text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Tajwar Shelim gives us a sobering look at the dire situation in Yemen.
One of the oldest bastions of civilisation, residing towards the Southern mountains of the Arab Peninsula, lies one of the most ancient cultures we know of today. Bordered between Saudi Arabia to the North, the Red Sea to the West and the Gulf of Aden and the Arabian Sea to the South, Yemen lies as the crossing point between the Western and Eastern world for millennia. A trade hub since 5000 BC, Yemen has acted as an empirical strategic location for countless centuries. In today’s current climate, however, Yemen has seen one of the largest humanitarian crises ever before, with more than 75% of its population under imminent threat of bombing raids, military occupation, severe malnourishment, deadly famine and more.
“It all starts with the Arab Spring of 2011, the toppling of multiple Arab regimes and political unrest led to the Yemeni public rallying with mass demonstrations against the government “
So how did this prominent, and ancient civilisation escalate to the scenario we see unfold today, and how has it resorted in so many innocents losing their lives? It all starts with the Arab Spring of 2011, the toppling of multiple Arab regimes and political unrest led to the Yemeni public rallying with mass demonstrations against the government in relation to poverty, rampant corruption and unemployment. As a result, the President stepped down and the Vice President took power and retained it through a landslide election. Why was the election so one-sided? He was the only candidate. It’s no surprise the issues continued.
“In 2014, the Rebels in Star Wars-like fashion seized control of the Yemeni capital, Sana’a and succeeded in taking over the government.”
The rise of ISIS, or Daesh, had made sweeping ground within Iraq and Syria, radicalising and destabilising the region, and an Al-Qaeda affiliate insurgency also sprouted to add to the madness. The main rival to the Yemeni government, who orchestrated the demonstrations and successfully impeached the President is nevertheless the Houthi rebels. In 2014, the Rebels in Star Wars-like fashion seized control of the Yemeni capital, Sana’a and succeeded in taking over the government. The insurrection led to a coalition effort formed of Arab nations along the United States to amass a large, multi-national offensive in Yemen. The US has spent over $140 million in arms in Yemen, and Western Powers have co-ordinated more than 14 000 airstrikes since 2009.
The main issue we should be focused on here is still the concern for the Yemeni people, who are on the brink of mass extinction. With Yemen’s arid climate, one of the most imperative issues is water scarcity. Yemen is the poorest nation in the Middle East, its oil reserves are tangible compared to their Arab counterparts and heavy restrictions, boycotting and air bombings have led to agriculture being the only surviving industry. The issue this creates is that agriculture uses 90% of Yemen’s water supply and only generates 6% of their GDP. The Times of London quoted that “Yemen could become the first nation to run out of water.”
The current situation is dire, and a humanitarian calamity. 80% of the Yemeni population does not have access to a regular water supply and relentless bombing campaigns have annihilated industry, infrastructure and pretty much anything left standing. This situation isn’t helped by two cyclones that erupted within the past three years causing major flash flooding along with catastrophic damage and famine. To top off this already lovely situation, the unprecedented rainfall was the perfect climate for locust breeding. Locust (grasshopper-like insects) swarms have thus amassed in their millions flying hundreds of miles devouring any and all remaining agriculture, crops and pretty much any life left.
“If help doesn’t reach them soon, we could see one of the worst humanitarian crises of this millennium.”
Since January 2015 more than 20 000 people have been killed in Yemen, over half were civilians, and most of them children. Currently, CNN reports more than 10 million Yemenis are deprived of food, water and electricity, and more than five million have been internally displaced and left as refugees as their homes and livelihoods have been utterly destroyed. Oxfam stated that over 10 million Yemenis are constantly suffering from malnourishment and severe dehydration, with more than a million of them children.
The main issue to take away from this is that 80% of the total population is in dire need of aid. That’s 80% of an entire country, 20 million people. And if help doesn’t reach them soon, we could see one of the worst humanitarian crises of this millennium.
This is the fifth article in a weekly column on current issues and topics of general knowledge and interest, run by Marthe Rossaak. If you are interested in contributing, please email your draft to [email protected] | <urn:uuid:a0a07fc9-d296-4c37-a210-55010bf9aa17> | {
"date": "2017-08-18T18:12:02",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105086.81/warc/CC-MAIN-20170818175604-20170818195604-00616.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9595714807510376,
"score": 2.515625,
"token_count": 1014,
"url": "https://www.rebelessex.com/2017/04/whats-the-deal-with-yemen/"
} |
Newswise — ATLANTA—An international team of astronomers has used a new algorithm to enhance observations from the NASA Kepler Space Telescope in its K2 Mission and perform the most detailed study yet of the variability of the Seven Sisters star cluster.
The Seven Sisters, known to the ancient Greeks and to modern astronomers as the Pleiades cluster, are a set of stars which are visible to the naked eye and have been studied for thousands of years by cultures all over the world. Stars such as the Seven Sisters are ordinarily far too bright to look at with high-performance telescopes, so researchers from the Stellar Astrophysics Centre at Aarhus University in Demark and Georgia State University have demonstrated a powerful, new technique for observing such stars.
The work is published in the journal Monthly Notices of the Royal Astronomical Society.
Satellites such as Kepler are engineered to search for planets orbiting distant stars by looking for the dip in brightness as the planets pass in front. These satellites can also be used to study asteroseismology, the structure and evolution of stars as revealed by changes in their brightness.
Because the Kepler Mission was designed to look at thousands of faint stars at a time, some of the brightest stars are actually too bright to observe. Aiming a beam of light from a bright star at a point on a camera detector will cause the central pixels of the star’s image to be saturated, which leads to a very significant loss of precision in the measurement of the total brightness of the star. This is the same process which causes a loss of dynamic range on ordinary digital cameras, which cannot see faint and bright detail in the same exposure.
“The solution to observing bright stars with Kepler turned out to be rather simple,” said lead author Dr. Tim White of the Stellar Astrophysics Centre at Aarhus University. “We’re chiefly concerned about relative, rather than absolute, changes in brightness. We can just measure these changes from nearby unsaturated pixels and ignore the saturated areas altogether.”
However, changes in the satellite’s motion and slight imperfections in the detector can still hide the signal of stellar variability. To overcome this, the authors developed a new technique to weight the contribution of each pixel in order to find the right balance where instrumental effects are cancelled out, revealing the true stellar variability. This new method has been named halo photometry, a simple and fast algorithm the authors have released as free open-source software.
Most of the seven stars are revealed to be slowly pulsating B-type stars, a class of variable star in which the star’s brightness changes with day-long periods. The frequencies of these pulsations are the key to exploring some of the poorly understood processes in the core of these stars.
The seventh star, Maia, is different: it varies with a regular period of 10 days. Previous studies have shown that Maia belongs to a class of stars with abnormal surface concentrations of some chemical elements such as manganese. One explanation for the cyclic light variations is that dark and light patches associated with these chemical elements cross the face of the star as it rotates. In order to confirm this idea, White and his Georgia State collaborators used the Georgia State University Center for High Angular Resolution Astronomy (CHARA) Array to determine the actual size of the star. The CHARA Array at Mount Wilson Observatory in California is the largest optical interferometer in the world, and it is ideal for close-up views of the stars. The CHARA Array observations of Maia confirmed the star has just the right size to explain the light variation as the result of a mottled rotating star.
No signs of exoplanetary transits were detected in this study, but the authors show their new algorithm can attain the precision that will be needed for Kepler and future space telescopes such as the NASA Transiting Exoplanet Survey Satellite to detect planets transiting stars as bright as our neighboring star Alpha Centauri. These nearby bright stars are the best targets for future space missions such as the NASA James Webb Space Telescope. | <urn:uuid:0bd585d4-fb04-4195-a4af-03b574e8cc1e> | {
"date": "2018-03-20T23:42:41",
"dump": "CC-MAIN-2018-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647545.84/warc/CC-MAIN-20180320224824-20180321004824-00256.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9339613914489746,
"score": 3.59375,
"token_count": 835,
"url": "http://www.newswise.com/articles/view/680085/?sc=c17"
} |
The world's most dangerous place for women
The Democratic Republic of Congo is one of the world’s most forgotten conflicts. An estimated 5.4 million have lost their lives in the last 15 years, most through preventable disease and malnutrition unleashed by the conflict. That is the equivalent of the population of Birmingham, Leeds, Glasgow, Sheffield, Bradford, Edinburgh, Liverpool, Manchester, Bristol, Cardiff and Coventry put together.Rape has been used as tool of war in this conflict, children as young as 3 months and women as old as 80 have suffered; making the DRC the 'rape capital of the world', according to has Margot Wallstrom, the UN's special representative on sexual violence in conflict. Click here to take action for women in DRC.
The UK Government is one of the largest financial contributors to the DRC government. The UK will spend an average of £198 million per year in Democratic Republic of Congo until 2015. Don’t let the our government’s contribution go to waste. Last year, 14,591 new cases of sexual violence were reported in DRC, yet there is still only one main rape crisis centre where women can go for support. Often women have to walk for days in order to receive post rape health care.
The majority of these rapes go completely unprosecuted, perpetuating the idea that rape can be used as a weapon of war.
Write to International Violence Against Women champion, Lynne Featherstone MP to get the UK government to live up to its commitment: the UK Department for International Development have stated that “improving the lives of girls and women will be a major priority” in the DRC. So help us hold the government to account on this. Now is the time when Lynne Featherstone will be deciding which countries to focus on in her role. We want to make sure that DRC is at the top of this list.
Congo Now is a coalition of 16 of the UK’s most active NGOs and UK-based Congolese campaigning organisations. Our aim is to raise awareness of the ongoing conflict in DRC , the continuing violence and civilian suffering as well as to raise broader awareness of the situation in the country as a whole: both good and bad. We believe, NOW is the time for the people of the Democratic Republic of Congo to be genuinely free: free from violence and free from poverty. You can contribute to this change, act now!
Our blogs are written by Amnesty International staff, volunteers and other interested individuals, to encourage debate around human rights issues. They do not necessarily represent the views of Amnesty International. | <urn:uuid:330e55fc-30f2-4e7b-b258-eb20dabf994e> | {
"date": "2018-01-20T01:30:08",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888341.28/warc/CC-MAIN-20180120004001-20180120024001-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9440275430679321,
"score": 2.84375,
"token_count": 537,
"url": "https://www.amnesty.org.uk/blogs/womens-action-network-blog/worlds-most-dangerous-place-women-0"
} |
Improving Access to Citizenship Certificates
As a primary legal document in Nepal, the citizenship certificate is compulsory for banking; accessing formal education and employment; registering on the voter’s roll; and obtaining a variety of benefits, including social security and government allowances for people with disabilities, victims of armed conflict and internally displaced persons. Yet despite its importance, there are significant barriers – including lack of knowledge or supporting documents and issues related to gender, caste and extreme poverty – that hinder access to citizenship certificates, especially for those from Nepal’s more marginalized groups. An estimated 2.1 million Nepalis are without citizenship certificates, further isolating the most marginalized groups from education and economic opportunities with negative impacts on human and economic development.
As part of its “Strengthening Political Parties and Electoral and Legislative Processes” program, IFES Nepal works with the Election Commission of Nepal and civil society to expand the political participation and civic engagement of youth, women, ethnic minorities, people with disabilities and other historically marginalized groups. One of the first steps to ensure citizens’ rights is to facilitate and improve access to citizenship certificates across Nepal.
Until she met Kalpana – a youth volunteer working with IFES' CSO partner Youth Initiative – sixteen year old Radhika Bhamisa believed that obtaining a citizenship certificate was beyond her reach. However, thanks to an educational session organized at the local high school on how to acquire a citizenship certificate, Radhika was informed by Kalpana on the appropriate steps to follow to obtain her citizenship certificate. These instructions gave Radhika the necessary courage to go through the process required to obtain her citizenship certificate at the local Bhaktapur District Administration Office. Within days, Radhika not only obtained her citizenship certificate, but she also registered to vote on the Election Commission of Nepal's official voter list.
"I had always been in a dilemma and thought it would never be possible to obtain my citizenship certificate. I will always remember Kapana Didi (sister) for having made the process accessible to me." – Radhika Bhamisa
From April to July 2014, IFES Nepal trained and supported four civil society organization (CSO) partners to conduct a survey on citizenship status among their target communities, which identified and assessed barriers to obtaining citizenship certificates. Community facilitators visited over 63,000 households in project districts that include some of the most marginalized communities in Nepal. Through these door-to-door exchanges, community facilitators explained the importance of citizenship certificates and voter registration to over 145,000 household members. Among surveyed individuals, 22 percent – the majority of whom are women – indicated that they did not have a citizenship certificate. The most commonly identified barriers expressed by the respondents include lack of awareness about the application process; lack of required supporting documents; weak family support; absence of economic resources; and inaccessibility to district headquarters.
Nepal is grappling with the challenging opportunity of drafting a new Constitution, consolidating post-conflict peace and strengthening its democratic framework. Improving the equal and active participation of all of citizens across Nepal is essential to strengthening and consolidating democratic, economic and social gains. | <urn:uuid:f392489d-21d2-4774-9310-3e7dfe78c38b> | {
"date": "2018-08-17T03:20:11",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211664.49/warc/CC-MAIN-20180817025907-20180817045907-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9425203800201416,
"score": 2.625,
"token_count": 643,
"url": "http://www.ifes.org/news/improving-access-citizenship-certificates"
} |
Pull the plug on pacifiers
Ellen Boll, M.A., CCC-SLP
Manager, MedCentral Pediatric Therapy
Babies are born wanting to suck. Some even suck their thumbs or fingers before they're born. Beyond nutrition, sucking is often an important method of self-soothing - a comforting, familiar and calming mechanism in a new world. That's why many parents rank pacifiers as a must have, right up there with diaper wipes and baby monitors. But what do you do when the baby is 18 months old and running around all her waking hours with a binky in her mouth? As a speech language pathologist I've had numerous parents bring a child to me with concerns their child's speech is difficult to understand. As I watch the parent enter the treatment room and pull the pacifier from their child's mouth (and hide it in a purse) I have a strong suspicion what the cause might be!
Studies have shown that prolonged use of a pacifier can result in increased ear infections, temporary to permanent malformations of the teeth and palate and delays in speech and sound development. Have you ever tried to talk with your thumb in your mouth? Not too easy - and you already know how to talk! There are no hard and fast rules for pacifier use, but most speech language pathologists recommend stopping pacifier use by 1 year of age, which is when speech and language development begins to really hit the high mark. It's around this time that the switch is also made from bottle drinking to cup drinking.
But how do you get a child to give up their best friend? Wouldn't it be nice to wake up one day and the binky was gone and nobody noticed! That's unlikely to happen because many children come to rely on the pacifier to soothe them to sleep. Here are some methods that have worked for some parents:
- Prepare your child for throwing away the binky. Set a date (his birthday or Christmas) and count down the days until the binky is gone. Mark the calendar and let your child put stickers on the calendar for the countdown.
- Throw away all but one pacifier. Every day or so, without the child knowing you are doing it, hide the pacifier somewhere in the house. When the child asks for it, go on a "hunt" together to look for it. Allow her to find it for several days. Then one day hide it where it won't be found (like the garbage!) Tell your child it must be lost for good this time. Allow her to continue looking, but don't let her find it.
- Offer a substitute for comfort, such as holding a special doll or blanket, or even a cloth diaper.
- On an episode of Super Nanny, the family made a ritual of collecting all the pacifiers in the house with the help of the 2-year-old daughter and placing them in a beautiful gift bag with ribbons. They told the daughter the binky fairy was coming to get them, because other younger children needed them now. They went together and collected them all in the beautiful bag, repeating the explanation that they were going to other children who needed them more, and together they hung the bag on a tree in the backyard. The next morning, the bag was gone and another beautiful bag was in its place, filled with a stuffed toy for the two-year-old and a thank you note from the fairy.
Many children will respond to these suggestions and can get rid of their pacifiers with minimal tears. But even if your child cries for a day or two after the binky is gone, the long-term benefits are worth the short-term misery! | <urn:uuid:5683572b-2dbe-4f1c-917b-e891043f0992> | {
"date": "2016-02-10T17:46:18",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701159985.29/warc/CC-MAIN-20160205193919-00257-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9680976867675781,
"score": 2.609375,
"token_count": 756,
"url": "http://www.medcentral.org/Main/Pulltheplugonpacifiers.aspx?email=1"
} |
Accountants and Auditors
Analytical bent of mind, interest in numeracy could bring forth opportunities for plentiful and varied career progression.The four main types of accountants and auditors are the following:
Financial accountants and auditors provide specialist services to commercial and non-commercial organizations to ensure that they are financially sound and comply with legal requirements and regulations. They participate in important financial decisions involving mergers and acquisitions, benefits planning and long-term financial projections. The work requires a good understanding of both accounting and finance and can be quite varied; there is a wide choice of roles and specializations available depending on where you work.
Public accountants do a broad range of accounting, auditing, tax, and consulting tasks. Their clients include corporations, governments, and individuals.
Management accountants, also called cost, managerial, industrial, corporate, or private accountants, record and analyze the financial information of the organizations for which they work.
Government accountants maintain and examine the records of government agencies and audit private businesses and individuals whose activities are subject to government regulations or taxation.
Internal auditors check for mismanagement of an organization’s funds. They identify ways to improve the processes for finding and eliminating waste and fraud. The practice of internal auditing is not regulated, but the Institute of Internal Auditors (IIA) provides generally accepted standards.
Role of Accountants and Auditors
- Examine financial statements to be sure that they are accurate and comply with laws and regulations
- Compute taxes owed, prepare tax returns, and ensure that taxes are paid properly and on time
- Inspect account books and accounting systems for efficiency and use of accepted accounting procedures
- Organize and maintain financial records
- Assess financial operations and make best-practices recommendations to management
- Suggest ways to reduce costs, enhance revenues, and improve profits
Skills of Accountants and AuditorsAnalytical skills: Accountants and auditors must be able to identify issues in documentation and suggest solutions
Communication skills: Accountants and auditors must be able to listen carefully to facts and concerns from clients, managers, and others. They must also be able to discuss the results of their work in both meetings and written reports.
Detail oriented: Accountants and auditors must pay attention to detail when compiling and examining documentation.
Math skills: Accountants must be able to analyze, compare, and interpret facts and figures, although complex math skills are not necessary.
Organizational skills: Strong organizational skills are important for accountants and auditors who often work with a range of financial documents for a variety of clients. | <urn:uuid:89087748-c24b-410b-8553-42196aa8364c> | {
"date": "2019-02-22T10:44:25",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247515149.92/warc/CC-MAIN-20190222094419-20190222120419-00136.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9326021075248718,
"score": 3.515625,
"token_count": 534,
"url": "http://www.worldeducation.info/Career-Options/Accountants-and-Auditors/index.html"
} |
In this article, we’ll go through all the steps necessary to set up a basic Windows virtual machine (VM) in Amazon Web Services (AWS).
In AWS, the service used to manage VMs is called Elastic Compute Cloud (EC2). Thus, the first thing we need to do is access the EC2 service from the AWS Console homepage:
This brings us to the EC2 dashboard. We can click Instances in the left menu to get to the page where we can manage our VMs (note that we can also launch a VM / EC2 Instance directly from here):
The Instances page lists any VMs that we already manage, and allows us to launch new ones. Click on one of the Launch Instance buttons to create a new VM:
The next step is to select something called the Amazon Machine Image (AMI). This basically means what operating software and software you want to have on the VM. In our case, we’ll just go for the latest Windows image available:
The next thing to choose is the instance type. Virtual machines on AWS come in many shapes and sizes – some are general-purpose, whereas others are optimised for CPU, memory, or other resources. In our case we don’t really care, so we’ll just go for the general-purpose t2.micro, which is also free tier eligible:
Since we’re just getting started and don’t want to get lost in the details of complex configuration, we’ll just Review and Launch. This brings us to the review page where we can see what we are about to create, and we can subsequently launch it:
One thing to note in this page is that the instance launch wizard will create, aside from the EC2 instance (VM) itself, a security group. Let’s take note of this for now – we’ll get back to it in a minute. Hit the Launch button.
Before the VM is spun up, you are prompted to create or specify a key pair:
A key pair is needed in order to gain access to the VM once it is launched. You can use an existing key pair if you have one already; otherwise, select “Create a new key pair” from the drop-down list. Specify a name for the key pair, and download it. This gives you a .pem file which you will need soon, and also allows you to finally launch the instance.
Once you hit the Launch Instances button, the VM starts to spin up. It may take a few minutes before it is available.
Scroll down and use the View Instances button at the bottom right to go back to the EC2 Instances page. There, you can see the new VM that should be in a running state. By selecting the VM, you can see its Public DNS name, which you can use to remote into the VM (though we’ll see an easier way to do this in a minute):
Before we can remote into the machine, it needs to have its RDP port open. We can go to the Security Groups page to see the security group for the VM we created – remember that the instance launch wizard created a security group for us:
As you can see, the VM’s security group is already configured to allow RDP from anywhere, so no further action is needed. However, in a real system, this may pose a security risk and should be restricted.
Back in the Instances page, there is a Connect button that gives us everything we need to remote into the Windows VM we have just launched:
From here, we can download a .rdp file which allows us to remote into the machine directly instead of having to specify its DNS name every time. It also shows the DNS name (in case we want to do that anyway), and provides the credentials necessary to access the machine. The username is Administrator; for the password, we need to click the Get Password button and go through an additional step:
The password for the machine can be retrieved by locating the .pem file (downloaded earlier when we created the key pair) and clicking on the Decrypt Password button. Note that you may need to wait a few minutes from instance launch before you can do this.
The password for the machine is now available and can be copied:
Now that we have everything we need, let’s remote into the VM. Locate the .rdp file downloaded earlier, and run it:
You are then prompted for credentials:
By default, Windows will try to use your current ones, so opt to “Use a different account” and specify the credentials of the machine retrieved in the earlier steps.
Bypass the security warning (we’re grown-ups, and know what we’re doing… kind of):
And… we’re in!
If you’re not planning to use the VM, don’t forget to stop or terminate it to avoid incurring unnecessary charges:
The VM will sit there in Terminated state for a while before going away permanently. | <urn:uuid:b7aa9812-9538-4eeb-944d-4f4e2473ae1a> | {
"date": "2020-01-24T12:22:38",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250619323.41/warc/CC-MAIN-20200124100832-20200124125832-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.908328652381897,
"score": 2.65625,
"token_count": 1062,
"url": "https://gigi.nullneuron.net/gigilabs/spinning-up-a-windows-virtual-machine-in-aws/"
} |
By Vanessa Voltolina
Searching for your next finned pet? Guppies are a common and easy-to-care-for option. In fact, guppies make great pets and can be excellent additions to the tanks of both experienced fish owners and aquatic pet newbies, said Sam Williamson, former marine biologist and fish expert of more than 20 years. However, many fish owners and prospective buyers may not know much about guppies and can benefit from learning about this type of fish.
“Guppies are an extremely misunderstood breed of fish,” Williamson said. “With so many different fish to choose from, it's easy to dismiss them as boring and too commonplace.” Here, discover a handful of our favorite — and fun! — facts about guppies:
Fact #1: Guppies are a Namesake
The guppy is named after Robert John Lechmere Guppy, a researcher and geologist with, interestingly, no formal scientific training. Guppy was credited with discovering the fish in Trinidad in 1866, according to the National Institute of Higher Education, Research, Science and Technology. Prior to Guppy, W.C.H. Peters originally discovered the fish in Berlin, where it was overlooked.
Fact #2: What’s in a (Nick)name?
Guppies have two common nicknames that you might recognize, according to Williamson: the millions fish and the rainbow fish. Why? They are known as millions fish because they breed at an incredible rate, with females often having around 50 fries (baby fish) per month, he said. They get the name rainbow fish from the wide range of colors in which they can be found.
Fact #3: They Love Tropical Waters
Guppies are a species of freshwater, tropical fish native to South America. There are nearly 300 different types of guppy throughout rivers in the Amazon, as well as in Barbados, Brazil, Guyana, Trinidad and Tobago and Venezuela. To mimic these waters, aim to keep the water in your guppy’s tank in the mid-70 degrees Fahrenheit, with 76 degrees as an ideal temperature, according to Williamson. This can be done ideally with individual tank heaters or by using a room heater in the tank room.
Fact #4: Guppies are Easy to Care For
“They're not fussy about what they eat, get on well with most other breeds of fish and live for roughly three years if well looked after,” Williamson said. Typically, most of a guppy’s diet will consist of brine shrimp. They will also eat algae in their tanks but not as enthusiastically as shrimp, Williamson said.
Fact #5: They Don't Lay Eggs
Like humans, guppies give birth to live young, which makes the birth process fascinating to watch, Williamson said. “If you look closely enough, you can often see the eyes of the babies through the translucent skin of the mother before she gives birth.”
Fact #6: Watch Out! Guppies Eat Their Own Young
To stop their habitat from becoming overcrowded, guppies have evolved to eat their young, Williamson said. While some recommend separating parents from offspring, Williamson said that this may not be the best option, as it can be very stressful for the parents. Instead, he recommends filling the tank with plant materials to give the fry (baby) a chance to hide from its parents.
Fact #7: Guppies Have Been Used to Fight Malaria
Guppies have been deliberately set free in Asian waters to fight the spread of malaria. In 2014, an anti-malaria “guppy movement” in a city of southern India aimed to control malaria using the fish, who feed on mosquito larvae.
Fact #8: Guppies Vary in Shape and Color
As mentioned, guppies come in a variety of colors, but Williamson said it’s possible that a guppy owner could end up creating his or her own unique colors by introducing different color guppies that breed. Additionally, guppy owners can also choose from a number of tail shapes, including the flag, veil, lace and double-sword tail.
Image: Chatuphon Neelasri via Shutterstock | <urn:uuid:91458286-c1fb-4b9e-bb54-bddd046e43bd> | {
"date": "2018-05-23T12:50:53",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865651.2/warc/CC-MAIN-20180523121803-20180523141803-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9591667652130127,
"score": 2.578125,
"token_count": 886,
"url": "https://m.petmd.com/fish/general-health/8-facts-about-guppies"
} |
What are organ clocks?
Organ clocks are precision mechanical clocks combined with a small organ. The mechanical clock movement is linked to the musical mechanism and the music is generated by a rotating barrel, usually of wood. The result is melodious and music pieces were composed especially for organ clocks by famous composers such as Haydn, Beethoven and Mozart.
The organ clocks were built for affluent, culturally sophisticated people, with an appreciation of art and music. They possibly originated in the late seventeenth century, but their high point was in the “Age of Reason” in the eighteenth century. The finest specimens were built primarily in Berlin around 1770. But many were made in Vienna and in England, the Netherlands and France a decade later. Extensive production of organ clocks began in the Black Forest from circa 1810 but these clocks were of lesser quality.
The music barrel - Most precious part of an organ clock
The greatest advances in organ clock making were made by the Viennese. They made the clockwork to such a high standard that the motion of the wheels and pinions and the rotation of the fly did not drown the melodious sounds of the organ itself. The tonal quality of the pipes was perfected and remains unsurpassed to this day. Finally they doubled the musical playing time up to 8 minutes, without the necessity of rewinding the mechanism.
Organ clocks were also used for entertainment in inns and taverns. Thus they already existed, like the other kinds of clocks made in the Black Forest, at the dawn of the age of mass production. At the same time barrel organs were manufactured in large numbers.
The era of organ clock manufacture came to an end at about this time. Alternatives such as the much cheaper musical boxes were developed in Switzerland. But these, like the carillon, were not capable of musical dynamics. The Swiss music box movements were initially confined to clocks which were erroneously referred to as “Spieluhr” (musical clock).
Today many of these precious old organ clocks are to be found in private collections and museums. The clocks made by our Matthias Naeschke clockworks follow in the long tradition of organ clock making and our skills are recognised world-wide. We are frequently asked by collectors and museum curators throughout the world for advice and information concerning an old organ clock.
- Next >> | <urn:uuid:155bd3a9-2601-4ad0-87d5-232d599bbc2e> | {
"date": "2018-12-12T04:10:42",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823712.21/warc/CC-MAIN-20181212022517-20181212044017-00216.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9836858510971069,
"score": 3.796875,
"token_count": 488,
"url": "http://fine-clocks.com/clock-dictionary.html?showall=&start=0"
} |
List of glaciers in Norway
These are the largest glaciers on mainland Norway. However, the 18 largest glaciers in the Kingdom of Norway are on Svalbard, including the second largest glacier in Europe, Austfonna on Nordaustlandet. In total, Norway has around 1,600 glaciers - 900 of these are in North Norway, but 60% of the total glacier area is south of Trøndelag. 1% of mainland Norway is covered by glaciers. | <urn:uuid:a8d443e3-3851-4bef-b63c-304a3a017960> | {
"date": "2015-05-05T11:46:47",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430456100475.98/warc/CC-MAIN-20150501045500-00041-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9582928419113159,
"score": 2.734375,
"token_count": 96,
"url": "http://en.wikipedia.org/wiki/List_of_glaciers_in_Norway"
} |
After the cooler than normal winter season, temperatures finally started to recover in March. Average temperatures during the month were 1 to 3 degrees above normal in central and southeast Illinois. The first surge of warm weather began on the 7th, and by the 10th, highs in the lower 70s were common south of I-72. Additional mild periods were observed from the 17-19th, 21-24th, and at the end of the month.
Precipitation averaged below normal. No severe weather occurred, although several places reported pea size hail on the 7th and 11th.
As astronomical spring was approaching, winter made one last appearance. Snowfall of 1 to 3 inches was common northwest of the Illinois River on the 20th, with the highest total of 3.9 inches at Altona, in northern Knox County. This particular storm system deposited snowfall in a large area from Oklahoma to Michigan, with the heaviest totals in southwest Missouri where the snow was a foot deep in some areas.
River levels on the Illinois River began rising shortly before mid-month, as runoff from snow melt upstream worked its way down the river basin. River levels rose to over 19 feet at Havana and 20 feet at Beardstown by the 21st. While river stages fell the remainder of the month, they remained above flood stage. Parts of the Embarras, Wabash, and Little Wabash Rivers also flooded late in the month, after rainfall of 1 to 2 inches fell from the 25-26th.
By the end of the month, strong southerly winds brought temperatures into the 80's in a few areas, for the first time in several months. | <urn:uuid:692ef32b-8a99-4af2-b549-8d479cafb8d1> | {
"date": "2015-02-27T06:02:32",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00046-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9748004674911499,
"score": 2.609375,
"token_count": 342,
"url": "http://www.crh.noaa.gov/news/display_cmsstory.php?wfo=ilx&storyid=50667&source=2"
} |
<chemistry> Any of the highly reactive metals (such as sodium or potassium) found in the first column of the periodic table, these metals act as bases.
(13 Nov 1997)
alkali denaturation test, alkali disease, alkali earth metal, alkalies < Prev | Next >
alkalimetry, alkaline, alkaline-ash diet
© mondofacto 2008-10 | about us | advertise with us | disclaimer | privacy & cookies | contact us | <urn:uuid:2c4fc91e-62f9-4a9f-8832-534254c435a0> | {
"date": "2015-11-29T01:35:47",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398455135.96/warc/CC-MAIN-20151124205415-00064-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7798327207565308,
"score": 2.515625,
"token_count": 103,
"url": "http://www.mondofacto.com/facts/dictionary?alkali+metal"
} |
In the 1970s, I joined the World Health Organization to help start and lead its new diarrheal diseases control program. The goal of the program was to reduce diarrheal mortality using a highly effective method of rehydrating patients by mouth using a solution composed primarily of salt, sugar and water.
In 1982, I wrote a paper with a colleague estimating that 4.6 million children under age 5 died each year from diarrhea — a shocking figure. Today, under-5 deaths caused by diarrhea have declined by 90 percent. Why? The treatment is inexpensive, easily administered at home, and it works.
In the late 1980s I was asked to help start the Acute Respiratory Infections Program at WHO, which had a similar goal of reducing childhood mortality from pneumonia by simply counting how many breaths a child had each minute and observing whether the breathing was labored. Children with rapid or labored breathing were given an oral antibiotic.
Preventing childhood diarrhea and pneumonia deaths and vaccinating children in the first six months of life was the essence of the Child Survival Revolution of the 1980s. But sadly, the revolution came to an end as much of the global health community shifted most of its attention and resources to HIV/AIDS.
In 2000, the United Nations and governments around the world set eight Millennium Development Goals. Number four was a pledge to reduce the global under-5 mortality rate by two-thirds by 2015.
But the newly released UNICEF report, Committing to Child Survival: A Promise Renewed, tells us that while we have made progress, more than 200 million children have paid with their lives because we failed to regain the momentum we had three decades ago. In 2012, most of the 6.6 million under-5 deaths were caused by preventable diseases like diarrhea, pneumonia, and malaria. And at our current rate of progress, by 2028 an additional 35 million children will die who would have survived had we met this MDG.
This is the moment of truth. The level of commitment that the world made to eradicating smallpox and improving access to antiretroviral drugs, especially in low-income countries, now needs to be applied to child survival. We need to accelerate our efforts to come as close as possible to achieving MDG 4 and ensure that what is not achieved is included in the post-2015 agenda. The technologies and approaches exist, and they are affordable.
The winning formula is global leadership and coordination, political commitment, adequate resources and strengthening of health systems in countries.
There is no excuse for letting millions of our children suffer and die because of our inaction. What are we waiting for?
Dr. Michael H. Merson is the founding director of the Duke Global Health Institute and the Wolfgang Joklik Professor of Global Health at Duke University. Previously, he served as director of the Diarrheal Diseases Control Program, the Acute Respiratory Infections Control Program, and the Global Program on AIDS at the World Health Organization.
More from GlobalPost: Millennium Development Goals: When failure means success | <urn:uuid:c78502c8-1215-4bdd-bcdc-0df90f3dda19> | {
"date": "2015-10-04T17:39:19",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736675795.7/warc/CC-MAIN-20151001215755-00086-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9684718251228333,
"score": 3.1875,
"token_count": 626,
"url": "http://www.globalpost.com/dispatches/globalpost-blogs/global-pulse/child-survival-ORS-MDG-Michael-Merson"
} |
Our last blog post in which we discussed our favourite animated films prompted us to think back to animations we have enjoyed from childhood. Some of the best loved animations of all time date back to the 1920s where Walt Disney and Warner Brothers revolutionised the industry. The earliest version of Mickey Mouse was created in 1928 followed closely by the Warner Brothers Cartoons in 1930. But what about even earlier than that? Where did animation begin, when and how?
So, we asked Kurobot to share his knowledge and teach us all about the origin of animation.
Motion in art can date back as far as Paleolithic cave paintings, a very very long time ago! Paintings of animals with many legs in various positions is noted as the first attempt at conveying motion. Other pieces include sequences and phases of movement in both animals and people painted onto bowls, plates and murals.
Animation before film dates back to the 1600s where numerous devices were used to display animated images. The magic lantern, invented 1650, used a translucent oil painting and a lamp to project images onto adjacent flat surfaces. It was often used to display monsters and demons to convince people they were witnessing supernatural events. (We have ours ready for Halloween)
The Thaumatrope, invented 1824, was one of the first devices to demonstrate the Phi phenomenon, the human (and Kurobot) brains ability to persistently perceive an image. The device used a small circular piece of card with different images on each side, strung onto a central cord. When the cord is spun between the fingers the images appear to merge into one creating a moving image.
Possibly the most well known origin of motion picture is the humble flip book. Invented 1868, a flip book features a sequence of animated images on the unbound edge of each page of the book. When bending the pages back and flicking through the book the images merge due to the rapid replacement of each image with the next, forming a short animation.
The silent era of animation began in the late 1800s with the production of short stop motion animations, the most famous of which, produced in 1920 was Felix the cat. Felix was the first merchandised cartoon character and became a household name.
1923 marked the beginning of the golden age of animation when a small studio “Laugh-o-grams” went bankrupt, and its owner, Walt Disney opened a new studio in Los Angeles. This was possibly one of the most significant events in the history of animation.
The first Disney productions include “The Alice Comedies” series, “Song Car Tunes” and “Dinner Time”, however the most notable breakthrough entitled “Steamboat Willie” featured an anthropomorphic mouse named “Mickey” neglecting his work on a steamboat to instead make music with the animals aboard the boat. This would mark the development of animation in our generation including TV, and CGI animation.
Image sources: Silent London, Education Eastman House, The Local, Good Comics, Animation Connection | <urn:uuid:0bc4c4b2-8f03-4ea8-9e69-249bd8360b74> | {
"date": "2013-05-21T10:21:44",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.962803304195404,
"score": 3.203125,
"token_count": 625,
"url": "http://www.kurojabber.com/category/animations-to-watch/"
} |
The Office of Inspector General (OIG) of the Department of Health and Human Services, FDA’s parent agency, has just issued a report sharply criticizing FDA’s oversight of State food inspections.
This report is one more piece of evidence for how FDA’s lack of resources makes our food supply less safe.
Because it does not have the personnel to do its own inspections, FDA increasingly delegates them to State agencies. The Salmonella outbreak from peanuts in 2009 is a prime example of why the State system is too diffuse to work. As the report explains,
The peanut processing plant responsible for a 2009 salmonella outbreak was inspected multiple times by a State agency working on behalf of FDA. This outbreak resulted in one of the largest food recalls in U.S. history and has led to serious questions about the effectiveness of State food facility inspections.
FDA has long been unable to inspect more than a tiny fraction of food processing facilities and the situation is getting worse, not better: the overall number of facilities inspected decreased from just over 17,000 facilities in 2004 to about 15,900 in 2009 (4%-5% of the total number).
FDA increasingly goes to States to fill the gap. In 2009, it contracted with 41 States to conduct inspections, and these conducted 59% percent of FDA’s food inspections. In 2004, State inspections comprised just 42% of inspections.
FDA says it has good reasons for relying on States:
According to FDA officials, one reason FDA relies on States is that these inspections are conducted under State regulatory authority, which often exceeds FDA’s own authority. For example, several FDA officials noted that, under certain conditions, State inspectors can immediately shut down a facility or seize unsafe food products, whereas FDA would have to go through a lengthy legal process to achieve similar results.
But this is not enough. The current report is only the latest of a series of OIG reports detailing problems with FDA’s food inspections. Previous reports found that more than half of all food facilities have gone 5 or more years without an FDA inspection.
The report concludes:
Taken together, the findings demonstrate that more needs to be done to protect public health and to ensure that contract inspections are effective and prevent outbreaks of foodborne illness.
Yes, of course they do. But how is FDA supposed to fix the problem?
Bizarrely, and at great risk to the public, FDA gets its funding from congressional agriculture appropriations committees, not health committees.
In this era of cost cutting, FDA was lucky to get a $50 million increase in funding, or so everyone says.
But this is nowhere near enough to hire and train enough inspectors to do the job right. It’s not that the States can’t do a good job. It’s that the dispersion of authority leaves much room for flexibility in interpretation and lack of accountability, as the OIG reports consistently show.
For reasons of politics, this may not be the time to demand a stronger food safety system. But if not now, when? | <urn:uuid:b7da5e5b-06bf-474e-9402-be8bf38aeec9> | {
"date": "2016-07-28T14:34:58",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828283.6/warc/CC-MAIN-20160723071028-00128-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9548236131668091,
"score": 2.671875,
"token_count": 632,
"url": "http://www.foodpolitics.com/2011/12/more-problems-with-fdas-ability-to-inspect-food-facilities/"
} |
Major new study exposes hidden causes of inequality
Hidden and unacknowledged beliefs are responsible for the UK's social inequality, according to a leading geographer at the University of Sheffield, whose research is set to be revealed in a new book published this week (Wednesday 21 April 2010).
In his book entitled Injustice: Why social inequality persists, Professor Danny Dorling claims that in rich countries, where there are now plenty of resources to go around, inequality is caused by deep-rooted, unacknowledged beliefs. Professor Dorling argues that, as the five social evils identified by Beveridge at the dawn of the British welfare state (ignorance, want, idleness, squalor and disease) are gradually being eradicated, social injustices are now being recreated, renewed and supported by five new sets of unjust beliefs:
• Elitism is efficient: educational apartheid in the UK has risen as the majority of additional qualifications in recent decades have been awarded to a minority of young adults.
• Exclusion is necessary: social segregation has increased as real financial rewards and benefits to those worse off have fallen — just as the riches of the wealthy have grown.
• Prejudice is natural: a wider racism has developed, a new social Darwinism, which sees some people as inherently less deserving and able than those who 'need' great rewards to work.
• Greed is good: a mantra is becoming more widely accepted that economic growth is necessary at almost any cost including growing global inequalities and mounting debt.
• Despair is inevitable: the rise in depression and anxiety is best understood as a symptom of living in times and places when wide inequalities are seen as acceptable.
The research addresses the fact that, by income, the UK is the fourth most unequal of the 25 richest countries in the world.
In his book, which is based on significant academic research across a range of fields, Professor Dorling also suggests that each belief has created a new and distinct set of victims.
These victims include a sixth of people in more unequal rich countries, who are excluded from full membership of society because of poverty, while a much smaller proportion exclude themselves from social norms by dint of their wealth.
In addition, Professor Dorling sheds light on how a fifth of adults in countries like Britain and the United States are now serial 'debtors' as rising inequalities in income and wealth have made it more likely that people get into debt in order to keep up with their peer group.
The research also explores how a third of families in Britain now contain someone who suffers depression or chronic anxiety disorder. According to Professor Dorling, living in more unequal affluent countries harms the mental well-being of people in general, especially adolescents who now face such uncertain futures.
Professor Danny Dorling, from the Department of Geography at the University of Sheffield said: "These are beliefs which have been publicly condemned as wrong and most individuals would claim not to support them. However, their acceptance by just a few, and the reluctance of many others to confront those few, is crucial to maintaining injustice in such times and lands of plenty."
Speaking about the book, fellow social commentator Richard Wilkinson, a Professor of Medical Epidemiology at Nottingham University and co-author of The Spirit Level, a research book which considered why more equal societies are more successful, commented: "Beliefs which serve privilege, elitism and inequality infect our minds like computer viruses. But now Professor Dorling has provided the brain-cleaning software we need to begin creating a happier society."
Professor Dorling will be speaking about Injustice and signing books on Monday 26 April 2010 at Blackwell's bookstore on Mappin Street, Sheffield, from 5.30pm.
He will also be speaking about his research at the RSA in London at 6pm on Thursday 22 April 2010. For more information and to sign-up for free, visit: http://www.thersa.org/events/our-events/why-social-inequality-persists
Notes for Editors: Injustice: Why social inequality persists by Daniel Dorling is published by The Policy Press on 21 April 2010, price £19.99 hardback (ISBN 978 1 84742 4266). It is available to buy from www.policypress.co.uk at 25% discount, or from Marston Book Services, P O Box 269, Abingdon, Oxon OX14 4YN Tel: 01235 465500 plus £2.75 postage and packing
The book contains seven tables and 25 figures. A bibliography of over 1500 recent pieces of evidence has also been brought together in creating the arguments to try to show where much new thinking is heading. An online appendix with 8 tables is available at the link below.
To download a press pack, visit the link below.
Of all the 25 richest countries in the world (excluding very small states), the US and the UK rank as second and fourth most unequal respectively when the annual income of the best-off tenth of their population is compared with that of the poorest tenth. Starting with the most unequal, the top five 10% richest:10% poorest income ratios are:
And the most equal are:
(For more on this list see Footnote 37 page 327 of 'Injustice')
Britain is at its most unequal for 80 years in terms of inequalities in income (the share of the richest 1% is almost back to 1920s levels); in terms of geographical inequalities in health (areas are as polarised as in the 1930s); and in terms of spatial polarisation in voting (approach 1918 levels of spatial segregation by 2010). All figures in Table 5 of 'Injustice' (p. 176).
The Policy Press is a leading social science publisher based at the University of Bristol and is committed to publishing books that make a difference. For more information, visit the link below.
For further information please contact: Shemina Davis, Media Relations Officer, on 0114 2225339 or email [email protected] | <urn:uuid:91d2a97c-50c9-40e8-a833-24d95d4977da> | {
"date": "2019-10-17T03:24:34",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672548.33/warc/CC-MAIN-20191017022259-20191017045759-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9524645805358887,
"score": 3.140625,
"token_count": 1233,
"url": "https://www.sheffield.ac.uk/news/nr/1598-1.173946"
} |
You're probably aware of health concerns tied to coffee—but you may not know that your dependence could amount to a diagnosable problem. In a recent study, researchers find that Caffeine Use Disorder may be more of a problem than many doctors realize. "There is misconception among professionals and lay people alike that caffeine is not difficult to give up. However, in population-based studies, more than 50% of regular caffeine consumers report that they have had difficulty quitting or reducing caffeine use," says study author Laura Juliano via Eureka Alert.
Do you have the disorder? Quartz points to three key symptoms:
- You want, or have tried, to quit or reduce your caffeine intake.
- You know caffeine leads to health problems for you—it makes it hard to sleep, for instance—but you keep using the stuff.
- You suffer from withdrawal symptoms, which can include headaches or nausea, if you don't get your daily dose.
Before you panic, however, the site notes that researchers find 400 mg per day to be OK for healthy adults; that's between two and three eight-ounce cups. Pregnant, anxious, or an insomniac? Cut that amount in half, CBS DC
reports. And if you need help, you're not alone: "Through our research, we have observed that people who have been unable to quit or cut back on caffeine on their own would be interested in receiving formal treatment—similar to the outside assistance people can turn to if they want to quit smoking," Juliano says. | <urn:uuid:299c392a-95d0-49cc-9faf-4ff29529eb38> | {
"date": "2014-03-12T01:07:23",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394020561126/warc/CC-MAIN-20140305115601-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9679872393608093,
"score": 2.796875,
"token_count": 317,
"url": "http://www.newser.com/story/181602/you-may-well-have-caffeine-use-disorder.html"
} |
posted by Rebekah on .
If we produce 350 units of output, the total cost is $11,500. It costs us $12,900 to produce 420 units. If we assume the relationship is linear, determine the cost function.
treat your data as two ordered pairs
( 350 , 11500) and (420 , 12900)
find the equation like you would given any two ordered pairs,
find the slope etc
cost = slope (number of units) + constant
y = m x + b
11500 = 350 m + b
12900 = 420 m + b
solve for m and b by elimination or substitution | <urn:uuid:ab626425-c8d7-429e-b747-d0b2300696eb> | {
"date": "2017-05-23T19:14:17",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607649.26/warc/CC-MAIN-20170523183134-20170523203134-00110.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8711561560630798,
"score": 3.03125,
"token_count": 136,
"url": "http://www.jiskha.com/display.cgi?id=1327548562"
} |
by Sunniva Heggertveit-Aoudia
When we talk about “diversity” we often think about the USA. Why? Because this is where you find most books, networks and magazines about the subject. And legislation around diversity, or rather discrimination, came in to place as early (or as late, depending on the angle) as 1961. But diversity is everywhere and it is a subject in many regions and countries. The focus may be different, the laws may be different and the understanding of what “diversity” is may be different.
[sws_pullquote_right]”Progress may not be at revolutionary speed, but we are coming to an understanding that diversity makes business sense and that the diversity of the world is at our doorsteps.” [/sws_pullquote_right]
When reading about legislative requirements on diversity in various countries, there seems to be one group that has prominence in most countries; people with disabilities. In large regions and countries like Canada, India and Europe, there is also attention around hiring and promoting women. Norway even has a quota of 40% women on boards for public limited companies. But from there on, which minorities receive the most attention vary like the world itself. In many places there is no legal steer, but there may (or may not) be an expectation – sort of an unwritten rule – of hiring minorities in both public and private sector. There are also different opinions on whether there should be a legal steer or not.
To give you an idea, I am inviting you to a brief journey around the world. Below you will find a selection of countries that have laws around disadvantaged groups of the population – other than women and people with disabilities (acknowledging that there may be more legislative requirements I have not come across in my search):
- Brazil: Black and native Brazilians
- Canada: People of Aboriginal descent, visible minorities
- France: Obligation to accept a certain number of students from poor families (often from North-African descent)
- India: Scheduled Castes (Dalit or “untouchables) and Tribes (two groupings of historically disadvantaged people); other underserved classes (“socially and educationally backward classes”)
- Malaysia: Bumiputra (ethnic Malay).
- New Zealand: People of Maori and Polynesian descent
- People’s Republic of China: Certain public positions are distributed to ethnic minorities (non-Han people)
- South Africa: Blacks, Indians and people of color
- UK: Catholics/Protestants
In several countries in the Middle East, there are laws around hiring more local staff (e.g. Qatarization), as the oil industry has brought in large numbers of expatriates.
I don’t think we have a country that has it all figured out, but I would like to highlight Singapore as a nation that is rather successful in mixing minority/majority groups and religions. Most Singaporeans are of Chinese, Malay or Indian descent. There are four official languages: English, Chinese, Malay and Tamil. Within this little space (694 km2/268 sq mi) people practice Buddhism, Christianity, Islam, Taoism and Hinduism. They celebrate all the various religious/festive days and show a respect for each other that is rather unique. Not that there is no tension or discrimination, but generally speaking it is a peaceful nation that has embraced its diversity. Alas, these are best practice examples.
Why do we need laws to promote recruitment or student intake of certain groups? This is a big question, but we seem to have a tendency to create in- and out-groups, on micro and macro levels, and you find it everywhere around the world in various degree. I will not go into the psychological reasons to why we have this tendency, the good news is that as humans we adapt and we learn. The fact that so many countries have legislation around diversity, is already a step forward, it means we are aware of the non-balance. Progress may not be at revolutionary speed, but we are coming to an understanding that diversity makes business sense and that the diversity of the world is at our doorsteps.
Simply said, achieving diversity and respect for people is a challenge all over the world, but there is also good progress going on around the world.
Sunniva Heggertveit Aoudia, owner of NORSUN Diversity and Cross-Culture Consulting, is a consultant, trainer and co-active coach. She has more than 20 diverse years of experience from the oil industry, recruitment and customer relations. Sunniva is a diversity specialist and inhabits deep knowledge on working across cultures (www.diversity-and-cross-culture.com). | <urn:uuid:6b24ffda-5bf3-4c63-ac2c-cde0436dd8b2> | {
"date": "2019-04-26T06:40:08",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578760477.95/warc/CC-MAIN-20190426053538-20190426075538-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9553206562995911,
"score": 2.65625,
"token_count": 993,
"url": "http://www.diversityjournal.com/6976-diversity-around-the-world/"
} |
Statistics and Probability Dictionary
Select a term from the dropdown text box. The online statistics
glossary will display a definition, plus links to other
related web pages.
Simple Random Sampling
Simple random sampling refers to any sampling method that has the following
The population consists of N
The sample consists of n
If all possible samples of n objects are equally likely to occur, the
sampling method is called simple random sampling.
An important benefit of simple random sampling is that it allows researchers to use
statistical methods to analyze sample results. For example, given a simple random
sample, researchers can use statistical methods to define a
confidence interval around a sample mean. Statistical
analysis is not appropriate when non-random sampling methods are used.
There are many ways to obtain a simple random sample. One way would be the
lottery method. Each of the N population members is assigned a unique
number. The numbers are placed in a bowl and thoroughly mixed. Then, a
blind-folded researcher selects n numbers. Population members having the
selected numbers are included in the sample. | <urn:uuid:7e321a58-638b-4166-afac-4f466c4fe274> | {
"date": "2013-12-07T15:03:58",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054867/warc/CC-MAIN-20131204131734-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9037564396858215,
"score": 4.375,
"token_count": 229,
"url": "http://stattrek.com/statistics/dictionary.aspx?definition=simple_random_sampling"
} |
Zanzibar Cathedral is a wonderful building. It stretches the local technique of construction in coral to the limits. It boasts a unique concrete roof from the era before reinforced concrete technology. There are beautifully crafted examples of “arts and crafts” copper panel work and stained glass that blend with local craftsmanship in timber. It is basilican in plan with an unusual combination of Perpendicular Gothic and Islamic details.
The Cathedral site has a remarkable history. Zanzibar reached its zenith through the slave trade and the cathedral was built on the site of the old slave market as a celebration of the end of the trade in the Sultan’s dominions. The foundation stone was laid in 1873 and it was consecrated in 1903, named after Canterbury Cathedral. The old part of Zanzibar, Stone Town, is now a World Heritage Site.
The edifice has fallen into a state of serious dilapidation. Despite occasional repair work over the years, structural and water ingress problems are bringing the building into danger of collapse. Moves to repair the cathedral were made in 2000 when Tom Gray visited and prepared a Condition Report. The subsequent development of a serious crack brings urgency to restoring the building’s structural integrity. To allow this to move ahead quickly it is proposed to separate the project into two phases. Structural work will be carried out by Tanzanian contractors under the direction of Christian Engineers in Development while a vocational school is established where young people will eventually be trained in the craft of conservation, liaising with the existing Stone Town Conservation and Development Authority.
Around ten years ago there was structural movement and although the original roof has lasted, the concrete has started to crack. At present a serious crack runs the height of the West gable and the cracking continues along the length of the roof.
The immediate concern is to undertake repairs so that the Cathedral is not in danger of collapse. The basic cost of this is £450 000, some of which has already been raised by communities both in Zanzibar and the UK.
The ultimate aim is to bring the building back into the showcase example of Swahili architecture that it once was. The cost is estimated at £250 000, which will allow tourists, academics and worshipers to be able to experience and enjoy this unique space with its turn of the 20th century art work.
- Rescue an internationally important building.
- Build a community of artisans focused on developing excellence in trainee craftsmen and women.
- Involve local people, expatriates, Muslims and Christians in a project that will foster understanding.
- Reduce poverty by providing training and work. | <urn:uuid:a0a7b9c4-89b6-4923-814a-e1007593a4d4> | {
"date": "2018-06-20T15:21:34",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863650.42/warc/CC-MAIN-20180620143814-20180620163814-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9551970958709717,
"score": 2.8125,
"token_count": 541,
"url": "http://www.zanzibarfriends.org/?page_id=11"
} |
Hutchinson in Reno County, Kansas — The American Midwest (Upper Plains)
Windmills were once a common sight across the Great Plains and played an important role in the settlement of the American West. Windmills allowed settlers to farm the fertile plains in areas not blessed with abundant streams and rivers. Used primarily for pumping water from underground wells, wooden windmills dotted the landscape throughout the 19th century. Metal windmills, popluarlized by Thomas Perry and LaVerne Noyes of the Aeromotor Company, became more prevalent in the 20th century because of their increased efficiency. Metal wheels turned faster than wooden wheels, and with the improvements such as back gearing (which reduced the ratio of pump strokes per revolution) and self-oilers (which eliminated the need to climb the tower to add oil), wooden windmills became obsolete and were not produced after 1940.
To pump water from an underground reservoir, windmills used wind to move the rotors on the wheel which forced internal gears to move the pump rod in a reciprocal motion. The pump rod forced a plunger and check valve below the water table on the downstroke and forced water to the surface on the upstroke when the check valve on the plunger closed.
This Star 24 model windmill was likely purchased at the Hinshaw Merchantile Store by H.D. Horton in 1920 and used on his farm in Plevna, Kansas. The Star 24 was
Erected by Reno County Museum.
Location. 38° 3.023′ N, 97° 55.754′ W. Marker is in Hutchinson, Kansas, in Reno County. Click for map. Marker is on the grounds of the Reno County Museum, 100 South Walnut Street (at A Avenue). Marker is in this post office area: Hutchinson KS 67501, United States of America.
Other nearby markers. At least 8 other markers are within walking distance of this marker. Siegrist Claim House, 1876 (here, next to this marker); Outhouses (a few steps from this marker); Warren G. Harding (within shouting distance of this marker); Hutchinson Auto and Tractor School (about 700 feet away, measured in a direct line); Hutchinson Implement Co. (about 700 feet away); American Hotel O'Brian's Grocery (approx. 0.2 miles away); Magers Agricultural Implements (approx. 0.2 miles away). Click for a list of all markers in Hutchinson.
Also see . . .
1. Reno County Museum. (Submitted on February 5, 2011, by William Fischer, Jr. of Scranton, Pennsylvania.)
2. Brief History of Windmills in the New World. (Submitted on February 5, 2011, by William Fischer, Jr. of Scranton, Pennsylvania.)
3. American Wind Power Center and Museum. (Submitted on February 5, 2011, by William Fischer, Jr. of Scranton, Pennsylvania.)
Categories. • Agriculture • Environment • Man-Made Features • Settlements & Settlers •
Credits. This page originally submitted on , by William Fischer, Jr. of Scranton, Pennsylvania. This page has been viewed 616 times since then and 11 times this year. Photos: 1, 2, 3. submitted on , by William Fischer, Jr. of Scranton, Pennsylvania. This page was last revised on June 16, 2016. | <urn:uuid:7598bc0b-6085-453c-a011-bc1d811f1232> | {
"date": "2017-03-24T10:26:41",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187792.74/warc/CC-MAIN-20170322212947-00086-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9344609975814819,
"score": 3.453125,
"token_count": 709,
"url": "http://www.hmdb.org/marker.asp?marker=40093"
} |
NumPy provides a C-API to enable users to extend the system and get access to the array object for use in other routines. The best way to truly understand the C-API is to read the source code. If you are unfamiliar with (C) source code, however, this can be a daunting experience at first. Be assured that the task becomes easier with practice, and you may be surprised at how simple the C-code can be to understand. Even if you don’t think you can write C-code from scratch, it is much easier to understand and modify already-written source code then create it de novo.
Python extensions are especially straightforward to understand because they all have a very similar structure. Admittedly, NumPy is not a trivial extension to Python, and may take a little more snooping to grasp. This is especially true because of the code-generation techniques, which simplify maintenance of very similar code, but can make the code a little less readable to beginners. Still, with a little persistence, the code can be opened to your understanding. It is my hope, that this guide to the C-API can assist in the process of becoming familiar with the compiled-level work that can be done with NumPy in order to squeeze that last bit of necessary speed out of your code. | <urn:uuid:e70db9c3-2823-4884-890d-cd029ba70098> | {
"date": "2014-11-27T19:39:49",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009084.22/warc/CC-MAIN-20141125155649-00180-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9278852343559265,
"score": 2.703125,
"token_count": 269,
"url": "http://docs.scipy.org/doc/numpy-1.5.x/reference/c-api.html"
} |
1) Bridge Crane
A lifting and horizontal movement device mounted on a "bridge" of one or more horizontal girders (bridge girders) which are supported at either end by trucks (end trucks). These trucks are attached at right angles to the girders and move on runways which are attached to a building's columns, overhead trusses, frames, or via a free standing system of columns.
2) I-beam crane
An overhead traveling bridge crane that utilizes standard I-beam (S beams) as the bridge girder and at times also utilizes I beams as the runway beams. Cranes that utilize H-beams (structural beams) as girder and runways are sometimes referred to as I-beam cranes as opposed to patented track cranes.
3) Double girder crane
An overhead traveling bridge crane that utilizes two bridge beams set atop the runway (end) trucks. Generally this type of crane utilizes a top running trolley hoist which moves along the top of the two bridge beams on its own set of trucks/trolley wheels. The hook from the hoist "falls" between the two bridge beams. Headroom under the crane is increased by utilizing this hoist/crane configuration.
4) Stacker crane
The stacker crane in appearance looks like a conventional bridge crane except that in place of a hoist, a rotating ridged or telescoping mast is suspended from the bridge trolley with the mast equipped with a load handling device such as single or double forks or a grab.
These cranes can be manually operated or powered and are used where the carne spans multiple aisles allowing for the storage and retrieval within any aisle of items such as coils of steel. | <urn:uuid:0a16f0c4-7e99-44c8-be5c-d04463c3c609> | {
"date": "2018-06-25T13:58:20",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867885.75/warc/CC-MAIN-20180625131117-20180625151117-00616.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9358915090560913,
"score": 3.203125,
"token_count": 356,
"url": "http://www.mhi.org/glossary?q=%22bridge+crane%22&pb=1&fq=&sort=score+desc"
} |
Image Source: http://www.amazon.com/JFK-Unspeakable-Why-Died-Matters/dp/1439193886
November 22, 1963 - A Day That Will Live in Infamy
The 50th anniversary of the murder of President John F. Kennedy at Dealey Plaza, Dallas, Texas will be November 22, 2013.
James Douglass, author of the extraordinary 'must read' book above, wrote on page 142:
We have no evidence as to who in the military-industrial complex may have given the order to assassinate President Kennedy. That the order was carried out by the Central Intelligence Agency is obvious. The CIA’s fingerprints are all over the crime and the events leading up to it.LewRockwell.com has covered the issue of JFK's murder over the years and recently posted a piece by a well known JFK researcher, John Judge.
A Call to Ocupy the Grassy Knoll in 2013
Few people know that Robert Kennedy believed his brother was murdered by a political conspiracy and told close associates that he would reopen the investigation if he was able to be elected into the White House. Even fewer people know that Dr. Martin Luther King, Jr. was high on his list of possible running mates for the presidency in 1968. All these deaths served to kill public hope for social and political change and left the rising Military Industrial Intelligence Complex warned about by outgoing President Eisenhower in 1963, and a permanent war economy and Cold War and nuclear arsenal were left in place to grow, along with the power of the intelligence agencies and the national security and police state who were clearly suspect of playing a role in these murders.The City of Dallas and the Dallas Police Department were key players in covering up the JFK murder investigation, largely because Lyndon Johnson was an extremely powerful and ruthless.Texas senator with considerable control over everything in TX, including the Texas Democrat political machine, the police and LBJ also had deep ties to Texas billionaires and Wall Street. Some researchers believe that LBJ was the mastermind behind JFK's assassination and researcher Phillip F. Nelson wrote a book documenting his investigation on this issue: LBJ: The Mastermind of JFK’s Assassination.
Anticipating ever larger crowds on the 50th anniversary of JFK’s assassination on November 22, 2013, the Coalition has applied for a legal permit in advance over the last three years, only to be told no permit can be issued more than a year in advance. Despite that rule, the Dallas Parks and Recreation Department informed me this year that a permit has been issued to the Sixth Floor Museum and the City of Dallas for the use of Dealey Plaza for the entire week from November 19-24, for exclusive use of the area and that no other permit can be issued for our event. The Director of the Sixth Floor Museum, Jessica Langford, has stated in the Dallas Morning News that they have no event planned for the Plaza, but they wanted to be “proactive” in preventing “a circus atmosphere” and the presentation of “conspiracy theories” in 2013. They also know quite well how many will be there listening. At one point she was asked what sort of an event they want to hold and she told the DMN reporter that she was not sure, “maybe a Moment of Silence”. This direct and content-based refusal of permit for the use of a public and historical site violates the protections of the First Amendment for free speech and expression.
Now the City of Dallas is denying a permit to the JFK organizers, truthers and researchers for the week of November 19-24, 2013.
EconomicPolicyJournal.com has also followed the JFK murder and recently posted a most interesting piece that asserts that George H.W. Bush was on the ground at Dealey Plaza as a CIA operative carrying out the murder of a popular president.
A few points to start out: NBC is not an impartial media outlet. George H.W. Bush is not a respectable, admirable man or a national hero. And "33" is not an insignificant number- It is quite relevant and meaningful, in some circles at least.
NBC is owned by General Electric, a "defense contractor and the 2nd largest company in world according to Forbes", which has received over $16 billion dollars in bailouts from American taxpayers. They build and sell engines for the F-16 fighter aircraft and Apache Block III helicopters. For them, war is literally a profit racket; so it makes sense that they would "honor" warmongers.
NBC news far from impartial- they shill for the military-industrial complex and in 2003, fired Pulitzer Prize winning journalist Peter Arnett after Arnett reported the truth from Iraq....
There are no photos of George H.W. Bush in Dallas on the morning of John F. Kennedy's assassination standing in front of the Texas Book Depository in Dealey Plaza, but the photos can be seen here. The photo of the FBI memo acknowledging that Bush was a CIA opeative at that time can be seen here: "FBI director J. Edgar Hoover wrote this memo 5 days after the assassination, naming George Bush as a CIA officer... "The substance of the forgoing information was orally furnished to Mr. George Bush of the Central Intelligence Agency and Captain William Edwards of the Defense Intelligence Agency on November 23, 1963, by Mr. V.T. Forsyth of this Bureau."
Despite the well orchestrated government cover-up at all levels (Congress, LBJ, FBI, CIA, Dallas PD, Texas public officials), much truth has surfaced on JFK's murder and researchers continue to diligently pursue the truth despite the 1964 Warren Commission ordering that all non-published official material be sealed for 75 years (2039). The public only got the government sanitized version of JFK's murder. However, Oliver Stone's 1991 film JFK stirred up an intense hornets nest and Congress passed the 1992 JFK Records Act that created the Assassination Records Review Board (ARRB), a committee that supposedly decides what records will be released. Although many records were released, it's generally believe that many critical records were not released and researchers continue to fight for the release of these records, here.
President Kennedy’s remains may have been laid to rest but his legacy and the quest for truth, justice and peace have not and continue to haunt us to this day. During JFK’s presidency, Vietnam combat deaths were 182 (16 in 1961, 53 in 1962 and 118 through 11/22/63). On 10/11/63, JFK issued National Security Action Memorandum 263 making it official that the US would withdraw from Vietnam. On November 21, 1963, JFK was given a list of the recent Vietnam casualties and he told his Assistant Press Secretary Malcolm Kilduff “After I come back from Texas, that’s going to change. Vietnam is not worth another American life”. The next day, JFK was dead. Had President Kennedy not been murdered, there would be no Vietnam War Memorial with the names of 58,261 dead Americans from a senseless war he morally opposed and was committed to ending. Nor would there be millions of dead Vietnamese, Cambodians, Laotians and others.
The Vietnam era is far from being consigned to the dustbin of history and in fact still lives on today in the very same US foreign policy that was responsible for the murder of President Kennedy. If anything, the evil forces that murdered President Kennedy are far more powerful and insidious today than they were in the 1963.
For this reason, President Kennedy’s soul and legacy will never rest until truth and justice prevail and neither will America, the American people and the Kennedy family. Indeed, truth and justice are what President Kennedy not only devoted his entire life too but also sacrificed his own life for in his courageous and relentless quest to save America and humanity from the scourges of murderous militarism gone mad.
It’s as if this injustice has inflicted an evil curse upon America from which we will never be able to recover our personal, family and national honor until truth and justice prevail. In many ways, the American people and the Kennedy family are forever and umbilically connected to that fateful day in Dallas on November 11, 1963.
Above all, it should be about what President Kennedy would want and anyone even remotely familiar with the works of this extraordinary man would categorically conclude that that President Kennedy would settle for nothing less than the truth because above all, he was truly a champion for truth and justice who abhorred the raw and absolute concentration of the very same secretive powers that murdered him.
But so long as that truth remains buried, the curse will follow all of us. If President Kennedy’s life meant anything to him, his family and the American people, it’s long overdue for all of us to honor his life and death with the truth because his scared soul can never rest in peace until he knows that his life had meaning and that his death fulfilled his destiny. | <urn:uuid:bbd6579e-1c51-49a7-b5d1-9a437427d681> | {
"date": "2017-05-23T20:38:09",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607702.58/warc/CC-MAIN-20170523202350-20170523222350-00471.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9704492688179016,
"score": 2.671875,
"token_count": 1840,
"url": "http://judymorrisreport.blogspot.in/2012/12/"
} |
Youngsters are being accused of attention-seeking after sharing details about personal issues online in search of support, a new report warns.
"Sadfishing" has been used to describe when someone posts about an emotional problem in an attempt to attract attention, sympathy or hook an audience.
The term was coined after a number of celebrities, such as Kendall Jenner, were accused of teasing details about personal issues on their social media site to drum up publicity and attract more likes and shares.
But a new study, by Digital Awareness UK (DAUK), says that youngsters facing genuine distress who are turning to the internet to find support are being accused of jumping on this bandwagon, and may be bullied as a result.
It argues that in these cases, students can be left feeling disappointed at not getting the support they desire, and it could make their emotional or mental health problems worse.
One Year 7 student told researchers he used Instagram to share his feelings when he was feeling down due to problems at home.
"I got a lot of people commenting on and 'liking' my post but then some people said I was sadfishing the next day at school for attention," the student said.
"Sharing my feelings online has made me feel worse in some ways but supported in others."
There are also concerns that youngsters could be left vulnerable to online groomers, who prey on them by providing sympathy in order to gain their trust.
"DAUK is concerned about the number of students who are bullied for sadfishing (through comments on social media, on messaging apps or face-to-face), thus exacerbating what could be a serious mental health problem," the report says.
"We have noticed that students are often left feeling disappointed by not getting the support they need online.
"Groomers can also use comments that express a need for emotional support as a platform to connect with young people and gain their trust, only to try and exploit it at a later point."
It goes on to give a case study of a teenage girl who had started a relationship with someone she met on social media through a mutual friend, after sharing her experiences of depression online.
He had responded to her post and shared his own experiences.
The young girl ended the relationship when she discovered he was much older than he claimed and he was pressurising her into sharing explicit images of herself.
The study, commissioned by the Headmasters' and Headmistresses' Conference (HMC) is based on face-to-face interviews with more than 50,000 children aged 11 to 16.
It notes that youngsters are becoming more tech-savvy and are more likely to manage their own use of technology responsibly.
Charlotte Robertson, DAU co-founder, said: "Over the last year we've seen the digital landscape evolve at such rapid pace - particularly when it comes to the prevalence of data misuse, access to anonymous platforms and increased sharing of upsetting content.
"This has left many parents feeling overwhelmed by how best to empower their children to navigate the online world safely.
"However, this report also highlights just how much progress is also being made, with tech-savvy young people often taking the lead when it comes to making sure technology has a positive and not a disruptive influence on their day-to-day lives."
Chris Jeffery, chairman of the HMC wellbeing working group and headmaster of Bootham School in North Yorkshire, said: "It is encouraging to read of the growing signs of increased control that many young people are taking over their use of technology, but it is also helpful to know new ways in which it is proving to be a burden for them as well." | <urn:uuid:b4a34f07-ee93-4ebe-9dfb-4484a5cad1bf> | {
"date": "2019-11-15T13:44:52",
"dump": "CC-MAIN-2019-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668644.10/warc/CC-MAIN-20191115120854-20191115144854-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9809593558311462,
"score": 2.515625,
"token_count": 752,
"url": "https://www.walesonline.co.uk/news/uk-news/warning-over-sadfishing-children-seek-17006679"
} |
A New York Times article (Pollack 2010) appeared on Tuesday, September 21, 2010, and discussed whether or not specially genetically engineered farmed salmon might be approved for sale in the US. There were representatives of the aquaculture industry and of the firm pushing the idea, AquaBounty Technologies, speaking in support before an FDA panel, and a number of special environmentalist or consumer’s groups going on record as against the idea in general, or some particular aspect that they felt was underexplored or held potential danger.
The critics brought up a number of issues that were treated as being so important of themselves, that the approval process should be delayed or cancelled altogether. But such a single-issue-based disapproval sometimes overlooked other factors and realities of salmon ecology, economics, and even human medicine, when a more holistic and interdisciplinary view of the risks and benefits of this AquAdvanatge™ salmon and its method of being aquacultured might be more revealing.
What’s the big deal with salmon?
Salmon now leads in US sales of all fresh, refrigerator case finfish in supermarkets and is the third most consumed seafood product just behind frozen shrimp and canned tuna (National Fisheries Institute 2009). It’s considered to be particularly good for you. It is nationally promoted, responsibly endorsed, and widely perceived as having health benefits, especially its polyunsaturated fats and omega-3 fatty acid content (Harel et al 2001, Horrocks & Yeo 1999) that outweigh its risks from mercury for most categories of consumers (Foran et al 2005, Smith & Guentzel 2010). Demand is expected to grow in the restaurant and institutional food service trade not the least because salmon is one of the most popular types of sushi and sashimi among both high school (FoodServiceDirector 2010) and college age consumers (Boss 2009).
Why do they farm salmon anyway? Can’t we just catch more wild salmon in the ocean?
Atlantic salmon are still caught in the wild, but their reproductive carrying capacity has long ago been reached, and Atlantic salmon fisheries have basically harvested (and often polluted) themselves out of business in many locales, including most of New England, formerly a rich salmon fishing area. Indeed most wild Atlantic salmon served in the US has been imported from Canada, the UK, or Scandinavian countries, but even so, catches have been declining: In 1996 we imported 566 tons of wild caught salmon, but by 2008 that amount was down to 58 tons.
It should be noted that while the Alaskan wild salmon fishery ----involving a number of different salmon species but not the Atlantic salmon----remains reasonably healthy, the other West coast native salmon fisheries running from Northern California through to British Columbia, have been in severe decline owing to overfishing and environmental calamities, and thus will not provide a ready, sustainable alternative in the future (US Fish & Wildlife Service 2010). The only realistic alternative source for a growing demand for salmon is to use aquacultured salmon.
Can’t we just stock the rivers with more salmon from salmon hatcheries, and let them grow up in the wild in the ocean and have them return to the rivers where we stocked them, just like wild salmon do?
This is being done in Alaska and Northern Europe with some success (and in the Great Lakes although the population cannot reproduce there) but there are still problems: The stocked fish generally behave like escaped farmed fish and sometimes out-compete the wild fish, and it is not always clear that wild and stocked fish interbreed successfully, even though they are of the same species. This means that it is sometimes possible to end up, not with an overall increase in the total number of available salmon, but rather the displacement of one type of salmon by another without any net gain in salmon supply. (Crozier 1993, Erkinaro et al 2010, Skaala, Glover & V. Wennevik 2006, Soto, Jara & Moreno 2006, Uusitalo, Kuikka & Romakkaniemi 2005).
Why do they want to genetically engineer a naturally perfectly good fish in the first place?
The principal reason is that these fish, when farmed, grow to harvest size in about half the time as non-genetically-engineered farm-raised salmon, and that this quick turnaround time means that they can be economically grown in closed aquatic systems, meaning not in pens in the open ocean or nearby brackish waters, but rather in clean artificial ponds much like modern American catfish farming, ponds or tanks which do not connect to rivers or the ocean. As seen in the catfish farming industry (Stankus 2010), many more variables regarding fish wholesomeness and taste, water quality, the presence of parasites and diseases, the management of waste products, are much more controllable, although realistically never perfectly controllable, in such closed systems. Salmon farming in a closed system represents a serious incremental improvement in the food safety, economics and as we will see shortly, in the environmental impact of salmon aquaculture. Genetically modified salmon raised in closed systems will go a long way to exploding the simplistic folkloric natural foods ideology that Norwegian fisheries researcher Oivind Bergh (2007) calls the dual myth: That wild fish are always healthier (and therefore always better for you) and that farmed fish are always unhealthy (and therefore always worse for you).
How do these genetically modified salmon grow so fast?
Basically, two genes have been inserted into their genomes. One gene simply enables internal growth hormone production year round despite the cold (salmon ordinarily stop making growth hormone in cold weather and therefore stop growing during winter months). The second gene basically enables the first gene to activate and do its work.
Most importantly, no hormones that are not native to fish are introduced to this fish, nor are they fed hormones in their rations. There is no reasonable scientific basis for suggesting that these fish are somehow hormonally disruptive of humans or other animals that might eat them, or even that the enhanced growth hormone production, is damaging to the fish themselves, the arguments used against hormones given to livestock and dairy cows through feed or direct injection.
Why can’t we just wait for the traditional growing out period of non-genetically engineered salmon farmed in bays and estuaries?
There are at least three reasons that make quicker growing farmed salmon, grown in closed systems, a better idea than farmed non-genetically modified salmon raised in sea pens.
The first is ironically ecological or environmental: Salmon farmed in the traditional manner in pens in bays and estuaries tend to become infested with sea lice, which, while not known to be harmful to humans, stunt the growth and well-being of the salmon being farmed. Unfortunately, once the sea lice find themselves a fertile home base, such as the trapped farmed salmon, they spread, not only to nearby wild salmon, but to other fish species as well, sometimes decimating their number(Costello 2009, Frazer 2009).
The second is also ecological and environmental: The sea floor beneath and areas surrounding sea pens are typically fouled with fecal products, uneaten food, and trace chemicals used to keep the cages from becoming coated with barnacles, weeds, and the like. Perversely, the increased organic matter in the waters near the cages actually decreases the oxygen levels in the water as well as the number of toxic compounds in the immediate area by binding with agents that would otherwise remain in solution and generally in a diluted state (Musclow 2005, Mayor et al 2010). See the following for more details.
The third reason is also environmental but includes some clinical implications as well: Quicker growing fish raised in closed aquatic systems with closely monitored water quality show demonstrably lower rates of bioaccumulation of environmental toxins including heavy metals, runoff fertilizer compounds, and especially trace pharmaceuticals like antibiotics used to suppress assorted bacterial and fungal infections in salmon penned up in bays and estuaries (Burridge 2010, Cabello 2006, Fortt, Cabello & Buschman 2007). These materials are not only generally bad for the sea life around them, but, should they accumulate within human consumers, poisonous and potential enablers of diminished antibiotic effectiveness, as they encourage the proliferation of drug resistant bacteria in the environment (Herwig, Gray & Weston 1997).
What will happen to wild salmon if these genetically engineered fish somehow escape their closed systems and mate with natural salmon populations?
First, at least as currently planned in terms of their major sites of production, the salmon will be raised in places where even the nearest sea and river waterways are seriously unfavorable to them, so it is likely that they would die out because they were in such unsupportable circumstances.
Second, all of these fish are females, and by design, about five out of every six are demonstrably sterile. Such a sex ratio and high rate of infertility does not bode well for them to be able to establish a viable invasive population which can compete with local, native fish. (Which generally do not include members of the salmonid family with which they could conceivably try to mate.)
What about possible allergic reactions?
It is unfortunately true that there are a great many people allergic, and sometimes severely so, to proteins in seafood, including proteins in Atlantic salmon (Pitsios et al 2010). However, there is as yet no evidence that the two genes that have been inserted into these AquaAdvantage Atlantic salmon will cause the production of any proteins that are not already likely to be in any other type of Atlantic salmon. A safe and sensible recommendation would be for people who are known to be allergic to Atlantic salmon not to eat any Atlantic salmon, AquAdvantage type or not, and for the rest of us to eat available Atlantic salmon including AquAdvantage salmon when we want to, because we like it and it is a generally healthy food.
Shouldn’t there be warning labels on such salmon?
Given that there are no known differences in the food safety or nutritional value of these salmon, there is no scientific justification for putting any kind of warning label on them. It might be fair to consumers who, for whatever reason, prefer wild-caught salmon or farmed salmon, to have the salmon labeled simply as wild-caught or farm raised salmon, and mention the country of origin. This is pretty much the standard procedure in most supermarkets anyway, and as noted below, seems to have little effect on sales. People buy what looks good to them at the lowest price they can get.
Are there any foreseeable disadvantages to genetically modified salmon of this type raised by this method?
Overexpectation, too much “hype” in terms of certain ecological and economic impacts is about the only forseeable problem.
At least three pre-existing dilemmas will likely persist despite the adoption of this genetically modified salmon and its method of being raised, but these dilemmas would also continue without them.
1. Detrimental impact on the global population of small fish and supply of fish byproducts. While all the science thus far suggests that with proper care, these fish can be raised safely within closed systems with virtually no risk to the local fish population by direct invasion of their waterways and competition for food within them, problems remain with the need of all carnivorous fish (and this includes salmon, farmed or wild) for smaller forage fish, usually caught in the wild to be turned into fish meal for the pellets fed to the salmon, and this can cause population declines in fish that would feed other fish in the wild or feed humans (think anchovies and sardines, for example) directly (Aubin et al 2009, Ayer et al 2009, Mullon et al 2009, Pelletier et al 2009).
2. This new type of salmon and way of producing it will not likely produce a great many more jobs in the poorer countries that host these or any other modern aquaculture operations. Unemployment in the poorer countries where this type of aquacultured salmon (and any other type of aquacultured salmon) will not dramatically decrease, because operations such as these are much efficient in their use of manpower, particularly when compared to the still large numbers of increasingly impoverished local traditional fisherfolk attempting to land ever diminishing catches. This is not to say that the fewer workers in modern farmed fishing would not, in the long run, be better off, particularly if there was a requirement that these international aquaculture companies hire and train displaced local fisherfolk, instead of bringing in alien crews for permanent operations (Adeel & Safriel 2008, Grigorakis et al 2010 ).
3. This new type of salmon and way of producing it will not likely increase the availability of low-cost, high-quality protein in the poorer countries that host these and any other modern aquaculture operations. Barring “set-aside-some for domestic use” legislation in the countries in which these operations are set up, the local population will probably not have greatly increased access to cheap salmon for their own consumption. The overwhelming share of farmed (and wild caught) salmon is sold on the international market as a cash crop to wealthy, highly developed countries like the US, and their consumers tend to buy the lowest priced salmon of comparable quality and freshness, regardless of which country was the source (Wozniak 2010).
Tony Stankus FSLA [email protected] Life Sciences Librarian, Science Coordinator & Professor
University of Arkansas Libraries MULN 233 E
365 North McIlroy Avenue
Fayetteville AR 72701-4002
Adeel, Zafar, and Uriel Safriel. 2008. Achieving sustainability by introducing alternative livelihoods. Sustainability Science 3 (1) (APR): 125-33.
Adhikari, S., L. Ghosh, S. P. Rai, and S. Ayyappan. 2009. Metal concentrations in water, sediment, and fish from sewage-fed aquaculture ponds of Kolkata, India. Environmental Monitoring and Assessment 159 (1-4) (DEC): 217-30.
Alderman, D. J. 2002. Trends in therapy and prophylaxis 1991-2001. Bulletin of the European Association of Fish Pathologists 22 (2): 117-25.
Aubin, J., E. Papatryphon, H. M. G. van der Werf, and S. Chatzifotis. 2009. Assessment of the environmental impact of carnivorous finfish production systems using life cycle assessment. Journal of Cleaner Production 17 (3): 354-61.
Ayer, Nathan, Raymond P. Cote, Peter H. Tyedmers, and J. H. Martin Willison. 2009. Sustainability of seafood production and consumption: An introduction to the special issue. Journal of Cleaner Production 17 (3): 321-4.
Bergh, Oivind. 2007. The dual myths of the healthy wild fish and the unhealthy farmed fish. Diseases of Aquatic Organisms 75 (2): 159-164.
Bernhisel-Broadbent, J, D Strause, and H A Sampson. 1992. Fish hypersensitivity. II: Clinical relevance of altered fish allergenicity caused by various preparation methods. The Journal Of Allergy And Clinical Immunology 90 ( 4 Pt 1): 622-629.
Boss, Donna L. 2009. College dining services tap into international street cuisines. Nation's Restaurant News 43 (27): 22.
Burridge, Les, Judith S. Weis, Felipe Cabello, Jaime Pizarro, and Katherine Bostick. 2010. Chemical use in salmon aquaculture: A review of current practices and possible environmental effects. Aquaculture 306 (1-4) (AUG 15): 7-23.
Cabello, F. C. 2006. Heavy use of prophylactic antibiotics in aquaculture: A growing problem for human and animal health and for the environment. Environmental Microbiology 8 (7) (JUL): 1137-44.
———. 2004. Antibiotics and aquaculture in Chile: Implications for human and animal health. Revista Medica De Chile 132 (8) (AUG): 1001-6.
Capone, D. G., D. P. Weston, V. Miller, and C. Shoemaker. 1996. Antibacterial residues in marine sediments and invertebrates following chemotherapy in aquaculture. Aquaculture 145 (1-4) (OCT 15): 55-75.
Cole, David W., Richard Cole, Steven J. Gaydos, Jon Gray, Greg Hyland, Mark L. Jacques, Nicole Powell-Dunford, Charu Sawhney, and William W. Au. 2009. Aquaculture: Environmental, toxicological, and health issues. International Journal of Hygiene and Environmental Health 212 (4) (JUL): 369-77.
Costello, Mark J. 2009. How sea lice from salmon farms may cause wild salmonid declines in Europe and North America and be a threat to fishes elsewhere. Proceedings of the Royal Society B-Biological Sciences 276 (1672) (OCT 7): 3385-94.
Cottee, Stephanie Yue, and Paul Petersan. 2009. Animal welfare and organic aquaculture in open systems. Journal of Agricultural & Environmental Ethics 22 (5) (OCT): 437-61.
Crozier, WW. 1993. Evidence of genetic interaction between escaped farmed salmon and wild Atlantic salmon (Salmo salar L.) in a Northern Irish river. Aquaculture 113, (1-2): 19-29.
Erkinaro, J., E. Niemelae, J-P Vaehae, CR Primmer, S. Broers, and E. Hassinen. 2010. Distribution and biological characteristics of escaped farmed salmon in a major subarctic wild salmon river: Implications for monitoring. Canadian Journal Of Fisheries And Aquatic Sciences/Journal Canadien Des Sciences Halieutiques Et Aquatiques 67, (1): 130-142.
FoodService Director. 2010. School District Dishes Up Sushi. FoodService Director 23(5): 8.
Foran, Jeffery A, David H Good, David O Carpenter, M Coreen Hamilton, Barbara A Knuth, and Steven J Schwager. 2005. Quantitative analysis of the benefits and risks of consuming farmed and wild salmon. The Journal Of Nutrition 135 (11): 2639-2643.
Fortt, Antonia, Felipe Cabello, and Alejandro Buschmann. 2007. Residues of tetracycline and quinolones in wild fish living around a salmon aquaculture center in Chile. Revista Chilena De Infectologia 24 (1) (FEB): 14-8.
Frazer, L. Neil. 2009. Sea-cage aquaculture, sea lice, and declines of wild fish. Conservation Biology 23 (3) (JUN): 599-607.
Grigorakis, Kriton. 2010. Ethical issues in aquaculture production. Journal of Agricultural & Environmental Ethics 23 (4) (AUG): 345-70.
Harel, Z, S Riggs, R Vaz, L White, and G Menzies. 2001. Omega-3 polyunsaturated fatty acids in adolescents: knowledge and consumption." The Journal Of Adolescent Health 28 (1): 10-15.
Hargrave, Barry T., Lisa I. Doucette, Kats Haya, Faron S. Friars, and Stephen M. Armstrong. 2008. A micro-dilution method for detecting oxytetracycline-resistant bacteria in marine sediments from salmon and mussel aquaculture sites and an urbanized harbour in Atlantic Canada. Marine Pollution Bulletin 56 (8) (AUG): 1439-45.
Herwig, R. P., J. P. Gray, and D. P. Weston. 1997. Antibacterial resistant bacteria in surficial sediments near salmon net-cage farms in Puget Sound, Washington. Aquaculture 149 (3-4) (MAR 31): 263-83.
Horrocks, L A, and Y K Yeo. 1999. Health benefits of docosahexaenoic acid (DHA). Pharmacological Research 40, (3): 211-225.
Lu, X. W., Z. Dang, and C. Yang. 2009. Preliminary investigation of chloramphenicol in fish, water and sediment from freshwater aquaculture pond. International Journal of Environmental Science and Technology 6 (4) (FAL): 597-604.
Mayor, Daniel J., Alain F. Zuur, Martin Solan, Graeme I. Paton, and Ken Killham. 2010. Factors affecting benthic impacts at Scottish fish farms. Environmental Science & Technology 44 (6) (MAR 15): 2079-84.
Meinertz, J. R., G. R. Stehly, and W. H. Gingerich. 1998. Liquid chromatographic determination of oxytetracycline in edible fish fillets from six species of fish. Journal of AOAC International 81 (4) (JUL-AUG): 702-8.
Mullon, C., J-F Mittaine, O. Thebaud, G. Peron, G. Merino, and M. Barange. 2009. Modeling the global fishmeal and fish oil markets. Natural Resource Modeling 22 (4) (NOV): 564-609.
Munoz, Ivan, Maria J. Martinez Bueno, Ana Agueera, and Amadeo R. Fernandez-Alba. 2010. Environmental and human health risk assessment of organic micro-pollutants occurring in a Spanish marine fish farm. Environmental Pollution 158 (5) (MAY): 1809-16.
Musclow, Sandy Lee. 2005. Impact Of Salmon Aquaculture On Sediment Chemistry And Mercury Loading. Master’s thesis. Montreal: McGill University.
National Fisheries Institute (2009). “Top 10 Consumed Seafoods,” http://www.aboutseafood.com/about/about-seafood/Top-10-Consumed-Seafoods
Naylor, Raymond L., Rebecca J. Goldburg, Harold Mooney, Malcolm Beveridge, Jason Clay, Carl Folke, Nils Kautsky, Jane Lubchenco, Jurgenne Primavera & Meryl Williams. 1998. Nature's subsidies to shrimp and salmon farming. Science 282 (5390): 883-887.
Ortega, C., O. Gimeno, V. Blanc, P. Cortes, S. Ania, and M. Llagostera. 2006. Antibiotic susceptibility of strains of Aeromonas salmonicida isolated from Spanish salmonids. Revue De Medecine Veterinaire 157 (8-9) (AUG): 410-4.
Pelletier, Nathan, Peter Tyedmers, Ulf Sonesson, Astrid Scholz, Friederike Ziegler, Anna Flysjo, Sarah Kruse, Beatriz Cancino, and Howard Silverman. 2009. Not all salmon are created equal: Life cycle assessment (LCA) of global salmon farming systems. Environmental Science & Technology 43 (23) (DEC 1): 8730-6.
Pitsios, Constantinos, Anastasia Dimitriou, Efthalia C Stefanaki, and Kalliopi Kontou-Fili. 2010. Anaphylaxis during skin testing with food allergens in children. European Journal Of Pediatrics 169 (5): 613-615.
Pollack, Andrew. 2010. Panel leans in favor of engineered salmon. The New York Times CLX (55170): B3.
Rivera-Ferre, Marta G. 2009. Can export-oriented aquaculture in developing countries be sustainable and promote sustainable development? The shrimp case. Journal of Agricultural & Environmental Ethics 22 (4) (AUG): 301-21.
Ruiz-Zarzuela, I., N. Halaihel, J. L. Balcazar, C. Ortega, D. Vendrell, T. Perez, J. L. Alonso, and I. de Blas. 2009. Effect of fish farming on the water quality of rivers in northeast Spain. Water Science and Technology 60 (3): 663-71.
Sapkota, Amir, Amy R. Sapkota, Margaret Kucharski, Janelle Burke, Shawn McKenzie, Polly Walker, and Robert Lawrence. 2008. Aquaculture practices and potential human health risks: Current knowledge and future priorities. Environment International 34 (8) (NOV): 1215-26.
Skaala, Oe, K. Glover, and V. Wennevik. 2006. Gene flow from escapes reduce survival in wild salmon populations. Fisken og Havet, Saernummer(2): 60-62.
Solensky, Roland. 2003. Resolution of fish allergy: A case report. Annals Of Allergy, Asthma & Immunology 91 (4): 411-412.
Soto, D., F. Jara, and C. Moreno. 2001. Escaped salmon in the inner seas, Southern Chile: Facing ecological and social conflicts. Ecological Applications 11, (6): 1750-1762
Thorstad, E.B., I.A. Fleming, P. McGinnity, D. Soto, V. Wennevik & F. Whoriskey2008. Incidence and Impacts of Escaped Farmed Atlantic Salmon Salmo Salar In Nature. NINA Special Report 36. 110 pp.
U.S. Fish & Wildlife Service. 2010. Wildlife Species Information. Endangered Species: Pacific Salmon, Oncorhynchus spp. http://www.fws.gov/species/species_accounts/bio_salm.html
Uusitalo, L., S. Kuikka, and A. Romakkaniemi. 2005. Estimation of Atlantic salmon smolt carrying capacity of rivers using expert knowledge. ICES Journal of Marine Science 62, (4) (Jun): 708-722
Vega, Mario H., Elizabeth T. Jara, and Mario B. Aranda. 2006. Monitoring the dose of florfenicol in medicated salmon feed by planar chromatography (HPTLC). JPC -Journal of Planar Chromatography-Modern TLC 19 (109) (MAY-JUN): 204-7.
Vizzini, Salvatrice, Cecilia Tramati, and Antonio Mazzola. 2010. Comparison of stable isotope composition and inorganic and organic contaminant levels in wild and farmed bluefin tuna, Thunnus thynnus, in the Mediterranean sea. Chemosphere 78 (10) (MAR): 1236-43.
Wolff, M. 2004. Use and misuse of antibiotics. time to evaluate it beyond humans. Revista Medica De Chile 132 (8) (AUG): 909-11.
Wozniak, Shawn. 2020. Has country of origin labeling influenced salmon consumption? Selected Paper prepared for presentation at the Southern Agricultural Economics Association Annual Meeting, Orlando, FL, February 6-9, 2010. http://ageconsearch.umn.edu/bitstream/56460/2/2010%20SAEA%20Wozniak.pdf
Wu, R. S. S. 1995. The environmental impact of marine fish culture: Towards a sustainable future. Marine Pollution Bulletin 31 (4-12) (APR-DEC): 159-66. | <urn:uuid:3bffeee9-c48d-4a19-bf14-c75ba497b3f5> | {
"date": "2017-04-25T16:24:26",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00646-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8720512986183167,
"score": 2.546875,
"token_count": 5846,
"url": "http://sla-divisions.typepad.com/dbio/2010/09/index.html"
} |
A. Cross-domain Transfer
The proper treatment of classified data has always been important throughout this nation’s history. Classification of data was present even in the early period of the American Revolution when the Continental Congress passed a resolution in September 1774 to keep its proceedings secret . It wasn’t until March 1940, before World War II, when the formal classifications of secret, confidential, and restricted were established. Many executive orders since then have refined the treatment of classified information .
Over the past ten years, leaks (whether intentional or unintentional) have made major news headlines. Examples include the release of classified documents and emails by WikiLeaks since 2007 [3, 4] and the leakage of classified information by Edward Snowden in 2013 . Data must be properly handled and protected in accordance with its classification level. It is widely regarded that the proper treatment of data commensurate with its classification level is important now more than ever. In this digital age, the access of information is lightning fast, and proper security protocols must be established and followed to prevent future leaks.
To ensure proper safeguarding of classified data, isolated domains/networks are used, such as the Non-secure Internet Protocol Router Network (NIPRNet), the Secret Internet Protocol Router Network (SIPRNet), and the Joint Worldwide Intelligence Communications System (JWICS), as well as other domains specific to missions and coalition partners. The domains are separate and isolated to protect their information. However, isolated domains create the problem of information isolation—the inability to share information. Classified information is useless unless it can be visible to the people that make decisions based on its facts. To transfer this information effectively and securely, an electronic capability with built-in security protocols is needed between the domains—that is, a cross-domain transfer solution.
B. ISSE Overview
ISSE (Information Support Server Environment) is a system with a long history that has evolved to become a premier cross-domain solution (CDS). It is a cross-domain transfer solution developed, maintained, and installed by the Information Handling Branch of the Air Force Research Laboratory (AFRL) Information Directorate in Rome, New York. It is also on the Unified Cross Domain Services Management Office (UCDSMO) baseline list, and it is fully accredited according to CNSSI 1253, NIST SP 800-53, and ICD 503 requirements.
ISSE was originally released as the USAFE (United States Air Forces in Europe) Guard in 1988 by the Rome Air Development Center. USAFE Guard’s sole purpose was to disseminate threat update messages. It operated on a Harris Nighthawk computer with CX/SM MLS operating system. The system was officially re-branded and certified as ISSE in 1995. This work was done ahead of key government actions, such as the establishment of the multi-level security (MLS) working group by the Defense Information Systems Agency (DISA) in 1997. In 2001, Top Secret/Sensitive Compartmented Information (TS/ SCI) and Below Interoperability (TSABI) and Secret and Below Interoperability (SABI) were coined in order to create categories of flow between domains with distinct security requirements.
ISSE provides the capability to transfer data bidirectionally between domains in either TSABI (commensurate with TS/SCI to/from Secret) or SABI (commensurate with Secret to/from Unclassified) cases. In either TSABI or SABI, the domain with the highest level of security is called the Controlling Security Domain (CSD) and the other domains are called Non-controlling Security Domains (NCSDs). At the time of publication of this paper, over 140 structured and unstructured files types can be transferred, including Microsoft Office files, images, video, databases, and chat.
While transferring data is the main purpose of a CDS guard, security is equally (if not more) important. As seen in the publicized leak cases, the insecure transfer of data between domains can have adverse effects for national security. The security posture of ISSE is aggressive and well developed for preventing malicious activity. Additionally, ISSE enforces the security policies of the host unit. ISSE filtering criteria which are established by the host unit identify and flag issues when transferring files. When caught by the filters, the file is immediately pulled from the transfer queue and placed in a reviewer inbox. ISSE filters are highly configurable, based on the host unit’s requirements. In addition to key word searches, ISSE parses, inspects, filters, and sanitizes. Each data path, i.e. thread, may be configured with different security policies. The thread filters check for viruses, malcode, file type, and digital signature. ISSE leverages commercial off-the-shelf software called Purifile© to inspect Microsoft Office file types, while the other filters are programmed by the ISSE software developers.
The ISSE architecture is fairly straightforward. The ISSE Secure Trusted Automated Routing (STAR) is the “guard” component at the domain boundaries that acts like a secure tunnel between security domains. Threads are established at the time of installation for data transfer in each direction. For instance, to conduct transfers between the CSD and NCSD bi-directionally, two threads are needed. The threads operate concurrently and independently from one another; that is, they operate in parallel and can be configured with different security policies. The STAR connects to the ISSE Proxy Server (IPS) of each domain. The IPS is composed of multiple Protocol Translators (PTs) and the ISSE Web Server (IWS). The PT acts to protect the STAR, compose and send email, relay COTS email, execute file transfers, and exchange data with the clients, IWS and STAR. The IWS can be configured for Reliable Human Review (RHR) and single/dual review for enhanced security. Additionally, an Application Programming Interface (API) can be configured in the STAR for mission applications that bypass the IPS. Examples of mission applications include Multi-level Database Replication (MLDBR), Full Motion Video (FMV), and Large File Slicer, which will be elaborated upon below. Two optional components for the ISSE system are Parallel Audit Review and Analysis Toolkit (PARAT) and Security and Workflow Enforcement Services (SAWES). PARAT provides near-real time audit collection and analysis. It collects, organizes, and presents the audits collected by ISSE to the administrator. It may be used to monitor the file transfers, users’ activity, and send alerts to the administrator. SAWES is an upstream review and orchestration engine which allows the user to self-review work, receive feedback from the automated filters, and make adjustments as needed.
The ISSE Program Management Office (PMO) oversees the entirety of the system acquisition. These activities include site survey, installation, training, and support from the Core Configuration Management (CCM) help desk. In order to acquire ISSE, customers in the Intelligence Community (IC) typically contact the DoDIIS Crossdomain Management Office (DCDMO). DCDMO and DISA will discuss requirements to arrive at the best CDS for the organization’s needs. Other U.S. government agencies may reference the UCDSMO baseline list or contact the ISSE PMO directly. When ISSE is selected as the best solution, the ISSE PMO conducts a site survey to determine the details of the site’s cross-domain requirements. Subsequently, the system is installed by the ISSE installers. On-site training is conducted for site administrators and trainers, and an out-brief is completed. At this point, the ISSE system is ready to use. Should any questions or concerns arise, agencies can call the 24/7 help desk. Most of the questions can be adjudicated immediately. If it is a more serious problem, the PMO engineers work with the site to resolve the problem. Additionally, training is offered at the PMO site in Rome, New York, several times per year. The annual support fee also covers one site visit per year.
There are several mission applications and capabilities that have been added to ISSE as user requirements have arisen. Three that will be discussed here are Multi-level Database Replication (MLDBR), Full Motion Video (FMV) adapters, and the Large File Slicer. MLDBR provides real-time, automated database replication between security domains for Oracle, DB2, MS SQL, and Sybase formats. MLDBR uses ISSE for cross-domain replication of database information; one MLDBR host can even interface with multiple ISSE systems. It leverages XML formatted messages to replicate databases between the CSD and NCSD(s). Database replication is a common user requirement leveraged by numerous organizations.
The FMV v1.0 capability was a special user request and was tested in the Unified Vision 2014 exercise . At the exercise’s central location in Ørland Air Station, Norway, ISSE provided 12 channels for video transfer to participants in Norway and Germany. ISSE was connected to an unclassified network and a coalition partner network. FMV performed well in this real world exercise by exhibiting exceptional video quality and less than 0.5-second latency.
Finally, ISSE is programmed to accept files less than 2 GB in size. Should the need arise to transfer files larger than this requirement, i.e. very high resolution photos, the Large File Slicer can be used. This application uses the ISSE API to communicate with the STAR. First fielded in January 2015 and demonstrated continually since then, it has human and machine interfaces that display the progress of the transfer. It operates by creating small ISSE packages from the larger file for a nearly infinite transfer capability. It sends the packages in parallel through the STAR while checking for security and malware, and compiles the pieces into the original file on the receiving end. | <urn:uuid:b189a5bd-0824-4752-aa00-354ebe8b7569> | {
"date": "2018-02-23T12:30:41",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814700.55/warc/CC-MAIN-20180223115053-20180223135053-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9295042753219604,
"score": 2.875,
"token_count": 2063,
"url": "https://www.csiac.org/journal-article/cross-domain-transfer-information-support-server-environment-isse/"
} |
The Umbracle (shade house) was part of the buildings designed for the Universal Exhibition and was build in 1883, being used through the exhibition as a pavilion. After the event the building recovered its original function, and it is one of the few structures that still prevail from the original exhibition. Many other buildings from important architects of the time disappeared after the exhibition was closed. This shade house is formed of bare brick fašades and wooden louvres to sift the light through the inside. The structure in the interior is sustained by slender iron columns, leaving a closed space that produces a suitable thermal and humidity conditions for the implantations of vegetal species from tropical origins. | <urn:uuid:0e821576-d292-4afb-a48c-2812a2706286> | {
"date": "2014-10-02T06:23:43",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663718.7/warc/CC-MAIN-20140930004103-00260-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9609092473983765,
"score": 2.984375,
"token_count": 139,
"url": "http://www.mimoa.eu/projects/Spain/Barcelona/Umbracle"
} |
Description by EdSurge
" HACKTIVITY KITS is a collection of nine hands-on and web 2.0 activities intended to explain and reinforce the concept of web hacking -- that is, the idea of remixing, reusing, and re-purposing existing content to create new material or glean interesting insights. Created by NYC HIVE, a MacArthur Foundation-supported group of civic-minded organizations (there's a Chicago one, too), the Hacktivity Kits are largely built upon Mozilla WebMaker tools: Popcorn Maker, Thimble, and X-Ray Goggles. Each Hacktivity includes a detailed list of learning goals and objectives, expected results, and supporting resources. There's also an extensive list of icebreakers to get the creative juices flowing and skills tutorials for the WebMaker tools. For example, look to the Online Storytelling kit which explains the SVT (Story, Vision, Tech) model for making "web native" stories. In addition to introductory tutorials on how to use the kit and associated technology, there's also the Spectrogram icebreaker, Popcorn Maker deep-dive, and an out-of-the-box design challenge for teachers just getting their feet wet." | <urn:uuid:3e4334a2-db97-4742-9cfa-803d6661cf8a> | {
"date": "2014-07-28T13:12:09",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9053192138671875,
"score": 2.734375,
"token_count": 248,
"url": "http://www.scoop.it/t/into-the-driver-s-seat/p/3996997018/2013/02/14/hacktivity-kits-for-webmaking"
} |
FOR IMMEDIATE RELEASE
March 11, 2011
Office of College Communications
WENHAM, MA –Since the 18th-century Enlightenment, Americans have maintained much friendlier ties with religion than Western Europeans. In fact, the United States and Western Europe’s paths to modernity have differed exponentially.
Thomas A. (“Tal”) Howard, associate professor of history, will be presenting a lecture entitled “America, Europe, and the Religious Divide” as part of the Old Town Hall Lecture Series sponsored by the Gordon College Institute for Public History. He will be discussing some of the main themes he addresses in his most recent book, God and the Atlantic: America, Europe, and the Religious Divide. The event will take place Thursday, March 17, at 7:30 p.m. at the Salem Old Town Hall.
“The book seeks to explain some of the religious differences between Europe and America,” says Howard. “I am especially keen to show how Europeans have interpreted America’s early experiment in religious liberty and its long-term effects.”
Howard is also the founding director of the College’s great books honors program, the Jerusalem and Athens Forum. He was the winner of the Lilly Fellows Program annual book award in 2007. Howard is also the author of Religion and the Rise of Historicism (2000) and Protestant Theology and the Making of the Modern German University (2006).
“The causes of the religious divide between Europe and America are hotly disputed among social scientists and contemporary historians,” says Hartmut Lehmann, former director, Max Planck Institute for History and the German Historical Institute, of Howard’s book. “By carefully examining European views of America since the late 18th century, Thomas Albert Howard is the first scholar to give historical depth to this debate. Everyone interested to find a way through the labyrinth of transatlantic comparisons and prejudice is well-advised to read this book.”
For more information visit http://oldtownhalllectures.com/
Gordon College is a multidenominational Christian college of the liberal arts and sciences on Boston’s North Shore, offering majors in 38 fields with graduate programs in education and music education. Gordon is nationally recognized for excellence in academics and in character building, and ranks as one of the nation’s top Christian colleges. www.gordon.edu | <urn:uuid:8bff336a-73c7-4806-ade4-8e8f3b5c455f> | {
"date": "2013-05-26T02:48:27",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9320220947265625,
"score": 2.609375,
"token_count": 498,
"url": "http://www.gordon.edu/article.cfm?iArticleID=1091&iReferrerPageID=314&iPrevCatID=88&bLive=1"
} |
The XML integration provided in Word opens up many powerful and exciting capabilities for information sharing and distribution. These capabilities can be leveraged by using XSLT transformations to put the data in a form suitable for display on the Web.
Viewing through the Web would be a pretty boring experience if not for the ability to use colors, fonts, graphics, and layout to present the information in an attractive and interesting way. To support the expectations of viewing on the Web, the Word document attributes must be transformed into the corresponding HTML equivalents. Accomplishing this feat, however, is not a trivial task. You'll need to develop an understanding of XSLT style sheets, as well as how to translate the WordML schema into equivalent HTML formatting elements.
Extensive documentation on the WordML schema and its object model for representing a document is readily available, but much can be learned by some simple examination of the generated XML of the Word document. For most applications for transforming data to the Web, the number of different attributes that are needed is a small subset of the overall Word document object model.
You can follow these steps to learn a lot about the WordML schema:
Start with an empty Word document, and then enter a small amount of text and apply a single attribute of interest to it (like bold).
Save the document as an XML document.
Open the document in Notepad and remove the second line from the file that looks like <?mso-application progid="Word.Document"?>.
After saving these changes, double-click on the file and it will be displayed in Internet Explorer.
Locate the <w:body> root that represents the contents of the document.
Examine the contents of that element to learn which elements control the specific behavior desired. | <urn:uuid:55c7167f-5c0c-4c7d-a96f-2c5a825938d8> | {
"date": "2017-07-22T04:56:52",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423901.32/warc/CC-MAIN-20170722042522-20170722062522-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.885993242263794,
"score": 3.140625,
"token_count": 362,
"url": "http://etutorials.org/Microsoft+Products/microsoft+office+word+2003/Part+V+Word+the+Internet+and+XML/Chapter+25.+Using+Word+to+Develop+XML+Content+and+Use+XML+Applications/Publishing+Content+to+the+Web+via+XSLT+Transformations/"
} |
In light of the International Autism Awareness Month and World Autism Awareness Day, the University of Jordan (UJ) Faculty of Educational Sciences in collaboration with the Life Development Center organized on Sunday, April 5, an event to spread awareness and education about autism.
Dr. Amal Malkawi, Department of Counseling and Special Education, said the event was created to educate students on how to deal with children with autism, from both a social and psychological perspective.
The event incorporated seminar presentation, and video viewing, as well as the distribution of pamphlets on behavioral and daily challenges with children with autism.
Dr. Bassam Al Abdallat, a faculty member, said the activity is important since students at the faculty are going to interact with children with autism during their course of study.
In November 2007, the United Nations General Assembly unanimously declared 2 April as World Autism Awareness Day to highlight the need to help improve the quality of life of those with autism so they can lead full and meaningful lives as an integral part of society.
This is the 8th annual World Autism Awareness Day. Each year, organizations around the world celebrate the day by holding awareness-raising events. | <urn:uuid:c89d472d-44c4-47a6-9719-a694d26b874f> | {
"date": "2017-04-30T05:05:38",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124299.47/warc/CC-MAIN-20170423031204-00414-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9620975852012634,
"score": 2.625,
"token_count": 236,
"url": "http://educational.ju.edu.jo/Lists/AcademicNews/School_DispNews1.aspx?ID=7"
} |
The Air Force completed the installation of SAGE in the early 1960s, with a total of 22 of these advanced command and control nodes installed. The first SAGE Division became operational in Syracuse NY on 26 Jan 1959. Groundbreaking for the first SAGE complex at McChord AFB, began in 1957. In December 1957, the US Air Defense Command activated the Grand Forks Air Defense Sector of NORAD. The sector became operational with the SAGE system on December 15, 1959, covering the air space of three states and one Canadian province. The Air Force inactivated the Grand Forks Air Defense Sector on July 1, 1963. In 1958 Air Defense Command established a Semi-Automatic Ground Environment (SAGE) sector at Minot AFB, which was activated in June 1961. However, as SACís mission continued to grow at Minot, ownership passed from ADC to SAC, and the SAGE center was deactivated in May 1963.
SAGE systems were located at Sector Direction Centers. The SAGE automatic data-processing capability substituted for manual GCI systems in observing, plotting, transmitting information and assigning targets for air defense weapons. SAGE facilities processed air surveillance information and sent the data to Air Defense Command units. IBM engineers installed two large, 275-ton computers in the basement of each SAGE facility, which were huge, windowless blast-resistant concrete buildings. The heart of the SAGE system, known affectionately as "Clyde", provided weapons controllers of the 60's and 70's with data which facilitated the intercept of unknown aircraft by Air Force fighters. These nodes were tied directly to NORAD's Combat Operations Center, which moved to Cheyenne Mountain from Ent Air Force Base in 1966, and maintained surveillance, identified aircraft, selected and directed intercepting aircraft, coordinated air defense responses and disseminated air defense intelligence.In 1979, the SAGE control centers were replaced by Regional Operations Control Centers (ROCC), as new high-speed digital computers replaced the old "Clyde" systems. | <urn:uuid:f01f6977-c948-43a2-8ab4-20b997ecd0c5> | {
"date": "2016-08-25T13:23:36",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982293468.35/warc/CC-MAIN-20160823195813-00202-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.961129367351532,
"score": 2.765625,
"token_count": 410,
"url": "http://fas.org/nuke/guide/usa/airdef/sage.htm"
} |
D.A.R.E.'s primary mission is to provide children with the information and skills they need to live drug-and-violence-free lives.
The mission is to equip kids with the tools that will enable them to avoid negative influences and instead, allow them to focus on their strengths and potential. And, that's exactly what D.A.R.E. is designed to do.
Additionally, it establishes positive relationships between students and law enforcement, teachers, parents, and other community leaders. Every youngster should have the opportunity to grow-up healthy, safe, secure, and equipped with the skills needed to succeed in life. Contemporary America, however, is rampant with challenges that could keep children from a positive life path.
D.A.R.E. (Drug Abuse Resistance Education) is a program which brings law enforcement and schools together to teach kids about the harmful effects of drug abuse and violence and how to avoid situations involving Drugs and violence.
D.A.R.E. was started in 1983 by former Los Angeles Police Chief Bill Gates to combat drugs and violence in their schools and communities. It has spread across the world and is currently taught in over 300,000 classrooms nationwide, over 40 countries worldwide as well as U.S. military installations and U.S. territories benefiting millions of children every year. The D.A.R.E. curriculum has been reworked and changed throughout the year to conform to current trends and to scientific studies as well as advancements in educational practices.
D.A.R.E. officers go through 80 hours of classroom instruction in how to present the D.A.R.E. curriculum. They work with educational professionals in ways to teach and how to open up to kids to get them involved and retain what they have learned.
Currently in Pullman the D.A.R.E. elementary curriculum is taught to the 5th grade classes each year. It consists of 9 in class lessons culminating in the 10th which is a graduation ceremony. It focuses on teaching kids facts about drugs and alcohol and giving them tools to avoid or get out of risky situations and ways to make good choices.
Here is the link to the D.A.R.E. website full of resources for students and parents: www.dare.com | <urn:uuid:0709414d-af3e-446f-9779-442973d40c58> | {
"date": "2015-07-03T06:12:41",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095775.68/warc/CC-MAIN-20150627031815-00276-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9715681076049805,
"score": 2.609375,
"token_count": 473,
"url": "http://neill-lib.org/departments/city-clerk/interlocal-agreements/doc_details/554-march-2005?tmpl=component"
} |
Bill details the engineering choices underlying the design of a beverage can He explains why it is cylindrical, outlines the manufacturing steps needed to created the can, notes why the can narrows near it lid, show close ups of the double-seam that hold the lid on, and details the complex operation of the tab that opens the can.
Why have they always used that cylindrical shape and how did they come to decide on this shape in the first place? All is revealed in this fascinating video detailing the intricate engineering process of the aluminum can.
I guarantee that you’ve never seen an explanation of a soda can as entertaining as this.He explains why engineers choose a cylindrical shape, illustrates the can’s manufacture using production line samples and animations.
The design, he says, serves a very special purpose. Besides, experts consider the shape as the most practical when the sodas are packed and displayed together. | <urn:uuid:64c3d11a-d274-4d53-8c52-2b3a2442d2ab> | {
"date": "2019-10-21T16:44:09",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987779528.82/warc/CC-MAIN-20191021143945-20191021171445-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9400981068611145,
"score": 2.96875,
"token_count": 191,
"url": "https://siamagazin.com/the-brilliant-design-of-the-aluminum-soda-can-explained/"
} |
The Bluebird (one word) isn't the only blue bird. It isn't even
the bluest. Female Eastern Bluebirds often don't look blue at all unless in flight. Only 2% of North American Species have blue feathers. The birds most commonly confused with bluebirds by novices are the Jays and the Indigo Bunting. (Tekiela) Small cavity nesters that are blue or blue-ish include Tree Swallows, Violet-Green Swallows and Purple Martins. Indigo Buntings are very blue, and are often confused with bluebirds. Other small to medium-sized native birds with blue bodies include:
Jays: Blue Jay, Florida Scrub-Jay, Mexican Jay, Pinyon Jay, Steller's Jay, Western Scrub-Jay
Swallows: Bahama Swallow, Barn Swallow, Tree Swallow
Warblers: Black-throated Blue Warbler, Cerulean Warbler
Here's an alphabetic list of North American species with blue or blue-ish bodies, sorted by common name. (Notice several have "cyan" in their scientific names.) Click on any photo (from Wikimedia Commons) for a larger view. For more ID tips, distribution maps and to listen to songs, see Cornell, Patuxent, or What Bird online guides, or get a good birding ID book. ( I am not a birder by any means! All I can recognize are small cavity nesters, so don't bother contacting me for help.)
Distinguish from Bluebird
Location in U.S.
Green back, blue upper wings, green cap extending below eye, white belly and chin
More slender, glittering blue-black upperparts, red-brown forehead chin and throat. Belly is white to orange. Deeply forked, long tail.
More gray, large head, larger overall, bushy crest, white throat and underparts, large dagger-like bill, male has blue-gray breast band. Female has a rusty belly band. One of the few species where female is snazzier than the male.
Black-throated Blue Warbler
Smaller, male has dark blue upperparts, slate blue/black throat and mask. White underparts with black sides and white wing patch/spot on folded wing at base of primaries.
NE US, SE Canada
Larger, bright purple-blue body, black face, two wide rufous/brown wing bars, thick silvery bill; female mostly brown.
Larger, pale gray underparts, head crest, neck surrounded with black necklace, wings and tail have prominent black bars and white patches.
Smaller, faintly streaked underparts, black band separates white throat and belly. Wings have two bold, broad white bars.
Larger, pale eyebrows, gray throat, blue-gray streaks on breast (no crest)
Short, thick bill. Brilliant, irridescent blue all over; female dull brown. Crown is darker blue with purple tint. Wings and tail have black edges.
E from middle of US, parts of SW
Larger, upper breast, throat and chin are white with streaks. Head is blue with a gray mask and narrow white eyebrow. No crest, long tail.
Santa Cruz Island, CA
Cinnamon-brown breast and sides, white belly (breast very like an Eastern Bluebird). Wings have a white wing bar. Short, thick bill, longer tail. Breeding male has bright blue head and back with red chest and white belly like Eastern and Western Bluebirds.
Large, pale gray underparts (no crest), long tail
SW and Mexico
Small, finch beak, with patchwork of red chest, blue head and green back. Red eye-ring. Wings have green shoulder patches. Females are bright greenish yellow.
Southern Midwest and TX
Larger, stockier, head is dark blue (no crest), large pointed bill, very short tail.
Larger, glossy dark purple-blue body (male entirely bluish-black), forked tail.
Many areas except NW and parts of SW and intermountain W
Larger, stockier, crest. Head is darker blue. In some areas they have white streaks on faces.
More slender, shorter bill, longer wings, iridescent, shiny blue-green upperparts, snowy white underparts. Tail is the same color as back and slightly forked.
Small thick bill. Looks dark, but in perfect light may look blue. Purple-blue with red wash on throat, breast and back. Nape and eye-rings are red. Wings and tail are purple blue. Female dull tan.
AZ, NM, TX
Larger, pale gray underparts. Dark-streaked white throat bordered by dark blu e necklace. Interior race has a much paler necklace that is hardly noticeable, throat is more pale and barely shows streaks. Long tail.
References and More Information:
What Bird - Bird ID tool by color, size, location, etc. - go to the bottom left (Click to Browse Birds by....)
If you experience problems with the website/find
broken links/have suggestions/corrections, please contact me!
The purpose of this site is to share information with anyone interested
in bluebird conservation.
Feel free to link to it (preferred as I update content regularly), or use text from it for personal or educational
purposes, with a link back to http://www.sialis.org or
a citation for the author. No permission is granted for commercial use. Appearance of automatically generated Google or other ads on this site does not constitute endorsement of any of those services or products! | <urn:uuid:4d5ce9d9-15b7-4481-8938-5747e3380e2c> | {
"date": "2018-06-20T11:07:38",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863518.39/warc/CC-MAIN-20180620104904-20180620124904-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.873255729675293,
"score": 3.359375,
"token_count": 1184,
"url": "http://sialis.org/otherbluebirds.htm"
} |
NEW BERN – Bernard George dons the blue wool uniform of a U.S. Colored Troops Civil War soldier for re-enactments at historic sites and other venues. June 19th has become an unofficial holiday for many African Americans. On that date in 1865 in Texas , supposedly the last slaves learned the Civil War was over and that they were free. George celebrates the role of African Americans in claiming their freedom every day.
A member of the N.C. African American Heritage Commission (AAHC), New Bern Historical Society, NAACP, and other historical and community groups, George travels the state and eastern U.S. on a mission of education as a Civil War re-enactor. He is one of 10 AAHC commissioners. See
http://news.ncdcr.gov/2011/02/11/african-american-heritage-commission-making-history/ and http://www.youtube.com/watch?v=enDULkLaz-I
“We are always the most photographed group at re-enactments; it’s such a well-hidden story of U.S. Colored Troops and sailors during the Civil War,” he observes.
Re-enactors can give a reality to history that the written word can’t, explains Dr. Jeffrey Crow, deputy secretary of the N.C. Department of Cultural Resources and co-author of “A History of African Americans in North Carolina .”
“The im media cy of another living person representing an earlier time allows pe opl e to connect in a way that they can’t with books,” Crow continues. “That is even truer when the recorded history is limited or misunderstood.”
George re-enacts as a member of the N.C. Colored Volunteers, a group recruited in New Bern and part of the First African Brigade. When not re-enacting he is a city planner for New Bern , local historian and community volunteer. As a member of the AAHC, he can help ensure that African American history and culture are appreciated across the state.
The commission’s mission is to preserve, protect and promote North Carolina ’s African American arts, history and culture for all pe opl e. The 2011 Summer Teacher Institute at the N.C. Museum of History will focus use of primary sources to explore African American life and culture, and is being partially supported by the AAHC. For George, interest in this history was stoked years ago.
“My grandfather told me when I was a young boy that his grandfather was a soldier. His grandfather fought for the Union ,” George explains. “I was concerned that this was contradictory to what I had learned in history. But when I went off to college I learned there was a cornucopia of experiences of African Americans during the Civil War.”
Through oral history from his grandfather and father, George learned that his family was free and had come from the Tidewater Virginia area to New Bern about 300 years ago. Documents from the 1700s at the Craven County courthouse further substantiate this history, along with family records. He notes that free blacks in North Carolina were the thesis subject for the eminent historian, John Hope Franklin.
As a Civil War re-enactor, George finds many adults do not know the story of blacks fighting for their freedom in the war and during Reconstruction. Blacks and whites are interested in finding out more at programs at state historic sites or other venues. He says African Americans are particularly drawn to the re-enactors, because most Civil War re-enactors are usually white. When visitors see the U.S. Colored Troops re-enactors, they go home and tell their family and friends and so educate others.
“It is important to talk with and re-educate pe opl e,” George continues. “As more historical research and study is done, we are shifting the paradigm and a more complete truth of American history will be known.”
So whether at a Juneteenth program in Jacksonville on June 18, or at the Martin Luther King, Jr. National Memorial dedication on Aug. 28 in Washington, D.C., George will be upholding the African American Heritage Commission ideal and his own, by protecting and promoting African American history for all people.
The African American Heritage Commission was created by the North Carolina General Assembly to assist the secretary of the N.C. Department of Cultural Resources in the preservation, interpretation and promotion of African American history, arts and culture. The Division of State Historic Sites and the Division of State History Museums are within the Department of Cultural Resources, the state agency dedicated to the promotion and protection of North Carolina ’s arts, history and culture, with info rmation about the Department of Cultural Resources at http://www.ncculture.com/ | <urn:uuid:a6715d2e-42a1-43f4-86bb-590738992a4b> | {
"date": "2016-02-07T23:36:46",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151880.99/warc/CC-MAIN-20160205193911-00076-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9626331329345703,
"score": 3.390625,
"token_count": 1019,
"url": "http://michaelchardy.blogspot.com/2011/06/reenactor-claims-african-american-civil.html"
} |
If you don't remember the Aeneid from school, let's just put it this way: It's considered one of the greatest written works in humanity's long history of writing things (it's been taught and studied for two millenniums for a reason). The Aeneid originated way back in 29 B.C., a result of the poet Virgil setting out to pen an epic ode to the founding of Rome and its general awesomeness, tentatively titled You Guys, We're, Like, the Greatest.
Now, Virgil was a meticulous craftsman. And by that we mean "slow as shit," in that it took him 11 freaking years to write the epic poem, and even then he thought it sucked balls (his exact words, probably). So in 19 B.C., Virgil set out on a lengthy vacation in Greece and Asia to attempt to edit and salvage the poem, but fell ill almost immediately. On his deathbed, he asked his friends to burn the insignificant little trifle he'd spent the last decade working on, the one that made the men cheer and the ladies swoon.
Fainting at a poetry reading was the Roman equivalent of throwing your panties on stage.
So what saved One of the Greatest Things Ever Written by Mankind from getting tossed into some burn barrel in an alley where bums would warm their hands over it? Politics.
Emperor Augustus had suggested the poem to Virgil in the first place, and parts of it implied that he was descended from Rome founder Aeneas, which would legitimize his reign. So when he learned of Virgil's "Please make sure no one sees the incredible masterpiece I created" request, Augustus issued an imperial decree of "Um, hell no," instead ordering Virgil's cohorts to finish editing the poem as best they could and publish it. And here we are, still talking about it, 20 centuries later.
When it inspires this kind of artwork, how can you not?
We're all familiar with Michelangelo, the Italian artist whose painting, sculpting and nunchuck skills are the stuff of legend. Once his chief rival, Raphael, had succumbed to a fatal case of excessive boning, Michelangelo was basically the King of Renaissanceville, completing two of his most famous sculptures (David and The Pieta) before he was 30 years old. He viewed painting as an inferior art form, yet still rocked the Sistine Chapel -- because if you're going to waste your time on something beneath you, there's no point in fucking around. Oh, and he made a lot of drawings. Like, tens of thousands of them.
Also, he was possibly a Cenobite.
Or about 600, judging by what we have left. Of course, you have to figure that not every single doodle he scribbled of St. Peter's Basilica in perfect 1/1,000 scale would survive four and a half centuries, but even in his own time, Michelangelo's talent was fully recognized -- his drawings were considered priceless gifts to be treasured and protected. So why are so few of them still around? Well, it might have something to do with Michelangelo tossing reams of them into bonfires throughout his life.
What? Why? If his drawings were so highly regarded that he could have turned them into favors or some serious coin, why just toss them into the inferno?
The most likely explanation involves a weird form of vanity and public perception. In Michelangelo's mind, true genius centered around the immediate, seemingly effortless creation of a work of art, whereas the actual sketching and design stages were elements to be ashamed of and kept hidden. You know the merits of hard work and proper planning and learning from your mistakes and all that jazz? Well fuck that, because real prodigies effortlessly crap out masterpieces at a whim. Michelangelo worked his ass off on almost everything he did, yet he'd rather you remember him as a lazy, gifted sumbitch who just strolled into the Sistine Chapel one day, looked up, grabbed a few paintbrushes and a stepladder and went to town.
"Man, I don't even remember painting that shit, I was so hammered."
For art that needed censoring, check out 8 Filthy Jokes Hidden in Ancient Works of Art. Or learn about 6 Classics Despised by the People Who Created Them.
If you're pressed for time and just looking for a quick fix, then check out 5 Movies That Prove the Action Genre Won't Let a Dog Die.
And stop by LinkSTORM to see what Cody did with his paintings of men riding unicorns.
Do you have an idea in mind that would make a great article? Then sign up for our writers workshop! Do you possess expert skills in image creation and manipulation? Mediocre? Even rudimentary? Are you frightened by MS Paint and simply have a funny idea? You can create an infographic and you could be on the front page of Cracked.com tomorrow! | <urn:uuid:128820e0-9aeb-41b1-8708-c74af675b74a> | {
"date": "2015-01-28T09:35:55",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122691893.34/warc/CC-MAIN-20150124180451-00153-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9764838218688965,
"score": 2.8125,
"token_count": 1034,
"url": "http://www.cracked.com/article_20062_5-famous-artists-who-tried-to-destroy-their-own-work_p2.html?wa_user1=3&wa_user2=Weird+World&wa_user3=article&wa_user4=recommended"
} |
Flyfishing began in the middle ages. It seems likely that some frustrated angler watched as hundreds trout attacked the swarms of aquatic insects emerging from the water to take flight. During such times, modern trout lock in on these insects and eshew all types of other tasty delicacies like crickets and even large worms. It's easy to imagine an ancient angler, frustrated by a swarm of wildly active trout and an empty creel, hatching the idea of imitating the insects that the trout were gobbling down.
How to accomplish the imitation of insects floating on the surface of a stream is another matter entirely. Since the insects - flies weight next to nothing, they would be nearly impossible to cast. Consider how far you could throw a fly. Now imagine a fly placed on the line of a typical fishing rod, you still have no weight to throw. The innovation of our ancient fisherman was to place the weight in a line that would float. If the line is heavy enough to throw, the fly will follow. Since a thick and heavy line would probably scare fish, you need to separate the line from the fly by way of a thinner line, the leader. It is still done this way today and this is the foundation of all modern flyfishing. Rather than use a line of woven horsehair greased with pig fat, we use slightly more refined, or at least better smelling, equipment.
Modern flyfishing has progressed to include lines that float, sink, and do both at the same time. Flyfishermen now pursue every species of gamefish but flyfishing is different from all other forms of fishing because the line provides the impetus to the lure or fly rather than the other way around. In flyfishing, the line is cast and the fly follows. This fact makes it a bit trickier to learn, but it is a very enjoyable and productive way to catch fish.
As you might imagine, flyfishing requires some specialized equipment. A thick floating line (usually), a long limber rod, a strange reel, and flies - artificial ones with hooks. The other equipment such as a vest and waders are common to all types of fishing. For local fishing, a floating line will serve more than 95% of you fishing needs and the discussion here will be limited to fishing with this type of line. As for the best fly rod for local waters, this is a little more difficult to determine. Rivers like the James, Jackson, and Maury are best fished with long rods from 81/2 to 9 feet in length. For mountain streams, shorter rods are preferred by many anglers. If you can choose just one rod for our local waters, a rod of about 8 1/2 feet is a good compromise.
Rods are matched to the weight of the fly line and lines are given a simple numerical rating according to their weight. Heavy lines such as those of 9-12 weights are usually used for fishing in the ocean where high winds are common. Light lines of 2-3 weight are used in windless conditions where the presentation of the fly is critical to catching fish. In this area, lines of 4-6 are the most commonly used. If you plan to purchase a line for fishing in this area, look for one with a designation like WF5F (weight forward, rating 5, floating). The 5 can be replaced by the weight of your choosing. Weight forward simply means that the greatest weight is in the front end of the line. This type of line is much easier to cast than a line that is the same weight throughout (level).
If you are buying a 5-weight line, you should match the rest of your equipment to that weight. Purchase a tapered monofilament leader of 7-10 feet and connect it to the end of the fly line. Most lines are marked so that you can easily find the leader end. The other end of the line will be tied to dacron or kevlar "backing." This thin woven line is wound onto the reel so that when you catch a big fish that pulls out your 100 feet of fly line, you still have something connecting you to the fish.
Rods will clearly show their line ratings and should be rated for the line you choose. Graphite is the material of choice for fly rods. Whippy fly rods are as difficult to cast as stiff ones. Moderate actions are best for beginners. If budget is an important consideration, it often is, be sure you get a good line and rod. High priced reels are great tools but their features don't often come into play with the smaller fish of the Shenadoah Valley. If you are planning a trip to Alaska, get a good reel too.
The flies you choose are very important to your success but will depend on the particular species you will be trying to catch. Specific flies will be mentioned later but any fly you choose should be durable. Check the fly to make sure that it is well tied. Look at the head of the fly - the portion next to the eye of the hook - to make sure that there are no loose threads or loose wraps of thread. If possible, get someone at a local flyfishing shop to help you make all these decisions about flies and the rest of your equipment.
The last piece of essential equipment is a pair of sunglasses. These do more than help you see fish, they protect your eyes from hooks traveling at tremendous speeds. Make sure you wear a pair when you fish and practice casting.
Casting a line is one of the most enjoyable parts of flyfishing and it really is easy when you get the hang of it. After you've assembled your equipment and the line is on your reel, thread the end of the line through the guides of your rod and pull out 15 feet of line beyond the rod tip (that's about 24 feet including your leader). Tie a bit of yarn or an old fly (break off the bend of the hook) to the end of your leader so that you can see where it falls and start practicing casting. It is better to try this on a lawn than in the middle of a trout stream, use that time for fishing.
Start by learning the forward cast then the back cast. This is the opposite of the way you will do it on the stream but when you learn the feel of a forward cast, the back cast will be obvious. Let the line start on the ground behind you. You know you've got it right when the line and fly straighten out in front of you at waist level then fall quietly to the ground. When you've mastered 15 feet of line, move on to 20, then 25.
For the back cast, start with 15 feet of line on the ground straight in front of you. Pull the line back sharply. When the line straightens out behind you, begin your forward cast. Don't worry if every cast isn't perfect, this will give you something to work on for the next 80 years. There are a number of excellent books and videos on casting that are listed at the end of this section. They will be much more helpful than this short introduction. | <urn:uuid:80e83e22-7039-4ec5-80f3-87f250778ee0> | {
"date": "2013-12-07T05:50:12",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053608/warc/CC-MAIN-20131204131733-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9619364738464355,
"score": 2.984375,
"token_count": 1459,
"url": "http://www2.wlu.edu/x22176.xml"
} |
About 150 years ago there were some 200 Jewish families in Mlawa. Only a few Hassidic and Mitnagdim families had any influence on the community. The ruling Hassidic congregations were the Worka, Bialower, Alexandrowite and, only later, Gur. The traditions and modes of life of the first families were later passed on to children and grandchildren thereby creating the Mlawa version of the Jewish way of life.
Many of the first families of Mlawa originated in the surrounding towns and villages. A conspicuous leftover of this rural background was the Mlawian Jew's hard Yiddish pronunciation. The background of fields and forest was blended with simplicity and Hassidic romanticism. These produced the unsophisticated Mlawian Jew with his emotional nature who was prone to moodiness, immersed in dreams, inclined to exaggeration, superstition, and attached to his homeland. Hassidism found fertile soil in the hearts of the simple Jews who lived in the blessed and beautiful flatland of Mazowsze.
The teachings of the Hassidic Rabbis were taken quite seriously. Faith, honesty, and decency were natural phenomena. Everyone could partake of as much learning and Hassidism as his heart desired. In the Hassidic shtibbls and in the batei midrash, workers sat together with the rich. There was closeness between the Hassidic and artisan families of Mlawa. The craftsmen were not scorned, as was the usual custom in other Jewish communities. It was natural for Hassidim, Mitnagdim and workers to be linked through marriage. Wealthy and respectable Hassidic Jews were the sons of craftsmen, tailors, and butchers who excelled in the study of the Torah and in good manners. Many craftsmen studied the Torah during their free time and enabled their sons to study as a full time occupation.
Israel Alter was descended from a large and aristocratic Hassidic family who had lived in the city for about 120 years. Sons, sons-in-law and grandchildren multiplied and established many new families (as reported by Berish Perlmutter).
Israel Alter lived in the market place in Brachfeld's house. He was a prominent dealer in timber and wool. He spoke Russian and Polish. His sons and daughters were instructed in languages and music. His sons' melamdim were chosen by the Rebbeh, with whom Israel was on intimate terms. When the Wurka Rebbeh came to visit, Israel Alter would sit on the balcony wearing his shtreimel (fur-edged hat). On the other hand when the governor of the province came to see him, he would put on his top hat.
In his home he had his own besmedresh. He conducted a table (presided over a table, like a Rebbeh), was associated with and maintained a cozy relationship with the Hassidim.
Hassidic families with business connections and relations with the authorities had to know how to treat non-Jewish merchants and top officials. Such homes had stables of their own, carriages, men and women-servants, bookkeepers and managers.
Israel Alter's first wife bore him five sons and three daughters: Moshe, Tanhum, Herschke, Shmuel and Yosef-Shiyeh, Rifka-Leah, Sheyneh and Golda. From his second marriage there were two sons and two daughters.
Only one of the sons, Shmuel, left Mlawa. The others remained to establish new families. The most learned of them all was Tanhum. The military barracks were housed in buildings he owned. Israel Alter bought estates for his other sons: Marianowa for Yosef-Shiyeh, Mlawka - for Herschke. This was according to the formula: estates, forests, paving roads, and building barracks.
One of the sons, Victor Alter, strayed from the beaten path. He became one of the main leaders of the Bund. His sister, Esther Iwinska, was also active and was the Bund representative in the City Council of Warsaw.
Tanhum Alter, Victor's brother was one of the forerunners of Hovevei Zion and one of the founders of the Zionist Organization in Mlawa. During World War I, Tanhum left town and made his way to Moscow and from there, to Vienna. He died in Paris.
His son, Mordechai Alter, changed his name to Marco Altieri and lived in Rome. He was the director of the Palestine Office for many years. Two of Tanhum's grandsons live in Israel. Their father, Wowe, was murdered by the Nazis in Paris.
Yossel Goldstein, who dealt in lumber, was also a native of Mlawa. He followed in the footsteps of his father-in-law. Goldstein was a Hassid and a great philanthropist. He prayed at the Alexander shtibbl and often traveled to visit the Rebbeh. He conducted a table for the Hassidim on Saturdays and festival days. He excelled in his hospitality. It was in his home that the town dowries were deposited.
Goldstein's daughters were known for their beauty and their education. Several of them were university graduates. At the end of the 19th century, several Mlawian girls broke through to the outside world and went abroad, generally to Belgium, to complete their education. The first to go were members of the following families: Konecki, Mendel Borenstein, Yossel Goldstein, and Shayeh Lifschitz.
Yossel Goldstein's sons left Mlawa and scattered all over Poland. Shmuel was the head of the Czestochowa community council; Peretz settled in Kalisz; Mendel was a building contractor in Warsaw; Wolf, the brother-in-law of David Pizic went to Biala.
Mordechai Ben Tov (Gutgeld), the renowned leader of Hashomer Hatzair, Israel's first Minister of Labor, and Shulamith Bar Don, active in the Israeli theatre, are the great-grandchildren of Yossel Goldstein and of Israel Alter.
As one continues to study the pedigrees, one comes to Avrum Landau and his large family who were all immersed in Hassidim. Avrum Landau used to travel to visit the old Tzaddik of Wurka and became linked by marriage to the son of the Biale Rebbeh, Reb Itchkeh Landau. Abraham Landau's sons, Itcheleh and Yerahmiel, were Hassidim who dealt in textiles, faithful followers of the Rebbeh. The Landaus and their sons and grandsons lived in the market where they owned textile stores. They kept their sons from any secular learning.
Yerahmiel Landau excelled in the mitzvoth (merits) of hospitality. He never came home alone but always, with a guest. When his wife grumbled because he had not notified her in advance, he would say: And what do I ask of you, another spoonful of soup? On Saturdays he brought home all the melamdim for kiddush (blessing over a cup of wine consecrating the Sabbath or holiday) and they too ate their fill.
Highly regarded in town was the family of Shlomo Lizbraski and his sons: Fischel, Haim, Yehuda-Meyer, Abraham and Zalman. Some of them were Alexandrower Hassidim, others Gur-Hassidim. They lived in the market and were engaged in road construction, textiles, and wine.
Mention must be made of other established Hassidic families, those of Zelik Warszawski and Mendel Warszawski. They were distinguished for their honesty and modesty. When Mendel turned fifty, he liquidated his affairs, assured his daughters of dowries and devoted himself to books on ethics.
The teacher and writer, Yakir Warszawski, and the Bund activist and journalist, Binem Warszawski, are related to the Warszawski families of Mlawa.
The Wyszynski family was an extensive one, well represented in the batei midrash and Hassidic houses of prayer.
One of the prominent, well-to-do families was that of Haim Leyzer Narzemski. He was a modest man of means, solid, clever and a respectable citizen. He was always well dressed. He could always be relied upon to mediate justly between contestants in civil disputes. For many years he was one of the heads of the Jewish community. He dealt in hides, chinaware and the wholesale distribution of liquor. He was a Mitnaged and yet, sent his sons, Wolf and Yosef-Lev, to study in the shtibbl. His sons-in-law were Hassidim. One of them was Hirsch Tuvia Yonish.
The Makowski family followed an entirely different course. Yossel Makowski, who did not know how to read, provided his sons with a secular education. He himself was a handsome, wealthy Jew in the wheat and wool business. Once he came to Yossel Goldstein's house, took a newspaper into his hands and suddenly called out to Yossel Goldstein's wife: Rifka-Leah, a ship has sunk. He was not aware that he was holding the paper upside down. His son Haim knew several languages and his grandson Yossel was the only Jewish doctor of the Mlawian community during the last twenty years of its existence.
Among the veteran families of village origin who blended in with the urban population and held important positions was the eccentric family of Lemel Kleniec. He became wealthy from trading in timber. His son, Herman Kleniec, was prominent in public affairs. He was one of the first Zionists in the city. Herman's sons received high school and college education. This was all due to his wife, Sarah, the daughter of an intelligent Jewish family from Plock.
The only Hassid in the Kleniec family was Moshe-Yosef, a sort of goyish Hassid. He wore a Jewish hat with a leather visor like that of the goyim.
Lemel Kleniec chose his sons-in-law from Hassidic circles though he himself was far removed from Hassidism. One of his sons-in-law was the known iron dealer, the Alexandrower Hassid Shimon Lipsker.
The Rybaks were a respected and wealthy family. Even in those times, Ya'akov-Wolf and Yosef Rybak wore short jackets. Yosef was the Sane Bonislawski agent for the Russian fish trade. His son Henryk was an uncertified dentist in town. At present he is in Israel.
Ya'akov-Wolf was an exporter of wheat to Germany. His son Abraham Rybak was one of the local forerunners of Hovevei Zion.
A special chapter should be devoted to the melamdim who lived in Mlawa. Even Reb Itchkeh, who conducted himself like a Rebbeh, brought his grandsons a special melamed from the Rebbeh's court, Itcheleh Cziczower. Every melamed brought from out of town by some family was provided with food, clothing, and a salary. Many other melamdim such as Reb Ya'akov Winower, Mattathiahu Zaratiner, would rent a corner in some poor family '5 home. Others opened heders of their own.
It should be mentioned that the dardeki (small children) melamed, who came from Chorzel, 70 years ago, had a heder in which he taught both girls and boys. Tirza Bat Yehuda-Meir Lidzbarski, who some years later became the wife of the watchmaker Feivel Shapira, studied in this heder as did Esther Warszawski and others. The melamed '5 apartment led to the heder. Benches were set up in the room, mended plates, and clocks hung on the walls - this was the Chorzel melamed's side-occupation. All his pupils excelled in the reading of Ivrit - Hebrew).
The melamdim, of whom there was no lack, were named according to the cities from which they hailed. They were brought in from all over the country.
An entirely different sort of melamed was Zelik Baranower (Rosenberg), a Hassid and a great scholar. He accepted only four pupils. His wife and daughters helped to earn a living by making headbands and women's hats.
Meyer-Shlomo Rosenthal was very erudite. He liked to pray and also to peek into secular books. He sewed his coattails together so as to be exempt from the tzitzit commandment.
After the Polish uprising was put down, there was extensive assimilation among the Jews. At the same time the Litvaks (Lithuanians), who had been expelled from Russia, arrived in Poland. They brought with them the first concepts of the Haskalah (Enlightenment). One of those exiles was the melamed Yuzelewski who, even before Gordon, opened a modern heder in town.
A totally different character was the melamed Rouven-Leib Hertzfeld the Czajker (from the town Czajk). He was well versed in languages, especially German, taught Hebrew and the Bible. Even Reb Itchke, who considered Hertzfeld treyf (unfit), needed the melamed when his son wanted to learn to read and write Hebrew properly. The Czajker had two sons and two daughters. He used to say about one of the sons, who went about with a talith and phylacteries: He is a Rebbeh without Hassidim (followers). The other son was proficient in secular learning.
Of him the Czajker said: This is a professor without a chair. Sixty years ago, Hertzfeld's two daughters opened a school for girls for the study of Hebrew in which Hebrew was the language of instruction. One of the girls became the wife of Moshe the Shohet.
A group of Jews who enjoyed studying ancient Hebrew literature and philosophy gathered around the Czajker. The Czajker spent his free time in the company of David Opatowski. Together they wrote the preface to the first Pinkas (annals) of Hovevei Zion in town. He was also a friend of Israel Goldman (the brother-in -law of Yossel Goldstein), an Alexander Hassid who was both very pious and a great scholar, grammarian and poet. Like his friend, David Opatowski, the father of the well-known writer Yosef Opatoshu, he was well versed in ancient Jewish philosophical literature.
Rybak of Plock discarded his long caftan and taught foreign languages. Later, so did the teachers Sanino, Bukowtzer, the elementary school teacher and, finally, Moshe Golumb. Generally, only the children of the rich studied languages. The Jewish girls attended the Polish pensia (high school).
JewishGen, Inc. makes no representations regarding the accuracy of
the translation. The reader may wish to refer to the original material
JewishGen is not responsible for inaccuracies or omissions in the original work and cannot rewrite or edit the text to correct inaccuracies and/or omissions.
Our mission is to produce a translation of the original work and we cannot verify the accuracy of statements or alter facts cited.
Mlawa, Poland Yizkor Book Project JewishGen Home Page
Copyright ©1999-2014 by JewishGen, Inc.
Updated 24 Jan 2004 by LA | <urn:uuid:61394137-b0d3-4fb7-8a79-d602699afa79> | {
"date": "2015-04-27T04:08:52",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246657041.90/warc/CC-MAIN-20150417045737-00140-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9840173125267029,
"score": 2.921875,
"token_count": 3349,
"url": "http://www.jewishgen.org/yizkor/mlawa/mla455.html"
} |
Computer crime generally refers to criminal activity where a computer or network is the tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more category. Additionally, although the terms computer crime or cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used to facilitate the illicit activity.
Computer crime can broadly be defined as criminal activity involving the information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
Theft of hardware has increased from warehouses and manufacturing facilities due to the growing demand for high-tech products such as microprocessors, computer memory, microcomputers/PCs, Laptop/notebook, palmtop, hard disk drivers and cellular phone that are valuable, compact and easy to transport. For example, a suitcase of microprocessors is worth more than an equivalent volume of cocaine.
Approximately, 4 percent of the hardware theft accounted for over 60 percent of total company losses. While the average high-tech hardware theft is probably in the low thousands of dollars, it is the high-value thefts that dominate overall company losses. Hardware theft has created different levels of cost. In addition of the direct cost of replacing stolen equipment from manufacturers, there are other indirect costs. (The Economic Costs and Implications of High-Technology Hardware Theft by James N Dertouzos)
Software license and copyright infringement can be defined as the unauthorized use or illegal copying of computer software. This can take many forms such as commercial counterfeiting, deliberate and unauthorized copying by dealers, unlicensed copying and use by "end users" and plagiarism by competitors. http://foldoc.org?software+theft
There are four main categories of music/movie copyright infringement and they are, making a copy of live performance (bootlegging), making copies of the product, counterfeiting which is essentially the same but involves duplication of both the music product and of its packaging.
Claiming authorship (creation) of another person's creations (normally writing).
By posting a work of art to the internet, an artist becomes ultimately vulnerable. The internet is too convenient; any user has complete freedom to publicize content worldwide. This has proven to be something that should be cherished and treated with care, yet feared in anyone’s eyes – let alone the artists. After all, the unfortunate, inevitable truth remains: as long as people are able to add to the internet, someone can find a way to take from the internet.
Online infringement of art copyrigh (along with selling stolen physical art online, unlicensed replication) has been a topic since perhaps the beginning of the internet. The disastrous examples are nearly endless: Stolen artwork being sold on eBay, printing a downloaded piece and selling it for a profit, other users posting a downloaded image and claiming it as their own (plagiarism); from something as shocking as a Facebook family photo being plagiarized and turned into an advertisement on a billboard…
Although there have been many attempts to counterattack these misfortunes, technology is advancing as we know it. When a cure is discovered, another disease is found, so to speak. For a spell, watermarking became popular and was able to prevent most attacks, but as the media grows ever-strong and graphics manipulation tools become more and more powerful, watermarking is but one lock that can be undone. Turning off the Right Click was another myth that was quickly put to rest by those who were able to get behind the coding of a webpage and retrieve the image from there. Some users believe that by use of Flash or Java applets, one is able to hide their image from even the code-saavy’s eye. However, that is another myth.
The internet allows many different types of invasions into personal information, and use of information with little consequences. Through the internet stolen credit cards are easily utilized without any check into if the user is the true owner of the card. When using credit cards over the internet, some tips to help avoid credit fraud are:
- never respond to emails requesting personal information - never respond to requests for verification (phishing) - never provide personal information to an unsecure site
As well, people must beware to ensure that no outside parties are able to obtain the credit card number, to avoid such a situation:
- sign credit cards as soon as you receive them - shred all applications for credit cards - only carry cards that you absolutely need - if you move notify the credit company of the change of address - shred anything with a written credit card number - Immediately cancel any stolen or lost cards
With these precautionary measure the improper use of your credit card should hopefully be avoided. If for some reason fraudulent charges still occur report them immediately to the credit company as to avoid any future fraud.
In conjunction with credit fraud, identity theft could be enhanced by the amount of information an individual lends to the internet. With many different forums for individuals to post opinions and information of themselves that they think will only be of interest to friends and family could potentially become information that another stranger could use to steal your identity. It is important to put only information that anyone and everyone is allowed to see because on the internet everyone is potentially able to see it. Private information should only be offered on secure and trustworthy sites and different passwords should be used respectively.
Software piracy is the illegal copying, distribution and use of software. When a commercial software package is purchased, an end user license agreement (EULA) is included to protect that software program from copyright infringement. Typically, the license states that you can install the original copy of the software you bought on one computer and that you can make a backup copy in case the original is lost or damaged. You agree to the licensing terms and conditions when you open the software package, when you open the envelope that contains the software disks or when you install the software. Types of software piracy include: • Softlifting: Borrowing and installing a copy of a software application from a colleague. • Client-Server Overuse: Installing more copies of the software than you have licenses for. • Hard Disk Loading: Installing and selling unauthorized copies of software on refurbished or new computers. • Counterfeiting: Duplicating and selling copyrighted programs. • Online piracy: Typically involves downloading illegal software from peer-to-peer network, Internet auction or blog. Software piracy applies mainly to full-function commercial software. The time-limited or functions restricted versions of commercial software called shareware are less likely to be pirated since they are freely available. Similarly, freeware (a type of software that is copyrighted but freely distributed at no charge) also offers little incentive for piracy.
The availability of high quality, full-color imaging products such as scanners, color printers, and color copiers has made digital counterfeiting creating counterfeit copies of items such as currency and Social Security cards, driver licenses, passports, visas, using computers and other types of digital equipment easier and less costly than in the recent past. With digital counterfeiting, the bill is either color copied or it is scanned into a computer and then printed. Counterfeiting is illegal in the United States. Counterfeiting of U.S. currency and other documents is a growing problem in United States and in other countries. The Secret Service has seen an increase in counterfeiting among high school and college students for using exam papers before the final test. To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every 7 to 10 years. These new designs such as for example, new $5 bill released in 2008 contain features such as micro printing, watermarks and a security thread that make the new currency much more difficult to duplicate than older currency. Due to the watermarks and security thread are embedded in the paper, counterfeiters are unable to duplicate those features when creating counterfeit bills either from scratch or by bleaching the ink out of existing lower-denomination bills and reprinting them with high denominations. Counterfeit copies of bills using the new designs are easy to detect just by holding them up to the light and looking for the proper watermark or security thread. This is attributed primarily to the ease of creating counterfeit bills- although not necessarily high quality counterfeit bills using digital technology. The paper used with real U.S. bills is very expensive and cannot legally be made by paper mills for any other purpose and because U.S. bills contain a number of other characteristics that are difficult to reproduce accurately. The majority of counterfeit money made by amateurs is easily detectable. Prevention measures for the counterfeiting of other types of documents such as checks, identification cards including RFID tags, digital watermarks, and other difficult to reproduce content. Educating consumers about fake products differs from the authentic products is a vital sign in the ongoing battle against counterfeiting. | <urn:uuid:5dd6882a-78df-43c4-a5e5-92abf234cc52> | {
"date": "2014-07-28T08:23:02",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510257966.18/warc/CC-MAIN-20140728011737-00282-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9459706544876099,
"score": 2.859375,
"token_count": 1934,
"url": "http://en.m.wikibooks.org/wiki/The_Computer_Revolution/Security/Computer_Crime"
} |
Hemoglobin is a crystallizable, conjugated protein consisting of an iron-containing pigment (called heme or hematin) and a simple protein, globin. In the lungs, it combines readily with oxygen to form a loose, unstable compound called oxyhemoglobin, a process called oxygenation.
In the tissues of the body, where oxygen tension is low and carbon dioxide tension is high, oxyhemoglobin liberates its oxygen in...
A Swedish study has shown that teaching type 2 diabetes patients about their disease results in greater decreases in the hemoglobin A1c... Read more »
You may have been told that you need to lower your LDL (bad) cholesterol levels, and increase your HDL (good) cholesterol levels. While... Read more »
So you don’t have diabetes. Should you still be worried about having an elevated risk of Alzheimer’s disease? A new study out of the... Read more »
Diabetes is much more prevalent in African-Americans than other groups of people, and unfortunately if you already have diabetes you are... Read more »
Source: ADAM Encyclopedia
of ComplicationsHigh Blood Pressure and Heart DiseaseAll patients with diabetes and high blood pressure should adopt lifestyle changes. These include... Read more » | <urn:uuid:62a2afb5-c88c-49c3-a9c1-78c1e8da69f1> | {
"date": "2013-05-21T10:00:33",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.905032753944397,
"score": 3,
"token_count": 258,
"url": "http://www.healthcentral.com/diet-exercise/h/foods-that-will-increase-hemoglobin-level.html"
} |
Fossil fuels, the carbon demons of the modern world, seem to have got us by the short and curlies! How much is this true and what is the outlook for the world with and without them?
Certainly the price of gasoline has got people's attention. Is this just a current blip, or are we going to have to live with this or worse? Is peak oil already upon us?
The name for fossil fuels exposes its origins. These are products from millions of years ago, like all fossils, that we have reaped the benefits of in running our modern world.
Essentially they come from two sources, land and water-based.
Coal and its associated methane gas arose from buried plant material from huge forests and swamps of the carboniferous period.
Petroleum products, including natural gas, were created from water-based algal organisms becoming buried and compressed.
Being created over millions of years while we consume them at massive rates we will deplete them eventually. There is great debate over the time this will take.
Dire predictions from the 1960s of the earth running out of oil have not been fulfilled exactly as stated. New deposits, new technologies, and more efficient use of oil products have all contributed to this.
Coal has been used from pre-history. It was important in the production of metals. It drove the industrial revolution and powered the steam engine. Petroleum products were used from ancient time more for water-proofing properties.
The rise of the internal combustion engine required oil products, initially diesel type and then more refined gasoline. Even today most transportation modes require oil-derived products to continue.
There are some changes on the horizon with more renewable products like ethanol from starches and more recently tougher plant parts and the rise of petroleum-like derivatives directly from processing plant products and by-products.
Throughout the world fossil fuels still provide the majority of the world's energy needs, whether in transportation or electricity production.
Burning of fossil fuels has created the major global warming concerns with its production of greenhouse gases. It is estimated in carbon dioxide alone 21.3 billion tonnes a year is being produced world-wide - twice what is calculated as being able to be naturally processed by the earth.
The energy for the rising Chinese economy is 70% fueled by coal-fired power stations, creating national problems with air quality. In 2007 it passed the USA as the world's top carbon polluter and now belches out more than the USA & India combined. It is using as much coal as all the rest of the world's other nations put together.
Interesting in fossil fuel developments is the work of a couple of Chinese graduates from the USA who have returned to their home country. Now based in Shanghai they have developed a catalyst which converts methanol from coal to form dimethyl carbonate. Dimethyl carbonate creates more oxygen in the burning of heavily-used diesel fuel. This reduces the sooty carbon component of diesel exhaust by over ninety percent.
China is embracing a number of clean coal technological innovations such as underground coal gassification. It is also employing carbon sequestration pumping liquid carbon dioxide underground. However the volumes sequestered this way are still low compared to the amount produced.
China's active pursuit of alternative energy technologies is well known. Huge efforts are being made to rapidly expand technologies aside from fossil fuels based ones.
As part of this they are seeking to use more electric cars. Of relevance, not just to them but also to the rest of the world, is the galling statistic that electric cars effectively pollute the environment more than gasoline-powered versions.
Due to China's heavy reliance on fossil fuels for power production fine particulate emissions per passenger unit distance travelled are 3.6 times higher for electric cars than for gasoline powered ones. This is better than the figures for diesel-powered cars, although diesel buses, with their multiple passengers, are about equivalent.
There are methods available for dealing with particulate emissions from burning of fossil fuels especially coal. Most countries have strong emissions guidelines requiring these to be employed.
Fine ash is trapped by filters or electrostatically. Although this waste can be dumped there are quite a number of uses for it including very energy-efficient-in-production, strong and effectively insulating bricks.
The world's deposits of coal could supply even current demands for a few hundred years.
For most of the world the fossil fuels we are most concerned about are the petroleum-based ones.
Unlike most of the world, the USA has benefitted from profoundly lowered natural gas prices due to its current huge production. The processes for extracting this has produced wide-ranging debate about the environmental effects. More on this later.
Why are gasoline prices remaining so obstinately high?
Many feel we are at the peak oil time, where supply is just keeping up with demand.
When events such as Libya's recent political upheavals affected its ability to supply its oil to the world, prices spiked. Even as it comes back on-line the chances are the prices are going to remain elevated.
Several countries like Russia, Iran and Kuwait have peaked in their oil production.
Saudi Arabia, with the world's largest deposits, still has the ability to adjust its production to fit demand.
Elsewhere the search for oil is occurring in areas from where it is much more difficult and costly to extract.
Whether this is from large offshore fields like the newer one 180 miles (300 kilometres) off the coast from Rio de Janiero, deeper-lying Gulf of Mexico ones, or oil shales and oil sands in North America, both production, adjustments and responses to accidents or other incidences will involve longer time frames than simple land-based liquid petroleum pumping.
Brazil's new field in 7000 feet of seawater and then under 5000 feet of rock is deeply seated. Estimated to be 100 billion barrels with one platform pumping at 68,000 barrels a day, this is a significant new supply.
When you consider, though, that the world's petroleum use of fossil fuels runs at over 82 million barrels a day, with around a fifth of this consumed by the USA, it is a relative drop in the bucket.
To become energy self sufficient the USA is exploiting its less readily accessible petroleum deposits.
In North Dakato oil shale extraction is creating thousands of new jobs and new petroleum supply. With the current price for petroleum the extra costs of extraction make it economic.
Utilising the same methods as those employed in natural gas extraction with vertical drilling to the shale layer, then horizontal drilling and fracturing, it is proving effective. How much these methods affect the environment is actively debated.
The movie Gasland documenting multiple state environmental effects from fracking disturbed many.
Television coverage concentrated more on the visually dramatic effects of gas tracking into water supplies. Flames could be lit from taps! However it is the other effects that are more disturbing.
Fracking does use enormous amounts of water, pumped into the ground along with a number of proprietary chemicals. A percentage of this water is retrieved and then has to be disposed of. Disposal systems, especially with the volumes that need to be handled, do not seem to be ideal.
Other chemicals used in the fracking fluids are being detected in aquifers. When these include ethylene glycol and other heavy metals, serious questions need to be raised about the future health of the surrounding population.
In a state as thinly populated as North Dakota this may not spark much interest. But when the process begins to be employed in Ohio and California there may well be some more serious opposition.
Again to attain energy self-sufficiency the huge reserves contained in the oil sands of Alberta, Canada are beginning to be exploited. Once more the relatively high cost of petroleum makes this financially viable.
It is environmental questions like the methods of extraction, whether open-cast or more underground, and then the transportation of the products to the USA in a huge pipeline that have raised major questions.
It amply illustates, along with BP's recent Gulf of Mexico disaster, the essential problem with these more difficult-to-extract petroleum fossil fuels. They are environmentally dirtier to produce.
How much are we willing to pay? This is the essential question.
It also illustrates why gasoline prices are unlikely to fall as they have in the past. We are seeking to extract more and more and difficult sources. They are costlier and environmentally more challenging to exploit.
We may well have to live with prices like we have now or even higher.
Even more important than that though is for how many years these supplies are going to last.
Given our current consumption, let alone the rapidly rising demands in the hugely populous countries of China and India, we are looking at a couple of decades or so.
Fossil fuels have been a mainstay of the rise of the modern world. To continue we are going to have to agressively, in time and money, pursue alternative energy sources that will lead us into the future. | <urn:uuid:bbba746e-f2a9-4d5b-b81e-2700fe45f19f> | {
"date": "2019-04-20T01:31:11",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528433.41/warc/CC-MAIN-20190420000959-20190420022959-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9598863124847412,
"score": 3.140625,
"token_count": 1842,
"url": "https://www.ialtenergy.com/fossil-fuels.html"
} |
TortoiseBlame - who changed which line, when and why?
Sometimes you need to know why a part of your files is the way it is, who made that particular change and why. Or in other words: "Who the h*** put that command there?".
Subversion has a command for this, and it is called blame (guess why). Subversion creates a blame of a file by adding information about the author who committed a line, the revision the line was last changed and the date.
TortoiseSVN has its own tool to show you those blames. In addition to the information other Subversion clients show, it also shows you the log message of the commit for each line inside a little tooltip window when you hover the mousepointer over a line.
To make it easier to follow a specific revision (which lines exactly were changed in a commit), it colors lines from the same revision differently. Also a separate color is used for the author of the currently selected line. | <urn:uuid:3f8714ee-85a3-4788-bf42-3a61cdb34241> | {
"date": "2019-07-20T15:41:14",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526536.46/warc/CC-MAIN-20190720153215-20190720175215-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9554212689399719,
"score": 2.75,
"token_count": 205,
"url": "https://tortoisesvn.net/blame.html"
} |
The Diabetes Complication You Didn’t See Coming
The number of people living with type 2 diabetes is increasing at a rapid rate. And it isn’t just about the diabetes. There are complications that can arise from this disease which are more serious than you may realize. Get informed!
One complication you may not have considered is kidney disease.
People who suffer from type 2 diabetes may also develop a dangerous form of kidney disease that can leave them without a well-functioning renal system. When this happens, blood isn’t filtered properly and you won’t manufacture urine well enough to excrete body waste. The only real option for dealing with this issue is dialysis treatment.
Diabetes Can Harm Your Kidneys
Diabetes damages the microscopic tubes that travel through your kidneys. These tiny tubes are responsible for filtering your blood of toxic nitrogen-containing compounds. These are the compounds that produce urine and eliminate it from your body. When this damage happens to the kidney tubes, they become leaky and protein can seep into your urine. These proteins, called albumin, can be measured in the urine, and detection can be a real indicator that you are unhealthy.
The Centers for Disease Control and Prevention (CDC) reports more than 35% of people living with diabetes have chronic kidney disease.
Lifestyle Changes Reduce Your Risk
A 2014 study published in Lancet Diabetes & Endocrinology assessed the effectiveness of lifestyle interventions to help control kidney disease. The researchers took 5,000 adult subjects living in the United States with type 2 diabetes. The subjects were all overweight. Participants were placed into one of two groups. The first group received their regular care, which consisted of diabetes support and education, while the other group received a combination of a weight-reduction diet and an exercise program.
During the first year of the trial, the group receiving weight-loss advice regularly met with a dietician, case manager and fitness professional to keep them on track. Although this study trial began in 2001, it continued until 2012.
The research team discovered that after one year, the diet and exercise group lost 8.6% of their total body weight in contrast to the control group which lost only 1% of their body weight.
When Intense Intervention Makes the Difference
The fact the control group did not experience an average weight increase throughout this period is surprising to say the least.
The important fact regarding this study was throughout the trial period, those who were in the weight-loss and exercise group were also 31% less likely to develop kidney disease as a consequence of their diabetes compared to the control group.
According to study author Dr. William Knowler, from the National Institute of Diabetes and Digestive and Kidney Diseases in Bethesda, Maryland, “This study indicates that an intense program of major behavioral change, including counseling, group session and mutual reinforcement can work.”
I feel his point is valid. It seems that while awareness is key, awareness alone isn’t enough to get the point across.
Diabetes education programs can’t just focus on lifestyle and strategy. What’s required is an intense intervention program to give more personalized support geared to individual lifestyle dynamics and unique challenges. The aim is to make sure the person with diabetes doesn’t develop a severe or life-threatening complication such as kidney disease.
Dr. Kevin J. McLaughlin has degrees in nutrition, physical education, and is a certified strength and conditioning specialist with an interest in anti-aging medicine. He’s also a chiropractor with 27 years of clinical experience. He has also spent time studying health promotion and the effect that health education has on health outcomes.
This article originally appeared on Foods4BetterHealth.com | <urn:uuid:1b758f0b-7bfb-42fb-961c-ddb9a6a2713e> | {
"date": "2018-07-15T19:00:30",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676588961.14/warc/CC-MAIN-20180715183800-20180715203800-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9590922594070435,
"score": 2.65625,
"token_count": 763,
"url": "http://ad-test.thirdage.com/diabetes-complication-you-didnt-see-coming/"
} |
The prohibited grounds are the protected categories listed under the Ontario Human Rights Code, which are: race, ancestry, place of origin, colour, ethnic origin, citizenship, creed, sex, sexual orientation, gender identity, gender expression, age, record of offenses*, marital status, family status, and disability.
*The prohibited ground identified as record of offenses is limited only to discrimination of employment.
Where harassing or discriminatory behaviour are severe and/or pervasive and cause unreasonable interference to a person's study or work environment, they may be deemed to create a poisoned environment. A poisoned work or learning environment is one that is intimidating, hostile, and/or offensive.
Although a person may not be the target of the behaviours, a person may feel the effects of certain harassing or discriminatory behaviours at their place of work or study. Depending on the nature of the comments of conduct, one instance may be sufficient to create a poisoned environment for a specific employee or student, or group of employees or students.
What is Discrimination?
Discrimination means treating people differently, negatively or adversely because of their race, sex, colour, ancestry, place of origin, ethnic origin, marital status, same sex partner status, sexual orientation, age, disability, citizenship, family status or religion.
Direct discrimination describes an act, behaviour, or practice of treating a person unequally on the basis of a prohibited ground.
Systemic discrimination, referred to as "constructive discrimination" in the Human Rights Code, is most commonly known as systemic discrimination because it is inherent in, or the result of, the organization's informal or formal policies, practices, or procedures. IT occurs when a requirement, qualification, or factor results in the exclusion, restriction, or preference of a group identified by a prohibited ground.
What is Harassment?
Harassment is defined in Ontario’s laws as "engaging in a course of vexatious comment or conduct that is known or ought reasonably to be known to be unwelcome”. Generally, these comments or conduct must be related to one of the prohibited grounds. The person responsible knows or ought reasonably to know that the remarks or behaviours are unwanted, unwelcome, offensive, intimidating, hostile, or inappropriate. Harassment does not include interpersonal conflict or disagreement or the proper exercise of performance evaluation, managerial direction, or performance or attendance management.
One remark or gesture would not normally be considered a "course of conduct". However, persistent and frequent comments are not necessary for there to be a violation of policy 6.1 Prevention of Harassment and Discrimination.
Workplace harassment is engaging in course of vexatious comment or conduct against a worker in a workplace that is known or ought reasonably known to be unwelcome. The conduct need not be based on the prohibited grounds.
Sexual harassment is a course of unwanted remarks, behaviours, or communications of a sexually oriented nature and/or a course of unwanted remarks, behaviours, or communications based on gender. The person responsible for the remarks, behaviours, or communications knows or ought reasonably to know that these are unwelcome. Sexual harassment may also include unwanted attention or remarks of a sexually oriented nature or unwelcome remarks based on gender which are not of a sexual nature, but which are demeaning or degrading.
Sexual Solicitation and Reprisal
Every member of Laurier has a right to freedom from sexual solicitation or advance by a person in a position to confer, grant, or deny a benefit or advancement, where that person knows, or ought reasonably to know, that such a solicitation or advance is unwelcome. Sexual solicitation or sexual advance includes an implied or expressed promise or reward for complying with a sexually oriented request made by a person in position to confer, grant, or deny a benefit or advancement.
Every member of the Laurier community has the right to be free from reprisal or threat of reprisal for rejecting a sexual solicitation or advance, where the reprisal is made, or threatened by, a person in a position to confer, grant, or deny a benefit or advancement.
When an individual has power over another, decision making can be impacted and mutual consent may be called into question should a complaint of harassment and/or discrimination arise either during or after a relationship has ended.
Ontario’s Human Rights Commission.
You may wish to visit the OHRC website for further information on your rights and details regarding prohibited grounds for discrimination or harassment: http://www.ohrc.on.ca | <urn:uuid:89703fd5-f078-4845-9d2b-c1450feae8fe> | {
"date": "2017-06-22T20:23:46",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9256103038787842,
"score": 3.3125,
"token_count": 902,
"url": "https://legacy.wlu.ca/page.php?grp_id=948&p=22336"
} |
Explanation: In recent days, children would cross their fingers when they lie to avoid punishment for telling a lie. Another way this is used is to cross the fingers while making a promise to invalidate the promise. Christians used the gesture of crossing fingers to recognize one another in times of persecution. Therefore, people cross their fingers wishing for good luck from God.
Learn English speaking much FASTER by downloading the TalkEnglish Offline Package and submerge yourself with over 8,000 audio files and over 800 pages of lessons! Then you can study without Internet connection and also listen to audio files using your MP3 player at any time. Go to the English Download page and download today! | <urn:uuid:8d05decf-838a-4ef7-bfbc-c8bb404c190a> | {
"date": "2018-04-21T23:19:35",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945459.17/warc/CC-MAIN-20180421223015-20180422003015-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9278057217597961,
"score": 2.765625,
"token_count": 138,
"url": "http://www.talkenglish.com/lessondetails.aspx?ALID=798"
} |
Real World Applications – Algebra I
How can we make enough chocolate chip cookies for an exact amount of people with only one recipe?
In this individual activity, you’re going to calculate how much of everything we need in order to make enough cookies for a lot of people. For the sake of this activity, we’re going to use Algebra for you to figure out how much of each ingredient we need to feed everyone in your class, classes (if you have more than one class), the whole grade level, and your whole school.
First, let’s start with the recipe. The recipe for the “best” chocolate chip cookies is found here: http://allrecipes.com/recipe/best-chocolate-chip-cookies/
First, let’s dig into what the recipe’s telling us. How many cookies does this recipe give us? Will it be enough for a classroom of students and teachers, assuming each person will eat two cookies?
Let’s say that some of the other teachers at your school want you to make cookies for their classes too. We want to quadruple the recipe. How much of each ingredient will you need, if you now need to bake cookies for 150 students (or more, depending on the school you attend)?
If there are 450 students in the whole school, what is the scale factor, or the multiplier, for each ingredient?
Well, if we are trying to give cookies for 450 people, that’s 900 cookies that we need to bake. That means we need a multiplier of 19 to make sure that everyone will get at least one. That means we’ll need 19 cups of butter, 19 cups of white sugar, 19 cups of brown sugar, 38 eggs, 38 teaspoons of vanilla extract, 57 cups of flour, 19 teaspoons of baking soda, 38 teaspoons of hot water, and 9.5 teaspoons of salt, 38 cups of chocolate chips, and 19 cups of chopped walnuts. That’s a lot of ingredients!
One thing most people do NOT want to do is to measure and count 19 cups of any ingredient. There’s an easier way! By using conversions!
First, let’s look at how much flour we need. 1 cup of flour is 8 ounces, and 1 pound of flour is 16 ounces. If each bag of flour is 5lbs, then we can get about 10 cups of flour per bag. Since we need 57 cups of flour, we should have 6.5lb bags of flour. Measuring 7 cups of flour is better than measuring 57 cups of flour! See below on how we used conversions to find how many cups of flour are in one 5lb bag:
The ounces units “cancel” in both the numerator and the denominator, and so the units of “pounds of flour,” so the units left are “cups of flour.” Using arithmetic, we multiply the numerators and divide by the denominator.
We can also use proportions to find out how many bags of flour we need for our recipe. From our calculations above, we know that 10 cups of flour are in one bag. What if we have 57 cups of flour? See below:
Using the method described in the concept, we now have . Divide both sides by 10, so . This means that we’ll need 5.7 bags of flour. But, of course, when we’re making 450 cookies, we will realistically get 6 bags of flour, use 5 whole bags for the recipe and measure 7 cups out of the sixth bag.
Applying our knowledge of mixed numbers, we can also represent the amount of flour needed as bags of flour, or bags of flour. Which representation do you think would be more useful for measuring and baking?
Try doing the same for the other ingredients. Here’s some helpful information, but you might not need all of it. Some of the conversions are here because big bags of some ingredients are given by weight (i.e. in pounds), instead of measurement. You might also want to apply your understanding of mixed numbers to clearly figure out fractions of certain ingredients.
For butter: . Butter is usually sold in packages of 4 sticks of 8tbsp each.
For white sugar: . White sugar is usually sold in 5lb bags.
For brown sugar: . Brown sugar is usually sold in 2lb bags.
For eggs: Eggs are usually sold in packages of 12 or 18.
For vanilla extract: , . Small bottles of vanilla extract are usually sold in 8 fluid ounce bottles.
For baking soda: . Baking soda is usually sold in 8oz and 1lb boxes.
Now that we’ve figured out how to make a really big batch of cookies, how would we figure out how to make a really small batch of cookies? The recipe on the website given yields 4 dozen cookies, or 48 cookies. What if we want one dozen cookies?
If we want one dozen cookies, we would divide all of the measurements by 4.
What if we wanted to only make 10 cookies with no leftovers? How could we alter the recipe?
Let’s use a conversion, or a scale factor. We know that the recipe gives us 48 cookies, but we only want 10 cookies. We can divide 10 by 48 and simplify the fraction, since it’s best to use measurements for cooking with fractions. . Now that we have our factor, we can multiply every measurement by this fraction to find our new measurements.
As you continue finding the other ingredients’ measurements, what do you notice?
How can wet get cup of butter? How can we get of one egg?
What unit fractions are close to ? What unit fractions is close to ? Do you think we can use , or of a cup for some of these ingredients? Do you think we can use or of an egg instead of of an egg?
What do you think the benefits are from changing the amount of some of the ingredients? What are some of the drawbacks?
Do you think it would be easier to make a dozen cookies instead?
What if we don’t have all of the measuring tools we need? What if you only had certain measuring tools?
Try finding a favorite family recipe and calculate how much of each ingredient you will need to make enough for your entire school. You might need the internet to help you with conversions with different measurements in weight and volume. | <urn:uuid:ec4dc2a9-44a7-4351-b7b2-f0f0438e125f> | {
"date": "2015-05-27T06:45:49",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928907.65/warc/CC-MAIN-20150521113208-00079-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.93746417760849,
"score": 3.40625,
"token_count": 1343,
"url": "http://www.ck12.org/algebra/Dimensional-Analysis/rwa/Baking-Cookies/r2/"
} |
Gurbani Kirtan or Shabad Kirtan simply Kirtan refers to Sikh devotional music that originated in the Hindu tradition as loving songs sung to God. Kirtan is also one of the important aspects of Sikhism that refers to the singing of the Sacred Hymns from the Guru Granth Sahib accompanied by music. The Sikhs place huge value on this type of singing and a Sikh is expected to listen to and/or sing Guru-Kirtan as frequently as possible.
Traditionally the music used to accompany Kirtan has been Indian Classical Music, which is based on Ragas and taal (rhythmic beat patterns). Traditionally the Indian musical instruments the Harmonium and Tabla have been used for this type of music. The Sikh scripture contains 31 Ragas and 17 talas which form the basis for Kirtan musical compositions.
While most Hindus and Sikhs devoutly sing Kirtan in its more traditional form, there are smaller groups that experiment with incorporation of non-Indian instruments such as the guitar. Some have even interspersed Western themes like jazz into the mix.
The Guru has pronounced that Kirtan is the magical formula to keep the human soul afloat in the dark era of Kaljug provided the devotee sings the pure melodies with his or her heart closely focused on the meaning and true spirit of the Gurbani thus:
|ਕਲਜੁਗ ਮਹਿ ਕੀਰਤਨੁ ਪਰਧਾਨਾ ॥ ਗੁਰਮੁਖਿ ਜਪੀਐ ਲਾਇ ਧਿਆਨਾ ॥|
|Kaljug meh kīrṯan parḝẖĝnĝ. Gurmukẖ japīai lĝė ḝẖiĝnĝ.|
|In this Dark Age of Kali Yuga, the Kirtan of the Lord's Praises are most sublime and exalted. |
Become Gurmukh, chant and focus your meditation.
The Holy Sikh Scripture, Sri Guru Granth Sahib (“SGGS”) is the main spiritual authority for the Sikhs. The Sikhs hold unique high regards for their Granth (“scripture”), which is treated as a living Guru (“religious master”). When Kirtan is sung, the lyrics are normally lines from the SGGS.
The Shabads (“Hymns”) of the Sikh Scriptures are primarily arranged in Chapters, which are names of musical Ragas (“ musical theme”). So the main Sikh Holy Scripture is arranged in chapters that bear names of musical ragas. Each of these Ragas is unique and all the Shabads in that Chapter have to be sung in that particular Raga. The title of the Shabad also has a numeric notation, which many believe gives the singers a clear idea of the Tala or musical rhythm or beat that needs to be used for that hymn.
Below is the English Translation from page 14 of the SGGS:
- raag sireeraag mehlaa pahilaa 1 ghar 1. (Raag Siree Raag, First Section, First House:)
- If I had a palace made of pearls, inlaid with jewels,
- Scented with musk, saffron and sandalwood, a sheer delight to behold
- Seeing this, I might go astray and forget You, and Your Name would not enter into my mind. ||1||
You will notice that the Shabad begins with “Raag Sireeraag” – Siree Raga is an important raga in Indian Classical Music. Further you will notice that the first line ends with ‘ghar 1’ – this conveys to musicians, the Tala or musical beat or rhythms to be used for that Shabad.
Real Kirtan is performed through words, mind and actions.
The Sikh tradition of Kirtan-Gurmat Sangeet-started by Guru Nanak at Kartarpur in 1521 was strengthened by his successors and particularly by Guru Arjan at Amritsar. In spite of several interruptions, kirtan continued to be performed at the Golden Temple and other historical Gurdwaras with due attention to raga, taal and dhuni.
There are three types of Sikh musicians, all of which continued to flourish during the period of the Gurus:
Guru Nanak started the rababi tradition by engaging Bhai Mardana as his accompanist-musician. Formerly the Muslim singers were known as Mirasis, but Guru Nanak gave them a new name - rababis, because they played on the rabab (rebec) and adopted the Sikh way of life in food, dress and manners. Some of the notable rababis after Mardana were his son Shahjada. Balwand and Satta, Babak - son of Satta, Chatra - the son of Babak, and Saddu and Baddu - the rababis used to perform kirtan regularly at Amritsar before India was Partitioned in 1947. The last of the line of rababis was Bhai Chand whose kirtan the author had the privilege of listening to, before 1947. After the Partition of India, the rababis migrated to Pakistan, the line of rababis is almost dying out without Sikh patronage.
The second type of musicians, ragis, were the amateur singers whom Guru Arjan encouraged to perform kirtan in order to avoid dependence on professional rababis. Some of the bards (bhatts) at the Court of Guru Arjan, whose compositions are included in the Scripture, became ragis and did kirtan before the congregations at different centres. Early in the eighteenth century, Bhai Jassa Singh Ahluwalia - the great warrior-performed kirtan at Mata Sundri’s residence at Delhi, after the passing away of Guru Gobind Singh.
Kirtan at the Golden Temple, Amritsar, was discontinued (on account of the persecution and atrocities of Muslim rulers) for many years in the eighteenth century. When the Sikh missals (confederacies) obtained control of Amritsar, kirtan was restarted at the Golden Temple. Bhai Mansa Singh ragi performed kirtan at the Golden Temple during the regime of Maharaja Ranjit Singh. Bhai Sham Singh Adanshabi did kirtan at the Golden Temple for more than seventy years. Outside Amritsar, Sant Attar Singh, Bhai Sujan Singh, Bhai Randhir Singh and his groups proved to be devoted kirtaniyas who did commendable missionary work.
The ragi group generally consists of three persons: one plays the tabla or jori (pair of drums) seldom participating in the singing; the other plays the harmonium, and the third plays a stringed instrument or harmonium or cymbals. The leader of the group sits in the centre and the group is known by his or her name. Even today, ragi-groups are employed by the Shromani Gurdwara Parbandhak Committee to perform kirtan in relays at the Golden Temple and at some historic Gurdwaras in the Punjab. Some of the travelling ragi-parties continue to perform kirtan in different parts of the world where there is a concentration of Sikh residents. Some groups of American Sikhs are particularly devoted to kirtan and sing hymns every morning in their Ashrams or in the local Gurdwara on holidays.
Guru Hargobind first employed the third types of musicians called dhadhis early in the seventeenth century. He instructed them to sing heroic ballads (vaars) in his court to inspire the Sikhs to acts of valour and heroism. Bhai Abdulla - expert in playing the Sarangi, and Bhai Natha - player of dhadh (a small hand-drum) were quite popular. As the clash with tyrannical Muslim rulers appeared imminent the dhadhi-groups performed before the sangat and groups of Sikh soldiers. These groups subsequently became very popular all over the Punjab on account of the use of folk tunes and their zealous and emotional style of singing. These folk singers had hardly any knowledge of Hindustani classical music, but their appeal to the masses was irresistible. A dhadhi group consists of two or three singers, one playing on the sarangi, another playing on the dhadh, and the third may be their leader, discoursing on the contents of their songs. Though they are expected to sing vaars of the Scripture, they usually sing their own poetic compositions on the daring exploits of Sikh warriors and martyrs. One of the famous dhadhi-jathas was that of Bhai Kishen Singh Kartor. Sohan Singh Seetal is also a well-known dhadhi.
The tradition of kirtan developed over the period of the ten Gurus is as follows:
- Hymns from the following compositions only are permitted in kirtan: Adi Granth, Dasam Granth, vaars and kabits of Bhai Gurdas, Bhai Nandlal’s poems.
- The kirtan-group is generally seated on the right side of the palki of Guru Granth Sahib. No special seats or cushions are provided for the singers. However, in big diwans (Assemblies), the use of platform or dais is allowed, provided it is lower than the palki (seat) of Guru Granth Sahib. This is done to enable the ragis and the congregation to have full view of one another.
- In the morning, kirtan of entire Asa-di-var (24 chhants, salokas and pauris) is completed. The singing of Asa-di-var is not to be interrupted by katha (exposition of a random hymn read from the Scripture) or lecture.
- Appropriate compositions of Gurbani are sung at certain functions. For example at the time of Anand Karaj (Sikh Wedding) Lavan, Anand and suitable shabads ar sung. At the funeral of a Sikh, appropriate shabads relating to death are sung. Kirtan Sohila is recited before cremating the dead body.
- Every hymn should be sung in the indicated raga and tala. The singer should use the appropriate laya, tan and palta. However, he must not forget the rasa and the appropriate ethos, mood and spirit of the hymn.
- Vars should be sung as indicated in the Scripture. For example Gauri var should be sung in Gauri raga, Ramkali var in Ramkali raga, with appropriate dhuni if indicated.
- Display of musical skill and excess of alaap and tan are not permitted, as they tend to make the minds of singers and listeners mercurial and unstable.
- Correct pronunciation and intonation of Gurbani is essential so that the audience may understand the wording and the meaning of the hymn. The singer is not supposed to introduce any words of his own or make interpolations in Gurbani . The use of extra words like ha, ji, wahwah, piyara, etc., is against the spirit of Gurmat.
- The raga-technique and the sounds of instruments are subordinated to the singing of the hymn. What is brought out prominently by the musician is the Gurbani and its rasa, and not the musical expertise. Parallel quotations (parmans) to illustrate the theme are permitted during the kirtan.
- Any hymn that has been commenced should be completed. Lack of time is no reason for stopping the singing of a hymn before it is finished.
- No kirtan is permitted during Akhand Path (continuous reading of the Scripture).
- The listeners should not make offerings (donations) to the musicians while the kirtan is in progress. Offerings can be made at the end of the kirtan. The best way is one followed by Sufi Congregations, where the listeners make the offerings to the president of the function or the organiser who respectfully hands over the collections to the leader of the music-group at the conclusion of the function. No ragi should interrupt his kirtan to acknowledge a donation or offering, nor should he mention the name of the donor. He should make a collective acknowledgement of the offerings at the end of the kirtan. This procedure is in accordance with Resolution No. 5 dated 2nd January 1976 of the Kirtan Sub-Committee of the Shromani Gurdwara Parbandhak Committee, Amritsar. It is absolutely forbidden to interrupt the performance of any kirtan to praise a donor or office-bearer of the Gurdwara or a distinguished visitor by name, as it is against Gurmat (Guru’s instructions).
Ragas in Kirtan
Ragas have a direct relationship to human moods and the following are the connections between Ragas and feeling:
- 1. Soohi - joy and separation
- 2. Bilaaval - happiness
- 3. Gaund - strangeness, surprise, beauty
- 4. Sri - satisfaction and balance
- 5. Maajh - loss, beautification
- 6. Gauri - seriousness
- 7. Aasa - making effort
- 8. Gujri - satisfaction, softness of heart, sadness
- 9. Devgandhari - no specific feeling but the Raag has a softness
- 10. Bihaagra - beautification
- 11. Sorath - motivation
- 12. Dhanasari - inspiration, motivation
- 13. Jaitsree - softness, satisfaction, sadness
- 14. Todi - this being a flexible Raag it is apt for communicating many feelings
- 15. Bhairaagi - sadness, (Gurus have, however, used it for the message of *Bhakti)
- 16. Tilang - this is a favourite Raag of Muslims. It denotes feeling of beautification and yearning.
- 17. Raamkali - calmness
- 18. Nat Narayan - happiness
- 19. Maali Gaura - happiness
- 20. Maaru - giving up of cowardice
- 21. Tukhari - beautification
- 22. Kedara - love and beautification
- 23. Bhairav - seriousness, brings stability of mind
- 24. Basant - happiness
- 25. Sarang - sadness
- 26. Malaar - separation
- 27. Jaijawanti - viraag
- 28. Kalyaan - Bhakti Ras
- 29. Vadhans - vairaag, loss (that is why Alahniya is sung in this Raag when someone passes away)
- 30. Parbhati - Bhakti and seriousness
- 31. Kaanra - Bhakti and seriousness
Taals in Kirtan
In connection with Tala or musical beats/rhythms and the ‘Ghar’ in the SGGS, the following can be concluded.
- GHAR 1 - DADRA TAAL (There are 1 Taalis and the Beat has 6 Maatraas)
- GHAR 2 - RUPAK TAAL (There are 2 Taalis and the Beat has 7 Maatraas)
- GHAR 3 - TEEN TAAL (There 3 Taalis and the Beat has 16 Maatraas)
- GHAR 4 - CHAAR TAAL (There are 4 Taalis and the Beat has 12 Maatraas)
- GHAR 5 - PUNJ TAAL (There are 5 Taalis and the Beat has 15 Maatraas)
- GHAR 6 - KHUT TAAL (There are 6 Taalis and the Beat has 18 Maatraas)
- GHAR 7 - MUT TAAL (There are 7 Taalis and the Beat has 21 Maatraas)
- GHAR 8 - ASHT MANGAL TAAL (There are 8 Taalis and the Beat has 22 Maatraas)
- GHAR 9 - MOHINI TAAL (There are 9 Taalis and the Beat has 23 Maatraas)
- GHAR 10 - BRAHAM TAAL (There are 10 Taalis and the Beat has 28 Maatraas)
- GHAR 11 - RUDRA TAAL (There are 11 Taalis and the Beat has 32 Maatraas)
- GHAR 12 - VISHNU TAAL (There are 12 Taalis and the Beat has 36 Maatraas)
- GHAR 13 - MUCHKUND TAAL (There are 13 Taalis and the Beat has 34 Maatraas)
- GHAR 14 - MAHASHANI TAAL (There are 14 Taalis and the Beat has 42 Maatraas)
- GHAR 15 - MISHR BARAN TAAL (There are 15 Taalis and the Beat has 47 Maatraas)
- GHAR 16 - KUL TAAL (There are 16 Taalis and the Beat has 42 Maatraas)
- GHAR 17 - CHRCHARI TAAL (There are 17 Taalis and the Beat has 40 Maatraas)
Quotes from Gurbani
The Sikh Gurus gave huge importance to Kirtan and this can be concluded from the following Shabads.
On 107 to 108 Guruji says that illnesses of countless lives are eroded by singing Kirtan, thus:
- Your humble servant, who obtains the Medicine of the Naam, is rid of the illnesses of countless lifetimes and incarnations.
- So sing the Kirtan of the Lord’s Praises, day and night. This is the most fruitful occupation. ||3||
On page 178, Guruji says that mind becomes peaceful when Kirtan is sang -
- Singing the Kirtan of His Praises, my mind has become peaceful;
- the sins of countless incarnations have been washed away.
- I have seen all the treasures within my own mind;
- why should I now go out searching for them? ||2||
On Page 196, Guruji says, Kirtan can only be sung by good fortune, thus:
- By great good fortune, the Kirtan of the Lord`s Praises are sung.
- O Supreme Lord God, as You give, so do I receive. ||1||Pause||
On Page 199, the SGGS advices that Kirtan keeps the mind awake and alert:
- Do only that, by which no filth or pollution shall stick to you.
- Let your mind remain awake and aware, singing the Kirtan of the Lord`s Praises. ||1||Pause||
On page 208, Guruji tells us those whose hearts are alight with God, sing Kirtan:
- Between the Lord and His Saint, there is no difference at all. Among hundreds of thousands and millions, there is scarcely one humble being.
- Those whose hearts are illuminated by God, sing the Kirtan of His Praises night and day with their tongues. ||3||
Also on the same page, Guruji says that ‘Kirtan is my treasure’:
- To sing the Kirtan of the Lord`s Praises is my treasure. ||1||Pause||
- You are my delight, You are my praise. You are my beauty, You are my love.
- O God, You are my hope and support. ||1||
On page 214 Guruji tell us that by singing Kirtan we will be saved, thus:
- As the Guru has taught me, so have I spoken.
- Says Nanak, listen, people: sing the Kirtan of the Lord`s Praises, and you shall be saved. ||4||1||158||
On page 297, Guruji tells us that even death is overcome by singing Kirtan:
- One is saved from hell, suffering is destroyed, countless pains depart, death is overcome, and one escapes the Messenger of Death, by absorption in the Kirtan of the Lord`s Praises.
- Fear departs, and one savors the Ambrosial Nectar, imbued with the Love of the Formless Lord.
'On page 322, Guruji says ‘lives of those who sing Kirtan are approved’, thus:
- Those who are attached to the hem of the Lord`s robe, do not suffer birth and death.
- Those who remain awake to the Kirtan of the Lord`s Praises - their lives are approved.
Guruji on page 363 tell us by singing Kirtan, Naam (God’s remembrance) is instilled in the mind thus:
- Without the Shabad, no one is approved.
- Singing the Kirtan of the Lord`s Praises, the Naam abides within the mind.
- He Himself gives His gifts, without hesitation. ||2||
Guruji on page 454 tell us that all sins and sorrows depart when Kirtan is sang:
- Sing the Kirtan, the Praises of the Lord of the Universe, and all sins and sorrows shall depart.
- Says Nanak, chant the Hymns of the Lord, the Lord of the Universe, O mind, and enshrine love for the Lord; love the Lord this way in your mind. ||1||
On Page 642, Guruji tells us that singing Kirtan is the ‘highest of all actions’ that we can perform:
- Singing the Kirtan of the Lord`s Praises in the Saadh Sangat, the Company of the Holy, is the highest of all actions.
- Says Nanak, he alone obtains it, who is pre-destined to receive it. ||8||
Guruji on Page 683 tell us clearly that ‘All desires, power, pleasure, joy and lasting bliss’ are found by singing Kirtan:
- All desires, power, pleasure, joy and lasting bliss, are found by chanting the Naam, the Name of the Lord, and singing the Kirtan of His Praises.
- That humble servant of the Lord, who has such karma pre-ordained by the Creator Lord, O Nanak - his efforts are brought to perfect fruition. ||2||20||51||
On page 1300, Guruji say by singing Kirtan, all Evil-mindedness is removed:
- Whoever speaks and listens to the Kirtan of the Lord`s Praises is rid of evil-mindedness.
- All hopes and desires, O Nanak, are fulfilled. ||2||1||12||
On Page 1337, Guruji advises us that singing Kirtan is equal to bathing at 68 sacred holy places, thus:
- Listen, O mind: the Kirtan of the Lord`s Praises is equal to bathing at the sixty-eight sacred shrines of pilgrimage.
- Listen, O mind: as Gurmukh, you shall be blessed with honor. ||1||
On page 1356, Guruji tell us how by singing Kirtan, the entire world and Pride, Attachment, Greed, Anger and Lust (PAGAL, the five thieves) are conquered, thus:
- They walk fearlessly through the armies of their enemies; they attack them with the Kirtan of God`s Praises.
- They conquer the entire world, O Nanak, and overpower the five thieves. ||29||
And finally, on page 1075 to 1076 Guruji tell us that in this era of the ‘Kal Juug’ Kirtan is supreme, thus:
- In this Dark Age of Kali Yuga, the singing of Kirtan (Lord’s Praises) is the most dominating force.
- Become Gurmukh, chant and focus your meditation.
- You shall save yourself, and save all your generations as well. You shall go to the Court of the Lord with honor. ||6||
- Kirtan videos
- Listen to Kirtan and Read the Shabad
- Sikh Ragas
- Feelings Of Ragas
- Timings For Gurbani Raag
- Sikh Kirtan
- Kirtan websites
- Listen to Shabad-Kirtan at Gurbani.gurmeet.info
- Sikh Sangeet - Shabad Gurbani Kirtan
- Gurbani from Sikhnet.com
- Live Kirtan from Harmindar Sahib by Sikh.net
- Bhai Harjinder Singh
- Information from India4World.com
- Bhai Amrik Singh Zakhmi
- Bibi Kamaljit Kaur
- Keertan.Org Audio and Video Database
- Kirtan with a bilingual message.
- Sikh Music Heritage Institute
|Kirtan:||Raga · Taal · Ragmala · Classical Music · Sangeet · Dhuni · Divan · Asa di Var · Jatha · Simran · Shabad · Tuk · Rababi · Dhadhi|
|Ragas:||Asa · Bairari · Basant · Bhairon · Bihagara · Bilaval · Devagandhari · Dhanasari · Gauri · Gond · Gujari · Jaijavanti · Jaitsri · Kalian · Kanara · Kedara · Maajh · Malaar · Mali Gaura · Maru · Nat Narain · Prabhati · Ramkali · Sarang · Sri · Sorath · Suhi · Tilang · Todi · Tukhari · Vadahans|
|Ragis:||Harjinder Singh · Maninder Singh · Amolak Singh · Darshan Singh · Balwinder Singh · Harbans Singh · Anoop Singh · Niranjan Singh · Amrik Singh · Avtar Singh · Snatam Kaur ·Kamaljit Kaur · Dileep Kaur · Joginder Singh · SS Maskeen|
|Saaj:||Harmonium · Tabla · · Tanpura · Taus · Rabab · Sarangi · Dilruba · · Saranda · Sarode · Sitar · Santoor · Pakhawaj · Dhadh · Dholak · Dool|
|Gurus:||Nanak Dev | Guru Angad | Amar Das | Ram Das | Guru Arjan | Har Gobind | Har Rai | Har Krishan | Tegh Bahadur | Gobind Singh | Guru Granth Sahib | Sikh Bhagats|
|Philosophy:||Sikh Beliefs | Simran | Sewa | Beliefs and Principles | Underlying Values | Prohibitions | Technique and Methods | Other observations | Technique and Methods|
|Practices:||Ardas | Amrit Sanskar | Chardi Kala | Dasvandh | Five Ks | Kirat Karni | Kirtan | Langar | Naam Japna | Simran | Three Pillars | Vand Chakna | Five Evils | Five Virtues|
|Scripture:||Guru Granth Sahib | Sikh Scripture | Dasam Granth | Ek Onkar | Waheguru | Bani | Mool Mantar | Japji Sahib | Jaap Sahib | Chaupai | Anand Sahib | Tav-Prasad Savaiye | Rehras | Sukhmani|
|More:||History | Gurdwaras | Harmandir Sahib | Khalsa | Khanda | Names | Places | News | Satguru | Sikhs | Bhagat Farid | Bhagat Kabir | Websites | Biographical | Terms| | <urn:uuid:7259f981-2c6f-4a58-8732-c1e50f5f6e2e> | {
"date": "2016-07-23T09:08:14",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257821671.5/warc/CC-MAIN-20160723071021-00056-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8942237496376038,
"score": 3.546875,
"token_count": 5991,
"url": "http://www.sikhiwiki.org/index.php/Kirtan"
} |
Date of Award
Doctor of Philosophy
Apparel, Events and Hospitality Management
Susan W. Arendt
School foodservice operations make up a large portion of the non-commercial foodservice industry. The number of Farm to school (FTS) programs has increased considerably within the school foodservice industry and provide opportunities to source ingredients locally. Due to the Healthy Hunger Free Kids Act, school foodservice employees are faced with the challenge of providing increased amounts of produce to students. FTS programs are being used to help meet this challenge. This study focused on identifying barriers and keys to success when using local produce from FTS programs as well as identifying and assessing differences between barriers and keys to success based on geographic location, and school lunch participation rates.
Interviews and a questionnaire were used to identify barriers and keys to success. Barriers identified through interviews included appearance, shelf life, service to students, and availability. Keys to success included exposure and support, service, and employee motivation. In the questionnaire, a five point Likert-type scale (1= strongly disagree to 5= strongly agree) was used to assess participants' agreement to statements about barriers and keys to success. The barrier items with the highest mean scores were "local produce has a different appearance than non-local produce" (M= 3.67), "the quality of local produce is better than non-local produce" (M=3.61), and "local produce is less available than non-local produce (M= 3.34)". Keys to success with the highest mean scores included "staff encouraging students to try local produce" (M= 4.15), "exposing students to local produce consistently" (M= 4.08), and "presenting local produce attractively to students" (M= 4.08).
Mean scores of agreement toward barriers and keys to success were compared to identify differences between barriers and keys to success based on geographic location and school lunch participation rates. Significant differences based on geographic location and school lunch participation rates were identified at the p<.05 level. There were no significant differences identified between keys to success based on school lunch participation rates. It is important for directors to understand the specific barriers and keys to success when implementing and maintaining FTS programs. Results from this study provide information that directors can use to help hourly employees overcome barriers through training and implementation of keys to success.
Nathan Merrill Stokes
Stokes, Nathan Merrill, "Investigating barriers and keys to success when implementing and maintaining farm to school programs: Perspectives of hourly school foodservice employees" (2014). Graduate Theses and Dissertations. 13657. | <urn:uuid:c1ad124b-3a2d-44e1-98e6-b1c9bccdd63d> | {
"date": "2018-04-25T02:55:44",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947690.43/warc/CC-MAIN-20180425022414-20180425042414-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9387492537498474,
"score": 2.703125,
"token_count": 539,
"url": "https://lib.dr.iastate.edu/etd/13657/"
} |
Decarboxylation is a chemical reaction that removes a carboxyl group and releases carbon dioxide (CO2). Usually, decarboxylation refers to a reaction of carboxylic acids, removing a carbon atom from a carbon chain. The reverse process, which is the first chemical step in photosynthesis, is called carboxylation, the addition of CO2 to a compound. Enzymes that catalyze decarboxylations are called decarboxylases or, the more formal term, carboxy-lyases (EC number 4.1.1).
In organic chemistry 1
- Protodecarboxylation 1.1
- In biochemistry 2
- Case studies 3
- References 4
In organic chemistry
The term "decarboxylation" literally means removal of the COOH (carboxyl group) and its replacement with a proton. The term simply relates the state of the reactant and product. Decarboxylation is one of the oldest organic reactions, since it often entails simple pyrolysis, and volatile products distill from the reactor. Heating is required because the reaction is less favorable at low temperatures. Yields are highly sensitive to conditions. In retrosynthesis, decarboxylation reactions can be considered the opposite of homologation reactions, in that the chain length becomes one carbon shorter. Metals, especially copper compounds, are usually required. Such reactions proceed via the intermediacy of metal carboxylate complexes.
Decarboxylation of aryl carboxylates can generate the equivalent of the corresponding aryl anion, which in turn can undergo cross coupling reactions.
Alkylcarboxylic acids and their salts do not always undergo decarboxylation readily. Exceptions are the decarboxylation of beta-Barton decarboxylation, Kolbe electrolysis, Kochi reaction and Hunsdiecker reaction are radical reactions. The Krapcho decarboxylation is a related decarboxylation of an ester. In ketonic decarboxylation a carboxylic acid is converted to a ketone.
Protodecarboxylations involve the conversion of a carboxylic acid to the corresponding hydrocarbon. This is conceptually the same as the more general term "decarboxylation" as defined above except that it specifically requires that the carboxyl group is, as expected, replaced by a proton. The reaction is especially common in conjunction with the malonic ester synthesis and Knoevenagel condensations. The reaction involves the conjugate base of the carboxl group, a carboxylate ion, and an unsaturated receptor of electron density, such as a protonated carbonyl group. Where reactions entail heating the carboxylic acid with concentrated hydrochloric acid such a direct route is impossible as it would produce protonated carbon dioxide. In these cases, the reaction is likely to occur by initial addition of water and a proton.
- tryptophan to tryptamine
- phenylalanine to phenylethylamine
- tyrosine to tyramine
- histidine to histamine
- serine to ethanolamine
- glutamic acid to GABA
- lysine to cadaverine
- arginine to agmatine
- ornithine to putrescine
- 5-HTP to serotonin
- L-DOPA to dopamine
Other decarboxylation reactions from the citric acid cycle include:
- pyruvate to acetyl-CoA (see pyruvate decarboxylation)
- oxalosuccinate to α-ketoglutarate
- α-ketoglutarate to succinyl-CoA.
Upon heating, Δ9-Tetrahydrocannabinolic acid decarboxylates to give the psychoactive compound Δ9-Tetrahydrocannabinol. In beverages stored for long periods, very small amounts of benzene may form from benzoic acid by decarboxylation catalyzed by the presence of vitamin C. The addition of catalytic amounts of cyclohexenone has been reported to catalyze the decarboxylation of amino acids. However, using such catalysts may also yield an amount of unwanted by-products.
- Richard H. Wiley and Newton R. Smith. "m-Nitrostyrene".
- http://www.chem.ucalgary.ca/courses/350/Carey5th/Ch19/ch19-3-4.html Decarboxylation, Dr. Ian A. Hunt, Department of Chemistry, University of Calgary
- Jim Clark (2004). "The Decarboxylation of Carboxylic Acids and their Salts". Chemguide. Retrieved 2007-10-22.
- "Malonic Ester Synthesis". Organic Chemistry Portal. Retrieved 2007-10-26.
- "Does marijuana have to be heated to become psychoactive?".
- http://www.erowid.org/archive/rhodium/chemistry/tryptophan.html Tryptamine from Tryptophan | <urn:uuid:de6beb6a-1486-4631-85e7-35f2e9938ad7> | {
"date": "2019-04-20T14:24:30",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529839.0/warc/CC-MAIN-20190420140859-20190420162859-00496.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8916878700256348,
"score": 3.796875,
"token_count": 1104,
"url": "http://worldheritage.org/articles/eng/Decarboxylation"
} |
Your plane tickets are purchased, accommodations are organized, and passport is squared away. You’re almost ready for a trip abroad. But depending on where you’re traveling, your health, and your planned activities, you may want to see a doctor before you take off.
Every destination has unique health risks and may be home to infections that your immune system hasn’t encountered before.
A 2016 review in the New England Journal of Medicine said depending on the destination, 22 percent to 64 percent of people report some illness during international travel. Most of these illnesses were mild, such as diarrhea, respiratory infections and skin disorders. But some returned with potentially life-threatening infections.
Depending on the destination, up to 64% of travelers return with some illness. via @MedStarWHC
But you can prevent much of this discomfort with a pre-international travel consultation with a travel medicine specialist. The appointment usually takes 30 minutes, during which time we’ll:
- Discuss where you’re going, the length of the trip and the activities in which you’ll participate
- Evaluate your health, including whether you’re up-to-date with all vaccinations
- Provide education on topics such as insect, food and water safety.
Based on this information, we can advise you on how to prevent illnesses specific to your destination. This may include travel vaccinations or preventive antibiotics.
Who should get a pre-international travel consultation?
Not everyone leaving the country needs a pre-international travel consultation with a travel medicine specialist. Many factors come into play, but in general, see your doctor if you are:
- Going to a developing country
- Taking part in high-risk or adventure activities
- Are pregnant or planning to become pregnant
- Have pre-existing conditions or are immunocompromised
- Traveling with children
If you grew up in an area, moved away, and return for a visit, be aware that your childhood immunity may not protect you anymore. For example, malaria immunity wanes after a few years after exposure, so when you go back, you may need a prescription for an anti-malaria drug. Researchers who authored an April 2017 study suspect a number of fatal bouts of malaria in the United States may be due to immigrants who returned to their home countries without taking proper precautions.
To learn about the specific health risks of your destination, go to the Centers for Disease Control and Prevention (CDC) and select the country you plan to visit.
See your doctor four to six weeks before your trip to ensure there is enough time to get any necessary vaccines or medications. Request an appointment for a pre-international travel consultation in our Travel Clinic or call 202-877-DOCS.
Illnesses we’re often concerned about during travel
With preparation, medication, vaccinations and some common sense, you can prevent many illnesses present in different parts of the world. Examples available vaccines that can reduce your risk of infection include Hepatitis A, Hepatitis B, typhoid and the meningitis vaccine. Depending on where you’re traveling, some of these vaccines may be recommended for you.
Malaria is a mosquito-borne illness that causes flu-like symptoms and can be life-threatening if not treated. Malaria is found in parts of Africa, Asia and South and Central America. Depending on your destination and what you plan to do there, we can give you an antimalarial drug to prevent the illness.
If you become sick while away from home, medical facilities could be scarce depending on where you are. It’s better to prevent malaria before it strikes.
Yellow fever also is a mosquito-borne virus. It’s found in tropical areas of South America and Africa and can range from a mild illness to causing severe liver disease.
You can get a vaccine to prevent yellow fever, and it may be required to enter certain countries. This vaccine is only available at designated vaccination centers, such as our Travel Clinic.
Other mosquito-borne illnesses
Zika virus, while not a big threat to most people, can cause devastating birth defects in unborn children. It’s been spreading through South and Central America and turned up in mosquitoes in Texas and Florida in 2016. There is no cure for Zika virus, although researchers are working on a vaccine. In the meantime, women who plan to become pregnant should avoid visiting these areas.
Japanese encephalitis, a rare but serious condition found in agricultural areas in Asia and parts of the western Pacific, also is transmitted through mosquito bites. You can get a vaccine for this disease before your trip.
Other illnesses that can be passed on by mosquitoes include dengue and chikungunya. Travelers should take steps to prevent mosquito bites, including:
- Using insect repellents that contain DEET.
- Wearing long-sleeved shirts and long pants in the evening.
- Sleeping under a mosquito bed net if window screens aren’t available.
Altitude sickness symptoms can start at 8,000 feet. That’s the elevation of the north rim of the Grand Canyon.
Altitude sickness is a result of exposure to low levels of oxygen and can cause symptoms such as headaches, loss of appetite, fatigue and poor sleep. Severe altitude sickness can be dangerous, affecting your lungs and brain.
If you plan to go above a certain altitude, we can give you medications to help prevent altitude sickness. It would be awful to spend a lot of money to travel somewhere and then spend most of the time with a headache.
You also can prevent or limit altitude sickness by drinking plenty of water, avoiding alcohol, resting often, and gaining elevation slowly to better adjust to the altitude.
How to avoid food-borne illnesses while traveling
Traveler’s diarrhea is a common gastrointestinal infection known by many names around the world, including Montezuma’s revenge and Delhi belly. Along with diarrhea, it can cause fever, abdominal cramps and bloating. Traveler’s diarrhea causes up to 40 percent of travelers to change their plans during a trip.
During your pre-international travel consultation, we’ll talk about how to avoid food-borne illnesses and maybe prescribe a short course of antibiotics to take in case you get sick. These medications usually can knock the illness out in about 12 hours.
Up to 40% of travelers change plans during a trip due to traveler’s diarrhea. via @MedStarWHC
I know part of the allure of traveling is trying local cuisine, and in general, this is fine. But there are a few things to think about regarding food, especially when visiting developing countries.
Food to avoid:
- Raw fruits and vegetables, such as salad. They may have been washed with unsafe water. If you can peel it yourself, it’s safe. This includes bananas and oranges.
- Raw or undercooked meat, seafood and eggs.
- Unpasteurized milk and cheeses.
- Food from street vendors.
Tips to ensure you drink safe water:
In developing countries, water may be contaminated by bacteria, parasites or viruses:
- Don’t drink tap water. Stick to bottled water.
- Ice often is made with tap water, so don’t use it in your drinks.
- Use bottled water when you brush your teeth.
- If bottled water is not available, boil your water for up to three minutes or use commercial iodine or chlorine tablets before drinking.
Contrary to popular belief, alcohol does not kill bacteria, so avoid alcoholic drinks with ice in them or throwing a splash of gin in your water to kill the germs.
People often have changes in bowel habits when they travel due to unfamiliar food and spices. However, we do want to avoid dysentery, which is characterized by bloody stool. If you have a fever, severe cramping and bloody stool, see a medical professional.
What to be aware of when you return from your trip
Just because you return home healthy doesn’t mean you can let your guard down. Symptoms for some illnesses, such as malaria and tuberculosis, can take several weeks to months to occur after returning from travel.
If you experience fever, weight loss or other abnormal symptoms, tell your doctor about your travel history. If symptoms persist, you may want to consider seeing an infectious disease doctor.
One last topic I like to discuss during pre-international travel consultations is behavioral risks. Vacation makes you feel uninhibited and relaxed, as it should. But some travelers may not take certain precautions that they normally would at home. They feel like they’re in a bubble and invincible.
It’s not uncommon to see people return from a trip with a sexually transmitted infection. Be careful and use condoms during sexual activity. Safety and health rules still apply no matter where your travels take you.
We want you to have the trip of a lifetime, and staying healthy is important. Before you get on the plane, check “pre-international travel consultation” off your to-do list. | <urn:uuid:9cb72d25-8cf9-4f76-ace6-7fe1307a5926> | {
"date": "2019-10-23T08:15:58",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987829507.97/warc/CC-MAIN-20191023071040-20191023094540-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9305686354637146,
"score": 2.5625,
"token_count": 1874,
"url": "https://www.medstarwashington.org/tag/infectious-disease/"
} |
Saffron is cultivated from the Western Mediterranean (Spain) to India (Kashmir). In much smaller scale, saffron is also cultivated in Italy and Greece (Crete). Of the Western and Central Asian cultivation areas, Iran is most productive and together with Spain and Iran produces more than 80% of the world's production. The saffron grown in India- Kashmir has particularly high reputation, but is hardly available outside India.
Saffron flower is more important in Central Asia and Northern India and is used extensively for rice dishes. Even the North Indian biryanis are relished due to the fragrant and aromatic flavor added by the saffron. Indian sweets like, kheer, ras malai, Indian yogurt drink (lassi), butter lassi (makhaniya lassi) have an everlasting culinary impression due to the saffron added to it. The use of saffron in sweet dishes is famous in the desert regions of Jodhpur in Rajasthan in the Indian sub continent.
Saffron is unique among spices due to its aroma. It is water-soluble and when added to the dish, gives a pure and homogeneous color. In high dosage, saffron exhibits toxic qualities. However, due to its high price, saffron poisoning is very rare.
Often called 'The Golden Spice', saffron has a history rooted in antiquity. It has always held a very special place for its extraordinary medicinal and flavoring properties as well as for being a striking yellow dye. Indian saffron is cultivated on a large scale in the Jammu & Kashmir valley whose cool dry climate and rich soil with excellent drainage and organic content make the location an ideal thriving ground for this spice. By every standard, Indian saffron is considered superior to its foreign counterparts.
Saffron Flower is a well known flower plant which belongs to the botanical family, Iridaceae. A spice made from the dried stigma of the flower of saffron crocus is considered the world`s most expensive spice. The plant has various uses including culinary and medicinal and is found quite extensively throughout India. The origin of saffron dates back to more than 3,000 years and is mentioned in various historical documents found in the Mediterranean, Asian and European countries. The Chinese historical documents of the 3rd century AD referred saffron to have a Kashmiri provenance.
• Botanical Name : Crocus Sativus L • Family Name : Iridaceae • Commercial Part : Stigma • Arabic : Zafran • Chinese : Fan Hung-Hua • Dutch : Saffraan • French : Safran • German : Safran • Italian : Zafferano • Japanese : Safuran • Portuguese : Acofrao • Russian : Shafran • Spanish : Azafran • Swedish : Saffran • Bengali : Jafran • Gujarati : Keshar • Hindi : Zaffran • Kannada : Kumnkuma kesari • Kashmiri : Kong • Malayalam : Kunkumapoove • Marathi : Keshar, Kesara • Punjabi : Kesar, Zafran • Sanskrit I : Keshara, Kunkuma • Sanskrit II : Aruna, Asra, Asrika • Tamil Kungumapoo • Urdu Zafran, Jafranekar | <urn:uuid:a62a41f1-d49d-4ffa-952b-80f03f62f76d> | {
"date": "2018-11-16T23:11:23",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743216.58/warc/CC-MAIN-20181116214920-20181117000920-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9076371192932129,
"score": 3.203125,
"token_count": 696,
"url": "http://www.florasaffron.com/saffron/what.html"
} |
The connection between our sinuses and headaches is well established, but what about the relationship between neck pain and our sinuses? Is there a connection?
Sinusitis is very common in the spring when pollen counts are high and times when the cold and flu are rampant. It usually manifests with a clear runny nose and pain over the affected sinuses and other “histamine” related symptoms (watery eyes, sneezing, etc.).
The Mayo Clinic states at least two of four primary symptoms of chronic sinusitis (CS) need to be present to confirm a CS diagnosis: 1) thick, discolored nasal discharge or drainage down the back of the throat (post-nasal drip); 2) nasal obstruction due to congestion that interferes with nasal breathing; 3) pain, tenderness, and swelling in the eyes, face, nose, forehead; 4) a reduced sense of taste and smell in adults and a cough in children.
Other CS symptoms can include: 1) ear pain; 2) jaw or teeth pain; 3) cough—often worse at night; 4) sore throat; 5) bad breath (halitosis); 6) fatigue; 7) irritability; 8) nausea; and 9) neck pain. Acute sinusitis has similar signs and symptoms when compared with CS, but they are short-lived. Symptoms that warrant a primary care consideration include: 1) high fever; 2) severe headache; 3) mental confusion; 4) visual changes—double vision, blurriness, etc.; and 5) profound neck pain and stiffness.
Causation of CS include: 1) Nasal polyps; 2) deviated septum; or 3) other medical conditions (cystic fibrosis complications, gastroesophageal reflux or HIV and other autoimmune system-related diseases) that can block the nasal passage.
Risk factors for CS include: 1) nasal passage conditions (polyps, deviated septum); 2) asthma; 3) aspirin sensitivity (due to respiratory problems); 4) immune system disorder (HIV/AIDS or cystic fibrosis); 5) hay fever/allergies; 6) pollutant exposure (air pollution, cigarette smoke).
Complications of CS: 1) meningitis; 2) infection migration such as to the bones (osteomyelitis) or to the skin (cellulitis); 3) sense of smell loss (partial or complete “anosmia”); 4) vision problems (including blindness).
Many are not aware that neck pain and stiffness and jaw or teeth pain are symptoms of CS. Conditions like this are a reminder that it’s important for both the doctor and patient to be aware of ALL the symptoms present, even if they seem like they aren’t connected. While doctors of chiropractic are trained to look for non-mechanical causes for neck pain when a patient seeks care, it makes it easier if the patient is forthcoming with all their symptoms, even the ones that don’t seem relevant.
The good news is that doctors of chiropractic are trained to manage CS and can offer patients advice on lifestyle changes that may reduce the risk of the infection recurring. Furthermore, chiropractors often work with allied healthcare professionals when antibiotics or other measures are needed. | <urn:uuid:a94ab14e-f08d-46b8-89b4-d0bd1c9d96be> | {
"date": "2017-09-26T20:01:16",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696681.94/warc/CC-MAIN-20170926193955-20170926213955-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9013818502426147,
"score": 2.78125,
"token_count": 686,
"url": "http://drperrywolk-weissblog.com/1234/neck-pain-and-sinusitis--what-s-the-connection-/"
} |
Behind The Scenes: Inside The Dome Of The Stearns County Courthouse [VIDEO, AUDIO, PHOTOS]
Subscribe to AM 1240 WJON on
ST. CLOUD – This week in our “Behind The Scenes” series on WJON we take you to the top of the Stearns County Courthouse inside the dome, and down below inside the tunnels.
The old building that stands in the center of Courthouse Square isn’t the original courthouse for Stearns County, but it has been there for over 90 years. It opened on September 1st, 1922.
Building Facilities Director Pete Reuter says the original plans show the building was much more than just a courthouse. It included a community room, a kitchen, and on the fourth floor men’s and women’s dormitories – for people who traveled to St. Cloud from the far reaches of western Stearns County.
Today it’s still a bustling hub of official county business. Most of the rooms have been transformed for modern day uses.
However, the central dome area remains true to the original design, including it’s signature dome. It features the original stained glass, as well as a series of screens. Back in the days before air conditioning, the screens could be opened creating a natural air flow through the building. The dome has an outer diameter of 46 feet, and peaks at 109 feet tall.
Get up inside the dome and you realize it’s actually two domes. The four clocks at the top of the courthouse were a big part of the original design, but the way they operate has been updated to an electronic system.
Most of the exterior of the building is granite from Rockville Granite Company in Cold Spring. The six granite pillars in front of the main entrance are 16 feet high and weight 50 tons.
One other little known fact is that there’s a tunnel that runs under the street, that connects the old courthouse to the new Administration Center. That’s where the old jail used to sit, and it was how prisoners were brought to court. Now it’s only used for judges and other county officials.
In 1982 the Stearns County Courthouse was added to the National Register of Historic Places.
The courthouse also has it’s place in Hollywood history, the staircase and one of the courtrooms made cameo appearances in the movie “The Mighty Ducks“. | <urn:uuid:ec57462c-1392-433b-a5bf-04b1e9515f1a> | {
"date": "2016-12-08T09:55:34",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542520.47/warc/CC-MAIN-20161202170902-00312-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9527978897094727,
"score": 2.515625,
"token_count": 509,
"url": "http://wjon.com/behind-the-scenes-inside-the-dome-of-the-stearns-county-courthouse-video-audio-photos/"
} |
The old man of La Chapelle
Discovered in 1908, the skeleton of "the old man of La Chapelle" was the first relatively complete skeleton of a Neanderthal individual that scientists had ever found. Buried in the limestone bedrock of a small cave near La Chapelle-aux-Saints, France, this skeleton includes the skull, jaw, most of the vertebrae, several ribs, most of the long bones of his arms and legs, plus some of the smaller bones of his hands and feet. The well-preserved skull shows the low, receding forehead, protruding midface, and heavy browridges typical of Homo neanderthalensis.
Scientists estimate he was quite old by the time he died, as bone had re-grown along the gums where he had lost several teeth, perhaps decades before. He lacked so many teeth in fact that it’s possible he needed his food ground down before he was able to eat it. Other Neanderthals in his social group may have supported him in his final years.
The original reconstruction of the ‘Old Man of La Chapelle’ by scientist Pierre Marcellin Boule led to the reason why popular culture stereotyped Neanderthals as dim-witted brutes for so many years. In 1911, Boule reconstructed this skeleton with a severely curved spine indicative of a stooped, slouching stance with bent knees, forward flexed hips, and the head jutted forward. He thought the low vaulted cranium and the large brow ridge, somewhat reminiscent of that seen in large apes such as gorillas, indicated a generally primitive early human and a lack of intelligence. However, additional discoveries of Neanderthal skeletons coupled with a re-examination of the Old Man’s skeleton in the 1950’s showed that many of the features thought to be unique in Neanderthals fall within the range of modern human variation, and that the Old Man suffered from “gross deforming osteoarthritis”. Thus, the slouching posture of the original reconstruction may have been based on an unfortunate individual with a deforming disability.
But this isn't quite the whole story. A more recent evaluation of the entire skeleton by scientist Erik Trinkaus has shown that, while the Old Man of La Chapelle did suffer from a degenerative joint disease, the deformation caused by this should not have affected Boule's original reconstruction of the individual’s posture. It appears that Boule's own preconceptions about early humans, and his rejection of the hypothesis that Neanderthals were the ancestors of modern humans, led him to reconstruct a stooped, brutish creature, effectively placing Neanderthals on a side branch of the human evolutionary tree. (Boule even gave his reconstruction an opposable big toe like the great apes, but there was no bone deformity that should or could have lead to this interpretation.) | <urn:uuid:c5b593e6-4748-46d0-b4dd-d9d94a12ce54> | {
"date": "2013-12-05T10:18:50",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163043499/warc/CC-MAIN-20131204131723-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.971123218536377,
"score": 3.75,
"token_count": 596,
"url": "http://humanorigins.si.edu/evidence/3d-collection/la-chapelle-aux-saints?page=9&js=1&view_name=scans&view_display_id=block_1&view_args=&view_path=node%2F1599&view_base_path=resources%2Fscans&pager_element=0"
} |
What a busy term!
Our topic this term was fairy tales. We began the term reading and acting out the ‘Cinderella’ story in our parent assembly. In class we looked at the similarities and differences between different re-tellings and even made Cinderella’s carriage out of playdoh. In English wrote play scripts for ‘The Three Little Pigs’ remembering to use all of the special features that play writers use including colons and stage directions in brackets. By the end of the term we had written our very own stories, with our own characters and settings! To help us along the way we used lots of talk, drawing and drama to help us remember our stories and retell them to the rest of the class.
Throughout Science week we did a top secret experiment! On day 1, we had to identify the secret ingredient. On day2, we had to draw the different reactions of crushing popping candy and putting popping candy in our mouths. On day 3, we experimented putting popping candy into different liquids to see what the reaction would be. And on day 4, we had to help Mrs Allen by predicting and investigating what would happen to the English Lions if they ate popping candy and drank lemonade at the same time! We predicted that the English Lions would definitely explode and their heads would fly off! But thankfully all was well and the popping candy simply popped and crackled. PHEW!
In PE this term we had Miss M come in from Premier Sport to teach us some gymnastics. We learnt how to join balances, rolls and travelling movements safely. Miss M said that the two special words to remember in gymnastics are ‘safe’ and ‘space’. Is it safe? Do I have enough space?
Our topic this term was Dinosaurs. We were extremely impressed with the effort the children put in to making their dinosaur masks at home over the holidays, well done! In English we learned lots of different fact about dinosaurs and then made fact files. Joshua wrote: ‘An asteroid hit the earth and all of the dinosaurs became extinct.’ Maxwell wrote: ‘The asteroid was going 30km fast.’ Bianca wrote: ‘Dinosaurs were cannibals. They ate other dinosaurs.’
In art and design the children made ‘Sockosaurs Rex’ hand puppets. They had to carefully sew on beads for eyes (which was very tricky!) and then choose materials to decorate the dinosaur’s plates.
In design and technology the children made large scale dinosaurs using different materials. They first had to design their dinosaur and select which materials they would use for the different body parts, and then as a class they built it using the equipment from the PE cupboard.
In maths the children have been learning to name, recognise and make totals using coins and notes. The children in German Wolves decided that Charles Darwin on the £10 note looked like Father Christmas and used this to help them remember the value of the note. Tony worked very hard, look he made 25p in two different ways, well done Tony!
Yet another busy term!
Our topic this term was superheroes. The children in Year One loved dressing up as their favourite superhero at the beginning of term. They wrote interesting similes and metaphors about each other’s costumes “Super girl has a top that is blue like the waves” - Ava. “Super girl’s boots are red like fire” - Rhianna. At the end of the children wrote their very own superhero stories! They created their own characters and then wrote about them making brave rescues! In History, the children compared modern day real life superheroes with heroes from History. Some children decided that Florence Nightingale is just as important to us today as our doctors and nurses because otherwise our hospital facilities wouldn’t be as clean or well-organized, which would mean that people wouldn’t be given very good treatment and would not get better quickly.
We have been scientists this term and explored how the weather changes and ways to test the wind pressure. The children did science experiments with card and bubbles and explored the direction that the wind moved. They enjoyed their outdoor learning and discoveries. We also made anemometers to test the wind pressure!
Term 1- Wow what a busy first term in Year 1!
Our topic this term was ‘Paws, Claws and Whiskers’ and believe it or not a real tiger escaped in our school! Mr. Ashdown brought us some CCTV footage of the tiger pouncing in our classroom, we could not believe our eyes! We went on a tiger hunt around the school and found footprints in the mud outside, and Miss Birkby even had to clean some muddy footprints up in the classroom before we came into school, what a naughty tiger! In English we wrote letters to the zoo asking how to look after the tiger. Some of the questions included: ‘Does the tiger get furious?’- Barnaby. ‘How does the tiger brush his teeth?’- Joshua and ‘Can we keep him?’- Daisy. We can’t wait to get the zoo’s reply!
We also met Stella, Daisy and their dog owners; Mrs. Birkby and Mrs. Birkby (very confusing!). We prepared questions to ask and learnt lots about both dogs. Daisy can sing! Stella digs and drinks tea from your cup if you’re not careful!
In Maths we learnt that half means two equal parts and quarter means four equal parts. We made different shapes out of playdough and practiced cutting them into halves and quarters. We also found out that to find a quarter of a square you half it then half it again, simple! | <urn:uuid:d2f803b8-062e-4d3d-a0e4-351a57acad43> | {
"date": "2017-08-23T04:31:03",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.92/warc/CC-MAIN-20170823035753-20170823055753-00296.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9750334024429321,
"score": 3.65625,
"token_count": 1192,
"url": "http://www.jubileeprimaryschool.org.uk/guten-tag/"
} |
Finally, I have found a way to enjoy novel studies with my students while still working on state achievement tests. I have rewritten my questions for one of my favorite units which match STAAR test stems. This way, you are enjoying and teaching great literature with your class, but are still showing them the kinds of questions they will encounter on tests. I have included my older questions, which are short answer, as well as the new (mostly) multiple choice questions. There are also a few other worksheets I have created as well. Plenty to do here to cover you study and assess the understanding of this wonderful book!
Skills include author's purpose, main idea, author's craft, figurative language, summary, cause and effect, and inferencing.
Answer key for multiple choice included.
Also helpful for tests such as:
AIMS CST CAT CSAP FCAT SSI CRCT EOCT GHSGT GAA IES TERRA NOVA HSA ISAT ITBS ISAT IST CCSS CAS MEA MSA MCAS MEAP ELL MCAII MCT NESA NECAP NJASK PSSA NECAP PASS STEP TCAP TAKS SDAAII HSPE WESTEST WKCE WKCE PAWS LEAP AIMS CSAP FCAT NAEP ISAT
MEAP NJASK ELA Common Core NECAP
STEP TCAP MSP WKCE PAWS | <urn:uuid:97c17eb2-0fe0-4075-866f-5021d98088c5> | {
"date": "2017-05-27T23:35:11",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609305.10/warc/CC-MAIN-20170527225634-20170528005634-00164.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.947983980178833,
"score": 2.515625,
"token_count": 297,
"url": "https://www.teacherspayteachers.com/Product/Bud-Not-Buddy-STAAR-Practices-and-Theme-Reading-UNIT-733226"
} |
Why do all the world’s religions emphasize giving thanks? What are the spiritual benefits of giving thanks? The physical benefits?
If you’re like most religion reporters, you dread the holidays, when editors demand yet another Christmas/Hanukkah/Kwanzaa/Festivus/solstice story. This edition of ReligionLink is chock-full of ideas to get you through another year.
While 1 in five people practice Islam internationally, a Pew Research survey in 2010 found that about half of Americans are able to correctly identify the Quran and Ramadan as associated with Islam. Another Pew survey in 2007 revealed that 58 percent of Americans say they know little or nothing about Islam’s practices, and often, what they do know […]
Buddha comes from the Sanskrit language, meaning “awakened.” Simply put, the basic teachings of Buddhism are: first, to do no harm to any living being; second, to do good; and third, to purify the mind from impurity. Buddhist religious practice is the formal discipline of sitting meditation and mindfulness in everyday life. Today .7 percent […]
The International Jewish Community of Moscow was founded in 2000. It provides a center for Moscow’s Jewish population, and for Jewish tourists. It hosts regular Shabbat and holiday services, kosher dining, and educational services. It is based on the Chabad-Lubavitch philosophy.
The Jewish Community of Japan provides a center for Japan’s Jewish population. It hosts regular Shabbat and holiday services, kosher dining and educational services. It is based in Tokyo.
October 2006 report published by The National Gay and Lesbian Task Force on the subject of Hell Houses, many of them held in churches around Halloween, and the effects they have on youth attitudes toward LGBT people.
David Dollahite is a professor of family life at Brigham Young University. He studies how religious beliefs and practices affect family relationships. | <urn:uuid:e6dfd0bf-00a0-4a32-b8b5-26ff7c47c443> | {
"date": "2019-05-19T06:58:14",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254253.31/warc/CC-MAIN-20190519061520-20190519083520-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9351571202278137,
"score": 2.59375,
"token_count": 400,
"url": "http://religionlink.com/search/tag/holidays/"
} |
Helium Reserves Running Low: Fact or Fiction?
Nuclear reactors, the large Hadron Collider, a welder’s workshop, a birthday party, and an MRI machine all have something in common: their need for helium. Whether in liquid or gas form, room temperature or near absolute zero, more than 8 billion cubic feet of this gas is used worldwide each and every year. With all of this usage, the demand for helium has never been higher, and you may have heard about helium reserves running low. But is it true? Are we running out, especially compared to other industrial gases?
This is something that we at US Gas, serving greater Chicago and the surrounding areas, watch carefully. So, while it is true that we see some helium reserves running low as more and more industries tap into them, let’s take a closer look to see if helium reserves running low is really a cause for concern and if will we run out of helium.
Helium reserves running low are a reality, but we are also still discovering new natural deposits of helium deep within the earth. One such discovery was made in Tanzania. Researchers from the University of Oxford found the deposit of helium deep in the rock where it has been gathering as a result of volcanic heat. And there is a lot of it!
It is estimated that around 54 billion cubic feet of the gas is there. Do you know that squeaky, high-pitch voice you get when you inhale helium? 54 billion cubic feet of the gas is enough to let every single person on the planet get that for an amazing 20 minutes! Even better, this is a low estimate and many researchers feel there is likely much more. That’s just under seven times the annual global demand. As impressive as that is, however, it is not an end-all solution to our helium reserves running low.
After all, Earth does have a limited supply of the gas, and once it is in the air it quickly escapes into the atmosphere and into space. Due to the light nature of the gas and the natural holes in rocks and stratus, helium has always been and always will be escaping earth and rising into the atmosphere. So, in that sense, we should always be mindful of the potential for Earth’s helium reserves running low.
Helium usually is contained in small pockets within rock. So drilling is difficult, and often it is not time- or cost-effective to tap into every underground reserve found. This is why scientists have to look for natural pockets, deeper within the crust, that are full of a lot of helium gas. These stores are millions or billions of years old. It is these ancient reserves that will help keep the helium reserve crisis at bay.
Will We Run Out of Helium?
If helium reserves running low seem like a result of the fossil fuel industry, you may be surprised to find that is not the case at all! Actually, most of the world’s helium comes from natural gas. A good source will be around 3 to 7 percent helium, which can be extracted and separated from the natural gas. Most natural gas pockets, however, will not surpass 0.5 to 2 percent concentration. That is why the find in Tanzania is so exciting. That 0.5 to 2 percent is nothing compared to the estimated 10 percent pocket that has been found in Tanzania.
Across the globe, helium is about a thousand times less lucrative than other gas, so while it is the fossil fuel industry that is instrumental in the production and collection of helium, it is not the primary focus at all. “Normally, it’s an afterthought,” says Samuel Burton, assistant field manager at the Federal Helium Program. “It’s something that they don’t even consider because the natural gas makes so much more money for them.” (Wired.com)
The most obvious change that will likely be seen in the coming years regarding helium reserves running low will be the struggle to balance helium reserve levels with a seemingly ever-growing rate of consumption. This is likely to make the price for helium will go up. Many say this is more of a precautionary step rather than a response to helium reserves running low.
An example of this process can best be described as this: helium is in high demand, and someday we may face helium reserves running low. So to delay that and to hold off on tapping into reserves as long as possible, prices will rise. This will prevent less frivolous uses, preserving the helium services that more desperately need it and can afford to use it.
With that in mind, however, consider this. In the United States, there is an estimated 20 years of known supplies for the gas that are easily, readily available. This is more than any other region of the globe right now. In 2014, the U.S. Department of Interior estimated the existence of over 1,169 billion cubic feet of helium still contained within the earth here in the United State. That’s around 117 years’ worth at our current usage rate. This has led many to question the idea that helium reserves running low is even an issue, and leaves some people wondering where the question “will we run out of helium” even came from.
Helium Reserves Running Low? Actually, the Future of Helium is Bright!
As with any other natural resource, helium isn’t infinite. It is like oil or coal in that sense, so it is definitely worth conserving and protecting. The focus remains on getting more helium, finding ways to produce it, and looking for options for capturing and reusing helium in certain applications. Many research labs, for instance, are working on ways to capture and recycle helium that they use in various processes and applications rather than letting it escape into the atmosphere. This, too, will go a long way in postponing any future situations of helium reserves running low.
The keys here are balance and planning ahead. We likely do not have a crisis situation just yet. But that day will come at some point, and it may come sooner if our usage of the gas continues to goes up. If we focus on being smart with the helium we have, and working on protecting the helium that remains to be tapped into, helium reserves running low will be a non-issue for generations to come.
So there is no need to worry about helium reserves running low because of some festive balloons at the next birthday party you go to. It is not likely that we will we run out of helium in the next 100 years, so we have time to plan and prepare and get smarter!
About US Gas, serving the Chicago Area
We at US Gas are known for our outstanding service for a full range of area industries like food, healthcare, environmental, medical, petrochemical, industrial hygiene and many more. Our compressed-gas fill plant boosts our supply and delivery to a superior level of service. Our aim is to be the Number One Company you think of when you think of industrial gas suppliers.
Let’s start the conversation! Our customer service team is ready to assist you, take your order, and provide sales assistance, billing, account information and any new promotional products or services. Ready to place an order?
To learn more about US Gas and the way we can serve your business, contact us at (708) 389-1402. | <urn:uuid:a963394e-4696-4d61-aab6-4ca0f81b5d62> | {
"date": "2019-02-17T13:40:17",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481994.42/warc/CC-MAIN-20190217132048-20190217154048-00616.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.950649082660675,
"score": 3.09375,
"token_count": 1513,
"url": "https://uscylgas.com/are-helium-reserves-running-low/"
} |
Earlier this month in Doha at the World Innovation Summit for Education (WISE), Sir Fazle Hasan Abed, founder of the Bangladesh Rural Advancement Committee, well known simply as BRAC, was chosen as the first winner of the WISE Prize for Education.
“Households with more education cope better with economic shocks and extreme weather events. People with higher levels of education earn more, have more control over their fertility, and have healthier and better-educated children.” he says while referencing the World Bank’s new Education Strategy. “The new Strategy emphasizes the need to invest early, nurturing young children to ensure that they arrive at school healthy and ready to learn; to invest smartly, transforming schools with good teachers, good materials, and good management; and to invest for all, laying the foundation for just and equitable societies.”
Governments across both the developing and developed world are experimenting with private management of public schools to better serve the poorest, and most under-served students. But have recent innovations lived up to their promise of improved results?
The verdict from a recent review of America’s ‘charter schools’—the most rigorous analysis of privately-managed schools to date—suggests some cause for optimism, at least at the middle school level. What is more, recent studies show that successful ideas from the private sector can feed back into the public sector to improve education for all.
As donors, developing country governments, civil society and private sector representatives gather in Copenhagen for the replenishment of the Global Partnership for Education (GPE), I feel both a sense of pride and urgency.
Last month the World Bank hosted Mr.Kapil Sibal, India’s Minister of Human Resources and Development. Sibal spoke to a packed audience about India’s contributions to the global knowledge economy and discussed some of his widely publicized education reforms and plans for the Indian education system. The highlight of the event was Sibal’s display of the $35 tablet PC which he hoped to launch soon as a technology aide to help bridge quality gaps in secondary education. The event was chaired by Tamar Manuelyan Atinc, Vice President of the Human Development Network, and moderated by Mr. Michal Rutkowski, Sector Director for Human Development in the South Asia Region. | <urn:uuid:d779c894-7caf-42b7-be2c-be5628db443c> | {
"date": "2014-04-18T23:29:01",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535535.6/warc/CC-MAIN-20140416005215-00075-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.955805242061615,
"score": 2.53125,
"token_count": 479,
"url": "http://blogs.worldbank.org/education/archive/201111"
} |
Loosely translated as faith in God, emuna is considered the cornerstone of Jewish belief and practice. What does the term emuna mean? How does this affect my life? When are we as Jews required to have or practice this emuna?
Unfortunately, many people assume that emuna refers to blind faith. However, this is not the case. In the Aleinu prayer recited at or near the end of every prayer service, we proclaim: “And you shall know today, and take to heart, that God is the only God…” We are instructed to ‘know’ that God exists. Blind leaps of faith have nothing to do with knowledge; they are expressions of what one wishes to be true, not what is in fact necessarily true.
Emuna begins in the mind as intellectual Emuna, formed after hard rational work and inquiry. Ultimate contemplation of the world and how it could not be created other than by an infinite Being will help us achieve this intellectual faith.
Knowing in our minds that our Creator is there is the first step. However, in time and with repeated practice, emuna can melt into the heart. After we readily acknowledge that God is part of our life and never leaves, we can work on developing loyalty to God with that knowledge and slowly begin to feel it internally. Rather than pure intellectual belief, emuna should be defined as the act of being faithful or loyal. It is the basic requirement of any healthy relationship and demands constant reinforcement.
With time and dedication we can strive toward living a life permeated by emuna. Emuna is developed throughout a lifetime and needs to be repeatedly contemplated. Loyalty to God becomes essential when life throws us a sharp curve ball which may cause us to lose balance and doubt that things truly are for the best.
Yet at these painful times, it is also more difficult to exercise our emuna muscles. It becomes most challenging when reality presents hardships that conflict with our ability to intellectually understand. The loss of harmony between that which we know in our minds to be true – God is taking care of us as part of His nation – yet do not enjoy or cannot see the logic in, is what provides us with our free will.
Through the means of free will, we choose whether to remain loyal to the word of God in spite of the pain, or to shun the word of God because of its seeming illogicality. Emuna is understanding that we cannot understand the totality of God’s knowledge, but recognizing and accepting that everything serves a purpose despite this.
Once we know logically that God is always with us, and we have started practicing this loyalty regularly, we can now engage in everyday life with trust in Him. This feeling of trust gives us a gift of security knowing that we are in perfect hands as we are being individually directed and handled by God Himself. Therefore, we can enjoy the feeling that we are being led through life by means of a personal guide, and that there is meaning and purpose to every event that occurs.
Emuna comes with practice of the mind and action. Utilizing life’s encounters as a prospect to seeing God in my life increases our awareness of His constant presence. We can use challenges as catalysts to come closer to our Creator since we extract meaning and grow from the experience.
For example, when traveling by bus to Jerusalem we can sit back, relax and enjoy the view. We can be free from worry, knowing that the driver is professional and knows how and where to drive. If we did not trust the driver’s skill, or we thought we could drive a bus better than him,, we may sit on edge the entire ride, questioning his navigation skills and driving abilities. In contrast, with emuna we can calmly sit on the bus, enjoy the scenery and await our final destination.
Sitting in bumper to bumper car traffic is boot camp for strengthening our emuna muscles. Some thoughts to ponder might include:
- I must be delayed for a good reason;
- maybe it is slippery ahead and needed to slow down or possibly;
- I need time to recollect my thoughts before continuing to drive.
The bottom line – there is purpose to my slowing down and it is all good for me even if I cannot readily see it.
Having someone cut the line while waiting for a cashier is another opportunity to exercise my emuna muscles. Perhaps this is a chance to refine my personality by allowing the other person to go in front without feeling bitter?
Emuna is looking beyond the limited now and knowing that we may not fully grasp the meaning of what is happening. We think we know what is best for us, but emuna means have faith that only God really knows. Nonetheless, we also have faith that one day we too will know. | <urn:uuid:573467ab-50d3-4747-ab53-199a9f2557eb> | {
"date": "2015-04-25T23:21:46",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246651873.94/warc/CC-MAIN-20150417045731-00148-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9697074890136719,
"score": 2.890625,
"token_count": 983,
"url": "http://www.aish.com/sp/ph/Faith-in-God-A-Jewish-Perspective.html?s=mbaw"
} |
A giant star recently went supernova in a distant galaxy. Except you'd never know it, because the star emitted giant dust clouds that trapped and squelched the explosion. I don't believe stars can feel embarrassment...but yeah, that's pretty embarrassing.
Astronomers have never seen such an anticlimactic end to a supernova explosion, although they suspect this sort of thing happened more often in the early universe. A team at NASA's Spitzer Space Telescope were looking for black holes when they discovered a heat signature in a galaxy 3 billion light-years away that was unlike any they'd seen before. Whatever it was, the object burned incredibly hot and then disappeared in just a few months.
The fact that it flared out so quickly suggested it was a supernova, but those explosions are supposed to emit lots of light, not heat. And yet this object had reached temperatures of nearly 1,300 degrees Fahrenheit, so something was turning that light into heat. They soon realized the only possibility - the supernova must have gotten caught in a massive dust cloud that absorbed the light and spat out heat.
The astronomers have been able to work out the backstory of this object in remarkable detail. The star must have been about fifty times as massive as our Sun, as such stars are known to emit big clouds of material right before they explode. The first dust cloud was belched out some 300 years before it went supernova, and then the second cloud just four years before. The two then slowly expanded away from the star, creating a double-layered dust shell that trapped in all the light from the explosion.
The researchers believe these supernovas were much more common in the early universe, before galaxies had fused hydrogen and helium into heavier elements, and they are still occurring in smaller, low metallicity galaxies. In fact, the researchers say they now expect to find 100 or so of these in the next two years, now that they know what to look for. It hasn't exploded yet, but the astronomers suspect Eta Carinae, the brighest star system in the galaxy, could be similarly dust-smothered when it finally erupts.
The original dust-squelched supernova might still have a happy ending to its story, though. There's a chance the supernova will brighten considerably when the shockwave from the explosion hits the inner dust shell and sends it hurtling toward the outer shell. That could make for a spectacular light show.
[Space.com; click on the image up top for a closer look] | <urn:uuid:6530bea4-8a94-4743-b530-016232fc9dc3> | {
"date": "2017-10-23T17:32:02",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826210.56/warc/CC-MAIN-20171023164236-20171023184236-00856.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9593791961669922,
"score": 3.4375,
"token_count": 520,
"url": "https://io9.gizmodo.com/5665738/supernova-explosion-gets-trapped-by-its-own-dust?tag=dust"
} |
Ten years ago I was invited to see a demonstration from an Israeli company researching the printing of battery and circuits in paper. We had at that moment done mostly passive RFID solutions or active RFID with big and expensive tags (RFID stands for “Radio-frequency identification”. RFID can be passive, active (often with battery) or semi-passive – like the one in printed circuits).
We could only imagine what would come out of this new technology. At the same time, I also received information on a project in Tel Aviv where you store binary information in the human body. Ten years ago it was like science fiction, but now we are doing projects with this type of technology.
We are involved in a project where we develop a mobile solution using technology by transferring data through the body which is then received by a digital device.
Your fingertips and body have now become part of the digital solution.
Connected Me is a an Ericsson concept that demonstrates capacitive coupling, and the power of touch, at speeds of up to 10Mbps.
Connected Paper makes it possible to access information about anything with print on it by touching it. By touching the Connected Paper, the information can be transferred through your body to your digital device.
Your body becomes the network
We are now in the Internet of Things era, and wearables-connected Things exchange data through the Internet. With technologies like capacitive coupling, Things will not only be able to transfer data through the Internet, but also through your body. Your future smart watch will be able to do such things like act as a security key for unlocking doors when you grab the handle or receive a business card by a handshake.
Stay clean, your body transmits your data. | <urn:uuid:20e3d903-24cc-4a87-9f5e-e15da9b35835> | {
"date": "2018-05-21T07:11:49",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863967.46/warc/CC-MAIN-20180521063331-20180521083202-00018.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.952713668346405,
"score": 2.5625,
"token_count": 357,
"url": "http://labs.sogeti.com/stay-clean-body-transmits-data/"
} |
This Site Is Part Of:
Welcome to the SA of NC Civil War 150 blog
North Carolina Civil War 150 is a space for collecting all news, events, and observances related to the American Civil War Sesquicentennial commemoration at the State Archives of North Carolina.
The State Archives of North Carolina Civil War Sesquicentennial Timeline (PDF) is now available.
Note: all posts and comments on this website are public records.
Tag Archives: politics
As described in an earlier blog post, Provisional Governor William W. Holden had convened a convention composed of “properly pardoned” delegates to fulfill a number of obligations necessary to complete President Andrew Johnson’s requirements for reentry into the United States. … Continue reading
In post-war 1865, Provisional Governor William Woods Holden went about the business of mending a state rent in every facet by the recent struggle. Infrastructure such as the railroad system not only had to be repaired but also the governing … Continue reading
By June 1865 the reality of a failed attempt at disunion began to settle in the minds of the people of the states that had passed Secession Ordinances. The capitol city of North Carolina had been occupied by Union forces … Continue reading
Toward the end of April 1865, North Carolina Governor Zebulon Vance was becoming increasing irrelevant in the rapidly unfolding events in North Carolina. He was unable to participate in the surrender negotiations between Confederate General Joseph E. Johnston and Union … Continue reading
Second Mondays Lecture Series May 11, 2015 at 12 Noon (Archives & History Building Auditorium, Raleigh, NC): Sherman’s March and the Occupation of Raleigh (William H. Brown, Registrar, State Archives of North Carolina) In March 1865, the American Civil War … Continue reading
In the world of politics, an ability to deal with crisis whether generated by yourself or others can truly define the value of an individual seeking to serve his or her constituents or using political office as a way to … Continue reading
As the state of North Carolina was becoming increasingly besieged by enemy forces entering the state from all sides, the civil authority within the interior of the state was collapsing as well. This was not an overnight phenomenon. The cracks … Continue reading
By September 1864, events continued to spiral downward for the Confederate States of America. Since the summer of 1864, federal armies had roamed at will in and out of its borders. Major General William Tecumseh Sherman and his combined Union … Continue reading
By late August and early September 1864, the Confederate field armies were slowly losing their ability to counter the Union offensives in both eastern and western theaters. The push to quickly end the war in 1862/1863 bled the Confederacy down … Continue reading
During the fifty-second month of the American Civil War, both sides of the conflict were becoming exhausted through the constant combat experienced during summer of 1864. In the past years of the war, engagements were fought, and both armies were … Continue reading | <urn:uuid:fda2b432-ca0d-4cd5-b36b-5158647f7e9f> | {
"date": "2017-10-23T22:43:40",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826840.85/warc/CC-MAIN-20171023221059-20171024001059-00156.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9573430418968201,
"score": 2.5625,
"token_count": 619,
"url": "https://civilwar150nc.wordpress.com/tag/politics/"
} |
script.sh >output.txt …stdout is not connected to terminal now, how can the scrip get know abot it?? The redirection operators are checked whenever a simple command is about to be executed. Redirection simply means capturing output from a file, command, program, script, or even code block within a script (see Example 3-1 and Example 3-2) and sending it as input And yes, during my research I found some weirdness in the Bash manual page about it, I will ask on the mailing list. Check This Out
After you type the < or > operator, you must specify where you want to read or write the data. bad_command2 2>>$ERRORFILE # Error message appended to $ERRORFILE. echo -n . >&3 # Write a decimal point there. Multiple redirections More redirection operations can occur in a line of course.
The syntax is (beside other redirection syntax) described here: http://bash-hackers.org/wiki/doku.php/syntax/redirection#appending_redirected_output_and_error_output share|improve this answer edited Mar 23 '14 at 11:24 Mathias Bynens 73.4k34147195 answered May 18 '09 at 4:42 TheBonsai 6,37731414 3 Reply Link xuhui November 24, 2014, 1:19 pmUseful for me!!!! Thanks a lot. Intuition behind Harmonic Analysis in Analytic Number Theory Are there any 'smart' ejection seats?
This is why pipes work. Bash Redirect Error Output To /dev/null LOGFILE=script.log echo "This statement is sent to the log file, \"$LOGFILE\"." 1>$LOGFILE echo "This statement is appended to \"$LOGFILE\"." 1>>$LOGFILE echo "This statement is also appended to \"$LOGFILE\"." 1>>$LOGFILE echo "This By default, you send the command input (that is, the STDIN handle) from your keyboard to Cmd.exe, and then Cmd.exe sends the command output (that is, the STDOUT handle) to the Hot Network Questions Dennis numbers 2.0 Should indoor ripened tomatoes be used for sauce?
Here documents <
I also know how to redirect output from display/screen to a file using the following syntax:cmd > file ls > fileHowever, some time errors are displayed on screen. http://gatoisland.com/bash-redirect/bash-redirect-error-to-output.php The order is important! Does mean=mode imply a symmetric distribution? asked 7 years ago viewed 344714 times active 7 months ago Get the weekly newsletter! Bash Append Stdout And Stderr To File
To use more than one filter in the same command, separate the filters with a pipe (|). TAG A here-document is an input redirection using source data specified directly at the command line (or in the script), no "external" source. Please try the request again. this contact form Redirecting output N > TARGET This redirects the file descriptor number N to the target TARGET.
Linked 463 Redirect all output to file 38 Linux (Bash): Redirect all output to file 1 Redirecting stdout and stderr output to a file using system command doesn't work in perl Ambiguous Output Redirect. Browse other questions tagged bash io-redirection stdout or ask your own question. Here strings <<< WORD The here-strings are a variation of the here-documents.
Avoid referencing file descriptors above 9, since you may collide with file descriptors Bash uses internally. They're evaluated from left to right. Wiki syntax is allowed: Please fill all the letters into the box to prove you're human. Linux Redirect Stderr To Null Next: Executing Commands, Previous: Shell Expansions, Up: Basic Shell Features [Contents][Index] show toc Using command redirection operatorsYou can use redirection operators to redirect command input and output streams from the
See the page about obsolete and deprecated syntax. bad_command3 # Error message echoed to stderr, #+ and does not appear in $ERRORFILE. # These redirection commands also automatically "reset" after each line. #=======================================================================&1 # Save current "value" of stdout. navigate here This will not cause STDERR to be redirected to the same file.
C Shell Family Some of the forms of redirection for the C shell family are: Character Action > Redirect standard output >& Redirect standard output and standard error < Redirect standard OR read more like this:BASH Shell Redirect Output and Errors To /dev/nullBASH Shell: How To Redirect stderr To stdout ( redirect stderr to a File )Unix and Linux: Redirect Error Output Sebastian Mar 27 '14 at 17:56 | show 1 more comment up vote 13 down vote This should work fine: your_command 2>&1 | tee -a file.txt It will store all logs There are two formats for redirecting standard output and standard error: &>word and >&word Of the two forms, the first is preferred.
When Bash creates a child process, as with exec, the child inherits fd 5 (see Chet Ramey's archived e-mail, SUBJECT: RE: File descriptor 5 is held open). No help available yet for $PROGRAM. Top of pageUsing the <& operator to redirect input and duplicateTo use the redirection input operator <&, the file you specify must already exist. Examples: % who > names Redirect standard output to a file named names % (pwd; ls -l) > out Redirect output of both commands to a file named out % pwd;
Your cache administrator is webmaster. As a special case, if n is omitted, and word does not expand to one or more digits or ‘-’, the standard output and standard error are redirected as described previously. | <urn:uuid:235709fc-057c-4d48-a4fe-c8845cc2c262> | {
"date": "2018-04-20T20:25:11",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944682.35/warc/CC-MAIN-20180420194306-20180420214306-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8118732571601868,
"score": 2.65625,
"token_count": 1277,
"url": "http://gatoisland.com/bash-redirect/bash-redirect-error-output-append.php"
} |
Pine Trees in Peril
High up on a mountain slope a sturdy whitebark pine stands its ground against the elements. It grows in the harsh subalpine environment where few other plants can survive.
In these windswept places the whitebark pine stabilizes soil, creates habitat, and holds snow to control water flowing from the mountains in the spring. It is an impressive sight; however, it is now more common to see skeletons of these trees where they once thrived.
Healthy whitebark pine trees © Parks Canada
Whitebark pine (pinus albicaulis) and the closely related limber pine (pinus flexilis) are species at risk. A non-native fungal disease called White pine blister rust (Cronartium ribicola), fire suppression, mountain pine beetle, and climate change are threatening the survival of these trees.
Skeleton whitebark pine forest and (inset) blister rust cankers © Parks Canada
An Old Friend to Wildlife
Slow growing, whitebark and limber pine may not produce cones until they are over 50 years old. When cones develop, their seeds are similar to the pine nuts sold in stores. The seeds are an important source of protein for animals like the Clark's nutcracker, red squirrel, and grizzly bear.
The whitebark pine and Clark's nutcracker have a particularly special connection. The tree relies on the nutcracker, with its long pointed beak, to break apart cones and spread seeds.
Clark's nutcracker © Parks Canada
The Clark's nutcracker gathers and stores seeds for the winter, usually in places that are open, sunny and likely to remain mostly snow-free.
These locations are also great places for whitebark pine trees to grow. The Clark’s nutcracker does have a very good memory, but about half the stored seeds are forgotten and left to grow into new trees.
Firing Up Restoration
Historically Rocky Mountain fires were more frequent, and were mostly small and patchy. They created open spaces for the nutcracker and whitebark pine. Fire suppression has interrupted this process.
Parks Canada has now developed a Terra Torch to burn small patches the way lightning strikes would have in the past. This technique has been used to complete prescribed fires in 26 small plots near Summit Lake.
Seeds from surviving trees have been collected, grown into seedlings, and planted in the burned areas and in other places in the park. The seeds are taken from healthy trees found in forests where most others have been infected or killed by the white pine blister rust disease. It is hoped that these trees will be resistant to the blister rust.
As of 2012, there have been 4,481 whitebark pine and 835 limber pine seedlings planted in the park.
Parks Canada conducts a prescribed fire to create openings for whitebark pine © Parks Canada
Volunteers have helped with seed gathering and planting; check the volunteer page for future opportunities. Whitebark and limber pine trees can be recognized by their needles, which grow in bundles of five. The more common lodgepole pine (pinus contorta) has needles in bundles of two.
Student volunteers help plant whitebark pine seedlings © Parks Canada
Next time you’re hiking in Waterton Lakes National Park, take the time to see if you can find one of these special five-needled pines.
Dictionary | Table of Contents | <urn:uuid:6cdb8589-30de-421b-b489-49971cfab45b> | {
"date": "2014-07-25T03:45:29",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997892806.35/warc/CC-MAIN-20140722025812-00080-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9451669454574585,
"score": 4.03125,
"token_count": 724,
"url": "http://www.pc.gc.ca/eng/pn-np/ab/waterton/natcul/natcul1/hi.aspx"
} |
What is green infrastructure?
Maryland has been called "America in miniature". From east to west, Maryland varies from ocean, to barrier island and beaches, to tidal marshes and estuaries, to fertile low-lying farmland, to pastoral rolling hills, to mountains, valleys and plateaus. North and South also meet in Maryland: historically, culturally, and ecologically. Ecologically, Maryland is the northernmost limit of many southern species, and the southernmost limit of many northern species. Like America, the state contains both big cities and small towns, and regions varying from forested to agricultural to urban. In short, Maryland is extraordinarily diverse for a state its size, and reflects conditions found in the nation as a whole.
Like America as a whole, Maryland's diversity and vitality depend on the composition of its landscape: its geology, climate, water, soils, flora, and fauna. These characteristics have shaped the history of the region, and still affect the state today. Maryland's most important natural lands comprise its "green infrastructure," and provide the bulk of the state's natural support system. Ecosystem services, such as cleaning the air, filtering and cooling water, storing and cycling nutrients, conserving and generating soils, pollinating crops and other plants, regulating climate, sequestering carbon, protecting areas against storm and flood damage, and maintaining aquifers and streams, are all provided by the existing expanses of forests, wetlands, and other natural lands. These ecologically valuable lands also provide marketable goods and services, like forest products, fish and wildlife, and recreation. They serve as vital habitat for resident and migratory species, maintain a vast genetic library, provide scenery, and contribute in many ways to the health and quality of life for Maryland residents.
When wetlands and forest are developed into human-centered uses, there are costs incurred that are typically not accounted for in the marketplace. The losses in ecosystem services are hidden costs to society. These services, such as cleansing the air and filtering water, are fundamental needs for humans and other species, but in the past, the lands providing them have been so plentiful and resilient, that they have been largely taken for granted. In the face of a tremendous rise in both population and rate of land use conversion, many people now realize that these natural or ecosystem services must be afforded greater consideration. The breakdown in ecosystem functions causes damages that are difficult and costly to repair, as well as taking a toll on the health of plant, animal, and human populations.
Where is green infrastructure found in Maryland?
Maryland's green infrastructure was mapped using satellite imagery, road and stream locations, biological data, and other information, with the results reviewed by scientists, local government officials, and conservation groups. Although even backyards and street trees provide some benefits, like shading and air purification, the state's most important natural lands are those that are large and intact enough to provide a full range of environmental functions.
The first step in the assessment of the State's green infrastructure identified the heart of the green infrastructure, called "hubs." These are typically unfragmented areas hundreds or thousands of acres in size, and are vital to maintaining the state's ecological health. They provide habitat for native plants and animals, protect water quality and soils, regulate climate, and perform other critical functions.
The second step connected hubs with "corridors" - linear remnants of natural land such as stream valleys and mountain ridges that allow animals, seeds, and pollen to move from one area to another. They also protect the health of streams and wetlands by maintaining adjacent vegetation. Preserving linkages between the remaining blocks of habitat will ensure the long-term survival and continued diversity of Maryland's plants, wildlife, and environment.
Examples of Maryland's green infrastructure are found throughout the state:
- The large expanses of unbroken forest around Savage River and Green Ridge State Forests in Western Maryland;
- The Youghiogheny Wild River in Garrett County;
- The Catoctin Mountains in Frederick County;
- The tidal marshes at Blackwater National Wildlife Refuge and Fishing Bay Wildlife Management Area on the Eastern Shore;
- The Assateague Island National Seashore, and Chincoteague Bay marshes;
- The mature hardwood forest along the Potomac River in southern Charles County;
- The forested lands surrounding Seneca Creek in Montgomery County;
- The Zekiah Swamp in Southern Maryland;
- The state and local parklands along the Patuxent River; and
- The Gwynns Falls/Leakin Park in Baltimore City and Baltimore County.
What is the status of Maryland's green infrastructure?
It has been estimated that before colonization by Europeans, Maryland was 95% forested, the other 5% being tidal marsh. By 1993, both forest and wetlands had decreased by half. The area converted to development is increasing even more rapidly now, as suburbs expand outward and large-lot houses are built in formerly rural areas. The scattered pattern of modern development consumes an excessive amount of land and fragments the landscape.
As forests are divided and isolated by roads, houses, and shopping malls, wildlife habitat and migration corridors are lost, and normal ecosystem functions such as absorption of nutrients, recharging of water supplies, and replenishment of soil are disturbed or destroyed. Water quality has been degraded in numerous streams and rivers, as well as in the Chesapeake Bay itself. Many of Maryland's remaining wetlands have been drained, filled, polluted, or otherwise degraded. Habitat loss and fragmentation have contributed greatly to a continuing loss of biodiversity in Maryland. At least 180 plant and 35 animal species have been extirpated from Maryland. Another 310 plant and 165 animal species are rare, threatened, or endangered.
Today, Maryland has only two million acres of ecologically significant land that has not been consumed by some kind of human development. Of these two million acres of green infrastructure, nearly 70% are unprotected. Billions of dollars are spent each year to construct or maintain the state's built infrastructure of roads, bridges and utilities that we depend on for modern life. By contrast, the state's green infrastructure, which exists naturally, is under tremendous pressure from development, yet receives little support in public policy. Left unprotected, the remaining green infrastructure is vulnerable and will be further reduced and fragmented.
Focusing conservation efforts on green infrastructure will help protect the ecological health found in each region of the state, including forests, streams, and wetlands, preserving and enhancing this heritage for future generations. By acting now, Maryland can ensure cleaner air and water for its citizens, safeguard habitat needed to spare native animals and plants from extinction, and preserve outdoor recreational opportunities that a large and increasing number of people enjoy.
What are the benefits of green infrastructure?
Green infrastructure benefits all Maryland citizens. For some people, like watermen, those who harvest and process timber, and those who cater to outdoor recreation, it provides their livelihood. For farmers, it provides insect control by birds. For city dwellers, it provides clean drinking water. For those living or farming near shorelines, streams, or steep hillsides, it protects their land from erosion. The green infrastructure provides places for hobbies, recreational activities, and learning opportunities. Children and teachers can, together, learn the wonders of nature by using the green infrastructure as a living classroom. Nature lovers can enjoy hiking, camping, observing, and photographing an impressive diversity of plants and wildlife.
Studies have shown that if the values of ecological services are considered, natural lands show a net gain in cost-benefit analyses. While residential areas require public services, natural areas need little, other than protection. Further, they make public construction of many engineered facilities unnecessary.
In addition to their ecological and economic contributions, these lands provide a sense of place and a unique identity. Natural landscapes make communities more comfortable and appealing; they link current generations to their heritage and cultural past. For everyone who lives in or visits Maryland, protecting green infrastructure helps to preserve our rich quality of life and safeguard, for future generations, Maryland's Chesapeake Bay and the legacy of Maryland's special natural landscapes, including the picturesque mountains of Western Maryland; the forests and wetlands of Southern Maryland; the expansive tidal marshes of the Eastern Shore; and the stream valleys of the Western Shore and Piedmont region.
Ninety percent of respondents in a 1999 national poll agreed that "open spaces make our communities more livable", and 85% said that "parks and open spaces contribute to the property values and economic stability of neighborhoods." In Maryland, polling surveys in 1995 and 2001 revealed that the vast majority of the state's citizens support public land conservation programs.
Can green infrastructure be protected?
Land protection is often first on the chopping block when budget cuts are considered. Yet, protection of natural land is a vital investment. Preserving open space stimulates spending by local residents, increases property values, increases tourism, attracts businesses, and reduces public costs. Biodiversity is responsible for at least $1.9 billion in economic and environmental services in Maryland. In fact, if the values of ecological services are considered, the benefits from conserving natural land gives a return on investment of at least 100 to 1!
Because much of the state's key natural resource land has been lost, Maryland needs to protect as much as possible of what remains. A focus on permanent protection of green infrastructure provides multiple benefits:
- It provides a balance to protecting land for recreation and agriculture with protection of ecological services;
- It ensures the continuation of natural services in each region that help clean the air and water;
- It supports Maryland's economy, especially the forest products industry, seafood industry, nature tourism, and outdoor recreation.
- It reduces the need for expensive stormwater management, flood control, and restoration projects by protecting water resources including streams, wetlands, and riparian corridors; and
- It addresses commitments in the new Chesapeake Bay Agreement to protect 20% of the watershed and to reduce the rate of sprawl development by 30%.
Over the past several decades, the State of Maryland has enacted several effective land conservation programs. These include Program Open Space and Rural Legacy, a variety of agricultural preservation efforts, private conservation easement agreements, and regulations that help preserve wetlands and shorelines. As a result, Maryland is known nationally as a leader in land conservation and natural resource protection. While these initiatives proved effective in addressing specific needs related to wetlands, endangered species, recreation, or farmland, they were not designed to protect a comprehensive network of ecologically sensitive lands. Despite our successes, only 30% of the identified green infrastructure was protected as of 2004.
Focusing on protection of green infrastructure builds upon existing conservation programs by:
- Conserving and connecting large contiguous areas of natural land, containing important natural resources;
- Providing a focal point to coordinate existing conservation programs and increase their overall effectiveness; and
- Guiding and coordinating land conservation and preservation efforts.
Developers, private landowners, and others benefit from having a clear understanding of where the most ecologically valuable lands are located, and where targeted conservation activities will be directed. Citizens interested in increased stewardship activities will know where their efforts are most needed. Land planners and developers can use the green infrastructure maps as a reference in the development of site plans and management objectives.
Using green infrastructure maps and data, local governments can enhance their efforts to provide open space, recreation lands, and natural areas that retain the unique character of their communities and rural landscapes. This can complement their efforts to direct growth to specified areas.
Private land trusts can also benefit. Conservation groups, and their members, will find that focusing on green infrastructure will give them a greater overall impact. It not only identifies large blocks of habitat and linkages, it gives a sense of how each given place fits into the larger landscape.
The approach to protecting green infrastructure involves four steps:
- Identify, using state-of-the-art computer mapping techniques, the most important natural lands in the state;
- Connect these lands through a system of corridors or linkages;
- Verify the presence and value of these lands on the ground; and
- Save those lands that are currently not protected through targeted acquisitions and easements.
The first three parts of this approach are known as the Green Infrastructure Assessment. Maps and other data from this assessment are distributed by the Maryland Department of Natural Resources to parties interested in land stewardship, as well as the general public. The fourth and most important part, actual land protection and management, is performed by various state programs, county governments, land trusts, and other entities.
In a sense, we are in a race against time. Once an area is developed, it will remain so indefinitely. And development is proceeding at a rapid rate, all across the state. Action is needed now to ensure that our children, our grandchildren, and generations to come, have the same opportunities to enjoy Maryland's outstanding natural resources and high quality of life that we do today.
Landscape assessment procedures
To identify and prioritize Maryland's green infrastructure, we developed a tool called the Green Infrastructure Assessment (GIA). The GIA was based on principles of landscape ecology and conservation biology, and provides a consistent approach to evaluating land conservation and restoration efforts in Maryland. It specifically attempts to recognize:
- a variety of natural resource values (as opposed to a single species of wildlife, for example),
- how a given place fits into a larger system,
- the ecological importance of natural open space in rural and developed areas,
- the importance of coordinating local, state and even interstate planning, and
- the need for a regional or landscape-level view for wildlife conservation.
The GIA identified two types of important resource lands - "hubs" and "corridors." Hubs are typically large contiguous areas, separated by major roads and/or human land uses, that contain one or more of the following:
- Large blocks of contiguous interior forest (containing at least 250 acres, plus a transition zone of 300 feet)
- Large wetland complexes, with at least 250 acres of unmodified wetlands
- Important animal and plant habitats of at least 100 acres, including rare, threatened, and endangered species locations; unique ecological communities; and migratory bird habitats
- Relatively pristine stream and river segments (which, when considered with adjacent forests and wetlands, are at least 100 acres) that support trout, mussels, and other sensitive aquatic organisms
- Existing protected natural resource lands which contain one or more of the above (for example, state parks and forests, National Wildlife Refuges, locally owned reservoir properties, major stream valley parks, and Nature Conservancy preserves)
In the GIA model, the above features were identified from Geographic Information Systems (GIS) spatial data that covered the entire state. Developed areas and major roads were excluded, areas less than 100 contiguous acres were dropped, adjacent forest and wetland were added to the remaining hubs, and the edges were smoothed. The average size of all hubs in the state is approximately 2200 acres.
Corridors are linear features connecting hubs together to help animals and plant propagules to move between hubs. Corridors were identified using many sets of data, including land cover, roads, streams, slope, flood plains, aquatic resource data, and fish blockages. Generally speaking, corridors connect hubs of similar type (hubs containing forests are connected to one another; while those consisting primarily of wetlands are connected to others containing wetlands). Corridors generally follow the best ecological or "most natural" routes between hubs. Typically these are streams with wide riparian buffers and healthy fish communities. Other good wildlife corridors include ridge lines or forested valleys. Developed areas, major roads, and other unsuitable features were avoided.
The GIA also provides an approach for ranking or prioritizing land protection efforts. Hubs and corridors were assessed for a variety of ecological parameters, and then ranked within their physiographic region. Physiographic regions have a characteristic geology and climate, which shapes the ecosystems and communities within them. We wanted to protect the best examples of each of these regions, ensuring ecosystems adapted to different climates and substrates were represented in the top ranking hubs. The hubs were also grouped by physiographic region because natural conditions and communities vary greatly between the Coastal Plain and the Appalachian mountains. For example, tidal marsh is not found outside the Coastal Plain, and high gradient streams are not found inside it.
The GIA can also help evaluate specific local areas. Individual "grid cells" were pixels determined by the resolution of the satellite imagery we used. The cells were squares corresponding to an area of 0.314 acre. Each cell in Maryland was given an ecological score based on both its local significance and its landscape context. Part of the cell ecological score was the rank of the landscape feature in the Green infrastructure network (i.e., whether it fell within a hub or corridor, and the relative ecological importance of that component), and part of the cell rank was based on local features (e.g., proximity to streams or rare species habitat). The cell-based evaluation permits more detailed site comparisons and prioritizations.
Green infrastructure hubs and corridors were also examined for their level of protection, management status, and risk of development. The vast majority (70%) of the Green infrastructure is unprotected. And only 13% of hubs, and less than 1% of corridors, were in areas managed primarily for natural values. Some of the factors used to estimate relative development risk included land ownership, regulatory restrictions, zoning, water and sewer service, population trends, parcelization, commuting distances, land value, proximity to roads, presence of waterfronts, and proximity to parks or other preserved open space. A hub or corridor's risk of development can be combined with its ecological score to help prioritize conservation efforts. Individual cells were also examined for their development risk.
Gaps are developed, agricultural, mined, or cleared lands within the Green infrastructure network that could be targeted for restoration. These were evaluated for their potential restoration to forest, wetland, or riparian buffers, by considering watershed condition, landscape position, local features, ownership, and programmatic considerations. Gaps with hydric soils were probably once wetlands, and could be restored as such. Reforestation of gaps along streams would not only benefit wildlife, but improve water quality and stream stability. Dredged, filled, or drained wetlands can also be restored. Roads in the Green infrastructure can be modified to mitigate some of their negative impacts. Structures such as underpasses or bridges can be designed to assist wildlife movement where roads and railways form barriers across corridors and hubs. Similarly, stream blockages can be examined for fish ladders, bypasses, or other structures that allow fish passage.
The results of the GIA were reviewed by field ecologists and county planners, and compared to other inventories of important natural resources in Maryland. Hub and corridor locations identified by the model were largely consistent with existing natural areas, although some small features, like some streams and isolated wetlands, were missed. Although only about a third of the land in the state were identified as being in the Green infrastructure network, most of Maryland's important natural resources were captured.
Setting priorities for parcel acquisition
In 2003, Governor Ehrlich helped institutionalize the Green Infrastructure into State Land Conservation Planning by expanding the criteria used to evaluate the State’s land preservation purchases to include a comprehensive set of ecological indicators.
Through this initiative, State land conservation programs such as Rural Legacy and Program Open Space will prioritize their conservation activities on areas identified as Green Infrastructure. A copy of the Governor's Land Conservation Plan can be accessed by clicking HERE
The following protocol was developed to help select and prioritize parcels for acquisition by State land conservation programs using elements of the green infrastructure. This is a three tier process:
Identification of candidate properties for acquisition, either proactively in focus areas (hubs and corridors that are highly significant ecologically, and under significant threat from development); or opportunistically from existing pools of willing sellers and other sources. The parcel boundaries are then digitized from tax maps.
Evaluation of the property to determine:
- if the project contains green infrastructure as delineated in the Green Infrastructure Assessment model,
- the amount, percentage, and ecological significance of green infrastructure present,
- proximity to existing protected lands and contribution to further protection of the green infrastructure hub or corridor the property lies in,
- an overall ecological score for the project, and
- the presence of other conservation features on the property.
For those properties rating highly in Tier 2, a cursory or "drive-by" field visit to areas easily accessible by roads or trails, to:
This step was performed by helicopter for areas on the Eastern shore and southern Maryland.
- verify the Green Infrastructure Assessment model,
- identify potential restoration needs, and
- estimate the threat of development the property faces if fee or easement acquisition is not pursued.
The Green Infrastructure Assessment methodologies, along with relevant background material, are described in http://www.dnr.state.md.us/greenways/gi/gidoc/gidoc.html. The finer details are found in the Appendices.
Further information can be obtained by contacting the Maryland Department of Natural Resources, Watershed Services Center.
Return to Green Infrastructure main page
© 2003 Maryland Department of Natural Resources | <urn:uuid:0cfc36ef-36b8-438d-a9cc-91f7d4480642> | {
"date": "2014-08-23T15:21:30",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00112-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9430969953536987,
"score": 3.5,
"token_count": 4380,
"url": "http://www.dnr.state.md.us/greenways/gi/overview/overview.html"
} |
Children with higher genetic risk for Attention-Deficit/Hyperactivity Disorder (ADHD) are more likely to see their symptoms persist into their late teenage years, according to findings from the Avon Longitudinal Study of Parents and Children (ALSPAC).
For most children with ADHD, their hyperactivity and inattention fade as they get older. Children with other neurodevelopmental conditions, such as autism and communication or learning disorders, also see their symptoms lessen with time. However, a small number of children continue to display symptoms throughout adolescence and into adulthood.
Research led by the MRC Centre for Neuropsychiatric Genetics and Genomics analysed information on more than 9,700 young people born in the former county of Avon in 1991-92, who are being followed by ALSPAC. They looked at the children’s genetic risk for ADHD, and the likelihood that their symptoms lasted beyond childhood.
Only a small proportion – 4 per cent – were persistently hyperactive and inattentive from age 4 to 17. Just under 6 per cent exhibited these symptoms only in childhood, and the majority (over 90%) only ever displayed low or modest levels.
Children with the highest genetic risk for ADHD were the most likely to display symptoms through to late adolescence.
The most genetically predisposed to ADHD were also most likely to display other social and conduct problems in childhood, including low IQ, social communication problems, language difficulties and poor behaviour. For example, more than half of the children with persistent symptoms of ADHD had trouble with interpersonal communication, compared to just 3 per cent of those with low signs of the disorder. They were also significantly more likely to have multiple social and conduct problems.
The authors explained that the presence of other problems “may help to identify children with ADHD whose symptoms are most likely to continue into adolescence”.
Read the full paper
‘Association of genetic risk variants with Attention-Deficit/Hyperactivity Disorder trajectories in the general population’ by Anita Thapar et al. was published in JAMA Psychiatry in November 2016. | <urn:uuid:02b50630-43f8-42e0-914c-ce07d41083f0> | {
"date": "2019-12-09T01:00:10",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540515344.59/warc/CC-MAIN-20191208230118-20191209014118-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9663048386573792,
"score": 3.234375,
"token_count": 424,
"url": "https://www.closer.ac.uk/news-opinion/news/genes-play-a-significant-role-in-persisting-symptoms/"
} |
Church Role in Agriculture
It is necessary, then, to point in a truly unified way to a new balance between agriculture, industry and services, so that development be sustainable, and no one go without bread and work, and so that air and water and the other primary resources be preserved as universal goods.
— Pope Emeritus Benedict XVI “Caritas in Veritate,” No. 27
When it comes to economic sectors like agriculture, some believe the Church should not get involved in business or policy matters. The Church should only provide “spiritual nourishment” to its members.
But bishops and church leaders follow a different track: Hearing the cry of vulnerable farmers in a merciless global market beyond their control, the Church is compelled to act in the secular world.
The Catholic Church speaks out on agricultural issues because much is at stake in moral and human terms: food is essential to sustain life. Who can deny that providing food for all is a Gospel imperative?
When the U.S. Farm Bill is periodically reauthorized by Congress, the Church gives due attention to agricultural, food assistance and rural development issues. The bishops give careful consideration and offer their perspectives based on Catholic social teachings. They do so not to set public policy, but rather to create a moral framework.
By doing so, the Church reminds us of the common good and “living in the light” of Gospel teachings. Church leaders can raise questions and ask policy-makers — political leaders, agricultural experts, advocates, and activists — to make policy choices with the most vulnerable in mind.
This goes beyond providing food for all: the Church cares for all those who produce the food – farmers and farmworkers – and calls for good stewardship of the land for future generations.
For I was hungry and you gave me food, I was thirsty and you gave me drink, I was a stranger and you welcomed me. (Matthew 25:35) | <urn:uuid:51e2ed6f-560b-47bb-8e0a-eae8fbbde1ff> | {
"date": "2019-04-18T16:40:37",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9557204842567444,
"score": 2.625,
"token_count": 394,
"url": "https://catholicrurallife.org/impact/church-role-in-agriculture/"
} |
Worms vary in dimension from microscopic to over 1 metre (3.3 feet) in length for aquatic polychaete worms (bristle worms), 6.7 metres (22 feet) for the African titan earthworm, Microchaetus, and 55 metres (180 ft) for the marine nemertean worm (bootlace worm), Lineus longissimus. Free-living worm species might live on land, in freshwater or marine settings, or burrow. In biology, "worm" refers to an outdated taxon (vermes) utilized.
Black-Backed Magpie, native to Australia and southern Papua New Guinea. It's pretty warble can be heard everywhere but it's a territorial bird when young are born and many's the person who's been dive-bombed and pecked by a parent bird protecting its nest and chicks. | <urn:uuid:b7aee1dc-2f7f-42cd-bb15-cc4aa886196b> | {
"date": "2016-10-27T00:29:01",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00098-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9112712740898132,
"score": 3.328125,
"token_count": 177,
"url": "https://za.pinterest.com/pin/378302437430567000/"
} |
An iceberg is a large piece of ice formed from freshwater that has broken off from a glacier or ice shelf and is floating in open water. It may subsequently become frozen into pack ice. Alternatively, it may come to rest on the seabed in shallower water, causing ice gouging in the land underneath or becoming an ice island. Because the density of pure ice is less than sea water an iceberg will float in sea water with about one-ninth of the volume of an iceberg above water. The shape of the underwater portion can be difficult to judge by looking at the portion above the surface. This has led to the expression "tip of the iceberg", for a problem or difficulty that is only a small manifestation of a larger problem.
Icebergs have always naturally formed. It has been speculated that iceberg formation will increasd as the climate warms. For example, last week, an iceberg four times the size of Manhattan broke off Greenland's Petermann Glacier. The ice island is now drifting south through the Nares Strait between Greenland and Canada. Experts are not sure whether it will make it all the way to the Atlantic and what damage it might cause on its way.
Once icebergs were nameless navigational obstacles such as the one that sunk the Titantic. Nowadays they are named and the larger ones routinely tracked. The following is a list of the more recent large bergs:
* Iceberg B-15 11,000 square kilometres, 2000,
* Iceberg B-15A, 3,100 square kilometres (1,200 sq mi), broke off 2003
* Iceberg C-19, 5,500 km2, 2002
* Iceberg B-9, 5,390 km2, 1987
* Iceberg D-16, 120 sq mi, 2006
The largest is the size of Jamaica and has been floating around Antarctica since its birth slowly melting and crumbling. The letter B indicates its location (Amundsen Sea).
Calving is the process that causes iceberg formation. It can be caused by tidal and seismic events, periodic calving and disintegration of ice masses are considered normal geological processes. One of the most important causal factors in glacial calving is the tendency of the ice to spread out at the terminus of the glacier. Other important variables include tidal fluctuations, storm surges, collisions from other ice masses, melt water wedging into crevasses, and pre-existing flaws along which calving might occur.
Global warming will lead to more melt water that will gradually help widen cracks and break off more icebergs in the future. Presently there is no firm mathematical formula for predicting calving.
Where do the icebergs go? Many stay near where they form. Others drift south or north into more active sea lanes causing potential damage and losses.
For further information: http://en.wikipedia.org/wiki/Iceberg or http://www.npr.org/templates/story/story.php?storyId=129183533&ft=1&f=1025 | <urn:uuid:cca105bb-7ce9-4761-890f-f3e911b4753e> | {
"date": "2015-10-07T16:11:43",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737867468.81/warc/CC-MAIN-20151001221747-00148-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.940078854560852,
"score": 4.21875,
"token_count": 625,
"url": "http://www.enn.com/sci-tech/article/41664"
} |
Astronomers using the NASA Hubble Space Telescope's Advanced Camera for Surveys (ACS) have found two supernovae that exploded so long ago they provide new clues about the accelerating universe and its mysterious "dark energy." The supernovae are approximately 5 and 8 billion light-years from Earth. The farther one exploded so long ago the universe may still have been decelerating under its own gravity.
"We're trying to fill in a blank region where the universe's rate of expansion switched from deceleration due to gravity to acceleration due to the repulsive force of dark energy," says John Blakeslee, an associate ACS research scientist at Johns Hopkins University, Baltimore, Md., and lead author of a new paper due out in the June Astrophysical Journal. "That's a real challenge, but the ACS is making it very straightforward to find distant supernovae and get detailed information about them."
"This beautifully demonstrates that the ACS is a 'supernova machine' for probing the early universe," says co-investigator Holland Ford, who headed the team that developed the ACS camera that was installed on Hubble in March 2002. According to the Johns Hopkins astronomers, the supernovae they discovered will be just the first of many to be identified with the ACS.
Coupled with Hubble's powerful vision, the ACS can pick out the faint glow of the distant supernovae. The ACS can then dissect their light (by spectroscopy) to measure their distances, study how they fade, and confirm that they are a special type of exploding star that are reliable distance indicators.
In 2001 Hubble astronomers found a supernova even farther away. It offered the first evidence the expanding universe was once decelerating. Astronomers are using Hubble's new camera to go supernova hunting for supporting evidence. "We have enough data on the new supernovae to constrain both their distance and the amount of dust obscuration," says Blakeslee. The filtering effects of interstellar dust can lead to misinterpretation of the cosmic distances unless carefully taken into account.
Type Ia supernovae are believed to be white dwarf stars that pull in gas from an orbiting companion star. The white dwarf siphons off mass until it hits a critical point where a thermonuclear "burning" wave of oxygen, carbon, and heavier elements immolates the star in a few seconds. The physics of the explosions is so similar from star to star that all Type Ia supernovae glow at a predictable peak brightness. This makes them reliable objects for calibrating vast intergalactic distances.
The supernovae were found when ACS team members Daniel Magee (University of California at Santa Cruz) and Zlatan Tsvetanov (Johns Hopkins University) compared earlier Hubble images of the same patch of sky with new ACS images and identified the two supernovae. Follow-up observations were then conducted with ACS and other Hubble instruments to get a detailed fix on their intensities and distances from Earth.
Information from studies of Type Ia supernovae confronted astronomers about five years ago with the stunning, unexpected revelation that galaxies appeared to be moving away from each other at an ever-increasing speed. They've attributed this accelerating expansion to a mysterious factor known as dark energy that is believed to permeate the universe.
Looking farther away into the universe (and, because of the distances involved, further into the past), they've seen evidence that gravity was at that time slowing the expansion of the universe. Astronomers have very little data, though, on the period of transition between these two phases, when the repulsion produced by dark energy began to surpass the tug of gravity.
"Continued studies of supernovae will allow us to uncover the full history of the universal expansion," Blakeslee says. "The sharper images, wider viewing area, and keener sensitivity of ACS should allow astronomers to discover roughly 10 times as many of these cosmic beacons as was possible with Hubble's previous main imaging camera."
Space Telescope Science Institute, Baltimore, MD
(Phone: 410/338-4514; E-mail: [email protected]) | <urn:uuid:a1a4ab65-29cb-40c1-80d5-5d42a1c51364> | {
"date": "2014-03-08T01:49:39",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999652570/warc/CC-MAIN-20140305060732-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9422782063484192,
"score": 3.734375,
"token_count": 843,
"url": "http://hubblesite.org/newscenter/archive/releases/2003/2003/12/text/"
} |
Is your body suffering the effects of inflammation?
Inflammation can be the cause of multiple health problems and is most easily described as "a fire within". It is the body's protective response to harmful agents such as allergens, different irritants, obesity, poor diet and lifestyle or disease due to bacteria or virus. Think of it as the body's way of removing harmful agents. Inflammation is typically seen on the outside of the body as a red, swollen, hot area (where an injury or bite might have occurred). This redness, swelling and heat is an indication of the body's defenses killing the invaders.
Is your pain sending you a message?
Inside the body inflammation is often experienced as pain. Like a smoke signal, pain is the body's way of telling you have a problem or a "fire within". Examples of inflammation that cause pain include rheumatoid arthritis, injuries, nerve damage, neuropathies or joint problems. Inflammation can also cause pain such as headaches/migraines or digestive disorders such as irritable bowel syndrome.
So how do I safely extinguish inflammation and treat pain naturally?
It is an unfortunate fact that people rely heavily on pain medications, often with little relief. Sadly, these drugs can cause side effects which produce a whole range of other problems such as a bleeding gut. So what can you do to decrease your pain and how do you know which natural products really work? Without the time and energy to do extensive research and without trying multiple products to see what works best for you, finding a suitable, good quality, reliable product that actually works, can be difficult. Fortunately trained natural health practitioners, have easy access to this knowledge and can help you sort out what really works. Here are just a few herbs with remarkable healing properties (which have traditionally been used for years), which science has now proven to be effective for pain relief.
* Turmeric has strong anti-inflammatory properties and is particularly useful in treating arthritic and rheumatic symptoms such as pain and swelling.
* Boswellia is useful for all types of pain and boasts analgesic, anti-inflammatory and anti-rheumatic effects. Pain from traumatic injuries and arthritic pain, responds particularly well to boswellia.
* Ginger is a a fabulous herb for arthritis and also heals the gut.
* High dose EPA found in fish oil, has powerful anti-inflammatory properties and is used for the treatment of not only pain but also the heart, skin and blood pressure.
What dietary changes will help me heal?
The latest research tells us that diet has an enormous impact on inflammation. Your first priority should be to reduce gluten containing foods. Gluten frequently bypasses the tight protective junctions of your small intestine, is reabsorbed back into the blood stream and starts the cascade of inflammation. Also don't forget about reducing other inflammatory foods such as sugary and processed foods, bad fats, colourants and flavourings. Eat more nuts, fish, olive oil and don't forget those fabulous spices.
Pain and inflammation can destroy your quality of life - don't let this happen to you! Safe, scientifically proven natural supplements and an anti-inflammatory diet will help you feel fabulous again.
Visit http://www.recipetohealth.com for more health information as well as in depth food guides and recipes for specific health problems.
Vivienne Savill is a registered nurse and naturopath in Darwin, Australia. She has worked in the health care industry for many years, with much of that time spent working in mainstream health facilities such as hospitals. She now runs a natural health clinic and over the years has helped many people regain true health and feel 100% again. | <urn:uuid:2f2c6fc0-b8f0-41e8-8759-e40021070792> | {
"date": "2014-10-22T13:48:06",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507447020.15/warc/CC-MAIN-20141017005727-00217-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9489812850952148,
"score": 2.625,
"token_count": 761,
"url": "http://www.inflammationreliefnow.com/2011/08/natural-ways-to-treat-pain-and.html"
} |
The human brain is complex and amazing. Many researchers are still discovering the mystery of how the brain works and there is still a lot of information to uncover. However, there are still also some misconceptions about how the brain works. Here are the following misconceptions about brain that you must know:
Myth: Only the 10% of human brain is at work.
Truth: Based on experiments on PET and MRI scan proves that the brain is working and active at any given activity. Although the brain does not function simultaneously, it was shown that the all of the area of the brain still function normally. It is just a matter of how often we exercise our brain. We might lose some brain tissue but still our brain can function pretty well.
Myth: Brain injury is forever.
Truth: The truth is that brain injury that cause lasting damage depends on which part of the brain and the types of injury. Like for example a concussion is a very serious problem but it takes time for the person to recover and a stroke can leave a serious concern to the brain and can actually become permanent. However, there are some cases in where the stroke can be recovered through therapy in which will help the brain to create new connection to the brain cells and improve the motor capabilities.
Myth: Classical music can stimulate your brain and makes you smarter.
Truth: Classical music does not have impact on your intellectual by all means. There was a study in 1993 where a group of researchers proved than students who listened to classical music scored above average in their IQ test but apparently this so-called Mozart effect is only temporary because they were asked to take another test after 15 minute and the result were different. Note: playing musical instruments however, can enhance your cognitive skills in the long run.
Myth: Alcohol will always kill the brain cells.
Truth: Alcoholic beverages do not kill the brain cells but it is a substance that alters the brain function because of its addictive abilities. But when the alcohol substance is abuse in the long term, it can and may damage the brain cells. Nevertheless, consuming moderate amount of red wine is great for the brain.
Myth: Drugs make holes in the brain.
Truth: Drugs are another addictive substance that alters the brain function but it does not create hole in your brain. Only physical trauma can put holes in the brain. I am not encouraging anyone to take drugs by all means. Bear in mind that drugs can still interfere with your brain’s system by blocking the activity of your brain cells.
Myth: Solving puzzle games can increase your overall brain’s performance.
Truth: Playing mind games such as crossword puzzles, Sudoku and the like can only improve and exercise your learning skills but not your overall brain ability. Just maintain a healthy diet and regular exercise can greatly affects your memory and cognitive in positive ways.
Myth: Human has the largest brain among any other creature on earth,
Truth: The human brain only weighs about three pounds and is around 15 centimeters in length. If we compare the human brain and all the creatures on earth, sperm whale has the largest brain. It weighs at 18 pounds while elephant 11 pounds. Still thinks human has the largest brain? Think again.
Myth: Human brain consists of 100 billion neurons.
Truth: Whoever created this myth did not do his calculation well! Scientists have gone through extensive research regarding the neurons in the brain and they discovered that the human brain contains around 85 billion neurons. So, if you heard your kids says that we have 100 billion neurons according to his science teacher in class, you should give the correct your kids.
Myth: Our brain cells are permanent and it dies as we age.
Truth: Have anyone ever told you that your brain cells forms new ones? Yes, it is! It is true that cells dies as we age but it also forms new cells during the course of your life. This process is called neurogenesis and it occurs in one region of your brain called the hippocampus.
Myth: A massive bump in the head can cause amnesia.
Truth: While popular TV and soap operas told you that a massive impact on the brain can lead to amnesia are true, it is actually false and absurd. There are two types of amnesia: the lack of ability to form new memories (anterograde) and the lack of ability to recall past memories (retrograde). Retrograde amnesia is usually cause by Alzheimer’s disease or traumatic brain injury.
I believe that we heard more about the rumors and myth about the brain which sounds legit to us but actually are very wrong and misleading. I hope through this article, you can learn a bit of how the brain works and what are the things that were exaggerated by people regarding the brain. | <urn:uuid:ead7f577-de43-4523-8d83-2b9a8ecdce7c> | {
"date": "2017-08-21T11:48:52",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108268.39/warc/CC-MAIN-20170821114342-20170821134342-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9605464339256287,
"score": 3.140625,
"token_count": 968,
"url": "http://designcanes.com/ten-misconception-and-truth-about-the-brain-that-you-should-know/"
} |
Network With Us
Join us on Facebook to get the latest news and updates.
ReGina Harvey's Story
Sparking Imagination and Engagement With Fractured Fairy Tales
Teaching kindergarten students to think for themselves is a challenging task. I am frequently looking for new and inventive ways to spark imagination and enhance comprehension. One day I found the lesson “Cowboys and Castles: Interacting with Fractured Texas Tales” on the ReadWriteThink.org. This lesson inspired me and recovered my joy for teaching. I could not wait to teach the lesson. The lesson immediately caught my student’s attention. Using the story Cinderella was an ingenious way to motivate the girls to learn, and the book Bubba the Cowboy Prince was an even more engaging enticement for the boys.
Although I did not follow the author’s exact plan, I used many of her inspiring ideas. Each day we “talked back” to our characters, activated schema, made comparisons, practiced verbally retelling the stories using a retelling picture handout and note for home to explain the task; we also made personal connections, charted story elements, and created our own fractured fairy tale using the interactive tool Fractured Fairy Tales. By time we got to the fractured fairy tale portion of the lesson, the students were very excited about changing the story and making it their own. I truly enjoy this method of teaching; I was amazed at how consumed they became with creating their own stories. The students were more engaged in this lesson than any other lesson I had taught them thus far.
Read Write Think helped me to culminate everything I knew about teaching reading. I now use the site regularly to create my lessons and I have begun to recommend it to my peers.
ReGina Harvey teaches kindergarten at an intercity school in Hattiesburg, MS. She loves to read and write children's books and to read The Reading Teacher. She has been happily married 17 years and has three children: Breanna (15), Naylon (11), and Gianna (2). | <urn:uuid:447be8ac-7e01-4cfa-a14e-d176862d5b82> | {
"date": "2013-12-07T20:45:31",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163055810/warc/CC-MAIN-20131204131735-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9568886756896973,
"score": 2.53125,
"token_count": 425,
"url": "http://www.readwritethink.org/about/community-stories/sparking-imagination-engagement-with-27.html"
} |
We should always remember those heroes who tried their best to conquer Mt. Everest. Their efforts made this highest mountain in the world become accessible and our dreaming Everest tour turn into reality.
- In 1947, a Canadian man named Le · Diman climbed Mt. Everest from Tibet with a few local porters. But they only ascended at around 6,400 meters (20,998 feet) and got returned. This is the first Everest climbing after the second world war.
This time and those 8 times I’ve written in my last post were all climbing Everest from Tibet, China and none of it succeed.
The liberation movement was happening in Tibet during 1950-1951. Therefore, foreign mountaineers were allowed to climb Everest from Tibet only with government’s permission, which was controlled under strict regulations. From then on, the foreign mountaineers changed to climb Everest from the South Col, Nepal.
- In 1950, the first climbing group formed by Americans climbed Everest by following the South Col Route with the lead of Houston. As this was the first time to climb from Nepal, they only arrived at Khumbu Glacier, 6,100 meters (20.014 feet) above sea level.
- At the same year, a British team which was declared to be a reconnaissance team by captain Dierman, climbed Everest from the south side, Nepal. They had only 5 members and descended from 5,480 meters (17,979 feet). This was also the second time for Dierman to climb Everest.
- In 1951, same as the first time, British mountaineer Shipton led a team of 7 members arrived at Khumbu Glacier and returned after crossing 6,450 meters (21,162 meters).
- In 1951, a Danish man whose name was Larson crossed the border of China and Nepal illegally and tried to climb Everest from Tibet. As a result, he didn’t make it higher than 6,500 meters (21,326 feet).
- In May 1952, a Swiss climbing team formed with 10 Mountaineers, started the conquering journey from the south side of Everest, Nepal. The leader was Dietmar. There were two members, Ranbir and the Nepali porter Tengxin, had reached over 8,540 meters (28,019 feet). But they didn’t go further because the weather turned worse. Although they didn’t complete a successful summit, they did discover a route to the top from the south side of Everest, which was meaningful in the history of conquering Mt. Everest.
- In October 1952, also a Swiss team led by Sheva, climbed Everest from the South Col for the first time in Autumn, which was after the rainy season. Ranbir and Tengxin joined this group as well, it’s only less than 5 months after their first Everest climbing. But they were stopped at 8,100 meters (26,575 feet) for the same reason as the last time – the changing weather.
- 29th. May 1953, this was meant to be the most memorable day in the history of climbing Everest. Leading by John Hunter, a British team formed by 10 Mountaineers, started the trip to Everest from the South side, Nepal. Finally, the New Zealander Edmund Hillary and Nepali Sherpa guide Tenzing Norgay succeed to reach the summit of Everest, which renewed the record of climbing Everest. This was the first time for human beings standing on the top of the highest mountain on earth, the nearest place to heaven. At this time, Mt. Everest was measured as 8,840 meters (29,003 feet). There were another two members of the team, Avans and Bull had reached 8,720 meters (28,609 feet) as well.
—to be continued | <urn:uuid:333e223c-fb84-45eb-a579-ccc575b00d5e> | {
"date": "2018-09-19T09:34:15",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156096.0/warc/CC-MAIN-20180919083126-20180919103126-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.977313756942749,
"score": 2.890625,
"token_count": 783,
"url": "http://www.everestbasecamptrek.net/2017/08/14/the-historic-moments-of-climbing-mt-everest-2/"
} |
The Global Gender Gap Index has just been published but the World Economic Forum. It was first introduced by the World Economic Forum in 2006 as a framework for capturing the magnitude of gender-based disparities and tracking their progress over time. This year’s edition of the Report benchmarks 144 countries on their progress towards gender parity on a scale from 0 (imparity) to1 (parity) across four thematic dimensions—Economic Participation and Opportunity, Educational Attainment, Health and Survival, and Political Empowerment—and provides country rankings that allow for effective comparisons across regions and income groups.
On current trends, the overall global gender gap can be closed in exactly 100 years across the 106 countries covered since the inception of the Report, compared to 83 years last year. The most challenging gender gaps remain in the economic and health spheres. Given the continued widening of the economic gender gap, it will now not be closed for another 217 years. However, the education–specific gender gap could be reduced to parity within the next 13 years. The political dimension currently holds the widest gender gap and is also the one exhibiting the most progress, despite a slowdown in progress this year. It could be closed within 99 years. The health gender gap is larger than it stood in 2006.
While all world regions record a narrower gender gap than they did 11 years ago, more efforts will continue to be needed to accelerate progress. At the current rate of progress, the overall global gender gap can be closed in 61 years in Western Europe, 62 years in South Asia, 79 years in Latin America and the Caribbean, 102 years in Sub-Saharan Africa, 128 years in Eastern Europe and Central Asia, 157 years in the Middle East and North Africa, 161 years in East Asia and the Pacific, and 168 years in North America.
A variety of models and empirical studies have suggested that improving gender parity may result in significant economic dividends, which vary depending on the situation of different economies and the specific challenges they are facing. Notable recent estimates suggest that economic gender parity could add an additional US$250 billion to the GDP of the United Kingdom, US$1,750 billion to that of the United States, US$550 billion to Japan’s, US$320 billion to France’s and US$310 billion to the GDP of Germany. Other recent estimates suggest that China could see a US$2.5 trillion GDP increase from gender parity and that the world as a whole could increase global GDP by US$5.3 trillion by 2025 by closing the gender gap in economic participation by 25% over the same period.
Get the full report here. | <urn:uuid:6767b77a-20d5-4464-bb01-3dab00fad5d7> | {
"date": "2019-01-17T17:07:49",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659056.44/warc/CC-MAIN-20190117163938-20190117185938-00256.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9378437995910645,
"score": 3.5,
"token_count": 532,
"url": "https://fiftyonepercent.net.au/2017/11/03/slow-work-on-the-global-gender-gap/"
} |
Linear regression calculatorTwo-dimensional linear regression of statistical data is done by the method of least squares. Enter the statistical data in the form of a pair of numbers, each pair is on a separate line. The first number is considered as X (each odd-numbered in the order), second as Y (each even-numbered in the order).
The output of the linear regression is coefficients A and B of the linear function f(x) = Ax + B, which approximates given 2D data by linear function (line). Least squares means that we minimize the sum of the squares of the errors made in the results of every point.
Also calculate coefficient of correlation Pearson product-moment correlation coefficient (PPMCC or PCC or R) is a measure of the linear correlation (dependence) between two variables X and Y, giving a value between +1 and −1 inclusive, where 1 is total positive correlation, 0 is no correlation, and −1 is total negative correlation. | <urn:uuid:fee9a746-6fb2-4e06-b061-0f152ba597d0> | {
"date": "2016-08-23T20:59:51",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982290442.1/warc/CC-MAIN-20160823195810-00056-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9181077480316162,
"score": 3.625,
"token_count": 203,
"url": "https://www.hackmath.net/en/calculator/linear-regression"
} |
After getting the knowledge about the Davis Cup, now its time to know some of the interesting facts about Davis Cup, a tournament which has a long history of over 114 years. Remember, Davis Cup is a team event which is played between the nations recognized by the ITF (International Tennis Federation) and no ATP rankings are involved.
Some of the Interesting Facts about Davis Cup
- Dwight F Davis, who initiated the first ever international tennis tournament bear the expenses of the tournament trophy when it was first played in the year 1900. The total expense was US$ 1000
- If we calculate the cost of the Davis Cup trophy today that it can be more than US$ 700, 000
- Total 217 ounces of silver is used in the trophy. It is 13 inches tall and it has a diameter of 18 inches. Rowland Rhodes is the designer of the trophy he was an English national.
- Each year the winner and the runners up team names get engraved on the plinth of the trophy. When one bowl is finished, another bowl is added to accommodate fresh winner’s name on the trophy, hence it is a never ending process.
- Since its inception the Davis Cup trophy has been presented 101 times till 2013.
- Davis Cup is the only team tournament in the world which has lasted a full century.
- Despite the game of tennis being more individual than a team game playing in Davis Cup and for that matter playing for your country has always been a matter of pride for the most of the tennis players around the world.
- From 1905 to 1914 Australia and New Zealand have sent a combined team to play in the Davis Cup as ‘Australasia’.
- The United States have won the most number of Davis Cup tournaments which is 32.
- Australia had the best winning streak from 1950 to 1967, during which they won 15 titles.
- In the year 1974 both South Africa and India reached the Davis Cup finals for the first time ever. They even became the first non American and Non Europe teams. But because South African government’s apartheid politics, India refused to compete and South Africa was declared winners by default. But since then South Africa has never reached in the finals of the Davis Cup.
- Davis Cup matches in Sweden have been stopped twice because of various political reasons. First in 1968 due to Rhodesia problem, then in 1975 because of human rights violation in Chile, as Chile was playing that tie. Recently in 2009 the match between Sweden and Israel was allowed to a small audience, citing security concerns occurred due to political unrest in Gaza a year earlier.
- The tie-breaker was included only in the year 1989. Prior to that there was no tie-breaker in any set. Now only fifth set doesn’t have a tie-breaker. | <urn:uuid:dc35ea1d-1b81-479a-8d7f-020bfd5c7a50> | {
"date": "2018-10-18T16:48:55",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511889.43/warc/CC-MAIN-20181018152212-20181018173712-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9724790453910828,
"score": 3.015625,
"token_count": 567,
"url": "http://sportycious.com/interesting-facts-davis-cup-91744"
} |
are highly preferred for working in hazardous environments to avoid risk to human life. This is the major factor attributing the growth of nuclear robotics industry. Nowadays, robotics have become integral part of nuclear works and robots have to perform various functions in the nuclear reactors such as cleaning, inspection, waste swabbing, pallet loading, taking routine measurements, handling nuclear chemicals, and nuclear decommissioning, among others. Robots used in nuclear industry have to function in limited work space, must conform to facility, and have to work with high payloads.
The report classifies the nuclear robotics markets
by power type such as electric, hydraulic, and pneumatic. Though pneumatic powered robots have high speed, they have limited position control and low force potential and hence are used in limited nuclear applications. Electrically powered robots are more precise and have advanced control options. These robots are small in size and faster than hydraulic robots. Hydraulic robots have high force and long reach. These types of robots are robust and have high tolerance to shock loads and better recovery options. The report also highlights the major types of nuclear robotics. The major types are single purpose robots and reprogrammable robots. Single purpose robots have limited ability to perform various operations; whereas, reprogrammable robots are multipurpose with computer based intelligence capability.
The report covers various applications of nuclear robots which include routine measurements, inspections, radiochemical handling, and nuclear decommissioning, among others. Besides, the nuclear robot market is further classified on the basis of components such as robot hardware, software and services.
The report gives analysis of various factors such as demand and supply side factors, market dynamics, and driving and inhibiting forces in the nuclear robotics market. The compact size, cost effectiveness and high safety provision to human life from harmful radioactive materials are some of the major factors driving the nuclear robot industry. The pricing analysis of nuclear robots and its impact on value chain of the industry is also analyzed in the report. The opportunity matrix, product lifecycle analysis and mapping of major suppliers and OEMs are also covered in the report extensively.
The report analyzes the different geographic markets such as North America, Europe, Asia-Pacific, South America, and Middle-East and Africa. Likewise, market insights on country level with special focus on leading developed and developing nations is also covered in the report.
The competitiveness among the leading players in the nuclear robotics marekt is measured based on the business developments strategies adopted such as new product launches and developments, mergers and acquisitions, partnerships, and collaborations.
Sample Companies profiled in this Report are:
- Northrop Grumman
- BAE Systems
- AB Precision Ltd.
- Boston Dynamics, | <urn:uuid:50e6f586-6a78-4af0-a3ac-1b636c317cc4> | {
"date": "2019-02-20T23:53:09",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247496855.63/warc/CC-MAIN-20190220230820-20190221012820-00012.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9424477815628052,
"score": 2.6875,
"token_count": 552,
"url": "https://industryarc.com/Report/15594/nuclear-robotics-market.html"
} |
In English, many things are named after a particular country – but have you ever wondered what those things are called in those countries?
1(being linked)conexión feminine
- Through the voices of the villagers, many of whom trace their linkage to the old Chipko movement, the film tries to understand the revolution.
- During the meeting he demanded its detachment from any linkage to the death of the five young men.
- The one thing both sides agree on is that the road would have a major impact on the Eastern Cape landscape insofar as it would dramatically improve access and linkage to the region.
- We have stated that the linkage exists, but we have not fleshed it out in specific terms.
- Samples taken from the crime scene have been sent to forensic laboratories for analysis to ascertain any linkage to the crime.
- But if linkage to the physical world adds reality to an idea, how can he claim that the idea, which is not material, is what redeems British efficiency?
- It was a memorable sermon, lacking any clear outline or notable linkage to the Scripture readings.
- The databank used standardised diagnostic criteria during the study and linkage to the individual original obstetric case notes.
- The chapters do vary significantly, however, in the depth of analysis and the strength of linkage to the central premises of the research.
- So, we shouldn't allow this subtle linkage to Gilgamesh to distract from a proper consideration of paleosols.
- But all the electronics machines were second-hand products and have no linkage to the Internet.
- Any clear linkage to the power and prestige of the central palatial authority would have conferred distinction.
- The textile sector presents good opportunity for us to spur growth and combat poverty because of its vertical linkage to agriculture.
- Community members formed strong linkages with the schools, sharing staff, and building resources and expertise.
- Queensland is focused on establishing linkages that provide a basis for long-term trade relationships.
- There will also be linkage to the town centre from the Industrial Estate to facilitate workers at lunchtime.
- Help us articulate the complexity, responsibility, and accountability of command and its direct linkage to our success as a military profession.
- The IMF presenter demonstrated a strong linkage between the level of per capita GDP and the poverty rate.
- All the elements will need clear linkage to each other through regular meetings, information technology, and shared protocols.
- Countless social standards, now fundamental to our culture, have direct linkage to wartime necessities.
2(device)acoplamiento masculinemecanismo de conexión masculine
- Instead of complex linkages and levers, this one keys right on the trigger bar and a small protrusion pushes the firing - pin stop up.
- The free sliding experiments suggest that mechanical linkages between the doublets prevent free sliding in an intact axoneme.
- The drive elements enable both linear and rotational motion through fully sealed linkages.
- After years of searching for the ideal point at which to attach the suspension linkage to a frame, the gearheads concluded that their sweet spot didn't exist.
- On inspection it was found that everything in the recently developed transmission was operating perfectly, the jamming in fourth gear traced to the mating of the standard gear linkage to the new gearbox.
- Our simulator calculates the forces on the runners and those that are transmitted through the steering linkage to the drivers' hands.
English has borrowed many of the following foreign expressions of parting, so you’ve probably encountered some of these ways to say goodbye in other languages.
Many words formed by the addition of the suffix –ster are now obsolete - which ones are due a resurgence?
As their breed names often attest, dogs are a truly international bunch. Let’s take a look at 12 different dog breed names and their backstories. | <urn:uuid:6d466ec0-7113-4d7e-825f-c92d0d5aef76> | {
"date": "2018-01-21T16:48:16",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890795.64/warc/CC-MAIN-20180121155718-20180121175718-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.926485538482666,
"score": 3.140625,
"token_count": 802,
"url": "https://es.oxforddictionaries.com/translate/english-spanish/linkage"
} |
Roanoke and Wampum: Topics in Native American Heritage and Literatures
"Roanoke and Wampum: Topics in Native American Heritage and Literatures" focuses on the discourses about selected legacies and writings predominantly of eastern Native North America. Ron Welburn skillfully approaches diverse subjects through scholarly and personal modes. More specifically, the book begins with the author reflecting on the sign talk of fifties television's Pahoo-Ka-Ta-Wah, and it concludes with a discussion of a narrative by thirties Chippewa author Thomas Whitecloud. Other essays inquire about the southeastern Blackfoot, Jeffrey Amherst, and literary theories. Still others discuss Indian slaves, the Great Seal of the United States, Mildred Haun's Melungeon novel, and nineteenth-century Indian interviewers. A section on William Apess features poetry and a scholarly essay.
10 pages matching transcribed in this book
Results 1-3 of 10
What people are saying - Write a review
We haven't found any reviews in the usual places.
A Good Word about X Brandss Discourses in Sign
Who Are the Southeastern Blackfoot?
11 other sections not shown
Abenaki African African American American Indian Ani-Kutani arrows autobiography Black Hawk Blackfeet Blackfoot Blacksnake Bruchac Carolina century Cherokee Christian clan Cocke County colonial Colrain Conley Conley's critical cultural dark Dawn Land Deadwood Deadwood Lighter describes discourse ecocriticism ecological Ecuyer Edohi encounters England English episode essay European experience Garcilosa Haithcock Haun Haun's Hawk's Henry Bouquet heritage historians homelands identity indigenous fiction interviews Iroquois issue Jeffery Amherst Kennedy language Lenape literary literature living Massachusetts meaning Melungeons narrative narrator Nations Native American never North novel Occaneechi Ohio oral history origins Patterson and Dougall Pawnee Pequot postcolonial priests readers realize recorded resistance role Saponi Seneca signifies Sihasapa Siouan Sioux slaves smallpox social South southeastern Blackfoot Spanish spiritual Squani stories survival swamp Thomson Timucua traditional transcribed translation tribal tribes Turkish Tutelo Valley Virginia Wampanoag Wampy western Whitecloud William Apess Williams's writing Yancy Derringer York Young | <urn:uuid:ec040dce-4150-44be-aac5-a0cf678b12cf> | {
"date": "2018-05-24T01:03:52",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865863.76/warc/CC-MAIN-20180523235059-20180524015059-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8222165703773499,
"score": 3.296875,
"token_count": 469,
"url": "https://books.google.com/books?id=O_1ZAAAAMAAJ&q=transcribed&dq=related:ISBN0449000753&source=gbs_word_cloud_r&hl=en"
} |
KELSEY, HENRY, explorer, mariner, and overseas governor of the HBC; b. c. 1667; d. 1724.
Kelsey’s reputation rests securely on his journey to the Canadian plains in 1690–92, but this achievement should not be allowed to eclipse his versatility or the solid contributions he made to establishing the HBC. In nearly 40 years of service Kelsey played a part in most of the major events in Hudson Bay. Between 1684 and 1722, there were only three complete years (1704, 1705, and 1713) in which he was absent from the bay. He went out from England for the HBC six times (in 1684, 1694, 1696, 1698, 1706, and 1714); he was twice a prisoner of the French when York Fort was taken, and twice present when it was recovered. He served at Albany when that was the only post in the HBC’s possession, and he helped to develop the East Main trade. He was in the first party which tried to settle at Churchill River (1689) and he contributed to the later and successful establishment of a post there. He had a rare understanding of Indian languages.
Nothing is known for certain of Kelsey’s parentage. A Thomas Kelsey served as an officer in the Parliamentary army and was a major-general of militia in 1655 (DNB); another Thomas Kelsey, goldsmith of London, briefly held stock in the HBC in 1679. The likeliest person to have been Henry’s father is John Kelsey of East Greenwich, mariner, who died in 1674 and who may have been “one Kelsy, a commander of a fire-ship,” mentioned by Pepys (Diary, ed. H. B. Wheatley (10v., London, 1898–99), VII, 180). John Kelsey left three sons of whom the first-named was Henry. Our identification rests chiefly on the East Greenwich connexion, for this is where Henry Kelsey’s wife came from, where his children were baptized, where he owned two houses, and where he himself died and was buried. A difficulty that has not been resolved, however, is that if Henry Kelsey was the eldest son named in John Kelsey’s will he must have been born not later than the summer of 1667, John, the second-named, being baptized on 24 May 1668 (o.s.). This means that when the HBC committee wrote in 1688 of “the Boy Henry Kelsey” (a soubriquet picked up and used by modern writers) he had already reached the age of 21.
Kelsey was apprenticed to the HBC for a term of four years on 15 March 1684. The suggestion has been made that this was his second period of service with the company, the first having run from 1677 to 1684. Kelsey certainly was apprenticed to someone in 1677 for his indenture of that year was in the HBC’s possession in 1683. It does not however follow that he must have joined the company at the age of 10: he and his indenture may have been taken over (in or before 1683) from a former master. Even if he joined at an earlier date it is unlikely that he had served in the Bayside ports before he sailed with Captain John Outlaw* in the Lucy on 6 May 1684.
Kelsey was posted to the fort at Nelson River which was later resited and styled York Fort. A few weeks after his arrival the place was unsuccessfully attacked by the French, but nothing is recorded of Kelsey’s part in the action. The first event which he thought worth entering in his own “Memorandum of my abode in hudsons bay” took place in the winter of 1688–89 when he carried letters (which Indians had failed to get through) from York to New Severn. On the round trip, which took a month, Kelsey was accompanied by an Indian boy. But even before this exploit Kelsey was known to the HBC committee in London as “a very active Lad Delighting much in Indians Compa., being never better pleased than when hee is Travelling amongst them.”
In this same dispatch Kelsey was detailed to go with a party to Churchill River, and in the early summer of 1689 the expedition set out from York. Having landed men to build a factory at Churchill, Captain James Young* with Kelsey aboard tried to sail the Hopewell north along the coast, and it is at this point that the earliest journal in The Kelsey papers begins, “A Journal of a voyage & Journey undertaken by Henry Kelsey to discover & Endeavour to bring to a Commerce ye nothern Indians Inhabiting to ye Northward of Churchill River & also ye dogside Nation.” From 17 to 26 June 1689 the Hopewell, hampered by ice, made only 20 leagues. Kelsey now suggested to Young that he and an Indian boy (the companion of the previous winter) should try their luck ashore. By his own computation Kelsey and the boy marched 138 miles in a northerly direction, inland but not far from the coast. From almost every point of view the trip was a failure. The going was hilly and stony; musk-ox were seen and described in the journal but game proved scarce; Indian litter was found but no Indians. Worst of all, the boy proved more hindrance than help, and was so apprehensive of danger that Kelsey turned back in disgust on 12 July. He travelled 142 miles back to the point where Young had put him ashore and a further 93 miles to Churchill River. The contrast between the disappointments of this march and the success of Kelsey’s journey to the Plains in 1690 is striking. North of Churchill, Kelsey was hampered by his own inexperience but even more by a companion who seems not to have known where he was going. As he tells the story, Kelsey underwent no such traumatic experiences as befell Richard Norton* in these parts nearly 30 years later. But the record for 25 July 1689 suggests that this journey was something more than a country walk: “To day put from ye shore it being dreadfull to behold ye falls we had to pass Considering we had nothing to tye our Raft but small Logline & were forct to shoot 3 Desperate falls ye Raft struck upon two of ym but gott safely over.”
Kelsey intended to return to England in 1686 but did not do so. The following summer, on 12 June 1690, he started from York on the journey for which he is chiefly remembered. Until the publication in 1929 of The Kelsey papers, the only contemporary account of this expedition was in the parliamentary report of 1749 when two (slightly different) versions of Kelsey’s journal were presented to a committee of the House of Commons as evidence of the HBC’s active interest in exploration. This journal covers only the period July to September 1691 when Kelsey was inland, and leaves it unclear where he went and with what object. The ambiguity enabled Joseph Robson*, a former employee of the HBC but in 1749 an opponent, to deny the authenticity of the journal and to propagate a version of Kelsey’s travels which is far from the truth. Robson, claiming to rest his case on oral traditions in the bay, did not seek to impugn Kelsey personally: he admitted that there had been a journey and that Kelsey had acquitted himself well. But he denied that the expedition had been authorized, let alone ordered, by Governor George Geyer* at York. In Robson’s tale Kelsey had run away from Geyer’s ill treatment, travelled inland on his own initiative, communicated with Geyer by means of a letter written in charcoal on birchbark (having no proper writing materials), and finally turned up at York with an Indian wife. Thus Kelsey’s exploit was construed to the company’s discredit. The Kelsey papers, containing the author’s own version of the 1691 journal and a rhymed prologue dealing with his departure from York in the summer of 1690, together with documentation from the HBC archives, put it altogether beyond doubt that Kelsey’s mission was authorized and ordered by Geyer and was a reflection of the London committee’s eagerness that such inland journeys should be made. Whether Robson’s version was of his own invention or whether he took it in good faith from later traditions in the bay, it is impossible to say.
The main purpose of Kelsey’s mission in Geyer’s words was “to call, encourage, and invite, the remoter Indians to a Trade with us.” Kelsey carried samples of the goods normally available at the bayside, including two long English guns, powder, shot, 20 pounds of Brazil tobacco, a brass kettle, beads, hatchets, a blanket, and a lace-coat. Next year Geyer sent up fresh supplies of the same sort. The HBC at this time was interested in ways of diversifying its trade so as to avoid an undue dependence on furs, and the orders sent to Kelsey in 1691 were to look for mines, minerals, and drugs. Probably his instructions included the pacification of Indian tribes, for war in the interior had long been recognized as a hindrance to trade. In any event Kelsey assumed the role of peacemaker. There is indeed no reason to question Geyer’s summary at Kelsey’s homecoming: “[he] travelled and endeavoured to keep the Peace among them according to my Order.”
The direction taken by Kelsey was southwest from York, and he set out cheerfully (according to Geyer), but “with heavy heart” by his own account. The route from York was probably up Hayes River and Fox River to Moose Lake, the same followed by Anthony Henday* in 1754, but this suggestion has been criticized by Doughty and Martin, editors of The Kelsey papers. Less than a month after leaving the bayside Kelsey was “on ye borders of ye stone Indian Country,” his estimated distance from York being 600 miles,
Through Rivers wch run strong with falls
thirty three Carriages five lakes in all.
(The above is a fair sample of Kelsey’s crude verse in the prologue to his journal in The Kelsey papers. No explanation has been offered why he wrote in this way.) Here, on 10 July 1690, Kelsey took possession of the land for his masters, naming the spot “deerings point” after Sir Edward Dering, then deputy governor of the HBC. It is on the location of this place that much of the controversy concerning Kelsey’s travels has turned. Three suggestions have been canvassed. The first, and least plausible, is Split Lake on Nelson River, which would effectively diminish Kelsey’s achievement: this came from L. J. Burpee in 1908 and was virtually withdrawn by him in a later edition of The search for the western sea (1935). The second is Cedar Lake, north of Lake Winnipegosis (C. N. Bell). The third, and now most widely accepted, is a bend in the Saskatchewan River about twelve miles below The Pas, Manitoba (A. S. Morton and others). Kelsey appears not to have travelled far from Derings Point in the winter of 1690–91 and was back there by the spring:
At deerings point after the frost
I set up their a Certain Cross
In token of my being there
Cut out on it ye date of year
And Likewise for to veryfie the same
added to it my master sir Edward deerings name.
Kelsey reported to Geyer by letter and received from York fresh supplies and orders. Then on 15 July 1691 he set out from Derings Point “to discover & bring to a Commerce the Naywatame poets.” Where he went can never be known with perfect certainty, despite the survival of his journal; but C. N. Bell’s summary is the most circumstantial yet made and deserves quotation: “ [Kelsey] ascended the Saskatchewan to the Carrot River at a point on which he abandoned his canoes and proceeded on foot, taking three days under starving conditions to pass through the muskeg country, extending for many miles south of the Saskatchewan River, then entered upon the first firm land, with its wild pigeons and moose, and farther south a more open prairie country which afforded an abundance of red deer, where he met the Eagle Creek Assiniboines, and proceeding on reached the Red Deer River, with its ‘slate mines,’ and, ascending that stream south south-west farther on came to the edge of the timber country, where before him stretched the Great Salt Plain, forty-six miles wide, extending cast and west, and on which he met more of the Assiniboine Indians (these from the adjacent Thunder Hill district) he had journeyed so far to treat with, for he was indeed in ‘the country of the Assiniboines.’ That plain abounded with buffalo, and, crossing it, he again entered a wooded area and high champlain land, replete with ponds and lakes all inhabited by beaver, which was evidently the Touchwood Hills country.” In the course of this journey, on 20 Aug. 1691, Kelsey recorded descriptions of the buffalo and grizzly bear, the first white man to do so in the Canadian west.
Kelsey met a large band of Stone or Mountain Indians (Assiniboines) on 25 August, and soon after he made contact with the “Naywatame” with a view to establishing peace between these two tribes according to Geyer’s instructions. It is not certain who the “Naywatame” were: Burpee suggests “the Nodwayes or Sioux,” and A. S. Morton the Gros Ventres (Atsinas). Kelsey reports his speeches and endeavours briefly and soberly. They were not on the whole successful; nor should it be expected that one young white man 1,000 miles from his friends would be able to heal tribal feuds. The “Naywatame” promised to meet Kelsey at Derings Point next spring and go with him to the Bayside, but fear of attack kept them away. Rich, who called the journey “both in its extent and in its consequences unique in the history of North America,” admits Kelsey’s failure as peacemaker. Kelsey may have spent the winter of 1691–92 south of the Saskatchewan or he may have gone back to Derings Point: the daily entries in his journal cease on 12 Sept. 1691. He returned to York in the summer of 1692 after an absence of two years. Geyer, who was evidently well pleased, reported Kelsey’s arrival “with a good Fleet of Indians” in his letter to London of 9 Sept. 1692.
Such was Kelsey’s exploration into the west. At times it was hard, and there may well have been dangers even if we discard with the rest of the fiction Robson’s tale of Kelsey’s killing two grizzly bears with two shots. Considered purely as a piece of pathfinding, the journey was a major achievement though Kelsey’s journal is suggestive of his having travelled always in the company of Indians who knew what they were doing. To say this is not to diminish Kelsey’s personal credit but rather to emphasize his outstanding talent for winning the confidence of the Indians whom he accompanied: this talent and a courageous spirit were the best assets for exploring North America. Harder to evaluate are the practical results of the journey. One must question its success as a diplomatic mission. Commercially, however, more may have been achieved; very likely trade at York was advanced, but by how much and for how long is impossible to say. In any case French occupation of York from 1694 to 1696 and from 1697 to 1714 must have reduced the benefits to the HBC. What is beyond dispute is that Kelsey’s travels were a triumph of nerve, especially if set against the failure of others to follow his example. In more than half a century after Kelsey made his way to the plains, only two employees of the HBC – William Stuart and Richard Norton – performed major inland journeys.
The version of Kelsey’s journal in The Kelsey papers has an interesting appendix, “an Accot. of those Indians belief & Superstitions.” Kelsey was no more anthropologist than he was poet; but perhaps his notes deserve to be regarded as the first “observations” of Indian life and religion by an HBC man, crudely prefiguring the “Observations” of James Isham* and Andrew Graham*.
After wintering at York, Kelsey returned to England; when his wages ceased on 12 Sept. 1693 he had completed nine years’ service in the bay. He re-enlisted on 25 April 1694, sailed with the summer shipping, and was back at York early in August. A letter written by him on 8 August contains the interesting declaration that “for my own part I shall neither do nor act on any discovery untill I receive further orders from my masters in England.” These orders never came and Kelsey made no more inland journeys. This year, 1694, saw a successful French challenge in Hudson Bay: for all but one of the following 20 years York, an obvious starting-point for inland travel, was in French hands, and when the HBC got it back Kelsey was too senior to be spared.
When the ships left for home on 13 Aug. 1694 Kelsey began “A Journal of our wintering by gods assistance at hayes River in ye year of our Lord 1694.” Only routine matters were recorded until 14 September when Indians brought news of two ships in the vicinity which proved to be French under Pierre Le Moyne d’Iberville. This journal is our principal source of information concerning the leisurely investment of York which followed. Though shots were exchanged on 16 September it was not until 3 October that the French got their mortar into position and were ready, if the English refused to give up the fort, to “reduce it to ashes & give us no quarter.” Governor Thomas Walsh thereupon sent Kelsey and another to negotiate with Iberville, and the fort was surrendered on 4 October. There is reason to think that the English garrison – Kelsey included – was turned loose to winter “in the woods & deserts” before shipment to France the following year.
Kelsey and other survivors were back in England at the end of 1695 or early in 1696. His wages had ceased on the day York was given up (the HBC’s usual practice) and he was probably short of money and glad to sign on once more on 18 May 1696 for a term of three years. The HBC was planning to recover York with the help of the Royal Navy, and Kelsey’s prompt re-engagement and his appointment as third in succession to the governorship are signs that the London committee attached no blame to him for what they regarded as the base surrender of 1694. Kelsey sailed from Gravesend on 2 June 1696 in the Royal Hudson’s Bay frigate (Capt. Michael Grimington), part of the mixed HBC and RN fleet. His journal (2 June to 19 July) describes the assembly and departure of this fleet and records speaking with a Swedish ship at sea, from whom the English squadron had news of Iberville. York was duly retaken but Kelsey’s journal of this event – if he kept one – has not survived and nothing is known of his part in the action.
Now follows the longest journal in The Kelsey papers, though by no means the most interesting, 18 Sept. 1696 to 3 Sept. 1697. Little personal information is to be found in this record of a year’s routine, similar to the many post-journals of later date in the HBC archives. It is indeed possible that this is a post-journal or draft or copy of one rather than a private document: Kelsey is sometimes mentioned as “Mr. Kelsey” instead of “I,” and the record of events at York continues in the journal when Kelsey himself is absent from the fort. The journal closes with a near-repetition of the events of three years earlier. On 19 Aug. 1697 the French were sighted by Indians; on 31 August they landed close to the fort. Bombardment began and the call for surrender came on 2 September. Governor Henry Baley was for resistance and “drew up a paper & brought on ye platform to satisfie ye men they should have every one a years pay gratis if they would sign ye same & we kept ye fort.” Some signed, others refused. Kelsey’s journal reports the incident but without comment and with no indication of his own preference. Surrender was decided on; with two others, Kelsey again negotiated terms with Iberville. Baley’s decision was the right one. Iberville in the Pélican had already beaten the English ships in the bay and the French force at York (if Kelsey’s estimate of 900 is believed) was in overwhelming strength. So ended “a Tedious winter & tragical Journal by me Henry Kelsey.” The prisoners appear this time to have been sent to France before winter, and Kelsey was probably back in England by the end of the year. War between France and England had been ended by the treaty of Ryswick, signed in September 1697.
The French held York till 1714 and, though war began again in 1702, the HBC made no attempt to recover it by force. With Iberville’s career in the bay ended, and the HBC short of money, stalemate ensued, broken only by an unsuccessful French assault on Albany, the HBC’s one remaining fort, in 1709. It was to Albany that Kelsey was sent after entering into a new contract for three years on 25 May 1698. For his fourth passage out he shipped in the Dering [III] (Capt. Michael Grimington); a journal of part of this voyage forms the last such record (in point of time) in The Kelsey papers. Henceforth Kelsey’s life must be reconstructed chiefly from the HBC’s archives and from his own brief “Memorandum of my abode.”
James Knight was governor at Albany till 1700 when he was succeeded by John Fullartine. Kelsey in 1701 was made master of the Knight frigate, a vessel of just under 50 tons, which had been sent to the bay in 1696 and was now used for the East Main trade. This trade was controlled from Albany, no permanent factory being built at East Main at this time though it is likely that temporary winter quarters were occupied on Gilpin Island, Baley Island or elsewhere. The Knight loaded at Albany with goods and provisions in the late summer, wintered on or off the East Main, and returned in spring. Anthony Beale ran the business for three winters and Kelsey for four (1701–3 and 1707–9), doubling the duties of master of the vessel and trader. The HBC had some hopes of the East Main trade, both for marten skins and for minerals. Nothing much came of the search for minerals, but furs were taken. Two of Kelsey’s seasons (1702–3 and 1708–9) were successful: 3,242 and 3,328 made beaver were the products, figures not exceeded in the East Main trade till 1729–30, though only a small fraction of what was being taken at Albany.
Kelsey came back to England in 1703, possibly because he was dissatisfied with his wage of £50 a year, possibly for the reason given by Governor Fullartine, “the recovery of his health.” Little is known of Kelsey’s life between 6 Oct. 1703 when he landed in England and his next contract with the HBC on 28 Nov. 1705; this was his longest time out of the company’s service. The terms of the new agreement suggest that he was badly wanted, 10s. a week till he sailed in the following summer, £4 a month as mate on the voyage out, and £100 a year in the bay. Kelsey was now clearly recognized as a competent seaman as well as an efficient officer.
Kelsey’s posting was as chief trader at Albany, but “I was kept out of my Imploy a year by Govr Beal.” In the winters of 1707–8 and 1708–9 he was back in the East Main trade and it was this that caused him to miss the French attack on Albany in 1709. For the next three years, so far as we know, he remained at Albany where it appears by a letter of 29 May 1710 that amongst other duties he had some responsibility for training: the London committee wrote, “you doe well to Educate the men in Literature but Especially in the Language that in time wee may send them to Travell If wee see it Convenient.” The reference to literature is mysterious – possibly it means no more than teaching them to read – but the same letter throws some light on one of the minor puzzles regarding Kelsey. Robson in his attack on the HBC alleged that Kelsey had compiled a “vocabulary of the Indian language, and that the Company had ordered it to be suppressed.” There was indeed such a work: “wee have sent you your dixonary Printed,” the committee continued, “that you may the Better Instruct the young Ladds with you, in ye Indian Language.”
Kelsey left Albany for England in August 1712 in his old ship, the Knight, though as passenger not master. His intention was to return to the bay in the following year, and he was appointed to go as deputy to Knight at York, which was about to be handed back to the HBC under the treaty of Utrecht. Delay in preparing documents for the handover caused a year’s postponement, and Kelsey was given £100 as compensation for the deferment of his appointment. This concession, and the waiving on this occasion of the normal requirement of one year’s notice of resignation, are further indications of the regard in which he was held. Kelsey left England – for the sixth and last time – in June 1714 and was present at the handing over of York on 11 September. For the next three years he played second fiddle to Knight. The main task was to rebuild the fort which was found in 1714 “all rotten and ready to fall, not scarce defensible against the natives if they have a mind to assault us.” Behind Kelsey’s laconic note “Exerted my utmost to gett a new fort” must lie a good deal of work and some hardship, notably that caused by the break-up of the ice in the river at 10:00 a.m. on Saturday, 7 May 1715, when the factory had to be evacuated and “if St Paul’s had stood there before the deluge there had been none now.” Kelsey took over command at York in 1717 when Knight went to establish a new post at Churchill, and when Knight returned to England the following year Kelsey, after 34 years of almost unbroken service to the HBC, was made governor over all the bay settlements, Churchill included.
Knight, back in England, made certain complaints against Kelsey, full particulars of which have not survived. Kenney, Rich, and others have suggested that the accusations centred upon private trade, but the few facts on record are not conclusive. Kelsey was sent a copy of the charges in 1719 with a request for detailed answers, the London committee “being very Unwilling to think that a Person wee had so Good an Opinion of as yourself should forfeit their Estimes.” Kelsey’s reply is lost but in a letter to Richard Staunton* of 1 Feb. 1720 he referred to “fals asspersions concerning ye Indians and had it not bin for ym it would been very hard with us this winter for they have killed near 100 Deer,” which sounds like a defence against a charge of being too soft with Indians. One of the charges, we know, referred to theft by Indians as long before as 1696–97. These are the only complaints against Kelsey recorded in the whole of his service, and it is clear that he strongly resented them. “It is a great Dolor,” he wrote to Staunton in 1720, “to be represented so Odiously to Our Masters and tuched in ye most Sensable part yt is a mans reputation wch is more Valuable yn Life itselfe.” What caused this friction between two old servants of the HBC is unknown. Knight was now an old man but he can hardly be reckoned senile for he was given command of the HBC’s voyage of discovery in 1719. He was an ex-shareholder and member of the London committee, so one would expect the charges he laid against Kelsey to have been taken seriously; but there is no evidence that they were pressed very far, and it is unlikely that the HBC would have left Kelsey in command till 1722 if they had lost confidence in him.
Kelsey’s term as governor lasted for four years. Post-journals survive for this period, but there is only one letter to London, a brief note dated 19 June 1719 announcing his departure “on discovery to the northward” and setting out the arrangements made for running affairs in his absence. This “discovery” was a matter of much concern in the closing years of Kelsey’s career. Knight set out on his last voyage in this same year to search for gold and the northwest passage and to find death, tragic but not unapt for the fierce old man whose first employment in the bay had been in 1676. Kelsey’s own voyage northward in July and August 1719 was quite independent of Knight’s; at the time he knew nothing of Knight’s plans and the HBC wisely tried to keep them apart. Knight was told not to sail south of latitude 64°N; if he did so, he would come under Kelsey’s orders. Kelsey’s expedition was in the Prosperous hoy, with the Success in company, and is briefly described in his “Memorandum”: two of the HBC’s Indian slaves were exchanged for two Eskimos to be trained as interpreters, and there was some trade in whalebone, oil and “Sea Horse teeth.” By his own estimate he sailed as far as 62° 40′N. By the next season (1720) Kelsey knew about Knight’s voyage, and this may be why he sent John Hancock to Churchill and thence north instead of going himself to renew the attempt to develop an Eskimo trade. Hancock was back in September with the news that Knight’s men had “Spoiled our Trade.” As yet there was no inkling of disaster.
In 1721 Kelsey again went north in person, having “Richd. Norton & an Nothern indian on board to show me ye copper,” tales of which had been reaching HBC posts. This is the nearest the evidence takes us to a coincidence of purpose between Knight’s dreams and Kelsey’s realistic aims. Knight’s was an expedition with several objectives, gold and other valuable minerals, the northwest passage, whale fishery, all to be searched for north of 64°. Kelsey’s voyages in 1719 and 1721 and the two which he dispatched but did not accompany in 1720 and 1722 were limited in intention, stimulated, as the most recent historian of the search for the northwest passage argues, by a concern at the failure of Churchill to pay its way (Williams, The British search for the northwest passage).
Kelsey’s last expedition is succinctly described in the “Memorandum.” He called first at Churchill, left there on 13 July 1721, saw parties of Eskimos on 21, 23 July, and 1 August, and began his return on 9 August. From these Eskimos he learned of the loss of Knight’s Albany, “we seeing things belonging to those vessels,” but he was unable to search to the northward, “ye winds did not favour my Intentions of going farther to ye Noward.”
Kelsey sent Captain John Scroggs in the Whalebone to the north in 1722, the last of this series of voyages of “discovery.” It is surprising in view of Kelsey’s finds the previous year that no orders have come to light for searching out the fate of Knight’s ships; but there may have been verbal instructions to this effect. Scroggs certainly brought back information sufficient to convince the HBC that Knight and his ships had been lost. Kelsey’s interest in the north now ended for with the arrival of the Mary from London in 1722 came his recall and his successor, Thomas McCliesh*. No reason was given by the HBC beyond Kelsey’s having completed four years as deputy and four as governor; “Wee think it Convenient to Call you home.” Kelsey was now in his middle fifties, not a great age for service in a company which had employed such a venerable figure as Knight.
Kelsey reached England on 31 Oct. 1722 and was paid off. In January 1724 he petitioned for appointment as captain of the HBC ship Hannah, which suggests that while he may have had enough of continuous residence in the bay he was still game for a summer voyage. In fact the Hannah did not sail in 1724 so Kelsey did not get the job. On professional grounds his appointment would have been entirely credible for he was an experienced mariner. When and how he gained this competence is not clear: we know that he commanded the Knight in 1701 and was mate in the Pery on her Atlantic crossing in 1706. In the “Memorandum” he records, and claims credit for, two major salvage operations in Hudson Bay which testify to skilled seamanship. The first was in 1711 when the Pery, out from England, grounded on sand off Albany and was wrecked by a gale. Kelsey reports “Govr Beale Desired me to take charge of ye knight to go down to ye Perry to save what could be of ye Cargo accordingly I did,” though Beale’s account of the event gives credit neither to Kelsey nor to anyone else. Again, in 1719 when the Hudson’s Bay [III] frigate was wrecked off Cape Tatnum, Kelsey saved most of the cargo. “I had,” he writes, “a narrow escape for my life & If I had not staid till ye 2d of Septr. to get ye cargo on shore their would have been little of it sav’d.”
Henry Kelsey died in his own house in Church Street, East Greenwich, and was buried on 2 Nov. 1724. He had married Elizabeth Dix of East Greenwich on 7 April 1698 soon after returning from his second spell as a prisoner of the French; she survived him and was the executrix of his will. Three children are known to have been born to the marriage: Elizabeth (b. 11 July 1704) and Mary (b. 17 March 1706), both born in the only long break in Kelsey’s service with the HBC, and John (b. 16 Nov. 1713) born while his father was waiting to return to York. In the registrations of baptism of his children Kelsey is described as “mariner” but in his will made on 2 Jan. 1723 as “gentleman.”
Kelsey’s earnings in his service to the HBC have been carefully investigated: they were not great. As an apprentice he was promised £8 and two suits at the end of his time: in fact he received £15 in gratuities and wages totalling £36. From 1688 to 1691 he was paid £15 a year, rising to £30 between 1691 and 1693; he received no reward for his exploration north of Churchill in 1689 but a gratuity of £30 for his journey to the plains, which if not the greatest ever made must surely have been one of the cheapest. By 1696 he was earning £35 a year, dropping to £30 when he went to Albany in 1698 and rising to £50 when he took over the East Main trade in 1701. From 1706 he got £100 a year and this (apart from a brief period in 1711 when he was in charge at Albany) remained his wage till he became governor in 1718 at £200 a year. Adding such supplementary payments as “lying-by money” it appears that Kelsey’s lifetime of service to the HBC brought him a little less than £2,500. Not surprisingly the provision left for his widow was slight. True he owned the house in which he lived and the one next to it, but in 1730 Elizabeth Kelsey had to petition the HBC for help with the cost of apprenticing her son: she received ten guineas, and another six guineas in 1734 to buy clothes for the son, “She being wholly incapable to do it herself.”
The Kelsey papers, which were not known to historians before 1926 and which are now the chief source of information concerning the life of Henry Kelsey, leave a number of questions unanswered. How and where did these papers come into the hands of the Dobbs family, descendants of Arthur Dobbs, the leader of the critics of the HBC in 1749? The “papers” are entries in a single paper-covered volume, the title-page of which reads “Henry Kelsey his Book being ye Gift of James Hubbud in the year of our Lord 1693.” Doughty and Martin, the editors, concluded that Dobbs did not know of the existence of this book when he attacked the HBC in 1749; for Dobbs, three years before Robson’s book was published, likewise interpreted Kelsey’s journey to the plains as impromptu and unauthorized. A contrary view is pressed by E. E. Rich who thought it probable that Kelsey’s journal was copied or abstracted from the HBC’s records by Christopher Middleton* and passed by him to Dobbs. “That Dobbs, with a copy of Kelsey’s Journal in his possession . . . should have suppressed it . . . is merely an instance of the rancour with which he challenged the Company’s position.” There is no evidence to support either view. There is nothing to show that the volume now called The Kelsey papers was ever part of the HBC’s archives for Middleton to copy or steal. The title page suggests that it was Kelsey’s own property, though his action of recording official business in a private book would not have had the company’s approval. He may have brought it back to England in 1722 in case Knight’s charges against him were revived: the “Memorandum of my abode” (the last document in the book) ends with the arrival of Kelsey’s relief and reads like an apologia. Dobbs could have got the volume from Kelsey’s family, could even have bought it, before 1749 or after 1749; one’s guess at the date must depend on whether one thinks Dobbs a rogue or not.
There is also disagreement about the handwriting of The Kelsey papers. Doughty and Martin were of the opinion that the whole of the volume was in Kelsey’s hand; Kenney that none of it was except a few lines in an Indian language which appear on pages 60–61 of the printed edition.
Some of these mysteries may in time be cleared up, but it is not rash to say that the HBC archives are unlikely to yield much more information of substance concerning the life of Henry Kelsey. Scraps of biographical information concerning his parentage, early life, and descendants may be found elsewhere, but we must not expect to know a great deal more of the man himself than we do now. It is little enough. What he did is in outline clear, but his character remains, as A. S. Morton said, “illusive.” A good deal of what has been written about him consists of generalized inference from his recorded actions. We seldom know what choice was open to him. His letters and journals contain few personal reflections; what can be found (such as the observation already quoted on the value of reputation, or the remark in 1722 “Its but in vain for any man to kick against the fates”) are commonplace. He had, one thinks, little formal education; his composition does not rise above the rather low level of HBC officers of the time. Yet he wrote verse which, however crude, was harder to write than prose, and he taught “literature” to the rough-necks in the bay. That he was a man with whom it was possible to quarrel is suggested by the dispute with Beale in 1706 and the break with Governor Knight, but we know the rights and wrongs of neither case. With men under his command Kelsey could certainly be severe, as he showed by flogging two men on Boxing-day 1719 and two more on 10 May following: the journal entries are consistent with his having administered these punishments in person. Undoubtedly his forte was relations with Indians, though Morton may be going a little far in calling him “our first example of that comparatively rare species, the Indianized Englishman.”
Perhaps Kelsey preferred Indian to white society; perhaps he pitied the natives and wanted to protect them. We know that he dismissed John Hancock from the council at York for cruelty to Eskimos and “for beating and Useing all Indians Morosly.” But for this, and for most of what Kelsey did, sound commercial reasons can be adduced.
The principal source of information on Kelsey’s life is The Kelsey papers (Doughty and Martin), which contains the journals cited above and the “Memorandum of my abode in hudsons bay from 1683 to 1722.” The date, 1683, is Kelsey’s error; he went out in 1684. There are two versions of the journal of 1691 in G.B., Parliament, H.C., Report from the committee appointed to inquire into the state and condition of the countries adjoining to Hudson’s Bay, and of the trade carried on there ([London], 1749), which also prints brief but important extracts from the HBC records, some of which are no longer extant. References to Kelsey will be found in HBRS, IX (Rich); XI, XX (Rich and Johnson); XXV (Davies and Johnson); and in The founding of Churchill (Kenney). Unpublished materials include a number of the HBC’s letters to Kelsey, entries of letters from Kelsey while governor to commanders of other posts in the bay, and the relevant post-journals, but these have been searched by Doughty and Martin for their Intro. to The Kelsey papers; by J. F. Kenney for “The career of Henry Kelsey,” RSCT, 3d ser., XXIII (1929), sect.ii; and by A. M. Johnson for her biography of Kelsey in HBRS, XXV, wherein will also be found authoritative statements concerning Kelsey’s terms of service and earnings, together with the results of careful search for his family history. C. N. Bell, “The journal of Henry Kelsey (1691–1692),” Hist. and Sci. Soc. of Man. Trans., new ser., IV (May, 1928), is a detailed reconstruction of Kelsey’s route in 1690–92, though not every conclusion has found general acceptance. HBRS, XXI (Rich), Morton, History of the Canadian west, and L. J. Burpee, The search for the western sea (London, 1908; rev. ed., Toronto, 1935), all discuss what the latter calls “the Henry Kelsey puzzle.” Joseph Robson’s case is put forward in his An account of six years residence in Hudson’s-Bay, from 1733 to 1736, and 1744 to 1747 (London, 1752). [k.g.d.] | <urn:uuid:86a95bf0-f8e8-4758-85d0-34f753b8ab9c> | {
"date": "2015-02-01T16:45:25",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121744242.57/warc/CC-MAIN-20150124174904-00020-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.982553243637085,
"score": 2.875,
"token_count": 9602,
"url": "http://www.biographi.ca/en/bio/kelsey_henry_2E.html"
} |
Spring 2013 Observing Highlights
Snakeheads, Crab Cakes and PANSTARRS… Goodbye Jupiter. Hello Saturn, Vesta is fading fast.
by Stan Howard, ACA VP Observing
So you think the cold winter weather makes the snakes go underground? Maybe all the small ones (those less than a zillion miles long) do, but the really BIG ones come out every night then. Each night during the spring, the longest snake of all, Hydra, raises its nine ugly heads from the horizon in the East and slithers along on its East to West path during the night. After Hercules and Iolus cleverly killed it a long time ago, Hera is said to have put it in the heavens, along with its accomplice, Cancer the Crab. The story generally goes that the second of Hercules’ twelve tasks was to GO DO the Hydra that Hera had specially arranged for Hercules’ demise. Anyone knows that the best way to DO a snake is to chop off its head, but Hercules had a real problem there. It seems that Hydra had nine pretty nasty heads, each of which would grow back into two heads if they were cut off. One of the heads was even immortal. To make matters worse, the Hydra had such bad breath, that the stench from each mouth (being part of a nine pack as it were) could kill a person. You may have experienced a similar problem before in a crowded elevator. Hercules invented the first gas mask by placing a cloth over his mouth and nose (the concept later evolved into an industrial grade particle filter) to stop the stench. Luckily, Hercules had a quick thinking assistant in Iolus (in real Mythology life, not TV Land). Iolus suggested that the best way to keep a head wound from growing back would be to cauterize with fire any cuts to short circuit that head sprouting thing. So Iolus carried a torch to seal the problem as soon as Ol’ Herc lopped off each head. This action did double duty, since the blood of the Hydra was also poisonous. When Hercules got to the last (and Immortal) head, he lopped it off and bagged it up for safe burial later under a big rock. This is why sometimes even now you get nasty surprises if you look under big rocks. You can see the nine head stars of Hydra clustered together as one head of Hydra. Five of them outline the head of Hydra, but they only appear to be together. The following are names, brightness, and distances of the nine head stars as I reckon them: Epsilon Hya @ 3.40 mag, 135 ly; Delta Hya @ 4.10 mag, 179 ly; Sigma Hya @ 4.45 mag. 352 ly; Eta Hya @ 4.30 mag. 466 ly; Rho Hya @ 4.35 mag. 332 ly; Hya 10 @ 6.10 mag. 207 ly; Hip 42899 @ 6.85 mag. 399 ly; Hip 42891 @ 6.45 mag. 414 ly; Hip 42854 @ 6.35 mag. 738 ly.
So what about the Crab? When Hera saw that Hercules and Iolus were keeping their wits about them, and the Hydra was not keeping its heads about it, she threw in Cancer the Crab to somehow turn the tide of the battle by distracting them. Hercules must have thought the crab was a big spider and was not impressed. He simply did what most people would do if they saw a big spider: he squashed Cancer into a flat crab cake with his boot. The whole incident is immortalized in the night sky for you to see this Spring.
Speaking of Crabs, if you want to get a jump start on finding Messier Objects before the BIG Messier Marathon this spring, you might as well start checking some of them out. Why not start at the start by seeing if you can identify M1, the Crab Nebula? It is right next to the easternmost horn tip of Taurus. Other M’s to get familiar with this spring could be M36, M37 and M38 in or near Auriga. I refer to my copy of Stellarium for help in locating all (not manmade) sky objects.
February will have the last call for two favorites of the night sky. The Andromeda Galaxy will be getting lower in the West each night until it will be setting around 9:00 PM by the end of the month. I always miss it during the months of the year when Andromeda is not easy to show to people. You’d also do well to get a last glimpse of Jupiter before the start of May because Jupiter will be setting after about 9:00PM by then, though it will be a brighter -1.54 by then.
However, the schedule for sky entertainment is seldom thin, and another of the gas giants, Saturn will be rising earlier each night this spring. About the 1st of March, Saturn will rise about midnight with a brightness of magnitude 0.61. By May 1st, it will be rising about 9:00PM with a magnitude of 0.35. Saturn is a "don't miss spectacle" through any telescope. Through a larger scope, you can also sometimes see about five of its moons.
Coming in March to a hemisphere near you will be Comet PANSTARRS, fresh and (hopefully) glowing from its trip around the Sun. It (may) be the first of the (BIG?) comets of 2013. So far, predictions are that it will be a naked eye visible comet with a fairly wide tail when viewed through binoculars or telescope. Depending on how its gases boil away, it may stay visible for about a month as it heads north and back to the 'cloud'. It may serve to whet our appetites for Comet ISON in November.
Remember Venus? It will not be visible until it moves away from the Sun (from our vantage point) in June. It will be a fairly bright -3.34 by then.
Mercury? Usually visible for only days at a time only a few times a year, on about June 8-10, Mercury will be about 24 degrees up from the setting sun, just viewable at NMR-DSO for a few minutes right at dusk. It is always a treat to catch a glimpse of Mercury in the glow of the evening sky where few stars dare to make themselves seen.
Since the DAWN spacecraft left Vesta and is heading to Ceres, no one pays much attention to Vesta's fading image. Vesta is fun to watch from night to night as it moves through the heavens noticeably like other asteroids which are normally hard to see. If you want to follow Vesta before it leaves the horns of Taurus near Jupiter, it is presently a findable magnitude of 7.16, but by May 1, it will just be only 7.76 mag. ~35 degrees above the Sun just after dark near the bent foot of Castor. I always refer to a laptop comparison of star backdrop patterns from Stellarium to ascertain which of the points of light in my binocular field of view is actually Vesta. It is good practice at star hopping to follow Vesta for several night in a row.
Uranus (6.27mag)... last call for viewing it in the evening low in the west will be about March 1st. Uranus (then 6.26 mag) and Neptune (7.75 mag) will become early morning risers in May.
There are plenty of interesting things to see out there. Just watch out for the snakes, crabs, flying PANSTARRS and hurtling asteroids. Since their close call Valentine's surprise from above, I know the Russians in Chelyabinsk will be looking up.
ACA VP Observing | <urn:uuid:9f92d28d-0da8-4eae-a703-ab83850c21cd> | {
"date": "2014-09-01T21:17:25",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055349-00486-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.959039032459259,
"score": 2.625,
"token_count": 1604,
"url": "http://www.angelfire.com/ga/astronomyclubaugusta/Afterglow/201302ACASHObs.html"
} |
Represents a shape range, which is a set of shapes on a document.
Assembly: Microsoft.Office.Interop.Word (in Microsoft.Office.Interop.Word.dll)
A shape range can contain as few as one shape or as many as all the shapes in the document. You can include whichever shapes you want— chosen from among all the shapes in the document or all the shapes in the selection— to construct a shape range. For example, you could construct a ShapeRange collection that contains the first three shapes in a document, all the selected shapes in a document, or all the freeform shapes in a document.
Note Most operations that you can do with a Shape object, you can also do with a ShapeRange object that contains only one shape. Some operations, when performed on a ShapeRange object that contains more than one shape, will cause an error.
Use Shapes.Range(index), where index is the name or index number of the shape or an array that contains either names or index numbers of shapes, to return a ShapeRange collection that represents a set of shapes on a document. You can programmatically use an array to construct an array of names or index numbers.
Although you can use the Range method to return any number of shapes, it's simpler to use the Item method if you want to return only a single member of the collection. For example, Shapes(1) is simpler than Shapes.Range(1).
Use Selection.ShapeRange(index), where index is the name or the index number, to return a Shape object that represents a shape within a selection.
Use the Group, Regroup, or Ungroup method to create and work with a single shape formed from a shape range. The GroupItems property for a Shape object returns the GroupShapes object, which represents all the shapes that were grouped to form one shape.
The recorder always uses the property when recording shapes.
A ShapeRange object doesn't include InlineShape objects. | <urn:uuid:69eae7f6-bb85-4e0f-aa58-8119dc991c21> | {
"date": "2013-12-21T19:38:01",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776439/warc/CC-MAIN-20131218054936-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9101982712745667,
"score": 3.171875,
"token_count": 411,
"url": "http://msdn.microsoft.com/en-us/library/microsoft.office.interop.word.shaperange(v=office.14).aspx"
} |
According to the U.S. Bureau of Labor and Statistics, the U.S. will witness a steep rise in Millennial workforce in the coming years. With an increase in Millennials, it has become a Herculean task for organizations to train them, especially on compliance, product, and HR policies.
Moreover, after training, it is hard for employees to recall and retain the information. Here comes microlearning to the rescue of organizations in training the Millennials. In this type of training, information is broken into a series of small chunks that is easy to assimilate. Learners can access the learning modules that last for 5 to 10 minutes on their mobiles from anywhere to brush up the concepts. This reduces cognitive load and increases knowledge retention.
Despite these benefits, organizations are leaving no stone unturned to make microlearning courses intriguing and engaging, Well, we will now look at a few elements that need to be incorporated in the courses to keep learners focused.
Add visuals: Depict the information visually instead of cramming it with text. As, we know, it is easy to assimilate concepts by visualizing them rather than hearing and reading. For instance, you can walk through the troubleshooting process by presenting the steps as an infographic. This allows learners visualize the entire process and remember it easily. If you are planning to explain a compliance topic to the audience, you can weave a story in the form of visuals to imprint the concepts in their minds.
Add quizzes: eLearning developers can use quizzes while introducing concepts to understand learners’ existing knowledge on the topic and at the end of the course to gauge their knowledge on the concepts learned. Quizzes can be of various types such as single/multiple choice questions, scenarios, asking the learner to label an image, sequence things in the right order, etc.
Incorporate real-time situations: Learners will be totally engrossed in the learning process when they are explained through real-time situations they are likely to experience in their job roles instead of adding irrelevant situations. This helps them understand the problem and deal with it before they actually confront it. For instance, if you are providing safety training to your employees, you can train them on protecting themselves from electrical shocks using scenarios.
Use analogies: eLearning developers can use analogies to explain complex topics. This helps learners connect to the new concept by comparing it with what they already know. To be precise, it is comparing two things and bridging from the known to the unknown. For instance, if you want to explain about an IP address, you can use phone numbers, to explain the concept. Like phone numbers to communicate with people, an IP address is used to communicate with a device connected to the network. Incorporating this element helps learners grasp new concepts at a brisk pace.
The above mentioned are a few ways an eLearning developer can adopt to make microlearning modules intriguing and engaging. Do you have anything to say? Please leave a comment.
Subscribe to Our Blogs
Get CommLab's latest eLearning articles straight to your inbox. Enter your email address below: | <urn:uuid:baf06d9f-36c3-4065-a5cc-96b87ce6698c> | {
"date": "2016-12-05T18:40:37",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541783.81/warc/CC-MAIN-20161202170901-00136-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9401386976242065,
"score": 2.765625,
"token_count": 636,
"url": "http://blog.commlabindia.com/elearning-development/elements-that-spice-up-microlearning"
} |
China Building Space PortBEIJING (AP) — China broke ground on its fourth space center Monday, highlighting the country's soaring space ambitions six years after it sent its first man into orbit.
The space port on the southern island province of Hainan incorporates a launch site and mission control center for slinging the country's massive new rockets into space carrying satellites and components for a future space station and deep space exploration.
The reports portrayed the center as a major stride forward for China's military-backed space program, which has launched three manned missions since 2003, including one last year that featured the country's first space walk.
China's future space ambitions include building an orbiting station and sending a mission to the moon, putting it in the forefront of the tightening Asian space race involving India, Japan and South Korea. China says its space program is purely for peaceful ends, although its military background and Beijing's development of anti-satellite weapons have prompted some to question that.
The Hainan center, located near the town of Wenchang and slated to go into use in 2013, is located at a latitude of about 19 degrees north, far closer to the equator than China's other bases in the its southwest and northern plains.
Proximity to the equator is an advantage for launching payloads such as geostationary satellites used for telecommunications because less fuel propellant is needed. Reports said rockets launched from the Hainan base will be capable of carrying up to 14 percent more payload than those launched from Jiuquan, the home of the manned space program in northern China.
That added capacity should aid particularly in China's space station program as well as plans to assemble the Beidou, or "Compass," navigation system as an alternative to the U.S. satellite GPS network, the dominant positioning system.
The center is also served by a nearby port, allowing for the transport by ship of components such as the new generation Long March 5 rocket capable of launching 25-ton components for a space station or future lunar missions. China's other space centers are located in remote parts of the country that rely on limited capacity rail links to transport rockets and other components.
According to media reports, the Hainan center's construction involves upgrading a small satellite launch pad already on the site and building a second pad and other infrastructure. More than 6,000 area residents are being moved to procure the 3,000 acres (1,200 hectares) needed for the base.
China is just the third country after Russia and the United States to have launched a person into space, and has long operated a successful commercial satellite launch program.
Officials say plans call for an unmanned moon landing around 2012, a mission to return samples in 2015, and possibly a manned lunar mission by 2017 ? three years ahead of an initial U.S. target date for returning to the moon.
Viewed as a source of national pride and patriotism, the program's strong public support helps shield it from the public doubts and budgetary pressures that constrain such programs elsewhere.
However, cooperation in space with other countries has been inhibited by wariness over the program's close military ties.
Highlighting that relationship, Chang Wanquan, a People's Liberation Army general who sits on the ruling Communist Party's powerful central military commission, joined other officers and technicians in Monday's groundbreaking ceremony, the reports said.
[Editor's note: Do you think China's robust space program could stir NASA and the European Space Agency to more ambitious plans? Or was the "space race" a one-time deal?] | <urn:uuid:2581be6e-eabc-40dc-9531-5deaf668d887> | {
"date": "2016-04-30T15:10:06",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111868.79/warc/CC-MAIN-20160428161511-00172-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.952528178691864,
"score": 2.59375,
"token_count": 728,
"url": "http://www.askmen.com/money/money-news_100/107_china-building-space-port.html"
} |
|Elevation||542 ft (165 m)|
|Area||0.85 sq mi (2 km2)|
|- land||0.85 sq mi (2 km2)|
|- water||0.00 sq mi (0 km2)|
|Density||1,014.2 / sq mi (392 / km2)|
|- summer (DST)||CDT (UTC-5)|
|Wikimedia Commons: Greenview, Illinois|
Greenview was laid out in October 1857, by Menard County pioneer Willian Engle, on land originally owned by Charles Montgomery in section 23 of township 19 north, range 6 west of the Third Principal Meridian. It was named after William G. Greene of nearby Tallula Precinct, because he convinced the railroad to come through the town: located on the Chicago, Alton & St. Louis Railroad, Greenview was incorporated by a special act of the Illinois General Assembly on May 6, 1869, then re-incorporated under the new general municipal laws of the state in March 7, 1877.
Greenview is located at (40.083818, -89.740274).
According to the 2010 census, the village has a total area of 0.85 square miles (2.2 km2), all land.
As of the census of 2000, there were 862 people, 366 households, and 252 families residing in the village. The population density was 1,014.2 people per square mile (391.6/km²). There were 397 housing units at an average density of 467.1 per square mile (180.3/km²). The racial makeup of the village was 99.65% White, 0.12% African American, 0.12% Native American and 0.12% Asian. Hispanic or Latino of any race were 0.12% of the population.
There were 366 households out of which 31.4% had children under the age of 18 living with them, 52.7% were married couples living together, 12.0% had a female householder with no husband present, and 31.1% were non-families. 29.5% of all households were made up of individuals and 16.1% had someone living alone who was 65 years of age or older. The average household size was 2.36 and the average family size was 2.89.
In the village the population was spread out with 24.4% under the age of 18, 9.4% from 18 to 24, 26.3% from 25 to 44, 22.0% from 45 to 64, and 17.9% who were 65 years of age or older. The median age was 37 years. For every 100 females there were 95.0 males. For every 100 females age 18 and over, there were 89.5 males.
The median income for a household in the village was $39,196, and the median income for a family was $49,125. Males had a median income of $30,455 versus $24,583 for females. The per capita income for the village was $21,050. About 4.0% of families and 7.5% of the population were below the poverty line, including 13.7% of those under age 18 and 7.1% of those age 65 or over.
- "Village of Greenview". History of Menard & Mason Counties, Illinois. Chicago: O.L. Baskin & Co., Historical Publishers. 1879. p. 353.
- "History and Historical Sites". Petersburg, Illinois: Menard County Tourism Council. Retrieved 2012-03-11.
- "US Gazetteer files: 2010, 2000, and 1990". United States Census Bureau. 2011-02-12. Retrieved 2011-04-23.
- "2010 Census U.S. Gazetteer Files for Places – Illinois". United States Census. Retrieved 2012-10-13.
- "American FactFinder". United States Census Bureau. Retrieved 2008-01-31. | <urn:uuid:61f86829-7aa5-4ddb-9ef0-fa81cd0fb96d> | {
"date": "2015-05-06T09:05:24",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430458431586.52/warc/CC-MAIN-20150501053351-00041-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.958288311958313,
"score": 3,
"token_count": 847,
"url": "http://en.wikipedia.org/wiki/Greenview,_Illinois"
} |
Something for the weekend. Heart of Oak. Written by actor David Garrick in 1759, with music by Dr. William Boyce, the song is a rousing tribute to the Royal Navy. Garrick penned the song during the Annus Mirabilis of 1759 when Church bells in Great Britain and America were constantly ringing in celebration of British victories, including the taking of Quebec, on land and sea. The song was an immediate hit both in Great Britain and its colonies.
The video clip above is taken from That Hamilton Woman (1941) starring Vivian Leigh and Laurence Olivier. In many ways simply a historical pot boiler common for films during the period, the film also celebrates British resistance to the tyranny of Napoleon which of course strongly resonated with British audiences in 1941. It was Churchill’s favorite movie and he would frequently show it to guests during the War.
The playing of Heart of Oak at the beginning of the clip is not a conceit of the film. When British ships of the line were sailing into battle the bands of the ship would strike up Heart of Oak, always a favorite of the sailors on board. Serving in miserable conditions, sometimes pressed (“compulsorily volunteered” was the phrase), the song did reflect how the sailors perceived themselves. They were almost all ardent patriots, as they demonstrated during the fleet mutinies at Spithead and the Nore in 1797, when the mutineers turned over to the government French agents who attempted to make common cause with them. The leaders of the mutineers told the authorities that they were entirely loyal to England, and they simply wanted redress for their grievances, which the Admiralty eventually granted. Admiral Nelson at Trafalgar, where he smashed the combined French and Spanish fleets and established British naval supremacy for a century, understood the patriotism of the common seaman, which is why he sent the fleet the message, “England expects every man to do his duty” prior to sailing into the fight.
Nelson in the film is shown as saying of the decorations that he wore in the engagement, “I won them in battle? Then I’ll wear them in battle.” although he of course realized that this made him a prime target for French snipers. Nelson had previously lost a right arm and a right eye in prior engagements. At Trafalgar his luck ran out and he was killed by a French sharpshooter. However, his stance was not foolhardy. To direct a fleet action in the early Nineteenth Century an admiral needed to be on deck, and Nelson understood that the attribute prized above all others by the men he led was physical courage. Nelson was a complete cad in his personal life, but he had in abundance that quality. The men would fight much harder if they saw their officers coolly displaying complete contempt for death in action, and therefore it was necessary for Nelson to do so. Additionally, throughout his career he had struggled for better conditions for the men under his command, and they fought their hardest when led by him. Continue reading | <urn:uuid:0093c83f-93d7-40cc-aa79-58ef4976977b> | {
"date": "2015-01-31T21:09:41",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115865430.52/warc/CC-MAIN-20150124161105-00104-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9860813021659851,
"score": 2.671875,
"token_count": 629,
"url": "http://the-american-catholic.com/tag/vivian-leigh/"
} |
Direct Method of Preparing the Statement of Cash Flows
If the Financial Accounting Standards Board (FASB)/ International Accounting Standards Board (IASB) proposed changes take effect, the direct method for preparing the statement of cash flows will be required, eliminating the choice of using the indirect method. Unfortunately, many students find the direct method more confusing than the indirect.
However, if you keep in mind the primary purpose of the statement of cash flows, which is to give the users of the financial statements relevant data about cash a business brings in and pays out during a financial period, you should be able to stay more focused with the whole preparation procedure.
Here are a few important direct method basics, to build upon the material in your intermediate accounting textbook:
You show cash received and paid, not net income or loss as shown on the income statement. Why? Because the income statement shows both cash and noncash transactions, and the users of the statement of cash flows want to know about only cash transactions. A biggie noncash transaction is depreciation.
To figure cash receipts from customers, you adjust accrual-based sales revenue by the change in accounts receivable (A/R) during the period. If A/R goes up, you decrease sales revenue. If A/R goes down during the period, it’s an addition to sales revenue.
For example, if during July 2013 the company has sales revenue of $200,000 and a $20,000 decrease to accounts receivable, total cash received from customers is $220,000 ($200,000 + $20,000).
To figure cash payments to suppliers during the period, you use the income statement account, the cost of goods sold (COGS), and the balance sheet accounts, inventory and accounts payable (A/P).
This process involves two steps. First, you adjust the COGS by adding an increase or subtracting a decrease in the inventory account balance during the month. The resulting figure is further adjusted by subtracting an increase or adding back a decrease in the accounts payable account balance during the financial period.
For this computation, COGS is $100,000, inventory shows an increase of $10,000, and A/P shows an increase of $5,000 during the financial period.
Using a portion of the very abbreviated financial statement information from the preceding figure, the following one shows the operating section of the statement of cash flows. | <urn:uuid:c5493dea-5c3a-4a43-820a-34e14dc865ba> | {
"date": "2016-07-25T08:37:44",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824217.36/warc/CC-MAIN-20160723071024-00208-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9334588050842285,
"score": 3.3125,
"token_count": 500,
"url": "http://www.dummies.com/how-to/content/direct-method-of-preparing-the-statement-of-cash-f.html"
} |
Farming for Carbon
Watch the video
In this 8.34 minute Pasture Promise TV video, dairy farmer and Nuffield Scholar Robert Richmond explains the agronomic importance of soil carbon, describing what soil carbon is and the beneficial effects on soil health and crop growth that can come from boosting it. He refers to observations during his travels in Australia that emphasised the importance of adopting soil management practices that promote biologically active soil, building soil carbon over the long term rather than relying on chemical inputs for short term gains. We see examples of the type of cow best suited for a system that largely relies on forage. He describes techniques he has applied including replacing short term rye grass leys with long term herbal leys, practising rotational grazing, and reducing cultivation. He explains the benefits he has observed - more productive soils, reduced fertiliser use and more resilient pastures, and the wider benefits of increased biodiversity and nutrients in the food chain.
- Robert practices rotational grazing systems on long term pastures with diverse swards.
- He explains that the pastures stay leafy for longer than conventional pastures, have greater photosynthetic activity, produce larger root systems, and return more plant material to the soil - building soil carbon over time.
- Higher levels of soil carbon have increased forage production and pastures re-grow faster in-between grazing. This increases the number of grazing events per year and the potential to increase stocking rates. “Since we have switched on to these leys we have been producing more grass than we ever were with rye grass and fertilisers.”
- Effective rotational grazing systems require livestock breeds suited to consumption of large amounts of forage and that have minimal impacts on soil compaction.
- Robert has observed the diverse swards support a larger variety of beneficial insects and are more resilient to extreme weather than rye grass pastures.
- The swards have been found to be richer in omega-3 oils than rye grass leys - a benefit transmitted down the food chain to consumers. Robert also refers to research highlighting that raising oil levels in ruminant diets reduces methane emissions.
Robert’s Nuffield report ‘The Benefits to agriculture and the environment of rebuilding soil carbon’ can be accessed here. | <urn:uuid:8dfb505a-ca47-4383-bedd-a3e2af72d33e> | {
"date": "2019-10-14T14:49:09",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986653247.25/warc/CC-MAIN-20191014124230-20191014151730-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9394705295562744,
"score": 3.421875,
"token_count": 464,
"url": "https://www.agricology.co.uk/resources/farming-carbon"
} |
Ukraine marks 33rd anniversary of Chornobyl tragedy
On April 26, 1986, there were two explosions followed up by a fire – these are the consequences of the events at the Chornobyl Nuclear Power Plant (NPP), which are still difficult to be evaluated.
Hundreds of thousands of people were involved in the cleanup works, but the exact number of victims of the tragedy is still unknown, according to a morning TV show, "Snidanok z 1+1."
The first cleanup workers, who arrived at the burning Chornobyl NPP, tamed the atom with almost bare hands: without special protective clothing or gas masks. Over three dozen people died from the radiation exposure received in those hours.
To reduce the radiation emission from the destroyed reactor, the helicopters threw sandbags and lead in it. In total, over 600,000 people took part in the cleanup efforts.
A huge radioactive cloud emerged as a result of the explosion, which spread far beyond Ukraine. More than half of the hazardous substances released into the air covered the territory of Belarus.
People were resettled from the contaminated area only a day after the accident. They left their homes with a minimum of items and documents. They were promised – this is not for long, but it turned out – forever. People who were evacuated at that time have been carrying out a memorial event for several years in a row in an attempt to bring the abandoned town of Prypiat (Pripyat) near the Chornobyl NPP back to life.
In general, almost a quarter of a million people left the area around the station. Dozens of settlements have disappeared from the map of Ukraine for good. A dead zone has appeared around the destroyed Chornobyl NPP. Only wild animals and some people live there. This zone stretched over an area of several thousand square kilometers, three megalopolises such as Kyiv could be placed on this area.
Today, the Chornobyl zone attracts tourists and "stalkers." The latter enter the territory illegally. Some want to see abandoned buildings, others – a non-operating Ferris wheel, and some dream of meeting the local red star – Semen the Fox, a Prypiat almost-tame animal.
"For over 30 years, the Chornobyl zone has become not only a forbidden place, but also a tourist corner. Now the guides are ready to show guests not only the nuclear power plant, but also dozens of abandoned villages, where life, on the one hand, has stopped, but, on the other hand, continues," TSN correspondent Anton Strashko said.
Ukrainian President Petro Poroshenko thanked Chornobyl NPP cleanup workers, states and organizations that help Ukraine to overcome the consequences of the disaster.
"Today, on the day of the 33rd anniversary of the Chornobyl disaster, we respectfully thank the cleanup workers and bow our heads before the bright memory of the heroes who saved the Ukrainian land and, without exaggeration, the whole world from the spread of the radiation threat," Poroshenko said in a statement available to UNIAN.
He thanked people of different professions who under extreme conditions made titanic efforts to curb the "peaceful atom," as well as all the specialists who are now working at the station and in the exclusion zone.
According to the president, the Chornobyl accident was a challenge on a global scale and a stern warning to the entire modern civilization.
He also thanked the donor states and international institutions that constantly help Ukraine to overcome the dire consequences of that disaster.
In addition, the president reiterated the recent opening of a new confinement facility over Chornobyl power unit No. 4.
"Despite the difficult social and economic situation caused by the exhausting struggle against Russian aggression, we are working with foreign partners on a new unique shelter facility installed above the destroyed power unit No. 4. Step by step, we are implementing a number of important projects on safety and environmental projects to ensure the transformation of the exclusion zone into a promising, useful territory," Poroshenko said.
He is convinced the key to solving problems related to Chornobyl will continue to be international solidarity, a common goal and well-coordinated work for the sake of humanity and the future of next generations. | <urn:uuid:0783b878-0117-4479-bb88-a50f5b0a36f9> | {
"date": "2019-07-18T22:51:10",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525829.33/warc/CC-MAIN-20190718211312-20190718233312-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9556260108947754,
"score": 2.8125,
"token_count": 871,
"url": "https://www.unian.info/society/10531848-ukraine-marks-33rd-anniversary-of-chornobyl-tragedy.html"
} |
MONDAY, June 2, 2014 (HealthDay News) -- The Obama
administration announced plans Monday that would require the United
States to cut power plant emissions that many scientists blame for
global warming by 30 percent by 2030.
It's a move that would substantially improve the health of
millions of Americans, federal officials said.
The plan targets the biggest source of carbon pollution in the
country -- more than 600 coal-fired power plants, according to the
U.S. Environmental Protection Agency.
"Today climate change that is fueled by carbon pollution is supercharging risks not just to our health but to our communities, to our economy and to our way of life," EPA Administrator Gina McCarthy said during a news conference Monday morning.
"Currently, there are no limits on carbon pollution from power plants -- our nation's largest source. For the sake of our families' health and for our kids' future, we have a moral obligation to act on climate change," she said.
McCarthy said "rising temperatures bring more smog, more asthma
and longer allergy seasons," and added that "carbon pollution from
power plants comes packaged with dangerous pollutants, like
particulate matter, nitrogen oxides and sulphur dioxide. And they
put our children and our families at even more risk."
The proposal, which is already stirring opposition from
Republican lawmakers and some business groups, "will result in
lower medical bills, fewer trips to the emergency room, especially
for those kids who have asthma, our elderly and our infirmed,"
The 645-page proposal, scheduled to be ready by next year, is a
key piece of Obama's efforts to combat climate change. It also
seeks to give the United States more credibility with other
countries when negotiations on a new international treaty resume
next year, the
The proposal is probably Obama's last chance to substantially
reduce the greenhouse gas emissions that many scientists blame for
trapping heat in the atmosphere and warming the planet,
The New York Timesreported. The President failed to get
Congress to enact a broad climate change bill during his first
term. This time around, he's using his executive authority under
the 1970 Clean Air Act to issue the regulation, the newspaper
The American Lung Association called the President's decision a
major step toward improving the health of the nation.
Association President Harold Wimmer said, "Power plant pollution
makes people sick and cuts short lives."
According to Wimmer, the new rules would reduce the burden of
air pollution in America, prevent up to 4,000 premature deaths and
100,000 asthma attacks in the first year, and prevent up to 6,600
premature deaths and 150,000 asthma attacks in 2030.
"Cleaning up carbon pollution will have an immediate, positive impact on public health -- particularly for those who suffer from chronic diseases like asthma, heart disease or diabetes. Steps to clean up carbon pollution can reduce sulfur dioxide and nitrogen oxides, both poisonous emissions from coal-fired power plants that are also major precursors to lethal ozone and particulate matter pollution," he said.
According to the U.S. Centers for Disease Control and
Prevention, air pollution is a leading environmental threat to
health. Health problems linked to air pollution include more
emergency room visits and hospital stays for breathing and heart
problems, worsening of asthma, low birth weight, decreased lung
growth in children, lung cancer and early deaths.
The EPA also said the new rule would cut electricity bills
roughly 8 percent by promoting energy efficiency and reducing
demand in the electricity system.
"We don't have to choose between a healthy economy and a healthy environment -- our action will sharpen America's competitive edge, spur innovation, and create jobs," McCarthy said.
The plan is already coming under fire by industry groups and
some lawmakers. The U.S. Chamber of Commerce said the new rule
would "cost America's economy over $50 billion a year between now
Karen Harbert, president and CEO of the U.S. Chamber of
Commerce's Institute for 21st Century Energy (Institute), said,
"Our analysis shows that Americans will pay significantly more for
electricity, see slower economic growth and fewer jobs, and have
less disposable income, while a slight reduction in carbon
emissions will be overwhelmed by global increases."
The proposal has also been the target of criticism from
Republicans -- and even some Democrats -- engaged in tight
campaigns in energy-producing states, the
Sen. Mitch McConnell, R-Kentucky, called the proposal a "dagger
in the heart of the American middle class." He said it would mean
higher costs, fewer jobs and a less reliable energy grid, the
The EPA said it would accept comments on the proposal for 120
days after it is published in Federal Register and will hold four
public hearings during the week of July 28. The hearings will be in
Atlanta, Denver, Pittsburgh and Washington, D.C. The agency said it
would then finalize the standards next June, based on the schedule
established in the June 2013 Presidential Memorandum.
For more on air pollution, visit the
U.S. National Library of Medicine.
EBSCO Information Services is fully accredited by URAC. URAC is an independent, nonprofit health care accrediting organization dedicated to promoting health care quality through accreditation, certification and commendation.
Please be aware that this information is provided to supplement the care provided by your physician. It is neither intended nor implied to be a substitute for professional medical advice. CALL YOUR HEALTHCARE PROVIDER IMMEDIATELY IF YOU THINK YOU MAY HAVE A MEDICAL EMERGENCY. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with any questions you may have regarding a medical condition.
Copyright © EBSCO Information Services. All rights reserved. | <urn:uuid:24ab79dd-6d4e-430b-85b7-3df389f82dc0> | {
"date": "2017-04-29T23:28:14",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123632.58/warc/CC-MAIN-20170423031203-00355-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9381486773490906,
"score": 2.75,
"token_count": 1232,
"url": "http://www.wkhs.com/Heart/Education/News.aspx?chunkiid=896747"
} |
Here is a review of the potential pitfalls of sharing a single Connection among multiple threads.
If one thread commits, it closes the Statements and ResultSets of all other threads using the same connection.
If threads share Statements, one thread could close another's ResultSet.
In many cases, it is easier to assign each thread to a distinct Connection. If thread A does database work that is not transactionally related to thread B, assign them to different Connections. For example, if thread A is associated with a user input window that allows users to delete hotels and thread B is associated with a user window that allows users to view city information, assign those threads to different Connections. That way, when thread A commits, it does not affect any ResultSets or Statements of thread B.
Another strategy is to have one thread do queries and another thread do updates. Queries hold shared locks until the transaction commits in SERIALIZABLE isolation mode; use READ_COMMITTED instead.
Yet another strategy is to have only one thread do database access. Have other threads get information from the database access thread.
Multiple threads are permitted to share a Connection, Statement, or ResultSet. However, the application programmer must ensure that one thread does not affect the behavior of the others.
Here are some tips for avoiding unexpected behavior: | <urn:uuid:c0ebb1a5-dd1b-4a1f-a212-4b245df306e1> | {
"date": "2015-03-29T10:38:27",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298464.94/warc/CC-MAIN-20150323172138-00242-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9230660200119019,
"score": 2.9375,
"token_count": 273,
"url": "http://db.apache.org/derby/docs/10.7/devguide/cdevconcepts89498.html"
} |
-Article by Alyssa Manansala
At Zeum, we are constantly trying to re imagine the way kids learn and create, whether that means introducing kids to new technologies, developing project based educational frameworks, or simply developing activities that inspire imagination and play. In our attempt to get kids more engaged in what they’re learning or creating, we know that one thing is for sure: any change starts with an idea, and more often than not it’s best to start big.
This week our Education Team of college interns went to Stanford University’s School of Education to visit the Learning Fabrication Lab, directed by Professor Paulo Blikstein. Inspired by the Constructionist learning theories of Seymore Papert, Professor Blikstein is exploring how learning changes when kids are given tangible tools to model and build their ideas. With his team of researchers and students, Paulo develops new technologies for rapid prototyping, digital fabrication, and learning design. One of the Lab’s main goals is taking the high-cost and highly developed technologies they’ve developed (which include 3D scanners and printers, and laser cutting) and scaling them down for the classroom. Taking big ideas and making them kid-friendly, the Lab promotes change in how kids learn in school, in particular by making the standard educational approach more engaging and hands on. Rather than having students learn from a teacher’s lecture, the FabLab encourages kids to learn science and technology by making and designing—a kind of learn as you go method. The FabLab showed the Zeum Team their GoGo Board, a robotics kit and software, and a lightning bolt circuitry postcard (similar to our Squishy Circuits creative workshop). Both the kit and the postcard are low-cost, and could easily be implemented in schools or interactive museums like Zeum.
At the end of our visit, we brainstormed ways to take inspiration from the FabLab’s advanced technology, and bring that same learn as you go method into Zeum. Our Mystery Box, Squishy Circuits, and 3D Space creative studios are just the start—What would you do with a 3D scanner or a laser cutter machine, both worth thousands of dollars? What would a kid do with them? Better yet, how might we scale them down to make them both useful and available to everyone? | <urn:uuid:9a7c89b0-b430-4404-8b48-5a78ce850fe0> | {
"date": "2018-06-23T21:30:56",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865250.0/warc/CC-MAIN-20180623210406-20180623230406-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9483340382575989,
"score": 3.734375,
"token_count": 482,
"url": "https://zeumblog.wordpress.com/2011/08/03/intern-field-trip-to-learning-fablab/"
} |
Latino groups applaud the Obama Administration’s important new standard to control and curb mercury and other toxic air pollution from power plants.
December 21, 2011 (WASHINGTON): EPA announced the adoption of historic safeguards against mercury and other toxic air pollution which will help to protect our children from increased risk of brain damage, cerebral palsy and other neuro-developmental problems. The Mercury and Air Toxics standard, or MATR is a major new measure to protect kids and families from mercury, toxics and other pollution from power plants.
These new health safeguards will reduce mercury emissions from power plants up to 90 percent, and vastly reduce levels of the toxic soup of other emissions that also lead to numerous health problems. Among the most dangerous of these pollutants is mercury, a neurotoxin that damages the developing brains and nervous systems of fetuses and young children. Mercury exposure can lead to delayed developmental milestones, delayed speech and other language problems, reduced IQ, problems with motor skills, and a laundry list of other health issues.
This rule protects our health while also creating thousands of jobs from the manufacturing, engineering, installation and maintenance of pollution controls to meet these standards, potentially including 46,000 short-term construction jobs and 8,000 long-term utility jobs.
This rule and these cost-savings are especially important to the Latino community because according to the Centers for Disease Control (CDC), Latino children have higher levels of mercury in their bodies compared with non-Hispanic white children. With 39 percent of Latinos living within 30 miles of a power plant, emissions controls are a critically needed and welcome safeguard.
Numerous Latino groups nationwide have joined together to thank the Obama administration for taking this important step towards protecting communities nationwide. Several signers to the letter remarked on the importance of this action:
Rafael Fantauzzi, President of the National Puerto Rican Coalition, Inc. (NPRC) and Chair of the National Latino Coalition on Climate Change (NLCCC) said:
“Today President Obama has taken an important step towards ensuring a safer, healthier future for our children by announcing a new strong standard for mercury and air toxics. NLCCC member organizations represent many Latino families who live near power plants that spew dangerous toxics into the air we breathe. Mercury is one of the leading causes of preventable birth defects in children like brain damage, cerebral palsy and other developmental problems. We are calling on our leaders in Congress to let this important protection stay in place to protect our children.”
Brent Wilkes, Executive Director of the League of United Latin American Citizens (LULAC) added:
“We support the new mercury and toxic air pollution rule announced today because it means that the health of our communities and families everywhere across the U.S. will face decreased risks for serious diseases associated with these pollutants. One of the most harmful effects of mercury pollution are birth defects and other developmental issues and with 39 percent of Latinos living near a power plant, we could not be happier to have this important new protection in place. The increased health costs and other expenses associated with these pollutants is also too heavy a burden to ask future generations to bear. These safeguards should be implemented immediately and without question by Congress.”
Roberto Carmona of Voces Verdes applauded the rule, adding:
“Voces Verdes applauds the Obama Administration’s important new standard to control and curb mercury and other toxic air pollution from power plants. This historic rule will benefit our nation as a whole and Latino families everywhere preventing the harmful effects of these pollutants, such as respiratory diseases, developmental problems and heart attacks in our communities. This rule protects our health while also creating thousands of jobs from the manufacturing, engineering, installation and maintenance of pollution controls to meet these standards, potentially including 46,000 short-term construction jobs and 8,000 long-term utility jobs. This is an important move to protect the public health while ensuring a brighter future for our communities.”
Other signers to the letter include:
Dr. Elena Rios, National Hispanic Medical Association; Mark Magana, National Latino Coalition on Climate Change, Rafael Fantauzzi, National Puerto Rican Coalition; Mildred Real, Common Ground for Conservation – America Verde; Juan Parras, Texas Environmental Justice Advocacy Services (TEJAS); Antonio Gonzalez, William C. Velasquez Institute; Raquelle Seda, Latino Family Services; Irma Munoz, Mujeres de La Tierra; Luis Olmedo, Centro Cívico del Valle; Refugio Mata, Project Economic Refugee.
Read the letter at Voces Verdes.
For more background on this, read A Long Awaited Victory for Children, Families, and Our Future on The Huffington Post by Adrianna Quintero, Director of Voces Verdes, La Onda Verde of NRDC. Also on the Los Angeles Times: EPA issues strong limits on mercury emissions from smokestacks. | <urn:uuid:2c94a1a9-ffa6-4055-b361-3c246feae60a> | {
"date": "2014-09-18T09:39:12",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657127222.34/warc/CC-MAIN-20140914011207-00205-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9068178534507751,
"score": 2.84375,
"token_count": 1015,
"url": "http://www.economicrefugee.net/latinos-welcome-historic-protections-against-toxic-air-pollution/"
} |
Unitarianism and Universalism
UNITARIANISM AND UNIVERSALISM
In 1961 the Unitarians and Universalists merged to form a single denomination, recognizing that their views on religious, social, and political matters had become virtually identical. This was not the case in the era of the American Revolution, when each had its American beginnings. The idea of a universal salvation had occurred to one or another Christian in the Old World as well as the new, and had been advanced on the eve of the Revolution by the liberal Congregationalist Charles Chauncy (1705–1787). But the organized Universalists were originally led by itinerant revivalists, and drew their members from the Baptists and Congregationalists, or from the unchurched. By contrast, New England Unitarianism emerged quietly and gracefully among the wealthiest and best-educated Bostonians as a further extension of Chauncy's Arminian Congregationalism (Arminianism, named for a sixteenth-century Dutch theologian, Jacobus Arminius, may be briefly described as free-will Calvinism).
Even in the beginning, however, Unitarians and Universalists had important things in common. Most of their churches arose and persisted in New England, where throughout their formative years—approximately the 1770s to the 1820s—the Congregational Church continued its regional dominance in Uoverall wealth and numbers. It did this in spite of disestablishment (1818 in Connecticut, 1832 in Massachusetts) and the vigorous growth of competing denominations. Those Congregationalists who had not themselves become Unitarians vigorously opposed the central idea that the Creator was one and indivisible and not a Trinity—Three Persons of one Divine Substance. Similarly the Congregationalists joined with other Christian denominations in being scandalized by the Universalists' defining principle: that the Atonement of Jesus extended to all souls. Critics argued that this was an open invitation to sin; Universalists saw it as divine encouragement to piety and virtue.
The first Unitarian congregation had previously been Anglican: the venerable King's Chapel in Boston. In 1787 it ordained the Reverend James Freeman, an avowed Unitarian, as minister. Unitarian principles quietly spread until 1805, when Harvard appointed Henry Ware (1764–1845) Hollis Professor of Divinity. After several further similar appointments, Harvard's faculty was firmly Unitarian, and a number of Congregational churches had proclaimed themselves Unitarian as well. Most famous among these was the Federal Street Church in Boston, whose minister was William Ellery Channing (1780–1842). Channing preached an inspiring and perhaps intoxicating message of the perfectibility of human nature. His sermon "Unitarian Christianity" (1819) is perhaps the defining text of the whole movement.
The Unitarian culture of eastern Massachusetts encouraged literature, science, and the fine arts, becoming the basis of a genuine New England Renaissance. It also prepared the ground for its precocious, if somewhat rebellious, spiritual child, the transcendentalism of the editor and essayist Margaret Fuller, the clergymen George Ripley and Theodore Parker, and the writer and philosopher Ralph Waldo Emerson. At their most radical, as in Emerson's case, the transcendentalists denied all traditional religious dogma, including the authority of the Bible, and exalted nature as the direct manifestation of the divine. Compared to the transcendentalists, however, the first generation of Unitarians remained theologically conservative in many respects. They avowed the holy inspiration and truth of Christian Scripture, the existence of miracles, and the immortality of the soul. Unitarians were not indifferent to the world around them but chiefly aimed to improve it by cultivating the individual. In "Likeness to God," Channing wrote of Christianity:
This whole religion expresses an infinite concern of God for the human soul, and teaches that he deems no methods too expensive for its recovery and exaltation. Christianity, with one voice, calls me to turn my regards and care to the spirit within me, as of more worth than the whole outward world. It calls us to "be perfect as our Father in heaven is perfect"; and everywhere, in the sublimity of its precepts, it implies and recognizes the sublime capacities of the being to whom they are addressed. (Selected Writings, p. 149)
The first important Universalist minister in Revolutionary North America was John Murray (1741–1815), who arrived in New Jersey in 1770. Raised as an English Calvinist, Murray joined the London church of the evangelical Anglican George Whitefield and subsequently converted to the Universalism of the Methodist James Relly. An itinerant for several years in America, Murray accepted the invitation of a small congregation in the seaport town of Gloucester, Massachusetts, in 1779, where his ministry attracted considerable interest and more than a little hostility. He also married a devout widow, Judith Sargent Murray (1751–1820), who proved to be a gifted and prolific author. Another founding father of Universalism was Elhanan Winchester (1751–1797), born in Brookline, Massachusetts, widely traveled as a young Baptist itinerant, and founder of the Society of Universal Baptists in Philadelphia in 1781. Benjamin Rush, a celebrated physician and signer of the Declaration of Independence, joined that society while maintaining his membership in the Presbyterian Church.
Hosea Ballou (1771–1852) established himself as Universalism's leading theologian with the publication in 1804 of his Treatise on the Atonement. Ballou was born and raised in rural New Hampshire, the eleventh child of a theologically severe, but personally warm, Baptist minister. His conversion to Universalism came when the movement had grown sufficiently to have some organization; he was ordained a minister at the Universalist General Convention of 1794. After preaching successfully in several towns, he settled permanently as pastor of the School Street Church in Boston in 1816. For the next quarter of a century he labored but a few blocks from William Ellery Channing's Federal Street Church, but Channing seems never to have sought his fellowship. Ballou's Treatise combined the optimistic rationalism of the Enlightenment with a determinism reminiscent of Jonathan Edwards. God had ordained that Christ should work the salvation of all humankind. The individual soul had but little choice: one could assent to divine grace either now or later. Death would speed the sinner to Heaven as swiftly as the saint. Many of the earlier Universalists had believed that unrepentant sinners would experience some discipline or punishment between death and Heaven, a notion that never entirely disappeared. Indeed, it regained currency after 1830.
Widely different in their origins, and appealing mostly to quite different segments of American society, the Unitarians and the Universalists both exhibited the idealism and optimism of the newly free and democratic United States. If the Unitarians were somewhat condescending and aristocratic in manner, they lived according to a high code of ethical behavior and greatly enriched the national culture. The Universalists, the foremost spiritual equalitarians, made democracy eternal.
Wright, Conrad. The Beginnings of Unitarianism. Boston: Beacon Press, 1955.
"Unitarianism and Universalism." Encyclopedia of the New American Nation. . Encyclopedia.com. (January 21, 2019). https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/unitarianism-and-universalism
"Unitarianism and Universalism." Encyclopedia of the New American Nation. . Retrieved January 21, 2019 from Encyclopedia.com: https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/unitarianism-and-universalism
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
- Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
- In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list. | <urn:uuid:9384fc23-a8ed-4f0f-9c2b-cea1bda2bbc2> | {
"date": "2019-01-22T02:33:45",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583823140.78/warc/CC-MAIN-20190122013923-20190122035923-00616.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.945957601070404,
"score": 3.6875,
"token_count": 1908,
"url": "https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/unitarianism-and-universalism"
} |
Consider: two scientists are asked whether there’s any doubt that humans are responsible for climate change. The first says, “It’s a fact humans are causing climate change – there’s no room for doubt.” The second replies, “The evidence for anthropogenic climate change is overwhelming, but in science there’s always room for doubt.”
The first scientist is probably a more effective spokesperson for the scientific consensus. But the second scientist is providing a more accurate representation of how science works.
This example defines the tension at the boundary between the realms of science and public opinion.
Is the aim of scientific advocacy to compellingly communicate particular scientific ideas, or to instill a way of understanding the natural world? Should scientists defend science or model science?
Read the whole story: NPR
Leave a comment below and continue the conversation. | <urn:uuid:78fe3e4a-5d90-4757-b4f9-072d2ae1f541> | {
"date": "2014-07-23T11:54:21",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877881.80/warc/CC-MAIN-20140722025757-00168-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8990465402603149,
"score": 2.546875,
"token_count": 180,
"url": "http://www.psychologicalscience.org/index.php/news/should-scientists-promote-results-over-process.html"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.