text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
very object tells a story, whether we find it on the street or appears while we empty the apartment of a beloved one. But what would happen if, suddenly, we had access to hundreds of thousands of objects that date from our days to the prehistory times?
This is precisely what has happened in Amsterdam: the construction of the North-South line of metro has allowed several sections of the Amstel River to dry and unearthed half a million pieces of waste thrown into the canals and preserved by mud. For 10 years, a team of archaeologists has been commissioned to unearth and make a catalogue of 19,000 of these objects, and now they have presented the findings in Below the Surface, a spectacular website, and also in an exhibition at the Rokin metro station.
From that incorrupt channel emerged thousands of surprises, mostly waste, but also objects that accidentally fell into the water. As the metro required excavation at a great depth, it reached the level of the Pleistocene (10,000 years ago) and, above all, archaeologists found from mobiles (but no smartphone, since the works began in 2005), to photo cameras, cassette tapes or identity cards. But also toys of the twenties, nineteenth century colony flasks, Victorian shoes, daggers and the remains of a medieval armour. Among the findings, there are 195 keys and 110 padlocks, 13,418 bottles of water and 7,354 bottles of wine, 713 spoons and 1,394 table knives, and also 154 watches, 908 buttons, 267 belts, a dozen glasses and two dentures. They have also catalogued 256 bullets of all times and three of pistols (one of them toy). And coins, 2,947, from Roman sesterces to the current euro.
The journalist Sophie Haigney has analysed, in an article in The New York Times, the life of some of these objects. Perhaps, the most curious of them all is the toothpaste tube Luxadont, that was produced in the 30s. This finding came to mobilize the Dutch army, which employed the toothpaste to do dozens of tests, because it was a radioactive toothpaste.
It seems that, during the 30s, radioactivity had an aura of unsurmountable modernity and was used as a hook to attract buyers, just as everything nowadays has to be “green”, since we praise organic vegetables (as if not they all were) and we glorify bifidus and probiotics as if there was no other possible option on earth. This toothpaste actually had a small part of thorium in the composition, and the manufacturers claimed that, with a little radioactivity, the teeth would be healthier and whiter. No wonder, this is the same epoch in which parties were organized on Las Vegas hotel roofs to watch the nuclear tests live.
Plunging into the newspaper library of La Vanguardia, one of our Bibles when it comes to cultural history, I see that in Catalonia we also followed the fashion of radioactive products. Not only with the “radioactive toothpaste” Doromad, one of those miraculous pastes, which “cleans, whitens and keeps the teeth” (sic), but also with the “radioactive sulphurous thermal cure” offered by the spa La Puda de Montserrat in 1928, and that helped to treat all kinds of herpes, skin diseases, arthritis or rheumatism. And of course, the radioactive waters were not only good for bathing, they were also good for drinking. From 1925 to 1945 we found advertisements, proclaiming “Do not ask for mineral water, ask for Amer Palatin”, a “digestive, radioactive and diuretic” water that they recommended to use daily, especially to prepare tisanes.
Illustrations created by different users of some of the objects found in the bottom of the Amstel river. You can make your own here | <urn:uuid:99b1aeef-549a-48b4-8377-6b5e8e164ab0> | {
"date": "2019-01-23T09:07:56",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584328678.85/warc/CC-MAIN-20190123085337-20190123111337-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9611720442771912,
"score": 2.515625,
"token_count": 814,
"url": "https://www.thenewbarcelonapost.com/en/do-not-ask-for-mineral-water/"
} |
How Will Climate Change Impact the Great Lakes?
Below: A Lake Ontario shoreline
Lower water levels. Warmer air and water temperatures. Less winter ice cover. More extreme storms.
Scientists believe this is the future of the Great Lakes basin as it begins to feel the impacts of climate change.
Al Douglas is the director of the Ontario Centre for Climate Change Impacts and Adaptation Resources, an agency tasked with communicating the science of climate change and its impacts. He recently spoke to Rust Wire about what residents of the Great Lakes region should know and understand about climate change. Our conversation has been edited for space. (To read more on this topic, see here, the Great Lakes Regional Assessment here, a report from the Union of Concerned Scientists here or the Climate Change on the Great Lakes project here.)
Editor’s note: We first met Douglas through the Institute for Journalism and Natural Resources’ Great Waters Institute, which educates journalists about environmental issues surrounding the Great Lakes. -KG
RW: “Can you start out by summarizing some of the changes and trends that you and other scientists have seen so far in the Great Lakes basin?”
AD: “It varies, because the basin is so big, it varies from place to place. The changes in climate vary a bit as you move from location to location around the Great Lakes. But there have been noted increases in temperature, since the last – well, since they have been recording temperatures, – changes …of around two degrees Celsius in some areas and a little less in other areas. Those are the average annual temperature changes that we see in different parts. We tend to also see a bit more variability that exists with the weather. We have highs and lows, and the lengths of time that we spend in those highs and lows has been changing as well…there are also the extremes. There is lots of evidence of large storm events that have occurred in the basin, that have caused problems for communities in the Great Lakes.”
RW: “When you say ‘extreme events’ do you mean something like a large thunderstorm or snowstorm, kind of like a ‘100-year-rain’?”
AD: “That’s right, yes. That’s a good way to communicate it, people can understand those terms…But you have to be a little careful with the words, because it is not just a one-in-100 year storm, it is the odds that a one-in-100 year event will occur each year; that’s the way to look at it. The intensity of those events seems to be at a higher level that we are used to and in some cases, they seem to be popping up more often in different locations.”
RW: “With the differences in temperature you mentioned, two degrees Celsius doesn’t really sound like a lot to most people. Why is that important?”
AD: “To the common person, I think that is a fair response. People don’t usually understand the magnitude of those temperature changes or even the associated average annual precipitation. The temperature and the precipitation are presented, both of those are presented as annual averages. That’s the data we’ve got.…The magnitude of that number is not very large…The difference in temperature from when we were coming out of the last ice age, and now, given that it was only around five degrees Celsius, that’s significant. That’s half of what that temperature change is. It has taken 10,000 -12,000 years to experience five degrees Celsius, and ….when you compare it to that number, it is quite significant. And again, that number does not capture the variability; it does not capture the extremes, so you are only looking at one aspect of climate change.”
RW: “My understanding is that one result of climate change will also be lower Lake levels. It sounds counter-intuitive, since there will also be more precipitation. Can you explain that?”
AD: “You’ve got warmer air temperatures, which also leads to warmer water temperatures. So, you’ve got a heating of that system. It holds the heat an awful lot longer. So warmer water temperatures, plus warmer air temperatures means that there is shortening of the ice cover season. And we depend on the ice cover –the freezing of the Lakes- to try to control the evaporation from the Lakes. So where you’ve got a shorter ice cover season, you could potentially have larger evaporation.”
Below: A Great Lakes ship passes through the locks at the Welland Canal in St. Catherines, Ontario.
RW: “And lower water levels impacts shipping, boating, recreation, a lot of things, right?”
AD: “Changes in water levels in the Great Lakes has a number of different impacts. Shipping and navigation – it is difficult to haul some of the large loads that they have, trying to get through the system. Tourism and recreation- there are aesthetic issues, beach closures, things like that. Fisheries- changes to the species, there are cold, cool and warm water species of fish. Where you’ve got certain populations now, and those could change into the future depending on the water temperature. Energy and industry, human health, munipicalites even consumption in some areas, all of this can be impacted by water levels.”
RW: “I think of lot of folks, particularly in the Midwest, mainly hear about rising sea levels, so they don’t really think climate change will impact them. How does climate change in the Great Lakes basin impact, say an average person living in a place like Cleveland, Milwaukee or Detroit? What changes might a person who uses the Lakes recreationally see? Why should they be concerned?”
AD: “You need to communicate the quality and quantity of water in the Lakes to be able to convince them that it is important to pay attention to…. There are huge, huge, economic benefits that are derived as a result of the waters in the Great Lakes. People often don’t understand that or appreciate it, or underestimate it. It’s a huge part of our economy. There are so many sectors- when we were talking about the water levels of the Lakes, and the number of different sectors that are impacted, these communities are dependent on water in the Great Lakes, water quality and water quantity. You know, as things change, as temperatures increase, as we see these changes to the system, we have to understand that is going to affect the economies in our communities. In addition, and this is so often undervalued or underappreciated, is the fact that it is affecting the ecosystem, the health of the ecosystems. The plants, the birds, the fish, and the intangible benefits that we derive from the biodiversity and ecosystems of the Great Lakes. As things change, so do they have to change and adapt. And where there are limits to adaptation and they are not able to adapt, we have this loss of diversity and shifting of species.”
RW: “Is there anything I haven’t asked about that you would like to mention or highlight?”
AD: “I suspect that the majority of your readers will be in the US. So, it’s worth noting the efforts of the EPA and NOAA right now and what they are doing in responding to climate change. I get news articles and different reports that come across my desk almost every day that show there is a lot more activity going on, in the States, both from the EPA and NOAA. That is very, very encouraging for me to see that happening at that level in the US…. To me, it’s that we’ve moved beyong the discussion about whether it is happening or not to ‘what sorts of activities do we need to do to make sure we’re prepared for this and able to respond to this.’”
Below: The Toledo skyline along the Maumee River, which flows into Lake Erie nearby. | <urn:uuid:b7674a37-af7c-49c9-ab8e-3b1ccc62cc6c> | {
"date": "2015-04-27T13:34:21",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246658376.88/warc/CC-MAIN-20150417045738-00262-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9623708724975586,
"score": 3.59375,
"token_count": 1694,
"url": "http://rustwire.com/2011/06/23/how-will-climate-change-impact-the-great-lakes/"
} |
Why does my text claim the object of Sonnets 1-126 is a woman, when eNotes claims they were written about a young man?
1 Answer | Add Yours
The answer is simply because the post-Victorian, prim, proper, prudish, unaccepting literary critic who wrote your English text probably wanted to (as so often happens) censor out anything that could be read as homosexual in the world's greatest author. People just don't want to accept that Shakespeare - though he was married - might have been attracted to men.
This, though, doesn't make him "gay". For the Elizabethans, sexuality was a fluid matrix - there was no straight, or gay: and there was likely nothing taboo about sleeping with man or woman, no matter what your gender! Shakespeare's contemporary, Christopher Marlowe, famously wrote that he loved to indulge in "tobacco and boys".
Unfortunately for such critics, there is a strong vein of homophobia running throughout Shakespeare's work, and the sonnets you refer to are indeed addressed to a young man - though the later sonnets are not (they're addresssed to a dark-skinned female). For proof, refer to Sonnet 20, and its reference to "a master-mistress", undoubtedly in possession of a "thing", and not "nothing" (Elizabethan slang for male and female genitalia).
Join to answer this question
Join a community of thousands of dedicated teachers and students.Join eNotes | <urn:uuid:6e6637b4-ed20-46e3-becc-216e65130409> | {
"date": "2014-12-22T12:15:57",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775222.147/warc/CC-MAIN-20141217075255-00099-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9780763387680054,
"score": 2.71875,
"token_count": 304,
"url": "http://www.enotes.com/homework-help/why-does-my-english-text-address-object-sonnets-1-44771"
} |
Don't forget the world's food gap
- Former Senate Majority Leader Tom Daschle is shown speaking at a Capitol Hill hearing in this January 2009 file photo. AP Photo
First, we must support scientific and technological innovation in agriculture. In the past 25 years alone, farmers in the United States have boosted corn production by more than 40 percent. And products in the ag pipeline offer the promise of nutritional outputs that will improve products and boost yields. In order to realize these new technologies, we must foster innovation by incentivizing and encouraging investment in biotech and broader agricultural research and development.
Second, we must facilitate an open, competitive marketplace. The most significant scientific achievements occur when we combine the best of competition and collaboration. The ability of multiple companies to offer differentiated products and services in an open marketplace promotes agriculture productivity, accelerates innovation and increases choice. One way to achieve this is through strengthened legal and legislative safeguards designed to encourage innovation while protecting intellectual property rights in agriculture. Within this regulatory structure, facilitation of American agricultural exports is key; global regulatory barriers to market entry must be removed.
Third, we must collaborate to innovate. In order to face 21st-century food demands in a way that promotes health and protects the environment, innovation in science and competition must be accompanied by collaboration among parties who have traditionally been somewhat divided. This will require collaboration between companies, environmental groups, farmers, NGOs and governments to ensure that efforts are not mutually exclusive. For example, we must move past old illusions about food vs. fuel. Advances in agricultural innovation can help to both feed and fuel the world. In the face of climate change and national security threats, we must continue to innovate so that the agriculture industry can meet the demand for both food and fuel in the coming decades.
Finally, we must empower farmers worldwide with the tools necessary to meet this growing demand. Partnerships must be forged between governmental leaders and local farmers in the developing world to facilitate the ability of these countries to increase their crop yields, enhance resistance to pests and improve crop performance in challenging climates.
The challenges we face are daunting. But I remain confident that harnessing the innovation of our policymakers, scientists and farmers around the world will put us on track to feed the world and preserve its resources. Indeed, we have no other choice.
Tom Daschle, a Democrat, served as a senator from South Dakota from 1987 to 2005 and was Senate majority leader. He is a senior policy adviser at DLA Piper, the distinguished senior fellow at the Center for American Progress and a founder of the Bipartisan Policy Center. | <urn:uuid:053858c7-8723-41e4-bca6-c24935cc76ae> | {
"date": "2015-10-06T19:15:14",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678979.28/warc/CC-MAIN-20151001215758-00196-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9343473315238953,
"score": 2.609375,
"token_count": 522,
"url": "http://www.politico.com/news/stories/0210/32980_Page2.html"
} |
Hi, I just received my copy of Cath Ruis na Rí for Bóinn, by PUL, an update into modern Irish of an Old Irish story (for=an old version of ar). He provides a list of notes, which are specifically stated to have been composed by him and not by an editor. And one of his notes is this:
Lucht cómhairle: members of a council. The use of the Irish word ball in the general sense of the English word member is a horrible mistake. The Irish word ball has no such general meaning. The fundamental meaning of ball is a place. Its sense as a member [I think he is talking of a limb here] is a secondary meaning. It is ridiculous, intolerably ridiculous, to hear the members of an association called baill. Cá bhfuil na baill? does not mean where are the members? It means where are the places? | <urn:uuid:bea9a483-b8de-4d25-8c7d-ad54290a0db5> | {
"date": "2018-01-22T23:42:06",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891546.92/warc/CC-MAIN-20180122232843-20180123012843-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.982637882232666,
"score": 2.609375,
"token_count": 193,
"url": "https://corkirish.wordpress.com/2011/02/09/does-ball-mean-member/"
} |
Hawaiian Monk Seals
(PC: Iris Takahashi)
- The Monk Seal’s Hawaiian name is llio-holo-i-ka-uauja, which translates to “dog running in the rough seas.”
- Hawaiian Monk Seals live in the Hawaiian islands and nowhere else!
- The Hawaiian Monk Seal is Hawaii’s official state mammal.
- Monk Seals can live to 25-30 years.
- Monk Seals are not like their cousins sea lions or elephant seals in that they do not live in colonies.
- Adult Monk Seals are about 6-7 feet in length and weigh about 400-600 pounds.
- There are currently about 1400 Hawaiian Monk Seals: 1100 in the Northwestern Hawaiian Islands and 300 in the main Hawaiian Islands. This makes the Hawaiian monk seals one of the most endangered animal species in the world.
- There are two other monk seal species in addition to the Hawaiian Monk Seal: the Caribbean Monk Seal and the Mediterranean Monk Seal.
- The Caribbean Monk Seal is extinct – the last one was seen in 1952.
- The Mediterranean Monk Seal is critically endangered — there are less than 500 individuals remaining.
- It is estimated that in the 1950s there were about 3000 Hawaiian Monk Seals, meaning today the seals are only at about 1/3 of their historic estimates.
- Some of the biggest threats to the Hawaiian Monk Seals are entanglement in marine debris, shoreline habitat loss, disease from other species (for example, toxoplasmosis from feral cats), and, shockingly intentional killing.
- Hawaiian Monk Seals have one of the highest documented entanglement of any seal/sea lion/walrus (pinniped) species. General marine debris, plastic pollution, and fishing gear (legal and illegal) constantly affect habitat. Despite NOAA and its partners removing over 700 metric tons of marine debris fro the Hawaiian islands and surrounding areas since 1996, accumulation rates remain constant.
- Hawaiian Monk Seals have been intentionally killed by humans likely because the seals were seen as a threat that were “stealing” fish.
Sources: https://www.fpir.noaa.gov/PRD/prd_hms_learn_about.html; http://h-mar.org/you-can-help-save-endangered-marine-animals/ | <urn:uuid:55116e96-f373-4bd4-bb0f-8611e41ef0ee> | {
"date": "2019-01-16T19:25:03",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657557.2/warc/CC-MAIN-20190116175238-20190116201238-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9131532311439514,
"score": 2.921875,
"token_count": 494,
"url": "http://wildalohafoundation.org/wildlife-info/hawaiian-monk-seals/"
} |
Few beings in the Star Wars universe can claim to have influenced and shaped the galaxy as much as Sheev Palpatine. The Emperor began his career as a seemingly kind and modest public servant. He showed that face to most of the galaxy, but he was so much more than a mere Senator of Naboo. After removing his master Darth Plagueis from the picture, Palpatine invested in a long-term plan. Because he carefully maneuvered pawns into place and twisted any and every situation to his favor, he rose through the ranks and was able to hide his Sith identity.
Palpatine’s patience and flexibility paid off as he coaxed the galaxy into war and then rescued it. The Emperor who formed the Imperial Senate was viewed as a savior of sorts. He stopped the all-powerful Jedi and brought peace to planets ravaged by the Clone Wars. It would be years before a meaningful number of citizens raised an eyebrow at Palpatine and his Empire and started fighting back. But even with the formation of the Rebel Alliance and the destruction of the first Death Star, Palpatine never stopped playing the game.
The actions of Palpatine ultimately caused a tremendous amount of devastation, hardship, and loss, but to serve his ultimate plan, he made intelligent decisions along the way. Here are five times Palpatine was right:
1. Recruiting Count Dooku
After the unexpected loss of his apprentice Darth Maul, Palpatine recruited Count Dooku and dubbed him Darth Tyranus. Dooku was a former Jedi and that, combined with his position as Count of Serenno, made him an ideal candidate. He was key to making the clone army come to fruition and to leading the Separatists. His ego also likely made him easier to manipulate.
2. Creating the Grand Army of the Republic
Peaceful times arguably mean that no standing army is needed, but it sure seems like a wise idea to have one ready just in case. Sure, the Jedi Order was on hand to keep the peace, but there were only so many of them and they weren’t organized and focused in the same way as a military organization. Palpatine’s movement to have an army was selfish, yes, but maybe not the worst idea.
3. Befriending Anakin Skywalker
Anakin Skywalker played a key part in Palpatine’s vision — he was perhaps the most important element. Palpatine knew just how to play his cards with the Chosen One from the first time he encountered him in The Phantom Menace. The fact that Palpatine had his eye on Anakin all along didn’t guarantee he could successfully turn the Jedi to the dark side though. Palpatine was deliberate and cautious, and he molded Anakin into the apprentice he wanted and needed masterfully.
4. Wiping out the Separatist leaders
After Anakin swore allegiance to Palpatine, the Emperor made moves to cover his tracks. One such move was clearing the slate by getting rid of the Separatist leaders. Their presence would have only hindered Palpatine’s new “peaceful” direction with the Imperial Senate and having them killed help put the nails in the coffin of the Clone Wars.
5. Dissolving the Imperial Senate
It took Palpatine a long time to take complete control, and the final straw was eliminating the Imperial Senate. He planned to disband the government organization once the Death Star was operational, but when the plans were stolen, he used the situation to his advantage by accurately pointing out a senator supported the Rebellion. This allowed him to rule the galaxy through select Imperial officers and granted him unchecked power. | <urn:uuid:fba0264b-fdcc-434d-97ac-425f360e6ba8> | {
"date": "2019-02-19T03:14:57",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489304.34/warc/CC-MAIN-20190219020906-20190219042906-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9845601320266724,
"score": 2.859375,
"token_count": 757,
"url": "https://www.starwars.com/news/5-times-palpatine-was-right"
} |
|Tree care at commercial projects or homeowner associations is often overlooked until serious problems or significant costs occur. Maintenance budgets seldom provide for periodic maintenance of growing trees or for long-term tree care. Trees are seldom an issue in new or young projects, but they can become significant cost and hazard liabilities as their size and age increases.|
A Tree Management Plan is based on an accurate Tree Inventory and Tree Assessment.
- Tree Inventory - Establishes the location and species of each tree throughout the site and documents this information on a site plan for permanent long-term reference. Each tree is assigned an identification number, which is utilized for reference, planning, or action steps. The inventory step is a one-time project. All planning is based on the information provided in this permanent tree document, and all reference to trees is made from it.
- Tree Assessment - Individually reviews each tree documented during the inventory to determine what short- or long-term management steps are required to optimize health, appearance, or safety. Included are issues of hazards, aesthetics, pruning, physical problems with hardscape, cultural problems, pest and disease, or other management issues. The assessment generates specific recommendations for action suitable for use by the appropriate landscape maintenance or pruning contractor.
- Tree Management Plan - Combines information generated during the inventory and assessment phases into a site-specific, long-term action plan. The plan specifies action steps and timing, based on priorities set by site management and the annual budget available for tree resources. Specifies what to do and when to do it. Completion of tree-care action steps are budgeted to occur over a specific time period. | <urn:uuid:2b680953-d0ea-4f3f-b77a-54b413fdc3a1> | {
"date": "2019-04-25T01:47:28",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578678807.71/warc/CC-MAIN-20190425014322-20190425040322-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9281960129737854,
"score": 2.703125,
"token_count": 336,
"url": "http://horticulturalassociates.com/tree-management-plans.html"
} |
Yogurt is available in many varieties, best described by their characteristics:
In addition to yogurt made from regular cows’ milk, some yogurts are made from goats’ milk.
American yogurt originally contained only Lactobacillus acidophilus, L. thermophilus, and L. bulgaricus cultures. Yogurts are now available with added bifidobacteria and other beneficial lactic-acid bacteria.
Yogurt can be purchased with a range of fat content, from cream-on-top style to fat-free.
Varieties include the different flavors of plain yogurts, and yogurts sweetened with sugar, honey, maple syrup, or fruit juice; some yogurt contains fruit preserves.
Some yogurts are thick and rich; others, such as Greek yogurt and others made in the Eastern European style, are very smooth; yet another variety is a beverage drink that resembles Kefir, and yogurt products are available in many other styles as well. | <urn:uuid:8ba10ca3-8b88-4159-aa11-70709868884c> | {
"date": "2014-10-23T00:09:25",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507448169.17/warc/CC-MAIN-20141017005728-00312-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9502813816070557,
"score": 2.734375,
"token_count": 208,
"url": "http://www.koshervitamins.com/shop/stores_app/healthnotes.asp?%2Fassets%2Ffood-guide%2Fyogurt%2Fselecting-and-varieties"
} |
Infant and Childhood Stroke Fact Sheet
is a stroke?
A stroke, also known as a cerebrovascular accident (CVA), occurs when the blood supply
to any part of the brain is
interrupted, resulting in tissue death and loss of brain function.
If blood flow is
interrupted for longer than a few seconds, brain cells can die, causing
causes a stroke in an infant or child?
stroke may be caused by a blood clot that forms in the brain (a thrombus)
or a blood clot, piece of plaque, or other material that travels to the
brain from another location (an embolism). The resulting stroke-related symptoms depend on the area
of the brain affected, the extent of the damage, and the cause of the
stroke. Bleeding (hemorrhage) within
the brain can, on rare occasions, cause symptoms that mimic stroke.
of strokes: Ischemic Stroke, Hemorrhagic Stroke
Strokes are classified as either ischemic or hemorrhagic.
In children, ischemic stroke
is more common than hemorrhagic stroke.
An arterial ischemic
stroke is due to a blockage of
the inflow of arterial blood.
A hemorrhagic stroke ocurs
when a blood vessel in the brain breaks or ruptures.
Before 28 days of age: Perinatal stroke encompasses cerebrovascular events that occur between the
28 weeks of gestation and one month following birth. A stroke that
occurs before birth may also be called an in-utero stroke or fetal
stroke. Another term
often used in this group is prenatal stroke. Prenatal stroke
occurs in the period before birth Stroke occurs more frequently in
the perinatal and prenatal age group than in older children.
Childhood stroke occurs between 1 month and 18 years of age.
Arterial ischemic stroke around the time of birth is recognized in one in
4000 full-term infants (2).
Arterial ischemic stroke which occurs in childhood ranges from 0.6 to 7.9 per 100,000 children (1).
The incidence of hemorrhagic
stroke in children is estimated at 1.5 to 5.1 per 100,000 children per
Stroke Information (all ages)
(1) Cerebrovascular Disorders in
Children, John Kylan Lynch, DO, Current Neurology and Neuroscience Reports
(2) Stroke in newborn infants., Nelson, KB, Lynch, JK. Lancet Neurology,
© Copyright 1997-2007, CHASA, All Rights Reserved
The information contained in this web site and on the Hemi-Kids
listserv are not a substitute for medical advice or treatment,
and the site owners recommend consultation with your doctor or health care professional. | <urn:uuid:765da6f3-d954-47c1-a3db-88899510bc04> | {
"date": "2016-04-30T07:06:28",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111620.85/warc/CC-MAIN-20160428161511-00060-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8595226407051086,
"score": 3.21875,
"token_count": 593,
"url": "http://pediatricstroke.org/stroke_facts.htm"
} |
Well most of it. In elementary school you probably learned about some guy named Basho writing three lined poems about nature, with the first line containing five syllables, the second seven, and the third five. Damn this is easy, you thought, as you were forced to write your own in-class. And your teacher dutifully checked for the syllable count and gave you and A+. Why? Because you can count to seven. If I’m assaulting the last glimmer of light in an otherwise dismal academic career, then my apologies. You were misled by an oversimplification and ignorance on the part of your teachers on what haiku is.
Let’s start with the big one: just like a sonnet can fulfill all the form requirements and suck, so too can a haiku (and suck). But this quality of all poetry is somehow dropped for haiku, and the syllable count, not what the syllables say, are what determines a poem’s success.
But before we go on it’s necessary to examine what haiku was in Japan. I won’t bore you with history, but there are a few names you should know. The primary haiku authors from Japanese literature are Basho, Buson, Issa, and Shiki. As haiku grew into its own independent form of poetry, it acquired certain characteristics. Classically speaking, a “season word” was always included, that is, something that denotes or implies the haiku’s season. For example, this haiku by Saimaro:
leaves of the plum
the color of cold wind
The season word is rather obvious in this, but I put it in green anyway, as I don’t exactly trust the same school system that taught us syllables = poem. Regardless, a season word is directly included. Sometimes, however, it is implied, like in this poem by Kaiga:
running errands right and left
The clue-in to the season is fireflies. Since fireflies only come in the summer months, we can assume the season is summer. When this is utilized in English however, the result is usually a choppy, one-of-four word approach that distracts from the true nature of haiku (see below). This is due in no small part to the more stress Japan places on the season, through a combination of Shintoism‘s kami in them and the susceptibility, shall we call it, to seasonal natural disasters. As a result of this emphasis, many words and animals in the Japanese language have significant seasonal associations, a characteristic English lacks. As we’ll see, this is far from the only language difference leading to a misunderstanding of English haiku.
Brief Interjection: The plural of haiku is haiku. Not haikus, no matter what anyone says. Japanese doesn’t have plurals the same way that English does. The movie wasn’t Seven Samurais, was it?
When composing your own haiku so many years ago, you may recall how it felt awkward, fulfilling that syllable count, and in a different way that writing to a rhymed rhythm. It just didn’t sound right. While there are ways to do it (see some in The Haiku Anthology), this awkwardness is due to the linguistic differences between Japanese and English. The Haiku grew up in Japan — naturally it adopted a form that intertwined nicely with the language. English and Japan are about as far apart linguistically as a language can get it, and to maintain the same elegant simplicity of Japanese haiku, an English author is incapacitated by the long syllabic requirements. The equivalent of a haiku’s worth ofJapanese syllables to English is about 3-5-3, a number that fits more naturally into the length and structure of English phrases.
The Nature of Haiku
At its core, a good haiku is a single moment in time, taken from the time stream by capturing the most base elements of it, and then preserving it as the written word. Moments are not very long–haiku’s sparse form and Zen-like qualities reflect that. So what constitutes a moment? Essentially haiku is a juxtaposition between the human self and nature, or a revealing of the self through a reflection in nature. The oft-quoted Santoka poem is a perfect example:
Dragonfly on a rock–
The introduction of Haiku: An Anthology of Japanese Poems by Stephen Addiss, Fumiko Yamamoto and Akira Yamamoto, uses the above haiku (10) and adds for commentary:
The observation of an insect leads to a deeper consideration of our own
perceptions. We may well ask…who is daydreaming?
I can’t remember learning that in school.
So is it even possible to write good English haiku? Of course. The magazines Modern Haiku and Acorn carry quality selections, and I highly recommend you subscribe. An example of a delightful poem from issue No. 28 Acorn:
Apple orchard scents–
of the abbot’s hello
– Rebecca Lilly
Well it’s definitely possible. I understand that most schools don’t have the luxury of spending several weeks or even a few days on haiku, but this didn’t take more than ten minutes now.
For further reading:
The Haiku Anthology (contains modern English haiku) | <urn:uuid:fdaf3dc2-9e3f-46a8-9668-af351100fbf6> | {
"date": "2017-08-17T13:28:38",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103316.46/warc/CC-MAIN-20170817131910-20170817151910-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9490428566932678,
"score": 2.671875,
"token_count": 1140,
"url": "https://newagemocha.wordpress.com/tag/school/"
} |
International Baccalaureate Exams are a diploma program which is designed to assess students and groom them in such a way that they will be fully capable of doing things on their own in a workplace. This exam is conducting its assessment in two methods. They are namely Internal Assessment and External Assessment. In Internal Assessment they conduct laboratory tests and experiments when it comes to science, field studies when it comes to geography, Investigations when it comes to mathematics etc. External assessment consists of academic essays, structured problem solving, multiple choice questions, case study questions etc. Therefore in order to get through this examination it is quite tough. Which is why in the present day private tutors are available for this course of studies. Here are a few tips on how to survive this exam with the help of private tuition.
Own this Examination
The moment you decide to take on this examination you need to keep in mind that this exam is for yourself. You can’t expect anyone to do things for you or expect things to happen on other people’s account. You will have to be ready to make the effort to get through this examination. There will be difficult subjects i.e. mathematics, science etc. which will also have support guidance available i.e. IB chemistry tuition, mathematics tutors etc. You need to ensure you take the most out of this available resources and make it a point to live up to the standards of a person who would have the willingness to get through this. Briefly, you need to understand the degree of difficulty in this course of study.
Once you get into this course, you will have also sorts of extra classes, lectures and many other work filling up your schedule. This will require a lot of commitment to get through. Especially when you would have to attend a lot of IB chemistry tuition or mathematics extra classes when your semester exams get close, you will have to prioritize your work and ensure all your work gets done. In addition to that, there will be assignments, group and individual ones which needs to be done as partial requirement of your modules.
When someone says exam tips, people would expect some miraculous ways to study and find easy way outs. Well, sadly there aren’t much short cuts when it comes to exams. You just need to sit down, relax, and make yourself study on your own purpose. Of course you can find unique ways to study for yourself. Some find it more memorable to write things and remember them. Some find it memorable to read things. However, I prefer to do both read and write at the same time which makes the best possible memory in your mind.
Anyhow, the best advice you can possibly get is to ask yourself, do you really want to do this exam? If yes, make it a point to live up for it. | <urn:uuid:02fda367-f770-44db-b6a8-fcbaf1f2b985> | {
"date": "2019-06-26T07:57:51",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000231.40/warc/CC-MAIN-20190626073946-20190626095946-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9632756114006042,
"score": 2.625,
"token_count": 569,
"url": "http://brilicious.com/how-to-survive-in-international-baccalaureate-exams/"
} |
May 9, 2014
Carbon nanotubes increase clinical breast imaging efficiency
Digital breast tomosynthesis (DBT) overcomes some of the limitations of digital mammography – the current gold standard for the early detection of breast cancer. Now, reporting in Nanotechnology, researchers have evaluated the use of carbon nanotube (CNT) cathodes in these systems and have not only increased the lifetime of the technology, but also decreased the time that is required to image patients.
DBT is a US FDA (Food and Drug Administration)-approved breast imaging modality that is gaining momentum as a competitor to two-dimensional (2D) radiography for breast-cancer screening. It is a quasi-three-dimensional (3D) modality that increases cancer detection rates by removing the effects of overlapping breast tissue. DBT acquires many X-ray projections over an angular range that are then reconstructed into a 3D image volume. This allows radiologists to scan the entire breast volume, leading to the visualization of more cancers and the proper diagnosis of those cancers.
Current DBT systems employ thermionic X-ray sources that must be physically rotated to acquire projection images. This leads to a loss of spatial resolution – crucial for properly detecting cancerous lesions – due to motion of the X-ray focal spot, gantry vibrations, and/or patient motion. The researchers have developed a stationary DBT (s-DBT) system employing field emission for X-ray production, which removes the need for tube motion (as reported in Qian et al. 2012 and Tucker et al. 2013). Removing tube motion increases the spatial resolution; further enhancing the cancer detection capabilities of the DBT modality.
Applying carbon nanotubes
The s-DBT technology has been made possible due to the field emission properties of CNTs. CNT-based X-ray source arrays have now been integrated into pre-clinical s-DBT systems. In this most recent study, the CNTs were rigorously tested for high-current capabilities, consistency, and the stability required for breast imaging tasks in a pre-clinical X-ray system.
The performance of the CNT emitters surpassed the requirements for DBT acquisition. They were further tested under conditions mimicking 2D mammography imaging. The performance of the CNT X-ray source array in the prototype s-DBT system was tracked over several years’ time. The system was put to use performing various breast imaging tasks and maintained stable operation conditions over that time, and continues to perform stably to this day.
A duplicate system has been installed at the North Carolina Cancer Hospital in Chapel Hill, NC, and is in use in a clinical trial. 100 patients will participate in this study – the results of which will hopefully support the screening and diagnostic power of DBT imaging, and illustrate the advantages of the s-DBT system in particular.
More information about the research can be found in the journal Nanotechnology 25 245704.
About the author
Emily Gidcumb is a materials science PhD student at the University of North Carolina at Chapel Hill (UNC-CH) working under the advisement of Dr Otto Zhou and Dr Jianping Lu. Her soon to be completed dissertation is titled “Performance of a carbon nanotube field emission X-ray source array for stationary digital breast tomosynthesis”, which focuses on the fabrication, development and characterization of the s-DBT prototype system. | <urn:uuid:fe35ec13-4450-4200-95cd-4e8e33292002> | {
"date": "2014-09-02T09:15:14",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921872.11/warc/CC-MAIN-20140909030952-00040-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9402515292167664,
"score": 2.640625,
"token_count": 709,
"url": "http://nanotechweb.org/cws/article/lab/57166"
} |
Friday, March 23, 2012
Friday, March 16, 2012
Bruce Charlton, Professor of Theoretical Medicine, University of Buckingham, UK, hypothesizes that psychological neoteny, “retention of youthful attitudes and behaviors into later adulthood” - thanks to the impact of higher education and more time spent in school - equips people to deal more effectively with our ever changing world. Psychological neoteny would seem to put youthful characteristics of learning readiness and thinking flexibility at our disposal. According to Charlton, "A child-like flexibility of attitudes, behaviours and knowledge is probably
adaptive in modern society because people need repeatedly to change jobs, learn
new skills, move to new places and make new friends."
So, that perhaps points to value in nurturing youthful attitudes and behaviors in the context of organizational change to help those who are less change-adaptable to become a bit more so.
But, as we all know, youthfulness is a double edged sword, and Charlton points to an associated delay in maturation, particularly among academics, professionals and other groups with long educational cycles. Do you remember being young, unpredictable, quickly shifting priorities, being attached to the next "shiny new thing," maybe being overly superficial, fascinated with short lived fashion? (I do - though I'll never admit it in public.)
Perhaps then, communications and marketing efforts that support organizational change need to adapt some techniques used to market products and services to youth - "Red Bull gives you wings!"
Bruce Charlton's Miscellany (One of his many blogs)
Psychological Neoteny, NY Times, By Clay Risen
Serious Study: Immaturity Levels Rising - Jennifer Viegas, Discovery News
Charlton BG. Psychological neoteny and higher education: Associations with delayed parenthood. Medical Hypotheses. 2007; 69: 237-40.
Charlton BG. The rise of the boy-genius: psychological neoteny, science and modern life. Medical Hypotheses. 2006; 67: 679-81 | <urn:uuid:2227877a-71d3-41d6-9a22-5b77ad04314e> | {
"date": "2013-05-24T22:29:03",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9389405250549316,
"score": 2.671875,
"token_count": 423,
"url": "http://reflectionskmoi.blogspot.com/2012_03_01_archive.html"
} |
If you are already convinced you need an all-in-one enterprise solutions system for your organisation, you can contact us on [email protected]
DevOps is a set of practices that automates the processes between software development and IT teams, in order that they can build, test, and release software faster and more reliably. The concept of DevOps is founded on building a culture of collaboration between teams that historically functioned in relative siloes. The promised benefits include increased trust, faster software releases, ability to solve critical issues quickly, and better manage unplanned work.
What is Analysis and Design?
Analysis emphasizes an investigation of the problem and requirements, rather than a solution. For example, if a new online trading system is desired, how will it be used? What are its functions?
“Analysis” is a broad term, best qualified, as in requirements analysis (an investigation of the requirements) or object-oriented analysis (an investigation of the domain objects).
Design emphasizes a conceptual solution (in software and hardware) that fulfills the requirements, rather than its implementation. For example, a description of a database schema and software objects.
Design ideas often exclude low-level or “obvious” details—obvious to the intended consumers. Ultimately, designs can be implemented, and the implementation (such as code) expresses the true and complete realized design.
As with analysis, the term is best qualified, as in object-oriented design or database design.
Useful analysis and design have been summarized in the phrase do the right thing (analysis), and do the thing right (design). | <urn:uuid:46c39fd1-670b-4551-bac8-2e714a0dcdc4> | {
"date": "2019-10-20T19:25:35",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986718918.77/warc/CC-MAIN-20191020183709-20191020211209-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9282463192939758,
"score": 2.65625,
"token_count": 335,
"url": "https://mbict.co.za/we-implement-devops/"
} |
Treaty of Nerchinsk - The First Treaty between Russia and China
The Treaty of Nerchinsk (1689) (Chinese: 尼布楚条约) was the first treaty between Russia and China. The Russians gave up the area north of the Amur River and east of the mouth of the Argun River but kept the area between the Argun River and Lake Baikal.
The agreement was signed in Nerchinsk on August 27, 1689. The signatories were Songgotu on behalf of the Kangxi Emperor and Fedor Golovin on behalf of the Russian tsars Peter I and Ivan V.
The authoritative version was in Latin, with translations into Russian and Manchu, but these versions differed considerably. There was no official Chinese text for another two centuries, but the border markers were inscribed in Chinese along with Manchu, Russian and Latin.
Later, in 1727, the Treaty of Kiakhta fixed what is now the border of Mongolia west of the Argun and opened up the caravan trade. In 1858 (Treaty of Aigun) Russia annexed the land north of the Amur and in 1860 (Treaty of Beijing) took the coast down to Vladivostok. The current border runs along the Argun, Amur and Ussuri Rivers.
From about 1640, Russians entered the Amur basin from the north, into land claimed by the Manchus who at this time were just beginning their conquest of China. By 1685 most of the Russians had been driven out of the area. For this, see Russian-Manchu border conflicts.
After their first victory at Albazin in 1685, the Manchus sent two letters to the Tsar (in Latin) suggesting peace and demanding that Russian freebooters leave the Amur. The Russian government, knowing that the Amur could not be defended and being more concerned with events in the west, sent Fyodor Golovin east as plenipotentiary. Golovin left Moscow in January 1686 with 500 streltsy and reached Selenginsk near Lake Baikal in October 1687, from whence he sent couriers ahead. It was agreed the meeting would be in Selenginsk in 1688. At this point the Oirats (western Mongols) under Galdan attacked the eastern Mongols in the area between Selenginsk and Peking and negotiations had to be delayed. To avoid the fighting Golovin moved east to Nerchinsk where it was agreed that talks would take place. The Manchus with 3,000 to 15,000 soldiers under Songgotu left Peking June 1689 and arrived in July, (March remarks that there were no Mandarins with them since the journey had to be made on horseback and few Chinese gentlemen had mastered this undignified skill). Talks went on from August 22 to September 6. The language used was Latin, the translators being, for the Russians, a Pole named Andrei Bielobocki and for the Chinese the Jesuits Jean-Francois Gerbillon and Thomas Pereira. To avoid problems of precedence, tents were erected side by side so that neither side would be seen as visiting the other.
The Chinese wanted to remove the Russians from the Amur but were worried about possible Russian support for the western Mongols. They also wanted a delineated frontier to keep nomads and outlaws from fleeing across the border. They were interested in the Amur since it was the northern border of the Manchu heartland. They could ignore the area west of the Argun since it was then controlled by the Oirats. The Russians knew that the Amur was indefensible and were more interested in establishing profitable trade. Golovin accepted the loss of the Amur in exchange for possession of Trans-Baikalia.
The agreed boundary was the Argun River north to its confluence with the Shilka River, up the Shilka to the 'Gorbitsa River', up the Gorbitsa to its headwaters, then along the east-west watershed through the Stanovoy Mountains and down the Uda River (Khabarovsk Krai) to the Sea of Okhotsk at its southwest corner.
The border west of the Argun was not defined (at the time, this area was controlled by the Oirats). The Gorbitsa is hard to find on modern maps. Google Earth shows a Gorbitsa River as a tributary of an unnamed river that flows south to join the Shilka about 35 km east of Nerchinsk. If this is the Gorbitsa, Russia would have had a long narrow beak between the Shilka and Argun. Neither side had very exact knowledge of the course of the Uda River.
The treaty had six paragraphs: 1 and 2: definition of the border, 3. Albazin to be abandoned and destroyed. 4. Refugees who arrived before the treaty to stay, those arriving after the treaty to be sent back. 5. Trade to be allowed with proper documents. 6. Boundary stones to be erected, and general exhortations to avoid conflict. | <urn:uuid:e264a367-c001-4e9c-8add-1e5894179be4> | {
"date": "2016-02-12T12:15:09",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163729.14/warc/CC-MAIN-20160205193923-00277-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9748300313949585,
"score": 3.859375,
"token_count": 1076,
"url": "http://history.cultural-china.com/en/34History6480.html"
} |
Trilobites formed the class Trilobita and are well known marine and extinct arthropods whose fossils have been recovered from different places. The first fossil record suggests that they were present in the Early Cambrian Period but studies indicate that they flourished well in the lower Paleozoic era and become extinct with the beginning of the Devonian Period. They underwent mass extinction at the end of Permian about 250 million years ago. They were the most successful species that were present on the earth for about 270 million years. Their fossil record suggests that they were already dispersed in different locations. As their exoskeleton was perfect to undergo fossilization about 17,000 species have been found out which belong to the Paleozoic time. These fossil records have contributed a lot towards biostratigraphy, paleontology, evolutionary biology and plate tectonics. They are often placed under the subphylum Schizoramia within the superclass Arachnomorpha although different taxonomists place them differently.
Trilobites have switched over to a wide variety of habitats like some moved over the sea-bed as predators, scavengers or filter feeders and some swam, feeding on plankton. Some have even developed a symbiotic relationship with a sulphur eating bacteria. Their role in parasitism is still debatable. They show their characters resembling with Crustacea, Chelicerata and Mandibulata. Only their exoskeleton has been found in the fossilized form and only traces of their soft parts have been found out. They may vary in size from 1 mm to 72 cm but the typical size may reach 3-10 cm. the largest fossil of trilobite was found in 1998 by the Canadian scientists in the Ordovician rocks on the shores of Hudson Bay belonged to the genus Isotelus rex. The exoskeleton is made up of calcite and calcium phosphate entangled in the protein matrix of chitin that covers the upper surface and curled on the lower side in the form of fringe that forms a structure known as doublure. The body is divided into three segments namely head, thorax and pygidium. The thorax is composed of a number of segments ranging from 2-61 but in general they may be 2-16. The segments lie in between head and the pygidium. Each segment is made up of a central axial ring and outer pleura that protects the limbs and the gills. The pleurae may be sometimes prolonged into spines. Apodemes are bulbous projections present on the ventral surface to which the leg muscles are attached.
The pygidium is also formed of a number of segments and the telson is fused together. The segments resemble the thoracic segments but are not articulated together. Depending upon the position of pygidium trilobites may be classified as micropygous meaning pygidium smaller than head, isopygous where is pygidium similar in size to that of head and macropygous where pygidium is larger in size as compared to that of head. The exoskeleton consists of a large number of scale-like structures collectively known as prosopon. It includes finer scale features like ribbing, domes, pustules, pitting, ridging and perforations. Its exact role is not known but it is believed that it is involved in structural strengthening, sensory pits or hairs, preventing predator attacks and maintaining aeration while enrolled. Some have developed horns over their heads that resemble like that of the modern beetles. The soft pars of the body have been recovered from only 21 species. They have a single pair of pre-oral antennae and undifferentiated biramous appendages. Each exopodite has 6-7 segments. Exopodites also bear coxa which also bears gill branch used for swimming or respiration. The mouth is situated at the edge of hypostome and lacks teeth. The mouth is coupled with the glabella which is an adaptation for carnivorous feeding habit. The mouth is attached to the stomach through the oesophagous. The intestine in turn is finally attached to the pygidium. The presence of heart, liver and other internal organs is simply predicted but no direct evidence is available in this regard.
Many trilobites had complex eyes although those dwelling at the bottom of the sea lacked them. The eyes were typically compound with lenses in the form of elongated prism. The number of lenses may vary from one to thousands in a single eye. The lenses are arranged in a hexagonal fashion. The lenses are made up of calcite. The prosopon are of several types which help on the collection of chemicals as well as vibrations. They undergo moulting and the successive growth stages are known as instars. During moulting each segment grows in size and new segments get added up in the sub-terminal growth zone. | <urn:uuid:f73d2aee-649c-471d-927a-370f1a70c25d> | {
"date": "2018-05-27T07:24:22",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868132.80/warc/CC-MAIN-20180527072151-20180527092151-00016.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9699036478996277,
"score": 4.40625,
"token_count": 1012,
"url": "http://book-reviews-risioja.blogspot.com/2011/07/trilobite-extinct-marine-arthropods.html"
} |
Before analyzing the two SBIRS-HEO images, its necessary to review a little of phenomenology associated with viewing rocket plumes in the infrared. That’s because there are some surprising effects that show up very well in both these photos that, perhaps, most people would not be aware of. In particular, I’m thinking of the “trough” a missile plume appears to go through when it passes through a region roughly 70 to 90 km high. If you look back to the first post I made on these images , you can perhaps see this trough as a dim spot in the plume’s trace as it streaks across the field of view. But I’m getting ahead of myself. Today, we need to discuss both the signal and the predominant background: reflected sunlight.
From the very start of the US space-based, early warning program, our satellites have reduced the background caused by sunlight reflected off of various things (clouds, snowfields, water) by only looking in a very narrow wavelength around 2.7 microns. This is the band at which water both radiates—when it is created in the combustion of hydrocarbons such as kerosene and acids such as nitric acid—and absorbs when it is in a more relaxed state, such as water vapor in the atmosphere.
What the world would look like to SBIRS if there were no atmosphere
If you were to stand 100 meters away from a Titan II missile (sorry, I know that’s rather an obsolete missile, but I happen to have the data for its plume radiance but not for more relevant rockets such as the Delta II) was firing, every thing else would appear dimmer than the plume. That is because sunlight reflected from a square meter is relatively weak as shown in the left side of this picture:
The right side of this picture shows a rather artificial comparison, namely if there were no atmospheric or dynamic effects. Here, a single pixel on the SBIRS sensor is assumed to be 0.5 km x 0.5 km on a side. In that case, you have no choice but to add up (or, as a techno-wonk might say, “integrate”) all the sunlight reflected to SBIRS that landed in that pixel. In this case, the sunlight is assumed to be reflected by something like white sand (white in the infrared(!), whatever color that corresponds to) and is “diffusively” reflected. If the sun, Earth, and satellite are aligned in the proper way, you could get specular reflection, when the Earth acts as a very good mirror, and get a considerable increase in solar power directed into the pixel and further worsening the signal to noise ratio. It doesn’t take ice or snow to give specular reflections, you can see from an airplane that trees, rocks, cornfields, clouds also give specular reflection—only in this case, specular backscatter—if you look at the bright circle around the plane’s shadow.
Adding in atmospheric absorption
Most of the sunlight, however, is reflected off of things fairly low in the atmosphere. Even most clouds are, almost by definition, in the “moist” part of the atmosphere where water vapor can absorb the same wavelengths of light that is generated by the water molecules in the rocket exhaust. The graph below shows the one-way absorption of light by the atmosphere for different heights that it originated. Sunlight reflected off of clouds would have to pass twice through this absorption and be even further reduced relative to the signal.
By the way, this atmospheric absorption worked so well and the DoD was so entranced by it that it apparently became very difficult for other sensors, that did not use this this absorption band, to be approved. Lets hope that the few military satellites that have flown with other sensors have convinced the powers-that-be that those wavelengths are valuable too!
Rockets move fast
This is not the complete story, however! There are other effects as the rocket moves through the atmosphere that also changes its signal. At low altitudes, there is enough oxygen for unburnt fuel to combust in “afterburning.” This, plus the shear-induced shock wave produced by the exhaust as it hits the atmosphere upon exiting the nozzle, increases the plume temperature and hence the signal at low altitudes. Even the aluminum particles ejected from most solid propellants continue to combust and radiate at these altitudes. These low altitude enhancements reach a maximum at around 20 km and can fall very quickly above that as the atmospheric oxygen drops off.
After the low altitude effects drop off, the plume is said to enter a “trough” region where the overall brightness of the plume drops to very low levels. In addition to a lack of oxygen for afterburning, the rocket is moving so fast that its exhaust gas comes out almost at rest with respect to the atmosphere. This reduces the shear shockwave effect that reheats the exhaust at lower altitudes, causing a further reduction in radiation. The trough occurs roughly between 40 and 90 km. Above this altitude the exhaust brightness increases again: the exhaust first displaces the very thin atmosphere as it comes out at temperatures lower than the ambient temperature. But as the rocket moves away, the atmosphere actually compresses the exhaust plume, creating a new shockwave that can reheat the plume up to temperatures near the combustion chamber temperature. These different regions are shown in the picture below:
Tomorrow, we will use these effects to understand the images taken by SBIRS-HEO 1 and 2. Until then, you might want to play around with the model of the Delta II 7920H that I’ve written to simulate the June 11, 2008 launch that SBIRS-HEO 2 imaged. There are, unfortunately, a number of approximations I’ve had to make to simulate this missile with its very complex flight that has both ground- and air-lit strap on solid-propellant boosters. I’ve included it as the first entry in the comment section. Remember, you can use GUI_missileFlyout to run that model. | <urn:uuid:37f00bd1-39a8-4744-8072-43ef648d0e00> | {
"date": "2015-02-28T19:12:58",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462035.86/warc/CC-MAIN-20150226074102-00169-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9559992551803589,
"score": 3.3125,
"token_count": 1284,
"url": "http://forden.armscontrolwonk.com/archive/2134/sbirs-signal-and-background"
} |
Talking to your child about the death of a loved one is never easy, especially when you are feeling devastated yourself. But it's really important because these conversations can become the solid ground for your child to stand on as she comes to terms with this loss. Either you or someone who knows the child well and whom the child can trust needs to sit down with her in a quiet spot where she has your full attention. You don't want her trying to piece things together from overheard remarks. She needs to get a usable story of what happened to her dad that can make some sense to her; otherwise, she's at the mercy of her misconceptions, her fears, and her imagination.
You and your child can understand this tragic death from suicide as the result of a sometimes fatal illness, similarly to the way the child whose father died from cancer can understand her father's death.
Your basic message to your child is that her father's brain got sick and his sick brain made him feel so terrible and hopeless that he made his body stop working and he died. Focus on the illness, not the event.
Then you follow her lead, answering her questions truthfully but with no more detail than she needs. You want to keep out the drama and stay away from any kind of blaming. Always use words and concepts that your child can understand at her age and level of development. Very young children will need help in understanding what death means, and you'll need to spend time telling them that when a person's body stops working, we say he is dead. Dead means he can't breathe, move, eat, sleep, think, talk, or feel pain anymore. (If it fits with your family's belief system, you can say that his body is dead but his spirit or soul is still alive.)
If and only if the child asks for more specifics, you can say, "When a rope is too tight around someone's neck for too long, he can't breathe anymore. When his body can't breathe, it stops working and then he dies," or "The bullet made his heart stop beating. When a person's heart stops beating, that person's body stops working, and then he dies."
When your child is ready to know more about why the brain sickness led to her father's death--and this may be right away or days or weeks later--you can tell her these ideas: When someone's brain is sick in this way, the brain sends confused thoughts that make the person feel so sad, scared, and angry that those feelings seem like the only feelings he'll ever have. The unhealthy brain makes the person believe that those feelings can never change and that what's wrong now will always be wrong. That is a mistake--feelings can change, problems can be managed, and things can get better, But sometimes when people are in the middle of thinking in this confused way, they do things to make their body stop working. When somebody makes their body stop working, we say they have completed suicide.
This is what happened to Daddy: He completed suicide. It's helpful if you say those words in a matter-of-fact way so that your child hears them from you first rather than hearing "suicide" whispered by someone else and not having a usable understanding of what it means. (Children who are shielded from the knowledge that their loved ones' illness led them to make their bodies stop working--to complete suicide--often feel betrayed when they find out at some later time. Their renewed grief is then colored by anger towards the ones who they thought were protecting them.)
If your child gives any indication that she feels she is at fault--"If only I hadn't argued with him, he wouldn't have been so upset and he'd still be alive," for example--be clear that she did not cause this death. All children argue with their parents sometimes, or have mean thoughts sometimes, or [put in what your child is worried about here]. It was the illness that made Daddy feel so desperate and have such distorted thoughts, not the child.
As you can see, talking to your child about the death of a loved one to suicide isn't a one-time conversation. Most of the time, children need to take in a little bit at a time, chew on it, then come back for more at a later point. They may show a whole range of emotions, often in short bursts. By realizing that both the need for multiple conversations and the variety of grief reactions your child may have are perfectly normal, and by letting your child see you as a caring, trustworthy source of information, you are helping her on the road to healing.
Anne Hatcher Berenberg, PhD and Vicki Scalzitti co-authored the book 10 Steps for Parenting Your Grieving Children. Anne is a licensed clinical psychologist specializing in work with children, adolescents, and their parents in Northfield, IL. Vicki is Manager of Children's Bereavement Services at Rainbow Hospice in Mt. Prospect, IL. Please stop by and visit their website. | <urn:uuid:6b8ea726-d90e-4c4b-b3d4-bded1972d406> | {
"date": "2014-07-23T11:59:08",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877881.80/warc/CC-MAIN-20140722025757-00168-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.979733407497406,
"score": 2.703125,
"token_count": 1027,
"url": "http://www.allianceofhope.org/blog_/2012/05/helping-grieving-children-how-do-i-tell-my-child-that-her-father-died-from-suicide.html"
} |
Is to efficiently achieve voluntary habitat restoration on private lands, through financial and technical assistance, for the benefit of Federal Trust Species.
The Partners for Fish & Wildlife Program was established in 1987 with a core group of biologists and a small budget for on-the-ground wetland restoration projects on private lands. This successful, results-oriented program has garnered support through the years and has grown into a larger and more diversified habitat restoration program assisting thousands of private landowners across the Nation. Click here for a history of the Partners for Fish & Wildlife Program. October 3, 2006 Congress unanimously approved and the President signed the document, Partners for Fish & Wildlife Act.
At the heart of the Service's mission are the conservation and management of the Federal Trust Species: migratory birds; threatened and endangered species; inter-jurisdictional fish; certain marine mammals; and species of international concern. It is estimated that 73% of our Nation’s land is privately owned and that the majority of our fish and wildlife resources occur on those lands. Consequently, the conservation lands held by Federal and state agencies and other conservation groups cannot completely provide for fish and wildlife needs. Because the habitat needs of all Trust Species cannot be met solely on public lands, public funds are also expended on private lands to accomplish habitat improvements through cooperative conservation programs such as the Partners Program.
The Partners Program provides technical and financial assistance to private landowners and Tribes who are willing to work with us and other partners on a voluntary basis to help meet the habitat needs of our Federal Trust Species.
The Partners Program can assist with projects in all habitat types which conserve or restore native vegetation, hydrology, and soils associated with imperiled ecosystems such as longleaf pine, bottomland hardwoods, tropical forests, native prairies, marshes, rivers and streams, or otherwise provide an important habitat requisite for a rare, declining or protected species.
Locally-based field biologists work one-on-one with private landowners and other partners to plan, implement, and monitor their projects. Partners Program field staff help landowners find other sources of funding and help them through the permitting process, as necessary. This level of personal attention and follow-through is a significant strength of the Program that has led to national recognition and wide support.
The Partners Program is guided by a national policy
that identifies the following objectives: U.S. Fish and Wildlife Service Manual, section 640 fw1
In addition, the Partners Program policy has established priority ranking factors to help guide project selection. These priorities are stepped down to the state and local levels as field staff collaborate with our stakeholders to further refine habitat priorities and geographic focus areas.
National priority ranking factors for the Partners Program are used to assign funding priority status to proposed projects that meet these conditions:
If other considerations are generally equal, then priority is directed to those projects that link private lands to important Federal lands (such as Refuges), have cooperative agreements of longer duration, multiple partners, cost sharing, and the greatest cost effectiveness. The overall goal of Partners Program projects is to return a site to the ecological condition that likely existed prior to loss or degradation. | <urn:uuid:27b0752d-100b-42fa-93a7-671adc21dbe5> | {
"date": "2014-10-24T15:35:25",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646209.30/warc/CC-MAIN-20141024030046-00271-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9414252638816833,
"score": 3.0625,
"token_count": 636,
"url": "http://www.fws.gov/southeast/es/r4-partners/news/aboutUs.html"
} |
A recent article in the journal, Meat Science, acknowledged that a sector of the population perceives meat as a food that is detrimental to their health because of studies associating meat consumption with heart disease and cancer. So, the article continues, meat consumers may look for healthier food alternatives as a means to maintain good health, which represents a good opportunity for the meat industry to develop some new products. The industry felt that natural foods could be added to meat to reach those health-oriented consumers by boosting antioxidants levels, for example. Foods like flax seeds and tomatoes are healthy, associated with reduced risks of cancer and cardiovascular disease. So, by making flax-y tomato burgers, they figure they can reduce saturated fat intake and maybe eat less sugar somehow. Wouldn’t it be easier to just cut out the middle-cow and eat flax seeds ourselves?
Flax seeds have been described as a “miraculous defense against some critical maladies.” I’m a fan of flax, but this title seemed a bit over-exuberant; I figured something just got lost in translation, but then I found a prospective, double-blinded, placebo-controlled, randomized trial—you know how hard that is in a nutrition study? For drugs, it’s easy: you have two identical looking pills, one’s active, one’s placebo, and until the end of the study, neither the researcher nor the patient has any idea which is which, hence “double blind.” But people tend to notice what they’re eating. So, how did they sneak a quarter cup of ground flax seeds into half of the people’s diets without them knowing? They created all these various flax or placebo containing foods, and even added bran and molasses to match the color and texture; so, it was all a big secret until six months later when they broke the code to see who ate which.
Why test it on hypertension? Because having a systolic blood pressure over 115—that’s the top number—may be the single most important determinant for death in the world today. If you take a bunch of older folks, most of them on an array of blood pressure pills, and don’t improve their diet at all, despite the drugs, they may start out on average hypertensive and stay hypertensive six months later. But those who were unknowingly eating ground flaxseeds every day, dropped their systolic blood pressure about ten points, and their diastolic, the lower number, by about seven points. That might not sound like a lot, but a drop like that could cut stroke risk 46 percent and heart disease 29 percent, and that ten point drop in the top number could have a similar effect on strokes and heart attacks. And for those that started out over 140, they got a 15-point drop.
In summary, flaxseed induced one of the most potent antihypertensive effects ever achieved by a dietary intervention. In other words, the magnitude of this decrease in blood pressure demonstrated by dietary flaxseed is as good or better than other nutritional interventions and comparable to many drugs, which can have serious side effects. And they’re not exaggerating about the comparable to drugs bit. The flax dropped systolic and diastolic up to 15 and 7. Compare that to powerful ACE inhibitors, like Vasotec, which may only drop pressures five and two, and calcium channel blockers, like Norvasc or Cardizem, which drop pressures eight and three. Side effects of these drugs include a large list of serious medical issues, as seen in my video Flax Seeds for Hypertension, compared to the side effect of flax seeds, “its pleasant nutty flavor.”
During the six-month trial, there were strokes and heart attacks in both groups, though. Even if the flax seeds can cut risk in half, any avoidable risk is unacceptable. Isn’t high blood pressure just inevitable as we get older? No – the prevalence of hypertension does increase dramatically with age, but not for everyone. People who eat more plant-based diets or keep their salt intake low enough tend not to exhibit any change in blood pressure with advancing age. It’s always better to prevent the disease in the first place.
And that’s not all flax can do. Check out:
- Can Flax Seeds Help Prevent Breast Cancer?
- Flax Seeds & Breast Cancer Survival: Epidemiological Evidence
- Flax Seeds & Breast Cancer Survival: Clinical Evidence
- Flax Seeds vs. Diabetes
- Flax Seeds for Sensitive Skin
- Flax Seeds for Breast Pain
Hibiscus tea may help with high blood pressure as well: Hibiscus Tea vs. Plant-Based Diets for Hypertension
Diet can also play an important role in preventing heart disease (How Not to Die from Heart Disease and One in a Thousand: Ending the Heart Disease Epidemic) and diabetes (How Not to Die from Diabetes and Plant-Based Diets and Diabetes). In some cases, diet can even reverse some of the worst ravages of high blood pressure: How Not to Die from High Blood Pressure and Kempner Rice Diet: Whipping Us Into Shape. | <urn:uuid:0918fdfb-40c8-4f87-a7d7-8b96f5207545> | {
"date": "2017-06-25T12:12:49",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320491.13/warc/CC-MAIN-20170625115717-20170625135717-00697.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9429813027381897,
"score": 2.640625,
"token_count": 1096,
"url": "http://nutriunify.com/flax-seeds-can-profound-effect-hypertension/"
} |
The Rev. Burrell Cannon (1848-1922)
The Rev. Burrell Cannon (1848-1922)
In 1898, everyone wanted to invent a flying machine. Huge prizes were offered in London, Paris and New York for the first successful "heavier than air" craft which could carry man. In Pittsburg, Texas, a Baptist minister who was also a skilled inventor made history with his craft! Rev. Burrell Cannon's Ezekiel Airship !
Ezekiel Airship : Contemporary Postcard
download a 750pixel image
Before the Wright Brothers had their plane in the air over Kitty Hawk, N.C. in 1903, an East Texan had designed an Airship that could fly and had raised funds to build it. The Rev. Burrell Cannon (1848-1922), pastor of the Baptist Church in Pittsburg, Texas was the inventor of the Ezekiel Airship and in August of 1901, he convinced his acquaintances that his Airship would fly and that it could be maneuvered by a lever within the inner wheel. This allowed for vertical take-off.
Rev. Cannon made the Bible his life study, and it was from the Book of Ezekiel that he got the idea for his wheel-within-a-wheel Airship.
"The appearance of the wheels and their work was like unto the color of beryl; and they four had one likeness; and their appearance was as it were a wheel within the middle of the wheel." (Ezekiel 1:16)
Ezekiel Airship : The Wheel Concept
Burrell Cannon was a minister, but made his living as a sawmill operator. He was a skilled machinist and mechanic and had 9 other patents for wind-driven machine to his credit.
He had credibility! His stock company raised $20,000.00 and the first Ezekiel Airship was built in Pittsburg, Texas at P.W. Thorsell's Foundry. Upon completion, the Airship was shipped by rail to St. Louis where it was to be exhibited. A storm blew it off the flat bed car near Texarkana, Texas and the first model was completely destroyed.
Ezekiel Airship : Stock Certificate
download a 1000pixel image
After the destruction of the first aircraft, Rev. Cannon moved to Longview where he attempted unsuccessfully to construct a second airship. It is reported that he felt the first one would not fly because the motor (gasoline driven) was too heavy. There is no factual documentation that it ever flew, but witnesses in Pittsburg as late as the 1960's swore they saw it lift off over a fence near the building where it was built.
The airship is not only the work of a skilled mechanic in a time of world obsession with flying, but it is a tremendous statement of his faith in God, and in his ability to interpret the Scriptures. This replica was constructed in 1986 by a skilled local craftsman working from the only known photograph of the airship.
At the time of his death in 1923 at age 74, Rev. Cannon was working to develop a connon-picker and boll-weavil destroyer.
"And when the living creatures went, the wheels went by them; and when the living creatures were lifted up from the earth, the wheels were lifted up." (Ezekiel 1:19)
The Ezekiel Airship - 18"x28" Official Texas Historical Marker
Camp County (Order #4691) 11/5/96. Location: Fulton Street, Pittsburg, Texas.
A Flying Start http://www.dallasnews.com
Some say it's possible an East Texas invention beat the Wright brothers into the air
"Our goal is to build a building large enough to house the entire airship," said Pittsburg Mayor D.H. Abernathy. "We think this airship is worth seeing."
Jon Freilich / The Dallas Morning News
"Our goal is to build a building large enough to house the entire airship," said Pittsburg Mayor D.H. Abernathy, whose reflection is seen in the mirrored case holding a model of the aircraft.
PITTSBURG, Texas - Some say the race to conquer the skies was won by a Baptist minister in East Texas a year before the Wright brothers ever hauled their flying machine to the windswept dunes of Kitty Hawk.
The aircraft - a canvas and wood contraption that resembled a cross between a dragonfly and a Conestoga wagon - was known as the Ezekiel Airship, named for the book in the Bible from which the Rev. Burrell Cannon said he received his inspiration to build it.
And if four witnesses told the truth, a man who helped build the Ezekiel Airship hopped behind the controls one Sunday morning in late 1902, fired up its 80-horsepower engine and briefly took the ship aloft to a height of 12 feet above a pasture at the edge of downtown Pittsburg.
Wilbur and Orville Wright were not to make their historic 120-foot, 12-second flight until Dec. 17, 1903.
Lacy Davis and above, The Ezekiel Airship
Experts who have studied a replica of the Ezekiel Airship now on display at the Camp County Museum in downtown Pittsburg say they doubt the aircraft ever performed like a traditional airplane. http://www.dallasnews.com/millennium/0520flying.htm
The 1st U.S. Aircraft! NOT the Wright Brothers - Not Kitty Hawk
Inspired by the 1st and 10th Chapters of the Book of Ezekiel in the King James version of the Holy Bible, Baptist Minister Burrell Cannon designed and constructed this airship, several years prior to the Wright brothers first flight. An accomplished engineer, Rev. Cannon held numerous patents for wind and water-driven machines, in times which preceded electricity.
Judge for Yourself! Could this airship fly? Whether it did or did not fly, it stands as a testament to one man's faith in God and Holy Scripture.
Rev. Burrell Cannon was a visionary Baptist preacher, but was an accomplished engineer and held several patents relating to wind-driven water pumps, windmills, etc. in a day and age without electricity. The design of this airship includes complicated but ingenious design features for propulsion and control of the craft which are marvels of engineering and mathematical calculations.
While modern engineers may debate its ability to actually fly, it was certainly a very serious project in its day. Rev. Cannon believed he was led by God to design and build the ship and God would insure its success. Here is how Rev. Cannon propelled and controlled the Craft:
PROPULSION. Four large outside wheels in the fuselage section contain smaller wheels which contain paddles. The gas engine turned the wheels and paddles at a rapid rate, creating, vertical and horizontal blasts of air which moved the machine forward as well as providing upward air flow to assist in flying and controlling, the craft. The'-paddles are pivoted, and on eccentric wheels, so that when the control levers were moved, the paddles on each side would create smaller, or larger, amounts of propulsion by controlling their angle of attack on the atmosphere.
CONTROL: The ship would be turned by varying the amount of airflow on each side with each set of paddles, and by varying the angle of the sail. Four small, brass hydraulic cylinders in the vertical corner posts of the fuselage, would raise or lower the sail from front to rear, or side to side. coordinated with the paddles, and thus allow the ship to do what is known in modem aviation as "side-slipping." This would run the airship, or make it rise or descend, depending on the angle of the sail and control of the airflow with the paddles.
THE ENGINE: The four-cylinder engine, hand-made at the Foundry where the craft was constructed is described as a "gas" engine. It does not specify if it was "gasoline" or something more like "natural gas". Rev. Cannon's notes do indicate the "gas" was contained in the hollow tubing from which the fuselage was constructed, as there appears to be no fuel tank aboard.
Rev. Cannon was very secretive about his engineering solutions, so this project is barely mentioned at all in the Pittsburg Gazette during the two years the ship was under construction in Mr. P. W. Thorsell's Pittsburg Foundry. Engineers and aviation buffs all over the world (including, the Wright Brothers) were attempting to develop heavier-than air crafts of all sorts hence the secrecy surrounding the project-- to prevent others from stealing Rev. Cannon's ideas. ...more | <urn:uuid:a0537ab1-9478-4e22-9fd1-455146a943a5> | {
"date": "2014-10-01T10:12:43",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663417.12/warc/CC-MAIN-20140930004103-00270-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9793675541877747,
"score": 3,
"token_count": 1795,
"url": "http://www.ctie.monash.edu.au/hargrave/cannon_ezekiel.html"
} |
- Recklinghausen's phakomatosis
- Recklinhausen neurofibromatosis
- Recklinghausen syndrome
- von Recklinghausen neuropathy
- Elephant man's syndrome (misnomer)
- von Recklinghausen's disease
Inheritable disease characterized by spots of increased skin pigmentation (café au lait spots), combined with multiple, often soft, sessile peripheral nerve tumours and a variety of others dysplastic abnormalities of the skin, nervous system, bones, endocrine organs and blood vessels. The pigmented spots are most prominent over the trunk, in the axillae (axillary freckles), and about the pelvic. The peripheral nerve tumours are of two types, schwannomas and neurofibromas. Both types of tumour occasionally become malignant. They occur along peripheral nerves, where they are quite obvious, and on spinal and cranial nerve roots. Extremely variable in size, number, and shape.
Onset in childhood; becomes more active at puberty, during pregnancy, and at menopause. Asymptomatic or pain when tumor produces pressure on adjacent structure. Mental retardation, seizures, hydrocephalus, and other neurological complications are frequent. Eye involvement may result in proptosis, muscle palsies, phakoma, glaucoma, corneal opacity, and other ocular complications.
Its incidence is 1 per 3.000 births and present in about 30 persons per 10.000 population. It is inherited as an autosomal dominant trait, but about 50 percent of cases arise as mutations.
Reckilinghausen disease is now divided in two genetically different forms : NF1 and NF2, with different clinical features.
First described in 1768 by Mark Akenside (1721-1770), in 1793 by Wilhelm Gottlieb Tilesius von Tilenau (1769-1857), by professor Robert William Smith (1807-1873) of the University of Dublin in 1849, and Rudolf Virchow in 1863. Recklinghausen's detailed description was of the autopsy findings in a female aged 55 years and a male aged 47 years.
We thank Volker Paech M.D., and Claudio Crisci, for information submitted.
Elephant man, see under Sir Frederick Treves, English surgeon, 1853-1923.
- M. Akenside:
Observations on cancers.
Medical Transactions. Royal College of Physicians of London, 1768, 1: 64-92.
- W. G. Tilesius von Tilenau:
Historia pathologica singularis entis turpitudinus. Jo Godofredi Rheinhardi viri 50 Annorum.
SL Crusins, Leipzig, 1793.
- Robert W. Smith:
Pathology, Diagnosis and Treatment of Neuroma. 1849.
- R. Virchow:
Die krankhaften Geschwülste. 3 volumes, Berlin, 1863-1867.
- F. D. von Recklinghausen:
Ueber die multiplen Fibrome der Haut und ihre Beziehung zu den multiplen Neuromen.
(On Multiple Fibromas in the Skin and their Relationship to Multiple Neuromas.)
Title page, translated from German: Festschrift in commemoration of the 25th anniversary of the founding of the Pathological Institute of Berlin, presented to Professor Rudolf Virchow by F. von Recklinghausen, professor in Strasbourg". Berlin, A. Hirschwald, 1882. | <urn:uuid:5a8fc650-3108-4e35-b2ef-4c05e2d05877> | {
"date": "2016-06-26T17:08:05",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00006-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7923884391784668,
"score": 2.578125,
"token_count": 771,
"url": "http://www.whonamedit.com/synd.cfm/1207.html"
} |
Loading the player ...
Science Talk: Vaccine Made With Synthetic Gene Protects Against Deadly Pneumonia
February 22, 2011 – Researchers at Albert Einstein College of Medicine of Yeshiva University, led by Liise-anne Pirofski, M.D., have developed an experimental vaccine that appears to protect against an increasingly common and particularly deadly form of pneumococcal pneumonia, which infects 175,000 Americans a year. The study was published in the February 22 online edition of the Journal of Infectious Diseases. See accompanying release
(February 22, 2011) | <urn:uuid:af0e8072-7493-49b2-8b74-490cf4e90dc1> | {
"date": "2018-02-20T15:53:19",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812978.31/warc/CC-MAIN-20180220145713-20180220165713-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9518951773643494,
"score": 2.5625,
"token_count": 117,
"url": "http://www.einstein.yu.edu/video/Default.asp?VID=329"
} |
Summary: New Federal and private-sector actions to help more people access organs transplants.
There are more than 119,000 Americans waiting for a life-saving organ transplant. Each day, twenty-two people die waiting. In addition to the tremendous human cost to individual patients, the waiting list carries a substantial cost to the public purse as well. For example, dialysis for end-stage renal disease (ESRD) is often grueling for patients in addition to being costly for taxpayers. To put that in perspective, Medicare spends $34 billion per year on ESRD—more than the entire budget of the National Institutes of Health. The President’s Council of Economic Advisers has estimated that each additional kidney transplant has the potential to generate $60,000 in Federal savings per year, making increasing access to transplantation a major opportunity to not only improve health but also reduce health care spending.
Federal government actions to help patients waiting for transplant have included:
In 2001, the Department of Health and Human Services launched the national Gift of Life Donation Initiative to increase organ, tissue, marrow, and blood donation;
In 2007, the Health Resources and Service Administration (HRSA) began funding the National Living Donor Assistance Center to reduce financial barriers to living organ donation;
In 2010, the enactment of the Affordable Care Act offered greater security to living donors by prohibiting insurers from denying health coverage to someone with a preexisting condition, including having donated an organ;
In 2013, the bipartisan HOPE Act paved the way for the first transplants in the United States between HIV-positive donors and recipients;
In 2016, the White House hosted an Organ Summit to spotlight commitments from diverse stakeholders to reduce the waiting list.
The actions below provide an update on new, common-sense steps to reduce the waiting list and improve patient outcomes.
Separate Alliance Note:
The Alliance appreciates that our kidney utilization project is mentioned in this article. Congratulations to all of our colleagues across the nation for their continued efforts.
For context, previous June White House Organ Summit Fact Sheet:
Previous White House Organ Summit blog:
Image taken from: http://www.pbs.org/program/white-house-inside-story/Share | <urn:uuid:0d6a0da0-cf69-4a36-b3fa-c50243739361> | {
"date": "2018-07-22T22:08:46",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594018.55/warc/CC-MAIN-20180722213610-20180722233610-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9033213257789612,
"score": 2.671875,
"token_count": 456,
"url": "https://organdonationalliance.org/reducing-the-organ-waiting-list-key-actions-and-opportunities-for-the-future/"
} |
JF Ptak Science Books Post 1107
[A continuation of our History of Dots #31 series.]
The history of dots must have some fair share of its content filled with a very varied history of astronomy, which just goes to show that even within the seeming-sameness of microscopic investigations of dots that its subcategories could be so vast and differentiated. (The image to the left is a small detail from the following image, below.)
Dots aren’t necessarily just dots–even in representing the stars, dots have a rich history. The first star-dots published in the West appear in 1482, taken from the work of the first century astronomer and philosopher Hyginius1, and is a book that contains maps of the constellations composed of such beautiful light-encrusted bits. There wouldn’t be another work like this one, strangely, for another 75 years. Alessandro Piccolomini’s2 work of 1559 (which would be the first true star atlas), and again we see the familiar representation.
Galileo’s dots were very aggressive. By 1610 he had produced his fifth and most powerful telescope, allowing things to be seen one thousand times closer, using it to make enormous discoveries–discoveries so big in fact that their towering significance is a but hard to understand today in the context of early 17th century knowledge. It was all published in his fantastic Sidereus Nuncius on March 4, 1610—the extraordinary very title page3 of the book proclaiming some of the great discoveries of Galileo’s adventure.
One monumental outcome of Galileo’s work was expanding the number of stars in the sky, which was basically mucking around with the perfect plan of the creator–formerly a cornerstone for the existence of a divine being. With the exception of comets and eclipses the sky had remained immutable, a perfect score of the creator’s creation, until 1572, when Tycho Brahe noticed something new in Cassiopeia, something that was not a comet—a “something” that was a star. This was momentous because the night sky had been seen for centuries as being complete—a new star, the Nova of Brahe, contradicted this high belief, offering the possibilities of newness where there had not been one previously. And so too with Kepler’s new star of 1602.
One of the things that Galileo brought to the world was an entirely new sky, revealed to him through his telescope—so many stars that he could only guess (though he reckoned that there was an order of magnitude more stars than previously known “stars in myriads, which had never been seen before….and which surpasses the old, previously known, stars by ten times”).
Which brings me to the images that I stumbled on today from “Statement of Views respecting the Sidereal Universe”4which was the work of the astronomer and great popularizer, Richard A. Proctor (“B.A. (Cambridge), Honorary Fellow of King's College, London”).
Proctor’s dots challenge all dots that have come before so far as theorizing on the structure (and extent) of the Milky Way is concerned. Proctor refers to William Herschel’s5--the man who first gave the Milky Way its shape and who fixed our own sun in an inferior and not-particualrly-special place inside that map--statement that the extent and constitution of the Milky Way is “unfathomable”.
Proctor gets there by presenting a map of the night sky with stars visible to the naked eye:
And then the double hemisphere map of the northern and southern skies “We have here the first step towards just views of the constitution of the Milky Way, or rather the next step beyond the great, but little noticed, discovery of Sir W. Herschel's, that the bright clouds of the Milky Way are for the most part spherical clusters of stars.”(Page 546.)
Finally is the crux of the matter: two sections of an fantastic map displaying 324,198 stars visible via a 2.5 inch aperture telescope.
He comments:“I assert, without the slightest fear of contradiction by any possessing such knowledge, that the broad teaching of the equal-surface chart. 0/3 24,000 stars disposes finally of all theories of the constitution of the sidereal universe which had previously been enunciated. The chart does not definitively indicate a new theory—rather it suggests the idea that the constitution of the sidereal universe is too complex to be at present ascertained. But it completely negatives (i), the stratum theory (even in the modified form apparently retained by Sir W. Herschel) ; (ii), the flat-ring theory of Sir John Herschel ; and (iii) the infinitely extended stratum theory, with condensation towards the mean plane, which Struve adopted.” (Page 547)
I think that for 1873 the verbose Mr. Proctor got his point across.
1. Hyginius Mythographus (fl. 1st century A.D.). Poeticon astronomicon. Edited by Jacobus Sentinus and Johannes Lucilius Santritter. Venice: Erhard Ratdolt, 14th October 1482. The first star atlas per se, standing alone in its field for a century.
2. Piccolomini, Alessandro. De la Sfera del Mondo. 1559
3. Galilei, Galilei Sidereus Nuncius (known in English as Starry Messenger), published 1610
The title page reads: Great and very wonderful spectacles, and offering them to the consideration of every one, but especially of philosophers and astronomers; which have been observed by Galileo Galilei … by the assistance of a perspective glass lately invented by him; namely, in the face of the moon, in innumerable fixed stars in the milky-way, in nebulous stars, but especially in four planets which revolve round Jupiter at different intervals and periods with a wonderful celerity.
4. Journal of the Royal Astronomical Society, Paper, Abstracts and Reports of the Proceedings of the Society from Niovember 1872 to June 1873, vol XXXIII, London, printed by John Strangeways, 1873.
5. It seems that few people now remember Frederick William Herschel as a great discoverer of alternative existences, but, well, that's pretty much what he did--and he did it during a time that must've made his astronomical discoveries seem like science fiction .For example, in 1785 Herschel published a revolutionary image of the “Stellar System” (the Milky Way), showing its irregular pattern and the off-center placement of our sun amidst a panoply of other stars.
(His image was remarkably and substantially correct, with the most grievous error being the placement of the sun too close to the center of the galaxy.) It was an image which bought the concept of a not so humano-centric idea into popular philosophy, and that our sun was a star among stars in a sea of stars. | <urn:uuid:52bd310f-6171-455d-b6cb-bdf6fc69bde2> | {
"date": "2015-02-28T00:30:17",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461612.31/warc/CC-MAIN-20150226074101-00103-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9479578733444214,
"score": 3.5625,
"token_count": 1497,
"url": "http://longstreet.typepad.com/thesciencebookstore/2010/08/page/2/"
} |
A child’s perception of the world is a mysterious thing. As kids are born into the world, they’re expected to pick up and interpret an incredible amount of things in the shortest space of time! By the time your little one is a toddler, he should be picking up the ability to separate and categorize the objects around him, like, “this is a ball, and that is a cup.” He’ll know how to distinguish different letters of the alphabet, and act while knowing what to expect from his actions -- and this is all part of a toddler’s perceptual development.
The Brain's Work
According to Dr. Janine Spencer in her article, “Developing Children’s Perception,” a toddler’s brain is still trying to settle and adjust to the surrounding environment. While the eyes play a big part in a toddler’s perception of things, it’s the brain that processes everything. The brain gives the little one an idea of the difference between a blue sweater and a red sweater, or the difference between a girl and a boy.
Learning For Themselves
As Spencer reports, parents can only play a small part in helping this incredible perception of the world develop. Most of it comes from that natural curiosity that drives kids to learn for themselves. From the moment your little guy is born, he starts this learning process. At just a few months old, a baby will reach out a try to grab an object nearby. Wow, right? This little monkey has the ability to stretch out his hand to the size of an object of his interest! This is the beginning of the development of hand-eye coordination. Twenty years later, it might have advanced to returning a tennis ball travelling at 90mph.
So how advanced is a toddler’s perception of the world? Well, from around 18 months, toddlers will have the incredible ability to store objects in the memory. This means that it progresses from that totally random trial-and-error “what would happen if I threw this plate on the floor?” to something like “this plate smashed the last time I threw it on the floor, so this time I won’t.”
Showing an Interest
Toddlers have developed the impressive ability to purposefully vary what they do, and what actions they perform, because of the curiosity to experience different results. According to the California Department of Education, toddlers develop interests in various objects, as they manually learn -- through touching and grasping -- certain features of all the still-alien objects that make up their worlds. As their motor development develops, so will their ability to draw, solve jigsaw puzzles and dress on their own. At this age, it's most important to keep practicing these skills -- so the more blocking, rolling, drawing and coloring the better! | <urn:uuid:3d6e2d3e-4de0-4365-84cc-43cffa17fe09> | {
"date": "2019-06-17T07:32:30",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998440.47/warc/CC-MAIN-20190617063049-20190617085049-00536.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9555982351303101,
"score": 3.6875,
"token_count": 584,
"url": "https://living.thebump.com/perception-development-toddlers-15173.html"
} |
Paper is an important material in today’s time. Even though there is a concern of how most papers get disposed, it is a fact that we cannot do without this incredible material. Asia pulp and paper is one of the top leading paper industries that exist today. Another factor you should acknowledge about this paper industry is that it is that largest paper and pulp company in the world.
Establishment Of The Industry
Asia pulp paper company was founded in nineteen seventy-eight. Since then, the company has secured its position in the marketing sector and exports tons of papers t more one hundred and twenty countries. The distribution is made to neighboring countries and the rest of the continent. The industry’s products can be traced around the world.
That is because the industry specializes in all types of paperwork for home use and also for public use. The industry produces tissue paper, grocery store bags, newsprint and even food packing bags. Every year, the company produces eighteen million tons of paper products. Today, the industry uses plenty of raw material to maintain its production.
Acquiring the standard amount of raw material is not an easy task. As the industry continues to experience growth, it relays on raw material suppliers who and committed and qualified. It is an essential requirement for each supply to comply with forest conservation policies, in order to be given the privilege of supplying raw materials.
Ranking Position Of The Industry
As time goes by, new industries have ventured in the same production of pulp and paper. Even though the industry still leads in the production of paper and pulp in Asia, the competition have become stiff in the global region. That is because of other pulp and paper industries situated in other regions such as Finland, China and also in the United States.
Competition is not the only factor that as affected the ranking of the industry, but also law matter as well. Paper production involves deforestation, and the company has a role to play in forest conservation, by planting trees. However, the industry has been accused of neglecting this duty and as a result its production has decreased.
The industry has made progress in conservation practices and stated that it will be in control of managing where its raw resources come from. This achievement is expected to be effective in the next five years. | <urn:uuid:81cae717-5489-48b4-93a5-155cea22e92e> | {
"date": "2017-05-24T06:11:19",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607802.75/warc/CC-MAIN-20170524055048-20170524075048-00276.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9617383480072021,
"score": 2.703125,
"token_count": 461,
"url": "https://asiapulpandpaper.wordpress.com/tag/asia-pulp-paper/"
} |
Digital images on OpenSFHistory are created from many types of original photographic material. Here we detail some of the formats.
Glass Plate Negatives
(catalog numbers beginning with wnp15)
Glass plate negatives were in use by both amateur and professional photographers from the 1850s until the early 1920s. Examples in OpenSFHistory date from the 1880s, and sizes range from 8×10 inches to 2×3 inches. To date, we have cataloged over 800 glass plate negatives.
Nitrate Film Negatives
(catalog numbers beginning with wnp14)
Nitrate negatives are a plastic film in use from about 1895 until the 1940s when safety film largely replaced it. Most amateur film up though the end of the 1930s is nitrate film. Nitrate film is highly flammable, but will not combust spontaneously under normal environmental conditions. Nitrate film was still in production up until the 1950s and it can be difficult to identify. If we’re not sure about the chemical composition of a film negative, to be safe, we treat it as nitrate. After scanning, these items are vacuum-sealed and put into cold storage. To date, over 1,000 have been processed and put online.
Safety Film Negatives
(catalog numbers beginning with wnp28)
Beginning in the mid-1920s, nitrate film began being replaced with cellulose acetate film known as “safety film.” While more stable and less flammable than nitrate, safety film does deteriorate, and can become acidic, shrink, and degrade (a vinegar smell is a big tip-off). So far we have cataloged over 500 negatives.
(catalog numbers beginning with wnp13)
Lantern slides are mounted glass positives. They were mostly produced commercially for sale and were intended for projection on a screen, either in the home or in a theatre. They are the precursors to 35mm transparency slides popular from the 1940s to the 1970s. We currently count 272 lantern slides in the collection.
(catalog numbers beginning with wnp24)
Stereoviews, or stereopticon cards, are commercially-produced dual exposures mounted on cardboard for viewing with a special viewer to produce a three-dimensional effect. They are the precursors to Viewmaster reels of the 1950s and 60s. We have not digitized any stereoviews at this point.
(catalog numbers beginning with wnp25)
Primarily Kodachrome, 35mm positive transparencies in the collection date from the late 1940s though the 1980s. We currently have about 400 online.
(catalog numbers beginning with wnp26 and wnp33)
Copy negatives are pictures of pictures. There are many, many copy negatives in the collection, so many that we have separated them into multiple catalog numbers. These images have many sources, from city agencies such as the Department of Public Works and San Francisco Water Department (PUC); institutions such as Society of California Pioneers and California Historical Society; and individual collectors and families who allowed their photos to be copied. The bulk of this type of negative are still in the process of being cataloged and digitized.
Duplicate negatives are created in a darkroom by a process where positive film is exposed to a negative, resulting in another negative. Often this is accomplished as a contact exposure, where an exposed negative is laid directly onto film and exposed to light. Identifying duplicate negatives can be a challenge and some dupe negatives have been processed.
Original Prints and Scrapbooks
(catalog numbers beginning with wnp27)
Acquired through purchase and gifts, these items are mostly amateur photography and family photos, though a small amount of commercial photographs exist in the collection.
(catalog numbers beginning with wnp4)
The private collector, whose collection is the cornerstone of OpenSFHistory, was an accomplished photographer and darkroom technician who made prints from many sources for reference, sharing, trading, and for sale. Often other collectors lent items for this purpose. The collector stored most negatives with one or more reference prints. Boxes of prints arranged by location were loaned out to other collectors or historians for scanning or duplication. Many of the prints in the collection are duplicated by original or copy negatives extant in the collection, but in some cases the negatives from which the print is derived was borrowed and returned. We avoid scanning contemporary prints unless we are sure that the negative doesn’t exist in the collection. | <urn:uuid:23e7a018-852b-4a58-8a64-92a0ba455af0> | {
"date": "2019-02-23T20:50:27",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249550830.96/warc/CC-MAIN-20190223203317-20190223225317-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9519692659378052,
"score": 3.015625,
"token_count": 936,
"url": "http://opensfhistory.org/news/page/91/"
} |
HANUMAN, HANUMAT. [Source: Dowson's Classical Dictionary of Hindu Mythology] A celebrated monkey chief. He was son of Pavana, ‘the wind,’ by Anjana, wife of a monkey named Kesari. He was able to fly, and is a conspicuous figure in the Ramayana.
He and the other monkeys who assisted Rama in his war against Ravana were of divine origin, and their powers were superhuman. Hanuman jumped from India to Ceylon in one bound; he tore up trees carried away the Himalayas, seized the clouds, and performed many other wonderful exploits.
His form is “as vast as a mountain and as tall as a gigantic tower. His complexion is yellow and glowing like molten gold. His face is as red as the brightest ruby; while his enormous tail spreads out to an interminable length. He stands on a lofty rock and roars like thunder. He leaps into the air, and flies among the clouds with a rushing noise, whilst the ocean waves are roaring and splashing below.” In one of his fights with Ravana and the Rakshasas, they greased his tail and set it on fire, but to their own great injury, for with it he burnt down their capital city, Lanka. This exploit obtained for him the name Lankadahi.
His services to Rama were great and many. He acted as his spy, and fought most valiantly. He flew to the Himalayas, from whence he brought medicinal herbs with which he restored the wounded, and he killed the monster Kalanemi, and thousands of Gandharvas who assailed him. He accompanied Rama on his return to Ayodhya, and there he received from him the reward of perpetual life and youth.
The exploits of Hanuman are favourite topics among Hindus from childhood to age, and paintings of them are common. He is called Marutputra, and he has the patronymics Anili, Maruti, etc., and the metronymic Anjaneya. He is also Yogachara, from his power in magic or in the healing art, and Rajatadyuti, ‘the brilliant.’
Among his other accomplishments, Hanuman was a grammarian; and the Ramayana says, “The chief of monkeys is perfect; no one equals him in the sastras, in learning, and in ascertaining the sense of the scriptures [or in moving at will]. In all sciences, in the rules of austerity, he rivals the preceptor of the gods. … It is well known that Hanuman was the ninth author of grammar.”
Modern Languages MLLL-4993. Indian Epics. Laura Gibbs, Ph.D. The textual material made available at this website is licensed under a Creative Commons License. You must give the original author credit. You may not use this work for commercial purposes. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. No claims are made regarding the status of images used at this website; if you own the copyright privileges to any of these images and believe your copyright privileges have been violated, please contact the webmaster. Page last updated: October 16, 2007 12:22 PM | <urn:uuid:a5fedbb7-401f-43b1-9b56-cd83c6d5f188> | {
"date": "2017-09-23T07:25:28",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689572.75/warc/CC-MAIN-20170923070853-20170923090853-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.977290153503418,
"score": 2.96875,
"token_count": 689,
"url": "http://www.mythfolklore.net/india/encyclopedia/hanuman.htm"
} |
Tock — A Compiler for Concurrent Languages, written in Haskell
Occam and Tock
The CSP calculus has inspired quite a few languages and frameworks; CHP is just one of them. Go is a recent example, but probably the oldest example is the occam programming language. Occam was developed for the Transputer processor, which has since died out. The efforts of research groups at Kent and Southampton made sure that occam survived the death of its original host platform. Today, a much-modified version of the original compiler, now named KRoC, will compile and run occam code on x86 Linux and various other platforms. Its basis, the original compiler, was written around twenty-five years ago. In C — eugh. Nowadays there are better languages to write a compiler in — such as Haskell.
My colleague Adam Sampson began playing with writing an occam compiler in Haskell using modern technologies like nanopass compilation (where the compiler consists of a large number of small and simple passes), Parsec (for, um, parsing) and generic programming (for performing automatic descents of the abstract syntax tree during the passes). At some point I joined in, and between us we wrote Tock, a compiler for occam and other concurrent languages, written in around twenty-thousand lines of Haskell.
Occam is a difficult language to compile, for several reasons. Its grammar has ambiguities that can only be resolved with semantic knowledge. For example, c ? x is either an input from channel c into variable x, or it is an input from channel c that must match the tag (think Haskell data-type constructor) x. It is not clear which it is until you have determined what x is, which typically happens after parsing. This is exactly the sort of problem that would occur if Haskell did not require data constructors to start upper-case and variables to start lower-case (without this restriction, what would x be in “let x = y”: variable or constructor?).
Occam is layout-based, using 2-space indents. This requires some pre-processing to insert indent/outdent markers. We use alex to tokenise and insert the markers, then use Parsec-2 to parse a stream of tokens into an abstract syntax tree (AST) after running a pre-processor stage on the token stream. To help resolve the ambiguities, we accumulate a symbol table in the parser, which is not nice — we would like to iron that out.
We started out using Scrap Your Boilerplate (SYB) as our generic programming method for implementing traversals of the AST in our nanopasses. The advantage of using generic programming for traversals is that you can write the code you’re interested in (e.g. apply this check to all parallel constructs in my AST) without writing the code you’re not interested in (if you find an if statement, here’s how to descend into it to find the parallel constructs). SYB turned out to be too slow for us and we ended up constructing our own generic programming framework, Alloy. It’s available on Hackage, and there is a paper (and a talk) if you’re interested.
Occam permits some powerful static safety checks. In every framework based on occam’s principles (including CHP) it is not possible to statically ensure that one-to-one channels are not going to be used wrongly in parallel (e.g. that the writing end will not be written to by two processes in parallel). The occam compiler does check this.
The algorithm is actually quite simple to implement in the AST. Wherever you find a PAR construct (which runs its branches in parallel), descend into all the branches and make a set of pairs of channel name and direction (input or output) that are used or passed as parameters to processes. Check all the sets against each other, and if any pair is present in more than one set, issue an error. With generic programming, making the set of pairs is just a generic query, and the whole thing is fairly straightforward. A similar check is performed to ensure that variables obey the Concurrent-Read Exclusive-Write (CREW) rule: that in parallel you either have no-one accessing a variable, only readers, or exactly one writer.
Another safety check involves arrays. Occam permits arrays of variables and arrays of channels, and performs safety checks on both. These checks are particularly tricky when combined with replicated parallel constructs. These are like parallel for loops; you can write PAR i = 0 FOR 10, and the code beneath will be replicated 10 times in parallel with indexes 0 through 9. The old occam compiler statically checked this by only allowing statically-known replication counts, and using brute force to expand out all the code and perform lots of known-constant checks on the array indices. Tock uses the Omega test (a form of Presburger arithmetic) to perform the same checks for dynamic replication counts. I spent a while pouring over the Omega Test paper to understand it (and produced some slides on it to help others understand it) and then implemented it in the compiler. I am still impressed by what it can do. Take this code, for example:
PROC p() INT a: PAR i = 0 FOR 10 SEQ a[i * 10] := 0 SEQ j = 1 FOR 10 a[(i*10) + j] := j :
This code declares an array of 100 INTs. The PAR i = 0 FOR 10 line runs the code below it 10 times in parallel, each with a different value of i (0 through 9, inclusive). This code is initialising an array of 100 items, by running these 10 parts in parallel, each of which initialises the beginning of a strip (indices 0, 10, 20, etc) to zero, and the rest of the strip (e.g. indices 1 through 9, 11 through 19) to be 1 to 9. In the above code, there is an error arising from incorrect indexing. The tock compiler spots this and gives the following error:
unsafe2.occ: 1: PROC p() 2: INT a: 3: PAR i = 0 FOR 10 Here-------^ 4: SEQ 5: a[i * 10] := 0 6: SEQ j = 1 FOR 10 7: a[(i*10) + j] := j 8: : tock: Error: unsafe2.occ:3:7 Indexes of array "a" ("i * 10 + j" and "i * 10") could overlap when: 1 <= i' <= 9 , j = 10 , 1 <= j' <= 10
That error message could perhaps do with being more helpful, but the important part is the most specific: when j is equal to 10, there can be an overlap between array indices being written to in parallel. The problem is that j shouldn’t be able to reach 10: the SEQ j = 1 FOR 10 line should be SEQ j = 1 FOR 9. If you are doing parallel imperative programming with arrays, this is a very useful error for the compiler to be able to spot. Once the line is corrected, tock can tell that it is safe, and will compile the file.
Tock is really a source-to-source compiler. Rather than producing native code, it produces C code (using the CCSP library) or C++ code (using the C++CSP library). This means that the code is as portable as the concurrency libraries themselves (almost every platform has a C/C++ compiler), and means that we get the C compiler to do all the optimisation of straight-line code for us, rather than writing that ourselves. I actually started work on a CHP backend for Tock, which I guess is fairly silly: compiling a low-level imperative language into a high-level functional language is not typically a good idea, but it was interesting. It involved lots of do blocks and let clauses to directly implement the imperative aspects in a sort of single-static assignment form crossed with a hint of continuation-passing. I’d like to finish it one day — but it’s a lot of work for no particular gain.
State of Play and Build System
Tock is just about feature complete. It lives in a public darcs repository if you are interested in it. The build system uses autoconf and automake, which is unusual for a Haskell project — most Haskell programs use cabal. There are several things that Tock needs that I don’t think cabal provides by itself:
- Two-stage compilation; due to our generics library, we must build one Haskell program and run it in order to generate more Haskell source that is then compiled alongside more source files to form Tock.
- C Tests; since we compile C using Tock, we must find out details about the C compiler (e.g. size of void* in C, or accepted flags) to give to Tock during the build process.
- Program availability; there are certain programs we require (e.g. gcc, alex), so we need to test for them during configuration.
That list is shorter than last time I looked at converting Tock to cabal, so perhaps it may now be possible to switch to cabal — I gather we might be able to keep our autoconf script for the tricky parts and use cabal for the rest. Any links on doing so would be appreciated! If we can get Tock cabalised, we can get it on Hackage, which would make it easier for people to download and use.
Almost all of our dependencies are in the Haskell Platform, so it would be nice to be able to say: install the Haskell Platform, install a concurrent run-time (e.g. CCSP), then issue “cabal install tock” and you’re done. What would also be good would be to get people working on the compiler. For example, Adam and I have wondered if we could add a Go frontend to our compiler, and thus bring the safety checks to bear on the Go language (and potentially to compile it down to our fast concurrency libraries). Unfortunately, neither Adam nor I have had time to work on Tock for a while now, but it would be a shame to let it stagnate. | <urn:uuid:d982f759-0813-49d0-aa79-1c7eab3ecbb6> | {
"date": "2016-08-27T02:49:39",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982297699.43/warc/CC-MAIN-20160823195817-00242-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9344891309738159,
"score": 2.90625,
"token_count": 2159,
"url": "https://chplib.wordpress.com/2010/04/07/tock-a-compiler-for-concurrent-languages-written-in-haskell/?like=1&_wpnonce=401286028f"
} |
Summary. A special investigative report (The Science of Sleep) conducted by CBS 60 Minutes revealed that sleep deprivation, sleep loss, or sleep interruption contribute to (or cause) numerous health problems including diabetes, depression, memory loss, poor thinking, and weight gain (due to a lowering of the protein Lepton which suppresses appetite and tells the brain when the stomach is full).
The special report included information from various scientific studies as well as interviews with specialists in the field of sleep disorders. People who normally would not get sick with the flue or other illnesses, are more susceptible to sickness when short on sleep. Because obesity is one of the primary causes of death in the United States, with the close link between poor sleep and obesity, it is fair to say that poor sleep may be a leading cause of death.
Resources. Sleep is a foundational part of the Resources for Life Weight Loss and Weight Management Program as well as the Schedule for Life and Holistic Living System. Below are resources for more information about the importance of sleep.
- Centers for Disease Control and Prevention (CDC) – Sleep
- CNN.com/health – Less sleep in older adults linked to heart attack, stroke risk
- Food and Drug Administration (FDA) – Sleep
- Google Search – Sleep Disorders
- JournalSleep.org – “SLEEP is a publication of the Associated Professional Sleep Societies, LLC (APSS), a joint venture of the American Academy of Sleep Medicine and the Sleep Research Society. It is distributed to more than 6,500 readers.”
- Medline – Sleep
- Mercola.com – 33 Secrets to a Good Night’s Sleep
- National Institutes of Health – National Center on Sleep Disorders Research
- National Institute of Neurological Disorders and Stroke – Understanding Sleep
- National Sleep Foundation
- Science Daily – Sleep Problems Linked To Obesity, Lower Quality Of Life In School-aged Children
- SHUTi – Sleep Healthy Using the Internet
- WebMD – Sleep Disorders
- Wikipedia – Sleep | <urn:uuid:a9afe045-73cf-4399-a8e4-e8b503d3b78c> | {
"date": "2018-02-17T19:48:02",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891807660.32/warc/CC-MAIN-20180217185905-20180217205905-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8941633701324463,
"score": 3.34375,
"token_count": 415,
"url": "http://www.resourcesforlife.com/health/sleep"
} |
The south processionSorry about these pictures: one notable problem of the site and architecture of the new museum is that the space is very narrow between the enclosure wall of the Ara Pacis and the wall of the museum. Therefore, it is impossible to get an appropriate distance from the enclosure wall. Furthermore, dramatic shadows often fall on the sides, especially noticeable on the north side (page 3).
|On both the north and south sides of the enclosure, priests, cult attendants, magistrates, and historical men, women and children are crowded into rows of figures. In some cases, there is controversy over which personages are represented, and at least two purposes for the procession have been described: it could be the reception ceremony offered Augustus on his triumphant return home from Gaul and Spain or it could be the "inauguratio" of the Ara Pacis itself, depicting part of the ceremony consecrating the space where it would be located. The procession is located on both sides of the exterior of the enclosure, that is, it is one single procession with the figures walking from east to west on both sides toward the western (main) entrance of the Ara Pacis. The realism of these processions contrasts with the interior of the enclosure war and the altar itself where symbolic associations predominate. See page 4.|
|The lead figure, missing most of his body, in the left image below, is Augustus. An undisputed attribution, he wears a laurel wreath and a veil since he is portrayed as a priest. Since most of his body has been lost, it is not clear what action he is engaged in, although it seems as if the procession has stopped around him. Agrippa is the figure with the toga covering his head. See below. The viewer must imagine the procession as preceding in double file since the figures on the far side are in lower relief with their heads in the spaces between the frontal figures.|
|Behind Augustus are four flamines maiores who wear the characteristic leather hat with a metal point. These are priestly officials who attend various Roman cults. The last flamen is followed by an assistant who has a ritual axe on his shoulder.|
|Another undisputed identification is Agrippa, who is portrayed with part of his toga covering his head and who carries a scroll. He was the most important official after Augustus, the princeps. Before him are officers of the state (or state religion) and behind flow members of the imperial family. Agrippa was Augustus' son-in-law, having married Augustus' daughter Julia and fathered the heirs to the empire, Gaius and Lucius Caesar. The child holding his robe is probably Gaius; he wears a short tunic (the "Trojan" style) and looks up at the woman behind him, generally identified as Livia, Augustus' wife, and the most prominent of the women in the procession. (She has also been identified as Augustus' daughter, Agrippa's wife, and mother of the heirs to the throne.|
Agrippa and family group
Family groupsOther family groups have been identified as Antonia Minor, Augustus' niece, her husband Drusus with their young child between them. His toga is fastened with a bulla. The next family group includes Antonia Maior, her husband, and their daughter and son (the latter who would become Nero's father).
|The woman in the background has her finger to her lips, as if to suggest respectful silence. It has been speculated that this is a reference to Drusus' death in 9 BCE, the year the altar was completed (Rossini 71 referring to an article by La Rocca). Drusus here is depicted in a military cloak.|
Orietta Rossini. Ara Pacis. Rome: Electa, 2006.
Marilyn Stokstad. Art History. Upper Saddle River, N.J.: Pearson Edu., 2005.
Click here to return to index of art historical sites.
Click here to return to index of artists and architects.
Click here to return to chronological index.
Click here to see the home page of Bluffton University. | <urn:uuid:13ac36be-1e5b-4808-8ab0-44e0635634fa> | {
"date": "2014-10-25T23:34:08",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119651455.41/warc/CC-MAIN-20141024030051-00320-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9716840982437134,
"score": 2.75,
"token_count": 861,
"url": "http://www.bluffton.edu/~sullivanm/italy/rome/arapacis/arapacis2.html"
} |
Nobel research means you can read this
Over the past decade, hard drives have shrunk to the size of postage stamps while their storage capacity has improved 50-fold, a feat that can be traced to two men who this week won the 2007 Nobel Prize for Physics.
Most common digital gadgets - from mp3 players to cameras to laptops - owe their enhanced power to this hard-disk technology.
Along with people in the trillion-dollar hard-drive industry, Durrani was delighted that the physics Nobel - usually given for highly theoretical work with scant practical application - recognises research that has tangibly changed lives.
"It shows that physics has a real relevance not just to understanding natural phenomena but to real products in everyday life," he says.
Professor Albert Fert of France's National Scientific Research Centre and Professor Peter Grünberg of the Research Centre Jülich in Germany have been lauded for discovering the principle, called giant magnetoresistance (GMR), that led to this advance.
Working at the atomic scale of nanotechnology, they independently discovered in 1988 that tiny changes in magnetic fields can yield a large electric output, something physicists at the time did not think possible.
These differences in turn cause changes in the current in the readout head that scans a hard disk to spot the ones and zeros in which the data is stored.
"The real pay-off is being able to use smaller and smaller magnetic domains. This translated directly into greater density of data," says Dr Phil Schewe of the American Institute of Physics.
In a quarter of a century, a computer of comparable computing power shrank from the size of a large room, to a fridge and then a laptop, he says.
"And now you can fit more than a trillion bits of data onto a tiny hand-held device, such as an iPod or an Blackberry."
A limit to Moore's Law?
The information revolution has long obeyed Moore's Law, which says advances in the miniaturisation of electronic circuitry enable silicon chips to double in power roughly every 18 months.
In the mid-1990s, though, it looked as if the limitations of hard-disk technology would brake that blistering pace of evolution.
Hard disks could not store enough data relative to their size and the induction coil, used for extracting the data, was a bad choke point.
Fert and Grünberg showed that their concept of packing more information into less space worked. But they could not find a way to ramp up to industrial-scale production.
That advance came from the laboratory of Dr Stuart Parkin, an experimental physicist at IBM, who applied something called 'sputtering' techniques to create GMR structures.
These structures are thin magnetic layers separated by non-magnetic metals.
When atoms are laid down on a hard disk in ultra-thin layers, they interact differently than when spread out more. This makes it possible to pack more data on disks.
IBM introduced the new technology in its disk-drive products in 1997 and was quickly followed by the rest of the industry.
Technology based on GMR "may be regarded as the first step in developing a completely new type of electronics, dubbed spintronics," according to the Nobel jury.
Unlike traditional electronics, spintronics uses not only an electrical charge but the spin of electrons in individual atoms.
These electrons spin in different directions under various circumstances, producing the changes in resistance that are used to store data.
"It is the thing that has made iPods possible and anything that requires lots of data storage, like YouTube," says Dr Chris Marrows, a physicist at the University of Leeds who specialises in spintronics.
This quantum mechanical effect, the Nobel jury predicts, will be the basis of a new kind of computer memory - MRAM, or magnetic working memory - that will be as fast as today's temporary memory but will be permanent at the same time. | <urn:uuid:7fa4a522-5005-4590-90c1-469e1a6e62ca> | {
"date": "2014-03-07T03:51:59",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999635677/warc/CC-MAIN-20140305060715-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9453287720680237,
"score": 3.28125,
"token_count": 806,
"url": "http://www.abc.net.au/science/articles/2007/10/10/2055563.htm?site=science&topic=latest&listaction=unsubscribe"
} |
is a game of physical and mental skill
, marketed by Hasbro
, in which players remove blocks from a tower and put them on top. The word jenga
is derived from kujenga
, the Swahili
verb "to build"; jenga!
is the imperative
Jenga is played with 54 wooden blocks; each block is 3 times as long as it is wide, and slightly smaller in height than in width. The blocks are stacked in a tower formation; each story is three blocks placed adjacent to each other along their long side, and each story is placed perpendicular
to the previous (so, for example, if the blocks in the first story are pointing north-south, the second story blocks will point east-west). There are therefore 18 stories to the Jenga tower. Since stacking the blocks neatly can be tedious, a plastic loading tray is included.
Once the tower is built, the person who built the tower moves first. Moving in Jenga consists of taking one and only one block from any story except the completed top story of the tower at the time of the turn, and placing it on the topmost story in order to complete it. Only one hand at a time may be used to remove a block; both hands can be used, but only one hand may be on the tower at a time. Blocks may be bumped to find a loose block that will not disturb the rest of the tower. Any block that is moved out of place may be left out of place if it is determined that it will knock the tower over if it is removed. The turn ends when the next person to move touches the tower, although he or she can wait 10 seconds before moving for the previous turn to end if they believe the tower will fall in that time.
The game ends when the tower falls in any significant way -- in other words, any piece falls from the tower, other than the piece being knocked out to move to the top. The loser is the person who made the tower fall (i.e. whose turn it was when the tower fell); the winner is the person who moved before the loser.
The game in its current form was invented in 1974 by Leslie Scott. It grew out of a childhood game created around a present of wooden building blocks purchased from a local wood craftsman in Ghana
. The family called it 'Takoradi Bricks' after the city in which it was made. She brought the game to England in the 1980s and introduced it to her friends at Oxford University. Calling it 'Jenga", she started selling the game and took out copyright on the rules. Jenga was promoted in the United States by Robert Grebler and was first manufactured there by Milton Bradley (now part of Hasbro) in 1987.
Official Hasbro Variants
Throw 'n Go Jenga is a variant marketed by Hasbro. It consists of blocks that are colored red, blue, or yellow plus a six-sided die. Before each move, the player throws the die and then follows the instructions on the die:
- Yellow/End: Remove any yellow block or remove any color end block.
- Red/Mid: Remove any red block or remove any color middle block.
- Blue/End: Remove any blue block or remove any color end block.
- Any two: Remove any two blocks of any color in any position.
- Wild: Remove any color block in any position
- Reverse: Don’t remove any blocks, but pass the die to the next player in the opposite direction.
Other than the fact that the die determines the proper move, play continues the same as regular Jenga.
Jenga Truth or Dare is an adult variation of Jenga also marketed by Hasbro. This version looks like regular Jenga except there are three colors of blocks, red, green and natural, instead of just the natural color of Jenga. Play is the same, but if you move a red block on your play, you have to complete the dare printed on it before stacking the block on top. If you move a green block, you have to truthfully answer the question printed on the block before stacking it. The natural blocks have nothing printed on them and are played as in Jenga. However, it is permissible to write your own truths or dares on the natural blocks if desired.
Jenga Xtreme uses blocks with different shapes and angles instead of the rectangular blocks of Jenga.
Casino Jenga: Las Vegas Edition employs a roulette-style game play, featuring a felt game board, betting chips, and additional rules.
As well, there have been a number of collector edition Jenga games, featuring the colours and logos of the Boston Red Sox, Oakland Raiders, New York Yankees, John Deere, among others.
Jenga World Tour
was announced by Atari
in July, 2007 for the Nintendo Wii
and released on December 7, 2007.
Jenga Around The World
the game is called "Mapolet", which means "avalanche" in Hebrew
The Danish name for the game is "Klodsmajor", meaning "klutz", with a play on words, as "klods" also means brick/block, referring to the jenga blocks. It is usually played in the style of Throw n' Go, but with a die with red, blue and yellow faces and no 'wild', 'pass' or position options.
In Brazil, this game is called "Torremoto". The name is a joke made of two Portuguese words: terremoto, which means earthquake and torre, which means tower.
There have been numerous games similar to Jenga throughout gaming history. Ta-ka-radi
is a game that was sold in the 1970's by L.L. Bean
with a similar premise as Jenga, having to remove blocks and place them on the top of a tower. Ta-ka-radi
is slightly different than Jenga in that the tower is built with gaps between each block, unlike Jenga in which each block is touching. Also, the addition of "Jungle Rules" brings a different skill level. When "Jungle Rules" are in effect, players are able to distract the player who is up by any means necessary, other than physical contact. Common "Jungle Rules" methods to distract a player include yelling, "Here come the cops!" or, "Your chair is on fire!". Because of these rules, many skilled players consider Ta-ka-radi much more difficult than regular Jenga. Ta-ka-radi is very common in the Northern Lake George
area, specifically Hague
, New York
The name is very similar to the original name of jenga, Takoradi Bricks, so maybe it is just a previous release.
Jenga In Pop Culture
A game of Jenga is played on the comedic cartoon American Dad!
between Hayley and Roger in the episode Black Mystery Month
. This game takes over 2 days because Roger is trying to decide his first move. At one point Hayley wakes up to the sound of the collapsing Jenga tower and declares how hilarious it is that after all that time Roger's first move collapses the tower, to which Roger replies that it was just a practice tower he built to test his move and that this is not illegal because he "...called Hasbro and checked, they said it was against the spirit of the game but not illegal."
This has not been confirmed in real life however.
In the CBS sitcom The Big Bang Theory, Sheldon, Howard and Rajesh play the game because, according to Sheldon, "The Internet has been down for a half-hour."
Jenga was also featured prominently in the development of the alternative pornography site Suicidegirls, as the owners, developers, and primary users engaged in a multi-year ladder
- Jenga is a registered trademark of Pokonobe Associates. | <urn:uuid:68570a5d-d403-4078-8179-882070a66fd1> | {
"date": "2013-12-12T23:20:24",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164746201/warc/CC-MAIN-20131204134546-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9589945077896118,
"score": 2.546875,
"token_count": 1662,
"url": "http://www.reference.com/browse/throw+(n.)"
} |
By Advocate.com Editors
Originally published on Advocate.com September 29 2010 11:50 AM ET
Individuals who follow the Mediterranean dietary pattern -- rich in vegetables, fruits, nuts, whole grains and fish -- appear less likely to develop depression, according to a report of the University of Navarra, published in the October issue of the Archives of General Psychiatry.
One plausible explanation is that the diet commonly followed in the region may be protective against depression. Previous research has suggested that the monounsaturated fatty acids in olive oil -- used abundantly in the Mediterranean diet -- may be associated with a lower risk of severe depressive symptoms.
The researchers studied 10,094 healthy Spanish participants who completed an initial questionnaire between 1999 and 2005. Participants reported their dietary intake on a food frequency questionnaire, and the researchers calculated their adherence to the Mediterranean diet based on nine components (high ratio of monounsaturated fatty acids to saturated fatty acids; moderate intake of alcohol and dairy products; low intake of meat; and high intake of legumes, fruit and nuts, cereals, vegetables and fish).
After a median (midpoint) of 4.4 years of follow-up, 480 new cases of depression were identified, including 156 in men and 324 in women. Individuals who followed the Mediterranean diet most closely had a greater than 30% reduction in the risk of depression than those who had the lowest Mediterranean diet scores.
"The specific mechanisms by which a better adherence to the Mediterranean dietary pattern could help to prevent the occurrence of depression are not well known," the authors write. Components of the diet may improve blood vessel function, fight inflammation, reduce risk for heart disease and repair oxygen-related cell damage, all of which may decrease the chances of developing depression.
"However, the role of the overall dietary pattern may be more important than the effect of single components. It is plausible that the synergistic combination of a sufficient provision of omega-three fatty acids together with other natural unsaturated fatty acids and antioxidants from olive oil and nuts, flavonoids, and other phytochemicals from fruit and other plant foods and large amounts of natural folates and other B vitamins in the overall Mediterranean dietary pattern may exert a fair degree of protection against depression," the authors write.
The study was funded by the Instituto de Salud Carlos III. | <urn:uuid:d5f9cf6a-ae08-4366-9199-5ee1442674b6> | {
"date": "2013-12-11T22:13:08",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164050279/warc/CC-MAIN-20131204133410-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9477160573005676,
"score": 2.875,
"token_count": 472,
"url": "http://www.advocate.com/print/health/ask-doctor/2010/09/29/mediterranean-diet-could-reduce-depression"
} |
|Hormones and Resistance Exercise
By Derek Marks, M.S., and Len Kravitz, Ph.D.
Taylor, J. M., Thompson, H. S., Clarkson, P. M., Miles, M. P., and De Souza, M. J. (2000). Growth hormone response to an acute bout of resistance exercise in weight-trained and non-weight-trained women. Journal of Strength and Conditioning Research, 14(2), pp 220-227.
Hormones, such as human growth hormone and testosterone, play a large role in the muscle hypertrophy and strength gained resulting from resistance exercise. While increases in testosterone levels are attributed to the hypertrophy and strength gained in men, it is still unclear how women are able to respond similarly to resistance training in the absence of increased testosterone. The purpose of this article is to review the function of hormones and a recent study exploring the acute responses of growth hormone to an acute bout of resistance exercise in weight-trained and non-weight-trained women.
ENDOCRINE SYSTEM and HORMONES
The endocrine system helps provide stability to the bodys internal environment through the release of hormones. Hormones are substances secreted from a tissue (mainly endocrine glands) that exert a biologic response on itself or other cells, and affect almost all aspects of human function. They regulate growth, development, and reproduction, and augment the bodys capacity for handling physical and psychological stress. Hormones differ in how they affect their target cells, and can be classified into three categories: amine, peptide, and steroid.
Amine hormones are derived from amino acids, while peptide hormones are structured by peptide bonds between multiple amino acids. Amine and peptide hormones are soluble and are transported in blood plasma in solution. The water-soluble characteristics of amine and peptide hormones make them easily removed from the circulation allowing only a short time (minutes) to exert their function.
Steroid hormones are not water-soluble and therefore must be bound to plasma proteins to be transported to their target tissue. The protein binding complicates the activity of steroid hormones, delaying the time to stimulate a biological response.
The major function of hormones is to alter the rates of specific cellular reactions of specific target cells. This is accomplished by altering the rate of intracellular protein synthesis, changing the rate of enzyme activity, modifying plasma membrane transport, and by inducing secretory activity (Robergs and Roberts, 1997).
Hormones are able to reach virtually all tissues because they travel in the blood. However, the ability for a target tissue to respond to a hormone depends on the presence of specific receptors in or on the tissue. Amine and peptide hormones exert their action on target cells by binding to specific receptors on the membrane of the target tissue. In response to the hormone binding, a molecule called a second messenger is produced, which then stimulates a cellular response. The most common of these second messengers is cyclic adenosinemonophosphate (cyclic AMP). For example, in bone and muscle cells, the cyclic AMP produced by the action of growth hormone binding activates anabolic reactions so amino acids can be synthesized into tissue proteins.
Steroid hormones do not bind to the membrane of the target tissue, but instead pass through it and then bind to a specific cytoplasmic steroid receptor in the cell, which then migrates to the nucleus. Once there, it enters the nucleus and initiates the nuclear and cytosolic events required for the synthesis of specific proteins.
Control of hormone secretion must be rapid in order to meet the demands of changing bodily functions. Hormone secretion is usually pulsatile in nature and constant hormone release rarely exists. The predominant hormonal control mechanism is referred to as negative feedback. This is very similar to how a thermometer works in your home. For example, an increase in blood glucose levels causes the release of insulin by the pancreas. Insulin action causes an increase in glucose uptake, resulting in lowered blood glucose levels. The decrease in blood glucose sends a feedback message to the pancreas, resulting in the halting or decrease in the release of insulin. The end result of insulin action is the inhibition of its own release as the body reaches its desired homeostasis.
HORMONES and EXERCISE
Hormone release can be stimulated by both external and internal stresses to the body. Adapting to acute exercise causes an increase in the secretion of many hormones. Several of the main hormones related to exercise and their responses are listed in Table 1.
It is well documented that the secretion of anabolic steroids results from resistance training, yet it is not clear why women exhibit similar responses to training (compared to men) in the absence of increased testosterone levels (Taylor et al., 2000). In a recent study by Taylor and colleagues, investigators examined the differences in growth hormone (GH) response to acute bouts of resistance exercise in weight-trained (WT) and non-weight-trained women (NWT). Growth hormone is responsible for increasing protein synthesis and for mediating the release of insulin-like growth factor (IGF-1), which is another potential anabolic factor (Taylor et al., 2000). They hypothesized that women with weight training experience would have a greater GH response to the exercise stimulus than the non-weight-trained women (Taylor et al., 2000).
The subjects included twelve healthy, eumenorrheic (normal menstruating), ovulatory women. Women assigned to the WT group had at least one-year of consistent weight training experience, while the NWT women had no regular weight training experience for at least six-months prior to the beginning of the study.
As part of the experimental design, the subjects were first familiarized with the exercise protocol, and their 10-repetition maximum was determined for the various exercises included in the protocol. The exercise protocol consisted of three sets of 10 repetitions for seven different exercises (bench press, leg press, seated shoulder press, leg extension, lat pulldown, biceps curl, and triceps pushdown) with one-minute rest periods between sets and exercises. Blood samples for hormone assays were taken ten and five minutes prior to exercise, and immediately, 5, 15, 30, and 60 minutes after exercise. All testing was performed 2 to 4 days after the onset of menses. This was done to help minimize the estradiol effect (the most potent naturally occurring estrogen). Diet, exercise, and supplementation were controlled for the day prior to testing.
Growth hormone levels were analyzed in absolute terms (i.e. which group had greater GH level at a specific time period) and in cumulative terms (i.e. which group had a greater GH response to exercise from pre-exercise to 60 minutes post exercise). The WT women had lower pre-exercise GH levels compared to NWT women. Additionally, the GH values measured immediately post-exercise and five minutes after were lower for the WT women. However, the overall GH response to the acute bout of resistance exercise was greater for WT women. What this means is that when using the pre-exercise GH level as a baseline value for each group, the WT women had a greater overall increase over the duration of the study (pre-exercise to 60 minutes post-exercise) in GH in response to exercise.
These findings demonstrated that both WT and NWT women have an acute rise in GH levels following resistance exercise, however, the WT women were able to sustain the increased GH levels for a longer period of time. The exercise protocol used in this study provided sufficient stimulus to cause GH levels to increase in both groups. Exercise variables contributing to GH release include intensity, load, rest interval, and the amount of muscle mass utilized. Since both groups used the same intensity, load, and rest period the differences in response may be explained by the WT women utilizing greater amounts of muscle mass during exercise. It could be assumed that due to greater exposure to resistance training, the WT women had greater amounts of lean body mass, and that training exposure also allowed for a greater relative recruitment of their motor unit pool when exercising (Taylor et al., 2000). This in turn stresses more sarcolemma of muscle, resulting in increases in anabolic hormone levels. Thus the authors suggest that the magnitude of hormonal response is related to the amount of muscle tissue stimulated.
The researches suggest that women should be encouraged to engage in resistance exercise, since there may be an influential effect of growth hormone response in women attempting to develop strength and power. However, further investigations are necessary to fully describe the relationship between hormonal responses and resistance-training in women.
Table 1. Main functional responses to exercise and glandular tissues and hormones involved in acute adaptation in men and women (from Robergs and Roberts, 1997). | <urn:uuid:379f764a-517f-4710-8db7-c681b2c70c32> | {
"date": "2015-11-30T23:13:18",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464253.80/warc/CC-MAIN-20151124205424-00139-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9410685300827026,
"score": 2.6875,
"token_count": 1816,
"url": "http://www.unm.edu/~lkravitz/Article%20folder/growthhormone.html"
} |
There has been a sharp increase in the number of cases of whooping cough in England, experts have said.
A total of 665 cases have already been confirmed this year, compared with 1,040 for the whole of 2011, the Health Protection Agency (HPA) said.
As a result, parents are being urged to check their children's vaccinations are up to date, as this is the most effective way to protect against the infection, according to head of immunisation Dr Mary Ramsay.
She said: 'Parents should ensure their children are up to date with their vaccinations so that they are protected at the earliest opportunity.
'The pre-school booster is also important, not only to boost protection in that child but also to reduce the risk of them passing the infection on to vulnerable babies, as those under four months cannot be fully protected by the vaccine.'
Whooping cough - also known as pertussis - is an infection that mainly affects the windpipe and the airways leading to the lungs.
Symptoms are similar to a common cold to begin with, before progressing to intense bouts of coughing accompanied by thick phlegm and the characteristic 'whoop' sound. | <urn:uuid:1c0402ba-6d82-4f77-a1e5-0503401147c2> | {
"date": "2019-01-16T13:06:50",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657470.23/warc/CC-MAIN-20190116113941-20190116135941-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9756889939308167,
"score": 2.984375,
"token_count": 240,
"url": "https://www.netdoctor.co.uk/healthy-living/news/a22300/experts-warn-of-sharp-rise-in-whooping-cough-cases/"
} |
23rd March 2019
The Binnacle comes Home.
Mike Tarver and Peter Jones, representing the Society, met with Lord Dafydd Ellis Thomas to celebrate the event. Mike, author of the definitive history of the Terra Nova, presented a copy of his book to Lord Ellis Thomas who showed great interest in the binnacle and the Welsh maritime tradition that it symbolises. The binnacle is now housed in the window of the one-time Dock Manager's office overlooking the Cardiff bay and the course steered by the Terra Nova as, a century ago, she was towed by tugs past Penarth Head.
This binnacle is the instrument that was installed on the Terra Nova as a special requirement for mapping the coastline of Antarctica. It was mounted on the specially constructed ice house and contained a Standard Compass that was precisely set up so that the magnetic influence of the ship did not interfere with the accuracy of the compass heading. When used at sea, the helmsman was instructed to keep a steady course, using the ship's compass, while readings were taken from obtrusive land features. Commander H.L.L. Pennell, as the expedition's navigating officer, was generally responsible for taking the readings. The binnacle itself is a securely mounted all-weather housing, including a lighting, that allows the gimballed compass within it to be readable through a glass window. The binnacle was presented to the Navigation School of the Royal Navy by the senior officers who brought Terra Nova back to Cardiff in 1913 preparatory to the vessel being sold back to her original owners - Bowrings.The ceremony is recorded on a brass plaque attached to the binnacle. It reads:
STANDARD COMPASS OF THE TERRA NOVA R.Y.S.
Commander Pennell, navigator and sometime commander of the Terra Nova was killed in action aboard the battle cruiser HMS Queen Mary at the battle of Jutland, in 1916. Lt Rennick died after his ship, HMS Hogue was torpedoed off the Dutch coast in 1914. | <urn:uuid:10385197-b53a-4ed8-8c07-ca1ecc2e900b> | {
"date": "2019-04-18T10:49:17",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517558.8/warc/CC-MAIN-20190418101243-20190418122320-00071.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9675994515419006,
"score": 2.828125,
"token_count": 417,
"url": "http://captainscottsociety.com/binnacle.html"
} |
- Go to the MODIS Rapid Response Image Gallery and enter Aral Sea in the Search field. Browse through the images and come up with your own research question about how the Aral Sea region has changed over time. Use the techniques in this chapter to quantify your study.
- Search the MODIS Rapid Response Image Gallery for images of the Aral Sea and try to pinpoint the date that the former island (named Vozrozhdeniye, which means "renaissance" or "rebirth") between the east and west portions of the sea became a peninsula of the mainland. Consider the implications for biodiversity for an island that becomes part of the mainland: for instance, are island species likely to spread to the mainland or will they become prey to mainland predators that now have access to them?
- Search for and download other images of the Aral Sea from MODIS and Landsat. Use a combination of techniques from this chapter to construct a more detailed record of how the area of the sea has changed over time.
The process of setting a scale and making measurements from images is the same for any image in which the features appear in the same focal plane. Thus, the techniques can be applied to any satellite image produced with a nadir (straight down) orientation, regardless of what parameter it measures or if the image is displayed in true or false colors. Additionally, this technique would work just as well for microscopic images as for satellite images. Five sites of special interest to this chapter are noted below.
Aral Sea Image of the Day has a set of images one is from 1989.
World of Change Aral Sea shows a series of images of the Aral Sea from 2000 to present. These images can be downloaded and analyzed in ImageJ.
A reference article The Shrinking Aral Sea also has images to use.
EarthShots: Satellite Images of Environmental Change is a collection of registered time series images taken by Landsat instruments since 1972. You can use the same techniques presented in this chapter to set a scale and measure distances and areas in this collection of images.
Search on NASA Earth Observatory for the phrase time series to find "before and after" images. Set a scale for each image and make measurements to give a quantitative description of the change that occurred.
The NASA Earth Observatory: World of Change features many other sets of images that would be appropriate to use with the techniques described in this chapter.
Occasionally, you may find an image that you would like to make measurements from, but its spatial resolution is not stated clearly. Here are some techniques you might use to set the scale for such an image.
- If the image contains a graphic distance scale, select a straight line along it, then choose Analyze > Set Scale... and enter the Known Distance indicated by the scale.
- If you can identify two specific features in the image, select a line between the two points then choose Analyze > Set Scale.... Find the Known Distance between the locations (by measuring it in an atlas, or with Google Earth, for example) and enter it along with the appropriate units of length.
- If you know the satellite instrument that recorded the image data, visit the instrument's website. Many instruments record data at a constant resolution or their data products are prepared at specific resolutions.
- You can occasionally open image files into a text editor application, and read recognizable header information that states the spatial resolution.
- Submit feedback to data sites, asking them to specifically state image resolutions.
Case Studies with Tool
Other EET chapters that utilize ImageJ as a tool and satellite imagery as a data source include the following:
Using NASA NEO and ImageJ to Explore the Role of Snow Cover in Shaping ClimateInvestigate satellite images displaying land surface temperature, snow cover, and reflected short wave radiation data from the NASA Earth Observation (NEO) website. Animate the images and compare them with the NEO ICE tool.
Using Satellite Images to Understand Earth's AtmosphereUse ImageJ to create an animation showing the change in monthly concentration of aerosols over the course of a year and compare it to a similar animation showing change in carbon monoxide concentration.
Annotating Change in Satellite ImagesUse time-series images to produce a map documenting land-use changes in China.
Analyzing the Antarctic Ozone HoleMeasure and graph the area of depleted ozone from Total Ozone Mapping Spectrometer (TOMS) images.
Exploring and Animating GOES ImagesTransform a time series of GOES images into an animation. Plot a storm track and determine storm speed.
Shrinking Forest - Growing ProblemUse time-series Synthetic Aperture Radar (SAR) images to create a color composite image showing the oldest to most recently deforested areas in the Amazon rainforest.
Whither Arctic Sea Ice?Animate thirty years of sea ice images, measure the ice extent each year, and then graph and analyze the results. | <urn:uuid:0335aea2-d6c9-4750-a1c8-0da3dc9c1c5a> | {
"date": "2017-03-25T05:56:14",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188824.36/warc/CC-MAIN-20170322212948-00436-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8992409706115723,
"score": 3.421875,
"token_count": 1014,
"url": "http://serc.carleton.edu/eet/measure_sat2/going_further.html"
} |
Camden County health officials are reporting the first human West Nile virus case in the state of New Jersey this year in a 60-year-old Bellmawr man.
According to health officials, the patient was admitted to Kennedy Health Systems in Stratford on July 12 with symptoms that had begun at the end of June. On July 17, he was released from the hospital.
“The Camden County Health Department encourages you to use insect repellents and take extra precautions if you are outside during peak biting hours. You may also want to wear long sleeves and long pants if you are in your yard between dusk and dawn,” said Freeholder Carmen Rodriguez, liaison to the Camden County Department of Health and Human Services. “While the chance of becoming ill is relatively small, there are things you can do to protect yourself and your family.”
In 2014, New Jersey reported eight human West Nile virus cases and has reported more than 200 since the virus were first seen in the US in 1999.
The primary way people get West Nile virus is through the bite of an infected mosquito. Most people who become infected with West Nile virus do not have any symptoms.
About one in five people who become infected develop a fever with other symptoms such as headache, body aches, joint pains, vomiting, diarrhea, or rash.
Less than 1 percent of infected people develop a serious neurologic illness, such as encephalitis or meningitis (inflammation of the brain or surrounding tissues). | <urn:uuid:b60d77d4-969c-4f2a-9372-655a2241b8e8> | {
"date": "2017-05-23T12:43:28",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607636.66/warc/CC-MAIN-20170523122457-20170523142457-00027.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9710829854011536,
"score": 3.140625,
"token_count": 306,
"url": "http://outbreaknewstoday.com/new-jersey-reports-1st-west-nile-virus-case-in-bellmawr-man-90265/"
} |
Smokers trying to quit are 60 percent more likely to report success if they switch to e-cigarettes than if they use nicotine products like patches or gum, or just willpower, scientists said on Tuesday.
Presenting findings from a study of almost 6,000 smokers over five years, the researchers said the results suggest e-cigarettes could play an important role in reducing smoking rates and hence cutting tobacco-related deaths and illnesses.
As well as causing lung cancer and other chronic respiratory diseases, tobacco smoking is also a major contributor to cardiovascular diseases, the world's number one killer.
"E-cigarettes could substantially improve public health because of their widespread appeal and the huge health gains associated with stopping smoking," said Robert West of University College London's epidemiology and public health department, who led the study.
Mainly funded by the charity Cancer Research UK and published in the journal Addiction, West's study surveyed 5,863 smokers between 2009 and 2014 who had tried to quit without using prescription medicines or professional help.
The results were adjusted for a range of factors that might influence success at quitting, West said - including age, nicotine dependence, previous attempts to give up smoking, and whether quitting was gradual or abrupt. | <urn:uuid:7adca06c-6a8f-4048-b725-91e001d5cfdf> | {
"date": "2016-12-04T01:59:09",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541170.58/warc/CC-MAIN-20161202170901-00376-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9648611545562744,
"score": 2.828125,
"token_count": 245,
"url": "http://www.tvnewslies.org/tvnl/index.php/news/health/32801-e-cigarettes-boost-quitting-success-among-smokers-study-finds.html"
} |
The percentage of Americans dying from cancer in 2004 was about the same as it was in 1970. You've heard the old adage about cancer: hopefully the cancer won't kill you before the cancer cure does. The grim statistics on survival rates confirm that conventional chemo and radiation are not getting very far with the vast majority of cancers.
Providing an effective holistic cancer treatment is what the EuroMed Foundation is about. If you would like to find out more about your cancer treatment options, request your free personal orientation to our services. One of our doctors will be happy to answer all of your questions in person or over the phone.
The Drawbacks of Traditional Cancer Treatment
In conventional cancer treatments, the body is bombarded with a large dose of toxicity – drugs and often radiation. This method harms the immune system, which makes it difficult to truly deliver a cancer cure. People struggle with the nausea and go bald from the toxicity of the drugs; this doesn't improve the quality of life much either.
In 1986, the McGill Cancer Center scientists surveyed 118 oncologists who specialized in lung cancer. They were asked if they would take chemo if they developed lung cancer. Three-quarters replied they would not.
It has long been acknowledged that the type of radiation used in the 1960s and 1970s elevated women's risk of subsequent cardiovascular disease. So many women were dying of the long-term adverse effects that it more or less counterbalanced any survival benefit from the treatment itself.
However, it is now said the newer forms of radiation minimize this sort of heart damage. To those of us who work with alternative medicine for cancer treatment, this did not ring true. Sure enough, a large and prolonged study by the Netherlands Cancer Institute showed that modern radiation also increases the risk of heart disease in women who receive it following surgery for breast cancer. Study results were published March 7, 2007, in the Journal of the National Cancer Institute (JNCI).
The Politics of Treatment
Why is conventional chemotherapy still pushed by the vast majority of oncologists? In the book, Questioning Chemotherapy, Moss explained that traditional oncologists are in a very difficult position because they've been trained to give these drugs. And they've devoted many years to reaching a very high level of expertise in the knowledge of poisonous, deadly compounds. They want to help the cancer patient, yet the tools they've been given don't work, he said.
From expert and author Cynthia Foster, MD:
"Cytotoxic chemotherapy kills cancer cells by way of a certain mechanism called "First Order Kinetics." This simply means that the drug does not kill a constant number of cells, but a constant proportion of cells. So, for example, a certain drug will kill 1/2 of all the cancer cells, then 1/2 of what is left, and then 1/2 of that, and so on. So, we can see that not every cancer cell necessarily is going to be killed. This fact is well known by oncologists.
"Now, how can cancer patients possibly fight even a few cancer cells when their immune systems have been disabled and this is yet another stress on the body, and they're bleeding because they have hardly any platelets left from the toxic effects of the chemotherapy? This is usually why, when chemotherapy is stopped, the cancer grows again and gets out of control."
The Immune System - The First Line of Defense
Because cancer is essentially a failure of the immune system, it makes no sense to administer a cancer cure that further damages the immune system. In Arizona, the doctors at the EuroMed Foundation kill cancer and bolster the immune system at the same time by blending conventional medicine with alternative medicine. We combine the best of both worlds for a better outcome through alternative cancer treatment of common cancers such as breast cancer and colon cancer.
We don't rely on chemo to do the entire job of killing cancer cells. We use a number of complementary therapies to diminish cancer. For example, Poly-MVA® is highly selective for malignant tissue. It influences oxygen, water, and electrical inputs to the malignancy. It behaves like a chemotherapeutic agent, but is not destructive. In June of 2008, Poly-MVA® became the first dietary supplement to be cleared by the FDA for use in a cancer study. It is likely this study will lead to the use of Poly-MVA® in conventional cancer treatments.
A Safer Chemotherapy
The treatment does not have to be worse than the disease. We use a low dose, targeted chemotherapy – about one-tenth the amount of standard chemotherapy. We make use of the body's own hormone, insulin, to carry cytotoxic drugs directly into the cancer cell. This is called IPT – Insulin Potentiation Therapy. Because it is so effective at delivering the drugs just to the cancer cells, there is little left over to cause a toxic reaction within healthy cells. In 60 years, there has never been a reported death from IPT.
Patients who undergo holistic cancer treatment with IPT and complementary therapies have far fewer side effects. In fact, you can read real patient stories to see what they have to say.
All of us have cancer cells in us. When the immune system is strong, it stays on top of the errant cells. When the immune system is weak, cancer grows. At the EuroMed Foundation, we know how to kill cancer without killing the immune system. Indeed, many of our patients finish treatment with a much stronger immune system than they had when they started. To find the answers to common questions about our cancer treatments, visit our FAQ page.
To find out if holistic cancer treatment is an option for you, request your free personal orientation online. Or you can call our office at 602-404-0400 to schedule your orientation. | <urn:uuid:e6890082-bd00-48f8-be02-68be4279586e> | {
"date": "2015-10-05T16:43:20",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736677484.23/warc/CC-MAIN-20151001215757-00038-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9589452743530273,
"score": 2.9375,
"token_count": 1195,
"url": "http://www.euro-med.us/cancer-treatment.cfm"
} |
NMU 130 – Avocadoes for weight loss
Nutrition / Natural Medicine Update No 130 (May 22, 2019)
with Dr. James Meschino
Topic: Avocado May Hold Secret to Weight Loss for Many People
Source: Journal Nutrients (March 2019)
An important study published in the journal Nutrients in March 2019 showed that substituting avocadoes for starchy carbohydrates at meals may help overweight individuals lose weight without feeling hungry or deprived. This strategy also lowers blood sugar and insulin levels, which helps to ward off diabetes and helps reduce the risk of cardiovascular disease. This study involved 31 overweight subjects who followed three different types of diets in a randomized 3-arm, 6-hour crossover clinical trial. The results showed that compared to the popular low-fat, high carbohydrate diet, overweight subjects showed better outcomes when avocadoes (fairly high in fat) were substituted for carbohydrates at a meal.
Avocadoes are fairly high in fat, but they mostly contain a healthy fat known as monounsaturated fat (oleic acid) and a fair bit of fiber. For instance, 1 avocado, or 100 gm of avocado or a cup of avocado contains 160 calories, of which most of the calories are in the form of healthy fat and provides up to 7 grams of fiber. Avocado, although classified as a large berry, is low in carbohydrate sugar calories. The study showed that the high-fat content in avocadoes provides hours of satiety (post-meal satisfaction) after a meal without spiking blood sugar levels and the monounsaturated fat does not stimulate excess cholesterol production in the body the way that saturated and trans-fats do. As such, the fats in avocadoes don’t raise blood cholesterol and don’t increase the risk of heart disease and stroke.
The researchers conclude that using avocado in place of carbohydrates at meals can help overweight patients suppress appetite and improve their internal physiology to facilitate the reduction of body fat and reduce the risk of diabetes and cardiovascular disease. So, using avocadoes in place of rice, bread, pasta, potatoes, even French fries, is a strategy to consider if losing weight is on your list of wellness goals.
I have included the reference for this publication in the text below.
Lanjun Zhu, Yancui Huang, Indika Edirisinghe, Eunyoung Park, Britt Burton-Freeman. Using the Avocado to Test the Satiety Effects of a Fat-Fiber Combination in Place of Carbohydrate Energy in a Breakfast Meal in Overweight and Obese Men and Women: A Randomized Clinical Trial. Nutrients, 2019; 11 (5): 952 10.3390/nu11050952
Eat Smart, Live Well, Look Great, | <urn:uuid:3c2516a5-298e-4c2d-99d3-e6670d69c32b> | {
"date": "2020-01-23T08:48:56",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.903006911277771,
"score": 2.59375,
"token_count": 569,
"url": "https://meschinohealth.com/nutritionmedicine/nutrition-natural-medicine-update-no-130/"
} |
Over the course of this week our little corner of the web will feature a series of posts relating to Mexico, the great American nation which this year commemorates the two-hundredth anniversary of the beginning of its war of independence. That revolt was begun by a heretic priest, Miguel Hidalgo, under the influence of the contemptible ideas of “the Enlightenment”, but he nonetheless marched under the banner of the Blessed Virgin of Guadalupe, who is venerated to this day as Queen of Mexico and Empress of the Americas. This curious rebel presaged so much of the history of Mexico: rebellion and devotion, religion and irreligion.
Our ‘Mexico Week’ is not intended to give any sanction to rebel priests or violent revolt against legitimate authority, but we instead aim to take this opportunity to display to readers some of the greatness of this brilliant yet troubled nation, oft forgotten due to its rather famous and prominent neighbour to the north.
Growing up in the United States, as I did, Mexico was (and still is) often written off as a place of drug killings and drunk American college students. But digging beneath the surface one easily discovers a Mexico rich in story. ‘Mexico Week’ will by no means be a comprehensive survey of the country, its history, and traditions, but rather a little cabinet of curiosities, a Mexican miscellany if you will. | <urn:uuid:f999eeb0-acdb-47c4-a123-9458efd1eec3> | {
"date": "2015-11-29T05:05:35",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456289.53/warc/CC-MAIN-20151124205416-00350-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9510859847068787,
"score": 2.625,
"token_count": 287,
"url": "http://www.andrewcusack.com/2010/mexico-week/"
} |
Sharing Assemblies are an important feature of our school, promoting and exemplifying our ‘caring and sharing’ ethos.
On Fridays at 9.45am, each room shows and describes to the rest of the school some of the work they have been doing during the week. Typically, all children in Room 1 will show their work and those in one of the four Houses (on a weekly rotation) from the other rooms.
Older students run the assemblies and help the younger children present their work. Parents are most welcome and, indeed, encouraged to attend, as the assemblies give an insight into many aspects of the school.
There are numerous benefits from these assemblies but some of the most important are:
- The older children gain experience of leadership and develop their sense of manaakitanga me te awhina.
- Children see that their work is valued and of interest to others.
- Children are given an opportunity to express themselves and develop confident public speaking from an early age.
- A strong sense of community is fostered and reinforced.
- The assemblies help children to exercise and expand their levels of attention, concentration, and focus.
- Younger children see the work of older children in other rooms and thus gain a sense of how their own learning and achievement will develop. | <urn:uuid:45f44006-4fe9-4696-802c-86fa1bcc8357> | {
"date": "2017-09-23T07:32:54",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689572.75/warc/CC-MAIN-20170923070853-20170923090853-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.962863564491272,
"score": 2.609375,
"token_count": 267,
"url": "http://opua.school.nz/school-assemblies/sharing-assemblies"
} |
Controlled Missouri River Flood Aimed at Helping Fish
STEVE INSKEEP, host:
Work your way back up the river system and you will find the Army Corps of Engineers in the midst of controversy again. After more than a decade of lawsuits and bitter arguments, the Corps has triggered an intentional flood on the Missouri River. It's a gigantic experiment. Conservationists hope this test will help them understand why an ancient fish species has all but died out.
Frank Morris reports from member station KCUR, in Kansas City.
FRANK MORRIS reporting:
Gavins Point, in South Dakota, is the last of six major dams on the Missouri River. Just below it, the river looks much like it did a hundred years ago, wide, shallow and braided with sandbars.
Last week, volunteers like Clay Jenkins came to Gavins Point to help stock the Missouri with a species much older than the river itself, the Pallid Sturgeon.
Mr. CLAY JENKINS (Volunteer, Gavins Point, South Dakota): You know, I've been reading about this for years, and this is the, this fish that's pivoting the whole Missouri River.
MORRIS: These bony-looking, primitive fish can reach 80 pounds and live to be 60. While they've survived shifting continents and ice ages, the industrialization of the Missouri has nearly wiped them out.
Last Friday, the Army Corps of Engineers opened the valves a bit at Gavins Point Dam to do something nature no longer can: send a spring rise surging more than 800 miles toward the Mississippi.
About 150 miles downstream, at Wilson Island, Iowa, Aaron Delonay, an ecologist with the U.S. Geological Survey, is helping his crew launch this flat-bottom boat to start another long day of searching for spawning sturgeon.
Mr. AARON DELONAY (Ecologist, U.S. Geological Survey): We hope to follow these fish as they move upstream and hopefully get closer and closer to determining where it is they spawn, when they spawn, and under what conditions do they spawn.
MORRIS: The spring rise is in full swing here today, but few other than the researchers and perhaps the fish will notice. The water rose almost two feet, much less than it would have in a typical spring flood before the dams were upstream.
After trolling past miles of tree-lined banks and a nuclear power plant, the boat's telemetry gear detects a fish fitted with a transmitter.
Mr. DELONAY: And actually, that's right where she is. She's between us and the bank.
MORRIS: It's a shovel-nosed sturgeon, a close relative of the Pallid. No one's ever witnessed a Pallid Sturgeon spawning, and with the species in sharp decline, Delonay admits that the chances of that happening this year are remote. He says, at best this spring rise will help ecologists conduct a better one next year.
Mr. DELANEY: This is a starting point. It has both positive and negative aspects to it. But essentially that's it.
(Soundbite of river crew)
MORRIS: Delonay says more sophisticated river management and work underway to recreate Pallid habitat could save the species. But political decisions governing a watershed more than twice the size of Texas don't come easy, or fast.
Farther downstream, at the Corps' Northwestern Division Headquarters in Omaha, a wall-sized map detailing the Missouri River Basin is posted behind Paul Johnston.
Johnston, who's with the Corps, says the spring rise was argued about, litigated and whittled down for a dozen years. Until lately, the Corps managed the Missouri strictly as an economic asset, one with hundreds of perpetually angry shareholders.
Mr. PAUL JOHNSTON (U.S. Army Corps of Engineers): That has been our challenge, to comply with the Endangered Species Act and respond to the concerns of people along the rest of the river. No small trick.
MORRIS: Steady wind is rustling leaves in large cottonwood trees 30 miles downstream from Kansas City, Missouri, where the river, now fast, wide and deep, churns past levees that shield Tom Waters' farm.
Mr. TOM WATERS (Farm Owner Along Missouri River): The science isn't there. They don't know if this is going to work or not. And they're just going to keep trying this, trying that, and all the time we're the ones at risk. And so it's scary.
MORRIS: It's also frightening to people way back upstream in Montana and the Dakotas who see any man-made spring rise tapping reservoirs already parched from six years of drought.
But observers up and down the river say it's clear that another party has now permanently joined the battle to control the flow of the Missouri River, and this one was here first.
For NPR News, I'm Frank Morris.
NPR transcripts are created on a rush deadline by a contractor for NPR, and accuracy and availability may vary. This text may not be in its final form and may be updated or revised in the future. Please be aware that the authoritative record of NPR’s programming is the audio. | <urn:uuid:ac504e64-993a-4a00-9db7-381816d08026> | {
"date": "2015-11-24T22:32:42",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398444047.40/warc/CC-MAIN-20151124205404-00056-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.951784074306488,
"score": 3.046875,
"token_count": 1106,
"url": "http://www.npr.org/templates/story/story.php?storyId=5417107"
} |
There are more than 70 different kinds of lymphoma, a cancer of the immune cells. As such, the path from diagnosis to the end of life can vary quite a bit. Hodgkin lymphoma is very curable, while some non-Hodgkin lymphomas are more difficult to treat. Stage IV lymphoma is the most advanced, but this can mean very different things for different people -- including living a fulfilling life for many years, in some cases. If the disease does progress toward the end of life, people go through stages that include changing the focus of therapy, emphasis on quality of life and symptom control, and providing support and comfort up to the last day of life.
Video of the Day
More aggressive stage IV or recurrent lymphoma often requires more intensive treatment, such as stem cell transplantation with high-dose chemotherapy. Doctors use a variety of tools to help people with cancer balance the risks and potential gains from anti-cancer therapy. People react differently to a poor prognosis, but some decide to focus on quality of life and maximizing the fullness of their remaining days rather than continuing with anti-cancer therapies.
Continuing care focuses on preserving the quality of a person's life, rather than prolonging it, but this does not mean giving up. Many people don't realize that the final process of dying is relatively short, occurring over just a few days. Until a person enters this phase, life can be close to normal -- although the person is obviously sick, with fatigue being very common. A pain-management plan developed by specialists can enable individuals to live their final days comfortably. As the end of life draws near, some people opt for home care by loved ones, while others prefer hospice care, which draws on the support of people who have both medical training and, oftentimes, considerable experience with end-of-life issues.
Changes in Body Function
As lymphoma spreads throughout the body, therapies that were previously used to treat the cancer may be used as a means of controlling symptoms. For example, if lymphoma spreads to the bones, radiation may be used to relieve pain. Chemotherapy may be advantageous in shrinking distant tumors that are blocking the function of organs, such as the bowels. Organs containing tumors may eventually fail to function properly, which can lead to such problems as difficulty breathing or swallowing, diminished mental capacity, infections, pain or fatigue.
Support and Preparation
Despite advances in medicine, unpredictable events and complications -- like infections -- can make it very difficult for doctors to say for sure when a person will live his last day. This unpredictability in the timing of death makes it important to have final arrangements well planned early on. Making personal decisions ahead of time and setting up a strong support network will optimize the time remaining for an individual to share with loved ones. | <urn:uuid:f1f694d2-3378-4ed7-a496-02b37d6fbe27> | {
"date": "2018-03-21T01:26:03",
"dump": "CC-MAIN-2018-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647556.43/warc/CC-MAIN-20180321004405-20180321024405-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9591813683509827,
"score": 3.046875,
"token_count": 572,
"url": "https://www.livestrong.com/article/266105-end-of-life-stages-in-lymphoma-cancer/"
} |
Which of the following describes the civil war in Syria?
1. The civil war in this ancient country drags on and on. At the center of the war is a Russian-backed government fighting militant Islamists hoping to carve out an Islamic state. Suspected rebels have been tortured and kidnapped, their ancestral homes burnt to the ground. There are daily clashes in this small country. The rebels call on the U.S. for help. The civil war remains a stalemate.
2. The rebels in this country want to topple a dictator and set up a theocratic state. The conflict has resulted in a severe humanitarian crisis. Both sides have been accused of widespread human rights violations and atrocities. One and a half million civilians have been displaced, an estimated 100,000 civilians killed. President Obama, feeling pressure from his interventionist advisors, sends 100 troops in a purely symbolic gesture to a neighboring country in 2011 on a time-limited mission. The troops will be fighting Christians.
3. A radical Islamic movement is attempting to topple a government it sees as illegitimate. The Islamic radicals accuse government forces of perpetrating massacres. countrymen demonstrate against the regime, others, who fear the radicals will set up a theocracy, demonstrate in support of the regime. President Obama takes a tough line with the government and cuts aid. year alone, more than 1,100 people have died in the conflict.
4. This Middle East country finds Islamic rebels, including members of al Qaeda, fighting an Islamic government. The rebels seek to topple the government and set up an Islamic theocracy. This nation, which has used chemical weapons before, refuses to sign a chemical weapons ban. “The security… is deteriorating rapidly and is of significant concern,” says Sen. Bob Corker, top Republican on the Senate Foreign Relations Committee. Christians continue to be the targets of systematic violence. Torture is still the order of the day, says one human rights group. Another organization puts the number of dead or wounded this year at more than 4,137 civilians killed, and 9,865 wounded.
5. None of the above.
The correct answer is 5. None of the above.
You may be forgiven, however, for mistaking the conflicts in Ingushetia, Uganda, Egypt, and Iraq for the one currently being waged in Syria. Little differentiates them except Washington’s all-consuming mania to get rid of al Assad.
Many of these wars are bloodier than the conflict in Syria. Iraq, for instance, has seen 4,137 deaths between January and July. The Ugandan war against the Lord’s Resistance Movement has seen 100,000 killed. The Israeli-Palestinian fighting in Gaza has the same concentration of civilians killed as does Syria, but no one in the Obama Administration is threatening air strikes against Tel Aviv. Of the four countries with the highest civilian death tolls, two of them — Iraq and Afghanistan — were supposed to have been neutered by American military intervention.
All of these conflicts have victims crying out for U.S. humanitarian military intervention. Why are some cries heeded and others not?
VIRGIL HAWKINS, AUTHOR of Stealth Conflicts, How the World’s Worst Violence Is Ignored, describes six factors that determine media coverage of global conflicts. And media coverage shapes what governments do. These are: national/political interest, geographic proximity/access, ability to identify, ability to sympathize, simplicity and sensationalism.
Proximity is most important. Large media outlets station reporters in Jerusalem or Cairo, so covering Middle East conflicts is relatively easy. Africa has few correspondents, and because of its size and impassable roads and the expense to send reporters there it is poorly reported.
Simplicity is another key factor. The ideal conflict for journalists has an obvious bad guy oppressing a peaceful, familiar underdog, writes Hawkins. If the conflict is too hard for the average TV viewer to get the media won’t waste time reporting it. We don’t get Africa. We may sympathize with the victims, but we lack the ability to identify. African conflicts, which seem omnipresent and never-ending, bring only bring yawns, which is why the biggest conflict since World War II, The Second Congo War, is virtually unknown to Americans. This is why 90 percent of the world’s conflict-related deaths occur not in the media-obsessed Middle East, but in war-torn Africa, says Hawkins.
The Syrian Civil War is a conflict the average Joe understands, with Assad playing the role of Hitler or Osama Bin Laden, and the rebels as Sylvester Stallone’s Rocky. What’s more Assad is Muslim. He is linked to Russia and Iran and Hezbollah, three of our top enemies. Understanding is one thing, but Joe still doesn’t want to go to war in Syria fighting alongside al Qaeda troops. How sad the Washington elite doesn’t get that. | <urn:uuid:f7190d26-a58a-4e5c-825b-5d21838f065f> | {
"date": "2017-04-29T23:12:16",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123632.58/warc/CC-MAIN-20170423031203-00355-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9436925053596497,
"score": 3.421875,
"token_count": 1021,
"url": "https://spectator.org/54885_why-syria/"
} |
Doctors Urge Parents to Lower Volume Controls on Holiday Electronics
MONDAY Dec. 21, 2009 -- If you're giving your teenager an iPod or other music player this holiday season, consider a bonus present to help their hearing: Preset the top volume level to one-half or two-thirds of the actual maximum.
That's the advice from specialists at Vanderbilt University Medical Center. They warn that sound over 85 decibels -- well short of the volume limit some music players carry -- can cause hearing loss. People are also at risk when they listen to music for too long.
"As parents, we can't hear how loud their music is when they have the earbuds in, so this is an important step," Dr. Ron Eavey, chair of the medical center's Department of Otolaryngology, said in a Vanderbilt news release. "I can tell you that if you hear the music coming from their headphones, it is too loud, but an easier way to know for sure is to preset the device. This will still allow them to listen to and enjoy their music but will safeguard against ear-damaging volume levels."
Many music players can be programmed to not allow their volume to go beyond a specified level.
Anne Marie Tharpe, professor and chair of hearing and speech sciences at Vanderbilt, said in the same release that hearing loss isn't always obvious, especially in kids. "The symptoms can initially be subtle and include difficulty hearing when there is background noise. Such losses can result in significant challenges for children in classroom settings."
Learn more about hearing loss from MedlinePlus.
Posted: December 2009 | <urn:uuid:a9ec098f-ba12-4603-bd6d-c569d111e57f> | {
"date": "2013-05-23T18:59:16",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9552271366119385,
"score": 2.671875,
"token_count": 333,
"url": "http://www.drugs.com/news/doctors-urge-parents-lower-volume-controls-holiday-electronics-21618.html"
} |
In March of 2012, Kaufman County’s Poor Farm joined eight other Texas historical sites on Preservation Texas’ ninth annual list of Texas’ Most Endangered Historic Places.
The Preservation Texas website quotes its president, Jim Ray:
The 2012 list highlights historic places that were once commonly found around Texas and that are almost gone or that represent rare construction types. In each instance these places are integral to the communities where are they located, yet they are in immediate danger of disappearing from the landscape. By calling attention to theses sites now, we want to encourage local action while there’s still time. It is our hope that inclusion on our list will provide those who care for these sites with the support, expertise and momentum to take their preservation efforts to the next level.
On Monday, April 2, 2012, Jamie Laywell, KCHC Secretary, announced the selection during the Kaufman County Commissioners Court’s regular meeting. The previous week, Jamie and other members of the KCHC traveled to Austin for Preservation Texas’ announcement of the 2012 Most Endangered Places list, which also included Lakehills (Bandera County), Panhandle (Carson County), Seguin (Guadalupe County), San Marcos (Hays County), Jefferson (Marion County), Corpus Christi (Nueces County), San Augustine (San Augustine County) and Pflugerville (Travis County). Read the full article from the Kaufman Herald.
The Kaufman County “Poor Farm” is the only such site in Texas, and believed to be the only one in the United States, that is still owned by the county. The history of the Kaufman County Poor Farm begins after the Civil War ended and the number of indigent persons within the entire state became so high that, by 1869 an addendum to the Texas Constitution, Article XII, Section 26, made the care for the poor the responsibility of each county. Under the new law, in1874, Kaufman County Commissioners began scouting for land to establish a “poor house”, or in this case a “poor farm”. In 1881 the county purchased 408+ acres of land, which was located only 1 1/4 miles from the courthouse square. By November, 1883, buildings were erected to house the residents and farm animals, and the operation of the County Poor Farm was underway. From the beginning the purpose of the poor farm was to offer a place where persons designated as paupers could remain there and support themselves by their own labor until they were either financially able to leave or until they died.
The poor farm was also used as an Epidemic Camp in 1900 when smallpox hit
the county. There existed a “place of burial” for transients and persons who died in jail, and where “quarantined” persons were buried away from the populace. In 1871, victims of a typhoid fever epidemic were ordered buried on “Dr. Snow’s place”, now known as the county’s indigent cemetery located on the north side of Hwy. 34, once part of the poor farm property, and still used today by the county as a burial site for indigent dead.
In 1931 acreage on the property was used in the Farm Demonstration Program Project of the County Agent. The use of the farm as such continued until the 1960s. From 1954 until 1973, the property was the site of the County Jail and a working prison farm. The jail building still stands and is part of the KCHC historical site. In 1998, a Texas State Historical Site Marker was dedicated by KCHC, and is now located on the eastern fence line of the KCHC “Poor Farm” property. KCHC holds a 99-year, renewable lease on 27 acres of the original poor farm property that includes a stock pond, 19th-century buildings, other outbuildings, and vintage farm equipment.
KCHC offers “Poor Farm” tours, classroom and service club programs, and student field trips on request. Contact the KCHC office for information.
For a more detailed discussion of the history of the Poor Farm and its cemetery, see The Poor House Story website, specifically Kaufman County Poor Farm by Kathy Kelley Hunt, former member of the KCHC. | <urn:uuid:85b4836f-b403-4e2e-afc2-e94582b4a3c4> | {
"date": "2014-07-30T00:55:50",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268363.15/warc/CC-MAIN-20140728011748-00342-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9693092703819275,
"score": 3.03125,
"token_count": 893,
"url": "http://www.friendsofkchc.com/kchc/sites/kaufman-county-poor-farm/"
} |
Richard Ritenbaugh, examining the Jewish observance of the ten Days of Awe, occurring between Tishri 1 (Rosh Hashana/Day of Trumpets) and Tishri 10, (Yom Kippur/Day of Atonement), points out that, even though there are no biblical instructions to observe the Days of Awe, we may look at their role in considering another view of the Day of Atonement. In the context of Jewish tradition, God allegedly writes three books annually - the Book of Life (in which a rather small number of righteous individual are entered), the Book of Intermediaries (into which most individuals fall), and the Book of Death (for the hopelessly incorrigible). During these ten Days of Awe, if an individual rigidly focuses on his spiritual obligations, repenting of his sins and reconciling with those he has wronged, God will move his name into the Book of Life, allegedly allowing him to return to being a carnal disagreeable person for the rest of the year. Consequently, according to this understanding, ten days of good conduct can wipe out 355 days of bad behavior. As God's called-out ones, we ought to count every day as a day of awe. We also must realize that all sins are sins against God, and that sins against other people do not have less importance.
A recent phenomenon among some Sabbatarians is something called the "Lunar Sabbath," counting the weekly Sabbath from each month's new moon. Charles Whitaker argues that the Lunar Sabbath idea is unbiblical and unworkable, asserting that the traditional weekly Sabbath, observed every seventh day, is correct and in line with God's Word.
In this sermon on the significance of the Day of Atonement, Richard Ritenbaugh teaches that on this day we do no work because most of the work of atonement is done by God Almighty. We fast, afflicting our souls, reminding us how much we depend upon God both physically and spiritually, enabling us to lighten our loads and other people's loads. Fasting puts us in a proper humble and contrite frame of mind, allowing God to respond to us, freeing us from our burdens and guiding us into His Kingdom and His family.
Receive Biblical truth in your inbox—spam-free! This daily newsletter provides a starting point for personal study, and gives valuable insight into the verses that make up the Word of God. See what over 145,000 subscribers are already receiving. | <urn:uuid:79df87dd-6755-4070-bcdf-dae9f087631d> | {
"date": "2018-08-16T14:10:16",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211000.35/warc/CC-MAIN-20180816132758-20180816152758-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.950465738773346,
"score": 2.90625,
"token_count": 515,
"url": "https://www.cgg.org/index.cfm/fuseaction/Library.topic/ID/6404/Tishri-10.htm"
} |
On the historic heroism of Prime Minister Narendra Modi on Jammu and Kashmir, two great men should be remembered; the entire country is also reminded of these two great men. These are two great men, Sardar Patel, and Shyama Prasad Mukherjee. Sardar Patel was against divided India, India did not want any fragmentation in any situation, Sardar Patel had dreamed of a strong India and wanted to overthrow the British carpenter. The British had certainly liberated India but had given up the stance of princely states. Sardar Patel had merged over five hundred princely states into India. A feat that we should be proud of as Indians. Although we have a lot to take pride in, certainly our leaders who gave us freedom and consequently our Nation was initiated and the economy was put on fast track mode by these same leaders so we definitely owe a lot to them says Saint Gurmeet Ram Rahim Singh Ji.
But there were three princely states whose mindset was anti-India as always some hindrances are always there even on the path of nobility. These states were from Junagadh, Hyderabad and Jammu and Kashmir. Sardar Patel sent the army and merged Junagadh and Hyderabad with India. Sardar Patel was ready to show the rule of Jammu and Kashmir to join India, but Jawaharlal Nehru took the case of J & K statehood in his own hands. The consequences were Article 370 and 35, which were geared by not just the Kashmiri Pandits of Jammu and Kashmir but also the people of the whole country. In that period, the people of the country needed a permit to enter Jammu and Kashmir, one country two constitutions and one country, two flags. It’s an irony that the Nation had to go through this.
This situation was very painful, permits were needed to move to and from our own country, such a system would hardly be anywhere in the world? Shyama Prasad Mukherjee was the first to recognize this pain. He, therefore, fought against this system. But Jawaharlal Nehru, as well as Sheikh Abdula, was defied. Mukherjee himself went to Jammu and Kashmir without a permit. Mukherjee got arrested and imprisoned, killing Syama Prasad Mukherjee in a conspiracy in the prison itself. The sacrifice of Shyama Prasad Mukherjee led the Prime Minister’s chair of Jawaharlal Nehru. The good thing was that the permit system was abolished to go to Jammu and Kashmir, the outcome of one country two flags were abolished. Certainly, the spirit of Sardar Patel and Shyama Prasad Mukherjee surely will be proud of Narendra Modi’s feat today.
Kashmiri Pandits have been the maximum victims of Section 35A. Another system in this stream is even more dangerous. If a woman marries a person outside the state, then her rights on her property are exhausted, that property goes to the state government. If the Kashmiri Pandit man marries a woman outside the state, then he has to go through a similar kind of pain. More than five lakh Pandits were driven out of Kashmir due to forceful, violent and jihadist mentality. This jihadist mentality is what is affecting the world over and people with personal interests are fuelling this mentality just for their personal gains. | <urn:uuid:5f13b787-2845-4c09-8504-9cdf6b48ac12> | {
"date": "2019-08-24T12:11:23",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027320734.85/warc/CC-MAIN-20190824105853-20190824131853-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9801382422447205,
"score": 2.546875,
"token_count": 692,
"url": "https://www.allperfectstories.com/one-nation-one-constitution-finally-made-possible/"
} |
ReadWriteThink couldn't publish all of this great content without literacy experts to write and review for us. If you've got lessons plans, videos, activities, or other ideas you'd like to contribute, we'd love to hear from you.
Find the latest in professional publications, learn new techniques and strategies, and find out how you can connect with other literacy professionals.
Teacher Resources by Grade
|1st - 2nd||3rd - 4th|
|5th - 6th||7th - 8th|
|9th - 10th||11th - 12th|
Reading and Writing About Pollution to Understand Cause and Effect
|Grades||3 – 5|
|Lesson Plan Type||Standard Lesson|
|Estimated Time||Five 45-minute sessions|
Sylva, North Carolina
MATERIALS AND TECHNOLOGY
- A River Ran Wild by Lynne Cherry (Harcourt, 1992)
- Chart paper and markers
- Overhead projector and transparencies
- Computer with Internet access
- LCD projector (optional)
- Lyrics for "Don't Go Near the Water" by Johnny Cash (Sony, 1974)
- CD or MP3 player (optional)
- Art materials for mural project
- Clear plastic containers
- Blue and red food coloring
- Plastic fish
- Pieces of paper
- Definitions of Miscible and Immiscible
- "A Fish Story"
- Cause and Effect Graphic Organizer
- Sequencing Graphic Organizer
|1.||Make a K-W-L chart on chart paper titled Facts About Water Pollution. The chart should have three columns: What I Know, What I Want to Know, and What I Learned.
|2.||Obtain and familiarize yourself with A River Ran Wild by Lynne Cherry. This book tells the tale of the ecological deterioration followed by the restoration of the Nashua River in Massachusetts.
|3.||Obtain the lyrics for "Don't Go Near the Water" by Johnny Cash. You can get a recording of this song by purchasing and downloading it from iTunes or another online music store or by getting Cash's 1974 album titled Ragged Old Flag from the library. You may want to simply type the lyrics to share with students, or you can make arrangements to play them the song during Session 2.
|4.||Visit Fires on the Cuyahoga River and review the photographs. Click on the link for "The Cuyahoga Revisited" at the bottom of the page and read this essay for background information about fires on this river, which actually happened twice prior to the more famous 1969 fire. Decide how you want to share the images with students during Session 2, either by printing them off and enlarging them or using an LCD projector. The concept of water catching fire is hard for students to understand and the use of actual photographs is powerful in teaching this lesson.
|5.||Print one copy of "A Fish Story" for each student in your class. Print one copy of the Definitions of Miscible and Immiscible to share with students and display in your classroom. Make a copy of the Sequencing Graphic Organizer and the Cause and Effect Graphic Organizer for each student in your class and a transparency of each for modeling purposes.
|6.||Divide the class into heterogeneous groups of no more than four students. Students should not be grouped by ability level, but you may want to make sure that each group has one student with strong reading ability, one with artistic ability, and a leader. Each group should also have an assigned work area in the classroom where they can conduct their experiment and complete their murals.
|7.||Gather materials needed for the experiment during Session 3. Each group should have a set of the materials listed in the Resources section.
|8.||Gather art materials for murals students create during Session 4. For each group, you need a large piece of poster paper measuring approximately two feet by four feet; this will serve as the background for the mural. You will also need to provide scissors, glue, construction paper, and markers. This part of the lesson helps visual learners to understand the effects of water pollution on living organisms. | <urn:uuid:67e9ba0e-51d8-445a-b7d5-a03c2060dca7> | {
"date": "2014-10-02T10:32:54",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663743.38/warc/CC-MAIN-20140930004103-00258-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9142289161682129,
"score": 3.34375,
"token_count": 881,
"url": "http://www.readwritethink.org/classroom-resources/lesson-plans/reading-writing-about-pollution-1035.html?tab=3"
} |
Newswise — A light-sensing pigment found in everything from bacteria to vertebrates can be biochemically manipulated to reset itself, an important therapeutic advantage, according to new research out of Case Western Reserve University School of Medicine. In a study just released from the Proceedings of the National Academy of Sciences, researchers successfully used a modified form of vitamin A, called locked retinal, to induce the recycling mechanism and engage proteins central to human vision. The targeted proteins include light-sensing rhodopsin, which belongs to a family of proteins—G protein-coupled receptors, or GPCRs—that sit in cell membranes and transmit external cellular cues into internal cell signaling pathways. The discovery opens a new therapeutic opportunity for modified retinals that help improve vision, and offers a major improvement over current therapeutics designed to perturb cell signaling in the eye.
“Our study demonstrates a complete transition from a one-way activation of a GPCR into a self-renewing, recycling activation mechanism by the mere addition of a cyclohexyl chemical group to the retinal. These findings exemplify the possibility of reprogramming GPCRs into self-renewing machines that can be controlled by external cues. This biochemically induced function will be helpful in treating people with vision impairment, and opens up several avenues for more efficient GPCR-based therapeutics,” said Sahil Gulati, first author of the study and graduate student in the department of pharmacology at Case Western Reserve University School of Medicine. Krzysztof Palczewski PhD, professor and chair of the department, served as senior author for the study.
The discovery digs into the biochemistry of vision and why the chemical configuration of the retinal is critical for humans to perceive light. Humans see with the help of an extremely sensitive protein in the back of the eye called rhodopsin, which attaches to a retinal molecule to sense light. Light photons enter the eye and get absorbed by the retinal-rhodopsin complex, activating a cascade of downstream signals that constitute vision. Importantly, the retinal awaits light photons while maintaining a particular chemical configuration—11-cis retinal—and transforms into a second configuration—all-trans retinal—after it absorbs a light photon. But this transformation is a one-way ticket, and requires an army of specialized proteins to convert all-trans-retinal back to 11-cis-retinal. Inherited mutations in any of these specialized proteins can cause retinal degenerative diseases. Researchers who want to treat such diseases must repair or bypass the mutated proteins to maintain this retinal conversion in humans.
“Our study shows how a chemical modification in the retinal can activate downstream visual signaling in a photocyclic manner. This chemical modification allows retinal to self-renew using thermal energy, and hence does not require any additional enzymes,” Gulati said.
The researchers discovered the self-renewing mechanism in bovine rhodopsin, which is exceptionally similar to human rhodopsin. The researchers used purified proteins in their laboratory to show that their modified retinal binds to bovine rhodopsin and successfully activates specific human eye proteins in response to light, and when complete, it uses thermal energy to slowly return to its inactive form that can be repeatedly reactivated with light. The findings suggest that retinal molecules with the specific chemical structure could reversibly stimulate rhodopsin that drives human vision.
Said Gulati, “Although one-way reaction mechanisms of GPCRs enable them to function normally in the human body, they cannot renew their activator molecules, and hence are dependent on continuous administration of drug molecules to treat disease symptoms. Controlled cyclic activation of GPCRs makes them self-sustainable.”
The newly discovered mechanism may enhance current approaches to treat retinal degenerative diseases and other nerve cell disorders. Researchers can biochemically tinker with the retinal and the retinal-bound rhodopsin molecules to improve their ability to turn on and off proteins in the eye. Said Gulati, “Our next steps will be to design a new class of modified retinals with faster thermal recovery, and to test their efficiency as human therapeutic modalities.”
This work was supported by funding from the National Institutes of Health (grants EY021126, EY027283 and EY025214 to K.P.; EY025214 to B.J.; CA157735 to G.T.), JSPS Overseas Research Fellow (K.K.), the Department of Veterans Affairs (grant IK2BX002683 to P.D.K.) and National Science Foundation (grant MCB-084480 to G.T.). The study was based upon research conducted at the Northeastern Collaborative Access Team beamlines, which are funded by the National Institute of General Medical Sciences from the National Institutes of Health (grant P41 GM103403). The Pilatus 6M detector on 24-ID-C beam line is funded by a NIH-ORIP HEI grant (S10 RR029205). This research used resources of the Advanced Photon Source, a U.S. Department of Energy (DOE) Office of Science User Facility operated for the DOE Office of Science by the Argonne National Laboratory under Contract No. DE-AC02-06CH11357. K.P. is the John H. Hord Professor of Pharmacology.
For more information about Case Western Reserve University School of Medicine, please visit: http://case.edu/medicine. | <urn:uuid:9857ecb5-3083-4bf8-ab84-52cbcc951001> | {
"date": "2017-08-19T07:24:41",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105326.6/warc/CC-MAIN-20170819070335-20170819090335-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.906420111656189,
"score": 2.796875,
"token_count": 1161,
"url": "http://www.newswise.com/articles/newly-discovered-chemical-reaction-in-eye-may-improve-vision"
} |
Autor/Herausgeber: Anne Mette et al.
The Systems Approach Framework Handbook
The web-handbook picks up this challenge and guides the reader through exploring the system’s dynamics and interactions by using a Systems Approach Framework (SAF).
Nearly half of the human population lives in the 10% of land that is considered as the coastal zone – a zone of breathtaking complexity, confronted with ever more rapid transformation processes and sustainability issues. Most of today’s coastal zone problems involve many competing interests and it is of crucial importance to simultaneously assess the social and ecological dimensions of them.
The web-handbook picks up this challenge and guides the reader through exploring the system’s dynamics and interactions by using a Systems Approach Framework (SAF). The SAF is a methodology that has been designed, developed and tested by 54 research institutes and universities across the European Union. Multidisciplinary teams were involved in the analysis of coastal problems, engaging in inter- and transdisciplinary work with society and policy, tackling environmental problems in the coastal zone, aiming to improve the ecological sustainability, economic efficiency, and social equity.
The web-handbook offers a 5-step-manual for identifying issues, for representing and illustrating complex processes, for interpreting these, and for engaging with policy makers and stakeholders to bridge the gap between science and policy and science and society. It fosters the integration between different scientific disciplines and society, and promotes a dialogue and transfer of scientific knowledge to policy and society.
The SAF manual that you will work with focuses on existing tools but connects these through the use of systems theory. It guides the reader through a full SAF-application and gives guidelines on how to implement the five steps, as well as offering you a set of essential supporting information, a variety of examples, bibliographies and links to several databases
Available at: www.coastal-saf.eu
Verlag, Ort: www.coastal-saf.eu | <urn:uuid:09596970-e518-49bf-a4ed-1b79beb9bce4> | {
"date": "2017-03-29T15:14:43",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00526-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9048042893409729,
"score": 2.765625,
"token_count": 404,
"url": "http://kmgne.de/wir-machen/publikationen-liste/the-systems-approach-framework-handbook/"
} |
Presentation on theme: "Indicators of Abuse & Mandated Reporting Arkansas Commission on Child Abuse, Rape and Domestic Violence."— Presentation transcript:
Indicators of Abuse & Mandated Reporting Arkansas Commission on Child Abuse, Rape and Domestic Violence
Indicators of Physical Abuse PHYSICAL: Bruises or welts in unusual places or in patterns Bruises in various stages of healing Explanation of injury differs from parent explanation
Indicators of Physical Abuse BEHAVIORAL: Becomes frightened when other children cry Says the parents deserve to be hurt Is afraid of certain people
Indicators of Neglect PHYSICAL: Underweight Always hungry Not clean Inappropriately dressed Denied medical or dental care
Indicators of Neglect BEHAVIORAL: Begs or steals food Arrives early & leaves late Frequent, unexplained absences Overtired or listless
Indicators of Sexual Abuse PHYSICAL: Difficulty walking or sitting Wearing torn, stained or bloody underwear Injury to or discharge from genitals Pain during urination
Indicators of Sexual Abuse BEHAVIORAL Acts withdrawn or younger than age. Displays sexual behavior Tells you that she has secrets that she cannot tell. Tries to hurt himself Indicators of Sexual Abuse
What is a Mandated Reporter?
A person who, by profession, is mandated by law to report if they have “reasonable cause to suspect” that a child has been subjected to child maltreatment. He or she “shall immediately notify the child abuse hotline”.
How many of you are Mandated Reporters?
Mandated Reporters Any child care worker or foster care worker; A coroner; A day care center worker; A dentist or dental hygienist; A domestic abuse advocate; A domestic violence shelter employee or volunteer; An employee of or a person working under contract for the Division of Youth Services, of the Department of Human Services; An employee of a Child Advocacy Center;
Mandated Reporters… Any foster parent; A judge; A law enforcement official; A licensed nurse; Any medical personnel who may be engaged in the admission, examination, care, or treatment of persons; A mental health professional; An osteopath;
Mandated Reporters… A peace officer; A physician; A prosecuting attorney; A resident intern; A school counselor; A school official; A social worker; A surgeon; A teacher; A Court Appointed Special Advocate (CASA) program staff or volunteer; A juvenile intake or probation officer;
Mandated Reporters… Any clergyman, which includes minister, priest, rabbi, accredited Christian Science practitioner, or other similar functionary of a religious organization, or any person believed to be so by the person consulting him or her, except to the extent he or she has acquired knowledge of suspected maltreatment through communications required to be kept confidential pursuant to the religious discipline of the relevant denomination or faith, or he or she received the knowledge of the suspected maltreatment from the offender in the context of a statement of admission
Your turn to ask the questions… “What if someone sends a child to me with an allegation?” “What if my agency policy says I can’t report/have to be the one at the school to report/have to ask permission to report?”
Act 703 of 2007 “No school, Head Start Program, or day care facility shall prohibit, require permission, or require notification of any person before any employee or volunteer directly reports child maltreatment to the hotline.”
Educate them! –I’ll even do it for you… Hold their hand! –offer to sit with them while they call on speaker phone the first time. Scare them… –Yes, you read that correctly…
Protects Mandated Reporters who report in good faith from criminal and civil liabilities. This good faith is assumed under the law. Willfully FAILING to report is a class C misdemeanor. The Act establishes civil penalties for Mandated Reporters. The Child Maltreatment Act
Reporting Options By Phone: 1.800.482.5964 By Fax*: 1.501.618.8952 * Mandated reporters only. Must use Arkansas State Police official “Mandated Reporter’s Form” May only be reported by fax if it is non-emergency.
Working with Children Develop trust Allow the child to be heard Meet with the child separately Remember that you may be the only adult who has the chance to understand the child
When a Child Discloses Abuse DO consider your response before you are in a real situation. DO pay attention to your body language. DO know the reporting law. DO reassure the child that they did the right thing by telling you.
When a Child Discloses Abuse DO let the child know that it was brave to share something (no matter how minimal) about a difficult subject. DO document the actual words. DO call the Child Abuse Hotline.
When a Child Discloses Abuse DON’T try to conduct the investigation yourself. DON’T act shocked, horrified, scared, etc. DON’T share this information with others. DON’T try to talk a child out of what he/she is saying.
When a Child Discloses Abuse DON’T suggest to a child the he/she may have been abused. DON’T attempt to find out the details from the parent. DON’T stand over the child while he/she talks to you. | <urn:uuid:53eb2a9e-d736-4c5b-9384-942dcf8e1f16> | {
"date": "2017-02-25T00:33:54",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00240-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.912469744682312,
"score": 2.625,
"token_count": 1128,
"url": "http://slideplayer.com/slide/4062385/"
} |
26 relations: Air Force Reserve Command, Air National Guard, Alaska, American Defense Service Medal, Arctic, Arctic Circle, Atlantic Ocean, Axis powers, Coast Guard Arctic Service Medal, Convoy, Kriegsmarine, Nazi Germany, Oak leaf cluster, Overseas Service Ribbon, Sans-serif, Serif, Service ribbon, Service star, Thule Air Base, U-boat, United States Air Force, United States Armed Forces, United States Coast Guard, United States Marine Corps, United States Navy, World War II.
The Air Force Reserve Command (AFRC) is a Major Command (MAJCOM) of the United States Air Force, with its headquarters at Robins Air Force Base, Georgia.
The Air National Guard (ANG), also known as the Air Guard, is a federal military reserve force as well as the militia air force of each U.S. state, the District of Columbia, the Commonwealth of Puerto Rico, and the territories of Guam and the U.S. Virgin Islands.
Alaska (Alax̂sxax̂) is a U.S. state located in the northwest extremity of North America.
The American Defense Service Medal was a military award of the United States Armed Forces, established by, by President Franklin D. Roosevelt, on June 28, 1941.
The Arctic is a polar region located at the northernmost part of Earth.
The Arctic Circle is the most northerly of the five major circles of latitude as shown on maps of Earth.
The Atlantic Ocean is the second largest of the world's oceans with a total area of about.
The Axis powers (Achsenmächte; Potenze dell'Asse; 枢軸国 Sūjikukoku), also known as the Axis and the Rome–Berlin–Tokyo Axis, were the nations that fought in World War II against the Allied forces.
Christmas is an annual festival commemorating the birth of Jesus Christ,Martindale, Cyril Charles.
The Christmas season, also called the festive season, or the holiday season (mainly in the U.S. and Canada; often simply called the holidays),, is an annually recurring period recognized in many Western and Western-influenced countries that is generally considered to run from late November to early January.
Christmas Eve is the evening or entire day before Christmas Day, the festival commemorating the birth of Jesus.
Christmas traditions vary from country to country.
The Coast Guard Arctic Service Medal was established on 20 May 1976 by Commandant of the Coast Guard Admiral Owen W. Siler.
A convoy is a group of vehicles, typically motor vehicles or ships, traveling together for mutual support and protection.
The Kriegsmarine (literally "War Navy") was the navy of Germany from 1935 to 1945.
Nazi Germany is the common English name for the period in German history from 1933 to 1945, when Germany was under the dictatorship of Adolf Hitler through the Nazi Party (NSDAP).
New Year is the time or day at which a new calendar year begins and the calendar's year count increments by one.
New Year's Day, also called simply New Year's or New Year, is observed on January 1, the first day of the year on the modern Gregorian calendar as well as the Julian calendar.
In the Gregorian calendar, New Year's Eve (also known as Old Year's Day or Saint Sylvester's Day in many countries), the last day of the year, is on 31 December which is the seventh day of Christmastide.
An oak leaf cluster is a miniature bronze or silver twig of four oak leaves with three acorns on the stem that is authorized by the United States Armed Forces as a ribbon device for a specific set of decorations and awards of the Department of Defense, Department of the Army, and Department of the Air Force to denote subsequent decorations and awards.
An Overseas Service Ribbon is a service military award of the United States military which recognizes those service members who have performed military tours of duty outside the borders of the United States of America.
In typography and lettering, a sans-serif, sans serif, gothic, or simply sans letterform is one that does not have extending features called "serifs" at the end of strokes.
In typography, a serif is a small line attached to the end of a stroke in a letter or symbol.
A service ribbon, medal ribbon, or ribbon bar is a small ribbon, mounted on a small metal bar equipped with an attaching device, which is generally issued for wear in place of a medal when it is not appropriate to wear the actual medal.
A service star is a miniature bronze or silver five-pointed star inch (4.8 mm) in diameter that is authorized to be worn by members of the seven uniformed services of the United States on medals and ribbons to denote an additional award or service period.
Thule Air Base, or Thule Air Base/Pituffik Airport, is the United States Air Force's northernmost base, located north of the Arctic Circle and from the North Pole on the northwest side of the island of Greenland.
U-boat is an anglicised version of the German word U-Boot, a shortening of Unterseeboot, literally "undersea boat".
The United States Air Force (USAF) is the aerial and space warfare service branch of the United States Armed Forces.
The United States Armed Forces are the military forces of the United States of America.
The United States Coast Guard (USCG) is a branch of the United States Armed Forces and one of the country's seven uniformed services.
The United States Marine Corps (USMC), also referred to as the United States Marines, is a branch of the United States Armed Forces responsible for conducting amphibious operations with the United States Navy.
The United States Navy (USN) is the naval warfare service branch of the United States Armed Forces and one of the seven uniformed services of the United States.
World War II (often abbreviated to WWII or WW2), also known as the Second World War, was a global war that lasted from 1939 to 1945, although conflicts reflecting the ideological clash between what would become the Allied and Axis blocs began earlier.
2018 has been designated as the third International Year of the Reef by the International Coral Reef Initiative.
2019 (MMXIX) will be a common year starting on Tuesday of the Gregorian calendar, the 2019th year of the Common Era (CE) and Anno Domini (AD) designations, the 19th year of the 3rd millennium, the 19th year of the 21st century, and the 10th and last year of the 2010s decade. | <urn:uuid:16453663-5323-4e3e-b036-ebb8292df547> | {
"date": "2018-12-13T07:03:10",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824525.29/warc/CC-MAIN-20181213054204-20181213075704-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9495158195495605,
"score": 3.046875,
"token_count": 1401,
"url": "https://en.unionpedia.org/%22A%22_Device"
} |
"The baby travelling through the birth canal is going to get the right sorts of bacteria" ... study co-author Charles Algert.
Babies born by caesarean are much more likely to be admitted to hospital with gastrointestinal disease or chest infections in their first year of life than those born naturally, a study of NSW births has found.
The babies were 22 per cent to 26 per cent more likely to be hospitalised with gastrointestinal disease and about 12 per cent more likely to be admitted with bronchiolitis, a type of chest infection, the researchers, from the Kolling institute at Royal North Shore Hospital, found.
The study co-author Charles Algert said children born by caesarean could miss out on picking up important gut bacteria that children born naturally get during the birth.
"We take all these yoghurts and things to get the right bacteria in our guts but the baby travelling through the birth canal is going to get the right sorts of bacteria," he said.
However, there could also be a link between caesareans and breastfeeding problems.
The study, which analysed data from 626,700 births in NSW between 2001 and 2008, found women who gave birth by caesarean were 70 per cent more likely to be diagnosed with a complication affecting breastfeeding.
And the babies of the women with breastfeeding problems were then 30 per cent more likely to be hospitalised with gastrointestinal problems.
Caesarean rates are increasing in NSW. In this study, published in the journal Archives of Diseases in Childhood, about 26 per cent of the babies were born by caesarean.
According to the most recent NSW Health Mothers and Babies report in 2009 the caesarean rate was more than 30 per cent, and as high as 45 per cent in some private hospitals.
Mr Algert said there was debate about the mechanisms through which caesareans were linked to poorer health.
Earlier Australian research had found the link between bronchiolitis and caesareans existed with only planned caesareans, suggesting labour itself could activate the mothers' immune system.
But Mr Algert said his research indicated it was the birth that was important. | <urn:uuid:1cdc2ccc-d605-4183-a4f7-c1fae7eb86a2> | {
"date": "2014-09-22T12:32:00",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137046.16/warc/CC-MAIN-20140914011217-00093-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9805927872657776,
"score": 2.5625,
"token_count": 455,
"url": "http://www.essentialbaby.com.au/birth/caesarean/could-a-caesarean-birth-make-your-baby-sick-20120203-1qw7a.html"
} |
It is often held that New Zealand punches ‘above its weight’ in many a competition, whether it’s good or bad to be the winner. Assertions bringing this cliché to mind are not difficult to locate. Whether in the context of sporting achievements or important strategic partnerships, we often hear that New Zealand is one of the best pound-for-pound punchers around.
This is just as well, because in the international political arena, weight class is hardly to this country’s advantage. New Zealand, like other small countries, has a very limited ability to affect global politics through the use of its resources alone. Small countries the world over usually understand this reality. Some choose to look inward, keeping international engagement to a minimum. Some make themselves champions of regional cooperation. And some attempt to stand out by cultivating a reputation for doing more than their fair share of ‘do-gooder politics’: contributing to international efforts that have a moral or ethical flavour to them.
Depending on how (and what) one counts, there are now about 50 global human rights agreements (HRAs) in existence. They cover virtually every human right one can think of: free and fair elections, wage equality, prohibition of torture, elimination of racial discrimination, judicial due process, and the elimination of child labour. Small countries with good rights situations at home can have a real impact here, as instigators of these agreements. The Convention Against Torture had its origins in a proposal submitted to the Swiss government. Sweden took a leading role in negotiations on the Convention on the Rights of Persons with Disabilities, writing one of two proposals. While this effort faltered, its renewed moment owed a good deal to New Zealand’s efforts. This connection is interesting, and New Zealand’s Office for Disability Issues emphasises it. But how does New Zealand stack up across the board on HRA activity?
Thanks to a new resource, the Database of UN Human Rights Agreements, we can answer this question in a systematic way. How enthusiastic is New Zealand about bringing these agreements home to be recognised as formally binding? In comparing New Zealand to other advanced democracies, Figure 1 shows the total number of HRAs each country has ratified. Interestingly, small countries don’t appear to be more (or less) enthusiastic about ratification than medium-sized countries are. New Zealand is very much in the middle of the pack: well-ahead of laggard giants like the US and Japan, but no further ahead than Australia, and behind Norway, the Netherlands, and Germany.
Looking at other areas such as contributions to international peacekeeping, one would likely find similar gaps between myth and empirical reality. Perhaps the discourse will catch up with the facts. But for the time being, with a temporary seat at one of the most important tables in the world, New Zealand might as well try to reap benefits from the cliché.
Jana Von Stein is a Senior Lecturer in International Relations at Victoria University and can be emailed at [email protected] | <urn:uuid:caa33609-8443-4902-abe7-5f539588b4c1> | {
"date": "2019-03-20T11:22:05",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202326.46/warc/CC-MAIN-20190320105319-20190320131319-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9533860683441162,
"score": 2.78125,
"token_count": 622,
"url": "http://www.incline.org.nz/home/do-gooder-human-rights-politics-how-does-new-zealand-measure-up"
} |
When you think of timber frame homes, you think of the smell of the timber, the big open spaces, and the natural beauty, but you also admire the craftsmanship spent making high quality, super strong structures. The building blocks of all timber frame homes is the carefully cut timber, but the joinery is what shapes them. Your child might refer to joinery as, “What snaps the legos together.”
We take pride in the quality of our craftsmanship at Woodhouse. While some companies machine cut and others hand cut timbers, we do both, using machine-cut joinery with a CNC machine for accuracy, competitive pricing, and efficient production, and hand finishing for superior quality and beauty.
A Time-Tested Building System
Joinery is an essential part of woodworking and the time-tested technology has been passed down through out the ages. Chris Koehn, the Western Regional Project Manager at Woodhouse, started his Timber Framing career in Germany restoring a medieval city with his uncle who was a restoration carpenter.
“Pulling a timber frame out of a building and realizing that the man who put it in there has been dead for 500 years or more was an interesting feeling… by studying these ancient structures, you learn what works and what doesn’t work,” said Chris.
Chris believes that the differences between European and Northern American Joinery techniques are mainly driven by the size of the trees Northern America had available when settlers first arrived. Europe ran out of large timbers long ago and had to compensate with smaller timbers.
“You don’t see any buildings in Europe post 1500AD that had any long, straight timber in it. They had to put together smaller pieces of timber and their joinery had to change to accommodate that,” said Chris.
While Europe was using Timber Framing for all sorts of structures, Northern Americans primarily used the building system to create wide open barns.
Northern Americans modified their frame lay-out system to efficiently use the larger North American timber for bigger, more repetitious buildings. We see this tradition continue even today in many of our “bent” based frame designs.
How Joinery Works
Fred Dewey, a Senior Designer and Joinery Expert at Woodhouse, describes joinery as, “The intersection between two or more timbers to form both a strong and aesthetically pleasing connection.”
Types of Joinery
A true timber frame structure uses many types of joinery. The 3 most common types of joinery in post and beam structures are:
- Mortise and Tenon joints – These joints have adjoining pieces that connect at an angle, which help transfer loads from horizontal timbers to vertical timbers. They typically have a 45° diagonal piece called a brace or strut that helps stabilize the beams. They are pegged, as opposed to nailed or screwed, and can be stronger than lap joints which use nails or screws.
- Lap joint – A joint made with two pieces of metal, timber, etc., by halving the thickness of each member at the joint and fitting them together. These joints are used on outside corners or where beams intersect, and are commonly nailed or screwed. You do not typically find lap joints used in historical European structures because steel for nails was a limited resource.
- Dove tails – A flaring lap joint which fits tightly making an interlocking joint between two pieces that resists pulling apart in all directions except one. These are used for special modifications to structures and works well for a high tension application. You typically would find this joint at a collar tie or joist location.
Systems for Creating Joinery
Europeans cut the timber used to create joinery by using a system called “scribing,” where you hold one timber up to another and hand-cut the pieces to match up perfectly. All of the joints are unique to the size of the timbers and can’t be used interchangeably throughout the structure.
Northern America adapted a lay out technique called square rule, which allowed for repetitious buildings like barns that have the same cuts of timber in a bunch of locations. It allowed for us to build bigger structures faster, but essentially functions the same way.
This timeless technology for joining wood is one reason Woodhouse’s timber frame structures are so appealing. It is a form of craftsmanship that makes the structure strong, while remaining hidden to stay beautiful to the eye. | <urn:uuid:6d1c690c-b116-4e62-9391-d7ffd31a22a4> | {
"date": "2017-12-17T13:51:38",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948596051.82/warc/CC-MAIN-20171217132751-20171217154751-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9627799987792969,
"score": 3.109375,
"token_count": 915,
"url": "https://timberframe1.com/blog/timber-frame-joinery-101-a-woodworking-tradition/"
} |
Colonic polyps, also known as colorectal polyps, are growths that appear on the surface of the colon. The colon, or large intestine, is a long hollow tube at the bottom of the digestive tract. It’s where the body makes and stores stool.
In most cases, polyps don’t cause symptoms and are usually found on routine colon cancer screening exams. However, if you do experience symptoms, they may include:
- blood in the stool or rectal bleeding
- pain, diarrhea, or constipation that lasts longer than one week
- nausea or vomiting if you have a large polyp
Blood on your toilet paper or blood-streaked stools may be an indication of rectal bleeding and should be evaluated by a doctor.
Polyps in the colon can vary in size and number. There are three types of colon polyps:
- Hyperplastic polyps are harmless and don’t develop into cancer.
- Adenomatous polyps are the most common. Although most will never develop into cancer, they do have the potential to become colon cancer.
- Malignant polyps are polyps that are noted under microscopic examination to have cancer cells in them.
Doctors don’t know the exact cause of colonic polyps, but polyps result from abnormal tissue growth.
The body periodically develops new healthy cells to replace old cells that are damaged or no longer needed. The growth and division of new cells is usually regulated.
In some cases, however, new cells grow and divide before they’re needed. This excess growth causes polyps to form. The polyps can develop in any area of the colon.
Although the specific cause of colonic polyps isn’t known, there are certain factors that can increase your risk of developing colonic polyps. These risk factors include:
- being over age 50
- being overweight
- having a family history of polyps or colon cancer
- having polyps in the past
- having ovarian cancer or uterine cancer before age 50
- having an inflammatory condition that affects the colon, such as Crohn’s disease or ulcerative colitis
- having uncontrolled type 2 diabetes
- having a hereditary disorder, such as Lynch syndrome or Gardner’s syndrome
Lifestyle behaviors that may contribute to the growth of colonic polyps include:
- drinking alcohol frequently
- having a sedentary lifestyle
- eating a high-fat diet
You may be able to lower your risk for colonic polyps if you make lifestyle changes to address these behaviors. Regularly taking a low dose of aspirin and adding more calcium to your diet may also help prevent polyps. Your doctor may have other suggestions for reducing your risk.
Polyps can be found on a number of tests. These tests may include:
- Colonoscopy. During this procedure, a camera attached to a thin, flexible tube is threaded through the anus. This allows your doctor to view the rectum and colon. If a polyp is found, your doctor can remove it immediately or take tissue samples for analysis.
- Sigmoidoscopy. This screening method is similar to a colonoscopy, but it can only be used to see the rectum and lower colon. It can’t be used to take a biopsy, or a sample of tissue. If your doctor detects a polyp, you'll need to schedule a colonoscopy to have it removed.
- Barium enema. For this test, your doctor injects liquid barium into your rectum and then uses a special X-ray to take images of your colon. Barium makes your colon appear white in the pictures. Since polyps are dark, they’re easy to identify against the white color.
- CT colonography. This procedure uses a CT scan to construct images of the colon and rectum. After the scan, a computer combines the images of the colon and rectum to produce both 2- and 3-D views of the area. A CT colonography is sometimes called a virtual colonoscopy. It can show swollen tissues, masses, ulcers, and polyps.
- Stool test. Your doctor will give you a test kit and instructions for providing a stool sample. You’ll return the sample to your doctor’s office for analysis, especially to test for microscopic bleeding. This test will show if you have blood in your stool, which can be a sign of a polyp.
The best way to treat colonic polyps is to remove them. Your doctor will likely remove your polyps during a colonoscopy.
The polyps are then examined under the microscope to see what type of polyp it is and if there are any cancer cells present. Doctors can usually get rid of polyps without performing surgery.
However, you may need surgery to remove the polyps if they’re large and can’t be removed during a colonoscopy. In most cases, this can be done by laparoscopic surgery. This type of surgery is minimally invasive and uses an instrument called a laparoscope.
A laparoscope is a long, thin tube with a high-intensity light and a high-resolution camera at the front. The instrument is inserted through an incision in the abdomen. Once your surgeon has a visual of your colon, they’ll remove the polyps using a special tool.
A pathologist, or someone who specializes in tissue analysis, will check the polyps for cancerous cells.
Maintaining a healthy diet can help prevent the development of colonic polyps. This includes eating more fruits, vegetables, whole grains, and lean meat.
You may also be able to prevent polyps by increasing your intake of vitamin D and calcium. Foods that are rich in vitamin D and calcium include:
You can further lower your risk for colonic polyps by reducing your intake of high-fat foods, red meat, and processed foods. Quitting smoking and exercising regularly are also important steps to prevent the development of colonic polyps.
Colonic polyps don’t usually cause any symptoms. They’re most often discovered during routine colon screenings, such as a colonoscopy or a sigmoidoscopy.
Your best option for finding out if you have colonic polyps is to have colon screenings regularly when your doctor recommends them. Polyps can often be removed at the same time as the screening procedure.
Though polyps are usually benign, doctors most often remove them because some types of polyps can later develop into cancer. Removing colonic polyps can help prevent colon cancer from developing.
A healthy diet, including foods rich in vitamin D, calcium, and fiber, can lower your risk for developing colonic polyps. | <urn:uuid:9353e98e-20e7-455b-acdd-1ae9621841eb> | {
"date": "2019-09-19T15:28:47",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573533.49/warc/CC-MAIN-20190919142838-20190919164838-00496.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9301782250404358,
"score": 3.5,
"token_count": 1412,
"url": "https://www.healthline.com/health/colorectal-polyps"
} |
- Writing: Communicating effectively in writing as appropriate for the needs of the audience.
- Critical Thinking: Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
- Learning Strategies: Selecting and using training/instructional methods and procedures appropriate for the situation when learning or teaching new things.
- Compute dimensions, tolerances, and angles of workpieces or machines, according to specifications and knowledge of metal properties and shop mathematics.
- Record production output.
- Verify alignment of workpieces on machines, using measuring instruments such as rules, gauges, or calipers. | <urn:uuid:93dd7c69-ab0a-4678-b7e6-7e6a14ad039c> | {
"date": "2017-01-17T09:04:36",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00276-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8486652374267578,
"score": 3.875,
"token_count": 129,
"url": "http://www.unixl.com/dir/gunsmithing/hawaii/"
} |
David Duke. Duke describes himself as a "racial realist", asserting that "all people have a basic human right to preserve their own heritage.
" He opposes what he considers to be Jewish control of the Federal Reserve Bank, the federal government and the media. Duke supports the preservation of what he labels Western culture and traditionalist Christian "family values", strict Constitutionalism, abolition of the Internal Revenue Service, voluntary racial segregation, ardent anti-communism and white separatism. The Southern Poverty Law Center describes Duke as "the most recognizable figure on the American radical right" and "a neo-Nazi". His views are characterized by racism, antisemitism, and Holocaust denial. Youth and early adulthood Duke studied at Louisiana State University (LSU) in Baton Rouge, and in 1970, he formed a white student group called the White Youth Alliance; it was affiliated with the National Socialist White People's Party.
Political activities. Blackbeard. Edward Teach (also Edward Thatch, c.1680—22 November 1718), better known as Blackbeard, was a notorious English pirate who operated around the West Indies and the eastern coast of the American colonies.
Although little is known about his early life, he was probably born in Bristol, England. He may have been a sailor on privateer ships during Queen Anne's War before settling on the Bahamian island of New Providence, a base for Captain Benjamin Hornigold, whose crew Teach joined sometime around 1716. Hornigold placed him in command of a sloop he had captured, and the two engaged in numerous acts of piracy. Their numbers were boosted by the addition to their fleet of two more ships, one of which was commanded by Stede Bonnet, but toward the end of 1717 Hornigold retired from piracy, taking two vessels with him. Teach captured a French merchant vessel, renamed her Queen Anne's Revenge, and equipped her with 40 guns. Early life Little is known about Blackbeard's early life.
New Providence. Paul Castellano. Costantino Paul "Big Paul" Castellano (pronounced cas-TAY-llah-noh) (June 26, 1915 – December 16, 1985), also known as "The Howard Hughes of the Mob" and "Big Paulie" (or "PC" to his family), succeeded Carlo Gambino as head of the Gambino crime family, the nation's largest Cosa Nostra family at the time.
The unsanctioned assassination of Castellano by John Gotti would spark years of animosity between the Gambinos and the other New York crime families. His nephew was actor Richard S. Castellano from The Godfather. Biography Background Castellano was born in Brooklyn in 1915, to Giuseppe Castellano and Concetta (née Casatu). Castellano's sister Catherine was married to Carlo Gambino, his cousin and a future boss of the Gambino crime family. Many sources state that Paul was married to Carlo Gambino's sister-in-law. Castellano often signed his name as "C. Early life John Gotti. John Joseph Gotti, Jr.
(October 27, 1940 – June 10, 2002) was an American mobster who became the Boss of the Gambino crime family in New York City. Gotti and his brothers grew up in poverty and turned to a life of crime at an early age. Operating out of the Ozone Park neighborhood of Queens, Gotti quickly rose to prominence, becoming one of the crime family's biggest earners and a protégé of Gambino family underboss Aniello Dellacroce.
Gambino crime family. The rise of what for a time was the most powerful crime family in America began in 1957, the day Albert Anastasia was assassinated while sitting in a barber chair at the Park-Sheraton Hotel in Manhattan.
Experts believe Carlo Gambino helped orchestrate the hit to take over the family. Gambino partnered with Meyer Lansky to control gambling interests in Cuba. The family's fortunes grew through 1976, when Gambino appointed his brother-in-law, Paul Castellano, as boss. Castellano infuriated upstart capo John Gotti, who orchestrated Castellano's murder in 1985. Five Families. Charles "Lucky" Luciano is considered the father of modern organized crime and is responsible for splitting New York into five different families The Five Families are the five original Italian American Mafia crime families of New York City which have dominated organized crime in the United States since 1931.
The families are: Bonanno, Colombo, Gambino, Genovese and Lucchese. History Names The Five Families were publicly named in the 1963 Valachi hearings based on their bosses at the time: Tommy Lucchese, Vito Genovese, Carlo Gambino, Joseph Bonanno and the recently deceased Joseph Profaci.
Mafia boss succession Bonanno Family: Profaci/Colombo Family: 1931 – Joseph Profaci has his Brooklyn-based gang formally recognized as a family.1962 – Profaci dies of cancer, and underboss Joseph Magliocco succeeds him.1964 – Magliocco is forced to retire after taking part in Bonanno's plot to take over the Commission. Mangano/Gambino Family: | <urn:uuid:10f6584f-cc46-444e-9f37-66cd202a6fd7> | {
"date": "2018-04-20T05:18:24",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937114.2/warc/CC-MAIN-20180420042340-20180420062340-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9664082527160645,
"score": 2.90625,
"token_count": 1092,
"url": "http://www.pearltrees.com/abhinavasokh/crime/id14024941"
} |
Re: .Net vs. .COM
> How big is the difference between .net and .com?
".com" is the domain name for commercial web sites. It is also slang for a
business that is run over the Internet.
".net" is the domain name for internet related websites like service
providers, network maintenance, etc. In theory, it covers anything needed to
keep the Internet running.
".Net" is the brand name for a set of products from MS. Like "ActiveX", it
has no real meaning and many of the products are unrelated.
"Mohan Reddy" <[email protected]> wrote in message
> In the recent past, we have seen the .com business going down. Now we are
> talking about .net. How big is the difference between .net and .com?
> Is .net going to dominate its peers? | <urn:uuid:b6181ade-0872-4221-9d2c-edb751e55c48> | {
"date": "2015-01-31T19:47:14",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122030742.53/warc/CC-MAIN-20150124175350-00237-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.913324773311615,
"score": 2.640625,
"token_count": 193,
"url": "http://forums.devx.com/printthread.php?t=54775&pp=15&page=1"
} |
The purpose of the U.S. Geological Survey's (USGS) National Oil and Gas
Assessment is to develop geologically based hypotheses regarding the potential
for additions to oil and gas reserves in priority areas of the United States.
The USGS recently completed an assessment of undiscovered oil and gas potential
of the Cambrian-Ordovician carbonate rocks, the Chattanooga and Floyd Shales,
and the Pottsville Formation coals in the Black Warrior Basin Province in
northeastern Mississippi and northwestern Alabama in the Gulf Coast Region.
The Cambrian-Ordovician carbonate rocks, the Chattanooga and Floyd Shales,
and the Pottsville Formation coals are important because of their potential
for natural gas resources.
This assessment is based on geologic principles and uses the total petroleum
system concept. The geologic elements of a total petroleum system include
hydrocarbon source rocks (source rock maturation, hydrocarbon generation and migration), reservoir rocks (sequence stratigraphy and petrophysical properties), and hydrocarbon traps (trap formation and timing). The USGS used this geologic framework to define two total petroleum systems and three assessment units. All three assessment units were quantitatively assessed for undiscovered oil and gas resources.
Additional publication details
USGS Numbered Series
Geologic Assessment of Undiscovered Oil and Gas Resources of the Black Warrior Basin Province, Alabama and Mississippi
Black Warrior Basin Province Assessment Team
Read Me File; 5 Chapters; Spatial Data; Available on CD-ROM | <urn:uuid:1d1a7ee6-2d97-417e-b888-9ef2cb894512> | {
"date": "2017-08-22T17:24:19",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112533.84/warc/CC-MAIN-20170822162608-20170822182608-00616.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8575279712677002,
"score": 2.875,
"token_count": 312,
"url": "https://pubs.er.usgs.gov/publication/ds69I"
} |
p53, also known as tumor protein 53 (TP53), is a transcription factor that regulates the cell cycle and hence functions as a tumor suppressor. It is very important for cells in multicellular organisms to suppress cancer. TP53 has been described as "the guardian of the genome", referring to its role in conserving stability by preventing genome mutation (). The name is due to its molecular mass: it runs as a 53 kilodalton (kDa) protein on SDS-PAGE.
Names of Protein
- Official protein name: Cellular tumor antigen p53
- Tumor suppressor p53
- Phosphoprotein p53
- Antigen NY-CO-13
The human TP53 gene, TP53, is located on the human chromosome 17 (17p13.1).
TP53 was identified in 1979 by Arnold Levine, David Lane, and Lloyd Old, working at Princeton University, Imperial Cancer Research Fund (UK), and Sloan-Kettering Memorial Hospital, respectively. It had been hypothesized to exist before as the target of the SV40 virus, a strain that induced development of tumors. The p53 gene was first cloned in 1983 by Moshe Oren (Weizmann Institute).
It was initially presumed to be an oncogene due to the use of mutated cDNA following purification of tumour cell mRNA. Its character as a tumor suppressor gene was finally revealed in 1989.
In 1993, p53 was voted molecule of the year by Science magazine.
TP53 is 393 amino acids long and has three domains:
- An N-terminal transcription-activation domain (TAD), which activates transcription factors
- A central DNA-binding core domain (DBD). Contains zinc molecules.
- A C-terminal homo-oligomerisation domain (OD). Tetramerization greatly increases the activity of p53 in vivo.
Most of the mutations that deactivate p53 in cancer usually occur in the DBD. The mutations destroy the ability of the protein to bind to its target DNA sequences, and thus prevents transcriptional activation of these genes. As such, mutations in the DBD are recessive loss-of-function mutations. Molecules of p53 with mutations in the OD dimerise with wild-type p53, and prevent them from activating transcription. Therefore OD mutations have a dominant negative effect on the function of p53.
Wild-type TP53 is a labile protein, comprising folded and unstructured regions which function in a synergistic manner (}.
p53 has many anti-cancer mechanisms:
- It can activate DNA repair proteins when DNA has sustained damage.
- It can also hold the cell cycle at the G1/S regulation point on DNA damage recognition.
- It can initiate apoptosis, the programmed cell death, if the DNA damage proves to be irrepairable.
p53 is central to many of the cell's anti-cancer mechanisms. It can induce growth arrest, apoptosis and cell senescence. In normal cells p53 is usually inactive, bound to the protein MDM2, which prevents its action and promotes its degradation by acting as ubiquitin ligase. Active p53 is induced after the effects of various cancer-causing agents such as UV radiation, oncogenes and some DNA-damaging drugs. DNA damage is sensed by 'checkpoints' in a cell's cycle, and causes proteins such as ATM, CHK1 and CHK2 to phosphorylate p53 at sites that are close to or within the MDM2-binding region of the protein. Oncogenes also stimulate p53 activation, mediated by the protein p14ARF. Some oncogenes can also stimulate the transcription of proteins which bind to MDM2 and inhibit its activity. Once activated p53 transcribes several genes including one for p21. p21 binds to the G1-S/Cdk and S/Cdk complexes (molecules important for the G1/S transition in the cell cycle) inhibiting their activity. p53 has many anticancer mechanisms, and plays a role in apoptosis, genetic stability, and inhibition of angiogenesis ().
Recent research has also linked the p53 and RB1 pathways, via p14ARF, raising the possibility that the pathways may regulate each other ()
Role in disease
If TP53 is damaged, tumor suppression is severely reduced. People who inherit only one functional copy of TP53 will most likely develop tumors in early adulthood, a disease known as Li-Fraumeni syndrome. TP53 can also be damaged in cells by mutagens (chemicals, radiation or viruses), increasing the likelihood that the cell will begin uncontrolled division. More than 50 percent of human tumors contain a mutation or deletion of TP53.
Certain pathogens can also affect p53. One such example, the Human papillomavirus (HPV), encodes for a protein, E6, which binds p53 and inactivates it. This, in synergy with the inactivation of another cell cycle regulator, p105RB, allows for repeated cell division manifestested in the clinical disease of warts.
In health p53 is continually produced and degraded in the cell. The degradation of p53 is, as mentioned, associated with MDM2 binding. In a negative feedback loop MDM2 is itself induced by p53. However mutant p53s often don't induce MDM2, and are thus able to accumulate at very high concentrations. Worse, mutant p53 itself can inhibit normal p53 ().
Potential therapeutic use
In-vitro introduction of p53 in to p53-deficient cells has been shown to cause rapid death of cancer cells or prevention of further division. It is these more acute effects which hopes rest upon therapeutically (). The rationale for developing therapeutics targeting p53 is that "the most effective way of destroying a network is to attack its most connected nodes". p53 is extremely well connected (in network terminology it is a hub) and knocking it out cripples the normal functioning of the cell. This can be seen as 50% of cancers have missense point mutations in TP53, these mutations impair its anti-cancer gene inducing effects. Restoring its function would be a major step in curing many cancers.
Various strategies have been proposed to restore p53 function in cancer cells . A number of groups have found molecules which appear to restore proper tumour suppressor activity of p53 in vitro. These work by altering the conformation of mutant conformation of p53 back to an active form. So far, no molecules have shown to induce biological responses, but some may be lead compounds for more biologically active agents. A promising target for anti-cancer drugs is the molecular chaperone Hsp90, which interacts with p53 in vivo.
Adenoviruses have been used to study the functions of p53 by scientists for years, but in a twist it is now modified adenoviruses which are being used as new cancer therapy tools. ONYX-O15 (dl1520, H101, CI-1042) is a modified adenovirus which was initially proposed selectively replicate in TP53-deficient cancer cells, but not normal cells . The wild form of the virus expresses the early region protein, E1B55kDa, which binds to and inactivates p53 - this inactivation is necessary for the virus to replicate and kill, or lyse, a cell. In ONYX-O15, E1B55kDa has been deleted. It was hoped that in cells with a normal p53, ONYX-O15 would be disabled by p53's activity, yet in cells with a dysfunctional p53, ONYX-O15 would selectively replicate in and lyse the tumour cells. The virus produced from this replication cycle could then spread to other surrounding malignant tissue and, over many cycles of infection, replication and lysis, eventually clear the tumour cells from the patient.
Preclinical trials using the ONYX-O15 virus on mice were promising. However, the clinical trials that followed were less so. Furthermore, many other scientists have since found that the virus is able replicate in cells with wild-type p53 as effectively as in cells with dysfunctional p53. Nevertheless, when the virus was used in combination with chemotherapy the results looked encouraging. Following on from this the virus has now been liscenced for therapeutic use in China. Without a complete understanding of exactly how the virus is selective for cancer cells the virus is unlikely to be used as a therapeutic in western countries.
Importantly, normal p53 is exploited in radiation therapy. Cells with healthy expression of p53 apoptose (undergo programmed cell death) in the presence of irreparable damage to the DNA. By inducing double-strand DNA damage using theraputic radiation, p53-mediated apoptosis can be elicited. In cells properly expressing p53, this pathway can be a powerful tool in the battle with neoplastic disease.
Diet, Helicobacter pylori, and p53 mutations in gastric cancer: a molecular epidemiology study in Italy
Cancer Epidemiol Biomarkers Prev. 1997 Dec;6(12):1065-9. Palli D, Caporaso NE, Shiao YH, Saieva C, Amorosi A, Masala G, Rice JM, Fraumeni JF Jr.
- A series of 105 gastric cancer (GC) cases with paraffin-embedded specimens interviewed in a previous population-based case-control study conducted in a high-risk area around Florence, Italy, was examined for the presence of p53 mutations. Overall, 33 of 105 cases had a mutation (p53+) identified by single-strand conformational polymorphism and confirmed by sequencing (Y-H. Shiao et al., submitted for publication). p53+ cases had a more traditional dietary pattern (i.e., corn meal mush, meat soup, and other homemade dishes) and reported less frequent consumption of raw vegetables (particularly lettuce and raw carrots). A positive association with a high nitrite intake and a negative association with raw vegetables and diffuse type histology persisted in a multivariate analysis. In addition, p53+ cases tended to be located in the upper portion of the stomach and to be associated with advanced age and blood group A. No relation was found between the presence of p53 mutations and histologically defined Helicobacter pylori infection, smoking history, family history of gastric cancer, education, and social class. Of the 33 p53+ cases, 19 had G:C-->A:T transitions at CpG sites. These tumors tended to occur in females and in association with H. pylori infection but not other risk factors. The remaining 14 cases with a p53 mutation had mainly transversions but also two deletions and two transitions at non-CpG sites. These tumors showed a strong positive association with a traditional dietary pattern and with the estimated intake of selected nutrients (nitrite, protein, and fat, particularly from animal sources). The findings of this case-case analysis suggest that p53 mutations at non-CpG sites are related to exposure to alkylating compounds from diet, whereas p53 mutations at CpG sites might be related to H. pylori infection. | <urn:uuid:8050cc72-31ec-4d21-bfb1-1f3c3eaeda6a> | {
"date": "2015-12-02T05:11:12",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448399326483.8/warc/CC-MAIN-20151124210846-00070-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9404048323631287,
"score": 3.671875,
"token_count": 2357,
"url": "http://www.drpeterjdadamo.com/wiki/wiki.pl/p53"
} |
Català - Castellano - Deutsch
I was recently in charge of rendering some quick views of a project we are designing at work. We didn't have much time to spend on it and needed some very basic trees to give the effect of the surrounding site. I had some low polygon trees downloaded from the 3dWarehouse, and wanted to add some leave material but make it transparent so I could see the buildings beyond the trees.
Since I use Maxwell every now and then I had completely forgotten how to add transparency to an existing material. Luckily I got some help. The process is very simple.
Let's use a quick scene to see how to do this. See the image below.
wiki link to this topic). To add the transparency, we can either make the existing BSDF transparent or add a new one. Adding an extra BSDF for the transparency has the advantage of letting you play more with the blending of both BSDF.
To add Transparency we have to do the following steps:
- Add a new BSDF
- Turn Transmittance Colour to White (100% transparent)
- Increase the Attenuation to 999m (see that the default units are nm, change that to m)
- Turn the Roughness of the material to a very small value (i set it at 0 on this example)
Having two BSDFs allows us to play with them to reach the material we want. In this case, I want the material to be transparent, but also to show the original brownish colour. To do that I set the blending weight of the transparent layer to 50 and that way I reduce the importance of the transparent layer in the material. Now I get to see again the brownish colour of the material while still having it transparent. | <urn:uuid:30726026-d813-4bc1-9c23-650dcdd19078> | {
"date": "2014-03-09T13:20:22",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999678747/warc/CC-MAIN-20140305060758-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9343767166137695,
"score": 2.90625,
"token_count": 364,
"url": "http://www.cad-addict.com/2009/04/maxwell-render-how-to-make-transparent.html"
} |
Table of Contents
- Opioid Substitution Therapy (OST)
- What Are Methadone and Buprenorphine?
- Can Anyone Get Methadone or Buprenorphine Treatment?
- What Side Effects Are Associated with Methadone and Buprenorphine?
- Do HIV Drugs Interact with Methadone or Buprenorphine?
- OST and Pregnancy
- Taking Care of Yourself
An opioid is a type of drug that relieves pain by blocking pain signals to the brain. Opioids come in many forms, including pills, patches, powders, and liquids. Also called opiates or narcotics, opioids come in various strengths – from very strong (e.g., morphine, Dilaudid, Duragesic, Oxycontin), to moderately strong (e.g., oxycodone, as in Lortab, Percocet), to strong (e.g., hydrocodone, as in Vicodin) to mild (e.g., codeine, as found in some cough/cold medicines). Heroin is made from morphine and can be injected, snorted, or smoked.
Opioids block the body's perception of pain. For some people, opioids also cause an intensely rewarding 'rush' or sense of extreme happiness. Although opioids can be effective and safe when taken as prescribed, they can also be highly addictive. This means that those who take or use opioids can lose control, become dependent on them, and use more and more of them. For more information, see The Well Project's article on Substance Abuse and Addiction.
Injection drug users, whether they inject heroin or another illegal substance, are more likely to get HIV, hepatitis C and/or B, and other infectious diseases through sharing or reusing needles and other injection drug equipment. It has been estimated that close to one in ten new HIV infections worldwide are the result of injection drug use. In some parts of Central Asia and Eastern Europe, unsafe injection practices are the cause of more than eight out of ten HIV infections. Of the three to four million people newly infected with hepatitis C each year, around two million of these are due to injection drug use. For more information on safer injection practices, see The Well Project's article on Cleaning Works.
Opioid substitution therapy, also called opioid replacement therapy or maintenance therapy, provides opioid addicts with a prescription medicine that replaces their drug of choice (e.g., heroin) and helps them manage their addiction. This medicine is usually supplied in a clinically supervised setting. The two medicines most often used as OST are methadone and buprenorphine; they are described below.
According to the World Health Organization (WHO), studies have shown that OST programs are effective in reducing illegal drug use, death from overdose, and behaviors that lead people to get and spread HIV. They also help those living with HIV (HIV+) to adhere to their HIV drugs and stay healthier longer. Unfortunately, less than eight percent of injecting drug users worldwide receive OST. However, this number varies greatly depending on the country. While as many as nine out of ten injection drug users get OST in the United Kingdom, OST is unavailable in the Russian Federation. In the US, it is estimated that around one in four opiate addicts receive OST.
If you are addicted to heroin or another opiate, your health care provider may recommend treatment with methadone or buprenorphine. They are both prescription drugs that can help you manage your addiction. It is important to know that both methadone and buprenorphine are addictive. That is, your body becomes dependent on your taking them and could have withdrawal symptoms if you stopped (e.g., anxiety, sweating, chills, rapid heart rate, nausea, vomiting, diarrhea). However, they take away your craving for heroin and do not make you feel high or tired. Methadone does not interfere with day-to-day activities such as driving a car or going to work, but buprenorphine may cause drowsiness.
Each dose of methadone lasts for about 24 hours so you will only need to take it once a day. Used at the appropriate dose, methadone is a safe drug that may not have difficult side effects even if you take it for ten years or more. Like any drug, it is possible to take too much methadone or buprenorphine and overdose. Symptoms of overdose for methadone and buprenorphine include slow breathing and heart rates, severe drowsiness, muscle weakness, pinpoint pupils, and cold, clammy skin.
Buprenorphine can be used once a day or once every other day, and is available as a sublingual tablet (dissolves under the tongue). Buprenorphine is less likely than methadone to cause overdose and withdrawal symptoms.
There are several brand-name products containing buprenorphine that the US Food and Drug (FDA) has approved for treatment of opioid dependence: Subutex (buprenorphine), and Suboxone and Zubsolv (buprenorphine + naloxone). Health Canada has approved Subutex and Suboxone, while the government in the UK has approved Subutex, Suboxone, and Prefibin (buprenorphine). The World Health Organization’s (WHO) guidelines recommend that health care providers offer substitution therapy for opioid dependence. However, not each country follows these guidelines, and even among those who do, each country’s preferred method for meeting the WHO guidelines differs.
Combined with behavioral therapies, counseling, and other supportive services, methadone or buprenorphine treatment can help you stop using heroin and other opiates, including prescription narcotics like Lortab, Vicodin, OxyContin, and Percocet. Taking care of a substance abuse problem can greatly increase the success of your HIV treatment.
Although the WHO’s guidelines for managing opioid dependence suggest that methadone replacement treatment is very effective, access to OST remains challenging in many areas. Methadone and buprenorphine treatment are recognized and available in some countries, yet remain unavailable and illegal in others.
In the US, because methadone and buprenorphine are federally controlled drugs, you must meet the requirements of the FDA. Federal requirements along with state laws can influence whether or not methadone and buprenorphine treatment are available in your area.
You cannot get methadone or buprenorphine in every pharmacy and you may have to go to the clinic to get your medicine. Currently advocates are pushing for methadone and buprenorphine to be treated like any other prescription medications.
Methadone's common side effects are constipation and excessive sweating. However, some people on methadone also report having dry mouth, trouble urinating, erectile dysfunction, skin rash, low blood pressure (which can result in feeling tired or dizzy), and nausea. Buprenorphine's side effects include nausea, vomiting, drowsiness, and constipation, and may be less intense than methadone's side effects.
There are street stories that methadone rots the bones and makes teeth fall out. However, there is no scientific or medical evidence that supports these myths.
Methadone and buprenorphine can interact with other medications. Sometimes drug interactions are minor and do not cause any problems. Other times the wrong combination of drugs can cause serious side effects. In addition, any type of liver disease (e.g., hepatitis) may make these interactions worse.
If you are taking opioid treatment and HIV drugs it is important that you be carefully monitored by your health care provider. In some cases methadone and buprenorphine cause the HIV drugs to become less effective. In some cases the HIV drugs cause the opioid treatment medicines to become less effective. It is important to talk to your provider to see if you need to have the dose of your methadone, buprenorphine, or any of your other medications changed.
The US Department of Health and Human Services (DHHS) creates HIV treatment guidelines that it updates periodically. They are very technical and designed to guide providers as they care for people living with HIV. Table 12 of the guidelines has a complete list of the interactions between HIV drugs and methadone. To look at this table, go to: http://www.aidsinfo.nih.gov/guidelines and click on Tables under Adult and Adolescent Treatment Guidelines. Then go to Table 12 on p. 18-19 ("Drug Interactions between Antiretroviral Agents and Drugs Used to Treat Opioid Addiction," last updated on May 1, 2014). The DHHS table uses abbreviations for HIV drug names, so you may find it helpful to look at our HIV Drug Chart to find your HIV drugs' other names.
Some other drugs used by HIV+ people, such as the antibiotic rifampin, which is used to treat tuberculosis, also interact with methadone. Talk to your HIV provider or opioid treatment program associate so they can provide you with the proper medical advice.
If you cannot take methadone because of drug interactions, other anti-opioid treatments may be used:
- Drug therapies such as LAAM (Levo-Alpha Acetyl Methadol), naloxone, and naltrexone
- Detoxification (clearing the body of drugs)
- Behavioral therapies
Methadone does cross the placenta (the blood supply to the baby) and your baby may be dependent on methadone at first and need to be weaned. Long-term studies have shown that there is no increased risk of birth defects or developmental difficulties in babies born to methadone-treated women.
Buprenorphine has not been as well studied in pregnancy as methadone. Recent studies have shown that buprenorphine treatment can be easier on the baby without an increased risk of birth defects. However, many health care providers are still not comfortable with the uncertainty about the possible long-term negative effects of buprenorphine. While in the past, methadone was the preferred opioid substitution treatment in the US for women who were pregnant or planning to become pregnant, buprenorphine is now being offered as a treatment to pregnant women who are new to OST.
If you are on methadone or buprenorphine and become pregnant, it is important that you not stop your treatment without first speaking to your health care provider.
Opioid substitution therapy is an important tool for treating addiction to heroin and other opiates, including prescription painkillers. Get the most out of your replacement therapy and your HIV drugs by keeping your health care provider informed of all the drugs you are taking, so any necessary dose adjustments can be made. | <urn:uuid:73195c91-6c59-4321-a48c-cbe503f86d6c> | {
"date": "2015-05-30T08:20:19",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930916.2/warc/CC-MAIN-20150521113210-00314-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9410277605056763,
"score": 2.953125,
"token_count": 2277,
"url": "http://www.thewellproject.org/hiv-information/treatment-opioid-addiction?qt-activity_tabs=0"
} |
Storing food promptly and correctly can help prevent
- Set your refrigerator at or below
40°F (4°C) and your freezer at
or below 0°F (-18°C).
- Refrigerate or freeze meat, poultry, eggs, fish,
shellfish, ready-to-eat foods, and leftovers within 2 hours or sooner. If the
temperature outdoors is above 90°F (32°C), refrigerate within 1 hour. (This is often the case during summer
- Do not keep fresh poultry, fish, or ground meats in the
refrigerator for more than 2 days. Cook or freeze them.
- Do not keep
fresh beef, veal, lamb, or pork in the refrigerator more than 3 to 5 days. Cook
or freeze them.
- Divide large amounts of leftovers into shallow containers for
quicker cooling. Use refrigerated leftovers within 3 to 4
- Don't pack your refrigerator with food. Cool air must
circulate to keep food safe.
- Never store cooked or ready-to-eat
food below raw food in the refrigerator.
- Always store food in
leak-proof, clean containers with tight-fitting lids.
- In general, high-acid canned food such as tomatoes, grapefruit, and
pineapple can be stored in a cupboard for 12 to 18 months.
general, low-acid canned food such as meat, poultry, fish, and most vegetables
can be stored for 2 to 5 years. But the can must be in good condition and
stored in a cool, clean, dry place.
- Do not keep canned food if the
cans are dented, leaking, bulging, or rusting.
If the food has a "use by" date, consume the food by that
date or throw it out. If it has no date or only a "sell by" date, use the
following table. It tells you how long you should keep some popular foods in
the refrigerator or freezer. If you follow the recommended refrigeration time,
you will ensure that food is safe and doesn't spoil. Freezing food keeps it
safe for as long as it is frozen, so the recommended freezer-storage times are
only to ensure highest quality.
Recommended refrigeration times
| Product|| Can refrigerate for:|| Can freeze for: |
|Bacon||7 days||1 month|
|Beef, ground||1 to 2 days||3 to 4 months|
|Beef, steaks and roasts||3 to 5 days||4 to 12 months|
|Cheese, processed or brick||3 to 4 weeks||Can be frozen, but affects taste and
|Chicken, breasts or legs||1 to 2 days||9 months|
|Chicken, giblets||1 to 2 days||3 to 4 months|
|Chicken, whole||1 to 2 days||12 months|
|Eggs, fresh||3 to 5 weeks||Do not freeze|
|Eggs, hard boiled||1 week||Do not freeze well|
|Fish, fatty (salmon, perch, other)||1 to 2 days||2 to 3 months|
|Fish, lean (cod, flounder, other)||1 to 2 days||Up to 6 months|
|Gravy ||1 to 2 days ||2 to 3 months |
|Ice cream, ice milk||Do not refrigerate||2 to 4 months|
|Lunch meat, opened package||3 to 5 days||1 to 2 months|
|Lunch meat, unopened package||2 weeks||1 to 2 months|
|Mayonnaise||2 months||Do not freeze|
|Milk||7 days||1 month|
|Pizza, cooked||3 to 4 days||1 to 2 months|
|Pork, chops||3 to 5 days||4 to 6 months|
|Pork, ground||1 to 2 days||3 to 4 months|
|Pork, roasts||3 to 5 days||4 to 6 months|
|Sausage||1 to 2 days||1 to 2 months|
|Soups, stews (with vegetables or meat)||3 to 4 days||2 to 3 months| | <urn:uuid:7dbb08d2-20fd-40ec-8a4e-48eec512943e> | {
"date": "2014-08-22T10:18:00",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823528.84/warc/CC-MAIN-20140820021343-00222-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8671616315841675,
"score": 3.125,
"token_count": 908,
"url": "http://www.everydayhealth.com/health-center/food-safety-storing.aspx"
} |
U.S. Geological Survey - Microbiology
Plant and animal images related to USGS microbiology research.
Plants and Animals
Research Summary: Expression of Genes (as Novel Biomarkers) in Sea Otter Populations as Indicators of Exposure to Organic Pollutants, Metals, Parasites, Bacterial Infection, Viral Infection, and Thermal Stress (A. Keith Miles, James L. Bodkin)
Description: A sea otter swims in Monterey Bay, California. USGS scientists study this federally listed species in efforts to help them recover from near extinction. | <urn:uuid:bd4d6b0e-9740-4e8b-b6fb-ef9008713cfc> | {
"date": "2016-06-30T01:14:37",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00118-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8566989302635193,
"score": 2.546875,
"token_count": 126,
"url": "http://microbiology.usgs.gov/image_gallery_plants_animals_sea_otter.html"
} |
A MUST problem and EXTRAs:
• 5.11 (new) •
(c) Is the result of • 5.10 • still valid using the decryption method of • 5.11 • ? Explain your answer.
(d) Using MAPLE™ find two random 100-digit primes p and q with the property that |gcd(p-1,q-1)|>75 digits.
(e) Find exponents a,a’,b such that |a|=|b|=|n|=200 digits whereas |a’|<125 digits. Verify on 10 random examples that (mb)a’ mod n = m.
Any two of the following three problems:
• 4.5 (new) •
• 6.7 (new) •
• 7.6 (formerly 6.5) •
Let n=p*q, the product of two primes p=q=3 (mod 4), be a modulus suitable for the Blum-Goldwasser cryptosystem. Suppose that we modify the cryptosystem and that in order to encrypt an l-bit message x we use the BBS generator 2l+t+1 times instead of only l+1. The initial l+t extra bits are used to authenticate x into a t-bit tag as w=ax|t(+)b where a is from F2l and b is from F2t.
The encryption would then be (y, w, s2l+t+1) where y is from the original scheme.
(1) Explicit the decryption/verification algorithm of this encryption/authentication scheme.
(2) Show that even this modified scheme fails under chosen cyphertext attack.
(Assume that the decryption device returns the original plaintext x only when (y, w, s2l+t+1) is correctly authenticated, otherwise an error message is issued)
Let n=p*q, the product of two primes, and let n-1 be an element of QNRn[+1] i.e. the Jacobi symbol (n-1/n) = +1. Let e be an RSA public exponent mod n.
1) Give explicit conditions on p and q to have the Jacobi symbol (n-1/n) = +1.
Let M be a random variable describing the random choice of a plaintext 0<M<n.
2) Show that H[ lsbn(M) | (Me/n) ] = H[ lsbn(M) ].
3) Use MAPLE™ to show that this may be false if the Jacobi symbol (n-1/n) = -1.
Let n=p*q, the product of two primes, and let y be an element of QNRn[+1]. Remember that the Goldwasser-Micali cryptosystem with public parameters (n,y) encrypts a zero bit by [a random square] x2 mod n and a one bit by [a random pseudo-square] x2y mod n.
Let GM(m1),GM(m2) be the Goldwasser-Micali encryption of messages m1 and m2 as computed and sent by Bob to Alice. Suppose Bob applied his personal signature to the encryption of each bit.
Imagine the government witnessed Bob's transmission of both messages to Alice and they wish to have some minor information about the messages as follows.
(a) Show how Bob can prove that both GM(m1),GM(m2) were encryptions of the same message m1=m2 without disclosing anything else about it.
(b) Show how Bob can prove that GM(m1),GM(m2) were encryptions of messages m1 and m2 that differed in an even (including zero) or odd number of positions, without disclosing anything else about them.
(c) Assume m1,m2 have even length, |m1|=|m2|=2k. Show how Bob can prove that GM(m1),GM(m2) were encryptions of different messages m1≠m2 by disclosing nothing except for the fact that they differed somewhere among all but one of the positions. (Bob can put aside one encrypted bit at a fixed position of GM(m1) and GM(m2), and then prove that the remaining truncated messages are different without disclosing anything about them except for the fact that they differ). Explain why we need messages of even length 2k.
(d) How much uncertainty is left about m1,m2 when only learning that they differ ? How much uncertainty is left about m1,m2 when learning that they differ by the method suggested in (c) ?
(in both cases assume that the a priori uncertainty was maximum.) | <urn:uuid:3df819ce-9bca-4cf9-95cc-16d3750cc797> | {
"date": "2017-12-18T05:07:11",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948608836.84/warc/CC-MAIN-20171218044514-20171218070514-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8732216358184814,
"score": 2.796875,
"token_count": 1027,
"url": "http://crypto.cs.mcgill.ca/~crepeau/CS547/HW-5-03.html"
} |
<cstddef> <cstdio> <cstdlib> <cstring> <ctime> <cwchar>
Unsigned integral type
Alias of one of the fundamental unsigned integer types.
It is a type able to represent the size of any object in bytes: size_t is the type returned by the
sizeof operator and is widely used in the standard library to represent sizes and counts.
In <ctime>, it is used in the function strftime as the type of its parameter maxsize and as its return value. In both cases it is used to express counts of characters. | <urn:uuid:52a5797e-443e-40e3-80b0-09e169d4fb3e> | {
"date": "2015-05-23T10:29:12",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927458.37/warc/CC-MAIN-20150521113207-00189-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8969656825065613,
"score": 2.78125,
"token_count": 128,
"url": "http://www.cplusplus.com/reference/ctime/size_t/"
} |
We have a health alert involving more possible food contamination.
Salmonella has shown up in 18 states including Kentucky. Most of the cases are adults and more than 60% of them are women. Health experts are trying to figure out how these 172 people across the country, including some in Kentucky, have come down with salmonella.
Health officials think the bacteria may have come from produce like lettuce or tomatoes. But so far the illnesses has not been tied to any specific product, restaurant or supermarket.
The salmonella outbreak has sent 11 people to the hospital. Salmonella is rarely ever fatal, it typically causes bad diarrhea, as well as possible nausea, vomiting, abdominal cramps, fever and headache. | <urn:uuid:a738c7ca-0d42-4475-a96c-ce1d2f1c5183> | {
"date": "2014-03-12T01:12:37",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394020561126/warc/CC-MAIN-20140305115601-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9632790684700012,
"score": 2.6875,
"token_count": 146,
"url": "http://www.wkyt.com/home/headlines/4528706.html"
} |
As of 2013, only 36% of the world’s population had access to the internet. It is anticipated that by 2015, 50% of the population will have access to the internet, and as a result, we will have officially entered the Innovation Age. The impact that a more connected world could have on our society is immeasurable. Although they may seem like concepts taken from an episode of The Jetsons, the following are five examples of innovative products that are either currently available or will be in the near future that can dramatically improve the ease and comfort of one’s life.
Nest is a smart thermostat. This means that it has the ability to learn user habits and can adapt to them automatically over time, so you won’t have to fidget with it in the summer and winter. It also has the ability to connect to many other devices (car, phone, washing machine, etc). Half of one’s energy bill is wasted via the thermostat, so Nest is helpful in the sake of efficiency. In addition to learning your preferences, it knows when you are out of the house, so it turns off the heat/AC automatically in order to save you money. And due to the connectivity of the devices, it knows when your are returning so that your home is comfortable by the time you arrive.
Apple Healthbook is a new feature of iOS 8 (and a key feature of the highly anticipated iWatch) that measures essentially all of a user’s vitals (heart rate, blood pressure, blood sugar, weight, respiratory rate, etc). It will also have a feature that measures the quality of sleep that a user received. This new app really seems like it could empower a lot of people to monitor their health more carefully and effectively, and as such, is a prime example of technology improving our lives.
Google Self Driving Car:
Though there is a functioning prototype of the Google car, it still isn’t ready to be mass produced for a large market. However, these autonomous vehicles, if mass produced, could greatly reduce the risk of vehicular accidents in the future. Also, they restore a great deal of independence to people who might have disabilities that have prevented them from driving previously.
Crowdfunding sites are a relatively new thing on the internet that are essentially fundraising platforms for various causes. Strangers will pool their money together to rally around a certain cause, whether it’s a creative venture (à la Kickstarter) or raising money for someone who’s sick in the hospital. These sites have given the ability to drastically change one’s circumstance all due to the kindness and generosity of strangers.
Mint is a personal finance website (and app) that is owned by Intuit. It puts all of your accounts, transactions, budgeting, investments and savings in one easy-to-read location. It will send you alerts about possible fraudulent activity, remind you of bills that are due, and give you a warning when you’ve gone over your budget. It is super helpful for those who often struggle with keeping a close eye on their financial situation. | <urn:uuid:30f13f6c-a7de-442f-8e11-f4d93b13ab7d> | {
"date": "2017-03-26T11:04:59",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189214.2/warc/CC-MAIN-20170322212949-00461-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9571550488471985,
"score": 2.6875,
"token_count": 643,
"url": "https://stratablue.com/5-innovative-products-changing-lives/"
} |
The world gains considerably by investing in young people. But adults often fail to provide the resources they need to chart a healthy course to adulthood.
GreeneWorks is especially concerned with helping adolescents improve their sexual and reproductive health. Reducing the risks of unprotected sex and premature childbearing has a dramatic impact on young people’s prospects—positively affecting their education, earning potential, wellbeing, and the lives of their children.
Our work emphasizes the active role young people can play in advocating for themselves and how to support them in shaping their own futures.
Selected collaborations, resources, and presentations
- Yes, Girls Do Marry as Children and Adolescents in Latin America is the blog post Greene crafted with colleagues from Promundo Global to accompany a longer report. Find copies of the report and its executive summary in English and Portuguese here.
- Margaret Greene co-wrote Girls Speak. A New Voice in Global Development for the International Center for Research on Women. The report expands on the idea that girls have a right to be heard, respected, and valued. Further, by listening to what girls want, policymakers and program managers can help bridge the gaps between ambitions and experiences. This report outlines six themes arising from girls’ aspirations, including the desire to be healthy and educated with viable livelihood and career opportunities; financial security and independence; and the wish to marry and have children whenever they want.
- Greene worked with the USAID’s Interagency Youth Working Group and Family Health International to organize the Protecting and Empowering Adolescent Girls: Evidence for the Global Health Initiative Conference in 2010. (Meeting Report)
- What do we know about the impact of adolescent sexual activity, pregnancy and childbearing on girls’ life prospects? Margaret Greene and Thomas W. Merrick’s research review Poverty Reduction: Does Reproductive Health Matter? for the World Bank builds on their earlier MacArthur Foundation-funded research exploring the links between poor reproductive health and poverty.
- Poor Health, Poor Women: How Reproductive Health Affects Poverty, a summary of this work, was published by the Woodrow Wilson International Center for Scholars.
- Greene’s work with Population Action International resulted in a seven-country analysis of youth policy. In This Generation: Sexual and Reproductive Health Policies For a Youthful World showing what countries as diverse as Iran, Mexico and the Netherlands have done to invest more holistically in young people’s sexual and reproductive lives. | <urn:uuid:e02a33d9-b5d6-4dee-86ab-be175ff8d959> | {
"date": "2018-10-18T16:34:24",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511889.43/warc/CC-MAIN-20181018152212-20181018173712-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9311113953590393,
"score": 2.90625,
"token_count": 502,
"url": "http://greeneworks.com/adolescents"
} |
The aim of this course is to present the fundamentals of computability theory and computational complexity theory in a rigorous yet accessible way. Computability theory was one of the most beautiful and important developments of the 20th century mathematics, a development that is fundamental to many disciplines, including computer science, cognitive science, computational linguistics and artificial intelligence. Computational complexity theory, a daughter science of computability theory, is every bit as fundamental, and it too has important ramifications for these disciplines. But while there are many superb introductions to these subjects, they are both topics whose mastery requires a certain amount of mathematical maturity.
The aim of this course is to provide the necessary mathematical background for understanding these subjects, and then to present their fundamental concepts and results. We focus on the mathematical essentials, and motivate the keys concepts in a number of ways: historically, conceptually, and logically. It is our hope that after taking this course you will have a stronger mathematical skills (and in particular, a deeper understanding of what a mathematical proof is, and how to do them) a thorough understanding of fundamental results in computability and computational complexity and their relation to logic, and an appreciation of what these results have to say to computer science, computational linguistics, cognitive science, and and related disciplines.
Patrick Blackburn INRIA
Address: INRIA Nancy Grand-Est Equipe TALARIS, Batiment B 615, rue du Jardin Botanique 54602 Villers lès Nancy Cedex, France | <urn:uuid:631e79b3-03d7-4819-b8d8-c1e2d2454f8d> | {
"date": "2017-03-24T04:10:18",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187690.11/warc/CC-MAIN-20170322212947-00081-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9208013415336609,
"score": 3.3125,
"token_count": 307,
"url": "http://computation4cognitivescientists.weebly.com/index.html"
} |
Colmac HPA air source heat pumps offer commercial and industrial users of sanitary hot water, an energy efficient means of heating water to temperatures as high as 176°F. The Colmac HPA heat pump water heater uses the same operating principle as an air-conditioner or domestic refrigerator. The heat pump gathers heat from the surrounding air, and through the refrigeration cycle, deposits the heat into water at a useable temperature. This principle of moving heat with a heat pump, rather than generating it by burning fossil fuel (i.e. natural gas), or electric resistance, makes water heating with heat pumps the best choice for conserving energy. Depending on the temperature of the air supplied to the heat pump, water can be heated using one third to one fourth of the energy required by electric resistance, or gas.
Since the Colmac HPA uses the same principle as an air-conditioner, it produces cool air as it makes hot water. This "free" cool air benefit can be put to use to supplement the existing air-conditioning system, or to provide "spot cooling" to hot work areas.
Colmac HPA heat pumps can be successfully applied wherever there is a need for large amounts of hot water and there is a source of warm air available. The Colmac HPA is best suited for supplying hot water in facilities where demands for hot water and space cooling are concurrent.
Product Line Performance Comparison 50 Hz:
||Heating Capacity (kW)
||Cooling Capacity (kW)
Note: Based on 24°C entering air wet bulb temperature, 20°C entering potable water temperature and 60°C leaving potable water temperature.
Product Line Performance Comparison 60 Hz:
||Heating Capacity (MBH)
||Cooling Capacity (MBH)
Note: Based on 75°F entering air wet bulb temperature, 70°F entering potable water temperature and 140°F leaving potable water temperature.
Air Source Heat Pump Basics
Energy from an warm air is absorbed by refrigerant in the evaporator causing the refrigerant to
change phase from a liquid to a gas. This gas refrigerant is then compressed by a compressor
which adds temperature and pressure to the refrigerant. The high temperature, high pressure
refrigerant gas is then condensed to a liquid in a condenser where energy is traded from the
refrigerant to sanitary water suitable for human consumption. Finally, the high pressure, liquid
refrigerant is passed through an expansion valve which causes the refrigerant pressure and
temperature to drop so it can once again enter the evaporator and absorb energy from the air.
To maximize the efficiency of an air source heat pump provide the warmest and most humid air
available and try to deliver the lowest sanitary water temperature acceptable. This minimizes the
compressor work which is the largest operational cost associated with a heat pump. | <urn:uuid:3e90b421-326c-4785-be38-fab021543852> | {
"date": "2016-06-29T16:25:12",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00128-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8101353645324707,
"score": 3.109375,
"token_count": 595,
"url": "http://www.colmacind.com/heatpumps/airsource/"
} |
What:WALT use our senses (hearing, smell, touch, taste and sight) to describe our thoughts, experiences and feelings
So what:I learnt to us (I see,I smell,I hear,I feel)
Now what:I should use more punctuation in my writing
Hear is an example
I could see the silvery blue fish jumping out of the water as I ran nervously down the sand to go snorkeling. The warm water changed to cool as I swam further out. The fish swam fast away from my family but came to me. I could see a giant Nemo hiding in some sea sponge. I feel the fishes tail as it swims off. It felt briskly and slimy.The snorkeling was wonderful I cant wait to go back someday!!!!! | <urn:uuid:aa1e7164-9160-45d1-9d77-95ccefe2c14a> | {
"date": "2018-02-24T20:11:03",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815934.81/warc/CC-MAIN-20180224191934-20180224211934-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9704737663269043,
"score": 2.796875,
"token_count": 169,
"url": "http://emmad5.blogspot.com/2013_03_01_archive.html"
} |
Tone, who accompanied it as "Adjutant-general Smith," had the greatest contempt for the seamanship of the French sailors, which was amply justified by the disastrous result of the invasion.
It contains a fine Gothic Protestant church (St Mary's) dating from the 13th century and has several educational establishments, notably a school of seamanship. Its industries comprise iron-founding, ship-building, brewing, and the manufacture of cigars, leather and tinned fish.
But the venture was beyond the resources of the ships and the seamanship of the time.
In July of that year, however, he was pursued by a squadron of British vessels, and escaped by good seamanship and the fine sailing qualities of the "Constitution."
He had a high reputation in the United States navy for practical seamanship. He died at Philadelphia on the 13th of February 1843.
His father was a sea captain, and the boy was early skilled in seamanship and navigation.
Early in 1793 the "Juno" went to the Mediterranean under Lord Hood, and her captain distinguished himself by an audacious feat of coolness and seamanship in extricating his vessel from the harbour of Toulon, which he had entered in ignorance of Lord Hood's withdrawal.
In these actions, except the last, the Americans had the advantage of greater size and a heavier broadside, but they showed excellent seamanship and gunnery.
It was due to his exertions as an organizer and a diplomatist quite as much as to the brilliant seamanship of Admiral de Ruyter, that the terms of the treaty of peace signed at Breda (July 31, 1667), on the principle of uti possidetis, were so honourable to the United Provinces.
It reminds us of the general conditions of Greek seamanship when we find that Corcyra was the meetingplace for the allied fleet, and that Syracuse was reached only by a coasting voyage along the shores of Greek Italy.
The effort succeeded in great measure through the fine seamanship of Capt.
The fishermen and fisherwomen form a quite distinct class of the people; both sexes are noted for their bodily strength, and the men for their bold and skilful seamanship. Tunny and sardines are cured and exported in large quantities, oysters are also exported, and many other sea fish, such as hake, sea-bream, whiting, conger and various flat-fish are consumed in the country.
More severe loss would have followed if the better average seamanship of the English and Dutch had not stood them in good stead.
He began to lay down galleys and long ships, and hired pirates renegade vikings no doubtto train crews for him and to teach his men seamanship. The scheme, however, was only partly completed when in 876 three Danish kings entered Wessex and resumed the war.
Before it reached the coast of Ireland, however, the French fleet had already suffered serious losses, owing partly to the attacks, of British frigate detachments, partly to the bad seamanship of the French crews and the rottenness of the ships.
Three years afterwards he joined the United States navy; but after making a voyage or two in a merchant vessel, to perfect himself in seamanship, and obtaining his lieutenancy, he married and resigned his commission (1811). | <urn:uuid:73683d1c-f434-4558-be63-8598c51cb56c> | {
"date": "2017-05-24T02:49:43",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607731.0/warc/CC-MAIN-20170524020456-20170524040456-00554.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9879494309425354,
"score": 2.734375,
"token_count": 704,
"url": "http://sentence.yourdictionary.com/seamanship"
} |
Bechoros 11 - 17
Little Gamboling Lamb
To fulfill the mitzvah of redeeming the first-born male donkey one must do one of two things. Either give the kohen a live lamb or kid, even if it is worth much less than the donkey, or give him money or anything else equivalent to the full value of the animal.
In order to use the first option he can give only a live lamb or kid - not a calf or any other live animal, and not a slaughtered lamb or kid.
This raises an interesting question. What about a ben pakuah - a live lamb found in the womb of its slaughtered mother? We rule that such an animal does not require slaughtering because the slaughtering of its mother in its prenatal state is considered as shechita for it as well (Chullin 74a).
We can therefore consider this ben pakuah as being a chunk of meat on the hoof rather than a live lamb, and thus invalid for use in redemption. On the other hand, this lamb is running around like any live animal, so it should be considered a bona fide lamb for the purpose of redemption.
The Sages were split on this issue with Rabbi Ashi ruling that a ben pakuah can be used for redemption and Mar Zutra that it cannot. The latter opinion draws its support from the fact that the same designation of lamb or kid is used in regard to the animal to be used for the Korban Pesach. A ben pakuah is disqualified for use as a Korban Pesach because only animals born in natural fashion are eligible for sacrifice. Mar Zutra's conclusion, therefore, is that just as the ben pakuah is ruled out for Korban Pesach so is it ruled out as redemption material.
Rabbi Ashi challenges this conclusion because a comparison with Korban Pesach would also require it to be male and unblemished, requirements which do not apply to this mitzvah. Rambam and Shulchan Aruch rule like the opinion of Rabbi Ashi.
Mitzvah or Penalty?
If a Jew does not wish to redeem his first-born male donkey by giving a lamb to a kohen as commanded by the Torah he is obligated to behead that animal. This is explicitly stated in the Torah (Shmos 13:13) and detailed in the final mishnah of the first perek.
The mishnah refers to this act of beheading as a mitzvah, but reminds us that the mitzvah of redeeming is preferable to the mitzvah of beheading. Rambam, accordingly, lists the beheading as one of the 613 mitzvos.
A problem arises, however, from the statement of the Sage Levi (Bechoros 10b) explaining the Torah's command to behead the unredeemed first-born donkey: "He caused a loss to the kohen (by not giving him a lamb as redemption) so he must also suffer a loss." This seems to indicate that the beheading is a penalty for not complying with the mitzvah of redemption, and should therefore not be considered a mitzvah as well. It was this problem which moved Ravid to challenge Rambam (Laws of Bikurim 12:1) in his description of beheading as a mitzvah.
A solution to this problem is suggested, however, by the author of Minchas Chinuch (mitzvah 23). Beheading the unredeemed first-born donkey is indeed a penalty as Levi declares, but there is a mitzvah to comply with this penalty.
The author cites an interesting parallel. The same aforementioned mishnah states that the mitzvah of Yibum - marrying the widow of a childless brother - is preferable to the mitzvah of Chalitzah - the ritual performed by the brother who refuses to marry her. The author of the Hilchos Gedolos - one of the earliest Halachic authorities whose words are quoted by the Beis Shmuel in his commentary on Shulchan Aruch Even Haezer (169:82) - writes that the reason a shoe is removed from the foot of the man in the Chalitzah ritual is to communicate to him that because he refused to do what was expected of him, he must remove his shoe like a mourner or one who has been excommunicated for rebelling against a mitzvah. Even though Chalitzah is thus viewed as a penalty it does not prevent a consensus that it is counted as a mitzvah.
(This last point is a little difficult to understand in our own day when Yibum is never done, even when the brother wishes to do so. The proper perspective on this is already suggested in our mishnah, which states that with the decline of the generations and the fear that Yibum will not be performed with the proper motivation, the mitzvah of Chalitzah is now preferable. It is perhaps this decline which requires this symbolic act of mourning involved in removing the shoe.) | <urn:uuid:f89a0ea6-8e69-4b5f-b750-b1ca9a6a2274> | {
"date": "2016-07-01T22:28:06",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00068-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9584170579910278,
"score": 2.640625,
"token_count": 1067,
"url": "http://www.ohr.edu/this_week/the_weekly_daf/198"
} |
Intriguing article over at Technology Review (the MIT publication) about some research into technology that could "unprint" paper.
According to the article, U.K. researchers are experimenting with laser lights that could potentially remove printed ink from a sheet of paper (emulating laser printer process, but in reverse). The idea is to vaporize the ink without destroying the paper, the article suggests.
The technology under research, discussed in the Proceedings of the Royal Society A, could potentially allow a sheet of paper to be reused up to five times before it must be tossed into the recycling bin. That could help save both money and energy used in the recycling process (although that would be offset by the energy used to "unprint" the page).
Personally, I wonder whether this would work for double-sided printing, which is now my default for anything I that produce myself. In any case, this isn't exactly something that will be commercially available tomorrow, but an idea worth mulling. | <urn:uuid:88b3e654-1a35-4103-8344-0b5822fdc230> | {
"date": "2013-12-21T19:12:23",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776439/warc/CC-MAIN-20131218054936-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9506077170372009,
"score": 2.796875,
"token_count": 202,
"url": "http://www.zdnet.com/blog/green/lasers-could-remove-ink-from-printed-paper-allowing-for-reuse/20713"
} |
In previous articles, I wrote about malicious hackers (crackers) moving away from attacks for bragging rights to attacks for profit. Part of this transition is the increased use of zombie PCs, or bots, to surreptitiously acquire personal and business information with criminal intent. In this article, I describe the nature of bots and botnets, the danger to your organization from these growing threats, and some things you can do to protect your information assets.
What are botnets?
A bot is a program that, when installed on a system, provides the bot owner with remote control capabilities without the system owner’s knowledge. The system on which the bot is installed is called a zombie. A network of zombies, under the control of a bot master, is a botnet. Botnets can range in size from just a few zombies to zombie herds of a million or more infected systems. So what’s the big deal? Most networks are protected by anti-virus software. The big deal is that the way in which bots are deposited in systems is undetectable to most anti-malware software.
Bots are typically installed as part of a rootkit delivered to target systems via various attack vectors – the most common are email and spyware, with instant messaging closing fast. Crackers use rootkits to install bots on target systems so they aren’t visible when listing processes, directories or folders, or by using any other administrative search or management utility.
The value of botnets is their stealth. Organizations or individuals who know sensitive information about them is compromised can take steps to protect themselves. This limits the revenue potential of the illegally obtained information.
What is the danger to your business?
Once a bot master has control of a system, she can perform a variety of tasks to obtain valuable information. These tasks include:
- Keystroke logging of user IDs, passwords, and banking and credit card information
- Theft of intellectual property
- Information relevant to personal identity theft or social engineering
- Social security numbers
- Dates of birth
- Employee IDs
Zombies are also used to conduct Distributed Denial of Service (DDoS) attacks. For example, criminals use DDoS attacks to shut down access to Internet businesses or to disrupt operations of brick-and-mortar organizations until the victim pays the bot master, or his client, a specified sum.
A recent example of a more low key use of a botnet is the Jeanson James Ancheta case. Ancheta, based in California, built an army of approximately 400,000 zombies. He then allegedly sold access to his botnet to crackers and spammers. Further, Ancheta allegedly generated revenue by using his remote control capabilities to deposit adware on the compromised systems (Brandt, 2005). In January 2006, Ancheta pleaded guilty as part of a plea agreement. But this is just one of a growing number of botnets, most of which are still alive and well.
According to Symantec’s Internet Security Threat Report (Volume VIII), 10,352 botnets operated each day during the first half of 2005. This was a significant increase from the less than 5000 daily botnet count reported six months earlier. Symantec gathers this information by using 24,000 global sensors.
What can you do to protect your business?
The best thing you can do to protect your information assets is to be proactive. Once bots are placed on your systems, they are difficult, if not impossible, to detect. Some ways to prevent your systems from being shanghaied into a botnet army include:
- Develop an effective patch management program to eliminate critical security vulnerabilities
- Include in your employee security awareness training an explanation of the dangers of spyware and how it’s invited into end point devices
- Monitor your network for network or packet anomalies indicative of attempted or successful zombie recruitment
- Encrypt critical or sensitive information in transit and while residing in databases, flat files, backup tapes, laptops, etc. (see Data Storage Security)
- Control or prohibit the use of public instant messaging or email services (i.e. AOL, MSN, Yahoo, et al)
- Use enterprise web filtering software to prevent users from visiting sites known to harbor malicious code
- Check enterprise email at the perimeter, before your users have to decide whether to open a message or attachment on their desktops
Malware detection vendors are beginning to provide software to identify and eradicate rootkits. RootKitRevealer from Sysinternals is a free utility that performs this function. Other vendors are working on solutions, but progress is slow.
The mission of crackers is changing. Massive Internet attacks are being scaled back to attacks targeting specific targets for the purpose of generating revenue. Organizations must take steps to ensure the safety of their systems, their employees, and their customers – including applying pressure to vendors to accelerate development of rootkit and bot prevention and detection solutions.
Author: Tom Olzak
Brandt, A. (2005, November). Alleged botnet crimes trigger arrests on two continents. PC World. Retrieved February 11, 2006 from http://www.pcworld.com/news/article/0,aid,123436,00.asp
Symantec Internet Security Threat Report, Volume VIII | <urn:uuid:1e9b0e58-7e31-4a88-b165-adf025df0423> | {
"date": "2017-01-17T23:23:38",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00230-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.919858992099762,
"score": 2.8125,
"token_count": 1091,
"url": "http://adventuresinsecurity.com/blog/?p=46"
} |
home > archive > 2002 > this article
Bush calls for the U.S. to rejoin UNESCO
By Charles A. Morse
In an otherwise excellent speech at the UN on September 12, President Bush, perhaps as a sop to win UN favor for military action in Iraq, called for the U.S. to rejoin the United Nations Education, Scientific, and Cultural Organization (UNESCO). Membership had been terminated in 1984 when it was discovered that large portions of the UNESCO budget, mostly extracted from the hides of U.S. taxpayers, was being diverted to Soviet fronts, terrorist organizations, and to support the bizarre and lavish tastes of the UNESCO Director-General, Senegalese leftist Amadou-Mahtar M'Bow and his entourage.
At the time, UNESCO was attempting to implement a "New World Information Order" in which the world's journalists would be required to pass an ideological litmus test in order to practice their craft. Theoretically, if a journalist ran afoul of the UNESCO commissars, his license could be revoked and he could face fines and possible criminal charges. This would have fulfilled a central plank of the Communist Manifesto, which calls for "public ownership of the means of communication." In terminating U.S. membership, President Ronald Reagan stated that UNESCO had "extraneously politicized virtually every subject it deals with. It has exhibited a hostility toward the basic institutions of a free society, especially a free market and a free press."
UNESCO is often referred to as a school board for the world and, as such, it reflects the educational philosophy of its founding Director-General, biologist/humanist Julian Huxley. In his book "UNESCO: Its Purpose and Its Philosophy" (1946), Huxley spills the beans. "The task before UNESCO...is to help the emergence of a single world culture, with its own philosophy and background of ideas, and with its own broad purposes." Huxley stated that the agency would advocate "the ultimate need for world political unity" and would condition "all peoples with the implications of the transfer of full sovereignty from separate nations to world organization." His stated that UNESCO "can do a great deal to lay the foundations on which world political unity can later be built."
In the early 1950's, former Communist Joseph Z. Kornfeder expressed the opinion that UNESCO was comparable to a Communist Party agitation and propaganda department. He stated that such a party apparatus "handles the strategy and method of getting at the public mind, young and old." Huxley would lard the agency with a motley collection of Communists and fellow travelers.
In Hamburg, Germany, 1964, Huxley chaired a UNESCO sponsored conference called the "International Symposium on Health, Education, Sex Education and Education for Home and Family living" in which the agenda was laid out for sex education. In "UNESCO: Its Purpose and Philosophy" (pp 46): Huxley lays out the sex ed agenda when he states "It will be one of the major tasks of the philosophy division of UNESCO to stimulate...the quest for a restatement of morality that shall be in harmony with modern knowledge and adapted to the fresh functions imposed by ethics by the world today." The conference concluded, "Sex education should begin at an early age."
Through its "World Heritage" subsidiary, UNESCO has, incredibly, already taken over control of such U.S. landmarks as the Statue of Liberty, Yellowstone National Park, Independence Hall, and other essential parcels of sovereign U.S. property. A portion of the admission to these symbols of American freedom now goes directly to UNESCO. We need to ask our elected members of Congress exactly how this happened. We must let Congress know that we do not want the U.S. to rejoin UNESCO.
Chuck Morse is a talk
show host at Salem Radio/WROL in Boston.
Get weekly updates about new issues of ESR!
© 1996-2013, Enter Stage Right and/or its creators. All rights reserved. | <urn:uuid:37967181-56f2-4bbd-853a-492de2e168b9> | {
"date": "2014-09-15T02:01:51",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657102753.15/warc/CC-MAIN-20140914011142-00024-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9561914205551147,
"score": 2.703125,
"token_count": 827,
"url": "http://www.enterstageright.com/archive/articles/0902/0902unesco.htm"
} |
(CNN) — Former astronaut Buzz Aldrin, the second person to walk on the moon in 1969, is being evacuated from the South Pole after his medical condition deteriorated, according to a release by the National Science Foundation.
Aldrin was part of a tourist group visiting Amundsen-Scott South Pole Station through luxury tourism operator White Desert. Although his condition has not been disclosed, a White Desert doctor and the US Antarctic Program doctor decided an evacuation would the best precautionary measure, according to a release from the company. The White Desert doctor said Aldrin’s condition was stable. The tourism operator made a request for a medical evacuation to the National Science Foundation today and they agreed.
Aldrin was placed on the first available flight to McMurdo Station, which is located on the Antarctic coast. A US Antarctic Program doctor is traveling with him. The NSF uses cargo planes equipped with landing skis, called LC-130s, and they are operated by the 109th Airlift Wing of the New York Air National Guard.
From there, another flight will take Aldrin to New Zealand. That flight will be scheduled as soon as possible, according to the NSF. Aldrin’s family has been notified, and both White Desert and the NSF will provide updates as they come in.
White Desert specializes in Antarctic tours and has operated there for 10 years. They are a member of the International Association of Antarctica Tour Operators, which was founded in 1991 with the purpose of advocating private-sector travel to the Antarctic that is safe and environmentally responsible. Amundsen-Scott is one of three year-round stations operated by the National Science Foundation in Antarctica.
Researchers there are studying the atmosphere and dark matter using two radio telescopes, as well as an observatory that monitors subatomic particles produced by black holes and other cosmic incidents.
Other medical evacuations have taken place in recent years at Amundsen-Scott and 850 nautical miles away at McMurdo Station. Americans have occupied the South Pole for research purposes since 1956 and Amundsen-Scott was built in 1957 but has been updated and redeveloped over the years.
The-CNN-Wire™ & © 2017 Cable News Network, Inc., a Time Warner Company. All rights reserved. | <urn:uuid:77b4fc21-f2b3-445c-99e9-5345ecb07082> | {
"date": "2017-03-23T00:18:28",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186530.52/warc/CC-MAIN-20170322212946-00391-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.965556263923645,
"score": 2.578125,
"token_count": 464,
"url": "http://wsvn.com/news/us-world/buzz-aldrin-evacuated-from-south-pole/"
} |
On March 16, 2015, the California Supreme Court corrected an 1890 decision that denied Hong Yen Chang admission to the California State Bar because of his Chinese heritage. It took a team composed of Chang’s descendants and law students from the University of California, Davis School of Law to finally get the Court to admit Chang to the Bar. In a nine-page opinion the Court noted: “Even if we cannot undo history, we can acknowledge it and, in so doing, accord a full measure of recognition to Chang’s pathbreaking efforts to become the first lawyer of Chinese descent in the United States.” In re Hong Yen Chang on Admission, California Supreme Court Case Number S223736 at 8.
Chang was born in China and moved to the U.S. in 1872 as part of a Chinese government-sponsored program to teach Chinese youth about Western culture. He attended schools on the East Coast—graduating from Phillips Academy, Yale University and Columbia Law School.
When Chang moved to California in 1890, he had already been admitted to the New York Bar two years earlier. In doing so, he became the country’s first Chinese-American attorney. Chang’s journey to gain admission in New York was not without difficulties, however. New York’s highest court first denied Chang admission because he was not a citizen, but later admitted him after a New York judge issued Chang a certificate of naturalization.
Yet, in spite of this fact, the California Supreme Court rejected Chang’s application because it did not consider Chang a citizen. It held that the certificate of naturalization issued in New York was void because the federal Chinese Exclusion Act prohibited courts from issuing certificates of naturalization to any native of China and it being conceded that Chang was a “person of Mongolian nativity.”
It would not be until March 26, 1923, when You Chung Hong was admitted to the Bar, that California would allow Chinese-Americans to practice law in this state.
“A candid reckoning with a sordid chapter of our state and national history.”
In overturning the 1890 decision, the California Supreme Court recounted California’s sad but pivotal role in persuading Congress to pass the Chinese Exclusion Act and how racism against Chinese immigrants formed the foundation for the California Constitutional Convention of 1879. The 1879 Constitution denied those with Chinese ancestry the right to vote along with any “idiot, insane person, or person convicted” of various crimes and directed the Legislature to discourage Chinese “immigration by all means within its power.
Given this historical background, the Court concluded that “the discriminatory exclusion of Chang from the State Bar of California was a grievous wrong” and that Chang had been denied the equal protection of the laws. Id. at 8.
Although Chang was unable to practice law in California and serve the Chinese community in San Francisco as he originally planned, he had a successful career in banking, academics and diplomacy. Nonetheless, Chang’s posthumous admission is bittersweet when considering the contributions he could have made to the legal community in California had he been afforded the privileges he had duly earned.
Michael Chung, Of Counsel, Willenken Wilson Loh & Delgado LLP
E: [email protected] | P: 213-694-3697 | <urn:uuid:88239b05-2af7-46e9-a148-475aa4643481> | {
"date": "2017-08-18T10:46:10",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104634.14/warc/CC-MAIN-20170818102246-20170818122246-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9691641926765442,
"score": 2.875,
"token_count": 689,
"url": "https://cmcplegalnews.wordpress.com/2015/07/09/125-years-later-ca-supreme-court-grants-membership-posthumously-to-first-chinese-american-lawyer/"
} |
Use this dialog to edit the worksheet title that is displayed at the top of a worksheet. For example, you might want to display the date at the top of a worksheet. Or you might want to display custom help text for a worksheet in the worksheet title area.
Formatting options that you specify apply to new text that you enter in the Title field or text currently selected in the Title field
Note: If you are editing default Discoverer options (that is, you chose Tools | Options and displayed the Formats tab) you use this dialog to specify the default worksheet title for new worksheets.
For more information, see:
Use this drop down list to specify a font for the text in the worksheet title area.
Use this drop down list to specify a point size for the text in the worksheet title area.
Use this color pane to specify a color for the text in the worksheet title area.
Use these buttons to change font style and text alignment options for the text in the worksheet title area. For example, use the B button to make text bold or use the U button to underline text.
Note: If you apply a format to a text variable, the format is applied to all characters in that text variable when the value is displayed on the worksheet. In other words, you cannot apply different formats to individual characters in a text variable
Use this color pane to specify a background color for the text in the worksheet title area. The background color that you specify applies to the whole title area.
Hint: Ensure that the background color is different to the text color.
Use this field to enter the text you want to appear at the top of the worksheet when you display the workbook on screen or print or export the worksheet. You can enter text and text variables up to a total maximum length of 1024 characters.
Note: The worksheet title displayed at run time can be more than 1024 characters (for example, if text variables are displayed).
Use this button to display a drop down list of text variables (for example, date, time) that you can insert into the worksheet title area.
Hint: Before you insert a text variable, place the cursor inside the Title field in the position at which you want to insert the text variable.
The value of a text variable is updated when a worksheet is displayed, printed, or exported. In other words, if you display the &Time variable on a worksheet, the time value is updated each time the worksheet is displayed, printed, or exported. For example, if you insert the &Time variable into a worksheet title area, the worksheet title area might display '12.00.00 PM' if you print the worksheet at midday and '08.30.00 AM' if you print the worksheet at eight-thirty in the morning.
To hide the worksheet title area on the current worksheet, clear the Show title check box on the options dialog (for more information, see "How to display or hide worksheet titles or text").
If you include the &Date and &Time text variables in a worksheet title area, the values displayed in the worksheet are the date and time on the Discoverer server. The date and time on the Discoverer server might be different to the date and time on the system running the Web browser where you started Discoverer Plus Relational.
To specify that Discoverer displays a worksheet title area when you create a worksheet, choose Tools | Options and select the Show title check box on the "Options dialog: Sheet tab". | <urn:uuid:f9807403-5b53-4d07-a11c-d464b0b5f7a5> | {
"date": "2016-12-08T02:30:51",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542323.80/warc/CC-MAIN-20161202170902-00360-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7050921320915222,
"score": 2.75,
"token_count": 754,
"url": "http://docs.oracle.com/cd/E12839_01/bi.1111/b40105/udet01.htm"
} |
This is the native Lesser Butterfly orchid that is fairly widespread throughout the western and southern parts of the UK. It has a flower spike to 30cm with 15/20 white night scented flowers. The bifolia comes from the two main leaves that appear in the spring. It is more tolerant of acid conditions than the Greater Butterfly.
For those introducing the plant into grassland or woodland an appropriate habitat management scheme must be introduced. In meadows grazing may take place from July until late autumn. This will help keep the sward open. Alternatively the grass may be cut for hay. Plants will begin growth in the spring, producing the typical twin leaaves.
In woodlands the lesser butterfly-orchid tends to grow along paths and
clearings where the grass is sparse.
Plants are normally sent out potted when the species are dormant. In this case between AUGUST and MARCH. | <urn:uuid:caab3f84-a73a-4a85-8c13-bbf7044b0830> | {
"date": "2017-08-21T19:38:52",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109525.95/warc/CC-MAIN-20170821191703-20170821211703-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9247797727584839,
"score": 2.90625,
"token_count": 187,
"url": "http://lanesidehardyorchids.co.uk/catalog/product_info.php/platanthera-bifolia-native-orchid-p-114?osCsid=raur30q0fmr9qmc3835n58obd2"
} |
167 KB | 4 files | DOC, PDF
Despite the sophistication of the Windows user interface, sometimes it is just easiest to pop out to the Command Prompt and execute a quick batch command. The cheat sheet of Run commands will make repetitive chores a snap.
Windows Command Prompt Commands
Use the Windows Command Prompt window to run various commands in the Windows OS. These commands perform useful functions like deleting files, showing folder structure, or getting network performance information. The help command may be one of the most useful of all, as it can be run to both output a list of all commands and be modified to show the help for a specific command.
To go to the Command Prompt, open Run (Windows KEY + R) and type cmd, or click Start, point to Programs, point to Accessories, and then click Command Prompt.
Windows Run Dialog Commands
Use the Windows Run dialog commands to open programs, folders and Internet resources. For instance, by running the calc command from the Run dialog, the Calculator program opens. These commands act as timesaving shortcuts because you don't have to click so many icons in the Windows interface to get to the items you want to use.
To open the Run dialog, click Start and select Run. You can also use the shortcut keystroke (Windows KEY + R).
The attached Zip file includes:
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ... More >>
This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being software as the object of measurement. ... More >>
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious URL intercepts, and the continuing rapid development of security. ... More >> | <urn:uuid:bc35ef7a-6545-47b7-a810-2948c34d1011> | {
"date": "2016-10-25T10:22:02",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720026.81/warc/CC-MAIN-20161020183840-00438-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8720399737358093,
"score": 2.78125,
"token_count": 381,
"url": "http://www.itbusinessedge.com/itdownloads/windows-command-prompt-and-run-commands/88670"
} |
1911 Encyclopædia Britannica/Alastor
ALASTOR, in Greek mythology, the spirit of revenge, which prompts the members of a family to commit fresh crimes to obtain satisfaction. These crimes necessitate further acts of vengeance, and the curse is thus transmitted from generation to generation. The word is also used for a man’s evil genius, which drives him to sin without any provocation; a man so driven is sometimes called Alastor. The epithet is applied to Zeus and the Erinyes as the deities of revenge and punishment. | <urn:uuid:e90e93af-319b-463e-ad5a-970d3da5f48f> | {
"date": "2015-07-31T19:29:17",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988311.72/warc/CC-MAIN-20150728002308-00307-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9416645765304565,
"score": 3.046875,
"token_count": 116,
"url": "https://en.wikisource.org/wiki/1911_Encyclop%C3%A6dia_Britannica/Alastor"
} |
Five Methods:Choosing Your MaterialsBuilding a Small Solar Oven with an Aluminum CanWith Cardboard Box, Plexi/silica glass, and Aluminum FoilFront-loaded Solar CookerA parabolic cooker with a suspension shelfCommunity Q&A
Having the ability prepare hot food and to have hot water when you want it is as easy as 1-2-3. The ability to cook with the sun and to prepare foods for long term storage. Simple to complex construction methods that will serve you anytime you need it.
Choosing Your Materials
There are square ovens and there are rectangular ovens. There are parabolic ovens and box ovens. Consideration should be given to how much actual unencumbered sunlight you have available to be able to use your solar oven. Taking into consideration what you want to cook and how often you are going to use the solar oven should also dictate the type of construction you choose.
1Decide how it will be used. Will it be used for a hobby or is it for actual family food preparation? Emergency situations can occur anytime and without warning. Being able to prepare food is one of the primary survival skills everyone should know, at least the basics to sustain life.
2Determine the size unit you need for your purposes. The larger the unit, the more food that can be cooked. The design you choose should be practical and functional for your use and needs.
3Choose your materials based off of your previous answers. Wood, metal, cardboard or a combination of any or all of these.
- Cardboard box types are the fastest and easiest to make. Long term need would be better served by using metal.
- Aluminum is the easiest to work with and is more easily used. Aluminum sheets, aluminum angles, aluminum screws, rubber gasket material, and either clear glass or clear Plexiglas or polystyrene. 2" styrene is used for insulation and is lined with an interior aluminum cooking cabinet. The cabinet should be built to be movable. The oven should have the ability to turn from side to side and have the ability to move up and down to be manually moved into the sun to maintain the interior temperature. An externally mounted thermometer to measure inside temperature to verify the foods internal temperature for safe cooking of meat and prepared food materials.
Building a Small Solar Oven with an Aluminum Can
This type of solar oven can only be used to cook small things, such as hotdogs.
1Use sandpaper to sand the paint off of the outside of the aluminum can to provide the sun with an unobstructed surface to hear.
2Cut the can into two equal halves with a box cutter . After cutting the can in half, make holes in both halves of the can to use wire as hinges to open and close the can.
3Punch holes in the front of the can and the back of the can with a hole puncher or a pair of scissors. They must be wide enough to fit a piece of a wire coat hanger into- these coat hanger pieces will also protrude at least 1/2" from the front and the back to support your hot dog as it cooks in your can solar cooker.
4Take the wire grill pieces used from cutting the wire coat hanger into pieces and use sandpaper and sand off all of the paint from each piece. Then clean the wires with alcohol and wipe clean before use.
5Make little legs for the front and back bottom of the can to support it as you use it. It sounds simple and it is, remember for the hot dog to cook the top has to remain closed. The cooking time will vary by the amount of daylight left when you begin to use the can cooker.
With Cardboard Box, Plexi/silica glass, and Aluminum Foil
The angle of the cooker determines the amount of directed sunlight and the amount of heat generated in the interior of the solar cooker.
1Take the first box and line it with the 2" styrene foam. This insulator will aid in the use of heat more efficiently. Take exact measurements of your foam-lined box with you're done.
2Take another box to fit the interior between the outside box measurements of the foam lined box and spray the interior with adhesive.
3Line the actual oven interior with aluminum foil. After the inside box has been lined with aluminum foil, cover the gax, foam, and the inside box with aluminum foil which has been sprayed with adhesive as well.
4Measure the outside dimensions of outer box and lay the self adhesive foam liner to support the glass cover of the solar oven. This basic type of oven is used sitting flat.
Front-loaded Solar Cooker
This method allows you to design a solar oven with a front load dehydrator with multiple racks to use the same heat that cooks in the solar oven. Addition of a horizontal and vertical movement mechanism for manual tracking and heat maintenance for cooking any food products. Multiple items can be cooked in the solar oven at the same time. A dutch oven can be used for cooking multiple foods as well. Time frames vary here as well for cooking. To become proficient experimentation is necessary.
A parabolic cooker with a suspension shelf
This type of cooker uses any type of satellite dish that is either painted silver or use of aluminum reflective duct tape. Building a support frame consists of the use of PVC pipe and copper tubing. The use of a custom built suspension shelf for support of pots and or pans suspended in front of the concave lens of the cooker.
1When using the parabolic disk angulation of disk towards the sun and aiming of the center focal plane on the bottom of the suspension shelf of which the pot or pan or skillet is sitting on.
- After determining which material you are going to use determine the size of the interior you will need based on the typical types of pots and pans you use including skillets of allow the placement of multiple pots and pans.
- For method two use black pots and pans with covers. Black is best for absorbing and maintaining heat inside of the oven.
- Wear gloves and eye protection when working with metals, files, saws and grinders, and glass.
- Wear oven mitts or use pot holders when handling any pots and pans that have been inside the solar cooker to prevent burns to your fingers and hands.
- Again when using metal or glass vessels to cook in with any solar oven, those that are open or closed use proper protection for your hands when handling hot pots, pans and skillets.
Things You'll Need
Build a Small Solar Oven with an Aluminum Can
- Aluminum can
- Box cutter
- Hole puncher/pair of scissors
- Wire coat hanger(s)
- Rubbing alcohol
With Cardboard Box, Plexi/silica glass, and Aluminum Foil
- 2 cardboard boxes, with one being slightly larger than the other
- 2" styrene foam
- Aluminum foil
- Plexiglas or silica glass, cut to fit
- Measuring tape
Sources and Citations
- All of these ovens and cookers can be located at URLsource (eg http://www.instructable.com/) Be bold and try it, have fun with it you never know when knowing how to build and use a solar oven can save yours or someone else's life. | <urn:uuid:f5a48970-ed22-46f9-8727-3fa523e32b4a> | {
"date": "2016-09-29T12:01:38",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661795.48/warc/CC-MAIN-20160924173741-00182-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9150673747062683,
"score": 2.5625,
"token_count": 1513,
"url": "http://www.wikihow.com/Build-Different-Types-of-Solar-Ovens-and-Dehydrators"
} |
Many of us know of someone affected by breast cancer – fighter, survivor, or victim. Breast cancer is a type of cancer where cells of the breast tissue divide and grow without normal control. It is a cancer that strikes women and men of all ages and all races. There is about 1.3 million people diagnosed annually. Unfortunately, the exact cause is unknown at this time. And there is no cure…yet.
20/20 for the Cure is Uptown Eyes’ annual event to highlight breast cancer awareness. There have been a decrease in breast cancer deaths in women over the age of 50. This is likely due to more education/awareness, early detection, as well as improved management and treatments.
The information in this blog is meant to be a resource and not a comprehensive source for breast cancer. Please note the various links for further information.
American Cancer Society – cancer.org
- Incidence rates in recent years have been stable in white women, and slightly increasing by 0.3% per year in African American women.
- Breast cancer is the second leading cause of cancer death in women (first being lung cancer). The chance of a woman dying from breast cancer is about 1 in 38 (about 2.6%).
- There has been a 39% decrease in death rates from 1989 to 2015. Since 2007, breast cancer death rates have been steady in women younger than 50, but have continued to decrease in older women. This is believed to be due to early detection and improved awareness and treatments.
- About 1 in 8 US women (about 12.4%) will develop invasive breast cancer over the course of her lifetime.
- About 2,550 new cases of invasive breast cancer are expected to be diagnosed in men in 2018. A man’s lifetime risk of breast cancer is about 1 in 1,000.
- A woman’s risk of breast cancer nearly double if she has a first-degree relative (mother, sister, daughter) who has been diagnosed with breast cancer. Less than 15% of women who get breast cancer have a family member diagnosed with it as well.
- About 85% of breast cancers occur in women who have no family history of breast cancer. These occur due to genetic mutations that happen as a result of the aging process and life in general, rather than inherited mutations.
There are several risk factors for breast cancer. Some you can control, others you cannot. Knowing your level of risk is helpful in early detection. Make sure you assess yourself and see if you may be at a higher risk. And consider some lifestyle changes to start to minimize your risk.
- Family History
- Personal history of breast cancer
- Radiation to chest or face before age 30
- Certain breast changes
- Being overweight
- Pregnancy history
- Breastfeeding history
- Menstrual history
- Using HRT (Hormone Replacement Therapy)
- Drinking Alcohol
- Having dense breasts
- Lack of exercise
Emerging risk factors:
- Low Vit D levels
- Light exposure at night
- DES (Diethylstilbestrol) Exposure
- Some pregnant women were given DES from the 1940s through the 1960s to prevent miscarriage. Women who took DES themselves have a slightly higher risk of breast cancer. Women who were exposed to DES while their mothers were pregnant with them also may have slightly higher risk of breast cancer later in life. They also have a higher risk of cancers of the vagina.
- Eating unhealthy food
- Exposure to chemicals
- In cosmetics
- In food
- for lawns and gardens
- in plastic
- in sunscreen
- in water
- when food is grilled/prepared
20/20 for the Cure benefits Susan G. Komen Ozarks.
We have been honored to host this event for the last 5 years
and will continue to do so with your support!
Please share this blog as well as
like and share on our Facebook and Instagram pages.
If you know of someone that has been recently diagnosed, here is some information from our local Susan G. Komen Ozarks. | <urn:uuid:58cc8820-16da-42d7-b0b6-b0dae807d08a> | {
"date": "2019-02-20T19:47:56",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247496080.57/warc/CC-MAIN-20190220190527-20190220212527-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9596862196922302,
"score": 3.234375,
"token_count": 842,
"url": "https://www.uptowneyesnwa.com/eyecare/20-20-cure-breast-cancer-awareness/"
} |
This is a trick which ranks almost as high in public estimation—the only gauge, by-the-bye, by which conjuring tricks can be measured—as the gold-fish trick. The same principal feature—the production of a substantial article, containing living things, from such unsuspected regions as the interior of a hat, or the folds of a handkerchief—is in both, and the audience is, in each instance, in the same dilemma in endeavouring to explain where the article comes from, and how the living creatures get into it. It may sound like exaggeration to assert that two substantial cages, 6in. high, each containing two live canaries or other birds, can be produced from a hat from one "load," but such can be done, nevertheless. The cages are of wire at the top and on the sides, the bottom being solid and heavy. The sides are hinged to the top, under which they fold, when the bottom, which slides up and down the sides, is pushed up. The top being domed, the birds are safe therein, not as comfortable, perhaps, as they might be, but still unhurt. The bottom pushed up and the sides doubled under, the whole is scarcely 2in. in depth; and two cages, placed bottom to bottom, and kept together by means of an elastic band or by a thread, can be got into the hat from the coat breast-pocket in the prescribed manner. To produce them, it is only necessary to raise the upper portion, by means of the ring there affixed, and the bottom will run down into its place, causing the sides to go into their positions. These cages are also produced from handkerchiefs, in which case it is usual to have them of very large dimensions. Herrmann produced one at times which had to be concealed up his back, so large was it. This was produced, without detection, in the very centre of the audience. | <urn:uuid:268d0507-4d23-408a-818b-b1b6c276da97> | {
"date": "2017-03-24T21:54:11",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188623.98/warc/CC-MAIN-20170322212948-00096-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9750759601593018,
"score": 2.953125,
"token_count": 400,
"url": "https://www.classicmagic.net/tricks/s356a.php"
} |
Nov. 14, 1797 - Feb. 22, 1875
From Minnesota State University at Mankato comes this excellent bio on Lyell:
Sir Charles Lyell attended Oxford University at age 19. Lyell's father was an active naturalist. Lyell had access to an elaborate library including subjects such as Geology.
When Lyell was at Oxford, his interests were mathematics, classics, law and geology. He attended a lecture by William Buckland that triggered his enthusiasm for geology. Lyell originally started his career as a lawyer, but later turned to geology. He became an author of The Geological Evidence of the Antiquity of Man in 1863 and Principles of Geology. Lyell argued in this book that, at the time, presently observable geological processes were adequate to explain geological history. He thought the action of the rain, sea, volcanoes and earthquakes explained the geological history of more ancient times.
Lyell rebelled against the prevailing theories of geology of the time. He thought the theories were biased, based on the interpretation of Genesis. He thought it would be more practical to exclude sudden geological catastrophes to vouch for fossil remains of extinct species and believed it was necessary to create a vast time scale for Earth's history. This concept was called Uniformitarianism. The second edition of Principles of Geology introduced new ideas regarding metamorphic rocks. It described rock changes due to high temperature in sedimentary rocks adjacent to igneous rocks. His third volume dealt with paleontology and stratigraphy. Lyell stressed that the antiquity of human species was far beyond the accepted theories of that time.
Charles Darwin became his dear friend and correspondent. Darwin is quoted saying, "The greatest merit of the Principles was that it altered the whole tone of one's mind, and therefore that, when seeing a thing never seen by Lyell, one yet saw it through his eyes."
Image from King’s College London. | <urn:uuid:b0441c1a-e696-4b0c-a4d7-16293360d60d> | {
"date": "2014-12-19T15:46:47",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768724.86/warc/CC-MAIN-20141217075248-00115-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9748867750167847,
"score": 3.453125,
"token_count": 398,
"url": "http://palaeoblog.blogspot.com/2008/02/died-this-day-sir-charles-lyell.html"
} |
General Structure and Shape:
Spores of Cladosporium usually are formed in long branching chains. The shape of the spores varies from spherical, to barrel-like, and to lemon-shaped. The spore surfaces are marked by a texture ranging from smooth to minutely roughened to highly "warty" wall.
In most places in the world, spores of Cladosporium are the largest contributors to the atmospheric spore count, both indoors and out. Although these spores are present year round, their concentration in the air hits a peak in the summer and early fall seasons in temperate climates.
The spores are known to be prevalent sources of allergens in the atmosphere, generally causing symptoms associated with respiratory allergies. Symptoms include allergic rhinitis (hay fever), asthma, and hypersensitivity pneumonitis.
Spores and colonies of Cladosporium are known to be very resistant to changes in the amount of water available, as they have been observed to resume growth after extended periods of drying. | <urn:uuid:48b854af-be08-4176-ab73-d235aabc0f85> | {
"date": "2017-04-25T14:42:31",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120461.7/warc/CC-MAIN-20170423031200-00293-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9437841773033142,
"score": 4.03125,
"token_count": 209,
"url": "http://pollen.utulsa.edu/Spores/Cladosporium.html"
} |
Mouse brain enthusiasts can finally relax. They have a place of their very own to hang out, swap stories and share information.
Researchers from the University of California, San Diego, have released something they’re calling the Whole Brain Catalog. At its core, the catalog is meant to serve as a repository for data gathered about the mouse brain. Scientists around the globe can opt to pop their brain studies into the catalog and help create a richer, shared set of information than what’s available at each individual research institution.
Mark Ellisman, a neurosciences and bioengineering professor at U.C.S.D., likens the project to Google Earth. He said scientists were trying to build a 3-D model of the mouse brain that could be explored at various levels, from the overall structure of the brain down to its most intricate features. Such an effort requires the scientists to harness an immense amount of data.
“If you talk about just looking at the wiring in the brain, that would require the equivalent resolution in Google Earth of being able to read the license plates on all of the cars in North America,” Mr. Ellisman said. “Seeing things that give the wiring their life like drug receptors and channels would be like seeing the bugs on all the windshields of the cars.”
Individual labs can gather data on this scale, but the U.C.S.D. researchers wanted a place to combine all the available information and make it open to scientists around the globe. The project has been financed by the Waitt Family Foundation, a philanthropic organization started by Ted Waitt, the co-founder of Gateway.
Scientists who want to tap into the Whole Brain Catalog can download a software application that does, in fact, behave much like Google Earth. It allows researchers to explore images of different regions of the brain and to burrow down into cellular structures. If Ammon’s Horn is what you’re after, just type the phrase into the search bar, and off you go.
Mr. Ellisman says he hopes that the Whole Brain Catalog will help unite researchers working in very specific areas and give them a more complete picture of the interplay between different parts of the brain.
“This gives you an immediate ability to see the domains that you are not so familiar with,” Mr. Ellisman said. “Someone working on the region of the brain that controls fear can see where the structures sit on multiple scales and where they interact with the rest of the components.”
The researchers at U.S.C.D. settled on the mouse brain for this project for a handful of reasons. First, scientists generally run a wide range of experiments on mice brains in a bid to replicate human disorders. And second, the mouse brain was of a reasonable size to study from a data standpoint. In addition, an agreement already in place in 15 countries has set standards for how data about mice is taken and shared.
Scientists have turned more and more to computer models like the Whole Brain Catalog to complement their lab experiments.
Mr. Ellisman said that just looking at the 3-D models generated by the computers and simulations of things like neuron growth could lead to unexpected revelations about the brain.
“I think humans are very visual animals,” he said. “And these visualizations open up an opportunity to do what we call discovery science. You put yourself in a new space that came from many, many experiments being mashed together.” | <urn:uuid:0935142e-5797-4a7b-8175-9f1d8137950f> | {
"date": "2017-08-17T21:39:35",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104160.96/warc/CC-MAIN-20170817210535-20170817230535-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.951110303401947,
"score": 2.96875,
"token_count": 720,
"url": "https://bits.blogs.nytimes.com/2009/10/27/a-virtual-voyage-through-the-brain-of-a-mouse/?_r=0"
} |
- Inhabitat – Sustainable Design Innovation, Eco Architecture, Green Building - http://inhabitat.com -
New rSTUD Significantly Increases Wall Insulation Performance
Posted By Andrew Michler On November 3, 2010 @ 3:00 pm In Sustainable Building,Sustainable Materials | 2 Comments
A dirty little secret in the building industry is that the promised r-value of a wall is usually just a measure of the cavity insulation in a perfect installation. Often the installation of insulation is not perfect, but just as important is the fact that the studs in the wall often leak a lot of energy through thermal bridging. The rSTUD is a new product developed to make a wall’s framing every bit as insulative as the high-end insulation that fills it. It’s 4 times more energy-efficient than conventional lumber and can reduce heat loss transmitted via a wall’s assembly by 85%.
Efficient insulation is all about the numbers, so lets take a look at what the rSTUD has to offer. The 2×6 has an r-value of 21 which makes it 3 times the efficiency of a typical 2×6 fir board rated at r 7.7. As framing can compose up to 20% of the total surface of a given wall, the real world r-value of the wall system will only be 3/4 of what is advertised. Headers , the beams that go across doors and windows, are also available with the dense pack insulation in-between structural members. Many builders make headers with foam insulation in-between the wood on-site, so this is not as ground breaking.
The rSTUD is not cheap, but like most things in building you have to look at the big picture to appreciate the benefits. If the wall is insulated with very expensive expanded foam, the real r-value of the wall system is maintained with this product rather than degraded by up to 20% through thermal bridging . This may also eliminate the need to foam the outside of the wall. The price can also be reduced with the good, old-fashioned practice of advanced framing or Optimum Value Engineering (OVE), which ironically is relatively simple and can reduce 5-15% of the framing. With demand for highly isolative building envelopes becoming more normal, especially as Passivhaus and other systems become more common, products like this will be critical.
+ rSTUD
Article printed from Inhabitat – Sustainable Design Innovation, Eco Architecture, Green Building: http://inhabitat.com
URL to article: http://inhabitat.com/new-rstud-significantly-increases-wall-insulation-performance/
URLs in this post:
Image: http://inhabitat.com/2010/11/03/new-rstud-significantly-increases-wall-insulation-performance/new-2-95/
r-value: http://en.wikipedia.org/wiki/R-value_(insulation)
insulation: http://www.inhabitat.com/2006/08/10/lets-talk-about-insulation-baby/
rSTUD: http://www.rstud.com/
Image: http://inhabitat.com/2010/11/03/new-rstud-significantly-increases-wall-insulation-performance/new-5-82/
Headers: http://inhabitat.com/?attachment_id=181875
thermal bridging: http://wiki.aia.org/Wiki%20Pages/Thermal%20Bridging.aspx
Optimum Value Engineering: http://www.toolbase.org/Technology-Inventory/Whole-House-Systems/advance-framing-techniques
Passivhaus: http://www.inhabitat.com/index.php?s=passivhaus
Copyright © 2011 Inhabitat Local - New York. All rights reserved. | <urn:uuid:f98920a3-3743-488e-93ea-436b0eeb6324> | {
"date": "2014-10-30T15:43:15",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637898226.7/warc/CC-MAIN-20141030025818-00137-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9040023684501648,
"score": 2.703125,
"token_count": 846,
"url": "http://inhabitat.com/new-rstud-significantly-increases-wall-insulation-performance/print/"
} |
Thirty years ago a UN commission published the Maitland Report, proposing that by the early 21st century, every individual on the planet should “be within easy reach of a telephone” given the economic benefits. That was interpreted as being within a one day walk of a phone. Anyone suggesting back then that over 90% of the global population would be covered by mobile cellular signals, and over half of the world’s population would have a phone in their pocket, would have been labeled a crazy optimist. Yet, today it’s all about high-speed broadband connections, which total over 3.4 billion as of 2014 – nearly half of the world’s population.
This year’s Global Information Technology Report, and chapter 1.2 in particular, details this history of ICTs as a powerful driver of economic growth, and discusses the remaining barriers to more inclusive prosperity. While ICTs have a multiplying effect on income and growth, unconnected countries and people are being left behind. To address a widening income gap, particularly within countries, more needs to be done to increase broadband adoption, particularly through policies that focus on universal access, affordability, digital skills and the gender gap.
Evidence from the last two decades demonstrates that ICTs, particularly broadband Internet, are an income multipliers. At the country level, macroeconomic data links fixed telephony, mobile telephony, Internet use, and broadband use to gross domestic product (GDP) growth in a causal relationship across developed and developing countries. , And increasing the intensity of data use also drives per capita income growth. This growing body of evidence highlights the fact that we are long past the days of the “Solow paradox,” when, in 1987, Nobel Prize–winning economist Robert Solow noted, “you can see the computer age everywhere but in the productivity statistics.”
At the microeconomic level, emerging analysis highlights the impact that ICTs can have on driving income growth at the bottom of the economic pyramid. Mobile phones in particular, have spread across the developing world and this ‘mobile miracle’ is contributing to income growth as handsets act not only as a communications device for sharing public and private information, but also as educational tools delivering learning content, and as a financial transfer and savings device.
A direct result of ICT adoption is the steady decline in absolute poverty across developing regions. The global extreme poverty rate (those individuals surviving on less than US$1.25 per day) dropped from 1.9 billion people in 1981 to 1.3 billion in 2010 according to the World Bank: extreme poverty rates in developing countries dropped from more than 50 percent to 21 percent. This decline in extreme poverty has been driven by long-run economic growth in China and India, recent growth across Africa, and the impact of social programs in Latin America.
The picture is more mixed, however, when looking at ICTs’ impact on income inequality. At the global level, the latest available data from the World Bank show income inequality (the distribution of income across all people in the world) to be on the decline. The most recent analysis finds that global income inequality has fallen steadily from a Gini coefficient of 72.2 in 1988 to 70.5 in 2008 with the decrease attributed to the large overall income gains of the global median (around the 50th percentile) of the population.
However, the decrease in global income inequality masks the income inequality increases observed within individual countries. With-in country income inequality appears to be rising in many countries (developed and developing) and one analysis by the International Monetary Fund suggests that technological progress, measured as the share of ICT capital stock, has a statistically significant impact on inequality. The available evidence presents a paradox where ICTs are driving economic growth and decreasing global inequality while at the same time contributing to rising within-country income inequality.
While this paradox appears, the full benefit of ICTs has yet to accrue to lower income groups. For example, network effects and externalities that multiply the impacts of ICTs require minimum adoption thresholds before those impacts begin to materialize. One analysis finds a positive impact of a 2.8% increase on GDP resulting from a 10% increase in telecommunications infrastructure, but only once a minimum threshold density is reached. In this case, the threshold was at 24% of the population. In other words, countries will only experience the full growth impacts of ICTs once penetration passes that point. Similarly, a 2009 analysis determined that increasing returns to broadband investment occurs when a critical mass of penetration—above 20% (20 subscriptions per 100 people)—is reached. Greater access and adoption of ICTs in lower-income groups will further accelerate income gains at the base of the economic pyramid.
To counter the disparity in the utilization of ICTs between lower- and higher-income groups, immediate actions should focus on closing the disparity in ICT adoption/penetration. To ensure that benefits of ICT accrue to lower income populations, more needs to be done to increase broadband availability and adoption, particularly through policies that achieve universal access, increase affordability, increases digital skills and close the gender gap. These include:
1) Focusing public resources and incentives for building broadband Internet access out to rural and underserved communities
2) Connecting schools and libraries to broadband Internet service and ensure widespread connectivity within schools
3) Removing excessive taxation on devices and access, and consider targeted subsidies for certain populations
4) Developing robust ICT training curricula and programs
5) Focusing on closing the gender gap in ICTs
The data in this year’s Global Information Technology Report leave no question that the adoption and use of ICTs has a positive effect on income and growth on lower-income countries and populations. However, the challenge to accelerate ICT adoption, particularly among lower-income groups, remains. Combining the positive economic growth impact of ICTs with targeted interventions focusing on alleviating poverty, will improve the well-being of citizens everywhere, especially those in absolute poverty at the bottom of the pyramid.
On Wednesday, April 15, at 10am US EDT, please join me and colleagues from the World Economic Forum to discuss the findings of the 2015 Global Information Technology Report.
Tags: broadband, GITR, growth, ICT, income, Inequality, WEF
Seven years ago, many people (including my mother-in-law) thought I had made a career-ending decision to accept a high-risk assignment and relocate to India. My mission: build from the ground up Cisco’s second headquarters, a Globalization Centre East in Bangalore focused on innovation, talent and partner development that envisioned 10,000 employees in three years, including the top 10% of worldwide talent. My charter included developing a world-class technology campus that also served as a showcase for incubating and advancing Smart City services worldwide, and to become the most relevant ICT company in India.
Was it the right decision?
Although half a world away from Cisco’s corporate headquarters in the Silicon Valley, I thought the new job was still full of great promise. India was and still is the world’s largest democracy, had a growing talent pool, a zest for innovation, a co-operative government, aspirational middle class and a potentially huge economy purring along at 8% annual growth.
In four years, we partnered with national and local governments as well as an ecosystem of commercial businesses to architect and develop a fully networked campus.The Smart + Connected Community inBangalore integrated building systems with IT systems and applications onto one IP network, enveloped by artfully designed buildings and collaborative work spaces.
Today, the 1-million-square-foot Globalization Centre East campus employs more than 11,000 people, houses Cisco’s Research and Development, IT and customer support teams with the best talent in industry. The campus also meets my original charter as the incubator for validating our industry-leading Smart + Connected Communities, especially Smart Cities, which today has projects on nearly every continent worldwide, encompassing more than 90 engagements.
All that has been extremely rewarding to see, but was it the right decision?
We achieved every critical objective except one: growing ICT technology throughout India itself. In my four years of living in India and after a number of subsequent trips revisiting there, I now realize that the promise and opportunity of India can be unpredictable. After several years of nearly double digit growth, India’s economy spiraled down, experienced high inflation, a weakening rupee, allegations of government corruption and financial policy decisions that spooked the international investment community.
Read More »
Tags: Bangalore, Cisco, Globalisation Centre East, ICT, india, Internet of Everything, internet of things, Narendra Modi, Smart + Connected Communities, Smart Cities, Wim Elfrink
I am writing this blog as the 2014 recipient of the IEEE Women in Engineering Region 8 Clementina Saduwa Award named after an amazing woman whose life was cut short in 2007. On a personal level, I am extremely passionate about the possibilities that technology presents for young girls and aspiring women. As a CTO for Cisco Services, my own role is concentrated on the use of technologies to develop architectures that will delight our customers. Why is technology interesting to me? It’s what one can do with the technology as an enabler to solving problems and to creating opportunities.
I became interested in technology because of my curiosity and encouragement from wonderful individuals who helped pave the way for me. My personal career highlights are numerous where risk taking and passion for making a difference in this world are common attributes. Our world needs young girls to create their own career path in Information and Communication Technology (ICT). A career in technology can be fun!
My mother was role model and encouraged me to be the person I want to be. Coming together to solve a problem and to create opportunities – we can rise above gender discrimination – but it’s about being bold in the process and having the courage to do so -make no doubt about this fact. I dream of a society where such a topic is no longer an issue but so engrained in our DNA !
What is Cisco doing?
Cisco has been very active in the ITU’s Girls in ICT initiative, where girls from secondary schools or universities are invited to spend the day at the office of ICT companies and government agencies so they better understand the opportunities the ICT sector holds for their future see.
ITU will have a live webcast on April 15 2014 at 12:30 CET.
Cisco wants to encourage girls to consider ICT as a valuable career option. We understand the value of diversity in the workforce and it is our aspiration to build a gender -balanced workforce. At Cisco, two of the top technology positions are held by women: both the Chief Technology Officer (CTO) and the CIO (Chief Information Officer) of Cisco are female. “If you cannot see it, you cannot be it!”
At Cisco, we take our commitment to making ICT career opportunities open to all seriously. We understand the value of a diverse workforce and believe that many more girls would pursue careers in ICT if they were better informed about the many different types of jobs available within the sector. By 2020 there will be approximately 50 billion things connected to the Internet. At its essence, the Internet of Everything is the networked connection of people, process, data and things…and is set to create an unprecedented level of disruption across industries, globally.
In fact, Cisco offices around the world are getting ready to host #GirlsInICT Day 2014! Girls to create ICT jobs of tomorrow #STEM #GirlsInIC
Further Read More »
Tags: ICT, information and communication technology, Service Provider
Women earn 57% of all U.S. undergraduate degrees but only 18% of undergraduate computer and information sciences degrees, according to the National Center for Women in Technology. Yet according to U.S. Department of Labor estimates, more than 1.4 million computing-related job openings will exist by 2020, with only enough computer degree graduates to fill 30% of them.
And globally, women comprise less than a third of workers in the computer science, engineering, and physics fields in some of the world’s key emerging economies, according to a report by Women in Global Science & Technology.
Attracting more girls and women to the technology field benefits women, their families, their communities, and the businesses they work for. Women are powerful catalysts for change in any society: When women are able to earn an income, they typically reinvest 90 percent of it back into their families and communities.
To help tap this valuable talent pool and attract more women to careers in the information and communications technology (ICT) field, Cisco is participating in Girls in ICT Day – an international event organized by the by the International Telecommunication Union (ITU).
Read More »
Tags: gender, Girls, girls in ict day, ICT, IT, women
It’s amazing to think about the way a traditional classroom operated only a few years ago. As Renee Patton recently pointed out in her blog post, there were rules, there were barriers, and they were all kept within the confines of an educational institution. As technology has advanced, those rules have been challenged, barriers overcome, and an entirely new era of learning has emerged.
The collaborative nature of education, educators and learners has allowed new technologies to thrive and innovation to accelerate. We’re flipping classrooms, implementing mobile learning programs and developing entirely new ways for students to connect and engage. And we’re looking with excitement toward a future that will continually change the way we teach and learn. Read More »
Tags: Cisco Unified Access, connected learning, edtech, edu13, education, educause, higher education, ICT, IT, learning, lecture capture, UCS, virtual desktop | <urn:uuid:3b87d254-56fb-42aa-a362-4a795eec485c> | {
"date": "2015-10-04T17:21:32",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736675795.7/warc/CC-MAIN-20151001215755-00086-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9438104033470154,
"score": 3.1875,
"token_count": 2877,
"url": "http://blogs.cisco.com/tag/ict"
} |
Last week, I had the chance to visit Bavaria’s (and so also Germany’s) oldest Spatial Database. It’s buried deep below Munich, and contains all the geo information about Bavaria in scale 1:5000 and some in 1:2500. It was introduced in 1808 and was in use until 1950. That’s also the current state of the data.
Each of the 26,000 official maps is painted in oil and mirror-invertedly on polished lime sand brick. Each “page” is 1m x 1m (3.2ft x 3.2ft) in size, 4-6cm (2-3in) thick and the weight of each stone “disk” is approximately 70kg (154lbs). That makes it 26 Kilostones in size, with a dump size of 1,820,000 kg or 3,968,000 lbs. | <urn:uuid:38ec842a-8943-4bef-b5c3-6552757e569b> | {
"date": "2015-05-25T15:09:44",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928520.68/warc/CC-MAIN-20150521113208-00254-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.951516330242157,
"score": 2.84375,
"token_count": 193,
"url": "http://www.usn-it.de/index.php/category/it/hardware/"
} |
Pennsylvania State Resource Center
Pennsylvania Statewide Offices
- Attorney General
The State Constitution provides that the Attorney General shall be the chief law enforcement officer of the Commonwealth and shall exercise such powers and perform such duties as may be imposed by law. The Commonwealth Attorneys Act establishes the Attorney General as the chief legal and law enforcement officer of the Commonwealth.
- Auditor General
The Pennsylvania Auditor General is the chief fiscal officer of the Commonwealth of Pennsylvania.
- Commonwealth of Pennsylvania
The Commonwealth of Pennsylvania is a state located in the Northeastern and Middle Atlantic regions of the United States. York, Pennsylvania was the first capital of the United States. The Declaration of Independence and Constitution were both written in Philadelphia, and Betsy Ross made the first contemporary American flag in Philadelphia.
The Governor of the Commonwealth of Pennsylvania is the head of the executive branch of Pennsylvania's government and the commander-in-chief of the state's military forces. The governor has a duty to enforce state laws, and the power to approve or veto bills passed by the Pennsylvania Legislature, and to convene the legislature. The governor may grant pardons except in cases of impeachment, but only when recommended by the Board of Pardons.
- Lt. Governor
The Lt. Governor is a constitutional officer of the Commonwealth of Pennsylvania. The Lt. Governor is elected every four years along with the Governor. The Lt. Governor presides in the Pennsylvania Senate and is first in the line of succession to the governor; in the event the governor dies, resigns, or otherwise leaves office, the Lt. Governor becomes governor.
- Secretary of the Commonwealth
Under the leadership of the Secretary of the Commonwealth, the mission of the Department of State is to promote the integrity of the electoral process, to provide the initial infrastructure for economic development through corporate organizations and transactions, and to protect the health, safety and welfare of the public.
- State Treasurer
The Pennsylvania Treasurer is the head of the Pennsylvania Department of the Treasury, which is the custodian of virtually all the Commonwealth of Pennsylvania's funds. The Pennsylvania Treasury invests taxpayers' money; maintains an unclaimed property database; makes college possible with a college savings program; reduces its citizens' energy costs with the help of the Keystone Home Energy Loan Program (HELP); and much more.
Pennsylvania Legislative Branch
- Center for Rural Pennsylvania
The Center for Rural Pennsylvania is a bipartisan, bicameral legislative agency that serves as a resource for rural policy within the Pennsylvania General Assembly. The Center promotes and sustains the vitality of Pennsylvania's rural and small communities by: sponsoring research projects to identify policy options for legislative and executive branch consideration and action; collecting data on trends and conditions to understand the diversity of rural Pennsylvania; publishing information and research results to inform and educate audiences about the diverse people and communities of rural Pennsylvania; and participating in local, state and national forums on rural issues to present and learn from best practices.
- General Assembly
The Pennsylvania General Assembly is the state legislature of Pennsylvania. The General Assembly became a bicameral legislature in 1790. The General Assembly has 253 members, making it the second-largest state legislature in the nation (behind New Hampshire) and the largest full-time legislature.
- House of Representatives
The Pennsylvania House of Representatives is the lower house of the bicameral Pennsylvania General Assembly. There are 203 members, elected for two year terms from single member districts. Elections are held in November of even numbered years.
- State Senate
The Pennsylvania State Senate is the upper house of the Pennsylvania General Assembly. Senators are elected for four year terms, staggered every two years such that half of the seats are contested at each election. The President of the Senate is the Lt. Governor of Pennsylvania, who has no vote except in the event of an otherwise tie vote. The President Pro Tempore of the Senate becomes the Lt. Governor of Pennsylvania in the event of the sitting Lt. Governor's removal, resignation or death.
Pennsylvania Court Rules and Forms
- Common Pleas and Magisterial District Courts Rules
Local Rules for Common Pleas and Magisterial District Courts.
- Orphans Court Forms
- U.S. Bankruptcy Court - Eastern District of PA Local Forms
Official Bankruptcy Forms; Local Bankruptcy Rules Forms; and Other Bankruptcy Forms.
- U.S. Bankruptcy Court - Eastern District of PA Local Rules
Local Bankruptcy Rules & Standing Orders.
- U.S. Bankruptcy Court - Middle District of PA Local Forms
Individual Fillable Local Bankruptcy Forms. Also provides links/access to Local Bankruptcy Rules and Local Bankruptcy Forms (as one PDF file).
- U.S. Bankruptcy Court - Middle District of PA Local Rules
Local Bankruptcy Rules. Also provides links/access to Local Bankruptcy Forms (as one PDF file); Local Bankruptcy Forms (as separate fillable PDF files); and Local Bankruptcy Rules (as a PDF file).
- U.S. Bankruptcy Court - Western District of PA Local Forms
- U.S. Bankruptcy Court - Western District of PA Local Rules
Local Rules, Forms, and Procedures.
- Unified Judicial System Forms
Provides links to widely used forms including forms for filing civil complaints, private criminal complaints and notices of settlement when cases are privately resolved.
- Unified Judicial System Rules of Court
Provides search option for Pennsylvania Rules of Criminal Procedure; Pennsylvania Rules of Juvenile Procedure; certain Pennsylvania Rules of Civil Procedure; local Criminal Procedural Rules; local Juvenile Delinquency & Dependency Rules; and Local Rules of Civil Procedure.
Pennsylvania Judicial Branch
- The Unified Judicial System of Pennsylvania
The Pennsylvania court system is structured like a pyramid. At its base are the magisterial district judges and the Philadelphia Municipal and Traffic courts where cases involving small claims, minor crimes and traffic offenses are heard. One step up on the pyramid are the Common Pleas courts in 60 judicial districts around the state where trials are held in civil and criminal cases and disputes involving family and estate matters are litigated. Another step up are the intermediate appellate courts, the Superior Court, a general court of appeals with 15 judges, and the Commonwealth Court, a special court with nine judges which hears government-related matters. At the top of the pyramid is the highest court, the Supreme Court with seven justices.
Pennsylvania Executive Branch
- Department of Aging
The Pennsylvania Department of Aging oversees many services and benefits to older Pennsylvanians. The department works hand-in-hand with the Governor's Office and the General Assembly on legislation affording older persons a quality way of life. The department is the focal point of state coordination and planning for elderly initiatives in Pennsylvania to include long-term care programs for the frail and chronically ill. The department's mission is to enhance the quality of life of all older Pennsylvanians by empowering the diverse community, the family and the individual.
- Department of Agriculture
The Pennsylvania Department of Agriculture (PDA) encourages, protects and promotes agriculture and related industries throughout the commonwealth while providing consumer protection through inspection services that impact the health and financial security of Pennsylvania's citizens.
- Department of Banking
The Pennsylvania Department of Banking protects the public from financial abuse, promotes financial education, ensures the safety and soundness of depository institutions, and fosters a strong economy for all Pennsylvanians. The department makes sure that the financial institutions chartered and licensed in Pennsylvania act responsibly and comply with the law.
- Department of Community and Economic Development
The Financially Distressed Municipalities Act empowers the Pennsylvania Department of Community and Economic Development (DCED) to declare certain municipalities in Pennsylvania as financially distressed. Philadelphia and Pittsburgh are subject to separate state authorities, rather than this department. DCED includes the following departments: Office of the Secretary; Executive Deputy Secretary; Administration; Business Assistance; Community Affairs & Development; International Business Development; Technology Investment; and Tourism, Film & Marketing.
- Department of Conservation and Natural Resources
The Pennsylvania Department of Conservation and Natural Resources (DCNR), established on July 1, 1995, is the agency in the U.S. State of Pennsylvania responsible for maintaining and preserving the state's 117 state parks and 20 state forests; providing information on the state's natural resources; and working with communities to benefit local recreation and natural areas. The department was formed when then-governor Tom Ridge split the Department of Environmental Resources (DER) into the DCNR and Department of Environmental Protection (DEP).
- Department of Corrections
The Pennsylvania Department of Corrections (PADOC) is the Pennsylvania state agency that is responsible for the confinement, care and rehabilitation of the inmates at state correctional facilities funded by the Commonwealth of Pennsylvania.The mission of PADOC is to protect the public by confining persons committed to their custody in safe, secure facilities, and to provide opportunities for inmates to acquire the skills and values necessary to become productive law-abiding citizens; while respecting the rights of crime victims.
- Department of Education
The mission of the Pennsylvania Department of Education is to assist the General Assembly, the Governor, the Secretary of Education and Pennsylvania educators in providing for the maintenance and support of a thorough and efficient system of education. The Department also cooperates with independent groups concerned with public education including the State Tax Equalization Board, State Public School Building Authority, Pennsylvania Higher Education Assistance Agency, Pennsylvania Public School Employes Retirement Board and the Pennsylvania Public Television Network Commission.
- Department of Environmental Protection
The Department of Environmental Protection (DEP) is largely responsible for administering Pennsylvania's environmental laws and regulations. DPA works daily to reduce air pollution; make sure PA's drinking water's safe; protect the water quality in PA's rivers and streams; make sure that waste is handled properly; support community renewal and revitalization; promote advanced energy technology and help the commonwealth's citizens prevent pollution and comply with PA's environmental regulations.
- Department of General Services
The Department of General Services (DGS) is one of the largest operating agencies in Pennsylvania state government. DGS oversees procurement of goods and services, manages non-highway capital projects and is responsible for numerous core operations of state government, including management of the vehicle fleet, the Capitol Police force, state buildings and facilities. DGS also serves as the state’s real estate agent and insurance broker.
- Department of Health
The Department of Health's mission is to promote healthy lifestyles, prevent injury and disease, and to assure the safe delivery of quality health care for all Commonwealth citizens. The Department is responsible for planning and coordinating health resources throughout the Commonwealth. It licenses and regulates a variety of health facilities, such as hospitals, nursing homes, ambulatory surgical facilities and other in-patient and out-patient facilities. In addition, the Department supports outreach, education, prevention and treatment services across a variety of program areas.
- Department of Labor and Industry
The Department of Labor & Industry (L&I) administers benefits to unemployed individuals, oversees the administration of workers' compensation benefits to individuals with job related injuries, and provides vocational rehabilitation to individuals with disabilities. L&I prepares job seekers for the global workforce through employment and job training services for adult, youth, older workers, and dislocated workers. In addition, L&I enforces various laws and safety standards in the workplace and administers the Commonwealth's programs for community service by young Pennsylvanians.
- Department of Military and Veterans Affairs
Pennsylvania's Department of Military and Veterans Affairs (DMVA) has a dual mission: to provide quality service to the Commonwealth’s veterans and their families, and to oversee and support the members of the Pennsylvania National Guard (PNG).
- Department of Public Welfare
The mission of the Department of Public Welfare (DPW) is to: Promote, improve and sustain the quality of family life; Break the cycle of dependency; Promote respect for employees; Protect and serve Pennsylvania’s most vulnerable citizens; and Manage our resources effectively. DPW's program offices include: Administration; Child Development and Early Learning; Children, Youth and Families; Developmental Programs; Income Maintenance; Long Term Living; Medical Assistance Programs; and Mental Health and Substance Abuse Services.
- Department of Revenue
The Department of Revenue is responsible for collecting Personal Income Tax, Sales and Use Tax, all corporate taxes, Inheritance Tax, Realty Transfer Tax, Motor Fuel Taxes and all other state taxes. In addition, the department collects the Local Sales Tax for Allegheny and Philadelphia counties, the Public Transportation Assistance Tax and funds for the Pennsylvania Intergovernmental Cooperation Authority. It also administers the Property Tax/Rent Rebate program and the Public Utility Realty Tax reimbursement, prepares the tax expenditure portion of the Governor’s Budget and licenses distributors and manufacturers of small games of chance. The Department also administers the Pennsylvania State Lottery, which generates funds for programs that benefit older Pennsylvanians.
- Department of State
Under the leadership of the Secretary of the Commonwealth, the mission of the Department of State is to promote the integrity of the electoral process, to provide the initial infrastructure for economic development through corporate organizations and transactions, and to protect the health, safety and welfare of the public. The Department will encourage the highest standards of ethics and competence in the areas of election, campaign finance, notarization, professional and occupational licensure, charitable solicitation, and professional boxing and wrestling.
- Department of Transportation
The Pennsylvania Department of Transportation (PennDOT) oversees transportation issues in the Commonwealth of Pennsylvania. PennDOT supports over 40,500 miles of state roads and highways, about 25,000 bridges, as well as new roadway construction, the exception being the Pennsylvania Turnpike Commission. In addition, PennDOT supports aviation, rail traffic, mass transit, intrastate highway shipping traffic, motor vehicle safety & licensing, and driver licensing. PennDOT also supports the Ports of Philadelphia, Pittsburgh, and Erie.
- Insurance Department
It is the responsibility of the Insurance Department to administer laws of the commonwealth as they pertain to the regulation of the insurance industry in order to protect the insurance consumer. The Department monitors the financial solvency of insurance companies; licenses insurance companies and producers/agents; reviews and approves insurance policy language and rates; coordinates the rehabilitation and liquidation of insolvent insurance companies; and administers health insurance programs for eligible adults and children.
- Office for Information Technology
OA-Information Technology is the executive agency responsible for leading and coordinating information technology services in the commonwealth in accordance with policy, planning, and budget directives adopted by the Enterprise Information Technology Governance Board. OA-IT is dedicated "to serving the Commonwealth of Pennsylvania and its citizens by providing enterprise-wide technology, policy, standards, architecture, information, and solutions to enhance system interoperability, security, and cost effectiveness."
- Office of Administration
The Governor’s Office of Administration (OA) provides efficient, responsive business support to agencies in Pennsylvania’s executive branch of government. OA directs the commonwealth’s deployment of technology; supports commonwealth employees; analyzes business processes; manages the commonwealth's public safety radio system; oversees planning and coordination among state agencies to ensure that critical government services continue during emergencies; and negotiates and consolidates business travel policies and services.
- Office of Consumer Advocate
The Office of Consumer Advocate (OCA) is a state agency that represents the interests of Pennsylvania utility consumers before the Pennsylvania Public Utility Commission (PUC), federal regulatory agencies, and state and federal courts. The OCA represents consumers in cases before the PUC involving a wide range of utility issues. The OCA is involved in rulemakings, policy statements, and state and federal level cases that involve either the price consumers pay for vital utility service or the quality of service they receive.
- Office of General Counsel
The Office of General Counsel is the largest legal enterprise in the Commonwealth of Pennsylvania. The representation that the Office of General Counsel provides is unlike any found in the private sector. The Office represent the Commonwealth of Pennsylvania, the Governor, members of the Governor's Cabinet, and the executive and independent agencies that manage the business of the Commonwealth.
- Office of Public Liaison
The Office of the Public Liaison (OPL) serves as the primary link between the Governor’s Office and citizens, ensuring that state government is responsive to their needs. The office addresses concerns that are reported to the Governor’s Office by members of the public. OPL also provides a venue for citizens’ groups and associations to share concerns about various issues impacting Pennsylvania’s diverse communities.
- Office of the Budget
The Office of the Budget is responsible for preparing the Governor’s annual budget and implementing it after it is passed by the General Assembly and the Governor signs it into law. Through Comptroller Operations, the Office of the Budget oversees the commonwealth’s uniform accounting, payroll and financial reporting systems. Comptroller Operations also facilitates payments to vendors who do business with the commonwealth.
- Office of Victim Advocate
The Pennsylvania Office of the Victim Advocate (OVA) is dedicated to representing, protecting and advancing the individual and collective rights and interests of crime victims. he Victim Advocate has the authority and the duty to represent the rights and interest of crime victims before the PA Department of Corrections (DOC) and the PA Board of Probation and Parole (PBPP).
- Pennsylvania Emergency Management Agency
The Pennsylvania Emergency Management Agency (PEMA) works to plan responses to, prevent loss from, communicate news about, coordinate resources for and help communities recover from natural and manmade disasters and emergencies. PEMA's mission is to coordinate state agency response, including the Office of the State Fire Commissioner and Office of Homeland Security, to support county and local governments in the areas of civil defense, disaster mitigation and preparedness, planning, and response to and recovery from man-made or natural disasters.
- Pennsylvania Health Care Cost Containment Council
The Pennsylvania Health Care Cost Containment Council (PHC4) is an independent state agency responsible for addressing the problem of escalating health costs, ensuring the quality of health care, and increasing access for all citizens regardless of ability to pay.
- Pennsylvania Lottery
The Pennsylvania Lottery was established by the Legislature in 1971. The purpose of creating the Lottery was, and remains, to generate funds to benefit programs for the Commonwealth's older residents. The Pennsylvania Lottery remains the only lottery in the nation that exclusively targets all of its proceeds to programs for older residents.
- Pennsylvania State Police
The Pennsylvania State Police (PSP) is the state police force of Pennsylvania, responsible for statewide law enforcement. The PSP's duties include patrolling all state and federal highways across Pennsylvania, enforcing the Pennsylvania Vehicle Code, overseeing the state's automobile inspection program, enforcing the state's commercial vehicle safety regulations, and providing the full range of police protection for municipalities without full-time local police departments.
- State Library
The State Library of Pennsylvania is one of the largest research libraries in the Commonwealth of Pennsylvania. The Office of Commonwealth Libraries, within the Pennsylvania Department of Education, has holdings in almost every area of human concern. It provides information and materials from its collections and automated resources to state government, state institutions and the general public. It is also charged with maintaining a definitive collection of publications of all agencies of the Commonwealth and serves as a Regional Depository for United States Government Publications.
- State Parks
The primary purpose of Pennsylvania State Parks is to provide opportunities for enjoying healthful outdoor recreation and serve as outdoor classrooms for environmental education. In meeting these purposes, the conservation of the natural, scenic, aesthetic, and historical values of parks should be given first consideration. Stewardship responsibilities should be carried out in a way that protects the natural outdoor experience for the enjoyment of current and future generations.
VisitPA.com is the official Web site for Travel and Tourism in Pennsylvania. Find great deals on travel packages and use the multi-day roadtrips to help plan a perfect trip.
Pennsylvania Boards and Commissions
- Board of Claims
The Board of Claims is both a judicial and an independent administrative agency. The Board of Claims, as it is now known, was created October 5, 1978 and supersedes the former Board of Arbitration of Claims. The Board of Claims has jurisdiction to hear and determine contract claims that equal or exceed $300.00 against the Commonwealth.
- Board of Probation and Parole
The Pennsylvania Board of Probation and Parole (Board) is committed to protecting the safety of the public, addressing the needs of crime victims, improving county adult probation and parole services and assisting in the fair administration of justice by ensuring the custody, control, and treatment of offenders under the jurisdiction of the Board.
- Commission on Crime and Delinquency
The Pennsylvania Commission on Crime and Delinquency (PCCD) was established to improve the criminal justice system in Pennsylvania. Working closely with the Governor's office, PCCD helps coordinate the work of state and local criminal justice agencies to increase communication, effectiveness and efficiency. PCCD provides training to deputy sheriffs and constables and technical assistance to communities and organizations to promote crime and delinquency prevention efforts.
- Historical and Museum Commission
The Pennsylvania Historical and Museum Commission (PHMC) is the official history agency of the Commonwealth of Pennsylvania. PHMC is responsible for the collection, conservation, and interpretation of Pennsylvania's historic heritage, which is accomplished through the Pennsylvania State Archives, the State Museum of Pennsylvania, the Bureau of Historic Sites and Museums, the Pennsylvania Trails of History, the Bureau for Historic Preservation, and the Bureau of Management Services.
- Local Government Commission
The Local Government Commission is one of the oldest agencies of its kind in the United States. It is a bipartisan legislative service agency affording research assistance to the General Assembly, collectively, and to individual Legislators as well. Another primary function of the Commission is to propose legislation that will enable local governments to be more effective and efficient in providing services.
- Pennsylvania Commission for Women
The Pennsylvania Commission for Women (PCW) serves as a strong advocate for women's rights and works to ensure that women and girls have equal opportunity and treatment in all aspects of life. PCW's mission is to identify and advance the diverse needs and interests of Pennsylvania women and girls; to inform, educate and advocate for its constituents; and to provide opportunities to empower women and girls to reach their highest potential.
- Pennsylvania Council on the Arts
The mission of the Pennsylvania Council on the Arts (PCA) is to foster the excellence, diversity, and vitality of the arts in PA and to broaden the availability and appreciation of these arts throughout the state. PCA accomplishes its mission through a combination of: Grants to the arts; Partnerships and initiatives; Technical assistance to partners and applicants; and Serving as a resource for arts-related information.
- Pennsylvania Fish and Boat Commission
The mission of the Pennsylvania Fish and Boat Commission (PFBC) is to protect, conserve, and enhance the Commonwealth’s aquatic resources and provide fishing and boating opportunities.
- Pennsylvania Game Commission
For more than 100 years, the Game Commission has managed the Commonwealth's wildlife resources for all Pennsylvanians. Funded primarily by hunting and furtaker license sales; State Game Lands timber, mineral and oil/gas revenues; and a federal excise tax on sporting arms and ammunition; the Commission is almost entirely supported by hunters and trappers, or assets that have been procured with license dollars.
- Pennsylvania Human Relations Commission
The Pennsylvania Human Relations Commission (PHRC) is the state's civil rights agency. PHRC's mission is to administer and enforce the Pennsylvania Human Relations Act and the Pennsylvania Fair Educational Opportunities Act through investigation, identification and elimination of unlawful discrimination and the promotion of equal opportunity for all persons.
- Pennsylvania Liquor Control Board
The Pennsylvania Liquor Control Board (PLCB) manages the beverage alcohol industry in Pennsylvania. PLCB is responsible for all licensing and retailing, as well as providing an educational program on the effects of alcohol.
- Pennsylvania Public Utility Commission
The Pennsylvania Public Utility Commission balances the needs of consumers and utilities to ensure safe and reliable utility service at reasonable rates; protect the public interest; educate consumers to make independent and informed utility choices; further economic development; and foster new technologies and competitive markets in an environmentally sound manner.
- Pennsylvania Securities Commission
The Pennsylvania Securities Commission administers and enforces rules and regulations under the Securities Act of 1972, the Takeover Disclosure Law of 1976, and subsequent amendments to those laws. The Commission's goal is to protect the public from deceptive practices in connection with offers, sales, and purchases of securities in Pennsylvania while encouraging availability of equity and debt financing to legitimate businesses and industries in or affecting the Commonwealth.
- Pennsylvania Turnpike Commission
The Pennsylvania Turnpike Commission (PTC) was created in 1937 to construct, finance, operate and maintain the Pennsylvania Turnpike. PTC also operates the James E. Ross Highway, Amos K. Hutchinson Bypass, Mon/Fayette Expressway and Pittsburgh's Southern Beltway. PTC is the only transportation agency in Pennsylvania that is not part of PennDOT, though it does follow current PennDOT policies and procedures.
- Port of Pittsburgh Commission
It is the mission of the Port of Pittsburgh Commission to promote the commercial use and development of the inland waterway-intermodal transportation system and to integrate that system into the economic, recreational, environmental and intermodal future of the residents and industries of southwestern Pennsylvania.
- State Civil Service Commission
Civil Service is a merit system of employment that hires, retains and promotes people based on their qualifications and ability to perform the job. The State Civil Service Commission (SCSC) administers the Commonwealth’s merit system for 37 state agencies. Additionally, approximately 9,000 employees work for 300 local government offices that have contracted with the Commission to provide merit services. SCSC develops and administers job specific tests and creates listings of qualified candidates for agencies to use in hiring candidates into civil service covered positions.
- State Ethics Commission
The Pennsylvania State Ethics Commission is an independent state agency charged with the responsibility of enforcing the Ethics Act. The Ethics Act applies to public officials and public employees. Candidates and nominees for public office are also subject to certain provisions of the Ethics Act. Additional responsibilities of the Ethics Commission include the enforcement of certain provisions of the Lobbying Disclosure Law and the issuance of advisory opinions regarding the Lobbying Disclosure Law. | <urn:uuid:72c0ceb4-50ad-40ad-8a6f-99c2217a36bd> | {
"date": "2017-03-23T06:22:48",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186780.20/warc/CC-MAIN-20170322212946-00396-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9273783564567566,
"score": 2.96875,
"token_count": 5441,
"url": "http://www.hg.org/Pennsylvania-government.html"
} |
Subsets and Splits