, pain or visual disturbance occurs after a light blow, contact your eye professional or visit an emergency room right away.
Getting particles or foreign materials in the eye:
- Do not rub the eye.
- Carefully lift your upper eyelid. Blink several times to allow tears to flush the particles. If you have sterile eye drops, try using them. If the particles remain, keep the eye closed and seek medical attention right away.
As a precautionary measure, contact your ophthalmologist or eye doctor for additional assistance. Your doctor may need to see you right away, or suggest you visit an emergency clinic at once. It’s always safest to have someone drive you, even if you think you’re ok to drive. Always err on the side of caution because we only get ONE pair of eyes.
You’ve no doubt heard of a PPO and an HMO, but have you ever heard of a PPE?
PPE stands for “Personal Protective Equipment”, and it refers to clothing, footwear, goggles, gloves, helmets and other garments designed to protect us from injury or infection. But since March is Workplace Eye Wellness Month, let’s just concentrate on our eyes.
All joking aside, protecting your vision is paramount in maintaining quality of life, like seeing your grandkids or going for a leisurely Sunday drive.
Please don’t risk injury for vanity. Industrial Safety and Hygiene News reports that 70% of total eye injuries are a result of flying particles, flying or falling objects or sparks that strike the eye. Though companies can offer you eye protection and education, it’s up to you to actually put them to use.
Starting a new job? Helping a co-worker with a chemical or assisting in the construction of a project at work or home? It only takes one mishap for a life-changing event to happen that could cause you to lose your vision. Always make a note of where eye protection is located, familiarize yourself with the instructions, and most importantly, actually wear the eye protection. It’s 10-seconds of safety that could save your vision and your life.
Next time, we’ll talk about recognizing and treating eye injuries.
Whether you’re saying “Au Revoir” to 2016 or getting ready to welcome in 2017, we want to make sure you remember “safety first” when planning to be around fireworks this New Year’s Eve.
Practice fireworks eye-safety during your celebration: Keeping it safe and fun for the entire family.
- First and foremost, do not use illegal explosives, professional fireworks, or any fireworks that you did not obtain from a licensed retailer in your city. Unlicensed fireworks can be dangerous to you and your eyes, which may lead to eye trauma and blindness.
- Make sure the area where you will be lighting fireworks has a safe perimeter between you and the spectators, that it’s free of overhead obstructions and away from dry grass or flammable materials, including automobiles. Look out for flaming embers flying through the air that could land in your eyes.
- When igniting approved fireworks, always wear safety gloves and protective eyewear and never allow children to assist in engaging fireworks. You can easily obtain small, non-igniting battery-operated lit toys that the kids will enjoy.
- If you’re attending a professional fireworks display, like the ones hosted by your local city or town, remember, THEY’RE THE EXPERTS. Don’t bring your own fireworks, which in fact is usually against park rules.
The National Council on Fireworks has more tips here to help you safely ring in the New Year.
Have a safe celebration and a happy & healthy New Year from the Rand Eye family.
Santa’s busy in his workshop, so while he and the Elves are getting ready for Christmas deliveries, we “present” a list that YOU might want to check twice before heading out to complete your side of the shopping, because December is:
Safe Toys and Celebration Month
The public safety non-profit, which has been keeping an eye out for our kids since 1973, is W.A.T.C.H., which stands for “World Against Toys Causing Harm”. They’ve done the legwork for parents all over the country with their list of the “10 Most Dangerous Toys of 2016”, designed to help moms, dads and Santa pick out the perfect and safest gifts this holiday. Please take a moment to look it over. You might even want to share this link with friends and family, to ensure that their gift giving choices for your kids are in line with toy safety. Check out the list here.
Luckily the “bad” list is small and we can browse through a very long “good” list on Good Housekeeping’s website “Good” toys for 2016. Their experts vetted 500-plus new toys for safety, quality and skill-building and compiled their list of Toy Award Winners, they then asked the toughest critics of all- kids – to name the “bestest” of them all. Click here to start making your list.
Have a SAFE and Happy Holiday Season.
‘Tis the season when gift giving is (almost) as much fun as receiving, and because it’s Safe Toys and Celebration Month, let’s do our best to make sure that the gifts our children SEE on Christmas and Hanukkah are safe and fun for them all year long.
According to the U.S. Consumer Product Safety Commission, nearly 252,000 toy-related injuries were treated in emergency rooms in 2014, and almost half of those affected the head or face. The commission reports that 1 in 10 of those children’s eye injuries treated in the ER trace back to toys. Some propelling toys like paintball guns and darts have the potential to cause serious eye injuries and even permanent vision loss.
When choosing a toy for a child consider these Top Toy Safety Tips:
- Avoid toys with sharp, protruding or projectile parts that could end up in their eyes.
- Make sure children are supervised by an adult when playing with toys or games that could cause an injury, especially to the eyes.
- Always provide children with the appropriate protective eyewear with polycarbonate lenses if recommended by the manufacturer of the toy or sporting equipment. Click here to learn which protective eyewear is recommended for your child’s sport.
- Keep toys made for older children away from younger children, who may accidentally hurt themselves, or suffer an injury to their eyes or face.
If your child does experience an eye injury during playtime, seek immediate medical attention from an ophthalmologist or medical eye doctor.
Have a safe and happy Holiday Season and a wonderful New Year.
Nothing says, “Welcome to Fall” like the orange glow of a pumpkin patch. Time to pick out a healthy, robust pumpkin for your Fall Halloween decorations, and carve out some fun by adding your own decorative design to his mesmerizing mug.
Have fun with your pumpkin this Halloween, but please observe these Halloween Safety Tips first before carving ol’ Jack, courtesy of Rand Eye Institute and The American Academy of Pediatrics.
While carving the pumpkin is a fun family activity that has so many layers, (design, baking pumpkin seeds, carving and construction), remember, small children should never carve pumpkins, let the adults do that. Children can draw his face with markers, or using a paper template, have them suggest where to poke the holes through the paper, so an adult can do the carving.
Consider using a flashlight or glow stick, instead of a real candle to light the inside of the pumpkin. Try using a small battery-operated LED candle, they’re inexpensive, reusable, come in a variety of colors and they flicker just like real candles. A candle left unattended is not only dangerous, but the heat from the candle melts the pumpkin prematurely, no one likes a floppy pumpkin.
So in the 35-year tradition of Rand Eye Vision safety-first tips, use your Rand EYE-Q this Halloween to keep your little ghosts, ghouls and goblins safe! | <urn:uuid:c2331d1b-d79c-4524-9878-3708acb317a5> | {
"date": "2020-01-20T11:40:29",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9279094338417053,
"score": 2.5625,
"token_count": 3786,
"url": "http://www.randeye.com/category/eye-safety/"
} |
Founded by Jesus Christ approximately two thousand years ago, Christianity is one of the most influential religions in world history. Although this faith began as a small sect of Judaism during the first century in ancient Israel, the Christian religion has nearly two billion followers at the beginning of the twenty first century.
The Ethiopian Orthodox church is one of the oldest in Christendom. It is believed by Ethiopians to date to at least the first century, making it an important part of Christianity.
The cross is probably the most important sacrament in the Christian religion. It is the symbol of faith and salvation and retains its purest form in Ethiopia, where it can be found in three principal forms: the processional cross, hand cross and the pendant cross.
Ethiopian processional crosses are elaborate pieces, attached to the tops of staffs on feast days and carried at the heads of parades through towns and villages, then back to the churches that usually house them. Hand crosses are carried during many religious ceremonies. They usually include the latticework form as well as a square at the base, traditionally believed to represent the Ark of the Covenant. Pendant crosses are the most common form found in Ethiopia. Pendant crosses are received at baptism and worn around the neck and are often the most prized possession, talisman and symbol of faith of the wearer.
The Sadigh Gallery has an intricately beautiful selection of Ethiopian crosses, an important part of Christian culture and history of which you can own a small piece to complement your collection or to treasure for more personal reasons. | <urn:uuid:423b80b8-95d2-4da6-a9d8-3782e370825b> | {
"date": "2020-01-20T12:48:55",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9666456580162048,
"score": 2.9375,
"token_count": 315,
"url": "http://www.sadighgallery.com/Ethiopian-Crosses_b_49.html"
} |
Mon, 08 Oct 2018 10:12:00 CDT — by: Luke Williamson
When people think about Sewanee and its impressive Domain, they often envision expansive forests, remote caves, sprawling bluff views, and eye-catching water features. It’s true that Sewanee boasts all of these things—but the Domain 3D project is interested in something that’s been, until now, inaccessible: what’s under our feet. Deep under our feet.
Dr. Jeff Paine, senior research scientist with the Bureau of Economic Geology (BEG) at the University of Texas at Austin, and Lucie Costard, a research scientist associate at the BEG, traveled to Sewanee in early September as a part of the collaborative efforts of both Sewanee and the University of Texas to work toward assembling a profile of what lies hundreds of feet beneath Sewanee’s vast Domain.
Paine, Costard, and Sewanee faculty, staff, and students began by meeting at the University Farm to set up and test instruments, and to teach students how to acquire data. With a Ground Conductivity Meter (GCM) that spans more than 10 feet in length, the farm, free of trees, seemed like the perfect testing area. Exploring the potential for the equipment was one of the central goals of this initial trip, explained Sarah Sherwood, associate professor and co-chair for the Department of Earth and Environmental Systems at Sewanee.
Paine’s visit was long-awaited. Paine explained that, three or four years ago, the Bureau of Economic Geology was contacted by individuals at Sewanee who hoped to initiate a collaboration, though how this would work and what instruments they would use was unclear. Out of much discussion and many different suggestions (from a seismic survey of the campus to drilling a core hundreds of feet deep), it was ultimately decided that UT Austin and Sewanee would begin by compiling a comprehensive overview of the shallow geophysics within the Domain. (The Environmental and Engineering Geophysical Society defines geophysics as “the non-invasive investigation of subsurface conditions in the Earth through measuring, analyzing, and interpreting physical fields at the surface.”)
Paine explained the benefits of this shallower focus as opposed to some of the other options: “It’s a bit more hands-on; you can get students involved, and you don’t have to hire a contractor to just go and collect data.” Martin Knoll, professor of geology at Sewanee, explained that the scope of this project would span much more than just an investigation into the shallower geophysics of the Domain, however. Eventually, the Domain 3D project hopes to assemble a seismic profile that, Knoll states, would “look several thousands of feet below the surface.”
Paine and Costard began by looking at specific areas of interest on the Domain. Among them: the natural wetlands that Professor Kristen Cecala in the Biology Department is researching, a contaminant plume that Knoll has been studying since 1996 (where a gas station once leaked gas decades ago), and an intriguing site with abnormally thick soil—the Borrow Pit.
Sewanee’s central campus is covered in thin soils, and punctuated by instances of exposed bedrock, so the Borrow Pit (with soil 17 feet deep or more) is of particular interest. And Paine’s team is essential towards gaining a better understanding of this unusual soil. Using traditional drilling methods is comparatively tedious and inefficient. With the imaging that is created by pulling the Ground Penetrating Radar (GPR) over sites, though, members of the 3D Domain project can non-invasively explore the subsurface and discover the extent of the soil.
Sherwood and Professor of Forestry Scott Torreano hope to use the data yielded by these geophysical instruments to gain a better idea about the recent geologic history of the local landscape.
Discussing the Borrow Pit, Sherwood said that “deep soil like that, thick soil like that, is just unheard of around here. So no one understands the environment in which it formed.”
Sherwood explained that it is likely that one layer of soil at the Borrow Pit was wind-derived, though aeolian (wind-derived) deposits are usually found much closer to major rivers, like along the banks of the Mississippi.
“But to have it this far from a major river? We’re not sure exactly what the source is,” remarked Sherwood. “It’s pretty thick, so we have no idea, really, what the source is. The shallow geophysics allow us to distinguish between the two parent soils: residual soils formed in bedrock and the upper unit formed in wind-transported sediments.”
When Torreano invited the state soil scientist to see the Borrow Pit soil, he hadn’t a clue what to make of it. Finally understanding how the soil in the Borrow Pit formed with the help of Paine, then, will be a key step towards shaping a better understanding of the Domain’s depositional history.
“It could tell a complex story of the last couple million years of the surface of an area that we haven’t been able to decipher otherwise.” Sherwood explained that, while the forests that carpet the Domain may seem pristine—they aren’t. Decades ago, these same tracts of land were farmed and logged repeatedly. And this led to the erosion of soils on the Domain. “So to get an idea of what the original history of this landscape was is a little more challenging, and this tool [the GPR] helps us do that,” said Sherwood.
Knoll and Sherwood both expressed their excitement for possible future projects. “One thing that we would like to be able to do,” started Knoll, “is to work down in Lost Cove. It would be nice to be able to see caves in the subsurface.” And Sherwood imagines that an archaeological collaboration might be a possibility later on, too: Costard's expertise is in applying geophysics in archaeological investigations.
Until future projects begin to take shape, though, many students are enjoying a very unique and rare opportunity in working with Paine. The fact that intro geology students had the opportunity to collect data with the equipment Paine brought to Sewanee, as Knoll says, is “pretty sweet. Those kids can say, ‘my first two weeks at Sewanee, I used geophysical equipment to look at the subsurface.’”
And the highly specialized equipment isn’t cheap. This is one of the reasons that Paine is so interested in collaborating with other institutions; he wants to share the expertise and tools available at UT Austin with other schools that might not be able to independently support a program as specialized as Paine’s.
For Paine and Costard, who have done research on diverse geoscience topics in North America, Europe, and Asia, Sewanee's Domain represents a new and intriguing challenge thanks to its topographic and geographic variety, its sheer size, and its situation on the Cumberland Plateau.
With the work that Paine, Sherwood, Knoll, and others are conducting, perhaps when people think about Sewanee we will envision not just the expanses of lush forest, but also consider the complexities of what lies, unsuspected, beneath our feet. | <urn:uuid:2431b908-8153-4b6d-8a16-44d22597b3ee> | {
"date": "2020-01-20T13:13:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9509774446487427,
"score": 3.265625,
"token_count": 1579,
"url": "http://www.sewanee.edu/offices/oess/news/natl_cult_stew/researching-sewanees-fascinating-subsurface.php"
} |
By Iris Jungmin Seo, STAND Canada Blog Writer
We have committed ourselves to the principles of ‘never again!’, but history has been repeating itself in unfortunate ways. The Genocide Convention 1948, also known as the Convention on the Prevention and Punishment of the Crime of Genocide, was the first human rights treaty adopted by the United Nations General Assembly in response to the terrors committed during World War 2. According to the United Nations, the adoption of the convention “marked a crucial step towards the development of international human rights and international criminal law as we know it today.” Ultimately, the convention obligates the States to take measures to prevent and punish the crime of genocide.
Did the Genocide Convention perfectly prevent crimes of genocide from occurring after World War 2? Not at all.
25 years ago from today, approximately 800,000 Tutsi minority people had been intentionally cleansed by the Hutu majority in Rwanda in the short span of 100 days. The ethnic tension between the Tutsi and Hutu people had been accumulating for decades. 85% of Rwandans were made of an ethnic group known as “Hutus” but the minority ethnic group known as “Tutsi” have long dominated Rwanda through a monarchy system. The Hutu Revolution in 1959 forced 300,000 Tutsis to flee the country which made them a smaller minority than they already were. This led a group of exiled Tutsis to form a rebel group known as Rwandan Patriotic Front (RPF) and invaded Rwanda between 1990-1993 until a peace deal have been reached. A transformative event occurred in April 1994 when a plane carrying President Juvenal Habyarimana and Cyprien Ntaryamira of Burundi, who were both Hutus, was shot down and killed everyone onboard. This event triggered the Hutu extremists to immediately blame the RPF and to start a “well-organized campaign of slaughter” of Tutsis for ethnic cleansing; the Hutu militias set up roadblocks and checked IDs to slaughter the Tutsis and thousands of Tutsi women had been taken away as sex slaves.
The Rwandan Genocide also marks the failure of the international community to respond to such crimes because the States have largely remained on the sidelines during the atrocities. UNSC vote in April 1994 has led to a withdrawal of most UN Peacekeeping Operations and by the next vote in May 1994 when they finally agreed to supply more troops, the genocide had been over. Furthermore, a separate French intervention entered Rwanda around June 1994 and limited their intervention to a “humanitarian zone” set up in southwestern Rwanda. This helped to save many Tutsi lives but also “helped some of the genocide’s plotters (allies of French) to escape.”
In response to the international community’s failure to act on the Rwandan Genocide, United Nation adopted a global political commitment known as Responsibility to Protect (R2P) which was signed by all member states of United Nation in 2005. R2P claims that “when a state fails to protect its people from genocide, crimes against humanity, war crimes and ethnic cleansing, the international community has the responsibility to do so”. Then, did the Responsibility to Protect (R2P) doctrine succeed in its original intentions of sharing the responsibility as an international community to protect the people and prevent genocide?
According to the Rohingya Refugee Crisis Report 2018, it has been estimated that approximately 905,000 Rohingya Muslim minorities have forcefully fled from the destruction of their homes and persecution, and approximately 10,000 people have been slaughtered as a result of yet another ethnic cleansing. Myanmar is a predominantly Buddhist country and religious differences triggered the Rohingya Genocide. The Rohingya are one of the many ethnic minorities representing the largest percentage of Muslims in Myanmar but the Government of Myanmar denies the Rohingya citizenship and even excluded them from the 2014 census. Similar to the Rwandan Genocide, the Rohingya Genocide began in August 2017 after an accumulation of ethnic tensions and a triggering event where Rohingya militants launched deadly attacks on 30 police posts.
Also similar to the Rwandan Genocide, the alarming situation in Myanmar has been faced by an “awkward silence” from the international community. According to Amnesty International, “lack of political will, not a lack of evidence, is at the root of the international community’s inaction. It is undeniable that Myanmar’s security forces committed crimes against humanity against the Rohingya. While the international community drags its feet deciding what to do about it, vital evidence risks disappearing or being destroyed.”
From the Holocaust to the Rwandan Genocide to the Rohingya Genocide, each story takes place in different eras with varying degrees of international law enforcement, but it is questionable whether we are advancing in the name of humanity or just walking in the same place.
What are we learning from these tragedies? Why are we making the same mistakes? These critical questions must be raised and we must not fail another tragedy.
To read more about STAND Canada’s policy recommendations, click here! | <urn:uuid:0898cf98-0319-400c-855a-e29736f8326c> | {
"date": "2020-01-20T11:10:55",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9609153270721436,
"score": 3.8125,
"token_count": 1041,
"url": "http://www.standcanada.org/comparative-analysis-of-rwanda-and-myanmar-what-did-we-learn-from-history/?shared=email&msg=fail"
} |
Several significant advances in toothbrush construction occurred in the mid 1900s. In 1950, after witnessing gum damage suffered by patients using nylon bristle brushes, Dr. Robert Hutson, a retired Navy periodontist, developed a softer-bristled toothbrush he named the Oral-B 60. He put very thin, flexible nylon filaments into compact tufts composed of forty bristles, and filled the brush head with 60 tufts. His tuft texture and configuration differed from other contemporary brushes where stiffer nylon bristles arranged in widely spaced tufts were used.
In 1951, another design breakthrough occurred when DuPont invented Lucite acrylic resin, and clear plastic toothbrush handles of different colors appeared.
Hyson, Jr., JM 2003 History of the toothbrush. J Hist Dent 51(2):73-80; “Ipana” Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc., 23 Nov. 2016. Web. 23 Nov. 2016; Mattick, BE 2010 A guide to bone toothbrushes of the 19th and early 20th centuries. Bloomington, IN: Xlibris Corp.
Oral B toothbrush 1957 ad
This 1957 Oral B ad claims to offer a safe, gentle and effective brushing solution that prevents tooth loss from gum disorder.
Courtesy of Duke University Libraries Digital Collections
Oral B toothbrush 1973 ad
This 1973 Oral-B ad announces minimum tooth abrasion and maximum gum stimulation in their design.
University of the Pacific Permanent Collection, (1973 Contact Point Vol 51, No 1)
This mid-20th-century Bristol-Myers toothbrush with an acrylic handle (A342.103) advertises Ipana toothpaste, first formulated by the company in 1901 and popularized by Disney’s Bucky Beaver in the 1950s.
University of the Pacific Permanent Collection, Donor: Estate of Douglas Kerr, DDS | <urn:uuid:b7cd6c0e-de0a-4067-8064-403b91927470> | {
"date": "2020-01-20T11:59:47",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8652326464653015,
"score": 3.03125,
"token_count": 391,
"url": "http://www.virtualdentalmuseum.org/exhibits/different-strokes-different-folks-history-toothbrush/13/"
} |
If you have thyroid disease, you need to understand the importance of a management strategy – one that includes exercise. The thyroid plays a role in all metabolic processes, so when it malfunctions, it affects your overall health and quality of life. You may feel tired all the time or seem unusually restless. The doctor will have many suggestions on what you can do to manage your illness, but at the top of the list will be regular exercise. Consider some of the ways exercise affects your thyroid disease.
A Little About Thyroid Disease
There are many variations of this disease, but the end results are usually the same. People with misbehaving thyroids generally have too much or too little amounts of key hormones.
A person whose thyroid under producesis said to be hypothyroid; when the thyroid makes too many hormones that person has hyperthyroidism. Either problem benefits from exercise.
Exercise and Hormone Production
Aerobic exercises, workouts that raise your pulse, increase the production of natural thyroid hormones. This offers an obvious benefit for those with hypothyroid or low thyroid hormone levels.
Exercise works to naturally increase thyroid production and reduce the symptoms of the disease such as:
Sensitivity to cold
Elevated blood cholesterol levels
The increase in hormone production that comes with exercise will help decrease the symptoms.
Exercise is effective for those with hyperthyroidism, too. The symptoms of hyperthyroid include:
Sensitivity to heat
Frequent bowel movements
Fatigue Muscle weakness
Exercise produces “feel-good” hormones called endorphins that act as analgesics. They provide a euphoric feeling that improves your mood and helps you sleep better.
How Much Exercise Do You Need?
Let your doctor help you decide how much exercise is right for you. Since thyroid disease can have cardiac implications, it is important to talk to your doctor before beginning a fitness program. For most people, the recommended amount of exercise is 30minutes a day five or six days a week. Keep your exercise at a moderate intensity to help boost your metabolism levels and mood. This would include things like:
A brisk walk
A bike ride
While exercise (or lack thereof) can have a significant impact on your thyroid disease, many other things can make a difference too. The right supplement, for instance, may help you feel betterand potentially improve thyroid symptoms. Check with your doctor, and consider implementing a thyroid support supplement as part of your daily routine. Who knows, you may find your exercise routine becomes easier and more effective!
Supports energy levels & concentration. Promotes a sense of overall well-being & mood enhancement
Supports weight loss when used with proper diet.
Thyroid Support Formula is not manufactured with wheat, gluten, soy, milk, egg, fish, or tree nut ingredients | <urn:uuid:86497b0a-e8f1-488f-8103-8b6b3eba14d9> | {
"date": "2020-01-20T13:16:49",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9357413053512573,
"score": 2.875,
"token_count": 581,
"url": "https://1bodybrand.com/blogs/1-body-blog/how-xercise-an-ffect-your-thyroid-disease"
} |
The outbreak in the Sacramento area left one man dead and sent nine people to a hospital.
Here are some things to know about botulism:
A RARE DISEASE
The National Organization for Rare Disorders says there were 199 confirmed and 14 probable cases of botulism reported to the Centers for Disease Control and Prevention in 2015, the last year for which statistics were available.
More than 70 percent involved infants, and foodborne botulism comprised 20 percent of cases.
VIDEO: Man dies after contracting botulism from NorCal gas station food
Foodborne botulism can be acquired by eating foods contaminated with botulinum toxin. Homemade foods that have been improperly canned, preserved, or fermented are common sources.
Less common are contaminated store-bought foods. In the California case, the cheese manufacturer says the toxin was not found in the cheese product.
Other types include wound botulism, in which spores of the bacteria get into a wound and make a toxin; infant botulism affecting a baby's intestines; and latrogenic botulism, which occurs if too much botulinum toxin - Botox - is injected for cosmetic or medical reasons, such as treating migraine headaches.
Foodborne botulism can lead to paralysis, breathing difficulty and sometimes death. Survivors often need to spend weeks or months on ventilators.
Additional symptoms include difficulty swallowing or speaking, dry mouth, facial weakness, blurred or double vision, drooping eyelids, nausea, vomiting and abdominal cramps. Many of the same signs and symptoms apply for wound botulism and infant botulism.
The Mayo Clinic reports that symptoms of foodborne botulism typically begin between 12 and 36 hours after the toxin gets into a body.
However, the time can range from a few hours to several days, depending on the amount of toxin ingested.
VIDEO:: 5 confirmed cases of botulism from Northern California gas station food
Experts advise seeking urgent medical care. Early treatment increases the chance of survival and lessens the risk of complications.
Seeking care promptly may also alert public health authorities and lead to warnings about eating contaminated food.
The Mayo Clinic says an injected antitoxin can reduce the risk of complications.
Many people recover fully, but it might take months and extended rehabilitation therapy.
The majority of botulism patients never fully recover. Long-term effects most often include fatigue, weakness, dizziness, dry mouth, and difficulty performing strenuous tasks.
Patients also report a generally less happy and peaceful psychological state than before their illness. | <urn:uuid:2d664bcf-dab3-4d36-86f2-fc633d8a6a84> | {
"date": "2020-01-20T12:05:18",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9414410591125488,
"score": 3,
"token_count": 528,
"url": "https://abc7news.com/news/2028399/"
} |
Nanobytes were originally designed as multirole particles that would be capable of enduring any theoretical conditions. Neucom continued research of nanotechnology until the year 2038, when nanobytes were released onto the market. Because they are capable of adapting to extreme conditions and of self-replication, nanotechnology can be used in practical applications in construction and space development, as well as a new energy source to replace nuclear power.
In 2040, during the Intercorporate War, a large quantity of prototype nanobytes were stored in Neucom facilities in the Chopinburg region. However, for reasons unknown, the nanobytes acquired self-awareness, and escaped from their facilities, after which they began multiplying, forming "hives" of sorts near the rivers running through the region. Shortly after the outbreak, UPEO high command took notice of the situation, and thus dispatched a squadron to deal with the rogue nanobyte plague.
Sometime later, the squadron, comprised of Nemo, Rena Hirose & Erich Jager, arrived at the faclity area. By the time they reached Chopinburg, the berserk nanobytes had already established three colonies in the region, taking the appearance of three massive orange circles spread on the ground. Using special anti-nanotechnology weapons, the three eliminated the nanobyte colonies in the region. However, when things seemed to have come to an end, Rena inadvertently flew too close to a surviving cluster of nanobytes, which swarmed her aircraft and began eating away at the mainframe, as well as infecting Rena herself, targeting her brain. Nemo managed to save Rena from certain death by releasing an ANB on her Flanker, killing the remaining nanobytes. | <urn:uuid:a9fc3622-bf54-485a-a8aa-93618bc92a1a> | {
"date": "2020-01-20T12:12:01",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9708204865455627,
"score": 2.65625,
"token_count": 360,
"url": "https://acecombat.fandom.com/wiki/Nano-Byte"
} |
Alcohol & Panic Attacks – How Alcohol Abuse Can Worsen Anxiety
Important InformationThis information is for educational purposes only. We never invite or suggest the use, production or purchase of any these substances. Addiction Resource and it’s employees, officers, managers, agents, authors, editors, producers, and contributors shall have no direct or indirect liability, obligation, or responsibility to any person or entity for any loss, damage, or adverse consequences alleged to have happened as a consequence of material on this website. See full text of disclaimer.
There are clear links between alcohol and anxiety, and between alcohol and panic attacks. Alcohol can trigger panic attacks because on a physiological level, drinking can cause low blood sugar, dehydration, increased heart rate, and increased levels of stress.
Unfortunately, and clouding the situation to some extent, it has also been established that many people with social and generalized anxiety turn to alcohol as a form of self-medication. As a consequence, this can worsen their symptoms. So while alcohol and anxiety attacks are correlated, it may be that those with anxiety disorders are more likely to drink.
Table of Contents
Does Drinking Alcohol Make Anxiety Worse?
When people use drinking to deal with anxiety and panic, they can experience severe consequences even from drinking eventually. Like other frequently abused substances, the combination of alcohol abuse, hangover, and withdrawal can lead to an increased risk of panic attacks. As a consequence, this kind of abuse can result in both alcohol addiction and more severe anxiety and panic disorders.
Anxiety and alcohol abuse – why does alcohol cause anxiety?
Can alcohol cause anxiety? Absolutely. While some people use alcohol as self-medication, two theories explain the link between alcohol and panic disorders:
- Tension reduction hypothesis: According to researchers, individuals who cannot cope with stress often become dependent on alcohol to reduce tension. But then, having temporarily experienced less anxiety after drinking alcohol, they begin to think that higher amounts of alcohol will help them deal with higher levels of stress.
- Biological theory: Some scientists claim that genetics can explain why people abuse alcohol.
Also, physiological changes that occur after drinking can explain why alcohol causes anxiety:
- Dehydration: When people consume alcohol, they can become dehydrated, because alcohol is a diuretic. This dehydration can cause headaches and dizziness, which can increase the uncomfortable feeling of anxiety.
- Heart rate and changes in the nervous system: Alcohol also increases the heart rate, which makes people more anxious. Some individuals can even mistake the increased heart rate they experience after drinking for a heart attack, which can then trigger a panic attack.
- Low serotonin and blood sugar levels: These changes can lead to depression and tiredness, so if one is already suffering from an underlying level of social anxiety, alcohol and its effects on the body will make it worse.
- Poor judgment: In addition to negatively affecting many bodily functions, drinking can lead to poor judgment. The behaviors that result from this can result in anxiety and panic attacks, either during or after the practices. One of the most dangerous examples of poor judgment, in fact, may be the belief that alcohol helps anxiety – once a person believes that, they’re caught in a cycle.
Can a hangover cause a panic attack?
Yes, hangovers can trigger panic attacks due to alcohol anxiety and the physiological and cognitive unpleasantness of being hungover. Also, one of the most common experiences during a hangover is feelings of paranoia, that something bad must have happened because of how bad one feels. Stress headaches can also be a common hangover experience, and these can lead a person who is already slightly anxious to worry that something terrible might be wrong with them, like a brain tumor.
Can alcohol withdrawal cause panic attacks?
In addition to the uncomfortable bodily changes associated with a hangover, alcohol withdrawal itself can cause anxiety, hallucinations, and panic attacks. Heavy drinkers can suffer from severe withdrawal symptoms after drinking, some of which can be life-threatening. These effects can also be dangerous for the people around the drinking individual. The resulting panic attacks and hallucinations can be terrible, and withdrawal seizures can be lethal.
Anxiety & Panic Attacks Explained
Anxiety is defined as fear and insecurity about the future. Generalized anxiety disorder, on the other hand, is defined as a constant state of uneasiness that interferes with people’s everyday activities. Symptoms of this disorder include:
- Stomach problems
- Negative thoughts
High levels of anxiety can lead to short but terrifying episodes of panic attacks. People start noticing all the small pains in their body and amplifying them in their minds, and they can also experience:
- Shortness of breath
- Detachment from reality
- Fear of death
Panic disorders can even lead to panic attacks while asleep. Research data shows that 70% of people with a panic disorder experience nocturnal panic.
Can alcohol help with anxiety? The answer to this has to be an emphatic No. Many people who suffer from anxiety or panic disorders may try to use alcohol to deal with their social anxiety, phobias, and panic attacks, but this ends up only making the problem worse.
How To Treat Alcohol Abuse, Anxiety Disorder, And Panic Attacks?
The biggest problem standing in the way of effective treatments for alcoholism and anxiety is that drinkers are unable to differentiate the anxiety caused by their drinking from the anxiety they had in the first place. Unfortunately, alcohol increases any baseline levels of anxiety people might have had – quite literally, pre-existing social anxiety and alcohol don’t mix.
People should also understand that alcohol can trigger anxiety, but it’s just as likely that anxiety triggers drinking. Studies show that people with anxiety disorders are three times more likely to abuse alcohol and drugs.
According to the National Institute on Alcohol Abuse and Alcoholism, heavy drinking is defined as 14 drinks for men per week, and seven drinks for women and people over 65 per week. (One drink = 1 bottle of beer, one glass of wine, or 1.5 ounces of liquor.)
People who drink this much and suffer from anxiety often ask questions during their treatment, such as “Does alcohol make anxiety worse?” or “Does alcohol increase anxiety?” They’re hoping the answer is No. It isn’t. Alcohol definitely makes anxiety worse.
Therefore, effective recovery from alcoholism usually saves treatment of anxiety symptoms until after a complete detox. Patients who suffer from anxiety need to learn to cope with stress without alcohol being present. Behavioral therapy often works well to accomplish this, and group sessions are also recommended.
- Stevens S, Cooper R, Bantin T, Hermann C, Gerlach AL. Feeling safe but appearing anxious: Differential effects of alcohol on anxiety and social performance in individuals with social anxiety disorder. Behav Res Ther. 2017 Jul;94:9-18. https://www.ncbi.nlm.nih.gov/pubmed/28441522
- Phillips P. Pharmacotherapy: anxiety and comorbid alcohol use. Nurs Times. 2016. https://www.researchgate.net/publication/271334024_Pharmacotherapy_for_anxiety_and_comorbid_alcohol_use_disorders
- Morley KC, Baillie A, Leung S, Sannibale C, Teesson M, Haber PS. Is Specialized Integrated Treatment for Comorbid Anxiety, Depression and Alcohol Dependence Better than Treatment as Usual in a Public Hospital Setting? Alcohol Alcohol. 2016. https://www.ncbi.nlm.nih.gov/pubmed/26672793
Where do calls go
Calls to our general hotline may be answered by private treatment providers. | <urn:uuid:ea591e86-925f-47ba-b672-2b21445d2256> | {
"date": "2020-01-20T12:44:52",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9403412938117981,
"score": 2.65625,
"token_count": 1600,
"url": "https://addictionresource.com/alcohol/effects/anxiety-panic-attacks/"
} |
Adrenal Insufficiency- Disease of the adrenal glands, resulting in the lack of cortisol production. Can also result in lack of DHEA, aldosterone and disrupt the balance of endocrine hormones, electrolyte balances and blood sugar levels.
Primary Addison’s disease- Autoimmune disease resulting in the
destruction of the adrenal glands, rendering them unable to
produce proper amounts of cortisol, DHEA & Aldosterone.
Secondary Adrenal Insufficiency- When the pituitary gland does
not produce the hormone ATCH (Adrenocorticotropic hormone)
resulting in the lack of cortisol production in the adrenal glands.
Tertiary Adrenal Insufficiency- When the hypothalamus fails to
release CRH (corticotropin-releasing hormone) which stimulates the
production of ACTH by the pituitary gland.
Congenital adrenal hyperplasia (CAH)- Genetic disorder present from birth that impairs the adrenal glands. CAH patients lack the enzymes the adrenal glands use to produce hormones that help regulate metabolism, the immune system, blood pressure and other essential functions.
Body Chemicals Affected in Adrenal Insufficiency-
Cortisol– Glucocorticoid hormone: The body’s stress hormone.
Aldosterone– Mineralocorticoid hormone: Regulates electrolyte balances by instructing the kidney to release potassium and retain sodium.
DHEA– Hormone that aids in the production of androgens and estrogens (male and female sex hormones)
(Blood sugar levels and electrolytes can also be impacted)
The primary diagnostic tests that endocrinologists use to diagnose adrenal disease:
ACTH stimulation test- Measures how well the adrenal glands respond to the release of the adrenocorticotropic hormone (ACTH). When this test is done, blood is drawn prior to injection of ACTH, then at 30 minute intervals for a few hours to test your adrenal response to the ACTH. If your cortisol levels do not rise properly, you are then diagnosed with adrenal insufficiency.
Dexamethasone Suppression Test- Tests adrenal gland function by measuring how cortisol levels change in response to the steroid dexamethasone. This test has historically been used to diagnose depression as well.
8am Cortisol Blood Draw- Your body’s natural cortisol levels should be the highest in the morning, according to your body’s circadian rhythm. If your AM levels are low, it indicates an adrenal issue.
(Saliva and urine tests are also performed, but are not as widely accepted for diagnostic criteria)
Most people understand what diabetes is. Diabetes is the lack of the appropriate amount of insulin. Diabetics have to be vigilant of their blood sugar levels and manage their disease with insulin shots/pumps. This is very similar to Adrenal Disease. Just the like the diabetic, the AI patient has to have an external source for their deficiency, but instead of insulin- we replace cortisol. Unfortunately, unlike the diabetics, we have no meter to check our cortisol levels. We have to physically watch our symptoms and stress dose or use an emergency injection if we drop too low. Lack of cortisol is DEADLY. An adrenal crisis will occur if an AI patient does not have cortisol replacement.
An adrenal crisis presents differently for everyone,
depending on which form of AI the person has.
Some possible symptoms are-
Blood Pressure/Heart Rate Changes, Weakness, Vomiting, Trouble Breathing, Anxiety, Flank/Back Pain,
Mental changes. These are not the only symptoms-
Everyone presents differently. It is important to always
wear a medical alert bracelet and have an emergency injection with you AT ALL TIMES.
Adrenal Crisis WILL result in death if left untreated.
Treatment of AI-
Medications such as Prednisone, Dexamethasone & Hydrocortisone replace the steroid hormone, cortisol in the body.
The medication Florinef (Fludrocortisone) is used to treat the lack of aldosterone in the body. Not everyone with AI needs this medication, it is mainly used in primary addison’s disease patients.
Side Note- Everyone is different! Not all steroids work for everyone!
Find the right one for YOU with your endocrinologist!
Managing adrenal disease is different for everyone,
but the absolute essentials for EVERY AI patient are-
Daily Replacement Cortisol Medication
Proper rest, hydration, stress management and nutrition.
Knowing the signs of low cortisol (there is no meter to check blood levels)
Respecting the physical limits of your body
Having an Emergency Injection of Cortisol at all times
Wearing a medical alert bracelet at all times
Adrenal disease certainly presents with it’s own unique challenges,
but it is not impossible to live a happy life with A.I.
Proper self care, medication and stress
management is imperative to living
the best life possible.
This post is not intended to diagnose or treat any medical condition. Consult your health care provider before starting or stopping any medical treatment.
I am NOT a doctor, nor do I claim to be. I am simply an adrenal insufficient woman who has done much research to understand adrenal disease and seeks to help others understand as well. | <urn:uuid:65034a38-3391-409d-bba3-b2e9d0669b60> | {
"date": "2020-01-20T13:11:24",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8587514758110046,
"score": 2.765625,
"token_count": 1133,
"url": "https://adrenalalternatives.com/2019/02/28/understanding-adrenal-disease/"
} |
Asbestos is a naturally occurring material that contains fibres. These fibres are strong and resistant to heat and chemicals which has led to the use of asbestos in a wide range of building materials and products, often as fireproofing.
Since 1985 the use of asbestos in buildings has decreased significantly and buildings constructed since 2000 will definitely not contain any asbestos.
In the home asbestos may be found in:
Generally materials containing asbestos that are in good condition are safe. Asbestos is only dangerous when it’s in a loose form, damaged, disturbed or worked on, as this can release the asbestos fibres into the air.
If these fibres are breathed in over a long period of time, they may damage the lungs and can lead to very serious illnesses. Materials containing asbestos that are in good condition should be left in place because it may be more dangerous to remove it and cause unnecessary disturbance.
You cannot tell for sure if a material contains asbestos just by looking at it. If you think you may have asbestos in your home please leave it alone, it is safe unless it is damaged or disturbed.
When carrying out DIY work around any materials that you think may contain asbestos, please do not:
Our Asset Management department are collating information on the location of asbestos in our properties. Each time a new asbestos survey is completed it is added to the information held, and each instance is dealt with in one of the following ways:
Where we are aware of any asbestos in residents’ homes we will advise residents of its presence and location. We will also ensure any other persons who are likely to disturb materials containing asbestos, such as staff and contractors, are aware of its presence, location and condition and agree the appropriate action that should be taken.
Should any asbestos materials (or materials you suspect may be asbestos) become damaged, then contact our Technical Services Advisors on 0300 500 6262 immediately. They will arrange to have the material inspected and/or tested and then either left in place, sealed or removed. | <urn:uuid:51232d35-1138-4a63-9260-f534c95994a8> | {
"date": "2020-01-20T13:01:02",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9532796144485474,
"score": 3.03125,
"token_count": 411,
"url": "https://ald.chg.org.uk/asbestos"
} |
Alona Armstrong, of Lancaster University, answered her own question below with the prospect of a Sahara Green again, thanks to deployments of all Renewables hardwares .
Massive solar and wind farms could bring vegetation back to the Sahara
Switching from fossil fuels to renewable energy is an important and necessary step towards averting climate change. However, in our efforts to go green, we also need to be mindful of other consequences, both intended and unintended – and that includes how a mass deployment of renewable technology might affect its surrounding climate.
What if the Sahara desert was turned into a giant solar and wind farm, for instance? This is the topic of new research published in Science by Yan Li and colleagues. They found that all those hypothetical wind turbines and solar panels would make their immediate surroundings both warmer and rainier, and could turn parts of the Sahara green for the first time in at least 4,500 years.
The scientists behind the research looked at the maximum amount of solar and wind energy that could be generated in the Sahara desert and the transition region to its south, the Sahel. The two regions were picked as they are relatively plausible sites for such an enormous roll-out of renewable energy, being fairly near to substantial demand from Europe and the Middle East, while having limited other demands on the land. Both have substantial potential resources of wind and solar energy. Li and colleagues also suggest that The Sahel, in particular, could also benefit from economic development and more energy for desalination, providing water for cities and agriculture.
As the two regions are so large, the solar and wind farms that were simulated in this study are the size of entire countries – 38 times larger than the UK. They would be vastly bigger than any existing solar and wind farms, and could provide up to four times as much energy as is currently consumed globally.
This would prompt quite significant changes in the local environment – massive wind farms would raise temperatures by around 2℃ for instance, similar to the amount of global warming we are concerned about. Solar would cause a smaller temperature change, around 1℃.
Precipitation increases of 0.25 mm per day associated with wind farms sound more modest, yet this would be almost double the previous amount of rainfall. Again, the effect associated with solar parks was smaller – an increase of 0.13 mm/day – but still significant when added up over a year.
Why turbines and panels mean warmth and rain
Wind farms largely cause temperature increases because their turbine blades bring warmer air down to the surface, especially at night. This has been observed in field studies and using remote sensing. They have also been shown to increase moisture in the air.
Solar panels mean more solar radiation is absorbed and less of the sun’s energy is reflected back into space. This causes the land surface to warm up. Several studies have shown this, including one which showed that the effect of warming caused by fossil fuels, via carbon emissions, was 30 times greater than the warming caused by solar photovoltaics absorbing more solar radiation. However, temperature effects may vary within the solar park and with season.
In the Sahara simulation, extra rainfall happens because wind turbines represent an obstacle to free-flowing air, slowing it down and reducing the effect of the Earth spinning on air flow. This lowers the air pressure, and the difference in pressure between the Sahara and surrounding areas causes wind to flow there. When the air meets, or converges, in the Sahara it has nowhere else to go but up. As the air rises, water vapour in it condenses and rain drops form.
For solar, the process is slightly different: warmer air, heated by the panels, simply rises. However, this also promotes low pressure, causing air to flow there, converge and rise.
More rainfall also means more vegetation. This increases surface roughness, as with wind turbines, and causes more solar radiation to be absorbed, as with solar panels. This reinforcing cycle is known as a “climate feedback” and incorporating these vegetation feedbacks is a novel aspect of the research by Li and colleagues.
Time to make it a reality?
Not quite. Decisions aren’t made in response to environmental impacts alone – if this was the case we’d have already ditched fossil fuels. It’s certainly true that developing a mega renewable energy site across the Sahara and the Sahel would be a game-changer, but there are lots of other factors to consider first.
These areas may be sparsely populated but people do live there, their livelihoods are there, and the landscapes are of cultural value to them. Can the land really be “grabbed” to supply energy to Europe and the Middle East?
Coherent and stable energy policies are challenging enough within an individual nation, let alone between nations with all the potential political implications and energy security issues. Though mass amounts of cheap Saharan energy sounds like a great thing, it is not clear it would be a secure enough investment for the economics to add up.
It’s also hard to tell what this would mean for desertification, which is caused by poor land management, such as overgrazing, as well as by the climate. The changes to rainfall looked at in this study are regional, not global, and once the wind and solar farms were taken away their effects would disappear and the land could revert back to its previous state.
Overall, this is an interesting and important piece of research, highlighting the need to be mindful of unintended consequences, be these positive or negative, of the energy transition. Integrating these findings with other social, economic, environmental and technical considerations is essential to ensure we don’t leap from the frying pan into the fire. | <urn:uuid:ecb7059f-e82d-48e1-a27b-9a14cbb3aa2d> | {
"date": "2020-01-20T13:27:08",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9657374620437622,
"score": 3.515625,
"token_count": 1177,
"url": "https://algmartun.com/2018/09/07/p9eiea-ptd/"
} |
I do not wish to downplay other tragic locations associated with the term, but “Ground Zero” was originally used only for the surface location closest to the detonation point of a nuclear explosion. Mississippi is home to one of those fortunately rare spots.
Fifty-five years ago (as of today) an atomic bomb was detonated—on 22 October 1964 (and on purpose)—in south Mississippi. It was the first of two nuclear test explosions in the same location, and the only ones east of the Mississippi River. The nuclear test detonations, along with two later gas explosions, were conducted by the U.S. Atomic Energy Commission and the Department of Defense in the Tatum Salt Dome, 21 miles southwest of my home in Hattiesburg, MS.
The two nuclear explosions were part of a larger project called the Vela Uniform Program, which was concerned with developing methods of detecting (and perhaps limits for avoiding detection of) underground nuclear tests in light of potential test ban treaties. The Tatum Salt Dome provided a capped chamber some 1500 feet below low-permeable strata; well-suited for certain parts of the program. A shaft was drilled 2,710 feet into the salt dome, where on 22 October 1964, the 5.3 kiloton yield nuclear device code-named “Salmon” was lowered and detonated, creating a chamber in the salt dome (duh). A second nuke, the 380 ton yield device called “Sterling,” was suspended into this chamber and detonated on 3 December 1966. The two nuclear tests were collectively called “Project Dribble.” Two methane and oxygen explosions in the same chamber, “Diode Tube” on 2 February 2 1969 and “Humid Water” on 19 April 1970, were part of “Project Miracle Play.”
The “Salmon Site,” as the 1,470 acre tract above the Tatum Salt Dome is now known, was sealed, cleaned, and passed from the AEC to the Department of Energy in 1992. The DOE retains the underground rights for the land and continues to monitor it via numerous test wells for radiation.
Surface ownership of the parcel was ceded to the State of Mississippi for use “as a wildlife refuge and working demonstration forest.” Meanwhile, the detonation chamber apparently contains a stratum of highly radioactive material, covered by a recrystallized melt puddle, and fluid, all safely contained by the salt envelope and sealed shafts above.
Today a concrete marker with two plaques marks the Surface Ground Zero of Mississippi, 2,710 feet above the detonation point and resulting radioactive chamber. It is a truly awkward monument. For starters, it is not easily visited, as the vehicle access “roads” are unmarked, gated, and locked. When the monument is finally reached, the main informational bronze plaque faces away from any who approach, as if embarrassed to reveal its story.
The SGZ monument seems guarded by six closed and securely locked test wells, each in turn protected by concrete-filled security poles. A rusty electrical panel box stands close by (wasps prevented me from testing the outlets in it) next to the stump of a formerly large tree.
A ominous sealed shaft beyond the monument and panel is unmarked except for the label added to the lid by the talented welder, “PS 3 – PLUGGED 6-18-79.” All this odd setting is put in context by the smaller—and arguably more important—plaque on the concrete monument, facing any arriving visitor and warning them against excavation of any kind. Good idea.
Thanks for looking!
project codenames fascinate me . . . other Vela Uniform underground tests were
conducted in Nevada and at one site in Alaska with various codenames, including
“Long Shot,” “Diamond Dust,” and “Diamond Mine;” with “Sterling” and “Miracle
Play,” it sounds like some kind of casino game or lottery—the latter of which Mississippi is starting next month.
Today—12 October 2019 (as I write this)—would be the 100th birthday of a World War II hero whose remembrance has been wildly variable, and for whom a recent memorial also deserves mention.
Doris Miller, often referred to as “Dorie,” was born near Waco, Texas, on 12 October 1919; the third of four sons born to sharecroppers Connery and Henrietta Miller. The midwife attending his birth was convinced he would be a girl, thus the child was named Doris. He enlisted in the Navy in 1939 and was eventually assigned to the battleship USS West Virginia. I have not been able to locate any anecdotal information on what it was like to be a man named Doris in the Navy; but . . . it was the case that Doris Miller was the heavyweight boxing champion aboard the West Virginia.
As an African
American seaman in the segregated U.S. armed forces of the day, Miller was placed
in a service role and promoted to Mess Attendant, Second Class in the ship’s
mess. On 7 December 1941, the USS West Virginia was at anchorage in Pearl
Harbor. Miller was collecting laundry when the Japanese attack on Pearl Harbor
commenced and the first of at least five aerial torpedoes struck the ship.
Miller ran to his battle station which he found destroyed and then reported to the central meeting point of the battleship. There he was ordered, because of his physique, to accompany an officer in an attempted evacuation of the ship’s mortally wounded captain from the bridge. Unable to safely remove the Captain, they moved him to a safer position behind the conning tower. Then Miller, though not trained on its use, manned an unattended Browning 50-cal. anti-aircraft gun. He fired until the ammunition was exhausted and he was forced to retire by spreading flames on the sinking ship. Miller later describing his actions:
It wasn’t hard. I just pulled the trigger and she worked fine. I had watched the others with these guns. I guess I fired her for about fifteen minutes. I think I got one of those Jap planes. They were diving pretty close to us.
While firing the anti-aircraft gun is the most famous part of his actions, Miller afterwards also “was instrumental in hauling people along through oil and water to the quarterdeck, thereby unquestionably saving the lives of a number of people who might otherwise have been lost.”
of those receiving commendations for actions at Pearl Harbor mentioned an unnamed
negro. This ignited attention by the press and NAACP. Finally, the Navy confirmed
Miller’s identity, and some reports appear to have printed it with a typo,
giving rise to the moniker “Dorie Miller.” In any case, Miller was awarded the
Navy Cross, presented by Admiral Nimitz on 27 May 1942. He became an icon for
the African American community, was sent on a war bonds tour, and appeared in a
recruiting poster. Having been transferred to the USS Indianapolis immediately
after Pearl Harbor, Miller was promoted to Cook, Third Class and assigned to
the new escort carrier USS Liscome Bay following the bond tour.
Those who know WW II naval history may realize from the foregoing that hero’s lives often do not end happily. The Indianapolis became one of the worst and most controversial naval losses of the war, and a story in itself. Miller, however, was transferred off the Indianapolis; but to the Liscome Bay . . . which would become the most deadly aircraft carrier loss in U.S. history. On 24 November 1943 the Liscome Bay was struck by torpedoes from a Japanese submarine which set off a huge munitions explosion. Miller was among the 644 men lost, the great majority of whom went down with the ship. In a cruel irony, Doris’ parents were informed of the loss on 7 December 1943, exactly two years after his heroic actions at Pearl Harbor.
The photos in this post are of the newish Doris Miller Memorial standing adjacent to the Brazos River in Waco. It is a moving monument, incorporating the shape of the battleship on which Miller served. The statue of Doris was unveiled on 7 December, Pearl Harbor Day, in 2017. A new biography of the hero, released on the same day, credits Doris Miller’s actions at Pearl Harbor as a catalyst for abolishing the U.S. Navy’s segregationist policies and, in a chain of events, for helping launch the civil rights movement.
As it happens, “Doris” also designates a deity of the sea in ancient Greece, the name coming from Greek words for “gift” and “pure.” A man named Doris. Indeed.
The first Emperor of Rome, Caesar Augustus, died on this day, 19 August, AD 14. Occasioned by the 2005th anniversary of that event, this post is a brief follow-up to “Monuments to Dead Romans: The Şekerhane Köşkü,” featuring a probable Temple to the Deified Emperor Trajan (d. AD 117). Since that entry (first in a new occasional series) was posted on the most likely day of Trajan’s death, this one too is timed for the anniversary of the Emperor’s death.
Like Trajan after him, Caesar Augustus died on his way back
to Rome. His ashes were placed in the huge tomb Octavian (his given name)
prepared for himself already in 28 BC, before he even obtained the title
Augustus by which he is remembered.
It was a huge circular Mausoleum built of concrete and tufa reticulate (small
blocks of volcanic conglomerate in a diamond pattern, often as a form for the
concrete). The outer of six concentric structural walls measured 300 Roman feet
(c. 89m) in diameter, and the 40 Roman feet (c. 12m) high. The 2nd
and 3rd walls were consequtively higher and bonded with the outer,
making 25m thick ring. A single entrance on the south pierced the outer walls,
opening to a vaulted corridor around the 4th wall, through which 2
entrances led to another corridor around the 5th wall, with a single
entrance to the burial vault (for urns, as the Romans practiced cremation). The
ruined state of the building makes the superstructure details unclear and
several reconstructions have been imagined, most assuming a finished overall height
of 150 Roman feet (40-45m).
According to Strabo, the Mausoleum was the most impressive of local monuments, “which consists of a mound of earth raised upon a high foundation of white marble, situated near the river, and covered to the top with ever-green shrubs. Upon the summit is a bronze statue of Augustus Cæsar, and beneath the mound are the ashes of himself, his relatives, and friends” (Strabo 5.8.3). One would expect such an impressive monument would be remembered, respected, restored, and revered.
Sadly, that has not been the case. The Mausoleum was
converted into a fortress in the medieval period, destroyed in 1167, and robbed
for building stone. The building became an ornate garden in the 16th
century, an arena for bullfights in the 18th, a theater and circus
arena in the 19th, and a concert hall with 3,500 seats in the early
Thereafter the site fell into total neglect, became overgrown, and deteriorated
even after some attempt at clarifying it with a surrounding plaze by the
Fascist government in the late 1930s.
The original white limestone facing was robbed along with
other usable limestone within. Trees dominate the upper surface of the ring
defined by the outer walls today, perhaps simulating hinting at the appearance
described by Strabo (above). The site has been closed for some time, and
restorations were supposed (by one report) to be completed in April of this
year. At last check, the Mausoleum is still inaccessible, but Google Earth photos
give some hope of progress.
My advice: if you get to choose whether to have a month named
for you or have a fantastic monument . . . take the month.
month August was named in his honor—a non-physical and more enduring “monument.”
Bonus for footnote readers—because I never get to share this one in class
anymore: if you ever have to watch Disney’s Cinderella (original animated),
as I have with two daughters and then two granddaughters, you might notice that
when the new fat mouse is discovered, he gives his name as “Octavius.” But
Cinderella says, “we’ll call you ‘Gus’ for short.” How does Octavius become Gus?
Octavius = AuGUStus. This almost makes up for the annoying music.
Most details from Amanda Claridge, Rome: An Oxford Archaeological Guide (Oxford: University Press, 1998), 181-84. BTW, this series is the most helpful and undersold of archaeological guides; the new edition of Rome is here.
Most of my posts result from a combination of visits I have made to odd places, some latent interest sparked by a random input, and bizarre current events. This is one of those posts. The stimuli, respectively, were a recent visit to the Orkney Islands, my 26 July A.Word.A.Day (AWAD) email featuring ultima Thule, and President Trump’s bid to purchase Greenland.
Despite being a great idea (and not a new one); the latter
is NOT going to happen, notwithstanding any confident flaunting of “the art of
the deal.” Ultima Thule may require a little explanation—at least to get
to the real topic of this post . . .
We begin sometime between 320-300 BC when Pytheas, an explorer from the Greek colony of Massalia (modern Marseilles, France), became the first known Greek to sail past the Carthaginian blockade at the Straits of Gibraltar. His apparent goal was the tin mines of Cornwall, but he also circumnavigated Britain and described its triangular shape accurately. In northern Scotland, Pytheas heard from the locals of a mysterious island called Thule (Θούλη). He reported of Thule that: it was “the most northerly of the Britannic Islands”; “there the circle of the summer tropic is the same as the arctic circle” (Strabo 2.5.8); it lay six days sailing north of Britain (Pliny Natural History 2.186-87); and “there is neither sea nor air, but mixture like sea-lung, in which earth and air are suspended; the sea-lung binds everything together” (Polybius 34.5.3-5). Sea-lung? This got weird. Although the words used are the same as those for jellyfish, Pytheas is using a strange metaphor at minimum. For this and other reasons, many ancient geographers dismissed Pytheas entirely, or accepted his description of Britain and drew the line at Thule.
Thule’s actual existence was debated for centuries, its possible real identification even still today, and the name Thule eventually came to mean the most northerly occupied place. The name was attached to Greenland when explorer Knud Rasmussen founded a trading post in the far NW corner of the island and named it “Thule.” The United States Air Force cemented the name by building Thule Air Base nearby in the mid-1950s. Meanwhile, the term ultima Thule developed as a literary extension of the geographic idea, meaning “the farthest place” or “a remotely distant goal.” Thus, the title of this post . . . which, admittedly, does not obviously reveal the pictorial topic.
If Thule was a real place, where was it? Some in the past have
identified Thule with the Orkney Islands. That is good enough for me to use
this weird thread of logic to feature some pics from the center of Mainland,
the central island of the Orkneys.
I rather liked Orkney. Crowds at important places could be
minimized, even at the height of the tourist season. This is partly due to the
relatively limited accommodations there. One could find huge clots of tourists,
but they came for organized day-trips via ferry from the north tip of Scotland.
Stuck on bus-tours, they were predictable and easily avoided. The other great
secret is something mentioned by Pytheas: “For it was the case that in these
parts the nights were very short, in some places two, in others three hours
long, so that the sun rose again a short time after it had set” (Geminus, Introduction
to the Phenomena 6.9). Indeed, in Orkney in early July, the sun set around 22:30
(10:30 pm) and rose around 04:00. Tourists seem to arrive about 10:30 and
depart around 16:00, leaving lots of time to see stuff in the early morning or
late afternoon-evening unencumbered.
In the heart of Mainland, Orkney lies a fantastic collection of megalithic monuments. The crown jewel is the Ring of Brodgar (built 2500-2000 BC), the largest stone circle (103.6 m/340 ft) in Scotland and the 3rd largest in the British Isles. It is unusual in that the perfect stone circle is combined with a henge, much like Avebury in England. The site is part of a UNESCO World Heritage Site and very much the signature location in Orkney (see the great example at left, which also nicely incorporates the low sun). During the main hours of the day, the Ring of Brodgar is crawling with bus loads of day-trippers, but I did not see another living human between 05:30-07:00!
The Ring of Brodgar dominates a narrow peninsula separating
the lochs of Stenness and Harray. A mile to the south are the Stones of
Stenness, four huge megaliths that remain of an earlier stone circle. The site
has an eerie magnificence with its giant standing stones (up to 19 ft high) with
sheep dozing or eating at their bases. An outlier monolith called the Watch
Stone (also 19 ft) dominates the near end of a bridge on the road that leads to
the Ring of Brodgar.
Near the Stones of Stenness are the excavated remains of the
contemporary Barnhouse Settlement, a Neolithic village of 15 or so houses,
including one (Structure Two) that is larger than the others. Past the Watch
Stone and across the bridge are continuing significant excavations of more
Neolithic structures, called the Ness of Brodgar, that continued after
Barnhouse was abandoned. In that later period, Structure Eight, probably for
cultic use, was built by the ruins at Barnhouse. It seems to be oriented—as is
another standing stone—with the largest chamber tomb in the region, Maeshowe
(and another target of many of those bus tours). These interesting sites are
all within a linear mile and a half. There are other significant Neolithic sites
and other wonders in the Orkneys, but they will have to wait. Like Greenland.
One more thing: is there any chance Orkney is the Thule of Pytheas? Almost certainly not. Tacitus’ biography of his father-in-law and Roman governor of Britain from 78-84, Julius Agricola, claimed the Roman fleet circumnavigated Britain and, “thus established the fact that Britain was an island. At the same time it discovered and subjugated the Orkney Islands, hitherto unknown. Thule, too, was sighted, but no more; their orders took them no farther” (Tacitus, Agricola 10). This eliminates Orkney as Thule, but brings the Shetland Islands and possibly the Faroe Islands into play. Modern scholarship ignores them and prefers either Iceland or Norway. I should like to travel to all possibilities, but for now this desire is my own ultima Thule.
Astute readers (obviously you, because you are reading the footnotes) may have noticed that I am not quoting Pytheas himself, but rather other classical authors. This is because Pytheas’ writings are lost, save their quotations by others.
I have always been fascinated by monuments or memorials to the deceased and the psychology behind them, as well as the physical structures themselves. This post is triggered in part by the most recent of the all-too-familiar temporary memorials that appear at scenes of horrific mass shootings in my own country. But not to dwell on that depressing and unfortunately ubiquitous topic, I hereby initiate an occasional series on monuments to long-dead Romans and other figures of antiquity.
Trajan excelled in his 19-year reign and was highly regarded
in life, death, and by Renaissance and early modern historians. Already having
made significant military conquests in Dacia, in AD 114 he set out for
campaigns on the eastern frontier. The problem there was agitation by the
Parthian Empire (originating in Persia—modern Iran—another connection of this
story with contemporary events!). Trajan was incredibly successful in his initial
campaign, taking the Parthian capital Ctesiphon and gaining a foothold on the
Persian Gulf. But reduced success and troubles elsewhere in the Empire caused
him to return towards Rome in 117.
Our main source for Trajan’s last days is Cassius Dio.
Already suffering in health, which he attributed to poison, the Emperor
suffered a stroke that left him partially paralyzed. In early August he sailed
for Rome from Antioch. When Trajan’s health deteriorated the ship put in at the
nearest port, Selinus in Cilicia, where he “suddenly expired” (Cassius
Dio 68.33). Selinus was subsequently renamed Traianopolis in the Emperor’s
honor and memory. Details on the exact disposition of his body are not given,
but his “remains” were transported back to Seleucia, the port of Antioch, for
viewing by his successor, Hadrian, and then to Rome.
On the outskirts of the Turkish city Gazipaşa are the ruins of Selinus/Traianopolis, and on the landward outskirts of them stands a lonely structure known locally as the Şekerhane Köşkü, which refers to the building’s use as a hunting platform for elites during the Seljuk Period. Early western explorers of the area identified it as having a sepulchral function and likely built as a cenotaph (a tomb structure without the honored person’s actual remains) for Trajan. Trajan was the only personality of his magnitude known to have died there and a memorial to him is a logical outcome although the written sources do not mention such. The roof of the edifice was covered in soil and produced wheat and other crops that were grown around it. This layer was cleared in the early 2000s revealing the foundation outlines of a temple-like structure with a place for a cult statue. These and other details now make it likely that the building was not a cenotaph but rather a platform for a temple to the deified Emperor Trajan.
Coins issued in Selinus from the late 2nd-mid 3rd centuries featured a temple to Trajan on the reverse. There is no other suitable candidate for this temple in the extant remains apart from the Şekerhane Köşkü. Further, there are striking parallels to coins featuring the Temple of the Deified Julius Caesar (mentioned above) in Rome, which was situated at the spot of Caesar’s cremation. One of the walls of the Şekerhane Köşkü incorporates an earlier square structure, arguably the cremation pit where Trajan’s corpse was burned—an essential step in Apotheosis (elevation to divine status) for both Caesar and Trajan.
The Emperor’s ashes were eventually transported to Rome
where they were placed in a special chamber at the base of Trajan’s Column, a
magnificent and still-standing 30 meter (98 ft) high column depicting the
Emperor and his troops during the Dacian wars and showing painstaking detail of
the Roman army in action. Trajan’s Column anchors one end of the extensive
Forum of Trajan, the last of the Imperial Fora in Rome.
In addition to physical monuments, Trajan’s legacy includes other
honors. He was universally lauded by contemporary writers and posthumously declared
by the Senate optimus princeps, “the best ruler.” He was considered by
some Christian theologians to be a “virtuous pagan,” and Dante depicts him in
Jupiter’s Heaven in The Divine Comedy. Modern historians have sometimes
questioned Trajan’s accomplishments, and his successor Hadrian (who did
relinquish Trajan’s gains against Persia) now gets better press.
This argument is effectively made by Michael Hoff, “The Şekerhane Köşkü at Selinus (Cilicia): The Temple of the Deified Trajan,” Journal of Ancient Egyptian Interconnections 10 (Sept 2016): 56-68 [this is a special issue also titled Ex Terra Scientia: Papers in Honor of David Soren, eds. R.H Wilkinson and P.P. Creasman]. For the nerds that read footnotes: I actually obtained this issue recently for a current research project and was pleased to find this article there. Ironically, Michael Hoff (the author) had graciously received my research colleague and I at his impressive excavation site within an hour of our most recent visit to the Trajan Temple site.
Hoff, “The Şekerhane Köşkü at Selinus (Cilicia): The Temple of the Deified
It has been almost 40 days and 40 nights since my last post
and it is Father’s Day . . . so, obviously, that calls for a post about Noah’s
Ark! But, alas, I have not visited Noah’s Ark—and Ancient Dan, out of
principle, does not post about things without direct contact. However, I have
recently visited the “Ark Encounter” and (surprise!) have some thoughts about
For the uninformed: The Ark Encounter is a Christian creationist theme park in northern Kentucky. It is owned and operated by Answers in Genesis (AiG), a young-earth creationist non-profit founded and directed by Ken Ham, a master purveyor of pseudoscience. AiG also operates the Creation Museum nearby. The Ark Encounter was developed by AiG’s for-profit partner, Ark Encounter LLC (whose corporate office is in the Creation Museum), with the benefits of huge and controversial local tax incentives. AiG, like many other “non-profit” Christian institutions, has plugged into the “business model” and is not shy about commercialization. From the moment one enters either attraction ($48 for the Ark, $35 for the Creation Museum), there are endless opportunities to spend more money on overpriced food, trinkets, and propaganda. Among other things, the Ark [Encounter] certainly provides a refuge from taxes.
How did I end up there? I would never have done so on my own, but three other long-time friend couples planned a trip to the Creation Museum and Ark Encounter. So Mrs. Ancient Dan and I joined them—fellowship with good friends, curiosity, and the principle of direct experience before commentary overcoming my reticence to give money to AiG.
Time, space, and decorum preclude any full systematic reaction
to the exhibits at the Creation “Museum” and Ark Encounter. Rather, I will
offer here a couple of observations on the presentation that struck me as
I expected a barrage of pseudoscience-based arguments, but there
was not as much of that as I anticipated. Other aspects of the presentation,
however, troubled me more. After my visit, I discovered that Bill Nye (“The Science
Guy”) had a similar reaction.
The Science Guy noted, “every single science exhibit is absolutely wrong; not
just misleading, but wrong.”
But that is not the disturbing part. The presentation made no serious attempt
to document its claims apart from woefully out-of-context biblical references. Some
might suggest that the curators of the Creation Museum and Ark Encounter are
incapable of proper argumentation and citation; but I don’t think so (although
one exhibit had undecipherable English syntax). Ken Ham is no scientist, but he
is a crafty presenter and an able politician. The exhibits do not seek to
educate; rather they aim to confirm the views of those already on board with
the ark, so to speak. Preaching to the choir works! But it also erodes the
choirs’ ability to think critically or for themselves.
The crowds at both facilities were themselves an exhibition
of credulity. Their faces and T-shirts proclaimed a desire for confirmation of heartfelt
views and a yearning for refuge from that threatening outside world—the world
of science. The latter was characterized throughout the displays as the “Evolutionary
World View” and tacitly blamed for the ills of human society. The Ark [Encounter]
is thus a refuge from the deluge of the modern world; a place where one can be
comforted that God is in control despite the chaos outside. Is there anything
wrong with that? As a late secular songwriter declared: “It don’t really matter
to me . . . you believe what you want to believe.” The insightful words are “what
you want to believe.” The main point of the song, however, is in
the next line: “you don’t have to live like a refugee.”
Still, is there anything wrong with seeking psychological refuge from a scary
Unfortunately, the Ark also provides a refuge from facts. One example will suffice here. Fundamentalist Christians are (in my opinion, unreasonably) disturbed by the notion of evolution. The Flood story provides a potential avenue to explain away all those pesky and undeniable fossils (which support the “Evolutionary World View”). But if the fossils were all the result of the single Flood event, all the weird lifeforms represented in them must have coexisted with humans at the time of Noah and the Ark. The “biggest” obvious (but certainly not the only) problem, then, would be the dinosaurs. A challenge for the young-earth creationist view is the cynical question, “were there dinosaurs on the Ark?” Ken Ham’s answer to that is: “absolutely.” So the Creation Museum and Ark Encounter go to great lengths to create a narrative in which dinosaurs lounged around with Adam in the Garden of Eden (display in the Creation Museum) and had quarters on the great boat. Indeed, an inordinate percentage of the animal replicas in the Ark Encounter are dinosaur or other paleo- “kinds.”
At this point I should note that the craftmanship of the Ark
replica is top-notch, the grounds are beautiful, and presentations are slick
and high-tech. It is, in a word, impressive. The result is a massive container for
a story that provides limited details. To flesh out visitors’ Encounter
experience, numerous entertaining displays answer those idle questions that
come with a literal understanding of the account. For example, names of Noah’s
daughters-in-law are provided along with their specialized contributions (and
ethnic features to match their assumed descendants). Living quarters of
unexpected luxury are recreated and set the stage for other “poetic license”
additions, like the library of written records (in a bizarre imaginary script).
Viewers are thus invited into a storyland world not so unlike Harry Potter,
Game of Thrones, the Christian fiction genre, or other fantasy theme parks.
What I find troubling is this: with the help of the theme
park atmosphere, the visitor is encouraged to accept the presence of dinosaurs
on the Ark as naturally as they might expect a huge clothed hi-pitched bipedal rodent
interacting with visitors at Disneyworld.
I return to the question: is there anything wrong with all
that fantasy? Not in principle; but the ability of the public to evaluate information
has always been suspect. In this “Dis-information Age,” flashy presentation,
repetition, and volume make discernment more of a chore (see “Russia and the
2016 election”). The real peril of Ken Ham’s efforts are a weakening of
critical thinking and an indoctrinated distrust of “science.” This is already a
huge problem in America, as the Anti-Vaxxer movement and the current resurgence
of Measles highlight.
Ironically, Ken Ham does what the original writer of the Noah’s Ark account in Genesis did: creates a retelling of a well-known and beloved account infused with new details that support a particular theological view. Flood stories were written adapted in Mesopotamian cultures long before the composition of the Torah (even if one assumes the most conservative view of Mosaic authorship). Those accounts feature conflicting actions of multiple gods with humans as simple annoyances. The Genesis author was concerned with eliminating the other deities from the narrative, leaving the one God of Israel in control with a focus on human morality. Ken Ham’s retelling is concerned with eliminating the established fossil record, scientific method, and critical thinking.
What does any of this have to do with Father’s Day? The Genesis Flood story presents Noah as the father of all mankind through his three sons, Shem, Ham (not Ken!), and Japheth. Unsurprisingly, the Ark Encounter takes up this approach. This is a danger zone because literal views of the Shem, Ham, and Japheth division was used to justify slavery in this country (primarily through interpretations of Gen 9:20-27). Happily, Ken Ham denounces racism in numerous displays—which I wholeheartedly applaud. So the Ark should be a refuge—from bigotry and hatred, because we are all in this boat together.
Petty (and Michael W. Campbell), “Refugee,” 1979.
BONUS FOR PEOPLE THAT READ FOOTNOTES: The earlier Mesopotamian flood epics
mentioned above have undeniable parallels to the Genesis account in terms of building
details, the releasing of birds, and a post-flood sacrifice. But the
Mesopotamian stories do not emphasize the notion of the variously-named boat
builders populating the world. This aspect of the tale is found,
however, in the less well-known Greek flood myth of Deucalion, where the
hero repopulates the world through three sons. A new study of these parallels
is found in Guy Darshan, After the Flood: Stories of Origins in the Hebrew
Bible and Eastern Mediterranean Literature [Hebrew], Biblical Encyclopedia
Library 35 (Jerusalem: Bialik Institute, 2018).
A follow-up to my previous Pic of The (special) Day post is in order. Last week, I held forth on the “Genesis of the Accepting Church” using the Apostle Paul’s first visit to the city Antioch of Pisidia, as narrated by Acts 13. This was occasioned by my use of the passage for a special combined Sunday School session on the 60th anniversary of University Baptist Church’s own Genesis. As it happens, the Narrative Lectionary used by UBC covers Paul’s continued work on the same journey in the cities of Lystra and Derbe, also in the Roman province of Galatia. If you haven’t read the one about Antioch of Pisidia, it might be helpful and can be found here.
Immediately after Antioch of Pisidia, the same sequence of events is reported at Iconium but with far less detail: Paul going to the synagogue, having an opportunity to preach there because of his status, resistance by unbelieving synagogue Jews, and eventual persecution and departure (Acts 14:1-7). From Iconium, they moved on to nearby Lystra. Today Lystra remains a largely un-investigated and non-descript ruin in the Lycaonian plain. The site is dominated by a large hüyük; a mound of ruins built up over centuries or millennia of human occupation (more familiar by the Arabic word tell). The active agricultural fields surrounding the mound are devoid of architectural features, but abound in those indicators of an ancient site: sherds of broken pottery and small stone objects turned up by the plow. It is a prototypical example of an unpreserved and unexcavated ancient site.
At Lystra the biblical narrative focuses on Paul’s healing of a cripple—very possibly at the synagogue where Paul was speaking (Acts 14:8-10)—and the aftermath of that miraculous event. Some of the locals, amazed by what Paul had done, declared him and Barnabas to be “the gods” in human form. Paul, “since he was the chief speaker,” was called Hermes (the messenger of the Olympian Greek gods) and Barnabas—apparently more quietly dignified and stately(?)—was deemed to be Zeus! The priest of Zeus brought out “oxen and garlands” to offer a sacrifice, but Paul and Barnabas declaimed that they were mere men and scarcely managed to avert the sacrifice (Acts 14:11-18). Then, with no indication of time passed after the previous scene, the reader of Acts is told that Jews from Antioch (of Pisidia) and Iconium came and “persuaded the people,” so that “they stoned Paul dragged him out of the city, supposing that he was dead” (v. 19). How could the same people declare Paul and Barnabas to be gods worthy of sacrifice and in the next verse stone Paul and leave him for dead? The answer, I sadly conclude, is human nature.
We, as most mammals do, have something of a pack mentality which causes us to readily accept a potential leader who demonstrates (or sometimes only claims) an ability to “save” us from whatever we may fear. This desire leads to irrational beliefs and actions. We see as much in this story; but also throughout history, in politics, in sports, and even entertainment. In the Roman world, the practice of worshiping the emperor as divine may strike us as “ignorant,” but it operated on the same psychology. And it worked! —as seen in the impressive temple to Augustus at Antioch of Pisidia (pictured in my previous post) complete with an entablature featuring bulls decorated with garlands, the very items brought out for sacrifice in our story.
Apparently refusing the role of physical/political savior, failing to provide what the crowds demand, or not being what people first hoped, is a dangerous business. This is the human side of what physically happened to Jesus; and Paul’s experience is an echo. The Lycaonians of Lystra demonstrate, in the extremes of their actions, the foibles of human temperament.
Happily, we don’t have to leave Lystra (or this blog) completely depressed about humanity. Paul returned to the city on the so-called “Second Missionary Journey” (Acts 16:1-3) and found the good side of people and their instincts. In Lystra Paul met a disciple named “Timothy, the son of a Jewish woman who was a believer; but his father was a Greek.” This Timothy was the product of a mixed marriage, which may have been a social burden and certainly created the potential for theological discrimination (Acts 16:3). It might be argued that Timothy’s mother is only mentioned because of her contribution to his mixed heritage, but note that only she is cited as a believer. And, assuming we can take it as authentic (many do not), 2 Timothy 1:5 has Paul remarking to Timothy about his faith: “a faith that dwelt first in your grandmother Lois and your mother Eunice and now, I am sure, dwells in you.” Timothy clearly received much more than Jewishness from his mother and his grandmother.
The love and nurture of a mother reveals and passes on the best part of human nature. We see it at Lystra in this story, and I feel it in my own life and in the lives of my children. As Tim[othy] might have said, “God bless[ed] us, every one!” | <urn:uuid:593a1f12-d2dc-4692-9b92-643f03040c70> | {
"date": "2020-01-20T11:25:30",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9608216285705566,
"score": 3.203125,
"token_count": 8813,
"url": "https://ancientdan.com/tag/potd/"
} |
Why did Charles Tupper want Confederation?
- PipingbobLv 71 decade agoFavorite Answer
The leader of the Conservative Party of Nova Scotia, James William Johnston, a fellow Baptist and family friend of the Tuppers, encouraged Charles Tupper to enter politics. As such, in 1855, Tupper ran against the prominent Liberal politician Joseph Howe for the Cumberland County seat in the Nova Scotia House of Assembly. Joseph Howe would be a frequent political opponent of Tupper in the years to come.
Although Tupper won his seat, the 1855 election was an overall disaster for the Nova Scotia Conservatives, with the Liberals, led by William Young, winning a large majority. Young consequently became Premier of Nova Scotia.
At a caucus meeting in January 1856, Tupper recommended a new direction for the Conservative party: they should begin actively courting Nova Scotia's Roman Catholic minority and should eagerly embrace railroad construction. Having just led his party into a disastrous election campaign, Johnston decided to basically cede control of the party to Tupper, though Johnston remained the party's leader. In the course of 1856, Tupper led Conservative attacks on the government, leading to Joseph Howe dubbing Tupper "the wicked wasp of Cumberland." In early 1857, Tupper succeeded in convincing a number of Roman Catholic Liberal members to cross the floor to join the Conservatives, reducing Young's government to the status of a minority government. As a result, Young was forced to resign in February 1857, and the Conservatives formed a government with Johnston as premier. Tupper became the provincial secretary.
In Tupper's first speech to the House of Assembly as provincial secretary, he set forth an ambitious plan of railroad construction. Thus, Tupper had embarked on the major theme of his political life: that Nova Scotians (and later Canadians) should downplay their ethnic and religious differences, and instead focus on developing the land's natural resources. He argued that with Nova Scotia's "inexhaustible mines", it could become "a vast manufacturing mart" for the east coast of North America. He quickly persuaded Johnston to end the General Mining Association's monopoly over Nova Scotia minerals.
In June 1857, Tupper initiated discussions with New Brunswick and the Province of Canada about an intercolonial railway. He traveled to London in 1858 to attempt to secure imperial backing for this project. During these discussions, Tupper found that the Canadians were more interested in discussing federal union, while the British (with the earl of Derby in his second term as prime minister) were too absorbed in their own immediate interests. As such, nothing came of the 1858 discussions for an intercolonial railway.
An election was held in May 1859, with sectarian conflict playing a large role, with the Catholics largely supporting the Conservatives and the Protestants now shifting towards the Liberals. Tupper barely managed to retain his seat. The Conservatives were barely re-elected and lost a confidence vote later that year. Johnston asked the Governor of Nova Scotia, Lord Mulgrave, for a dissolution, but Mulgrave refused and invited William Young to form a government. Tupper was outraged and petitioned the British government, asking them to recall Mulgrave.
For the next three years, Tupper was ferocious in his denunciations of the Liberal government, first Young, and then Joseph Howe, who took over from Young later in 1860. This came to a head in 1863 when the Liberals introduced legislation to restrict the Nova Scotia franchise, a move which Johnston and Tupper successfully blocked.
Tupper continued practicing medicine throughout this period. He established a successful medical practice in Halifax, rising to become the city medical officer. In 1863, he was elected president of the Medical Society of Nova Scotia.
In the June 1863 election, the Conservatives campaigned on a platform of railroad construction and expanded access to public education. The Conservatives won a huge majority, with 44 of the House of Assembly's 55 seats. Johnston resumed his duties as premier and Tupper again became provincial secretary. As a further sign of the Conservatives' commitment to non-sectarianism, in 1863, after a 20-year hiatus, Dalhousie College was re-opened as a non-denominational institution of higher learning.
In May 1864, Johnston retired from politics, accepting an appointment as a judge, and Tupper was chosen as his successor as premier of Nova Scotia.
- caminitaLv 43 years ago
Charles Tupper became into in many circumstances in charge for Nova Scotia transforming into a member of Confederation in 1867. A Father of Confederation, Charles Tupper became right into a delegate to the Charlottetown, Quebec and London conferences. | <urn:uuid:bb38c0df-bb46-4343-a7ae-65a00e78e994> | {
"date": "2020-01-20T13:07:59",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9718831777572632,
"score": 2.921875,
"token_count": 950,
"url": "https://answers.yahoo.com/question/index?qid=20081126162107AAPqDUA"
} |
Personal responsibility is about the integrity to make the choice to do our own work. Therefore, shortcuts that cheat us and take away from the learning experience should be avoided. The reward of hard work and an honest effort is a better understanding and greater appreciation for the subject Schools should work to create a culture of academic honesty. Professors, staff, and students must understand that integrity and honesty are valued qualities to be nurtured and maintained. Those who truly value learning, never even consider cheating. That is academic integrity (ISAAC, 2007).
A student must have the courage to own both the good that is accomplished and the mistakes made along the way. The mark of a mature student is to learn from these mistakes and continue to improve. A positive attitude displayed towards constructive criticism is essential in order to achieve the necessary improvements. Personal responsibility is a virtue that should apply to a student’s thoughts, feelings, and actions. Ultimately, with sufficient resources available, the time and effort a student contributes will determine their amount of success.
Don’t waste your time!
Order your assignment!
Members of the School of Education and Human Development at George Washington University wrote Recent scholarship has emphasized the importance of student effort and involvement in their academic and co- curricular activities as the decisive elements in promoting positive college outcomes. As colleges have struggled to extend opportunities, an accompanying expectation for students to assume responsibility for their own education often has been lacking. Institutions must work to create a climate in which all students feel welcome and able to fully participate.
It is equally important to nurture an ethic that demands student commitment and promotes student responsibility. Students can contribute to their own learning and to the development of a campus climate in which all can grow and learn (Davis ; Muriel, 1993). Some classes will be more stimulating to a student than others. Often there are required courses in a subject of less personal interest. The responsible student will display the same attitude and dedication to these classes as in the ones enjoyed the most.
For example, subjects such as math may not seem as relevant to an English degree as 20th entry English literature, but they should receive the same level of commitment. A student must set aside both resources and time to complete assignments. For example: An on-line student can have the best computer with all the right software and it won’t do a bit of good if they begin working on their thesis two hours before the due date. At the same time, a student can have a week to dedicate to writing their thesis and it won’t do them any good if they cannot get to a computer to submit it to the Professor.
Before students begin a course they should ensure they have both the time and sources necessary to succeed. When assignments are too difficult, or grades are lower than expected, some students look for others to blame. To quote from California State University, Chic’s recent guidelines for new students “DO NOT BLAME OTHERS FOR YOUR ACADEMIC PROBLEMS. A large number of students blame others for their failure. This is a cop-out for ineptitude” (USC, 2011-2012). Students who have accepted personal responsibility will look into themselves to find the motivation to achieve their academic goals.
For those who want to get the most from their university experience blaming the lack of time, work, family obligations, the instructor, or the university, is not an option. In order to practice personal responsibility in my education I will do my best to follow the five guidelines outlined by members of the Carnegie Foundation for the Advancement of Teaching. Five Key Dimensions of Personal and Social Responsibility (Colby & Sullivan 2009) 1. Strive for excellence: I must do my best at all times.
If at the end of the day I can say I have done everything possible with what I have, can accept the outcome with my head held high. . Cultivate personal and academic integrity: I will get what I put into my education. If I cheat and plagiarism from others it hurts me and my team members. In order to be truly proud at the end of this long hard process I have to be able to say I DID IT. I copied it doesn’t have the same ring to it. 3. Contribute to a larger community: Working within my team is important. Together we can achieve a better outcome than we could separately.
Working with diverse people we can learn from and strengthen each other. 4. Take seriously the perspectives f others: We are all different and look at the world through our own experiences. Nobody has all the answers and everyone has strengths and weaknesses. The trick is to use our strengths to help others while accepting help to strengthen our weaknesses. 5. Develop competence in ethical and moral reasoning: need to gain confidence in my ability to think things through using all available information. I must hold myself to the highest moral and ethical standards both in the academic world and life in general. | <urn:uuid:a6a81457-0290-4bb2-a345-92bd0a4092c4> | {
"date": "2020-01-20T13:39:22",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9581533074378967,
"score": 2.75,
"token_count": 1009,
"url": "https://anyassignment.com/samples/personal-responsibility-essay-4396/"
} |
Chalkboard Math is the perfect app for elementary school students in need of math practice in the following areas: addition, subtraction, multiplication, and division.
In addition to be a fun app that allows students to play Chalkman (similar to Hangman) while practicing math facts and giving positive audio feedback for both correct and incorrect answers, Chalkboard Math has been verified by professional educators to help promote the following skills:
1) Add and subtract within 20, demonstrating fluency for addition and subtraction within 10. (US Common Mathematics Core Standard: 1.OA.6)
2) Fluently add and subtract within 20 using mental strategies. By end of Grade 2, know from memory all sums of two one-digit numbers. (US Common Mathematics Core Standard: 2.OA.2)
3) Fluently multiply and divide within 100, using strategies such as the relationship between multiplication and division or properties of operations. By the end of Grade 3, know from memory all products of two one-digit numbers. (US Common Mathematics Core Standard: 3.OA.7)
Here's how the app works:
You first choose the numbers (1-12) that you want to work with, and then choose the math operations (addition, subtraction, multiplication, division).
The app will then speak out the problem (if your volume level is set, and device not on mute) - and then either present the correct answer or go on to the next problem. The app offers positive words of encouragement for both correct and incorrect answers.
If you are playing the Chalkman game, you need to get 25 problems correct to win and save the Chalkman character from erasure.
Chalkboard Math also has a Flashcard mode that you can enable to learn math facts. If you are on the go, you no longer have to carry flashcards with you to practice math.
Fix iOS 9 crashing issue
Ratings and ReviewsSee All
I clicked on the "about" button and can't get rid of the window now to use the program... I clicked on it again to see if it would close and it only enlarges the drop shadow around it with each click. Closing the app and reopening doesn't work to remove it either, so I guess I will delete the app now. Thank you, anyway.
Follow-up on previous problem with the about window not closing:
We noticed that if you keep tapping the screen the drop shadow gradually fades until the box closes. A little quirk... We like the program and will use it, but it would be better if children could write on it with their finger instead of having to type the answers.
Good but could use a couple upgrades
I like this app a lot but would love additional options, especially to turn off the comments (i plan on using this app for adult education; the rest of the app is happily free of cartoons etc but the comments are juvenile). It would also be fun to have multiple modes e.g. timed, head to head.
Great App for doing basic Math
Purchased this for my wife to use in her classroom but found myself playing with it helps getting the brain going again. Thank You!
- 22nd Century Software, LLC
- 56.6 MB
Requires iOS 9.0 or later. Compatible with iPhone, iPad, and iPod touch. Apple TV.
- Age Rating
- © 2012, 22nd Century Software LLC
With Family Sharing set up, up to six family members can use this app. | <urn:uuid:4ef63ef3-019f-4ab7-9856-cc9c98ef8b11> | {
"date": "2020-01-20T12:02:16",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9292539954185486,
"score": 2.9375,
"token_count": 729,
"url": "https://apps.apple.com/us/app/chalkboard-math/id542250586"
} |
The African Elephants once held numbers as high as 3 to 5 million during the last century, now only 415,000 are left in the wild.
If we don't act right now, researchers warn that we might lose the African Elephants forever. World Wide Fund for Nature (WWF) in a new campaign fundraiser has said the African Elephants face the fear of extinction in two decades if immediate action is not taken to preserve them, reports Newsweek.
Raising the funds needed to finish the fencing for female African #elephants, enabling us to rescue Kenya, one of the #Mendoza4 elephants. The same healing & joy you saw when elephants like Ramba & Lady arrived, is something Kenya deserves as well— Global Elephants (@GlobalElephants) December 3, 2019
DONATE: https://t.co/TFe3MxIU7B pic.twitter.com/wpNQWh7OMT
The population of these African Elephants, at present who are the biggest animal walking the earth, has gone down by a massive 70 percent in just 40 years primarily because of the illegal ivory trade, which is the biggest driver of elephant poaching.
Statistics show that 20,000 elephants are killed every year in this trade.
Juvenile African Elephants Taken From Their Families Are Shipped in Cages to China— BraveAgeFilms (@BraveAgeFilms) November 27, 2019
In cell phone camera footage obtained by CNN, young elephants appear distressed as they are kept in holding cells, waiting to be exported.https://t.co/B1PxWsMOfF#AnimalCruelty #AnimalRights pic.twitter.com/YpakUqGMxO
Once an elephant is killed, the poachers harvest the ivory from the tusks in order to meet the ever-increasing demand that is there to make products out of the material.
Ivory is an extremely expensive material that is used to make ornaments and decorations as well as being used in traditional Asian medicine for its therapeutic values.
Tomorrow is #GivingTuesday! Join our fight to save real acres and protect over three million acres of savanna in Kenya for threatened species like African Elephants and Grevy's Zebra. All donations will be matched 3:1, so don't wait- make your gift today! https://t.co/OxUSK3kKr7 pic.twitter.com/8clEqwempi— Rainforest Trust (@RainforestTrust) December 2, 2019
Even though there is a global ban on poaching and ivory sale, under the CITES multilateral treaty (the Convention on International Trade in Endangered Species of Wild Fauna and Flora), the poaching still happens so rampantly that it is now threatening the existence of the entire species.
African Forest Elephant— Kemono Friends Bot (@kemofure_bot) December 3, 2019
Elephants have been referred to as "forest gardeners" due to their significant role in seed dispersal and maintaining plant diversity.-
There are many parasitic species that use African elephants as their host. pic.twitter.com/qzdpmE6LKr
The poachers are said to be a part of powerful organized criminal networks that mainly partake in corruption, money laundering, and assassinations. One major issue that comes up while addressing the problem is that the government where the African Elephants reside often lack sufficient resources to protect and monitor elephant herds.
The herds mainly stay in remote and inaccessible habitats and often the helpless animals suffer a very brutal death.
Poaching has reached alarming rates. Wildlife Conservation Society estimates that this year 30,000 African elephants will be killed for their ivory, over 25 million sharks will be caught for their fins, and nearly 600 rhinos will be shot down in South Africa alone for their horns— Sabyasachi Dash (@Sabyasachi_SD) December 4, 2019
WWF Coordinator for West Africa, Pauwel De Wachter, released a statement, saying, "Poachers generally use Kalashnikovs or poisoned arrows. These weapons hurt the animal but do not kill them immediately. Once the elephant is on the ground, the poachers cut his tendons to immobilize it, condemning them to a painful death. So that the elephant empties more quickly of his blood, they cut his trunk."
African Elephants are found in 37 countries across the continent and are categorized as "vulnerable" by the International Union for Conservation of Nature (IUCN).
According to the statistics provided by WWF, only 415,000 are left in the wild. African Elephants play a major role in the ecosystem by helping to maintain healthy habitats for many other species, primarily by helping in dispersing seeds from various plants.
The African Elephants, which are spread in two species once held numbers as high as between three and five million during the last century, but the number has shown a dramatic decline because of poaching, habitat fragmentation, and deforestation. | <urn:uuid:11525a7c-bf14-42df-8471-b70933f11ee1> | {
"date": "2020-01-20T12:44:08",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9374892711639404,
"score": 2.96875,
"token_count": 1045,
"url": "https://apsari.com/african-elephants-face-extinction-by-2040"
} |
When the operational form of the journalistic process is executed in a different format, it will be interpreted differently. This is contributable to the effect that the online interface is creating a new form of journalism, which uses different protocols to communicate it’s message. Three key parts, as discussed by Mark Deuze (2003), are: 1. the ability to become hypertextual (i.e. create content within content by the use of hyperlinks to other sources); 2. interactivity (i.e. adding social features to the content/the webpage’s interface) and 3. multimedia (i.e. adding film, photo and sound in order to provide extra information on the given subject, or add aesthetic value to the text). Because of these singular abilities online, ‘non-traditional’ features have become prominent to the role of designing the form and content of an online news source. In the case of Deuze these are: Adaptive interactivity, navigational and functional.
As explained in chapter one, a medium, especially nowadays, cannot operate in a singular form. Interactive media communicate through different platforms, giving the user the possibilities to switch and change his or her focus amongst several differently designed interfaces. The notion that a medium nowadays is not able to function in isolation changes the design of the interface and instigates new procedures in order to support the users need for social interaction. For a medium to gain legitimacy there needs to be a point of recognition, in which the user recognizes and accepts references he/she has experienced earlier, seen by this user as other trustworthy media. The elements used to trigger the memory of the user act as manipulator, which is meant to create an arbitrary symbolic manipulation, (re-)creating an appearance of authority.
This forms a continuous reciprocity of hypermediacy, which in effect creates this authentic feeling. Creating something that will be transparent, which enforces it’s status of a trustworthy source of information, depends on a ‘cultural literacy’. This literacy isn’t always directly obvious when looking at the interface, as it occurs in specifically designed details (Phillips, 2010). In order to experience this transparency the user has to acknowledge and understand the literacy of the medium. In other words, media have to evoke hypermediacy through its interface, in order to prevent the users previous experience from becoming a liability. To implement what we have demonstrated in the previous chapter and apply this concept to a news source, we need to look at how users interact with the media and what the properties of this media’s authoritative role is. | <urn:uuid:985da80f-8ec1-45c4-9b65-512a15b75960> | {
"date": "2020-01-20T12:38:04",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9321745038032532,
"score": 3.515625,
"token_count": 533,
"url": "https://authoritativebydesign.com/2017/05/15/2-the-authority-of-news-design/"
} |
What is erection in Power Plant?
Erection is the process of collecting all components and equipments needed for the construction of the plant as per the engineering design recommends.
The erection includes the process from paving ways, constructing main structure, setting equipment and machinery and align it properly.
The entire process of erection, testing and commissioning may be divided into three main categories:
- Pre-erection activities to be completed before starting of erection of the plant.
- Erection of built-in parts of the plant.
- Erection of main operating components of the hydro set.
Pre erection activities:
Preparation of a plan for the implementation of erection work and sequence of various activities
Site storage planning consisting of open, locked, semi-closed storage and road construction, connection for plant distribution to assembly field.
Erection of temporary structures, living quarters needed to work smoothly and quickly on the site.
Building power, water, compressed air system for erection operations. DG sets of sufficient capacity to be retained when power failure occurs.
Arrangement of lighting of erection site and nearby area.
Ensure the timely supply of equipment and materials needed for continuation of erection work in conjunction with charts and schedules.
Providing installation plans for hoisting, carrying systems, instruments and equipment as well as coordinating the transfer of material to the site. The content will be removed and transferred to a pre-identified position in the unloading port.
Arrangement of protective measures to protect workers and machinery during the storage, transport and deployment of various plant components.
Erection of Main Operating Components:
In the first point, a well-coordinated overall plan is planned for the development of civil works and activities related to the building of hydro-mechanical and hydro-generating systems.
A PERT / CPM shall be established to track current operations and sensitive activities in order to prevent any interruption in the plan.
The number of building works to be finished by months in keeping with the project’s total planned construction timetable.
Big activity wise PERTs are established displaying sequence and length of activities matching delivery schedule and civil building activities to track erection works in-charge. This should provide timeline and length as per the total timetable of all essential and concurrent tasks to complete the erection work.
What is the difference between Erection and commissioning?
Erection is the process of installation of physical structure and instrument for the process plant, Commissioning is carried out followed by the erection.
Erection is planning and testing the site’s physical side for the latest piece of kit. Installation is the package preparing for service, oil filling, attachment of air ducts, intercabling, etc.
Commissioning is the final act before putting the new piece of kit into use, it often involves testing the kit as an individual piece and checking that its fully integrated into its final system. This ensures that a modern generator has practical security and vibration modifications that interact with the current switch board. | <urn:uuid:0c8fb706-9745-47f1-9dd5-768e9d05558d> | {
"date": "2020-01-20T11:24:03",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9306667447090149,
"score": 2.71875,
"token_count": 614,
"url": "https://automationforum.in/t/what-is-erection-in-power-plant-difference-between-erection-and-commissioning/7603"
} |
Reptiles & Amphibians
These are resources we've gathered that relate to amphibians and reptiles.
“Gut loading” refers to the practice of feeding insects a nutritious diet before they are eaten by your pet. Most commercially-available prey insects are deficient in many nutrients that our insectivorous pets require. Gut loading enhances our pets’ nutrition in two ways:
Sometimes reptiles require intramuscular injections as part of their treatment protocols. Intramuscular means “in the muscle”. Reptiles have vascular and renal anatomy that differs significantly from mammals, so they must receive intramuscular injections in the proper location to work properly.
Cryptosporiosis is caused by an internal parasite that can infect many different species of animals. It is caused by a protozoal, or one celled, parasite called Cryptosporidium. There are several species of Cryptosporidium, but the most commonly encountered in reptiles is C. serpentis. Cryptospordiosis is an important disease in reptiles due to its tendency to be highly contagious and high mortality rate.
Nutritional Secondary Hyperparathyroidism (NSHP), commonly referred to as “Metabolic Bone Disease”, is a common and serious health problem in pet reptiles. This disease causes the bones to become soft and brittle, easily bending and breaking. These fractures are referred to as pathologic fractures or fractures that occur during normal activity due to disease of the bone, not because of excessive trauma. In many cases, reptiles may have multiple fractures all over their body. Young growing reptiles may also develop swelling of the jaw and limbs, called fibrous osteodystrophy or “rubber jaw syndrome”. In severe cases, where the calcium in their body becomes dangerously low, reptiles develop muscle tremors, paralysis, and can lead to death.
Easy for follow diagrammatic instructions on building an artificial burrow for your tortoise. | <urn:uuid:8d410ca4-c990-42d8-8943-7b37bdddb2fc> | {
"date": "2020-01-20T13:03:41",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9432365894317627,
"score": 3.359375,
"token_count": 397,
"url": "https://azeah.com/resource/reptiles-amphibians?id=101"
} |
The Skin microbiome
Many people have probably heard of good, probiotic bacteria associated with the gut - how important they are for our health and well-being. But they are just as important to the skin, its balance and health and as many as 21% of our total microbiome microbes are on and in the skin.
Trillions of microorganisms live and thrive on our skin - primarily bacteria, but also, for example, various fungi and virus species, which together form the ecosystem we call our microbiome. There are so many of them that they outnumber our own, human cells - and the vast majority are of great importance to us.
A balanced microbiome with high bacterial diversity - i.e. as many different bacterial species as possible - is the most important prerequisite for healthy skin. We live in a mutually beneficial relationship with our bacteria - we provide them with food and shelter, they help us to strengthen our immune system, protect against negative environmental effects, maintain the optimum acidity (pH value) of the skin and produce substances that are important for the skin. In other words, bacteria keep the skin healthy, moisturised and well-functioning.
For many years, bacteria has mostly been thought of as the enemy – something dangerous that should be eliminated.
Nothing could be more wrong, however. While it is true that bacteria can cause disease, most bacteria are very beneficial for our health.
The past decade’s scientific research into the microbiome has led to a completely new understanding of bacteria as one of our most important allies. There is a mutually constructive collaboration between the microbes in our microbiome and our human organism, making bacteria vital to our health.
Only a few bacteria can cause problems for us if, for example, after a period of weakening they are able to reproduce and grow. It can result in dry, itchy and irritated skin. So it requires sufficient "good" bacteria to make sure that harmful bacteria are not given the opportunity to take over. Adding probiotic bacteria can therefore help to maintain a healthy balance of the skin or, if damage has occurred, to restore it.
WHO defines probiotics as “live microorganisms which when administered in adequate amounts confer a health benefit on the host"
As part of her personal care, a woman will use 12 different products containing on average 168 different chemicals on a daily basis. Men use slightly fewer products, but are still exposed to about 85 different chemicals daily (source: Environmental Working Group). In addition, we are in contact with other products such as detergents.
It is not hard to imagine that this can have an impact on the skin, which can eventually lead to damage - that is, imbalance - of its microbiome. Occasionally, a single product may be enough to cause problems, but often it will be the overall, accumulated impact that becomes problematic and upsets the balance and reduces the important bacterial diversity of the skin. Imbalances can, however, also occur for reasons unrelated to the use of specific products.
Whatever the cause - the balance of the skin's microbiome is destroyed, which can mean that "bad" bacteria with potentially harmful effects can multiply and outnumber the "good" bacteria. This will impair or damage the skin's immune system as well as the barrier function and can cause problems such as itchy and irritated skin. | <urn:uuid:ae82be22-f744-4f8b-90ee-7b9a04293e62> | {
"date": "2020-01-20T13:33:33",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9569767713546753,
"score": 3.140625,
"token_count": 674,
"url": "https://bakskincare.com/pages/the-skin-microbiome-2"
} |
Inventory is not simply a “cost of doing business.” It directly affects a company’s profitability and the cost of goods sold. Business practices of lean manufacturing treat unsold inventory as a waste, to be eliminated where possible.
Inventory control is “the process of managing inventories in such a way as to minimize inventory costs, including both holding costs and potential out of stock costs,” write authors William M. Pride, Robert J. Hughes and Jack R, Kapoor in “Business.”
Manufacturers recognize three general types of inventory: raw materials, work-in-process (WIP) and finished goods. At a car maker, a tire is raw material, the chassis on the production line is WIP, and the finished automobile is finished goods. While each is under ownership of the company, it is inventory. Retailers have only finished goods--called "stock" or "merchandise."
Inventory costs a company in purchasing, storage and handling. Effective inventory control minimizes those costs, by determining the minimum of time required to receive materials from suppliers, and to produce goods to order; and the minimum amount of raw materials required to begin an order.
An inventory control system is a methodology, or technology, of inventory control. It may be as simple as a handwritten manifest, as complex as a material requirements planning (MRP) system. Enterprise software providers, including SAP and Oracle, offer dedicated inventory control software systems.
Cost of Goods Sold
An effective inventory system minimizes the cost of inventory, including storage costs; handling; and loss through pilfering and obsolescence. | <urn:uuid:a08b0a74-cac9-444d-8079-0563adcc39fb> | {
"date": "2020-01-20T11:26:59",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9361140131950378,
"score": 2.703125,
"token_count": 338,
"url": "https://bizfluent.com/facts-6157507-define-scope-function-inventory-control.html"
} |
I was sent an interesting PDF file to investigate this week. The issue was that spaces were appearing in the text when translated into HTML5. Intrigued, I dived in to see what was going on…
The PDF file was created using Corel’s PDF Engine. This often has its own unique way of doing things (to put it politely). So I drilled down and found the word in question which was appearing with a space in it. I copied it from Acrobat and it also had a space in it! I looked at the internal PDF command and the text was encoded as a single word with a space in it. But in the viewer (both our PDF viewer and Acrobat) no space is visible.
The reason for this is that there is a command in the PDF text commands called Tw. This allows you to define an additional amount of space (positive or negative) to be added when a space is drawn. In this case, the amount is set to cancel out the space exactly so it is there but does not appear as a gap when the PDF is viewed. I have altered our code to now ignore this when converting the PDF to HTML5 (and extracting text).
So if you are using, our PDF to HTML5 convertor and seeing odd spaces, try today’s release. The bigger mystery is why Corel needs to add spaces in the middle of words and then move the position back to ignore them – any ideas? | <urn:uuid:7c1fef94-8a1a-4a9a-ad94-45517b50d7da> | {
"date": "2020-01-20T11:32:21",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9796226620674133,
"score": 2.53125,
"token_count": 298,
"url": "https://blog.idrsolutions.com/2011/12/pdf-to-html5-conversion-creative-use-of-space-by-corel/"
} |
They may have the largest physical variety among all animal species on Earth, but dogs can still recognise one of their own over any other animal based on simple images of their faces.
Since their domestication somewhere between 15,000 and 100,000 years ago, dogs have been learning to use facial cues as an important part of their social communication. When interacting with us, dogs can read and use our facial expressions to gauge where our attention lies and sometimes what we're feeling. Studies have also shown that they're better than wolves and some primates at understanding the hints we give them about an object's whereabouts - particularly if it's a treat - by reading our eyes and head movements. Dogs also display a range of facial expressions themselves, which researchers believe are used for communicating with other dogs, whether it's to impart hostility, friendliness, fear, and so on.
Along with the ability to make and read facial expressions, another important part of being a social animal is recognising the face of your fellow species member, or conspecific, even when the other senses are masked. A number of studies have demonstrated the ability of certain animals to recognise their conspecifics based exclusively on visual cues, including Rhesus macaques, sheep, cows, and some birds and invertebrates.
Dogs also fall into this category, which is pretty impressive, considering the huge variety of breed combinations and morphological differences within this species. Breeds range in size from the biggest 100-kg Mastiffs to the smallest 1-kg Chihuahuas. Tails can be straight or curly, as can their coats, which can come in many colours, lengths and hair types. Ears can be floppy or pointy. Eyes can be obscured by fur or excess skin and mouths can be droopy or taut. There are now 400-500 recognised dog breeds around the world, and because dogs breed quickly, there's no sign that this morphological variety will slow down any time soon.
Knowing that dogs can identify a picture of another dog, two independent teams of researchers, one led by Anais Racca from he Department of Biological Sciences at the University of Lincoln in 2010 and the other by Sanni Somppi from the Faculty of Veterinary Medicine at the University of Helsinki in 2012, tested if dogs could recognise pictures of other dogs when also faced with pictures of humans and inanimate objects. While both confirmed that this was the case, the teams restricted their experiments to 24 pictures per category, and this, says Dominique Autier-Dérian from LEEC and National Veterinary School in Lyon, France, in a new Animal Cognition paper, is not enough. “Because of the small number of stimuli used, these studies could not take into account morphological species-specific diversity. In fact, there is more morphological diversity among breeds in domestic species compared to wild species."
So Autier-Dérian and his team put together a more comprehensive experiment to test whether dogs can recognise each other as a separate group, away from other animals, despite their incredible physical diversity. Nine dogs were selected (see profiles above) and routinely exposed to a large variety of dog, human and other non-dog species' faces, with the aim of better understanding how well they know their own kind.
The nine dogs were exposed to a pool of 3,000 pictures of different breeds, both pure and mixed, on one of two computer screens. On the other screen, a selection of 3,000 faces from 40 wild and domestic “non-dog species” including cows, cats, rabbits, birds, reptiles, wild felines and humans appeared*. The computer each would appear on was randomised, and the faces were scaled to take up 70% of the canvas for uniformity. They could be front-on, side-on, or turned slightly towards the viewer. Each dog ended up viewing more than 144 pairs of pictures randomly selected from the two pools, and never saw the same picture twice.
The dogs were trained to wait in a windowless “sitting area” where it would view the two computer screens. When two images appeared on the screens, the dog would be told “image!” from an instructor behind, prompting it to move towards one of the screens and place its paw on a tablet in front of it. The instructor would then say ‘‘place!/here!’, and the ’dog would retake its original sitting position to await the next pair of images. If the dog choose the face of another dog, it would receive a treat, indicating that the instructor wanted it to choose a dog’s face every time. If the dog made an incorrect choice, it would return to its sitting area empty-handed.
The researchers found that despite the huge diversity of dog breeds and non-dog species shown to these nine dogs, each one managed to successfully recognise which faces belonged to dogs and which faces didn't. Whether it was the face of a big, shaggy dog or a tiny, sleek one, the dogs managed over a number of different trials to lump them all into the same category, away from any of the other species.
“The fact that dogs are able to recognise their own species visually and that they have great olfactory discriminative capacities insures that social behavior and mating between highly morphologically different breeds is still potentially possible and therefore that, although humans have stretched Canis familiaris to its morphological limits, its biological entity has been preserved,” the researchers concluded.
What’s left to do now is to figure out what physical characteristics the dogs were using to distinguish the pictured dogs from the other species.
*The researchers note that this time, no faces of wolves or foxes were included.
Order my new book, Zombie Tits, Astronaut Fish and Other Weird Animals, here. | <urn:uuid:0c99b0b3-a3c4-48ae-a073-2a874e49375d> | {
"date": "2020-01-20T13:42:07",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9587803483009338,
"score": 3.65625,
"token_count": 1200,
"url": "https://blogs.scientificamerican.com/running-ponies/dogs-recognise-other-dogs-in-a-crowd/"
} |
What we want to do is to create a kind of shell which with very free form by pouring the concrete onto sandpile. After a test——concrete with different consistencies pouring onto the same sandpile and evaluating the performances, we are looking forward to finding the most suitable consistency for a concrete shell.
Firstly we made a test showing what can 10 gram water do in a default mix, we added 10 more gram water each consistency and poured them onto a slanted panel. They performed wide differences which totally beyond our imagination.
Then we began to deal with the main question. We made four different consistency (the diagram shows the exact figure) and poured them onto the sandpile, trying to made them flew freely and tolerating the overlapping part for better evaluation.
From the experiment on how concrete flow with different consistencies, we learned that viscosity did have great affect on how it shaped. And the amount of water decided concrete’s viscosity. Concrete of mixture 1 and mixture 2 flew quickly and hard to shape, after decreasing the water, it became easier to shape the shell. Therefore, for further development, concrete between mixture 3 and mixture 4 can be used to shape a shell, with appropriate flowability to extend and enough viscosity.
We took a triangle as a unit to build the formwork looking forward to creating a casting with screw texture.
We followed the given steps and default data to mix the concrete but it was too dry to drain through the coarse aggregate. We were wondering if the sand was big enough to let concrete drain through. So we decided to leave it right here and we will continue it after we find the way through the coming seminar course.
We firstly defined a 2cm*2cm grid, then tried to sew each chosen point and made this cover. Unfortunately the stirrer didn’t work, so we added 175 gram extra water to make it flowable. We poured concrete into fabric which we made some smocking to give it an amazing surface.
We poured concrete onto the cut plastic cups. After two days, we found it too soft due to the too much water, so the main question in this casting is the amount of the water.
Made by: Lancelot Coar
Materials: concrete, fabric
Process:The invisible forces (of tension and compression) that move through all material structures are in fact curvilinear in nature, contrary to the rectilinear forms they are often contained by. This project examines the ways in which tensile reinforcing might more accurately follow the complex, yet predictable, forms of tensile force-flow as opposed to the overly generalized linear assembly of steel rebar commonly used in these structures.
The work shows a multi-level column and slab construction in which a pre-tensioned structural fabric is pulled into a form that follows the force-flow within the structure. The concrete (modeled in plaster) is then poured within the fabric form work, allowing the hydrostatic pressure to generate the desired form.
Made by: Jamie North
Materials: concrete, recycled slag, smelting iron ore, plants
Process: The process begins by modelling the work on paper or in a program, then constructing a steel armature if needed and making the form mouldings, which are typically made from plywood or cardboard. Then the detailed mouldings are made from clay and the larger aggregates that will be exposed in the final sculpture. The mouldings are as negative sculpture, as the positive or “end” piece is determined by this crucial stage. Once this negative sculpture is completed, the concrete mix is poured in, vibrated and left to cure before being stripped. Final finishing involves scraping away the clay which is reminiscent of an archaeological process, as the material placements and decisions behind these are revealed. High pressure water is then used to clean away the remaining clay.
The plants positioned within the man-made pylons comfortably complement one another. The process which the concrete undergoes lends it an almost organic and aestheticised appearance, making it a suitable-looking object to support the growth of organic life. | <urn:uuid:561b7276-9daf-431d-916d-6e34009f7f75> | {
"date": "2020-01-20T11:26:32",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9396977424621582,
"score": 3.15625,
"token_count": 846,
"url": "https://breakingthemould2017.wordpress.com/category/ninglin-liu/"
} |
We’re getting better at earlier diagnosis, but more needs to be done. Find out about our research to help detect breast cancer earlier and accurately.
Our aim is that an increasing number of people will be diagnosed early and our improved understanding of different breast cancers will increase their chances of successful treatment.
As a result of our research, we understand more than ever about the earliest stages of breast cancer and how it develops. Through our pioneering health information and campaigns, we’ve worked to turn this knowledge into practical interventions and solutions for women facing the disease. Now, we’re working to ensure every woman receives the right diagnosis at the earliest opportunity.
By understanding the earliest changes in the development of breast cancer, we will make sure women are diagnosed early.
Our researchers are investigating the cellular processes that regulate the early development of normal breast tissue. In cancer, these processes are often defective, so understanding how they normally work will improve our understanding of the early changes that signal breast cancer. This could lead to new ways to detect the disease.
We must ensure the best methods are implemented to detect breast cancer at its earliest stages.
A new imaging technique called digital breast tomosynthesis (DBT) acts like a ‘3D mammogram’, providing 3D images of the breast. Our researchers will use cutting-edge computer modelling to develop a technique to spot areas of high breast density. This could eventually be incorporated into routine breast screening, enabling doctors to spot the signs of breast cancer earlier than is currently possible.
We need to ensure that the breast screening programme evolves to incorporate new evidence on the best ways to group people by risk.
Currently, women over 40 years with an increased risk of developing breast cancer because of a family history of the disease can be offered a yearly mammogram. But this is not available for women aged 35-39 considered to have a moderate or high risk of developing breast cancer. We funded a large-scale clinical trial which provided strong evidence that screening these women yearly would benefit them, by picking up tumours earlier. We hope that these results will help to inform future reviews of the services offered to women with a family history of breast cancer. | <urn:uuid:e25b9c3a-4af4-4f80-adbd-8dd23e232c13> | {
"date": "2020-01-20T12:13:33",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9498737454414368,
"score": 3.09375,
"token_count": 445,
"url": "https://breastcancernow.org/breast-cancer-research/early-detection-diagnosis"
} |
Íslendingasögur by Gilwellian – Árni Magnússon Institute
By Rebecca Merkelbach
University of Cambridge
“I’ve come to kill your monster!” exclaims Beowulf in the 2007 film version of the epic poem. But how do his suspicious Danish hosts know that this monstrously huge stranger is actually a hero searching for glory? And, by the same token, how do modern audiences with no prior knowledge of the Marvelverse know that the Incredible Hulk is a “good guy”? At least readers of the Icelandic sagas had an advantage: they were used to their heroes being monsters – at least part of the time.
Iceland’s medieval literature is rich in many regards: in Eddas and sagas, it tells us about early Scandinavia and its expanding world-view, ranging from the mythology of the North, the legends and heroes of the migration age, the Viking voyages and the settlement of Iceland all the way through to the coming of Christianity and the formation of kingdoms in Scandinavia.
It also tell us about monsters – for the literature of medieval Iceland is also rich in the paranormal. In mythology, gods and men fight against giants. In the sagas, humans battle the forces of disorder, the trolls and revenants – think a cross between a vampire and a zombie – that inhabit the wild mountains and highlands of Norway and Iceland. Or at least that is what, on the surface, appears to happen.
Trolls won’t always be trolls
Monstrosity, however, is never clear-cut. Because of their hybrid nature, monsters cannot easily be categorised – instead, they demand to be approached and read in a more nuanced way. Such a reading will soon lead to the realisation that not all monsters are created equal, that they do not all pose the same threat. For trolls are not always trolls.
In fact, the word “troll”, which we now understand to denote some kind of mountain-dwelling ogre, was used for a number of different kinds of figures: witches, the undead, berserkers, but also people who were larger or stronger or uglier than ordinary humans. Which leads us to the monstrous heroes of the medieval Icelandic family sagas, or Íslendingasögur.
Half monster, half hero
In these texts, we encounter characters that are both troll-like monster and human hero – that both threaten and defend society and that therefore draw our attention to the fact that the boundary between monstrosity and heroism is not only thin but also regularly crossed.
While some of the creatures that are referred to as “trolls” – especially revenants, but also witches and even berserkers – are unequivocally monstrous, the characters that occupy the most ambiguous position suspended between monstrosity and heroism are outlaws. These, however, are also the characters that have captured the Icelandic imagination the most: there are three sagas that scholars agree to be major outlaw stories, the sagas of Grettir Ásmundarson, Gísli Súrsson, and Hörðr Grímkelsson.
There are also some sagas that draw on similar narrative motifs to tell the story of men who are outlawed for at least parts of their lives, like the saga of the Sworn Brothers (Fóstbræðra saga) or the saga of the people of Kjalarnes (Kjalnesinga saga). All of these marginal heroes border not only on society, but also on that which one encounters when one leaves the social spaces behind: the monstrous.
This has less to do with their physical location in the “wild”, and more with the way they interact with society: when Hörðr goes raiding with his outlaw band, he becomes a threat to the local community. And such a threat to economic growth and social stability has to be removed. However, if these characters were only threatening, only monstrous, they would not have their own sagas. They are not only monsters: they are also heroes, defenders of the society they themselves threaten.
The story of Grettir “the Strong” Ásmundarson is a particularly interesting example of this. In the 19 years Grettir spends as an outlaw both in Norway and Iceland, he constantly moves back and forth between human society and isolation as a “monster”, never fully belonging to either. When he steals from the local farmers or simply sits on their property and refuses to let go, he becomes a monster in the eyes of society. But when he fights against trolls and revenants, performing tasks no one else would be able to perform, he becomes a guardian of the medieval Icelandic galaxy that consists of farms and sheep.
Myung Jung Kim / PA Archive/PA Images
In this duality, Grettir and Hörðr and other strong, troll-like men, are not too dissimilar from the monstrous heroes of the present day. Bruce Banner has clear anger management issues, but when he transforms into the Hulk, his strength enables him to perform amazing feats of heroism in defence of society. But the dual nature of his character can also make him turn against his friends and allies, just as Hörðr turns against his family when he wants to burn his own sister in her house.
This fluid continuity between monstrosity and heroism has been explored extensively in medieval literature: Beowulf or the Táin Bó Cúailnge, (the Cattle Raid of Cooley) – just like the Icelandic sagas – have their fair share of monstrous heroes. But it keeps fascinating us even today.
Shows such as Heroes have added a new shade to this exploration in recent years. Currently, even the humanness of zombies is on the cultural agenda in Warm Bodies or iZombie. Let us hope that, as this exploration continues, as we become more aware of the continuity between the monstrous and the human, we will eventually realise that, often, “the other” is just another “self”. | <urn:uuid:3f31be26-89aa-4356-8109-8f4de0493eb1> | {
"date": "2020-01-20T12:21:09",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.962279736995697,
"score": 2.546875,
"token_count": 1273,
"url": "https://brewminate.com/outlaws-trolls-and-berserkers-meet-the-hero-monsters-of-the-icelandic-sagas/"
} |
A Phoenician-Punic ship from a relief carving on a 2nd century CE sarcophagus / Photo by NMB, Wikimedia Commons
The Phoenicians established themselves as one of the greatest trading powers in the ancient world.
By Mark Cartwright / 04.01.2016
The Phoenicians, based on a narrow coastal strip of the Levant, put their excellent seafaring skills to good use and created a network of colonies and trade centres across the ancient Mediterranean. Their major trade routes were by sea to the Greek islands, across southern Europe, down the Atlantic coast of Africa, and up to ancient Britain. In addition, Arabia and India were reached via the Red Sea, and vast areas of Western Asia were connected to the homeland via land routes where goods were transported by caravan. By the 9th century BCE, the Phoenicians had established themselves as one of the greatest trading powers in the ancient world.
Map of Phoenicia and its trade routes (click image to enlarge) / Image by Akigka, Wikimedia Commons
Trade and the search for valuable commodities necessitated the establishment of permanent trading posts and, as the Phoenician ships generally sailed close to the coast and only in daytime, regular way-stations too. These outposts became more firmly established in order to control the trade in specific commodities available at that specific site. In time, these developed further to become full colonies so that a permanent Phoenician influence eventually extended around the whole coastline of the ancient Mediterranean and the Red Sea. Their broad-bottomed single-sail cargo ships transported goods from Lebanon to the Atlantic coast of Africa, Britain, and even the Canary Islands, and brought goods back in the opposite direction, stopping at trade centres anywhere else between. Nor was trade restricted to sea routes as Phoenician caravans also operated throughout Western Asia tapping into well-established trading zones such as Mesopotamia and India.
Phoenician sea trade can, therefore, be divided into that for its colonies and that with fellow trading civilizations. Consequently, the Phoenicians not only imported what they needed and exported what they themselves cultivated and manufactured but they could also act as middlemen traders transporting goods such as papyrus, textiles, metals, and spices between the many civilizations with whom they had contact. They could thus make enormous gains by selling a commodity with a low value such as oil or pottery for another such as tin or silver which was not itself valued by its producers but could fetch enormous prices elsewhere. Trading Phoenicians appear in all manner of ancient sources, from Mesopotamian reliefs to the works of Homer and Herodotus, from Egyptian tomb art to the Book of Ezekiel in the Bible. The Phoenicians were the equivalent of the international haulage trucks of today, and just as ubiquitous.
Methods of Exchange
As with many other ancient civilizations the Phoenicians traded goods using a variety of methods. Prestige goods could be exchanged as reciprocal gifts but these could be more than mutual tokens of goodwill as, by bestowing on the receiver an obligation, they were a method to initiate trade partnerships. Luxury goods given as gifts may also have been a deliberate attempt by the Phoenicians to create a demand for more such items and help the Phoenicians acquire the local resources they coveted.
Goods could be collected as a form of tribute in return for military protection or under compulsion. These were then stored in large quantities and then redistributed either locally or traded elsewhere. Goods could be bartered for and exchanged in kind on the spot. Alternatively, and perhaps the most common method employed by the Phoenicians, goods could be bought or sold in a relatively controlled manner where quantities and prices were fixed beforehand through the drawing up of trade agreements and treaties controlled by the state. The exchange value of goods was, therefore, fixed and so coinage was unnecessary, which is not to say there was no system of written arbitrary values and credit arrangements. The Phoenicians may not have produced coinage precisely because their trade was truly international and they had no use for coins which could not be used far from the place of their mint.
Completely free trade where prices fluctuate due to supply and demand is a mechanism thought by some historians not to have been in operation prior to the 4th century BCE but the view is much debated amongst scholars. Phoenician trade was likely, then, carried out by state officials working on commission but also by consortiums of traders closely associated with royal households. These latter would have been high-ranking nobles, as described in Isaiah 23:8, “Tyre, the crowning city, whose merchants are princes, whose traffickers are the honourable of the earth.” Perhaps from around the 8th century BCE the quantity of trade carried out by private merchants increased and the direct intervention of the state was reduced, again, the point is still subject to academic debate. The trading of goods most often took place in state-sanctioned trade centres which were generally recognised as neutral by the different regional states. The Phoenician city of Tyre is a classic example.
Exported Goods – Wood
Phoenicia was a mere coastal strip backed by mountains. Despite the paucity of land available they did manage to produce cereals through irrigation of the arable terrain and cultivate on a limited scale such foodstuffs as olives, figs, dates, walnuts, almonds, pomegranates, plums, apricots, melons, pumpkins, cucumbers, and wine. However, the Phoenicians were most noted as exporters of wood. This commodity came from their abundant cedar and fir forests and had been traded since the beginning of recorded history. The cedar is a tall tree with a thick girth, making it ideal for timber. It also has the additional benefit of possessing an aromatic odour. Mesopotamia and Egypt were the most notable customers, the former receiving their trunks via caravan up to the Euphrates River while ships carried the wood to the African coast. The trade is recorded in reliefs of Sargon II and an inscription of Nebuchadnezzar. According to the historian George Rawlinson, Phoenician cedar wood was used by King Solomon for his celebrated temple, by Herod in Zerubbabel’s Temple, and by the Ephesians for the roof of the Temple of Artemis at Ephesus, one of the Seven Wonders of the Ancient World.
The other famous Phoenician export was textiles which used wool, linen yarn, cotton, and later, silk. Wool (sheep and goat) probably dominated and came from Damascus and Arabia. Linen yarn was imported from Egypt while silk came from Persia. Taking these raw materials, the Phoenicians transformed them into uniquely colourful items, especially clothes and carpets. Fine multi-coloured clothing from Phoenicia is referenced both in Homer – where Paris gives Helen a gift of the cloth prior to whisking her off to Troy – and in Egyptian art when depicting Phoenicians from Sidon. The dyed fabrics were then exported back again, for example, to Memphis where the Phoenicians even had their own quarter in the city.
Cloth dyed purple (actually shades ranging from pink to violet) using fluid from the Murex trunculus, Purpura lapillus, Helix ianthina, and especially the Murex brandaris shellfish brought the Phoenicians fame throughout the ancient world. Living in relatively deep water, these shell-fish were caught in baited traps suspended from floats. The dye was then extracted from thousands of putrefied shellfish left to bake in the sun. So popular were these textiles that vast deposits of the shells have been excavated on the outskirts of Sidon and Tyre and the species was all but driven to extinction along the coasts of Phoenicia. The highest quality cloth was known as Dibapha, meaning ‘twice dipped’ in the purple dye. The Phoenicians not only exported the dyed cloth but also the process of extracting the dye, as indicated by the shell deposits found at Phoenician colonies across the Mediterranean. Besides their vivid colours, Phoenician textiles were also famous for their fine embroidery. Popular designs included repeated motifs such as scarabs, rosettes, winged globes, lotus blossoms, and mythical monsters.
Two Phoenician coloured glass vessels. 5th-3rd century BCE. (Museum kunst Palast, Dusseldorf) / Photo by Remi Mathis, Wikimedia Commons
The Phoenicians also traded glassware. The Egyptians had already been long-time producers but from the 7th century BCE the Phoenicians began to produce transparent glass, as opposed to merely opaque glassware. Important centres of glass production were Sidon, Tyre, and Sarepta. Transparent glass was used to manufacture mirrors, plates, and drinking glasses but the Phoenicians seemed to have appreciated semi-transparent coloured glass (blue, yellow, green, and brown) for their more elaborate productions as well as for jewellery and small plaques which were sewn onto clothing. Phoenician glassware, especially in the form of small perfume bottles, has been found as far afield as Cyprus, Sardinia, and Rhodes.
The Phoenicians imported metals, especially copper from Cyprus, silver and iron from Spain, and gold from Ethiopia (and possibly Anatolia). This raw material was transformed into ornate vessels and art objects in Phoenician workshops and then exported. Tin (from Britain), lead (Scilly Isles and Spain), and brassware were also traded, the latter principally coming from Spain. Ivory was imported from either Punt or India, as was ebony, both coming to Phoenicia via Arabia. Amber came either from the Baltic or Adriatic coast and was used in Phoenician jewellery. Embroidered linen and grain were imported from Egypt and fine, worked cloth from Mesopotamia. Grain, barley, honey, and oak timber used for oars on Phoenician ships, came from Palestine.
Phoenician markets also traded in slaves (from Cilicia and Phrygia but also captured by the Phoenicians themselves), sheep (Arabia), horses and mules (Armenia), goats, wool (Damascus and Arabia), coral, perfumes (Judah and Israel), agate, and precious stones such as emeralds (from Syria and Sheba). Spices came from the Arabian peninsula (some coming from distant India) and included cinnamon, calamus, cassia, ladanum, frankincense, and myrrh.
From the 7th century BCE the Phoenicians’ trade network was eclipsed by the efforts of one of its most successful colonies – Carthage, by the Greeks, and then the Romans. But the Phoenicians had been the first Mediterranean trading superpower, and their early dominance led to those empires which followed adopting similar trading practices and even adopting Phoenician names for certain exotic goods from distant lands. The Phoenicians had dared to sail beyond the horizon and transport commodities to where they were most prized. As the prophet Isaiah (23:2) stated, “you merchants of Sidon, whose goods travelled over the sea, over wide oceans.”
- Aubet, M.E. The Phoenicians and the West. (Cambridge University Press, 2001).
- Kenrick, J. Phoenicia. (Forgotten Books, 2015).
- Moscati, S. The World of the Phoenicians Paperback. (Weidenfeld & Nicolson History, 2016).
- Rawlinson, G. History of Phoenicia. (CreateSpace Independent Publishing Platform, 2014).
Originally published by the Ancient History Encyclopedia under a Creative Commons: Attribution-NonCommercial-ShareAlike 3.0 Unported license. | <urn:uuid:4ec7f143-100c-41eb-86f0-070a2f67ff40> | {
"date": "2020-01-20T11:20:21",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9716148972511292,
"score": 4.28125,
"token_count": 2456,
"url": "https://brewminate.com/trade-in-the-ancient-phoenician-world/"
} |
Broadband is a faster way of accessing the internet. It enables users enjoy faster uploads ad downloads which was impossible with dial-up connections. Besides, broadband lets users enjoy landline and internet connections by sending information to and from your computer via electrical signals using satellite transmission, plastic fibres, glass or copper telephone wires.
There are different types of broadband high-speed transmission technologies like: Cable Modem: Cable Modem provides broadband through coaxial cables that deliver sound and pictures to your television. This type of broadband is usually an external device with two connections. One connection is to the computer, and the other one to the cable wall outlet, and provides a speed of up to 1.5Mbps and above.
Digital Subscriber Line (DSL): This is a wireline transmission technology that is more efficient and faster in transmitting data compared to traditional copper telephone wires. It can transmit data at speeds ranging from hundreds to millions of bits per second, depending on how far you are located from the telephone company.
Fibre: This is a hundred times faster than cable and DSL modem. It uses fibre optic technology which transforms the electrical signal transmitting data to light which is then sent through a glass fibre with about a human hair’s diameter. Satellite: This is a type of wireless broadband that provides internet connectivity to remote or sparsely populated areas and works just like satellite TV and telephone.
Getting broadband is very simple. All you need to do is identify a suitable service provider and follow the application process. However, it is advised to do some research about the different types of broadband available and what they offer. Also, read reviews on different service providers to find the best service providers. Lastly, compare different package deals to find out which one is best for your internet needs. It also helps getting recommendations from friends and family members as it saves time that is otherwise spent on doing research. You need to know your internet needs before choosing your broadband to choose a broadband with suitable speed. For instance, if you need the internet connection for online gaming or streaming videos, you'd be better off with a fibre optic broadband as it is very fast and reliable. However, if you need broadband for basic internet needs like sending and receiving emails, DSL or cable broadband is enough.
Traffic management is a technique used by broadband service providers to restrict, prioritise and ration the usage of connections and networks by broadband customers. It ensures the smooth running of the service even when many people simultaneously use the internet. The types of traffic that are prioritised differ from one provider to another. However, providers usually prioritise things like video streaming to keep the videos from cutting out or buffering. They give less priority to traffic that does not need speed such as sending emails and downloading music and videos, which is kept in the regular lanes in the peak hours of the day. Nowadays, a lot of broadband service providers do not manage their traffic, which is what you need to check. This is important because poor traffic management can lead to a poor internet connection where it’s difficult doing simple tasks like sending emails. Do some research to identify service providers that don't practice traffic management and provide affordably priced services.
A lot of people do not switch providers because they do not know its many benefits. First and foremost, you can save a lot of money if you choose a limited-time or exclusive deal with the new provider. The other benefit is a faster internet connection, which is why many people switch providers. Switching providers also gives you additional benefits like more TV channels, free calls and higher usage allowance. The choice to switch providers depends on your needs. Do you need faster speed than what you are getting from your current service provider? Do you need additional features not offered in your broadband deal? If your answer to these questions is yes, you probably need to switch providers. The best thing about switching providers is that you get a package that suits your internet needs. Keep yourself updated about different package deals as service providers are constantly coming up with attractive deals to stay ahead of the competition.
Broadband service providers offer free email addresses to all their new customers. If you wonder what happens to the email address when you cancel your current contract and switch to another provider, it depends on your current service provider. While some delete the email address permanently once the contract is terminated, others like Plusnet, Virgin Media, Sky and BT let you keep the email address but they charge for it. It is very important to find out what happens to your email address when you switch providers before terminating your contract. You risk losing all your important messages and email accounts linked to the email address if your service provider does not allow you to keep the email address. Before you terminate the contract, make sure you backup all your important messages. However, it’s not needed if the service provider allows you to keep the email address. You just have to inform them early enough before you switch.
Bundling is where you get most of your home communication services from one service provider and is very advantageous. It not only makes your life easier but also affordable as it saves you up to £500 compared to getting separate deals. Besides, with bundling you deal with only one service provider, meaning you get only one bill at the end of the month. You also needn’t contact numerous service providers when you experience problems with the services. However, think carefully before you get a bundle deal. Do you really need all its services? If not, you'd be better off getting a single service. However, you should take the bundle offer if you need all the services, as it’s more affordable compared to getting separate services. Make sure you compare different service providers' bundle deals to find out which one meets your needs and budget the best.
There are several things you need to get broadband like: Phone line: Phone lines are single -circuits found in telephone communication systems, used to deliver DSL cable services and telephone services to premises. Therefore, if you intend to get broadband and do not have a phone line, you need to get one especially if you plan at getting DSL broadband. Microfilter: A microfilter is a device that lets you simultaneously use your broadband and phone services without any interruption. You will experience a lot of noise in your phone line without it. So make sure you have one if you plan to get broadband for your home or business. Router: Routers provide high-speed internet access for two or more computers and are important if you plan to use the internet on a number of computers. It lets each user have an easy and fast connection without signal interference.
ADSL broadband is currently the most popular UK broadband which transmits data through the copper wires in your phone line at a speed of up to 17Mbps. It is great for users with basic internet needs such as sending and receiving emails and other tasks that do not require a very fast internet connection. Most people prefer it because it is very affordable. However, it may become obsolete in the near future because of the increased popularity of fibre optic or superfast broadband which provides a hundred times faster internet connection compared to ADSL broadband. Besides, they are best for remote and sparsely populated areas. The only downside is that this superfast broadband is quite expensive. However, improvements are being made to make it more affordable for and accessible to all UK residents.
Fibre broadband is a new and advanced mode of internet delivery created as a solution for the challenges of telephone lines. Since telephone lines were not created with the internet in mind, transmitting internet data through it is challenging. This causes signal interference which lowers the internet speed. Fibre optic broadband transmits the electrical signals to light and transmits the data through glass fibres almost the size of a human strand. This kind of data transmission provides a faster internet connection without signal interference. Besides, it lets people in remote and sparsely populated areas easily access the internet since there is no need to be close to a BT exchange to enjoy this broadband. Fibre broadband is expected to replace the most common UK broadband; ADSL.
A lot of customers are frustrated and confused about internet speeds. Sadly, the 'up to' speed that internet service providers advertise is not what you get for the following reasons. First and foremost, the speed you receive depends on how close you are to the telephone exchange. If you are close to the telephone exchange, you will receive a faster internet speed compared to being far from the telephone exchange. The other reason for not getting the advertised speed is the number of people getting internet services from the same provider. The more the people, the slower the internet speed. Last but not least, your internet connection may be affected by the number of devices connected to the internet. Fibre broadband does not have these challenges, which is why many UK people are switching to fibre optic broadband. | <urn:uuid:9b844b4b-29ee-49d5-89ac-e74ee4eb628e> | {
"date": "2020-01-20T12:45:24",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9496739506721497,
"score": 3.078125,
"token_count": 1801,
"url": "https://broadbandcompareuk.com/"
} |
Dental health is critical at every stage of life. Many people don’t realize that our needs change as our bodies do– whether we are young children cutting our first teeth, teenagers in braces, experiencing a pregnancy, or entering retirement. Each important stage of our lives brings with it some dental demands!
Entering our golden years, in particular, is an extremely important time in everyone’s life– and one that requires special dental attention.
Your mouth in its golden years
Not too long ago, it was a common idea that people simply lost their teeth with age (and sometimes earlier than that!) But in this day and age we can trust that as you grow wiser, more worldly, and enter into retirement– your relaxed smile will feature a complete set of teeth.
However there are some important changes that older men and women should be aware of when it comes to oral health.
- Menopause, which usually occurs around the age of 50, marks a significant drop in estrogen, which can affect your teeth. Postmenopausal women are at a higher risk for gum disease than they were previously. While studies are still underway, health professionals recommend staying very strict about regular dental checkups around and following menopause to ensure your best gum health.
- As we age, the nerves in our teeth age too– they become smaller and less sensitive. The outcome of this is that we can’t feel the discomfort associated with oral health problems like gum disease or cavities– pain that earlier in our lives would have been noticed quickly. For this reason, again, extremely regular and perhaps more frequent visits to the dentist are the key to staying on top of any health problems that may arise.
- Unfortunately, aging can sometimes herald health conditions that we didn’t experience when we were younger. Diabetes and cardiovascular diseases are just two health conditions that can make a huge impact on oral health, particularly gum health. If you have a change in your health status, be sure to tell our doctors at your next appointment!
The tips for keeping your mouth healthy as you age may sound familiar to you:
- Brush twice a day, preferably with an electric toothbrush.
- Use floss or an interdental cleaner at least once a day.
- Maintain a healthy diet– your body needs vitamins and minerals to keep your mouth healthy!
- And of course, don’t take up smoking as your new hobby when you retire– it’s terrible for teeth, gums, and your breath. Try sailing instead.
Some of our tips for keeping your mouth healthy may be a little new:
- If you wear dentures, be sure to clean them daily, and to take them out of your mouth for a minimum of four hours once a day.
- Make sure your dentures fit well. Our clinic is the most trusted source of dentures in Burns, Oregon, and we can help you with a denture choice that fits your needs– and your mouth.
Do you have more questions about how oral health care changes with age? Please bring them with you to your next appointment with Burns Dental Group– we look forward to seeing you! | <urn:uuid:9c58b5c2-ea97-4b60-9fc0-0a6e7b9ac532> | {
"date": "2020-01-20T12:49:10",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9617258906364441,
"score": 2.515625,
"token_count": 651,
"url": "https://burnsdentalgroup.com/aging-oral-health/"
} |
This column aims to build on and extend the field's understandings of the nature of ethics and equity in computing. Specifically, we argue that issues related to systems of power, which are often absent from conversations around ethics in computing, must be brought to the foreground in K-16 computing education. To this end, we argue for a justice-centered pedagogy5 that centers power by explicitly acknowledging the ethical and political dimensions of computation and builds learning conditions so that everyone—including, but not limited to, students on computer science (CS) or engineering pathways—can understand, analyze, critique, and reimagine the technologies that shape everyday lives.
A power-conscious approach to ethics in computing highlights the socio-political and sociocultural contexts in which technologies are developed and deployed. To respond to the highly complex sociotechnical problems of the 21st century and beyond, future computer scientists and engineers need educational opportunities that prepare them to understand and care about the far-reaching ethical and sociopolitical implications of new technologies. Yet, we must also fundamentally rethink who computing education is for. Serious efforts should be made at the K-12 and undergraduate levels to make the knowledge, skills, and tools to critically examine the relationships between power, ethics, and technology available to all. Given rapidly evolving innovations and contexts of computing, we argue for two changes in our approach to ethics and equity in K-16 computing education:
No entries found | <urn:uuid:7b167e23-6244-46e4-ad54-92a1a7068d3c> | {
"date": "2020-01-20T13:09:31",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9362961649894714,
"score": 2.921875,
"token_count": 291,
"url": "https://cacm.acm.org/opinion/articles/234921-its-about-power/abstract"
} |
Relatively low levels of investments from major funders, no recent acceleration in funding observed, and a decline in new commitments to funding since 2011: this is the main – and somehow discouraging – picture of investments for childhood cancer research according to a systematic analysis published in The Lancet Oncology. Despite the efforts by the WHO Global Initiative for Childhood Cancer launched in September 2018, these cancers are still missing from many global health agendas.
Moreover, disparities in access and quality of care are also contributing to the great variation in outcomes observed worldwide.
“Childhood cancers caused an estimated 75,000 deaths in children aged 0–14 years in 2018, of which 90% were in low-income and middle-income countries” said Eva M Loucaides, University College London Hospital, and colleagues, who analysed the pattern of funding for childhood cancer research as a proxy for research activity in the field. “Judicious investment in research is particularly urgent” they added.
Using data from an interlinked research information system (Dimension database, provided by Digital Science), Loucaides and colleagues systematically analysed 3,414 grants from 115 funders across 35 countries between 2008 and 2016, categorized by different criteria like tumour type, funding source and research focus. During the study period, a total of 2 billion US$ was invested in childhood cancer research, 37.9% for general childhood cancer, 22% for leukaemias and 16.2% for Central Nervous System tumours. More than two-thirds of the whole budget were awarded to (77%) or came from (78%) institutions based in the USA.
This is consistent with the USA’s top global position in supporting health research and development in most domains, and according to the authors suggests that global childhood cancer research is vulnerable to changes in the USA’s overall national spending on research.
Finally, data on the distributions of funding by study type mirrored the bottleneck in bringing discoveries from the bench to the bedside, with preclinical research receiving almost 60% of the whole available funding, compared to lower investments in clinical trials (25.7%) and health-care delivery research (5.5%). “The momentum for universal health coverage for children must be met with major new public and philanthropic commitments in global childhood cancer research” researchers conclude, asking for full transparency of all funders and their contributions in the context of a global strategy on childhood cancer. | <urn:uuid:7ea4c5ec-16c7-4c00-8797-487b71b3715d> | {
"date": "2020-01-20T11:11:09",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9404071569442749,
"score": 2.703125,
"token_count": 496,
"url": "https://cancerworld.net/news/investment-in-childhood-cancer-research-is-lagging-behind/"
} |
As the fall season of sports winds down, the winter sports season will soon be here. That means the return of high school wrestling season. As a sports medicine doctor, we often get the job of doing “skin checks” for wrestling meets along with the athletic trainer. This means checking the skin all over for any signs of infection or fungus that could easily be transmitted to other wrestlers and equipment. It is an important job because skin infections can travel from wrestler to wrestler very easily with the whole team quickly becoming infected. This is something that no trainer, parent or athlete wants to happen.
Why do wrestlers get rashes more often than in other sports? They have a lot more skin-to-skin contact than other sports! During a match they are almost constantly in contact with another player’s skin and the mats. They might wrestle several different people in tournaments increasing exposure even more.
Common Wrestling Skin Infections
What are some common infections that wrestlers often get? Two of the most common are ringworm and herpes. Ringworm is a fungus (the fancy name is tinea corporis if it is on your body, tinea capitis if it is on your head) that creates a scaly, circle-shaped rash. It requires a cream applied a few times a day if it is on your body or a medicine by mouth if it is on your head. Herpes is a virus—along the same lines as what causes cold sores. It creates vesicles (fluid-filled spots) that break open and cause red areas on the skin. The first time an athlete gets it, it can cause fevers and flu-like symptoms. It requires a medicine by mouth and can keep coming back year after year.
Prevention of Skin Infections
Can these rashes be prevented? There are definitely many things that can be done on both an individual and a team level to keep these wrestlers healthy and out on the mats.
- Good hygiene! Wrestlers should ideally shower after each practice or meet. Clothes should also be washed after each practice or meet as well.
- No sharing! Wrestlers should never share towels, razors and soap in the showers. This allows for a fast spread of germs.
- Keep equipment clean: Mats should be cleaned and disinfected before and after use
- When in doubt, check it out: Any area of concern should be checked out by a doctor or trainer ASAP to ensure early detection and treatment.
Following these guidelines can keep your wrestler healthy and out on the mat. Covering or avoiding going to the doctor can sometimes lead to long term consequences in the case of certain rashes. Better to get it checked out and treated early. | <urn:uuid:b6c5fff1-c9af-48bb-b17d-2bae289f14ee> | {
"date": "2020-01-20T13:25:02",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9504667520523071,
"score": 2.734375,
"token_count": 554,
"url": "https://childrensmd.org/browse-by-age-group/teens/common-wrestling-skin-infections/"
} |
Popular Music Theory Workbook Grade 7
The Rockschool Grade 7 Theory Workbook is the ideal preparation for your Grade 7 exam, containing example questions and a full specimen paper. Grade 7 exams earn UCAS points, and include advanced time signatures, compound intervals, modes and scores with eight instruments.
Rockschool's Popular Music Theory Syllabus is regulated by Ofqual and offers UCAS points at Grades 6, 7 and 8.
The popular music theory workbooks are only available in hard copy format. Learn more about your purchasing options
Download Model Answers
* The download includes model answers to help you prepare for your theory exam. Learn more.
|Workbook Model Answers PDF Sample Answers||£3.99||Add to Cart|
|Additional Sample Papers PDF Additional Sample Papers||£3.99||Add to Cart|
The Rockschool Popular Music Theory Workbook Grade 7 is the ideal preparation for students taking Rockschool's new Grade 7 theory exam. Practise each section of your Rockschool Popular Music Theory exam in isolation, and then study a specimen paper from the Grade 7 exam. Use your Grade 7 Workbook alongside the accompanying Popular Music Theory Guidebook (Grades Debut–5).
Your Grade 7 Workbook includes sample questions from each of the following sections of your theory exam:
There is no errata for this book. | <urn:uuid:33580450-beae-40dc-9eca-87e97abf320d> | {
"date": "2020-01-20T12:52:48",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8415367603302002,
"score": 2.96875,
"token_count": 278,
"url": "https://cloud.rslawards.com/shop/popular-music-theory/workbooks/grade-seven"
} |
This blog was set up for Tzvi Pittinsky and Sue Waters presentation on Crowdsourcing ISTE: A Dynamic Model for Collaboration Inside and Outside the Classroom for ISTE 2015.
We’ve now presented our session for ISTE 2015 and the purpose of this post is to explain what was covered in the presentation — so the learning can continue outside the session.
Throughout the presentation we tried to inspire educators with different ideas, and approaches, they might like to try with their students or for their personal learning.
— Tarah Sawyer (@Tarah_Sawyer) June 29, 2015
While we were waiting to begin…
Before the session started Tzvi had this blog post displaying at the front of the room with some questions for participants to share their reflections on by posting by email to the blog and The Empire Strikes Back Uncut: Full Movie playing.
Tzvi did this for a few reasons including:
- Show how easy it is to use posting by email to the blog.
- Provide a real example of crowdsourcing by playing a movie created by fans. Star Wars Uncut is a crowdsourced fan mashup remake of original Star wars movies. Each fan created 15 seconds of film which were used to create The Empire Strikes Back Uncut: Full Movie playing. You can read more about the Project here.
I’ve embedded the video below for those that would like to watch it here!
Post by email
You can check out all the posts sent by post by email here! Many of the reflections are short because it was more about providing an opportunity for participants to see how easy it was to publish posts using email as opposed to adding some one as a user to the blog.
Post by email can be set up to moderate all posts submitted so the posts are only published once checked by a teacher.
Below is the quick email I sent to demonstrate how it works:
The subject of the email is used as the title of the post and the body is the post’s contents.
Our First Slides
We used two different slides during the presentation.
Here’s the first slides used with a summary of what was covered below the slides.
What is Crowdsourcing?
Tzvi started off by explaining that crowdsourcing is where information, input on a task or project is done by a group of people and often involves the use of the Internet.
He provided the following two examples of crowdsourcing that participants were more likely to be aware of:
- Wikipedia is a great example of crowdsourcing. An aspect we didn’t cover is how educators can run their own Wikipedia editing assignments with students (learn more here).
- Waze is a crowdsourced traffic and navigation app that provides real time traffic and road information. Waze is used widely in USA but I’m not aware of many Australians using it (or being aware of it — perhaps related to our stricter smartphone regulations in cars?)
How We Both Connected Through Crowdsourcing
Inspiration for our presentation developed from the relationship we formed while crowd sourcing notes from the ISTE 2014 conference. Tzvi started crowdsourcing notes and resources being shared at ISTE 2014 into a Google spreadsheet when a friend of his asked if he could share his notes from sessions he attended with her as she wasn’t able to attend ISTE 2014.
Tzvi thought rather than just share his own reflections, and notes, with one individual; why not share his notes with everyone while also inviting others to share their own resources.
I wasn’t at ISTE 2014 but had decided to learn how much as I could get out of ISTE from afar by being #NOTAtISTE using a range of different strategies — one of which involved curating the best information and content shared during the conference into the ISTE Insights Flipboard magazine with the help of Jeffrey See. Together Jeffrey and I curated over 936 articles shared during ISTE 2014.
While curating articles into the ISTE Insights Flipboard magazine I saw requests to add to Tzvi’s Google Spreadsheet being shared. It made logical sense for me to add links to his Google spreadsheet while curating my Flipboard magazine since I was at home on a computer which is faster and easier compared to those at the conference.
Tips for using Google Spreadsheets
Tzvi provided two very important tips for using Google Spreadsheets with students:
- If you are using a Google Apps account make sure you edit the Sharing options to allow anyone to view the document and change the access to Edit so they can enter the information.
- Make the students aware that you are able to review Revision History to see how much they contributed (and learn how to use Revision history).
You’ll see screenshots of both these tips in the Slides.
Next I showed how I use Flipboard to follow hashtags and curate content into Flipboard magazines. Before sharing we asked participants how many of them used Flipboard. Only one participant used Flipboard to create Flipboard magazines.
Flipboard was originally designed as a social network aggregation, magazine-format app for iPad in 2010. It is now the most popular of the magazine-like content aggregator apps for iOS, Android, Kindle and Nook.
Flipboard’s strength is you are able to bring your social networks such as Facebook, Twitter, Instagram, Google+, LinkedIn into one location alongside your favorite news sources and anything else you like to read, or watch (like YouTube) – all while making it easily to share your favorite content with your social networks and enabling you to easily curate your favorite content into Flipboard magazine(s).
For the demonstration I showed how following the twitter search for periscope #ISTE2015 in my Flipboard accounts allows me to quickly find the latest Periscope.
It’s as simple as:
1. Search for periscope #iste2015
2. Tap on Social network results.
3. Tap on Tweets mentioning “periscope #iste2015″
4. Tap on Follow.
5. Tapping on a Periscope link opens the live or recorded broadcast in the Periscope app on my mobile device.
6. Tapping on the + sign loads the Flipboard Magazine option where you can add a link or article to a magazine.
To curate ISTE Insights Flipboard magazine I follow the hashtags #ISTE2015 and #NotAtISTE15 in my Flipboard account.
Thanks to Marcelle McGhee for attending the session and answering any follow up Flipboard questions!
I demonstrated following Periscope tweets in Flipboard to explain how important Periscope was for participants that weren’t able to attend.
Periscope is a live streaming app for iOS and Android purchased by Twitter in March, 2015. Periscope allows users to transmit live to your Periscope and Twitter followers via a mobile device; and whoever is watching is able to comment and ask questions.
You can also watch Periscope broadcasts in your web browser, but can’t comment, by clicking on a link to a broadcast. You can watch the broadcast recording for up to 24 hours after it is recorded if you miss the live broadcast.
Benefit of using Periscope for ISTE is if the live broadcast you are watching stops you can switch over to another Periscope. For example, I was able to watch Soledad O’Brian’s keynote live at 7 AM in Australia by switching to a new periscope when I lost the live broadcast.
Read Tony Vincent’s Live Periscope Broadcasts from ISTE 2015 to learn more about Periscope. Tony will be uploading his best broadcasts from ISTE 2015 to YouTube, and embedding them at the bottom of his post, as replays are only available for 24 hours after the live broadcast.
Shout out to Jeremy King for Periscoping some of our session!
— Sue Waters (@suewaters) June 29, 2015
Our Next Slides
Tom Barrett began his series of using Google presentations to crowdsource ideas about the uses of different tools for the classroom in November 2007 — starting with One idea, one slide, one image. Make sure you check out Tom Barrett’s series if you haven’t seen his Interesting Ways series.
— Kharima Richards (@Kharima4) June 29, 2015
Thanks to everyone who help contribute their ideas as a slide!
Thanks for everyone who attended our presentations at #ISTE2015 and remotely via #NotAtISTE15! We appreciated everyone’s support. Huge thanks to Tzvi for inviting me to present with him remotely!
— Kharima Richards (@Kharima4) June 29, 2015
Please leave a comment below if you have any questions or want to share your advice/tips on how to use crowdsourcing in the classroom. | <urn:uuid:fc52e596-81f6-473e-a9bf-c5c861f96e67> | {
"date": "2020-01-20T12:53:58",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9442114233970642,
"score": 3.4375,
"token_count": 1851,
"url": "https://crowdsourcing.edublogs.org/author/supersue/"
} |
BananAppeal is half the size as other small anise-trees, forming a 3-4' tall by 3-4' wide, round shrub. So this one has a different shape, being a lower mound, rather than an upright-oval form like FLA Sunshine.
Small anise-tree grows wild in moist, woodland soils, but this species transitions well to typical home-garden and landscape conditions (provide some irrigation during times of bad drought).
We don't know why the common name is "anise-tree" when it's clearly a shrub; sometimes a large shrub, but a shrub. Even though the common name is small anise-tree, we're asked for yellow anise-tree when people are looking for the yellow-leaved types, so we've taken to calling it that too.
Yellow anise-trees are great for a shadowy, moist corners of your garden, but BananAppeal has the reputation for being more sun tolerant and resistant to the yellow leaves bleaching out in full sun exposure. I have not experience that myself - we do see leaf bleaching, but, in truth, I don't mind it at all. Sunlight brings out the real yellow, even though it's a slightly bleached real yellow. In shade the leaves are chartreuse.
BananAppeal and FLA Sunshine are similar, but different. Let us know if you need help considering which one is best for your garden. Both bring unrivaled glow and cheer to winter gardens, dark moist garden corners, and gray days.
Thank you First Editions® for another terrific shrub. We've seen it mistakenly called "Banana Appeal", but the trademarked name is BananAppeal.
small anise-tree, Ocala yellow-star
USDA Hardiness Zones
- Winter: yellow
- Spring: yellow
- Summer: yellow
- Fall: yellow
Fall Leaf Color Quality
evergreen and maintains pretty color in the cold
Soil Moisture Requirements
Soil pH Requirements
acid to neutral
full shade, morning sun only
To Make It Thrive
plenty of water and shade | <urn:uuid:783f02dc-a5e2-4d93-a729-1345d6e440c1> | {
"date": "2020-01-20T11:41:00",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9275265336036682,
"score": 2.609375,
"token_count": 456,
"url": "https://cuttingedgeplants.com/products/illicium-parviflorum-bananappeal"
} |
A report from the Centre for Sustainable Healthcare and Academy of Medical Royal Colleges comments on widespread overuse of tests and interventions. A range of options are presented for cutting waste.
“Reducing waste in today’s climate of constrained resource is really about creating the health care system that we want to have. It is not just about cutting corners or reducing spending. As responsible stewards, doctors can provide a more effective use of constrained economic and environmental resources”. (p.6)
Maughan, D. [and] Ansell, J. (2014). Protecting resources, promoting value: a doctor’s guide to cutting waste in clinical care. London: Academy of Medical Royal Colleges, November 6th 2014.
Coverage of this report in the news:
Brimelow, A. (2014). UK doctors have ‘ethical duty’ to prevent waste. London: BBC Health News, November 6th 2014.
Potential Savings Achievable By Reducing Low-Value General Surgical Interventions
A systematic review identified 71 low-value general surgical procedures. The authors estimate that stopping just five high-volume, high-cost general surgical procedures could save the NHS €153 million per year.
Full Text Link (Note: This article requires a suitable Athens password, a journal subscription or payment for access).
Malik, HT. Marti, J. [and] Darzi, A. [et al] (2017). Savings from reducing low-value general surgical interventions. British Journal of Surgery. November 8th 2017. [Epub ahead of print].
Potential Savings Achievable By Reducing Prescribing of Over-the-Counter Medicines for Minor, Short-Term Conditions
NHS funding is being diverted to frontline care by reducing routine prescribing for minor, self-limiting conditions (short-term conditions which usually cure themselves or cause no long-term effect on health), and are amenable to self-care.
NHS England frees up millions of pounds which could be used for frontline services. [Online]: NHS England, March 29th 2018.
Triggle, N. (2018). NHS no to dandruff and diarrhoea treatment. London: BBC Health News, March 29th 2018.
Potential Savings Achievable By Collaborative Purchasing Across Hospitals
A collaborative purchasing scheme across seven hospitals (involving agreed evaluation of the best products and bulk purchasing) when tested on just eleven products generated savings of £2 million locally. Switching use of examination gloves alone saved an estimated £400,000.
Clinician-led scheme in Sheffield frees up millions of pounds to fund frontline care through pioneering ‘price match’ scheme. London: NHS England, April 4th 2018.
Less Waste, More Health: Reducing Waste (RCP)
A report from the Royal College of Physicians covers suggested changes to procurement and disposal of medical supplies, with a view to reducing the NHS’s carbon footprint, and improving societal health and wellbeing. It includes case studies and twelve recommendations.
“In England, there are 165 hospital trusts with a combined expenditure of over £4.6 billion per annum on medical supplies and other consumables. What we use and how we dispose of it has an impact not only on the finances of the NHS but the environment and population health”. RCP. Press Release.
Less waste, more health: a health professional’s guide to reducing waste. London: Royal College of Physicians, April 2018.
An RCP infographic, possibly of interest: ‘Which waste bin?’ – sustainability flow chart. | <urn:uuid:6ba08c52-2d3a-4ba5-bb2a-975404a9956c> | {
"date": "2020-01-20T11:19:39",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8968979120254517,
"score": 2.59375,
"token_count": 754,
"url": "https://dementianews.wordpress.com/2014/11/08/reducing-waste-in-the-nhs-improves-value-lowering-costs-and-achieving-sustainability-centre-for-sustainable-healthcare-academy-of-medical-royal-colleges/"
} |
Models the state which a state machine can be in.
public ref class State sealed
public sealed class State
type State = class
Public NotInheritable Class State
Initializes a new instance of the State class.
Gets or sets an optional friendly name that is used for debugging, validation, exception handling, and tracking.
Gets or sets the activity performed when entering the state.
Gets or sets the activity performed when exiting the state.
Gets or sets whether the state is a final state.
Gets the collection of transitions that come from this state.
Gets the collection of variable objects associated with the state.
Determines whether the specified object is equal to the current object.(Inherited from Object)
Serves as the default hash function.(Inherited from Object)
Gets the Type of the current instance.(Inherited from Object)
Creates a shallow copy of the current Object.(Inherited from Object)
Returns a string that represents the current object.(Inherited from Object) | <urn:uuid:f5002f6e-a89e-4f3e-a952-f5a80598e234> | {
"date": "2020-01-20T12:33:35",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7096669673919678,
"score": 2.640625,
"token_count": 220,
"url": "https://docs.microsoft.com/en-us/dotnet/api/system.activities.statements.state?redirectedfrom=MSDN&view=netframework-4.8"
} |
The size of a packet.
A packet's size can be expressed in three different ways. Either the size of the packet is fully known (Full), the packet is chunked using OpenPGP's partial body encoding (Partial), or the packet extends to the end of the file (Indeterminate). See Section 4.2 of RFC 4880 for more details.
Packet size is fully known.
The parameter is the number of bytes in the current chunk. This type is only used with new format packets.
The packet extends until an EOF is encountered. This type is only used with old format packets.
impl Serialize for BodyLength[src]
impl SerializeInto for BodyLength[src]
fn serialized_len(&self) -> usize[src]
Serializes the packet to a vector.
impl Copy for BodyLength[src]
impl PartialEq<BodyLength> for BodyLength[src]
impl Clone for BodyLength[src]
fn clone(&self) -> BodyLength[src]
fn clone_from(&mut self, source: &Self)1.0.0[src]
Performs copy-assignment from
source. Read more
impl Debug for BodyLength[src]
type Error = Infallible
The type returned in the event of a conversion error. | <urn:uuid:af6605ea-425e-4d89-bfac-e4017a71dbc1> | {
"date": "2020-01-20T13:13:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7416977882385254,
"score": 2.921875,
"token_count": 282,
"url": "https://docs.sequoia-pgp.org/0.5.0/sequoia_openpgp/packet/enum.BodyLength.html"
} |
January 9, 2013 Update:
SB3280, a moratorium on fracking in Illinois was referred to the Rules Committee on January 8, 2013. Stay tuned for more information and next steps.
A Moratorium on Fracking in Illinois!
The natural gas Industry wants to frack Illinois. Hydraulic fracturing (fracking) is an extremely dangerous method of natural gas extraction. The technology injects millions of gallons of water, sand and chemicals deep into the earth in order to break up shale rock and release natural gas. Concerns include release of methane during the drilling process, contributing to climate change and contamination of drinking water and mishandling of chemical wastes, posing serious health risks to humans and wildlife.
The January Veto Session is scheduled from January 2-8. Call now (before January 8, 2013, 5:00 pm) to tell Illinois state representatives and senators to vote “yes” on SB3280, which will establish a moratorium on fracking and an investigative task force that will examine all of the health and environmental impacts associated with this method of gas extraction. For a description or update on the bill, click here
You can find your state legislator here. or call the state switchboard at 217.782.2000 to connect with your representative. Be sure to also place a call to Governor Quinn at 312.814.2121 or 217.782.0244 and ask him to support the moratorium on fracking as well.
- High pressure hydraulic fracking (fracking) is not the same process as has been used in Illinois for decades. It uses a much more powerful technology
- Fugitive methane is released during shale gas drilling contributing to climate change.
- Fracking uses huge amounts of water – up to 2-7 million gallons per frack and a well can be fracked many times
- The mix of 600 or more toxic chemicals has poisoned wells, and resulted in harm or death to plants, animals and humans.
- Many citizens of Southern Illinois are opposed to fracking. Bans or moratoria have been passed in Alto Pass and Carbondale. Carlyle passed a ban on drilling.
- Please protect the people and environment of Illinois from the harm that fracking has caused in states like Colorado and Pennsylvania
Thanks for making these calls! Be sure to spread the word to your family and friends,
For more information, see:
www.dontfractureillinois.net (website of S.A.F.E., Southern Illinoisan Against Fracturing our Environment | <urn:uuid:3e2e5a10-d41a-47a6-b450-c106e21daefe> | {
"date": "2020-01-20T13:05:33",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9296283721923828,
"score": 2.671875,
"token_count": 513,
"url": "https://ecojusticecollaborative.org/action-alert-stop-the-frack-attack-in-il/"
} |
Genetics as a phenomenon was discovered in the late 19th century. This can be considered as quite a late discovery in comparison to other medical advancements such as general anaesthesia which can be seen throughout recorded history around the world. Genes are the main factors that affect people with genetic conditions like the well-known Down’s syndrome or Huntington’s disease causing the person to sometimes have characteristic facial features or intellectual disabilities. A gene is a sequence of DNA bases that code for either a polypeptide chain or functional RNA; they can even exist in different forms called alleles – this is how organisms have variations within species like different eye colour or blood type. Genes can have random mutations which alter the base sequence of DNA through error.
Essay due? We'll write it for you!
There are two types of error: substitution and deletion. Substitution is when one base is substituted with another; deletion is when one base is deleted. Often these errors cause no effect on the organism due to the degenerate, non-overlapping nature of the genetic code but sometimes they do and thus cause genetic disorders. The two disorders I will investigate through the course of this report are 22q11 Deletion Syndrome and Turner syndrome. Both these disorders are genetically caused. Through my Work experience at Clinical Genetics, I have learn’t that it can be quite visually clear when a person has a specific genetic condition due to characteristic feature, for example, a short palpebral fissure, indistinct philtrum and micrognathia all indicate to the person having fetal alcohol syndrome or FAS.
These specific characteristics for specific genetic conditions are especially useful for clinical geneticists who help identify genetic causing conditions. However, for some genetic disorders, genetic doctors are faced with no outward, physical disabilities but a difference in other factors like puberty and sexual development, behaviour, fertility or even employment and education; these are all clinical features geneticist take into account when diagnosing. I will be specifically looking at the behavioural factors affected by the mutated gene that causes 22q11 deletion syndrome and Turner Syndrome. Genes cause 22q11 deletion syndrome and Turner Syndrome to come about, more specifically a mutation in a person’s gene causes these disorders.
These disorders can then have behavioural characteristics associated with them. Thus, I want to see whether these behaviour problems are due to the gene mutation, or other environmental factors. I also want to investigate the extent genes affect behaviour in the mentioned genetic disorders. Turner Syndrome:Turner syndrome’s features were described in 1938 and 1959 by Turner and he found that the cause of this syndrome is an absent X chromosome (45,X karyotype) in the 23rd chromosome pair. This mutation only happens in girls/ women and affects one in twenty-five thousand live female births. Girls who have this condition, do not have the second sex chromosome.
Statistics from the Oxford Desk Reference Clinical Genetics and Genomics (Second Edition) show us that 80% of the X chromosome in 45,X are of maternal origin meaning the origin of the mutation, is thought to be because of ‘paternal meiotic error’ that then cause ‘genetic abnormal sex chromosomes. ’ For this condition, there is help available through NHS approved groups that help the person themselves and those around them, family and friends that are affected.
Disclaimer: This essay has been submitted by a student. This is not an example of the work written by our professional essay writers. You can order our professional work here.
Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.
Your essay sample has been sent.
Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.Order now | <urn:uuid:792f6bef-5ff1-4232-9b6b-e43dc1b743fb> | {
"date": "2020-01-20T11:31:21",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.944488525390625,
"score": 3.453125,
"token_count": 791,
"url": "https://eduzaurus.com/free-essay-samples/genes-affect-behaviour/"
} |
In this lesson I want to make two calls to the GitHub API. I want to load a user's profile and then also a list of their repositories. The straightforward way to do this would be to make two sequential HTTP requests. We could first load the user and then await the response and then do the same for the repositories.
Once we have both responses, we want to log the user's name to the console and then also the number of their repositories. This should be enough to run our program and see some output, so let's head over to the terminal and say node async.js.
Yep, there we go -- we have a name and a repository count. Now, the problem with this program is that the HTTP requests are made sequentially and not in parallel. This is because we're only making the second HTTP request after the first one has already completed. This can cause performance problems in our applications.
If every request takes about half a second to complete, making two requests already costs us one second. You can compare this to boiling eggs for breakfast. Instead of cooking one after the other, you would boil them all at the same time, right?
All right, let's fix our code. Let's first get rid of the await operator here and then rename the variables to include the promise suffix, because now we're storing the promises in the variables, and not the results.
We now have two concurrently running HTTP requests. We are not waiting for the first one to finish before we make the second one. Down below, we can now say const user=await user promise and do the same for the repositories.
Notice that this approach is different from the one we used before. We are now kicking off both requests at the same time and then we are waiting for both to come back. The slower of the two promises determines how long this entire operation takes, and we are no longer incurring the performance hit of awaiting two HTTP requests sequentially. | <urn:uuid:32d34fb3-2bb1-4fd6-a706-fa6ea60d857d> | {
"date": "2020-01-20T13:37:56",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9526935815811157,
"score": 2.828125,
"token_count": 401,
"url": "https://egghead.io/lessons/javascript-await-multiple-promises-sequentially-or-concurrently"
} |
The City of Atlantis has been one of the world’s oldest myths, dating back to the time of the ancient Greeks. Atlantis was described as a sprawling metropolis, with the Atlantean people being enjoying an advanced and sophisticated existence.
At some point, according to the historical records, a natural disaster caused the city to be swallowed by the ocean, and the Atlantean culture was lost forever.
It’s long been the belief that the stories of Atlantis were just that: stories. But more and more evidence has surfaced in recent years that point to the fact that it may have actually existed, and that there was some kind of ancient flood that destroyed the city.
Most of what we know today can be traced back to Greek philosopher Plato, and while some of the details he recorded are vague at best, archaeologists are making more breakthroughs with each passing year.
Here are some facts we do know about the lost civilisation that is theorised to be Atlantis, for those who want to try and discover the city themselves. It’s as exciting as playing at a casino no deposit!
1. We Know Where It Is
For years, historians have speculated on the possible locations of where the city once stood, and for the most part, there haven’t been any tangible discoveries. But a more extensive analysis of Plato’s text on Atlantis reveal some great details to its location: the Straits of Gibraltar.
This is a body of water that separates Spain from Africa, and at once point, it was most likely an open piece of land that could have supported a city.
2. Much of The Story is missing
Plato’s texts are the closest we have to a full description of Atlantis, but his texts only describe so much, and after some musings on the gods, it suddenly comes to an abrupt end.
Historians aren’t sure whether Plato left is book unfinished on purpose, or if a finalised version has been lost through time. But it’s agreed that there is much more to the story that we’ve yet to find out.
3. It Might Be The Oldest Civilisation
Most historians agree that modern civilisation started around 12000 years ago. The beginning of civilisation is marked as the time when humans first invented agriculture – and many believe that Atlantis would have existed around 11500 years ago.
This means that not only was it one of the first cities in the world, but the level of advancement that Plato describes shows that the Atlantean were ahead of every other culture by thousands of years.
4. It’s Not The First Nor The Last
Throughout history, human cultures and civilisations have risen and fallen, and this natural cycle attests to the possibility of Atlantis.
It wouldn’t be the first empire that was wiped out by natural disaster, but it may have been the very first in recorded, modern history. | <urn:uuid:bdd81971-b8b0-4a93-b8b0-164b5901cc78> | {
"date": "2020-01-20T12:17:37",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9653666615486145,
"score": 3.3125,
"token_count": 601,
"url": "https://elementsintime.com/myths/atlantis/"
} |
Inverse Trigonometric Function(redirected from Arccosec)
inverse trigonometric function[¦in‚vərs ‚trig·ə·nə‚me·trik ′fəŋk·shən]
Inverse Trigonometric Function
a function that is a solution of the problem of finding an arc (number) from a given value of its trigonometric function. The six inverse trigonometric functions correspond to the six trigonometric functions: (1) Arc sin x, the inverse sine of x; (2) Arc cos x, the inverse cosine of x; (3) Arc tan x, the inverse tangent of x; (4) Arc cot x, the inverse cotangent of x; (5) Arc sec x, the inverse secant of x; and (6) Arc csc x, the inverse cosecant of x.
As an example, according to these definitions, x = Arc sin a is any solution of the equation sin x = a; that is, sin Arc sin a = a. The functions Arc sin x and Arc cos x are defined in the real domain for ǀxǀ ≤ 1, the functions Arc tan x and Arc cot x are defined for all real x, and the functions Arc sec x and Arc csc x are defined for ǀxǀ ≥ 1. The last two functions are rarely used.
Since trigonometric functions are periodic, their inverse functions are multiple-valued. Certain single-valued branches (the principal branches) of these functions are designated as arc sin x, arc cos x, …, arc csc x. Specifically, arc sin x: is the branch of the function Arc sin x for which –π/2 ≤ arc sin x ≤ π/2. Similarly, the functions arc cos x, arc tan x, and arc cot x are determined, respectively, from the conditions 0 < arc cos x ≤ π, –π/2 < arc tan x < π/2, and 0 < arc cot x < π. The inverse trigonometric functions Arc sin x, … can easily be expressed in terms of arc sin x, …; for example,
Arc sin x = (—1)n arc sin x + πn
Arc cos x = ±arc cos x + 2πn
Arc tan x = arc tan x + πn
Arc cot x = arc cot x + πn
where n = 0, ±1, ±2, ….
The well-known relations between the trigonometric functions yield relations between the inverse trigonometric functions, for example, the formula
The derivatives of the inverse trigonometric functions have the form
The inverse trigonometric functions can be represented as power series, for example,
These series converge for – 1 ≤ x ≤ 1.
The inverse trigonometric functions can be determined for arbitrary complex values of the independent variable, but the values of these functions will be real only for the values of the independent variable indicated above. Inverse trigonometric functions of a complex independent variable can be expressed by means of a logarithmic function, for example, | <urn:uuid:27926529-a190-408b-8f70-375c316a33a7> | {
"date": "2020-01-20T12:03:59",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7808808088302612,
"score": 3.234375,
"token_count": 685,
"url": "https://encyclopedia2.thefreedictionary.com/Arccosec"
} |
This may seem a little weird, but it’s true. Muscle soreness isn’t the end all be all of a good workout. Most people, beginners especially, assume that a good workout means being sore for days. And that if you aren’t sore it means you aren’t working hard enough. Well, we can put an end to all those thoughts because it’s B.S. Let’s debunk this idea, and dive into what exactly is muscle soreness and why being sore all the time might actually be a bad sign.
What is Muscle Soreness?
So you may have found that muscle soreness usually shows up about 2-3 days after your workout (delayed onset muscle soreness, or DOMS), and this is totally normal. It takes your body a few days to recognize the injuries and to produce the inflammation necessary to repair the damage. What’s interesting with muscle soreness is that it doesn’t happen every time you workout, and it shouldn’t. Certain types of exercises are going to cause more damage than others, but there are also a few other things that come into play that cause muscle soreness.
Let’s first break down the fact that there are two types of muscle soreness – acute and DOMS.
Acute muscle soreness is felt immediately after exercise and is caused from a build up of lactic acid during exercise. This soreness typically goes away almost immediately after exercise.
DOMS is delayed onset muscle soreness and is caused by tiny mirco-tears to the muscle fibers and surrounding connective tissues.
It is possible to get both types of soreness after starting a new training program or trying a new exercise – but it should not be a symptom after every single workout. Here are a few reasons you might be getting DOMS more often..
Muscle Soreness Causes
How often you train
If you are someone who works out regularly, you know that muscle soreness can come and go depending on the type of exercises you are doing and how frequently you do them. For example – if you are just starting your journey, almost everything is going to make you sore. This is because your body is not used to the stress you are putting it under and therefore the fibers are going to tear more easily until you build up the stamina.
Muscle soreness can also occur if you over do it or overtrain. This means that the intensity or duration you put your body under was just too much, and you aren’t giving yourself enough time to recover between workouts. This is where muscle soreness is not a good sign. You have to be taking rest days in order to allow those miro-tears to heal and the inflammation to go away!
What type of training you are doing
Any type of exercise can cause muscle soreness, but there are a few specifics that can cause it to be worse, or more prevalent.
Eccentric exercises are what cause the most mirco-tears. This is because of the time the muscle is under tension during the lengthening phase. So the “lowering” or the movement such as going down in the squat, lowering a bicep curl or lowering a pull-up are what eccentric movements are. Any exercise that you increase the time the muscle is under tension is going to cause more inflammation and muscle fiber tears.
It doesn’t have to be just lifting weights though. Things like running down a hill or high tension cycling can do it too!
There are a few key factors in your internal health that may cause you to not recover as quickly as you should. Diet is one. If you are not eating an adequate diet of 1. nutrient dense foods and 2. ENOUGH of it, then you are going to experience muscle soreness for much longer. This is because your body doesn’t have enough energy and calories to repair the damaged tissue!
Hormones can also play a big part in muscle soreness as well. Research shows that estrogen can actually help stimulate muscle repair and decrease damage done. So ladies, this is great for you! And guys, I’m sorry. Although men do have some estrogen, it’s not enough to regenerate muscle tissue as fast as women.
Bad Signs of Muscle Soreness
If you find yourself sore after every workout, or all the time, it is definitely a bad sign. You should not be sore all the time – soreness should only come around when you are trying new exercises, increasing intensity a lot or just starting out on your exercise journey. If muscle soreness continues for 5-7 days and does not let up it could be a sign of:
• Over training (not giving yourself enough time between workouts)
• Poor nutrition (not eating enough nutrient dense foods, especially protein)
• Lack of sleep (your body regenerates at night, if you aren’t getting adequate amounts of sleep this can cause prolonged soreness)
• Injury (if you are sore for a long period of time, it could mean a minor injury has occurred. Make sure you are icing the sore spot, getting a lot of fluids in and eating anti-inflammatory foods)
How to Relieve Muscle Soreness
So now that we know muscle soreness occurs after different types of workouts, and shouldn’t continue on for an extended period of time…there are ways we can relieve the acute soreness! Let’s not forget that everyone is different, so what works for one person might not work for everyone – so be sure to take an individual approach.
• Eating anti-inflammatory foods
• Eat plenty of protein
• Take epsom salt bath
• Drink water and electrolytes
• Foam rolling
All of these have been known to decrease soreness by decreasing inflammation within the body. Just remember that muscle soreness, or DOMS, should not continue for longer than 7 days. If it does, see a doctor or physical therapist because a bigger injury may have occurred!
Muscle soreness is not always a sign of a “good” workout, and just because you aren’t sore doesn’t mean you need to be pushing it harder. Soreness is a sign of new exercises that your body is not used to, so as that stimulus starts to become more familiar your body will adapt!
Sign Up for My Weekly Newsletter! | <urn:uuid:125346b1-3372-4638-b9ff-1ca7eb4ddb80> | {
"date": "2020-01-20T12:57:22",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9578254222869873,
"score": 2.671875,
"token_count": 1332,
"url": "https://endorphitness.com/muscle-soreness-and-why-it-could-be-a-bad-sign/"
} |
Most likely an adze, which is a type of ancient hand plow, used for tilling the earth for planting.
The cathac is the oldest existing irish manuscript of the Psalter
most of the iron got used then
the iron age began in 1200 bc
Magnet in the mobile !
The Maasai Mara is a large game reserve located in Kenya. Thereserve is named after the Maasai people who inhabit southern Kenyaand Northern Tanzania.
The excavation was essentially done by Grethe Hojgaard who initially found him. No idea on how long it took thought to fully get him out.
There was a cord wrapped around his , this was used to strangle him.
Iron has it’s roots in the Proto-Indo-European *h?esh?r? meaning”blood”, so named because of it’s tendency toward a red color whensmelted and due to rusting. It’s chemical symbol Fe comes from it’sLatin name ferrum. | <urn:uuid:629711b3-f80c-4a24-9892-dec69c30d7d8> | {
"date": "2020-01-20T12:22:39",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9700525403022766,
"score": 2.796875,
"token_count": 216,
"url": "https://espaceacademy.com/category/q-a/history-q-a/ancient-history-q-a/iron-age-q-a/"
} |
Lack of Donor Region in Hair Transplant
In hair transplant, the donor region is the region where the hair follicles to be transplanted are taken to the shed area. Donor region and the insufficiency of this article we write about you can reach the curiosity.
What Does the Donor Region Mean?
Donor means donor. It is a term used for many different operations, not just for hair transplant operations. In hair transplant, the donor region is the area where healthy hair follicles are taken for transplant. It is also called a donor zone. The most ideal and most commonly used area as a donor region is the nape of the back of the head. Different regions of the body can also be used as donor regions. The donor zone is only taken from the person's own body. It cannot be used as the donor zone of someone else's body.
Why is the Donor Area Important in Hair Transplant?
The hair density and hair quality in the donor area is very important for successful hair transplant operation. The number of hair follicles taken from the donor area is very important for densification of hair in October. When the areas where there are not enough hair follicles are selected as donor regions, the hair is rarely seen. In a hair transplant operation that is not lush and frequent enough, it becomes apparent that the person's hair is shed.
How to Decide Donor Region in Hair Transplant?
When selecting a donor region, the size of the donor region, the number of hair follicles in the area and the quality of the hair are examined. Places with a much smaller number of hair follicles than needed are not selected as donor sites.
People with thin and thin hair need more hair follicles to make their hair look lush. For this reason, people with thicker hair are transplanted with fewer hair follicles. Therefore, the hair structure directly affects donor site selection.
The number of hair follicles per square centimeter determines the density of the donor area. Low density regions cannot be used as donor regions.
Insufficient Donor Region in Hair Transplant
People who come for transplant may have patients with very high baldness, or those with a nuchal area that are inadequate to receive donors. The neck is ideal for donor area. However, if the number of hair follicles in this region is insufficient, other parts of the body can be used as a donor area. If the donor area is insufficient, the beard, chin, shoulder area, leg area or arms can be used as donor area.
If the person does not have a disease or problem for the procedure, the donor area is absolutely present. It is not difficult to find a donor area in the human body. Because the hair follicles are coded to avoid shedding in many areas.
With Esthetic Hair Turkey, hair transplant operations are performed successfully. With its successful staff and state-of-the-art technology, our center provides 100% customer satisfaction. You can contact us if you want to have your hair transplant in our center and have detailed information about hair transplant prices. | <urn:uuid:c317807f-a466-48b2-ad0e-e71fdb786e0f> | {
"date": "2020-01-20T11:19:47",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9503780603408813,
"score": 2.96875,
"token_count": 634,
"url": "https://esthetichairturkey.com/en/lack-donor-region-hair-transplant/"
} |
Animal plasma has been widely used in piglet feeding, not only as a protein source, but also as a tool to reduce gastrointestinal disorders after weaning.
Drs FELLIPE BARBOSA and INGE HEINZL* consider a safe alternative in order to keep animals healthy and to avoid loss of performance.
The recent developments surrounding the health risks associated with using animal plasma as a piglet feed ingredient is growing serious concerns in China. After the reported cases of African swine fever (ASF) commencing in August 2018, the Chinese government decided to ban the use of pig blood (and its by-products) in animal feed for some time.
The reason for the temporary ban of pig blood ingredients: African swine fever.
ASF is a viral disease of pigs and wild boars. The virus causes a lethal hemorrhagic disease in pigs. In some cases, the death of infected animals can occur during one week after the infection. There are no vaccines against the ASF Virus. When it hits the herd it is virtually impossible to stop its spread contaminating all animals.
Spreading of the virus occurs as follows:
• contact with contagious pigs from infected areas,
• contact with contaminated materials, being fed with kitchen waste and
• non-trusted animal origin feed ingredients.
There is a risk of pig blood carrying different types of viruses like ASF virus. Therefore, from time to time the use of ingredients based on blood is questioned by pig producers. To minimise this risk, the use of ingredients derived from pig slaughterhouses (including animal plasma) in pig feed is no longer allowed in China. This measure will cause not only a protein deficit in piglet feeds but also reduced protection of weaned piglets when intestinal disorders are concerned.
Immunoglobulins from animal plasma and its benefits on reducing post-weaning diarrhea (PWD)
The use of animal plasma has a positive effect on post-weaning performance of piglets. It is generally known that as a palatable ingredient, animal plasma stimulates feed intake. This results in better growth and a higher post-weaning performance in piglets. However, a closer inspection on the mode of action of spray dried plasma reveals its properties as an immune-ingredient and shows its supporting effect on the overall health status of the animals. Scientific publications showed that the positive influence on growth when feeding plasma to piglets is mainly due to its “immunoglobulin fraction”. This assigns to plasma a specific role in nutrition of weaned pigs to prevent PWD and to reduce the need for antibiotics.
Egg immunoglobulins: a natural way of protecting weaned piglets
Globigen® Jump Start (EW Nutrition GmbH) is a functional and standardized product based on whole egg powder. It contains natural immunoglobulins (IgY – “immunoglobulins from yolk”) mixed with a carrier. IgY are cells of the immune system from birds similar to the IgG in mammals. They have the main function of identifying and neutralizing harmful substances in the body. IgYs are obtained through a non-invasive process and are natural ingredients from eggs. There is no connection with blood and slaughter by-products and therefore no risk of carrying animal diseases.
Globigen® Jump Start is used to support piglets during critical stages of life, as long as their natural immunity is not completely developed. Scientific data confirmed that the IgY present in egg powder are capable of supporting intestinal health and growth performance of newly weaned piglets. More recently, also the possibility of using immunoglobulins as alternatives to zinc oxide (ZnO) and in-feed antibiotics (Hedegaard et al., 2017; Li at al. 2015) were evaluated with promising results.
Better results than plasma IgG: understanding the antigens causing post-weaning diarrhea
Animal plasma is a by-product of the meat industry. The animals slaughtered were possibly exposed to various diseases over their whole life. It cannot be considered as a standardized product in terms of immunoglobulins (either quantity nor quality). The Ig contained could be useful but also totally useless, depending on the pathogens the animals have been confronted with. As a source of immunoglobulins Globigen Jump Start is a costefficient and effective alternative to replace plasma in piglets’ diets. Its IgY content will have the same protection effect in the gut as IgG, but the nutritionist will have the possibility of choosing different protein sources in the market, either because of price or availability of raw materials. Our recommendation is that 40kg of plasma can be replaced by 2kg of Globigen Jump Start supplied with different high digestible protein sources.
A piglet trial was conducted with the objective of evaluate the efficacy of egg immunoglobulins on performance parameters of weaned piglets and to evaluate it as a substitute for animal plasma. Piglets were challenged with F4 and F18 entertoxic E. coli (ETEC) strains and feed either 2kg of Globigen Jump Start (GJS) or 40kg of spray dried plasma (SDP) in the weaner diet. The comparison was also done to a negative group (NG – microbiological challenge and no protection in the diet); and a positive group (PG – no microbiological challenge and antibiotics + ZnO in the diet).
Piglets from NG had lower feed intake, weight gain, and feed efficiency than animals from PG. The same was observed for piglets from GJS and SDP group. However, the impact of bacterial challenge on weight gain was lower for GJS piglets than for SDP (-14% and -52% when compared to PG); whereas feed intake was similar for both groups (-13% and -14% when compared to PG). The results showed that piglets receiving GJS where more efficient on converting feed into growth even when challenged when compared to SDP animals.
In this trial, the product based on egg immunoglobulins showed better influence on the performance of piglets than blood plasma. This may be due to the fact that the quality of the plasma depends on the animals slaughtered and on their contact with diseases, determining how much and which antibodies are available in this feed.
Additionally, blood plasma includes the danger of infectious diseases.
Safe and standard: free of swine related diseases and ruminant material
EW Nutrition clearly understands the importance of maintaining standardisation. It is a key factor for the customers to have a product that they can depend on every day.
Therefore, trough specific steps during the production of Globigen products, EW Nutrition ensures product quality. During production, all eggs are pasteurised and dried to a whole egg powder. In between steps include microbiological analysis, Salmonella, and avian disease controls to ensure the final product is free of the mentioned threats. Furthermore, as Globigen products are originated from laying hen farms there is no risk of contamination with any swine disease, like the devastating ASF. Finally, Globigen products do not contain any raw materials produced from, or substances derived from ruminants nor do the products come in contact with risk materials during the whole process (not be at risk for carrying transmissible spongiform encephalopathy or bovine spongiform encephalopathy – BSE).
ASIAN FEED MAGAZINE – February/March 2019 | <urn:uuid:64d0ee81-0e85-466d-aa2a-f17e6e17b0c0> | {
"date": "2020-01-20T13:21:26",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9439272880554199,
"score": 3.125,
"token_count": 1534,
"url": "https://ew-nutrition.com/en-ja/egg-immunoglobulins-a-plasma-replacer/"
} |
There were no turning points in the Civil War. There were, however, several turning points identified after the war. Determining a “turning point” is an academic exercise: we see the events that determined the ultimate outcome of the war only after we know the ultimate outcome. A turning point is, as historian Erik Rau described, “ultimately a construct of historical reflection.” Historian Carl Becker went a step further in a 1926 speech to the American Historical Association, describing a turning point as a “symbol, a simple statement which is a generalization of a thousand and one simpler facts which we do not for the moment care to use.”
The symbol a historian chooses depends on the outcome she wishes to highlight. Social historians interpret Antietam as a turning point because the Union victory gave Lincoln the impetus to proclaim the emancipation of slaves in areas in rebellion of the Union. The Union’s hard-won victory over Vicksburg could be seen as an economic turning point because it effectively broke the Confederacy in two along the Mississippi, further stressing already over-extended Confederate supply lines. Gettysburg, on the other hand, could be understood as a military turning point because it demonstrated General Grant’s ability to definitively defeat Lee on the battlefield. It is also considered the “high watermark of the Confederacy,” a characterization that only makes sense in hindsight as we can only recognize the Confederacy’s highest point in reference to its lowest point, Lee’s surrender at Appomattox. Turning points–symbols–are very personal things: one hundred fifty years later, historians continue debating the relative importance of individual battles. Gary Gallagher, for example, rejects the importance of Vicksburg and Gettysburg in favor of the Seven Days Battles, writing Gettysburg “looms largest in the public imagination as the war’s grand turning point…(but) affected the long term-shape of the war relatively little” while Vicksburg “generated a greater emotional than military result.”
These debates can get historians into trouble as it can be very difficult to requite the knowledge gifted by historical hindsight with the information Americans had at the time. A turning point, Rau reminds us, is not something that “reveals itself to the people living through it at the time.” The soldiers fighting at Antietam, Vicksburg, Gettysburg, and countless other battles, did not know the tide of battle shifted as they took and left the field.
As a budding military historian focused more on war’s effects on society than how they were fought, I am much more interested in the war’s point of no return than in the war’s various turning points. In 1861, the North and South alike anticipated a speedy end to the conflict. Twelve months of battle proved this expectation dead wrong. Union and Confederate corpses littered the battlefield of Shiloh in alarming numbers, yet somehow the armies’ determination to keep fighting did not die. Grant responded to a demoralizing Confederate attack at Shiloh on April 6, 1862 with his own counterattack, telling one of his officers that retreat was not an option: “Retreat? No. I propose to attack at daylight and whip them.” Soldiers seemed to share the same dogged determination despite the horrors they witnessed. “If my life is spared I will continue in my country’s service until this rebellion is put down, should it be ten years,” wrote a Union soldier after the battle of Shiloh. Fifteen months and thousands of casualties letter, another soldier’s correspondence echoes the same. Concluding a letter to his family written after the Battle of Gettysburg, Lieutenant William Wheeler of the 13th New York Battery wrote,
“The time may vary a few months, a few years, or even a few decades, but the job will be settled and that all right too. I am…ready to bear, believe, hope, and endure all things for the cause, knowing that if we do so, we also, like Charity, shall never fail.”
Shiloh was a wakeup call to the North and South, but the soldiers also experienced it as a point of no return. It was their first taste of the brutal battles to come, yet it did not deter them from fighting. Whether their motivation was honor, moral conviction, or some other amorphous justification, the soldiers fought on. Both sides knew the short war they predicted was simply not possible: that bridge was crossed and burned. Something changed around Pittsburg Landing in Spring 1862. As the armies progressed to Antietam, Vicksburg, and Gettysburg, they did not know the war was shifting in favor of Union victory, but the battle experiences of 1862 and 1863 gave rise to different soldiers and different armies. In contrast to the “turning points” identified by historians years after the fact, the renewed determination to keep fighting despite the brutality, trying conditions, and uncertainty experienced after Shiloh was “reveal(ed) to the people living through it at the time.” As poet Walt Whitman wrote in 1883,
“Future years will never know the seething help and black infernal background of countless minor scenes and interiors (not the official surface-courteousness of the Generals, not the few great battles) of the Secession War…the real war will never get in the books…The actual soldier of 1862-’65, North and South, with all his ways, his incredible dauntlessness…will never be written.”
Amid all this speculation I also wonder how women experienced the inertia of the war. Their experiences were very different from those of the men, but no less difficult and certainly of no less importance. How did one feel the war on the homefront, especially as the line between homefront and battlefront blurred? “I do not write often now – not for want of something to say, but from a loathing of all I see and hear. Why dwell upon it?” wrote diarist Mary Chestnut in 1865. These words demonstrate Chestnut’s own feeling of loss and awareness of an ending, but how did Northern women feel? Or the emancipated slave women? Did they sense the beginning of the end or recognize the turning of the tide?
Historians are quite adept at finding “the few great battles,” but they sometimes overlook the minutia of individual experience. The difference between a turning point and a point of no return is quite simple, really: one we find in the words of historians, the other in the words of the soldiers themselves.
Erik Rau quoted in Roger D. Launius, “What are Turning Points in History, and What Were They for the Space Age?” Societal Impact of Spaceflight, ed. Steven J. Dick and Roger D. Launius, NASA SP-2007-4801, (NASA Office of External Relations Historical Division, 2007), 22.
Carl L. Becker, “What are Historical Facts?” The Western Political Quarterly VIII, no. 3, (September, 1955): 327-340, accessed September 7, 2016, EBSCOHost.
Aaron Sheehan-Dean, “Gettysburg: Turning Point or a Small Stepping-Stone to Victory?” Teaching History.org, accessed September 7, 2016, http://teachinghistory.org/history-content/ask-a-historian/25224.
Gary W. Gallagher, “The war’s overlooked turning points,” Civil War Times 21, 2, Biography in Context, accessed September 6, 2016, EBSCOHost.
Rau, 22.
James McPherson, Battle Cry of Freedom: The Civil War Era, (Oxford: Oxford University Press, 1988), 410.
Unknown Union soldier quoted in McPherson, 413.
“Letter from Lieut. William Wheeler, Thirteenth New York Battery to Family regarding the Battle of Gettysburg, Warrenton Junction, Virginia July 26, 1863,” Battle of Gettysburg and the Civil War, accessed September 8, 2016, http://www.totalgettysburg.com/william-wheeler-letter.html.
Rau, 22.
Walt Whitman, Specimen Days and Collect, (Philadelphia: David McKay, 1883), 81.
Mary Boykin Miller Chestnut, Mary Chestnut’s Civil War, ed. C. Vann Woodward (New Haven: Yale University Press, 1981), 834.
Becker, Carl L. “What are Historical Facts?” The Western Political Quarterly VIII, no. 3, (September, 1955): 327-340, accessed September 7, 2016, EBSCOHost.
Chestnut, Mary Boykin Miller. Mary Chestnut’s Civil War, ed. C. Vann Woodward. New Haven: Yale University Press, 1981.
Gallagher, Gary W. “The war’s overlooked turning points,” Civil War Times 21, 2, Biography in Context, accessed September 6, 2016, EBSCOHost.
Launius, Roger D. “What are Turning Points in History, and What Were They for the Space Age?” Societal Impact of Spaceflight, ed. Steven J. Dick and Roger D. Launius, NASA SP-2007-4801, NASA Office of External Relations Historical Division, 2007.
“Letter from Lieut. William Wheeler, Thirteenth New York Battery to Family regarding the Battle of Gettysburg, Warrenton Junction, Virginia July 26, 1863,” Battle of Gettysburg and the Civil War, accessed September 8, 2016, http://www.totalgettysburg.com/william-wheeler-letter.html.
McPherson, James. Battle Cry of Freedom: The Civil War Era. Oxford: Oxford University Press, 1988.
Sheehan-Dean, Aaron. “Gettysburg: Turning Point or a Small Stepping-Stone to Victory?” Teaching History.org, accessed September 7, 2016, http://teachinghistory.org/history-content/ask-a-historian/25224.
Whitman, Walt. Specimen Days and Collect. Philadelphia: David McKay, 1883.
*Image taken from the Harpers Ferry National Historical Park Online Photo Archive. https://www.nps.gov/applications/hafe/detail.cfm?Image_No=hf-0002 | <urn:uuid:2afa8957-6755-47a8-9100-ba84ce06aa73> | {
"date": "2020-01-20T12:45:29",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9190134406089783,
"score": 3.828125,
"token_count": 2210,
"url": "https://fragilelikeabomb.com/2018/04/06/the-point-of-no-return/"
} |
By knowing and absorbing the elements and principles of design you attain a valuable intuitive resource. As with the layouts, experimentation is the best way to gain familiarity with these pesky but important precepts.
Line – a mark with greater length than width which can be thick, thin, diagonal, straight, vertical, horizontal or curved; defines contours; indicates movement and direction; can suggest a mood.
Working with line can be enlightening. It can turn what starts out as a little dot into a beautiful work of art. Paul Klee is one of the artists who took line to a spiritual plane in my view. Check out some of his work if you want to learn about the art of line.
Shape – a closed line that can be organic (my favorite–for now), geometric or flat expressing length and width.
Form – 3-D shapes that express length, width and depth; conveys volume.
Space – the area between and around objects; referred to as negative when around the object and has shape; can refer to the feeling or illusion of depth; real space is 3-D.
Texture – the surface quality that can be seen, imagined or felt; can be rough, smooth, hard or soft.
Color – the light reflected off of objects; hue (blue, green, etc.), value (the lightness or darkness), intensity (how bright or how dull).
Color is my utopia. I am eternally, desperately in love with color. Although, a blank canvas can make quite a statement.
Balance – the distribution of visual weight; concerning the heaviness or lightness of objects, color, texture and space; balance can make a design feel stable or chaotic.
Emphasis – the part of the design that catches the attention of the viewer; usually a focal area that stands out due to contrast; a difference in size, color, texture, shape, etc.
Movement – the route the viewer’s eye travels while observing the work; usually along line edges, shape and color planes.
Pattern – repeating of an object or symbol all over the artwork.
Repetition – creates unity within the work.
Proportion – brings the feeling of unity through the appropriate use of size, amount and number.
Rhythm – when one or more elements of design is used repetitiously in order to create a feeling of organized action; creates a mood.
Variety – the use of several elements of design to hold the attention of the viewer; guides the viewer’s eye throughout the work.
Unity – the feeling of harmony; all parts of the work create a sense of integrity; completeness.
I will attempt to create some good examples of each in my next post. Wish me luck! | <urn:uuid:c7afab54-41bd-434b-84b1-2d4026b1af1a> | {
"date": "2020-01-20T11:41:43",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9126468300819397,
"score": 2.953125,
"token_count": 562,
"url": "https://fstartjournal.com/2013/04/17/elements-and-principles/"
} |
This chapter describes some simple ways of using GNAT to build executable Ada programs. Running GNAT, through Using the gnatmake Utility, show how to use the command line environment. Introduction to Glide and GVD, provides a brief introduction to the visually-oriented IDE for GNAT. Supplementing Glide on some platforms is GPS, the GNAT Programming System, which offers a richer graphical “look and feel”, enhanced configurability, support for development in other programming language, comprehensive browsing features, and many other capabilities. For information on GPS please refer to Using the GNAT Programming System. | <urn:uuid:63e2899b-a7a1-40b2-bee9-14900b9e0692> | {
"date": "2020-01-20T12:55:53",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8796944618225098,
"score": 2.6875,
"token_count": 124,
"url": "https://gnu.huihoo.org/gcc/gcc-4.0.4/gnat_ugn_unw/Getting-Started-with-GNAT.html"
} |
Acitivate your mind by learning about simple and compound machines while you explore the House and Tool Shed!
Zoom Inventors and Inventions
From A to Z to learn all about inventors and inventions.
A lot of information can be found on this site. Be ready to learn a lot about inventions!
How Everyday Things Are Made
If you've ever wonderd how things are made - products like candy, cars, airplanes, or bottles - or if you've been interested in manufacturing processes, like forging, casting, on injection molding, then you've come to the right place.
Inventor of the Week
This is an Inventor Archive that is organized by the inventors' last names. You can also browse by the invention.
The History of Chewing Gum and Bubble Gum
Learn about the invention of gum
Learn about the history of this popular pop!
History of the Camera
Have you ever had your picture taken? It would be hard to imagine life without zapping those photographs. Find out how it all began!
Interesting facts about the invention of a popular candy. | <urn:uuid:0f44bae7-f1b6-4184-9089-4dda6e7c25dd> | {
"date": "2020-01-20T11:50:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9295644164085388,
"score": 3.21875,
"token_count": 231,
"url": "https://gt.ops.org/WebResources/StudentWebsites/tabid/96/Default.aspx"
} |
Ramakrishna is one of the most popular indian saints of all times. His teachings were addressed to all religious and social groups, and became popular in all classes of indian society, as well as in the West. Ramakrishna played an important role in the cultural renaissance of the 19th century India, his teachings influenced the development of the indian society till now. And he is still widely known, revered and loved in India.
Ramakrishna was born in a poor brahmin family in a rural Bengal. From the early childhood he was prone to exaltation and experienced uncontrollable ecstasy, especially during the religious ceremonies. In this state he was loosing all connection with the outside world getting totally absorbed in bliss. With time he was going into trance more and more often, and by the end of his life it was happening to him almost every day. As a child he was not much interested in school studies, but readily listened and learned the hindu scriptures, folk stories and myths from the wandering hermits and monks. When Ramakrishna was 19, his brother became a priest in a Kali temple in Calcutta, and invited Ramakrishna to assist him in the temple services. The next year his brother died, Ramakrishna took his place as a priest and stayed in the temple till the end of his life. He was totally absorbed in worshipping Kali, he started seeing her as his mother and the mother of the universe. He was feeding her, talking to her, crying for her. Though his family made him marry, he continued living like a monk, devoting all his time to worship. His spiritual path was very rich, he was one of a few mystics, who tried to experience the divine through many different ways and practices. In different periods of time he was worshipping Rama, then Krishna, for a few years he practiced Tantra, and then learned the philosophy and practice of Advaita Vedanta. Later he was initiated into Islam, and performed all muslim prayers and practices, and stated that “the Hindu way of thinking had disappeared altogether from his mind”. Once somebody was reading the Bible in front of him, and he started practicing Christianity, and no longer thought of going to Kali temple. During all his practices he had strong spiritual experiences and visions. He had a reputation of a spiritual madman, many of the practices he was performing seemed pretty odd in the public opinion, for example for some time he was behaving like a woman, wearing women’s clothes, living with women, and with time forgot completely that he is living in a body of a man. Although the authenticity of his experiences, together with his child-like innocence and complete openness were winning the hearts of people, and more and more visitors were coming to see him and receive spiritual teachings. Ramakrishna was a talkative person and a gifted speaker, his style of teaching was quite unique. He used to teach in rustic Bengali, using numerous stories and parables, describing his own rich spritual life, telling tales, explaining complex philosophical concepts with the simplest mundane illustrations, cracking jokes, singing songs and mimicking all types of people. His extraordinary informal style of teaching helped him to reach the hearts of the most sceptic visitors, among those were many intellectuals and members of political and social elite. His ideas became widely popular only after his death, dye to continuous efforts of his disciples, the most prominent of them was Swami Vivekananda.
The essence of Ramakrishna’s teachings is the oneness of existence. “It has been revealed to me that there exists an Ocean of Consciousness without limit. From It come all things of the relative plane, and in It they merge again.” All religious are different ways to come to the same goal. All of them are valid ways to realize God, and the religious variety exists to suit the needs of many different seekers. “You can eat a cake from the center, or from any of the sides. The sweetness will be the same.” The realization of God is the supreme goal of all living beings. No matter which way you choose, the essencial is your intensity and sincerity. “Can you weep for Him with intense longing of the heart? Men shed a jugful of tears for the sake of their children, for their wives, or for money. But who weeps for God?” If one abstains from distractions like sensual pleasures, and dedicates himself solely to spiritual search, the result is bound to come. “As long as the child remains engrossed with his toys, the mother looks after her cooking and other household duties. But when the child no longer relishes the toys, he throws them aside and yells for his mother. Then the mother takes the rice-pot down from the hearth, runs in haste, and takes the child in her arms.” Ramakrishna taught that serving people is the same as serving God, since he is present in all of them. What is the uniqueness of Ramakrishna’s teachings? They were delivered only in informal conversations and were coming from his authentic inner experience. Here is one of his stories: “A few people were crossing the Ganges in a boat. One passenger, a scholar, asked another: “Do you know Vedanta?” “No, sir.” “Do you know Samkhya and Patanjala?” “No, sir.” “Have you read any philosophy at all?” “No, sir.” Then the great storm arose and the boat was about to sink. The passenger asked the scholar: “Sir, do you know how to swim?” “No.” “I don’t know any philosophy at all, but I can swim.” | <urn:uuid:bae97bd1-09fd-488f-aaf5-001c79abcd95> | {
"date": "2020-01-20T13:11:45",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9898408055305481,
"score": 3.140625,
"token_count": 1218,
"url": "https://gurureview.org/ramakrishna/"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.