text
stringlengths
198
630k
id
stringlengths
47
47
metadata
dict
Astronomers crack mystery of 'transformer' star By Catholic Online (NEWS CONSORTIUM) 7/25/2014 (2 years ago) Catholic Online (www.catholic.org) Astronomers have discovered a star that seems to vary and vanish in a surprising fashion. They mystery may now have been solved. The mysterious star switches between two states of energy output, baffling scientists -- until now. LOS ANGELES, CA (Catholic Online) - Scientists observing a pulsar have been surprised to notice the star disappear and reappear in their observations. Stars do not appear or disappear suddenly, so they were intrigued by the discovery and examined the pulsar more closely. A pulsar is actually the core of a dead star, called a neutron star, which spins very rapidly, emitting radio waves in beams as it spins. This particular pulsar spins about 43,000 times per minute. It also has a small companion star that is about 20 percent the size of the Sun. The pulsar and small star orbit one another and this is key to understanding why the pulsar appears and disappears. Scientists now think the pulsar is drawing gas from its companion which builds up and heats up, then essentially explodes in a burst of energy. This causes the waves emitted by the star to change from radio waves to X-rays. Since the star is studied in radio waves, every time it bursts, it disappears from the radio-sensitive instrument used to observe it. This creates the illusion, on paper, that the star is disappearing. Meanwhile, while it is invisible to radio waves, it lights up in X-rays. This periodic transformation between these two states of energy output have not been studied before so that makes this binary system both new and rare. Scientists don't know when the next switch will occur, so they will continue watching it in the hopes they can observe it switching back and forth again. Astronomers hope to learn more about how pulsars form and how they interact when they orbit larger companion stars. The study announcing the discovery was published in The Astrophysical Journal. Copyright 2017 - Distributed by THE CALIFORNIA NETWORK Pope Francis Prayer Intentions for FEBRUARY 2017 Comfort for the Afflicted. That all those who are afflicted, especially the poor, refugees, and marginalized, may find welcome and comfort in our communities. A Nevada state senator has proposed a bill that would protect citizens from being implanted with RFID chips. The bill, proposed by a ... continue reading FOUR CLOSE CALLS in four weeks: Scientists wonder what's going on as four asteroids pass dangerously close to Earth Watch Whoa, that's close! As the world worries about an asteroid due to pass Earth on February 25, a much closer shave is happening right now. ... continue reading Astronomers think they have discovered a galaxy that is 99.9 percent dark matter. If true, the discovery is unprecedented. LOS ANGELES, CA ... continue reading The world is closer to nuclear war than it has been in decades, and few people are paying attention. The Bulletin of Atomic Scientists have ... continue reading Scientists has injected a human-pig hybrid into a pig. The experiment is being conducted in California in the hope of growing human organs ... continue reading by Catholic Online - What is the Pope doing in California? - Pope Francis shares words of wisdom - Catholics Should Read, Pray, Live and Love the Bible as the Word of God - Massive storm threatens to flood more than just the Oroville Dam HD Video - Daily Reading for Wednesday, February 22nd, 2017 HD Video - St. Wulfric: Saint of the Day for Monday, February 20, 2017 - Daily Readings for Monday, February 20, 2017 - Daily Reading for Tuesday, February 21st, 2017 HD - Daily Reading for Monday, February 20th, 2017 HD - Daily Reading for Sunday, February 19th, 2017 HD - Daily Reading for Saturday, February 18th, 2017 HD Copyright 2017 Catholic Online. All materials contained on this site, whether written, audible or visual are the exclusive property of Catholic Online and are protected under U.S. and International copyright laws, © Copyright 2017 Catholic Online. Any unauthorized use, without prior written consent of Catholic Online is strictly forbidden and prohibited.
<urn:uuid:7a79f79e-de18-4ebc-bef6-03ab1ebff895>
{ "date": "2017-02-20T02:10:04", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00144-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9450826644897461, "score": 2.703125, "token_count": 896, "url": "http://www.catholic.org/news/technology/story.php?id=56305" }
Paicu Luheacana is a member of the Tsou tribe, one of 14 officially-recognised indigenous tribes in Taiwan. They lived on the island for thousands of years before the majority Han Chinese arrived, but now make up only two percent of the population. Because of previous harsh government policies and pressures to modernise, much of their culture has been lost. Miss Luheacana is trying to change that. She came back from the cities where she worked a few years ago and convinced her father to let her manage her family’s ancestral land on Alishan Mountain, where she grows organic tea. Unlike many Han Chinese who lease indigenous people’s land, she doesn’t use pesticides. Miss Luheacana says indigenous people feel that their land is their mother and because they love their land, they should not hurt it. The land is very much tied to their culture. With many young indigenous people moving to the cities to make a living, the language and culture have not been passed on. Many young indigenous people cannot speak their tribal language or understand the culture. But now an increasing number of them, like Miss Luheacana, are returning to start businesses. The more young people come back, the more hope there is the Tsou tribe’s culture will be passed on, she says. Their goal now is to stop overdevelopment on Alishan.
<urn:uuid:48a95458-326c-43fd-8aa5-7648c5e9f49f>
{ "date": "2018-12-16T21:43:03", "dump": "CC-MAIN-2018-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827998.66/warc/CC-MAIN-20181216213120-20181216235120-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9727581739425659, "score": 3.25, "token_count": 293, "url": "https://duneblog.wordpress.com/2011/10/03/an-indigenous-taiwanese-woman-working-to-save-her-culture/" }
620 delegates participated. It was the first feminist congress in Mexico and the second in Latin America. The congress made important contributions to the Civil Code and influenced the Law of Family Relations enacted by Venustiano Carranza on April 9, 1917: 1. The concept of legal equality between women and men and the emancipation of women at 21 years of age. 2. Allowing for ‘absolute’ divorce. 3. Opening the possibility for women to work in public administration and in education, therefore promoting higher education. The topics discussed at the congress focused on four issues: 1. The best ways to free women from the yoke of tradition 2. The role of primary schools in preparing women for life 3. The skills and occupations the State should support to prepare Mexican women for “an intense life of progress.” 4. The public posts that women could and should occupy to be leaders of society. Most of those at the conference were teachers, because teaching was the only legitimate area of study to which women had access and, therefore, was almost the only paid work permitted by society. At that time, positivist, socialist and revolutionary ideals coexisted with nineteenth-century conservative concepts. However, the exchange of views and visions, often conflicting, planted some avant-garde ideas amongst the women who attended the congress, which had been planned since 1915 and "To create free and strong generations, women must attain a legal status that elevates them." Referring to the congress, Jesús Silva Herzog said "the conclusions reached by the Yucatecan women show the leftist progressive spirit that prevailed in revolutionary society there. Yucatan was unquestionably the most advanced Mexican state in social matters." The first three women elected as local deputies in Mexico were elected in Yucatan: Elvia Carrillo Puerto, Beatriz Peniche Barrera and Raquel Dzib Cícero. Cortina G. Quijano, Aurora.- "The Feminist Congresses of Yucatan in 1916 and their influence on local and federal legislation." "Feminism in Mexico: Background," FEM magazine, Volume VIII, No.20, October-November 1983. "100th anniversary of the first Feminist Congress:To legislate and judge with a gender perspective must now be a priority," Carla A. Humphrey Jordan
<urn:uuid:3b43efdd-a3ea-428d-9055-cc7f220cc7f4>
{ "date": "2017-03-25T22:00:59", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189083.86/warc/CC-MAIN-20170322212949-00116-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9458589553833008, "score": 3.40625, "token_count": 524, "url": "http://www.gob.mx/sre/articulos/100th-anniversary-of-the-first-feminist-congress-of-mexico" }
A synthesizer allowing control of pitch, shape, frequency/amplitude modulation and low-pass filter by hand-drawing of waveforms. The screen has three areas; waveform drawing area, control selection, utility functions. In the waveform drawing area you can drag your finger to change or draw a new shape that affects the sounds playing. Control selection has eight options that control the sound - Red: Primary waveform. Orange: Primary frequency (i.e. the main melody). Yellow: Secondary waveform (used as amplitude or frequency modulation of the first waveform, or as a second oscillator). Green: Secondary frequency. Cyan: Envelope (i.e. the volume shape for the playing sound). Blue: Envelope frequency. Purple: Mixer control, between the playing sound and any running loop. Magenta: Low-pass filter cutoff frequency. Utility functions are eight options that control how the waveform is edited and looping - Draw: When this option is selected the waveform changes instantly as you draw it. Slide: When this option is selected the waveform will slide from its current value to what you draw. Line: When this option is selected the waveform will change a horizontal line at the point selected. On the Primary waveform (Red) this option is not allowed. Sine: When this is pressed the waveform will become more like a sine wave. Overtone: When this is pressed a 2nd harmonic will be added. Soften: When this is pressed any rough edges on the current waveform will be softened Record: Pressing this will start a loop being recorded. If Record is pressed again after starting to record an echo of the time between presses will be created. Play: If Record has been pressed then pressing Play after it will create a loop of what was playing between the presses. If a loop is already playing, pressing Play again will stop it.
<urn:uuid:f5b287f8-6a45-4e7d-b1dd-3e0edbebf7c0>
{ "date": "2019-04-21T20:05:26", "dump": "CC-MAIN-2019-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532882.36/warc/CC-MAIN-20190421195929-20190421221929-00096.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9091744422912598, "score": 2.546875, "token_count": 416, "url": "http://evolver.fm/appdb/app/wravend/" }
Video conferencing has many benefits, not the least of which is economical. As travel costs rise and travel budgets tighten, many in business have moved toward online, real-time communication tools. According to The Business of Federal Technology, it appears that the U.S. government may be following suit. This July, the U.S. House of Representatives introduced legislation that would potentially cut $15 billion in travel expenses incurred annually by federal agencies through the increased use of videoconferencing. The bill, titled "Cut the Waste, Stay in Place Act of 2013," and introduced by Rep. Michael Fitzpatrick, (R-Pa.), would call on the director of the Office of Management and Budget to develop a plan to reduce the federal government’s travel expenditures by as much as 50 percent by 2017. Specifically, the bill calls on the use of video conferencing to achieve a significant budget cut. Writers of the bill claim the following three benefits to adopting this new measure: - Video conferencing has been under-utilized thus far, and therefore its full potential has not been completely realized. - The move from hardware-based software to browser-based software makes video conferencing technology less expensive and more accessible to more parties. - Video conferencing enhances communication, improves problem-solving, reduces carbon footprints, facilitates better collaboration, and shortens project time periods, among many other benefits. This new bill builds on previous orders issued via the Telework Enhancement Act of 2010, which already calls for agencies to reduce travel expenditures by 30 percent compared to 2010 levels. Under the umbrella of previous initiatives, many agencies have already made motions toward collaborative technology. NASA is one such agency. It saved $21 million in fiscal 2012 by replacing travel with video conferencing when it was possible. The Naval Safety & Environmental Training Center has successfully used video conferencing for better training programs--providing video-based education to over 10,000 government civilians and Navy personnel all over the world. The Center also adapted its mission-critical U.S. Navy Safety Professional Development, replacing its San Diego conference with a video broadcast. This adaptation reduced a potential $1.5 million travel tab to less than $100,000. The budget saving advantages of video conferencing are undeniable, and the U.S. government agrees. Real-time communication benefits are realized while maintaining a responsible hold on expenditures.
<urn:uuid:4f4dab03-9703-4f09-9fc1-1262920d612b>
{ "date": "2014-07-23T20:06:39", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883466.67/warc/CC-MAIN-20140722025803-00152-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9566954970359802, "score": 2.609375, "token_count": 495, "url": "http://www.batipi.com/blog/2013/8/1/us-government-seeks-to-save-15-billion-with-video-conferencing" }
Preventive actions against mould in attics - Keep the space dry! The drier the climate, the less risk there is of mould or dry-rot. - It is best not to install an exhaust fan in the loft, as this can create negative pressure and draw up damp internal air from the living area to the attic. - If you decide to install a dehumidifier, you must make sure that you seal the loft, so that no outdoor air leaks in. - The dehumidifier should also be fitted with a humidistat. The humidistat starts the dehumidifier when the humidity gets too high, and turns it off when the humidity has dropped to an acceptable level. This saves energy.
<urn:uuid:0d472858-9102-47bc-aa84-d8a4eaec9e95>
{ "date": "2019-01-20T03:33:23", "dump": "CC-MAIN-2019-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583690495.59/warc/CC-MAIN-20190120021730-20190120043730-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.877346932888031, "score": 2.703125, "token_count": 152, "url": "http://www.dehumidify.me/attics/preventive-action/" }
ARTICLES (THE) & WORD SORTING - Grade 1 Common Core Aligned 40 Pgs! JUST PRINT-N-GO! * This packet only focuses on the DEFINITE article, "THE". Get the INDEFINITE articles worksheets, "A & AN" here - ARTICLES (A & AN) & WORD SORTING - Grade One, 24 Pgs! Common Core aligned to : Sort words into categories (e.g., colors, clothing) to gain a sense of the concepts the categories represent. Use determiners (e.g., articles, demonstratives). 15 anchor posters 6 sorting worksheets 5 "THE" worksheets 2 pages (Superlative Olympics), "Who has the longest hair?" 4 A, An or The worksheets Spin & Write! And so much more! Please see the animated GIF to know what you'll be purchasing. Thank you for stopping by. Feel free to become a follower to get the latest freebies and newest upload updates. Rock, Paper, Scissors!
<urn:uuid:81e35dd4-88c0-4ef6-9d25-14a5558c0870>
{ "date": "2017-06-27T19:00:51", "dump": "CC-MAIN-2017-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00377.warc.gz", "int_score": 4, "language": "en", "language_score": 0.738507866859436, "score": 4.0625, "token_count": 237, "url": "https://www.teacherspayteachers.com/Product/Articles-1593084" }
Helping Patients Learn Healthy Habits Building for lasting behavior change with a patient-centric, research-driven approach to health innovation What if we told you we could improve health outcomes for more than 50% of patients and save the US healthcare system up to $289bn a year? That’s the average cost of nonadherence to prescribed medications, or in layman’s terms, not taking your meds. Fixing this epidemic could not only save billions of dollars but, with around 125,000 deaths a year in the US due to failure to follow doctor’s orders, it could save thousands of lives too. Better lifestyle decisions can solve many of our personal health problems; eating healthily, regular exercise, taking your pills, are all positive behaviors that contribute to better health, and disease resistance. Many health companies are looking to technology to help us build these habits; for example, ‘smart’ pillboxes that uses reminders, alerts and progress tracking. Unfortunately, positive behavior change takes more than an electronic prod. Recent research showed no noticeable improvement in nonadherence when using a wireless pillbox. For Daniel Weng, founder of Tricella, the maker of a smart pillbox, technology alone can’t fix our biggest health problems. “A smart pillbox isn’t enough. Too many companies forget that it’s humans, not technology, that leads to better outcomes. While technology empowers people to make better decisions, it’s not the solution unto itself,” he says. Consequently, Tricella pillboxes go beyond basic reminder technology to inject the element of social support. Weng designed his pillbox to connect patients and caregivers; an accompanying app with simple call-to-action response buttons reduces the friction of responding to non-adherence and driving the engagement of caregivers to patients. In short, health technology must help patients build sustainable healthy habits – if it doesn’t, it fails. Changing patient behavior is increasingly at the heart of healthcare, but no one finds change easy. Many of us make new year’s resolutions but 80% have failed by the second week of February. This failure isn’t our fault, says Sean Young PhD, Director of the UCLA Center for Behavior Change, because we set ourselves up to fail by trying to change too much too quickly. When change proves too hard, we lose motivation and revert back to bad habits. In his bestselling book, Stick With It: A Scientifically Proven Process for Changing Your Life For Good, Young suggests a better strategy – taking tiny steps towards greater change. He also underlines the need for community and for change that holds the patient’s interest. His goal? To make change easy. When designing health technology, the Fogg Behavior Model provides a blueprint for effective behavior change. It facilitates behavior change by optimizing three key elements of the patient’s journey; ability, motivation, and triggers. Don’t assume your users already have the education, resources or time to achieve the target behavior. Often this isn’t the case. When mapping out motivational experiences, consider both technology-based ability and the patient’s knowledge of the health problem. A frictionless design flow is critical. A patient-centric approach ensures design never prevents a user performing a desired action or adopting the target behavior. Map out the user journey from first access to adopting the new habit. This makes sure every direction has a clear and easy-to-follow path to completion. Education is vital in health technology; for users to adopt a new behavior, they must understand their illness and the benefits of change. Key to successful health technology is understanding your users’ needs, emotions and challenges at every stage in their patient journey, then delivering the right educational content at the right moment. 7 Cups of Tea, an on-demand emotional health service, takes a thoughtful approach to providing educational content. The step-by-step My Growth Path drip-feeds advice for a happier life, helping users to quickly engage with the platform. Content series, such as Mind Over Mood, and ‘single paths’, such as Anxiety: Overcoming Worry, allow users to delve into topics of interest. Ongoing user research should inform both the design of a health technology and a content strategy. When designing and building the Together in Heart Failure platform, a Novartis-funded online community for those impacted by heart failure, multiple research sessions revealed patients’ pain points and needs. These included: • Patients want to access support throughout the day • They struggle to consume complex information supplied by healthcare professionals • They crave a safe space where they could share and connect with others. Together in Heart Failure – an always-accessible, mobile-first platform – addressed these challenges and allows patients to receive digestible educational content at their moments of need. A user-tested approach to design created a welcoming aesthetic and high engagement rate. An effective health technology should motivate patients to take the next step towards better health. Again, user research should inform your approach; identify the support and inspiration your patients need, and when they need it, to ensure their motivation remains high throughout the journey. With Together in Heart Failure, audience research revealed that users felt most motivated when content was tailored to their position in the patient journey. Building on this insight, the platform allows users to personalize the content they see by following specific topics and contributors. This means that recently diagnosed patients can choose to see motivational messages that help them come to terms with their diagnosis, while patients at a more-progressed stage can consume content that inspires them to improve diet and exercise. Another example of leveraging patient motivation is Pfizer’s Hemocraft, an online platform that uses gamification to help young people with hemophilia better manage their disease. Players embark on a virtual adventure where they learn to self-treat their condition. This innovative approach to health technology seeks to truly build for the target audience – making the process a game, rather than a chore. If we’re to create health innovation that empowers patients to adopt healthy habits, we need to take a research-driven, patient-centric approach to technology design. When we build for lasting behavior change rather than short-term results, health technology truly has the power to help save lives. Steve Peretz is Director of Health Innovation and Meg Donchak is Product Manager at Beyond, a global design and technology ideas company. Since you're here... ... and value our content, you should sign-up to our newsletter. Sign up here
<urn:uuid:4572eef3-e55e-4717-b349-602cacadc351>
{ "date": "2019-08-18T18:05:54", "dump": "CC-MAIN-2019-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313987.32/warc/CC-MAIN-20190818165510-20190818191510-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9152699708938599, "score": 2.640625, "token_count": 1371, "url": "https://social.eyeforpharma.com/column/helping-patients-learn-healthy-habits" }
May 23, 1914 was a shameful day in Canadian history. May 23, 1914 was the day that the Komagata Maru, a ship carrying 376 people of South Asian decent, sailed from Japan to the shores of British Columbia. Unfortunately, after spending over a month at sea, the 12 Hindus, 24 Muslims and 340 Sikhs, all of whom were eager to start a new life, were denied entry into Canada. NDP MP Jasbir Sandhu's motion today urged the Government of Canada to officially apologize in Parliament to the South Asian community and to the individuals impacted by the 1914 Komagata Maru incident in the House of Commons. For two long months all 376 passengers were forced to stay on board the ship. Not only was it made clear that their presence in our country was unwelcome, Canadian officials also denied passengers very basic necessities such as food and water. For 63 days all of those on board the Komagatu Maru lived in extremely confined spaces fighting hunger and dehydration. They waited patiently clinging to the hope that perhaps they would be granted entrance into Canada, a country which they believed would provide them with opportunity and a new beginning. Unfortunately, after spending over two months on Canadian waters, the Komagata Maru, and almost all of those on board were forced to depart and return to Asia. The Komagata Maru incident occurred during a time in Canadian history where there was a deep-seated prejudice against minorities and immigrants, particularly those who were of South Asian descent. Unfortunately, these prejudices were supported by law for during this time there existed a Continuous Passage Act, which stated that South Asians were only allowed to enter into Canada if they had made a continuous voyage without any stopovers. This particular clause was implemented in an attempt to stop South Asian immigrants from entering Canada for at this time it was not possible for a ship to travel continuously from India to Canada. Although those on board did abide by this law by departing directly from Japan to Canada without stopping over, the fact that they were still denied entry is a reflection of the racist and discriminatory attitudes that were prevalent at this time. On August 3, 2008 Prime Minister Harper apologized to the South Asian community about the Komagata Maru incident. However the fact that this apology was not delivered in the House of Commons is unacceptable. I commend Sandhu for introducing this motion and I applaud his commitment to this extremely important issue. Having worked closely with the South Asian community residing in my province of British Columbia, I am well aware of the hurt and pain that was perpetuated by the Komagata Maru incident. This is why on June 21, 2011 I introduced the very same motion in the Senate of Canada, stating: "Honourable senators, I give notice that, at the next sitting of the Senate, I will move that the Government of Canada officially apologize in Parliament to the South Asian community and to the individuals impacted in the 1914 Komagata Maru incident." Historically, the government has extended official apologies in Parliament to acknowledge injustice and wrongdoing. For example, in June of 2010, Prime Minister Harper delivered an official apology to those Aboriginal people who were victims of the Canadian residential school system. Similarly, in 2006, Prime Minister Harper delivered an official apology to those Chinese-Canadian's who were unfairly taxed when immigrating to Canada. Both of these apologies were extended in a very respectful manner. Both of these apologies recognized the pain, suffering and injustice that was inflicted upon these communities. The 376 passengers on board the Komagata Maru as well as all of those people who were negatively affected by the racist and discriminatory immigration policies that existed at this time also deserve an official apology. The Canada I know is a country that embraces multiculturalism and welcomes people from all walks of life. The Canada I know prides itself on treating people of all races, religions and creeds with fairness, respect and dignity. Although the Komagata Maru incident happened almost a century ago, it represents a very sad time in our country's history. I have heard from over 10,000 of my constituents in British Columbia, who have all expressed to me that they would like to be given the same respect that has been extended to other groups and receive an apology in Parliament. It is my sincere hope that we will continue debating this important issue both in the Senate and in the House of Commons, and urge our Government to do the right thing and deliver an apology to the South Asian community and to all of those affected by the 1914 Komagata Maru incident. Follow Senator Mobina Jaffer on Twitter: www.twitter.com/senjaffer
<urn:uuid:9b74a12d-02df-44ee-b7a8-509fe9e9deb2>
{ "date": "2015-05-22T16:40:50", "dump": "CC-MAIN-2015-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207925696.30/warc/CC-MAIN-20150521113205-00329-ip-10-180-206-219.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9792206883430481, "score": 3.046875, "token_count": 946, "url": "http://www.huffingtonpost.ca/senator-mobina-jaffer/komagata-maru_b_1527910.html?ref=canada-politics" }
Waterloo researchers create ‘world’s largest functioning model of the brain’ November 30, 2012 The purpose is to help scientists understand how the complex activity of the brain gives rise to the complex behavior exhibited by animals, including humans. The model is called Spaun (Semantic Pointer Architecture Unified Network). It consists of 2.5 million simulated neurons. The model captures biological details of each neuron, including which neurotransmitters are used, how voltages are generated in the cell, and how they communicate. Spaun uses this network of neurons to process visual images to control an arm that draws Spaun’s answers to perceptual, cognitive and motor tasks. While the claim appears to be misleading, since IBM Research – Almaden actually recently simulated 530 billion neurons and 100 trillion synapses on a supercomputer, the Waterloo researchers explain that “although impressive scaling has been achieved, no previous large-scale spiking neuron models have demonstrated how such simulations connect to a variety of specific observable behaviors,” the researchers say in a Science paper. “The model can perform a wide variety of behaviorally relevant functions. We show results on eight different tasks that are performed by the same model, without modification. “This is the first model that begins to get at how our brains can perform a wide variety of tasks in a flexible manner — how the brain coordinates the flow of information between different areas to exhibit complex behavior,” said Professor Chris Eliasmith, Director of the Center for Theoretical Neuroscience at Waterloo, Canada Research Chair in Theoretical Neuroscience, and professor in Waterloo’s Department of Philosophy and Department of Systems Design Engineering. Unlike other large brain models, Spaun can perform several tasks. All inputs to the model are 28 by 28 images of handwritten or typed characters. All outputs are the movements of a physically modeled arm that has mass, length, inertia, etc. Researchers can show patterns of digits and letters to the model’s eye, which it then processes, causing it to write its responses to any of eight tasks. And, just like the human brain, it can shift from task to task, recognizing an object one moment and memorizing a list of numbers the next. Because of its biological underpinnings, Spaun can also be used to understand how changes to the brain affect changes to behavior., the researchers suggest. “Spaun provides a distinct opportunity to test learning algorithms in a challenging but biologically plausible setting,” say the researchers in Science. “More generally, Spaun provides an opportunity to test any neural theory that may be affected by being embedded in a complex, dynamical context, reminiscent of a real neural system.” “In related work, we have shown how the loss of neurons with aging leads to decreased performance on cognitive tests,” said Eliasmith. “More generally, we can test our hypotheses about how the brain works, resulting in a better understanding of the effects of drugs or damage to the brain.” In addition, the model provides new insights into the sorts of algorithms that might be useful for improving machine intelligence. For instance, it suggests new methods for controlling the flow of information through a large system attempting to solve challenging cognitive tasks. Professor Eliasmith has written a book on the research: How To Build A Brain will be availabe this winter.
<urn:uuid:186cae9c-214e-439b-b087-812a10c3ba7f>
{ "date": "2016-06-27T09:24:25", "dump": "CC-MAIN-2016-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00188-ip-10-164-35-72.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9134138226509094, "score": 3.125, "token_count": 696, "url": "http://www.kurzweilai.net/waterloo-researchers-create-worlds-largest-functioning-model-of-the-brain/comment-page-1" }
Tilted uterus: Can it lead to infertility? A tilted uterus, also called a tipped uterus, retroverted uterus or retroflexed uterus, is a normal anatomical variation. It shouldn't interfere with your ability to conceive. In most women, the uterus tips forward at the cervix. About 1 in 4 women, however, has a uterus that leans backward, or tilts, at the cervix. In the past, doctors thought that a tilted uterus might have contributed to infertility. But experts now know that the position of the uterus doesn't affect the ability of sperm to reach an egg. Occasionally, a sharply tilted uterus may happen when scar tissues (adhesions) form due to conditions such as endometriosis, infection or prior surgery. Although this may make it more challenging for sperm to reach an egg, conception can still occur. However, in these cases, you may benefit from seeing a fertility specialist. Last updated: December 17th, 2016
<urn:uuid:1a88adb5-fc1e-4970-9b62-a77de3a297a1>
{ "date": "2017-12-18T08:26:25", "dump": "CC-MAIN-2017-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948609934.85/warc/CC-MAIN-20171218063927-20171218085927-00256.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9505196213722229, "score": 2.84375, "token_count": 200, "url": "https://www.drugs.com/mcf/tilted-uterus-can-it-lead-to-infertility" }
Some environmentalists such as former Vice President Al Gore want to tax greenhouse-gas emissions, saying it’s a way to curb the use of fossil fuels such as coal and oil, and boost energy efficiency and cleaner energy sources, such as wind power. The Environmental Defense Fund said it prefers a cap on carbon emissions to a tax. The carbon tax also has had support among economists who have worked for Republican administrations, including Kevin Hassett, who is also at AEI, and Gregory Mankiw, an economist at Harvard University. Exxon, which opposed legislation in 2009 that would have capped carbon emissions and allowed an auction to trade them, said at the time that a carbon tax would be easier to implement and more predictable. “Combined with further advances in energy efficiency and new technologies spurred by market innovation, a well-designed carbon tax could play a significant role in addressing the challenge of rising emissions,” Kimberly Brasington, a spokeswoman for the company, said in an e-mail. “A carbon tax should be made revenue neutral via tax offsets in other areas,” she added. Exxon’s political action committee gave nearly $1.2 million to political candidates in the past two years, 93 percent of it to Republicans, according to the Center for Responsive Politics. Exxon is the biggest U.S. natural-gas producer. A carbon tax could boost demand for natural gas in U.S. power plants, as gas emits half the carbon dioxide as coal when burned to make electricity. Natural gas futures fell 1.5 percent to $3.703 per million British thermal units today. Gas prices fell to a 10- year low in April after mild winter weather crimped demand for heating fuels while production rose to a record. “The source hit hardest is coal,” David Kreutzer, a research fellow in energy economics at the Heritage Foundation in Washington who opposes the tax, said in an interview. “The biggest substitution for coal is going to be natural gas.” Taxing greenhouse-gas emissions would help finance an overhaul of the convoluted corporate tax code and is a better way to address global warming than regulations from the EPA, according to Aparna Mathur, an economist at the American Enterprise Institute who hosted yesterday’s forum. Exxon, the world’s largest energy company by market value, gave AEI $295,000 last year. Exxon played no part in Mathur’s research or the meeting, she said. Some of Mathur’s fellow scholars at the Washington think tank say imposing a new tax is a mistake, and conservatives are getting duped into thinking it would be imposed in place of -- not in addition to -- other taxes and regulations. “Conservatives are utterly naive to believe that they will get trade-offs in response to a carbon tax,” Kenneth Green, a resident scholar at AEI, said in an interview. “We’ve had some robust discussions over the lunch table about our differences.”
<urn:uuid:bd83dac7-db23-4e0d-9d02-d512886edab3>
{ "date": "2014-04-18T05:11:56", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532480.36/warc/CC-MAIN-20140416005212-00387-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.961506724357605, "score": 2.75, "token_count": 629, "url": "http://www.futuresmag.com/2012/11/16/carbon-fee-from-obama-seen-viable-with-exxon-backi?t=educationtetfs&page=2" }
History of Greece : To the Death of Alexander the Great (Cambridge Library Collection - Classics) Üye Girişi yapın, temin süresi ve fiyatını size bildirelim. Üye Girişi yapın, sizi bu ürün stoklarımıza girdiğinde bilgilendirelim. Temin süremiz 28 - 42 iş günü Yayıncı Cambridge University Press ( 03 / 2015 ) ISBN 9781108082204 | 14 x 21,41 x 5,79 cm | İngilizce | 952 Sayfa | Türler Şehir Tarihi / Dünya This book, originally published in 1900, was the major work of the classical historian J. B. Bury. It became a standard textbook on the topic of ancient Greek history to the death of Alexander the Great for almost a century, and in its updated form is still studied today. Bury had studied philosophy as well as classics at Trinity College, Dublin, and had travelled widely in Greece, but until the publication of this work was better known for his two-volume History of the Later Roman Empire (also reissued in this series), and many of his other works also deal with the Byzantine period. He describes in the preface his decision to limit the extent of his history: 'compression into a single volume often produces a more useful book'. This magisterial and very readable synthesis of political and military history encompasses nearly three millennia and the whole of the Mediterranean and Near East.
<urn:uuid:da0bbef3-22d6-4c10-8bf4-69b53401a195>
{ "date": "2017-10-19T07:38:26", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823255.12/warc/CC-MAIN-20171019065335-20171019085335-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.904050886631012, "score": 2.515625, "token_count": 346, "url": "http://www.pandora.com.tr/urun/history-of-greece-to-the-death-of-alexander-the-great-cambridge-library-collection-classics-/496524" }
Submitted to: Experiment Station Bulletins Publication Type: Experiment Station Publication Acceptance Date: 7/1/2007 Publication Date: 7/12/2007 Citation: Pinson, S.R., Fjellstrom, R.G., Tabien, R.E., Mcclung, A.M., Wang, Y. 2007. A new micro-chamber method for selecting sheath blight tolerant rice. Experiment Station Bulletins. http://beaumont.tamu.edu/eLibrary/Newsletter/2007_Highlights_in_Research.pdf. pp.IX-XI. Technical Abstract: Dr. Shannon Pinson’s role as an applied Plant Geneticist is to develop new knowledge and techniques that allow breeders to be more efficient and successful at developing improved rice varieties. While visiting various rice researchers in Bangladesh in 2002, Dr. Pinson gained some knowledge and ideas that have since led to the development of a new method for evaluating rice lines for sheath blight susceptibility. This new method, known formally as the micro-chamber method, but informally referred to at the “Coke bottle method”, offers several advantages over the previously used field-plot evaluations – including requiring less seed, less labor, and less plant-growth time. Furthermore, the new method is conducted under controlled lab conditions, freeing breeders from the previous restriction of a single growing season per year under difficult field conditions. The most widely accepted method for evaluating rice for sheath blight susceptibility is to inoculate densely-planted field plots with Rhizoctonia solani, the fungus that causes sheath blight disease; allow the pathogen to grow over time; then rate the plots for severity of disease symptoms.
<urn:uuid:edbb834c-7cf1-466c-969f-4d3a54574850>
{ "date": "2019-05-20T15:48:30", "dump": "CC-MAIN-2019-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256040.41/warc/CC-MAIN-20190520142005-20190520164005-00096.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8928387761116028, "score": 2.96875, "token_count": 363, "url": "https://www.ars.usda.gov/research/publications/publication/?seqNo115=214422" }
Make transparent graphic box to place behind legend items I would like to add a transparent box behind my legend features, so that I can still see underlying map features. Apart from making a feature layer that can be set to transparent, how else can this effect be achieved using a graphic feature. My only other alternative is to complete the legend outside of Desktop using a graphics program (eg. Photoshop, Corel, etc.). I have access to ArcInfo 9.3 / 9.3.1 / 10. Mapping Center Answer: You cannot apply transparency to graphic elements in ArcMap, but you can to geographic features. As you surmised, one way to do what you want to do is to draw a graphic rectangle for the area that you want to be transparent, then right click the data frame and select the option to Convert Graphics to Features. Note that you have to be in Data View to do this. Then you can apply the color and transparency you want to the feature. But you can do all of this in ArcMap and not have to use a graphics program. If you would like to post a comment, please login.
<urn:uuid:22de792b-70a0-46d5-8a48-d4d19bca14a0>
{ "date": "2014-12-21T06:10:28", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770742.121/warc/CC-MAIN-20141217075250-00139-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8994325995445251, "score": 2.921875, "token_count": 233, "url": "http://mappingcenter.esri.com/index.cfm?fa=ask.answers&q=1422" }
Oromo people and the Land of Oromia The Oromo are indigenous African people inhabiting the North Eastern part of Africa Their country is called Oromia, which is currently under the domination of the Ethiopian colonial Empire. The Oromo are descendants of the Eastern-Kushitie group of people indigenous to the Horn of Africa, with a population of over 40 million, which makes them one of the largest indigenous peoples of East Africa. A map of the region showing Oromia within the current political boundaries of Ethiopia. A Few Facts About Oromia - Oromia is the largest Regional State in the Ethiopian Empire State. - Oromia (also phonetically spelled as Oromiyaa) - Oromia has been occupied by Ethiopia (Abyssenia) for over 100 years - Size: 600,000 Square km (375,000 Square miles); Larger than Italy, Switzerland, Belgium, The Netherlands and France combined - The Oromo nation has a single common mother tongue, called the Oromo language or Afaan Oromoo or Oromiffa. - It is the third most-widely spoken language in Africa, after Hausa and Arabic. - Before colonization, the Oromo had used their own language in social, religious, educational, political, and legal activities. - The Oromo language has been neglected and suppressed by Ethiopian authorities. In an effort of destroying Oromo national identity, the language of a minority group, Amharic is used as the official or national language. - The population of oromo is over 40 million in Ethiopian. - 3rd largest single nationality group in Africa; single largest nationality in East Africa. - Capital: Finfinnee (also called Addis Ababa). - Religion: Christianity, Islam and Traditional Belief in God, Waaqaa - Mainly agriculture (coffee, several crops, spices, vegetables) and Animal Husbandry; Mining industry; Tourism trade; Medium and small-scale industries (textiles, refineries, meat packaging, etc) - Breadbasket of the Horn of Africa - Largest livestock holding in Africa - Forestry and wildlife reserves of the Horn - Minerals (gold, silver, platinum, uranium, marble, nickel and natural gas) - An independent loosely confederated nation before being colonized by the Ethiopian empire in the 1890s and still a nation in captivity - Practiced Gada Systen a democratic Leadership structure, which is similar to Grecian Polls - Locale of the 3.5 million year old Lucy - The Oromo culture is governed by an egalitarian Gada democratic system of administration. - Power to administer the affairs of the nation and the legislative power belongs to the people. - Respect for elders, women and children are the key components of Oromo Culture. - A culture of managing conflicts through arbitration/consensus. The hour has not come but it will come, perhaps our children will see the departure of the oppressors Rooba, 1975 voicing his faith in the future of Oromia - Conquered after bloody resistance between 1882- 1898, as the result of which the population of Oromo was reduced from 10 million to 5 million - In 1886 a smallpox epidemic (the first biological warfare used in the region) was used to frighten and weaken Oromo resistance - Currently thousands of Oromos languish in prison, Many have fled the country. - Deprived of their rich resources - Politically marginalized, tortured, and deprived of basic human rights. - Ongoing killings, extra judicial disappearances, imprisonment, segregation and injustice in the universities, colleges, and educational system - Struggling for Self Determination
<urn:uuid:7474c4c3-07d5-4e0e-b274-ee3c10f6682e>
{ "date": "2017-04-23T11:50:14", "dump": "CC-MAIN-2017-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00115-ip-10-145-167-34.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9223839640617371, "score": 3.625, "token_count": 797, "url": "http://oromodictionary.com/aboutOromo" }
The model for the utility patent dates back to German patent law in the 1800’s, and addresses a gap in market for small inventions which were not patentable at the time but were deemed as worthy of patent protection due to their economic value. Prior to the utility patent designation, the German patent office was only granting patents to inventions which were completely new and highly innovative. However, the industrial revolution produced a great number of valuable technical solutions which were very simply constructed. These were generally modifications of existing objects and tools which were already in common use. This model proved to be useful throughout the industrial world and quickly spread to other countries, including the Unites States and other Western countries. The model was most recently introduced in Denmark as late as 1992 and Austria in 1994. When looking back at the US Patent Office records, one will find a wide variety of curious, small invention success stories. It’s a good bet that even the smallest, simplest items we use everyday are covered by patents which have made fortunes for their inventors. Because patent law requires that each change made to a patented item be patented as well, many significant inventions like the telephone are covered by numerous patents. No item is too small, simple or cheap to be patented, and in many cases the simpler items require greater patent protection because they are cheapest and easiest to copy. A good example of simple design which became a best selling toy is the “return ball”, a simple rubber ball attached to the end of a long piece of elastic. The string is tied around the finger or held in the hand, and when thrown out the ball returns to the thrower’s hand thanks to the recoil effect of the string.
<urn:uuid:0828df81-fc2b-4a96-9cb4-1d0a16673e13>
{ "date": "2019-08-25T23:02:39", "dump": "CC-MAIN-2019-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330907.46/warc/CC-MAIN-20190825215958-20190826001958-00416.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9759308099746704, "score": 3.078125, "token_count": 350, "url": "http://www.invents.com/category/invention-history/" }
Led by Alexander Hillel, researchers at the John Hopkins University have completed development on a half-organic, half-synthetic biomaterial that's capable of delicately reshaping the bodies soft tissues after damaging accidents or deforming diseases. The future of plastic surgeons is uncertain, as this new tech may ostensibly nullify their purpose. The new biomaterial, as of yet unnamed, can be implanted under the skin as a liquid, moulded to specific dimensions and permanently secured into place by an LED light. Currently, there are few solutions offered to people whose lips, cheeks or soft flesh have been damaged, but this new innovation could conceivably give them a way out. A portion of the public generally assumes that any plastic surgery is automatically an elective procedure, but some patients -- particularly after fires or car accidents -- suffer terrible stigmatization because of their appearance. The biomaterial developed at JHU is a ticket back to normalcy for them, and it could reshape the plastic surgery industry forever! Non-Invasive Plastic Surgery 1,364 clicks in 123 w More Stats +/-
<urn:uuid:18eeb4c1-243e-4855-be98-c9433ac1b4fd>
{ "date": "2013-12-09T23:45:12", "dump": "CC-MAIN-2013-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164001281/warc/CC-MAIN-20131204133321-00002-ip-10-33-133-15.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9531430602073669, "score": 2.71875, "token_count": 224, "url": "http://www.trendhunter.com/trends/biomaterials" }
Poliomyelitis, more commonly called polio, is an infectious disease caused by a virus. The virus infects and destroys certain nerve cells and the muscles become weak or paralysed. About one out of every 100 people infected with the polio virus will develop paralysis with permanent nerve damage. During the last polio epidemic in Canada in 1959, many patients could not breathe by themselves and had serious complications or died because the virus paralysed their chest muscles. There are three different types of poliovirus: types 1, 2, and 3. The poliovirus is spread by direct contact with an infected person or by contamination of water, food or hands. The virus can survive in the environment for long periods of time. As long as polio still exists in parts of the world, Canadians, especially those not protected by vaccination, are still at risk. Polio still exists in certain parts of the world, including Africa and the Indian subcontinent. People who are not protected against the disease can get it while visiting countries where the disease is still present. As well, someone visiting Canada could bring the disease into the county. The last time a person brought the disease to Canada was in 1996, but the infection did not lead to paralytic disease. Vaccination with a safe and effective vaccine is the only sure way to protect against polio. SV40 is a monkey (simian) virus that infects several monkey species without making the animals sick. The virus can be found in the kidneys of these infected monkeys. Kidney cells from infected monkeys were used in the production of polio vaccines before the discovery of SV40 in 1960. As a result, some individuals who received those vaccines between 1955 and 1963 may have been exposed to SV40. Polio vaccines were originally grown in rhesus monkey cells. Early in 1960, scientists discovered that some of the monkeys whose cells were used to grow the vaccine had been infected with the SV40 virus. As a result, there were concerns that people who had received those first batches of polio vaccine may have been exposed to SV40. When it was first discovered that some monkey cells had been infected with SV40, the potential health effect of the virus on people exposed to contaminated polio vaccine was unknown. Studies done in 1961 showed that the SV40 virus could cause cancer in rodents, such as hamsters. Studies since have described a way in which SV40 contributes to the development of cancers. The SV40 virus has also been detected in some patients with three rare cancers in humans; mesothelioma (cancer of the lining of the chest or abdomen, known to be caused by exposure to a certain type of asbestos fibre), osteosarcoma (cancer of the bones) and ependymoma (a childhood brain tumour). However, most cancers have many potential causes. In 2003, the Institute of Medicine in the United States concluded that there was not enough scientific information to determine if the SV40 in polio vaccines produced before 1963 has caused human cancers. To date, there is no epidemiological evidence that shows people exposed to the SV40 contaminated polio vaccine are at increased risk of developing the type of cancers that rodents developed after direct exposure to SV40. A number of epidemiologic studies have been done to see if there was a connection between an increase in cancer rates and possible exposure to SV40 before 1963. To date, the studies have not found an increase in cancer rates. The cancers studied included the rare cancers found in rodents: mesothelioma, ependymoma, choroid plexus tumour, as well as non-Hodgkin's lymphoma, intracranial tumours and leukemia. Following the discovery of SV40 in the early 1960s, several steps were taken to eliminate SV40 from vaccines: the materials used to produce the polio vaccines were tested to make sure they were free of SV40, and, in the early 1990s, a new system was introduced for producing the vaccine that is completely free of materials that could have been infected by SV40. All polio vaccines used in Canada are manufactured using materials that have been subjected to strict quality control tests to ensure their safety and sterility. No, polio vaccines used in Canada are not contaminated with SV40 because they are produced using materials completely free of SV40. Currently, the only polio vaccines used are those made with inactivated polio virus (IPV). An inactivated virus is one that will not make you sick but instead makes you produce antibodies that protect you from being infected with the polio virus. Polio vaccines given to Canadians have been free of SV40 since the early 1960s. These vaccines are manufactured according to the highest standards in the world. Health Canada regulates all vaccines for human use. Like all medicines, vaccines go through rigorous tests before they are approved. Health Canada also monitors all aspects of vaccine production by the manufacturers. As well, the factory where the vaccine is manufactured must be inspected to ensure that all stages of production meet the requirements for safety, sterility and quality control. Before the manufacturers can release the polio vaccine, each batch has to be tested for safety and quality under guidelines specified by Health Canada. Testing is also carried out by Health Canada to confirm the manufacturer's results. The vaccines used in Canada are safe and effective and there is a well developed system for monitoring and evaluating vaccine associated adverse events in Canada that includes: a national vaccine adverse events surveillance system, a paediatric hospital-based surveillance system and a national panel of experts that looks at serious vaccine-associated adverse events. The last major epidemic in Canada occurred in 1959. During this epidemic, 1,887 cases resulted in paralysis, out of approximately 190,000 poliovirus infections. In Canada, the disease has been eliminated following the introduction of inactivated polio virus vaccines (IPV; containing only dead virus and given by injection) in 1955 and oral polio virus vaccine (OPV; containing live, weakened virus) in 1962. The Pan American Health Organization certified that Canada was polio free in 1994. The Working Group on Polio Elimination in Canada, a Health Canada advisory committee of experts, reviews data collected by Health Canada and by organizations around the world to ensure that we continue to take the steps that are necessary to make sure Canada remains polio free. Thanks to continued polio vaccination campaigns world wide, polio was eliminated from the Western hemisphere in 1995. The WHO is working towards eliminating the disease world-wide by 2005.
<urn:uuid:fea737da-e485-4ebf-be97-b3ecf606ab69>
{ "date": "2016-12-03T13:35:34", "dump": "CC-MAIN-2016-50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540932.10/warc/CC-MAIN-20161202170900-00448-ip-10-31-129-80.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9709973931312561, "score": 3.71875, "token_count": 1315, "url": "http://www.phac-aspc.gc.ca/im/polio-eng.php" }
Production: How To Film at Eye Level When it comes to video production, differentiating the various types of shots and shooting angles is one of the basic skills any type of director or filmmaker should fully grasp. A cameraman controls what the camera records, understanding how different angles work can change what scenes or emotions are emphasized. The eye level shot is one of the basic types of shots. It is not as dramatic as a low level or high level shot but it does convey the story by showing the dialogue between the characters as well as their facial expressions. Here are the steps in filming at eye level. Step 1 - Keeping It Steady A tripod is an accessory which provides stability to the camera. Some filmmakers and photographers believe that the quality of support provided by the tripod will determine the quality of the shots taken. Using a tripod is important as it lessens the probability of making erratic video shots. There are varying sizes and heights available. The legs can be adjusted that is convenient for unlevel terrain. For added stability, you may place additional weight at the center of the tripod such as the equipment bag. The weight must be twice that of video camera. Opt for tripods that can lock into a fixed position. In cases where there is no tripod, the arms can function in the same way. Place the camera flat on your palm, your elbow resting on your ribs for support and leverage. You may also brace against a rock or part of a wall to remove the stress from your arms and shoulders. Step 2 - Positioning the camera The eye level shot is neutral as it depicts how a person would normally see their surroundings. It places them on the same footing as the subject being videotaped. When shooting at eye level, the camera is normally placed at 5 to 6 feet from the level of the ground. The distance from the ground varies depending on the height of the subject. It is important to take a clear shot of the person's head when filming at eye level. In the case of kids or infants, the filmmaker will need to kneel or crouch low to the ground depending on the child's height. Step 3 - Focusing the Camera Eye level shots are at times associated or interchanged with the term mid-level shot. The mid-level shot can incorporate up to three people in a single frame and no more. This allows the viewer to understand the scene without being overwhelmed by the details. When filming an object against the foreground, the object should be the point of focus. In the case of filming people or animals, the shot should be focused on the eyes, making it the sharpest area out of the entire image.Popular P&S Cameras for High Quality Photos:
<urn:uuid:fb3d224d-cd74-405b-8c65-47ceb086f3e2>
{ "date": "2016-09-26T22:36:30", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660898.27/warc/CC-MAIN-20160924173740-00037-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9496099352836609, "score": 3.109375, "token_count": 550, "url": "http://www.steves-digicams.com/knowledge-center/how-tos/becoming-a-professional-photographer/production-how-to-film-at-eye-level.html" }
Wednesday 21 September 2016 is the International Day of Peace, which is observed and celebrated by nations around the world every year on this day. This year, the theme designated by the United Nations is “The Sustainable Development Goals: Building Blocks for Peace.” The 17 Sustainable Development Goals aim to build a more prosperous and fair world for everyone, ending poverty and building a sustainable future. According to the UN, “The Sustainable Development Goals are integral to achieving peace in our time, as development and peace are interdependent and mutually reinforcing.” Find out what the 17 SDGs are, and how you can help make them a reality: sustainabledevelopment.un.org/sdgs Read more about the International Day of Peace, and find events near you:
<urn:uuid:1ff2e63c-0bd6-412e-a329-6f05a165594a>
{ "date": "2018-09-22T22:24:50", "dump": "CC-MAIN-2018-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158766.53/warc/CC-MAIN-20180922221246-20180923001646-00496.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9394843578338623, "score": 2.890625, "token_count": 160, "url": "http://www.jedo.perthcatholic.org.au/2016/09/international-day-of-peace-21-september-2016/" }
The world of infectious disease is constantly evolving; an infection that is considered a national or global threat one year could be eliminated the next. There is also always the possibility that an unknown pathogen could emerge and wreak havoc on any sector of the population at any given time (that’s why the World Health Organization included Disease X on its 2018 list of Blueprint priority diseases). Still, clinicians, infectious disease specialists, preventionists, and the larger health care community all have a pretty good idea of which specific pathogens, human behavior patterns, national crises, or risk factors could contribute to the next major outbreak. Here, after consulting with experts in the infectious disease space, the Contagion® editorial staff has compiled a list of the top 5 infectious disease—both emerging and re-emerging—concerns to monitor in 2019. #5: Candida Auris #4: Vaccine Hesitancy 2018’s No. 1 emerging infection to watch out for is a continuing concern in 2019 as well. Candida auris , a type of yeast, is particularly pesky because it is often multidrug-resistant, is outbreak-prone in health care-related settings, and is difficult to identify. There have been nearly 500 cases confirmed in the United States as of December 21, 2018. is not easily identified. You need [matrix-assisted laser desorption/ionization-time of flight mass spectrometry] or DNA sequencing,” Tom Chiller, MD, MPH, chief of the Mycotic Diseases Branch, US Centers for Disease Control and Prevention (CDC), told Contagion® earlier this year. “It’s unfortunately easily transmitted. It’s on our skin so it can readily contaminate health care environments. It’s difficult to treat because of the multidrug resistance, and it causes severe infections like invasive candidiasis.” The growing hesitancy to vaccinate children as a collective behavior is something to watch in 2019, as it could lead to the re-emergence of infectious diseases previously eliminated in the United States. in June that several US cities were vulnerable to a measles outbreak because of opposition to vaccination. Indeed, there have been more than 290 confirmed cases of the disease this year in the United States, despite the fact that measles was considered eliminated by the CDC in 2000. “[Say] an American child who has not been [vaccinated] goes on a trip abroad and acquires measles,” William Schaffner, MD, infectious disease specialist at Vanderbilt University Medical Center, and the former president of the National Foundation for Infectious Diseases, told Contagion® . “They bring it back and then you have an outbreak of measles, a disease that was totally eliminated.” #3: Antibiotic Resistance Ask any infectious disease specialist or preventionist what his or her biggest fear is and chances are antibiotic resistance is high on that list. “Antimicrobial resistance is an important public health threat. Higher rates of antimicrobial resistance have several deleterious effects, and antimicrobial resistance is recognized as a global crisis for which urgent interventions are needed,” David Van Duin, MD, PhD, wrote in the December issue of Contagion® The CDC released a comprehensive list of US antibiotic resistance threats in 2013 and is working on publishing an updated list for 2019. Considered the most pressing threats: Clostridium difficile , Carbapenem-resistant Enterobacteriaceae (CRE), drug-resistant Neisseria gonorrhoeae , Methicillin-resistant Staphylococcus aureus (MRSA), and extended-spectrum beta-lactamase producing Enterobacteriaceae, among others. #2: The Opioid Epidemic The opioid epidemic could be the culprit of the next major infectious disease outbreak, experts warn. With the rise in drug use-associated infective endocarditis stemming from the use of intravenous drugs, the number of hospitalizations and valve-replacement surgeries has also spiked. People who inject drugs are also at a higher risk of contracting hepatitis (B, C, and even A) and HIV, and they are also at risk of developing MRSA bloodstream infections or cellulitis at the injection site. And now clinicians are even tracking the consequences of orally administered opioids. “There are now good data to indicate that even orally administered opioids have immunosuppressive properties. What we’re seeing now an increase in staphylococcal infections, group A strep infections, pneumococcal and Candida infections related to opioid use,” Dr. Schaffner told Contagion® . “I think that the recognition is going to expand further as more data come in on the immunosuppressive aspect of opioids. [This] will move from a warm to a hot topic in 2019.” #1: Ebola and Other Hemorrhagic Fevers The infectious disease community has been particularly focused on the Ebola outbreak in the Democratic Republic of the Congo this year, as confirmed cases topped 500 . The current uncontrolled outbreak, the funding gaps that are arising, and the long-term efficacy of the deployed Merck vaccine are sure to keep the Ebola virus at the forefront of the public health discourse in 2019 as well. Other hemorrhagic fevers are also garnering some public attention. Nigeria experienced its largest Lassa fever outbreak to date this year, which remains a concern. Marburg , a zoonotic disease sometimes referred to as Ebola’s cousin, is also on the radar of infectious disease specialists heading into the new year because of its high fatality rate in humans. To stay informed on the latest in infectious disease news and developments, please sign up for our weekly newsletter.
<urn:uuid:1bf10529-bf61-447b-8c0c-e4733434afa9>
{ "date": "2019-11-15T12:50:24", "dump": "CC-MAIN-2019-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668644.10/warc/CC-MAIN-20191115120854-20191115144854-00456.warc.gz", "int_score": 3, "language": "en", "language_score": 0.939113438129425, "score": 3.171875, "token_count": 1229, "url": "https://www.contagionlive.com/news/top-5-infectious-disease-concerns-to-watch-in-2019" }
The swine influenza pandemic of 2009 and more recent zoonotic transmissions of several avian influenza subtypes to human populations punctuates the threat posed by new pathogens for which we have no pre-existing immunity. Traditional vaccines require 5-6 months to develop and produce sufficient quantities to protect a significant portion of a population. Given how rapidly outbreaks can spread, a more rapid response is necessary to mitigate the consequences. Messenger RNA (mRNA) vaccines offer more suitable production speed and scale to respond to pandemic outbreaks. Having recently published successful results with mRNA vaccines against Zika virus in mouse models, Moderna therapeutics’ vaccine spin-off, Valera, is blazing a trail in the clinic with a first-in-human trial of an mRNA vaccine for avian influenza subtype H10N8. With the Phase 1 trial ongoing, Valera has reported promising early results along with animal model studies in mice, ferrets, and non-human primates in the journal Molecular Therapy. The paper is available online now, and will feature in the June edition for print. Although nucleic acid vaccines address some challenges in traditional vaccine development and production, there are several challenges to realizing mRNA vaccines. mRNA requires chemical modifications of the nucleotides to enhance stability. Encapsulation within a lipid nanoparticle (LNP) will further enhance stability and provide a vehicle for intracellular delivery. To produce LNPs of appropriate size, and sufficient size-homogeneity and efficacy for in vivo use, Valera have used the NanoAssemblrTM technology to formulate their mRNA LNP vaccines. For their animal studies, two mRNA-LNP vaccines were formulated using modified mRNAs encoding the hemagglutinin (HA) protein from either the H10N8 or H7N9 avian influenza subtypes. LNPs were administered intramuscularly (IM) or intradermally (ID) where they drain into nearby lymph nodes. LNPs promote cellular uptake into host cells and are designed to release mRNA into the cytoplasm. This leads to authentic viral antigen expression and presentation to the host immune system. Both formulations produced potent neutralizing antibody titers in all three animal models. The choice of administration route had no discernable effect on outcomes. The H7 mRNA-LNP formulation was also assessed in challenged mouse and ferret models and a significant increase in survival rate and decrease in viral titers were observed in the groups that received the vaccine. Both formulations were also tested in cynomolgus monkey and generated high levels of neutralizing antibodies. At the time of publication, human phase 1 trials were still ongoing to evaluate the safety and immunogenicity of the H10 mRNA vaccine. Results from randomized, double-blinded, placebo-controlled and dose-escalating trials were reported at day 43 post-vaccination. Of the 31 subjects, 23 were administered the vaccine via IM injection while 8 were given a placebo. 87% of vaccinated and none of the placebo subjects had hemagglutination inhibition titers of 40 or greater, a measure that indicates a 50% reduction in risk of contracting influenza compared to persons with undetectable titer. Importantly, reports of adverse events were similar to existing H1N1 vaccines in terms of their nature, severity, and frequency. Though full results and analyses will be necessary to evaluate the success of the trial, these interim results are encouraging. In all, Valera’s mRNA vaccines encoding avian influenza antigens were efficacious in animal models. Though additional results are still forthcoming, this phase 1 study represents not only a first-in-human study for mRNA vaccines, but also the first time any nucleic acid vaccine was used in humans without electroporation. Hence, this study is not only an important data-point for LNP formulations in the clinic, but also a leap forward in realizing the potential for rapid on-demand development of vaccines. Because mRNA LNPs represent a vaccine platform that can induce host presentation of virtually any peptide antigen with minimal reformulation, a successful trial will precipitate rapid advancement of numerous future vaccines. Recently, the World Health Organization confirmed 120 new human cases of avian H7N9 influenza in China resulting in 37 deaths, highlighting the concern for a potential pandemic and the need for an effective, safe, and high-speed vaccine production platform. Production speed and scale of mRNA-based vaccines make them ideally suited to impede potential pandemic threats. Here we show that lipid nanoparticle (LNP)-formulated, modified mRNA vaccines, encoding hemagglutinin (HA) proteins of H10N8 (A/Jiangxi-Donghu/346/2013) or H7N9 (A/Anhui/1/2013), generated rapid and robust immune responses in mice, ferrets, and nonhuman primates, as measured by hemagglutination inhibition (HAI) and microneutralization (MN) assays. A single dose of H7N9 mRNA protected mice from a lethal challenge and reduced lung viral titers in ferrets. Interim results from a first-in-human, escalating-dose, phase 1 H10N8 study show very high seroconversion rates, demonstrating robust prophylactic immunity in humans. Adverse events (AEs) were mild or moderate with only a few severe and no serious events. These data show that LNP-formulated, modified mRNA vaccines can induce protective immunogenicity with acceptable tolerability profiles.
<urn:uuid:b36035ea-0775-4da5-864a-8ad3b6f24e1e>
{ "date": "2019-10-13T23:12:12", "dump": "CC-MAIN-2019-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986648343.8/warc/CC-MAIN-20191013221144-20191014004144-00496.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9280659556388855, "score": 3.03125, "token_count": 1133, "url": "https://www.precisionnanosystems.com/resource-center/publications/detail/influenza-mrna-vaccine-clinicalstudy" }
I’m exploring our world today through eight beautifully illustrated nonfiction books. I’m always on the lookout for books that teach my kids geography; they never seem to know where countries are located and often get even the continent wrong. Until they can world travel — my oldest is planning on taking a gap year after high school — we are arm chair traveling via books. I’m giving five of them away to five winners. Please fill out the Rafflecopter at the bottom to enter. How about you? What nonfiction picture books have caught your eye lately? Great Nonfiction Books to Explore Our World The Earth Book: A World of Exploration and Wonder by Jonathan Litton, illustrated by Thomas Hegbrook This beautiful nonfiction picture book is broken out into four sections: physical earth, life on earth, earth regions, and human planet. Each section then has one or two page spreads that then give a detailed overview of each “chapter.” For example, earth regions are broken down into oceans, islands, rainforests, poles, deserts, and extreme earth. This book does a good job presenting a lot of information in a readable day. Rainforests uses the illustration to show the different layers of the rainforest; it includes ten animals found in the rainforest, and it includes rainforests in different geographic areas, as well as a summarized paragraph about the current state of rainforests. Browse this book with your child to discover the earth and all its wonders. [nonfiction picture book, ages 7 and up] This Is How We Do It: One Day in the Lives of Seven Kids from around the World by Matt Lamothe Flowering Minds‘s loves this book too: “In this wonderful non-fiction book, we get to peek into the lives of seven kids from around the world and see how different and similar they lives are.” I was both struck by the beautiful illustrations and the information that includes what each child eats using their native words which can be looked up in the glossary in the back. She noticed that “all the families are nuclear – mother, father, kids. In many parts of the world, families will include a grandparent, great-grandparent, aunt, uncle all living under a single roof. I feel that the opportunity to show diversity in families was lost.” I think that’s a great point. Darshana has further resources for those who want to compare and contrast or do a book extension such as cooking a recipe from the book. I would also suggest What The World Eats which I think is fascinating. It shows the groceries that a family eats in the course of a week. Not only do you see the groceries each family uses for the week’s meals but also the members of each family. [nonfiction picture book, ages 5 and up]
<urn:uuid:a345b808-b990-4522-afc0-2b5ad41c46f7>
{ "date": "2017-10-23T08:00:36", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825812.89/warc/CC-MAIN-20171023073607-20171023093607-00356.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9657079577445984, "score": 2.90625, "token_count": 595, "url": "https://www.pragmaticmom.com/category/my-best-book-lists/non-fiction-book-reviews-reviews/" }
Turns out not all industry-funded research is bias. A recent study funded by the Danish Dairy Research Foundation found that butter actually did raise participants’ cholesterol, even the bad kind. Whoops. The double blind study conducted at the University of Copenhagen put 47 people on five-week diets with increased amounts of either butter or olive oil in the form of rolls. The result was that this moderate increase in butter intake resulted in increases in total cholesterol, including both HDL and LDL (also known as “bad”) cholesterol. In fact, the study even concluded that “hypercholesterolemic people [those with high cholesterol] should keep their consumption of butter to a minimum.” The Washington Post spoke to Marion Nestle, an author who has advocated for the public to pay attention to who funds these sorts of studies when considering their results. “It's very rare for an industry-funded study to find something that goes against the interests of that industry,” the NYU professor told the Post. Whether or not this information will change people’s levels of consumption, butter is the key ingredient in many of our favorite foods. Here is a roundup of five of the best butter-laden recipes to try before you reduce your cholesterol: Buttery biscuits are the ultimate comfort food. Clarified to make this brunch staple, it's all about the butter here. The name of this cake is based on the equal portions of it's four ingredients, which includes butter. Butter is the key ingredient to the flakey pastry we can't get enough of. And then topped with kimchi butter.
<urn:uuid:a30dd349-7fd3-46a8-bed6-52a14115cf07>
{ "date": "2018-03-17T04:14:52", "dump": "CC-MAIN-2018-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644271.19/warc/CC-MAIN-20180317035630-20180317055630-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9622991681098938, "score": 2.671875, "token_count": 337, "url": "http://www.foodandwine.com/fwx/food/butter-may-be-bad-you-says-butter-industry" }
voice response systemA form of speech synthesis in which sentences are formed by concatenating pre-recorded words from a database. Unlike a TTS system, which uses speech synthesis to form spontaneous sentences and/or phrases based on human phonetics, a voice response system operates with a limited vocabulary in situations where the sentences and/or phrases that are formed follow a strict predetermined pattern. For example, a train station may use a voice response system to notify passengers of schedule information or a train��s status. The synthesized speech is created from a pool of words that are strung together based on the input of a human operator, and the pool only contains a limited number of words as there are a limited number of combinations of words that are necessary for the train station's purpose; financial institutions also use voice response systems to aid customers in getting account information over the telephone. The same principle applies here -- since the financial institution only needs to provide the caller with a limited amount of information, it does not need to be able to generate spontaneous sentences in response to customer inquiries. Contrast with TTS. The following compilation of small business marketing tips highlights some of the expert advice published over at Small Business Computing. Read More »Taking Ownership through Digital Governance Taking ownership of our own misjudgments or simple forgetfulness takes a healthy amount of humility and some honest self-assessment. Yet sometimes... Read More »Have We Become a World of Addicts? It's hard to imagine our lives without smartphones. But people who suffer separation anxiety when they don't have their phones nearby may be in... Read More » With cost and security in mind, we look at five cloud storage options that will suit the needs of most home and SMB owners. Read More »Windows 10 Tips for Desktop PC Five basic tips to help you customize Windows 10 on your desktop PC. Read More »29 Free Android Apps for Cash-Strapped Students From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More » Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now. - Watch Datamation's editor James Maguire moderate roundtable discussions with tech experts from companies such as Accenture, Dell, Blue Jeans Network, Microsoft and more »
<urn:uuid:b1e8754b-649e-444c-a7e1-267ce4642993>
{ "date": "2015-08-30T03:37:48", "dump": "CC-MAIN-2015-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064869.18/warc/CC-MAIN-20150827025424-00231-ip-10-171-96-226.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9113426208496094, "score": 3.0625, "token_count": 488, "url": "http://www.webopedia.com/TERM/V/voice_response_system.html" }
Some Christian schools choose their curriculum based upon whether or not it has a “Christian” publisher. But our criteria should be different; we should not ask, “Who is the publisher?” but rather, “What is the best curriculum? What curriculum best develops a child’s ability to listen, speak, read, and write? What curriculum best prepares the student for college? What curriculum will make our students well informed Christians? What curriculum best prepares our students to thoughtfully challenge the humanistic professor or the pagan professional? What curriculum best insures that our students will be safely secured to the masthead of Truth when the wild winds and waves of fallen culture roar and blow?” What makes a curriculum “Christian” is not the “curriculum” but rather the Christian. Thus, our curriculum should be taught by godly men and women. But more importantly, our curriculum should be taught by thinking Christians whose vibrant faith in Jesus Christ, and whose passion for lifetime learning, will permeate our hallways, classrooms, athletic fields, and academic disciplines, thus bringing “every thought in captivity to Christ.” And perhaps most importantly for parents, our curriculum should prepare students to meet the world head on, to boldly engage and impact their culture for the glory of God. A Christian education demands excellence – maximum performance and accomplishment – in all academic disciplines. Grammar School (grades K-4) should concentrate upon students’ mastery of the “nuts and bolts” of learning, the elemental facts of math, science, language, art, music, and history. Logic School (grades 5-8) should emphasize clear and rational thinking within the various academic disciplines, epitomized by integrating principles of formal logic throughout the curriculum, especially in language arts and mathematics. The consummation of a Christian school curriculum (9-12) should aim to refine students’ ability to listen and think clearly, and to speak and write eloquently from an informed perspective, whether in math, science, art, or the humanities. Beyond these elemental and structural benefits of the curriculum, classical Christian education should emphasize an appreciation of the Judeo-Christian foundations of Western culture. The last quarter of the twentieth century witnessed an intellectual attack against Western culture, not only attempting to de-Westernize the literary canon, but even to undermine the political, religious, and moral foundations that have contributed to the rise and influence of Western culture and the Judeo Christian ethic that undergirds it. By studying God’s Word and great works of art, music, literature, and philosophy from the pre-Socratic era to modernity, students experience a sweeping view of Western history and thought, and thus attain a clear understanding of how we came to be what we are. Such a panoramic vision of history is vital to students’ understanding of the future, especially in view of the political correctness, multi-culturalism, emerging globalism, and anti-Western biases of the “new world order.” Though the primary focus of our curriculum should be Western history, the emerging influence of China, India, and the Islamic nations also requires that we be intellectually informed about those cultures as well. One way to illustrate classical-Christian education is to imagine a magical time machine that could travel to any point in world history, to any place, and to any person. What century would you choose? What shining city from the past? What great minds would you seek out? Would you be charmed by Homer’s muse or Virgil’s voice, and survey the grandeur of their epic visions by tracing the daring exploits of brave Odysseus and Aeneas as they sail the blue oceans and wage bloody war to establish the kingdoms of Greece and Rome? Would you march with Caesar’s legions, or walk beneath the portico of the Acropolis and listen to Socrates, Plato, or Aristotle as they contemplate the great themes of Western Philosophy – justice, beauty, truth, love, and goodness? Or would you travel to sixteenth-century Florence, or perhaps to Rome, and momentarily recapture the splendor of the Renaissance? Would you stare at the sun through the kaleidoscopic prism of cathedral glass, or ponder the dark and disturbing architectural images of the gargoyle? Would you gaze over da Vinci’s shoulder as he scribbles the first primitive aircraft, gently curves the Mona Lisa’s smile, or sketches the thirteen human forms that would become The Last Supper? Or perhaps you would visit the Piazza della Signoria and watch in wonder as Michelangelo’s delicate but strong hands make David come to life from stone, or ascend Michelangelo’s scaffold and recline with him beneath the Sistine Chapel dome as the history of Providence unfolds in splendid color and dynamic form. Would you descend with Dante into the nether regions of The Inferno, dark circle by dark circle, downward and downward still, fathoming the terrifying depths of human pride, prevarication, perversion, lust, greed, and envy until finally, in a moment of supreme poetic irony, you discover the devil frozen in ice? Or would the next century allure you, the century that shook the foundations of Christendom, cast down the Holy Roman Empire, and dethroned and decapitated apostate kings? Would you listen for Luther’s hammer upon the Wittenberg door, or stand boldly beside the German Lion as he tells the worldly prince, “Here I stand”? Would you strain your eyes in the flickering candlelight of Calvin’s midnight study, and watch in wonder as the bearded sage dips his iron pen, diamond-pointed, into the ineradicable ink of the Great Reformation, and trace out the recovery of sola gratia, sola scriptura, sola fide, sola Christos, and soli deo gloria? Or perhaps you would sail with Calvin’s heirs to Plymouth Bay in quest of the shining city upon the hill. Or, would you venture into the age of reason, scientific discovery, and enlightenment? How thrilling to catch Newton’s apple and experience the sudden wonder of profound discovery? How stupefying to witness Leibniz’s formulation of calculus, or to scope the shining heavens with Copernicus’ eye, and with a simple stroke of his pen, shake the stars, sun, moon, and earth from their courses? Or perhaps you would choose to sit with Jefferson on his verandah, as the Virginia gentleman condenses the abstract political philosophy of Locke, Montesquieu, and Kant into a declaration of concrete action. Would you be a Tory or a Whig, obey the God-ordained magistrate and pay your taxes, or take up arms with the sons of liberty? And would you willingly pay the high price of liberty and, if necessary, die for the rights of those with whom you vehemently disagree – the Shakers’ heresy, Paine’s agnosticism, Jefferson’s Christ-less deism, or even the atheist? And how would you solve this delightful dilemma? Would you lend your ear to Mozart or Beethoven, Bach or Handel? Whose strings would stir your spirit, whose horns awaken your soul to the majesty that is music? Now thrust your time machine into the 19th century, the Age of Romanticism, Industrial Revolution, and unparalleled scientific upheaval. Eavesdrop at a quaint café along the Avenue des Champs-Élysées as Monet, Renoir, and Van Gogh discuss the mysterious interplay of light and color, function and form. Listen to the soft, impressionistic tones of Claude Debussy’s Prelude to the Afternoon of a Fawn. Ponder the beauties of nature through Wordsworth’s eye, your heart leaping up as you gaze upon the splendor of a rainbow or the dignified simplicity of a solitary lass threshing golden grain. Listen to the opiate charms of the Ancient Mariner’s rime, or Byron’s comparison of a woman’s beauty to the rolling spheres of a starry midnight. Retreat to the woods and live deliberately with Thoreau; go fishing in the stream of time and learn timeless lessons from the industrious ant, the morning mist, the lark’s song, and Walden Pond in winter. And then, hear the soft voice of nature’s music when it dies, as monstrous machines of the Industrial Revolution growl with cacophonous roar, their unnatural and hideous heads bobbing up and down like mad elephants, and their grotesque snouts spewing black smoke into England’s sapphire sky, stripping the sun of its golden glory and clothing it in the gray rags of greed. Weep as England’s silver rivers turn strangely purple with the poison of progress, bleeding from factories where pregnant women and eight-year-old children work eighteen-hour days; hear the blare of the brutal whistle that sends them into dark streets oozing with sewage, and into twelve-by-twelve rooms where tuberculosis and alcoholism ravage the souls of England’s poor. Empathize with Dickens’ tender soul as he caricatures England’s brutalized masses in such unforgettable characters as David Copperfield and Stephen Blackpool, or stand quietly in the labyrinth of the London library and witness the tears of a young Jewish intellectual who had “seen enough” of capitalism’s invisible hand; follow his fingers page by page as he exhausts the annals of economic history and theory; hear him whisper the words that would shake the nations – workers of the world, unite! Sail with Conrad down the winding Congo into the dark heart of Africa, only to discover that it is a voyage into our own twisted hearts of darkness. Shudder at Darwin’s explanation of this tragic age – things are as they are because the strong must necessarily rule the weak, and the weak must adapt or die. Tremble at Nietzsche’s matter-of-fact, soulless declaration – God is dead. Now accelerate your time machine into the twentieth century. See the crimson specter of communism engulf the third world, and the triumph of atheism, existentialism, and nihilism in Europe. Inhale the mustard gas and anthrax spores, feel the thunder of Panzer divisions moving the earth beneath your feet, and shade your eyes to the Blitzkrieg’s lightning. Smell the burning flesh. Trace America’s rise to world domination at the cost of two Armageddons. Marvel at Einstein’s genius, and watch in horrible anticipation as the mushroom blooms upon the horizon of terrorism in the twenty-first century. But we do not need Orwell’s time machine to take this journey; a well-organized, classical-Christian school curriculum is in fact just such a time machine. This wondrous expedition into the past is exactly what we should do. What an amazing gift to give our children! By studying the “great books,” students encounter the most influential thinkers, artists, and writers of history – face to face, and mind to mind – and thus come to understand Western history and culture. We should not merely read about great books; in literature and history, we should read great books, see great art, listen to classical music. In math and science we should learn to apply classical logic and theory to practical learning. In our humanities classes, we should organize our curriculum chronologically so that students read great books as an ordered, historical narrative, and thus navigate the rising and falling tides of culture as it is shaped by great thinkers. To the extent we are able, we should also organize our curriculum interdisciplinarily, so that our students understand how philosophy, literature, art, science, and politics, like tributaries to a great river, converge at watershed moments in human history. Studying great books, art, and music will inform our students as to why things were as they were, and more importantly, why things are as they are. Our students thus will understand the foundations of Western culture through the Greco-Roman philosophers and poets; they will understand why the Dark Ages are so-called; they will grasp the true meaning of the Renaissance as an age in which learning is reborn, and how, subsequently, individualism triumphs over institutionalism; they will understand why the Age of Reason is an age of Scientific Enlightenment, political revolution, and ultimately skepticism, and why modernity has yielded to humanistic “isms” which have effectively unraveled the fabric of Western culture. But we do not explore the great books, music, and art merely to understand the history of Western culture; we study them as a basis to make value judgments. Great works are touchstones of excellence so that, by studying them, students learn how to think with aesthetic discernment and discrimination and thus make qualitative judgments about what is bad or worse, better or best. In other words, studying great works cultivates taste. But much more than this, by filtering all earning through the grid of God’s Word, we impart to our students a Christian world-view that equips them to make moral judgments, not merely about the basic questions of right and wrong, but also about profound ideas that, in the modern world more often than not, directly clash with Christianity. Thus understood, our philosophy of Christian education is not only a time machine, but also a kind of intellectual hospital or zoo. What parent would send his child into a disease-infested city without inoculation? Too often, Christian schools quarantine their students by slamming the door to a dangerous and hostile culture. But we must know that, sooner or later, the door must be opened and the vulnerable child emerge. A Christian education should inoculate students to the outside world and its dangerous diseases – atheism, existentialism, Marxism, Darwinism, Nihilism, humanism, and all the other “isms” – that threaten, not just the health, but the very life of Christianity. Metaphorically speaking, “It’s a jungle out there!” But the classical-Christian school curriculum should “cage the beast” so that, when our students safari into adulthood, they will not only recognize the serpent and the lion but also have the weapons to defeat them and thus protect themselves and their posterity. This essay may be quoted in accordance with standard fair use standards and proper citation of the author. Any other use of this document requires the author’s permission.
<urn:uuid:b68ed85c-bea9-46a0-84e3-5e99958b86d1>
{ "date": "2018-12-16T21:46:08", "dump": "CC-MAIN-2018-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827998.66/warc/CC-MAIN-20181216213120-20181216235120-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9299602508544922, "score": 2.703125, "token_count": 3022, "url": "http://whitefishchristianacademy.org/category/uncategorized/" }
By John DeFore While automakers and garage-based inventors work on replacing the car as we know it, a scientist at Temple University claims to have found a way of squeezing more out of the ones we already own with a process tongue-twistingly dubbed electrorheology. A team led by professor Rongjia Tao implemented the principle for a small device that creates a strong electric field to make auto fuel less viscous; that allows much smaller fuel droplets to be injected into the engine for combustion. As the authors explain in the introduction to their paper: “Because combustion starts at the interface between fuel and air and most harmful emissions are coming from incomplete burning, reducing the size of fuel droplets would increase the total surface area to start burning, leading to a cleaner and more efficient engine.” While other strategies exist for reducing the size of fuel droplets, the researchers say they don’t yet exist in forms usable in unmodified vehicles. Tao’s team’s innovation, on the other hand, “could be easily applied on current engines to improve their efficiency” — by up to an impressive 20% in a diesel-based experiment, according to this summary in Science Daily: “Six months of road testing in a diesel-powered Mercedes-Benz automobile showed that the device increased highway fuel [economy] from 32 miles per gallon to 38 mpg, a 20 percent boost, and a 12-15 percent gain in city driving.” While the device is still being modified and tested, Temple has already licensed the technology to California-based Save The World Air, Inc., which plans to use it in diesel trucks. Copyright © 2008 | Distributed by Noofangle Media
<urn:uuid:fb09083d-bd2b-4a11-b5d6-36662ec4dd39>
{ "date": "2014-09-02T01:49:22", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921318.10/warc/CC-MAIN-20140909055359-00495-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9343143701553345, "score": 3.296875, "token_count": 357, "url": "http://www.greenrightnow.com/keye/2008/10/09/using-electrical-fields-to-boost-auto-efficiency/" }
Places of Interest nearby Location address: Deutschland, Günzburg Number of texts: 1 The Iller-Lech Plateau , also known as the Upper Swabian Plateau , is one of the natural regions of Germany. In the northwest the Iller-Lech Plateau borders on the Swabian Jura and, in the extreme northeast, on the Franconian Jura . The boundary with these two natural regions is roughly formed by the course of the river Danube.
<urn:uuid:9470ecbc-6477-4b86-88d5-1ab512b45ae0>
{ "date": "2017-04-29T02:23:52", "dump": "CC-MAIN-2017-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123172.42/warc/CC-MAIN-20170423031203-00472-ip-10-145-167-34.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9284113049507141, "score": 2.59375, "token_count": 107, "url": "https://www.routeyou.com/en-de/location/view/48857296/iller-lech-plateau" }
Spider Man, it seems, got it wrong. By the end of the decade, humans might well be able to climb like insects up the face of any building. Yet the inspiration behind such wall-scaling technology will not be spindly-legged arachnids, but rather hairy-toed geckos. In this month's issue of Nature Materials, a team of scientists reports that it has prodcued a dry, glueless adhesive that would allow humans to scurry across the living-room ceiling - supported solely by the feeble molecular attractions that occur every time two objects touch. There is more work to be done before "gecko tape" is ready for human use. The first piece is smaller than a postage stamp and can only hold a Spider-Man action figure to the underside of a piece of glass. But the promises are astounding: from gecko gloves to easy-peel bandages to one-sided velcro. Now, scientists believe they have passed perhaps the most significant stumbling block. "There are technological challenges, but I see them only as challenges," says André Geim, a physicist at the University of Manchester in England and author of the new study. "There is nothing that is fundamental ... that could stop us from achieving this." How gecko tape works is a glimpse into what was - until recently - a mystery of modern biology. Scientists previously assumed that geckos used some sort of sticky residue or suction to scuttle across sheer glass. Three years ago, though, a team of biologists discovered that geckos used something far more unusual: molecular attraction. Weak molecular forces, called van der Waal forces, attract any two touching objects to one another. These forces are so small they usually go unnoticed. When a human puts his hand against a wall, for example, it doesn't stick because only a small fraction of the hand touches the wall - perhaps several thousand points of contact. The feet of geckos have billions of microscopic hairs per square inch, with anywhere from several to thousands of split-ends touching any surface. The resulting molecular forces are strong enough to defy gravity. The plastic hairs on Dr. Geim's gecko tape are not nearly as concentrated as the hairs on a gecko's feet. But he says that bigger strips of his gecko tape have the potential to harness van der Waal forces to hold up larger things - like humans. "We have shown that this mechanism is scalable," he says, whereas the mechanism for insects is not. The effort is just one example of research in the field of biomimicry, where scientists examine conch shells for ways to improve tank armor and analyze spider webs to create stronger construction materials. However, it is uncertain when gecko tape will be strong enough to help rock climbers scale mountains or window-washers cling to skyscrapers. For one, Geim's gecko tape is too small. A Spider Man wannabe that sought to hang from the ceiling would need at least a hand-size swath of tape. Geim's small piece of tape is only as sticky as Scotch Tape and costs $500 (See Editor's note below). Moreover, the tape is about as durable as a croissant. Geim speculates that a student could take two or three paces up a wall before the tape began falling apart. Scientists' next goal is to find a material that is durable - strong enough to keep the hairs from becoming tangled, yet flexible enough to ensure the hairs stick to any surface. "There's a long way to go," says Robert Full, a biologist at the University of California at Berkeley who helped to unravel the gecko climbing mystery in 2000. "[But] the biological inspiration is going to work." He envisions robots that can go anywhere on their gecko-like feet; bandages that won't hurt to remove; and a more efficient way to handle computer chips in vacuum environments, where sticky residues can't be used. "It's revolutionary at all scales," Dr. Full says. "What takes longer is that we want to move bigger things, but that's not far off - maybe five years." (Editor's note: The original version of this story misstated the cost of the scientists' small piece of gecko tape.)
<urn:uuid:039aadec-f3b9-489a-8a55-a8f6ab1df58c>
{ "date": "2019-08-25T01:12:03", "dump": "CC-MAIN-2019-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027322160.92/warc/CC-MAIN-20190825000550-20190825022550-00016.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9568190574645996, "score": 3.453125, "token_count": 887, "url": "https://www.csmonitor.com/2003/0605/p01s04-stss.html" }
The Shedd Aquarium provides numerous volunteer and educational programs for students interested in marine biology. Makenna Andersen, a senior at St. Charles East High School, spent a week aboard a Shedd research boat near Bimini Island in the Bahamas. Andersen and nine other high-schoolers spent hours snorkeling, collecting data and understanding what marine biologists do. Sadie Norwick, the manager of learning programs at the Shedd Aquarium, said the mission of the trip is to connect the students to animals in the natural world. She said before the students go, they have a one-week crash course in marine biology, and after the trip the students share their data and findings in the form of posters and presentations at the Shedd Aquarium. Andersen said that her experience as a physical education leader at school provided her previous swimming experience, and the constant diving did not trouble her. Part of the research involved using beach seines, which involved dragging nets through the sand to temporarily catch and record data about marine animals. Andersen said the best part of the trip was seeing unusual wildlife, such as the four manta rays that visited their boat. Apart from the flora and fauna, Andersen said the chef on the boat sometimes cooked local cuisine and gave the students Caribbean meals, including Bimini bread and lionfish. She also said that Bimini had undergone heavy construction to deepen the bay and construct a golf course at the expense of the marine wildlife. Andersen said while she was still thinking about her college choices, the trip had definitely solidified her interest and pursuit in marine biology. To learn more about a petition related to what is happening in Bimini, visit www.change.org and search for “Bimini.”
<urn:uuid:d84e4400-b287-4305-a21c-3c2cf8f4b650>
{ "date": "2016-09-25T02:05:55", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659753.31/warc/CC-MAIN-20160924173739-00123-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9669600129127502, "score": 2.859375, "token_count": 364, "url": "http://www.kcchronicle.com/2014/07/24/shedd-aquarium-gives-students-volunteer-opportunties/ah6dm4n/" }
Many of the 5000 decorative bindings in this collection depict women or girls. The site also offers lesson plans covering women's history and women writers, and the historical essay, "From Domestic Goddesses to Suffragists: The Story of Women Told... Watch Blanche Wiesen Cook's interviews with athletes (Jane Katz and Eve Ellis); authors (Kathy Engel, Erica Jong, and Grace Paley); historians (Alice Kessler-Harris and Ellen Schrecker); journalists (Claudia Dreifus, Amy Goodman, and Ruth Gruber);... Jewish women; Women athletes; Women authors; Women historians; Women journalists; Women musicians Highlights include correspondence with Lydia Maria Child and Amy Post; Jacobs' appeal for aid for the Savannah Freedmen's Orphan Asylum; and "Advertisement for the capture of Harriet Jacobs. American Beacon, Norfolk Virginia, July 4, 1835. African American women authors; Women slaves; Women social reformers Display a larger image and more item information when the pointer pauses over a thumbnail
<urn:uuid:f5e5165c-0e3e-4db7-9da0-2b1d5bf37a5d>
{ "date": "2015-04-26T05:41:58", "dump": "CC-MAIN-2015-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246652631.96/warc/CC-MAIN-20150417045732-00209-ip-10-235-10-82.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8516726493835449, "score": 3.078125, "token_count": 210, "url": "http://digital.mtsu.edu/cdm/search/collection/women/field/descri/searchterm/Amy" }
Click on the link below for a downloadable [PDF] of this information: HPRC Dietary Supplement Classification System: Sports Gels Sports gels are designed to deliver a substantial amount of carbohydrate in a compact and easily transported form, providing a large fuel boost in a single serving. Most of these are a viscous liquid, although chewable gels also exist. Products currently on the market typically have around 20 to 30 g of carbohydrates per serving (serving size is about 30-50 g), but commercial recipes change frequently. Ingesting sports gels with water has been shown to help maintain blood glucose levels during exercise1-3 and improve exercise performance.1 However, if not used properly, sports gels can cause gastrointestinal distress. Because all sports gels are rich in carbohydrates, the body absorbs them very slowly. An adequate amount of water must be consumed with the sports gel to dilute it, lowering the osmolarity of the combined solution and increasing the absorption rate. Drinking an electrolyte replacement drink instead of water with a gel will result in improper dilution and slow absorption, as cellular fluids are drawn upon to dilute the gel, resulting in stomach irritation and dehydration.2 So although it appears that gels may be an efficient, effective way to provide energy for exercise, they come with the major concern of simultaneously taking in enough water for them to be properly absorbed. Virtually all sports gels have two or more of the following: maltodextrin (a starch product rapidly absorbed as glucose), sugars, and caffeine (as much as 100 mg from various sources). The first two are the primary sources of carbohydrate. Other ingredients are highly variable and may include forms of sodium (salt), potassium, vitamins (A, C, E, B1, B2, B3, B5, B6, and/or B12), amino acids, fruit juice concentrates, taurine, ginseng, quercetin, etc. The gel consistency often comes from tapioca syrup. Dose Range and Upper Limit Food and Nutrition Board DRI: RDA/AI: Not relevant due to variations and combinations of ingredients. However, the RDA for carbohydrate (including sugars) is 130 g/d for both men and women ages 19-50.4 For sodium and potassium, the AIs are 1.5 g/d and 4.7 g/d, respectively.5 Information on DRIs for caffeine, vitamins, amino acids, and quercetin are discussed in separate monographs. Upper Limit: Not relevant due to variations and combinations of ingredients. No UL has been established for carbohydrate or potassium; for sodium it is 2.3 g/d.5 Doses Used in Randomized Clinical Trials: “An energy gel composed of 25 grams of CHO taken with 200 ml of fluid was able to maintain blood glucose levels during a two hour run at 70% VO2max when compared to a placebo.”2 Toxicology Data: No data found. Benefits and Risks Evaluation of Potential Benefits Sports gels provide quick sources of carbohydrates before and during exercise to help maintain blood glucose levels and improve performance.1-3 Potential Detrimental Effects on… Military Performance: Gastrointestinal intolerance may occur due to concentrated carbohydrate load, especially if consumed without adequate water or with a sports drink instead of water.2 Military Survivability: No data found. Other Health Risks Use of sports gels may lead to overconsumption or over-reliance on low-nutrient carbohydrate sources.2 In general, they do not contain significant amounts of other required nutrients, and some contain caffeine and herbs that may produce unwanted effects, so it is important to read labels for nutritional content, instructions for use, and possible warnings. Interactions with Medications or Other Bioactive Substances No data found. However, some ingredients may have interactions when taken individually. For details of potential interactions associated with individual ingredients, visit the Natural Medicines Comprehensive Database.6 No data found. Concern and Benefit Estimate (see Dietary Supplement Risk Matrix) Benefit potential: Moderate Risk (safety concern): Minimal Classification score: 3 Sports gels are designed to provide convenient means to obtain carbohydrates, but they must be consumed with water to avoid potential gastrointestinal distress. They should not be combined with sports drinks, as this could result in overconsumption of concentrated carbohydrates. - Campbell C, Prince D, Braun M, Applegate E, et al. Carbohydrate-supplement form and exercise performance. Int. J. Sport Nutr. Exerc. Metab. 2008;18(2):179-90. - Deuster P, Maier S, Moore V, Paton J, et al. Dietary Supplements and Military Divers A Synopsis for Undersea Medical Officers. 2004. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA511570&Location=U2&doc=GetTRDoc.pdf. - Patterson SD, Gray SC. Carbohydrate-gel supplementation and endurance performance during intermittent high-intensity shuttle running. Int. J. Sport Nutr. Exerc. Metab. 2007;17(5):445-55. - Panel on Micronutrients, Panel on the Definition of Dietary Fiber, Subcommittees on Upper Reference Levels of Nutrients, Subcommittee on Interpretation and Uses of Dietary Reference Intakes, et al. Dietary Reference Intakes for Energy, Carbohydrate, Fiber, Fat, Fatty Acids, Cholesterol, Protein, and Amino Acids (Macronutrients). Washington, DC: Food and Nutrition Board, Institute of Medicine, National Academy of Sciences; 2005. - Panel on Dietary Reference Intakes for Electrolytes and Water, Standing Committee on the Scientific Evaluation of Dietary Reference Intakes. Dietary References Intakes for Water, Potassium, Sodium, Chloride, and Sulfate. Washington, DC: Food and Nutrition Board, Institute of Medicine, National Academy of Sciences; 2005. - Jellin J, Gregory, PJ, eds. (Various). Natural Medicines Comprehensive Database 2011; http://www.naturaldatabase.com.
<urn:uuid:fd3bf1fd-64e9-4b70-b2d0-6f284edea1f4>
{ "date": "2017-04-25T10:35:36", "dump": "CC-MAIN-2017-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120338.97/warc/CC-MAIN-20170423031200-00587-ip-10-145-167-34.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8702427744865417, "score": 2.546875, "token_count": 1297, "url": "http://hprc-online.org/dietary-supplements/dietary-supplement-classification-system-1/class-3-supplements/copy_of_branched-chain-amino-acids" }
Maps and Flags Above is just a small part of our gift-packed souvenir stamp-collection; inquire by email if the picture or subject of your interest is not here: we will be obliged to accomodate your wishes. A flag is a piece of cloth, often flown from a pole or mast, generally used for signalling or identification. The design of a flag displayed in another form is also referred to as a flag. The first flags were used to assist military coordination on battlefields, and flags have evolved into a general tool for rudimentary signalling and identification, especially in environments where communication is similarly challenging (such as the maritime environment where semaphore is used). National flags are potent patriotic symbols with varied wide-ranging interpretations, often including strong military associations due to their original and ongoing military uses. Flags are used in messaging or advertising, or for decorative purposes, though at this less formal end the distinction between a flag and a simple cloth banner is blurred. The study of flags is known as vexillology, from the Latin vexillum meaning flag or banner. Although flag-like symbols have been used by ancient cultures for thousands of years, the origin of flags in the modern sense is a matter of dispute. Some believe flags originated in China, while others hold that the Roman Empire's vexillum was the first true flag. Originally, the standards of the Roman legions were not flags, but symbols like the eagle of Augustus Caesar's Xth legion; this eagle would be placed on a staff for the standard-bearer to hold up during battle. But a military unit from Scythia had for a standard a dragon with a flexible tail which would move in the wind; the legions copied this; eventually all the legions had flexible standards ― our modern-day flag. During the Middle Ages, flags were used mainly during battles to identify individual leaders: in Europe the knights, in Japan the samurai, and in China the generals under the imperial army. From the time of Christopher Columbus onwards, it has been customary (and later a legal requirement) for ships to carry flags designating their nationality; these flags eventually evolved into the national flags and maritime flags of today. Flags also became the preferred means of communications at sea, resulting in various systems of flag signals; see International maritime signal flags. Beginning in the 17th century, European knights were replaced by centralized armies, and flags became the means to identify not just nationalities but also individual military units. Flags became much more elaborate, and were seen as objects to be captured or defended. Eventually these flags posed too much danger to those carrying them, and by World War I these were withdrawn from the battlefields, and have since been used only at ceremonial occasions. The above explanation comes from 出典: フリー百科事典"ウィキペディア"
<urn:uuid:5a16874c-9615-4b9d-9645-a996222334ec>
{ "date": "2018-01-21T16:32:29", "dump": "CC-MAIN-2018-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890795.64/warc/CC-MAIN-20180121155718-20180121175718-00056.warc.gz", "int_score": 4, "language": "en", "language_score": 0.7581275701522827, "score": 3.796875, "token_count": 587, "url": "http://deshima.co.jp/html/stamps/htm/cmap.html" }
I first heard about the Tolpuddle Martyrs on Blue Peter. In the days of Valerie Singleton, John Noakes and Peter Purves, Blue Peter was a source of all sorts of interesting information which I still remember today. It was 1834, just after the Captain Swing riots, and a group of men in Dorset decided to form a trade union to protest about their low wages - they were getting 6/- a week at that time. It was called the Friendly Society of Agricultural Labourers. Forming a trade union was legal - but they were arrested for swearing an illegal oath when they joined. The law that was used had actually been passed to deal with the naval mutiny of 1797, and had never been repealed. The jury at the trial was packed with landowners and magistrates who opposed the rights of working men to band together to negotiate a fair wage, and the six men were transported to Australia. And then there was a public backlash against the severity of the sentence. Petitions were signed (with 800,000 signatures), there was a protest march - 30,000 people marching up Whitehall, and most of the men were freed and were able to return home. There's now a Tolpuddle Martyrs Museum, and there's a festival in the village every year to commemorate the men, usually the third week in July - so just around now. People like Tony Benn and Billy Bragg have attended, because of the importance of the Martyrs to the history of the trades union movement. The website is www.tolpuddlemartyrs.org.uk
<urn:uuid:108fcddd-496a-4024-b288-cd31e668b1b4>
{ "date": "2017-09-21T12:04:51", "dump": "CC-MAIN-2017-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687766.41/warc/CC-MAIN-20170921115822-20170921135822-00616.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9910760521888733, "score": 2.59375, "token_count": 326, "url": "http://morwennatower.blogspot.com/2014/07/the-tolpuddle-martyrs.html" }
How are you going to put Tybalt on trial? He's in the tomb. Hum... Anyway, both of these characters contribute to the age-old feud for which no one remembers the cause. Of course, Juliet lives in a patriarchal (male run society as opposed to matriarchal--female run) society. The men rule the roost. Women obey their fathers and brothers (and other male relatives) until such time they are married, then they obey their husbands, etc. Tybalt, then, can bear the brunt of the blame since he is more hot-headed and passionate for the feud than most other characters. He was ready to take Romeo down at the masquerade, and then after him from scene to scene up to his death. He also kills Mercutio, who is Romeo's true friend. Romeo responds (as anyone who is egged on to fight will) by challenging Tybalt despite the Prince's edict. Tybalt just kept picking at the scab...he never let the sore heal properly. This is a good point to bring up in your trial. A case can be made that the only people who caused Romeo and Juliet's deaths are the two of them. Another case can be made that the Nurse and Friar are to blame for the young lovers' deaths. In fact, there is a more direct connection between the two counselors (one who helped Juliet marry a sworn enemy without telling her mother and one who not only conducted the marriage but also contrived to allow Juliet to escape her parents, allowing them to think she was dead). It might make an interesting argument that Tybalt and Lady Capulet may have had a hand in the deaths but that others were more to blame. In the end, it is the patriarchal feud which is to blame, and that means the two Lords are on the same list as Friar and the Nurse. All four of those names are higher on the blame list than Tybalt and Lady Capulet. With both of them, you can just say that they are forced to do what they do by the demands of a patriarchal society. Lady Capulet is not at fault -- she is just doing what her husband says. In a patriarchal society, she has little choice. Tybalt is just defending the honor and virtue of his kinswoman. In a patriarchal society, a woman's chastity and her obedience to her father (when she is not yet married) are of paramount importance. He is simply trying to prevent an outsider (Romeo) from potentially taking away Juliet's chastity and making/helping her disobey her father.
<urn:uuid:e1c3adb6-a3ec-4891-8bc2-cda605644849>
{ "date": "2017-06-26T00:12:59", "dump": "CC-MAIN-2017-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320595.24/warc/CC-MAIN-20170625235624-20170626015624-00657.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9813435673713684, "score": 2.625, "token_count": 538, "url": "https://www.enotes.com/homework-help/really-need-help-how-do-defend-tybalt-lady-401137" }
Sanctuary to save old tigers from poachers Wildlife authorities in eastern India are setting up a special reserve for tigers who can no longer hunt - in order to slow the endangered animal's rapidly declining population. The reserve, which will be in one of the world's largest mangrove forests in the Sundarbans Delta about 100km south of Calcutta, will serve as a rehabilitation centre for the sick and ageing tigers. The chief conservator of the Sundarbans forest, Atanu Kumar Raha, said tigers that could no longer catch prey because of their age or injuries would be moved to the sanctuary, where they would be safe from poachers. 'It will be like an old-age home for the tigers. We will develop it as a natural habitat for them so that the animals do not feel that they are in captivity,' he said. India's wild-tiger population has dwindled rapidly in recent years, prompting an international outcry among conservationists. While the tigers numbered an estimated 40,000 a century ago, the official estimate of the population of India's national animal has dropped to 3,700. Conservationists say, however, that there are now probably no more than 2,000 tigers in India. In an open letter to Prime Minister Manmohan Singh last month, the head of the UN Convention on International Trade in Endangered Species, Willem Wijnstekers, wrote that while India was a signatory to the convention, the sluggishness with which it was implementing anti-poaching measures was undermining its stated commitment to the treaty. Mr Raha said weakened animals will be fed and given veterinary treatment while in the reserve, with those recovering their health later being released back into the wild.
<urn:uuid:bff6de6b-bece-40d0-9018-08216aba9203>
{ "date": "2016-08-29T22:20:26", "dump": "CC-MAIN-2016-36", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982967784.68/warc/CC-MAIN-20160823200927-00216-ip-10-153-172-175.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9578062295913696, "score": 3.109375, "token_count": 358, "url": "http://www.scmp.com/article/502353/sanctuary-save-old-tigers-poachers" }
1. In which country is Act I set? 2. In what building does Act I take place? 3. What separates the two terraces in the first scene? 4. What time of day does the first act take place? 5. What time is it, specifically, at the top of Act I? 6. What is heard off-stage when the play starts? 7. In Act I, where do the honeymooning couples plan to spend their first night together? 8. What is Sibyl's nickname for Elyot? 9. What is the view from the terrace? This section contains 5,543 words (approx. 19 pages at 300 words per page)
<urn:uuid:dc914bf4-8aed-422d-8399-9b5ad6413658>
{ "date": "2016-10-21T21:57:25", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00386-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9433478116989136, "score": 2.734375, "token_count": 151, "url": "http://www.bookrags.com/lessonplan/privatelives/shortanswer.html" }
1.Kitty has three cousins. ______ of them like playing football. A. Other B. All C. Both D. Either 2.—Here is a schoolbag. Whose is it —Oh, it’s _______ Thank you. A. my B. mine C. me D. I 3.—_______ is this pen? —It’s mine. A. What B. Whose C. Where D. How 4.This is ______ key and that is ______ eraser. A. a; a B. a; an C. an; a D. an; an 5.There’s ______ water in the cup. A. lot of B. a lot of C. many D. a lot 6.Jim’s book is new. What about ______? A.your B.him C.her D.mine 7.A man is talking to a woman________ the lost and found office. A. to B. in C. at D. on 8._______people come here every day. A. Hundreds B. Hundred of C. Hundreds of D.A hundred of 9.______ you ______ your gloves A.Are;look for B.Are;looking for C.Do;looking for D.Is;looking for
<urn:uuid:510d585f-8814-46ec-aace-bda6f2b03a30>
{ "date": "2019-02-17T18:51:24", "dump": "CC-MAIN-2019-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482347.44/warc/CC-MAIN-20190217172628-20190217194628-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.6737955808639526, "score": 2.828125, "token_count": 334, "url": "http://www.21cnjy.com/H/4/48926/4589742.shtml" }
Twisting Prominence Eruption (May 1, 2009) SOHO captured a fairly large prominence eruption over an 8-hour period (April 23, 2009). The prominence rose up, twisted, and broke apart. At its greatest extension, it rose up about 25 Earth's high above the solar surface. The eruption was observed by the EIT instrument in extreme ultraviolet wavelength at 304 Angstroms. Prominences are cooler clouds of gas that are relatively unstable. They are tethered above the Sun by magnetic forces and on occasion can be seen breaking away for reasons not yet fully understood. SOHO began its Weekly Pick some time after sending a weekly image or video clip to the American Museum of Natural History (Rose Center) in New York City. There, the SOHO Weekly Pick is displayed with some annotations on a large plasma display. If your institution would also like to receive the same Weekly Pick from us for display (usually in Photoshop or QuickTime format), please send your inquiry to [email protected].
<urn:uuid:5ca6eed9-b50f-4b7c-80ec-4678a0206b2a>
{ "date": "2015-10-13T08:56:11", "dump": "CC-MAIN-2015-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738004493.88/warc/CC-MAIN-20151001222004-00004-ip-10-137-6-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9199517965316772, "score": 2.890625, "token_count": 214, "url": "http://sohowww.nascom.nasa.gov/pickoftheweek/old/01may2009/" }
"Array of 2n elements is given, and out of this n elements are same, and remaining are all different. Find the element that repeats n time." This can be done in O(n) with the following algorithm: 1) Iterate over the array, checking to see if any elements [i] and [i+1] are the same. 2) Iterate over the array, checking to see if any elements [i] and [i+2] are the same. 3) If n = 2 (and thus length = 4), check if 0 and 3 are the same. Call the matching elements m and the non-matching elements r. For n = 2, we can construct mmrr, mrmr and mrrm - so we must check for gap size 0, 1 and the only place we can have gap size 2. For n > 2, we cannot construct the array with no gaps of size 0 or 1. For example for n = 3, you have to start like this: mrrmr... but then you must place an m. Similarly for n = 4, mrrmrrmm - having no gaps of size 0 or 1 would require ms to be outnumbered by rs by more and more as n increases. Proving this is easy.
<urn:uuid:ca85dfe6-f0e5-4888-95b2-f9c4dd638a33>
{ "date": "2014-12-27T06:54:19", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447550643.22/warc/CC-MAIN-20141224185910-00099-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8876113891601562, "score": 3.09375, "token_count": 270, "url": "http://stackoverflow.com/questions/16872510/calculate-majority-element-in-an-array/16872636" }
Pregnancy is a rewarding as well as a tough stage for women. The nine month period brings about sea of changes in women many of which are positive and some negative. Such changes prevail on the pregnant women right from the day one of pregnancy till the birth of the baby. While hormonal fluctuations cause such changes, some pregnant women experience accumulation of liquids in the joints and joint pains while some experience breathing problems even at the slightest instant. The positive aspect to pregnancy in women is the faster rate of nail and hair growth owing to the iron and calcium supplements that are administered on them. Taking medical tests during the complete tenure of pregnancy is important and tests for each trimester changes. The Tests To Be Taken During The Second Trimester Are Given Below: 1. Routine Screenings & Tests There are some regular tests that are taken on all pregnant women like Pap smear tests, test to check for diseases like Gonorrhea and Chlamydia that are sexually transmitted. Blood test will be taken to ascertain Blood type, Anemia levels, HIV, Syphilis and Hepatitis B, to ascertain body’s immunity levels for Varicella and Rubella and Cystic Fibrosis. While these are done to ascertain the initial level health, Urine tests, Blood Test and weight will be checked during every visit to the Doctor till delivery. 2. Multiple Marker Screening Between the 15th to 20th weeks Multiple Marker Test is taken on the pregnant women. This test is addressed in many names like Maternal Serum Screening and Maternal blood screening. This test measures a number of things and based on the same they are referred to as Triple marker tests or Triple Screen tests. When Inhibin A is measured through the tests, they are termed as Quadruple Marker Test or Quadruple Screen Test. These tests are taken to ascertain if a woman is carrying a healthy fetus or an affected one. Ultrasound scans are usual prenatal care tests where sound waves are projected on the baby inside the mother’s womb to ascertain the right position and structure of the baby. The other names with which Ultra Sound is referred to as are Sonograph, Sonogram and Ultra sonogram. Ultrasound test is taken to ascertain pregnancies in the outer area of the Uterus if any, delivery date, number of fetuses in the womb, normalcy of the fetal heartbeat, fetal growth and kidney or gastrointestinal malfunctioning. 4. Glucose Screening This test is typically done between the 24th to 28th months of Pregnancy to ascertain if the mother has acquired gestational diabetes so medication can be initiated accordingly to protect the baby from possible risks due to the same. Women who have high risk pregnancies may be tested for this earlier to avoid taking any risk. The test is performed in an hour’s gap after making the pregnant women drink some liquid high in sugar. If the sugar level is high, then you will be made to drink glucose solution in an empty stomach and blood tests taken once in 3 hours till the symptoms get normal. 5. Amino Centesis Usually the fluid that surrounds the baby is highly amniotic providing genetic information that is vital to the entire process. The test is done to ascertain the possibility for any structural defects like Spinabifida or Down syndrome and congenital heart or kidney ailments in the fetus. The other ailments that get ascertained through such tests are Anencephaly, Phenylketonuria a type of disorder that is metabolic in nature, ailments that are usually inherited, heart disorders and Palate. 6. Percutaneous Umbilical Blood Sampling (PUBS) This test is usually done by the Doctors if they are not satisfied with the Ultrasound and Amniocentesis test results. A needle is inserted in to the umbilical Cord and blood collected through which observations pertaining to chromosomal defects or chromosome related disorders is done. When the fetus has any chromosomal deficiencies that are fatal can be quickly found and protective steps taken in the right time. 7. Fetal Doppler Ultrasound This test is performed on the mother to ascertain the heart rate of the fetus, its breathing pattern and movements and viscosity of the blood. The umbilical arteries and veins are thoroughly scanned for any abnormalities in the fetus. This test is performed using an instrument called Fetoscope either to evaluate the abnormalities in the fetus or to treat the fetus for abnormalities found in it. Some fetal abnormalities evaluated or treat through Fetoscopy are Congenital Diaphragmatic Hernia, Urinal Tract obstruction, Twin Transfusion syndrome and Acardiac Twin. This test is done in two methods. One is External Fetoscopy and Endoscopic Fetoscopy.
<urn:uuid:d70faf22-b4af-463c-a2a0-3138cd8b98ff>
{ "date": "2017-10-23T17:15:02", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826210.56/warc/CC-MAIN-20171023164236-20171023184236-00856.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9179344177246094, "score": 2.734375, "token_count": 974, "url": "http://www.pregnancyxp.com/second-trimester-tests-during-pregnancy/" }
Hello-World has a wide variety of language learning activities designed especially for children and the way children learn. Arrange: Drag the pictures in to place. From biggest to smallest; Oldest to youngest, children learn to compare things. Balloon Games: The balloon game introduces vocabulary words one at a time. Bingo: Choose one of the 80 vocabulary categories and click the picture that matches the sound. Get Bingo with 5 in a row. Children: These activities are especially for the youngest children: 2 to 4 (Conversations Dialogs): There are about 60 different dialogs. The animated speakers talk about topics like homework, lessons, greetings, and everyday life for a child. The Dictionary: Our talking picture dictionary has thousands of words. Lessons: Topics that have many different activites are grouped as lessons. Learn main concepts: The alphabet, counting, directions, the calendar, telling time, and weather are all included. Logic puzzles: Children listen to the clues to solve the puzzles. Maps: Maps of the world show countries, the people, the capital, the flag, and the language spoken. Matching: Children must match animals to what they eat, clothes to parts of the body, food and where it comes from, and more. Memory: You can select a vocabulary topic, one or two players and level of difficulty. Uncover two cards to see a picture and hear the word. Move the mouse: Teaches children to move the mouse. Especially for ages 2 to 3. Nouns and pronouns: This section includes the words for I, you, he, she, it as well as the reflexive pronouns: myself, yourself, etc. Puzzles: Each puzzle piece is a word. Number of pieces ranges from 4 to 10. For ages 3 and up. Science: Children learn about the solar system and a few other topics. These lessons teach the words and phrase in the new language they are learning. Songs: The songs vary from language to language. Even babies can enjoy these animated songs. Spelling: The spelling games show a picture and spell the word one letter at a time. Then the letters are scrambled and they have to drag them into place. Tic-tac-toe: One or two players can play the tic-tac-toe games. You have to know the vocabulary to get tic-tac-toe. Verbs: Native speakers have translated and recorded hundreds of verbs. Words: Native speakers have translated and recorded thousands of words.
<urn:uuid:ec9ccd1f-f185-473d-b437-7e92e7178a61>
{ "date": "2014-07-22T15:12:24", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997858962.69/warc/CC-MAIN-20140722025738-00208-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9038192629814148, "score": 3.859375, "token_count": 534, "url": "http://www.hello-world.com/learn/index.php/?fun=pattern.php" }
Looking at the Past to Understand the Future: Analyzing Irony in the Opening Page Lesson 2 of 10 Objective: SWBAT propel conversations by posing and responding to questions that relate to current discussion to broader themes by connecting our society to that in Fahrenheit 451. Today we start our last text together: Fahrenheit 451. At the beginning of class, I set a challenge to the class. As a department, we have debated whether freshmen are ready for the abstract complexities of this text and many of my colleagues want it to be a junior year text. Each of us had made concessions, and I continue to read Fahrenheit with my honors freshmen. But at the beginning of the unit, I tell them that some English teachers worry that aren't intellectually prepared to read it and that we need to prove them wrong. Cheap ploy? Maybe, but it raises the stakes and motivates the class. Learning about the 1950s For homework, students spent time researching the 1950s. We will begin by reviewing their work. I will just ask students to share interesting things they discovered about this time period and I will try to supplement additional information (SL.9-10.1a). For instance, it is inevitable that someone will bring up the inception of the television in every living room. I will use that detail to talk about what those tvs looked like: a big box with a small screen. This addition will be important when we learn about Mildred's wall-TV units. The size increase and flattening of television sets could be described as a prophetic element of Bradbury's text. These small details-- the tv, the fear of the atomic bomb, the first credit card-- all help us understand the place from which the novel was written, but also where Bradbury saw society headed. Throughout our reading, I will ask students to question whether the society within the novel is more like Bradbury's or our's. This question, no matter the answer, encourages students to analyze and question the way we live. Before we begin reading, we will discuss the denotation and connotation of the title of Part 1: "The Hearth and the Salamander." Then we will read the first three paragraphs and pause. These first paragraphs are important to discuss because they set up the primary irony of the text: the protagonist is a fireman, but his job is to start fires and to burn down houses. Bradbury doesn't say this specifically, but it is implied in the description. We will go back through the lines and unpack the description, so that we understand. One way to unpack the text is to discuss the connotations of the word "burn," since the opening line informs the reader that "It was a pleasure to burn" (RL.9-10.1). What a great first sentence! Why is it so great? Do we ever think of burning in a good way? What does the statement imply about the protagonist? (RL.9-10.4 and SL.9-10.1c) After our discussion, we will read the next three paragraphs. These paragraphs are also beautifully descriptive and deserve attention. Here is an example of how we will begin the discussion (RL.9-10.4 and RL.9-10.5). I will start the discussion in class, but students will focus on these paragraphs for homework. For homework, student will pick, from the last three paragraphs we read, one sentence that they like. Then they will explain why they like it (W.9-10.2 and W.9-10.10). Maybe it sounds nice and they can explain what creates the pleasing quality. Maybe they like image it creates in their mind and they can try to explain what they see. Or maybe they can connect something from these paragraphs to something else they know. We will discuss their work tomorrow in class. * Note: I tag this task to W.9-10.2 because I see it as a mini-explanatory essay. The students do not write a complete essay, but must back up their explanation with evidence from the paragraphs that we read.
<urn:uuid:63b86c5d-6051-41b6-bf5e-ec64b092bc10>
{ "date": "2017-01-16T12:57:00", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279176.20/warc/CC-MAIN-20170116095119-00478-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9506120085716248, "score": 3.46875, "token_count": 842, "url": "http://betterlesson.com/lesson/603741/looking-at-the-past-to-understand-the-future-analyzing-irony-in-the-opening-page" }
Raise your hand if you're a combination knitter. You rebel, you! Have you ever compared the way you're knitting to other knitters? We all hold our yarn and needles a little differently, even if we learned from the same teacher. I recently noticed that one of my friends threads the yarn through four of her left-hand fingers and lets it flow right onto the tip of the needle rather than throwing the yarn like I do. Other knitters pick the yarn as they knit, and some might even knit a combination of several styles. Walk into any knitting group and you'll see dozens of variations of knitting, including a few combination knitters. Combination knitting, sometimes known as combined knitting, combines traditional Eastern and Western knitting methods to create an entirely different way of knitting. There are a few things that distinguish Eastern, Western, and combination knitting. One thing is how the knitter inserts the knitting needle into the stitches. Did the needle go through the front loop? Or did the knitter insert the needle through the back loop? How the knitter wraps the yarn around the tip of the needle -- clockwise or counter-clockwise -- is also an indication of the style. Let's take a look at the elements of all three types of knitting to get a better understanding of each style: - Worked in the front loops - Knit stitches are wrapped clockwise - Purl stitches are wrapped counter-clockwise This is probably the method you'll see most often in knitting -- especially in the United States. Western knitting involves working in the front loops of the stitches. The yarn for a knit stitch will be wrapped clockwise around the needle, while the yarn for a purl stitch will be wrapped counter-clockwise. - Worked in the back loops - Knit stitches are wrapped counter-clockwise - Purl stitches are wrapped clockwise So called because it is more common in Eastern European countries, as well as Arab and South American countries. Eastern knitters work in the back loop of the stitches. Wrapping the yarn to knit each stitch is exactly opposite of the Western style. Eastern knitters will wrap knit stitches counter-clockwise and wrap purl stitches clockwise. - Knit stitches are worked in the back loops - Purl stitches are worked in the front loops - Knit and purl stitches are wrapped clockwise Combination knitting combines Eastern and Western knitting. In combination knitting, the knit stitch is worked in the back loops, while the purl stitch is worked in the front loops. The yarn for both stitches is wrapped clockwise around the needle. A closer look at combining styles Mix and match! Now let's get crazy: did you know you can mix and match all these styles? Each knitting style has its own strengths and weaknesses, and you can learn how to take advantage of those strengths. To better understand the differences in Eastern and Western knitting, see our combined knitting tutorial. Be sure to come back to the Craftsy blog tomorrow for Free Pattern Friday!
<urn:uuid:588b6dc8-0a5d-4743-af9e-8eca89abff4b>
{ "date": "2016-07-01T04:35:12", "dump": "CC-MAIN-2016-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00088-ip-10-164-35-72.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9262280464172363, "score": 3.109375, "token_count": 627, "url": "http://www.craftsy.com/blog/2014/01/combination-knitting/" }
What is Proxy Server? One most common way to keep anonymous on the online world is through the utilization of a proxy server. A proxy server is defined as a machine which admits the incoming requests from the web and will be passed onto their destination. A proxy server is like the internet’s middlemen that maintain the separation of the computer and the destination web server. The proxy server can dwell inside the local computer of a user or at multiple points between the internet’s destination servers and a user’s computer. The types of proxy server are as follow: - The proxy server that forwards requests and replies unchanged is called as a tunneling proxy or usually a gateway. - Forward Proxy—is known as an Internet proxy that is utilized to recover from a variety of sources, most commonly from anywhere on the World Wide Web. - Reverse Proxy—usually, a reserve proxy is an internet proxy used to act as a front-end to protect and control accessing of the server from a private network. It as well performs tasks like verification, load-balancing, or decryption and so on. Two Main Purposes of a Proxy Server - For Performance Improvement. A proxy server can significantly improve the performance of a user’s computer in a way that it saves all the request results for a particular period of time. Just imagine the scenario where both users A and B access the WWW or World Wide Web using a proxy server. At first, user A requests for a particular web page, which you may call Page 1. Later in time, user B also requests for the same page. Instead of passing on the request to the Web server where Page 1 dwells—which is a time-consuming operation—what the proxy server does is to merely return Page 1 which is by now fetched for user A. This becomes a faster operation because oftentimes, a proxy server is on the similar network as its user. Authentic proxy servers maintained by a large number of users. - For Requests Filtering. A proxy server may be utilized in filtering the requests. For e.g., business companies may use the proxy server to avert its users from opening a certain set of websites. To make sure that your privacy is protected while using a proxy server, you must acquire one from the most trusted provider. Think whether you want to get public proxies which everybody uses or a private one which, of course, will cost you some money. If you go for the latter, ensure that the company from where your proxy server will come from is provided with a policy that states they do not collect log files, because if yes then your privacy is not that private anymore. Proxy servers are used for different advantages such as to share internet connections on a LAN or Local Area Network, implement access control on the internet, hiding an Internet Protocol address, accessing of blocked websites, speeding up of internet surfing and much more. Just be a responsible user in every single thing that you do on the web to enjoy the benefits at its best.
<urn:uuid:5098a69e-6b05-4687-84ec-b1e9fd834536>
{ "date": "2018-11-19T22:52:57", "dump": "CC-MAIN-2018-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746112.65/warc/CC-MAIN-20181119212731-20181119234731-00376.warc.gz", "int_score": 3, "language": "en", "language_score": 0.924280047416687, "score": 3.265625, "token_count": 618, "url": "https://whatis.techgrapple.com/internet/what-is-proxy-server/" }
Right Triangles and Trigonometry Introduction to : We organize our trigonometric measurements by comparing the sides of a right triangle, creating three trigonometric ratios: sine, cosine, and tangent. Looking at ∠A, we can see clearly which side is adjacent, which is opposite, and which is the hypotenuse. Using these terms, we can define our three basic trigonometric ratios. sin(A) = opposite / hypotenuse = a / h cos(A) = adjacent / hypotenuse = b / h tan(A) = opposite / adjacent = a / b An easy way to remember which ratio is which is to just remember what someone who stubbed their foot would do and say. They'd soak their toe and say, "Ahhh." Soak a toe, ahhh. SOHCAHTOA. Each letter stands for something: Sine: Opposite over Hypotenuse Cosine: Adjacent over Hypotenuse Tangent: Opposite over Adjacent It's important to know that these ratios depend on angles, not side lengths. That means it doesn't matter if a triangle is the size of Godzilla or the new iPod nano. If its angles are the same, it'll have the same trigonometric ratios. We could stare at these fractions all day, but the only surefire way to learn trigonometry inside and out is to practice. Are you ready for this? We'll start simple and find the sine, cosine, and tangent for ∠A of this triangle. That's all there is to it, putting one side over the other. For ∠B, though, these ratios would be different. Since these ratios never change for similar angles, we can use them to find the side lengths of similar triangles. That's kind of the whole point of trigonometry.
<urn:uuid:3f1d2e90-3d7a-42cf-8017-47a07ad9a7e9>
{ "date": "2015-02-01T19:53:03", "dump": "CC-MAIN-2015-06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122086930.99/warc/CC-MAIN-20150124175446-00213-ip-10-180-212-252.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.928596556186676, "score": 4.125, "token_count": 400, "url": "http://www.shmoop.com/right-triangles-trigonometry/trig-ratios-help.html" }
A novel class of synthetic molecules with the targeting and effector functions of antibodies were synthesized to induce a highly targeted immune response against prostate cancer. The study entitled “Chemically Synthesized Molecules with the Targeting and Effector Functions of Antibodies” was published in the Journal of the American Chemical Society by Patrick J. McEnaney part of Dr. David A. Spiegel’s group, and colleagues. The team engineered a class of new molecules, called synthetic antibody mimics (SyAMs) that bind simultaneously to unhealthy cells and cells from the immune system. This interaction leads to a very specific targeted immune response like the one seen with natural human antibodies. In this study the main focus was the use of SyAM molecules to target prostate cancer, termed SyAM-Ps, which recognize tumor cells by binding to a specific protein, the prostate-specific membrane antigen (PSMA), on the surface of the transformed cells, and to the Fc gamma receptor on the surface of the immune cell. This binding elicits a high selective cancer cell phagocytosis and consequently, the death of the malignant cell. “Unlike antibodies, however, our molecules are synthetic organic compounds that are approximately one-twentieth the size of antibodies,” said David A. Spiegel, a professor of chemistry at Yale in a press release. “They are unlikely to cause unwanted immune reactions due to their structure, are thermally stable, and have the potential to be administered orally, just like traditional, small-molecule drugs.” he added. Dr. Spiegel said that the process of synthesis and optimization of the synthetic antibody structure took substantial time and effort. Dr. Spiegel also added that the synthetic molecules with an intermediate size seem to be the best in targeting cancer cells and stimulating the immune cells. “It’s also noteworthy that molecules of such a small size can bring together two objects as enormous as cells, and trigger a specific functional response, entirely as a result of specific receptor interactions,” added Dr. Spiegel. Based on the study’s results, the team concluded that SyAMs have the advantage of being small biological molecules that overcome the negative effects associated with the standard treatments for cancer and other diseases, like HIV and various bacterial diseases.
<urn:uuid:e2e13b6d-dfcc-445f-879d-536c9cbb8042>
{ "date": "2017-06-25T10:22:11", "dump": "CC-MAIN-2017-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00417.warc.gz", "int_score": 3, "language": "en", "language_score": 0.955701470375061, "score": 2.5625, "token_count": 473, "url": "https://prostatecancernewstoday.com/2014/12/23/researchers-developed-novel-class-synthetic-molecules-target-prostate-cancer-cells/" }
A recent study out of the UK found that dogs may understand that humans cannot see in the dark, and they will take advantage of the lack of sight to sneak a treat. During the study 84 dogs were watched under varying light conditions. The lighting conditions were changed so that the person in the room was either illuminated or in the dark. The same lighting changes were done with food that the dogs were verbally commanded not to eat. Overall the study concluded that more often than not, dogs would wait until the person was in the dark and could not see to sneak some of the food. Traditionally people have thought that dogs learn from conditioning, such as commands, but this is not necessarily true. This study shows that dogs are aware of their environment, even when commands are given. We all know our dogs are smart, this study just suggest they might be smarter than we think! So next time you think your dog does not understand the commands you give him, just know that it could be he understands when you are not paying attention he might be able to get away with it.
<urn:uuid:8aea8a46-3dc2-4de4-8384-33ffb9071a4e>
{ "date": "2014-07-28T08:32:28", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510257966.18/warc/CC-MAIN-20140728011737-00282-ip-10-146-231-18.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9916335940361023, "score": 2.78125, "token_count": 216, "url": "http://www.baxterboo.com/fun/a.cfm/sneaky-k-9s" }
by David Bernstein, Volokh.com Doug Kendall of the Constitutional Accountability Center writes: “The Tenth Amendment, like all other Amendments, is a binding part of the Constitution that should be fully respected…. [But w]hen the states ratified the Constitution, they renounced their status as fully-independent sovereigns and endowed the federal government with enumerated but substantial powers.” Kendall is correct. Anyone, tea partier or not, who claims that the states retain full “sovereignty” after 1789 doesn’t know what he is talking about. Kendall’s next sentence, however, doesn’t follow at all: “The Tenth Amendment does not give tea partiers, or anyone else, a constitutional basis for rolling back critical laws that protect Americans’ health, safety, and retirement security.” Through the New Deal period, it was accepted that the states did retain an important element of sovereign power inherited from the British Parliament, the “police power.” The scope of the police power was subject to much debate, but it was typically thought to at least conclude the power to protect and promote state citizen’s health, safety, and morals. Progressive types argued that promoting the public’s “welfare” was also part of the police power.Details
<urn:uuid:a2568b66-ca2f-4408-bf4a-beae64a8954f>
{ "date": "2014-11-01T12:38:12", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637905860.51/warc/CC-MAIN-20141030025825-00099-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.954171359539032, "score": 3.453125, "token_count": 280, "url": "http://blog.tenthamendmentcenter.com/2011/09/01/" }
Estrogen is best known for its starring role in running the female reproductive system. Now, researchers in Japan think they've uncovered a new role for it in maintaining healthy blood in both sexes. They argue that estrogen might have potential for treating blood diseases such as leukemia and anemia. The hormone may be necessary for the production of blood platelets, according to a study in the 1 December issue of Genes and Development. Up to a trillion platelets reside in an adult's blood. By causing clotting at wounds, they are essential in stemming bleeding. Platelets are made by enormous megakaryocyte cells in bone marrow. These cells extend beaded strings of cytoplasm known as proplatelets, which break, releasing up to thousands of platelets. Understanding platelet formation has important clinical implications; too many platelets can cause excessive clotting, whereas too few increases the risk of fatal bleeding. It's clear that a gene called p45-Nfe2 turns on and off some of the genes involved, but researchers have struggled to work out the entire chain of events. Now, cell biologist Yuka Nagata of the Institute of Physical and Chemical Research (RIKEN) in Saitama, Japan, and her team think they may have filled in the gaps. The scientists first compared mouse megakaryocyte cells created from embryonic stem cells engineered to lack p45-Nfe2 with normal megakaryocytes. To their surprise, a gene called 3beta-HSD, which plays a role in synthesis of steroid hormones, was less active in the experimental cells. In normal megakaryocytes, 3beta-HSD boosts production of estradiol, the most common form of estrogen. The new finding suggests that p45-Nfe2 stimulates 3beta-HSD to produce estrogen, which in turn hikes platelet production. Indeed, another experiment in live mice showed that the estrogen-blocking drug tamoxifen slashed platelet counts by 45% within 9 days. Patients suffering from low-platelet-count diseases such as bone marrow abnormalities or those undergoing chemotherapy may benefit from treatment with estradiol, Nagata says. Conversely, patients with high platelet counts, prone to strokes and heart attacks, might be candidates for estrogen-blocking drugs, she says. This work has "uncovered an important piece of the puzzle" of how platelets form, says oncologist and developmental biologist Ramesh Shivdasani of Harvard Medical School in Boston, Massachusetts. Other genes are certainly also involved, he says. The next step, adds hematologist Ken Kaushansky of the University of California, San Diego, is to figure out exactly how estrogen leads to more platelets. However, the side effects of estrogen could hinder wide use as a treatment for platelet abnormalities, he warns.
<urn:uuid:e526cdc4-4ea5-4241-87d8-c36f8214224c>
{ "date": "2015-01-28T06:32:25", "dump": "CC-MAIN-2015-06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115862207.44/warc/CC-MAIN-20150124161102-00128-ip-10-180-212-252.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9418230652809143, "score": 3.546875, "token_count": 578, "url": "http://news.sciencemag.org/2003/12/estrogen-steps-platelet" }
South Carolina – State Symbols, Emblems, Nicknames South Carolina SC Facts & Firsts SC State Symbols, Emblems, Nicknames State Symbols, Emblems South Carolina has many state symbols of cultural and historical relevance to the state. Most have only recently been designated state symbols, although the state seal was first used in 1777. The state flag wasn't adopted for almost another century, when South Carolina seceded from the Union and desired a new flag. The 1900s saw the introduction of many new state symbols such as South Carolina's state tree in 1939, the state animal in 1972, and the state fruit in 1984. - SC Amphibian - Spotted Salamander - named the official state amphibian in 1999, following a year-long campaign by the third-grade class of Woodland Heights Elementary School in Spartanburg. - SC Animal - White Tailed Deer - can be seen bounding through South Carolina's woods year-round. They are plentiful in our state, and in 1972 the legislature named them the official state animal. - SC Beverage - Milk - there are around 90 dairy farms in our state. - SC Bird - Carolina Wren - known for nesting in unusual places such as bags, boxes, flower pots, and even shoes! – Mockingbird, 1939 – 1948 - SC Butterfly - Eastern Tiger Swallowtail - named for the long portion of their hind wings which resemble a swallow's tail feathers. Each of the fore wings of the Eastern Tiger Swallowtail has four black stripes resembling a tiger. - SC Fish - Striped Bass (Rockfish) - SC Flag - Note: No one knows for sure what the crescent on the caps of Moultrie's troops represented - SC Flower - Yellow Jessamine (pronounced "JES-uh-min" or "jaz'min") - SC Folk Art and Craft Center - South Carolina Artisans Center, Walterboro - SC Folk Dance - The Square Dance - SC Food (unofficial) - Grits - SC Fossil - Columbian Mammoth - the bill was signed in 2014 after the efforts of a third-grader from Lake City. In 1725, fossilized mammoth teeth were discovered in a SC swamp. - SC Fruit - Peach - We lead all southern states in peach production – including Georgia! – and are fondly called the "Tastier Peach State." - SC Grass - Indian Grass - SC Gemstone - Amethyst - several world-class amethysts have been discovered at the Ellis-Jones Mine in Abbeville County - SC Mace - Mace of the House of Representatives - SC Marine Mammal - Bottlenosed Dolphin - SC Migratory Marine Mammal - Northern Right Whale - SC Mottos - one motto is "Dum Spiro Spero," which is Latin for "While I Breathe, I Hope." The woman pictured to the right is the Roman goddess Spes, the goddess of hope. - Music - The Spiritual - SC Pledge - "I salute the flag of South Carolina and pledge to the Palmetto State love, loyalty and faith." - SC Poet Laureate (current) - Marjory Wentworth Previous Poet Laureates: – Bennie Lee Sinclair, 1986-2000 – Grace Beacham Freeman, 1985-1986 – Ennis Rees, 1984-1985 – Helen von Kolnitz Hyer, 1974-1983 – Archibald Rutledge, 1934-1973 - SC Popular Music - Beach Music - originated around the time of the second World War, and has come to be regarded as synonymous with the official state dance, the Shag. - SC Tartan - Carolina Tartan - SC Tree - Sabal Palmetto (Cabbage Palmetto) - the flexibility of its trunk, together with its strong root system, enable the palmetto to withstand the fierce winds that so often strike our coastline. - SC Waltz - The Richardson Waltz - SC Wildflower - Goldenrod - SC Wild Game Bird - Wild Turkey - these turkeys are very good fliers. Even though they fly relatively close to the ground and only for short distances, they can reach speeds of up to 50 miles per hour!
<urn:uuid:1674c4e6-804f-46fc-8be8-0e456da71b39>
{ "date": "2015-04-18T15:06:23", "dump": "CC-MAIN-2015-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246635547.24/warc/CC-MAIN-20150417045715-00172-ip-10-235-10-82.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8987765908241272, "score": 3.40625, "token_count": 892, "url": "http://www.sciway.net/hist/symbols.html" }
Kinesthetic/Tactile Learning Styles Infographic The Kinesthetic/Tactile Learning Styles Infographic explores the characteristics, learning strengths, career possibilities, and learning process for people who learn by doing. For more information about hands-on programs for kinesthetic/tactile learners, visit: http://www.pti.edu/programs However, I highly encourage you to read “The Myth of Learning Styles” “Myth: 82% thought that teaching children in their preferred learning style could improve learning outcomes. This approach is commonly justified in terms of brain function, despite educational and scientific evidence demonstrating that the learning-style approach is not helpful (Kratzig & Arbuthnott 2006).”
<urn:uuid:42153b0d-76eb-43dc-bc9a-db65c354b893>
{ "date": "2017-02-27T04:47:52", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00244-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8994513750076294, "score": 2.8125, "token_count": 150, "url": "http://elearninginfographics.com/kinesthetictactile-learning-styles-infographic/" }
A rare chance to appreciate Monet Thursday, April 11, 2013 MANCHESTER — One of Claude Monet’s most celebrated early paintings — Adolphe Monet in the Garden of Le Coteau at Sainte-Adresse — is now on view in the Currier’s European Gallery for a limited time. The painting, which has been on public view only once in a museum, remained in the artist’s family until 2004. It will return to its owner in early July, and no future public showings are scheduled. “This is a rare opportunity for visitors to experience the incredible talent one of the greatest French Impressionists just as he began to emerge as an innovator and before he became a seminal figure,” said Susan Strickler, CEO and Director of the Currier. “Come take advantage of this moment.” Adolphe Monet in the Garden of Le Coteau at Sainte-Adresse is an early painting (1867) of Monet’s father, and was in the artist family for several generations. It has never been shown in North America. In 1867 Monet was only 27 years old. Adolph Monet in the Garden of Le Coteau at Sainte-Adresse was painted two years before the Currier’s own early Monet The Seine at Bougival, and a full seven years before the term Impressionism was coined in 1874 by a French art critic. The two paintings are displayed together for the first time. Impressionism reached its full maturity in the 1880s, and was the dominant style for another decade in much of Europe. Adolphe Monet in the Garden of Le Coteau at Sainte-Adresse depicts the artist’s father reading a newspaper under a canopy of shade trees. The center of the composition provides a vista into a sunlit, flowering garden on the estate Le Coteau in Sainte-Addresse, a town along the Normandy coast. It was on display once, two years ago in Paris at the Galeries nationales du Grand Palais in a major retrospective exhibition of Monet’s work. The seeds of Impressionism are clearly evident in both paintings. In the painting of Monet’s father, Adolphe, the palette is bold, the brushstrokes are expressive, and the focus is on broad areas of light and shadow rather than the objects themselves. In the Currier’s Seine at Bougival, the artist expresses the fleeting quality of sunlight passing through dappled clouds, and the brushstrokes have become more pronounced and the application of paint thicker and more dynamic. The Currier Museum of Art is located at 150 Ash St. Open every day except Tuesday. More information: www.currier.org or call 603-669-6144 x108.
<urn:uuid:7da79ff3-512d-40bb-9451-dead6332cabe>
{ "date": "2014-07-25T14:25:56", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894275.63/warc/CC-MAIN-20140722025814-00064-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.949486255645752, "score": 2.515625, "token_count": 615, "url": "http://fosters.com/apps/pbcs.dll/article?AID=/20130411/GJENTERTAINMENT_01/130419986/-1/fosnews1417" }
A breeding program implies that we, as breeders, have a goal. These goals must translate into indentifying traits that we wish to change or conserve in our animals. Traits can be changed or conserved in two ways: - 1..By selection of the best animals to breed from, and - 2..By changing the level of in-breeding in the population. Theory tells us that related animals have similar genes. Thus, for highly heritable traits, breeding with the best animals produces progeny that are most likely to be as good as, or even better than the parents. For inherited diseases controlled by a single allele, selection will be useful for decreasing, and where possible, eliminating them from the population. In most populations, natural selection is occuring all the time. Animals with a deleterous abnormality, with low survivability or reproduction, do not leave many progeny. Thus natural selection acts to cull them out. To fully understand the effects of in-breeding, we need to discuss two other facets of genetics. These are: Dominant alleles show their effect, even when one allele is present. Recessive alleles are hidden by dominants. They can only show their effect when both alleles in a gene are recessive. - 1..Dominant and recessive alleles; - 2..That inbreeding causes the two alleles present in each animal to be alike, more than does any other form of breeding, such as out-crossing or cross-breeding. While this is the case in many genes, there are others where there is no dominance, and where each allele will show its effect in proportion to its numbers present,ie, 1 or 2 times. If deleterious genes are dominant, or show no dominance, their presence, even in single dose is obvious. Selection can thus act against such genes at all times and act to remove them, even when they are present only in low frequencies. If deleterious genes are recessive, they will only become obvious if they occur in a double dose at a gene. Thus, recessive, inherited defects for example, remain hidden unless they are present twice at a gene. In many cases, the majority of the recessive deleterious alleles in a population are not seen and can not therefore be removed by selection. This is a general principle that applies to any recessive deleterious gene, whether it onits own causes an inherited disease, or whether it causes a decrease in a complex, quantative trait such as reproduction. In presently existing populations therefore, deleterious alleles are likely to be recessive, because deleterious alleles, inherited differently, will have already been removed by natural selection. Inbreeding is the mating of related animals; that is of animals with genes that came from the same ancestors.Of course, such genes may be the products of the duplication of the one single strand of chromosome in an ancestor, and must, in that case, be identical (certainly the same allele). The coefficient of inbreeding is the measure of the degree of inbreeding in an animal. With pedigrees available, and assuming the animals at the back of the pedigree are un-related, it is possible to calculate exact values of inbreeding coefficients for each pedigree. We know that the animals at the back of the pedigree may also be related. This just means that the calculated value may be lower than the true, absolute value of the inbreeding coeficient. The calculated value is useful for comparing the relative amount of inbreeding that has occured in the generation represented by any pedigree. Inbreeding, by increasing the number of genes at which there are similar alleles (the genes are homozygous), has the effect of making inbred animals breed truer, ie,more predictably than non-inbred animals. this was used by breeders early last century after Mendels Laws had been rediscovered, to differentiate their breeds by colour pattern, ear shape and so on. Inbreeding therefore got the reputation of being a good thing. It was thought that if you could make cattle homozygous for the genes for fast growth or high milk production, all progeny would then bred true to type for grothw rate and high milk production. However, for quantative traits such as fast growth rate and high milk production,the inheritance is more complex. In quantative traits, no one can differentiate between genetic and environmental effects. And how many genes must one make homozygous for fast growth rate? Is it 3, 10, 30 or 3,000? merely asking the question shows the impossibility of using inbreeding to fix quantative traits in the homozygous form we want, at all genes that matter. What has now been realised, is the main effect of inbreeding, resulting from its tendency to pair identical alleles at more and more genes, is to expose recessive alleles. As set out above, if there are any recessive deleterious genes being carried ina population, they remain hidden unless inbreeding causes them to become obvious. So, while breeders are using inbreeding to make lines breed true in perhaps twenty Mendelian genes concerned with outward appearance, they are casuing thouisands of genes in all other characters to become homozygous, and many of those will cause deleterious effects. In some breeds, specific inherited diseases become obvious. In all breeds there will be a general, often unspecifiable reduction in vitality, so that martalities will rise, reproduction will be lower, and even size will tend to go down. Can you apprciate the enormous significance of inbreeding in causing problems for dog breeders?
<urn:uuid:e5da94d4-5358-4b3f-9467-a82d09d48ebb>
{ "date": "2017-10-18T00:19:52", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822625.57/warc/CC-MAIN-20171017234801-20171018014801-00356.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9507408142089844, "score": 4.125, "token_count": 1174, "url": "http://www.wolfweb.com.au/acd/genetics.html" }
Converting an Idea into a New Business Solution is a Lot of Work Innovation culture places a very high premium on the ‘great idea’ as an enabler for innovation. Popular culture is cluttered with the idea of the genius innovator who has one great idea after another. In truth, innovation is a systematic discipline that can be learned and practiced. In fact, as Peter Drucker, the management guru pointed out, “An innovation program based on the hopes of producing some bright ideas is the riskiest.” Not all complexities on the ground can be imagined and anticipated in a lab. These complexities often get underestimated and organizations end up biting a lot more than they can chew. A lot of good innovative ideas fail because this last-mile connectivity is not achieved. An idea is just a starting point for innovation rather than the end goal. An innovation can be classified as one only when it becomes useful to someone. A lot of work is required before a bright idea or invention can become an innovation. This is the art of systematic innovation. Technologists who are in awe of technology often fail to apply the critical thinking needed to make a technical invention into a successful innovation. Scientists and inventors are frequently guilty of giving undue importance to technical feasibility, while underestimating other factors that go into creating an innovative product, such as economic viability, ease of use, aesthetic appeal, process changes and availability of talent. In reality, the idea accounts for only a small percentage of the final product. It is the other factors that pre-dominantly determine whether an innovation is successful or not. When evaluating an idea, and while iterating on a solution, it is important that each iteration covers the entire solution – and not just the core idea. Innovation programs must take into account that creating a proof of concept or iterating on a prototype means testing out as many of these other factors as possible, in addition to testing the core concept.
<urn:uuid:1cab6d86-ced7-4a0a-9a51-e54da16be7ee>
{ "date": "2020-01-29T11:39:16", "dump": "CC-MAIN-2020-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251796127.92/warc/CC-MAIN-20200129102701-20200129132701-00296.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9514419436454773, "score": 3.15625, "token_count": 398, "url": "https://www.infosys.com/insights/living-labs/business-solution.html" }
Time vs. Tense Difference between Time and Tense Time and Tense are two words used differently to suggest the position of the Sun and the occurrence of some event respectively. Time is used as a subset of tense. The examples of word ‘time’ are as follows: - What is the time by your watch? - Time is the ultimate healer. - How many times should I pay for you? - Time and again I have been emphasizing on hygiene in schools. In the first sentence, time is used to ask the Sun’s position. In the second sentence, it’s used as in general case. Third sentence use the word ‘time’ to suggest ‘numbers’. And the word ‘time’ in the last sentence is used as ‘again and again’ or ‘several times’. Tense is used in grammatical sense to express the time of action. Present tense, past tense and future tense, these are three kinds of tense. Present tense is used to denote an action which is performing at the time when the sentence is uttered. “He gives the magazines to his sister”. Past tense is an action that happened some time before. As in “She looked at me.” Future tense indicates an incident or action which will happen late. For instance, “The show will be a super hit.” The word ‘time’ is used to denote the adjectival form of ‘timely’. ‘He offered me payment in time. The word ‘time’ can be used with prepositions with ‘in’ and ‘on’ to suggest different meanings.
<urn:uuid:285a8650-88f3-4510-9063-c2b74886b49a>
{ "date": "2014-10-23T08:35:17", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507454577.44/warc/CC-MAIN-20141017005734-00121-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9581973552703857, "score": 3.671875, "token_count": 364, "url": "http://vspages.com/time-vs-tense-1785/" }
Abnormal Manchettes, airway, Antimicrobiens pharmacologie, asthma, Crohn's Disease, Cyclooxygenase, Decidua, Early development, Embryos, epidemiology, Estrogen, Filament, Growth Hormone, Helicobacter pylori, Hypertension, Implantation, Infection, Infliximab, Insulin-Like Growth Factor, Liposomes, Liver, Metabolism, Mice, Neuronal, Nitric oxide, obstructive sleep apnea, Ovary, Oxytocin, Pheromone, Porcine Embryos, Porcine Endometrium, Pregnant, Protein, Rainbow Trout, Rat, Receptor Expression, Ribonucleic Acid, Sex, Spermatid, Spermatogenetic, Steroidogenesis, Testis, Testosterone, Trophoblast, Uterus Preterm delivery remains a major cause of morbidity and mortality in the United States, with African Americans bearing a disproportionate share of this adverse outcome. In 1997, urban mothers of African-American infants, compared with mothers of non-Hispanic white infants were 145% more likely to experience the death of a baby before the infant’s first birthday. Most of these deaths occur among infants of very low birthweight (VLBW), that is, at weights below 1,500 g. Almost all such births are preterm, and they occur almost three times more frequently among African-American women than their white counterparts for reasons that are still incompletely understood. Known risk factors for VLBW include unwanted conceptions, poor nutrition, and insufficient prenatal care. Other implicated risk factors are maternal age less than 20 years, single marital status, low income, and not having graduated from high school. Research over several years comparing racial groups while attempting to control for socioeconomic status resulted in the paradoxical finding of a wider black-white gap among women in birth outcomes with fewer risk factors. For example, Kleinman and Kessel reported that the black-white relative risk for VLBW was 3.4 among low-risk women, compared to 1.7 among high-risk mothers. Viagra Online Canadian Pharmacy The failure of the socioeconomic model to eliminate observed racial disparities has led some researchers to suggest a possible genetic mechanism for these differences. However, theoretical and empirical studies of the genetic theory of racial disparities in health and birthweight have largely discredited that approach. Comparing women of different races while controlling for socioeconomic status is not logically possible if race is acknowledged to be a social construct rather than a genetic category. Race designation is more appropriately seen as an integral part of the person’s social status. Thus, researchers have begun to move beyond the traditional socioeconomic and genetic models to more contextual analyses in order to explain the black-white gap in preterm birth. Preliminary studies support the view that the greater risk of preterm delivery among African-American women is embedded in their social context. In response to this understanding we have undertaken an investigation of several social factors in African-American women and their role in the delivery of VLBW infants. The primary focus of the larger project of which the present report is a part was the impact of perceived racial discrimination on black VLBW risk. Results have been reported elsewhere. In the present study, we explored various indicators of social support to determine whether such support offers a protective effect to African-American women experiencing psychosocial stress. We also evaluated possible direct effects of social support on the pregnancy outcome under study, since prior work has indicated such an effect in other populations. Copyright ®2009 - Level of Health – Medical Blog
<urn:uuid:63c35970-7b43-4054-bcc2-4471f1f50bdc>
{ "date": "2019-03-24T22:11:01", "dump": "CC-MAIN-2019-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203493.88/warc/CC-MAIN-20190324210143-20190324232143-00176.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9319514036178589, "score": 2.71875, "token_count": 752, "url": "http://www.levelofhealth.com/health/maternal-support-in-the-delivery-room.html" }
The True History of Chocolate In 1544 Dominican friars took a delegation of Maya nobles to visit Prince Philip of Spain. Among the presents they brought to his court, together with various kinds of chilies, beans, sarsparilla, maize, liquidambar (a plant of the witch hazel family), and 2000 quetzal feathers, their most precious offering, were receptacles of beaten chocolate. This was, according to Sophie Coe and Michael Coe, the first appearance of chocolate in Europe. The future Philip II, however, seemed more concerned about his visitors’ nakedness than their gifts, and may not have been aware of the historic event. The Coes return to the Mayas at the end of their story. Inhabitants of the clouded, forested mountains and the fertile valleys bordering the Petén lowlands, called Verapaz (“True Peace”) by the Spaniards, the Kekchi Maya people were for the Dominicans a striking example of how kindness and understanding could bring greater rewards than violence. It was here, in what is now Guatemala and southern Mexico, that Bartolomé de las Casas began his locally successful, but ultimately doomed, efforts to counter the rapacious destruction he saw all around him in the ancient worlds the Europeans had stumbled onto in 1492, with devastating consequences for the indigenous populations. The title of the Coes’ book is an allusion to The True History of the Conquest of Mexico, completed in 1572 in Guatemala’s capital by the old, poor, and partially blind conquistador Bernal Díaz del Castillo, a warrior who wished to get the facts straight, free from “lofty rhetoric,” about the fate of the Aztecs. The Coes seek to do the same for chocolate and also to bring seriousness to the study of the history of food and drink. “Although food, sex, and mortality are the three great givens of human existence,” they note, “earlier generations of academics generally avoided these topics as not quite respectable.” This is not entirely true: Gilberto Freyre’s trilogy on Brazil is full of sex and accounts of exotic and erotic sugary delicacies of one sort or another. Nevertheless, what the Coes have achieved is to strip away, as Bernal Díaz del Castillo tried to do, the myths and misunderstandings, and to reconstruct from often very obscure sources, with some exciting archeological fieldwork and hieroglyphic deciphering, the remarkable passage of chocolate from its origins in the lowland jungles of southern Mexico to “Hershey’s Kisses” and Cadbury’s “chocolate box,” and to reestablish its genealogy over three millennia. Chocolate for nine tenths of its long history was drunk, not eaten, and only one fifth of that history post-dates the fall of the Aztec capital in 1521. The dark brown, pleasantly bitter, chemically complex substance bears little resemblance to the pulp-surrounded seeds of the cacao plants from which it is produced. The European invaders had to name many of the plants and plant derivatives, new to them, that they encountered in the Western Hemisphere, and to fit them into their own schemes of classification, as well as within the health theories of classical authors, who… This article is available to online subscribers only. Please choose from one of the options below to access this article: Purchase a print premium subscription (20 issues per year) and also receive online access to all content on nybooks.com. Purchase an Online Edition subscription and receive full access to all articles published by the Review since 1963. Purchase a trial Online Edition subscription and receive unlimited access for one week to all the content on nybooks.com.
<urn:uuid:8e5daa26-cbc7-433a-aa85-8c2165ffebc5>
{ "date": "2016-08-26T01:33:23", "dump": "CC-MAIN-2016-36", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295103.11/warc/CC-MAIN-20160823195815-00116-ip-10-153-172-175.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9523639678955078, "score": 3.0625, "token_count": 797, "url": "http://www.nybooks.com/articles/1996/09/19/the-road-to-kisses/" }
Angelica Portagnuolo Archaeology | | News | * | English An extraordinary discovery of a place of worship dating back to 9000 B.C. has been made in Turkey. In the south of Turkey, in Göbekli Tepe, in an area well-known as "Mount of belly button", a giant and mysterious work of architecture has been brought to light by an equipe of researchers from Dai (German Archeological Institute of Istanbul) and from the museum of Urfa, under the direction of Klaus Schmidt, a German archaeologist. Image - 1 - Dr. Klaus Schmidt The excavation campaign, which started in 1994, has soon revealed the presence of finds, which are outstanding and unique in their genre: a templar structure made of 240 pilasters which are around 4 meters high and form a range of concentric circles. These circles appear to date back to around 9000 B.C. and are completely buried underground. Most of the pilasters have engravings on the surface referring to either the religious sphere or the daily life of those who used to go to the site of worship. For example, one of the engraving represents a pig and two ducks flying in the net. The discoverer says: "I believe that Göbekli Tepe celebrates the catch, the lifestyle of hunters-pickers". "Why should it not be?" "It was such a rich and easy life that offered them enough spare time to devote themselves to sculpture".The hunters of Göbekli decided to leave the temple in around 8000 B.C., probably because the need to feed more people that used to meet in this place for religious purposes, caused a change of the ecosystem of the territory itself It might have happened that lots of trees were chopped down and many animals which were "easy prey of these hunters" were chased away. By looking at the top of brownish and dry hills, you can deduct that the heavenly earth had become indeed an uncultivated and bare plain. It is a surprise to discover how these Neolithic semi nomad hunters had managed to build such a work of architecture by assembling both the religious and the social aspects in a refined and complex way. This is something even more ancient than the so well-known anatolic sanctuaries of Çatal Hűyűk dating back to 6500 B.C. Following a first research on the findings, Schmidt sustains that the temple might have been linked to the story of Eden, as told in the Bible. According to the Muslims, Sanliurfa, a city close to Göbekli, should be the city called Ur, as mentioned in the Bible; the rivers that flow down from Heaven could be, instead, Tigris and Euphrates which wet the half-moon shaped fertile area where Göbekli Tepe is located; in the Bible it is told that some mountains surround Eden and that by looking at the top of Göbekli hills you can see the mountainous chain of Taurus.More from the original site It still a mystery how a population, apparently not civilized yet, could have built such a big place of worship with pilasters of fifty tons weight, in such a historical and ancient period; it is important to remember, indeed, that the only place comparable to this one, which has been discovered, is Stonehenge in Great Britain which dates back to 3100 B.C. Mellaart J., The Neolitic of the Near East, New York, 1976, pp. 114-135 Home Page PD Dr. Klaus Schmidt La Voce di Fiore The First Post - the online daily magazine "Digging for history in Turkey" Stonehenge From Wikipedia, the free encyclopedia. Deutsches Archäologisches Institut (DAI)
<urn:uuid:1fe0da01-c47b-40af-8449-b3c8e63cb30b>
{ "date": "2017-10-24T07:54:46", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828189.71/warc/CC-MAIN-20171024071819-20171024091819-00656.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9448237419128418, "score": 3.203125, "token_count": 786, "url": "http://1965gunner.blogspot.com/2008/04/gobekli-tepe-earliest-known-human.html" }
Samuel Gridley Howe (1801-1876) was born in Boston on November 10, 1801. He was educated at the Boston Latin School. His father, having decided that he could send only one of his three sons to college, had all three read a chapter from the Bible and chose the best reader, who happened to be Samuel. He was sent to Brown University because there was less Federalist influence there than at Harvard. Young Howe spent some of his time studying, some in companionship with a group of friends joined together in the “Knights of the Long Table,” and some in the perpetration of general mischief. Among his misdemeanors were taking President Messer’s horse up to the top floor of the college building, putting ashes in a tutor’s bed, and also squirting ink through the keyhole into the eye of a tutor who was trying to check up on what Howe was doing. For his offences he was rusticated, sent to the care of the Reverend Josephus Wheaton of Holliston, Massachusetts, to keep up his studies away from the distractions of college life from mid-March to the first of August 1819, after which he was allowed to return to college. His antics were such that, when he called on President Messer some years after his graduation to apologize for his youthful pranks, Messer motioned him to sit at a distance, fearful that “there will be a torpedo under my chair before I know it.” After graduation from Brown, Howe went to Harvard and received his M.D. degree in 1824. The Greek War of Independence had started in 1821, and Howe, fresh out out Medical School and inspired by Lord Byron, took some fencing lessons and offered himself as surgeon/soldier to the Greek cause. It was said of him that he “only became a surgeon when the fighting was over.” He did not meet Byron, who was ill and died in April 1825. He did manage to purchase Byron’s blue-plumed helmet, which occupied a place of honor in the Howe household and was eventually returned to Greece by his daughter, Maud Howe Elliott, in 1926. Howe’s medical experience with the Greek army and later with the navy led to his promotion to Surgeon-in-chief of the Greek fleet. He returned to America in 1828 to undertake a lecture tour to raise supplies of food and clothing for the Greeks and returned to distribute them, giving them away to the feeble, but requiring the able-bodied to work for them. He set refugees to work building a sea-wall on the island of Aegina and established a colony of the poor in a town which he named “Washingtonia,” where he was “governor, legislator, clerk, constable, and everything but patriarch.” In 1831 he returned to the United States and was engaged to head the New England Institution for the Education of the Blind which had been chartered two years earlier. He returned to Europe to learn from schools for the blind there, and was imprisoned for bringing American aid to Polish refugees in Prussia. On his return to Boston in 1832 he took two blind students into his father’s house and began to instruct them with the aid of his sister. As his funds were soon exhausted, he exhibited his students before the state legislature to win continued support. The next year Colonel Thomas Handasyd Perkins gave his mansion for the school, and in 1839 it was renamed the Perkins Institution for the Blind in his honor. Meanwhile, a fund of $50,000 had been raised for support of the school. His most famous pupil was Laura Bridgman, a seven-year old New Hampshire girl who had been blind and deaf after having scarlet fever at the age of two. He then turned his attention to the mentally deficient, and in 1848 persuaded the Massachusetts legislature to appropriate “a sum not exceeding $2500 for the purpose of teaching ten idiotic children,” selected by the Governor and Council. Two years later the legislature established the Massachusetts School for Idiotic and Feeble-Minded Youth, which later became the Walter E. Fernald School. He married Julia Ward, the author of “The Battle Hymn of the Republic.” He was opposed to slavery and, as a sympathizer with John Brown of Harper’s Ferry, he lived for a short time in Canada, because Brown’s supporters were being arrested in the United States. During the Civil War he was a member of the Sanitary Commission. He was later on the commission to observe the condition of freedmen in the South and the commission sent to Santo Domingo in 1867. He went to Crete with supplies during the insurrection against Turkey in 1871. One of Howe’s last communications from Theodore Parker was a Latin epitaph (written when Howe was fifty-seven, so that his age of 77 at death was a conjecture), which translated reads: .Here LiesHowe was 74 when he died in Boston on January 9, 1876. On June 4, 1941 a marble and bronze base for the flagpole on the Middle Campus was dedicated as a memorial to him, a gift of the American Hellenic Educational and Progressive Association. Awaiting the resurrection of the just All that was mortal Of that illustrious man, Samuel Gridley Howe, M.D. As a youth he disported in Brown University To get an education, And its reverend and famous President Messer Much he riled. Yet he became well versed In the difficult dialect of Brown University And in its Arts, Letters and Philosophy. Among the beautiful chiefs he was Antinous. He studied the medical art. As a pupil he dug up many subjects and cut them into bits With force of arms. As a master he sent the souls of many chiefs untimely to Orcus. A true Aesculapius among doctors In the land of the Argives He slew many Turks by medical art and the sword, Than which a better never did sustain itself upon a soldier’s thigh. He fought for Poland, the unconquered. He visited those in prison. He made the blind see. The dumb speak, the foolish understand (as well as he could). He restored the insane to their right mind, He freed the slaves, He made his garden yield the choicest pears. He lived about seventy-seven years. Prisoners bewail him. The blind weep for him. The dumb lament. Idiots mourn. The insane cry out for him. And the slaves sit in the dust.
<urn:uuid:3da2cfe2-225c-449e-88ab-37da377eb152>
{ "date": "2017-10-22T01:05:43", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824931.84/warc/CC-MAIN-20171022003552-20171022023552-00656.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9892598390579224, "score": 2.625, "token_count": 1400, "url": "http://liber-brunoniana.github.io/Articles/Howe,%20Samuel%20Gridley.html" }
Help avoid instant message viruses Using an instant messaging (IM) program—such as Windows Live Messenger (formerly MSN Messenger), Windows Messenger, AOL Instant Messenger, Yahoo Messenger, or others—you and a friend can type messages to each other and see the messages almost immediately. Because IM is so popular, virus writers can use it to spread malicious programs. Understanding instant message viruses Like email viruses, instant message viruses are malicious programs that are designed to travel through IM. These viruses are spread, in most cases, when a person clicks a link or opens an infected file that was sent in an instant message that appeared to come from a friend. When you open one of these files, your computer can become infected with a virus. Because of the virus, your computer may slow down or stop responding, or you may not notice any change at all. However, the virus might have installed a covert program on your computer that could damage software, hardware, or important files, and that could contain spyware, which can track information entered on the computer. A computer infected by a virus may continue to spread the infection by sending copies of the virus to everyone on your IM contact list—that is, the collection of IM names that you can store in your IM program. 5 steps to help avoid instant message viruses As with most threats on the Internet, you can help keep yourself safe by taking basic precautions. If you know how to avoid email viruses, you'll already be familiar with many of these steps. Be careful with links and files in IM. Never click a link or open, accept, or download a file in IM from someone you don't know. If the link or file is in an IM from someone you do know, don't click the link or open the file unless you know what the link or file is and you were expecting it. Contact the sender by email, phone, or some other method to confirm that what they sent was not a virus. Update your Windows software. Visit Microsoft Update to scan your computer and install any high-priority updates that are offered to you. If you use automatic updating, the updates are delivered to you when they are released, but you have to make sure you install them. Make sure you're using an updated version of your IM software. Using the most up-to-date version of your IM software can better protect your computer against viruses and spyware. If you're using MSN Messenger, upgrade to Windows Live Messenger, which will block attachments that might contain malware and allow you to scan attachments for viruses. For more information, see Windows Live Messenger Overview. Use antivirus and antispyware software and keep it updated. Antivirus and antispyware software, such as Microsoft Security Essentials, can help to detect and remove malicious programs from your computer, but only if you keep the software current. Microsoft Security Essentials works with Microsoft Update. Windows Defender will also help defend your computer against spyware. Windows Defender is part of Windows Vista and Windows 7. If you install Microsoft Security Essentials, it will automatically disable Windows Defender. This is because Microsoft Security Essentials provides real-time protection that guards against viruses, spyware, and other malicious software while Windows Defender only helps protect against Spyware and potentially unwanted software. Run your computer as a standard user not an administrator. Windows Vista and Windows 7 both include User Account Control, a feature that lets you run your computer as a standard user, while also enjoying the benefits of an administrator when you need them. This helps you avoid viruses and other unwanted software. For more information, see Windows 7 Features: User Account Control.
<urn:uuid:c6e0fff3-748d-4476-aa75-6dbbfbd5ab35>
{ "date": "2014-07-23T20:21:26", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883466.67/warc/CC-MAIN-20140722025803-00152-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9170615077018738, "score": 3.078125, "token_count": 746, "url": "http://www.microsoft.com/en-gb/security/pc-security/antivirus-im.aspx" }
I bet you can’t name one student over the age of 18 that doesn’t own a highlighter… That’s because highlighting is often an important part of note taking, reading and studying - especially in college! College students are inundated with information overload and use highlighters daily as a tool to cut through the clutter to help them clarify, organize, and synthesize subject matter. Highlighting helps to cut down the excess so that students can more easily focus on the main concepts that are important to them and study more effectively and efficiently. Highlighting correctly can be very helpful for students, however it can often be a distraction when done incorrectly. Have you ever looked back through your textbook after reading a chapter only to find either, A) You had so perfectly colored every page a bright neon hue that your kindergarten-self would be jealous? Or B) you retained ab-so-lute-ly NOTHING? If you answered yes to either (most likely both), you are a victim of “Over-Highlighting”!! “Over-Highlighting” is a common problem while reading – Take a look at your friend’s notebook or textbook next time you’re at the library – I promise you’ll see entirely too much highlighting. To keep this time-waster from happening you’ve got to stay focused and refrain from getting caught up in mindlessly “coloring” the page. Try applying some of these tips on highlighting text effectively from CliffNotes.com: - Focus on the main point – and that may not be the entire sentence. It’s perfectly okay to highlight only key terms or parts of sentences. In fact, you may get a better sense of the main idea of a paragraph if you highlight a string of words (excluding extraneous information) that lets you glean the main idea at a glance. - Consider reading the entire paragraph, and then going back and highlighting the important words and ideas. If you highlight from the start, you may not be sure of the paragraph’s purpose and how to best capture that purpose or idea with your highlighter. - If you buy a used textbook or other reading material, look for one with little or no highlighting. It’s hard to ignore the previous owner’s highlighting. In addition to highlighting, consider jotting notes in the margins, next to passages. Now, don’t be a victim, highlight effectively and efficiently. Above all else, Highlight so that you get an A on the test! Sharpie Highlighters are the number one choice when it comes to highlighting and doing so effectively. Available in 8 different styles and 10 bold fluorescent colors, there’s a Sharpie Highlighter for your every need: - MINI - for on-the-go highlighting. (Also available in Fashion Wrap MINI for highlighting in style.) - Jumbo - our longest writing highlighter. - Pocket - pen-style highlighter (Pocket Pink Ribbon Highlighters donate to breast cancer research.) - Retractable -just click and highlight. - Tank - large barrel-style highlighter. - Grip - contour, comfort grip highlighter. - Generation - fashion patterns and designs. - Liquid - liquid ink designed with see-through window to help you know before you’re low.
<urn:uuid:57870f4a-ad51-4e81-8cf9-80d446d1ef6d>
{ "date": "2013-05-23T04:53:47", "dump": "CC-MAIN-2013-20", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00000-ip-10-60-113-184.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8869104981422424, "score": 3.09375, "token_count": 712, "url": "http://blog.sharpie.com/tag/study/" }
Worldwide economic recession is happening and it is hurting a lot of businesses because of cost-cutting. In the United States of America, there have been talks about giving out stimulus checks to help the economy. Many people are wondering if there be a stimulus check in 2012? Stimulus check definition According to experts a stimulus check is defined as a check that the U.S government gives to its taxpayers so that the consumers will spend the money in order to help generate sales and income in businesses like retailers, manufacturers, real estate and the like. The amount on the check depends on the income tax return filed by taxpayers. Accordingly, those who are joint taxpayers will receive twice as much as other taxpayers will receive in their stimulus check. Why is the government doing this? America had been hit hard by recession in 2008 and a lot people lost their jobs and businesses closed down because of poor income. The economy was on a downward slope so a lot of people tended to avoid spending and only buy what they needed and not what they want. Certain business sectors and even real estate crashed And the solution is to give out stimulus checks to the taxpayers to stimulate the economy. Why does the government see this as one of the solutions? By giving money away money, they will have more opportunity to spend and in return, it will stimulate economic growth. This is one of the attempts to help fix recession and the increasing unemployment rate. But a point of concern is raised if the government spends too much and increase the debt load which will also bring a negative effect on the economy. Stimulus check look-back In 2008, stimulus checks have been given in order to help the economy in the midst of the crisis. About 120 million households were given up to $600 per person. Then in 2009, about $250 stimulus checks were sent out to select groups. During that year, the stimulus check was given to each person receiving Social Security and SSI because of the very low inflation that year. In 2010 and 2011, there was a proposed stimulus check of about $250 million that was intended to be given in the first quarter or 2010, but it never happened. Who can get the stimulus check? According to reports, in 2010 and 2011, there are selected groups that are intended to be given a stimulus check. This includes people who receive Social Security or SSI. Want to learn more about RESPs? Buy The Book: The RESP Book: The Simple Guide to Registered Education Savings Plans Everything you need to know about RESPs.
<urn:uuid:a78692b3-79dc-4669-850d-1640161da9c5>
{ "date": "2017-02-23T09:41:34", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00324-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.967889130115509, "score": 2.90625, "token_count": 517, "url": "http://www.moneysmartsblog.com/stimulus-check-2012/" }
Paterson, city (1990 pop. 140,891), seat of Passaic co., NE N.J., at the falls of the Passaic River; inc. 1851. Founded in 1791 by Alexander Hamilton and others of the Society for Establishing Useful Manufactures, Paterson was a planned attempt to promote industrial independence in the newly formed United States by harnessing the water power of the falls. In 1792 and 1794 cotton-spinning mills were established. In 1835, Samuel Colt began the manufacture of the Colt revolver. Shortly thereafter the silk industry was established, beginning a silk boom which would earn Paterson the appellation "Silk City of the World." The iron industry, which initially supplied Paterson with textile machinery, was producing locomotives in great numbers by 1880. After World War I, the aeronautics industry moved to Paterson. Although the silk industry is gone, textiles and transportation equipment are still made, and there is an apparel industry. Other industries produce electronic equipment, paper and food products, fabricated metals, rubber, and plastics; data-processing services also are important. During the first half of the 20th cent., notably in 1912–13, 1933, and 1936, many bitter strikes arose from bad labor conditions in the silk industry. The city has gradually become an ethnic center, with significant black and Hispanic populations. High unemployment rates marked Paterson in the late 20th and early 21st cent. Of special interest is the historic district that centers around the roaring Great Falls of the river. Designated a national historical park in 2009, it is a unique display of industrial history, with old cobblestone streets and stone bridges; the abandoned houses of workmen and mill owners; and industrial works that include several locomotive factories (one dating back to 1830), the Colt gun factory (1835), and historic spinning mills and waterworks. More on Paterson from Infoplease: See more Encyclopedia articles on: U.S. Political Geography
<urn:uuid:6014cfbb-2943-4df5-ab47-d8e0cf4b1a3b>
{ "date": "2014-08-01T02:13:37", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273874.36/warc/CC-MAIN-20140728011753-00414-ip-10-146-231-18.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9458971619606018, "score": 3.34375, "token_count": 412, "url": "http://www.infoplease.com/encyclopedia/us/paterson.html" }
Harriet Tubman became famous as a “conductor” on the Underground Railroad during the turbulent 1850s. Born a slave on Maryland’s eastern shore, she endured the harsh existence of a field hand, including brutal beatings. In 1849 she fled slavery, leaving her husband and family behind in order to escape. Despite a bounty on her head, she returned to the South at least 19 times to lead her family and hundreds of other slaves to freedom via the Underground Railroad. Tubman also served as a scout, spy and nurse during the Civil War.
<urn:uuid:a26d8fa8-c9a7-4203-830a-20eadce4083f>
{ "date": "2017-05-28T10:20:08", "dump": "CC-MAIN-2017-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609613.73/warc/CC-MAIN-20170528101305-20170528121305-00092.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9807072281837463, "score": 3.953125, "token_count": 116, "url": "http://preview.history.com/topics/black-history/harriet-tubman" }
Fixed equipment that transmits RF energy, such as base stations, antenna sites or wireless access points, are covered by exposure guidelines based on the same scientific knowledge as the limits applied to RF portable products,” she said in an e-mail. “Generally, due to the height of antennas, fixed network equipment produces RF exposure levels that are typically hundreds or even thousands of times below safe exposure limits. When installing new communications infrastructure, Motorola works with our customers to ensure compliance based on existing RF safety guidelines and standards.” McWhinney sent along a list of three dozen institutions in Canada, China, Japan, Russia, the U.S. and countries in the European Union that Motorola has funded for research into the potential health effects of RF fields. Los Alamos National Laboratory’s public-information office was unable to find any lab staff who wanted to dispute or support claims by wireless opponents. A theoretical biologist and biophysicist at the lab, Bill Bruno, has been among anti-wireless advocates at Santa Fe public meetings. Workshops organized in 2008 by the National Research Council of the National Academies at the request of the Food and Drug Administration of the U.S. Department of Health and Human Services found gaps in research into potential adverse effects of RF energy on humans. The International Commission on Non-Ionizing Radiation Protection in 2009 said that scientific literature has “provided no evidence of any adverse effects … (of) exposure to high frequency electromagnetic fields.” Stih, who moved to Santa Fe about five years ago and has not been active in the local anti-wireless movement, said he is convinced that many common household items present hidden dangers — mercury in compact fluorescent bulbs, chemicals in air freshener and even tiny leaks of natural gas. But he said he is still learning about the effects of wireless signals. “My personal experience is more anecdotal …. versus some kind of study,” he said. “I’m actually going out to people’s houses looking for mold, chemicals, mouse droppings, plague, whatever. They’re complaining about not feeling good and I’m ruling everything else out … because what if I’m missing something and it’s not what they think it is? All I can say doing this: I am amazed at the number of people who appear to be bothered by this.” Stih said people may go for years without reacting to electromagnetic fields, then suddenly reach a tipping point where they become hypersensitive. “What happens if you or I become the next Wi-Fi-sensitive person?” he asked. “I see it all the time with mold people — people who end up being sensitive to mold. Macho contractors say, ‘Mold is no big deal. I’m not worried about that mold.’ Next thing you know, their lives are ruined. They just have one bad incident. One bad day.” Huntington Beach, California El Monte, California Solomon Islands, Honiara Sri Lanka, Colombo Manchester, New Hampshire Mount Gambier, South Australia Click on any of the pictures below to learn more
<urn:uuid:99d0f125-e123-4dd4-9ade-5a299cb6d32e>
{ "date": "2017-09-22T06:28:01", "dump": "CC-MAIN-2017-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688671.43/warc/CC-MAIN-20170922055805-20170922075805-00416.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9366941452026367, "score": 2.59375, "token_count": 668, "url": "http://www.emfnews.org/articles/home-environment-expert-unsure-about-wi-fi-impact-part-3/" }
The concentration of organic acids and sugars has an important influence on the taste of ripening fruits. The characteristic flavour of edible fruits results from the aroma volatiles produced within the fruit during ripening and on maceration. The volatile profile of fruits determined by gas chromatography and mass spectroscopy is complex, including many alcohols, aldehydes and esters. Previous studies indicate that the differences in flavour between tomato varieties is due, at least in part, to variation in aroma volatile production (Brauss et al., 1998). Over 400 volatile compounds are detected in tomato fruit (Hobson and Grierson, 1993), although a group of seven including hexanal, hexenal, hexenol, 3-methylbutanal, 3-methylbutanol, methylnitrobutane, and isobutylthiazole are amongst the most important contributors to fruit aroma. These flavour volatiles are formed by several different pathways: 3-methylbutanal and 3-methylbutanol are formed by the deamination and decarboxylation of amino acids whereas hexanal, hexenal and hexenol are formed by lipid oxidation of unsaturated fatty acids on the maceration of fruit. Hexanal and hexenal arise through the activity of lipoxygenases (LOX), which catalyse the hydroperoxidation of polyunsaturated fatty acids containing a cis,cis-pentadiene structure. In plants, reaction intermediates are unsaturated fatty acid hydroperoxides (HPOs), which give rise to the C6 aldehydes through the action of hydroperoxide lyases (HPO-lyase). Two groups of HPO-lyases cleave either 9-(S)-HPOs or 13-(S)-HPOs, generating two C9 fragments, or a C6 and a C12 fragment, respectively (Hatanaka, 1993). In tomato fruit, linoleic and linolenic acid are the main LOX substrates, and the majority of HPOs found in tomato fruit, however, are 9-isomers. It appears that the 13-isomers, which are produced in a much smaller proportion, are metabolized further to produce flavour volatiles and compounds involved in defence, such as jasmonic acid (JA) (Galliard and Matthew, 1977; Regdel et al., 1994; Smith et al., 1997). The main aldehydes produced are hexanal and hexenal (Galliard and Matthew, 1977), and these aldehydes can then be further transformed into hexenol and hexanol by the action of alcohol dehydrogenase (ADH). Tomato LOX consists of a family of at least five genes, TomloxA and TomloxB (Ferrie et al., 1994), TomloxC and Tomlox D (Heitz et al., 1997), and TomloxE (NCBI Accession AY008278). Analysis of the role that ethylene plays in the regulation of TomloxA, TomloxB and TomloxC during tomato ripening has shown that the individual isoforms are differentially regulated and may have different functions (Griffiths et al., 1999a). Levels of TomloxA mRNA decrease as ripening progresses and this is delayed in the mutants, Nr and rin as well as sense suppressed ACO1 (low ethylene) fruit, indicating that this gene is regulated by both ethylene and developmental factors (Griffiths et al., 1999a). TomloxB expression increases during ripening and is regulated by ethylene, since the mutant and low ethylene transgenic fruit show reduced expression. TomloxC transcripts increase in response to ethylene, however, ethylene treatment of mature green fruit does not induce expression. This would indicate the presence of a developmental pathway that initiates expression and an ethylene component that enhances mRNA levels once expression has been initiated by the developmental pathway (Griffiths et al., 1999a). Silencing of TomloxA and TomloxB, by antisense gene knockout, failed to reduce flavour volatiles in ripening fruit and did not alter the levels of TomloxC mRNA (Griffiths et al., 1999b), suggesting that TomloxC may encode the major fruit lipoxygenase involved in flavour volatile production. TomloxC and the mainly leaf expressed TomloxD differ from the other LOX enzymes in that they are chloroplast targeted (Heitz et al., 1997). It therefore seems likely that during ripening TomloxC utilizes the polyunsaturated fatty acids from the redundant thylakoid structures as a substrate to produce the aroma volatiles hexanal and hexanol. TomloxD is thought to function in the octadecanoid defence signalling pathway which is activated in response to herbivore and pathogen attack (Heitz et al., 1997). Suppression of the Arabidopsis chloroplast atLOX2 gene, which is most similar to TomloxD, resulted in the absence of wound-inducible jasmonic acid (JA) accumulation and reduced expression of the wound- and JA-inducible vsp gene (Bell et al., 1995). Therefore, it appears that LOX has a dual role in both volatile production and defence signalling. Recent work with Arabidopsis has provided evidence that atLOX2 is a translation initiation factor-4e-binding protein and that this interaction may play a regulatory role given the numerous examples of products of LOX activity, such as JA, found to be involved in translational activation (Freire et al., 2000). Therefore the ethylene-dependent and independent regulation of LOX genes may orchestrate many aspects of fruit ripening and defence against pathogens. Alcohol dehydrogenase (ADH) has also been shown to play a role in hexanol and hexenol accumulation in ripening tomato fruit (Speirs et al., 1998). Two ADHs have been indentified in tomato, ADH1 which is found only in pollen, seeds and young seedlings (Tanksley, 1979) and ADH2 which accumulates during the later stages in ripening commitant with the accumulation of flavour volatiles (Chen and Chase, 1993; Longhurst et al., 1994). Genetic manipulation of ADH2 levels in ripening tomato fruit has been shown to affect the balance of some flavour aldehydes and alcohols and fruits with increased ADH2 levels had a more intense ‘ripe fruit’ flavour (Speirs et al., 1998). Tomato ADH2 has not been identified as ethylene inducible. However, it is induced by low oxygen stress and it is likely that increasing ADH2 activity during ripening is a function of decreasing oxygen concentration within ripening fruit (Speirs et al., 2002). Ethylene has also been shown to be important in the production of aroma volatiles in Charentais melon fruit, as antisense suppression of ethylene production results in strong inhibition of aroma (Ayub et al., 1996; Bauchot et al., 1998). The melon aroma volatile profile mainly consists of volatile esters and, although little information exists regarding the biosynthetic pathways involved, the last step in their formation is catalysed by acyl-transferases (AAT) (Fellman et al., 2000). AATs are a super family of multifunctional AATs and are implicated in diverse biochemical pathways such as fruit ripening, the production of epicuticular waxes and benzoyltransfer reactions (St-Pierre et al., 1998). A ripening-related gene, MEL2, isolated from melon fruit (Aggelis et al., 1997), has been identified as an ATT by expression in yeast (Yahyaoui et al., 2002). Recent analysis of antisense ACO melon has shown that fruit treated with the ethylene antagonist 1-methylcyclopropane have a 50% reduction in AAT activity. This indicates that the last step of alcohol acetylation comprises ethylene-independent and ethylene-dependent AATs (Flores et al., 2002). MEL2 also shows similarity to pTOM36 isolated from a tomato fruit-ripening library (Davies and Grierson, 1989). Although the function of this gene has not been fully investigated, ripening tomato does produces aromatic esters. An AAT gene that plays a crucial role in flavour biogenesis has also been recently cloned from strawberry, a non-climacteric fruit, indicating that AATs are not exclusively regulated by ethylene (Aharoni et al., 2000).
<urn:uuid:d381c041-99d9-414f-b721-fa3b1a1217ad>
{ "date": "2017-06-24T10:55:37", "dump": "CC-MAIN-2017-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00497.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9246641993522644, "score": 3, "token_count": 1805, "url": "http://www.biology-online.org/articles/ethylene_biosynthesis_action_tomato/volatile_production.html" }
See Cortona guide for highlights and historic monuments Although doubted for many centuries, archaeological excavations (and linguistic experts) have now shown definitively that Cortona is of Etruscan origin. Cortona is believed to have been a rich and powerful Etruscan town, as demonstrated by the cyclopean walls surrounding the city that are still visible in some parts today, The walls are made of huge slabs of superimposed stone. Beside them are the tombs, a magnificent example of which is the so-called 'Cave of Pythagoras' (570 ca.-495 BC) - some of the finds from this cave are now housed in the renovated Etruscan Museum of Cortona. Entering into the Roman empire from the late 4th century BC, Cortona remained faithful to the Romans during the war against Hannibal (247-182 BC) and its inhabitants were given the rank of "socii" (allies) of Rome. After the fall of the Roman Empire and the Lombard domination, Cortona was administered as a largely independent Municipality until the struggles against Arezzo. The struggles against Arezzo were a very difficult time for Cortona which involved a long siege and partial destruction of the city. A period of substantial economic recovery and building came after the expulsion of Arezzo and the establishment in the city of the Lords of the Casali family, which began with Uguccio Casali (XIV century) and then continued until 1409, when Cortona, after its conquest by the King of Naples, Ladislaus (1386-1414), was sold by him to the Republic of Florence. The period of Florentine rule had positive developments for Cortona, especially in terms of construction. This included the building of the Cathedral (1456) and the Girifalco Fortress (1549). Even the 16th century was an important period for Cortona: note the presence in the city of artists such as Luca Signorelli (1445-1523), Francesco di Giorgio Martini (1439-1501) and Giorgio Vasari [1511-1574] (1554), who built the Sanctuary of Santa Maria Nuova. This building activity continued in later centuries. In the 17th century Filippo Berrettini (XVII century) completely redid the façade of the Praetorian Palace (1608), and in the 18th century, under Grand Duke Leopold (1747-1792), the reclamation of the surrounding area began and several mansions were built such as the Palazzo Ferretti (1730). In the 19th century the city had even more construction, such as the Sanctuary of "Santa Margherita", and also an upgrading of its architectural heritage, with numerous renovations and rebuilding projects, plenty of which continued even in the 20th century. Many of these 'recent' transformations took place around the periphery of Cortona, leaving the history of the centre largely intact and perfectly preserved. Origins of the name Cortona The Roman name for the place, Curtonium, perhaps derived from the Etruscan 'Curies-Tolena' (via "Curtolena" and "Curton-Cortona"), while other scholars believe it came from "Coryto", and yet others from "Cotile" or "Cotilia'. For all this uncertainty, there are no doubts about the Etruscan origin of Cortona since Wilhelm Schulze, a German scholar, showed that names with the suffix-“-ona”, such as "Ver-ona", are of Etruscan origin (the Etruscan "-un" becoming the Latin "-on"). Thus, from the ancient Etruscan name "Curth-un" we find the Italian “Cort-ona”. Even more recently the Italian Giovanni Semenano researched Cortona and concluded that "Cortona" means "land", and is derived from the Etruscan "kurtun" (similar to the Hebrew name "Keret"; Egyptian "qart"; Cretan "Gortina").
<urn:uuid:24023faf-5512-4f54-a11f-5eb959fe7f71>
{ "date": "2017-08-22T14:48:32", "dump": "CC-MAIN-2017-34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110792.29/warc/CC-MAIN-20170822143101-20170822163101-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9607629179954529, "score": 3.296875, "token_count": 874, "url": "http://www.italythisway.com/places/articles/cortona-history.php" }
Most Active Stories Stars And Stripes: Pair Of Sumatran Tigers Born At National Zoo Originally published on Thu August 8, 2013 1:03 pm The Smithsonian's National Zoo has announced the birth of a pair of Sumatran tigers, a species that has dwindled to less than 500 in the wild. Both mother and cubs are reportedly doing well. There was no immediate word Thursday on the sex of the cubs. Four-year-old Damai gave birth on Monday. The new arrivals appear healthy, and so far, "Damai is being a great mom, and is nursing and grooming both cubs," the zoo says on its website. "All I can do is smile because the team has realized our goal of producing critically endangered tiger cubs," great cats curator Craig Saffoe says. According to the zoo's website: "The Sumatran tiger cubs' eyes have not opened yet, so Damai is spending most of her time grooming and nursing them. Damai lets the cubs crawl all over her, as if her body is a jungle gym." The new family will likely not be on exhibit until late fall because "bonding time is critical for mom and her cubs," the zoo says. Until then, you can view the zoo's Tigercubcam or follow developments on Twitter at #CubWatch. For the past few years, the National Zoo has been trying to encourage Damai and Kavi, the 12-year-old father, to breed. On June 21, officials confirmed via ultrasound that Damai was expecting. Only about 400 to 500 Sumatran tigers exist in their native habitat on the Indonesian island. Their Javanese and Balinese cousins are already extinct. The Zoological Society of London notes that "the vast majority of captive tigers are known hybrids or of unknown origin and so are not useful for conservation breeding purposes. Only tigers whose single subspecies ancestry can be traced back through written records can be included in conservation breeding programmes." The history of such breeding programs appears to have been relatively successful. Damai was born at the San Diego Zoo, one of about 25 cubs to be bred there over the years –- including a pair of males as recently as March. There are similar programs in places such as Melbourne, Australia, where four cubs were born in 2010. Update At 1:00 p.m. ET: Saffoe tells NPR that "we don't know what the gender is of either cub." "We have our internal guesses because we like to play the same games that people at home like to play," the great cats curator says. "The first cub that came out, I think every single keeper remarked how big that cub looked, so we said 'that's got to be a boy,'" he says.
<urn:uuid:d1d909e5-3c2f-4305-b257-058579f6b82b>
{ "date": "2014-03-09T02:08:53", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999670363/warc/CC-MAIN-20140305060750-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9735163450241089, "score": 2.984375, "token_count": 590, "url": "http://wvasfm.org/post/sumatran-tigers-born-national-zoo-mother-cubs-doing-well" }
from The American Heritage® Dictionary of the English Language, 4th Edition - adj. Moving or traveling homeward. - adj. Restricted or confined to home: homebound invalids. from Wiktionary, Creative Commons Attribution/Share-Alike License - adj. who is at their home, unable to leave it for some reason from the GNU version of the Collaborative International Dictionary of English - adj. Kept at home, usually due to illness; same as housebound. from The Century Dictionary and Cyclopedia - Same as homeward-bound. from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved. - n. people who are confined to their homes - adj. confined usually by illness The practice, called homebound instruction, is common for a number of reasons, including health-related issues, special education or when students present a safety threat to others, he said. Upcoming auxiliary fundraisers include gift wrap at the Green Valley Barnes & Noble from Dec. 21 to Dec. 23, and its Valentine's Day program, where volunteers call homebound seniors and read them a light-hearted poem. The Shopper / Transportation program needs volunteers to drive around the elderly, the Friendly Visitor Program needs volunteers to visit those who may be experiencing loneliness and depression, the Bikur Cholin program needs volunteers to visit ill patients in hospitals and the Telephone Reassurance program needs volunteers to call homebound seniors. Home Health: The guidance informs States that they may no longer require that people meet the more narrow Medicare definition of "homebound" in order to receive Medicaid home health services. Those pushing for change say that the current system isn't fair to people who can't attend the caucuses (technically called precinct conventions), such as homebound elderly people or those who have to work. Those programs include: reading intervention programs, special teaching programs for students that are "homebound," and bedside programs for students in the hospital. In Miami, two doctors and several nurses from ABC Home Health Care Inc. were charged with swindling $25 million by writing fake prescriptions recommending nurses and other expensive aids to treat homebound patients, authorities said. We had a three-hour layover before we could board our homebound jet to Washington-Dulles. St. Mary's County Meals on Wheels needs drivers and substitutes to deliver meals to homebound people once a week. Arlington Meals on Wheels needs volunteers to deliver meals to the homebound, 11 a.m. to 12: 30 p.m. weekdays. 703-522-0811 or [email protected]. Wordnik is becoming a not-for-profit! Read our announcement here.
<urn:uuid:452a0130-74fa-447a-833f-b9f1da326f05>
{ "date": "2014-12-19T21:12:23", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768957.83/warc/CC-MAIN-20141217075248-00059-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9439658522605896, "score": 2.546875, "token_count": 576, "url": "http://www.wordnik.com/words/homebound" }
This is another article I found! I didn't take a chance on posting just the site--I did a cut and paste of the entire article. Enjoy! By Marie Parsons Abydos, or Abjdu, lies in the eight nome of Upper Egypt, about 300 miles south of Cairo, on the western side of the Nile and about 9.5 miles from the river. It spreads over 5 square miles and contains archaeological remains from all periods of ancient Egyptian history. It was significant in historical times as the main cult center of Osiris, the lord of the netherworld. At the mouth of the canyon at Abydos, which the Egyptians believed to be the entrance to the underworld, one of the tombs of the 1st dynasty kings was mistaken for the tomb of Osiris, a thousand years later, and pilgrims would leave offerings to the god for another thousand years. The area is thus now called Umm el Qa’ab, "Mother of Pots." Abydos was the burial place for the first kings of a unified Egypt. But it contains remains from earlier, in the Predynastic period. In 1900 the Predynastic cemetery of el-Amra was excavated with hundreds of graves from all Predynastic phases. Other important cemeteries were found at Naga ed-Deir, el-Mahasna, Mesheikh, Beit Allam and the various cemeteries at Abydos itself. In addition, settlements have been found, most representing small farming villages. El-Mahasna had beer-brewing facilities. The Predynasty/Early Dynastic cemetery is located in the low desert. It consists of three parts: predynastic Cemetery U in the north, Cemetery B in the middle with royal tombs from Dynasty 0 and the early 1st Dynasty, and in the south the tomb complexes of six kings and one queen from the 1st dynasty and two kings from the 2nd dynasty. Most of the 1st dynasty tombs show traces of immense fires. Many had also been plundered many times. In 1977 a tiny ivory label was discovered bearing the "nar" name of Narmer, and the king is seen smiting an enemy in the Delta. Cemetery U contains several hundred graves and offering pits. Ceramics are from the Naqada culture. Of particular importance is the tomb named U-j, uncovered in 1988. It is dated to 150 years before Aha and the beginning of the 1st dynasty. The tomb is elaborate, brick-lined, with doors and windows. It has twelve chambers and measures about 27 feet x 24 feet. It still contained much funerary equipment. There were large amounts of different kinds of Egyptian pottery, and more than 200 wine jars imported probably from Palestine. There were also about 150 labels of ivory or bone, many of which were apparently attached to linen bolts. Many of the inscriptions on the labels are readable with clear glyphs and signs. The most frequent sign was a scorpion, sometimes together with a plant. It is speculated that either King Scorpion was buried here or that he was a known figure. Hundreds of wine jars imported from Canaan were also unearthed in one of the tomb’s store-rooms. There were traces of a wooden shrine on the floor in the burial chamber, and in the northeastern corner a complete crook-shaped scepter of ivory. Many of the earliest tombs are in the location known as Umm el Ga'ab. Ten royal enclosures in total must have been built; but only eight have been located. Some of the royal owners have been identified: Djer, Djet (Tomb), Queen-mother Merneith (Tomb), of the 1st Dynasty, Den (tomb) and Peribsen (Tomb) and Khasekhemwy (Tomb)of the 2nd Dynasty. At least some of these burials were surrounded by subsidiary graves for attendants killed and buried along with the royal funeral. Cemetery B contains three double-chamber tombs, currently attributed to King Aha (Tomb), and his Dynasty 0 predecessors of Narmer (tomb), Ka (tomb) and possibly another King named Iry-Hor (tomb). Pottery shards have been found here which are inscribed with the name-signs of these kings. Royal graves at Abydos became more elaborate, until the last and largest royal tomb built there for Khasekhemwy, last king of the 2nd Dynasty. His tomb, called Shunet es-Zebib, the Storehouse of the Flies, measures about 230 feet long and varying between 56 and 33 feet in width. Near Khentyamentiu’s temple, a mile north of the Umm el Ga’ab (Qa'ab) cemetery and nested among the enclosures were fourteen (found to-date) large boat graves The remains of the ancient ships, dating to the 1st Dynasty, were uncovered in the desert. Each averages 75 feet in length and had been encased in a structure two-feet thick with whitewashed mud-brick walls. Whether they were meant to represent solar barques, anticipating the ship built by Khufu and found within his Pyramid at Giza, is not yet known. North Abydos contains an ancient settlement and also the remains of a large stone temple from the 30th Dynasty, along with a portal structure of Ramesses II, and a fairly recently discovered temple built by Tuthmosis III. Most of the early town lies beneath modern groundwater and the remains of later settlements. Another temple, that of Khentyamentiu which was later identified with Osiris as his temple, dates from the later third millennium BCE. Royal cult buildings or ka chapels were built here by kings from the Old Kingdom through the New Kingdom. Buildings to the west and southwest of the cult buildings proved to be houses spanning the period from late Predynastic to the 2nd Dynasty. A residential and industrial section have also been found to the southeast of those excavations, dating to the Old Kingdom and First Intermediate Period. A number of mudbrick houses, consisting of between 7 and 10 small rooms, courtyards and a narrow street have been found. A workshop, the earliest and most complete faience workshop in Egypt, was also uncovered, complete with kilns. The Northern cemetery was the principal burial ground for non-royal individuals at Abydos during the Middle Kingdom, and continued to be so used through the Graeco-Roman period. The tombs of the first kings of unified Egypt were deep brick-lined structures topped with mounds of sand, later called mastabas, the Arabic word for bench, since their square or rectangular shapes resembled benches. Later in the 1st Dynasty, one structure was placed underground, supported by a retaining wall, and the second mastaba was placed above ground directly over the first, to protect the lower one. The most striking standing buildings are the enclosure of King Khasekhemwy from the 2nd Dynasty, the well-preserved New Kingdom temples of Seti I (temple) and Ramesses II (temple) from the 19th Dynasty, and the walled enclosure now called the Kom es-Sultan, the location of the early town and main temple dedicated to Osiris. The 19th Dynasty Seti temple contains seven sanctuaries set in a row, each dedicated to a different deity, Ptah, Ra-Harakhty, Amun-Ra, Osiris, Isis and Horus. Seti I himself was included with his funerary shrine. The unusual L-shaped plan of the temple is caused by a southeast wing appended to the main rectangular-shaped temple. This wing contains rooms dedicated to Sokar and Nefertum and other funerary deities. There is also a King list to the south of the sanctuaries. Since the temple was unfinished when Seti died, his son and successor Ramesses II finished the work. Immediately behind the chambers dedicated to the Osiris cult is another structure, subterranean, called the Osireion. It contains offering scenes and other scenes from the Book of Gates and the Book of the Dead. South Abydos was developed as a zone for royal cult complexes, two well-preserved ones so far identified as belonging to Senusret II of the 12th Dynasty and Ahmose of the 18th Dynasty, who built a small pyramid here. . Relief fragments at the complex of King Ahmose, the founder of the New Kingdom and conqueror of the Hyksos invaders, have been found near his pyramid and funerary complex at Abydos. One fragment represents a group of three arcers, teams of bridled chariot horses, ships with oars, and fallen warriors recognizable as Asiatics. Other fragments bear the names of Apophis, the leader of the Hyksos, and that of Avaris, the capital city of the Hyksos. As work proceeds at ancient Abydos, a home of the dead for so many millennia, more and more of the history and religious beliefs of the ancient Egyptians is returning to life. The Portal Temple of Ramesses II The Mortuary Complex of Senusret III The Tombs of Umm el Ga'ab: Adjib (Anedjib), Tomb of (X) Aha, Tomb of (B10, B15, B19) Den (Wdimu), Tomb of (T) Djer, Tomb of (and the Tomb of Osiris) (O) Djet (Wadji), Tomb of (Z) Iry-Hor, Tomb of ( B1-B2) Ka, Tomb of (B7-B9) Khasekhemwi, Tomb of (V) Queen Merytneith, Tomb of (Y) Narmer, Tomb of (B17-B18) Peribsen, Tomb of (P) Qa'a, Tomb of (Q) Semerkhet, Tomb of (U) Encyclopedia of the Archaeology of Ancient Egypt Archaeology Magazine, by David O’Connor, Diana Craig Patch, and Stephen P. Harvey The Oxford Encyclopedia of Ancient Egypt Egypt Uncovered by Vivian Davies and Renee Friedman Marie Parsons is an ardent student of Egyptian archaeology, ancient history and its religion. To learn about the earliest civilization is to learn about ourselves. Marie welcomes comments to [email protected]
<urn:uuid:534d1537-b9b7-4fae-83c2-788349f57c92>
{ "date": "2014-09-02T02:00:44", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921318.10/warc/CC-MAIN-20140909055359-00495-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9643840789794922, "score": 2.84375, "token_count": 2192, "url": "http://www.kingtutone.com/forum/viewtopic.php?p=7387" }
Students received three items (wire, light bulb and battery) and had to make the light bulb shine. After a few minutes of trial and error, they became successful in lighting the bulb, Students learned that this was a circuit. It was a closed or complete circuit when light bulb was on and an open circuit when the light bulb was off. Besides making a complete circuit, student had to view illustrations of circuits, predict if they were closed or open, and finally tested them to using their tools. I hope you enjoy learning how the garden changes throughout the school year.
<urn:uuid:248f4f6d-94e1-4157-8526-5d73a6c718f9>
{ "date": "2018-07-18T07:07:49", "dump": "CC-MAIN-2018-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590069.15/warc/CC-MAIN-20180718060927-20180718080927-00216.warc.gz", "int_score": 4, "language": "en", "language_score": 0.990414023399353, "score": 3.875, "token_count": 115, "url": "http://eelmatus.weebly.com/garden-blog/circuits" }
Life Science: Session 6 Building a Tree of Life What is a tree of life? The theory of evolution by natural selection makes a powerful supposition: All species, past and present, trace their ancestry to a single common ancestor. If this is valid, and if evidence of common ancestry can be found, scientists should be able to trace the evolution of life on Earth. A tree of life is a powerful graphic model that is used to display this information. To interpret a tree of life is simple. Every node represents a common ancestor, from which two different lineages branch. Branches that occur closer to the top of the tree represent lineages that arose later in evolutionary time. The tips of branches represent living species. The closer two tips are within one branch, the more closely they’re related. How are trees of life built? Scientists constructing early trees of life used a variety of data to hypothesize relatedness of modern species – mostly external and internal features. This was supplemented with other types of evidence, including the fossil record. It was (and is) particularly exciting for scientists to find transitional forms, which provide evidence of common ancestry. One notable example is Archaeopteryx, which, preserved as a fossil imprint, has both reptile and bird features, and is used to argue that birds evolved from reptiles. Today, molecular evidence in the form of DNA sequencing is used to provide data to build a tree of life. The assumption with this type of data is based on mutation — changes in DNA sequences due to errors in replication. Mutation provides the variation upon which natural selection acts in order to cause evolution. As two species evolve from a common ancestor, their DNA will continue to mutate and will become less and less similar. Eventually, differences in DNA become a genetic reflection of the differences between species. DNA sequencing, therefore, is allowing scientists to build a tree of life that they consider to be much more accurate. |prev: vertebrate evolution||next: scientist at work|
<urn:uuid:da1f229b-edf9-4d80-8576-71983d848d23>
{ "date": "2014-04-20T08:24:43", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538110.1/warc/CC-MAIN-20140416005218-00443-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9540210366249084, "score": 3.75, "token_count": 410, "url": "http://www.learner.org/courses/essential/life/session6/closer4.html" }
(Of a ship) moored by means of an anchor: thirty ships lay at anchor here the day before Más ejemplos en oraciones - By the time they'd reached the top of the hills surrounding the harbor where the ship lay at anchor, she'd fallen hopelessly in love with Greece, the island and the taxi driver. - At the ports of Los Angeles and Long Beach, dozens of container ships are stuck waiting at anchor or in a berth at any given time because there aren't enough dockworkers to unload them. - The baton was transferred from her sister ship HMS Kent at anchor of Salalah, Oman after a concentrated programme of briefings, personnel and equipment exchanges. Definición de at anchor en: - el diccionario Inglés de EE.UU.
<urn:uuid:54baf951-1723-4fdb-adb7-bfd09240d35e>
{ "date": "2014-08-30T08:47:46", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834663.62/warc/CC-MAIN-20140820021354-00048-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8134127855300903, "score": 2.84375, "token_count": 172, "url": "http://www.oxforddictionaries.com/es/definicion/ingles/at-anchor" }
Despite professing to care about the environment and supporting environmental causes, individuals behave in environmentally irresponsible ways like driving when they can take public transportation, littering, or disposing of toxic materials in unsound ways. This is the author's fourth exploration of how to encourage individuals to stop behaving irresponsibly about the environment they allege to care deeply about. The prior three articles all explored how the norm of environmental protection could be enlisted in this effort; this article applies those theoretical conclusions to the very practical task of getting people to switch the type of light bulb they use. To accomplish this, the article synthesizes the previous articles into an assumption about the critical role of norms in changing personal behavior and tests that assumption by exploring how to make individuals more responsible consumers of electricity and adhere to the concrete norm of energy conservation by swapping out their incandescent light bulbs for compact fluorescent lights (“CFLs”). The agreed upon goal behind energy conservation is to reduce the country’s reliance on fossil fuel-based energy production, thus reducing the emission of harmful airborne pollutants and greenhouse gases as well as the related environmental harms associated with coal production. One way to reduce residential energy consumption is to persuade individuals to switch to CFLs. Up to ninety percent of energy produced by incandescent bulbs is lost as heat; switching to CFLs is one way to prevent this energy loss. 37 Hofstra L. Rev. 943-974 (2009) Scholarly Commons Citation Babcock, Hope M., "Responsible Environmental Behavior, Energy Conservation, and Compact Fluorescent Bulbs: You Can Lead a Horse to Water, But Can You Make It Drink?" (2009). Georgetown Law Faculty Publications and Other Works. 943.
<urn:uuid:fa1f050a-befb-4770-91cf-beb1ecd33c86>
{ "date": "2017-10-21T19:27:43", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824894.98/warc/CC-MAIN-20171021190701-20171021210701-00356.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8958917260169983, "score": 3.078125, "token_count": 354, "url": "http://scholarship.law.georgetown.edu/facpub/943/" }
those had certificated librarians, compared with 93% of all high schools nationally with certificated librarians (Howell, 1968). The report noted the challenges of keeping pace with the rapid population growth of that era but nevertheless included a host of recommendations about required staffing and budget levels to provide adequate library services to all public schools. "The results of this study make it apparent," wrote Superintendent of Public Instruction Max Rafferty in the foreword of the report, "that far too little has been done for the schools to have the library facilities, stock of library materials, and quality of library services they need and must have to maintain the quality of modern education programs that are required" (Howell, iii). In spite of robust federal funding from ESEA, the California legislature did not mandate staffing or minimum per pupil expenditures. The California Media and Library Educators Association, though, did produce Guidelines for California Library Media Programs.: School, District, County, State, which adapted the national standards of 1975 to California and articulated qualitative and quantitative guidelines to be used by schools and districts throughout the state in developing and maintaining quality school library programs (Guidelines for California Media Programs, 1977). Just as the ESEA money was folded into an education block grant, Section 18100 of the California education code was passed, requiring school districts to maintain school libraries or enter into contracts with other agencies to do this, and directing the State Board of Education to adopt standards, rules and regulations for library services (Brandes, 1987). The State Board even made strong recommendations that districts assign certificated librarians to provide services to students in well-stocked school libraries. Unfortunately, because these recommendations and regulations carried no funding mechanisms or sanctions for enforcement, districts were free to carry out the Board's instructions to any degree they chose (Brandes, 1987). Achterman, Douglas L.. Haves, Halves, and Have-Nots: School Libraries and Student Achievement in California. Denton, Texas. UNT Digital Library. http://digital.library.unt.edu/ark:/67531/metadc9800/. Accessed June 19, 2013.
<urn:uuid:1cbd70b9-b126-49ce-a91e-667f9400cc08>
{ "date": "2013-06-20T02:01:06", "dump": "CC-MAIN-2013-20", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00000-ip-10-60-113-184.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9371855854988098, "score": 2.65625, "token_count": 467, "url": "http://digital.library.unt.edu/ark:/67531/metadc9800/m1/94/ocr/" }
Require Java Assistance? : Require Java Assistance? Introduction to Java : Introduction to Java Java is both a programming language and a platform. Syntax is derived from C and C++ with a simpler object model and low level facilities. Can run on any JVM irrespective of the computer architecture as the applications are compiled to bytecode. It allows application developers to write once and execute anywhere. Java Features : Java Features Platform Independent. Several hazardous features of C,C++ removed. Automatic Memory Management. Built-in Networking. Benefits: Java : Benefits: Java Development Tools: Compiling, running, monitoring, debugging, and documenting applications. Application Programming Interface (API): API provides the core functionality of the Java programming language. It offers a wide array of useful classes ready for use in the applications. It spans everything from basic objects, to networking and security, to XML generation and database access, and more. Deployment Technologies: The JDK software provides standard mechanisms such as the Java Web Start software and Java Plug-In software for deploying of applications to end users. User Interface Toolkits: Swing and Java 2D toolkits make it possible to create sophisticated Graphical User Interfaces (GUIs). Integration Libraries: Integration libraries such as the Java IDL API, JDBCTM API, Java Naming and Directory InterfaceTM API, Java RMI, and Java RMI-IIOP Technology enable database access and manipulation of remote objects. Services we provide.. : Services we provide.. Java Web Application Development Services. Java Application Programming. Java Website Development. JSP and Java Integration. Java Applet Development. Java Web Services Development. Java Product Development. Java JSP Servlets Maintenance and Support Service Contact Us : Contact Us For Java related queries Contact
<urn:uuid:c7f7f44b-b959-4827-a021-2ee68f67abf8>
{ "date": "2014-09-03T04:37:52", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00227-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.7520000338554382, "score": 2.703125, "token_count": 373, "url": "http://www.authorstream.com/Presentation/suryakantbehera-331981-java-jsp-servlet-development-offshoredevelopment-javaoutsourceindia-javaexperts-javaserviceprovider-offshorejavadevelopment-mfs-science-technology-ppt-powerpoint/" }
- 1Control or maintain the rate or speed of (a machine or process) so that it operates properly: a hormone that regulates metabolism and organ functionMore example sentences control, adjust, manage - Water is necessary to transport nutrients around the body, remove wastes, maintain body temperatures and regulate metabolic processes in our bodies. - He slipped inside and, struggling to think over the deafening noise of the generator, he found the control panel that regulated the machine and switched it off. - Depression stiffens the body's response to insulin, the hormone that helps regulate energy metabolism. - 1.1Control or supervise (something, especially a company or business activity) by means of rules and regulations: the organization that regulates fishing in the regionMore example sentences - One can only suspect that both the US and the EU are responding to pressure from business leaders not to regulate their overseas activities. - Often governments for a variety of reasons decide to regulate the activities of firms that compete against each other. - In contrast, no previous treaty or customary rule existed regulating method of combat in internal armed conflict. - 1.2Set (a clock or other apparatus) according to an external standard.More example sentences - Clocks were regulated by electricity to Greenwich mean time. - Mr. Davies came every Friday to wind and regulate the clocks. - More example sentences - On the other hand, the public should accept some inconvenience to their daily routines due to regulative measures the government will inevitably take in order to protect them from the dangerous illness. - Meanwhile, back at home, businesses have very strong lobby groups that exert massive pressure on the government to not pass any regulative legislation. - In the West, liberal support for the child's independence rather than regulative monitoring by parents tends to prevent juvenile delinquency. late Middle English (in the sense 'control by rules'): from late Latin regulat- 'directed, regulated', from the verb regulare, from Latin regula 'rule'.
<urn:uuid:3db37e0e-f644-43ed-a4ff-127334c1d9e9>
{ "date": "2014-03-15T02:28:35", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678695535/warc/CC-MAIN-20140313024455-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9155164957046509, "score": 3.328125, "token_count": 411, "url": "http://www.oxforddictionaries.com/us/definition/american_english/regulate" }
From Guaymas, Sonora, Mexico: As a father of five year old daughter with typeá1 diabetes, I want to know if there is any realistic milestone to find a cure. Are we three, five, or 10 years away from the cure? Will it be very expensive once they find it? There are many researchers all around the world looking for a cure for diabetes. We know a great deal more now than even five or ten years ago, but we believe that typeá1 diabetes is a disease in which the body's immune system gets mixed up -- and attacks the normal beta cells of the pancreas. These cells are destroyed so that insulin deficiency occurs. Researchers are looking to understand how this occurs since this may give us a clue to block the autoimmune destruction. This may also give us some idea how to allow other beta cells or a pancreas/part of a pancreas to be transplanted. For now, unfortunately, there is no immediate cure. State-of-the-art treatment is expensive and includes frequent blood glucose monitoring, multiple insulin doses designed to mimic how the pancreas used to work, knowledge of food and activity as well as illness/stress effects on blood glucose levels and close contact with a multidisciplinary diabetes treatment team to maximize treatment options for anyone with type 1 diabetes. Original posting 1 Oct 2001 Posted to Research: Cure Last Updated: Tuesday April 06, 2010 15:09:25 This Internet site provides information of a general nature and is designed for educational purposes only. If you have any concerns about your own health or the health of your child, you should always consult with a physician or other health care professional. This site is published by Children With Diabetes, Inc, which is responsible for its contents. © Children with Diabetes, Inc. 1995-2014. Comments and Feedback.
<urn:uuid:4811db30-8fa1-4ba3-b4ba-0a018ef90d2b>
{ "date": "2013-12-07T06:22:12", "dump": "CC-MAIN-2013-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053608/warc/CC-MAIN-20131204131733-00002-ip-10-33-133-15.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9252408146858215, "score": 2.625, "token_count": 380, "url": "http://www.childrenwithdiabetes.com/dteam/2001-10/d_0d_7lp.htm" }
Chemicals and COSHH Chemical Safety (Information Sheets) - Clinical Waste Disposal There's an array of chemicals and materials at the University, some are perfectly safe, others could cause harm to you, an unborn child or harm the environment. That is why before carrying out any experiment at the University, you must always undertake a COSHH Assessment. This process is essential to finding out what the dangers are of using the chemical and it will also help you to work out what controls you need to put in place to manage any risk. However, never assume because you have worked with the chemical before you understand the risks associated with it because how it will react will also depend on a number of other factors, for example: - Quantity being used - How it will react with other chemicals being used - How it will react during the processes being used That is why before starting your COSHH Assessment you must refer to guidance so you fully understand the chemical you are working with. Useful sources of information to identify chemical hazards are the Manufacturers Safety Data Sheets (MSDS) and the Sigma-Aldrich database is a good source of such information, and if you can't find information on the chemical don't use it and ask your Supervisor for help. Alfa Aesar also provide a good searchable MSDS database The following guidance has been produced to help you understand the COSHH Assessment process. The guidance includes a blank COSHH Assessment Form which you can type straight into and a Powerpoint training package on how to undertake a COSHH Assessment. - COSHH Risk Assessment Form (Word) - COSHH Risk Assessment Training Presentation (PPT) - Hyfforddiant Asesu Rheoliadau Rheoli Sylweddau Peryglus i Iechyd (COSHH) - Biological Hazard Risk Assessment Form (Word) In addition, a number of Information Sheets have been prepared on specific chemical safety topics. It is hoped these will provide useful information and answer frequently asked questions regarding chemical safety, for example chemical compatibility, safe storage of chemicals etc. - Information Sheet 1 - First Things First - Information Sheet 2 - Identifying Chemical Hazards - Information Sheet 3 - Chemical Storage - Information Sheet 4 - Chemical Compatibility - Information Sheet 5 - Emergency Spill Procedure - Information Sheet 6 - Safe Handling and Use of Chemicals - Information Sheet 7 - Safe Disposal of Chemicals - Information Sheet 8 - Globally Harmonised System (GHS) - Chemical Waste Disposal Procedure If your School/Department intends to produce and supply unique chemicals then the CLP Regulations will apply immediately (as will REACH). Further information is available in from HSS or: The Table of harmonised entries in Annex VI to CLP ECHA has prepared an excel table containing all updates to the harmonised classification and labelling of hazardous substances, which are available in Table 3.1 of Annex VI to the CLP Regulation. The excel table containing all updates to the harmonised classification and labelling of hazardous substance is available here. New Hazard Labelling & Information - see link From the 1st June 2015 the type of warning labels on hazardous substances distributed / supplied by manufacturers etc changed from the traditional 'orange square' to the world standard 'diamond' shape. Many of the images stayed the same but numerous new warning images were also introduced. CLP also introduced harmonised warning and precautionary statements for labels, which replaced the old style risk and safety phrases. Hazard Statements for labels, for example: - H240 - Heating may cause an explosion - H320 - Causes eye irritation - H401 - Toxic to aquatic life Precautionary Statements for labels, for example: - P102 - Keep out of reach of children - P271 - Use only outdoors or in well-ventilated area - P410 - Protect from sunlight More information on the CLP Regulations can be found on the HSE site and in Information Sheet 8 as detailed above. Useful Sources of Information: - GHS, the internationally agreed Globally Harmonised System of Classification and Labelling of Chemicals (NCEC) - Royal Society of Chemistry
<urn:uuid:342f9bc9-b90e-453d-8205-5e9da182a93a>
{ "date": "2019-05-20T10:28:21", "dump": "CC-MAIN-2019-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255943.0/warc/CC-MAIN-20190520101929-20190520123929-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8951037526130676, "score": 3.328125, "token_count": 883, "url": "https://www.bangor.ac.uk/hss/inflink/chemical-information.php.en" }
It may be hard to believe but there are lots of ways of using a difficult childhood experience in a positive way. MAKE THE BEST OF IT A difficult parent can provide a useful template of how you don’t want to be. Or who you don't want to be with. It also helps you recognise and be wary of other difficult people in various walks of life. A painful life at home with a difficult mother or father won’t last for ever. Even negative thoughts can be turned round and used to make you strong and positive. FIND OUT HOW OTHERS LIVE Look at your friends' families and your own extended family. Watch how people on buses, trains and in shops behave. See how other children interact with their parents and how the parents respond. DEVELOP INNER STRENGTH A difficult parent can instill a powerful need to prove yourself. Doing well will boost your confidence and make you feel good. Learn to trust your instinct. Coping Studying how your difficult parent communicates will help you develop skills in dealing with people and get your point across in a more positive way. Learn the importance of good timing and being tactful, logical and clear. CONFIDENCE AND SELF BELIEF Growing in confidence will: - make you less scared of what you lived through as a child. - help you make your own decisions and opinions. - give you the strength to walk away from something or someone you feel uneasy about. This is not an easy skill to learn but will help you cope with difficult situations and cut down on arguments.
<urn:uuid:3c342c2e-e583-40f4-ab54-dc31a9a386ab>
{ "date": "2017-06-28T05:23:05", "dump": "CC-MAIN-2017-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322870.59/warc/CC-MAIN-20170628050821-20170628070821-00337.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9335733652114868, "score": 2.53125, "token_count": 339, "url": "http://www.myhorridparent.com/positives/" }
Wednesday, February 23, 2011 In the stunning book "Unbroken," by Laura Hillenbrand, the true World War II survival tale of Louis Zamperini, ill-treated American prisoners of war get a rare chance to laugh when their captors tell them that the Japanese military had torpedoed Washington, D.C., and killed President Abraham Lincoln. Of course, we all know that our 16th president had met his tragic end in 1865, and it's fairly a surprising fact that even Japanese soldiers in 1943 did not know this. But, here on Presidents Day eve, how much do we know about our own presidents? Many of us take a day off from work, we fly the flags that day, in this combination of what once were observances of Lincoln's Birthday and Washington's Birthday, but how much do we know about the 44 men who have served our highest elected office?. Presidents Day legally took effect in 1971 as a way to honor all our nation's commanders-in-chief. Speaking of birthdays, those 40 and older had probably memorized Lincoln's (Feb. 12) and Washington's (Feb. 22) but how many other presidential birthdays are common knowledge? Calvin Coolidge was born on July 4 and, remarkably, three of our first five presidents died on that date: Presidents John Adams, Thomas Jefferson - the only presidents to sign the Declaration of Independence - and James Monroe. Do you know which presidents died in office? William Harrison (after having served only one month), Zachary Taylor, Abraham Lincoln, James Garfield, William McKinley, Warren Harding, Franklin Roosevelt and John Kennedy. Who is the only president besides Kennedy buried in Arlington National Cemetery? (William Taft.) Thomas Jefferson declined even to honor himself at his place of rest. He designed his own tombstone and wrote his own epitaph, omitting the fact that he was President of the United States. Also, Jefferson was the first president to shake hands with guests. Previously people bowed to presidents. Our first president, Washington, had no formal education, and at various times he wore dentures made of human teeth, animal teeth, ivory or even lead. Never wood. Washington was the only president elected unanimously; he received all 69 electoral votes. Presidential leadership was not always such a clear distinction. When the first southern states seceded in 1861, John Tyler (a Virginian, and president from 1841-45) worked to create the Southern Confederacy. He died in 1862, a member of the Confederate House of Representatives. (Joseph Nathan Kane as posted on http://www.infoplease.com/spot/prestrivia1.html)
<urn:uuid:cc935c05-962e-4ad9-95f6-d182ab9f5c87>
{ "date": "2017-10-19T11:18:42", "dump": "CC-MAIN-2017-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823282.42/warc/CC-MAIN-20171019103222-20171019123222-00256.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9757531881332397, "score": 3.265625, "token_count": 554, "url": "http://t.hoodrivernews.com/news/2011/feb/23/feb-19-2011-editorial-getting-to-know-the-chiefs/?templates=tablet" }
Ever heard of 'oil sands'? Michael Fumento describes the possibility of five centuries of cheap oil: |It was a tenet of the late great economist Julian Simon that we'll never run out of any commodity. That's because before we do the increasing scarcity of that resource will drive up the price and force us to adopt alternatives. For example, as firewood grew scarce people turned to coal, and as the whale oil supply dwindled 'twas petroleum that saved the whales.| Now we're told we're running out of petroleum. The "proof" is the high prices at the pump. In fact, oil cost about 50% more per barrel in 1979-80 than now when adjusted for inflation. Yet it's also true that industrializing nations like China and India are making serious demands on the world's ability to provide oil and are driving prices up. So is this the beginning of the end? Nope. The Julian Simon effect is already occurring. The evidence is in something called oil sands (also called oil shale), a tar-like substance that can be surface mined as coal often is. The oil is then separated from the dirt using energy from oil or natural gas extracted from the site itself to produce a tar-like goo called bitumen. It's then chemically split to produce crude as light as from a well head. Oil sands in a single Venezuelan deposit contain an estimated 1.8 trillion barrels of petroleum, with 1.7 trillion in a single Canadian deposit. In all, about 70 countries (including the U.S.), have oil sand deposits although technology hasn't yet made them economical for exploitation. Of Canada's reserves alone, over 300 billion barrels (more than the entire proved oil reserves of Saudi Arabia) is currently considered recoverable. And recovering it they are... Michael Fumento: Fill 'er up with oil sands!
<urn:uuid:507ba184-9dc2-44c0-9b47-aa2c1801a489>
{ "date": "2014-12-20T17:51:44", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770071.75/warc/CC-MAIN-20141217075250-00131-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9608803391456604, "score": 3.203125, "token_count": 382, "url": "http://directorblue.blogspot.ca/2005_10_01_archive.html" }
Without a doubt, technology is no longer a minor part of education. My experience with computers as a high school student (early to mid 80s) simply involved using one to type a paper for English class and creating flow charts in computer class on Wang computers. Since then, technology has become a fundamental part of our daily lives as well as education at every level. As a result of an insatiable thirst for instant information in our society, it’s become paramount that schools “keep up”. Often times, this means altering and/or adopting methodologies that will best harness technology as an instrument to enrich and support learning opportunities. I have read and heard discussions with the prevailing thought of computers inevitably replacing teachers. I think a lot of people underestimate the value of teachers and the influence they can have on their students. “Teachers affect eternity; No one can tell where their influence stops.” ~Henry Brooks Adams These are six reasons why I don’t think computers will ever fully replace teachers. 1. Relationship Building - Teachers will take interest in their students as people and learn about their activities outside of the classroom. I made sure to periodically talk with students about their lives away from school. It allowed me to get to know them better (learning things I would not have ever known) and in turn for them to know more about me aside from being their teacher. When invited, I would also attend plays, athletic competitions, recitals, etc. It was truly amazing to see those students in different environments. Often times, they seemed the complete opposite of their school persona. 2. Teaching To Multiple Learning Styles - Everyone learns and thinks differently. Regardless of the modality of learning (auditory, kinesthetic or visual) teachers will provide differentiated instruction to accommodate the needs of their students. Examples of this can be using a math game to reinforce basic math skills, varying delivery style for a lesson (hands-on activity for kinesthetic learners), or group activities (grouping students to allow for success based upon their skill set). 3. Field Trips/Special Events - Teachers spend an inordinate amount of time planning lessons and experiences for their students. The kids will have fond memories these experiences when they reflect upon their time as your student. This is definitely true as I have experienced it. Some of the experiences my former students recall are team building activities, field trips and musicals they performed as a grade level. I still remember them too! Technology is not able to provide these type of experiences. 4. Role Model/Mentor - Teachers serve as role models every minute of every day. It is a major element of who they (we) are and what they undertake. Many students learn from their teacher(s) simply through observation while others learn more directly. This is a responsibility the majority of teachers take seriously. 5. Flexibility - A major part of teaching is having the ability to be flexible. Most teachers will give great effort to do what is necessary for their students to succeed. Every teacher creates lesson plans, but anyone who has taught (in any capacity) knows that things don’t always go as planned. Teachers must be cognizant of times when their students are experiencing difficulty (give students a short break or end the lesson and continue the next day) as well as when concepts need to be covered in more depth. I think being flexible also includes doing something different every now and then. For example, when I taught fourth grade I would read to the class after lunch each day for 15 - 30 minutes. We would periodically change our location. Sometimes we stayed in the classroom. Sometimes we would go outside and sit under a shade tree, or go to the Storytelling Room adjacent to the library. As much as students like routine and predictability, they enjoy a change of pace and appreciate it when it happens. 6. Leadership - Great teachers inspire students to undertake leadership roles, accept academic challenges, become confident in their academic abilities, and become agents of change. They recognize strengths and encourage kids to reach their full potential as students and as individuals. In elementary school, this is often accomplished by giving students appropriate opportunities to develop as leaders (typically, but not limited to, classroom jobs). At any level, taking time to work with a student one on one, covering a concept they are having difficulty with, exhibits genuine concern about that student’s success. An example of this is having a one on one conversation with a student that is having social, academic and/or issues at home. In order to provide effective leadership, one has to gain the respect and trust of their students. Once that is accomplished, you will be amazed at the positive influence a teacher can have. Technology is a powerful tool that can facilitate student learning.Teachers that are resistant to effectively incorporating technology into their curriculum risk hindering their students’ development into a 21st century learners.
<urn:uuid:bccac158-ffb0-4957-bf2e-64b2c54b5c35>
{ "date": "2019-03-20T20:09:09", "dump": "CC-MAIN-2019-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202450.86/warc/CC-MAIN-20190320190324-20190320212054-00061.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9757925271987915, "score": 2.5625, "token_count": 1002, "url": "http://www.penrosetutoringandlearning.com/blog/five-reasons-technology-will-not-replace-teachers" }
The Most Important Financial Ratios for New Investors Before you can begin investing in individual stocks, it is important that you learn how to calculate financial ratios. Even if you decide to get your financial ratios from your broker or financial site, you still need to know what they represent and what they will tell you about the business in which you would like to invest. Otherwise, you may make a mistake and buy into a company with too much debt, not enough cash to survive, or low profitability. This guide to financial ratios will explain how to calculate the most important financial ratios, and, more importantly, what they mean. You can't calculate financial ratios without the financial statements! This guide to financial statements provides step-by-step instructions on how to read a balance sheet, income statement, and other important accounting documents. All financial ratios are divided into one of five categories. By learning each of these five categories, you'll know which financial ratio calculation is needed when you begin working through a company's financial statements. Some investors prefer to focus on a financial ratio known as the "price to cash flow ratio" instead of the more famous "price-to-earnings ratio" (or p/e ratio for short). Sit back, relax, and grab a cup of coffee because you're about to learn everything you ever wanted to know about this often overlooked stock valuation tool. The price to earnings ratio, also known as the p/e ratio, is probably the most famous financial ratio in the world. It is used as a quick and dirty way to determine how "cheap" or "expensive" the stock is. The best way to think of it is how much you are willing to pay for every $1 in earnings a company generates. Learn how to calculate it, and much more. While the price to earnings ratio (or p/e ratio for short) is the most popular way to measure the relative valuation of two stocks, the PEG ratio goes one step further. It stands for the price-to-earnings-to-growth ratio. As you can tell by its title, the PEG ratio factors in a company's growth. The asset turnover financial ratio calculates the total sales for each dollar of asset a company owns. It measures a company's efficiency in using its assets. Like the price to earnings ratio, the current ratio is one of the most famous of all financial ratios. It serves as a test of a company's financial strength and relative efficiency. For instance, you can tell if a company has too much, or too little, cash on hand. The debt to equity ratio is important because investors like to compare the total equity (net worth) of a company to its debt obligations. For instance, if you own $100 million worth of hotels and have $30 million in debt, you are going to be less concerned than if you have the same $30 million in debt with only $40 million worth of real estate. Learn how to calculate the debt to equity ratio and why it is important. The gross profit margin lets you know how much profit is available as a percentage of sales to pay payroll costs, advertising, sales expenses, office bills, etc. It's one of the most important financial ratios you can learn. The interest coverage ratio is an important financial ratio for firms that use a lot of debt. It lets you know how much money is available to cover all of the interest expense a company incurs on the money it owes each year. If you need to know how many times a business turns its inventory over a period of time, you'll need to use the inventory turnover ratio. It allows you to see if a company has too many of its assets tied up in inventory and is heading for financial trouble. An extremely efficient retailer, for instance, is going to have a higher inventory turnover ratio than a less efficient competitor. The net profit margin ratio tells you how much money a company makes for every $1 in revenue. Companies with higher net profit margins can often offer better benefits, heftier bonuses, and fatter dividends. Operating income, or operating profit as it is sometimes called, is the total pre-tax profit a business generated from its operations. It is what is available to the owners before a few other items need to be paid such as preferred stock dividends and income taxes. The Quick Test Ratio (also called the Acid Test or Liquidity Ratio) is the most excessive and difficult test of a company's financial strength and liquidity. When you are analyzing a business or a stock, common sense tells you that the faster a company collects its accounts receivables, the better. The sooner customers pay their bills, the sooner a company can put the cash in the bank, pay down debt, or start making new products. There is also a smaller chance of losing money to delinquent accounts. Fortunately, there is a way to calculate the number of days it takes for a business to collect its receivables - it's called receivable turns or receivable turnover, and it's a useful financial ratio to learn. Where asset turnover tells an investor the total sales for each $1 of assets, return on assets, or ROA, tells an investor how much profit a company generated for each $1 in assets. The return on assets figure is also a sure-fire way to gauge the asset intensity of a business. For example, does the company in which you are researching have to spend large sums of money on expensive machinery before it can manufacture and sell a product to generate a return? It is one of the most important financial ratios you can know. One of the most important profitability metrics is a return on equity (or ROE for short). Return on equity reveals how much profit a company earned in comparison to the total amount of shareholder equity found on the balance sheet. Once you know how to calculate the return on equity financial ratio mentioned above, you need to go even further and break it down into the various components. This is called the DuPont analysis. By learning it, you can actually see what it is that makes a company profitable. It is, and remains, the secret to understanding most great fortunes. The working capital per dollar of sales financial ratio is important because it lets you know how much money a company needs to keep on hand to conduct business. Generally speaking, the more working capital a company needs, the less valuable it is because that's money the owners can't take out of the business in the form of dividends.
<urn:uuid:f3c802a1-5443-46c0-a1d0-1a1dfb6a3d31>
{ "date": "2019-06-17T05:32:00", "dump": "CC-MAIN-2019-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998376.42/warc/CC-MAIN-20190617043021-20190617065021-00096.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9592620134353638, "score": 2.515625, "token_count": 1325, "url": "http://jacara.info/financial-ratio-guide-357501" }
Maine Schools for Excellence - TIF 4 The Maine Schools for Excellence (MSFE) project aims to improve the education system in the state of Maine by providing select schools and districts with opportunities for rigorous professional development, a new evaluation system for educators which focuses on helping teachers and leaders improve their methods, and bonuses for improved student performance. This page will serve as a portal for our district's involvement in this project as well as to provide general information about this project as a whole. Below you will find links to documents and external websites to help you better understand the scope of this initiative and what it is trying to accomplish. TakeOne! & TEPG Facilitator Roll Out - 05/15/2013 Evaluation Systems - A Comprehensive Guide to Developing & Operating Teacher Evaluation Systems Presentation. Gathering Feedback for Teaching - This report presents an in-depth discussion of the analytical methods and findings from the Measures of Effective Teaching (MET) project’s analysis of classroom observations. The Widget Effect - This report examines our pervasive and longstanding failure to recognize and respond to variations in the effectiveness of our teachers.
<urn:uuid:ded06d9c-ea1e-4e45-a39e-80df699820ef>
{ "date": "2014-12-18T21:35:00", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767878.79/warc/CC-MAIN-20141217075247-00163-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9242313504219055, "score": 2.515625, "token_count": 230, "url": "http://www.rsu19.org/tif-4" }
Tale of Two Talmuds Two versions of the Talmud--the Bavli and Yerushalmi--have much in common but also reflect differences in language, length, and cultural context. When people speak of "the Talmud," they are usually referring to the Talmud Bavli (Babylonian Talmud), composed in Babylonia (modern-day Iraq). However, there is also another version of the Talmud, the Talmud Yerushalmi (Jerusalem Talmud), compiled in what is now northern Israel. The Yerushalmi, also called the Palestinian Talmud or the Talmud Eretz Yisrael (Talmud of the Land of Israel), is shorter than the Bavli, and has traditionally been considered the less authoritative of the two Talmuds. Like the Talmud Bavli, the Talmud Yerushalmi consists of two layers--the Mishnah and the Gemara. For the most part, the Mishnah of the two Talmuds is identical, though there are some variations in the text and in the order of material. The Gemara of the Yerushalmi, though, differs significantly in both content and style from that of the Bavli. First, the Yerushalmi Gemara is primarily written in Palestinian Aramaic, which is quite different from the Babylonian dialect. The Yerushalmi contains more long narrative portions than the Bavli does and, unlike the Bavli, tends to repeat large chunks of material. The presence of these repeated passages has led many to conclude that the editing of the Yerushalmi was never completed. Others, however, have argued that these repetitions represent a deliberate stylistic choice, perhaps aimed at reminding readers of connections between one section and another. Comparing the Two Texts While the Bavli favors multi-part, complex arguments, Yerushalmi discussions rarely include lengthy debate. For instance, both the Bavli and the Yerushalmi discuss the following Mishnah: "For all seven days [of Sukkot], one should turn one's Sukkah into one's permanent home, and one's house into one's temporary home. . ."(Sukkah 2: 9). The Bavli Gemara embarks on a long discussion of the validity of this statement in the Mishnah: ". . .The rabbis taught, 'You shall dwell [in booths on the holiday of Sukkot]' (Leviticus 23:42) means 'you shall live in booths.' From this, they said 'for all seven days, one should make the Sukkah [temporary booth or hut] one's permanent home, and one's house temporary home. How should one do this? One should bring one's nice dishes and couches into the Sukkah, and should eat, drink and sleep in the Sukkah.' Is this really so? Didn't Rava say that one should study Torah and Mishnah in the Sukkah, but should study Talmud outside of the Sukkah? (This statement appears to contradict the Mishnah's assertion that during Sukkot, one should do everything inside the Sukkah.) This is not a contradiction. [The Mishnah] refers to reviewing what one has already studied, while [Rava's statement] refers to learning new material [on which one might not be able to concentrate while in the Sukkah]" (Talmud Bavli Sukkah 28b-29a). As proof of this resolution, the Bavli goes on to relate a story of two rabbis who leave their Sukkah in order to study new material. Finally, the Gemara suggests an alternate resolution of the apparent conflict--namely, that one learning Talmud is required to stay in a large Sukkah, but may leave a small Sukkah. Did you like this article? MyJewishLearning is a not-for-profit organization.
<urn:uuid:d250889c-d1af-456d-8f53-cb41f5c14f7e>
{ "date": "2014-11-20T20:55:55", "dump": "CC-MAIN-2014-49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400372202.67/warc/CC-MAIN-20141119123252-00048-ip-10-235-23-156.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9454084634780884, "score": 3.375, "token_count": 824, "url": "http://myjewishlearning.com/texts/Rabbinics/Talmud/Gemara/Babylonian_and_Jerusalem_Talmuds.shtml?p=1" }
Jameh Mosque of Saveh is among the first mosques built in Iran and Saveh County. It was adorned and refurbished by Iranian artists during different periods in a way that nothing has remained from the initial building of the mosque as e result of the refurbishments. This mosque is completely made by mud that has made it unique. Jameh Mosque of Saveh consists of a court and a dome in the south, two porches, one minaret, some Shabestans, several old Mihrabs with Kufic script, and two mihrabs from Safavid period with Thuluth script. One of the features of this religious-historical monument is that the signs of three historical periods (pre-Islamic, early Islamic centuries, and Safavid period) are visible in it. The remains of this monument indicate the fact that it has been a fire temple during Ancient Iran’s period, and changed to a mosque in the Islamic period. The mosque covers an area of 4200 square meters, and it was registered in the list of Iran’s National Heritage as the first historical monument of Markazi Province.
<urn:uuid:0f9d1730-3a6d-48ca-a905-762ead7b0be0>
{ "date": "2020-01-20T01:01:23", "dump": "CC-MAIN-2020-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250595787.7/warc/CC-MAIN-20200119234426-20200120022426-00296.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9764478206634521, "score": 2.78125, "token_count": 236, "url": "https://travital.com/attraction/jameh-mosque-of-saveh-saveh/" }
Dryhill Local Nature Reserve Situated in the Kent Downs Area of outstanding natural beauty, Dryhill is a Site of Special Scientific Interest. The exceptional structure of its rocks and fossils led to it becoming the first 'geological' Local Nature Reserve in Kent. Originally a stone quarry, this closed in the 1950s and since then nature has reclaimed the site, creating woodlands that are ideal for picnics. Woodland and high rocky outcrops are all linked with a variety of paths to explore, and there are two open picnic areas in grassland surrounded by trees. The rocks at Dryhill are of great research and educational value as they allow geologists to understand the environmental conditions that existed during the Lower Cretaceous, an important part of our geological history. Exceptional rock formations exposed on the site called Hythe Beds are thought to have been deposited approximately 115 million years ago. Dryhill is part of Regionally Important Geological Sites (RIGS), geological sites that are important for historical, scientific research or educational reasons. The Kent RIGS Group, English Nature and Local Authorities work together to protect and maintain them for these purposes. Guide Dogs, Hearing Dogs and Registered Assistance Dogs welcome
<urn:uuid:53cdec36-a901-44af-91bd-2bbe6daffa5c>
{ "date": "2019-03-26T03:15:01", "dump": "CC-MAIN-2019-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204768.52/warc/CC-MAIN-20190326014605-20190326040605-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9420462846755981, "score": 2.71875, "token_count": 249, "url": "https://www.visitsevenoaksdistrict.co.uk/attractions/dryhill-local-nature-reserve-2015/" }
The U.S. Geological Survey (USGS) initiated research and monitoring programs in estuaries of the Gulf of Mexico with the goal of developing reliable and credible predictive capabilities based on an understanding of natural and anthropogenic influences on the ecosystems. The results of these studies will provide custodians of our environment with the knowledge and tools to more effectively manage and regulate these vital ecosystems. Key to the USGS approach is the recognition that estuarine systems function as a result of a complex interplay among biologic, geologic, hydrologic, atmospheric, and chemical processes and an integrated, multidisciplinary research strategy among all entities conducting research in the estuaries is therefore essential for achieving credible results. In order to demonstrate the efficacy of this approach, Tampa Bay was selected for a five-year pilot study. Tampa Bay is one of the largest estuaries in the Gulf of Mexico and typifies the stress experienced from the impact of human population expansion in the region. The first year will be dedicated to a demonstration of the power of integrated, multidisciplinary science combined with effective data management and GIS products. Although estuarine settings vary throughout the Gulf, one of the products of the project will be a research template, incorporating past and on-going research and newly introduced USGS capabilities that can be applied to other gulf estuaries. Past and on-going research activities conducted by non-USGS entities and USGS capabilities were presented at the Gulf of Mexico Estuaries Integrated Science Workshop and constituted the basis for designing the integrated research strategies for the bay. This paper describes the objectives, strategy, and techniques, from field research to finished product, to initiate the first-year demonstration activities, the five-year pilot project, and the template for conducting similar studies in other estuaries of the Gulf of Mexico.
<urn:uuid:2ff23c2d-b5b4-44d6-b65b-09ea962b8fb6>
{ "date": "2015-11-25T14:14:15", "dump": "CC-MAIN-2015-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398445208.17/warc/CC-MAIN-20151124205405-00200-ip-10-71-132-137.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.921045184135437, "score": 2.625, "token_count": 371, "url": "http://gulfsci.usgs.gov/tampabay/reports/white/summary.html" }
Over 8,000 websites created by students around the world who have participated in a ThinkQuest Competition. Compete | FAQ | Contact Us Space C. A. D. Space C. A. D. teaches computer-aided design through authentic technical drawings from the US and Russian space programs. The site has progressive lessons, history, interactive quizzes, challenging design projects, and many full color photos of the rockets, satellites, and space stations represented in the technical drawings. The site features free CAD software and SVG images which support panning and zooming. 2001 Achievement Award RossIndependence H. S., Yardley, PA, United States JonathanTaylor Insitute, Morrisville, PA, United States ChrisHomeschool, Newtown, PA, United States 19 & under Cynthia LangIndependence H. S., Yardley, PA, United States Social Sciences & Culture > Education > Homework & Study Guides Science & Technology > Technology English, Spanish, French
<urn:uuid:01d4a088-c12b-4a1c-93ec-00a8362dde90>
{ "date": "2013-06-19T12:48:42", "dump": "CC-MAIN-2013-20", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00000-ip-10-60-113-184.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8462697267532349, "score": 2.6875, "token_count": 206, "url": "http://www.thinkquest.org/pls/html/f?p=52300:100:688215768653851::::P100_TEAM_ID:501582243" }
California, Federal Officials Reveal Water Tunnel Plan For Delta Don't Miss This Get Breaking News First SACRAMENTO, Calif. (CBS13/AP) — California and federal officials announced plans Wednesday for a massive twin tunnel system to carry water from the Sacramento-San Joaquin River Delta to farmland and cities. Gov. Jerry Brown and Interior Secretary Ken Salazar unveiled the proposal at a Sacramento news conference. “A healthy Delta ecosystem and a reliable water supply are profoundly important to California’s future,” said Gov. Brown. “This proposal balances the concerns of those who live and work on the Delta, those who rely on it for water; those appreciate its beauty, its fish, its waterfowl and wildlife. So this plan is all about California’s future.” Gov. Brown acknowledged that there will be opposition to the plan. Supporters say the tunnels will guarantee a stable water supply for Californians. But opponents argue the project could destroy the already fragile delta ecosystem. The tunnel proposal faces stiff opposition from delta residents, some environmental groups and Northern California legislators. State officials have said they don’t know just how much water would be diverted through the tunnels or how habitat restoration and decreased flows would affect the fish. They say these questions would be answered through scientific studies that accompany construction over the next 10 to 15 years. Formed by the confluence of California’s two longest rivers — the Sacramento and the San Joaquin — the delta supplies drinking water for two-thirds of Californians and irrigates nearly 4 million acres of farmland. The ecosystem’s rapid deterioration and the crash of once-abundant fish populations a decade ago has spurred regulations that limit delta pumping, especially during dry years. Farmers in the Central Valley say the restrictions have forced them to fallow productive land. (TM and © Copyright 2012 CBS Radio Inc. and its relevant subsidiaries. CBS RADIO and EYE Logo TM and Copyright 2012 CBS Broadcasting Inc. Used under license. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed. The Associated Press contributed to this report.)
<urn:uuid:4597fcee-c7f8-40ca-a76c-67e733c3e035>
{ "date": "2014-04-19T00:24:47", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535535.6/warc/CC-MAIN-20140416005215-00075-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9190189838409424, "score": 2.578125, "token_count": 453, "url": "http://sacramento.cbslocal.com/2012/07/25/california-federal-officials-to-reveal-water-tunnel-plans/" }
Addis Ababa (HAN) July 27, 2014. Environmental-Economic issues. The Federal government of Ethiopia launched its 2025 strategy to deliver green economic growth for the region-Horn of Africa. Ethiopia launched its Climate Resilient Green Economy (CRGE) Strategy in November 2013 as a central element in its ambition to become a low carbon middle income economy by 2025. This will develop a green economy to enable the country to strengthen its adaptive capacity to the effects of climate change; its intent to become a “green economy front runner” is an expression of both its potential for and its belief in a sustainable mode of growth. Ethiopia, in fact, is fully aware of the impediments that conventional development paths cause by their unsustainable use of natural resources. It has over the few years registered unprecedented and continuous growth as a result of policies and strategies carefully tailored to respond efficiently to the existing socio-economic context. The Climate Resilient Green Economy strategy is yet another positive step to resist the adverse effects of such problems as climate change and build an economy that will provide sustainable development. Full report attached: Ethiopia Green economical strategical policy 2025 To tackle the challenges of global climate change and related problems, the government has identified four major economic pillars to underpin the ‘Green Economy’ strategy. These are: improving crop and livestock production practices to allow for better food security and higher farmer incomes while reducing greenhouse emissions; protecting and re-establishing forests for their economic and ecosystem value, specifically including an increase in carbon stocks; expanding electricity generation from renewable sources of energy for domestic and regional markets; and leapfrogging to modern and energy-efficient technologies in the transport, industrial and construction sectors. Establishing these parameters for the relevant parts of the economic development plan id preventing the economy from being locked into any unsustainable paths, and will also help to attract the investment required for their development. Additionally, as part of this strategy, the government has selected four areas for fast-track implementation: exploiting Ethiopia’s vast hydropower potential; large-scale promotion of advanced rural cooking technologies to minimize the use of charcoal; large scale efficiency improvements to the livestock value chain; and reducing emissions from deforestation and forest degradation (REDD). Conventional farming in Ethiopia is characterized by land expansion and soil erosion and high carbon emissions. What is now needed are methods of production which provide sustainable development and effective use of natural resources without resorting to traditional practices. The ‘Green Economy’ strategy plans to realize this by intensifying agricultural output through use of improved inputs and better management, the introduction of low-emission agricultural techniques, increasing the value of the animal production chain, improving the efficiency of production, consuming different sources of protein, introducing mechanical equipment for ploughing to replace at least 50% of animal draft power, and managing rangeland to manage its carbon content and improve the productivity of the land. The strategy focuses on protecting and re-establishing forests for their economic value and for their importance to the ecosystem including their use as carbon stocks. It takes into consideration the fact that deforestation and forest degradation must be reversed to support the continued provision of the services and growth within the GDP. In order to develop sustainable forestry and reduce fuel wood demand, the strategy therefore covers a reduction in the demand for fuel wood through the distribution and use of fuel-efficient stoves and/or alternative-fuel cooking and baking techniques, increasing afforestation and reforestation, expanding forest management to increase carbon sequestration in forests and woodlands, and closing off certain areas for the rehabilitation of degraded pastureland and farmland, leading to enhanced soil fertility and so ensuring additional carbon sequestration. On power, the emphasis lies in expanding electricity generation from renewable energy sources for domestic and regional markets. Power production in Ethiopia currently has been low because the inputs have been largely from renewable energy resources, and developing the necessary electric power capacity from renewable energy is an enormous challenge. The pace of growth required is high. The total investment in expanding electric power generation capacity through 2030 is estimated at approximately US$38 billion over 20 years, around USD 2 billion annually. This requires a doubling of the current expenditure of US$1 billion, and will be achieved by a combination of tariff adjustment, private capital, climate finance and sovereign wealth funds. The latter can be obtained by exporting clean energy to neighboring countries and capturing a share of the monetization that there reduced emissions will produce, or by mobilizing international assistance in the form of grants. Concerning the transport, industrial and construction sectors, the plan to leapfrog to modern and energy-efficient technology is seem as the main means to ensure sustainable development with significantly abated emissions. The potential methods identified in this regard are: the introduction of stricter fuel efficiency standards for passenger and cargo transportation; the purchase of hybrid and electric vehicles to counter the low efficiency of the existing vehicle fleet, and the construction of an electric rail network – powered by renewable energy – to substitute for road freight transport; improve urban transport in Addis Ababa by introducing an urban electric rail network and enabling fast and efficient bus transport, substituting imported fossil fuels with domestically-produced biodiesel and bio-ethanol fuels. In construction and buildings, the plan calls for accelerated transition to high-efficiency light bulbs for residential, commercial, and institutional buildings, the use of landfill gas-management technology to reduce emissions from solid waste, and the reduction of methane production from liquid waste. In the industrial sector, cement production contributes the largest share of emission, and an improved energy efficiency of the process of production is necessary, with more modern technologies and the introduction of computerized energy management and control systems. While contributing to reaching these planned economic and social development targets, the country also has the domestic potential to contribute to the global effort by abating around 250 Mt CO2e by 2030. Compared to conventional development practices this will equal a decrease in GHG emissions of up to 64% by 2030 compared to the all-too-often concept of business-as-usual. Equally, implementing all these initiatives will also provide important additional benefits, including significant improvements in public health through better air and water quality, and the promotion of rural economic development by increased soil fertility and food security. Equally, it must be noted that building a green economy will require an estimated total expenditure of around US$150 billion over the next 20 years. This a formidable figure, but it can be reached. By developing a ‘Green Economy”, Ethiopia will be able to exchange GHG emissions abatement for climate finance to fund some of the required investment. The government intends to attract development partners to help implement this new and sustainable growth model. It welcomes collaboration with domestic and international partners. It appreciates the emerging climate-finance schemes to compensate developing countries for the provision of environmental services to the world, and it acknowledges that bilateral and multilateral development partners as well as the private sector will be invaluable in helping it achieve these undoubtedly ambitious, but certainly achievable, goals. Photo: The Minister of Foreign Affairs, Dr. Tedros Adhanommet Bill and Melinda Gates, the founders of the Bill and Melinda Gates Foundation and owners of Microsoft Company, on Thursday (July 24). Dr. Tedros thanked the Foundation for the significant support it has given to the health sector in Ethiopia The latest updates Follow twitter.com/GeskaAfrika Geeska Afrika Online (1985 -2014) – The International Gateway news and views about the Horn of Africa (Ethiopia, Eritrea, Somalia, Somaliland, Sudan, South Sudan, Djibouti, Kenya and Uganda), the best IGAD news and information Online Site for the last 20 Years. -HAN & Geeska Afrika Online (1985-2014), the oldest free independent Free Press in the region, brings together top journalists from across the Horn of Africa. Including Ethiopia, Somalia, Eritrea, Sudan, Djibouti, South Sudan, Uganda, Kenya, Oromo, Amhara, Somali, Afar and Harari. Plus, we have daily translations from 150 major news organizations in the Middle East and East African regions. Contact at [email protected]
<urn:uuid:96308bf8-1bc7-4650-b759-7b6e627e0652>
{ "date": "2016-10-28T19:40:17", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00057-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9213141202926636, "score": 3.140625, "token_count": 1671, "url": "http://www.geeskaafrika.com/4572/ethiopia-launched-its-2025-climate-resilient-green-economy/" }
Choosing What, How Much, and When to Eat In the past, meal plans for people with diabetes were very restrictive. Things are different now. There isn’t a one-size fits all diabetes diet. While you may need to make some changes in what and how much you eat, you have flexibility in deciding what’s on the menu. With a little planning, you can still include your favorite foods. What Does “Healthy Eating” Really Mean? - Eating a variety of foods, including vegetables, whole grains, fruits, non-fat dairy foods, healthy fats, and lean meats or meat substitutes. - Trying not to eat too much food. - Trying not to eat too much of one type of food. - Spacing your meals evenly throughout the day. - Not skipping meals. For people with diabetes, a good cookbook provides ideas to trim fat from their diet and gives detailed nutritional analysis and exchanges for each recipe. The American Diabetes Association publishes new cookbooks every year filled with recipes that meet the Association's diabetes nutrition guidelines. Next: Getting Active
<urn:uuid:179d578b-dce4-4d32-9b4a-6219bba8c1ea>
{ "date": "2018-09-18T22:34:49", "dump": "CC-MAIN-2018-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155702.33/warc/CC-MAIN-20180918205149-20180918225149-00496.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9467700719833374, "score": 2.921875, "token_count": 233, "url": "http://www.diabetes.org/living-with-diabetes/recently-diagnosed/where-do-i-begin/choosing-what-to-eat.html" }
A mosquito-borne virus possibly linked to serious birth defects in Brazil has the potential to spread within the Americas, including to holiday destinations like Florida and throughout the Caribbean, researchers who track infectious diseases suggest. Already at epidemic levels in the South American country, locally acquired cases of the Zika virus have been reported in Mexico as well as the Caribbean islands of Puerto Rico and Martinique. Zika is native to parts of Africa and Asia and is transmitted to people by the daytime-biting Aedes mosquito. In 2007, the disease took root in the Pacific Islands, and last year it sparked a massive outbreak in Brazil, with an estimated 440,000 to 1.3 million cases. While Zika generally causes mild symptoms like fever, feeling unwell, a rash, red eyes and joint pain — or in the majority of people, no symptoms at all — the virus is being investigated as a possible cause of small heads and undeveloped brains in some newborns whose mothers may have been infected while pregnant. There has been a 20-fold increase in the number of babies born with this condition, known as microcephaly, since Zika first appeared in Brazil last May, said Dr. Kamran Khan, an infectious disease specialist at St. Michael’s Hospital in Toronto, whose team is studying the pathogen’s potential transmission patterns. “There is an association — and I emphasize the word association. It’s not yet proven to be a causal relationship,” Khan said Thursday. However, he suggested that Canadian women who are pregnant or plan to become pregnant be wary if travelling to southern climes. “I think pregnant women should be taking significant precautions if they choose to be travelling into areas where Zika is spreading locally,” he said, including wearing skin-covering clothing and avoiding mosquito bites by using repellent. On Wednesday, researchers at the U.S. Centres for Disease Control (CDC) said they have found strong evidence of a link between the virus and the spike in birth defects in Brazil: Zika’s biological footprint was found in the placentas from two women who miscarried and the brains of two newborns who died. The infants had small heads indicative of microcephaly. Brazilian health authorities said earlier this week that 3,530 babies have been born with microcephaly in the country since October. The number was less than 150 in 2014. There is no preventive vaccine or antiviral medication to treat Zika, which is not transmitted directly person-to-person, but can be passed from an infected individual to an uninfected person through bites from the same mosquito. The virus has spread across more than a dozen countries in South and Central America and north into Mexico, said Khan, adding that it has the potential to be picked up by Aedes mosquitoes in Florida and the southern Gulf states and to spread among local populations. The CDC said some travellers returning to the United States from Zika-affected areas have been infected with the virus, including a Houston-area woman who had returned from a trip to El Salvador. “Right now we are not seeing any local transmission in the United States, but the ingredients for that to occur are present in some parts of the country,” said Khan. The Public Health Agency of Canada also said a B.C. resident who recently travelled to El Salvador had contracted the dengue-like virus, but there have been no reported cases of Zika cases acquired in Canada and the agency says the risk to Canadians is low. On its website, PHAC says the incubation period for Zika virus ranges from three to 12 days, with symptoms lasting two to seven days. An infection may go unrecognized or be misdiagnosed as another mosquito-borne viral infection such as dengue or chikungunya, which are both carried by the Aedes mosquito. While the agency has not issued any travel restrictions related to Zika-endemic countries, it recommends that pregnant women discuss any travel plans with their health-care providers to assess their risk and to get advice on how to protect themselves against mosquito bites. On Thursday, Khan’s team published an analysis in the Lancet medical journal predicting where in the Americas the virus could spread, after mapping the destinations of international air travellers from Brazil between September 2014 and August 2015. Of almost 10 million travellers, 65 per cent went to other locations in the Americas, 27 per cent to Europe and five per cent to Asia. Traveller volumes were greatest to the United States, followed by Argentina, Chile, Italy, Portugal and France. China and Angola received the highest volume of travellers in Asia and Africa, respectively. The Canadian researchers collaborated with colleagues at Oxford University, who mapped the global geography of Aedes mosquitoes capable of transmitting the Zika virus and then modelled the worldwide climate conditions necessary for the virus to spread to humans. They estimated that more than 60 per cent of the populations of the U.S., Argentina and Italy live in areas conducive to seasonal transmission of the Zika virus, while Mexico, Colombia and the U.S. have an estimated 30.5 million, 23.2 million and 22.7 million people respectively living in areas conducive to year-round transmission. With the Olympics taking place this summer in Brazil, the researchers are also assessing whether travel to and from the Games might accelerate the international spread of the disease. “The world we live in is very interconnected now,” said Dr. Isaac Bogoch, a tropical infectious disease specialist at Toronto General Hospital who contributed to the study. “Things don’t happen in isolation anymore. Infections from the farthest corners of the world can quickly arrive on our doorstep.” With files from Associated Press With files from Associated Press
<urn:uuid:fc480e1d-c314-465d-a1c0-4893e3a9ca69>
{ "date": "2017-03-26T17:23:22", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189244.95/warc/CC-MAIN-20170322212949-00466-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9600263237953186, "score": 3.109375, "token_count": 1188, "url": "https://www.thestar.com/news/canada/2016/01/15/zika-virus-prompts-travel-warning-for-pregnant-canadians.html" }
Eat Right to Sleep Well 10 Foods Help Us Relax and Rest Getting enough sleep—or not—has a trickle-down effect. A study in the Journal of Obesity shows that good quality shut-eye helps us reduce stress, lose weight and function better. Research also shows that most Americans would be healthier, happier and safer going about their daily activities if they slept 60 to 90 more minutes each night, according to the American Psychological Association. A consistent sleep routine helps enable a good night’s rest, with activities like going to bed at the same time whenever possible; shutting down the Internet, email and text messaging at least an hour before bedtime; and limiting intake of caffeine and alcohol. Another best practice is eating foods that help us relax, fall and stay asleep. Four primary sleep-promoting vitamins and minerals naturally found in foods are tryptophan, magnesium, calcium and vitamin B6. Some of these help the body produce melatonin, the hormone responsible for regulating the body’s sleep/wake patterns called circadian rhythms. Others enhance serotonin, which carries nerve signals and relays messages in the brain related to mood and sleep. Some foods are naturally packed with these essential vitamins and minerals, and eating certain foods at certain times can help us tip the scale towards a successful night of restful sleep. 1 Kiwi. Full of vitamins C and E, serotonin and folate, kiwi can help us sleep longer. In a study at Taipei Medical University, in Taiwan, researchers had participants eat two kiwifruits one hour before bedtime for four weeks. Total sleep time improved by 13.4 percent. 2 Soy. In a Japanese study published in the Nutrition Journal, researchers surveyed 1,076 participants between 20 and 78 on how often they ate soy products, which are rich in sleep-enhancing isoflavones. Those that ate the most soy foods enjoyed deeper, more sustained sleep. Researchers concluded that soy’s isoflavones help regulate the sleep/wake cycle. 3 Tart cherry juice. A study by the University of Rochester, in New York, found that older adults drinking two, eight-ounce servings of tart red cherry juice daily, one in the morning and one at night for two weeks, enjoyed moderate sleep improvement, comparable to taking the herb valerian and melatonin. 4 Fish. Salmon, halibut, mackerel and tuna help boost the production of vitamin B6, which helps make melatonin. A recent study from the University of Pennsylvania published in Scientific Reports found that eating more fish led both to better sleep and improved cognitive function in children. 5 Fiber-rich foods. Choices such as chia seeds, nuts and whole grains help promote restorative “slow-wave” sleep, according to the Journal of Clinical Sleep Medicine. 6 Calcium-fortified yogurt. According to Dr. William Sears, a pediatrician in Pasadena, California, and author of The Baby Sleep Book: The Complete Guide to a Good Night’s Rest for the Whole Family, “Calcium helps the brain use the amino acid tryptophan to manufacture the sleep-inducing substance melatonin. This explains why dairy products, which contain both tryptophan and calcium, are some of the top sleep-inducing foods.” 7 Bananas. Rich in potassium, magnesium, tryptophan and vitamin B6, which are used to make melatonin, bananas help promote good sleep. A study in the Journal of Pineal Research found that men that ate two bananas at a time for a week had a rise in melatonin that reached a peak two hours later; pineapple juice and orange juice also raised those levels. 8 Walnuts. Eating a handful of walnuts an hour before bedtime provides fiber- supporting, restorative, slow-wave sleep, concluded a study in the journal Nutrition. Plus, walnuts are a good source of tryptophan, which helps make serotonin and melatonin; University of Texas researchers also found that walnuts contain their own source of melatonin. 9 Dark leafy greens. Kale, spinach and collard greens are among the magnesium-rich greens that can help us de-stress and go to sleep, says Dr. Raj Dasgupta, a professor of pulmonary and sleep medicine at the University of Southern California, Los Angeles. 10 Almonds and dates. Nerina Ramlakhan, Ph.D., a London sleep therapist and author of Fast Asleep but Wide Awake: Discover the Secrets of Restorative Sleep and Vibrant Energy, counsels her clients to start at breakfast by eating eight almonds and two dates. These two fiber-rich foods are able to slowly help produce melatonin for later in the day. Judith Fertig writes cookbooks and foodie fiction from Overland Park, KS. Edit ModuleShow Tags This article appears in the June 2018 issue of Natural Awakenings.
<urn:uuid:724cd28e-c8d5-40d8-a6dc-b2fe391bdfb0>
{ "date": "2019-06-17T10:56:43", "dump": "CC-MAIN-2019-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998473.44/warc/CC-MAIN-20190617103006-20190617125006-00416.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9185063242912292, "score": 2.625, "token_count": 1018, "url": "https://swfl.naturalawakeningsmag.com/Conscious-Eating-Archive/Eat-Right-to-Sleep-Well/" }
Friday, I reported that G20 leaders had agreed to a 250 billion (emphasis mine) [my have agreed to support a general SDR allocation which will inject $250bn (£170bn) into the world economy and increase global liquidity," it said. SDRs are Special Drawing Rights, a synthetic paper currency issued by the International Monetary Fund that has lain dormant for half a century. In effect, the G20 leaders have activated the IMF's power to create money and begin global "quantitative easing". In doing so, they are putting a de facto world currency into play. It is outside the control of any sovereign body. Conspiracy theorists will love it. will do a full entry explaining this "global quantitative easing" reports special drawing rights. Factsheet - February 2009 The SDR is an international reserve asset, created by the IMF in 1969 to supplement the existing official reserves of member countries. SDRs are allocated to member countries in proportion to their IMF quotas. The SDR also serves as the unit of account of the IMF and some other international organizations. Its value is based on a basket of key international currencies. Why was the SDR created and what is it used for today? The Special Drawing Right (SDR) was created by the IMF in 1969 to support the Bretton Woods fixed exchange rate system. A country participating in this system needed official reserves—government or central bank holdings of gold and widely accepted foreign currencies—that could be used to purchase the domestic currency in world foreign exchange markets, as required to maintain its exchange rate. But the international supply of two key reserve assets— gold and the U.S. dollar—proved inadequate for supporting the expansion of world trade and financial development that was taking place. Therefore, the international community decided to create a new international reserve asset under the auspices of the IMF. However, only a few years later, the Bretton Woods system collapsed and the major currencies shifted to a floating exchange rate regime. In addition, the growth in international capital markets facilitated borrowing by creditworthy governments. Both of these developments lessened the need for SDRs. Today, the SDR has only limited use as a reserve asset, and its main function is to serve as the unit of account of the IMF and some other international organizations. The SDR is neither a currency, nor a claim on the IMF. Rather, it is a potential claim on the freely usable currencies of IMF members. Holders of SDRs can obtain these currencies in exchange for their SDRs in two ways: first, through the arrangement of voluntary exchanges between members; and second, by the IMF designating members with strong external positions to purchase SDRs from members with weak external The value of the SDR was initially defined as equivalent to 0.888671 grams of fine gold—which, at the time, was also equivalent to one U.S. dollar. After the collapse of the Bretton Woods system in 1973, however, the SDR was redefined as a basket of currencies, today consisting of the euro [34 percent], Japanese yen [11 percent], pound sterling [11 percent], and U.S. dollar [44 percent]. The U.S. dollar-value of the SDR is posted daily on the IMF's website. It is calculated as the sum of specific amounts of the four currencies valued in U.S. dollars, on the basis of exchange rates quoted at noon each day in the London market. The basket composition is reviewed every five years to ensure that it reflects the relative importance of currencies in the world's trading and financial systems. In the most recent review in November 2005, the weights of the currencies in the SDR basket were revised based on the value of the exports of goods and services and the amount of reserves denominated in the respective currencies which were held by other members of the IMF. These changes became effective on January 1, 2006. The next review by the Executive Board will take place in late 2010. The SDR interest rate The SDR interest rate provides the basis for calculating the interest charged to members on regular (non-concessional) IMF loans, the interest paid and charged to members on their SDR holdings, and the interest paid to members on a portion of their quota subscriptions. The SDR interest rate is determined weekly and is based on a weighted average of representative interest rates on short-term debt in the money markets of the SDR basket currencies. Under its Articles of Agreement, the IMF may allocate SDRs to members in proportion to their IMF quotas [This is what the G20 agreed to do]. Such an allocation provides each member with a costless asset on which interest is neither earned nor paid. However, if a member's SDR holdings rise above its allocation, it earns interest on the excess; conversely, if it holds fewer SDRs than allocated, it pays interest on the shortfall. The Articles of Agreement also allow for cancellations of SDRs, but this provision has never been used. The IMF cannot allocate SDRs to itself. provides a graphic of global financial [250 billion of special drawing rights will be distributed according to the quotas shown in the graphic above.] questions whether SPRs are a redistribution scam. by Equity Private, Apr 03, 2009, 12:30pm "irate taxpayer and emerging markets hedge fund manager" points out that, as currently proposed, the Special Drawing Rights option to the U.S. Dollar as a reserve currency has all the texture and stickiness of a redistribution he is mostly right]. He points out: Basically, it is money-printing on a global scale, with the fruits being shared among all members of the IMF, including some of the world's most noxious regimes. Of course, the SDR consists only of USD, GBP, EUR, and JPY, so you can see whose citizens bear the cost and their currencies get diluted as the crap countries cash in their shiny, new SDRs. For example, international financial scofflaw Argentina gets over $2 billion worth of SDRs. The Nigerians, whose email scammers will surely now start dangling SDR-related propositions to already-fleeced Americans, will get a similar amount. Syria gets $350 million, perhaps some of that will go to protect Hezbollah from a painful devaluation that would push up the local currency price of Cemtex. We aren't quite this caustic in our assessment of the SDR scheme (we mean this in the British sense of the word) but the points are not lost on us. Certainly, now that the United States is somewhat dazed by the present crisis, economic heel-nipping is easy. Let's just hope that some misplaced "capitalist guilt" doesn't cause this Administration, or the next, to buy into what amounts to a redistribution scheme. Special Drawing Rights, while complicated to understand, are a form of global 1) G20 leaders have activated the IMF's power to create money and agreed to a 250 billion SDR allocation. 2) Special Drawing Rights (SDRs) is a potential claim on the freely usable currencies of IMF members. 3) In 1973, the SDR was redefined as a basket of currencies, today consisting of the euro (34 percent), Japanese yen (11 percent), pound sterling (11 percent), and U.S. dollar (44 percent). 4) The IMF may allocate SDRs to members in proportion to their IMF quotas, which is what the G20 just decided to do. 5) If a member's SDR holdings rise above its allocation, it earns interest on the excess; conversely, if it holds fewer SDRs than allocated, it pays interest on the shortfall. 6) The SDR interest rate is determined weekly and is based on a weighted average of representative interest rates on short-term debt in the money markets of the SDR basket currencies. Conclusion: Essentially, IMF SDRs allocations are really credit lines to IMF members funded by printing the euro, yen, pound and the dollar. Since SDRs are backed 44 percent by the dollar, the 250 billion increase in SDRs allocations involves the creation of 110 billion dollars to fund these credit lines. Claims that “the Special Drawing Rights option to the U.S. Dollar as a reserve currency has all the texture and stickiness of a redistribution scam” aren’t entirely wrong. Personally, I believe the US/UK are using SDRs as a way to create more money in a way that most people won't understand. Eric de Carbonnel Support Market Skeptics with a donation : by Eric de Carbonnel
<urn:uuid:27f2da29-7a92-49dd-a737-fe6e977526a0>
{ "date": "2016-10-23T16:13:18", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00479-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9338086843490601, "score": 3.015625, "token_count": 1915, "url": "http://www.24hgold.com/english/contributor.aspx?rss=true&article=2505033052G10020&redirect=false&contributor=Eric%20de%20Carbonnel&t=Explaining%20IMF's%20Special%20Drawing%20Rights" }
Prince Eugene of Savoy 1663 Prince Eugene Franz of Savoy-Carignan is born in Paris on 18 October, as the fifth of seven children to Eugene Moritz of Savoy-Carignan and Olympia Mancini. 1673 His father dies after a short illness under circumstances that were never fully clarified. 1678 Ordained with minor orders by the Papal Nuncio in Turin. 1683 After having been rejected from Louis XIVs army he flees France and enters the service of Emperor Leopold Is army. Successfully participates in the relief of Vienna in the Battle of Kahlenberg (12 September). Carlo Emmanuele dEste, Marchese di Borgomanero invites Eugene to lodge at his home and introduces him to Leopolds court. 1688 Named field marshal-lieutenant. Prince Eugene also becomes lay abbot of two abbeys in Savoy, which provides him with a good source of income but also the obligation to remain celibate. 1693 Named imperial field marshal. 1694/95 Buys the first buildings on Himmelpfortgasse. In addition to the intense building activities that now commence, Prince Eugene continues to build up major collections of paintings, books, engravings as well as plants and a zoo. 1697 Named commander-in-chief of the imperial army in Hungary (5 July). At the Battle of Zenta on 11 September, Prince Eugene has his first success as a commander. His fame as field marshal is subsequently consolidated by a number of further successful military operations. Buys a large plot of land on Rennweg, which is gradually expanded as he acquires more property. 1701 The Battle of Carpi on 9 July marks the first larger military operation in the War of the Spanish Succession. On 1 September, the Battle of Chiari follows. 1702 Battle of Cremona (1 February) as well as the Battle of Luzzara (15 August). Begins building the palace in Ráckeve on the Csepel Island (Danube) near Budapest. 1703 Named president of the Imperial War Council. 1704 Battle of Höchstädt (13 August) resulting in a coalition with the English and subsequently a friendship between their commander, the Duke of Marlborough, and Prince Eugene. Terracing works carried out on the Belvederes land. 1705 Battle of Cassano (16 August), a French victory following a bloody battle. 1706 Relief of Turin (7 September) 1708 Battle of Oudenaarde (11 July) as well as the siege of Lille (10 August to 22 October, citadel falls on 10 December). Construction begins to extend the palace on Himmelpfortgasse by five bays to the east (Gallery Wing). 1709 Siege of Tournai (428 July, citadel falls on 3 September) and Battle of Malplaquet (11 September). 1712 Construction of the Lower Belvedere begins. 1714 With the signing of the Treaty of Rastatt (6 March) the War of the Spanish Succession ends. 1716 Named governor of the Austrian Netherlands (until 1724). Battle of Peterwardein (5 August) during the Ottoman-Venetian War. 1717 Battle of Belgrade with a surprise attack launched by Prince Eugene in the night of 16 August. Completion of the Lower Belvedere and construction of the Upper Belvedere begins. 1718 Signing the Treaty of Passarowitz (21 July) not only terminates the Austro-Ottoman War but also puts an end to the enormous threat of the Ottoman Empire to Austrian security. 1724 Prince Eugene is appointed vicar-general of Austrian dominions in Italy. 1723 Completion of the Upper Belvedere, extension of the palace on Himmelpfortgasse by five bays to the west (Library Wing). 1725 Prince Eugene acquires Schloss Hof palace and expands it to create his tusculum rurale. 1731 From this year on, the ten volumes of Belvedere engravings based on drawings by Salomon Kleiner appear. As a supplementary volume the so-called Menagerie work is published to document the animals as well as plants in the Belvedere garden. 1734 The 70-year-old field marshal is appointed commander of the Rhine army in the War of Polish Secession at the insistence of Emperor Charles VI. 1736 Prince Eugene dies at his palace on Himmelpfortgasse in the night of 21 April. The magnificent funeral ceremony takes place at St. Stephens Cathedral on 9 July. The Savoy Crypt in the cathedral is Eugenes final resting place.
<urn:uuid:a32d1f7b-435c-4504-ad80-4575222e8a43>
{ "date": "2017-03-24T04:20:08", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187690.11/warc/CC-MAIN-20170322212947-00081-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9409949779510498, "score": 3.109375, "token_count": 1000, "url": "http://belvedere.at/bel_en/belvedere/prinz_eugene_of_savoy" }
Making notes to help formulate questions How much you remember and can note down afterwards may depend on the type of learner you are. This will be further explored in week 2. To be able to question material as you listen to it, you need to make very brief notes which act as reminders as you are listening – it could be just single words or short phrases. Then, when the material has finished you need to go back and fill in detail on those points which help you think about exactly what you are questioning. You can practice this skill while listening to any source of material. The subject doesn’t matter, to question and to make short meaningful notes to yourself, are skills which need to be practised. © University of East Anglia
<urn:uuid:a4bf962b-8958-440b-a873-bd60c727bec4>
{ "date": "2018-08-21T10:00:32", "dump": "CC-MAIN-2018-34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218101.95/warc/CC-MAIN-20180821092915-20180821112915-00176.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9676543474197388, "score": 4, "token_count": 154, "url": "https://www.futurelearn.com/courses/preparing-for-uni/0/steps/1104" }