text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
With a BMI of 31.7, you are moderately obese (class I obesity)
Obesity increases risk for serious conditions such as heart disease, type 2 diabetes, obstructive sleep apnea, certain types of cancer, and osteoarthritis.
Obesity is most commonly caused by a combination of excessive food energy intake, lack of physical activity, and genetic susceptibility, although a few cases are caused primarily by genes, endocrine disorders, medications, or psychiatric illness.
As a result, obesity has been found to reduce life expectancy.
Obesity is one of the leading preventable causes of death worldwide
Moderately obese treatment
Successful weight-loss treatments include setting goals and making lifestyle changes, such as eating fewer calories and being physically active.
Setting realistic weight-loss goals is an important first step to losing weight, for example, try to lose 10% of your current weight over 6 months. The best way to lose weight is slowly.
A healthy eating plan gives your body the nutrients it needs every day.
It has enough calories for good health, but not so many that you gain weight.
A healthy eating plan is low in saturated fat, trans fat, cholesterol, sodium (salt), and added sugar. Following a healthy eating plan will lower your risk for heart disease and other conditions.
Healthy foods can include:
- Fat-free and low-fat dairy products (low-fat yogurt, cheese, and milk).
- Protein foods (lean meat, fish, poultry without skin, beans, and peas).
- Whole-grain foods (whole-wheat bread, oatmeal, and brown rice).
Other grain foods include pasta, cereal, bagels, bread, tortillas, couscous, and crackers.
- Fruits (fresh, canned, frozen, or dried).
- Vegetables )fresh, canned (without salt), frozen, or dried).
- Canola and olive oils, and soft margarines made from these oils, are heart healthy.
However, you should use them in small amounts because they're high in calories.
- You also can include unsalted nuts, like walnuts and almonds, in your diet as long as you limit the amount you eat (nuts also are high in calories).
Your eating plan should take into consideration:
- Portion sizes
A portion is the amount of food that you choose to eat for a meal or snack.
Cutting back on portion size is a good way to eat fewer calories.
- Food weight
You can lose weight if you eat foods that are lower in calories and fat for a given amount of food.
For example, replacing a full-fat food product that weighs 2 ounces (56gr) with a low-fat product that weighs the same helps you cut back on calories.
Another helpful practice is to eat foods that contain a lot of water, such as vegetables, fruits, and soups.
- Foods to avoid
Foods that are high saturated fats raise your blood cholesterol levels and also might be high in calories.
Fats and cholesterol raise your risk for heart disease, so they should be limited.
Changing your behaviors or habits related to food and physical activity is important for losing weight.
The first step is to understand which habits lead you to overeat or have an inactive lifestyle. The next step is to change these habits. | <urn:uuid:0a7f9d68-3978-4106-8515-55b4d959a96b> | {
"date": "2017-07-27T12:41:21",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428257.45/warc/CC-MAIN-20170727122407-20170727142407-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9494116902351379,
"score": 3.421875,
"token_count": 698,
"url": "http://www.bestbmicalculator.com/31.7/"
} |
For most people, ensuring their child’s online privacy and security can be overwhelming. The frightening reports and headlines often destroy the little confidence they have regarding their child’s physical and cyber safety.
Internet – A Necessity
The Internet a necessity can truly be a wonderful resource for your kids. They can use it to communicate with teachers and other children, research school reports, and play interactive games. Children who are old enough to filch a screen can have access to the world. And the reach is amazingly very broad.
But that access can also pose hazards. The internet is flooded with the good, the bad, and the utterly scary ugly materials and individuals. When it comes to the issue of online security and privacy, a lot has been done, and more still needs to be done.
Yes, there are a good number of laws and regulation aimed at tackling this menace; however, these laws are not well suited for children and young persons.
The breach privacy is never a pleasant issue to experience, and criminals are forever on the prowl to find loopholes. It is particularly more alarming if children and teens are involved. This is because these set of people are very vulnerable to a security lapse. Dozens of media reports document the increasing victimization of children by blackmail, rape, abduction and even murder because the industry didn’t secure their data. Law enforcement and children’s protection agencies now identify social media as a serious threat to child safety
Then, there is the online commercial exploitation of children when commercial websites gather and use children’s personal information for behavioral targeting. There is no knowing the limits on how this data can be used, stored, or transferred, and corporations have too much influence over the play spaces of children and young persons
A lot of events in life are left to chance, but we do have the power to influence children’s technology use if we all come together and do it the right way.
What Can We Do?
Digital rights and privacy settings designed for adults do not work well for children. Instead, it endangers their safety. Predators, terrorist recruiter, and bullies sneak through digital loopholes to stalk unsuspecting children, and young persons, and it’s happening right now.
The Red Hood Project is calling on everyone to come together so we can do something about it. Let’s hold industry accountable to establish real safety standards that protect our kids.
The Red Hood Project seeks:
- Age verification of child users
- Disabled location and web browser tracking
- Default privacy settings for children and youth
- Firewall protection for children’s data online.
Even if you decide to catch Pokemon to help you get to a new level at a fast pace, you will still need to devote lots of time to it. You may need to peruse through this write-up on how to get a Pokemon go account to help you to quickly achieve your tasks and you might even catch 60 of them in about a second. That is very impressive. Some tips are provided below:
Ensure that both your app and phone screen are on whenever you are on the move. If there is no display of Pokemon Go on the screen, your phone won’t give out any sign when you come across a Pokemon and you won’t be able to track the eggs.
Walk to work? Plan your movements and ensure to pass most lures and Pokestops. Endeavour to make the screen of your phone more visible to detect their locations.
Endeavour to catch all Pokemon that come your way, but avoid wasting Pokeballs. Even if you don’t require another Zubat, which will give you 100 XP and 100 Stardust, you can save it for later use.
You only have one incubator. All your eggs should be inside it so as to avoid complicating matters.
Endeavor to select a buddy Pokemon to enable you to earn candy at every step as you move towards your preferred pocket monster.
If you notice some effects or loading sign on the game for a short period, don’t wait. Shut down the game immediately.
Avoid catching a Pokemon while the loading sign is still on. This might cause the game to crash.
As long as you can locate and identify a Pokemon, you can secure it – even if it looks far from you. Endeavor to click on it. You don’t need to wait any longer. You can keep moving while you try to secure it – although Pokemon tends to move quicker than you do.
If you find yourself in a situation whereby you located a Pokemon and a Pokestop all at once? The first thing to do is to activate the Pokestop – if you proceed to catch the Pokemon, you might end up not activating the Pokestop.
Have you created an Instagram profile but unable to gain followers that would have given you an edge? And you don’t know what to do to ganhar seguidores Instagram and get more followers who are loyal and committed? Below are some guidelines to assist you in gaining more Instagram followers.
- Use Quality Images
This may look easy, but the true fact is that many people don’t seem to understand why they are unable to gain more Instagram followers, and one of the reasons might be due to poor-quality images. Endeavor to consider some features like lightning, angles, and the main image when taking pictures. People have interest in seeing high-quality images taken from an important angle.
Instagram can be regarded as a VISUAL space, so if you have low-quality visual, it will be very difficult to achieve your task. However, if you don’t have quality photo skills, you have numerous options: you can upload quality stock photos, hire an experienced photographer, or develop your skills via learning.
- Have a Branded Image
Why do you like to visit the page of your favorite brand or Instagrammer? There is a high chance that you can recognize and identify their products via the Instagram. This is due to their branded image. You have already got yourself acquainted with their products and services and you can easily identify them in the midst of multitudes. I believe that you want the same thing to happen to you and you wish to gain committed and loyal followers who will always like your photos and help boost your business.
You wish to be different and unique. You can achieve your aim by creating a brand image that stands out and has recognizable features. However, you must consider some things like your overall feed before uploading pictures and then try to create some attractive design to help boost your image and drive in more followers by using some specific kinds of design features, using a specific color scheme (or filters), or by using a template. Endeavour to consider the factors highlighted above and make an informed decision.
If you happen to be going through issues with bedbugs, book an appointment and/or talk about your options with a pest control organization that are professionals on bed bug control in Toronto. In addition, infestations by bedbugs that Toronto inhabitants have experienced of late should be more than enough reason to opt for the gold and reach out to the professionals.
Whether you have experience with bed bugs or not, it’s a situation that’s best treated through prevention. This is due to the fact that the methods that are employed in destroying a bed bug infestation are not a “for sure” method. It’s as a result of the bed bug population possessing the uncanny ability to become resistant to various types of pesticides and exterminating methods that majority of the people eventually turn to expert extermination services.
The Key to Staying Away From Bedbugs Is Prevention
Bed bugs are renowned for their ability to hide in the tiniest of places like the seams of bed sheets, pillowcases, mattresses and even the bed frame itself.
Begin your prevention techniques by focusing on the furniture in the bedroom and progress outwards due to the fact these bugs are so attracted to carbon dioxide, which is the chemical compound produced when a mammal exhales and is what makes us appear like dinner to a bedbug. This explains why they like to concentrate in the bedroom for them to calmly feed while their victim is asleep and have a very small risk of being noticed by the host, plus they just require five minutes to feast on their victim until they are full.
Switch to a metal bed frame rather due to the fact that wood is a popular place for bedbugs to burrow and hide in, that includes dressers, nightstands, headboards and every other wooden furniture. You should pull all furniture away from touching anything, most especially the walls in a bid to assist you in narrowing down how simple it’s for the bed bugs to climb up and onto the furniture.
Raising chickens in your backyard is a profitable venture in addition to it being a wonderful activity. You could start the business of selling fresh eggs on a daily basis and earn cash from it as well. But before you begin to earn money from the poultry business or hen rearing, wouldn’t you like to know a few details about building a chicken coop house? Well, to create the best chicken coop house, you would need the coop house plan. What should you think about when you’re planning to create your own coop house?
Don’t forget that space is hugely important for animals too, just the way it’s for humans. You should not think of putting all the fowl together in a small coop house, due to the fact that insufficient space will affect the health of the hens in addition to affecting their free movement. Their egg laying capacity would surely be affected if their health is affected.
Therefore always have it at the back of your mind to provide at least 3 to 4 square feet of space for every hen when you pick a coop house. It doesn’t really matter if the space happens to be more than that, due to the fact that you could either get more fowl in future, or the existing ones can move about more freely.
Convenience Of Use
With the use of the best chicken coop house plans, you have made the decision to create your own coop home, basically to make the process easier for you.You would not like the chicken coop home program to be in such a way that would make the routine jobs very hard to handle as well. Therefore opt for a coop dwelling plan that’s not just sufficient in terms of space, but also convenient for daily jobs such as feeding the fowl, washing of the floors and cleaning etc.
First things first, you would require the Pokémon Go app, available for Android and iOS in Australia, New Zealand, and the United States and new Pokémon go accounts. If you are not in the aforementioned areas, hang tight, as Ninantic is extending to other areas with time.
Once you have been logged in, you would get a short introduction by the dreamy Professor Willow, who would provide you with an introduction to the game, and take you through catching your option of the three starter pokémon — either a Squirtle, Bulbasaur, or Charmander that should not be strange to Pokémon regulars.
After that though, the game relatively much leaves you alone, aside from a small tips aspect that often explains normal map icons. But there are three fundamental parts to the game of Pokémon Go namely visiting pokéstops, gym battles, and catching Pokemon.
Catching pokémon functions mostly like you would expect: you simply move around with the app open on your mobile phone, that would buzz when pokémon are around. Click on the pokémon on the map, and you will switch to the catching interface. The color of the ring around the pokémon helps in determining how effortless it is to catch — red the most difficult, yellow intermediate, and green is easiest.
Pokémon is discovered at various Combat Power (CP) levels, that more or less determines how potent the pokémon would be. To accelerate a pokémon’s CP, you would require two resources: Stardust, a common item you receive with every pokémon that you capture, and the specific candy of the Pokemon that could be received by catching duplicates of the pokémon you would like to level up.
For instance, to level up a Zubat’s Combat Power, you would require Zubat candies and Stardust. Similarly, to improve your Pokemon, you would be required to use more of the candies of that Pokemon that will also dramatically accelerate the Combat Power of that Pokemon. As your character level improves, you will meet with higher level Pokemon in the wild and be able to accelerate the Combat Power of your Pokemon more.
A lot of people realize that they get some comfort and refreshment from a cup of tea and they look forward to it. A majority like to make their daily tea made from a stove top kettle. However, there is another option that is common with tea drinkers. Modern electric tea kettles represent an alternative to stove top tea kettles and provide safety and time-saving benefits. An advantage associated with an electric style kettle is that it boils water in less than when compared with the stove top ones. The handles of the kettle will also stay cooler than what’s obtainable with the normal stovetop kettle. For an extensive comparison of the stove top and electric tea kettles, take a look at the 10 best tea kettles article.
The stove top tea kettles normally take around 9 minutes to boil water and when pouring, users have to be careful when handling the kettle due to the fact that the handle might become very hot during this time. The efficiency of the electronic kettle normally provides boiling water in roughly 5 minutes and makes the handles stay cooler and not present the likelihood of a burning hand. It’s fascinating to carry out a test yourself of the two kinds of tea kettles to find out the period of time it takes for water to boil.
Electric tea kettles can easily be bought cheaply and cleanly. They offer an automatic shut off feature when the water boils, whereby the stove top normally gives a whistle.
An electric kettle might occupy space on your counter if you elect to leave it out of your cupboards when you’re not using it. This could be an option for those living with limited counter space. It could be placed in a cabinet when it’s not in use. According to the 10 best tea kettles article, a lot of colors and styles of tea kettles exist to select from for drinkers. In addition, they can be used to boil water for hot chocolate, coffee or other foods too.
Are you looking for tips that can help you achieve a rocking hot body? Perhaps it is summer and you want to get that body ready to fit into a bikini. If that is the case then this article has got all of the tips for you! All of these tips are absolutely essential in helping lose weight and build more muscles to get a slimmer and hotter body. If you need more information then you should check out this Bikini Body Guide PDF, to learn additional essential tips to losing weight.
- Start walking
Walking and any other type of cardio exercise is another great way that you can start losing weight. Other exercises that are similar to walking include jogging. Doing either of these workout exercises for at least an hour a day are going to help you lose a lot of weight in a surprisingly short amount of time. So what are you waiting for? If you want to lose weight, you had better put on those running shoes.
- Cut off those carbs
Carbs can really make your body start packing all of that weight. You have got to focus on reducing the amount of carbs that you eat per day. The foods that you should be avoiding include bread, pastry, sugary foods and other kinds of junk foods. Even by reducing the carbs that you eat in a day, you are going to lose a bit of weight.
- Sit-ups for abs
You have got to have a great looking stomach if you want to wear a bikini, and you will need to have defined abs to get that look. Sit ups are the perfect exercise for you if you want to achieve that chiseled abdomen muscle look.
- Get ready for some squats
Squat training is another workout that you have got to start doing. Squats can help you build up the size and shape of your butt!
- Eat regularly
If you think that starving yourself can help you lose weight, you are wrong! Maintaining a regular and healthy eating habit is important, especially if you want to burn more body fat.
- Maintain a workout
When you start exercising you have got to do it more regularly as well. Not maintaining a workout schedule will mean that you are not going to get the maximum benefits from working out more often.
- Stay motivated
And most importantly of all, you have got to stay motivated if you want to achieve a hot bikini ready body. Try to stay focused on your goal. Your motivation is going to help you maintain your diet and keep on exercising.
By following all of these tips, you are bound to get the body that you have always wanted. It is really important that you follow all of these tips to the letter and try to do them regularly as well. This is because if you reinforce these healthy habits, over time they will become second nature to you. And then you are going to get more used to the idea of exercising and eating better. After several weeks of following these tips, you are going to be surprised at how great your body looks.
Kid’s trampolines are a vital tool used by kids for exercise and entertainment purposes. Kids are always excited and they have lots of energy inside their body system. So, you don’t have to worry yourself because your kids will surely enjoy using a trampoline. But what are the factors to consider when you are planning to buy the proper one for your kids? If you are not yet satisfied, below are some guidelines that you can follow when looking to buy the best toddler trampoline with handle for your kids.
Ensure that you know the reason why you are purchasing one
There are various types of trampolines used for different activities. You must ask yourself some important questions before even going out to the market to buy one. Do I really need to buy a kid’s trampoline? What sort of activity will be performed on it? Some trampolines are made for different purposes like exercises, or an extensive fund playpen. There are others used for fun activities in the pool or a lake.
Check if you have the right space
You must ensure that you have the right space for your kid’s trampoline before you go out to buy one. You are advised to check the house and look for the right spot that has enough space, accessible and secured. To avoid accident and injuries, you will need a space of about 2-3 feet and 20 feet of overhead clearance.
If you are looking to buy a handle for little toddlers, consider purchasing a toddler trampoline with handle which will serve as an extra support while they are playing on it. This will make them to be more stable and will prevent them from falling off. Other things to consider are safety and security. You need to make sure that the equipment is safe for use.
There are some essential things you need to look out for when perusing a survival knife review. You must ensure that the survival knife you are shopping for has a full tang blade. Full tang can be described as a single piece of metal that connects the blade to the entire handle. There are different techniques of fixing the handle to the tang and they are; injection-molded rubber, rivets, braided paracord, or by affixing it to the tang.
However, the best survival knife is the fixed blade survival knife, it stands out from others and can be considered as the best type of knife for outdoor usage. These knives are very tough and strong and can withstand any form of abuse and punishment. They can also be used for other purposes like shelter building, fixed as a spear tip, chopping, prying, hammering, fire building, and lots of others task.
Any hole found on a knife which serves as an attachment for rope and cord is described as Lanyard holes. You have to ensure that your knife has one of these holes which normally appear at the base below the handle. There are some survival knives with extra lanyard holes that appear below the blade so that the knife can be easily connected to a pole as a spear. You can actually perform this task on one lanyard hole but doing it on 3 make the work easier.
Other Factors to Consider
Apart from the information provided by a survival knife review, some other things that you must put into consideration are: a sharpener fixed to the sheath, an unattached sheath, the options for connecting the sheath to your belt/body and the effectiveness of the knife. Another essential thing to consider is the price. You don’t have to spend much to get the best survival knife but be ready to spend around a hundred bucks. With this kind of knife, the price is in a way related to its quality.
Orthopedic dogs are designed to be closer to the ground level; this makes it easy for dogs to easily climb in and out of the bed. Also, there is a high-quality ortho foam used in the design of the ortho dog bed which works by molding and contouring itself to a dog’s body thereby providing comfort for painful pressure resulting in a good night’s sleep. In addition, foam orthopedic beds help to regulate the temperature of the environment by keeping your dog warmer during cold seasons and cooler in the summer period.
These orthopedic dog beds are not only utilized by senior dogs. There are also dogs used for herding activities or exercises performed by the owners. These stable, luxury, and specially designed bed help to provide comfort and relief to dogs anytime they feel like resting or taking a nap. Also, orthopedic bed helps reduce the chance of thinner breeds such as Greyhounds to develop sores and calluses rather than them utilizing a thin bed or a hard floor.
In addition, ortho dog bed can be used to improve the health and lifestyle of a dog throughout their lifetime, starting from their young age. These beds provide support for these dogs by preventing premature muscle and joint breakage or dislocation and help to keep them in good shape and active form even as they grow older.
Another amazing feature of orthopedic dog beds is that it provides excellent comfort to dogs who is just recovering from an injury or surgical operation. Endeavor to visit your pet’s veterinarian to find out the best orthopedic bed that can be utilized for your convalescing dog.
If you are looking to buy an ortho dog bed, choose the one with enough space so that your dog will have the freedom to move about and make sure that you buy the bed that will complement your dog’s weight. If you plan on placing it inside your home, ensure that you find a good resting area for your dog that is free from breezes and currents.
People are eager to find out the benefits of Nutrisystem diet and its adverse effect. People are just looking for an unbiased Nutrisystem diet reviews of this package which will provide them certified information about this plan. Most people got to find out that there would be a little alteration to any diet and want to be sure that the alterations won’t have an adverse effect on their health or body. The true fact about diet is that it can never be perfect. And all diets encourage users to change their eating habits and pattern for effectiveness. For some diets, the process is more attractive than others. This write-up provides essential and valuable information about the Nutrisystem diet.
The Food: The unique thing about this diet is that it has a variety of choices than most diets and it offers some specialized kind of foods that you can’t get on diets like burgers, tacos, pizza, nachos and candy bars. This diet allows you to eat five meals per day and also offers both the shelf stable and frozen foods so that you will have the energy to do other important activities.
The Comfort: To be realistic, it is hard to be on a diet because you won’t have the time to prepare your own meals. All Nutrisystem meals are prepackaged. All you need to do is to warm them or remove the cover. They have already designed this product in the right way and you don’t need to make any alteration to it. All you need to do is to order your favorite food.
The Free and Extensive Assistance: They offer a good support and can be considered as one of the best. They offer a complete free counseling which you can get via the internet, email or through the phone. You can get it at any time you like.
Additionally, they usually send other incentives like workout tips or motivational DVDs or books with your food delivery. Their website is full of valuable and essential information.
Foxes like to make their own holes or dens and this is a sort of natural activity that they normally engage in. In the same vein, your dog which is kind of related to the fox also engages in this sort of activity by making it a personal den. The dog playpen provides such a bounded space for your “domesticated animal” which serves as its den.
A dog playpen provides enough space for your pets which give them freedom unlike that of a crate with a limited space and freedom. Due to enough space, it gives the dog enough room to exercise themselves and freely move about. This is a vital tool that you can use especially if you are the busy type.
A dog playpen is an essential tool that you can use if you wish to train your newly acquired puppies in a quick, effective and secured way. The enclosed space helps to provide a great avenue for reinforcement training. With this tool, you can be able to teach your dogs some important commands and even aspects of home etiquette.
If you want to provide maximum comfort for your puppies, you can add few toys to the pen to keep your puppies busy. This will make them feel entertained and comfortable. Also, it helps to keep them busy instead of them going around destroying your modern furniture.
Due to the numerous benefits of using dog pen, you would expect that it will be too costly. Despite this fact, it is relatively cheap and affordable. Most pet shops also have it in their possession. Also, it is very easy to construct and doesn’t require any professional knowledge.
You can purchase a dog playpen for your adorable pet so as to show him that he is special and precious. Having his own space will make him feel special and lovable.
Buying a knife is not a difficult task. Depending on someone’s requirements, you just need to feel the weight and balance on your hand. If you don’t have enough money to buy a top-quality product, there are several alternatives that you can go for. Also, you need to get more information about the maintenance of a knife. This is due to the fact that the information is not well transmitted from the seller to the buyer. Luckily, it is no longer challenging as knife sharpeners of different varieties are readily available. Despite the different versions; the manual and the best automatic knife sharpener, rest assured that the life of a knife is in good hands.
The simplest and unsophisticated tool is the sharpening steel. It doesn’t need any external stimuli like battery or electricity; it produces good result via a simple motion of alternating between knife and sharpener. If you want guidelines on how to perfectly perform the task, the internet is full of vital tools and resources which appear in the form of text and video mode. In addition, you can add the sharpening stone (whetstone) to the shopping basket. Though they are similar to one another, it is recommended that you use it on a less regular basis as compared to the steel. Tougher in nature, you are advised to use it for truly blunt blades. A modern kitchen sometimes sports these two essential tools.
The fancier knife sharpener is utilized as multi-stone hones. As one alternates the edges, each serves a purpose ranging from coarsest to finest sharpening needs. You might need to apply lubricant to allow a smooth glide of the blade along the surface. You can either utilize an oil or water. As diamonds are a girl’s best companion, some devices also include nature’s precious mineral to deliver excellent result.
One of the advantages of Electric sharpening devices is flexibility and easy control. Some experts do not support the running of a knife through the best automatic knife sharpener due to the fact that it is not as effective as the hand cranked version for sharpening a knife.
You can always buy lol accounts but there is a faster way of creating a League of Legends (LoL) account. League of Legends is remarkable MOBA online game which is free and very captivating.
The LoL gameplay is quite simple, there are 3-5 teams in which a champion is being chosen. The main goal of this game is to advance through your opponent’s defense system and annihilate their HQ (Nexus) which lasts 20-40 minutes. Presently there are 83 champions accessible in LoL, but in other keep the game up to date and exciting a new champion is being introduced into the game once every 3-4 weeks. Each champion has its distinct set of abilities, different status and base statistics which makes them very different from each other. During the gameplay, you get to upgrade your champion’s stats and boost its ability through items you purchase and better still make them more fitted to your specs.
LoL grants you experience and IP as you play more matches and this is a great opportunity for those who are interested in character customizations and level ups outside the match. The purpose of the experience is to enable you to level up your summoner and also IP enables you to purchase new champions and runes. Another goal of this game is to achieve the mastery level 30 which is the max level. As you approach level 30 there are mastery points and rune slots available to unlock. You can now Use those IP to purchase runes and use your mastery points to increase your characters stats such as defense, magic damage, attacks, etc.
Ready to become a LoL player?
LoL is quite similar to various other video games, however, the name used during the game is different from that which you signed up with. As the sign-up name is only used when Logging in. | <urn:uuid:6a36b9a9-ced0-4036-b03b-4b646973f8bd> | {
"date": "2017-09-25T22:15:35",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693459.95/warc/CC-MAIN-20170925220350-20170926000350-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9578865170478821,
"score": 2.828125,
"token_count": 6399,
"url": "http://www.redhoodproject.com/"
} |
INTRODUCTION: Have you ever lost something important? How did you feel when it was found? Have you ever lost a small child, or been lost yourself? What feelings did you have as you searched for a missing infant, or when a missing toddler was found?
Part of the power of the teachings of the Savior was found in his ability to draw spiritual lessons from the common experiences of the people. Try to identify with these parables of the Savior that relate to the emotions of finding something valuable that you have lost?
I. THE SAVIOR TEACHES THE WORTH OF SOULS
Read the parables of the Lost Sheep and the Lost Coin (Luke 15:4-10) As you read, look for words or phrases to highlight in each verse and identify the most important ideas. What idea is repeated in verses 4 and 8? (searching for that which is lost) What idea is repeated in verses 5,6,7,9,& 10? (joy and rejoicing)
1 Then drew near unto him all the publicans and sinners for to hear him.
2 And the Pharisees and scribes murmured, saying, This man receiveth sinners, and eateth with them.
3 And he spake this parable unto them, saying,
4 What man of you, having an hundred sheep, if he lose one of them, doth not leave the ninety and nine in the wilderness, and go after that which is lost, until he find it?
5 And when he hath found it, he layeth it on his shoulders, rejoicing.
6 And when he cometh home, he calleth together his friends and neighbours, saying unto them, Rejoice with me; for I have found my sheep which was lost.
7 I say unto you, that likewise joy shall be in heaven over one sinner that repenteth, more than over ninety and nine just persons, which need no repentance.
8 Either what woman having ten pieces of silver, if she lose one piece, doth not light a candle, and sweep the house, and seek diligently till she find it?
9 And when she hath found it, she calleth her friends and her neighbours together, saying, Rejoice with me; for I have found the piece which I had lost.
10 Likewise, I say unto you, there is joy in the presence of the angels of God over one sinner that repenteth.
Identify the groups who were listening to these parables (Luke 15:1,2) ("publicans and sinners;" "Pharisees and scribes.") Note that explanations of the characteristics of publicans, Pharisees, and scribes can be found in the Bible Dictionary or the Guide to the Scriptures. What do you think the Savior would want each of these groups to learn from these parables? What does he want you to learn?
II. JESUS TEACHES THAT HEAVENLY FATHER REJOICES IN FORGIVING THE REPENTANT
11 And he said, A certain man had two sons:
12 And the younger of them said to his father, Father, give me the portion of goods that falleth to me. And he divided unto them his living.
13 And not many days after the younger son gathered all together, and took his journey into a far country, and there wasted his substance with riotous living.
14 And when he had spent all, there arose a mighty famine in that land; and he began to be in want.
15 And he went and joined himself to a citizen of that country; and he sent him into his fields to feed swine.
16 And he would fain have filled his belly with the husks that the swine did eat: and no man gave unto him.
17 And when he came to himself, he said, How many hired servants of my father's have bread enough and to spare, and I perish with hunger!
18 I will arise and go to my father, and will say unto him, Father, I have sinned against heaven, and before thee,
19 And am no more worthy to be called thy son: make me as one of thy hired servants.
20 And he arose, and came to his father. But when he was yet a great way off, his father saw him, and had compassion, and ran, and fell on his neck, and kissed him.
21 And the son said unto him, Father, I have sinned against heaven, and in thy sight, and am no more worthy to be called thy son.
22 But the father said to his servants, Bring forth the best robe, and put it on him; and put a ring on his hand, and shoes on his feet:
23 And bring hither the fatted calf, and kill it; and let us eat, and be merry:
24 For this my son was dead, and is alive again; he was lost, and is found. And they began to be merry .
As you read Luke 15:11-24, you may wish to ponder the following points:
1. The younger son traveled to a "far country". What do these "far countries" represent in our world? (15:13)
2. What happens to the son in the "far country" (15:13)? What happens to us when we leave the Father's influence and journey to a "far country"?
3. How much is required of those who journey there? (15:14--"he spent all.")
4. When the prodigal had spent all and was in want, who in this far country, which is often typified as Babylon, cared about him? (15:15,16) How does this apply to us? (See Alma 30:60)
5. As a result of these conditions, what does the son decide to do? (Luke 15:17- 19,21). How is the son's attitude an example of true repentance?
Do not overlook the fact that it is in part the recollection of a great father that encourages this boy to return home. Then think about the response of the father to the repentance and return of his son. How is his response like the response of our Father in Heaven when we repent? What does the father do when he sees his son? (15:20). How close is the son when the father runs to him? (15:20). Does the father treat the returning prodigal like a servant or a son? One commentary on this parable pointed out that slaves did not wear shoes. They were reserved for family members. The ring was a symbol of power. And then there is the robe. What sort of robe does the father give to this returning prodigal? Why the best robe? What does the response of the father have in common with the first two parables in this chapter? (15:21-24).
Remember the groups who are listening to these parables (Luke 15: 1,2). What would the Savior want each of these groups to learn from this the parable of the prodigal son?
Many years ago a young lady shared this experience with me. She is a remarkable disciple, and her life has come to typify the highest levels of Christian conduct and goodness, but for a time in Junior High and High School, she strayed from the straight and narrow path and became lost, like the coin, the lamb, and the prodigal son.
Following her high school experiences, she traveled to Wyoming to work for a summer on a "Dude Ranch" near Jackson Hole. Her parents were not pleased to have he so far away, but both recognized that their major function at that time was to extend love and support. Even though she had been continually willing to talk to them, to admit her transgressions and weaknesses, she had ceased being willing to listen to their counsel. And so she went.
She did not go un-loved, nor un-tutored. A marvelous bishop had worked with her for years, and the teachings of her parents had found a responsive, although often subdued, chord in her life. Thus, even when she did things that were wrong, she knew that they were wrong, and struggled with the differences between her beliefs and her actions.
One evening she left the girls' dorm at the ranch. She was on the way to the Wranglers' Dorm—the dormitory where the young men employed by the ranch made their summer homes. She knew as she walked along that what she intended to do she should not do, and a part of her did not want to go on. But another, and usually stronger part, did. She told me that as she walked, she began to pray: "Heavenly Father, why don't you stop me."
And she got an answer. A message came clearly to her heart, a message something like this: "Daughter, I can't stop you. But if you will stop yourself, and turn around, I will help you."
She was so surprised by this unexpected response that she stopped walking. (She described this to me in great detail) She said, "I stopped, and then slowly turned around until I was facing back the way I had come. And for the first time in months, perhaps years, I felt the Spirit in my heart. It was as though the Father was by my side. I began to walk to back to my own room, and I was not alone." It was at that moment that her life began to change. As soon as she turned around and started home, "[her] Father saw [her], and had compassion, and ran, and fell on [her] neck, and kissed [her]." (Luke 15:20) He then made the journey home by her side.
“The boy in the parable wanted only to be a servant in his father’s house, but his father, seeing him afar off, ran to meet him and kissed him, put a robe on his back, a ring on his hand, and shoes on his feet, and had a feast prepared for him.
“So it will be with you. If you will take the first timid step to return, you will find open arms to greet you and warm friends to make you welcome” (Gordon B. Hinckley, “Everything to Gain—Nothing to Lose,” Ensign, Nov. 1976, 95).
This young woman later married to wonderful young man, a returned missionary, in the Salt Lake Temple. She must have felt the power of the Spirit and the overflowing love--the rejoicing--of the Father and his angels as she knelt there in that holy place, clean and worthy and beautiful beyond words. The Father had brought forth the robe and the ring and the shoes, and killed the fatted calf to welcome her home.
There is of course another son in the parable. He is the faithful, diligent, steady son, home with the livestock and the problems of the farm while his younger brother “wasted his substance with riotous living” (Luke 15:13) and “devoured [his father’s] living with harlots . . .” (Luke 15:30). A trace of bitterness in him is not a great surprise. We are all like him to some degree. Jeffrey R. Holland spoke of this regrettable tendency.
“As others seem to grow larger in our sight, we think we must therefore be smaller. So, unfortunately, we occasionally act that way. How does this happen, especially when we wish so much that it would not? I think one of the reasons is that every day we see allurements of one kind or another that tell us what we have is not enough. Someone or something is forever telling us we need to be more handsome or more wealthy, more applauded or more admired than we see ourselves as being. We are told we haven’t collected enough possessions or gone to enough fun places. We are bombarded with the message that on the world’s scale of things we have been weighed in the balance and found wanting. Some days it is as if we have been locked in a cubicle of a great and spacious building where the only thing on the TV is a never-ending soap opera entitled Vain Imaginations” (“The Other Prodigal,” Ensign, May 2002, 62 ff).
25 Now his elder son was in the field: and as he came and drew nigh to the house, he heard musick and dancing.
26 And he called one of the servants, and asked what these things meant.
27 And he said unto him, Thy brother is come; and thy father hath killed the fatted calf, because he hath received him safe and sound.
28 And he was angry, and would not go in: therefore came his father out, and intreated him.
29 And he answering said to [his] father, Lo, these many years do I serve thee, neither transgressed I at any time thy commandment: and yet thou never gavest me a kid, that I might make merry with my friends:
30 But as soon as this thy son was come, which hath devoured thy living with harlots, thou hast killed for him the fatted calf.
31 And he said unto him, Son, thou art ever with me, and all that I have is thine.
32 It was meet that we should make merry, and be glad: for this thy brother was dead, and is alive again; and was lost, and is found.
Ponder attitude of the older son. Why does he feel the way he does? What does the father say to alleviate the son's concerns? What does the father say to the older son? (Luke 15:31) Should the younger son be given the opportunity to regain his wasted inheritance? Have you ever encountered an attitude in the church today that would be similar to the attitude of the older son. What is the older son afraid of if the younger son is allowed to return to the family?
Reflect on the great leaders in the Book of Mormon who rebelled and then later returned, much as the prodigal son. (Alma the Younger, 4 sons of Mosiah, etc ). What hope does this parable, and the testimony of these men, offer to the "prodigal sons" of today? In what way are we all prodigal sons?
Why is it that we sometimes want our mortal experiences to be evaluated like sums in a math class: "You were bad a total of 72 times and good only 64. Therefore, you are more bad than good and you can go to Hell!" This is not the manner in which the Father and the Son calculate our preparation for salvation. Their only concern is, "What are you?" Not, "what were you." Read Isaiah 1:18; Ezekiel 18:21,22; Isaiah 43:25; Mosiah 26:30. What do these verses tell you about the importance the Lord places on past mistakes when we repent? What must we be willing to do when those apparently less worthy than ourselves return to be with us and among us? Why is this sometimes so hard to do.
“Who is it that whispers so subtly in our ear that a gift given to another somehow diminishes the blessings we have received? Who makes us feel that if God is smiling on another, then He surely must somehow be frowning on us? You and I both know who does thisCit is the father of all lies. 3 It is Lucifer, our common enemy, whose cry down through the corridors of time is always and to everyone, ‘Give me thine honor’” (“The Other Prodigal,” Ensign, May 2002, 62 ff; read the whole talk).
What does Luke 17:3,4 suggest as a proper attitude for all who are privileged to welcome back a returning prodigal? How often is the Lord willing to forgive the repentant? How often does he instruct us to forgive? (Mosiah 26:30; Moroni 6:8; D&C 64:9-11; Matt. 18:21,22, etc.)
Since the Father is so willing to forgive us, there are certain things the scriptures say we should do. One of those things is illustrated by the story of the 10 men with leprosy.
III. A MAN WHOM JESUS HAS HEALED OF LEPROSY RETURNS TO THANK HIM.
11 And it came to pass, as he went to Jerusalem, that he passed through the midst of Samaria and Galilee.
12 And as he entered into a certain village, there met him ten men that were lepers, which stood afar off:
13 And they lifted up their voices, and said, Jesus, Master, have mercy on us.
14 And when he saw them, he said unto them, Go shew yourselves unto the priests. And it came to pass, that, as they went, they were cleansed.
15 And one of them, when he saw that he was healed, turned back, and with a loud voice glorified God,
16 And fell down on his face at his feet, giving him thanks: and he was a Samaritan.
17 And Jesus answering said, Were there not ten cleansed? but where are the nine?
18 There are not found that returned to give glory to God, save this stranger.
19 And he said unto him, Arise, go thy way: thy faith hath made thee whole.
Read in Luke 17: 11-19 the story of these ten lepers. There is much about these ten that can teach us. Note that they meet the Savior as he enters into the village. Their disease prevents them from the normal associations that almost all men long for. And they must lift up their voices to speak to him. They must be pleading with great earnestness, but they are also keeping their distance. They are considered contagious. How often do the sins of unhappy people keep them far away from the very experiences that might bring them peace?
What does this story suggest we should do when we need to be healed. What should we do when the Savior heals us physically or spiritually? Why do you think nine of those with leprosy did not return to give thanks? This experience from my mission has helped me understand something about giving thanks.
"Much of my childhood my mother spent on her knees. She was not giving thanks. She was praying for strength. I was trouble with a capital ‘T .’ Dad always said I was the rock-throwingest kid in the history of America, and there were broken windows and cracked windshields enough to prove it. When I discovered Mom liked flowers, I picked three hundred tulips from a neighbor's yard and delivered them to her. I shut down a construction company one weekend when I discovered that the workers left the keys with the equipment and I decided to add to my collection. I wasn't wicked, but I was a ton of trouble.
"Still, I loved the Church and I looked forward to my mission. After several months in the field, I wrote home to tell Mom that I had been called to a leadership position. I thought she would be proud. When she answered my letter, she began like this: 'When I got your letter, I began a fast. ..'
"A fast? Why a fast? I thought. I wrote home once to tell my mother I was going to have a routine physical examination. She put my name on the prayer roll. Now she had received a letter containing what she should have considered good news, and she fasted! Her letter continued: " ...because I wanted to get as close as I could to my Father in Heaven, so that I could tell him how grateful I am for what he has done for you in your life. She fell on her face at his feet, "giving him thanks" (Luke 17:16) [Rending the Veil of Heaven, by Ted L. Gibbons, p. 45].
Pres. Boyd K. Packer taught
“The gospel teaches us that relief from torment and guilt can be earned through repentance. Save for those few who defect to perdition after having known a fullness, there is no habit, no addiction, no rebellion, no transgression, on offense exempted from the promise of complete forgiveness. ..I repeat, save for the exception of the very few who defect to perdition, there is no habit, no addiction, no rebellion, no transgression, no apostasy, no crime exempted from the promise of complete forgiveness. That is the promise of the atonement of Christ” (Conference Report, Oct. 1995, pp. 22,23).
But there is still a price to be paid for time away from the straight and narrow path. We must not find in the kindness—the mercy and grace—of the Savior a license to sin, but rather a longing to stay close to the love of Lord.
“But please do not misunderstand the true meaning of the scriptures. One may not wallow in the mire of filth and sin and conduct his life in a manner unlawful in the sight of God and then suppose that repentance will wipe out the effects of his sin and place him on the level he would have been on had he always lived a righteous and virtuous life. The Lord extends loving merry and kindness in forgiving you of the sins you commit against Him or His work, but He can never remove the results of the sin you have committed against yourself in thus retarding your own advancement toward your eternal goal” (Harold B. Lee, Stand Ye In Holy Places, p.221). | <urn:uuid:d57a5ea0-3cb1-4d5c-8d57-ce046cd688f7> | {
"date": "2017-06-23T06:51:17",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9826419353485107,
"score": 2.625,
"token_count": 4536,
"url": "http://www.ldsliving.com/New-Testament-Lesson-18-He-Was-Lost-and-Is-Found-/s/78524"
} |
What You May Not Know About Bed Rails
Photo: Steven Miles, MD
December 24, 2012
ST. PAUL, Minn. - In the past decade, more than 150 people have been killed and thousands have been severely injured when they became trapped in side rails used to prevent them from rolling out of bed. Dr. Steven Miles at the Center for Bioethics at the University of Minnesota says the government has been aware of the problem for more than a decade.
"A minimum of 36,000 persons have been transported to emergency rooms for injuries caused when limbs or their head gets stuck in a rail, but they don't die. In some cases, those lead to fractures or other soft-tissue injuries."
Miles says this is an entirely preventable problem. He says part of the problem is that the Consumer Product Safety Commission and the Food and Drug Administration are arguing about which of them has authority to recommend changes to the companies that make bed rails.
The issue is compounded by the components of the typical elderly patient bed, he explains.
"The problem is that the mattress lasts about 3 years, the rails last about 7 years, and the bed lasts about 15 years. So, during the life of these products, they're constantly being mixed and matched, with different mattresses being put on the bed, and so forth."
Since Miles first alerted federal regulators to the problem in 1995, about 550 bed-rail deaths have occurred. He says the manufacturers have not been emphasizing getting a safe product to the consumer.
"The emphasis has been on 'buyer beware.' And the question of whether the FDA and the Consumer Product Safety Commission are going to shift from 'buyer beware' to get a safe product to the end users is exactly where the regulatory fight is right now."
Miles points out that with the growing population of elderly Americans, the problem will continue to grow, unless more stringent safety standards are enforced. | <urn:uuid:73cc2d7b-2c14-494a-943f-fae074f27c83> | {
"date": "2015-10-09T12:12:55",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737929054.69/warc/CC-MAIN-20151001221849-00084-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9640591144561768,
"score": 2.8125,
"token_count": 395,
"url": "http://www.publicnewsservice.org/index.php?/content/article/29840-1"
} |
UNEP Launches Green Passport Initiative to Reduce Environmental Impacts of 2014 World Cup in Brazil Tue, May 27, 2014
The campaign also features the Green Passport Tours- 60 tour options at and around each one of the twelve host cities of the 2014 FIFA World Cup, which encourage travelers to choose more sustainable practices, such as public transportation and local cultural experiences.
Brasília, 27 May 2014 - The United Nations Environment Programme (UNEP) and Brazil's ministries of Environment, Sports, Tourism and Social Development today launched the 2014 edition of the Green Passport initiative, which is an online mobile application aimed at promoting sustainable tourism during the 2014 World Cup in Brazil and beyond.
"Launched ahead of the FIFA World Cup, the Green Passport campaign hopes to leverage the event's immense popularity among millions of fans worldwide to promote a greener and more responsible travel culture; one that promotes attitudes and practices that are respectful of the environment and that support economic and social development at the host destination," said UN Under-Secretary-General and UNEP Executive Director Achim Steiner.
"With tourism being one of the fastest growing economic sectors globally and substantial expansion predicted, especially for emerging destinations,the main focus of UNEP's work is to reverse the negative environmental impacts of a business as usual scenario. We want to encourage greater sustainability within the tourism supply chain and relevant sectors. This will translate into sustainable economic growth, better employment opportunities and healthier ecosystems."
In 2012, UNEP and Brazil agreed to work together on incorporating sustainability concerns into the World Cup. The Green Passport can be downloaded as an application or used online, and gives a wealth of advice to tourists on how to minimize their environmental impact while in Brazil.
Beyond responsible tourism tips, the campaign features the Green Passport Tours- 60 tour options at and around each one of the twelve host cities of the 2014 FIFA World Cup, which encourage travelers to choose more sustainable practices, such as public transportation and local cultural experiences. Tourists may also recommend establishments engaged in the campaign, using sustainable criteria.
By developing activities focused on sustainable production and consumption, the campaign involves the Brazilian tourism sector in activities such as Sustainability Journeys- workshops to engage hotels, bars and restaurants in eco-efficiency practices in five host cities (Brasilia, Belo Horizonte, Rio de Janeiro, Salvador and São Paulo)- and the Green Passport Pledge, which invites the tourism sector to commit to more sustainable practices.
Through the campaign website, self-assessments can be carried out. The results will indicate how a company can commit to adopt and/or improve sustainability practices.
"The Green Passport campaign brings the word sustainability to the ordinary citizen. The campaign is a new format to promote sustainable tourism, showing that everyone can change their behavior with simple attitudes while travelling," said the Minister of the Environment of Brazil, Ms. Izabella Teixeira.
The campaign was presented alongside other sustainability initiatives from the Brazilian government. Ms. Teixeira, the Minister of Sports, Mr. Aldo Rebelo, and the Minister of Tourism, Ms. Vinicius Lages, hosted the event. The Minister of Social Development and Fight Against Hunger, Ms. Tereza Campello, showcased the Sustainable Organic Brazil campaign.
Note to Editors
About the Green Passport campaign - Created in 2008, the Green Passport campaign emerged as a partnership between UNEP, the Ministries of Environment and Tourism of Brazil, the French Ministry of the Environment and Sustainable Development and other partners. It is currently available in countries such as Brazil, Costa Rica, Ecuador, South Africa and South Korea. The campaign is already an international reference in the dissemination of information on sustainable tourism.
The 2014 edition in Brazil has the support of the Ministry of Environment, Ministry of Sports, Ministry of Tourism and Ministry of Social Development and Fight Against Hunger. The campaign also includes a partnership with UNICEF (United Nations Fund for Childhood), UNESCO (United Nations Educational, Scientific and Cultural Organization), ILO (International Labour Organization), UNAIDS - Joint United Nations Programme on HIV/AIDS, UNODC (United Nations Office on Drugs and Crime), BRAZTOA (Brazilian Association of Tourism Operators) and FAS (Sustainable Amazon Foundation). Sustainability Journeys, an integral part of the campaign, are conducted with the sponsorship of Itaú Unibanco.
For more information, please contact:
UNEP Office in Brazil - +55 61 3038.9237
João Gonçalves - [email protected]
Marcelo Tavela - [email protected] or
Karishma Thethy - [email protected]
comments powered by | <urn:uuid:3b023100-16ec-404a-aff7-04350cc8b9d4> | {
"date": "2016-06-25T23:07:25",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00026-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9127542972564697,
"score": 2.5625,
"token_count": 975,
"url": "http://unep.org/newscentre/default.aspx?DocumentID=2788&ArticleID=10866&l=en"
} |
I'm a provider
You will be redirected to myBlue. Would you like to continue?
Please wait while you are redirected.
Please enter a username and password.
Deep brain stimulation (DBS) involves the stereotactic placement of an electrode into the brain (ie, hypothalamus, thalamus, globus pallidus, subthalamic nucleus). DBS is used as an alternative to permanent neuroablative procedures for control of essential tremor and Parkinson disease. DBS is also being evaluated for the treatment of a variety of other neurologic and psychiatric disorders.
Deep brain stimulation has been investigated as an alternative to permanent neuroablative procedures, such as thalamotomy and pallidotomy. The technique has been most thoroughly investigated as an alternative to thalamotomy for unilateral control of essential tremor (ET) and tremor associated with Parkinson disease (PD). More recently, there has been research interest in the use of deep brain stimulation of the globus pallidus or subthalamic nucleus as a treatment of other parkinsonian symptoms, such as rigidity, bradykinesia, or akinesia. Another common morbidity associated with PD is the occurrence of motor fluctuations, referred to as "on and off" phenomena, related to the maximum effectiveness of drugs (i.e., the “on” state) and the nadir response during drug troughs (i.e., the “off” state). In addition, levodopa, the most commonly used anti-Parkinson drug, may be associated with disabling drug-induced dyskinesias. Therefore, the optimal pharmacologic treatment of PD may involve a balance between optimal effects on PD symptoms versus the appearance of drug-induced dyskinesias. The effect of deep brain stimulation (DBS) on both Parkinson's symptoms and drug-induced dyskinesias has also been studied.
DBS has also been investigated in patients with primary and secondary dystonia, defined as a neurologic movement disorder characterized by involuntary muscle contractions, which force certain parts of the body into abnormal, contorted, and painful movements or postures. Dystonia can be classified according to age of onset, bodily distribution of symptoms, and cause. Age of onset can occur during childhood or during adulthood. Dystonia can affect certain portions of the body (focal dystonia and multifocal dystonia) or the entire body (generalized dystonia). Torticollis is an example of a focal dystonia. Primary dystonia is defined when dystonia is the only symptom unassociated with other pathology. Treatment options for dystonia include oral or injectable medications (i.e., botulinum toxin) and destructive surgical or neurosurgical interventions (i.e., thalamotomies or pallidotomies) when conservative therapies fail. Secondary dystonia is a dystonia brought on by an inciting event, such as a stroke, trauma, or drugs. Tardive dystonia is a form of drug-induced secondary dystonia.
DBS has been investigated in patients with chronic cluster headaches. Cluster headaches occur as episodic attacks of severe pain lasting from 30 minutes to several hours. The pain is usually unilateral and localized to the eye, temple, forehead, and side of the face. Autonomic symptoms that occur with cluster headaches include ipsilateral facial sweating, flushing, tearing, and rhinorrhea. Cluster headaches occur primarily in men and have been classified as vascular headaches that have been associated with high blood pressure, smoking, alcohol use, etc. However, the exact pathogenesis of cluster headaches is uncertain. Positron emission tomography (PET) scanning and magnetic resonance imaging (MRI) have shown the hypothalamic region may be important in the pathogenesis of cluster headaches. Alterations in hormonal/serotonergic function may also play a role. Treatment of cluster headaches includes pharmacologic interventions for acute episodes and prophylaxis, sphenopalatine ganglion (SPG) blockade, and surgical procedures such as percutaneous SPG radiofrequency rhizotomy, and gamma knife radiosurgery of the trigeminal nerve.
The role of DBS in treatment of other treatment-resistant neurologic and psychiatric disorders, particularly Tourette syndrome, epilepsy, obsessive-compulsive disorder, and major depressive disorders, is also being investigated. Ablative procedures are irreversible and, though they have been refined, remain controversial treatments for intractable illness. Interest has shifted to neuromodulation through DBS of nodes or targets within neural circuits involved in these disorders. Currently, a variety of target areas are being studied.
DBS involves the stereotactic placement of an electrode into the brain (i.e., hypothalamus, thalamus, globus pallidus, or subthalamic nucleus). The electrode is initially attached to a temporary transcutaneous cable for short-term stimulation to validate treatment effectiveness. Several days later, the patient returns to surgery for permanent subcutaneous implantation of the cable and a radiofrequency-coupled or battery-powered programmable stimulator. The electrode is typically implanted unilaterally on the side corresponding to the most severe symptoms. However, the use of bilateral stimulation using 2 electrode arrays has also been investigated in patients with bilateral, severe symptoms. After implantation, noninvasive programming of the neurostimulator can be adjusted to the patient's symptoms. This feature may be important for patients with PD, whose disease may progress over time, requiring different neurostimulation parameters. Setting the optimal neurostimulation parameters may involve the balance between optimal symptom control and appearance of adverse effects of neurostimulation, such as dysarthria, disequilibrium, or involuntary movements.
In 1997, the Activa® Tremor Control System (Medtronic) was cleared for marketing by the U.S. Food and Drug Administration (FDA) for deep brain stimulation. The original FDA-labeled indications were limited to unilateral implantation of the device for the treatment of tremor, but, in January 2002, the FDA-labeled indications were expanded to include bilateral implantation as a treatment to decrease the symptoms of advanced Parkinson disease that are not controlled by medication. In April 2003, the labeled indications were expanded to include “unilateral or bilateral stimulation of the internal globus pallidus or subthalamic nucleus to aid in the management of chronic, intractable (drug refractory) primary dystonia, including generalized and/or segmental dystonia, hemidystonia and cervical dystonia (torticollis) in patients seven years of age or above.” This latter indication received FDA approval through the Humanitarian Device Exemption process. The Activa® Tremor Control System consists of the following components: the implantable neurostimulator, the deep brain stimulator lead, an extension that connects the lead to the power source, a console programmer, a software cartridge to set electrical parameters for simulation, and a patient control magnet, which allows the patient to turn the neurostimulator on and off, or change between high and low settings.
The Vercise™ Deep Brain Stimulation System (Boston Scientific) is currently available in Europe, Israel, and Australia. Completion of a large U.S. multicenter trial (INTREPID) is expected in 2021.
In February 2009, the Reclaim® device (Medtronic), a deep brain stimulatory, was cleared for marketing by FDA through the Humanitarian Device Exemption (HDE) process for the treatment of severe obsessive-compulsive disorder (OCD).
Note: The use of spinal cord stimulation as a treatment of chronic pain is addressed in a separate policy, Spinal Cord Stimulation.
Unilateral deep brain stimulation of the thalamus may be considered medically necessary in patients with disabling, medically unresponsive tremor due to essential tremor or Parkinson’s disease.
Bilateral deep brain stimulation of the thalamus may be considered medically necessary in patients with disabling, medically unresponsive tremor in both upper limbs due to essential tremor or Parkinson disease.
Unilateral or bilateral deep brain stimulation of the globus pallidus or subthalamic nucleus may be considered medically necessary in the following patients:
Deep brain stimulation for other movement disorders, including but not limited to multiple sclerosis, post-traumatic dyskinesia, and tardive dyskinesia, is considered investigational.
Deep brain stimulation for the treatment of chronic cluster headaches is considered investigational.
Deep brain stimulation for the treatment of other psychiatric or neurologic disorders, including but not limited to Tourette syndrome, depression, obsessive-compulsive disorder, Alzheimer disease, anorexia nervosa, alcohol addiction, chronic pain, and epilepsy, is considered investigational.
POLICY EXCEPTIONSFederal Employee Program (FEP) may dictate that all FDA-approved devices, drugs or biologics may not be considered investigational and thus these devices may be assessed only on the basis of their medical necessity.
The coverage guidelines outlined in the Medical Policy Manual should not be used in lieu of the Member's specific benefit plan language.
Disabling, medically unresponsive tremor is defined as all of the following:
Contraindications to deep brain stimulation include:
At the present time, there is only one device that has been approved by the U.S. Food and Drug Administration (FDA) for deep brain stimulation: the Activa Tremor Control SystemTM, manufactured by Medtronic Corp., MN. This system consists of the following components: the implantable pulse generator (Itrel7 II), the deep brain stimulator lead (DBSJ Lead), an extension that connects the lead to the power source (Model 7495 Extension), a console programmer (Model 7432 Console Programmer), a software cartridge to set electrical parameters for simulation (MemoryMod7), and a patient control magnet, which allows the patient to turn the pulse generator on and off or change between high and low settings.
Medically Necessary is defined as those services, treatments, procedures, equipment, drugs, devices, items or supplies furnished by a covered Provider that are required to identify or treat a Member's illness, injury or Nervous/Mental Conditions, and which Company determines are covered under this Benefit Plan based on the criteria as follows in A through D:
A. consistent with the symptoms or diagnosis and treatment of the Member's condition, illness, or injury; and
B. appropriate with regard to standards of good medical practice; and
C. not solely for the convenience of the Member, his or her Provider; and
D. the most appropriate supply or level of care which can safely be provided to Member. When applied to the care of an Inpatient, it further means that services for the Member's medical symptoms or conditions require that the services cannot be safely provided to the Member as an Outpatient.
For the definition of Medically Necessary, “standards of good medical practice” means standards that are based on credible scientific evidence published in peer-reviewed medical literature generally recognized by the relevant medical community, and physician specialty society recommendations, and the views of medical practitioners practicing in relevant clinical areas and any other relevant factors. BCBSMS makes no payment for services, treatments, procedures, equipment, drugs, devices, items or supplies which are not documented to be Medically Necessary. The fact that a Physician or other Provider has prescribed, ordered, recommended, or approved a service or supply does not in itself, make it Medically Necessary.
Investigative is defined as the use of any treatment procedure, facility, equipment, drug, device, or supply not yet recognized as a generally accepted standard of good medical practice for the treatment of the condition being treated and; therefore, is not considered medically necessary. For the definition of Investigative, “generally accepted standards of medical practice” means standards that are based on credible scientific evidence published in peer-reviewed medical literature generally recognized by the relevant medical community, and physician specialty society recommendations, and the views of medical practitioners practicing in relevant clinical areas and any other relevant factors. In order for equipment, devices, drugs or supplies [i.e, technologies], to be considered not investigative, the technology must have final approval from the appropriate governmental bodies, and scientific evidence must permit conclusions concerning the effect of the technology on health outcomes, and the technology must improve the net health outcome, and the technology must be as beneficial as any established alternative and the improvement must be attainable outside the testing/investigational setting.
POLICY HISTORY5/1998: Issued
12/4/2000: Code reference section updated
5/2001: Reviewed by Medical Policy Advisory Committee (MPAC); DBS for treatment of dystonia considered investigational.
2/13/2002: Investigational definition added
3/6/2002: "The procedure must be performed in a BCBSMS approved center" deleted
4/18/2002: Type of Service and Place of Service deleted
5/6/2002: Code Reference section updated, CPT code 61855 deleted
5/2002: Reviewed by MPAC; broader indications for otherwise untreatable Parkinsonism is medically necessary, Sources updated
5/29/2002: Code Reference section updated, HCPCS C1767, C1816 added
3/11/2004: Code Reference section updated, CPT code range 61850-61888 listed separately, HCPCS C1767, C1816, E0751, E0753 deleted, non-covered ICD-9 diagnosis codes 333.0, 333.6, 333.7, 340 deleted
7/21/2005: Reviewed by MPAC, added "DBS for obsessive compulsive disorder is considered investigational."
10/17/2005: Code Reference table updated, codes 95978, 95979 added. Change description of 95970, 95971, 95972, 95973, 95974, 95975.
11/15/2005: ICD9 procedure codes 86.97, 86.98 added
3/13/2006: Policy reviewed, no changes
03/22/2006: Coding updated. HCPCS 2006 revisions added to policy
9/18/2007: Policy reviewed, no changes
12/31/2008: Code reference section updated per 2009 CPT/HCPCS revisions
8/18/2010: Policy description section updated, medically necessary indications for globus pallidus or subthalamic nucleus, primary dystonia, including generalized and segmental dystonia, hemidystonia and cervical dystonia (torticollis) added to policy statment section. FEP verbiage added to the Policy Exceptions section. Detailed information regarding disabling, medically unresponsive tremor and contraindications of deep brain stimulation added to policy guidelines. Added ICD-9 codes 333.6, 333.79, 333.83 and 333.89.
08/11/2011: Policy reviewed; policy statement unchanged. Deleted outdated references from the Sources section.
07/17/2012: Policy reviewed; no changes.
11/15/2013: Added anorexia nervosa, alcohol addiction, and chronic pain as investigational indications for deep brain stimulation.
12/31/2014: Code Reference section updated to revise the description of the following CPT code: 95972.
01/12/2015: Policy description updated regarding secondary dystonia and devices. Added the following policy statement: Bilateral deep brain stimulation of the thalamus may be considered medically necessary in patients with disabling, medically unresponsive tremor in both limbs due to essential tremor or Parkinson disease. Added Alzheimer disease as an investigational indication for deep brain stimulation.
08/25/2015: Code Reference section updated to add ICD-10 codes. Removed ICD-9 procedure code 01.24. Updated the code descriptions for 01.22, 02.93, 61885, and 61886. Removed deleted code 64573 from the policy and replaced with 64568.
12/31/2015: Policy guidelines updated to add medically necessary and investigative definitions. Code Reference section updated to revise the description for CPT code 95972.
05/31/2016: Policy number added. Removed deleted CPT code 61875 from the Code Reference section.
07/06/2016: Policy description updated. Medically necessary statement regarding bilateral deep brain stimulation updated to add "upper" to clarify that the statement refers to both upper limbs.
SOURCE(S)Blue Cross Blue Shield Association policy # 7.01.63
CODE REFERENCEThis may not be a comprehensive list of procedure codes applicable to this policy.
The code(s) listed below are ONLY medically necessary if the procedure is performed according to the "Policy" section of this document. | <urn:uuid:b83e9f9d-88ee-45f8-99af-f55f9fa5f27a> | {
"date": "2016-08-25T07:56:25",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292975.73/warc/CC-MAIN-20160823195812-00096-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8992921710014343,
"score": 2.546875,
"token_count": 3510,
"url": "http://www.bcbsms.com/index.php?q=provider-medical-policy-search.html&action=viewPolicy&path=%2Fpolicy%2Femed%2FDeep_Brain_Stimulation.html&source=emed"
} |
Treatment-Resistant Bipolar Disorder
Treatment of bipolar illness involves four primary aims: treatment of mania, treatment of depression, prevention of manic recurrences, and prevention of depressive recurrences. Lithium has come to be regarded as the treatment of choice for bipolar illness, since double-blind controlled trials have demonstrated its efficacy for all four treatment goals (Goodwin et al. 1969; Maggs 1963; Stallone et al. 1973; Stokes et al. 1971). The concept of treatment resistance is often applied to bipolar illness when one or more of these goals are not achieved despite adequate treatment with lithium or another appropriate medication.
Kraepelin’s (1921) naturalistic data suggested that, if untreated, many individuals with bipolar disorder are likely to have one or more acute episodes yearly. Kraepelin believed that resolution of mood symptoms with complete restitution of functioning was the defining feature of the illness. As applied to bipolar illness, treatment resistance can be defined as failure to effect recovery from an episode within a reasonable time frame despite receiving adequate treatment and/or as failure to prevent recurrences despite institution of appropriate prophylactic regimens.
Estimating the prevalence of treatment-resistant bipolar illness is hampered by the clinical complexity of the illness. Research on unipolar illness has been aided by relatively straightforward definitions of recovery, relapse, and recurrence. However, the nature of bipolar illness, with its various irregular episodic courses and the potential for mislabeling a switch in polarity as recovery from the preceding phase, makes it inappropriate to apply the same definitions to bipolar illness. Thus, the absence of consensus regarding appropriate definitions of recovery and treatment resistance continues to present a significant obstacle to research in this important public health problem. Even interpreting the available literature can be frustrating.
Typical of the conundrums presented by patients with bipolar disorder is the treatment of rapid cycling. Studies of treatment outcome may define recovery or marked improvement in rapid cycling as the cessation (or near cessation) of the occurrence of new episodes. This definition appears reasonable but fails to distinguish treatment success (euthymia without functional impairment) from a clear treatment failure (the induction of a prolonged depression). Furthermore, interpreting the results of interventions for any particular phase of rapid cycling is always clouded by the possibility that the improvement is merely part of the natural transition of the illness to the next episode.
Prevalence estimates for treatment-resistant bipolar illness are highly dependent on the definition chosen. The duration of acute episodes and the frequency of recurrence provide two reasonable and distinct measures of treatment response. First, the median duration of acute episodes provides a context for defining treatment resistance. Keller et al. (1986) followed the course of illness in 155 patients during open naturalistic treatment. The reported median duration of acute episodes was 10 weeks for pure mania, 19 weeks for pure depression, and 36 weeks for mixed episodes.
Since the time of Kraepelin, longitudinal studies have informed us that recurrence rather than sustained remission is the rule. Many patients diagnosed in adolescence could expect to have 10 or more acute episodes during their lifetimes (Carlson et al. 1974; Fukuda et al. 1983; Kraepelin 1921; Perris 1968; Zis et al. 1980). The enormous variation between individuals limits the usefulness of predicted averages of duration of episodes and cycle frequency in determining whether a given patient has treatment-resistant bipolar illness. For more consistency in diagnosis, we offer the following definitions for treatment-refractory bipolar illness:
• Treatment-refractory mania: Mania without remission despite 6 weeks of adequate therapy with at least two antimanic agents used together (lithium, antipsychotic, anticonvulsant, etc.) in the absence of antidepressants or other mood-elevating agents.
• Treatment-refractory bipolar depression: Depression without remission despite two adequate antidepressant treatment trials including at least one augmentation strategy.
• Treatment-refractory mood cycling: Continued cycling despite maximal tolerated lithium combined with valproate and/or carbamazepine for a period of three times the cycle length and not less than 6 months in the absence of antidepressants or other cycle-promoting agents.
• Recovery from acute episode: A period of at least 8 weeks with sustained remission of mood symptoms. During the first 8 weeks of recovery, remission is characterized by no more than 1 day in any week with significant mood abnormality (depression, lack of interest, irritability, expansiveness, euphoria), no more than two neurovegetative symptoms, and an Axis V (Global Assessment of Functioning) rating above 60.
Fortunately, the vast majority of acute episodes appear to be treatment-responsive. Sachs et al. (1994b) reported the course of illness during a year of open treatment for 100 unselected outpatients with bipolar disorder. During the follow-up year, 58% experienced one or more new acute episodes and 32% remained euthymic. As Kraepelin might have expected, however, all but 10% met the criteria for recovery at some time during the follow-up year.
Chronicity, defined as no recovery during 1 year of follow-up, provides a measure of treatment resistance among patients who experience new acute episodes. Several studies provide estimates of the incidence of treatment resistance based on chronicity of acute episodes during open naturalistic treatment. Keller et al. (1986) reported a 20% chronicity rate among patients after an acute episode. At 18-month follow-up, pure mania had the lowest rate of chronicity (8%), followed by pure bipolar depressive episodes (22%). The highest rate of chronicity (38%) was found among patients with a mixed index episode. Coryell et al. (1989) studied patients with type II bipolar disorder and found that as many as 10% remained ill for 5 years or longer. Failure of prophylaxis is the most common problem seen in clinical practice, but treatment-resistant acute episodes may be a significant problem as well, because one out of every four or five acute episodes appears to follow a chronic course.
Revision date: July 3, 2011
Last revised: by Jorge P. Ribeiro, MD | <urn:uuid:939267b1-7fd7-4308-ae5c-323ec26e1d54> | {
"date": "2017-03-25T23:49:11",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189088.29/warc/CC-MAIN-20170322212949-00451-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9307867884635925,
"score": 2.890625,
"token_count": 1269,
"url": "http://www.health.am/psy/more/treatment_resistant_mood_disorders15/"
} |
A Visual Language of Migration
Immigrants themselves, they now devote their time to giving a voice to fellow immigrants. The artists' collective group Migrantas takes drawings and turns them into compelling pictograms. Nimet Seker sketches a portrait of the group
Three posters stand side by side in the Kreuzberg area of Berlin. One pink, one blue, one yellow. On the first, two figures stand face-to-face. One poses the question: "Are we different?"
The second shows a solitary figure, who, with lowered head surveys her rounded belly. The line beneath reads: "Where will it belong to?" The third poster represents a figure standing astride a globe, the legs planted in two continents, the heart broken in two.
In Hamburg an advertising pillar displays a pictogram of a female figure. Wearing a blue headscarf and smiling, she embraces the city of Hamburg's coat of arms. Under her, the single word "Zuhause" (home).
The pictograms speak a direct and simple language with a clear, universal and powerful message. They are similar to the kind of pictograms one finds in public spaces, such as airports, all over the world. They are the work of the Berlin artists' collective Migrantas.
Pictograms as artistic language
"The pictograms are a synthesis. They tell a story," says Marula Di Como. The artist from Argentina has been living in Berlin since 2002. She devised the pictograms as part of her own distinctive artistic language.
Working together with graphic designer Florencia Young, her first project involved the conception and design of "Proyecto Ausländer", which included an urban action in Buenos Aires, and dealt with the subject of being a stranger in a foreign land.
In 2004 they joined forces with the sociologist Estela Schindel, also from Argentina, who has lived in Berlin for some years, and the Migrantas collective was born. Irma Leinauer subsequently became project coordinator and with the addition of Argentinian journalist Alejandra López, Migrantas reached its full complement of five women.
Migrantas reflects upon the living conditions of immigrants in Germany. "The objective of Migrantas is to give a public voice to the thoughts and opinions of all immigrants," Florencia Young explains. One way of doing this is to get immigrants involved in workshops.
These provide an opportunity for participants to reflect upon their own situations and experiences as immigrants. Discussions are followed by sessions where the participants make drawings inspired by their experiences and emotions. The drawings then provide the basis for the pictograms.
"Not a terrorist"
Marula Di Como shows one of the drawings. It depicts a figure with a triangle on its head. Alongside, a dove of peace and a peace symbol. "Not a terrorist: we also want to live in peace," are the words written underneath. The sketch became a pictogram showing a figure with a blue headscarf and red smiling mouth: "Not a terrorist"
"When we saw the sketch we thought it was just amazing. It is a drawing that represents the feelings of all these women. It was immediately clear to us what the pictogram would look like," Di Como recalls.
The artists' create a synthesis of the drawing and the women's words, but is there not some interpretation involved here? "The woman herself put it this way: 'The headscarf makes me a terrorist, I am the other, I am completely bad, I am the enemy. What I want to say with my drawing is that these things are not what I am,'" says Di Como. "In this case she wrote it down herself, she was quite clear about it. What we did was to create the synthesis."
Part of the urban landscape
The pictograms graphically and concisely sum up what the women feel and experience. They make a direct statement, speak a clear, unambiguous language.
They are displayed in urban areas on posters, free postcards, at bus stops and in digital animations on screens in subway stations. Migrantas try to ensure maximum visibility for their images in public spaces.
"It is important to us that the participants are present when the pictograms are put on display, so that they can see their own work. It is a very important day for the women. They are the protagonists. Their voices are being heard, receiving recognition," Florencia Young explains.
With "Proyecto Ausländer", Di Como and Young began by expressing their own feelings of alienation in Germany. Through Migrantas the voices of the immigrants become pluralized: "We, as artists, cannot say everything. We must allow the immigrants to speak for themselves. We created the project, but there are only a few of us. When many women's voices come together, the impact is greater," says Young.
Personal contact and exchange of ideas in horizontal dialogue between artists' and workshop participants is important. "There are no barriers between the personal and the professional. We see and hear things that are just incredible. When I listen to some of the Kurdish women, for example, I realise that I don't have any problems," adds Di Como.
"We, the immigrants, are always the others. This is not just so in Germany or in Europe. It is a universal phenomenon," she continues.
At home in Berlin
Coming from Argentina, which itself received many immigrants in the 1920s, both artists are well aware of the feelings that immigrants experience. One side of Di Como's family is from Spain, the other from Italy.
Florencia Young's family, on the other hand, has its roots in Ireland, though her mother is Italian-Spanish. "We live in Germany now. My son's German is better than his Spanish. Berlin is our home," she says. "I think one always feels foreign, because one does not belong 100 per cent here. I came here when I was 37. I lived a different life somewhere else – 37 years long. That leaves its mark, of course, but now I live here and I concentrate on the positives, not the negatives. There are good and bad things about every country, it doesn't do any good to find fault."
© Qantara.de 2008
This article was published in cooperation with the Online-Magazine babelmed.net, "Meeting the Other". For more information about the project click here.
Translated from the German by Ron Walker | <urn:uuid:5658b509-e705-451b-b911-5f0e586c06cf> | {
"date": "2015-04-02T10:03:17",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427132827069.83/warc/CC-MAIN-20150323174707-00138-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9636513590812683,
"score": 2.59375,
"token_count": 1347,
"url": "http://en.qantara.de/content/artists-collective-migrantas-a-visual-language-of-migration?qt-nodes_popularity=0"
} |
From around 1425 to 1475 from late Middle English which itself came from the Latin term with the same meaning. From the Latin term pater ("father") + familiās, an archaic genitive of familia ("family", "household"). Literally meaning "father of the family" or "father of the household". Confer the English word family.
- (a man who is the head of a household): materfamilias | <urn:uuid:1762d0b8-edf6-42e4-9019-e7be9bc0a1f7> | {
"date": "2015-10-09T05:30:03",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913815.59/warc/CC-MAIN-20151001221833-00100-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8705443143844604,
"score": 3.421875,
"token_count": 91,
"url": "https://en.wiktionary.org/wiki/paterfamilias"
} |
|Name: _________________________||Period: ___________________|
This test consists of 5 short answer questions and 1 (of 3) essay topics.
Short Answer Questions
1. Slocum was happy to meet another American who worked as a ______.
2. How did Slocum feel when he was introduced by the admirer?
3. Who accompanied Slocum on this part of the voyage?
4. What was the first name of the late princess?
5. The man routinely preached about ______.
Essay Topic 1
Slocum's visits to various ports turned out to be valuable learning experiences for all concerned. Discuss the learning experiences between Slocum and the islanders. What did the islanders teach Slocum? What was the most unusual skill? What was the most practical or valuable? What skills did Slocum teach to the natives? What other items did Slocum introduce to the natives? How do you think the experiences changed each? Explain.
Essay Topic 2
Write a short story about traveling alone around the world. You may choose any time person or manner of transportation. Include as many details as possible including the reason for the journey, the process, the voyage, and the outcome.
Essay Topic 3
The point of view used in "Sailing Alone Around the World" by Joshua Slocum is third person omniscient. Examine the author's choice. What are the benefits of writing in third person omniscient? What are the disadvantages? How would the story change if it had been written entirely in first person? Explain. Choose a passage from the book and rewrite it in the first person. Note observations on the way the text changed.
This section contains 1,481 words
(approx. 5 pages at 300 words per page) | <urn:uuid:feddc084-4512-430a-9b08-6faaed5b1669> | {
"date": "2015-03-27T07:06:54",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131295619.33/warc/CC-MAIN-20150323172135-00002-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9503927826881409,
"score": 3.3125,
"token_count": 376,
"url": "http://www.bookrags.com/lessonplan/sailing-alone-around-the-world/test6.html"
} |
The Goldsmith’s Craft section collects precious objects issued from feminine funerary trousseaux.
Some of the grave goods, such as the rings and the statuettes in amber or the pupae (dolls), had a ritual value. Others, like hairpins or the golden reticulae (hairnets) that were used to gather the hair, were used in particularly lavish hairstyles. Dating from the 1st century BCE is the splendid intaglio in jasper signed by Aspanios and depicting the bust of Athena Parthenos.
The greater space is dedicated to the context of Grottarossa, where, in a marble sarcophagus dating from the second half of the 2nd century CE, a mummy of a female child about 8 years of age was found. | <urn:uuid:94281dae-d49e-4d4d-8333-22a2df2f8316> | {
"date": "2015-03-30T10:37:22",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299261.59/warc/CC-MAIN-20150323172139-00278-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9597803354263306,
"score": 2.53125,
"token_count": 166,
"url": "http://www.archeoroma.beniculturali.it/en/coins-and-jewels/goldsmith-s-craft"
} |
Naturopathic medicine emphasizes wellness and disease prevention by natural means, as opposed to waiting for things to go wrong with the body that require drastic surgical or pharmaceutical intervention. The practice of detoxification illustrates this natural medicine philosophy.
Unfortunately we live in a world in which much of our food, water and air contain chemicals and compounds that are not good for the human organism: artificial additives and preservatives in food, harsh chemicals in household cleaners, carbon monoxide in the air and even traces of lead and mercury in our food and water. Not only that, but the body itself produces toxins such as ammonia and lactic acid that are natural byproducts of metabolism. Detoxification assists the body in using its own ability to clean and purify itself by getting rid of such toxins from blood, organs and tissues.
Diet is an important component of detoxification processes. Obviously, you shouldn’t continue to ingest more toxins at the same time that you’re trying to eliminate them from your system. Eating only organic foods during detox minimizes the intake of pesticides and unnatural chemical additives. The foods chosen should also be rich in nutrients and antioxidants, as well as being high in fiber. Drinking pure water and organic juices help the body flush out toxins in urine and stool.
A sampling of foods considered to be especially beneficial in a detox diet include:
Exercise is important to the detoxification process, just as it should be in daily life. Exercise not only has direct physical benefits for the human body, it also helps to reduce stress, which hinders the body’s natural self-cleansing processes. Proper breathing during exercise, as well as focused deep breathing on its own or as a part of a yoga or meditation practice, helps increase the supply of oxygen to cells, which also assists in detoxification. A session in the sauna and some forms of hydrotherapy (water therapy) can be a beneficial part of detox as well.
There are more specialized detoxification procedures such as chelation therapy to remove heavy metals from the blood and enzyme therapy that can help the heart and stomach, and reduce the effects of aging. A trained naturopathic doctor can advise you whether such treatments are right for you.
For those living year-round or part-time in the Phoenix, Arizona area, Dr. Paul Stallone is a respected Scottsdale naturopathic physician and alternative medicine practitioner who believes in disease prevention through proactive wellness care. Dr. Stallone can recommend the best detoxification program for you as part of an individualized program of holistic health care and treatment. Call the Arizona Integrative Medical Center today at to make an appointment with Dr. Stallone. | <urn:uuid:f054c14d-cdfe-4197-898e-02cebdb49184> | {
"date": "2018-07-20T16:17:52",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591718.31/warc/CC-MAIN-20180720154756-20180720174700-00042.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.956812858581543,
"score": 2.515625,
"token_count": 544,
"url": "http://www.scottsdalecancertreatmentcenter.com/detoxification-helps-the-body-clean-itself/"
} |
The Human Heart: Vulnerable When Hit or Physically Shocked
By Dorothy B. Reitman, Uechi-Ryu Karate
The lay public and newcomers to the martial arts tend to consider the most serious injuries that a person may inflict upon another to be percussive injuries such as the breaking of bones or head injuries. However, strikes that may not even cause bruising could possibly lead to serious injury or even death. [Stephen Drehobl]
The karate style, “Uechi Ryu Karate- Do” contains such a movement that contemporary practitioners still struggle to understand. The strike is called Boshuken Morote Zuki in Japanese, which simply means, “thumb-knuckle strike with both hands”.
The description of the Boshuken Morote Zuki Strike
Modern Arnis Philippine Martial Art “Stick Fighting” Remy Amador Presas
The black circles in the above drawing are the strike zones.
We will refer to the person performing the strike as “A” and the person struck as “B”. “A” drives both hands straightforward in nearly simultaneous bilateral palm heel/thumb knuckle strikes. In kata, the movements are as follows: “A”‘s right hand, starting at the ilium, strikes “B” on the left ilium; “A”‘s left hand, starting at the pectoralis muscle strikes the right pectoralis muscle of “B”. In other words, “A” strikes targets on “B” correspond to his/her own kata starting points. It is important to note that the strike when delivered in a real fight would probably not begin from the origin points in kata. The hands would simply srike from where ever they happened to be at the moment. The kata provides the key to unlocking the mystery of one possible application of this movement by cryptically informing the practitioner where the strike is to be placed on the opponent. The power for this strike is not confined to movement of the arms. It comes initially from the ground /feet, progressing to the knees, hips, waist, and subsequently up the spine and out to the arms to the thumbs. .
Can the shock of the Boshuken Morote Zuki directly affect the heart’s rhythm?
In order to understand the implications of the Boshuken Morote Zuki, we will examine the anatomy and physiology of the heart beat cycle.
The SA node (sinoatrial node) lies in the right atrium beneath the opening of the superior vena cava. See figure 18-2a. Each cardiac cycle is initiated by the SA node and sets the basic pace for the heart rate. The SA node is the pacemaker of the heart. The SA node initiates electrical impulses that spread out over both atria causing them to contract. The impulse then passes to the AV (atrioventricular node) located near the bottom of the interatrial septum. (Between the atrium and ventricle.) Contraction of ventricles is stimulated by the Purkinje fibers. [Principles of Anatomy and Physiology Gerard J. Tortora, Nicholas P. Anagnostakos ]
The operation of the SA node can be disrupted by shock, such as a physical strike to that area of the torso. When something disrupts the SA node the AV node takes over to initiate a basic pace for the heart rate. When both the SA node and the AV node are Almost simultaneously disrupted, the heartbeat can be dangerously affected. The heart could be profoundly affected to the point of cessation of function.
When the right hand strikes the Ilium a shock wave radiates across the torso, while at the opposite “corner” of the torso, the left hand strikes, which also generates a shock wave across the torso in the opposite direction. The proximity to the heart and the SA and AV nodes may allow the shock waves of the strikes to disrupt the operation of the SA, AV nodes and thereby disrupt the timing of the heartbeat cycle. How serious the strike is depends on where in the heart beat cycle the subject is when hit. The intensity of the strike may not have to be very strong in order to have devastating results. An interesting subtlety was noted by Mr. James Thompson, who pointed out that the potential energy in this movement is amplified by the whiplike phenomenon of the hand corresponding to the forward foot always striking almost simultaneously before the hand corresponding to the rear foot. [Oral seminar communication ]
In training, I was struck very lightly with the Boshuken Morote Zuki, and observed that my heart fluttered and that some light headedness occurred. The strike appeared to disrupt the rhythm of my heart. From my perspective as a registered nurse, I believe that the results of this strike could be very serious, even lethal .
Severe disruption of the heart’s life sustaining function is not confined to the martial arts.
In the Philadelphia area alone, several recent newscasts have reported that baseball players struck in the chest by the baseball subsequently lost consciousness and died. A five year old girl in Kyoto, Japan playing catch with friends died after having been struck in the chest by a rubber ball [Mainichi Shimbin, March 17, 2002]
I would like to thank Stephen Drehobl, David Elkins, and Harvey Liebergott for their encouragement and help in preparing this article.
Dorothy Reitman has been studying Uechi Ryu Karate at the Uechi Ryu Karate Academy in Collegeville from Sensei Stephen Drehobl, Yandan since January 2000. She received her Shodan from Sensei James Thompson, Shihan Kyoshi Hachidan June 6, 2003. She has been a registered nurse since July 9, 1977. | <urn:uuid:6dec85f6-72a6-41a0-ad0a-ee67c21016cf> | {
"date": "2013-06-20T02:09:23",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9345675110816956,
"score": 2.625,
"token_count": 1220,
"url": "http://uechi-ryu.com/vunerable-human-heart/"
} |
In a proposal submitted to the Central Government recently, the Kerala government has sought a green signal for the removal of 25,000 MT of dry bamboo from 100 sq km of the Wayanad Wildlife Sanctuary, following drying up of the bamboo after mass/gregarious flowering this year. The sanctuary is spread over an area of 344.44 sq km, of which approximately 50 sq km is under dense growth of bamboo. Another 50 sq km area is under moderate bamboo forests.
Bamboo that belongs to the grass family is one of the fastest growing plants. Because of its extensive shallow rhizome-root system and accumulation of leaf mulch, it serves as an efficient agent in preventing soil erosion, conserving moisture, reinforcement of embankments along rivers and drainage channels. Bamboo dominated forests play a pivotal role in maintaining key ecological functions in tropical and subtropical forest ecosystems. Given such enormous usefulness of bamboo, does it really make sense to disfigure a natural bamboo forested landscape and disrupt its natural succession process?
There are many reasons cited by the Kerala Forest Department for the removal of bamboo – “It’s a fire starter, has led to several incidents of fire in Wayanad, a threat to 107 human settlements residing in the landscape and causes degeneration of the habitat.” Anatomising the reasons cited by the forest department to extract bamboo, the revelations uncovered narrate a complete contrasting history.
Bamboo is highly common across the Western Ghats, but because of its critical ecological functions, its extraction from protected areas is completely banned. At Nagarahole and Bandipur National Parks, which are adjacent to the Wayanad Wildlife Sanctuary, bamboo has not been extracted ever since they were declared “Protected Areas”. P M Muthanna, who leads conservation interventions for the Wildlife Conservation Society-India WCS-India in the Malenad-Mysore tiger landscape explains, “The flowering of bamboo occurred in Nagarahole and Bandipur between 2009 and 2010 during which, no critical incidents of fire were reported. In fact, in 2013, there have been very few incidents of forest fires reported in Nagarahole and Bandipur, thanks to effective fire preventive measures adopted by the forest department. If fire prevention plan is followed by the forest staff diligently, such untoward incidents can be contained.”
Revoking the threat to families living in the forest and disproving incidents of man-animal conflicts, B M Akarsha, a senior conservationist with WCS-India, cites an example. “More than 450 families resided inside the Bhadra Tiger Reserve, when mass flowering and drying up of the Giant Bamboo occurred in 1999. The Forest Department hired a large number of fire watchers and effective field patrolling resulted in zero incidents of fire from 1999 to 2003. Surely, there is no evidence that the successive years of flowering and drying of bamboo…escalated human-wildlife conflicts!”
This is not the first time such a proposal has been sent to the National Board for Wildlife, confirms a member, “Several proposals to extract bamboo have been coming in lately from different states, and this is a very alarming trend.” So what’s driving this huge demand for bamboo? Renowned conservationist, D V Girish, who won a legal battle against the extraction of bamboo in Bhadra in 1997, says it’s the money. “Fear is instigated by those with vested interests. When bamboo started to flower and dry out in Bhadra in 1999, there were zero incidents of forest fire in the following three years. Most often, contractors try to garner support from villagers, resulting in forest fires being instituted deliberately,” he asserts.
There is no denying that there is a huge lobby for bamboo. As explained by one of the informers, who chooses to remain anonymous, “In most cases, when permissions are sought to extract bamboo by the forest department, the staff involve contractors, who are given the freedom to extract from non-designated areas too. We have observed and documented on several occasions, contractors exploiting the forests by hunting and logging, besides indulging in other illegal activities. Under usual circumstances, these contractors are registered as members in weaving communities who are to receive bamboo under subsidised rates. But most often, the government does not verify the authenticity of such communities and its members. Hence, without even benefiting the artisans, the illegally extracted bamboo then finds its way to the legal market, where it’s sold at exorbitant rates.”
Conservationist Girish, who has worked relentlessly against the extraction of bamboo in Bhadra from 1993-1997, says, “Bamboo is not a natural hazard, as most forest officials claim. It forms an integral part of the forest.” The threat to large portions of wildlands and wildlife is not just slow and careless elimination in the name of economy and development, but ignorance and lack of knowledge which have proven to be their principal accomplices.
– The article has been published in Deccan Herald newspaper:Link | <urn:uuid:b61f2c16-210c-4b63-b799-09a7492d9363> | {
"date": "2018-01-17T12:47:43",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886939.10/warc/CC-MAIN-20180117122304-20180117142304-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9593695998191833,
"score": 3.1875,
"token_count": 1039,
"url": "https://eletellnow.wordpress.com/2013/07/30/bamboo-extraction-harms-forest/"
} |
But that’s not true.
Spiked blood pressure and genes
The words “genes” and “genetic” have infiltrated medical sciences in recent years. Besides genes giving us a specific eye color and height we also discovered that genes play a role in diseases. Genes are now being implicated in many diseases, including diabetes, hypertension, Alzheimer’s, and cancer.
Modern medicine embraced gene-disease link with enthusiasm. Until then close to 90% of pathological changes had unknown causes. Genetics filled the void. It also gave a sigh of relief as we finally managed to pinpoint the ultimate cause of human misery, the corrupt DNA.
As the field of genetics grew so was our understanding how tightly the faulty DNA and diseases go together. It’s just a matter of time we figure out the genetic code and fix all the nasty health surprises, including spiked blood pressure.
- Test for genetic predisposition
- Common high blood pressure causes
- Spiked blood pressure does not kill
Genes change all the time
If you believe that hypertension is genetic and the only option you have, is to take a heart medication in order to keep the numbers down, you are wrong. If you believe that spiked blood pressure is controlled by the genes that don’t change, you are wrong again.
Genes are extremely plastic and change constantly. But they don’t change randomly like kaleidoscope. They change in response to the environment, lifestyle, and circumstances. Gene plasticity is one of the reasons why people who have healthy habits not only seem to be doing better, but also pass on a lower risk for diseases to their offsprings. 1
This means that if you have a good grasp of healthy lifestyle principles, you can actually decide which genes you keep and which genes you strike off. It also means that even if your mom and dad gave you a hypertension gene you could inactivate it and, with an intelligent lifestyle effort possibly make it disappear for the next generations.
- High blood pressure cures
- How NOT to lower cholesterol with food
- 5 ways to lower high blood pressure
Solutions for spiked blood pressure
There is a growing evidence that hypertension not only can be controlled with better lifestyle habits, but also completely reversed with such. Among well-known lifestyle interventions for high blood pressure are: increased dietary potassium, increased fibre, daily exercise, and weight management.
Lifestyle interventions are exceptionally effective. The problem is that not too many people follow them. Many choose a less effort-full solution, a heart pill.
The problem with heart meds
But there is a catch, actually a few.
- Heart medications can only reduce blood pressure numbers. They cannot raise it or regulate it
- They cannot reverse hypertension
- They don’t improve heart health
- They don’t correct heart or any other genes
- They have side effects
- They may be expensive
- They discourage self-care and thus accelerate degenerative changes
- They don’t prevent heart disease progression
- They don’t prevent BP erratic swings
- They contribute to nearly impossible to control fluctuating blood pressure in elderly.
You have full control over spiked blood pressure ..
..even if you have a hypertension gene. Heart health is not as much of an effect of your genetic expression as it is an effect of your lifestyle habits. 2 If your blood pressure spiked a few times already, it is a sure sign you need to change your daily routine, because what you do on a daily basis can have a much bigger influence on your heart than your current DNA sequence.
Lifestyle improvements have one big additional plus: you are not the only one to benefit from them. Think about it. You can pass your heart-strong genes to your kids and your grand-kids (if it’s not too late already). To start follow the steps in The Ultimate Guide to Low and Fluctuating Blood Pressure. | <urn:uuid:80119955-c561-4497-b5a5-e03d3f41a52d> | {
"date": "2019-10-18T13:37:17",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986682998.59/warc/CC-MAIN-20191018131050-20191018154550-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9419611692428589,
"score": 2.5625,
"token_count": 816,
"url": "https://www.drdnaturopath.com/is-spiked-blood-pressure-genetic/"
} |
How to Perform Paleo Strength Exercises
The dumbbell lunge strengthens the lower body.
To get in the starting position, stand, holding a dumbbell in each hand at your sides, palms facing your legs. Your feet should be about shoulder-width apart.
Take a large step forward with one leg, simultaneously bending both legs until they're at 90 degrees. (The top of your front thigh will be parallel to the ground.)
Keep your chest up and head in a neutral position, looking ahead.
Pushing through the heel of your front foot, step back into your starting position.
Either repeat the movement on the same side or alternate sides. | <urn:uuid:cb067978-8fd3-4cf0-ac8f-017e0fe547f7> | {
"date": "2015-03-30T11:23:19",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299261.59/warc/CC-MAIN-20150323172139-00278-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8780569434165955,
"score": 2.71875,
"token_count": 136,
"url": "http://www.dummies.com/how-to/content/how-to-perform-paleo-strength-exercises.pageCd-storyboard,pageNum-4.html"
} |
Joles works with both students who have been diagnosed with ADHD and are on medication and those who only display the behaviors commonly associated with ADHD. Joles noted that everyone has certain behaviors that are displayed when presented with boredom, a stressful situation or anxiety. Children are no different.
"Kids aren't getting the brain stimulation in a physical way that they used to," Joles said. "Exercise and activity affect your ability to sit, think and focus."
Joles explained that if brain chemicals such as serotonin, the calming chemical, and dopamine, the organizing chemical, are not functioning properly, children often seem to have less control over their behavior. Serotonin increases when the tactile, proprioceptive and vestibular systems - touch receptors, muscles and joints and the inner ear - are stimulated.
"All I can do in my classroom is observe behaviors and make notes about what I'm seeing and what I want to be seeing," noted Joles, who tries to get to know each child as best she can.
Joles also does a considerable amount of work with rewards and consequences and has noticed that if the students are willing to try and still are unable to complete a task, it's likely that they do not have the control over the situation they may like to have. "My personal opinion is that no child would choose to be that miserable," continued Joles.
"We do not prescribe medications; we are not doctors," stressed Dennis O'Brien, principal of North Ohio, where only nine of the 450 students are on some sort of medication for ADHD. "It really is up to the parents."
"My goal with kids is never to medicate as a first resort," explained Joles of her general view of the situation. "That's always a last resort for me, but I think for some people it's viewed as not an option at all, and I think that's really unfair to the child who may have a need. I want to see every child succeed."
O'Brien and Robin Little, North Ohio social worker, emphasized that when a teacher notices a potential problem with a child, he or she approaches Little, who is in charge of organizing a child study team to look into the issue and provide a closer examination.
In cases where inability to focus or overactivity are the primary causes of concern, the members of the team look at what the teacher has done to improve the behavior and what other effective ways of handling that particular child may be. The next step in the study-team's process is meeting with the parents to get an idea of how they see their child at home.
The study team will often recommend that the teacher and the parents fill out the Conner's rating scale, which touches upon such behavioral areas as defiance, distraction, movement, forgetfulness, temper outbursts and restlessness. Little then scores the evaluations and makes the results available to the parents and teacher.
"It's good information for the physician to see," said Little, who noted that school personnel never tell parents that they have to take their children to see a physician for medication, but a physician is the one who ultimately has to make the diagnosis. "If they truly have it and they're put on medications, there is a difference."
Many parents choose not to seek the advice of a physician and instead opt for alternative ways of handling the situation, said Little. In those cases, the school supports the decision and has alternative ways of handling the behavior.
Joles has recently brought to the school - through a $1,000 grant from the Otsego Education Foundation - sensory integration equipment such as squeezy balls for hand movements, weights for wrists and large balls instead of chairs. In the near future, a lending library is planned so that the devices will be available for others to check out for use in their classrooms.
According to Joles, with the help of a list of ideas from the Occupational Therapy Pediatric List Serve, she has found it effective to provide active children with certain jobs to do, such as carrying a box of books to library or having a child hand out papers to the rest of the class. Simple activities often help the child sit and finish their schoolwork.
"It works, and I didn't believe that it didn't work at first," admitted Joles, who strongly believes it is an educator's job to meet the needs of students and stay on top of the latest issues so that they are better able to serve. "We should be meeting kids needs." | <urn:uuid:bee64585-3b10-4ece-85c2-a6a033ebada4> | {
"date": "2016-12-03T04:32:58",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540839.46/warc/CC-MAIN-20161202170900-00496-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9788109660148621,
"score": 2.78125,
"token_count": 918,
"url": "http://articles.petoskeynews.com/2001-11-05/adhd_24063933"
} |
Floating some 9,000 feet above the city in a hot-air balloon in 1887, Edwin H. Husher took what may be the first aerial photo of Los Angeles. (I tell the full story behind this historic image and its creation over at Los Angeles Magazine.)
After seeing the photo, The Atlantic‘s Alexis Madrigal had a great idea: why not overlay the aerial image onto a present-day map of the city? My Photoshop skills were not quite up to the task, but I was able to simulate the same view today using Google Earth. Sharp eyes will notice that the perspective is not exactly the same—with altitude, location, and tilt, there were simply too many variables—but it is fun to compare how the city looked in 1887, when roughly 20,000 people called it home, to the metropolis of nearly 4 million people today.
The Los Angeles River suffers the most dramatic change. In the earlier image, the river’s wide, sandy wash dominates the landscape. By 2013, the river has been reduced to a concrete flood channel, fading into the surrounding industrial development. | <urn:uuid:d684e65d-fb25-4808-93bf-3a5bcf264a32> | {
"date": "2014-09-30T17:50:23",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663060.18/warc/CC-MAIN-20140930004103-00278-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9596156477928162,
"score": 3.359375,
"token_count": 230,
"url": "http://nathanmasters.me/2013/08/15/los-angeles-from-the-air-1887-vs-2013/"
} |
The "Black Lives Matter" hashtag evolved as a call for social change aimed at increasing the conversation about racial inequality. But what if social change was less dependent on talking and more dependent on nonverbal communication?
Viewer impressions of political candidates are heavily weighted to the content of their speech rather than the body language, a new study published in the Journal of Communication has found. The research, conducted by a trio ...
(Phys.org)—Women are twice as likely as men to use emoticons in text messages, according to a new study from Rice University.
Body language of both speaker and listener affects success in virtual reality communication game.
Children suffering from extreme social anxiety are trapped in a nightmare of misinterpreted facial expressions: They confuse angry faces with sad ones, a new Emory University study shows.
Subtle patterns of nonverbal behavior that appear on popular television programs influence racial bias among viewers, according to research from Tufts University to appear in the December 18, 2009, issue of the journal Science.
(PhysOrg.com) -- European researchers have developed a suite of tools to add non-verbal cues to email, phone calls, chats and other channels of electronic communication. It is fascinating work, and the real-world applications ... | <urn:uuid:7a76504c-4bfa-4bfd-8f8d-f729b3d3bccb> | {
"date": "2015-08-02T09:12:47",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989018.48/warc/CC-MAIN-20150728002309-00133-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.929360568523407,
"score": 2.890625,
"token_count": 253,
"url": "http://phys.org/tags/nonverbal+communication/sort/date/all/"
} |
The Teachers’ Domain self-paced student lessons for adolescent literacy, funded by the Walmart Middle School Literacy Initiative, make their debut at this year’s National Council for Teachers of English conference in Chicago. These self-paced lessons align with the Common Core standards that emphasize teaching literacy skills through content and are designed to enhance the literacy skills of struggling 5th – 8th grade readers.
Each lesson contains 10 – 12 screens in which students read, view videos, complete an interactive activity, and write to learn about an engaging science or history topic. Resources can be searched by content area or key literary strategies such as determining important information, sequencing events, and understanding problem/solution.
In the self-paced literacy lesson Solving a Public Health Problem, for example, students watch videos about a real-life disease outbreak in New York City and learn about the step-by-step process public health workers use in investigating the cause of similar outbreaks. Exploring a science focus on public health, they read informational text, learn and practice vocabulary words, and explore content through videos and interactive activities. When finished, students select and complete a writing assignment offline. | <urn:uuid:52997f29-cf89-476b-b133-0b129e6510f6> | {
"date": "2018-06-23T06:27:35",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864943.28/warc/CC-MAIN-20180623054721-20180623074721-00176.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9097217321395874,
"score": 3.703125,
"token_count": 234,
"url": "http://education.wgby.org/2011/11/28/adolescent-literacy-self-paced-student-lessons/"
} |
|Page tools: Print Page Print All RSS Search this Product|
Asthma and chronic obstructive pulmonary disease
Chronic obstructive pulmonary disease
Chronic obstructive pulmonary disease is a chronic condition associated primarily with smoking and environmental factors such as working or living in areas where there is dust, gas, chemical fumes, smoke or air pollution .
More than three in 100 (3.4%) people reported having chronic obstructive pulmonary disease, about the same as in 2012–13 (4.1%).
The proportion of people with chronic obstructive pulmonary disease was:
1. National Asthma Council Australia, How is Asthma Treated? <http://www.nationalasthma.org.au/understanding-asthma/how-is-asthma-managed>; last accessed 14/11/2019.
2. Lung Foundation Australia, August 2018, COPD the Basics, <https://lungfoundation.com.au/wp-content/uploads/2018/09/Book-COPD-The-Basics-Sep2018.pdf>; last accessed 15/11/19.
These documents will be presented in a new window. | <urn:uuid:46688a21-2e94-437d-950b-20cfcd3607b1> | {
"date": "2020-01-25T18:52:18",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.860531210899353,
"score": 2.9375,
"token_count": 243,
"url": "https://www.abs.gov.au/ausstats/[email protected]/Latestproducts/4715.0Main%20Features32018-19?opendocument&tabname=Summary&prodno=4715.0&issue=2018-19&num=&view="
} |
Suffragist Elizabeth Cady Stanton wasn’t afraid to tackle any subject and make a few enemies along the way. Her position on American apple pie is one example. The Brits had pie right, Stanton said. They didn’t use a bottom crust, for it would inevitably become soggy. Her views on the subject were laid out in a collection of her writings:
“Mr. Gurney’s dig at our pie referred to the soggy undercrust so many of our American cooks persist in making. The English never have an undercrust to their pies, one of the few respects, it seems to me, in which English cooking, which is generally atrocious, is superior to our own, which also belongs in many respects to the atrocious order. The English put the fruit in a deep dish and simply spread a nice light crust over it. If there be women, or men either for the matter of that, in the United States who know how to make a crisp undercrust and bake it to the well-done point, let them produce the perfect American pie. But if they cannot accomplish this difficult feat, let us have done with our national raw, soaked undercrust of dough, which is why du=yspepsia has attacked one-half of our men, who will eat pie whether it is good, bad or indifferent.
“Though these lines were written in 1840, they still hold good to-day. Pie is still with us, and so is the abominable undercrust. All travelers can testify to
seeing some son of Adam at every railway station in America running for the cars with a great piece of pie in his hand, which to withstand such wear and tear must have an undercrust as tough as sole leather. Yet the prospective presidents of this great republic all eat it, and will to the end of time.”
From Elizabeth Cady Stanton’s writings, a free ebook online.
Did you stop by for Elizabeth Cady Stanton’s virtual birthday party in November? It’s not too late. LINK. Stay in touch with suffrage news, views, and stories about the suffrage movement by reading Suffrage Wagon News Channel. | <urn:uuid:87ca7769-4120-4e4e-a4f2-b0c0b634c31c> | {
"date": "2016-07-27T09:44:34",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826759.85/warc/CC-MAIN-20160723071026-00033-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9700151085853577,
"score": 2.5625,
"token_count": 466,
"url": "https://suffragewagon.wordpress.com/2012/12/03/american-apple-pie-wasnt-sacred-to-elizabeth-cady-stanton/?like=1&source=post_flair&_wpnonce=c8d80d4293"
} |
For some people, surgery may help improve sleep apnea, depending on the structure of the upper airway. The main objective of surgery is to make breathing easier by increasing the size of the upper airway. A deviated nasal septum may be fixed, or enlarged adenoids or tonsils may be removed. Removal of adenoids and tonsils is the most common treatment for children with OSA.
More extensive surgery can also be performed, such as remodeling the air passages in the throat by removing the uvula, tonsils, and part of the soft palate (uvulopalatopharyngoplasty). If no other treatment works, another surgical option includes making an opening in the throat to bypass the upper airway (tracheostomy). Air passes through a tube inserted in the opening and into the lungs. When this operation is performed for OSA, the patient keeps the tube covered during the day and opens it at night so air can flow freely during sleep.
Other possible surgeries include jaw remodeling or surgery for obesity, such as gastric bypass surgery.
Your doctor will help you decide if surgery is an option for you. | <urn:uuid:54a8f3e5-7224-4752-9709-4bf2a0d1d4ea> | {
"date": "2014-12-23T04:25:19",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802778085.5/warc/CC-MAIN-20141217075258-00051-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9371368885040283,
"score": 2.953125,
"token_count": 238,
"url": "http://www.nationaljewish.org/healthinfo/conditions/sleep-disorders/types/apnea/treatment/surgery"
} |
Submitted to: Eastern Native Grass Symposium
Publication Type: Abstract only
Publication Acceptance Date: 7/1/2006
Publication Date: 10/10/2006
Citation: Harrison Dunn, M.L. 2006. Native grass germplasm. Eastern Native Grass Symposium. Interpretive Summary:
Technical Abstract: The mission of the National Plant Germplasm System (NPGS) is to safeguard plant germplasm that is important to world agriculture by acquiring, documenting, maintaining, distributing and evaluating germplasm. One set of germplasm maintained by the NPGS is the switchgrass (Panicum virgatum L.) collection housed at the Plant Genetic Resources Conservation Unit in Griffin, Georgia. The switchgrass collection contains 181 total accessions, 96 percent which are currently available for distribution. The material has been collected from 21 states throughout the U.S. representing a diverse geographic range. Cultivars/releases in this collection include Blackwell, Nebraska 28, Grenville, Kanlow, Maimi, Wabasso, Stuart, Alamo, Shelter, Cave-In-Rock, Caddo, Forestburg, Dacotah, Trailblazer, Shawnee, Sunburst, Falcon, Summer and Pathfinder. The material also includes a great deal of unreleased material. Small seed samples are freely available for bona-fide research purposes and can be requested through the Germplasm Resources Information Network (GRIN) website at http://www.ars-grin.gov/npgs/. The extent of morphological variation and differention in this population of accessions has not been assessed. Typically, descriptor data is available for each accession on the GRIN website. Descriptor data for warm-season grasses include plant height and width, foliage amount, height and distribution, leaf length and width, stem size, tiller production, maturity, seed production and winter survival. To acquire this data from the switchgrass germplasm, all accessions were germinated and transplanted to the field in spring 2006. In the fall 2006, descriptor data will be collected for each accession, and this information will be uploaded to the GRIN website for public access. | <urn:uuid:7c98af88-5dfd-46ae-925d-2c1bfe43c809> | {
"date": "2016-10-27T00:31:30",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00098-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.862159788608551,
"score": 2.546875,
"token_count": 456,
"url": "https://www.ars.usda.gov/research/publications/publication/?seqNo115=197841"
} |
Virtual world is fraught with real dangers, so be cautious when using internet and social media
Pavan Duggal | March 9, 2015
Free speech has always been a subject of immense debate. Different legal regimes in different parts of the world have sought to regulate free speech on various grounds. In India, the constitution guarantees the fundamental right to freedom of speech and expression. However, this right under Article 19(1) of the constitution is not an absolute right. The state can impose various ‘reasonable’ restrictions under Article 19(2). These can be imposed in the interest of sovereignty and integrity of India, the security of the state, friendly relations with foreign states, public order, decency or morality or in relation to contempt of court, defamation or incitement to an offence. The supreme court has also upheld the reasonableness of such restrictions.
In this context, there is one provision in the cyber law which has got the attention of all stakeholders, i.e. section 66A of the Information Technology Act, 2000. In India, there have been many controversies over the use of this section. Kolkata-based professor Ambikesh Mahapatra was arrested for forwarding caricature/cartoons on Facebook. The Ravi Srinivasan Twitter case showed how a person’s tweets could be brought under the ambit of section 66A. Mumbai residents KV Rao and Mayank were arrested for allegedly posting offensive comments against some leaders on their Facebook group.
This article aims to explain what section 66A is all about.
Section 66A makes it an offence when you send, by means of a computer resource or communication device, any information that is offensive or has menacing character.
Any information which you know to be false but which is sent for the purpose of causing annoyance; inconvenience; danger; obstruction; insult; injury; criminal intimidation; enmity; hatred; or ill will. All these must be done persistently by using a computer resource or communication device. Any e-mail or electronic mail message for the purpose of causing annoyance; inconvenience; to deceive the addressee or recipient about the origin of such messages; or to mislead the addressee or recipient about the origin of such messages, also come under this section. So, if you are a social media user or even if you are a user of a computer system or mobile, be careful. You could be brought within the ambit of this section.
To help understand its scope let’s examine some common illustrations of acts which could come under this section. When you send either by means of a computer, mobile phone, tablet or any other communication device, the following kind of information, you could be covered under this section. If you swear or abuse somebody, it could be said to be grossly offensive or to be having menacing character. Anything defamatory which affects the character, reputation, standing or goodwill of a person could be deemed to be grossly offensive, as also making false allegations against the character of a person or character assassination. Using insulting words or symbols which are obscene, calling someone names, posting the picture of a person in uncomplimentary situations and environments; electronic morphing which depicts a person in a bad light, using swear words, threatening somebody with consequences for his life, information aimed at hurting religious sentiments, showing gods and goddesses of particular religions in an uncomplimentary light, putting the picture of a person against a slogan/phrase/saying which does not depict his true character or personality, deceiving the addressee or recipient about the origin of such messages (sending emails from a fake account), sending emails and SMSs in the name of RBI or containing fake recruitment offers all qualify as offences under section 66A.
The aforesaid are just some illustrations to demonstrate how broad section 66A is and how and in what particular comprehensive manner can it impact you and your life. These illustrations are neither comprehensive nor complete but have been given as selective examples of the ambit of section 66A, for academic, research and review purposes only. This section can, however, also be effectively used as a tool for gagging legitimate free online speech. The problem with section 66A is that it comes up with extremely wide parameters which have not been defined clearly. These parameters are capable of being interpreted in any manner possible by law-enforcement agencies. Given the advent of technology and the way people are misusing the same, there could be millions of situations which could qualify as offences.
Threats and lessons
The learnings from section 66A are that till such time this section is either changed, modified, varied or amended, it will be imperative that you exercise due diligence when you send information on the internet, social media and mobile networks. Kindly note that the focus of the law is not on publishing information, it is instead on the offence of sending information. This assumes more significance, since whenever you are on the internet or sending an e-mail or posting or publishing a blog or creating an SMS, you are doing so from your computer system or communication device. Hence, be careful before you send across any information.
How reasonable is ‘reasonable restriction’
There are tremendous problems in the way section 66A has been drafted. This provision, though inspired by the noble objective of protecting reputations and preventing misuse of networks, has not been able to achieve its goals. India being the world’s largest and vibrant democracy, ‘reasonable restrictions’ on free speech need to be very strictly construed. Section 66A has the potential of prejudicially impacting free speech in the digital and mobile ecosystems. It needs to be amended to bring the cyber law in sync with the principles enshrined in the constitution and also with the existing realities of social media and digital platforms today. The issue of constitutional validity of this provision is pending before the apex court and it will be interesting to follow the developments in this space.
(The article appeared in March 1-15, 2015, issue)
Is the AAP headed for a split?
A sale-purchase agreement was signed between Numaligarh Refinery Limited (NRL) and Bangladesh Petroleum Corporation (BPC) for supply of high speed diesel (HSD) through the proposed 131 km Indo-Bangla friendship pipeline. The agree
The dismal performance of the Congress in the Municipal Corporations of Delhi elections forced party chief Ajay Maken to announce his resignation, ending an energetic effort to revive the party in the national capital. Ajay Maken, now 53, had taken over as the chief
The BJP’s clean sweep is not just a referendum on the Arvind Kejriwal government, but also could mark the beginning of the end of one of India’s youngest political parties, the Aam Aadmi Party (AAP). After the Bharatiya Janata Party’s massive win in the UP assembly elections, th
In an interview with Governance Now after BJP’s victory in all the three municipal corporations of Delhi, Delhi BJP president Manoj Tiwari said that the focus will be on sanitation and effort will be to make Delhi free of corruption. What are BJP`s immediate goals a
In order to jointly promote, develop and adopt external thermal insulation and composite systems (ETICS) solutions technology in construction of highly energy efficient green buildings, NBCC (India) Limited and Bolix, SA of Poland have inked a memorandum of business exploration (MoBE). | <urn:uuid:ce4d8d1e-afcf-4228-86f0-f090b1b41aa6> | {
"date": "2017-04-27T05:03:03",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121869.65/warc/CC-MAIN-20170423031201-00353-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9407660365104675,
"score": 2.953125,
"token_count": 1520,
"url": "http://www.governancenow.com/views/columns/social-media-harassment-indian-cyber-law"
} |
Inventing George Whitefield
Race, Revivalism, and the Making of a Religious Icon
University Press of Mississippi 2015
New Books in African American StudiesNew Books in American StudiesNew Books in British StudiesNew Books in Christian StudiesNew Books in HistoryNew Books in Peoples & PlacesNew Books in Politics & SocietyNew Books Network February 22, 2016 Franklin Rausch
George Whitefield was a complex man driven by a simple idea, the new birth that brought salvation. Because of such passion, Whitefield received both enthusiastic support, preaching to audiences numbering in the thousands, and bitter criticism for violating religious doctrine or political convention. As such, Whitefield remains someone who continues to stir debate and devotion even to this day. In her fascinating new book, Inventing George Whitefield: Race, Revivalism, and the Making of a Religious Icon (University Press of Mississippi, 2015), Dr. Jessica Parr explores the life and afterlife of George Whitfield, focusing particularly on how the conflict he spurred and the veneration he received have shaped memories of him. Parr’s work is fascinating and accessible, making it a good read for both the scholar of American religious history and for students in an undergraduate classroom. | <urn:uuid:98c69b86-163f-46bf-82de-cc57598a5e35> | {
"date": "2018-08-21T01:52:10",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217909.77/warc/CC-MAIN-20180821014427-20180821034427-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.927276611328125,
"score": 2.65625,
"token_count": 245,
"url": "https://newbooksnetwork.com/jessica-parr-inventing-george-whitefield-race-revivalism-and-the-making-of-a-religious-icon-up-of-mississippi-2015/"
} |
Nuclear Power Plants in the US
Over one-third of the US population lives or works within 50 miles of a nuclear power plant. Currently, there are 105 operating nuclear reactors at 65 sites throughout the United States. As the map illustrates, only a few power plants are found in regions which have some earthquake risk. The pattern of nuclear reactor sites across the United States show that the Central US is relatively empty compared to the Eastern Seaboard, the Great Lakes, and along the Mississippi River. It is no coincidence that the placement of these power plants follows the population distribution, which has historically followed major waterways and ports. Additionally, the strategic placement of these power plants close to major water bodies also provides the water required to help cool the plant however, the placement near the water’s edge, particularly next to the ocean, increases risk of damage from environmental impacts such as sea-level rise, tsunami, hurricane, or other extreme weather events.
This map shows seismic hazard, nuclear power plant sites, number of reactors per site, and the population contained within a 50 mile radius of each nuclear power plant site. The total US average population contained within all of these 50 mile radii is approximately 117.7 million or 38% of the entire US population. More power plants are seen around the Great Lakes and in the Northeast with a higher occurrence of populations which overlap within the 50 mile catchment of multiple nuclear plants. Nuclear plants in California are visibly vulnerable to earthquake risk with one Southern California plant potentially impacting a population over 5 million. More frequent overlap of nuclear power plants and seismic risk is seen in the Southeast as the seismic hazard appears minimal, though not insignificant. This map is not an analytical tool but allows the user to visualize population size within a 50 mile radius of a nuclear power plant as well as proximity to seismic hazard.
Seismic hazard data is provided by the USGS 2008 United States National Seismic Hazard Maps Project (NSHM). Seismic hazard is displayed as Peak Ground Acceleration (PGA); the greater the PGA, the greater objects will accelerate horizontally thusly experiencing a greater force. This map specifically displays the seismic event PGA of a 10-in-100 (10%) chance of exceedence in a 50-year time period. PGA is generally used in the evaluation of building codes, using the Modified Mercalli Intensity Scale (I-X) PGA can be correlated to potential damage (shown in legend) and perceived shaking. Population counts within a 50 mile radius of each nuclear power plant were calculated using the LandScan 2008 TM 30 arc-second Global Population dataset which is a statistical approximation of ambient or 24-hr day/night average population. | <urn:uuid:dfca1cf4-3b56-4ea9-acdb-66657d01049f> | {
"date": "2016-08-30T14:54:47",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982984973.91/warc/CC-MAIN-20160823200944-00236-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9324778318405151,
"score": 3.765625,
"token_count": 545,
"url": "http://ncdp.columbia.edu/library/mapsmapping-projects/nuclear-power-plants-earthquake-risk/"
} |
Optimizing soil moisture for plant production: The significance of soil porosity
MetadataShow full item record
This publication discusses the processes above, within and below the soil that enable water to move and crops to grow, and is intended to help land users make better use and take better care of these basic resources. The document will contribute to raising awareness of possibilities for better use of rainwater and improved management of soils. It will be useful to anyone concerned with maintaining and improving the productivity, quality and health of land, including farmers, advisory staff, trainers and their students, as well as technical decision-makers in governmental and non-governmental agencies. It should also encourage multidisciplinary approaches and dialogue among stakeholders of different backgrounds. | <urn:uuid:63216cc8-5f17-47b2-af8e-3843f27b2e49> | {
"date": "2017-01-24T03:16:56",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00192-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9242686629295349,
"score": 3.171875,
"token_count": 147,
"url": "https://vtechworks.lib.vt.edu/handle/10919/65454"
} |
The Oxford English Dictionary defines facsimile as: "an exact copy or likeness; an exact counterpart or representation1." The current "Collection in Focus" includes a selection of manuscript facsimiles, including books of hours, from the Ingalls Library Rare Book Collection. The original of each item featured is unique because each was produced before the use of movable type, the invention of the printing press circa 1439 by Johannes Gutenberg (c.1398-1468)2 and the subsequent mass production of printed books.
Although many manuscripts were simply functional and very plain, some were quite beautiful and lavish. Such books were created for sovereigns and popes and others with the wealth necessary to afford the luxury of commissioning a book made by hand. The production of manuscript facsimiles is often very expensive as publishers seek to reproduce the text, images and materials at the highest quality possible.
The Ingalls Library collects facsimiles to aid research and scholarship by enabling scholars to study and examine these volumes without having to travel to remote locations to view the original. While facsimiles can never replace the importance of viewing the original item, they are a convenient way to facilitate comparative study.
Hours of Isabel la Catolica is an illustrated manuscript held in the Biblioteca del Palacio in Madrid. The manuscript has 84 miniatures, and represents a move from the richly stylized forms of the Middle Ages to the naturalism of the Renaissance. It consists of the calendar for local and regional feasts, and many Gospel Sequences, Psalms, prayers, masses and passion readings. Thought to have been illustrated in Bruges in the atelier of Willem Vrelant, the book has Catalan script, hinting that Spanish scribes resided in Bruges.
Travels of Marco Polo/Das Buch der Wunder/Le Livre des Merveilles is a full color manuscript presented to Jean, duc de Berry (1340-1416) by John the Fearless (Jean sans Peur) in 1413. It is illuminated by the Boucicaut Master. The duc de Berry was an avid bibliophile who commissioned the most famous book of hours, the Tres Riches Heures. The original manuscript of Marco Polo is housed in the Bibliotheque Nationale in Paris.
The Morgan Crusader Bible, created for Louis IX between 1244-1254, was designed to glorify the French monarch as the spiritual leader of the world. Originally designed without text, the manuscript is thought to have had multiple creative hands of the highest quality. These same artisans are thought responsible for Sainte-Chapelle's wall decoration and stained glass windows, dedicated in 1248. The Bible acquired text in Latin and Persian before passing into 19th century ownership, and surfaced in Egypt with Judeo-Persian inscriptions.
Officium Beatae Mariae Virginis/Book of Hours of the Blessed Virgin Mary is thought to be a book of hours produced in a Paris workshop. Devoted to the liturgical hours of the day, it focuses on the infancy of Jesus and the life of the Virgin. Books of hours were frequently given as wedding gifts or to celebrate the birth of a child, especially the first born. The Officium Beatae…was purchased between 1840 and 1844 by Abbe Marincola, together with other books from the library of Pope Pius VII (1742-1823). In the absence of other documentation, little can be hypothesized about the original patron.
Das Vatikansiche Stundenbuch Jean Bourdichons is a 15th century book of hours owned by the Vatican Library, Biblioteca Apostolica Vaticana, no. 3781. The artist, Jean Bourdichon (1457-1521) was the official painter to French Kings, including Louis XI, Charles VIII, Louis XII, and Francis I. Bourdichon's masterpiece, the Grandes Heurs of Anne of Brittany, is owned by the Bibliotheque National in Paris.
The Golden Gospels of Echternach was produced around 1030 at the Imperial Abbey at Echternach in Luxembourg, under the direction of Abbot Humbert. This great monument of Romanesque manuscript illumination, written in gold ink, comprises 136 folios that contain the Vulgate version of the Gospels and cannon tables. The sumptuous jeweled cover predates the manuscript by about 50 years, and is set with cloisonné enamel plaques, gems, pearls and a synthetic ivory cross. The cover was a gift of the dowager Empress Theophano and her son, Otto III, to the Imperial Abbey. The original manuscript is owned by the Germanisches Nationalmuseum in Nuremberg, Germany.
All of our facsimiles may be viewed by library visitors upon request.
1. The Oxford English Dictionary…. Oxford: The Clarendon Press, v. IV, p. 11.
2. Füssel, Stephan. Gutenberg and the Impact of Printing , translated from the German by Douglas Martin. Aldershot, Hampshire; Burlington, VT: Ashgate Pub., 2004. | <urn:uuid:13ed8d76-a1d6-49fd-9a33-733ba8ee670f> | {
"date": "2016-12-05T15:22:36",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541697.15/warc/CC-MAIN-20161202170901-00160-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.925171971321106,
"score": 3.546875,
"token_count": 1072,
"url": "http://www.clevelandart.org/research/in-the-library/collection-in-focus/manuscript-facsimiles-ingalls-library-rare-book-collection"
} |
I noticed my self saying “where the script is run”, describing what thread was executing the script code in my C++ app. Is it more natural to think of a thread as a physical context, comparing it to a ‘where’ instead of ‘what’? In the real world threads are represented by objects that do something, while no one actually thinks of something as having two different functions. The TV produces both light and sound, but this isn’t by coincidence. Someone created the aggregate function of producing both light and sound by coupling two different objects that do one thing. Just as none of the speaker and screen’s parts overlap (physically impossible), none of their code would overlap if they were made of software.
Applying the idea to threads, why does the code have to overlap between threads? Is sharing memory a prerequisite to concurrent execution, or is it simply an easy way out of your problem that could probably be better understood?
Hmmm. In my case sharing memory between threads makes it very easy to work with the audio data, but maybe using separate processes would be a better analogy? One way or another, it seems like having ONE perfectly-defined abstraction for concurrent execution would be the way to go. | <urn:uuid:087a16a9-6c36-4456-9005-2a56ff801abd> | {
"date": "2017-07-26T04:51:57",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425766.58/warc/CC-MAIN-20170726042247-20170726062247-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9814389944076538,
"score": 2.609375,
"token_count": 257,
"url": "http://vedanamedia.com/2008/11/22/concurrency-contexts/"
} |
By Philip Pilkington, a writer and research assistant at Kingston University in London. You can follow him on Twitter @pilkingtonphil
Shared psychotic disorder, or folie à deux, is a rare delusional disorder shared by two or, occasionally, more people with close emotional ties. An extensive review of the literature reveals cases of folie à trois, folie à quatre, folie à famille (all family members), and even a case involving a dog.
– Medscape Reference
In the previous part of our series on the origins of neoliberalism, we saw that the vigour mustered to start the movement on its way was generated by an enormous repression undertaken by the Austrian political philosopher Friedrich Hayek. When Hayek saw his intellectual position, a position in which he had invested most of his emotional energy, falling to pieces due to contemporary economic events, political happenings and theoretical debates, he opted to seal himself into his own mind and reject reality. Instead he began pushing a political philosophy and a metaphysics that he set to work constructing and disseminating. In this part of the series we explore in more detail the fruits of his labour in America.
In the following two parts of the series we draw extensively on the excellent work which a number of historians of science have undertaken and published collectively in the volume The Road from Mont Pelerin: The Making of the Neoliberal Thought Collective. We cannot recommend enough that the interested reader searches out this volume for more details of this extremely important institution which, in a very real way, has come to shape our political discourse today.
The Road to Serfdom: American Edition
A major concern of the American members of the Mont Pelerin Society, most of whom were based out of the now infamous Chicago School of Economics and Law, was to make Hayek’s delusion more palatable to the American public. During the Second World War many New Deal institutions had solidified and become popular with the public and after the war the majority of Americans did indeed think that their country, while definitively capitalist, was nevertheless one in which the government played a rather large and constructive role.
The political right found themselves completely flummoxed by such a situation. More practical men, like President Ike Eisenhower, jumped on board, while fringe elements, like Joe McCarthy, fled into paranoia, attacking many prominent liberals as Communist agents. Already in the wartime planning era of the 1940s, when Keynesianism loomed large in America, those economists at the Chicago School and elsewhere in the US who had read and absorbed Hayek’s delusion knew that they needed to change the terms of the debate. But how they were to do this proved a daunting question.
In 1945 Hayek conceived that there should be a sister book of The Road to Serfdom written for an American mass audience. Hayek and the Chicago School economists knew that the original was too refined for American tastes. After all Europeans like their propaganda filled with lofty philosophical notions, while Americans are more content with sound bites that chime with certain trigger words that have been circulating since the revolution of 1776. It is the evolution of what effectively became the American edition of The Road to Serfdom that Philip Mirowski and Rob Van Horn explore in their paper “The Rise of the Chicago School of Economics and the Birth of Neoliberalism,” included in the volume mentioned at the beginning of this piece. The evolution of this book was particularly important because it gave rise to a specifically American strain of neoliberalism.
The problem for the Mont Pelerin members was basically as follows: classical members of the Chicago School, like the economist Henry Simons, were, like Hayek, fairly tied to certain ideas that existed in the older liberal school of political economy. Among these ideas was the notion that monopoly and oligopoly were twin evils that conspired against the public and caused inefficiencies in the market. Simons was arguably more tied to this idea than Hayek mostly because Hayek had developed, as we have seen in the previous part of this series, a pathological obsession with planning as it related to forms of government. For this reason Hayek thought that most forms of monopoly were the result of government planning. But whatever his views were, the implications were clear: this sort of ideology was not going to fly in an America that was now dominated by large corporations with substantial ties to the state.
Mirowski and Van Horn make this case apropos of the Volker Fund, a charitable foundation set up in 1932 by home furnishings mogul William Volker, which was then converted into a bankroller of libertarian propaganda by Volker’s nephew Harold Lunhow upon the former’s death in 1947. They write:
The politics of postwar America presumed not only a powerful state, but also a configuration of powerful corporations whose international competitors had mostly been reduced to shadows of their former selves. In promoting “freedom,” they were primarily intent on guaranteeing the freedom of corporations to conduct their affairs as they wished. Thus, the Volker Fund was not interested in bankrolling a classical liberal economic position resembling that of Henry Simons, for it did not adequately correspond to their objectives. American corporations did not fear concentrations of power and generally favored the existence of a powerful Cold War state. It is our contention that the Volker Fund pushed for a reformulation of classic liberalism in the American context to conform to its Cold War antisocialist agenda. The participants in the Free Market Study [an offshoot of the Mont Pelerin Society], and even eventually Hayek, would just have to learn to adjust to the emergent characteristic doctrines of neoliberalism.
The money men loved Hayek’s message that government interference and economic planning would lead to tyranny, but they were not so keen on his purist free market ideas. Fortunately for them, however, Hayek himself was less concerned with constructing a pure free market system than he was with fighting the ghost of what he called “socialism”. Thus a union was accommodated and the child of this marriage was to be Milton Friedman, who would pen the American edition of The Road to Serfdom, which came to be called Capitalism and Freedom.
Before turning to this, however, we should briefly highlight this emergent anti-socialist trend – or, more accurately, this ideological trend constructed against what a fringe group of people thought to be “socialism”. It is this we hear when we stick our ears into the right-wing echo chamber in America today. Many are perplexed with how right-wingers and vulgar libertarians completely change the meaning of the English language and denounce centrist and centre-left politicians and commentators as “socialist” when these people have no interest in having the state seize control over the means of production – which is the definition of the term “socialism”. Now perhaps we can more clearly see that the roots lay buried in the dominant aspect of Hayek’s delusion; which was the aspect taken up and bankrolled by certain right-wing corporate interests in the 1940s and 1950s.
Consolidation of the American Neoliberal Doctrine
As the American Mont Pelerin Society began to accommodate their corporate bankrollers, the discourse of American neoliberalism proper began to crystallise out from Hayek’s original delusion. The state and big corporations were no longer to be feared, as they may have been by classical liberals. Rather they were to seen as guardians of the neoliberal order. Every society needed its networks of power and the goal now became to ensure that these networks of power were populated by people who were initiated into Hayek’s delusion.
This made neoliberalism a far more potent political ideology than the purely negative anti-government sentiment implicit in Hayek’s The Road to Serfdom were it left standing alone. Here was an ideology that politicians could buy into because it secured them a place in the schema. They were to become the handmaidens of corporate interests and were absolved from any need to institute proper government reforms – after all reforms were evil. Thus the neoliberal doctrine gave the politicians a very easy job and, most importantly, one from which they could largely absolve themselves from blame should the situation go awry. After all, they were not in charge – the free market was. Again, Mirowski and Van Horn summarise this situation well:
The starting point of neoliberalism is the admission, contrary to classical liberalism, that its political program will triumph only if it acknowledges that the conditions for its success must be constructed, and will not come about “naturally” in the absence of concerted effort. This notion had direct implications for the neoliberal attitude toward the state, the outlines of what they deemed a correct economic theory, as well as the stance adopted toward political parties and other corporate entities that were the result of conscious organization, and not simply unexplained “organic” growths. In a phrase, “The Market” would not naturally conjure the conditions for its own continued flourishing, so neoliberalism is first and foremost a theory of how to reengineer the state in order to guarantee the success of the market and its most important participants, modern corporations. Neoliberals accept the (Leninist?) precept that they must organize politically to take over a strong government, and not simply predict it will “wither away.”
Again, it is worth stepping out of our narrative here for a moment and pointing out that this makes sense of where we are today regarding the US political scene. On the one hand, we have the Democrats who largely support the neoliberal agenda both in public and behind the scenes, although they still defend the remnants of a welfare state which largely promote dependency on elites. On the other hand, we have the Republicans who support the neoliberal agenda behind the scenes but sell it in public by peddling Hayek’s original delusion to attack the now crumbling remnants of a welfare state which was originally designed for a full employment economy, and which has now in the era of neoliberalism degenerated into a minor tyranny thus providing a false microcosmic confirmation of Hayek’s delusion.
The American edition of The Road to Serfdom took some time to appear. This was because, as we have said, there was a large amount of consolidation going on in the American segment of the neoliberal movement. It took a while for various political realities to be integrated into the doctrine to make it more palatable for elites. Finally, however, in 1962 Milton Friedman published Capitalism and Freedom.
Capitalism and Freedom is a vulgar work. No more nor less propagandistic than The Road to Serfdom, but certainly sanitised and written for a distinctly different audience. Friedman was soon to go on and create monetarism, which would give policymakers a positive program for how to run the economy, but for now he was content with consolidating neoliberalism as a doctrine and ensuring that American elites were not put off by the more radical musings of Hayek. Friedman, in sterile prose, writes of every societal institution as if it were either a natural market or an institution that might encroach on otherwise efficient markets – a highly simplistic “good versus evil” narrative couched in pseudo-scientific terminology. More importantly still, he chalks up monopoly and corporate power as being due to nefarious government interference and even then he dismisses this by evoking his infamous “as if” approach to methodology, thus neutralising the problem altogether:
I have become increasingly impressed with how wide is the range of problems and industries for which it is appropriate to treat the economy as if it were competitive.
And so the road was paved for the American version of neoliberalism which many live under today. Hayek’s delusion had begun to spread in the US by the 1960s. First among a few emotionally and ideologically close individuals (for ideological proximity is the next best thing to emotional closeness), but soon it was to be spread to the population at large by a charming actor named Ronald Reagan who would prove a master at emotional manipulation. Folie à deux, folie à trois, folie à quatre and so on.
In the next part of the series we will explore the emergence of the European version of neoliberalism, also born from Hayek’s delusion, but more accommodative to the trade unions that wielded, and continue to wield, significant power in Europe. This can be read as a spreading of Hayek’s delusion among the institutions of the centre-left, which would then become a steadfast pillar of neoliberalism and a bulwark against a phantom socialism. | <urn:uuid:f13e6d96-d617-46c2-94ac-7ec587895941> | {
"date": "2016-08-26T19:58:31",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296571.15/warc/CC-MAIN-20160823195816-00136-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9723990559577942,
"score": 2.609375,
"token_count": 2594,
"url": "http://www.nakedcapitalism.com/2013/01/philip-pilkington-the-origins-of-neoliberalism-part-ii-the-americanisation-of-hayeks-delusion.html"
} |
Preventing Illness and Infection
How to Prevent the Spread of Infection
We are moving into the fall and winter season when flu and other contagious illnesses tend to become more prevalent. Recent media reports have also highlighted concerns about contagious viruses such as H1N1 and other types of influenza, mononucleosis, staph infections and meningitis.
We encourage you to take the following precautions to reduce your risk of illness at home, school or work and help you have a healthful and safe fall and winter.
- Clean hands regularly with soap and water or use an alcohol-based hand sanitizer.
- Get vaccinations for such illnesses as influenza and meningococcal meningitis.
- Cover your mouth when you cough, using disposable tissues or cough into your sleeve.
- Avoid touching your eyes, nose and mouth.
- Remain at home and away from others until 24 hours after fever is gone.
- Practice good cleaning habits in your home and work environments, including disinfection of surfaces and weekly washing of bedding.
- Keep cuts and scrapes clean and covered with dry bandage
- Avoid contact with other people’s bandages and wounds.
- Avoid sharing personal items such as razors or towels.
- Wipe off exercise equipment before and after you use it.
- Obtain medical care as needed.
- Remain at home and away from others until 24 hours after fever is gone without the use of fever-reducing medicines, such as Tylenol or ibuprofen.
Recent media coverage has focused on the H1N1 virus. Symptoms of H1N1 include the following:
- sore throat
- runny or stuffy nose
- body aches
- diarrhea (in some cases)
- vomiting (in some cases)
Emergency Warning Signs: If you become ill and experience any of the following warning signs, seek immediate emergency medical care. In adults, emergency warning signs that need urgent medical attention include:
- Difficulty breathing or shortness of breath
- Pain or pressure in the chest or abdomen
- Sudden dizziness
- Severe or persistent vomiting
- Flu-like symptoms improve but then return with fever and worse cough
Please visit us on Facebook for more information.
WHERE TO GO IF YOU ARE SICK
If you have insurance or can pay cash:
- Immediate Care, 4722 W. Kellogg (take West Street exit), 316-440-2565
- Take Care Clinics (inside some of Walgreen's), 1-866-825-3227
- West Wichita Minor Emergency Center, 8200 W. Central (across the street from Bishop Carroll High School), 316-721-4910
If you do not have insurance:
- E.C. Tyree Health & Dental Clinic, 1525 N. Lorraine, 316-681-2545. Take proof of income. There will be a minimum charge of $30.
- Brookside United Methodist Church Clinic, 2760 S. Roosevelt, 316-652-0152.
- Hunter Health Clinic, 2318 E. Central, 316-262-2415. Taka picture ID and a check stub for the last 30 days. Visits are pro-rated based on income.
For more information about the prevention of disease, access the Centers for Disease Control and Prevention’s Web site at www.cdc.gov. | <urn:uuid:db54f170-f5f3-4f50-970e-da6d1de90be1> | {
"date": "2014-07-24T19:22:35",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997890773.86/warc/CC-MAIN-20140722025810-00096-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8951207995414734,
"score": 3.28125,
"token_count": 715,
"url": "http://www.friends.edu/health-wellness-preventing-illness?device=mobile"
} |
Date published: 30 March, 2015
The vole guard must be made of plastic and be flexible enough to expand or unroll to allow plant growth.
The width must be no less than three centimetres. The height must be a minimum of 20 centimetres and a maximum of 50 centimetres.
The guard must be positioned into the ground around the stem of the young plant.
The immediate surrounding area must be strimmed or cut to prevent voles climbing vegetation and bypassing vole guards.
Please make sure you abide by conditions set out in the Forestry Grant Scheme claim form and guidance.
Click 'Download this page' to create a printer-friendly version of this guidance that you can save or print out. | <urn:uuid:551f9042-9d50-41fc-bedc-328a7a8437f6> | {
"date": "2019-02-18T00:31:55",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247483873.51/warc/CC-MAIN-20190217233327-20190218015327-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.880908191204071,
"score": 2.765625,
"token_count": 151,
"url": "https://www.ruralpayments.org/publicsite/futures/topics/all-schemes/forestry-grant-scheme/forestry-grant-scheme-capital-items/vole-guard/"
} |
If you’ve been seeing bats around your home, you’re not the only one.
Surprise visits from bats are common this time of year. Baby bat “pups” are just learning to fly, and you might see them practising their insect-hunting skills around your property.
Some might even unintentionally find their way into your house. If you see one, don’t panic.
“The young are new to echolocation and may accidently fly into your house as they learn to orient themselves,” Danielle Dagenais, a biologist and coordinator with the B.C. Community Bat Program for the Greater Vancouver-Squamish region, said in a press release. “Don’t be [alarmed], they will find their way out if you leave a window or door open for them.”
Female bats gather in maternity colonies in early summer where they stay with their babies until they’re ready to fly. Some bats have adapted to living in human structures, such as under roofs or siding, in attics, barns and other buildings.
While some see having bats as a benefit for insect-control, others may want help removing them. The BC Wildlife Act makes it illegal to exterminate or harm bats. Bat exclusion – using devices to deter bats from nesting – is only allowed in the fall and winter once the bats are no longer in the building.
But the B.C. Community Bat Program wants to help you find the resources and support you need. You can visit bcbats.ca or call 1-855-9-BC-BATS ext. 11 for more information on how to remove bats, report bat sightings, or get advice and support for dealing with them on your property.
They also ask that you report any bat deaths in colonies in houses, barns or bat houses. Don’t touch a dead bat with your bare hands. They can contract rabies. If you or your pet have been bitten or scratched by a bat, talk to your doctor or veterinarian. | <urn:uuid:c9f3d994-d760-4330-8a26-f384de4772ee> | {
"date": "2019-05-27T08:28:55",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262029.97/warc/CC-MAIN-20190527065651-20190527091651-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9455506801605225,
"score": 2.765625,
"token_count": 430,
"url": "https://www.newwestrecord.ca/community/bats-in-your-belfry-don-t-go-batty-1.23392171"
} |
Pulmonary atresia is a rare heart defect. In a normal heart, the blood flows in from the body to the right atrium. It then goes into the right ventricle. Next, the blood travels to the lungs through the pulmonary valve. There, it picks up fresh oxygen. The blood then returns to the left atrium and goes into the left ventricle. The blood moves out to the rest of the body.
With this defect, there is no pulmonary valve in the heart. Blood cannot flow into the pulmonary artery. This is the artery that brings blood to the lungs. Other heart problems, like a small right ventricle, may also be present.
A direct cause is not known. This defect develops while the baby is forming in the womb. The baby is born with the condition.
These factors increase the chance of pulmonary atresia in your child:
- Family history of congenital heart defect
- Other heart defects
- Certain chromosomal disorders, such as Down Syndrome
Your doctor will ask about your child's symptoms and medical history. A physical exam will be done. Your child's doctor may also detect a heart murmur during the exam.
Images may be taken of your child's chest. This can be done with:
Talk with the doctor about the best treatment plan for your child. Some defects may be so severe that they are difficult to treat. Treatment options include:
Medicines, like Prostaglandin E1, will be given to keep a vessel that connects the pulmonary artery and the aorta open. This opening allows some blood to continue to reach the lungs, especially when the ventricular septum is intact. This is a temporary treatment.
Sometimes a shunt can be placed between the aorta and pulmonary artery. This is done to improve blood flow to the lungs.
Several surgeries may be considered depending on:
- The size of the pulmonary artery and right ventricle
- Other heart abnormalities that your child may have
Open heart surgery aims to:
- Remove the temporary shunt
- Close any holes between the chambers of the heart, if they are present
- Enlarge the pulmonary artery, if needed
- Insert an artificial valve, if needed
- Reconnect veins and arteries for proper circulation
When the right ventricle is too small to pump blood effectively, other surgeries may be done. These can reroute blood to the lungs.
Your child will need to see a heart specialist regularly. Your child may need to take antibiotics prior to certain medical or dental procedures. This is to prevent heart infections.
There is no way to prevent this condition. Getting appropriate prenatal care is always important.
- Reviewer: Michael Woods, MD
- Review Date: 07/2013 -
- Update Date: 05/11/2013 - | <urn:uuid:71db3de7-7ba4-4250-bf4e-b7e14c3d242f> | {
"date": "2014-11-27T04:14:14",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931007797.72/warc/CC-MAIN-20141125155647-00204-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.874678373336792,
"score": 3.65625,
"token_count": 583,
"url": "http://sahealth.com/your-health/?/619539/"
} |
Show image list »
General Andy Jackson & the Seminole Indian War...
Item # 206059
June 6, 1818
NILES' WEEKLY REGISTER, Baltimore, June 6, 1818
* General Jackson in Florida with the Indians
* Arbuthnot and Ambristie are executed
Perhaps the best item in this issue is the report headed: "Indian War" which includes: "....A party of the Tennessee volunteers amounting to near 50 arrived in this town [New Orleans]...from St. Marks. Gen. Jackson had discharged all his militia & himself with 1200 regular troops...If his purpose be to reach the Alabama, Pensacola will not be far out of his way...We are informed that the power of the savages is totally broken, their towns burnt, their corn destroyed..." with more. This is followed by another report from the Louisiana Gazette which includes: "A number of Tennesseans, who lately were volunteers in Jackson's army in Florida...The accounts...had left general Jackson on his march to attack the Indian encampment at Swancey...General Jackson pursued them some distance...Gen. Jackson now discharged the Tennessee volunteers...took up a line of march for Fort Gadsden. It was thought by some that the general might pay a visit to Pensacola..." with more (see).
Among other reports in this issue are:
* "Slavery of the Mind"
* "Mellish's map of the World"
* "Army of the United States" is a very lengthy list of appointments & promotions
* Message from the Governor of Connecticut is signed in type: Oliver Wolcott
* "Reply of the President" to the leaders of Annapolis, Md. is signed in type: James Monroe
This issue is complete in 16 pages, measures about 6 1/2 by 10 inches. Very nice condition.
This small size newspaper began in 1811 and was a prime source for national political news of the first half of the 19th century. As noted in Wikipedia: "Niles edited and published the Weekly Register until 1836, making it into one of the most widely-circulated magazines in the United States and himself into one of the most influential journalists of his day. Devoted primarily to politics, Niles' Weekly Register is considered an important source for the history of the period."
Category: Pre-Civil War | <urn:uuid:8a10d314-4e3a-4873-aa5d-13a71f99ead1> | {
"date": "2017-10-22T16:49:10",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825308.77/warc/CC-MAIN-20171022150946-20171022170946-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9675636887550354,
"score": 2.734375,
"token_count": 494,
"url": "http://www.rarenewspapers.com/view/206059?list_url=%2Flist%3Fcode%3Dwwii_other_wars_1800s"
} |
THE BEAR WAS GONE
Short Story written by: Pia Francisca Zuñiga (7 years old, her first short story)
Years and years ago only 800 animals existed: 100 rabbits; 200 turtles; 100 grasshoppers, 300 dogs, 40 bears and 60 pumas.
You know that animals need to live and to reproduce, well, this is what happened in Argentina:
One day the female bear left her home. She was gone and the other bears were very worried because they needed to reproduce so as not to become extinct.
But one day, when the bears were relaxing by the river, the female bear reappeared with lots of other female bears. She had gone to look for some female friends to share her life and to make the other bears happy too.
This is how the bear breed was saved and why we can see bears nowadays.
*This story is only fiction.
Share this short story for kids with your friends on Facebook, Google +, or Twitter with the buttons you’ll find at the end of the story. Thank you! | <urn:uuid:23ec81c3-8683-4aa6-b43b-a64bd1b217d6> | {
"date": "2018-10-21T07:21:37",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513760.4/warc/CC-MAIN-20181021052235-20181021073735-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9710132479667664,
"score": 3.125,
"token_count": 225,
"url": "http://www.shortstories.net/fables-bear-gone/"
} |
Just a quick posting to let you all know about the 150th anniversary of the Battle of Wilson’s Creek, near Springfield, Missouri that occurred August 10, 1861. The battle is considered the Bull Run of the West, as it was the first major engagement of the war in the West and, like its Eastern counterpart, was a Confederate victory. In addition, Brig. Gen. Nathaniel Lyon was killed in the battle and it paved the way for German immigrants to participate in large numbers for the Union cause, as they made up a portion of Lyon’s army. This is a short posting, as I am heading down to take part in the weekend events to commemorate the battle, including the reenactment. I will post on this early next week, but will be away from the blog for a few days. Until then, happy reading and researching. | <urn:uuid:f0531f2b-73a8-4567-9408-4160400190bb> | {
"date": "2015-03-04T15:16:31",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00092-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9803292155265808,
"score": 2.515625,
"token_count": 175,
"url": "https://civilwarhistory.wordpress.com/2011/08/10/the-bull-run-of-the-west-150-years-ago/?like=1&source=post_flair&_wpnonce=6952e6b5fb"
} |
(Archived document, may contain errors)
May 6, 1983 CLOSING THE MATH AND SCI .ENCE GAP INTRODUCTION American education is confronting a grave crisis. So declares Schools throughout the nation are turning out graduates the recent report by the President's Commission on Excellence in Education. woefully deficient in mathematics and s cience education. Over the past fifteen years the number of qualified secondary teachers of mathematics and science has fallen drastically. The prospects for training present education majors in these fields are dim for education majors are increasingly d r awn from the bottom quarter of college classes. These, regrettably, are least intellec tually capable of grasping the demanding disciplines of mathematics and science schools have become embarrassingly lax; the traditional core curriculum has been gutted a nd replaced by courses of highly questionable academic merit. According to a National Institute of Education report, for example, 58.6 percent of American high I school students in 1981 were enrolled in driver education, while only 37.3 percent were takin g general science. Standardized test scores in verbal and mathematics apptitude have declined steadily over the past 19 years (in mathematics, they have declined 30 points). Not surprisingly, postsecondary institutions have had to institute remedial course s , which supplant rigorous course content, that prepares the graduate for gainful employment, responsible adulthood, and enlightened leadership. Naturally, the hard disciplines of physics, chemistry, engineering, and mathematics have suffered, with possibl e disastrous impact on the U.S. ability to compete on the world market r..
Graduation requirements in many of this nation's public high Congress seems about to throw money at the problem, apparently oblivious to the .fact that, as federal funding for educa tion has increased over the past 15 years, academic performance has declined. 2 And in their rush to expand the federal role, legislators seem to have forgotten that the Department of Education has presided over the virtual collapse of basic standards in public education.
The two leading bills now before Congress would provide funding primarily for training new mathematics and .science teachers, retraining teachers of other disciplines in these subjects, and instituting in-service training programs. These congressional efforts are poorly targeted. They would spend money while ignor ing the factors that threaten the education system as a whole such as the exodus of bright women from the classroom and inade quate teacher salaries. Most important, the crisis i n education can be traced to the centralization of education at the federal level and the abdication of control by the federal government to special interest groups a false and destructive dogma, which aims for an unrealistic rigid equality at the expense of excellence, and dismantles an academically demanding curriculum. The most powerful interest group, the National Education Association (which lobbied hard for the Cabinet-level Department of Education consistently and vehemently has resisted efforts to s ubject its membership to accountability or to hold students to standards In seeking competent mathematics and science teachers from a pool of increasingly academically incompetent education majors and in continuing to fund and enforce federal mandates tha t have crippled education, Congress is engaged in an exercise in futility. Taxpayer funds should not be given to those responsible for America's present educational predicament. Rather, Congress and the states should correct the basic faults of the educati on system. incompetent, though supposedly Ilqualified, people, and to draw into education knowledgeable individuals from other fields.
Teachers should be accredited by rigorous testing of general intelligence and knowledge of subject matter. Teacher salari es should be based upon performance. Finally, the federal govern ment should recognize its sorry track record in education and withdraw from policymaking local matter and should be returned to them These groups have succeeded in mandating Certification re q uirements must be redefined to weed out Education is essentially a state and MANIFESTATIONS OF THE PROBLEM The Shortacre of Oualified Teachers Although more than enough certified teachers are available in the U.S. (in 1977 approximately 160,000 applied fo r approxi- mately 110,000 teaching positions),l a dearth of mathematics and science teachers persists. Between 1971 and 1980, the number of teachers nationwide prepared to teach secondary school mathematics Survey of Recent College Graduates, U.S. Departme n t of Education, National Center for Education Statistics. 3 declined 77 percent; those prepared to teach secondary school science declined 65 percent.2 According to a 1982 report, 44 states indicated a shortage or critical shortage of chemistry and mathem atics teachers 45 indicated a shortage of'physics teacher The result: mathematics and what are commonly referred to as the hard sciences (e.g chemistry and physics) are seriously under represented in the nation's public schools.
One reason for this shortag e is that experienced teachers of mathematics and science are quitting In 1980-81, 4 percent of them left for higher paying employment, primarily in business and industry--a rate five times the loss due to teacher retirement.4 Many of the vacated math and science teaching positions are either being filled by teachers certified in non-science disciplines or are not being filled at all In 1980, for example, 26 percent of the nation's teaching positions in mathematics were held by teachers not certified in th e subje~t Of greatest concern, however, is that ,public school teachers of rigorous subjects are selected from a group who, as college- bound high school seniors, were among the poorest students in mathematics and verbal skills as measured by Scholastic Ap t itude Test (SAT) scores. Certification requirements compound the difficulty; some states do not even require that secondary teachers of mathematics study up to the level they may teach.6 Fallinq Graduation Requirements Although 45 states have secondary sc h ool graduation require- ments, eight require no units of mathematics and ten require no units of science. districts demand more than one year of mathematics or more than one year of science for a diploma. Fewer than one third of the high schools even teac h calculus.7 In many high schools, a credit in driver education is considered equivalent, for purposes of graduation, to a credit in physics or math.8 Only one-third of America's 16,000 school Chris Pipho, "Differential Pay Schedules: A Solution to the Tea cher Shortage?" Phi Delta Kappan, March 1983, p. 453 National Convention in Precollege Education in Math and Science, National Science Foundation Fact Sheet, May 1982 Pipho, op. cit., p. 453 Ibid.
Lawrence P. Grayson, "Leadership or Stagnation A Role for T echnology in Mathematics, Science and Engineering Education" (a National Institute of Education study), Engineering Education, February 1983, p. 363 National Convocation in Precollege Education, op. cit.
Tom Wicker, "Asking Less, and Getting It," New York Times, March 25 1983 p. A31 4 A'report by Clifford Adelman of the National Institute of Education prepared for the National Commission on Excellence compares the percentages of students enrolled in certa in courses from 1971 to 1981 with those of students enrolled in those same courses from 1964 to 19
69. In 1969, the report showed, 96.9 percent of American secondary students were enrolled in English I; this had dropped to 76.5 percent by 19
81. In 1969, 87.8 percent were taking U.S. government; in 1981, this had fallen to 51.1 percent. General science classes contained 61.1 percent of American students in 1969; in 1981, only 37.3 percent took such classes. Algebra I enrollments fell to 63.8 percent in 19 81, from 75.5 percent in 19
69. Conversely, enrollments in sociology jumped to 19.0 percent in 1981 from 6.9 percent in 1969, while student enrollments in driver education skyrocketed to 58.6 percent in 1981, from a mere 0.3 percent in 1969 standardized te st scores. Since 1965, mathematics and verbal SAT scores have declined. Between 1965 and 1980 the scores on the mathematics section of the SAT fell from 496 to 466.9 Poorly trained high school students translate into lowered Poorly prepared high school gr aduates adversely affect the academic rigor of the colleges they enter. Indeed, the number of remedial courses in four-year institutions of higher education increased 72 percent between 1975 and 19
80. By 1980, one-fourth of all mathematics courses offered in two- and four-year institu tions of higher learning were remedial.1 Is it any wonder that there has been a disturbing decline in the number of postsecondary students receiving degrees in the hard.sciences, engineering, and mathematics? In 1950, 36 per c ent of all bachelor and first professional degrees were in science and engineering percent. In 1965, a record 30 percent of all master's degrees were in science and engineering; by 1980, the figure was 18 percent engineering fell from a high of over 60 pe r cent during the years 1950 through 1969 to a low of 51 percent in 1980 In 1980, the proportion had fallen to just 29 The share of doctoral degrees received in science and The net result of this general decline in the knowledge base has been poorly prepare d graduates entering the work force the first time America's newest adults are less skilled than their parents (a syndrome known as Ifdownward mobility1 Industry, which traditionally has depended and built upon the basic academic competencies of its new re cruits, can no longer do so. some 300 of the United States' largest companies have been compelled to offer remedial courses in basic mathematics and English for their entry-level workers.ll For To date National Convention in Precollege Education, op. cit.
Report by the National Commission on Excellence in Education, April 19
83. John Naisbitt, Megatrends (New York: Warner Brothers, 1982 p. 32 lo l1 5 The military, too, needs an increasing number of educated troops for their Specialized Skill Training, whic h'equips officer and enlisted personnel with the skills and information to perform special jobs such as medical specialist, electronic engineer propulsion engineer, field radio operator, aircraft maintenance specialist, and aerospace ground equipment mech anic. The Reagan Administration's military program increases the demand for science trained workers in the companies building the new, sophisticated weapons systems.
The average citizen today must make political decisions and judgments about scientific concerns as diverse as toxic waste disposal, genetic engineering, robotics, and nuclear power.
Without a fundamental knowledge of the disciplines which under gird these topics, Americans have no base from which to weigh and measure conflicting information TH E ROOTS OF THE PROBLEM Women Leaving Teaching Education imparts and replenishes the culture of the society it serves. The quality of that culture depends in great measure upon the quality of its educators. In the United States, these educators historicall y have been among the finest and brightest women. Today, however, bright women have left education to pursue professions traditionally open mainly to men. By 1990 for example, it is predicted that the number of women earning bachelor degrees in business wi l l be eight times greater than the number earning such degrees in the 1960s Salary A key disincentive for attracting and retaining quality teachers is salary. Teacher salaries are now the lowest of any profession requiring a college education. Using consta n t 1980-81 dollars as a measure, the annual salary of classroom teachers fell from a high of $20,533 in 1973 down to almost $17,000 in the 1980s, a 15 percent decline.12 the case of mathematics and science, where science graduates choosing business as a ca r eer can expect salaries well above their colleagues in the teaching profession This is a particular problem in Poor Quality of Teacher Colleges Many of those entering teaching today do so because they either cannot or will not succeed in more demanding ca reers.
This, in turn, depresses the quality of teacher colleges and l2 Nancy Dearman and V.W. Plisko, eds., The Condition of Education 1982 Washington, D.C National Center for Education Statistics, 1982) p. 103 6 education departments. Lyn Gubser, former e xecutive director of the National Council for Accreditation of Teacher Education NCATE complains that the enforcement of the council's standards has relaxed over the past several years. In the mid 1970s, he reports, fewer than 5 percent of the institution s reviewed by NACTE were denied accreditation in one or more programs. next few years, however, more rigorous accreditation standards were applied, and by 1978, 25 percent of the institutions reviewed had programs turned down. By 1982, only 5 percent of th e insti- tutions reviewed were denied accreditation in one or more programs.
This decline apparently was attributable to the failure of NCATE to hold programs to the more rigid standards.13 A NCATE committee moreover, recently proposed that the council eli minate its most important requirement: evaluate their graduates For the that institutions of teacher education Teacher colleges and education departments stress education and methods courses rather than those with substantive discipline content. In the ca s e of science, such emphasis could produce science teachers who may know something about teachinq methods but who could know little about science. Good scientists and mathematicians who are attracted to education often find that the route they are required to travel in order to teach screens out the very competencies needed to do it well of acquiring a teaching certificate effectively removes education from consideration by many--probably most-of the brightest and the best The present process The National E d ucation Association I A serious barrier to quality science and mathematics educa tion in the public schools is the National Education Association NEA A union representing nearly four-fifths (or 1.6 million of the nation's teachers, NEA is one of the most powerful political lobbies It lobbies, however, only rarely in the best interests of education, but primarily for the immediate interests of its own membership.
As the teacher population is increasingly drawn from the bottom quarter of college classes--the population least capable of handling the rigorous disciplines of math and science-the NEA has fought to eliminate or weaken all measures that would question the performance of their membership For example, the NEA vehemently opposes standardized testing- - the best researched and most accurate measure of academic performance available--arguing that it Iffosters inequality The union also opposes assessments of teacher competence, either before certification or at any time during a teacherls tenure. Its oppos ition is effective.
NEAIs stated goal is to control all teacher training and employment, arguing Ifthe profession must govern itself, as do l3 A Conversation with Lyn Gubser," Education Week, March 23, 1093, pp. 7 17. 7 other professions. It has also succe eded in enforcing compulsory union membership (with dues set at several hundred dollars a year per person) in many jurisdictions.14 What the NEA has chosen to overlook, however, is that other professions are subject to accountability. If a lawyer loses to o many cases, he soon has no clientele. The education profession on the other hand, has no such checks. Tenure is automatic for any teacher who has taught more than three years An incompetent teacher, therefore, in most cases reigns unchecked. While other p rofessions have stiff standardized entry tests education poses few barriers. Other professions attract indivi duals from the higher college strata; education attracts those from the lowest In addition, the NEA consistently and vigorously has opposed diffe r ential pay rates to provide higher rates of pay in disciplines where there is a shortage. If schools are to pay science teachers enough to attract high quality recruits, the union also would have them pay the same rates .for incompetents and for teachers i n fields where there is already a surplus entry into Federal Actions The most damaging blows to science and mathematics education have been from Washington. Federal actions have dismantled an academically demanding curriculm and provided the NEA with a Ca b inet-level Department of Education years, federal mandates have favored the disadvantaged pupils at the expense of those who have the highest potential to contribute positively to society. Less able students have received almost exclusive attention and ma s sive federal funding. While there have been test score gains at the lower end of the scale, they have been more than offset by declines at the upper,end of the scale. Further confirmation of the negative impact of federal mandates comes from the National A ssessment of Educational Pro gress. This organization recently issued a report on the reading, science, and mathematics performance of American youth during the 1970s (see Chart I For the past twenty Chart I National Mean Percentages of Changes in Perform a nce in Reading Science, and Mathematics, Within Lowest and Highest Achievement Classes for 9-, 13- and 17-Year-Olds for Two Assessments Age 9 Age 13 Age 17 Lowest Highest Lowest Highest Lowest Highest Reading 5.0 1.4% 1.4 0.3 1.0 0.4 Science 1.0 -2.5 1.5 2.5* 0.6 -3.9 Mathematics 1.1 -3.0 1.2 -3.4 1.2 -4.3 Significant change in performance between assessments.
Source Reading Science and Mathematics Trends A Closer Look," National Assessment of Educational Progress, December 1982 l4 Chester Finn, "Teacher Politics ,I1 Commentary, February 1983, p 12 8 As the chart indicates, although the lowest achievers did imp r ove, this was not nearly enough to offset the decline among the highest groups, especially in mathematics and science A key reason for this erosion of achievement standards is that the federal government has dismantled an academically demand- ing curricul u m by catering to the demands of special interest groups, such as the disadvantaged, racial minorities, the handi capped, women, and non-English-speaking students. The concerns of each special group have replaced a generalized concern for the welfare and a d vancement of the whole. All special concerns are portrayed as having equal claims, as deserving equal considera- tion and equal fulfillment for lack of an objective standard by which to judge them. Indeed, any attempt to judge between them brings the crit icism of discrimination. Yet, the mark of a civilized body politic is the ability to weigh competing claims and to order them on the basis of their merits.
The curricular changes which have been mandated by the federal government have infused education with a distorted and dangerous perception of the parts at the expense of the whole.
CONGRESSIONAL EFFORTS TO REMEDY THE PROBLEM Efforts are underway in Congress to remedy the deleterious effects of the long-term neglect of mathematics and science in the nati on's public school systems. One measure (H.R 1310 introduced by Congressman Carl D. Perkins (D-Ken passed the House in March 19
83. In the Senate, S. 530, whose chief sponsors are Robert T. Stafford (R-Vt and Claiborne Pel1 (D-R.I has just been endorsed b y the Senate Arts, Education and Humanities Subcommittee of the Labor and Human Resources Committee. Both measures call for the usual federal solution of throwing money 425 million and $400 million, respectively) at the problem rather than addressing the need to reform the education system itself.
H.R 1310 places about half of its $425 million in the hands of the Department of Education. these funds to the states according to a formula based on popula tion and poverty statistics. The states, in turn, are t o pass most of the money to local education agencies. These must use the funds to rectify deficiencies in mathematics and science at the elementary and secondary levels through such activities as in-service training for teachers, the updating of instructi o nal programs, and the establishment of partnerships with outside organizations, such as institutions of higher education and business and industry. These partnerships are meant to take the form of in-service training programs for math and science teachers the lending or leasing of equipment to upgrade the school's instructional hardware, visiting lecturers from the private sector (under the supervision of a certified teacher on-site instruction at the private sector location, and summer jobs in business an d industry for classroom teachers The Department is to parcel out 9 At the postsecondary level, the federal government is called upon to fund a National Teaching Scholarship program to upgrade the skills of teachers currently certified in these disciplines and to encourage college students to choose teaching careers in them. H.R. 1310 stipulates that the pool of selected candidates must include Ilindividuals who are unrepresented or underrepresented in the respective disciplines," such as women, racial and ethnic minorities, and the handicapped. In addition, funding for summer institutes to upgrade the knowledge base of already certified teachers and of their supervisors is provided.
The remaining portion of the $425 million is to be admin istered by the National Science Foundation to improve the quality of science and engineering faculty, instructional equipment, and college courses S. 530 is similar to H.R. 13
10. Under the administration of the Department of Education 90 percent of the designated $400 mil lion is to be allocated to the states according to a formula based on population. Sixty-five percent of the state money is targeted for math, science, computer, and foreign language pro grams in elementary and secondary schools; 35 percent is targeted for teacher training, teacher retraining, and in-service training programs at colleges and universities An amendment to S. 530 reserves some small percentage of state funds for exemplary programs to aid underrepresented populations, including minorities and w omen as well as the gifted and talented. Additional funds for programs administered by the National Science Foundation are expected to be added to this measure by the full Labor and Human Resources Committee.
The Administration is still.coo1 to these measu res, but has supported two bills S. 706 and H.R. 1324, introduced by Senator Orrin Hatch (R-Utah) and Congressman John N. Erlenborn (R-Illinois respectively. Unlike H.R. 1310 and S. 530, the Administration backed measures allocate comparatively limited do l lars ($50 million) to train those individuals who could within one year become qualified to teach mathematics and science at the secondary school level. The Administration backed measures stress the inclusion of private schools in all transactions and add the signi ficant statement require a scholarship recipient to become certified under state law These bills, however, appear to have little or no prospect of enactment Nothing in this Act shall be construed to While Congress is clearly aware that the count r y faces an acute problem in science and mathematics education, its attempts to meet the crisis once again fail to address the underlying causes. Congress is seeking to spend taxpayers' money to counter the obvious and catastrophic symptoms while continuin g to fund and enforce the equally obvious causes. The inevitable result will be the establishment of a huge new bureaucracy to absorb the funding while further obscuring the real issue. 10 Any in-service training attempts to upgrade the skills of the young e st generation of teachers probably is a waste of time energy, and resources. These teachers are the product of the weakened curriculum of the past twenty years and have been drawn increasingly from the bottom quarter of a poorly educated college populatio n . For the most part, they are ill-equipped to handle the rigors of mathematics and science. In addition, they are generally protected by tenure and thus they have no incentive to improve. The only teachers who could benefit from in-service training is tha t rapidly dwindling number of older, capable individuals who received a thorough education years ago present problems in math and science education as long as they seek candidates from the pool of current high school graduates. Programs, such as that at th e Harvard Graduate School of Education in which corporate retirees are being trained to become teachers of mathematics and science, offer the most realistic way to lure this talent into the classroom of the marketplace. Personal ambition has been fulfilled . Many are now willing and available to serve one of the higher aims of mankind--the training of its youth Teacher scholarship programs are also unlikely to remedy the Older men have met the challenge Business/industry/school partnerships merit some explor ation.
But education cannot serve only the marketplace wider function. Moreover, assuming that the principal obstacle to providing adequate science education is a shortage of hardware in the public schools is a trap that must be avoided. Mental discipline and subject content are the missing links the fact that school closets are packed with unused teaching machines and other relics of the Itclassroom technological revolu- tion" of the 1960s. The problem is not lack of machines or lack of money; the problem is lack of teachers with mental discipline professionalism, subject knowledge, and personal commitment to the highest goals of education It has a far Witness RECOMMENDATIONS What needs to be done is 1. Redefine teacher certification requirements. Existing certification requirements bar competent individuals from entering the teaching profession and protect those already in the system.
Excellence in teaching requires, minimally, (a) a liberal arts education and (where applicable) expertise in a specific sub ject area; (b) a course in human development so that the aspiring teacher will be knowledgeable of the sequential development of children's logical reasoning and (c) classroom apprenticeships to acquaint the candidate with children and with classroom proc e dures 2. Accredit teachers throuqh riqorous testing of general intelligence and knowledge in specific subject matter. These 11 are the primary determinants of an individual's ability to impart knowledge. Doctors must pass stringent state medical licensin g boards; lawyers must pass stringent state bar exams; teachers should have to pass stringent.state teacher exams to determine their fitness to teach 3. Base'salaries on performance and need. High quality learning comes from high quality teaching. And high quality teachers ought to be paid what they are worth not be the measure by which salary increments are received performance should. In addition, with certification requirements redefined and accreditation standards firmly in place, there should be salary differentials to offset the serious shortage of teachers in mathematics and science Seniority should 4. Withdraw federal mandates. Mandates have diluted the curriculum by catering to special interests, to the detriment of the whole. Upgrading mathematics a nd science education will have far less impact on student performance if the rest of the curricu lum is mandated by present day social legislation; for, the by-products of a sound education in mathematics and science discrimination, judgment, accurate lab e ling, the ability to weigh competing claims based on their relative merits) are at fundamental odds with the ideological underpinnings of this legislation (that all points of view, cultures, and contributions have equal merit and are not to be critically e xamined 5. Limit federal funding of education. Federal monies mean federal control, and durinq the past fifteen years, the federal government has clearly demonstrated its inability to work in education for the welfare of the whole control of education to social reformers whose llreformsll have forced upon our schools,a false and destructive ideology.
It has relinquished its Education is a state and local matter and should be returned to them. Local regulations of education may, in some cases warrant critic ism, yet it is better that an isolated school system here and there go astray than that an entire nation of school systems do so To this end, the federal government should aggregate its discretionary programs in education into block grants and allocate th ese funds to the states. This would diminish federal involvement and allow states and localities the time to accumulate tax provided funds to continue the program, if they desire.
The proper role of the federal government in education has been identified b y the Reagan Administration essence a local, private matter and can be most effectively handled at those levels. Quite properly, the Administration would have the federal government focus its limited resources on defining and encouraging excellence, (thro u gh exemplary private sector research projects making available the most up-to-date and well-proven methods of its attainment, and rewarding people and programs that exemplify excellence in education with presi- dential excellence awards education is in 12 CONCLUSION Education reflects the values and priorities of society.
Over the past twenty years, those values and priorities in the United States have been determined in large part by federal legislation and judicial mandates. These fiats.have established and nourished programs and attitudes antithetical to the competen cies and skills which are fundamental to mathematics and science.
Massive federal funding to implement the mandated programs and policies has 'fed the malady that now afflicts education and its component parts. Paradoxically, those who have demanded and continue to demand federal programs and funding are now prominent i n the ranks of those who react with dismay at the results and panic stricken, seek to curtail what they continue to promote It must be remembered that the ultimate function of education is to make man all that he is capable of being To attain this an educa t ion program must provide the finest leadership, emphasize excellence, profess and pursue the highest of values, and foster perceptual clarity and intellectual acumen in those it seeks to serve federal government has eroded, rather than strengthened, these principles And there is little reason to believe that the solution proferred by Congress for the deficiencies in mathematics and science teaching-more federal involvement--will move the nation's schools once again in the proper direction It is all too evi dent that the expanding.role of the Eileen Gardner, Ph.D. Policy Analyst | <urn:uuid:8ce4bbe0-f1bb-47cb-8028-a0073a19b821> | {
"date": "2017-09-23T00:14:40",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689411.82/warc/CC-MAIN-20170922235700-20170923015700-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9540937542915344,
"score": 2.71875,
"token_count": 6039,
"url": "http://www.heritage.org/education/report/closing-the-math-and-science-gap"
} |
Diagnosis Code B19.1
Information for Patients
Also called: HBV
Your liver is the largest organ inside your body. It helps your body digest food, store energy, and remove poisons. Hepatitis is an inflammation of the liver. One type, hepatitis B, is caused by the hepatitis B virus (HBV). Hepatitis B spreads by contact with an infected person's blood, semen, or other body fluid. An infected woman can give hepatitis B to her baby at birth.
If you get HBV, you may feel as if you have the flu. You may also have jaundice, a yellowing of skin and eyes, dark-colored urine, and pale bowel movements. Some people have no symptoms at all. A blood test can tell if you have it. HBV usually gets better on its own after a few months. If it does not get better, it is called chronic HBV, which lasts a lifetime. Chronic HBV can lead to cirrhosis (scarring of the liver), liver failure, or liver cancer.
There is a vaccine for HBV. It requires three shots. All babies should get the vaccine, but older children and adults can get it too. If you travel to countries where Hepatitis B is common, you should get the vaccine.
NIH: National Institute of Diabetes and Digestive and Kidney Diseases
- Hepatitis B
- Hepatitis B -- children
- Hepatitis B Vaccine: What You Need to Know (Centers for Disease Control and Prevention)
- Hepatitis B: Information for Parents (Centers for Disease Control and Prevention)
- Hepatitis B: Information for Parents (American Academy of Family Physicians)
- Hepatitis B: Information for Parents (American Academy of Pediatrics)
- Hepatitis virus panel
- Preventing hepatitis B or C
- What I Need to Know about Hepatitis B - NIH - Easy-to-Read (National Institute of Diabetes and Digestive and Kidney Diseases) | <urn:uuid:8dec7e18-33ce-4ec8-af56-da0213b6d3e4> | {
"date": "2017-05-23T09:01:57",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607593.1/warc/CC-MAIN-20170523083809-20170523103809-00305.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8779365420341492,
"score": 3.921875,
"token_count": 422,
"url": "http://icdlist.com/icd-10/b191"
} |
WYOMING NEWS SERVICE, Casper, WY – The month of March is Colorectal Cancer Awareness Month. The American Cancer Society is reporting some good news – colorectal cancer incidence and mortality rates have declined significantly over the past decade, because of early detection and better treatments.
But don't tell colon cancer survivor Robert Webster – not to be confused with our Sheridan City Councilman – that it's a disease that only strikes people over 50. His daughter was also diagnosed with the disease, and that happened when she was just 20. That's why Webster is volunteering as a spokesperson for the American Cancer Society about the importance of recognizing symptoms, understanding risks, and getting screened.
While normal screening starts at age 50, Webster says he and his family got tested much younger. And there are symptoms such as blood in the stool, a change in bowel habits, and abdominal pain that merit a check with a doctor.
Then, he says, there is prevention.
The American Cancer Society says there is proof that early detection, better treatments and healthier lifestyles are working, because colorectal cancer rates have dropped significantly over the past decade.
Even so, the Wyoming Department of Health lists it as the second-leading cancer cause of death. | <urn:uuid:5a71a2d8-d3fc-4097-b2a1-811c76ae056a> | {
"date": "2016-10-22T02:21:52",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.28/warc/CC-MAIN-20161020183838-00252-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9718001484870911,
"score": 2.65625,
"token_count": 256,
"url": "http://www.sheridanmedia.com/news/cancer-survivor-get-tested15400?page=1"
} |
Preschool teachers are often fabulous at nurturing independence, cooperation, patience, and self-control in young kids. Why? They've developed an arsenal of tactics for dealing with kids of every possible personality. And they don't get bogged down by mommy guilt. Here are their classroom-tested tips for solving common behavior issues like getting little kids to share, listen, clean up, and more.
By Marisa Cohen and Ilisa Cohen from Parents Magazine
"My son has a tantrum whenever one of his friends starts to play with his toys."
Let him hide his favorites. Meltdowns happen when a child feels he has no control over a situation. Before a get-together, let him choose a few toys to stash away. "That gives him a say in the matter and makes him more inclined to share his other things willingly," says Terese Parker, a teacher at the Kirkwood United Methodist Preschool, in Kirkwood, Missouri.
Lead by example. When two children in her class fight over a toy, Deborah Field, a teacher at the Temple Beth El Preschool, in Swampscott, Massachusetts, tells them, "Actually, that's mine, and I'm letting you have a turn because it makes me happy." She suggests buying a small truck that you designate as "Mommy's toy." Then, if your child won't let a buddy use his things, offer the friend "your" toy -- and say how nice it is to watch him play with it.
Create a sharing story. Staple several pieces of construction paper together, and make a picture book. On the first page, show your child refusing to share and his friend frowning. Then show him pondering the options, such as offering a different toy or taking turns. The final entry should be a picture of the children playing together nicely. "Read it every day," Parker suggests. "It will give him cues about how to behave, and soon he'll make the correct choices himself." | <urn:uuid:6ea42b94-9dd8-45fa-a9c3-44767fc1b5f9> | {
"date": "2013-12-20T22:13:23",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345773230/warc/CC-MAIN-20131218054933-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9780193567276001,
"score": 2.8125,
"token_count": 405,
"url": "http://www.parents.com/toddlers-preschoolers/starting-preschool/curriculum/advice-from-preschool-teachers/?page=1"
} |
The following is a description of the traditional Asian diet as believed to be related to disease prevention and increased longevity. The dietary principles described here are based on the historical diets of rural Japan, China, and other Asian nations. Today, many fast-food restaurants and western-style eating patterns have become more common in Asia. With these recent dietary changes, heart disease, obesity, and cancer rates have also been on the rise.
A well balanced diet is an important part of a healthy lifestyle. Throughout the world agriculture, climate, availability of certain foods, and cultural differences influence what people eat. The United States has developed the Food Guide Pyramid to show healthy eating patterns for people over two years of age. Other parts of the world may have different ways of eating, but they may be just as healthy.
The traditional Asian diet receives a lot of attention because many of the chronic diseases, such as heart disease, diabetes, and certain cancers, are not as common in Asia as in the United States and other western nations. Researchers believe that the Asian plant-based diet provides protection against many chronic diseases. The diet is also believed to contribute to the long life spans commonly seen in Asia.
If consumed in adequate amounts, the traditional Asian diet contains all of the essential nutrients needed by most adults. High in fiber, vitamins, minerals, and antioxidants, the Asian diet is also low in saturated and total fat. It is this combination that many health professionals believe protects against many chronic diseases, such as heart disease and cancer.
The Asian diet is relatively low in meat and dairy foods. Protein and iron are obtained from nuts, seeds, and legumes. Iron is also provided through certain vegetables, such as dark leafy greens. Calcium is obtained from soy products, nuts, seeds, and green leafy vegetables.
The dietary principles of the Asian diet are meant to be for the average healthy adult. Individuals with special nutritional needs, such as children, pregnant women, or those with certain medical conditions, should consult a physician or registered dietitian to determine their appropriate dietary requirements.
Foods Eaten Daily
The following is a general description of how foods are proportionately consumed in the traditional Asian diet. Foods are divided into categories based on whether they are to be consumed daily, weekly, or monthly. The Asian diet does not recommend serving sizes or number of servings per day. Rather the emphasis is on a proper balance of healthy foods.
- Grains and Breads: Of the foods consumed on a daily basis, rice, rice products, noodles, breads, millet, corn, and other grains are consumed in the greatest amount. Potatoes and cereals are included in this food group.
- Vegetables: Fresh vegetables are also consumed in large quantities in the traditional Asian diet. Cabbage, bok choy, scallions, dark leafy vegetables, and bean sprouts are just a few of the many different kinds of vegetables used.
- Fruit: Fruit is another food that is enjoyed on a daily basis, with as much variety as possible. Bananas, mangoes, tangerines, watermelon, grapes, and pineapple are examples of the many fruits used for desserts as well as in main courses.
- Nuts and Legumes: Nuts and legumes are the main sources of protein in the traditional Asian diet. They are also good sources of fiber, vitamins, and minerals. Soybean is a commonly used legume in the Asian diet. It can be found in many different forms, such as tofu and soy milk. Nuts, seeds, and tofu are often used in soups, salads, noodle dishes, and main courses.
- Vegetable Oils: Vegetable oils, which are high in unsaturated fats, are used mainly in cooking. This is one of the main differences between the historical Western style diet which uses butter, margarine and other saturated fats in cooking. Medical studies have indicated that a diet high in saturated fats may play a role in some chronic disorders, such as heart disease. Replacing saturated with unsaturated fats, particularly monounsaturated fats which are found in canola and olive oil, has been shown to decrease the risk of heart disease.
- For the average healthy adult.
- Not for children, pregnant women, or those with special nutritional needs.
- Please consult a registered dietitian or physician for further guidelines.
Optional Daily Foods
- Dairy products: Dairy foods, such as milk and cheese, are not commonly consumed in most traditional Asian diets. If used on a daily basis, choose low or nonfat products in moderate amounts.
- Fish and Shellfish: Fish and shellfish are also considered to be an optional daily food. This is because many Asian people, such as those living in the interior regions of China, did not have access to large amounts of fish. Medical studies have found a relationship between eating fish and prevention of chronic diseases such as heart disease.
Foods Eaten a Few Times a Week
- Sweets: Sweet desserts, that are high in fat and sugar, are consumed in moderation and on a weekly basis only. Try fresh fruit as a healthy and delicious dessert.
- Eggs and Poultry: Eggs, chicken, or turkey are also consumed only a few times a week.
Foods Eaten a Few Times a Month
- Red Meat: Meat is eaten monthly, or more frequently if consumed in smaller servings.
Calcium and Osteoporosis
The lack of dairy foods raises concern about calcium intake and osteoporosis. Even though Asians historically have had low rates of osteoporosis, there may be other factors involved. For example, many rural Asians traditionally spend much of their day performing vigorous activity. Regular exercise, especially weight bearing exercises, may reduce the risk of bone loss. Therefore, a diet with sufficient calcium, along with regular exercise, is suggested for decreasing the risk of osteoporosis.
Although calcium can be obtained from plant foods, it is most readily available from dairy products. As a result, low-fat or nonfat milk or milk products are recommended as important sources of calcium in the American or Western diet. Please consult a registered dietitian for further guidelines.
- Physical Activity — Many Asians bike or walk for transportation. It is recommended that some form of regular exercise be adopted for health. Regular physical activity has been shown to help control weight, reduce stress, and prevent many chronic diseases.
- Tea — Green and black tea is consumed widely in Asia. Some medical research suggests that the various beneficial antioxidants found in these teas may provide a protective effect against some chronic diseases, such as throat, stomach, lung, and breast cancer.
- Sodium — Historically, Asian diets have been high in sodium, partly due to the use of soy sauce. Today, many Asians are lowering their salt consumption by switching to reduced-sodium soy sauces. They are also increasing their use of many herbs and spices for seasonings. For example, ginger, basil, lemon grass, garlic, fennel, clove, cinnamon, and fresh and dried chiles are just a few of the herbs and spices being utilized as flavor enhancers.
- Wine, Beer, and other Alcoholic Beverages — Alcoholic beverages are considered optional in Asian-style diets. They should be consumed only in moderation. Many health and social factors should also be taken into consideration before determining whether alcohol should be used. For example, alcoholic beverages should be avoided during pregnancy or before operating a motor vehicle.
|This Sample Diet Provides the Following|
|Protein||120 gm||Sodium||3,772 mg|
|Carbohydrates||214 gm||Calcium||657 mg| | <urn:uuid:e5e42806-d42d-4935-bd75-525e3cb18725> | {
"date": "2019-09-22T12:51:07",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575513.97/warc/CC-MAIN-20190922114839-20190922140839-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9551261067390442,
"score": 3.34375,
"token_count": 1579,
"url": "https://www.gicare.com/gi-health-resources/asian-diet/"
} |
In an aside to his contribution to our recent discussion of same-sex marriage (my contribution is here), Big Think’s Peter Lawler wrote that Darwinists agree with many religiously observant people in “thinking that the main point of any social animal is to generate replacements and raise them right.” The idea that the purpose of our lives should be to pass on our genes is often attributed to Darwinists, but it’s not something you will learn in an evolutionary biology class. That’s because it’s not at all what the theory of evolution says.
Evolutionary theory offers a naturalistic explanation for the diversity of life. The theory of evolution is essentially that organisms adapt to their environment as new, heritable traits that help them survive and reproduce are passed on to their offspring. The theory accords beautifully with the observed evidence and is completely uncontroversial among biologists, although any sort of naturalistic explanation of life may run counter to the basic (and ultimately non-falsifiable) metaphysical beliefs of many people.
Evolutionary theory doesn’t say anything about what is right or wrong. It offers an explanation for why human beings developed they way they did. But on its own it doesn’t say anything about what what we should do now that we are here. We can say that passing on our genes is "the point" of human biology only in the sense that specific human characteristics developed largely because they enabled us to pass on our genes. But this is different from saying, as religious people sometimes do, that it is "the point" of human life in the sense that we have a moral imperative to go forth and multiply.
The fact that humans developed the way we did because it contributed to our ability to reproduce certainly doesn’t mean that we should devote our lives solely to passing on our genes. Consider that natural selection rewards passing on our genes at all costs. It might help your children’s chance of survival under certain circumstances, for example, to murder your step-children. People who murdered their step-children in times of scarce resources might in fact be more likely to pass their genes on to future generations. But even if that were the case, murdering your step-children would still be a terrible thing to do. Even religions that say we have some duty to procreate would agree that passing on our genes doesn't justify any crime.
The idea that evolutionary theory tells us that the goal of human life should be to reproduce a version of what the philosopher G.E. Moore called “the naturalistic fallacy.” As Moore pointed out, the fact that something is something happens naturally does not make it good. Gravity may explain why things roll downhill, but tells us nothing about whether it’s better for things to be at the bottom of hills than at the top of them. Likewise, the fact that there may be a natural explanation for why human beings murder and rape certainly does not justify murder or rape, even if it may incline us to be more understanding of our baser impulses.
The naturalistic fallacy is related to David Hume’s famous claim that we cannot derive what ought to be from what actually is. Science can and should inform our choices, but there are no empirical observations we can make to answer fundamental moral questions. We cannot prove that murder is wrong by looking at the fossil record any more than we could prove it's wrong by shooting a beam of particles at gold foil. That's why moral philosophers and theologians do not work in the field or perform experiments in laboratories.
It’s also why you won’t hear prominent biologists testifying in court that relationships that don’t involve biological reproduction are immoral. Because that’s just not what the science says. | <urn:uuid:d942bde6-fad0-4f39-bdac-b49ccba3b7c3> | {
"date": "2014-09-19T09:52:28",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131238.51/warc/CC-MAIN-20140914011211-00017-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.957415759563446,
"score": 2.546875,
"token_count": 773,
"url": "http://bigthink.com/politeia/evolution-and-the-meaning-of-life"
} |
All computers, from the family home computer to those on desktops in the largest corporations in the country can be affected by computer security breaches. This guide provides general overview of the most common computer security threats and the steps you can take to protect against these threats and ensure that your computer is both safe and cannot easily be used to attack other computers on a network or on the Internet itself.
Importance Of Security
While the Internet has transformed and greatly improved our lives, this vast network and its associated technologies have opened the door to an increasing number of security threats from which individuals, families and business must protect themselves. The consequences of attacks can range from the mildly inconvenient to the completely debilitating. Important data can be lost, privacy can be violated and your computer can even used by an outside attacker to attack other computers on the Internet.
Threats to Data
As with any type of crime, the threats to the privacy and integrity of data come from a very small minority. However, while a car thief can steal only one car at a time, a single hacker working from a single computer can generate damage to a large number of computer networks that can wreak havoc on our country's information infrastructure. Whether you want to secure a car, a home or a nation, a general knowledge of security threats and how to protect yourself is essential.
Viruses are the most widely known security threat because they often garner extensive press coverage. Viruses are computer programs that are written by devious programmers and are designed to replicate themselves and infect computers when triggered by a specific event. For example, viruses called macro viruses attach themselves to files that contain macro instructions (routines that can be repeated automatically, such as sending email) and are then activated every time the macro runs. The effects of some viruses are relatively benign and cause annoying interruptions such as displaying a comical message when striking a certain letter on the keyboard. Other viruses are more destructive and cause such problems as deleting files from a hard drive or slowing down a system. A computer can be infected with a virus only if the virus enters through an outside source - most often an attachment to an email or a file downloaded from the Internet. When one computer on a network becomes infected, the other computers on the network - or for that matter other computers on the Internet - are highly susceptible to contracting the virus.
Trojan Horse Programs
Trojan horse programs, or Trojans, are delivery vehicles for destructive computer code. Trojans appear to be harmless or useful software programs, such as computer games, but are actually enemies in disguise. Trojans can delete data, mail copies of themselves to e-mail address lists and open up computers to additional attacks. Trojans can be contracted only by copying the Trojan horse program to a computer, downloading from the Internet or opening an email attachment.
Web sites have come alive through the development of such software applications as ActiveX and Java Applets. These applications enable animation and other special effects to run, making web sites more attractive and interactive. However, the ease with which these applications can be downloaded and run has provided a new vehicle for inflicting damage. Vandals can take on the form of a software application or applet that causes destruction of various degrees. A vandal can destroy a single file or a major portion of a computer system.
Innumerable types of network attacks have been documented, and they are commonly classified in three general categories: (1) reconnaissance attacks, (2) access attacks, and (3) denial of service (DoS) attacks.
Reconnaissance attacks are essentially information gathering activities by which hackers collect data that is used to later compromise networks. Usually, software tools, such as sniffers and scanners, are used to map out and exploit potential weaknesses in home computers, web servers and applications. For example, software exists that is specifically designed to crack passwords. Such software was originally created for computer administrators to assist people who have forgotten their passwords or to determine the passwords of people that have left a company without telling anyone what their passwords were. Placed in the wrong hands, however, this type of software can become a very dangerous weapon. Access attacks are conducted to gain entry to e-mail accounts, databases and other confidential information. DoS attacks prevent access to all or part of a computer system. They are usually achieved by sending large amounts of jumbled or other unmanageable data to a machine that is connected to the Internet, blocking legitimate traffic from getting through. Even more malicious is a Distributed Denial of Service attack (DDoS) in which the attacker compromises multiple machines or hosts.
Data transmitted via any type of network can be subject to interception by unauthorized parties. The intercepting perpetrators might eavesdrop on communications or even alter the data packets being transmitted. Perpetrators can use various methods to intercept data. IP spoofing, for example, entails posing as an unauthorized party in the data transmission by using the Internet Protocol (IP) address of one of the data recipients.
Con artists have been perpetrating scam operations for decades. Now more than ever, the stakes are higher as they've got easy access to millions of people on the Internet. Scams are often sent by e-mail and may contain a hyperlink to a web site that asks you for personal information, including your password. Other times, scam e-mail may contain a solicitation for your credit card information in the guise of a billing request. There are ways to take proactive steps toward protecting yourself from scams on the Internet, such as never giving out your password, billing information or other personal information to strangers online. Because it is easy to fake e-mail addresses, be mindful of who you're listening to or talking with before you give out personal information. Don't click on hyperlinks or download attachments from people or web sites you don't know. Be skeptical of any company that doesn't clearly state its name, physical address and telephone number.
Spam is the commonly used term for unsolicited e-mail or the action of broadcasting unsolicited advertising messages via e-mail. Spam is usually harmless, but it can be a nuisance, taking up people's time and storage space on their computer.
Once you understand the threats, putting the proper safeguards in place becomes much easier. You have an extensive choice of technologies, ranging from anti-virus software packages to firewalls for providing protection. With all the options currently available, it is possible to implement proper computer security without compromising the need for quick and easy access to information.
Virus protection software can counter most virus threats if the software is regularly updated and correctly maintained. Anti-virus software relies on a vast network of users to provide early warnings of new viruses, so that antidotes can be developed and distributed quickly. With thousands of new viruses being generated every month, it is essential that the virus database be kept up to date. The virus database is the record held by the anti-virus package that helps it identify known viruses when they attempt to strike. The software can prompt users to periodically collect new data. It is essential to update your anti-virus software regularly.
Organizations both large and small need to craft computer security policies. Security policies can be rules that are electronically programmed and stored within computer security equipment as well as written or verbal regulations by which an organization operates. Written policies as basic as warning computer users against posting their passwords in work areas can often preempt security breaches. Customers or suppliers with access to certain parts of the network need to be adequately regulated by the policies as well.
Making sure that your computer system is password protected is the simplest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network. However, the most powerful network security infrastructures are virtually ineffective if people do not protect their passwords. Many users choose easily remembered numbers or words as passwords, such as birthdays, phone numbers, or pets' names, and others never change their passwords and are not very careful about keeping them secret. The golden rules, or policies for passwords are:
- Make passwords as meaningless as possible
- Change passwords regularly
- Never divulge passwords to anyone
A firewall is a hardware or software solution to enforce security policies. In the physical security analogy, a firewall is equivalent to a door lock on a perimeter door or on a door to a room inside of the building - it permits only authorized users such as those with a key or access card to enter. A firewall has built-in filters that can disallow unauthorized or potentially dangerous material from entering the system. It also logs attempted intrusions. | <urn:uuid:14525e1a-fa2d-49d4-b249-7b2b1232c187> | {
"date": "2017-02-26T08:07:27",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00112-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9456983208656311,
"score": 3.390625,
"token_count": 1751,
"url": "https://www.mica.edu/Academic_Services_and_Libraries/Technology_Systems_and_Services/Help_and_Resources/Knowledge_Base/Safe_Computing/Beginners_Guide_to_Computer_Security.html"
} |
Improve Air Quality
- Limit off-road vehicle use. The dust kicked up by these vehicles tends to remain in our air, causing a brown cloud that mixes with other pollutants and causes respiratory problems for many people.
- Restrict leaf blower use, particularly on high pollution days. Consider vacuuming the dust instead of blowing it into the air.
- Limit fireplace use and observe "no burn" days, as burning wood adds particulate pollution to the air. Consider converting a wood-burning fireplace into a gas model.
- Drive slowly on unpaved roads to limit the amount of dust kicked up into the atmosphere.
- Reduce emissions by taking public transit, car pooling or by consolidating trips
- Choose low-water plants for your home/business landscape. Click here to view our water saving plant guide.
- Install a drip irrigation system for your landscape with set timers to control your water usage
- Use gravel or synthetic turf instead of water-guzzling grass for your landscape
- Install spray nozzles on your outside hoses to control water use
- Install low-water use toilets, showerheads and faucets in your home or business. Click here to search for EPA WaterSense labeled products.
- Use a broom or vacuum to clean sidewalks or driveways instead of a hose
- Don't leave the faucet running while brushing your teeth
- Wait to run washing machines and dishwashers until you have a large load to clean | <urn:uuid:f1fe69e7-e557-4b8a-b87f-294f57c7aa6d> | {
"date": "2019-10-22T21:02:37",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987824701.89/warc/CC-MAIN-20191022205851-20191022233351-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8853501677513123,
"score": 2.984375,
"token_count": 302,
"url": "https://www.surpriseaz.gov/1958/Green-Tips"
} |
Accessing the world wide web through a broadband or high-speed connection at home can enhance your online experience. Using a high-speed internet connections has risks, as your computer has to be switched on to use, making it accessible to hackers.By taking some basic precautions and using a few simple tools, you can protect your computer and your information from theft, misuse and destruction. Usa.gov offers tips for online safety and security.
OnGuardOnline "provides practical tips from the federal government and the techniology industry to help you be on guard against internet fraud, secure your pc, and protect your personal information."
The Free Library of Philadelphia (FLP) database InfoTrac OneFile offers these resources about online safety.
The Free Library's online catalog retrieves thirty eight resources when searching for online safety.
Microsoft offers a free password strength checker.
The American Association of Retired Persons (AARP) and Google have partnered to produce a series of online safety videos. | <urn:uuid:67177500-7629-47fc-9a28-a0965bab7e22> | {
"date": "2019-02-24T03:28:43",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249578748.86/warc/CC-MAIN-20190224023850-20190224045850-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8857735395431519,
"score": 2.921875,
"token_count": 202,
"url": "https://libwww.freelibrary.org/faq/faqsubcat.cfm?FAQCategory=89"
} |
Histoplasma Antibody, Serum
Clinical Information Discusses physiology, pathophysiology, and general clinical aspects, as they relate to a laboratory test
Histoplasma capsulatum is a soil saprophyte that grows well in soil enriched with bird droppings.
The usual disease is self-limited, affects the lungs, and is asymptomatic.
Chronic cavitary pulmonary disease, disseminated disease, and meningitis may occur and can be fatal, especially in young children and in immunosuppressed patients.
Aiding in the diagnosis of active histoplasmosis
Complement fixation (CF) titers > or =1:32 indicate active disease. A rising CF titer is associated with progressive infection.
Positive immunodiffusion test results supplement findings of the CF test. The simultaneous appearance of both H and M precipitin bands indicates active histoplasmosis. The M precipitin band alone indicates early or chronic disease or a recent histoplasmosis skin test.
Patients infected with Histoplasma capsulatum demonstrate a serum antibody with a rising titer within 6 weeks of infection. A rising titer is associated with progressive infection. Specific antibody persists for a few weeks to a year, regardless of clinical improvement.
Cautions Discusses conditions that may cause diagnostic confusion, including improper specimen collection and handling, inappropriate test selection, and interfering substances
Recent histoplasmosis skin tests must be avoided because the test causes a misleading rise in complement fixation titer, as well as an M precipitin band, in approximately 17% of patients having previous exposure to Histoplasma capsulatum.
Cross-reacting antibodies sometimes present interpretive problems in patients having blastomycosis or coccidioidomycosis.
Reference Values Describes reference intervals and additional information for interpretation of test results. May include intervals based on age and sex when appropriate. Intervals are Mayo-derived, unless otherwise designated. If an interpretive report is provided, the reference value field will state this.
Mycelial by CF: negative (positives reported as titer)
Yeast by CF: negative (positives reported as titer)
Antibody by immunodiffusion: negative (positives reported as band present)
Clinical References Provides recommendations for further in-depth reading of a clinical nature
Kaufman L, Kovacs JA, Reiss E: Clinical immunomycology. In Manual of Clinical and Laboratory Immunology. Fifth edition. Washington DC, ASP Press, 1997 | <urn:uuid:2277064f-1cd5-44a7-8f3b-b3cef63f6660> | {
"date": "2014-12-23T04:36:39",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802778085.5/warc/CC-MAIN-20141217075258-00051-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8683059215545654,
"score": 2.6875,
"token_count": 528,
"url": "http://www.mayomedicallaboratories.com/interpretive-guide/?alpha=H&unit_code=26692"
} |
Chicago’s Montrose Point Bird Sanctuary
by Richard Pallardy
I’m standing on a promontory jutting into Lake Michigan, looking south at the skyline of the third-largest city in the United States. The skyscrapers that dominate downtown Chicago glint imposingly over a stretch of steely blue water through the slight afternoon haze. I’m at Montrose Point, a roughly half-mile spur of land located on the city’s North Side.The vista is arguably among the best in Chicago. The point’s protrusion into the lake allows for an uninterrupted inspection of the towering assemblage of buildings that I daily wend my way through on my way to work at Encyclopædia Britannica’s offices on the Chicago River. Chicago is, indeed, a city with big shoulders.
I stroll westward, back inland, where a glade stretches upwards, mostly obscuring the buildings beyond. Picking my way slowly up one of the paths leading into the trees, I look around me. I am transported: as the branches close behind me, thoughts of urban life recede and are replaced by subtler, gentler stimuli. The wind gently agitates the leaves of a cottonwood, exposing their silvery undersides. The setting becomes intimate, enveloping; my line of sight extends only a few feet in front of my face as my eyes alight on bows laden with flowers relaxing onto the path and brilliant green shoots poking through the umber leaves littering the ground. A bird calls, and then another. I see a flicker of crimson dart through the increasingly shadowed underbrush: a male American cardinal.I’m entering Montrose Point Bird Sanctuary, a place that could not be more aptly named. The 15-acre refuge (and adjacent 11-acre dune habitat) is a hugely important stopover for hundreds of species of birds, particularly migrants that make their journeys along the shores of the inland ocean known as Lake Michigan. continue reading… | <urn:uuid:28386589-d49d-4e88-bd81-260f87d0b060> | {
"date": "2014-10-22T13:48:33",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507447020.15/warc/CC-MAIN-20141017005727-00217-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9128197431564331,
"score": 2.6875,
"token_count": 417,
"url": "http://advocacy.britannica.com/blog/advocacy/2014/04/21/"
} |
About this task
Step 4 shows the end schema generated. Note that any character which could be misinterpreted by the program is replaced by neutral characters. Underscores replace asterisks, for example.
Rename the schema (by default, metadata) and edit the schema
columns as needed.
Make sure the data type in the Type column is correctly defined.For more information regarding Java data types, including date pattern, see Java API Specification.Below are the commonly used Talend data types:
Object: a generic Talend data type that allows processing data without regard to its content, for example, a data file not otherwise supported can be processed with a tFileInputRaw component by specifying that it has a data type of Object.
List: a space-separated list of primitive type elements in an XML Schema definition, defined using the xsd:list element.
Dynamic: a data type that can be set for a single column at the end of a schema to allow processing fields as VARCHAR(100) columns named either as ‘Column<X>’ or, if the input includes a header, from the column names appearing in the header. For more information, see Dynamic schema.
Document: a data type that allows processing an entire XML document without regarding to its content.
- To generate the Positional File schema again, click the Guess button. Note that, however, any edits to the schema might be lost after "guessing" the file-based schema.
- When done, click Finish to close the wizard. | <urn:uuid:193eff77-8719-4890-a378-79ed2e3f20e6> | {
"date": "2019-10-20T01:21:41",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986700560.62/warc/CC-MAIN-20191020001515-20191020025015-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8183249235153198,
"score": 2.546875,
"token_count": 322,
"url": "https://help.talend.com/reader/9NRa~CylzTWZ8bFvUjlang/i3eWF~CyIoeec6rREDPaLA"
} |
22 May 2011, rev. 31 May 2011
Means for ascertaining the location of a computing device have matured rapidly recently, and include GPS, Wifi, and triangulation within mobile phone cells. Researchers and privacy advocates have long warned about the dangers of person location and tracking. During April 2011, the public became aware that location data was being gathered with much greater intensity, was being retained longer, was being stored in more accessible places, and was being used for more purposes, than consumers had previously realised. The collection and exploitation of data about the users of mobile devices raises serious privacy issues. These are addressed in the APF's Policy Statement on the Location and Tracking of Individuals through their Mobile Devices.
Transmissions over wireless networks are also capable of being exploited in order to gather data about third parties. In particular, various organisations have been collecting positional data as a means of locating stationary Wifi networks. The purpose of this Policy Statement is to declare the APF's position on the gathering of positional data relating to third parties such as the operators of stationary wireless networks, through the interactions between those networks and mobile devices carried by individuals.
Wireless networks pass data between devices by transmitting signals using particular parts of the electromagnetic spectrum. Those transmissions can be detected by any device in the vicinity of the device that sends the message. There is a variety of categories of wireless networks, which have varying characteristics such as the size of the area within which they are usable, and the volume of data traffic that they can support. This document focuses primarily on one particular, currently very common category of wireless network, which is specified by the IEEE 802.11x series of standards, and is usually referred to as 'Wifi'.
The message-content that devices transmit over Wifi networks may be 'in clear', or it may be encrypted. (The most common encryption tool is SSL/TLS, which is used by web-browsers when they communicate with web-servers by means of the https protocol rather than http). For several reasons, most message-content is sent 'in clear'. One reason is that encrypting and decrypting message-content incurs overheads and slows down 'the user experience'. Another is that most users are unaware of the risks they take by transmitting messages in clear, or rely the providers of their devices, software and services to operate in a trustworthy and secure manner.
To transmit message-content over a wireless network, a device also transmits unique identifiers for both the sending device and the device that the message is intended to reach. These unique device-identifiers may be referred to variously as a Network Interface Card Id (NICId) or a Media Access Control address (MAC). Of necessity, the device-identifiers are transmitted 'in clear', i.e. unencrypted. Because of the nature of wireless media, the device-identifiers are able to be detected by every other device that is in the vicinity at the time.
Generally, the hub of a Wifi network transmits a particular message-type every few seconds, which is commonly referred to as a beacon. This publishes the SSID (an identifier for the network), and a range of data describing the network's mode of operation. The beacon also includes the hub's own unique device-identifier. However, because it is addressed to any device in the vicinity, it does not contain the unique device-identifier of any other device. An alternative is available, referred to as 'passive mode', whereby the hub only sends a beacon when requested to by another device that is in the vicinity.
It is inherent in many networks, including wireless networks, that every device may detect every message sent by every other device on that network. Well-behaved devices are designed to ignore messages that are not intended for them. The data is ephemeral in the device's memory, and quickly flushed. This is an implementation of the principle that technology should be designed to forget non-relevant data. However, devices may be designed to instead gather some or all data that it detects, and to retain it and/or make it available to one or more other devices.
Generally, consumer devices such as Wintel and Mac desktops and laptops were designed to be well-behaved and forgetful of data that is not relevant to them. Generally, it appears that mobile devices, including smartphones (running under Apple iOS, Google Android, MS Phone 7, RIM/Blackberry, and perhaps Nokia Symbian) and 'GPS' devices (such as TomTom and Garmin), have been designed to be not well-behaved, but instead to be elements of a surveillance system.
Organisations have interests in taking advantage of data that can be gathered from wireless networks. One motivation is to acquire information about the behaviour of individual mobile devices, and hence about their users. This can then be exploited to provide better services to users generally, or better services for each specific user, or (depending on the point of view) to manipulate users' behaviour.
A second motivation for gathering data from wireless networks is to improve the accuracy with which devices' locations can be computed. Each technique for computing the location of a computing device has limitations. These include, for example, blindspots, local weather conditions, obstructions to wireless signals such as pre-stressed concrete, and network congestion. Several corporations have come up with ways to create and maintain databases that assist them to cope with these limitations. An element of these schemes is the use of positional data associated with Wifi networks.
Users' mobile devices detect and interact with wireless networks. The position that a mobile device was in when it detected a network can be recorded. (For example, a GPS reading may be available when a Wifi network is detected). The Wifi network's identity and location, and the date and time, can then be uploaded to the corporation, with or without the individual being aware of it, or consenting to it. The corporation can thereby create and update a database of locations of Wifi networks, and that database can thereafter be used as a means of computing the location of mobile devices. This has been performed by companies such as Skyhook, and appears to have been a primary reason for Google's 'StreetView' programs, during which they captured not only images of the streetscape they passed through, but also Wifi traffic.
Each message that is transmitted over a wireless network is intended for, and only for, a specific device. It is addressed to a specific device, and is not 'broadcast' and it is not 'published'. Because of the nature of electromagnetic transmissions, however, the message may be detected by devices other than the intended device. Every device other than the intended recipient-device must respect the fact that the message is addressed to another device, and must ignore the message.
That statement applies to the message-content, which may of course be not only private, but also sensitive.
That statement also applies to the device-identifiers that travel with the message. Device-identifiers are by their very nature highly sensitive data. In a great many circumstances, the data is directly associated with a specific individual, or capable of being indirectly associated with a specific individual. If device-identifiers were collected by another party, they would enable the correlation of multiple messages sent and received by the device over a period of time. This would represent a systematic and very serious breach of the privacy of personal communications.
During the first half of 2010, it was discovered that Google, as part of its StreetView operations, had been gathering device-identifiers and message-content (referred to in the reports at the time as 'payload data'). This was a serious breach of privacy expectations, was in many cases a breach of privacy laws, and was in many cases also a breach of telecommunications interception legislation.
The above analysis applies to all messages transmitted on a stationary network, but special consideration needs to be given to beacons. There are three key differences between a beacon and other messages:
The SSID (network name) and the device-identifier for the hub itself may or may not be sensitive. For example, an Internet cafe may consent to, and even encourage, the recording and publication of the network name and the hub's device-identifier; whereas an individual who establishes a personal area network to enable communication among the individual's multiple devices may have a strong preference for their device-identifier to not be recorded or published.
1. All messages transmitted on wireless networks such as Wifi must be regarded as being for the specific purpose of transmitting message-content from the sending-device to the intended recipient-device and to only the intended recipient-device.
2. All devices other than the intended recipient-device that detect messages transmitted on wireless networks:
3. All handling of messages transmitted on a stationary network such as Wifi must be subject to legal requirements that obligate the behaviour described in the preceding paragraphs. Infringements must be subject to criminal provisions, and infringers must be prosecuted.
In general, beacons and data relating to beacons must not be stored, retained nor made available to other devices. If, however, two conditions hold, then exploitation of that data is permissible. The two conditions are:
1. The operator of the hub must have signified their consent to storage, retention and/or disclosure of the data. (It is acknowledged that the standards currently lack a simple means for hub-operators to signify consent. Nonetheless, until the standards are upgraded, the onus must be placed on organisations that wish to exploit the data to demonstrate that they have the hub-operator's consent).
2. The user of the mobile device that detects the beacon must have signified their consent to storage, retention and/or disclosure of the data. (Again, it may not to be simple to achieve free and informed consent by the user; but the onus must be placed on organisations that wish to exploit the data to demonstrate that they have the user's consent).
Cavoukian A. & Prosch M. (2010) The Roadmap for Privacy by Design in Mobile Communications: A Practical Tool for Developers, Service Providers, and Users' Information and Privacy Commissioner, Ontario, Canada, 29 December 2010
Cavoukian A. & Cameron K. (2011) 'Wi-Fi Positioning Systems: Or An Unintended Architecture of Location –Tracking?' Information and Privacy Commissioner, Ontario, Canada, forthcoming, 2011
Metz C. (2010) 'Google ends all Street View Wi-Fi data collection 'Who needs the cars? We'll use handsets'' The Register, 20 October 2010 | <urn:uuid:85ae6149-b32b-4a28-bfbd-9f914490978d> | {
"date": "2018-05-24T12:06:33",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866276.61/warc/CC-MAIN-20180524112244-20180524132244-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9485386610031128,
"score": 2.984375,
"token_count": 2186,
"url": "http://www.privacy.org.au/Papers/PosData.html"
} |
The Public and its Problems
The Public and its Problems is a 1927 book by American philosopher John Dewey. In this work, Dewey touches upon major political philosophy questions that have continued into the 21st century, specifically: can democracy work in the modern era? Is there such a thing as a "public" of democratic citizens, or is the public a phantom, as journalist Walter Lippmann argued in his 1925 book The Phantom Public (and to which The Public and its Problems was a direct response).
Dewey begins his argument by distinguishing between the "state," represented by elected lawmakers, and the "public," the diffuse, often incoherent body of citizens who elect the state. The public is called into being when ordinary citizens experience the negative externalities (or consequences) of exchanges beyond their control (such as market or governmental activities). A public then is made up of citizens whose common interest is focused on alleviating these negative externalities through legislation; in fact, Dewey argues that a public does not actually exist until a negative externality calls it into being.
Dewey asserts that this occurs when people perceive how consequences of indirect actions affect them collectively: “Indirect, extensive, enduring and serious consequences of conjoint and interacting behavior call a public into existence having a common interest in controlling these consequences”. Hence, a public only develops when it has a reason and comes together around an issue of substantial or serious significance.
In the second half of The Public and its Problems, Dewey concedes to the arguments of adversaries of modern democracy (such as Walter Lippmann) by describing all the powerful forces at work that eclipse the public and prevent it from articulating its needs. For example, Dewey explains how special interests, powerful corporate capital, numbing and distracting entertainment, general selfishness, and the vagaries of public communication make effective public deliberation difficult.
Whereas Walter Lippmann believed that the public had little capacity to be a rational participant in democracy and was essentially nonexistent, Dewey held a more optimistic view of the public and its potential. Dewey did not call for an abandonment of the public; rather, he hoped the public would regain a sense of self. The solution to this, he writes, is improved communication. Only then, with communication, will the public find itself and become a cohesive group.
In addition to Dewey's proposition that the public cannot find itself because there are too many publics, he also blames the distractions of modern society. He points out that even in the past, the public has had other concerns than politics: "Political concerns have, of course, always had strong rivals". In discussing the distractions of the past, Dewey explains that those distractions are far more prevalent and bountiful in today's society and citing technology as the main perpetrator.
He uses examples of "the movie, cheap reading matter and [the] motor car as drawing peoples' attention away from politics. These technologies, Dewey explains, are far more desirable topics of discussion for the everyday person than the latest political news. Unfortunately, Dewey does not give a solution to the problem of technology taking away from interest in political affairs. However, Dewey does have hopes that society can someday use its technology to improve communication and thus improve public interest in politics.
Furthermore, he asserts that local community is where democracy must happen so that people can become active and express issues of public concern. In this way, the local community can become the “Great Community.” He writes, “Without such communication the public will remain shadowy and formless…Till the Great Society is converted into a Great Community, the Public will remain in eclipse. Communication can alone create a great community”.
- Dewey, 126.
- Dewey, 137.
- Dewey, 142.
- Asen, Robert. "The Multiple Mr. Dewey: Multiple Publics and Permeable Borders in John Dewey's Theory of the Public Sphere." Argumentation and Advocacy 39 (2003).
- Bybee, Carl. "Can Democracy Survive in the Post-Factual Age?" Journalism and Communication Monographs 1:1 (Spring 1999): 29-62
- Dewey, John. (1927). The Public and its Problems. New York: Holt. | <urn:uuid:2c9b11a5-5582-4a67-b66e-aff587606525> | {
"date": "2015-01-25T23:17:27",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115891802.74/warc/CC-MAIN-20150124161131-00080-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9392160177230835,
"score": 3.59375,
"token_count": 879,
"url": "http://en.wikipedia.org/wiki/The_Public_and_its_Problems"
} |
(JBD & RHS)
Type and reference sections, synonyms, and use of name: The Kokomo Limestone Member was considered by Cumings and Shrock (1927, p. 76) as a formation and was named for about 50 feet (15 m) of color-banded, thinly laminated eurypterid-bearing Waterlime Beds of Foerste (1904b, p. 33) that were exposed in the Markland Avenue Quarry in Kokomo, Howard County, Ind. (SW¼ sec. 36, T. 24 N., R. 3 E.). This use restricted the more or less informal use by Foerste and others of the term Kokomo, which also applied to overlying rocks now assigned to the Kenneth Limestone Member. (See also Cumings, 1922, p. 459-461, for early assignments of the Kokomo to the Waterlime, Lower Waterlime, Lower Helderberg, and Eurypterid Beds, Divisions, etc.)
The type quarry was filled in during the 1960's, which led Shaver (1970, p. 84), following the suggestion of Shaver and others (1961, p. 23), to designate the Kokomo rocks cored at the edge of the quarry in Indiana Geological Survey drill hole 72 as the principal reference section. The core is in the Survey core library and was described in the last-mentioned source (p. 13).
The rank of the Kokomo was reduced to that of member in the Salina Formation (Pinsak and Shaver, 1964, p. 50). The Kokomo Limestone Member was later transferred to the Wabash Formation when the latter unit was assigned to the elevated-in-rank Salina Group (Droste and Shaver, 1982, p. 21).
Description: The Kokomo Limestone Member characteristically consists of strikingly banded tan and gray micritic to very fine grained, thinly laminated and dolomitic limestone. Besides the thin lamination, which may be considered as made up of couples, each consisting of a dark lamina and a light lamina, a more gross alternation of light and dark beds characterizes the Kokomo in some places. At such places the thin lamination is pervasive through the gross couples whose separate light and dark parts are 2 to 10 feet (0.6 to 3.0 m) thick. In addition, as many as four still larger units have been traced in the Cass County area (Tollefson, 1979).
The basis for such recognition has been, besides the gross lithology noted above, the different combinations of lesser Kokomo lithologies that consist of intraformational breccias and contorted beds (considered to represent soft-sediment deformation), algal stromatolites, cut-and-fill structures, molds of evaporate crystals, and other features generally ascribed to very shallow subtidal to intratidal environments, including environments of desiccation. In some places macro-fossiliferous rocks are present in parts of the Kokomo and include the tabulate coral Halysites, so-called "dwarf" cephalopods of the Protokionoceras type, eurypterids, and leperditiid ostracods in coquinas. (See especially Cumings and Shrock, 1928a; Pinsak and Shaver, 1964; Tollefson, 1979; and Shaver and Sunderman, 1983, p. 177-180.)
As recorded especially by Droste and Shaver (1983), the Kokomo variably overlies parts of the cherty Liston Creek Limestone Member (Wabash Formation), very likely conformably or with only very minor localized unconformity, and in some places the Kokomo completely replaces the Liston Creek and rests directly on the Mississinewa Shale Member (Wabash Formation). In the Silurian outcrop area of central northern Indiana and in the subsurface just to the north, the Kokomo underlies either the cherry Kenneth Limestone Member (Wabash Formation) conformably or the Muscatatuck Group (Middle Devonian) unconformable, The Kokomo-Kenneth contact appears sharp in places but not in others, and evidence of unconformity of regional scope is lacking In fact, the Kokomo-Liston Creek relations (noted above) and the existence of a probable Kokomo reef facies (for example, see Indiana University Paleontology Seminar, 1980) appear to deny strongly the classic idea of the Kokomo having grossly unconformable relations with the reef-bearing rock units that include without doubt all the other members of the Wabash Formation.
Distribution of the Kokomo beyond its type area in Howard County and the adjacent Cass County area is poorly understood, although various notations of Kokomo rocks in the Jasper County and Allen County areas have been made from about the turn of the century. Pinsak and Shaver in their 1964 Salina thickness map (pl. 2) defined an approximate Kokomo distribution in the Cass County and Howard County area, but beyond that area they applied the term Kokomo only in Allen County (p. 79). More recently, the term Kokomo has been assigned to rocks in Marshall and Pulaski Counties in areas that are variably north and south of the Fort Wayne Bank (Droste and Shaver, 1983), but Okla (1976, p. 38) recognized the Kokomo only in the counties around the type area. Physical continuity of the Kokomo in typical lithology among ail these occurrences seems most unlikely.
In the cored type section, the Kokomo is about 50 feet (15 m) thick in the type area, including Cass County, it ranges from zero to about 125 feet (38 m) in thickness, the zero being a deposition Al zero for a facies relationship and in the above-mentioned areas beyond the type area, reported thicknesses range from 30 to 125 feet (9 to 38 m).
Correlation: Within the Wabash Formation, the Kokomo correlates, variably, with part of or nearly the whole of the Liston Creek member. In recent years it has been correlated with other rocks of the Salina Group in stratigraphically high positions, as high as the E unit of the Michigan and Appalachian Basins and higher. Much confusion has attended past correlations, however, beginning with correlation with the Lower Devonian Waterlime Beds (so-called) of New York during the period on either side of 1900. The problem was one of commonality of the thinly laminated eurypterid-bearing beds and one of lack of normal-marine index fossils. This problem continued as late as the time of publication of the 1956 bedrock-geology map of Indiana (Patton, 1956), and Pinsak and Shaver's (1964) and Okla's (1976) correlations possibly involve rocks that Droste and Shaver (1983) and Tollefson (1979) assigned to a pre-Mississinewa position as well as to a post-Mississinewa position. Further, the Kokomo correlates, as do Liston Creek rocks, with much of the Bailey Limestone of the Illinois Basin.
The type Kokomo as well as some other parts of the Kokomo are known to underlie the Kenneth Limestone Member Wabash Formation), whose brachiopods, conodonts, and ostracods collectively require a rather Late Silurian age assignment. Moreover, conodonts identified as Spathognathodus eosteinhornensis and S. snajdri have been found in the Kokomo itself (Pollock and Rexroad, 1973). For all these reasons, the Kokomo was assigned a latest Ludlovian to early Pridolian (middle Cayugan) age by Shaver and others (1985). | <urn:uuid:4c330cc7-922c-4db3-a70f-8a0f1b507550> | {
"date": "2014-09-02T23:46:12",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909031808-00123-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9345688819885254,
"score": 2.765625,
"token_count": 1643,
"url": "http://igs.indiana.edu/compendium/comp04ro.cfm"
} |
Mississippi diverted to revive Delta wetlands
Wetlands around the city of New Orleans are disappearing at such an alarming rate that a University of South Carolina coastal marine scientist predicts there will be little of the marshland left by the end of the century.
“At some point New Orleans is going to be an island in the Gulf of Mexico, surrounded by levees,” he said.
Dr. James Morris, director of USC’s Belle W. Baruch Institute for Marine and Coastal Sciences near Georgetown, S.C., has been studying the Gulf Coast for about 20 years. He serves on three committees that are studying different aspects of the restoration of marshes along the Delta and the Mississippi River. This week he was with engineering, science and technology experts working on recommendations for restoring the Delta’s wetlands through diversions of the Mississippi River.
“The basic problem here is the wetlands around New Orleans are not getting sediment like they once did because the river has been altered to prevent flooding,” Morris said. “Navigation is really important here, and they have protected navigation at the expense of the wetlands.”
Years of building canals, levees and dams to control flooding and to make the waters easier for ship navigation has hurt the flow of the Mississippi River sediment, the life-blood of wetlands. The lack of that nutrient-rich sediment has accelerated the loss of wetlands along the Delta, he said. Wetlands are important because they buffer coastlines against floods and soil erosion and they provide habitats for fish and wildlife.
“I’m more involved in the technical aspects of how you go about restoring the marshes. One of the solutions is to divert river flow from the Mississippi into the surrounding bayous,” Morris said. “That’s probably the only feasible solution.”
This summer, in response to flooding, the U.S. Army Corps of Engineers has opened two channels to divert part of the Mississippi River away from New Orleans and toward the wetlands. The Bonnet Carre spillway is sending water into Lake Pontchartrain, while the Morganza spillway diverts water through the Atchafalaya River Basin and into the Gulf of Mexico.
By diverting the river, the starved Delta wetlands are fed with sediment that helps the marshes grow and thrive. It also means some people will have to live with more flooding periodically – some of which is going on right now.
“But the question is, ‘Do you flood a city of a million people or do you flood 1,000 homes in a floodway?’ The answer to that one is pretty easy. That was designed from the get go. People who lived there knew that was going to happen,” Morris said. “Yes, it’s a tragedy for some people, but no one died, no one lost their land. They’ll rebuild. And the city of New Orleans survived.
The engineering, science and technology committee Morris was meeting with this week is sponsored by a coalition of Non-Governmental Organizations including Audubon, the National Wildlife Federation and the Environmental Defense Fund.
He also serves on the NOAA Diversion Workshop Panel that will summarize the benefits and impacts of freshwater diversions on interdistributary soils and vegetations, and he is on the National Research Council’s Gulf Oil Spill Committee tasked with recommending methodologies to assess the damage to ecosystem services in the Gulf of Mexico as a consequence of the Deep Water Horizon spill. | <urn:uuid:331bca3c-b8b1-44db-abda-25a35d183c68> | {
"date": "2015-09-01T14:11:43",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645191214.61/warc/CC-MAIN-20150827031311-00347-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9595575928688049,
"score": 3.3125,
"token_count": 727,
"url": "http://www.sc.edu/news/newsarticle.php?nid=1765"
} |
WebMD Medical News
Daniel J. DeNoon
Laura J. Martin, MD
Aug. 19, 2011 -- An unprecedented drop in the number of women getting mammograms was due to women going off hormone replacement therapy (HRT), a new study suggests.
Up to the year 2000, more and more U.S. women were getting breast cancer screening via mammography at least once every two years.
But in 2005, researchers were astonished to see that fewer women were getting mammograms. What happened has been a mystery until now.
In a new study, National Cancer Institute researcher Nancy Breen, PhD, and colleagues finger the culprit: hormone replacement therapy.
"A change in hormone therapy use was associated with the drop in mammography use for women ages 50 to 64 years, but not for women age 65 years and older," Breen and colleagues report in the early online edition of the journal Cancer.
In 2002, results from the Women's Health Initiative study linked HRT to increased risk of breast cancer. The result was that 6.4 million women ages 50 to 64 and 2 million women ages 65 and older suddenly stopped hormone therapy.
Since a woman needs a prescription to get HRT, women had to see a doctor every year. And the most important factor in whether a woman gets a mammogram is whether her doctor recommends it.
Using data from the National Health Interview Surveys from 2000 and 2005, Breen and colleagues found a statistical link between stopping HRT and getting a mammogram -- but only for women ages 50 to 64.
That solves one mystery, but not another. In 2008, and again in 2010, mammography rates went back up even higher than they had been in 2005. Yet there appears to have been no increase in HRT use.
SOURCES:Breen, N. Cancer, published online Aug. 22, 2011.Breen, N. Cancer, May 15, 2011; vol 117: pp 2209-2218.Kaiser Foundation, statehealthfacts.org: "Percentage of Women Age 40 and Older Who Report Having Had a Mammogram within the Last Two Years, 2010."
The Health News section does not provide medical advice, diagnosis or treatment. See additional information. | <urn:uuid:ab354069-905c-4d34-9f18-aca71479e931> | {
"date": "2013-12-05T10:03:11",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163043499/warc/CC-MAIN-20131204131723-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9516456723213196,
"score": 2.578125,
"token_count": 460,
"url": "http://www.9wsyr.com/webmd/breastcancer/story/Drop-in-Mammograms-Due-to-Hormone-Therapy-Fears/ZzEBslu2YEWS7KIJ9a37wA.cspx"
} |
UNCG Home > The University Libraries > Civil Rights Greensboro Home > Elizabeth Wheaton
Elizabeth Wheaton grew up in Chicago and moved to Greensboro in 1969. She studied the shootings that occurred at a death to the Klan rally in Greensboro in 1979 for the Institute of Southern Studies and for Southern Exposure. She later reported on two federal trials of the case for United Press International. Her book, Codename GREENKIL: The 1979 Greensboro Killings, is a study of this event and the parties and motives involved. Wheaton works for the American Civil Liberties Union of North Carolina. | <urn:uuid:1253c553-58d9-421e-94df-60aa2dda97d7> | {
"date": "2014-07-31T13:32:21",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273350.41/warc/CC-MAIN-20140728011753-00396-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9010471701622009,
"score": 2.59375,
"token_count": 119,
"url": "http://library.uncg.edu/dp/crg/personbio.aspx?c=116"
} |
Tunisia is a country situated on the very north of the African continent. Thanks to its location, the northernmost point of the country called Cape Angela is actually also the northernmost point of the entire Africa. This area is washed by the Mediterranean sea.
Furthermore, the Tunisian Republic, which is the official name, also borders with Libya and Algeria. It covers a total area of more than 165 thousand square kilometres, although the population of this country is only around 11 million people. Their official language is Arabic.
The capital city of Tunisia is called Tunis, which is also the reason for the name of the entire country. Tunis is the largest city and serves as a home to almost 3 million people (including the great metropolitan area).
Tunis is also the centre of attention for most of the country’s politics and economy, as well as business and trade. The Tunisian economy is steadily growing, experiencing a great development during last couple of years. It is the only fully democratised state within the Arab world. Last but not least.
Tunisian economy is mostly oriented in export, agriculture and tourism. Tunisia is for example a member of the Arab League, the African Union, the Group of 77 or the United Nations.
History of Tunisia dates back to the ancient times. Initially inhabited by people today known as Berbers, the larger migration period came during the 12th century BC.
Christianity was brought by Romans occupying the land since 146 BC till around eight hundred years later. Following the footsteps of Romans, Tunisia was also later ruled and occupied by Arabs and Ottomans, as well as France in the 19th century. The Tunisian Republic eventually gained its full independence in 1957.
Tunisia today offers a great blend of history and beautiful nature and landscape. Having a lovely coast of the Mediterranean sea is only one of the appeals for tourists.
The salty water also produce a great quality fish and seafood, contributing to the deliciousness of Tunisian cuisine.
Extreme nature showcasing the old way of living of the old inhabitants is simply showing the strong will of humans to survive in every condition.
The Sahara gates and sand dunes in the south of the country will simply leave you speechless. Last but not least, the culture full of traditions and colours is so welcoming, that you will never want leave. | <urn:uuid:526e3866-3016-4c48-b171-20d5baf67894> | {
"date": "2018-01-21T18:11:50",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890823.81/warc/CC-MAIN-20180121175418-20180121195418-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9707483053207397,
"score": 2.65625,
"token_count": 480,
"url": "http://travellerhints.com/place/middle-east/tunisia/"
} |
The Internet can be a confusing and dangerous place. Without a safety net, many people can fall into the danger zones
of pornography, predators, online scams, Internet viruses, and spyware. With such free access to the Internet around the world,
many have abused it as an opportunity to take advantage of others.
But, there's no reason to fear the Internet. When used properly, with the right precautions and the right information; the Internet
educates, positively influences, and provides a creative outlet for today's kids.
safesurfingkids.com was created as a resource for kids and their parents
to help them work together as they learn about important safety precautions to take while surfing the 'net.'
Should you find any information missing here, or have questions, comments, or suggestions, please
Website Tips for Safe Surfing
For kids and teens, safesurfingkids.com, contains :
information on kid and teen-friendly Search Engines, directories and portals that serve as your
child or teen's entry point onto the Internet.
Links to approved websites for kids and teens.
Parent-child Internet Use agreement that help protect anyone online...
Tips for kids about how to be careful about revealing information and taking care while surfing the Internet.
Safe Surfing - Tips for Parents
For parents, teachers and adults this website contains information about protecting and helping kids and teens with safe
fun, and effective use of the Internet with tips on:
evaluating your browser security
reporting incidents, suspicious Internet activity and illegal websites
information and statistics and surveys about kid's Internet activity
warning signs about dangerous activities your child may be involved in on the Internet
filtering and blocking software that is available for use on your computer
tips on how to communicate with and protect kids who are using the Internet
interpretation of Internet slang and words encoded in acronyms
general rules for de-coding online slang
Internet slang - the meanings of numbers and symbols
sample contract / online agreement for kids and parents
FREE - Printable Internet Safety Lesson Plans
NEW --- WHO are you talking to online? | <urn:uuid:378844ba-6787-44a9-afa3-5ba53c6cdf72> | {
"date": "2014-10-21T06:59:54",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444209.14/warc/CC-MAIN-20141017005724-00075-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.872047483921051,
"score": 2.65625,
"token_count": 437,
"url": "http://safesurfingkids.com/"
} |
Few sights bring spring to mind more than a dogwood tree (Cornus florida) in full bloom. This tree has a naturally graceful and pleasing form, usually covering itself in pure white blossoms in April and May. The dogwood tree attracts wildlife in the fall, when they produce small red fruits that are eaten by squirrels, deer and many species of birds. Given the right conditions and basic care, it's a relatively long-lived tree that grows in U.S. Department of Agriculture plant hardiness zones 5 through 9.
The dogwood is a native American flowering tree, often seen blooming in woodlands in spring. It usually grows to a height of 15 to 30 feet when mature. The tree has a widely branched, broad shape that tends to be flattened at the top. Its flowers consist of four large, flat petals that are modified leaves called bracts, which surround the tiny yellow true flowers. A pink-flowered variety (Cornus florida f. rubra) has extra-showy pink-to-rose flowers and a growth habit similar to the native tree. It also grows in USDA zones 5 through 9.
A healthy, well-developed young dogwood begins flowering when just 2 or 3 years old. The tree usually lives about 80 years, especially when grown under ideal conditions. In its native habitat, it thrives in partial shade under larger woodland trees, where it can become extra tall, reaching a height of up to 40 feet. When cultivated in a home garden, it can also do well in full sun if planted in a spot with northern or eastern exposure, where it's protected from late afternoon sun. Under these conditions, it also tends to develop a bushier, more compact form.
The dogwood tree has a slow-to-moderate growth rate and reaches a height of about 20 feet when it's 25 years old. It growth is most vigorous when planted in well-drained, organically rich soil. If your soil is high in clay and tends to hold water, add some sand to the planting area to improve its drainage. Mixing compost into the soil at planting and top-dressing with compost during the tree's first few years also helps increase the soil's organic content while raising its fertility. To help keep the tree's roots cool and conserve soil moisture, you can add a 4- to 6-inch thick layer of mulch to the area under the tree at the start of summer.
Although a dogwood can have a long life, several disease problems may jeopardize its longevity, especially if it's grown under sub-optimal conditions, such as drought, which stresses the tree. Several fungal diseases may develop in a stressed tree, including dogwood anthracnose, leaf spot and root rot. Providing at least 1 inch of water weekly, especially during the first few years, helps keep the tree healthy. You can also help prevent disease by choosing a planting site with good air circulation and following good cultural practices, such as clearing debris from under the tree regularly and watering only with a soaker hose or drip irrigation, to avoid wetting the tree's foliage.
- Tom Brakefield/Stockbyte/Getty Images | <urn:uuid:37766f4f-592a-4f6a-bed5-def1287511c5> | {
"date": "2016-12-09T06:04:14",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542686.84/warc/CC-MAIN-20161202170902-00216-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.956538736820221,
"score": 3.3125,
"token_count": 658,
"url": "http://homeguides.sfgate.com/average-lifespan-dogwood-trees-83822.html"
} |
DMA hardware is integral to most ARM SoC designs. They are extensively used for driving various peripheral controllers related to flash memory, LCD displays, USB, SD etc. Here we elaborate the functioning of a typical ARM SoC DMA controller and briefly delve into its internal mechanisms. The intent is to explain the underlying architecture of a typical DMA module and then eventually tie those elementary structural features to ARM’s PrimeCell® DMA Controller, which initially might come across as a more sophisticated hardware.
Direct memory access is simply meant to enable the processor to offload memory transfer operations. In this manner a system will be able to dedicate its valuable computational resources towards more apt alternate purposes. So, in fact we can state that a DMA controller is like a processor module which is capable of only executing load-store operations. While a full blown pipelined processor core possesses several other computational features and hence it should rarely be employed for rudimentary data transfers.
Eventually DMA is about transferring data across different hardware modules. Depending on the use case, the DMA source and destination might vary. And depending on the hardware the specifics of the bus protocol employed for load-store also varies. But just like a processor core, a DMA controller core will also be compatible with the hardware bus protocol features related to burst mode, flow control etc. Otherwise it simply won’t be able to move data around.
So, a DMA controller should be simply interpreted as a form of rudimentary logical block meant to implement data transfers. Similar to a processor core, this IP block also plugs into the larger data bus matrix involving SRAM and other peripherals. While a processor executes its object code from instruction memory, a DMA controller executes its operations by loading transfer configurations from a RAM memory segment. Such a configuration is usually termed as a descriptor. This recognizable structure would essentially describe all the details regarding the source/destination, burst size, length of the transfer etc. Eventually, such a configuration table would have to be loaded into the RAM by the DMA driver software running on the main processor. And usually the memory location of this descriptor table would be communicated to the DMA controller via some shared register.
DMA controller is eventually a co-processor assisting the main core software with various complex use cases involving heavy data transfers. For example, populating an LCD image bitmap or transferring contents to an SD card are all DMA intensive features. Such a controller would usually support multiple DMA channels enabling simultaneous transfers. In this particular case, a DMA controller with more than two channels should be able to simultaneously drive an LCD and an SD Card.
An interrupt signal would be usually employed to synchronize these DMA transfers with the main processor operations. So, once the requested data transfer is completed, DMA hardware would simply assert an interrupt, which would be acknowledged by the processor.
Usually, the contents of a transfer descriptor would resemble the DMA controller register structures. Essentially, these memory descriptor contents are blindly loaded into its actual hardware registers by the DMA controller itself. For example, a descriptor would include entries for the source and destination address which would basically correspond to the actual DMA controller source and destination address registers. Such a DMA controller block would also involve a separate core logic which reads these registers and then implements the actual memory transfers. Illustrated by the Fig 4 below.
The transfer descriptor structures written to the memory by the processor would be loaded into the controller registers by the DMA hardware and eventually parsed and executed by its core load/store transfer logic. Undoubtedly, any errors within these memory resident transfer descriptors would also be propagated to the core transfer logic via these registers. Essentially, such a register set is meant to communicate all the relevant transfer configuration details to the DMA load/store engine. It clarifies all the details like source/destination, burst size, transfer length etc, but the actual circuit implementing the load-store loop would be already present within this DMA core.
Every hardware module has a primary interfacing mechanism, simple peripherals use registers and complex processors employ binary object codes. A typical DMA controller interfacing mechanism as elaborated above involves descriptor table reflecting its register set and transfer capabilities. PrimeCell is a DMA IP block from ARM, but unlike a typical DMA controller, its primary interfacing mechanism is not register set or descriptor tables. But it’s an instruction set, very much resembling a simple processor.
PrimeCell integrates a rudimentary processor core which understands a limited instruction set, mostly meant for implementing load store operations and other synchronization mechanisms related to data bus and processor interrupts. So, here, instead of a descriptor table, we have an object code describing the transfer. Essentially a binary code implementing memcpy, but written using assembly instruction code understood by the PrimeCell DMA processor. Obviously, such an instruction code would also specify the source/destination address, burst size etc. It’s an actual binary object code.
This DMA processor core is also multi-threaded with one transfer channel being associated with each thread. These threads possess the same scheduling priority, and the system implements a round-robin scheme. The internal FIFO is utilized as a buffer during DMA transfers and it’s shared across all the channels. Each channel is allowed access to the whole FIFO memory, but of course, at any instant, FIFO utilization across all the running channels can never exceed its total size. Such a flexible shared memory design adds to software complexity but it can also lead to a more productive hardware resource allocation pattern.
Finally, PrimeCell IP block also includes an instruction cache to optimize object code access. Also provides scope for instruction abort handling and watchdog exceptions to avoid lockups. In other words, the module almost resembles a full blown multi tasking processor. But do note that, such transfer related or hardware related exception triggers are present in a typical DMA controller also. So, seems like, with PrimeCell IP, a software engineer is being exposed to the underlying machinery which already exist in other typical DMA hardwares but is eventually hidden behind the veil of register set abstractions. As always, nothing is without a trade-off, the more complicated aspect of managing this module is definitely the object code generation. Which makes a crude compiler out of an otherwise relatively simple DMA driver. | <urn:uuid:008352f3-5073-49b6-acb0-4e98754edad7> | {
"date": "2018-10-24T03:35:56",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583518753.75/warc/CC-MAIN-20181024021948-20181024043448-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9131352305412292,
"score": 2.921875,
"token_count": 1297,
"url": "https://msreekan.com/tag/processor-core/"
} |
Recovery plan for the White Shark (Carcharodon carcharias)
About this document
This document constitutes the Australian National Recovery Plan for the White Shark. The plan considers the conservation requirements of the species across its range and identifies the actions to be taken to ensure the species' long-term viability in nature and the parties that will undertake those actions. This is a revision of the 2002 White Shark (Carcharodon carcharias) Recovery Plan (EA, 2002) and should be read in conjunction with the 2013 Issues Paper for the White Shark (Carcharodon carcharias) (DSEWPaC, 2013).
This recovery plan sets out the research and management actions necessary to stop the decline of, and support the recovery of, the white shark in Australian waters. The overarching objective of this recovery plan is to assist the recovery of the white shark in the wild throughout its range in Australian waters with a view to:
- improving the population status, leading to future removal of the white shark from the threatened species list of the EPBC Act
- ensuring that anthropogenic activities do not hinder recovery in the near future, or impact on the conservation status of the species in the future.
The accompanying issues paper provides background information on the biology, population status and threats to the white shark. | <urn:uuid:1e521ac1-24b5-417b-b624-9136a0989d04> | {
"date": "2015-02-28T07:31:28",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461848.26/warc/CC-MAIN-20150226074101-00125-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.861762285232544,
"score": 2.515625,
"token_count": 270,
"url": "http://www.environment.gov.au/resource/recovery-plan-white-shark-carcharodon-carcharias"
} |
Confederate Battle Flag
Place of Honor
Confederate Battle Flag – what is its’ significance in the history of the Confederacy and America? Should anti-Southern history – and yes, even American history – politicians, special interest groups and ordinary people be allowed to effect its removal from public display? Why not just replace the Confederate Battle Flag with the white flag and make many people, especially the Washington spineless, whining, always-unhappy-about-something 1subspecies (PC politicians) crowd, happy? This would also include all the peripheral hangers-on who are always agitating for one thing or another to benefit themselves. Upon achieving one goal they are on to another. Never satisfied! I have a strong opinion on the flag subject. I feel that the people clamoring for its’ removal or replacement are more guilty of the charge they are making – racism – than are those they are charging. My understanding is that many blacks also fought for the Confederacy under that flag.
Many people died on the battlefield under that Confederate Battle Flag. People who had nothing to gain, no matter which way the war went, but were caught up in its prosecution much as those prior to, and of, the World Wars and subsequent ones. They answered the call of their government, many with no choice. It was their time to fight for a cause outside their realm of control.
As an illustration of the above circumstances, I was a member of the National Guard in 1961 when the Berlin wall was erected. On October 1, 1961, while on the way home from work, I heard on the car radio that we, my National Guard unit, were to report for duty that night. On Oct 11, 1961, 10 days after mobilization, we arrived at Fort Hood, Texas (leaving family, jobs, and friends behind), and started preparations for deployment to Germany by Dec 15. We were assigned as III Corps communications unit for the 1st and 2nd Armored Divisions – my Specialty was cryptography. We were all volunteers with the Guard (state controlled), and the unit had been transferred from state control to regular Army.
At that time, after living through the Second World War (too young to participate) and knowing the History of the Germans and much of their behavior during the war, I could not have cared less about what happened to them, I felt that they deserved just about anything bad that occurred. However, we and some 500,000 more mobilized along with us, were expected to stand up against Russia on behalf of the Germans where, in my opinion, there was a population guilty of many atrocities and war crimes due to their active participation in Hitler’s war machine. We had no choice in the campaign – it was decreed by politicians, in our case, John F. Kennedy and the Russian leader at that time. Years later an article appeared in the local newspaper that the whole event was a ruse to protect the Russian leader from critical events occurring in Russia regarding his leadership. We were pawns in a political game over which we had no control and no obvious personal gain or choice. We were duped, and so was the American public. But we were blindly committed to potential battle under the United States of America Flag by politicians. Many returned home with financial and other problems.
And now, the spineless, gutless politicians and others in Carolina and elsewhere are ready to cave on a flag representing the courageous Confederate soldiers, both black and white, who answered their call to duty. The call to duty was made by their government. This was their time and place in American history, no matter the merits of the fight or their understanding of it. It is my opinion that few had potential gain from the campaign. Those who had wealth in their holdings before the Civil War lost it all. Families were destroyed and future generations, on both sides, were eliminated. They were all called and committed to give their all. Abraham Lincoln was no Hero. The Confederate Battle Flag should be allowed to stand in public places of honor in honor and testament to those who fought under it – they gave their all!
1A subset of the species “Politician.”
2Species. A class of individuals or objects grouped by virtue of their common attributes and assigned a common name; a division subordinate to a genus.
1,2The American Heritage Dictionary of the English Language; William Morris, Editor; Published by: Houghton Mifflin Company. Copyright 1969, 1970, 1973, 1975, 1976. | <urn:uuid:9f8ebe8a-8dfe-4a84-9fe1-e4b4a3c7eadd> | {
"date": "2020-01-27T10:19:51",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251696046.73/warc/CC-MAIN-20200127081933-20200127111933-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9855496883392334,
"score": 2.703125,
"token_count": 919,
"url": "https://www.ihaveheard.com/2015/06/22/confederate-battle-flag-honorable-flag/"
} |
Is your personal life in an uproar, how is your self esteem? Everyone always has room for improvement; yet, some of us need more than others do.
There are ways to improve yourself once you ask yourself “what do I need to do to improve.” Maybe sitting down and writing a list of things that you don’t like about yourself could help. Make sure you prioritize them making the most important one on top and the less important on the bottom. Everyday work on this list checking off each one as you feel it is getting better. Remember don’t stop improving them just because you’ve put a check beside it. It takes time to make changes but you can do it.
Are you working full or part time, if not volunteer if need be? Get busy and don’t just lie around the house doing nothing. Keeping busy and helping others always helps. By helping others, you learn that someone else in the world has it worse than you do. A job always helps especially if you are stressed out about paying a bill and there is no money to pay. Every dollar you make is one dollar more than you had yesterday.
Volunteer to work at the library a couple of hours a day or maybe just one day a week. The nearest hospital is probably in need of a volunteer if nothing just to talk to the ones that are alone and no one comes to see them. Helping others always makes you feel better especially if you can see they enjoyed or benefited from it.
Take a little time out of each day for yourself. You can’t be any good to other people if you don’t take care of yourself. Draw a bathtub of bubbles and relax, go for a walk alone or maybe go to the library and read, bring a book home to read and relax. A little something for yourself each day really helps to relax you and it can make you feel better.
How about doing a little exercising; if you’re not already doing it try it and see how it helps relieve stress. After a while, you’ll notice how you will look forward to exercising alone or with a friend. If you walk with a friend don’t talk about your problems, keep the pace up and talk about the weather or maybe something you’re going to do for your tomorrow. Eventually you’ll notice how much better you feel getting out and taking care of yourself.
Do you watch much TV? Sometimes the news can make a person depressed but then again it can be educational and give you something to discuss with friends or family. Watch the weather and when you’re walking talk, about what is supposed to happen tomorrow; will it rain or snow. The news makes a good conversation when talking to other people.
Go out and visit someone once a week maybe. Get out of the house and be with a friend other than cleaning house when you’re at home. If you don’t have, many friends go make some new ones. Meeting friends is something you can do when you’re volunteering your time; when at the library talk to the librarian when you are checking out that book. New friends can be anywhere if you’re willing to talk. Don’t be afraid if you don’t make a new one every time you talk to someone; just is, yourself and someone else will be there to be the friend you need or want in your life.
Remember life is short, if you need a little improvement here and there, that’s ok. No one is perfect and you can only change the quality of life you have. | <urn:uuid:2e8ad9eb-fdcd-4bee-a4be-bc6d2de5b064> | {
"date": "2019-05-24T20:04:18",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257731.70/warc/CC-MAIN-20190524184553-20190524210553-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9563031196594238,
"score": 2.59375,
"token_count": 753,
"url": "https://dawellnessclub.com/improving-the-quality-of-your-personal-life/"
} |
Updated 8:50 pm, Tuesday, July 15, 2014
On this date in ...
1914: An Albany bookkeeper at a local bank who was declared insane and confined to the Poughkeepsie State Hospital for the Insane for 13 years after 55 writs of habeas corpus granted parole ... to the hospital grounds.
1964: A group of residents of Karlsfeld and Hurstville, two hamlets in the town of Bethlehem, pressed their demands of annexation of more than 1,000 acres to the city of Albany by serving petitions on town and city officials. The petitions were signed by more than 70 percent of the 394 registered voters of the two hamlets.
1989: After a 10-minute round of explosions, officials believed the danger posed by an abandoned fireworks factory had passed. For nine days, town, county, state and federal officials removed dangerous explosives from the site, where William Bottieri made fireworks until his death two years earlier. Neighbors near the plant on Ostrander Road in Guilderland said the explosions that followed the deliberate torching of six dilapidated sheds were mild compared to the previous week's window-rattling blasts, when experts detonated the materials they could safely handle.
Want to read more about the Capital Region's past? Have any memories or thoughts about how our history relates to today's events? See http://blog.timesunion.com/history/ | <urn:uuid:6f58c5b5-7a87-4ecc-8043-f58174469115> | {
"date": "2017-12-11T04:19:30",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948512121.15/warc/CC-MAIN-20171211033436-20171211053436-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9564684629440308,
"score": 2.78125,
"token_count": 290,
"url": "http://www.timesunion.com/local/article/Looking-Back-5623774.php"
} |
Pheidole rugosula Forel 1902
Big-headed ant (Andersen 2002) (Generic common name)
Synonyms (Berry et al. 1997 )
Pheidole variabilis Mayr, Pheidole variabilis rugosula Forel
Pheidole is among the largest of ant genera. Wilson (2003) estimates the number of its known species as close to 900, with a large number still to be described. Australia has some 53 species and subspecies. Three of these are established in New Zealand, P. megacephala , P. rugosula and P. vigilans . P. rugosula is Australian in origin; it is still listed as P. variabilis rugosula in Australia (Shuttuck 1999; WWW4).
Distribution (see map)
P. rugosula is the most common of the three Pheidole species established here. Like P. megacephala , it is now well established in Auckland City, but by contrast it has been able to extend its range both northward and southward. It has been collected at a number of sites in Northland (RJH pers. obs.; Lester et al. 2003), is present in Waikato, Bay of Plenty, Taranaki, and Hawkes Bay, and has been collected as far south as Nelson and Christchurch.
The workers of Pheidole are dimorphic (major and minor workers). The antennae are 12-segmented with usually a 3-segmented club. In side view the propodeum is depressed below the level of the pronotum and the forward section of the mesonotum, and these two regions are connected by the steeply sloping rear section of the mesonotum. The nest entrance typically has a small mound of soil extracted from the nest.
Diagnostic features of the major worker
Length 3 mm; head massive with the rear (occipital) margin deeply impressed in the middle; rugae (wrinkles in the cuticle) extending from the clypeus almost to the rear margin of the head; propodeal spines (paired) longer than diameter of propodeal spiracle; colour light brown.
Diagnostic features of the minor worker
Length 2 mm; head with rear (occipital) margin shallowly impressed in the middle; head reticulate laterally, with longitudinal rugae and a more or less smooth medial area extending almost to the rear (occipital) margin; propodeal spines (paired) 2-3x diameter of propodeal spiracle; colour light brown.
Berry et al. (1997) provide a key to Pheidole species in New Zealand.
Details of biology are few. Minor workers have been observed foraging on flowers in a garden in Kohimarama, Auckland (AWD pers. obs.), and one minor in a group of minors and majors extracted from a nest in a lawn on the University of Auckland's city campus was observed carrying a springtail (AWD pers. obs.).
Seed harvesting has been observed also. In January 1980, a senior botany student studying Onehunga weed ( Soliva spp.) growing in the University of Auckland campus, noticed minor workers collecting achenes (small, dry, one-seeded fruits) of the plants, placing them around the nest entrances (surrounded by the usual mound of soil) and carrying them into the interior.
Berry et al. (1997) note that "among the label data for this species were several records of P. rugosula attacking mantid oothecae, including those of the native mantid, Orthodera novaezealandiae Colenso."
Can be abundant around urban areas causing a nuisance. Workers are attracted to pet food left out and windfall fruit. It has been sampled in native habitats but its impacts are unknown.
Compiled by Warwick Don & Richard Harris | <urn:uuid:eee41a80-d775-4789-9809-9dd1e9ad3f9d> | {
"date": "2018-03-17T04:33:17",
"dump": "CC-MAIN-2018-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644271.19/warc/CC-MAIN-20180317035630-20180317055630-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9154080152511597,
"score": 2.53125,
"token_count": 826,
"url": "https://www.landcareresearch.co.nz/publications/factsheets/Factsheets/pheidole-rugosula"
} |
Is the European tree frog returning?
Foto: Frank Körner
The European tree frog used to be common and widespread in Lower Saxony. It could be frequently observed - particularly in late summer and early autumn; this is the time when the frogs enjoy the warming sun rays on the leaves of shrubs and trees. Especially on blackberry-picking excursions, one could encounter the little green frogs just about everywhere.
Today, however, the European tree frog has disappeared from numerous areas and is ranked on the Red List of endangered species. It used to be widespread also in the lowlands of the Rottbach brook to the south of the Nienburg District near the border to North Rhine-Westphalia. Blackberry hedges can still be found here; spawning grounds for successful reproduction of the frogs, however, are missing. LIFE-AMPHIKULT aims at finding a solution for this situation. Currently, plans are underway for the new water bodies. Weather permitting, excavators will pull in this winter. ”Whether the European tree frog will accept the new ponds depends on various factors”, according to Dr. Markus Richter, project manager of LIFE-AMPHIKULT. “It is vitally important that there are close-by European tree frogs that are able to overcome the distance between old spawning grounds and new water bodies.”
To deal with this question, the project was assisted by Gunnar Mügge from Sulingen, who volunteered in the field mapping of the amphibians. He spent countless nights looking out for European tree frogs in the districts of Diepholz, Nienburg and Minden-Lübbecke. Thanks to their loud mating calls, the males are relatively easy to spot at the spawning grounds. The positive result of this nightly quest was the locating of calling males at three sites near the Rottbach brook. Even though only individual males could be heard and the populated water bodies are hardly suitable for a successful reproduction, the species has evidently not yet totally disappeared from the area. This augurs well for the return of the European tree frog to the Rottbach brook. | <urn:uuid:17c99c24-90af-459d-b82f-26b65adbb867> | {
"date": "2018-09-23T07:03:08",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159160.59/warc/CC-MAIN-20180923055928-20180923080328-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9493911266326904,
"score": 2.984375,
"token_count": 442,
"url": "http://life-amphikult.de/index.php/en/?start=35"
} |
This post is the introduction to a new series here on the Partially Examined Life blog: "Saints and Simulators," a look at cutting-edge modern technology, and its implications for both religion and philosophy. We'll be both beginning and ending the series with a deliberately provocative question: Did Nick Bostrom, professor of philosophy at Oxford University, provide the first convincing modern proof of the probable existence of God?
At first glance it seems more than unlikely. Bostrom—best known for his notorious theory that the world exists only on a giant computer—isn't a notably a religious man. What's more, philosophers and theologians have argued for thousands of years as to whether God exists; whether the existence of God can be proven; and whether demonstrating proof of God’s existence is something we should even try to pursue. Despite all this, in the year 2003, when Bostrom published a new theory detailing the strong probability that God does in fact exist, next to nobody noticed.*
This was not because the paper itself languished in obscurity. It was cited affirmingly by respected scientists, and billionaire entrepreneurs, and its line of logic was even certified by the presumably sober-minded analysts at the Bank of America. Yet the headline-grabbing claim that made it famous was seemingly not about God at all, but rather about the likelihood that our entire universe exists only as a simulation on a cosmic computer.
Perhaps this was because the claim about God was tossed off by Bostrom as a casual aside; or because it seemed irrelevant to his largely atheistic, technology-minded audience. Nevertheless, the implications about God are arguably the most interesting and important parts of the theory, because (a) they serve as the foundation of an entirely new and original defense of religious belief, and (b) because they are closely tied to assumptions about the universe that are consistently cited in defense of atheism.
If you'd like to read the original paper, it's here: Are You Living in a Computer Simulation? All you have to do is blink, however, and you'll completely miss the theological content—or perhaps just find it less than compelling.
Accordingly, the first part of this series will comprise a layman’s introduction to the simulation theory itself, and shows how, as ridiculous as they may seem on the surface, its core conclusions follow logically from some of the most commonly accepted assumptions of today’s modern scientific worldview; and how its conclusion, accordingly, is far more difficult to escape then one might assume. The next part of the series will introduce the closely related idea of the “technological singularity,” a time predicted for the near future when the power of technology grows without limit. It explains the fears and concerns people have for the concept, including Bostrom’s own shockingly plausible fear that the human species could be wiped out by the unintentional creation of killer robots.
The series will conclude with Bostrom’s admission that his simulation theory necessarily entails a godlike figure (the simulator), and with a demonstration that both the simulation theory and the concept of the technological singularity unexpectedly lead toward belief in something strikingly similar to God as described in the major traditional religions of the world. | <urn:uuid:7b543cd4-c778-4b82-b3e1-1c874ce1c8ba> | {
"date": "2019-12-07T08:30:03",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540497022.38/warc/CC-MAIN-20191207082632-20191207110632-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9664599895477295,
"score": 2.59375,
"token_count": 662,
"url": "https://partiallyexaminedlife.com/2019/01/24/saints-and-simulators-did-bostrom-prove-the-existence-of-god/?replytocom=2932574"
} |
|Codeforces Round #359 (Div. 1)|
After the piece of a devilish mirror hit the Kay's eye, he is no longer interested in the beauty of the roses. Now he likes to watch snowflakes.
Once upon a time, he found a huge snowflake that has a form of the tree (connected acyclic graph) consisting of n nodes. The root of tree has index 1. Kay is very interested in the structure of this tree.
After doing some research he formed q queries he is interested in. The i-th query asks to find a centroid of the subtree of the node vi. Your goal is to answer all queries.
Subtree of a node is a part of tree consisting of this node and all it's descendants (direct or not). In other words, subtree of node v is formed by nodes u, such that node v is present on the path from u to root.
Centroid of a tree (or a subtree) is a node, such that if we erase it from the tree, the maximum size of the connected component will be at least two times smaller than the size of the initial tree (or a subtree).
The first line of the input contains two integers n and q (2 ≤ n ≤ 300 000, 1 ≤ q ≤ 300 000) — the size of the initial tree and the number of queries respectively.
The second line contains n - 1 integer p2, p3, ..., pn (1 ≤ pi ≤ n) — the indices of the parents of the nodes from 2 to n. Node 1 is a root of the tree. It's guaranteed that pi define a correct tree.
Each of the following q lines contain a single integer vi (1 ≤ vi ≤ n) — the index of the node, that define the subtree, for which we want to find a centroid.
For each query print the index of a centroid of the corresponding subtree. If there are many suitable nodes, print any of them. It's guaranteed, that each subtree has at least one centroid.
1 1 3 3 5 3
The first query asks for a centroid of the whole tree — this is node 3. If we delete node 3 the tree will split in four components, two of size 1 and two of size 2.
The subtree of the second node consists of this node only, so the answer is 2.
Node 3 is centroid of its own subtree.
The centroids of the subtree of the node 5 are nodes 5 and 6 — both answers are considered correct. | <urn:uuid:f6a15738-306a-479a-a40e-1a8f28cb8333> | {
"date": "2017-09-20T20:08:34",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687447.54/warc/CC-MAIN-20170920194628-20170920214628-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9325234889984131,
"score": 3.234375,
"token_count": 542,
"url": "http://codeforces.com/problemset/problem/685/B"
} |
Receptors for the special senses are found
throughout the integumentary system.
primarily in the head.
in the fingertips.
in internal organs.
Sensory receptors include
all of the above.
The sequence of information flow in response to biting into a slice of pizza is
perception, sensation, impulse send to CNS, sensory receptors activated.
sensory receptors activated, impulse sent to CNS, sensation, perception.
impulse sent to CNS, sensory receptors activated, perception, sensation
impulse sent to CNS, sensory receptors activated, perception, sensation.
The Golgi tendon organ is stimulated more when
muscle tension increases.
muscle tension decreases.
muscle tension stays the same.
muscles are metabolically active and produce oxygen.
Taste receptors are
unable to divide.
found only on the tongue.
modified epithelial cells.
modified connective tissue cells.
Rhodopsin is found in ____ cells.
Movement of hair cells in the semicircular canals signals
the frequency of the sound.
sound waves to the brain.
the velocity of the movement.
the direction of motion.
The stapes transmit vibrations to the round window of the inner ear.
The utricle and saccule contain the sensory receptors associated with the sense of dynamic equilibrium.
The optic disc is medial to the fovea centralis and is the site from which nerve fibers from the retina leave the eye and become part of the optic nerve. | <urn:uuid:b6d92420-7f0b-4622-80e5-a27208f5ba8d> | {
"date": "2016-12-10T02:01:53",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542932.99/warc/CC-MAIN-20161202170902-00096-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8296224474906921,
"score": 3.671875,
"token_count": 319,
"url": "https://www.goconqr.com/p/819565-Nervous-System-III-Senses-quizzes"
} |
Here's one lovely answer: Meta.L.Hyttan. This project in Avesta, Sweden, in which visitors use special flashlights to explore a historic site and reveal interpretative content of interest, is an elegant example of how museums can innovative the label experience.
First, a little explanation about "pull" content techniques. Pull techniques invite visitors to actively retrieve content of interest, rather than consuming content "pushed" indiscriminately by the museum. "Pull" techniques don't just allow multiplicity of content; they also emphasize the visitors' active role in seeking out information. Of course, visitors are always somewhat active in their pursuit of interpretation--they decide whether or not to read the label, whether or not to watch the video, whether or not to click into the interactive. But requiring visitors to take a physical action to retrieve interpretative material imparts a certain power to visitors--they choose what to reveal, not just what to look at. It's not surprising that research has shown that information retrieved via "pull" techniques is retained better than that which is pushed. You may not remember what your teacher lectured about, but you probably do remember the answer she gave you to a question of particular interest.
The most familiar pull learning tool we use daily is Google. It's certainly possible to plunk a computer into the gallery and let people google to their hearts' content, but that activity doesn't fit naturally into the flow of museum-going. Nor does hitting different buttons on an audio guide or even a cellphone feel entirely natural in the context of the physical and visual exploration of exhibits. The technology distracts and breaks a bit of the power of the museum experience. And while I believe in letting people use their own technology (i.e. their phones) to access information, I think there's potential for other kinds of devices and environmental interactions to add value in a way that enhances, rather than detracts from, museum-ness.
Which brings us back to Sweden. In 2004, the firm Smart Studio created a unique flashlight-based interpretative interface for exploration of a historic blast furnace site in the old Swedish steel town of Avesta. The site itself has no interpretative material--no labels or obvious media elements. But each visitor is given a special flashlight, used both to illuminate the space (for general exploration) and to activate interpretative experiences include light projection, sound, and occasional physical experiences (i.e. smoke and heat). There are indicated hotspots in the site which activate interpretative material when the flashlights light on them. Smart Studio launched with two layers of content in the hotspots--educational (how the blast furnace works, explanation of certain elements and history) and poetic (imagistic stories from the perspective of steel workers, based on historical content). Visitors can walk through the blast furnace site and receive none of the interpretative material if they choose, or they can use their flashlights to activate content.
I love this project for several reasons:
- They used a technology that fits well conceptually and practically into the experience of exploring a historic site of this type. You use the flashlight to see the site, and you use the flashlight to see deeper, hidden layers of history as well. The metaphor is consistent and the object interaction is intuitive.
- The flashlights function in a magical, surprising way that stems naturally from their typical use. If you were given a crazy pointer and told to use it in this way, it would not be as surprising or exciting as this new "activation" of a familiar object. This gives the sense that there is something magical and unusual happening at the historic site, giving it an aura of mystery and enhancing the uniqueness of the experience.
- The minimal intervention of the interpretative material allows purists to experience the site without additional media elements if they so choose.
- Unlike an audio tour, the light-based interpretative material can be shared socially. A family could explore the space together and use flashlights to "show" new content to each other.
- The act of illuminating the interpretative material gives visitors the sense of personal agency in the discovery and exploration of history. Again, the flashlight metaphor evokes the experience of other explorers and archaeologists, and lets visitors play at uncovering history. But they are also in control of the content experience, revealing stories on demand.
- The infrastructure can support a layered, changing set of content pieces. In their original proposal, Smart Studio alluded to this potential for multiple languages and interpretative contexts, but I'm not sure whether they have pursued it and added additional interpretative material over time. | <urn:uuid:8264bccb-bf75-4b67-829f-8cdd18111bb7> | {
"date": "2013-12-09T03:24:41",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163857566/warc/CC-MAIN-20131204133057-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9138153195381165,
"score": 3.015625,
"token_count": 940,
"url": "http://museumtwo.blogspot.com/2009/03/querying-environment-smart-model-for.html"
} |
The colours in this TerraSAR-X radar image of the Kubitzer Bodden, north of Stralsund, tell us how strongly the radar beams emitted were scattered back by Earth's surface in each polarisation (red: HH, green: VV, blue: HH-VV). This permits the drawing of conclusions about various properties of the backscattering surfaces (e.g. roughness and humidity). Among other things, such information is used to identify different surfaces, such as forests, grain fields or sandbanks. Furthermore, the image yields valuable information about processes that go on above and on the water, such as roughness caused by wind. The stripes that are distinguishable in the Kubitzer Bodden are caused by so-called atmospheric boundary-layer rolls. Such image structures may serve to identify and derive high-resolution wind fields above the water.
Credit: DLR; date: July 7, 2007, 5:24 UTC; original resolution: 3 metres (reduced image); mode: StripMap mode; polarisation: VV and HH | <urn:uuid:504f857f-a321-46d5-8610-d6b12a7bc52b> | {
"date": "2017-01-24T03:41:48",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00192-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9199146628379822,
"score": 3.75,
"token_count": 219,
"url": "http://www.dlr.de/eo/en/desktopdefault.aspx/tabid-6695/10983_read-10126/gallery-1/gallery_read-Image.1.3754/"
} |
There are four parts to this tutorial, two videos, one formative assessment quiz (does not count as a quiz grade, but will help to make sure that you have an understanding of the material), and one activity. Please make sure that you work with all four.
Trace the expansion of the United States from its beginnings in Jamestown in 1607 through the purchase of the Louisiana Territory from the French in 1803.
Starting with the first English settlement at Jamestown, Virginia in 1607, the English colonists looked for ways to expand their land holdings in order to grow tobacco, their cash crop.
When George Washington and the Virginia militia crossed the Appalachian Mountains in 1754 and attacked a small French force at what is now Pittsburgh, Pennsylvania, they started the French and Indian War that would develop into a world-wide colonial conflict.
After the British won the war, the colonists believed that they should be able to settle on the Western side of the Appalachian Mountains. King George III had other ideas and issued the Royal Proclamation of 1763, preventing that from happening. This became one of the early steps toward the American Revolution.
In the years following the Revolution, more Americans settled on the Western side of the Appalachian Mountains, and President Thomas Jefferson wanted to make sure that they could get their produce to market down the Mississippi River through New Orleans.
Jefferson sent two ambassadors to Paris to negotiate a purchase of that city from Napoleon, who realized that he could not hold on to that much land in North America and offered to sell the entire Louisiana Territory.
While Jefferson had some Constitutional concerns, he eventually decided that it was in the best interest of the United States to buy and went through with the purchase for $15 million.
Institutions have accepted or given pre-approval for credit transfer.
* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 27 of Sophia’s online courses. Many different colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.
American Colonial Expansion before the American Revolution
A brief look at how the English colonies expanded from the first colony at Jamestown, Virginia through the end of the French and Indian War and the Royal Proclamation of 1763.
Your assignment is to figure out who the three people are in this image by clicking on each link and working to figure out what the clues have in common. Please be ready to bring your answers to class tomorrow. | <urn:uuid:89dedd62-27a3-49b1-8050-78fac1ccb7f4> | {
"date": "2018-04-22T22:12:57",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945660.53/warc/CC-MAIN-20180422212935-20180422232935-00576.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9618356823921204,
"score": 4.0625,
"token_count": 514,
"url": "https://www.sophia.org/tutorials/early-expansion-in-the-united-states"
} |
February 16, 2017: Daily Bible Reading Commentary for Job 13-14
Click here for the Daily Reading
Commentary: At the end of Joshua, we saw a clear example of how the actions of one or the few can affect all. This was the prominent thought throughout much of the Old Testament. Job, however, offers a shift in that thinking. Job is contends that he is being judged on his own actions and that it only effects him. It is a shift in thinking, from a group mentality to an individual mentality, which many hold today. Job goes on to express his belief that his friends can no longer help him. We also see Job recognizing the fragility and shortness of life and crying out to the Lord to have mercy. Today's reading concludes the first group of speeches; one from each of Job's three friends, and Job's response to each. The friend's repeating theme is to repent and seek the Lord's forgiveness, for Job has surely sinned. Job's theme is that his situation is unique, which his friends fail to realize, and that he has done no wrong.
Focus Verses: 14:4 How fortunate are we that our God is merciful and forgiving! We are all unclean, yet through the blood of Christ, we are able to become clean. What does this verse mean to you about the power of the Lord? | <urn:uuid:0fa2b34a-bbc4-4f33-88d7-0d7df386491a> | {
"date": "2017-10-17T15:14:50",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822116.0/warc/CC-MAIN-20171017144041-20171017164041-00856.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9842971563339233,
"score": 2.734375,
"token_count": 279,
"url": "http://theforgivenessfoundation.org/index.php/scriptures/daily-bible-readings-2017/4020-february-16-2017-daily-bible-reading-commentary-for-job-13-14"
} |
!< (Not Less Than)
Compares two expressions (a comparison operator). When you compare nonnull expressions, the result is TRUE if the left operand does not have a lower value than the right operand; otherwise, the result is FALSE. If either or both operands are NULL and SET ANSI_NULLS is set to ON, the result is NULL. If SET ANSI_NULLS is set to OFF, the result is FALSE if one of the operands is NULL, and TRUE if both operands are NULL.
expression ! < expression
Is any valid Microsoft® SQL Server™ expression. Both expressions must have implicitly convertible data types. The conversion depends on the rules of data type precedence. For more information, see Data Type Precedence.
Operators (Comparison Operators) | <urn:uuid:9e440ee5-6dc8-4e97-bf37-d1341ed7731c> | {
"date": "2014-03-07T19:16:45",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999650424/warc/CC-MAIN-20140305060730-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7878366708755493,
"score": 2.71875,
"token_count": 167,
"url": "http://technet.microsoft.com/en-us/library/aa276868(v=sql.80).aspx"
} |
*A note on curriculum: While I'm aware that many of my readers follow a purchased or school-provided curriculum, I think it's important to remember how very little these guidelines actually matter. If somebody says your child should learn the names of all our local planets in grade two, so you ensure memorization of these names and planet features, what is the likelihood that your child will remember them ten years later? Not much, unless the child was and continued to be interested in those facts. However, if the child never knew the names until he was in his twenties, and then took it upon himself to explore and discover them, he'd probably remember them simply because he cared more. It's like that with everything from reading to math skills to social skills. When we perceive a personal need or desire to learn, we do. There is indeed a progression of suggested skills in most curriculum packages, but I have learned from my children that skill #7 doesn't need to be preceded by a teaching of skills #'s 1-6. When the need for them arises, they'll fall into place. And depending on the kids' learning styles, the way things fall into place will differ.
I suppose this article will be useful for different people in different ways. If you're a teacher or a homeschool parent you'll want to adapt to your curriculum; if you're an unschooler or a teacher of self-directed learners, you might want to read this article with the kids and see how or if they'd like to engage with these ideas. Whatever you do - enjoy! And I'd be happy to hear about other ideas in the comments.
The essential thing to keep kids interested is to keep the subject matter relevant. Unless a child has some personal context for ancient Rome or cell biology, it will be of little interest. So start with things that matter. And that's home. Family. Direct experiences the child is having. And you can't provide the experiences to augment the ideas you're trying to teach; you have to provide the experiences first - or better yet, work with experiences the child already has and allow those to lead to new and different places.
Now for the project suggestions:
Books!I have to start here because honestly there are so many amazing books out there that bring our own local spaces to life with wonderful stories and images. From local mythology to children's picture books to adult fiction and non-fiction, there is very little as wonderful as exploring your own world through a passionate author's eyes.
Activities to do with the books include:
- create maps of the places listed in the books
- write fan-fiction based on the books
- create dramatic productions based on the characters or even directly adapted from the books
- create a tour-guide to the area shown in the book
- take the book to the specific location where the story takes place and read it there
- replicate the foods, crafts, or other things mentioned in the book
- ...etc. Let the book and your kids' creativity lead the way!
|This was my kids' giant hand-drawn map of Haida Gwaai, inspired from print-outs, photos, and the amazing book, the Golden Spruce, by John Vaillant. We also wrote to John, since he's a local author, and thanked him for his wonderful book.|
Local Map ExplorationGet a very good local map (printed version is better than digital) and hang it on an often-seen wall. Good sources for such maps are often geological survey departments, hiking or orienteering groups, a map store, or Backroad Mapbooks, here in Canada. Find a map that has topography, creeks, trails, historical and geological features... whatever interesting things you can find. If the best maps you can access are online, find one and have it printed large-scale to hang on your wall, or laminated for table- or floor-use.
The key here is local. You want to find a map local enough and large enough that you can see the location of your house or building as distinct from your neighbour's. This is what makes things matter. You can draw yourselves onto the spot where you live.
The obvious is to start exploring things you find on the map, and letting those explorations lead to new discoveries, but we've also had many fun map-games, in addition to the exploring. Sometimes we got out little toy cars and drove them around on the map, telling stories as we went; sometimes we made map-board-games, where we set out missions to accomplish on the map, and used dice-throws to determine inches traveled between places. For example: Leave home, go to the store to buy popcorn, check the mail, pick up a parcel from the post office, go to friend's house to pick them up, and take them to the beach for dinner. First person to arrive at the beach is the winner! Although in our non-competitive household, we ended up picking each other up from the road as we went by.
Another idea is long-distance treasure-hunting, using the map as a first clue and travel-aid. We once set up a fabulous mile-and-a-half treasure hunt for our daughter's birthday cake. The hunt began in the daylight, and by the time they found the cake it was dark, necessitating a hike up a candle-lit trail to the cake in the dark woods. Of course my job was to hike the cake in before they arrived, turn on the electric-tea-light-lit trail markers, and then light the cake just as they arrived. And yes - forest fires are a concern here. But it was well into the rainy season by the time we did this.
Local Resource History and Manufacturing:Things don't just come from a store! Hopefully you already shop locally as much as possible, so follow some of those leads. If you see locally-produced goods for sale, see if you can arrange for guided tours of the places they're produced. Sometimes you can even get involved in the production or tending at the facility. Some ideas of this sort are:
- farms (we once watched a lamb being born at the farm where we buy our lamb-meat!)
- dairies, including the grazing areas for the cattle or goats, if possible
- broom-makers, milliners, glass-blowers, shoemakers and other specialty shops
- breweries, candymakers, and other food production
- cement factories
- the local dump or recycling facility - we did a tour of ours once and it was fascinating!
- mines (including abandoned mine-adits like the one near our house!)
- fisheries and fish-processing plants
Google Maps or Google Earth:Well where to begin?! Obviously just exploring Google Maps (or Google Earth if you want to get fancy) is a fabulous activity on its own - no guidelines, nobody hanging over your shoulder, handing over expectations or asking you what you learned... just discover. We've found some of the most amazing things, from unknown (to us) remote modern day civilizations, to craters, migrating animals in the Savanna, and even shipwrecks. We also toured our own community in Streetview and found people we know!
But I promised you some guided activity ideas. Here are a few.
How about guided Streetview tours? Yep! Google offers those: Google Maps Treks
You can also use Google Maps to create your own customized maps on My Maps. Consider using this tool for special projects that you set up for your children or better yet that they make for themselves. Some ideas to consider: a treasure-hunt, a map of local pets or babysitting clients, a road-conditions map, or a forest or wilderness observation/conservation map (make field trips into specific areas and detail the condition of the area, animals observed, or places of interest on an interactive map to share with others). You can also use My Maps to track where you've been on your local (or global) adventures! These maps can have multiple contributors, which opens the opportunity for groups of kids to work together on creating useful and interesting maps that are meaningful to them in a local and social context.
One activity I set up for my kids was a Google-based story writing project. I set up a few tables like the one below, providing just enough information for some Google-maps searches that led them to a few vaguely or directly-related places around the world. Each of the sets of places followed some kind of theme or story-line I had in mind, but I didn't provide this to my kids. Their mission was to fill in the table as much as possible or desired, and then to write a story using all or most of the places, things, and details from the table. Don't get too attached to your own ideas that went into compiling the table - if you leave enough information out and encourage your kids to really let loose creatively on a regular basis, the story your kids produce will likely be nothing like the one you had envisioned. Your kids might even discover a different place, business, or item at the coordinates you've given. That doesn't matter - this activity has no wrong answers. There's sure to be something interesting to come out of any solution to the puzzle.
Obviously, this does take a bit of prep-work, but I have to admit it was fun for me. :-) The table below is an example, but if you use this idea, I encourage you to tailor the table to suit your own needs and interests. I usually had the Place Name column and the Address/Coordinates column, but often had other things like "altitude", "local recipe", or "person who lives there", which sometimes included real people in our community, famous people, or scientists or employees whose names I found on websites of the places I listed!
|Name of Place||GPS coordinates or|
|Person, plant or animal||Weather forecast |
(or other detail)
|201 Kicking Horse Ave P.O. Box 148|
Field, British Columbia
|51.430112, -116.462598||phyllopod||Use satellite view|
|Highway 838 Midland Provincial Park Drumheller, Alberta Canada|
|Youpaotai Rd, Nanshan Qu, Shenzhen Shi, Guangdong Sheng, China||A small weed growing from a crack in the pavement|
Use satellite view!
Spoiler Alert! If you are wondering what this table is about and don't want to go research those locations, here they are, in order that they appear on the table. This will give you an idea of the theme I was following, on this table:
- Burgess Shale Geoscience Foundation
- Mt. Field (location of Walcott Quarry; Cambrian fossils)
- Midland Provincial Park (contains Royal Tyrell Museum and is near to Fossil World)
- Maotianshan Shales (Cambrian shales in Chengjiang, Yuxi, China)
- Chiwan container terminal in China
And maybe story-writing isn't your or your kids' thing? Maybe this info will feed into a fabulous painting or sculpture; maybe it will become a theatrical production or a YouTube comedy show. The idea is to give some inspiration and then step back to allow kids to run wild and see what comes out. So work with it until it works for you.
Exploring Google Maps is a bit like air-travel, so here's one last idea, while it's on my mind: get the free flight simulator, GeoFS, and fly from airport to airport, discovering new places as you go! My son has spent countless hours discovering new places both local and abroad. It can be fun to start at your local airport, fly over your own home, and then abroad to locations you've visited before or perhaps completely new places. And of course... there are many types of planes to fly, and some are better at aerobatics than others. It's basically a violence-free reality-based video game. There's a little concern with the ability to talk to other users online, but I'll leave you to your own family's internet safety protocol for that one. Enjoy!
Please do add your own fabulous ideas in the comments. I'm always happy to hear about them, and so are other readers! | <urn:uuid:464d5932-7135-48f4-85a1-61271851a109> | {
"date": "2018-08-21T23:30:48",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221219197.89/warc/CC-MAIN-20180821230258-20180822010258-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9601269364356995,
"score": 3.0625,
"token_count": 2567,
"url": "http://rickshawunschooling.blogspot.com/2017/11/"
} |
Mycosis fungoides, the most common type of cutaneous T cell lymphoma (CTCL), is a slow growing form of cancer in which some of the body's white blood cells become malignant. These abnormal cells are drawn to the skin and some are deposited there. They are a special type of white blood cell called T-lymphocytes (T-Cells). T-cells regulate the body's immune system in its job of fighting infections and other harmful things in the body.
Cutaneous T cell lymphoma usually develops slowly over many years. In the early stages skin may develop dry, dark patches on the skin, sometimes itchy, sometimes not. Often, it is misdiagnosed as psoriasis or eczema at first and only recognized after several biopsies.
Cancers of the lymphatic system are called "lymphomas". The most well known lymphoma is Hodgkin's disease. All the other lymphomas are called non-Hodgkin's lymphoma. CTCL is a sub-type of non-Hodgkin's lymphoma. Unlike the vast majority of lymphomas, CTCL is made from T-Cells .
CTCL isn't one disease but a collection of related cancers of the lymphatic system. The most common type of CTCL is still sometimes known by its old name "mycosis fungoides". This name referred to mushroom fungus look of the skin only seen in advanced disease. About 10% of CTCL patients instead have widespread redness of the skin and abnormal blood counts (the Sezary Syndrome). Some cases of CTCL may develop from white spots ("hypopigmented MF") or red sores (lymphomatoid papulosis). There are other, even rarer ways for CTCL to appear.
If the disease progresses unchecked, raised growths may form on the skin after a period of years. If they become tumors, the risk increases that tumors will form in the lymph glands or other organs in the body. Even in very early CTCL these abnormal T-Cells are probably present in tiny amounts through-out the bloodstream from the beginning, but when present in large amounts it indicated more advanced disease.
Most cancers are treated with surgery and chemotherapy. Unfortunately, slow growing forms of cancer, such as CTCL, are less curable with chemotherapy than fast growing ones, and surgery is usually not an option. So there isn't one "right" treatment for all patients with CTCL. Treatment is based mostly on the size, extent and places the CTCL is found and the patient's age and overall health.
For early and very limited CTCL treatment with a potent topical "steroid cream" (Diprolene, Temovate, Lidex, and many other brands) is often the initial choice. Phototherapy (PUVA, Narrow band or broadband UVB) is useful if larger body areas are involved. Topical chemotherapy with agents such as nitrogen mustard (Mustergen) or BCNU (Carmustine) is more aggressive and less widely used. Targretin gel is a recent addition and can be useful.
For treatment failures or more advanced CTCL a systemic therapy is used. Choices include Bexarotene capsules (Targretin), intravenous fusion protein (Ontak), Interferon-alpha or methotrexate (Rheumatrex). Sometimes these systemic treatments are combined together or with external treatments to produce better results. More advanced disease may also be treated with total skin electron beam radiation therapy, but this is often saved as it can not be repeated. Sezary syndrome, and some cases of CTCL, is treated with extracorporeal photochemotherapy. Further research is ongoing to determine the optimal combinations for the different stages of CTCL. For severe disease that has failed other treatments bone marrow transplantation has been used.
Early disease is usually treated best by your dermatologist. Advanced disease should be treated in a center that specializes in this condition. IT IS IMPORTANT YOU DO NOT ACCEPT THE DIRE PROGNOSIS given in older medical literature you may find in a public library. Patients diagnosed at early stages can usually expect to live a normal life span and die of unrelated causes. Treatment is effective, but may need to be continued for quite a while. For some, relapses occur, and treatment must either be lifelong in order to control the disease, or it must be repeated each time a relapse occurs.
Back to Index
The medical information provided in this site is for educational purposes only and is the property of the American Osteopathic College of Dermatology. It is not intended nor implied to be a substitute for professional medical advice and shall not create a physician - patient relationship. If you have a specific question or concern about a skin lesion or disease, please consult a dermatologist. Any use, re-creation, dissemination, forwarding or copying of this information is strictly prohibited unless expressed written permission is given by the American Osteopathic College of Dermatology. | <urn:uuid:d3b58927-bd60-47e2-bf42-a3ec478c4a9e> | {
"date": "2019-01-18T09:16:43",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660020.5/warc/CC-MAIN-20190118090507-20190118112507-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9467188119888306,
"score": 3.453125,
"token_count": 1055,
"url": "https://www.aocd.org/page/MycosisFungoides"
} |
|Sense, philosophy: sense is a property of statements which makes the determination of the truth value (true or false) possible, although not guaranteed. Even false statements make sense; otherwise their falsehood could not be established. What is meaningless, therefore, is what cannot be negated. Statements about the future allow an assessment of probabilities if they are sensible without having a truth value. Wishes and commands are sensible and understandable if they can be reformulated into negative statements. See also understanding, negation, truth values, verification, determination, indeterminacy, probability, Fregean sense._____________Annotation: The above characterizations of concepts are neither definitions nor exhausting presentations of problems related to them. Instead, they are intended to give a short introduction to the contributions below. – Lexicon of Arguments. |
Sense / meaning / Frege / Mates: both should not be confused because the compositionality applies to both ((s) seperately) : - e.g. (1) morning star / Aevening star are the same (2) m.s. / m.s. are the same - (1) and (2) do not have the same meaning - E.g. a = a is not the same sense as a = b - n.B.: nevertheless m.s. and e.s. have the same meaning (reference) - meaning / Frege: m. of a statement: the truth value (object) - sense of a statement: thought, content, proposition -
((s) decisive place in the literature).
truth value / MatesVsFrege: do not exist - yet per Frege, without whose metaphysics - sense (manner of presentation) uniquely determines the meaning (reference)._____________Explanation of symbols: Roman numerals indicate the source, arabic numerals indicate the page number. The corresponding books are indicated on the right hand side. ((s)…): Comment by the sender of the contribution. The note [Author1]Vs[Author2] or [Author]Vs[term] is an addition from the Dictionary of Arguments. If a German edition is specified, the page numbers refer to this edition.
Elementare Logik Göttingen 1969
Skeptical Essays Chicago 1981 | <urn:uuid:e06d3a89-7444-4113-9664-4b2306352c6c> | {
"date": "2019-08-24T01:26:23",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319155.91/warc/CC-MAIN-20190823235136-20190824021136-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.82752925157547,
"score": 3.453125,
"token_count": 471,
"url": "https://philosophy-science-humanities-controversies.com/listview-details.php?id=267560&a=$a&first_name=Benson&author=Mates&concept=Sense"
} |
(CNN) — Picture the scene: you're driving through the arid American desert. There's been nothing around for miles. Suddenly, up ahead, you spot a gigantic concrete arrow.
No, you're not hallucinating as you travel. These enigmatic structures are dotted across the length and breadth of the United States -- they were built in the late 1920s and early 1930s to help guide pilots navigating the country's fledgling air mail system in an era long before satellites and GPS. Back in the day, the arrows were illuminated by neighboring beacons. Now, most of these light towers are long gone and the arrows lie abandoned -- some visible on Google's aerial maps. For those in the know, tracking these strange formations can be a compelling pastime. Retired Californian couple Brian and Charlotte Smith drive around the United States, snapping photographs of the arrows for their specialist website Arrows Across America.
These mysterious arrows are dotted across America. Pictured here: Arrow in Nevada on the Los Angeles-Salt Lake airway.
The Smiths discovered the indicators almost by accident after Brian, a former police officer with the California Highway Patrol, was sent an email about them. The couple was immediately intrigued.
"Charlotte got really interested in it and wanted to find what it was, so started researching, looking for them on the internet," Brian tells CNN Travel.
She found little to go on.
"What sparks my attraction to the arrows was that this existed and I had no clue about it, and there was no information about it," says Charlotte, a former genealogy researcher.
She's right, there's really not much information available online. Contrary to popular belief, the arrows have no association with the US Post Office.
The arrows were illuminated by neighboring beacons. Most of them are long gone, but a few survive -- including this one in Carbon County, Wyoming on the Salt Lake-Omaha airway.
Jenny Lynch, historian and corporate information services manager at the Postal Service and Nancy Pope, curator at the Smithsonian's National Postal Museum, separately tell CNN Travel the arrows were built when the Department of Commerce took over the airways.
The arrows were built between 1926-1931, according to the Journal of Air Traffic Control, produced by the Air Traffic Control Association. Beacons were 25 miles apart from one another and the arrows were painted yellow -- although the paint on most of the remaining indicators has now faded.
Today, the Smiths are concerned they're now being painted quirky colors.
"People paint these things bright orange and it ruins them really," says Brian.
The arrows tend to be in isolated locations. Pictured here: Arrow in Sweetwater County, Wyoming on the Salt Lake City-Omaha Airway.
"When I found an arrow, I marked [the location], and started making a spreadsheet," explains Charlotte.
All the arrows are in fairly isolated locales -- the first arrow the Smiths visited was no exception.
"It was in Nevada, right by Reno," says Charlotte. "Brian ended up having to climb up the hill as I couldn't climb it at all, I've got really bad knees. We took a lot of pictures."
Despite the difficulties, they were hooked -- and Arrows Across America was born.
The beacons were officially decommissioned in the 1970s. Pictured here: Arrow in Siskiyou County, California, adjacent to Montague Airport on the San Francisco-Seattle airway and San Francisco-Redding section.
The couple host a comprehensive website featuring photographs, coordinates and information on each of the arrows they've found.
Brian, 70, and Charlotte, 67, have been photography buffs for a while now. "When Brian retired, we took a Photoshop class," says Charlotte. "We took a bunch of photos in Egypt and we just really liked taking photos, and we had a website."
Their arrow-centric site has taken off: "We had over six million hits in the last 12 month period on our website," adds Charlotte.
History buffs who stumble across the site often contact the couple to ask for tips on embarking on their own arrow quests.
"They want to know if there's any arrows in their location," explains Brian.
Other photographers get in contact to let the Smiths know if they've discovered a "new" arrow. The couple will add the discovery to their encyclopedia.
The photographs range from detailed close-ups to aerial shots that depict the surrounding landscape -- mimicking what an air mail pilot would have seen back in the day.
The Smiths take aerial shots too. Pictured here: Arrow in Washington County, Utah on the Los Angeles-Salt Lake airway.
"We personally like the drone photos better because we get a better idea of what the arrow actually looks like," says Charlotte.
Photographing the arrows is often a once-in-a-lifetime experience.
"I've hiked out to them in the middle of the desert, and some just I'll never go back to them again because they're so difficult to get to," says Brian. "But I enjoy the hiking out to them and just looking at them, because we have something that nobody else does."
Brian's favorite is located in Elko County, Nevada, on the San Francisco-Salt Lake airway.
"It takes a four-wheel drive to there, as the road is dirt with loose rock and fairly steep," he recalls. "The view of the surrounding desert however was just beautiful."
This is Brian Smith's favorite arrow in Elko County, Nevada on the San Francisco-Salt Lake airway.
The Journal of Air Traffic Control reports that the beacons were officially decommissioned in the 1970s. Some four decades later, their future remains uncertain.
"I have a feeling that they're all going to become historical monuments in the next couple of years, the ones that are left," says Charlotte.
"There's been quite a couple that have been destroyed over the years and we just can look on Google Earth and see an arrow there that doesn't exist anymore, it's disheartening -- and I think the public is starting to recognize the fact that [...] it needs to be preserved," she adds.
Thanks to Lynn Lunsford of the Federal Aviation Administration for pointing CNN Travel in the direction of the ATCA Journal. | <urn:uuid:bdbc648c-0fa4-4856-b9d9-9bd1eb9f60a1> | {
"date": "2018-09-21T16:07:21",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157216.50/warc/CC-MAIN-20180921151328-20180921171728-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.971328616142273,
"score": 3.0625,
"token_count": 1310,
"url": "https://edition.cnn.com/travel/article/concrete-arrows-america/index.html"
} |
Where was the light bulb invented? What about the first steam locomotive, or hydroelectricity? Why have you never seen a canal in North-East England? Which was the only UK city outside London that Martin Luther King ever visited?
A free five-week course answers all of these questions and more, exploring the global impact the North East has had on the world ,and what it means to be a ‘Geordie’.
Launched in partnership with online providers Future Learn and delivered by Northumbria University’s world-renowned experts associated with Northumbria’s Institute of the Humanities, the Global Geordies MOOC (Massive Open Online Course) launches on 26 February for five weeks.
Utilising innovative videos, short articles and quizzes, learners of all ages and abilities will be introduced to the historical, technological and cultural connections between the North East and the wider world by Northumbria’s expert team, led by Dr Leona Skelton, Vice Chancellor's Research Fellow in the Humanities at Northumbria.
She said: “As both a historian of the North East and somebody who is proud to be from the region, it’s really exciting to be able to showcase Northumbria’s expertise in local history and culture in this way.”
Brian Ward, Professor in American Studies at Northumbria is Leona’s co-host for Global Geordies and appreciates the world-wide reach of these free online courses.
He added: “As with Northumbria’s American South MOOC, which is now in its third run with Future Learn, we are already seeing enrolments for Global Geordies from all over the world.”
The MOOC is open to people living anywhere in the world. During the five-week course, students will learn how the North East’s industry and trade inspired global innovations in science and engineering. They explore the rich history of diversity in the North East, and learn about the regeneration taking place in the region today, and how it will affect the future.
The course has been designed to share a wide range of fascinating research findings from staff at Northumbria to facilitate discussion, reflection and deeper understanding of the two-way relationships between the North-East and the world, with three main thematic pillars running throughout the course - political, environmental and cultural factors.
Delivered in partnership with Future Learn, Global Geordies will be led by experts from Northumbria’s Institute of the Humanities. This cross-disciplinary centre is dedicated to exploring the many facets of what it is to be human and what drives us in terms of culture and creativity. Research at the University’s Institute of the Humanities brings together the disciplines of Art History, American Studies, Creative Writing, English Language and Linguistics, English Literature, History, and Media Studies.
The Global Geordies course follows the successful launch of the American South MOOC at Northumbria last year. If you want to learn more about the history, literature, politics, film, art and popular culture of the United States, then American Studies at Northumbria is the ideal choice. Whether your interests lie in the Civil War or the War on Terror, Walt Whitman or Walt Disney, this course will help you to develop your critical and imaginative skills in the context of the American experience and its global significances. To find out more go to: www.northumbria.ac.uk/humanities
Global Geordies launches in partnership with Future Learn on 26 February 2018. To sign up for this free course visit: https://www.futurelearn.com/courses/global-geordies
Northumbria is a research-rich, business-focused, professional university with a global reputation for academic excellence. To find out more about our courses go to www.northumbria.ac.uk
If you have a media enquiry please contact our Media and Communications team at [email protected] or call 0191 227 4604. | <urn:uuid:b1fd4db8-4396-4091-84ed-d276df7a79fc> | {
"date": "2018-11-16T12:52:59",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743011.30/warc/CC-MAIN-20181116111645-20181116133645-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9247494339942932,
"score": 2.703125,
"token_count": 847,
"url": "http://newsroom.northumbria.ac.uk/pressreleases/learn-how-geordies-changed-the-world-with-new-five-week-online-course-2408460"
} |
Unabridged Audio Book
Download or Stream instantly more than 55,000 audiobooks.
Listen to "Creative Chemistry" on your iOS and Android device.
Don't have an iOS or Android device, then listen in your browse on any PC or Mac computer.
11 Hours 8 Minutes
Audio Book Summary
Slosson reviews the transformation of alchemistry from an obscure and imprecise practice to the science of chemistry. Along the way, he explains how the modern industrial world now relies on fertilizers, explosives, textile materials, polymers and metals.
By exploring the properties of a once undervalued element, the high strength of vanadium steel made the Ford car possible. Another element, cerium, appears in butane lighters and was once seen as a threat to the match industry in France.
In his chapter on oils, Slosson reviews the development of hydrogenated oils, especially during WWII, in the search for a way to reuse otherwise discarded components of corn and cottonseed. Through the revolutionary reaction of hydrogenation, waste materials became a stable product that wouldn't spoil when packaged or carried without refrigeration. Once thought of as a miracle, shoppers were once willing to pay more for fully hydrogenated oils than their natural, unsaturated forms. Only in recent years has evidence of health risks checked their popularity and given them the image of cheap, unhealthy fillers. (Summary by LivelyHive) | <urn:uuid:99d0aa97-420d-4b8f-9872-9184c9cc1b2a> | {
"date": "2019-06-15T22:49:05",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997501.61/warc/CC-MAIN-20190615222657-20190616004657-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9299013614654541,
"score": 3.078125,
"token_count": 293,
"url": "https://www.audiobooks.net/audiobook/creative-chemistry/257132"
} |
SKODA - background & news
Skoda Environmental Protection Credentials
As of Spring 2013, Skoda offers 48 models with carbon dioxide emissions of fewer than 120g/km and 10 models with emissions fewer than 100g/km. The marque’s most junior model, the tiny Mii, is available powered by compressed natural gas with the larger, CNG-powered Octavia set to go on sale late in 2013. Drivetrain electrification is another goal for Skoda and a ten-vehicle strong fleet of Octavia Green E-Line cars is currently undergoing testing.
The company’s ‘GreenFuture’ strategy is aimed at improving the fuel efficiency of its cars and also the water and energy economies of its plants. Since 1990, Skoda says it has invested over €410 million in sustainable processes, facilities and vehicle efficiency. The company still plants a tree for each car sold in the Czech Republic – 363,000 to date.
Skoda’s 2010 Sustainability Report indicated that water consumption per car produced has reduced by 60% from 1999 whilst wastewater had dropped nearly 70%. Solid waster per vehicle produced had also dropped from 95kg in 1999 to 37kg in 2009.
Skoda Auto is an automobile manufacturer in the Czech Republic. In 1991, it became a subsidiary of the Volkswagen Group.
The origins of Skoda go back to the early 1890s where, like many long-established car manufacturers, the company started out with the manufacture of bicycles.
The first model, Voiturette A, was a success and the company was established both within Austria-Hungary and internationally.
By 1905, cars were being produced by the firm. During the First World War Skoda was engaged in war production.
After WWI it began producing trucks, but in 1924, after running into problems and being hit by a fire, the company sought a partner.
As a result, it merged with Skoda Works, the biggest industrial enterprise in Czechoslovakia. Most later production was under the Skoda name.
After a decline during the economic depression, Skoda was again successful in the late 1930s.
The Velvet Revolution brought great changes to Czechoslovakia, and most industries were subject to privatisation.
In the case of Skoda Automobile, the government brought in a strong foreign partner. Volkswagen was chosen in 1990 and in April, 1991, Skoda became the fourth brand of the Volkswagen Group.
The perception of Skoda in Western Europe has undergone complete change. As technical development progressed and attractive new models were brought to market, Skoda's image was initially slow to improve.
By 2005, Skoda was selling over 30,000 cars a year in the UK. Skoda now has several manufacturing and assembly plants, including one in Sarajevo, Bosnia and Herzegovina.
Skoda also has an assembly plant in the city of Aurangabad, in the western Indian state of Gujarat. Backed by VW expertise and investments the design, style and engineering have improved greatly.
Following a long history of class victories in lower levels of motorsport, Skoda became a participant in the FIA World Rally Championship in the 1999 season, with World Rally Car models of the Skoda Octavia. Skoda's best result with the Octavia WRC was a third place at the 2001 Safari Rally.
Skoda used the 2004 season to develop the car further but did not achieve much success the following season.
The bestsellers of the brand are the Fabia and the Octavia with both models available in estate version.
The flagship of the brand is the Superb, a very well equipped vehicle, cheaper than its German competitors, while the practical Roomster completes the range.
Car dealer directory
This directory will locate SKODA dealers by county. Start your location from the drop down list.
- 1,700+ DEALERS.Compete bidding price down, you compare
- SAVE TWICE. You could pay £££ less then the Max Price
- BEST NEW CAR DEALS. We check 100,000 prices daily
- UK MAIN DEALER SUPPLIED.
- FULL DEALER WARRANTY.
- FREE DELIVERY. England/Wales included, Scotland (+£280)
- SAFE & SECURE. Small deposit by credit card and the balance on inspection
- HAPPY CUSTOMERS. Our customers have given us a 98% satisfaction rate.
* No Fee - Subject to our t's & c's
** Total vehicle value (all orders) | <urn:uuid:c8ef7284-7a1a-45e6-a450-5e2c89f0cca7> | {
"date": "2015-02-28T13:54:19",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00147-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9538550972938538,
"score": 2.578125,
"token_count": 943,
"url": "http://www.autoebid.com/new-car-reviews/SKODA-Reviews"
} |
Thirty-five women from Senegal took part in a workshop this June aimed to reduce the trade in endangered shark meat.
The training is part of a community-based conservation project funded by IUCN’s Sir Peter Scott Fund and partner Fondation Ensemble, launched to the public in May, 2008.
Senegalese women have traditionally been employed in shark meat processing. But the over-exploitation of shark stocks, largely to meet the demand for shark fins in Asia, has resulted in the disappearance of some species from the region.
The workshop took place over two days (13th and 14th June), at a fish processing site in Mballing, Senegal. Participants were appointed from six communities to learn new skills for their withdrawal from the unsustainable trade in endangered shark species.
Within West Africa there is high demand for processed pelagic fish, such as the abundant Sardinella, which is traditionally used in cooking and is affordable to the poorest in the community. The training sessions focused on the production of salt dried and smoked Sardinella as a commercially viable alternative to shark meat, supported by the Senegal Ministry of Fisheries.
New technologies in fish processing were also taught to improve the efficiency and hygiene standards adopted by the participants. Project leader Dr. Mika Diop noted that the women were very impressed by their new found skills and were keen to establish new trade networks in their home communities.
By supporting the withdrawal of women from shark meat processing, the project hopes to provide long-term benefits to both local livelihoods and marine biodiversity in West Africa. | <urn:uuid:32c57630-9e4b-4027-8841-8513dd9878f7> | {
"date": "2016-12-08T10:19:12",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542520.47/warc/CC-MAIN-20161202170902-00312-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.975129246711731,
"score": 3.078125,
"token_count": 320,
"url": "https://cms.iucn.org/content/learning-new-trade-save-sharks-senegal"
} |
By taking some extra steps and by being careful, you can prevent the development of type 2 diabetes mellitus.
Prevention of type 2 diabetes mellitus is possible if a few healthy lifestyle changes are made and attention is paid to the prevention of diabetes complications associated with this disease. Some steps to prevent diabetes are to make healthy changes in your lifestyle, however medication is also necessary. Many doctors recommend screening for the presence of type 2 diabetes in people aged over 30 who are at risk; and also of those who family member has a history of diabetes or those who are overweight.
Some risk factors for diabetes, such as age, family history and ethnicity can not be changed. Neverheless, adherence to healthy diet and increasing physical activity – with or without weight loss – can prevent the development of type 2 diabetes mellitus.
In addition, if you suffer from high blood pressure or are overweight, changes in your habit can help prevent this diabetes. Your doctor may give you specific recommendations, which will be right for you and include changes in diet and exercise which should be followed regularly. It greatly helps in reducing the risk of further complications.
The role of drugs in the prevention of diabetes:
Recent studies have shown that medications can help prevent the progress to type 2 diabetes in people with impaired glucose tolerance and is not restricted only to control the already-existing type 2 diabetes mellitus. Different studies have shown that various anti-diabetic drugs along with healthy lifestyle changes can reduce the risk of diabetes in humans with a high level of risk.
Primary step towards prevention of diabetes is to fight against obesity and including healthy nutritious food in one's diet. The content of food should be with low glycemic index, that is, those that do not cause a sharp increase in blood sugar. The most useful products from this perspective are artichokes, apricots, bananas, legumes, nuts, figs, melons, grapefruit, garlic, oatmeal, rice and olive oil. | <urn:uuid:069a5a74-1c77-431d-90ce-b412bafac0ee> | {
"date": "2018-09-21T19:28:51",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157503.43/warc/CC-MAIN-20180921190509-20180921210909-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.939419686794281,
"score": 3.09375,
"token_count": 400,
"url": "https://mediv.dp.ua/tips-to-prevent-type-2-diabetes.html"
} |
Grant Expels the Jews
On Dec. 17, 1862, . . . Gen. Ulysses S. Grant issued the most notorious anti-Jewish official order in American history: “The Jews, as a class violating every regulation of trade established by the Treasury Department and also department orders, are hereby expelled from the department within twenty-four hours from the receipt of this order.” Known as General Orders No. 11, the document blamed Jews for the widespread smuggling and cotton speculation that affected the area under Grant’s command . . . from northern Mississippi to Cairo, Ill., and from the Mississippi River to the Tennessee River. . . .
In the end, only a small number of Jews were seriously affected. . . . Within hours of its issuance, Confederate Gen. Nathan Bedford Forrest staged a daring raid that tore up rail and telegraph lines around Grant’s headquarters at Holly Springs, Miss. The resulting breakdown in communications meant that news of General Orders No. 11 spread slowly.
Eleven days later, . . . one of those affected, Cesar Kaskel, rushed to Washington to protest. [H]e was able to see Abraham Lincoln at once. . . . Lincoln [ordered the Order countermanded.]
In a follow-up meeting with Jewish leaders, Lincoln reaffirmed that he knew “of no distinction between Jew and Gentile.” “To condemn a class,” he emphatically declared, “is, to say the least, to wrong the good with the bad. I do not like to hear a class or nationality condemned on account of a few sinners.” In short order, attention returned to the battlefield, where, within a year, Grant’s victory at Vicksburg elevated him to the status of a national hero.
But . . . [the order had] lingering effects. In the short term, it brought to the surface deep-seated fears that, in the wake of the Emancipation Proclamation, Jews might replace blacks as the nation’s most despised minority. . . .
[D]uring the eight years of Grant’s presidency, . . . [e]ager to prove that he was above prejudice, Grant appointed more Jews to public office than any of his predecessors, and, in the name of human rights, extended unprecedented support to persecuted Jews in Russia and Romania. Time and again, partly as a result of his enlarged vision of what it meant to be an American and partly in order to live down General Orders No. 11, Grant consciously worked to assist Jews and secure them equality.
Nevertheless, the memory of what his wife, Julia, called “that obnoxious order” continued to haunt Grant to his death in 1885. Especially when he was in the company of Jews, the sense that in expelling them he had failed to live up to his own high standards of behavior, and to the Constitution that he had sworn to uphold, gnawed at him. He apologized for the order publicly and repented of it privately. . . .
. . . The order and its aftermath also shed new light on . . . the era of the Civil War and Reconstruction. During these years . . . the definition of what America is and who “We the People” should include convulsed the country. Most of the debate naturally centered on the status of black people, but there was likewise substantial debate concerning the Jews. . . .
. . . Through his appointments and policies, Grant rejected calls for a “Christian nation,” and embraced Jews as insiders in America, part of “We the People.” During his administration, Jews achieved heightened status on the national scene. . . . [Grant] . . . included both blacks and Jews as being among the unfortunates whom “those in authority” should go out of their way to protect. . . .
Unfortunately, those opportunities did not last. Reconstruction proved to be an “unfinished revolution” for black Americans and so it was (albeit not nearly to the same extent) for Jews. . . . Across the United States, anti-Semitic restrictions and quotas led to a substantial decline in Jews’ social status. The “golden age” of the Grant years had, by then, become a distant memory. . . .
Ulysses S. Grant was as popular as George Washington and Abraham Lincoln in the late 19th century, but in the 20th . . . [h]istorians ranked him close to the bottom among all American presidents.
In recent years, however, a thoroughgoing re-evaluation of Ulysses S. Grant has taken place. . . . [H]istorian Sean Wilentz observed in the New York Times, “the vindication of Ulysses S. Grant is well under way. I expect that before too long Grant will be returned to the standing he deserves — not only as the military savior of the Union but as one of the great presidents of his era, and possibly one of the greatest in all American history.” . . . General Orders No. 11 and its aftermath transformed Grant’s career — sensitizing him to prejudice and teaching him to treat members of minority groups as individuals responsible for their own actions. . . .
General Orders No. 11 also greatly strengthened America’s Jewish community. The successful campaign to overturn the order made Jews more self-confident. . . . The fact that Ulysses S. Grant selected, for the first time, a Jewish adviser . . . appointed a series of Jews to public office . . ., and, as president, attended the dedication of a synagogue further enhanced Jews’ self-confidence.
. . . General Orders No. 11 marked a turning point in American Jewish history. Paradoxically, Ulysses S. Grant’s order expelling the Jews set the stage for their empowerment.”
– Submitted by Peter A. Gilbert, Vermont Humanities Council Executive Director
This excerpt from Professor Jonathan Sarna’s When General Grant Expelled the Jews, published in March 2012, is gratefully used with the author’s and publisher’s permission.
Dr. Jonathan Sarna is the Joseph H. & Belle R. Braun Professor of American Jewish History at Brandeis University and chief historian of the new National Museum of American Jewish History.
“When Gen. Grant Expelled the Jews,” by Jonathan D. Sarna, Slate.com | <urn:uuid:7d2a0fd7-483b-4fde-9d92-b22499b02ee3> | {
"date": "2017-07-24T12:40:17",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424876.76/warc/CC-MAIN-20170724122255-20170724142255-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9563192129135132,
"score": 3.046875,
"token_count": 1347,
"url": "https://civilwarbookofdays.org/2012/12/14/grant-expels-the-jews/"
} |
Developing a modelling framework to assess safety performance of intersections
2017-02-15T23:34:40Z (GMT) by
Road crashes have become one of the most important health issues in today’s society. The number of people killed in traffic crashes in the world each year has exceeded one million people. It is expected that increasing numbers of motor vehicles in many countries will result in a sharp increase in the number of fatalities in traffic crashes to the extent that they may exceed two million injuries by the year 2020. In order to ensure that this does not occur, efforts should be made to manage mobility and safety. Safety evaluation is essential part of safety management. Studies of safety evaluation show that researchers have approached the understanding, analysis and prediction of safety events in many ways. One of these is through the use of mathematical models of safety situations. A literature review of safety models revealed that safety modelling has been approached from three different perspectives. These are the transportation, crash analysis and medical perspectives. Transportation researchers have utilised statistical analysis to investigate the relationship between crash outcome and road, traffic, and environmental factors. Another group of transportation researchers used micro-simulation models to estimate the number and severity of conflicts based on road, traffic and environmental factors. Researchers from crash analysis perspective used statistical analysis and Newtonian Mechanics to explore the relationship between crash severity and crash characteristics such as the mass of bullet vehicle and target vehicle, ∆V of the crash, energy absorption of the colliding vehicles, impact speed, impact characteristics, angle of the crash and equivalent barrier speed. Medical scientists focus on the human body, investigating the level of severity on different regions of the body. Detailed human body characteristics were taken into consideration to measure the level of severity for each region of the body. Statistical analysis is used to study a relationship between occupant injury severity and human body characteristics. In summary, researchers have used micro-simulation models, statistical analysis, and numerical models using Newtonian Mechanics to estimate number of conflicts, severity of conflicts, number of crashes, and severity of crashes. The first three output variables (i.e. number of conflicts, severity of conflicts and number of crashes) have only been considered by transportation researchers. Crash severity is the common output variable used in all three research perspectives to assess road safety performance. All these output variables play a crucial role in road safety assessment. However, the research carried out previously estimates only one or two of these output variables and omits the others in road safety assessment. A comprehensive safety assessment model should estimate all these variables in one framework in order to improve the understanding of variables influencing traffic safety. Moreover, it improves safety modelling by combining these three safety modelling perspectives. The broad aim of this research is to develop a theoretical framework for intersection safety evaluation. In order to develop the theoretical framework first we define Safety Analysis Chain (SACH). The SACH diagram shows the relationship of a chain of events taking place and making a road location unsafe. The five events in the SACH include “traffic flow”, “conflicts”, “severe conflicts”, “crashes” and “severe crashes”. Then a theoretical method is outlined to quantify the five events of the SACH. The developed theoretical method consists of three components outlined below: • The first component of the framework is to estimate the number and severity of conflicts using a micro-simulation model. This component estimates the first three events of the SACH. Inputs into the first component are the geometry and traffic characteristics of the road system. The output of the first component of the simulation framework is the characteristics of the serious conflicts which have been generated in the micro simulation model. • In the next step the link between “severe conflicts” and “severe crashes” is modelled. In order to model this link, the risk of being involved in a severe crash is estimated using conflict characteristics. The second component of this framework is the measurement of the potential injury severity of each simulated conflict. The characteristics of the simulated conflict are used as input. These are the output of the first component of the simulation framework. A three-step modelling approach is used to estimate the potential injury severity of conflicts. In the first step, expected speed change of the subject vehicle (∆Vs) in the crash is estimated given the condition that the conflict leads to a crash. The expected ΔVs is estimated using conflict characteristics and driver’s reaction before crash. The second step is to utilise Newtonian Mechanics to estimate the magnitude of kinetic energy applied to the subject vehicle. In the third step of this component, the expected Injury Severity Score (ISS) of the conflict is measured using estimated kinetic energy of the subject vehicle and the impact type of the expected crash. • The third component of the framework is to estimate average number of crashes and consider this value as the output of “crashes” event in the SACH. The average number of crashes is calculated using either the historical crash data of the road location or the available crash prediction models. The final output of the framework is the safety level of the studied road location. The safety level of the road location is measured using a road safety index (RSI) derived based on the output of the three components of the framework. The RSI is derived based on the definition of crash severity risk (CSR) which is the product of average expected severity and the probability of crash. The value of average expected severity and the probability of crash can be calculated using the quantified events of the SACH. The developed road safety index was applied to assess the risk of turning behaviour at a signalised intersection in Melbourne, Australia. The results of the model were compared to the historical crash data of the intersection. The results of the case study showed the measured risk of being involved in a severe crash for investigated manoeuvres was consistent with the historical crash data of the intersection. This study contributes to knowledge in a number of directions, these are outlined below: • This study contributed on road safety modelling through linking the main safety modelling perspectives to improve road safety understandings and modelling. • An other main contribution of this study is to integrate the preceding safety research perspectives through developing a theoretical framework to model the link between all the SACH events. • In this study, a combination of Newtonian Mechanics and statistical models is incorporated into the micro simulation model to estimate the potential injury severity of simulated conflicts. The developed framework improves the simulation based safety performance assessment by considering the risk of crash severity for different conflicts. • This is the first study investigating the relationship of ΔV, kinetic energy and the injury severity score of the crash to assess roads safety level. The developed modelling framework uses a combination of micro-simulation, statistical and numerical analysis to integrate the conflicts with crash severity to provide a better assessment of road network safety. Given that, at this point, there are no microscopic traffic algorithms reliable enough to replicate accident occurrences, these models applied after the conflict has been detected from micro-simulation represents an approach to improve the usefulness of microscopic simulation for safety assessments. | <urn:uuid:f85c9c55-aed7-448c-9fbc-9b517677adff> | {
"date": "2019-10-16T12:26:14",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986668569.22/warc/CC-MAIN-20191016113040-20191016140540-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9347817897796631,
"score": 2.9375,
"token_count": 1435,
"url": "https://figshare.com/articles/Developing_a_modelling_framework_to_assess_safety_performance_of_intersections/4657420/1"
} |
This chapter is on cultural aspects of information- communications systems embedded into new media environment and invisible e-technologies, and on a new age of social responsibility for information technology professionals. Besides the key issues in information technology development that create smart environment and ambient intelligence, the chapter also discusses digital e-culture and the new media role in cultural heritage. From the viewpoint of information technology, the current information-communications systems converge with media. This convergence is about tools-services-content triangle. Thus, we are confronted with a new form of media mostly presented with the term digital, reshaping not only media industry but also a cultural milieu of an entire nation on a regional and global basis. The discussion follows on the World Library idea that is rebuilding with new form of World Memory (World Brain), the shift from visible culture domination to the domination of invisible culture in the world of e-technologies predominance. From this scenario, information technology professionals coping with information systems projects, e-services development, and e-content design have more cultural responsibility than in the past when they worked within closer and inner cultural horizons and when their misuse of technologies had no influence on culture as a whole. | <urn:uuid:dcee2614-53e9-4adf-85fe-7d3cae92f85c> | {
"date": "2017-04-23T19:49:37",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00527-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8940833210945129,
"score": 2.59375,
"token_count": 238,
"url": "http://www.igi-global.com/chapter/information-communications-systems-convergence-paradigm/22389"
} |
In 2002, 1707 civil unions were established in Vermont, down from 1875 in 2001. The highest number occurred in July (225).
Civil unions involving out-of-state residents accounted for almost 90 percent of the total number of civil unions (Table I-2), a 3 percent increase from 2001. The states with the largest number of residents who established civil unions were New York, followed by Massachusetts and Florida (Table I-1). The largest number of Vermont residents who established civil unions resided in Chittenden County (Table I-2).
Seventy-one percent of the civil unions were between female partners, up from 67 percent in 2001, and the most common age group for both male and female partners was 35 to 39 (Table I-4). Civil union partners tend to be highly educated: 55% completed at least four years of college (Table I-5).
Table I-6 shows the total number of civil unions or marriages, including the current civil union, that each person has been a party to during their lives. For 76 percent of the civil union partners, this was their first union, or marriage.
The dissolution of civil unions follows the same procedures, same requirements, rights, and obligations as divorces. There were 9 dissolutions in 2002. | <urn:uuid:7537146f-8aad-447e-9e4c-7680a935719c> | {
"date": "2015-02-27T16:51:25",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00081-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.969976007938385,
"score": 3.109375,
"token_count": 263,
"url": "http://healthvermont.gov/research/stats/2002/cu.htm"
} |
Center to Transform Haitian Building Industry, Produce More Resilient Buildings
Thursday, January 12, 2012
On January 12, 2010, a catastrophic 7.0 earthquake struck Haiti. In the months that followed, the United States building community worked to develop a construction toolkit to help Haiti rebuild. Two years later, a glimmer of an idea that began during that time is now on its way to becoming a reality: the establishment of the Haiti Center for Sustainable Reconstruction & Development.
A diverse group of members of the U.S. construction community, the Haitian diaspora and the U.S. and Haitian higher education community are working together on the project. The Center, which is to be located at the State University of Haiti, will serve as an educational and technical resource for the entire Haitian building and construction industry, including public and private universities, technical and vocational schools, national and local government agencies, the building industry and the general public.
Following the earthquake, it became clear that poor building practices in Haiti played a significant role in the level of destruction and the loss of life. There was a need for proper education and training; codes, standards and guidance; enforcement; and tangible examples of proper construction techniques. The U.S. building community began compiling a toolkit of such materials to offer the Haitian government. After visits to Haiti, discussions with a number of organizations and some serious teamwork, a plan for the Center began to grow.
"Because of poor construction practices, more than 250,000 Haitians died unnecessarily in the earthquake,” said Ryan Colker, the National Institute of Building Sciences Presidential Advisor and Director of its Consultative Council. "Unfortunately, other hazards, including hurricanes and landslides, also pose significant threats. We saw an opportunity to change the culture of building in Haiti—an opportunity where a safe, sustainable and resilient built environment would support the emergence of a revitalized country. The Haiti Center for Sustainable Reconstruction & Development will provide Haiti with the know-how to establish the necessary governmental infrastructure and proper training for the building trades so that this level of destruction won’t occur in the future.”
"By engaging the Haitians in learning and implementing safe building techniques, the Center hopes to significantly reduce the damages and costs from the natural disasters that habitually visit the poor island,” said Daniel Lamaute, Reconstruction Project Liaison, National Association for the Advancement of Haitians (NOAH).
The Center will serve as a unique resource for the Caribbean region. It will encourage a multi-disciplinary research program focused on disaster risk reduction that covers engineering, architecture, physical planning, public policy and public administration. The Center will offer a diverse curriculum of courses for a variety of audiences, including professional courses for university students, continuing education for practicing professionals, resources for hands-on technical and vocational training, and outreach programs for the nation’s building industry, government and non-government agencies. Plus, an onsite library will host training materials on construction practices.
A number of entities are involved in establishing the Haiti Center for Sustainable Reconstruction & Development, including the National Institute of Building Sciences, Earthquake Engineering Research Institute, Virginia Polytechnic Institute and State University, Ayers Saint Gross Architects + Planners, National Organization for the Advancement of Haitians, Institute for Building Technology and Safety, Haitian American Engineers Organization, Witt Associates, California Polytechnic University College of Architecture and Environmental Design, and the State University of Haiti.
Legally incorporated as a nonprofit organization in the United States in April of 2011, the Center is seeking funding, curriculum development and technical resources. To donate funds or otherwise support this effort to improve the safety and durability of buildings in Haiti, visit www.HaitiBuildingCenter.org or contact Ryan Colker. | <urn:uuid:9f48c03e-b337-41ed-a8dd-5fd8e699259b> | {
"date": "2017-02-21T12:15:18",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00364-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9370115995407104,
"score": 2.796875,
"token_count": 767,
"url": "http://www.nibs.org/news/100303/News-Releases-Center-to-Transform-Haitian-Building-Industry-Produce-Mo.htm"
} |
Dam Parity May Impact Pigs' Immunity Levels
Preliminary results of research at the University of Nebraska suggest that health status, as indicated by circulating immunoglobulin concentrations in baby pigs, may be affected by dam parity.
Researchers investigated the health status of different parities by evaluating the ability of Parity 1 (P1) and Parity 3 (P3) dams to produce and passively transfer immunoglobulins (IgA and IgG) to their offspring.
General observation is that P1 progeny have reduced health status compared to progeny from older sows (Table 1). But these differences in health status of pigs from different dam parities have not been fully clarified.
The objective of the University of Nebraska study was to provide baseline information to gain a greater understanding of parity health differences by evaluating production and transfer of immunoglobulins from dams of increasing parity to their progeny.
Large White x Landrace females were part of an ongoing sow longevity experiment at the University of Nebraska.
After farrowing, 4-5 piglets from five, Parity 3 sows and four, Parity 1 gilts were randomly selected for analysis.
Three parameters were evaluated to assess the health status of progeny derived from different parities:
Circulating concentrations of IgA and IgG in P1 and P3 dams;
Concentrations of IgA and IgG during lactation in colostrum and mid- and late-lactation milk; and
Circulating concentrations of IgA and IgG in P1 and P3 progeny.
Whole blood was obtained from each dam 24 hours pre-farrowing and from dam progeny at 0, 8, 15, 20 (weaning), 29 and 37 days post-farrowing.
The concentrations of IgA and IgG in serum obtained from P1 and P3 females 24 hours prior to parturition are depicted in Figure 1. The values for both immunoglobulins are within normal ranges.
However, P3 females had greater concentrations of both IgA and IgG compared to P1 females. The higher stress load on P1 females may dampen their immune response, researchers noted.
This trend for differences in circulating concentrations of immunoglobulins at the time of parturition did not continue when IgA and IgG concentrations were evaluated in colostrum and milk samples from the same females (Figure 2). The IgA and IgG concentrations observed in colostrum samples obtained within 12 hours of farrowing were greater than immunoglobulin levels detected in milk samples obtained at mid- or late lactation.
“Although differences exist in immunoglobulin concentrations in the serum of these same females, it was somewhat surprising that no differences in colostrum or milk immunoglobulin concentrations were observed during lactation,” says lead researcher Thomas E. Burkey.
Figure 3 depicts circulating IgA and IgG concentrations in P1 and P3 progeny at several time points following parturition. The progeny of P3 females had greater levels of IgG compared to the progeny of P1 females at every time point evaluated, with a similar trend observed for IgA.
Progeny immunoglobulin concentrations from birth to about 2 weeks of age are almost completely due to passive transfer from the dam. Baby pigs rely on passive transfer of immunity via colstrum, and milk from the dam until they can mount their own immune response at 2 to 5 weeks of age.
Researchers: Thomas E. Burkey, Phillip S. Miller, Rodger K. Johnson, Duane E. Reese and Roman Moreno, all of the University of Nebraska. Contact Burkey at (402) 472-6423.
|System 1a||System 2b|
|Parameter||P1 Progeny||P2 Progeny||P1 Progeny||P2 Progeny|
|Weaning wt., lb.||12.10||13.00||11.70||12.60|
|Avg. daily gain, lb.||0.92||0.95||0.91||0.96|
|Avg. daily gain, lb.||1.99||2.01||1.62||1.69|
| aAverages calculated from 242,406 and 677,661 P1 and P2 progeny, respectively. |
bTotal number of progeny were not included.
Circovirus Spread Via Semen Studied
Because porcine circovirus-associated disease (PCVAD) has spread rapidly across North America, boar semen has been implicated as a possible source for dissemination of the virus.
To address this issue, and determine if there are differences in semen shedding of porcine circovirus type 2 (PCV2) isolates, 15, 7-month-old PCV2-negative boars were randomly allotted to three different groups. The first group served as control, the second was inoculated with PCV2a (North American-like virus) and the third group was inoculated with PCV2b (European-like virus).
Semen and serum were collected during the 90-day trial at Iowa State University (ISU).
Research concluded that PCV2a and PCV2b were both shed in low levels in semen in the two groups, of experimentally infected boars. Semen was shed for up to 12 weeks.
Overall, the amount of shedding was low and variable among individual boars within groups, and peak shedding occurred approximately three weeks post-challenge.
Detection of PCV2 in semen corresponded well with detection of PCV2 DNA in serum samples and blood swabs.
This trial verified that mature boars shed low quantities of PCV2a and PCV2b in semen, and that semen is a potential route for PCV2 transmission amongst swine herds.
In a second trial, a swine bioassay model was used to determine if PCV2-positive semen was infectious. Twelve, 4-week-old, PCV2-negative pigs were divided into four groups. All of the 4-week-old naїve pigs that were inoculated intraperitoneally (abdominal area) with PCV2-positive semen became infected with either PCV2a or PCV2b.
But when the same semen samples were extended, and used to artificially inseminate PCV2-negative gilts in a third trial, those gilts did not develop PCV2 infection, nor did they show evidence of PCV2-associated reproductive failure. All gilts inseminated with PCV2-positive semen became pregnant and carried pregnancy to term. There was no evidence that fetuses became infected with PCV2.
Researchers concluded that experimental inoculation of boars with PCV2 produces infection; however, it has yet to be determined if PCV2-positive semen is a risk for transmission and dissemination of PCVAD.
Research was funded by the Pork Checkoff.
Researcher: Tanja Opriessnig, Iowa State University. Contact Opriessnig by phone (515) 294-1950, fax (515) 294-6961 or e-mail [email protected].
Immune Parameters May Signal Why Some Pigs Clear PRRS Virus
Porcine reproductive and respiratory syndrome (PRRS) virus is difficult to rid from herds because infection elicits a weak immune response that is not fully protective.
This results in persistent infection in a subset of pigs, thus providing a continued source of virus circulation within the herd.
Substantial research efforts have not yielded the exact components of a protective anti-PRRS virus immune response, particularly as it relates to persistence.
These shortcomings led researchers at the U.S. Department of Agriculture Agricultural Research Service's (ARS) Beltsville Animal Research Center (BARC) and Kansas State University to use “Big Pig” samples to determine whether immune markers that control PRRS virus persistence can be identified.
The Big Pig project was a PRRS CAP1 (Coordinated Agricultural Project)-supported, multi-institutional (university and commercial), multi-disciplinary experiment initiated in 2005. It was designed to analyze pig responses to PRRS disease, virus replication and immunity in 109 pigs (and 56 control pigs), sampled for up to 203 days post-infection.
Blood samples collected throughout the Big Pig project were evaluated for blood protein levels that might be predictive for pigs that clear PRRS virus rather than pigs that remain persistently infected with PRRS.
The hypothesis was that protective serum cytokine levels 7-42 days post-infection would help predict which pigs were more likely to have persistent viral infection (147-203 days post-infection).
Samples from pigs that apparently cleared PRRS virus from serum and tissues by 28 days post-infection were labeled the Non-Persistent (NP) pigs. Persistent (P) pigs were those that showed evidence of long-term, persistent PRRS infection at 150 days post-infection.
Sera from P and NP pigs collected over the course of the PRRS infection were tested for serum cytokine levels (substances that are secreted by cells of the immune system) following PRRS infection.
NP pigs appeared to have faster and higher levels of serum cytokine Interleukin-8 and anti-viral Interferon-gamma than the pigs with persistent infections. This immune cytokine trend correlated with the clearance of virus from serum and tissues.
Researchers noted this effect might indicate that the NP pig's immune response was faster and more effective than that for pigs with persistent infections, and possibly enabled the NP pigs to prevent PRRS virus infections from becoming persistent.
This conclusion sets the stage for identifying prognostic indicators of persistent infection and for targeting these proteins for anti-PRRS virus biotherapeutics or vaccines.
At present, it is estimated that 60% of U.S. hog operations are infected with PRRS. The National Pork Board calculates PRRS is the most economically significant disease facing the swine industry, costing $560 million annually.
Researchers: Joan K. Lunney, USDA, ARS, BARC; Bob Rowland, Kansas State University. Contact Lunney by phone (301) 504-9368, fax (301) 504-5306 or e-mail [email protected]. Contact Rowland by phone at (785) 532-4631 or e-mail [email protected].
Serum Sampling is Best PRRS Diagnostic Tool
Serum samples provide the best sample to detect porcine reproductive and respiratory syndrome (PRRS) virus during acute infection, with the blood swab sample performing almost as well in research conducted by the University of Minnesota in collaboration with South Dakota State University, PIC and Boehringer Ingelheim Vetmedica, Inc.
Boar studs are regularly monitored for the presence of the PRRS virus, testing different biological samples by reverse-transcription polymerase chain reaction (RT-PCR).
Usually, samples are run in pools to reduce the cost of submitting individual samples, even though the impact of pooling on the sensitivity of RT-PCR is unknown.
To assess the impact of pooling and collection method on PRRS virus by detection, 29 boars were inoculated with a low virulent PRRS strain. Serum, blood swab and semen samples were obtained from each boar every two to three days for two weeks and tested by RT-PCR.
Eleven of the 29 boars did not appear to become infected from the inoculation. Data from the other 18 boars showed that serum provided the best sample, followed by blood swab.
Other results showed that semen samples failed to detect PRRS infection in most of the cases.
For most of the samples, pooling did not affect the performance of the test. But PRRS detection was missed in a small proportion of pooled samples. The impact of pooling on the sensitivity of PCR was higher in samples taken when infection started. Sensitivity was decreased by 6-8% when serum or blood swab samples were run in pools of five.
This decrease in sensitivity should be taken into account when designing surveillance protocols for boar studs by proportionally sampling more boars.
Researcher: Albert Rovira, DVM, University of Minnesota. Contact Rovira by phone (612) 625-7702, fax (612) 625-1210 or e-mail [email protected].
Seeking Answers for Postweaning Diarrhea
Porcine postweaning diarrhea (PWD), caused by enterotoxigenic Escherichia coli (ETEC), is one of the most economically significant swine diseases. It causes an estimated $90 million in annual losses due to death of up to 5% of young pigs.
Symptoms of PWD include severe diarrhea, dehydration, slow growth and weight loss.
Despite its importance, there are no commercially available vaccines or treatment options to protect weaned pigs from PWD.
Key virulence factors for PWD are believed to be bacterial fimbriae and enterotoxins produced by ETEC strains. Bacterial fimbriae attach E. coli strains to the small intestine and cause bacterial colonization. Then the colonized E. coli strains secrete enterotoxins, which cause an overproduction of fluid secretions and result in diarrhea.
However, recent studies at South Dakota State University's Center for Infectious Disease Research & Vaccinology indicate that factors causing PWD could be more complicated, and that other virulence factors could be contributing to the disease, making the development of treatment options even more difficult.
K88 and F18 fimbrial strains of E. coli are the dominant pathogens found in pigs with PWD. These E. coli strains produce one or more enterotoxins.
A study of 304 E. coli strains isolated from pigs with PWD suggests that other E. coli toxins and non-fimbrial adhesions could contribute to PWD.
The study found that fimbrial E. coli strains isolated from pigs with PWD express mainly K88 (64.6%) and F18 (34.3%), but also heat-labile (57.7%) and a variety of heat-stable toxins, all of which remain the dominant fimbriae and enterotoxins associated with PWD.
But it is noticeable that enteroaggregative E. coli toxin is commonly associated with PWD, and that the porcine attaching and effacing-associated factor is showing high prevalence in PWD.
To understand the virulence factors for PWD, a study model was developed using genetically engineered E. coli strains with one fimbria and one enterotoxin. Animal challenge studies were conducted using gnotobiotic (germ free) pigs.
It was found that a K88 E. coli strain and a heat-labile toxin cause severe diarrhea in all pigs, and a strain producing K88 fimbria and heat-stable toxin (STb) causes disease in 60-70% of pigs. Other enterotoxins are being investigated for virulence.
An ongoing research project for vaccine development funded by USDA shows promise. So far the vaccine protects pigs from K88 fimbrial ETEC strains. Work continues to add vaccine protection against heat-stable toxins, and acquisition of funds to complete this research project.
Researcher: Weiping Zhang, South Dakota State University. Contact Zhang by phone (605) 688-4317, fax (605) 688-6003 or e-mail [email protected]. | <urn:uuid:d74608b5-66a4-489b-8d06-82ff0ccf6029> | {
"date": "2015-07-30T04:45:58",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987127.36/warc/CC-MAIN-20150728002307-00167-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9415835738182068,
"score": 2.609375,
"token_count": 3288,
"url": "http://nationalhogfarmer.com/print/mag/farming_health"
} |
The original UNLV press release by Francis McCabe can be read here.
Scientists carrying out research at the U.S. Department of Energy’s Advanced Photon Source (APS) and Advanced Light Source (ALS) national synchrotron x-ray research facilities discovered the first direct evidence that fluid water pockets may exist as far as 500 miles deep into the Earth’s mantle.
Groundbreaking research by University of Nevada, Las Vegas (UNLV) geoscientist Oliver Tschauner and colleagues from UNLV, The University of Chicago, the California Institute of Technology, the China University of Geosciences, the University of Hawaii at Manoa,, and the Royal Ontario Museum (Canada) found diamonds pushed up from the Earth’s interior had traces of unique crystallized water called Ice-VII, a high-pressure form of water ice that is stable above 2.4 gigapascals. Ice-VII has recently been recognized as a mineral by the International Mineralogical Association.
The study, “Ice-VII inclusions in Diamonds: Evidence for aqueous fluid in Earth’s deep Mantle,” was published in the journal Science.
In the jewelry business, diamonds with impurities hold less value. But for Tschauner and other scientists, those impurities, known as inclusions, have infinite value, as they may hold the key to understanding the inner workings of our planet.
For this study, the researchers used diamonds that surged up from inside Earth in southern Africa (Orapa [Fig. 1], Namaqualand), China (Shandong), Zaire, and Sierra Leone. “This shows that this is a global phenomenon,” Tschauner said.
The diamonds were examined by x-ray diffraction at The University of Chicago’s GeoSoilEnviroCARS (GSECARS) undulator beamline 13-ID-D at the APS, and x-ray micro-fluorescence at the GSECARS 13-ID-E beamline. Additional diffraction data were collected at the High Pressure Collaborative Access Team (HP-CAT) 16-ID-B beamline, also at the APS. (The APS is an Office of Science user facility at Argonne National Laboratory). Characterization by infrared spectroscopy was carried out at Caltech, and at the ALS bending magnet beamline 1.4 (the ALS is an Office of Science user facility at Lawrence Berkeley National Laboratory.)
Scientists theorize the diamonds used in the study were born in the mantle under temperatures reaching more than 1,000-degrees Fahrenheit. The mantle - which makes up more than 80 percent of the Earth’s volume - is made of silicate minerals containing mostly magnesium, and smaller amounts of iron, aluminum, and calcium among others.
And now we can add water to the list.
The discovery of Ice-VII in the diamonds is the first known natural occurrence of the aqueous fluid from the deep mantle. Ice-VII had been found in prior lab testing of materials under intense pressure. Tschauner also found that while under the confines of hardened diamonds found on the surface of the planet, Ice-VII is solid. But in the mantle, it is fluid.
“These discoveries are important in understanding that water-rich regions in the Earth’s interior can play a role in the global water budget and the movement of heat-generating radioactive elements,” Tschauner said.
This discovery can help scientists create new, more accurate models of what’s going on inside the Earth, specifically how and where heat is generated under the Earth’s crust.
In other words: “It’s another piece of the puzzle in understanding how our planet works,” Tschauner said.
Of course, as it often goes with discoveries, this one was found by accident, explained Tschauner.
"We were looking for carbon dioxide," he said. "We're still looking for it, actually,"
See: O. Tschauner1*, S. Huang1, E. Greenberg2, V.B. Prakapenka2, C. Ma3, G.R. Rossman3, A.H. Shen4, D. Zhang2,5, M. Newville2, A. Lanzirotti2, and K. Tait6, “Ice-VII inclusions in diamonds: Evidence for aqueous fluid in Earth’s deep mantle,” Science 359, 1136 (9 March 2018). DOI: 10.1126/science.aao3030
Author affiliations: 1University of Nevada, Las Vegas, 2The University of Chicago, 3California Institute of Technology, 4China University of Geosciences, 5University of Hawaii at Manoa, 6Royal Ontario Museum
Correspondence: * [email protected]
This work was supported by U.S. Department of Energy (DOE) awards DESC0005278, DE-FG02-94ER14466, and DE-NA0001974, and by NSF grants EAR-1634415, EAR-1128799, EAR-1322082, EAR-0318518, and DMR-0080065. The Advanced Light Source is a DOE Office of Science User Facility under contract no. DE-AC02-05CH11231. GSECARS is supported by the National Science Foundation-Earth Sciences (EAR-1634415) and U.S. DOE-GeoSciences (DE-FG02-94ER14466). HP-CAT operations are supported by DOE-NNSA under Award No. DE-NA0001974, with partial instrumentation funding by NSF. This research used resources of the Advanced Photon Source, a U.S. DOE Office of Science User Facility operated for the DOE Office of Science by Argonne National Laboratory under Contract No. DE-AC02-06CH11357.
Argonne National Laboratory seeks solutions to pressing national problems in science and technology. The nation's first national laboratory, Argonne conducts leading-edge basic and applied scientific research in virtually every scientific discipline. Argonne researchers work closely with researchers from hundreds of companies, universities, and federal, state and municipal agencies to help them solve their specific problems, advance America's scientific leadership and prepare the nation for a better future. With employees from more than 60 nations, Argonne is managed by UChicago Argonne, LLC for the U.S. Department of Energy's Office of Science.
The U.S. Department of Energy's Office of Science is the single largest supporter of basic research in the physical sciences in the United States and is working to address some of the most pressing challenges of our time. For more information, visit the Office of Science website. | <urn:uuid:3b64da87-477f-4991-891a-6011e6c830b3> | {
"date": "2019-05-21T15:00:04",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256426.13/warc/CC-MAIN-20190521142548-20190521164548-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9068499803543091,
"score": 3.390625,
"token_count": 1433,
"url": "https://www.aps.anl.gov/APS-Science-Highlight/2018-03-13/unique-diamond-impurities-indicate-water-deep-in-earths-mantle"
} |
Sunday in the Park With George and Clojure
White: a Blank Page or Canvas.
As I spent a pleasant Sunday outside doing yard work, songs from one of my favorite musicals, “Sunday in the Park with George”, came to mind. While the songs were playing in my head, my thoughts again drifted to one of my favorite programming languages, Clojure. To my surprise, I was struck by similarities between the musical, which is about the artist Geroges Seuret and his creation of one of his famous painting, and that of the functional JVM language of Clojure. Granted, musicals, art and programming languages don’t generally get discussed together, but please humor me and let me elaborate. Following the thread of my inspiration, I will be using the first few opening lines from the musical as my headings and guides for my discussion.
Let’s start with the broad subjects of Art and Software. They are both created. We use our tools, palettes and techniques to create representations of the world. The visual artist portrays this representation in paints and on canvas, while the software developer uses programming languages and computers.
Looking back in time, we see that there are many different styles of painting that have developed over time. From flat, idealized Byzantine Art to that of the incredible realistic detail of Renaissance Dutch portrait masters. These styles were a reflection of not only the techniques and materials of the time, but also an outlook on the world and the way the artist represented it. Likewise, software styles also have differed over time. From the procedural BASIC language to the current dominant style of Object Oriented programming, the styles are a reflection of not only the technology available to us, but in the way that we model real world concepts and processes into the digital space.
The Challenge: Bring Order to the Whole.
Georges Seuret was interested in the optic effect when two small points of different color placed close to one another, would seem to create a third new and luminous color when viewed at a distance. He innovated a technique called pointillism, and created a whole painting composed of tiny dots of color. The striking effect of this can be seen in his famous, large scale painting titled “A Sunday Afternoon on the Island of La Grande Jatte”.
In his use of pointillism, Seuret turned to simplicity to create order and achieve complexity. By breaking the painting down into the essence of dots of colors, he opened the way for a sort of parallelism in color viewing by the user, which ended up giving the viewer a perception of richer colors. This very technique, enhanced by todays technology is of course the basis of our incredible RGB viewing in our televisions and monitors.
Let’s turn to Clojure. Clojure is a functional language that is interested with concurrency. It also turns to simplicity to achieve complexity. By breaking things down and simplifying to more pure functions with immutable data structures, it make the complex problem of parallel programming possible. This is something that is very hard in the Object Oriented world view programming model. In my opinion, Clojure’s approach to concurrent complexity with simplicity is an important innovation to our world of software, just as pointillism was to the world of art. To better explain, let’s walk though some of the language features.
Rich Hickey designed Clojure as a general-purpose language. He wanted it to combine some of best parts of a scripting language – the approachability and interactive development with a REPL – with an infrastructure that would be fast, robust and support multithreaded programming.
The language itself is a LISP. It gains the benefits of the simplicity of syntax of the code as data as well as having the power of Macros that allows one to customize the language. The beauty of this simplicity and conciseness allows one to focuses more on the code that matters.
Pure functions and immutable state is great, but to most things you will need some sort of state. Clojure also provides ways to use mutable state and still support correct multithreaded designs. It uses Software Transaction Memory System and Agents to achieve this. This use of mutable state in a controlled and isolated way, allows clean, efficient and concurrent programming.
Clojure embraces the JVM as it’s platform. This pragmatic approach gives not only gives the language a scalable, proven run time environment, it also gives it the advantage of accessing Java’s many mature libraries through wrapper free interoperability.
Clojure language is a joy to learn. Being concise and a LISP, is very regular in it’s syntax. There are only a few key data structures and forms to learn to really get started.
In summary, innovation in art and technology can come through a quest for simplification. This very act of simplification, then allows for breakthroughs in complexity. Both Seuret and Hickey have shared in this vision in both their art and software.
Finally, I highly recommend watching “Sunday in the Park with George” if you haven’t seen it yet. I also highly recommend looking at Clojure too. In fact, you might want to try some Clojure Koans before watching the show. You might enjoy it from a different perspective… | <urn:uuid:a5dfd009-1609-43d0-9ae6-13af1ae9a0fa> | {
"date": "2017-03-29T15:14:11",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00526-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9505266547203064,
"score": 2.546875,
"token_count": 1089,
"url": "http://gigasquidsoftware.com/blog/2011/09/12/299/"
} |
Orange Unified School District has decided to push forward with its popular elementary-school program that teaches children Mandarin Chinese.
The district this school year introduced the Mandarin Dual Language Immersion Program at Fletcher Elementary School, which allows kindergarten and first-grade children to learn the language. Fletcher Elementary is one of only two public schools in Orange County with a Mandarin-immersion program.
Students learn about 50 percent of their daily lessons in Mandarin and 50 percent in English. District officials said they introduced the program to better prepare students to compete globally, as China continues to grow as a world power. This school year, about 30 students in each grade are participating in the program.
"I think teaching Mandarin is one of the most important things schools can do to give students a leg up," said Victoria Castillo, a parent with the school's PTA. "This shows how a school can evolve to better meet the educational needs of children."
Contact the writer: 714-704-3773 or [email protected] | <urn:uuid:cfc0e900-fc3e-4461-87ca-da111920ebfa> | {
"date": "2016-05-02T20:16:07",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860117405.91/warc/CC-MAIN-20160428161517-00176-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9626179337501526,
"score": 2.65625,
"token_count": 205,
"url": "http://www.ocregister.com/common/printer/view.php?db=ocregister&id=383073"
} |
Emerging Voices features contributions from scholars and practitioners highlighting new research, thinking, and approaches to development challenges. This article is from Nicole Tosh, a program associate with the Global Assets Project at the New America Foundation. She discusses how cash transfers can empower girls living in poverty and the technological innovations that stand to facilitate cash transfers.
Yesterday was the first annual International Day of the Girl. A number of initiatives, partnerships and even films are being released, directing the attention of policymakers, NGOs, and governments squarely to the issues facing girls in poverty. Finally the world is waking up to a reality that 600 million girls are already acutely aware of: life as a girl at the bottom of the pyramid is tough.
The chief argument made by those leading this effort is that anti-poverty interventions targeting girls—rather than women or children generally—disrupt the intergenerational cycle of poverty that traps whole communities. Of course, there are a handful of dissenting voices who disagree with this ever-growing movement. As I’ve written previously, their opposition tends to be based either on a simplistic understanding of the research or generally misdirected.
Research on investments in girls shows that more education leads to fewer but healthier children and higher earnings. Having fewer children leads to a decreased risk of death and other pregnancy-related complications, and more earnings means more money reinvested in the girl’s family. All of this cannot happen, however, unless girls are empowered.
What does empowerment mean? It means giving a girl the opportunity to stay in school rather than forcing her to work in the home or wed in her teenage years, providing her with the resources and knowledge to deal with family planning and other health issues, and allowing her to make her own decisions—financial or otherwise.
The numbers show empowerment matters. Maternal mortality is the single greatest cause of death among girls aged 15 to 19. While the Millennium Development Goals (MDGs) have made education equality a top priority, girls still comprise 53 percent of out-of school youth; and 75 percent of AIDS-infected youth in Africa are girls.
In light of the stark realities that girls confront, policymakers, NGOs, and governments are beginning to focus their efforts on providing direct assets to girls (DATG). While the term “asset” can refer to a number of different tangible objects (think: bike) and even intangible quantities (think: education), the most basic and literal asset—money, in the form of direct cash transfers to girls—may just be one of the most promising.
The reasons for this are many. Cash transfers, an increasingly recognized antipoverty tool, provide beneficiaries with the means to meet their needs, but perhaps equally important, cash transfers offer economic independence for many of the world’s poorest. But that’s not all. Study after study has shown that cash transfers can have an impact on beneficiaries’ education, health, and overall social capital. In fact, findings shared at this year’s International AIDS Conference on Kenya’s Cash Transfer for Orphans and Vulnerable Children Program showed a decrease in HIV risk behavior among youth who received cash transfers. Specifically, the results indicate that children receiving payments were 30 percent more likely to delay their sexual debut, and 7.2 percent less likely to have multiple sexual partners over the last year.
While research continues to assess the impacts of conditional versus unconditional cash transfers—those that require beneficiaries to meet certain conditions versus those that do not—in general, cash transfers to the poor represent a seismic shift in the way aid is doled out to those who need it most. Whereas in-kind aid (food, fuel, etc.) meets a specific need and seems to imply that the donor rather than the recipient knows best, cash transfers allow individuals to use the money to meet their family’s multiple needs and accepts that the recipient may in fact know what’s best for his or her family. This is the crux of the argument behind the 2010 book, Just Give Money to the Poor, written by policy experts Joseph Hanlon, Armando Barrientos, and David Hulme.
The Global Assets Project at the New America Foundation released a paper yesterday, Investing in Girls: Opportunities for Innovation in Girl-Centered Cash Transfers, examining the landscape of girl-targeted government-to-person (G2P) cash transfer programs across Latin America, Africa, and Asia. Seventeen programs across six countries—Guatemala, Yemen, Pakistan, Nigeria, India and Bangladesh—are likely just the beginning of this trend.
Improvements in electronic payment (e-payment) platforms, experimentation with encouraging savings and asset building, and innovations like biometric identification promise to not only allow for more efficient payments to girls, but also to enhance the impacts of cash transfer programs on their lives.
E-payments not only reduce leakages and corruption, but they have the potential to provide beneficiaries with a secure place to store their money away from those who could exert control over girls’ limited financial resources. SMS messages to their mobile phones reminding girls of savings goals could help encourage them to develop a savings habit, which would not only ensure that girl beneficiaries have money set aside for a rainy day, but would also provide long-term benefits for their ability to manage money. Finally, biometric IDs (which rely on voice, iris scans, fingerprints and other unique biological traits) are being implemented in India, where early female marriage is common despite laws in place prohibiting girls to marry before age 18. Biometric IDs can help ensure that girls are “counted” and thus have an identity that allows them to access financial institutions for storing and saving cash transfer payments and that cannot be falsified by parents eager to marry off their daughters.
Of course, there are hurdles to overcome. First and foremost, data on many of these programs is very limited. We need researchers to not only conduct impact evaluations on the overall effectiveness of programs, but also on specific components of program design, paying special attention to the payment and delivery mechanisms. Second, developing countries often lack the infrastructure to provide full financial inclusion. This is where mobile network operators (MNOs), branchless banking systems, and other out-of-the-box approaches to financial access can play a role. Financial inclusion in many of these countries will not happen overnight, but incremental avenues through mobile banking, branchless banking, and in-school banking can open the door for many “unbanked” girls in the developing world.
With the launch of the recent Better Than Cash Campaign, which is encouraging governments to transition to electronic payments for beneficiaries of pensions, social protection programs, and other G2P transfers, more governments will likely jump on the e-payment bandwagon. And with increased attention dedicated to the unique needs and power of girls in the developing world, more of these payments could be directed their way. As these two trends merge together, especially in light of the technological innovations underway, new and exciting opportunities for girls in poverty are sure to follow. | <urn:uuid:b8f5b82d-765a-4de7-8393-c347d8330b34> | {
"date": "2015-10-10T03:46:33",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737940789.96/warc/CC-MAIN-20151001221900-00052-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9527016282081604,
"score": 2.984375,
"token_count": 1440,
"url": "http://blogs.cfr.org/development-channel/2012/10/12/emerging-voices-nicole-tosh-on-empowering-girls-through-cash-transfers/"
} |
Figure 2: Framework for Stroke Rehabilitation
The "stage" column in the framework shows that physiological changes resulting from an underlying disease or injury may lead to impairment, which in turn may result in disability or handicap. In the instance of stroke, brain tissue is damaged from a lack of blood flow, which may lead to a limitation in normal functioning ability, e.g., memory loss or limited mobility. These impairments may result in a disability or handicap that constrains the individual's normal social role, e.g., by limiting capacity to work. This literature review does not distinguish between the terms "disability" and "handicap," although some literature does.
The "services" column of the framework shows that services differ according to the stage of the disabling condition. Continuing with the example of stroke, anticoagulant drugs may be administered to break up blood clots. Impairment may be addressed through such services as cognitive skills training for memory loss or use of a walker of physical therapy for limited mobility. In order to help maintain the individual's social role and functioning in the community, programs such as "Meals on Wheels" or technological adaptations in the workplace can address the disability.
The "context for services" column of the framework shows that rehabilitation services are provided in different settings and by different providers, corresponding to the stage of the disabling condition and type of services needed. For example, a stroke victim may initially present to the emergency room and be admitted to the hospital to be administered anticoagulants under supervision of a physician. As such, rehabilitation would differ little from medical intervention. Services to address the impairments of stroke may be delivered in a rehabilitation stroke unit of a hospital or in a residential nursing home, skilled nursing facility, or on an outpatient basis. Services to address the individual's social role are provided on an outpatient basis, and might include for example environmental modifications and transportation services.
It is notable that throughout health care, the context for service delivery has shifted; inpatient hospital stays are shorter as patients are managed in less intensive settings, moving from inpatient care to rehabilitative hospitals, skilled nursing facilities, or outpatient care. The growth of managed care and prospective capitated payment for inpatient health care has provided incentives to shift care from inpatient to outpatient settings, contributing to the increase in services provided in skilled nursing facilities, other ambulatory settings, and the home. | <urn:uuid:cda5249a-d10f-4066-a3e6-3732a68fd6d5> | {
"date": "2016-07-24T14:51:48",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824109.37/warc/CC-MAIN-20160723071024-00151-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9460989832878113,
"score": 3.109375,
"token_count": 493,
"url": "http://www.ahrq.gov/professionals/clinicians-providers/resources/vision/visfig2.html"
} |
If you've ever wondered how the U.S. population could increase by almost 60 percent — to more than 300 million people — between the 1965 and 2010 national censuses, look no further than the Hart-Cellar Act, which ended a century-old policy of discriminating against non-northern European immigrants.
About half of the U.S. population growth over the last 45 years can be attributed to immigrants and their descendants, a demographic flood that has forever changed the nation. Today, one in five Americans is either first- or second-generation U.S. residents, according to the Census Bureau.
During roughly the same period, the population of Japan increased about 30 percent, to almost 128 million. Only about 2.1 million were immigrants, according to Japan's National Institute of Population and Social Security Research.
Japan also happens to be the oldest nation in the worldand has one of the lowest fertility rates, according to the CIA Fact Book. After years of marginal growth, according to national census data, the population is now actually shrinking, experts say.
As striking as that is, Japan is not alone. Italy, Monaco, Greece and Germany have similar demographic profiles, according to a variety of statistics, and South Korea is likely to resemble Japan in a generation if dramatic changes are not undertaken.
The difference between these countries and the U.S.? Immigration policies.
"Countries that have traditionally been destinations for large immigration tend to have younger populations," said Jacob Kirkegaard, a senior fellow at the Peterson Institute for International Economics. "There is another link, which is probably more important for the preparation of the aging, and that's if you have a relatively liberal immigration policy you tend to have relatively higher fertility rates. Also, having a fairly liberal economy, open labor markets, easy access and an economy that is relatively flexible is often reflected in immigration policy."
This human dynamic may seem merely like demography's ultimate case study, but it also has enormous implications for the economic health of nations and the quality of life of their citizens.
"An aging population means a decline in the labor force," Kirkegaard added, reflecting a widely held opinion among experts. "It lowers potential [economic] growth rates. Where it becomes very problematic is the impact it has on social spending."
Countries from North America to Europe to Asia-Pacific are grappling with this demographic time bomb, which threatens the sustainability of national pensionand health-care systems, and is prompting fundamental changes to retirement law and labor markets. For some developed nations, the problem will get much worse before it gets even a little better.
For instance, according to the U.S. Census Bureau, the European Union will experience a 14 percent decrease in its workforce and a 7 percent increase in its consumer populations by 2030.
A European Commission study shows that countries are not only raising the retirement age, but are also introducing a contingency clause that changes the size of the pension benefit based on expected demographic changes such at the time of retirement.
At the same time, countries such as Italy and Germany have liberalized immigration policy on top of the changes that came with the launch of the European Union's single currency a dozen years ago, which opened borders to workers across a wide swath of member states.
Others, such as Japan and South Korea, however, have barely budged. (Read more: China's Aging Problem)
"Immigrants come in at the prime of their youth," said Madeleine Sumption, a senior policy analyst at the Migration Policy Institute, MPI, who specializes in labor markets "These people have a whole working life ahead of them. They earn an income and pay taxes, which helps the shortfall in public finances."
Statistics from the Organization for Economic Cooperation and Development illustrate the disparity among its member countries.
Over the 2000-2010 period, the percentage of immigrant workers, known as foreign worker inflows, in Japan and South Korea was relatively flat at 0.3 percent and 2.2 percent, respectively. (Read more:
In contrast, inflows to Italy, Spain and the U.K. rose between 200 percent and 400 percent.
Italy recently overtook the U.S. in the pace of net migration, ranking among the top 25 in the world, according to the CIA Fact Book. Japan and South Korea ranked in the low 90s with no statistical growth in net migration.
"The European countries realize they need more workers," said Nicholas Eberstadt, a political economist and demographer at the American Enterprise Institute, AEI. "Immigration augments the labor pool and changes the ratio between workers and retirees."
These structural changes, which experts said are often unpopular, combined with immigration, can make a demographic difference. Such policies, however, must remain in place for long periods of time because second-generation immigrants usually adapt to local custom, which means smaller family sizes. Thus, new waves of immigrants are needed. The U.S., Australia and Canada are good examples of this dynamic.
Kirkegaard of the Peterson Institute added that most countries still need a "more strategic immigration policy," such as one that brings in scientists and engineers, and also keeps track of "changing trends in the labor markets."
Again, the U.S. is a good example. Census data shows that of those with at least a bachelor's degree, 46 percent of foreign born residents had a degree in science and engineering, compared to 33 percent for native born.
Canada and Australia, said experts, have taken the lead in immigration policy, adopting a point system (for such criteria as age, education, language) that helps determine eligibility; Australia is now giving special consideration to those who have already secured a job offer, said Sumption of the MRI. Employers are being encouraged to get more involved in the overall immigration process.
"You can change the composition and size of the labor force, but it will take a generation," said Eberstadt of the AEI.
Constructing and executing a successful immigration policy isn't easy though, said experts.
"Immigration is politically difficult," said MRI's Sumption. "A lot of people talk about it as a no-brainer [as if] those who don't do it are fools. [But] It can take a while to get used to the cultural problems it brings. There's a greater risk of a backlash if you ramp up immigration too quickly."
The opening of the European Union more than a decade ago brought a wave of low-skilled workers to the more developed members, which was disruptive for some of them. Spain had a huge influx of foreign construction workers during its recent real estate boom.
Sumption pointed to the case of the U.K., where the immigrant population went from 7 percent to 12 percent between 1997 and 2010.
"It caused anxiety because the government didn't seem in control," she said. As a result, immigration policy became an election issue.
Eberstadt said immigration can be "tricky" — and it is hard to explain why it works in some cases and not in others.
For instance, he cited the U.K., where Indian immigrants have integrated much better than Pakistanis; the Netherlands, where the Indonesian immigrant population has been absorbed very well; and, more broadly, northern Europe, where immigration has not worked well with Moroccans.
At the other extreme, however, are the countries where immigration is rare and the resident population seemingly allergic to immigrants.
"To understand South Korea," said Kirkegaard of the Peterson Institute, "you need to know that the single biggest [recent] migrant group was rural brides from Vietnam and the Philippines." | <urn:uuid:8d19ece1-1022-4069-b24e-dd63bff5576e> | {
"date": "2015-07-30T05:40:53",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987127.36/warc/CC-MAIN-20150728002307-00167-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9689700603485107,
"score": 2.84375,
"token_count": 1567,
"url": "http://www.cnbc.com/id/49571697/page/2/"
} |
Internal Radioactive Source Calibration of the Borexino Solar Neutrino Experiment
Back, Henning Olling
MetadataShow full item record
A measurement of solar neutrinos below 1 MeV of energy will further our knowledge of the neutrino's mass and mixing properties and will provide a probe to possible physics beyond the standard model of particle physics, as well as advance our understanding of energy production in the Sun. Borexino is a liquid scintillator detector that will measure the neutrino energy spectrum to the lowest energy threshold to date. It has been designed to measure the flux of the mono-energetic neutrinos produced by electron capture on 7Be in the Sun's core, which will produce a Compton-like edge in the energy spectrum. Because of the low count rate, Borexino requires extremely low backgrounds, and a good understanding of the backgrounds that do exist. Although the purification techniques used for the scintillator lowered the radioactive contaminates to levels never before achieved, cuts must still be made to the data. At Virginia Tech, we have developed an internal source calibration program that will be able to give us a thorough understanding of both the pulse shape discrimination efficiency and the energy and time response of Borexino. Energy calibration for alphas, betas, and gammas (energy scales) can be accomplished with such sources. When the calibration source is used in conjunction with an accurate source location system any spatial dependencies can be found. The system will use different types of sources at various energies to give the required information to make the cuts needed to extract believable physics from the detector.
- Doctoral Dissertations | <urn:uuid:afefaf9b-82d0-4f90-ae61-db389a1d95c5> | {
"date": "2016-02-09T17:59:55",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701157443.43/warc/CC-MAIN-20160205193917-00096-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8727691769599915,
"score": 3.296875,
"token_count": 338,
"url": "http://vtechworks.lib.vt.edu/handle/10919/11255"
} |
Consuming a Mediterranean diet -- rich in fruits, vegetables, grains, potatoes, olive oil, seeds, fish, low saturated fat, dairy products and red meat -- may boost bones and muscle mass in postmenopausal women, a study suggests.
Researchers found that menopause -- characterised by a decline in estrogen levels -- speeds a woman's loss of bone mass and increases her risk of developing the bone-thinning disease known as osteoporosis, and increases the risk of fractures.
"We found that the Mediterranean diet could be a useful non-medical strategy for the prevention of osteoporosis and fractures in postmenopausal women," said Thais Rasia Silva, a postdoctoral student at Universidade Federal do Rio Grande do Sul in Brazil.
"Postmenopausal women, especially those with low bone mass, should ask their doctor whether they might benefit from consuming this dietary pattern," Silva added.
The study, presented at the Endocrine Society's 100th Annual Meeting in Chicago, also linked the Mediterranean diet with a lower risk of heart disease, diabetes, cancer, and mortality risk due to certain other chronic diseases.
The team included 103 healthy women with an average age of 55 and who had gone through menopause 5.5 years earlier, on an average.
All women underwent bone scans to measure their bone mineral density, total body fat and appendicular lean mass, which was used to estimate skeletal muscle mass. They also completed a food questionnaire about what they ate in the past month.
Results showed that a higher consumption of Mediterranean diet was associated with an increased bone mineral density measured at the lumbar spine and with greater muscle mass.
The previous studies have found that the Mediterranean diet may also boost conception chances of women undergoing in-vitro fertilisation (IVF).
(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.) | <urn:uuid:fdc9e835-3124-4dde-913b-26d9efe200b2> | {
"date": "2019-02-19T03:09:43",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489304.34/warc/CC-MAIN-20190219020906-20190219042906-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9478722214698792,
"score": 2.765625,
"token_count": 392,
"url": "https://wap.business-standard.com/article-amp/news-ians/mediterranean-diet-may-boost-bone-density-in-elderly-women-118031900901_1.html"
} |
The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules.
FIPS 140-2 defines four levels of security, simply named “Level 1” to “Level 4”. It does not specify in detail what level of security is required by any particular application.
FIPS 140-2 Level 1 the lowest, imposes very limited requirements; loosely, all components must be “production-grade” and various egregious kinds of insecurity must be absent.
FIPS 140-2 Level 2 adds requirements for physical tamper-evidence and role-based authentication.
FIPS 140-2 Level 3 adds requirements for physical tamper-resistance (making it difficult for attackers to gain access to sensitive information contained in the module) and identity-based authentication, and for a physical or logical separation between the interfaces by which “critical security parameters” enter and leave the module, and its other interfaces.
FIPS 140-2 Level 4 makes the physical security requirements more stringent, and requires robustness against environmental attacks. | <urn:uuid:a4d7c573-4f7f-44bf-99ae-6fde5026a560> | {
"date": "2019-08-17T11:23:44",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027312128.3/warc/CC-MAIN-20190817102624-20190817124624-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8539912104606628,
"score": 2.53125,
"token_count": 239,
"url": "https://protectdata.asia/data-security-regulations/"
} |
- Date submitted: 1 Nov 2011
- Stakeholder type: Major Group
- Name: 350.org
- Submission Document: Download
Full Submission350.org in partnership with the Center for Biological Diversity UNCSD RIO+20: 350.org Inputs for the Draft Zero process Introduction To ensure a successful Rio+20 Summit,governments and all sectors of society must come together to restore confidence within the international community with ambitious action to address implementation gaps and take further action on the core principles and goals set forth in the Rio Declaration, Agenda 21, and Rio Conventions. From the perspective of the 350 movement--a civil society movement of young people, artists, civil society organizations, faith communities, and citizens of all kinds in nearly every country of the planetHHone of the most important aspects defining the success or failure of the summit will be whether it advances international commitment and ambitious action to fight climate change. The number 350 is the bottom line to define ambitious action to stop the climate crisis. 350 parts per million ppm) of CO2 is what many scientists, climate experts, and over 112 national governments say is the safe upper limit for CO2 in our atmosphere. Accelerating Arctic warming and other early impacts related to climate change have led scientists to conclude that we are already above the safe zone at our current 392 ppm, and that unless we are able to rapidly return to below 350 ppm this century, we risk reaching tipping points and irreversible impacts such as the melting of the Greenland ice sheet, savanization of the Amazon and major methane releases from increased permafrost melt. In order to ensure the possibility of a sustainable, equitable future for all, the outcomes of the Rio Summit must include concrete action to mitigate climate change that ensures a stable climate at 350 ppm. Concrete proposals for action from Rio to achieve this include: Moving to 100% Renewables Countries should use the UNCSD2012 to take clear action on moving economies towards 100% renewable energy. This is fundamental to the concept of green economy. It will not be sustainable for economies to continue on their current path burning through nonH renewable resources such as fossil fuels and nuclear energy. Countries must agree upon a vision that ensures clean and renewable energy sources and energy efficiency, developed with involvement and prior consent of local communities. This vision will need to be coupled with initial concrete actions to trigger incentives for this type of shift within economies and to promote growth of innovation and advancement in the renewable technology sector. Specifically countries should use Rio+20 to: ? Make a clear commitment to clean energy, based on the principle of common but differentiated responsibilities, that includes: o 30% of energy use from renewable sources globally by 2020 o 40% overall improvement in energy efficiency globally by 2020, and o Universal access to modern energy services and ending energy poverty: clean, reliable and affordable energy services for cooking and heating, lighting, communications and productive uses. Eliminating fossil fuel subsidies ? Eliminate fossil fuel subsidies and perverse incentives by 2020, including aid, loans or other subsidies that encourage further development of fossil fuels. This should be in line with the phase out of subsidies agreed upon in the G20 commitment, and revenues should be redirected to support renewable energy and energy efficiency programs, as well as technology innovation in the renewable sector. ? We should also end subsidies to false energy solutions such as ?clean coal,? nuclear, and large hydro or any projects where environmental and social impacts outweigh their perceived climate benefits. Defining a green and just economy Green economy is a new concept to be discussed at the Rio+20 summit, and therefore requires definition. In developing a vision for a just, green economy and taking the first steps globally on the concept, countries should commit to action on the following points: ? Equity must be at the heart of the green economy, ensuring the right and access through funding and technological support to clean, sustainable development for developing countries and frontline communities in the Global South and North. We must remember that one size does not fit all and that there are common but differentiated responsibilities on the path to a global sustainable future. ? Providing access to green job opportunities through policies such as setting targets and resources for capacity building, investment in green technologies, and job training for low income individuals. ? The green economy framework must break down barriers to current Intellectual Property Rights issues that impede sharing important renewable and sustainable development technologies, including technologies for adaptation. This could be achieved through varied incentives, such as creating new innovation hubs and ensuring new technologies remain in the global commons to speed the deployment of clean renewable energy around the world. ? A green economy vision should support cities as innovation hubs for best practices in sustainable policy development and implementation. Cities have become leaders of sustainable development design and implementation. Where countries have floundered cities have provided leadership. Countries should explore increased partnerships with city governments and also share best practices at the international level as well. ? Address change in productionHconsumption patterns as the current patterns lead to unsustainable use of natural resources and increasing greenhouse gases emissions. ? Establish an international financial transaction tax (FTT). According to The Tobin Tax ? A Review of the Evidence, this could raise as much as 400 billion annually. These funds would be essential to making a real impact on combating climate change and eliminating poverty. Supporting and empowering civil society to be a partner in implementing sustainable policies As youth and civil society declared in Copenhagen, ?you can?t make decisions about us, without us?. 350.org works with civil society organizations and in almost every country on earth to build a powerful movement to fight climate change, and through that work we see the powerful local knowledge and organizing capacity that citizens everywhere are utilizing to achieve a sustainable society. Agenda 21 paved the way for substantial and positive changes in the government and nonHstate actor relationship, and has allowed many diverse sectors to begin to work together to ensure a sustainable future. In order for Rio+20 to be a success, civil society involvement must be prioritized, and countries should undertake the following: ? Continue to provide more capacity building opportunities across sectors of civil society and communities in order to empower citizens to have an active part in the implementation process. Where possible, governments should forge specific partnerships with civil society and communities to help implement sound sustainable policies. ? Make public funds available to NGOs that have the ability to help ensure implementation and compliance monitoring where needed. ? Ensure that cooperation mechanisms and government-public partnerships center around best practices and sustainable development in the local context rather than putting a market approach first. | <urn:uuid:f125861b-f0fb-48f0-9ef4-b4b76d91d560> | {
"date": "2014-09-02T09:48:22",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921872.11/warc/CC-MAIN-20140909030952-00040-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9206271767616272,
"score": 3.0625,
"token_count": 1308,
"url": "http://www.uncsd2012.org/index.php?page=view&nr=626&type=510&menu=20&template=529&str=Agenda%2021"
} |
Sir George William Ross
Ross, Sir George William, 1841–1914, Canadian political leader, b. Ontario. He sat (1872–83) in the House of Commons and then entered the Ontario government as minister of education. He was Liberal prime minister of Ontario from 1899 to 1905. In 1907 he was appointed to the Canadian Senate and in 1910, the year he was knighted, became Liberal leader in the Senate. He was a notable public speaker, and many of his addresses have been published.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
See more Encyclopedia articles on: Canadian History: Biographies | <urn:uuid:ac68241b-6b23-4547-b29e-8f691163afd9> | {
"date": "2015-03-29T22:41:36",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298755.8/warc/CC-MAIN-20150323172138-00198-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9712800979614258,
"score": 3.015625,
"token_count": 138,
"url": "http://www.factmonster.com/encyclopedia/people/ross-sir-george-william.html"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.