text
stringlengths
198
630k
id
stringlengths
47
47
metadata
dict
August 26, Women's Equality Day, commemorates the day when women in the United States took a giant step toward equality by winning the right to vote. Sadly, it's all too clear 94 years later that it was just one step on the long road to equality — and we're not there yet. Today, women across the country still routinely face inequality at home, at work and throughout society. And too often, the issues we care most about seem not to matter. That's why the National Partnership for Women & Families is proud to be joining with a growing and diverse group of organizations, advocates and individuals who are coming together in a new, coordinated way to remind lawmakers, the media and the public that women and workers in this country do matter. Together, we are raising our voices to say that the policies that would significantly advance our equality and economic security should be much more important to our elected officials. Put simply: #WEmatter. Some of us have been fighting for decades to build a more fair and family friendly America. We know firsthand the great progress we've made over the years in combating discrimination and unequal treatment. But we also know just how far we still have to go to achieve true equality for women and all workers. Women's equality matters today not only because it is just, moral and long overdue. It matters because, today, women make up nearly half of the workforce and are breadwinners in two-thirds of U.S. households. Yet we remain our families' primary caregivers. Families, our economy and our country are suffering because the nation's workplace policies have failed to keep pace with these realities. Women's equality matters because, despite being a nation that claims to value families, the United States is one of a handful of nations in the world that does not guarantee some form of paid leave. Just 12 percent of workers have access to paid family leave through their employers, and fewer than 40 percent have access to employer-provided paid medical leave through a temporary disability insurance program. This means that millions of women and families are one accident, injury, serious illness or birth away from financial devastation. Women's equality matters because millions of workers are forced to jeopardize their wages and their jobs when they get sick or need to care for a sick child because we don't have a national paid sick days standard. Forty-three percent of women who work in the private sector and 80 percent of low-wage workers — the majority of whom are women — can't take a single paid sick day to recover from common illnesses. And more than half of working mothers don't have even a few paid days they can use to care for a sick child. Women's equality matters because women still face blatant discrimination at work. Despite banning pregnancy discrimination more than 35 years ago, women are still forced out of their jobs or fired simply for being pregnant. And due to pay discrimination and a lack of family friendly workplace policies like paid leave and paid sick days, women are still paid just 77 cents for every dollar paid to men, which amounts to more than $11,600 in lost income each year that could go toward basic necessities. For African American women and Latinas, these numbers are even worse, which is appalling. Women's equality matters because women make up nearly two-thirds of the minimum wage workforce and the majority of tipped workers. And yet the tipped minimum wage has been stuck at a measly $2.13 per hour for more than 20 years. To make matters worse, workers in these occupations often also lack access to paid sick days and other supportive workplace policies while also suffering from unpredictable and erratic schedules, which threaten their ability to make ends meet from day to day and week to week. Women's equality matters because every American deserves quality, affordable, patient-centered health care and efforts to provide that remain under attack, as does the birth control coverage and access to reproductive health services that women need. Women's equality matters for all of these reasons and many more. And it's clear that there is much more that lawmakers can and should be doing to help. At the federal level, there are proposals like the Family And Medical Insurance Leave (FAMILY) Act, the Healthy Families Act, the Pregnant Workers Fairness Act, the Paycheck Fairness Act, the Fair Minimum Wage Act, the Schedules That Work Act and the Women's Health Protection Act that would go a long way toward advancing women's equality and economic security. They matter. And they should be priorities. So let this Women's Equality Day be a reminder that the stories, experiences and struggles of women and their families are the stories, experiences and struggles of our nation. They should be top of mind for lawmakers and anyone who claims to care about our country's future. At the National Partnership, #WEmatter represents a unified call for action and accountability that is only growing stronger. It's time that many more elected officials at all levels start listening, because #WEmatter — and because we know that winning the right to vote was just the beginning.
<urn:uuid:5c30f3b3-840c-44b4-ac9c-8b7deb662746>
{ "date": "2016-09-26T00:14:16", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660467.49/warc/CC-MAIN-20160924173740-00080-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9728322625160217, "score": 2.59375, "token_count": 1023, "url": "http://www.nationalpartnership.org/blog/general/womens-equality-matters.html" }
|Exploring the Planets: Mars| Students will learn that Mars, and each planet in the solar system, is unique due to the materials from which it is made and the processes that shaped it. Images and information from Mars exploration voyages, including the Viking Mission in 1975, the Pathfinder Landing in 1997, the Mars Global Surveyor project, the Mars Odyssey and Mars Express spacecrafts, the Mars Exploration Rovers, and the Reconnaissance Orbiter are presented. Students will learn about Mars mean distance from Sun, length of year, rotation period, mean orbital velocity, inclination of axis, average temperature (day and night), diameter, inclination to ecliptic, and number of observed satellites. The seasons, volcanoes, canyons and plains, craters, water, wind patterns, and two moons of Mars are also discussed. Intended for grade levels: Type of resource: No specific technical requirements, just a browser required Cost / Copyright: Copyright 2002 National Air and Space Museum DLESE Catalog ID: DLESE-000-000-006-020 This resource is part of 'Exploring the Planets Gallery' Resource contact / Creator / Publisher:
<urn:uuid:253d363d-0d7d-474f-84cf-3be2bda4a7fc>
{ "date": "2017-01-24T23:24:47", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00412-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.8521000146865845, "score": 4.1875, "token_count": 244, "url": "http://www.dlese.org/library/catalog_DLESE-000-000-006-020.htm" }
Kansas Geological Survey, Bulletin 157, Part 1, originally published in 1962 Originally published in 1962 as Kansas Geological Survey Bulletin 157, Part 1. This is, in general, the original text as published. The information has not been updated. On December 25, 1961, at 6:20 a.m. and at 7:00 a.m., northwestern Missouri and northeastern Kansas felt the effects of earthquakes centering approximately 8 km (5 mi) north of Excelsior Springs, Missouri. The shocks originated at depths of 20 to 30 km (12 to 18 mi), within the continental granitic layer. The intensity of the second and stronger shock was V. Motion of individuals and objects was perceptible, but damage was limited to minor cracking of plaster. At approximately 6:20 a.m. and at 7:00 a.m. on December 25, 1961, earthquakes centering about 8 km (5 mi) north of Excelsior Springs, Missouri, were felt throughout northwestern Missouri and northeastern Kansas in an area roughly within a radius of 112 km (70 mi) of the epicenter. Early reports placed the shocks in western Missouri between Kansas City on the north and Joplin and Springfield on the south. Confirmation of the occurrence of an earthquake in northwestern Missouri first came from seismological stations at Saint Louis University and the University of Kansas. The second shock was reported as the stronger of the two, and this was confirmed by the seismological records. First reports, suggesting disturbance in a long narrow belt between Kansas City and Joplin, prompted a canvas by mail to determine effects of the earthquakes. On December 27 and 28, approximately 700 questionnaires were mailed to postmasters, police chiefs, newspaper editors, and geologists in the area in hopes of determining the intensity pattern. By January 16, 492 questionnaires had been returned and an additional 128 unsolicited letters had been received. This information, supplemented by some field investigation, was the basis for preparation of isoseismal maps (Fig. 1, 2). Maximum intensity of the second and stronger shock was V. Zone V is characterized by "felt by nearly everyone; many awakened, some dishes, windows, etc., broken; a few instances of cracked plaster; unstable objects overturned, disturbance of trees, poles, and other tall objects sometimes noticed, pendulum clocks may stop" (Wood and Neumann, 1931, p. 282). The epicenter as plotted from this investigation closely correlates with the epicenter as determined from seismic information from nine stations. Without the cooperation of many individuals, too numerous to name, this work could not have been completed. Newspapers made it known to their readers that information was desired, and some papers printed the questionnaire. This help was directly responsible for many of the unsolicited letters. Many postmasters, to whom most of the questionnaires were addressed, made considerable effort to give a cross section impression of their patrons' reactions. Thanks also go to several graduate students at the Department of Geology of the University of Kansas and to several staff members of the State Geological Survey of Kansas, who helped process mail and who field-checked critical areas. We especially thank Virgil B. Cole of Wichita, Kansas, for permission to reproduce part of an unpublished basement map of the area affected by the earthquakes (Fig. 3), and J. A. Peoples for help in interpretation of records and for obtaining information from other stations. In the midcontinent area, normally regarded as tectonically stable, numerous small shocks have occurred during historic time. Earthquakes that have been felt in eastern Kansas and western Missouri are as follows (Merriam, 1956): |Date||Epicenter||Maximum intensity at epicenter| |December 16, 1811||36.6° N, 89.6° W, New Madrid, Mo.||X| |January 2p, 1812||36.6° N, 89.6° W, New Madrid, Mo.||X| |February 7, 1812||36.6° N, 89.6° W, New Madrid, Mo.||X| |April 24, 1867||39.5° N, 96.7° W, Manhattan, Kans.||VIII| |November 8, 1875||39.3° N, 95.5° W, Valley Falls, Kans.||V| |November 15, 1877||41° N, 97° W, eastern Nebraska||VII| |November 18, 1878||36.7° N, 90.4° W, southeastern Missouri||VII| |October 31, 1895||37° N, 89.4° W, Charleston, Mo.||VIII-IX| |December 2, 1897||Most noticeable near Westport, Mo.||III| |January 24, 1902||38.6° N, 90.3° W, Missouri||VI-VII| |January 7, 1906||39.3° N, 96.6° W, Manhattan, Kans.||VII-VIII| |September 27, 1909||39° N, 87.7° W, Indiana||VIII| |April 9, 1917||38.1° N, 90.6° W, Eastern Missouri||VI| |July 30, 1925||35.4° N, 101.3° W, Texas Panhandle||VI| |August 9, 1931||Probably near Turner, Kans.||IV| |March 1, 1935||40.3° N, 96.2° W, Tecumseh, Neb.||VI-VII| |November 23, 1939||38.2° N, 90.1° W, Griggs, Ill.||V| |April 9, 1952||35.4° N, 97.8° W, Oklahoma City, Okla.||VII| The coincidence of points of origin and the similarity of areas affected permit discussion of the two earthquakes together.Area Affected The 6:20 shock, which had a maximum intensity of IV, was perceptible over an area of approximately 21,500 sq km (8,300 sq mi), the zone of maximum intensity (IV) being confined to Ray and Clay counties, Missouri, between latitude 39.2° and 39.5° N and longitude 93.8° and 94.6° W. The area in which the shock was perceptible is approximately circular, but the zone of maximum intensity is slightly elongate northeast and off set to the southwest of the center (Fig. 1). Figure 1--Isoseismal map of eastern Kansas and western Missouri showing area affected by earthquake of 6:20 a.m., December 25, 1961. Roman numerals indicate intensity according to Modified Mercalli Intensity Scale. The second shock, at approximately 7 a.m., had a maximum intensity of V but in the lower range of that grade. It was felt over an area of approximately 25,500 sq km (9,745 sq mi), but there were two separate small zones of maximum intensity centering around Kansas City (latitude 39.1° N and longitude 94.6° W) and around Lawson (latitude 39.4° N and longitude 94.2° W) (Fig. 2). These two zones of intensity V and the surrounding zone of intensity IV are, as in the 6:20 a.m. shock, displaced to the southwest in the roughly circular area in which the earthquake was perceptible. Figure 2--Isoseismal map of eastern Kansas and western Missouri showing area affected by earthquake of 7:00 a.m., December 25, 1961. Roman numerals indicate intensity according to Modified Mercalli Intensity Scale. The epicentral area lies within the Forest City basin on the northwest flank of the Ozark Dome, in an area underlain by nearly horizontal Pennsylvanian and older rocks. In the vicinity of Excelsior Springs this sedimentary sequence is approximately 2,500 feet thick and is locally overlain by glacial deposits as much as 100 feet thick. Not even a superficial relationship between the epicenters and any major structural feature can be established. The calculated depths of the earthquakes are not conducive to establishment of a relationship between "minor" basement features and foci (points of origin in depth), although such a relationship seemingly is a distinct possibility. Virgil B. Cole, extending his Precambrian basement map of Kansas (Cole, in press) into adjacent states, shows a series of northwest-trending features in western Missouri (Fig. 3). Several features are definitely bounded by faults, which have been mapped either in surface or subsurface rocks. Areas of maximum intensity for the 7:00 a.m. earthquake lie on the flanks of such structures, and are suggestive of faulting along them in a manner similar to that which has been established along parallel down-faulted blocks (grabens) in southwestern Missouri and southeastern Kansas. The intensity V zone (7: 00 a.m. shock) centering in Kansas City may be exaggerated because of the greater number of reports from this area of greater population density and perhaps should be disregarded. To do so, however, would not detract from the possibility of the second area of intensity V being associated with faulting along the basement trough that trends northwestward through Excelsior Springs and on the flank of which is superimposed the epicenter. Figure 3--Basement configuration in vicinity of northeastern Missouri earthquakes of December 25, 1961. Zones of intensity V show areas of maximum intensity relative to basement features (from unpublished map by Virgil B. Cole). Contour interval 100 feet. The epicenter as estimated from intensity distribution is approximately 8 km (5 mi) north of Excelsior Springs, Missouri (latitude 39.4° N, longitude 94.2° W). J. A. Peoples (personal communication) found that ". . . an epicenter position of 39.4° N, 94.2° W is reasonably consistent with reported seismic arrival times for seismograph stations at Lawrence and Manhattan, Kansas; Rolla, Florissant, and St. Louis, Missouri; Fayetteville, Arkansas; Tulsa, Oklahoma; Dubuque, Iowa; and Bloomington, Indiana. Although this is a preliminary estimate, it would be difficult to reconcile a shift of more than 10 km from this position." Preliminary determination by the Coast and Geodetic Survey (January 8, 1962) placed the epicenter in the vicinity of Martin City (latitude 38.9° N, longitude 94.6° W) in western Missouri, south of Kansas City. No reports of the earthquake being felt in the vicinity of the epicentral determination of the Coast and Geodetic Survey were reported. Shocks recorded at Lawrence are as follows: |Time of arrival (Greenwich Civil Time)| |(Interpretation by J. A. Peoples)| The Lawrence station is approximately 92 km (60 mi) from the epicenter. The hypocentral times (time of origin) are 12h 19m 55s, and 12h 58m 14s, Greenwich Civil Time. Questionnaires and field study indicate a maximum intensity of IV (Modified Mercalli Intensity Scale of 1931) for the first shock (6:20 a.m.), and a maximum intensity of V, but in the lower range of grade V, for the second. The characteristic effects of earthquake activity in intensity zones I-V as defined by this scale (abridged) are listed below (Wood and Neumann, 1931, p. 282). A maximum intensity of IV was delimited for the 6:20 a.m. earthquake in Ray and Clay counties, but more restricted zones of intensity V (Kansas City, Greenville-Lawson) could be isolated for the 7: 00 a.m. shock. Although the zone of greater intensity at Kansas City is anomalous to the overall distribution of effect (giving full consideration to the volume of correspondence from this area), there is no doubt it is justifiably isolated from the area of intensity V to the northeast. The depth of focus has been computed using Gutenberg's formula (Gutenberg and Richter, 1942, p. 174) (see p. 9 of book) where r is radius to limit of perceptibility, I0 is maximum intensity, and h is depth of focus. For the first earthquake r is about 88 km (55 mi) and I0 is 4; therefore, the depth of focus is estimated at about 35 km (22 mi). The second shock shows a slight increase in the radius of perceptibility to 112 km (70 mi) and I0 is 5; depth of focus is therefore computed as approximately 25 km (16 mi). Seismic data from the Lawrence station do not aid in the determination of the depth of focus but indicate only that the hypocenter was not below the granite. Inasmuch as the limit of perceptibility cannot be determined precisely, and inasmuch as intensity of the 7:00 a.m. shock reached only into the lower range of grade V, depth of focus could reasonably be approximately the same for both shocks, at about 30 km (19 mi). Because of unknown factors involved, it can be concluded only that they occurred near the base of the granite at a depth of 20 to 30 km (12 to 19 mi). The U.S. Coast and Geodetic Survey reports the depth for the first earthquake at about 25 km (16 mi) and of the second at about 20 km (12 mi); these figures agree reasonably well with other depth determinations. No warning foreshocks preceded the earthquakes nor were there any aftershocks. Although isolated reports of ground motion are not unexpected, and most can be attributed to some other coincidental activity, worthy of note are reports from Jasper, Newton, Lawrence, and Christian counties, Missouri, and from Vernon and St. Clair counties, Missouri, and Crawford County, Kansas. Both areas are regions where faults have been identified in both surface and subsurface rocks. Movement along these faults may have been triggered by release of stress as a result of the earthquake activity northeast of Kansas City. Of necessity, because of the small amount of effective energy available as far as 240 km (150 mi) from the epicenter, the earthquake activity could provide only a small triggering force in a region already under stress. The first earthquake was felt most strongly in the vicinity of Rockingham, Vibbard, Kearney, and North Kansas City, Missouri. Areas of maximum intensity for the second shock are centered around Kearney and Lawson and around Kansas City, Missouri. Throughout these areas, noises associated with the earthquakes were reported. They were described variously as jets crashing the sound barrier, explosions, roars, muffled booms, thunder, heavy trucks passing, heavy blasting, or fast freight trains. The occurrence of sound, however, is not critical for interpretation of intensity. Rapid ground vibration generates these noises, and the frequency of vibration may be below the threshold of hearing for some individuals but not for others. Different persons thus would be expected to react differently to the same vibrations. Other differences in reaction of individuals within a single isoseismal zone are also expected (Wood and Neumann, 1931, p. 278): "To evaluate intensity critically account must be taken of duration of shaking; nature of ground underneath locality and whether surface is level, gently sloping or steep; whether observers were outdoors, or indoors, in what kind of structure, on what floor, whether quiet or active, and if active how occupied; also whether the motion is rapid or slow, simple or complex, and whether it begins gradually or abruptly. . . ." For the most part, observations within isoseismal zones correspond with descriptions in the Modified Mercalli Scale. Specific observations are recorded here for areas within the zones of maximum intensity in order to better define the extent of the activity. Lawson, Missouri--Many residents felt both shocks; some reported being awakened by the first, and a few by the second. The second earthquake was generally conceded to be the stronger. Of the few residents questioned, three reported cracked plaster, all in relatively new homes. Rattling of dishes and windows was common, and movement of unstable objects was detected. Vibbard, Missouri--An aluminum trailer house, set on concrete blocks, swayed and banged against a porch adjacent to the trailer. Liberty, Missouri--A 4-inch water main seemingly was broken during the second shock, but the break could have been caused by an exceptionally heavy truck passing over the area. The water department was notified of the break at 7:20 a.m. Dishes rattled throughout the area, and pictures moved on walls. Kearney, Missouri--Most residents were fully aware of the earthquakes. Many were awakened; some reported shaking of beds. Several who went out of their residences reported seeing neighbors also checking adjacent areas. Excelsior Springs, Missouri--Reports from Excelsior Springs indicate a lesser effect than in Kearney and Lawson. Some but not most persons reported being awakened by an explosion, not by the shock alone. Many, used to much local blasting, assumed another large explosion at the quarry. Kansas City, Missouri--The major effect was produced by the second shock. Several residents reported cracked plaster, one reported cracked windows, one a cracked basement, one a cracked patio, and several reported that windows and doors became difficult to open or close. An individual who was sitting in a chair at the time of the shock described his reaction as similar to that when sitting in a car struck from behind. In some houses waterpipes chattered, walls creaked, bird cages rattled, and small bells rang, and pictures were swung from position. In several homes, sand from pre-existing cracks in plaster was shaken onto the floor. Several movements of furniture were reported, including a large chandelier in motion. Coffee was seen sloshing in cups. Letters from the Kansas City area were numerous, the interest of residents typically expressed as follows: Dear Dr. Dellwig: My name is John R. Taylor. I am 9 years old. I live at 7418 Jarboe, Kansas City 14, Mo. My house is a 2-story frame structure. The ground underneath is clay. I happened to be awake on Christmas morning about 7:00 when I felt the house vibrate. The quake lasted from 5 to 7 sec. The tremor shook the bookcase about 1 1/2 inches out of place. I was resting near the side of my bed, and it shook me out of bed almost! Although it was slightly large, you could not tell anything had happened unless you felt the tremor, for no noticeable damage had been done. I was the only one in my family who noticed it. I felt only the second one. JOHN R. TAYLOR Kansas City, Kansas--A Christmas tree was tipped over in Prairie Village. Other reports from that area included reference to ornaments shaken from Christmas trees, a chandelier moving, beds rocking, water sloshing in a glass, and bottles and other unstable objects being rattled. In Overland Park a nightstand rattled on the floor, other furniture vibrated, and a small figurine was overturned. The earthquakes of December 25, 1961, were centered in Ray and Clay counties, in western Missouri. Maximum intensity in the epicentral area during the first shock (6:20 a.m.) was IV and during the second shock (7:00 a.m.) was V. Both earthquakes were felt over an area of maximum radius of approximately 112 km (70 mi). Depth of focus was 20 to 30 km (12 to 19 mi). No relation with any major structural feature can be established, but there is a suggestion of a relationship with possible basement faults. No damage other than minor cracking of walls can be definitely attributed to the earthquakes. Cole, V. B., in press, Configuration of Precambrian basement rocks in Kansas: Kansas Geol. Survey Oil and Gas Invest. 26, map. Gutenberg, B., and Richter, C. F., 1942, Earthquake magnitude, intensity, energy, and acceleration: Seismol. Soc. America Bull., v. 32, p. 163-191. Merriam, D. F., 1956, History of earthquakes in Kansas: Seismol. Soc. America Bull., v. 46, p. 87-96. Wood, H. O., and Neumann, Frank, 1931, Modified Mercalli Intensity Scale of 1931: Seismol. Soc. America Bull., v. 21, p. 277-283. Kansas Geological Survey, Geology Placed on web July 25; originally published in April 1962. Comments to [email protected] The URL for this page is http://www.kgs.ku.edu/Publications/Bulletins/157_1/index.html
<urn:uuid:cecca463-0fdb-4112-b775-f603d9bf2e2e>
{ "date": "2016-09-28T13:45:26", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661449.76/warc/CC-MAIN-20160924173741-00082-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9508856534957886, "score": 3.078125, "token_count": 4345, "url": "http://www.kgs.ku.edu/Publications/Bulletins/157_1/index.html" }
Countries in the World |Home Earth Continents Luxembourg Country Profile Google Earth Luxembourg (City) Map ___ Satellite View and Map of Luxembourg (City), Luxembourg (45-degree view available) About Luxembourg (City)Satellite view showing Luxembourg (City), the national capital of the Grand Duchy of Luxembourg. The city is located at the confluence of the Alzette and Pétrusse rivers in southern Luxembourg. In 963 Count Siegfried built his Castle of Lucilinburhuc on the Bockfiels (Bock), the castle was connected to the plateau through a drawbridge. In time, a settlement grew on the plateau which later should become Luxembourg. Today Luxembourg city has a population of about 100.000 inhabitants. Main attractions are the Grand Ducal Palace, Notre-Dame Cathedral, the only cathedral in the country, the National Museum of History and Art, the Mudam, the foremost museum dedicated to contemporary art in Luxembourg, and the Neumünster Abbey, formerly a Benedictine Abbey is today a public meeting place and cultural center. Just zoom in (+) to see Grand Ducal Palace, the official residence of the Grand Duke of Luxembourg. Nearby to the south there are the city's Old Quarters and Fortifications, a UNESCO World Heritage Site. The map shows a city map of Luxembourg City with expressways, main roads and streets, zoom out to find the location of Luxembourg – Findel Airport (IATA code: LUX), about 6 km (4 mi) northeast of the city. To find a location use the form below. To view just the map, click on the "Map" button. Luxembourg City straddles several valleys and outcrops. Bookmark/share this page | To find a location type: street or place, city, optional: state, country. ||Local Time Luxembourg: Friday-May-6 13:07Standard Time Zone (CET): UTC/GMT +1 hour CEST (Daylight Saving Time) in use from end of March until end of October: time zone offset: UTC/GMT +2 hours φ Latitude, λ Longitude (of Map center; move the map to see coordinates): | Google Maps: Searchable map/satellite view of Luxembourg (City), Luxembourg. |More about Luxembourg: Searchable map and satellite view of the Grand Duchy of Luxembourg Political Map of Luxembourg Luxembourg Country Profile Map of Europe Luxembourg City (official web site; in French) Wikipedia: Luxembourg (City) | Weather Conditions Luxembourg ||Related Consumer Information: Rome - Zürich - Madrid - Paris - Amsterdam London - Stockholm - Berlin - Prague - Vienna - Istanbul Bern, Cologne, Brussels, Frankfurt, Hamburg, Luxembourg (City), Monaco, Munich (München), Nice, Rotterdam, The Hague, Vaduz, Zurich Austria | Belgium | France | Germany | Liechtenstein | Monaco | Netherlands | Switzerland Austria Map | Belgium Map | France Map | Germany Map | Netherlands Map | Switzerland Map Map Help [ show ] One World - Nations Online .:. let's care for this planet Made to improve cross-cultural understanding and global awareness. Copyright © 1998-2016 :: nationsonline.org
<urn:uuid:799272d9-1b9c-4c21-abe2-74d05c5af795>
{ "date": "2016-05-06T11:07:56", "dump": "CC-MAIN-2016-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861754936.62/warc/CC-MAIN-20160428164234-00076-ip-10-239-7-51.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.7851631045341492, "score": 2.6875, "token_count": 711, "url": "http://www.nationsonline.org/oneworld/map/google_map_Luxembourg_City.htm" }
In Maoist thought, a capitalist roader (simplified Chinese: 走资派; traditional Chinese: 走資派; pinyin: Zǒu zīpài) or (simplified Chinese: 走资本主义道路的当权派; traditional Chinese: 走資本主義道路的當權派; pinyin: Zǒu zīběn zhǔyì dàolù dídàng quánpài) is a person or group who demonstrates a marked tendency to bow to pressure from bourgeois forces and subsequently attempts to pull the Revolution in a capitalist direction. If allowed to do so, these forces would eventually restore the political and economic rule of capitalism; in other words, these forces would lead a society down a "capitalist road". The term first appeared in Communist Party of China literature in 1965, but the idea was initially developed by Mao Zedong in 1956–1957, against what he saw as reactionary tendencies in the party. Capitalist roaders are described as representatives of the capitalist class within the Communist Party and those who attempt to restore capitalism while pretending to uphold socialism. Mao contended that Deng Xiaoping was a capitalist roader and that the Soviet Union fell to capitalist roaders from within the Communist Party after the death of Joseph Stalin. |This People's Republic of China-related article is a stub. You can help Wikipedia by expanding it.| |This article about a political term is a stub. You can help Wikipedia by expanding it.|
<urn:uuid:95af65d5-0a8a-497f-84c8-7d19afb2e5bd>
{ "date": "2017-03-27T17:33:45", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189490.1/warc/CC-MAIN-20170322212949-00486-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.930935263633728, "score": 2.890625, "token_count": 365, "url": "https://en.wikipedia.org/wiki/Capitalist_roader" }
Another week, another amazing application for Google Earth. Declan actually reported on this in his article in Nature a few weeks ago, but the passing reference, well, passed me by: The Global Biodiversity Information Facility is a prototype data portal that gives you access to an exhaustive database of taxonomies and where on Earth specimens of these species have been found. You can query the database for your favorite plant or animal and then you can plot the returned geographic “occurence data” on Google Earth, like so. The screenshot below is from a search for White Mustard and Bighorn sheep (for the record, not my favorite plant and animal): But that’s not all: There is an easy-to-use tool to add your own coordinate data to Google Earth, links to detailed and dynamic topographic overlays for different regions around the world, and tools for creating 3D objects in Google Earth. The method used is quite nifty, involving dynamically created llinks inside Google Earth that take you to a web page where you can tweak away.
<urn:uuid:b1296a76-9809-4282-9a39-be142993949d>
{ "date": "2017-04-30T20:36:27", "dump": "CC-MAIN-2017-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125849.25/warc/CC-MAIN-20170423031205-00238-ip-10-145-167-34.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.902416467666626, "score": 2.53125, "token_count": 219, "url": "http://ogleearth.com/2006/02/global-biodiversity-data-in-google-earth/" }
"Hepatitis" means inflamation of the liver. Hepatitis C is the most common form of viral hepatitis. Hepatitis C is a contagious liver disease that ranges in serveity from a mild illness lasting only a few weeks to a serious, lifelong illness that attacks the liver. The hepatitis C virus (HCV) is spread through blood to blood contact, and can be acute or chronic. Hepatitis C is spread when blood from an infected person enters the body of someone who is not infected. Common ways the virus is spread include: - Sharing needles or syringes for IV drug use - Being born to a mother infected with Hepatitis C - Needlestick injuries in health care settings Less common ways the virus is spread include: - Sharing personal items that may have come in contact with an infected person's blood like razors - Having sexual contact with a person who is infected - Tattoo or piercing parlors that have poor infection control policies. 70%-80% of people with acute Hepatitis C do not have any symptoms Some people however, have symptoms soon after being infected, including: - Loss of appetite - Abdominal pain - Dark urine - Clay- colored bowel movements - Joint pain Talk to your doctor about getting tested for Hepatitis C if any of the following are true: - You were born from 1945 through 1965 - You are a current or former injection drug user, even if you only used one time or many years ago - You were treated for a blood clotting problem before 1987 - You received a blood transfusion or organ transplant before July 1992 - You are on long-term hemodialysis treatment - You have abnormal liver tests or liver disease - You work in health care or public safety and were exposed to blood through a needlestick or other sharp object injury - You are infected with HIV Acute hepatitis C can be treated, and in about 25% of people it will clear on its own without any treatment. The treatment drugs for acute hepatitis are the same as the ones that are used for chronic hepatitis. Chronic hepatitis has several medicines that are used to treat the infection, and there are more options than ever before.
<urn:uuid:ddbe0a4b-2d94-4a13-b094-eb2a91bee160>
{ "date": "2018-10-21T08:45:56", "dump": "CC-MAIN-2018-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513804.32/warc/CC-MAIN-20181021073314-20181021094814-00536.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9542721509933472, "score": 3.9375, "token_count": 474, "url": "https://www.oregonclinic.com/hepatitis-c" }
The Principles of Water Softening The hard water is contaminated with many types of ions such as calcium, magnesium etc which are present in considerable concentration in the hard water. It is very important to reduce the reduction of all such ions present in water and the entire terminology is known as hard water softening. Foul odor or smell, improper action of soap, build up scale interference etc are some of the major side effects of hard water that are to be overcome. It is not easy for the soap to form lather with hard water during its action which then reduces the productivity of the soap and the purpose for which it is being used. Hence to overcome all such problems the softening of hard water is necessarily required. Well hard water can be softened in many ways or using many techniques such as ion-exchange method, regeneration method, lime softening, by use of chelating agents, by action of physical conditioners etc. Better the ability of the method to reduce the concentration of calcium and magnesium ions, stronger is the process. Well in normal cases we make use of the sodium ions to replace the calcium and magnesium ions that are mainly responsible for the hardness of water. In the ion-exchange method the water containing magnesium and calcium ions is implemented or passed through a pipe which contains the sodium ions in it. Once the water falls on the bed called zeolite the calcium and magnesium ions present in that hard water are immediately replaced by the sodium ions ultimately leading to the softening of hard water. The main principle involved behind this is that sodium ions because of their non precipitating nature are not clogged into the pipes and are known to react better with soap. During ion-exchange water softening technique one has to replace or regenerate the zeolite bed every time as the zeolite bed after replacement of sodium ions is left with magnesium and calcium ions deposited on its surface. Regeneration is an effective step or step forward in this target. In regeneration process any brine solution such as sodium chloride is passed over the bed of Zeolite to remove the magnesium and calcium ion deposits. Well the other basic and minute process included in softening of water is the use of chelators. Chelators enable the softening of water during chemical analysis. Shampoos, preservatives, citric acid etc are some of the commonly used chelators. Last but not the least in some cases with involvement of radio waves or magnetic field it is believed that even physical conditioners can soften the better but to add to your knowledge I would like to say that with use of these conditioners the water only seems softened but it is not so in reality. Well one of the most convenient and easiest methods for softening of water is ion-exchange method which main principle involves replacement of calcium and magnesium ions by sodium ions for water softening. Kinds of Purifiers - Whole House Filters - Shower Filters - Chlorine in Water - Water Treatment - Treatment Equipment - Countertop Filters - Aquasana Filters Review - Water Filter Systems - Purification Process
<urn:uuid:eee76557-1531-4bee-a7db-74cd26c7d65c>
{ "date": "2014-04-24T16:46:01", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206647.11/warc/CC-MAIN-20140423032006-00179-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9473076462745667, "score": 3.09375, "token_count": 630, "url": "http://www.aquasanawater.net/water-softening-concept.html" }
Cattleman and inventor Charles Goodnight was born on March 5th in Texas. As a tribute to the man who may be the one individual most responsible for the food truck industry we have today we have put a short biography together for you. Charles Goodnight: The Man, The Myth, The Legend Charlie Goodnight, also known as Charlie, was born with the Texas Revolution. He came to the state from Missouri the year Texas entered statehood, and, later, with a handful of men, invented the American ranching industry and the chuck wagon. He is sometimes known as the “father of the Texas Panhandle.” Essayist and historian J. Frank Dobie said that Charles Goodnight “approached greatness more nearly than any other cowman of history.” The chuck wagon (a cowboy’s portable kitchen wagon used on the cattle trails) was invented by Goodnight in 1866 by using an army surplus Studebaker wagon to create what is considered by many as the first food truck. Goodnight purchased the government wagon and had it completely rebuilt according to his specifications in seasoned bois d’arc, the toughest wood available. The distinguishing feature of the wagon was the sloping box on the rear with hinged lid that lowered to become a cook’s worktable. The box was fitted to the width of the wagon and contained shelves and drawers for holding food and utensils. Since early 17th Century England, individuals involved in the meat business referred to a lower priced part of the beef carcass as the “chuck.” To the cowboys, “chuck” was food, so the box was called a chuck box and the wagon became known as a chuck wagon. Most chuck wagons had the same basic design. They were large, sturdy, four-wheeled wagons with bows across the top covered with waterproof sheets. There was usually a cowhide stretched beneath the wagon bed and fastened at the corners; it was used to carry wood or cow chips. Chuck wagon food was comprised of black-eyed peas, beans, corn and cabbage. Of course, there was lots of beef and bison steaks and stews spiced with chilies, garlic, and onion or the occasional catfish or shrimp caught from the rivers, lakes or coastal waters. Sourdough breads (sourdough bullets), quick biscuits, skillet corn bread and cowboy coffee were served with the meals. The chuck wagon was drawn by oxen or mules. The wagon usually carried food, eating utensils, a water barrel, as well as tools and bed rolls, all tucked away in drawers and shelves and covered by a canvas covering. A hinged counter that folded out was used for chopping and preparing the food. Without the chuckwagon’s creation by Charles Goodnight, not only would the trek Westward changed, but who knows if there would be a mobile food industry like we have today. More on Charles Goodnight can be found at PBS.org <here>
<urn:uuid:2ba4c3d9-336a-4475-8080-7693472fdd9a>
{ "date": "2017-03-01T17:50:22", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00160-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9792865514755249, "score": 2.859375, "token_count": 632, "url": "http://mobile-cuisine.com/profiles/charles-goodnight/" }
Using SambaRobert Eckstein, David Collier-Brown, Peter Kelly 1st Edition November 1999 1-56592-449-5, Order Number: 4495 416 pages, $34.95 You'll be glad to know that configuring Windows to use your new Samba server is quite simple. SMB is Microsoft's native language for resource sharing on a local area network, so much of the installation and setup on the Windows client side has been taken care of already. The primary issues that we will cover in this chapter involve communication and coordination between Windows and Unix, two completely different operating systems. Samba uses TCP/IP to talk to its clients on the network. If you aren't already using TCP/IP on your Windows computers, this chapter will show you how to install it. Then you'll need to configure your Windows machines to operate on a TCP/IP network. Once these two requirements have been taken care of, we can show how to access a shared disk on the Samba server. This chapter is divided into three sections. The first section covers setting up Windows 95/98 computers while the second covers Windows NT 4.0 machines. The final section provides some prerequisite information on how SMB connections are made from Windows clients and servers, which is useful as we move into the later chapters of the book. Unfortunately, Windows 95/98 wasn't designed for a PC to have more than one user; that concept is more inherent to a Unix operating system or Windows NT. However, Windows 95/98 does have limited support for multiple users: if you tell it, the operating system will keep a separate profile (desktop layout) and password file for each user. This is a far cry from true multiuser security. In other words, Windows 95/98 won't try to keep one user from destroying the work of another on the local hard drive like Unix, but profiles are a place to start. The first thing we need to do is to tell Windows to keep user profiles separate, and to collect usernames and passwords to authenticate anyone trying to access a Samba share. We do so via the Password settings in the Control Panel. If you are not familiar with the Windows Control Panel, you can access it by choosing the Settings menu item from the pop-up menu of the Start button in the lower-left corner of the screen. Alternatively, you'll find it as a folder under the icon in the upper-left corner that represents your computer and is typically labeled My Computer. After selecting the Passwords icon in the Control Panel, click on the User Profiles tab on the far right. You should see the dialog box shown in Figure 3.1. Then click the lower of the two radio buttons that starts "Users can customize their preferences...." This causes Windows to store a separate profile for each user, and saves the username and password you provide, which it will use later when it connects to an SMB/CIFS server. Finally, check both the options under the User Profile Settings border, as shown in the figure. The next step is to select the Change Passwords tab on the left side of the dialog box. In order for Samba to allow you access to its shares, the username and password you give to Windows must match the account and password on the Samba server. If you don't have this tab in your dialog box, don't worry; it's probably because you haven't given yourself a Windows username and password yet. Simply click the OK button at the bottom and respond Yes when Windows asks to reboot. Then, skip down to the section entitled Section 184.108.40.206, Logging in for the first time. After selecting the Change Passwords tab, the dialog box in Figure 3.2 will appear. Select the Change Windows Password button. The Change Windows Password dialog box should appear, as shown in Figure 3.3. From here, you can change your password to match the password of the account on the Samba server through which you intend to log in. If you didn't have a Change Passwords tab in the Passwords Properties window, then after Windows has finished rebooting, it will ask you to log in with a username and a password. Give yourself the same username and password that you have on the Samba server. After confirming your new username and password, or if you already have one, Windows should ask you if you want to have a profile, using the dialog shown in Figure 3.4. Answer Yes, upon which Windows will create a separate profile and password file for you and save a copy of your password in the file. Now when you connect to Samba, Windows will send its password, which will be used to authenticate you for each share. We won't worry about profiles for the moment; we'll cover them in Chapter 6, Users, Security, and Domains. We should point out, however, that there is a small security risk: someone can steal the password file and decrypt the passwords because it's weakly encrypted. Unfortunately, there isn't a solution to this with Windows 95/98. In Windows 2000 (NT 5.0), the password encryption should be replaced with a much better algorithm. The next thing we need to do is make sure we have the TCP/IP networking protocol set up correctly. To do this, double-click on the Network icon in the Control Panel. You should see the network configuration dialog box, as shown in Figure 3.5. Microsoft networking works by binding specific protocols, such as IPX or TCP/IP, to a specific hardware device, such as an Ethernet card or a dialup connection. By routing a protocol through a hardware device, the machine can act as a client or server for a particular type of network. For Samba, we are interested in binding the TCP/IP protocol through a networking device, making the machine a client for Microsoft networks. Thus, when the dialog box appears, you should see at least the Client for Microsoft Networks component installed on the machine, and hopefully a networking device (preferably an Ethernet card) bound to the TCP/IP protocol. If there is only one networking hardware device, you'll see the TCP/IP protocol listed below that device. If it appears similar to Figure 3.5, the protocol is bound to the device. You may also see "File and printer sharing for Microsoft Networks," which is useful. In addition, you might see NetBEUI or Novell Networking, which are standard with Windows installations but undesirable when TCP/IP is running. Remove NetBEUI if you possibly can - it's unnecessary and makes debugging Windows browsing difficult. If you don't have any Novell servers on your network, you can remove Novell (IPX/SPX) as well. If you don't see TCP/IP listed at all, you'll need to install the protocol. If you already have TCP/IP, skip this section, and continue with the section Section 3.1.3, Setting Your Name and Workgroup, later in this chapter. Installing TCP/IP isn't difficult since Microsoft distributes its own version of TCP/IP for free on their installation CD-ROM. You can add the protocol by clicking on the Add button below the component window. Indicate that you wish to add a specific protocol by selecting Protocol and clicking Add... on the following dialog box, which should look similar to Figure 3.6. After that, select the protocol TCP/IP from manufacturer Microsoft, as shown in Figure 3.7, then click OK. After doing so, you will be returned to the network dialog. Click OK there to close the dialog box, upon which Windows will install the necessary components from disk and reboot the machine. If you have more than one networking device (for example, both an Ethernet card and a dialup networking modem), each appropriate hardware device should be "linked" to the TCP/IP protocol with an arrow, as shown in Figure 3.8. Select the TCP/IP protocol linked to the networking device that will be accessing the Samba network. When it is highlighted, click the Properties button. After doing so, the TCP/IP Properties panel for that device is displayed, as shown in Figure 3.9. There are seven tabs near the top of this panel, and you will need to configure four of them: The IP Address tab is shown in Figure 3.9. Press the "Specify an IP address" radio button and enter the client's address and subnet mask in the space provided. You or your network manager should have selected an address for the machine. The values should place the computer on the same subnet as the Samba server. For example, if the server's address is 192.168.236.86, and its network mask 255.255.255.0, you might use address 192.168.236.10 (if it is available) for the Windows 98 computer, along with the same netmask as the server. If you already use DHCP on your network to provide IP addresses to Windows machines, select the "Obtain an IP address automatically" button. Domain Name Service (DNS) is responsible for translating Internet computer names such as hobbes.example.com into machine-readable IP addresses such as 192.168.236.10. There are two ways to accomplish this on a Windows 98 machine: you can specify a server to do the translation for you or you can keep a local list of name/address pairs to refer to. Networks that are connected to the Internet typically use a server, since the hosts files required would otherwise be huge. For an unconnected LAN, the list of possible hosts is small and well-known and might be kept on a Unix machine in the /etc/hosts file. If you are in doubt as to whether a DNS server is being used, or what its address might be, look at the file /etc/resolv.conf on your Unix servers. Any machine using DNS will have this file, which looks like:#resolv.conf domain example.com nameserver 127.0.0.1 nameserver 192.168.236.20 In the example shown, the second nameserverline in the list contains the IP address of another machine on the local network: 192.168.236.20. It's a good candidate for a DNS server. We can disqualify the other address because every Unix machine has a localhost address of 127.0.0.1 whether it is connected to a network or not. This address is required for some system tools to operate correctly. You must type the correct IP address of one or more DNS servers (note that you cannot use its Internet name, such as dns.oreilly.com) into the appropriate field in Figure 3.10. Be sure not to use 127.0.0.1 - that will never be the correct DNS server address! Try to select addresses on your own network. Any name servers listed in /etc/resolv.conf should work, but you'll get better performance by using a server nearby. (If you don't find /etc/resolv.conf files on your Unix machines, just disable DNS until you can find the address of at least one DNS server.) Let's assume you only have one DNS server, and its address is 192.168.236.20. Click the Enable DNS radio button, as shown in Figure 3.10, and add the server's address to the top DNS Server Search Order field. Also, provide the name of the Windows 95/98 machine and the Internet domain you're in. You can safely ignore the Domain Suffix Search Order field for anything related to Samba. WINS is the Windows Internet Name Service, its version of a NetBIOS name server. If you've enabled WINS on Samba, you must tell Windows the Samba server's address. If you are using WINS servers that are entirely Windows NT, enter each of them here as well. The dialog box shown after selecting the WINS Configuration tab is shown in Figure 3.11. WARNING: Do not mix a Samba WINS server and a Windows NT server as a primary/backup combination in the WINS dialog. Because the two cannot replicate their databases, this will cause name resolution to perform incorrectly. From here, select Enable WINS Resolution and enter the WINS server's address in the space provided, then press Add. Do not enter anything in the Scope ID field. If you do not have either DNS or WINS, and you don't wish to use broadcast resolution, you'll need to provide a table of IP addresses and hostnames, in the standard Unix /etc/hosts format. On a Windows machine, this goes in \WINDOWS\HOSTS under whichever drive you installed Windows on (typically C:\). A sample host file follows:# 127.0.0.1 localhost 192.168.236.1 escrime.example.com escrime 192.168.236.2 riposte.example.com riposte 192.168.236.3 wizzin.example.com wizzin 192.168.236.4 touche.example.com touche 192.168.236.10 hobbes.example.com hobbes You can copy this file directly from any of your Unix machines' /etc/hosts; the format is identical. However, you should only use hosts files in Windows as a last resort for name resolution. The final tab to look at is Bindings, as shown in Figure 3.12. You should have a check beside Client for Microsoft Networks, indicating that it's using TCP/IP. If you have "File and printer sharing for Microsoft Networks" in the dialog, it should also be checked, as shown in the figure. Finally, press the OK button in the TCP/IP configuration panel, and you'll be taken back to the Network Configuration screen. Then select the Identification tab, which will take you to the dialog box shown in Figure 3.13. Here, for the second time, set your machine's name. This time, instead of your DNS hostname and domain, you're setting your NetBIOS name. However, it is best to make this the same as your hostname. Try not to make a spelling mistake: it can be very confusing to configure a machine if TCP thinks it's fredand SMB thinks its You also set your workgroup name here. In our case, it's SIMPLE, but if you used a different one in Chapter 2, Installing Samba on a Unix System, when creating the Samba configuration file, use that here as well. Try to avoid calling it WORKGROUP or you'll be in the same workgroup as every unconfigured (or ill-configured) machine in the world. Click on the OK button to complete the configuration; you will need to reboot in order for your changes to take effect. Now for the big moment. Your Samba server is running, and you have set up your Windows 95/98 client to communicate with it. After rebooting, log in and double-click the Network Neighborhood icon on the desktop. You should see your Samba server listed as a member of the workgroup, as shown in Figure 3.14. Double-clicking the server name will show the resources that the server is offering to the network, as shown in Figure 3.15 (in this case a printer and the test directory). WARNING: If you are presented with a dialog requesting the password for a user IPC$, then Samba did not accept the password that was sent from the client. In this case, the username and the password that were created on the client side must match the username/password combination on the Samba server. If you are using Windows 98 or Windows NT Service Pack 3 or above, this is probably because the client is sending encrypted passwords instead of plaintext passwords. You can remedy this situation by performing two steps on the Samba server. First, add the following entry to the [global]section of your Samba configuration file: encrypt password=yes. Second, find the smbpasswd program on the samba server (it is located in /usr/local/samba/bin by default) and use it to add an entry to Samba's encrypted password database. For example, to add user steveto Samba's encrypted password database, type smbpasswd -a steve. The first time you enter this password, the program will output an error message indicating that the password database does not exist; it will then create the database, which is typically stored in /usr/local/samba/private/smbpasswd. If you don't see the server listed, start Windows Explorer (not Internet Explorer!) and select Map Network Drive from the Tools menu. This will give you a dialog box into which you can type the name of your server and the share testin the Windows UNC format: \\ server\test, like we did in the first chapter. This should attempt to contact the Samba server and its temporary share. If things still aren't right, go to Chapter 9, Troubleshooting Samba, for troubleshooting assistance. © 1999, O'Reilly & Associates, Inc.
<urn:uuid:11e268b6-a11f-481e-b143-9e05d12d28b3>
{ "date": "2018-09-24T00:07:00", "dump": "CC-MAIN-2018-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159938.71/warc/CC-MAIN-20180923232129-20180924012529-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9102903604507446, "score": 2.8125, "token_count": 3598, "url": "http://casadebender.com/reference/servers/using_samba/ch03_01.html" }
Taken from sciencedaily.com October 1, 2006 — Mechanical and electrical engineers at DaimlerChrysler, General Motors and BMW have jointly developed a hybrid-vehicle technology that shuts the internal combustion engine off when the vehicle stops. Meanwhile, engineers are working to replace the platinum in fuel cells with cheaper materials, which could lead to viable hydrogen cars. AUBURN HILLS, Mich. — The high cost of hybrids has kept many people from going green, and a new Edmonds.com study shows that with the cost of gas — combined with tax credits — it only takes about three years to break even. Now a new breed of hybrid is going to lessen that time even more. It’s the brainchild of not one car company but DaimlerChrysler, General Motors and BMW! They are all working together to create the car of tomorrow. As gas prices go up, the pressure is on to create cars that use less. “The hybrid system that we’re developing, we can apply to any vehicle that we have,” Glenn Denomme, a chief engineer of Hybrid Powertrain Programs at DaimlerChrysler in Auburn Hills, Michigan, tells DBIS. It allows for increased performance compared to a conventional SUV and improves fuel economy by up to 25 percent. Denomme says, “You can still haul your cargo, but you can still be environmentally sound too.” Today’s hybrid works best in stop-and-go traffic — tomorrow’s hybrid will give you better fuel economy, not only in the city, but on the highway. When the new hybrid is stopped, the advanced system shuts the internal combustion engine off, conserving fuel. When the car starts to move, electric power is used to conserve fuel, adding power from the engine as needed. Speeding up even more, power from both the engine and electric motors are routed to the wheels for greater acceleration. The new technology doesn’t stop there! A fuel cell car is 100-percent electric. “It takes hydrogen and oxygen, combines it to form water, and at the same time produces electricity,” says Doanh Tran, an advanced vehicle engineer with DaimlerChrysler’s Fuel Cell Vehicles & Technologies. Hydrogen can be produced from just about anything that has a hydrogen molecule, and the car has no emission out of the tailpipe except water vapor. Right now, platinum is used for the fuel cell’s parts and is expensive, but materials engineers are working to find new metals. And as for mileage, it gets 56 miles per gallon, so a little can go a long way. The fuel cell car won’t be for sale until around 2012. The new DaimlerChrysler hybrid will hit the market in 2008. It will cost more than a conventional car, but the price hasn’t been set yet. BACKGROUND: The German-American consortium of BMW, DaimlerChrysler and General Motors are developing a new type of two-mode hybrid system for a wide range of cars, trucks and SUVs, starting with the 2008 Chevrolet Tahoe available in fall 2007. Current hybrids perform well in stop-and-go city driving, but don’t get as good mileage on the highway. The new hybrid version will get 25 percent better mileage in combined city and highway driving. ADVANTAGES: Current hybrid engine systems have a single mode of operation, using a single gear set to split the engine’s power into two systems — routing it to drive the wheels or charge the battery — for both city and highway driving. Like other hybrids, the two-mode combines the power of a gasoline engine with that of electric motors, capturing energy from braking that would otherwise be lost and shutting off the engine at a stop. The battery alone can power the vehicle at low speeds. The new technology can operate much more efficiently at highway speeds with a greater boost from the electric motors, shutting down half the cylinders when not needed, thereby improving gas mileage. The components of the new two-mode system are also lighter and more compact, making them especially useful for reducing overall fuel consumption. BATTERY BASICS: Whenever one type of matter converts into another, as in a chemical reaction, one form of energy also changes into another. A battery has two ends, called terminals, one with a negative charge, and one with a positive charge. Electrons congregate on the negative terminal. Connect a wire between the two terminals, and the electrons will flow from the negative to the positive end as quickly as they can. Connecting the battery starts the flow of electrons, jumpstarting a series of chemical reactions inside the battery to create even more electrons. HOW FUEL CELLS WORK: Just like batteries, a fuel cell is a device that uses chemical reactions to convert hydrogen and oxygen into water, producing electricity in the process. A battery eventually goes dead when all the chemicals are used up, but in a fuel cell, there is a constant flow of chemicals into the cell. The voltage produced by fuel cells can be used to power lights, electrical appliances, and laptops, as well as cars and trucks. Fuel cells are light, more efficient than internal combustion engines, and don’t produce damaging emissions. They are currently expensive to manufacture, however.
<urn:uuid:ac68bcb4-008f-4133-8de3-1d892355e421>
{ "date": "2017-09-20T02:02:31", "dump": "CC-MAIN-2017-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686117.24/warc/CC-MAIN-20170920014637-20170920034637-00296.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9385761022567749, "score": 3.421875, "token_count": 1114, "url": "https://rizkibeo.wordpress.com/2008/08/15/cars-of-tomorrow-automotive-engineers-team-up-to-improve-energy-saving-technology/" }
Talking Vehicles On The Horizon April 17, 2014 In February, the US Department of Transportation (DOT) announced plans to move forward with vehicle-to-vehicle (V2V) communication technology. V2V technology allows vehicles to communicate wirelessly to alert nearby vehicles of their presence. It is felt by the DOT that this technology will go a long way toward preventing crashes on America’s roads. With V2V technology, cars broadcast their presence, speed, and direction up to ten times a second to other vehicles nearby. If a driver is about to enter an intersection and the vehicle detects another vehicle about to run the red light, the vehicle can warn the driver in time to stop. As envisioned by the DOT, V2V technology, at least in its initial stages, will only provide a warning to drivers that another vehicle is approaching. It won’t provide active controls to stop or steer the vehicle away from a collision. That capability may come later on. The announcement comes on the heels of a study begun in 2012 in Ann Arbor MI in which 3,000 cars, trucks, and buses were outfitted with the technology. That study, along with years of research suggests to the DOT that the technology “has the potential to help drivers avoid or mitigate 70 to 80 percent of vehicle crashes involving unimpaired drivers, and that could help prevent many thousands of deaths and injuries on our roads every year.” The DOT gave assurances that the V2V system won’t collect any data on vehicles or their location. The system will only communicate among vehicles and not to any outside source. There were no details on how soon the V2V system will be implemented. Before that can happen, vehicle manufacturers will all have to agree on standards and procedures for installation in their vehicles.
<urn:uuid:fc2d9b93-f0b3-4e1a-acc4-2731e575cf52>
{ "date": "2018-12-19T05:26:23", "dump": "CC-MAIN-2018-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831334.97/warc/CC-MAIN-20181219045716-20181219071248-00050.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9645493626594543, "score": 2.78125, "token_count": 371, "url": "https://www.lowestpricetrafficschool.com/laws/talking-vehicles-on-the-horizon/" }
For many of us, the name "Einstein" calls to mind two things: genius, and unruly white hair. (Unruly white hair now almost evokes "genius" on its own.) But behind the iconic name and image, of course, are the man himself and his revolutionary work. This year marks an anniversary for both: fifty years ago, on April 18, 1955, Einstein died in Princeton, New Jersey, where he had spent the final two decades of his life. And one hundred years ago, in 1905, the then-twenty-six-year-old Einstein published five papers in the prestigious German science journal Annals of Physics. One of those papers, which explained how light can behave as both a particle and a wave, earned him a Nobel Prize. Two others explained the nature and motion of atoms and molecules. Yet another introduced the world's most famous equation, E=mc2. But it was a fifth paper, describing his theory of relativity, that made him an international celebrity, a synonym for brilliance. His theory—which suggested, among other things, that it was possible for space-traveling twins to age at different rates—captured the imagination of non-scientists in a way his other work hadn't, because it upended our very concepts of space and time. One recent Atlantic article, a review by physicist Alan Lightman of a republication of Einstein's 1905 papers, puts the nature and dramatic scope of Einstein's accomplishments that year into perspective. Lightman points out that in 1905, many scientists were convinced that the world's mysteries had already been solved. Since the seventeenth century, for example, Newton's laws of motion had successfully accounted for everything from "the bouncing of balls to the orbits of planets." And more recently, physicists had published detailed theories on the nature of light and heat. But there were cracks in the façade. Physicists had long believed that time and space were of an absolute nature. Five seconds meant five seconds, no matter who measured it or where. And space was thought to be filled with a colorless substance called ether—a fixed reference against which all measurements could be made and through which light waves traveled. (It was assumed that light, like sound, could only propagate through a medium.) The trouble was, hard as they tried, physicists couldn't find this so-called ether. And the speed of light, which was thought to vary depending on the speed of the object emitting the light, always turned out to measure the same. Einstein's paper on relativity, published in June of 1905, was modestly titled "On the Electrodynamics of Moving Bodies," but it was universe-shattering. He eliminated the untraceable ether (calling it "superfluous"), and said that space and time measurements are not absolute, as previously thought, but depend on who is doing the measuring. Without absolute space and time, Einstein determined there is only one fixed entity: the speed of light. If it doesn't change in experiments, he asked, why don't we assume it never changes? From these postulates Einstein derived his special theory of relativity. (A decade later he published an expanded version—the "general theory of relativity"—which took gravity into account.) Lightman suggests that to a significant extent, it was Einstein's attitude of open-mindedness that enabled him to conceive of such revolutionary ideas. "Einstein regarded all concepts as subject to revision based on experiment," Lightman writes. "There were no sacred cows—everything was open to question. A few pages into his paper he began questioning the meaning of time with the profound innocence of a child." At the time Einstein's groundbreaking work first became known, many laypeople vaguely understood that he had wrought some kind of momentous transformation in the way science made sense of the world, but the specifics of his theories seemed utterly confusing and counterintuitive. The first Atlantic article about Einstein and his ideas appeared in October of 1920, four years after the publication of his general theory of relativity. Called "In Defense of Science," the short, unsigned piece offered a humorous take on how Einstein's strange theories about space and time might apply in the real world. Do Bolsheviki attempt to agitate a peaceful community? Let our velocity be —dv(An), and presto! these uncomfortable characters won't have been born for a century and a half yet; and we may confidently leave their treatment to posterity. Do some of our enthusiastic officials suppress certain of the rights of man? Let us apply the formula Xdp = Y2, and whoof! they find themselves in the seventeenth century, where they may hunt the fearsome witch and wily Quaker to their hearts' content. Does my revered wife's uncle read aloud items from the Daily Transcript? Q = Pz, and lo! it's four o'clock, and the paper hasn't yet arrived. "This is Truth," the anonymous author wrote, referring to Einstein's new theories—but a truth understood only by a "benevolent intellectual aristocracy" who can perform the necessary mental acrobatics to bend the laws of the universe to its will. In tones of mock solemnity, the author proclaimed the significance of this development: And now, little children and reverend theologians, gather about and let us consider the situation. Do you realize what is really meant by Einstein's Idea? Why, bless your orthodox hearts, this is no less than a scientific Doctrine of Free Will! ... mind has assumed its dominion over matter; Man has come into his kingdom. Less than a year later, Alexander McAdie, a meteorology professor at Harvard, published "Relativity and the Absurdities of Alice" (June 1921), which touched on many of Einstein's discoveries, including both special and general relativity. McAdie described ways in which Einstein's work had helped turned fantasy into reality. "Alice in dreamland underwent remarkable transformations," he wrote, "but the physicists are changing substances and analyzing structure of atoms in a way that makes Lewis Carroll's wildest flight of fancy seem humdrum." Today any budding physicist can tell you without cracking a smile that 'a conception of the physical world in its objective four-dimensional scheme would merely be an abridged statement of the correspondence of the subjective time-space experiences in the realm of the various senses, and nothing more.' Remember, it is not the Hatter speaking now, but the average serious-minded young man or woman at college, who has been taking notes of the lectures on Relativity given by the Professor of Mathematical Physics. By the time McAdie wrote his article, Einstein's relativity theory had been put to practical tests by astronomers and had succeeded. For example, general relativity had been able to account for a discrepancy in Mercury's placement in its orbit when closest to the sun. Discoveries like this one were a spectacular blow to pre-existing theories of physics, and helped to make Einstein a household name. Awed by the manner in which Einstein had shattered old scientific assumptions, McAdie compared him favorably with legendary scientists of the past. Of Euclid he wrote, "he has had his day," referring to the fact that general relativity requires a non-Euclidean geometry. As for Newton, "Sir Isaac never had a theory of gravitation," he wrote, "only a law; but Einstein has both theory and law. Moreover, "[Newton's] law of attraction "gets a jolt," McAdie wrote, because Einstein suggested that gravity wasn't an attraction between bodies at all, but, rather, a distortion of space-time in the presence of matter. "May we not say with Alice, 'Curiouser and curiouser!'" wrote McAdie. In June of 1955, two months after Einstein died, The Atlantic published "Albert Einstein: Appraisal of an Intellect," by George Russell Harrison, then dean of the school of science at MIT. "The world has lost a shy and kindly man, sweet-natured and intensely human," wrote Harrison. He explained that Einstein was a man whose best-known work "came about from the long, long thoughts of a youth of twenty-six." By the time he arrived at the Institute for Advanced Study in Princeton in 1933, Harrison suggested, his greatest work was done. He had spent his remaining years trying to find a "unified field theory": one in which the three basic forces—electrical, magnetic, and gravitational—are united and expressed as a single force. He did not succeed. But, Harrison emphasized, he had already done enough. "In my opinion, one must go beyond Galileo and even Archimedes to find Einstein's match, back to the days when the world of speculation was very young indeed." Harrison, a contemporary of Einstein's, described the figure Einstein had cut on the Princeton campus, "in his wrinkled sweater, his long white hair straggling out from under his formless stocking cap." Though he was a brilliant thinker, Harrison recalled, he was "far from what would be called a good speaker." Typical of Einstein is the story of the popular lecture he was finally prevailed upon to give, for it shows his incapability of behavior that was not genuine. He had been asked many times to speak to a certain audience, but had always begged off on the basis that he had nothing to say. Finally, however, the pressure became so great that he was forced to accede. Came the evening of the lecture, and amidst applause Dr. Einstein was led to the front of the stage and introduced. For a few moments, he looked out at the audience, tongue-tied and silent. Finally he could stand it no longer and, smiling sheepishly, said, "I find that I have nothing to say," and returned to his seat. Harrison also described Einstein's "full-fledged gift of humor," which he drew upon whenever laypeople asked for a simple explanation of relativity theory. "When you sit with a nice girl for two hours," he would say, "you think it's only a minute. But when you sit on a hot stove for a minute, you think it's two hours. That's relativity." Laypeople misunderstood Einstein in many ways, Harrison suggested. It was commonly believed, for example, that he was the world's best mathematician. But Einstein's gift was his intuition—his ability to grasp ideas others couldn't. When it came time to put math to those ideas, he often turned to others for help. "Atomic War or Peace" (November 1947) Albert Einstein, the ranking physicist of our century, now commits himself unequivocally on the crisis which involved the atomic bomb, the United Nations, Russia, and ourselves. By Albert Einstein as told to Raymond Swing The day Einstein died, Harrison saw a newspaper headline that read, "His Theory Paved the Way for Atom Bomb." Though technically true (Einstein's equation E=mc2 had shown that small amounts of mass can be converted into a large amount of energy), Harrison thought the article "would have saddened him." Einstein, he pointed out, had been a pacifist who regretted the link between his work and instruments of war. "It would be equally true, and almost as relevant," Harrison wrote, "to say that the submarine Nautilus resulted from the discovery made by Archimedes when he sprang from his bath shouting 'Eureka!'" But Einstein had also been aware, Harrison suggested, that putting his theory into practice was "a normal part of human evolution." He was, after all, a man who well understood the desire to probe deeply and to find oneself where no one had yet been.
<urn:uuid:b18005f5-e373-4ea1-b707-eb62c93d8e49>
{ "date": "2017-02-23T02:51:18", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00280-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.980579674243927, "score": 2.90625, "token_count": 2406, "url": "https://www.theatlantic.com/magazine/archive/2005/04/mind-over-matter/303941/" }
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology | | Probability density function| PDF of the uniform probability distribution using the maximum convention at the transition points. Using maximum convention | Cumulative distribution function| CDF of the uniform probability distribution. |Mode||any value in| The continuous uniform distribution is a generalization of the rectangle function because of the shape of its probability density function. It is parametrised by the smallest and largest values that the uniformly-distributed random variable can take, a and b. The probability density function of the uniform distribution is thus: The values at the two boundaries a and b are usually unimportant because they do not alter the values of the integrals of f(x) dx over any interval, nor of x f(x) dx or the like. Sometimes they are chosen to be zero, and sometimes chosen to be 1/(b − a). The latter is appropriate in the context of estimation by the method of maximum likelihood. In the context of Fourier analysis, one may take the value of f(a) or f(b) to be 1/(2(b − a)), since then the inverse transform of many integral transforms of this uniform function will yield back the function itself, rather than a function which is equal "almost everywhere", i.e. except at a finite number of points. Also, it is consistent with the sign function which has no such ambiguity. The uniform distribution is normalized: The cumulative distribution function Edit The cumulative distribution function is: The moment-generating function Edit The moment-generating function is from which we may calculate the raw moments m k This distribution can be generalized to more complicated sets than intervals. If S is a Borel set of positive, finite measure, the uniform probability distribution on S can be specified by saying that the pdf is zero outside S and constantly equal to 1/K on S, where K is the Lebesgue measure of S. Standard uniform Edit Restricting and , the resulting distribution is called a standard uniform distribution. One interesting property of the standard uniform distribution is that if U1 is uniformly distributed, then so is 1-U1: - is an exponential distribution if and . Relationship to other functions Edit As long as the same conventions are followed at the transition points, the probability density function may also be expressed in terms of the Heaviside step function: and in terms of the rectangle function There is no ambiguity at the transition point of the sign function. Using the half-maximum convention at the transition points, the uniform distribution may be expressed in terms of the sign function as: The standard uniform distribution is the continuous uniform distribution with the values of a and b set to 0 and 1 respectively, so that the random variable can take values only between 0 and 1. Sampling from a uniform distribution Edit When working with probability, it is often useful to run experiments such as computational simulations. Many programming languages have the ability to generate pseudo-random numbers which are effectively distributed according to the standard uniform distribution. If u is a value sampled from the standard uniform distribution, then the value a + (b − a)u follows the uniform distribution parametrised by a and b, as described above. Other transformations can be used to generate other statistical distributions from the uniform distribution. (see uses below) Order statistcs Edit Let X1, ..., Xn be an i.i.d. sample from the uniform distribution on the interval [0, 1]. Let X(k) (with the subscript k enclosed in parentheses) be the kth order statistic from this sample. Then the probability distribution of X(k) is a Beta distribution with parameters k and n − k + 1. The expected value is This fact is relevant to Q-Q plots. Uses of the uniform distribution Edit In statistics, when a p-value is used as a test statistic for a simple null hypothesis, and the distribution of the test statistic is continuous, then the test statistic is uniformly distributed between 0 and 1 if the null hypothesis is true. Although the uniform distribution is not commonly found in nature, it is particularly useful for sampling from arbitrary distributions. A general method is the inverse transform sampling method, which uses the cumulative distribution function (CDF) of the target random variable. This method is very useful in theoretical work. Since simulations using this method require inverting the CDF of the target variable, alternative methods have been devised for the cases where the CDF is not known in closed form. One such method is rejection sampling. The normal distribution is an important example where the inverse transform method is not efficient. However, there is an exact method, the Box-Muller transformation, which uses the inverse transform to convert two independent uniform random variables into two independent normally distributed random variables.de:Stetige Gleichverteilungnl:Uniforme verdelingfi:Tasajakauma |This page uses Creative Commons Licensed content from Wikipedia (view authors).|
<urn:uuid:6c4e8e0a-6ef9-406c-bcca-9b45fd298a47>
{ "date": "2015-07-04T03:32:18", "dump": "CC-MAIN-2015-27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096301.47/warc/CC-MAIN-20150627031816-00176-ip-10-179-60-89.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8637024164199829, "score": 2.8125, "token_count": 1049, "url": "http://psychology.wikia.com/wiki/Uniform_distribution_(continuous)?oldid=3836" }
A capacitor is basically an electrical spring. It stores an electrical charge when the voltage increases, and it releases that electrical charge when the voltage starts to drop. Capacitors are used smooth out the output of DC power supplies. When a capacitor is connected in an AC circuit it alternately charges and discharges with the AC current. This has the effect of causing voltage to peak after the current peaks. Note that this is exactly the opposite of inductive reactance which causes current to peak after the voltage peaks. Adding a capacitor in series with an inductive load offsets the inductive reactance so that the voltage and current peak together. Capacitors are used with PSC motors to improve their efficiency by offsetting the inductive reactance of the motor windings. This is why PSC motors became the standard motor for compressors and fans. Several years ago I had a furnace with a shaded pole indoor blower motor. When it died, I decided to replace it with a similar size PSC motor. The replacement PSC blower motor was slightly larger in horsepower than the original shaded pole motor, but drew only half as many amps while operating. Of course today PSC motors are being replaced with brushless DC, or ECM motors for efficiency savings that are equally dramatic. You can do a demonstration of the effects of inductive and capacitive reactance by wiring a 60 watt light, a 120 volt 10 watt unit bearing shaded pole motor, and a 10 MFD run capacitor in series to a 120 volt power source. Wire a switch in parallel to the shaded pole motor and another switch in parallel with the capacitor. The switches will allow you to take the motor or capacitor out of the circuit by simply bypassing them. Ideally, you want to use an oscilloscope to show the source voltage and the voltage across the light. The light will remain in phase with the circuit current since the light is a resistive load. The phase relationship between the source voltage and the voltage across the light will show the relationship between voltage and current. Operating the switches will show the effects of inductive reactance, capacitive reactance, and the combination of the two. Even without an oscilloscope you can show that the voltage across the three devices adds up to more than the applied voltage. This shows why run capacitors must be rated for a higher voltage than the voltage to the unit.I did a powerpoint presentation for the National HVACR Educators & Trainers Workshop this past March that includes an interactive virtual lab to show inductive and capacitive reactance. You can download the presentation at the HVAC Excellence web site. It is listed in the free downloads as "Practical Labs." Students can click on the switches to control them and see the results. For more ideas on teaching alternating current fundamentals check out Unit 29 Electrical Power and Circuits in Fundamentals of HVAC/R.
<urn:uuid:66414bfe-043a-45c6-baf0-15a51485832a>
{ "date": "2017-09-22T11:42:49", "dump": "CC-MAIN-2017-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688940.72/warc/CC-MAIN-20170922112142-20170922132142-00256.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9278837442398071, "score": 3.75, "token_count": 591, "url": "http://hvacrfundamentals.blogspot.com/2010/05/teaching-capacitive-reactance.html" }
London: Regular use of ibuprofen may help reduce risk of bladder cancer, especially in those with certain genetic marker, a new study has found. In a 2012 collaborative project with the National Cancer Institute, Margaret Karagas, PhD, co-director, Cancer Epidemiology and Chemoprevention program at Norris Cotton Cancer Center, and Professor of Community and Family Medicine at the Geisel School of Medicine at Dartmouth, and Richard Waddell, D.Sc, Research Assistant Professor of Medicine at the Geisel School of Medicine, looked for connections between ibuprofen use and bladder cancer. Karagas did an earlier study on the relationship between bladder cancer and non-steroidal anti-inflammatory drugs (NSAIDs) usage in New Hampshire. The new study included patients in Vermont and Maine. Researchers enrolled 1,171 participants newly diagnosed with bladder cancer and 1,418 participants who did not have bladder cancer. Karagas also added a genetic component looking at thirty-nine genes related to NSAID metabolism and studied a new class of NSAIDs known as selective cyclooxygenase (COX-2) inhibitors, such as celecoxib (Celebrex). The findings in the recent study suggested that “regular use of no aspirin no selective NSAIDs, particularly ibuprofen, may reduce bladder cancer risk, especially among regular users for 10 years or more.” However, the study also noted that observed reduction in risk was specific to individuals carrying a specific allele (or variant of a gene) related to NSAID metabolism. For Karagas one of the novel findings was a trend of an increased risk of bladder cancer for those using selective COX-2 inhibitors, especially celocoxib (Celebrex). But Karagas warns against leaping to any conclusions, noting, “further investigation is needed.” Karagas also stresses that this study “does not make any recommendations. It does not, in any way, suggest that patients begin taking ibuprofen as a prophylactic measure against bladder cancer, nor should patients go off any medicine prescribed by their doctor.” Their results were published in the International Journal of Cancer (June 2012).
<urn:uuid:ee59f6cb-bb52-4e43-a9e3-0b2e3935ea73>
{ "date": "2018-09-26T02:05:30", "dump": "CC-MAIN-2018-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162809.73/warc/CC-MAIN-20180926002255-20180926022655-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9439693689346313, "score": 2.578125, "token_count": 457, "url": "http://zeenews.india.com/news/health/diseases-and-conditions/regular-ibuprofen-use-cuts-bladder-cancer-risk_19552.html" }
Tips For Growing Salvia Salvia (commonly referred to as ‘Sage’) represent a huge family of ornamental plants that attract a variety of pollinators to their nectar rich flowers. They are resistant to deer and rabbits. - Plant in full sun. - Plant native Western Salvia varieties in soil that is low fertility and well-drained. - Plant Old World Salvia in a wide range of soils (loams, sand) including clay. - Many spring-flowering varieties of sage will re-bloom in fall if deadheaded after the first bloom. - New transplants need regular irrigation their first growing season to establish themselves. Once established they will need regular, deep irrigation during hot, dry weather. - During fall garden clean-up, wait to cut back the plants until spring for improved cold hardiness. - In colder USDA zones (zone 6 and below) it is essential to give Native Southwestern and Southwestern hybrids protection from the extreme cold their first couple winters in the garden. Mound up pine needles or fallen autumn leaves over and around the base of the plant. Western Native Salvia: : It is from the Western US that we find our most beautiful native salvia species. For attracting hummingbirds, there are no finer flowers than the Western native sages. Typically, this group of Salvia prefer ‘lean’ (not very fertile), well drained soils. They will grow in dry clay conditions in arid climates but will rot out in clay soils where there is more than about 15 to 18” of precipitation annually. Western Salvia include: - Salvia greggii - ‘Furman’s Red’, ‘Cold Hardy Pink’ - Salvia hybrids - ‘Maraschino’, ‘Raspberry Delight’, ‘Ultra Violet’ and ‘Burgundy Seduction’. - Salvia pachyphylla and Salvia dorrii is recommended for arid western gardens. - Salvia azurea and Salvia reptans - Early fall bloomers with excellent cold hardiness. To get established in USDA zones 5 & 6, Western Salvia (noted above) must be planted in spring or early summer, not in the fall. Protect your new plants over their first winter or two in your garden. Cover each plant with a generous pile of clean straw or pine needles. This allows the plant's crown (junction of root and branches) to mature and obtain maximum cold hardiness. Old Wolrd Salvia: The Old World Salvia include some of the very best, most durable, longest-lived perennials. These salvia are an excellent choice for gardeners across most of the United States. ‘Old World’ Sages bloom primarily in shades of blue, pink and white. They are well adapted to cold climates and a wide range of soils including clay. The European Salvia are incredibly attractive to honey bees, many of our native bees and bumble bees as well as butterflies. Old World varieties include: - Salvia syslvestris'Lyrical Rose', 'May Night', 'Little Night', 'Caradonna' and 'Marcus'. - Salvia daghestanica - Salvia verticiliata More in-depth guidance for growing Salvia: Planting Nectar Rich Salvia to Attract Pollinators to the Garden, Sage Advice, The Spectacular Salvia and Cold Hardy, Late Summer / Early Fall Blooming Sages.
<urn:uuid:91b9e9b7-6854-40bd-adea-15dbbb5dfb59>
{ "date": "2018-12-11T09:33:29", "dump": "CC-MAIN-2018-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823614.22/warc/CC-MAIN-20181211083052-20181211104552-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8906713724136353, "score": 3.140625, "token_count": 740, "url": "https://www.highcountrygardens.com/plant-finder/hummingbird-plants/salvia-amistad" }
- David Semitekol - Chicago, IL - United States This conversation is closed. Where do you use math in your profession? One of the most difficult challenges that math teachers face today is motivating their students. This becomes more difficult when faced with the all famous question: "What am I going to use this for?" Help me with some real world examples of modern day math. Please let me know your profession and what type of math you use to share with our students. Thank you everyone so much for the contributions! They are great and I wasn't expecting such a turn out. My goal is to gain enough examples and to use them at the start of each lecture. I'm hoping that these examples in the beginning of class will spark the student's interest for the reaming of the lecture and to show that that we really do use math. There is a difference between having to learn something and wanting to learn something. When we have to learn it we just try to get through it. When we want to learn it, this is when we make breakthroughs. Stimulate the interest in students so that they want to learn math and we increase our probability in someone discovering the next breakthrough.
<urn:uuid:e7628a8d-2203-4e51-b875-00ae38661832>
{ "date": "2015-07-31T13:47:20", "dump": "CC-MAIN-2015-32", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988305.14/warc/CC-MAIN-20150728002308-00336-ip-10-236-191-2.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9637266397476196, "score": 2.890625, "token_count": 248, "url": "http://www.ted.com/conversations/9100/where_do_you_use_math_in_your.html?c=409451" }
China is now getting its power from the largest floating solar farm on Earth. Donald Trump's Paris Agreement Announcement And 11 Times It Made No Sense. Teaching_strategies. Natural Hazards• ELI Natural Hazards category. Explicit cookie consent. Earth Under Water in Next 20 Years - Full Documentary. Debating the link between emissions and population. There are those who perceive any effort to limit population growth as "population control. " This is a term that chillingly evokes coercive state intervention to control individual reproductive behavior. Population control programs have rarely been implemented without exacting unacceptable ethical costs. But there's a big difference between coercive state-led population control programs and efforts to slow rapid population growth. Population control programs target the actions of individuals. Efforts to slow the population growth rate, meanwhile, work within existing societal contexts and seek to produce voluntary change. Population size and composition are among the key drivers of climate change. Regions with the heaviest carbon footprints are experiencing slower population growth than other regions. Sub-Saharan Africa's carbon footprint is light. African policy makers do care about the region’s rapid rate of population growth—but climate change is by no means the top reason why. Bhutan most ‘carbon negative’ country in the world – At this week’s Paris Climate Change Conference an underrated and unlikely champion of combating climate change was the little Himalayan nation of Bhutan. Bhutan pledged to reforest its land of which two-thirds is already covered by forests. Bhutan is in fact already considered the world leading ‘carbon negative’ country, as it sucks up three times the CO2 emissions that the 700,000 population produces, turning the country into a carbon sink according to the the Energy and Climate Intelligence Unit’s(ECUI) ‘carbon comparator’ tool. In 2014 Bhutan broke a world record for trees planted in one day – 50,000 – and its commitment to reforestation is set to break new records. However, large portions of the country still lack access to the electricity grid. Uruguay makes dramatic shift to nearly 95% electricity from clean energy. Explicit cookie consent. Renewable energy outstrips coal for first time in UK electricity mix. Renewable energy has for the first time surpassed coal in supplying the UK’s electricity for a whole quarter, according to government statistics released on Thursday. The revelation of the surge in wind, solar and bioenergy to a record 25% comes in a week when the government has been heavily criticised by business leaders and Al Gore for cutting support for clean energy. The high performance of renewable electricity between April and June, the latest period data is available for, was due to both more wind and sun and more turbines and solar panels having been installed, compared to the same period the year before, when renewables contributed 16.4% of electricity. Gas-fired power stations provided the most electricity - 30% - with renewables second. Nuclear power was third with 21.5% and coal - the most polluting fuel - fell back to fourth, with 20.5%. Ageing coal and nuclear plants have been closing in recent years, while renewable energy has been rapidly rolling out. Renewables growth. How much fossil fuel has been used in your lifetime? Solar FREAKIN' Roadways! Damming Tibet: China's destruction of Tibet's rivers, environment and people. The wild yak has gone the way of the bison in 19th-century America. Similar to native American peoples like the Blackfoot Indians, Tibetan nomads have become beggars in their own land, with their culture decimated by the Chinese policy of resettlement. During Fracking Hearing, Nebraskan Challenges Oil And Gas Commission To Drink Wastewater. James Osborn pours a mystery concoction into water at a Nebraska Oil and Gas Conservation Commission meeting in March 2015. Opposition to a proposal to dump out-of-state fracking wastewater in Nebraska went viral over the weekend, after a community group posted a video of a man offering chemical-laden water to a Nebraska Oil and Gas Conservation Commission. The commission was hearing public comment on a Terex Energy Corp. application to inject up to 10,000 gallons per day of wastewater from fracking in Colorado and Wyoming into an old oil well on a ranch in Sioux County, in the northwest corner of Nebraska. Whose renewable future? In January this year, the energy researcher Jeremy Leggett made a bold claim. He told the Guardian newspaper that we should expect a major oil firm to turn its back on fossil fuels soon and shift to renewable energy. ‘One of the oil companies will break ranks,’ he said, ‘and this time it is going to stick.’ Leggett points to the collapsed oil price, the falling costs of renewable-energy generation and potential government action on climate change as key factors that could persuade an oil corporation to jump ship. His comments were excitedly shared online by anti-fossil fuel campaigners. Weak Kariba Dam walls threaten Zambia's energy security - BBC News. Belo Monte, Brazil: The tribes living in the shadow of a megadam. Explicit cookie consent. THE oil price has fallen by more than 40% since June, when it was $115 a barrel. It is now below $70. This comes after nearly five years of stability. Here's a taste of rewards for No - mass fracking. Fellow Scots should be aware that even now Westminster is auctioning off licenses to frack across the Central Belt of Scotland. If you don't think that's any cause for concern, read this. While Better Together ask Scotland not to break the UK apart most people in Scotland are totally unaware that the Westminster government plans to break Scotland apart as they are currently inviting shale oil and gas companies to frack the Central Belt of Scotland. “The oil is not gone”: 14 species still suffering from the Gulf spill. Can Coal Ever Be Clean? Coal provides 40 percent of the world’s electricity. It produces 39 percent of global CO₂ emissions. Scotland to create 'buffer zones' for shale gas and onshore oil extraction. Planning rules governing the extraction of shale gas and onshore oil in Scotland will be made tougher, the Scottish government has said. It believes there should be reinforced protection for communities near sites of new energy sources, including the controversial fracking method. Climate Change Minister Paul Wheelhouse also said he wanted to see buffer zones between sites and settlements. Explicit cookie consent. ROW after giant row of wind turbines marches towards the snowy peaks of the Tian Shan range, harvesting energy from the air. On a blustery July day in Xinjiang in China’s far west, it is hard to stand upright beside the structures, each 90m (nearly 300 feet) high. China is better known as a land of coal and smog, but it is now increasing the generation of electricity from renewable sources faster than any other country, with more than 100 gigawatts a year of installed generating capacity from wind, a third of the world’s total (see chart). In future, wind power will be a vital source of renewable energy. If it can integrate large-scale wind generation into its electricity network, China will be an example for other countries. Norway's 'green battery' hydro plan for Europe. The solution involves blowing out a cavern inside the water tunnel near the turbine where the electricity is to be generated, creating a surge chamber where water at the correct velocity can reach the turbines immediately. Norway is hoping to become the 'green battery of Europe' by using its hydropower plants to provide instant extra electricity when demand is strongest, or when generation from wind and solar power sources in other countries fades. Without building any new dams or power stations, Norwegian engineers believe they could use the existing network to instantly boost European supplies and avoid other countries having to switch on fossil fuel plants to make up shortfalls. World must wake up to China's energy revolution. A fundamental shift is taking place in China's economy - away from heavy industries primarily reliant on coal to more service-orientated, sustainable activities. Massive investments are being made in renewable energies such as solar and wind power. The pace of change in China's energy policy means that the targets it has set for cutting greenhouse gases (GHGs) are likely to be achieved sooner than expected, according to a new study. Unicorn4275.sharedby. Unicorn4275.sharedby.
<urn:uuid:b0231985-b158-4edd-a0ae-5ab10423524b>
{ "date": "2018-11-19T03:18:58", "dump": "CC-MAIN-2018-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745015.71/warc/CC-MAIN-20181119023120-20181119045120-00416.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9406763911247253, "score": 2.765625, "token_count": 1733, "url": "http://www.pearltrees.com/shwilson/energy/id14311979" }
Master skeleton is not a feature in Autodesk Inventor. It’s a design trick and usually called Top-Down Design Concept. It is useful for controlling shapes and dimensions to assemble complicated parts. And simplify modification for entire assembly design. For example is in a complete design of Aseptic Tank. Master skeleton consist of one or more sketches with dimensions or parameters that are linked to each other. Using constrain in drawing sketch for master skeleton is required to determine relation between entities or sketches. Then the sketch becomes master skeleton we use as reference of part drawing. Later, it will be a component of one unit of assembly. Furthermore, another benefit of using master skeleton as design concept is to ease a drafter assembling parts that have been made, because it needs only two constraints which are flush and mate. However, the draftsman should be more careful in making parts from master skeleton reference. Especially in ‘direction’ feature, because it can give wrong result. Now we will make simple assembly from a master skeleton concept. [Practice] Simple Parametric Tank We will create a simple parametric tank as an exercise. This simple tank consists of Top part, Bottom part, Shell and Support. Support can be Bracket or Foot shaped. Follow these steps. 1) Creating master skeleton a. Click “New” on “Get Started” tab and choose “Sheet Metal (mm).ipt”, then click “Create” button on lower section of “Create New File” dialog box. Blank window will be opened and we are ready for creating new part. b. Click “Create 2D sketch” then choose plane where we will locate the sketch. For example, choose “YZ plane” on model browser. c. Choose “Project Geometry” on “Draw” panel in “Sketch” tab. Then choose “Centerline” in “Format” panel. Then choose “Y axis” on model browser. Right click and choose “ok”. Continue same procedure to set horizontal reference, for example Z axis. d. Create sketch like picture below using features in “sketch” tab. Because simple tank consist of some parts, to ease model creation, every part should be created in one sketch. Create those sketches in the same plane. To make sketch that has been a reference before, you can use “Project Geometry” command, as has explained before. To name dimension, we can do it by typing name and dimension’s size that we want when we make it. To end every sketch you’ve created, you can click “Finish Sketch” command in “Exit” panel . After all sketches have made, save this file as “Master Skeleton”. 2) Managing Parameters a. Choose “Parameters” command in Parameter panel on Manage tab. Then parameter dialog box will show up like picture below : On “Model Parameters” section, in “Parameter Name” column, names you’ve created will be shown. Check on “Export Parameter” column. b. Expand “Parameters” panel on “Manage” tab then choose “Export to XML”. Export to XML dialog box will be opened. Save that file with name “Master Skeleton Parameters”. 3) Creating Model from Master Skeleton a. Create new file to start creating new model. Click “new” in Application menu . Choose metric templates, then choose sheet metal (mm).ipt. b. Click “Derive” on “Create” panel in 3D model tab. Then “open” dialog box will be shown. Choose master skeleton that you’ve created before. Click “Open” in “Open” dialog box. Next dialog box will show is “Derive Part” dialog box. Expand “Sketches” and “Parameters” on “Derive Part” dialog box. On “Sketches”, click (+) sign to exclude Shell sketch, Top part sketch & Legs sketch. The symbol will be like picture above. In “Parameters”, all parameters that you have created will be shown. Make all their status to be active. Click “Ok” button on lower area of “Derive Part” dialog box. The window will show Bottom part sketch. c. Click “revolve” on “Create” panel in “3D model” tab. Revolve dialog box will show, then choose sketch available as profile and Y axis as revolve axis. Click “ok” to end revolve command. d. Click “Thicken/Offset” command in “Surface” panel on “3D model” tab, then “Thicken/Offset” dialog box will show. Choose all the surfaces and input 2 mm in the “Distance” with direction as picture. Click “Ok” to end command. Right click on “RevolutioSrf1” and choose “Visibility” to make the surface become invisible. The mode arranged will show like below : Save the file with name “Bottom Part”. Create other parts like Shell, Top part, and Legs in same way by using features available at 3D Model tab. Now we have these files : 4) Assembly Modeling a. Click “New” on Application Option, then choose “Metric” templates and choose “Standard(mm).iam”. After that, click “create” button to create an assembly. b. Choose “Place” on “Component” panel on Assemble tab, then “Place Component” dialog box will open. Choose Master Skeleton for first part that will be assembled, then choose “Open” on lower area of “Place Component” dialog box. c. Expand “Origin” and “Folded Model” master skeleton part in browser like picture below. d. Click “Constraint” on “Relationship” panel in “Assemble” tab, then “Place Component” dialog box will open. Choose “Mate” in “Type” column and “Flush” in “Solution” column. After that, choose origin plane on both Master Skeleton and Assembly model. If you choose “YZ” plane on Master Skeleton, you should also choose “YZ” plane on Assembly model. e. Continue constraint allocation on three planes so that it’s fully constrained. Add another parts that have created with same constraint to Master Skeleton. f. Right click on master skeleton, then choose “BOM Structure” and choose “Reference”. Then make the Master Skeleton become visible too. So it looks like this : 5) Managing Parameters and iLogic Rules in Assembly Model a. Click “Import from XML” in “Manage” panel on “Manage” tab. Open Master Skeleton-Parameters have created. And see that parameters you have made in Master Skeleton will be copied into User Parameter Assembly. b. Show “iLogic” browser by clicking “iLogic Browser” panel in “Manage” tab . Click “Add Rule” on the same panel and tab, and name it Simple Tank Rule. Then “Edit Rule” dialog box will open. c. In Principe, if we’re going to change dimension in Master Skeleton, we can change it directly in Assembly model. Inventor will synchronize parameters between Assembly model and Master Skeleton. So if we change dimension in Assembly model, dimension in Master Skeleton will also change. And we won’t be able to change dimension in Master Skeleton without deleting relationship between parameters that have made in Assembly and Master skeleton. d. On “Model” tab expand Master Skeleton then click on “Model Parameter”. Parameters in Master Skeleton will be shown in right column. Double click on “Parameter” column to open in iLogic editor. Then do same thing on parameter assembly placing it in the same name. Click “Ok” in “Edit Rule” dialog box. 6) Make Form to Modify Model a. Click “Forms” tab in iLogic Browser. Right click on empty space in “Forms” tab and choose “Add Form”. Then Form Editor dialog box will show. b. Click “Form 1” in Label column and enter new name to rename the form. Rename the form with Tank Modification. c. Choose “Renamed” parameter in parameter check box. d. Drag all parameters in “Parameters” tab to “Label” column, and rename it like picture below. Click “OK” button to finish this section. e. Now, if you click “Forms” tab in iLogic Browser you will find “Tank Modification” Button. Click “Tank Modification” button, then Tank Modification dialog box will show, and you can modify the tank by this form. f. Try to change Inside Diameter Tank to 700mm, Shell Height to 400mm and Legs Height to 500, and see the changes. Now, you can control dimensions of parts you filled in Tank Modification form. When you input dimensions, make sure it’s rational numbers, so it will form proportional tank. Alright then, have a nice try!!
<urn:uuid:b044c707-9d3a-4fd2-884a-31e0c868eada>
{ "date": "2019-09-22T18:12:32", "dump": "CC-MAIN-2019-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575627.91/warc/CC-MAIN-20190922180536-20190922202536-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8247041702270508, "score": 3.09375, "token_count": 2124, "url": "https://www.cad-notes.com/master-skeleton/" }
Ben Henry: You’re listening to Consilience, a podcast from The Scientist magazine. This month, we’re bringing you stories about music and the brain. I’m Ben Henry. Our first story is about why we like the music that we like. To help me untangle the research on this topic, I’m talking with Diana Kwon, a staff writer for The Scientist magazine. Diana, thanks for talking with me. Diana Kwon: Thanks for having me. BH: So, you wrote a piece in the March issue of The Scientist called “Musical Tastes: Nature or Nurture.” That story starts in the late nineteen nineties, with a study by two Harvard psychologists, Marcel Zentner and Jerome Kagan, who wanted to know whether four-month old infants preferred consonant musical chords over dissonant ones. DK: From my understanding it’s the first time somebody actually sat down and said: Okay, let’s take some babies and see what type of music they like. BH: What they would do is sit a baby down in front of a speaker. They played each kid two versions of a melody. One version contained consonant chords, a combination of notes that just sound nice together [C major plays]. The other version had slightly different chords that sound a little bit grating [C diminished plays]—dissonant chords. Zentner and Kagan found that these very young children didn’t appear to like the dissonant music: they were fidgety, they wouldn’t look right at the speaker, they would cry. But when the consonant music played, they were much more likely to just sit contentedly and listen. DK: And since then, researchers have done a bunch of other studies on kids who are even younger, and even in animals like chimps and baby chickens, and have found similar things. There’s just been increasing evidence building that maybe there’s some sort of preference at an early age. BH: We think of our musical preferences as being highly personal and subjective. But maybe, some part of it is actually biologically hardwired in us. Diana spoke to Josh McDermott, who studies this idea at MIT. Here’s a piece of that interview. He’s explaining another reason why we might have an ingrained preference for certain intervals, that is, combinations of notes. Josh McDermott: I think it comes down to the fact that the particular intervals that are used in Western music, and arguably in music cross-culturally, are not random. The intervals that are most common, or most important, in Western music are typically defined by ratios between the pitches that are simple integer ratios, or approximately so. So they’re not random, and so that seems to indicate, well, there’s got to be some force that’s responsible for the fact they’re not random. And so one possible force is that there’s an intrinsic aesthetic difference between different musical intervals, so people end up using the ones that are more pleasing. BH: The problem with this argument, that there’s something inherently nice about certain combinations of notes, is that almost all of the studies supporting this idea took place in Western cultures, where we share a musical heritage. From classical music hundreds of years ago to radio hits today, we rely heavily on consonant chords and avoid dissonant ones. So, maybe we’re just biased, and the infants in those studies absorbed just enough Western music to show that bias. To get around that problem, McDermott joined a group of anthropologists and other scientists studying a group of people who don’t listen to Western music—or for that matter, any music other than their own. The Tsimane’ live in a vast, remote swath of the Bolivian Amazon. They’re mostly isolated from surrounding cultures. McDermott and his colleagues wanted to know if they had the same aversion to dissonance that we do. Here’s McDermott again. JM: The first part of the trip that summer, we did a bunch of recording sessions with the Tsimane’ musicians, so that was pretty fun and quite interesting. So we set up a little recording studio as best we could in this one building in this town. A few weeks before we arrived, we arranged for there to be a big announcement broadcast that we were looking for musicians. They just started showing up—some of them had traveled days basically to come hang out and play music. BH: The music the Tsimane’ played for them sounded fabulously unlike anything you would hear on the radio. So McDermott’s team had this unique opportunity to study people whose musical experience was completely different from those of us raised in Europe or North America. Diana can explain the experiments they did. DK: What they would do is—kind of like what the researchers would do back in the nineties—they would play clips of music, and because they were adults they were able to just ask them whether they preferred one piece of music to another. Another important thing they needed to do was figure out whether this group of people could tell the difference between these two different types of tones. BH: McDermott and his colleagues found that the Tsimane’ were perfectly able to tell the difference between consonant and dissonant sounds. But when they were asked to rate those clips of music on a scale according to how much they enjoyed it, they gave consonant and dissonant music the same ratings. Unlike Westerners, the Tsimane’ didn’t have an ingrained distaste for dissonance. But the story is complicated, McDermott says. JM: One cautionary note I would provide is that most people, myself included, would shy away from these black and white distinctions between being innate and learned. A lot of people would say nothing is completely innate . . . and in my mind, there’s a real vacuum in terms of having good experiments in pretty remote cultures. BH: Even if we’re all born with a preference for consonance, the Tsimane are evidence that it can be overruled by culture. If there is something truly universal about musical tastes, we haven’t found it yet. LJ Rich: I never listen to music voluntarily. I hear music everywhere, whether I like it or not. You see, I have this strange mixing of the senses called synesthesia. LJR: When I see, touch, or taste things, I hear sound. And when I hear sound, I hear music—My brain generates music. It’s really useful when I’m doing classical composing. However, it does mean that, in my other, day job as a TV reporter for BBC Click, the technology show, it can get a little overwhelming. I get distracted by reality. BH: At this point, Rich walks over to a keyboard on the stage. LJR: I’m going to let you into a secret, and explain why I’m so distracted. Going around a building, or going around a city, I kind of hear this. These are the cars. The buildings are kind of like this, and the people are kind of like this. BH: There’s something else going on here. LJ Rich is not only a synesthete, she also has absolute pitch, meaning she can identify or play any given musical note by ear, without any sort of reference. Between these two gifts, her whole world is music. LJR: It’s so overwhelming, that the way that I deal with it is by harmonizing with it. I make noises, I sing along, I probably look a little crazy when I do it. But it turns that noise into music. BH: It seems like a total coincidence that Rich has both synesthesia AND perfect pitch—But it’s not. I’m talking with Catherine Offord, who wrote about this in the March issue of The Scientist. Hi Catherine, thanks for talking. Catherine Offord: Thank you very much for having me. BH: You spoke to LJ Rich about what her world is like and also about the neuroscience behind it. Before we even get into that, it’s just so hard for me to even imagine what living inside of her head feels like. CO: Yeah, and it’s something she’s aware of as well. She was telling me that it’s difficult to have conversations with people because you want to use words like delicious, or tasty, to describe sounds. To somebody who doesn’t have synesthesia, that just sounds like you’ve made a bit of a slip-up. BH: Can you just summarize, in general, what synesthesia is? CO: Synesthesia is the linking of different senses when you get one stimulus. So for example, you have a taste, and that’s associated with a sound, or you see a word, and that’s associated with a color. So it’s basically crossing over these different sensory inputs. BH: From your reporting, it sounds like there’s a lot more going on here. What have you learned? CO: So, first of all, I wanted to chat with some people at the Feinstein Institute. They’d been conducting a study a few years ago where they managed to find all these people—hundreds of people—with absolute pitch. And they’d given them a few surveys to find what other kind of experiences they might be having. They discovered that around 20 percent also had synesthesia. BH: Twenty percent—that’s not necessarily true of all people with absolute pitch; this was just one study after all—but it’s still a huge proportion, considering that synesthesia is relatively rare in the general population. CO: That kind of led them to look at this overlap, between absolute pitch and synesthesia. BH: That’s where LJ Rich comes in—she’s part of this overlap. Another team of researchers, led by Psyche Loui of Wesleyan University, used MRI machines to compare the neural activity of people with synesthesia and people with absolute pitch. CO: They were finding, first of all, that the neural activity was kind of unusual in both groups. So both had this heightened neural activity known to be involved in processing music. But in the people with absolute pitch, there was more activity on one side, and in synesthesia, there was more activity on the other side. And so they had this little phrase that they coined in the title of their paper, which was that maybe these things are just two sides of the same coin. BH: On one side of the coin: the ability to perfectly, and consistently identify any musical note, just by hearing it. On the other side: a world of bright sounds and loud shapes. The two seem to have nothing to do with each other. But there’s a theory out there, that all of this has to do with a neurological concept called hyperconnectivity. One of the ways that researchers can quantify what the brain is doing is to track the connections between different parts of the brain. A neurological roadmap keeps all of the separate parts connected to each other. But researchers have noticed, some people have more roads on their maps than others. When one part of their brain is active, it’s more likely to cause some other part of their brain to be active, sometimes parts that would normally be resting. That’s hyperconnectivity. The concept shows up in a lot of different types of research. For example, studies have suggested that hyperconnectivity might explain some cases of depression. They’ve linked it to autism, and even schizophrenia. Those brain scans of people with perfect pitch or synesthesia turned up a similar suggestion. CO: Perhaps, heightened connectivity is partly leading to these extra modes of perception, like absolute pitch, or synesthesia, or extreme creativity, or things like that. BH: It’s still a hypothesis, but maybe studying the brain’s connections could help us understand incredible gifts as well as disease. There’s another application to this field of research. CO: Although this isn’t a disease—it’s not as though absolute pitch or synesthesia can be thought of as a disease model—it is a really great model for the interaction between genes and the environment. Because there is evidence that suggests that things like absolute pitch and synesthesia don’t necessarily come about just because of your genetics. So, it seems there are things early in life or during development that can make it more or less likely that someone will develop synesthesia and absolute pitch. And so they think it’s a really good model to use to study those overlaps. BH: For now, the mind of LJ Rich is mostly a mystery. Before we end the episode, we have one more interesting tidbit about the brain. I heard about this from Bob Grant, a senior editor at The Scientist. Here’s our conversation. So, you were telling me that you were reporting a story about bats, but you had sort of inadvertently uncovered some surprising information about birds. So, what did you learn? BG: Yeah, so I was talking to a guy at Texas A&M named Mike Smotherman who has studied bat song for quite a while, and now he’s transitioned and out of that. So I was kind of just talking with him about research, current research that’s uncovering some similarities between the neural substrates that drive bird song and bat song. There’s a couple different instances where some of the same brain regions give rise to the vocalizations, et cetera, et cetera. What he told me was—and he said it in kind of a matter of fact way: You know how song birds regrow a part of their brain during the spring so that they can sing their mating songs, and then that part dies back, and then regrows again the next spring when they need to sing again? And I was like—wow—I didn’t know that. BH: Out of curiosity, Bob looked into why a bird might lose and then regrow a part of its brain every year. BG: Brains are very energetically expensive things. To run a brain, to maintain a brain, takes a lot of energy. A lot of the energy that human beings for example consume goes to the maintenance and running of our brains. So it makes sense, from an evolutionary perspective in these birds, that when it’s essential that they display this behavior, for the furtherance of their species and their population, that they grow that brain center to produce these songs. It’s interesting in and of itself, but it also was one of the first insight into neurogenesis in vertebrates that made people think—oh, wait a second, this old dogma where you’re born with the neurons you have, especially in the brain, and if you lose ‘em you lose ‘em. That dogma has changed over the past few years, to where people realize that neurogenesis is a real thing that happens in vertebrates and mammals, and humans even. BH: So there you have it. We shut off the heat when we go on vacation, and some birds lose a part of their brain when they don’t need it. That’s it for Consilience this month, the show is written, produced, and edited by me, Ben Henry, with help from Kerry Grens, Bob Grant, and Jef Akst. We’ll be back in April.
<urn:uuid:601806ad-1518-4ccd-b9b4-b2b2c72f3d77>
{ "date": "2017-07-26T13:39:59", "dump": "CC-MAIN-2017-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426161.99/warc/CC-MAIN-20170726122153-20170726142153-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9704186916351318, "score": 2.796875, "token_count": 3334, "url": "http://www.the-scientist.com/?articles.view/articleNo/48878/title/Consilience--Episode-2--In-Tune/" }
It's difficult to imagine an aspect of day-to-day existence in 2016 that hasn't been touched or even transformed by innovation. It's even more challenging to envision a future in which innovative technology won't play a central role in every event, every career, and every life. This is why it's essential that our nation's entire educational structure enhances long-term planning related to innovation, while quickly and consistently upgrading the advanced tools our students utilize. The new economy requires a previously unimagined level of high-tech knowhow, and our schools are responsible for cultivating it. The process must begin in pre-school and continue up through high-school graduation. It's a high-definition network that enables students in a New Jersey classroom to interact directly with peers in Finland, China, or other distant places. As we build learning communities, we'll need to deemphasize the products we use in favor of an increased focus on how they're integrated into educational experiences. Leading education strategist Steven Hodas often speaks of innovation needing to transform from a noun to a verb. Simply put, when innovation moves from a thing to an action, it evolves from training to learning -- and enhanced teacher growth and student performance are the key outcomes. At the recent Tri-State Innovation Summit at Ramapo College -- sponsored by the Bergen County Association of School Administrators (BCASA) and EdSurge -- my call-to-action was to begin to develop a common language that ensures innovation-readiness. From English to science, to mathematics, social studies, music, art, and every other educational experience in which students participate, we need to be prepared to initiate positive change. Have we created an educational ecosystem that allows innovation to evolve and grow? Our need for education-based innovative enhancements doesn't conclude with students; we must also ensure that our faculty, staff, administration, boards of education, and communities at large all have access to the most advanced, innovative, and creative thinking available. Our nation's school districts work diligently to maximize innovation in each and every one of their classrooms. One of their most-effective tactics is direct, face-to-face connection with recognized innovative technology experts. Developing this critical common language around our ecosystems will be our next steps in this process. How do we develop robust lab sites? How do we speak about procurement? How do we know that what we did worked, so that our staff members are empowered to collect and utilize data? To begin our evolution as districts, we as educators will need to have essential, in-person conversations, not just with sales representatives, but with the developers as they begin their process to scale. At the Innovation Summit, representatives from every Bergen County school district, plus hundreds of others from New Jersey, New York, Connecticut, and around the country, gathered to focus on and learn about how we lean into innovation integration. The summit focused on creating an environment for thought-leaders to engage with developers who are actively planning and designing the next phases of classroom innovation. I believe that it is essential that we as thought leaders have this opportunity, and the Innovation Summit was the ideal venue. It provided for some extremely meaningful dialogue, both among individual educators and, most importantly, between educators and developers. It's vital that developers get feedback, both positive and critical, from professionals who know how children learn. The summit gave attendees a chance to say, "That's an absolutely terrific idea," or "That just will not work with your target group.” And, most significantly, it allowed us to begin the process of developing a common language as thought leaders throughout our school districts. Therein lies the benefit of such a dialogue. One emphasis of the summit was that this conversation can result in creating an effective learning tool that does not rely on legacy providers, but on the very people using the innovation. The structure of our current system often inhibits our best new ideas -- technological or otherwise -- directing them toward a single silo, without any benefit to students. Such situations are undoubtedly a waste of creativity and institutional credibility and also a lost opportunity to evolve into something better. With innovation technology in particular, the sharing of positive developments on a broad scale not only benefits an increased number of individuals, but also enables districts to identify wiser, more effective strategies related to a successful implementation. For us to succeed at integrating the latest, most potent technology enhancements into our schools, it's essential that we develop the habit of thinking far beyond just "my school" or "my district." Instead, we need to cultivate a perspective that views this nation's young people as a single group of essential individuals who aren't segmented by income level, ethnic or racial background, or geography. The Tri-State Innovation Summit ignited that conversation. For hundreds of education leaders throughout our region and beyond, this was an absolute game-changer, in terms of how they both employ and think about innovation. In turn, this will help them make significant improvements to their home districts and, by extension, to the educational experiences of the children we serve.
<urn:uuid:33fb9cca-8973-4e2e-a9f6-9e402f5f2451>
{ "date": "2019-05-21T19:19:23", "dump": "CC-MAIN-2019-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256546.11/warc/CC-MAIN-20190521182616-20190521204616-00256.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9600484371185303, "score": 2.609375, "token_count": 1030, "url": "https://www.njspotlight.com/stories/16/03/13/op-ed-integrating-innovation-into-today-s-educational-experiences/" }
Understanding a Metal Detector~ Minelab Metal Detector Technology If a detectorist doesn't understand how their detector fully works, potentially they could be missing gold nuggets. Metal detectors work on the principle of conductivity. All metal objects, whether ferrous or non-ferrous are conductive. That is, heat and electricity can flow through them. A metal detector creates an Electro-Magnetic Field which penetrates into the ground. When this field comes across a conductive metal object, the search coil senses a charge in the field, and thus, detects the objects buried below. A signal is then sent to the control box, which drives a loudspeaker, meter or headphones and emits a noise, alerting the operator of a potential object. Metal detectors react to the surfaced area of an object, not its mass. The larger the surface area, the deeper you will be able to detect an object. For example, a coin lying flat will be detected at a greater depth than the same coin standing on it's edge. In addition to metals, a detector may react to iron ores, magnetic non-conductive minerals and beach salts. These non-metallic substances are known as mineralized ground and cause a detector to produce a false signal or ground noise. To eliminate this ground noise, the detector has a ground balance function to compensate for the levels substances in the ground being searched. What is Automatic Ground Tracking (AGT)? AGT refers to the ability of the detector to track the changes in ground mineralization and automatically adjust the ground balance to suit. This ensures perfect ground balance and full detection depth and eliminates the need for the operator to stop and manually adjust the detector as the ground conditions change. The Minelab SD2100 does not have auto ground tracking. What is Very Low Frequency (VLF) Technology? Conventional VLF detectors transmit a continuous magnetic field into the ground on one set frequency. This VLF technology as the name implies, operates at low frequencies. The conventional range is from 3 kHz to 50 kHz. Minelab now produces detectors which operate at slightly higher than 50 kHz and lower than 3 kHz frequencies to gain greater depth and sensitivity. Some models operate in a number of frequencies which allows you to choose the most effective range for the particular type of detecting. The Minelab GT15000, 16000, American Gold Striker, XT17000, XT18000 & latest Eureka Gold all use this VLF technology. What is Broad Band Spectrum (BBS) Technology? Unlike other metal detectors which operate on one or two frequencies, BBS technology transmits multiple separate frequencies over a range of 1.5 kHz to 25.5 kHz. All multiple frequencies are transmitted at the same time, spread over a wide spectrum. BBS technology means you have more depth, greater and more accurate discrimination. The Minelab Sovereign series & Excalibur use this technology. What is Full Band Spectrum (FBS)? FBS technology is a further development of Minelab's BBS Multi Frequency Technology. This Technology is unique to Minelab, providing greater depth and improved target identification in most soil conditions. FBS refers to the use of 28 frequencies operating simultaneously over a range from 1.5kHz to 100kHz. FBS Technology means that a wider range of targets can be located at greater depths. The Minelab Explorer II & the latest Minelab Quattro use this technology. What is Multi-Period Sensing (MPS) Technology? It transmits a stream of alternating short and long pulses of magnetic field into the ground. These pulses cause metal objects in the ground to produce a changed magnetic field of their own. MPS technology is able to locate metal targets up to four times the depth of conventional detectors. MPS also means that very small targets may be found in the most difficult ground and you will dig less ground signals. The Minelab SD2100, SD2100v2, SD2200d, SD2200v2 & the GP Extreme detectors all use this type of technology. What is Dual Voltage Technology (DVT)? DVT refers to changes in the voltage used to create the electro-magnetic field transmitted from the coil into the ground. By using two different voltages (DVT) the possibilities of magnetic saturation of the ground is lessened. Thus, detectors using DVT have an increased ability to balance out ground mineralization providing increased depth and greater sensitivity compared with other detectors. The latest Minelab GP3000 Metal Detector uses this technology. What to see more on the Minelab GP3000? "Click Here!" What are Operating Frequencies? Frequencies in a metal detector are referred to in kHz (kilo hertz) which is the number of times a signal is transmitted into the ground as received back per second. The lower the detector's frequency, the deeper it will penetrate. However, its sensitivity to smaller targets may be reduced. On the other hand, the higher the detector's frequency, the higher its sensitivity to even the smallest targets, but it may not penetrate as deeply. Generally, gold detectors operate at a higher frequency for locating small gold nuggets. Coin, relic and treasure hunting detectors operate at lower frequencies for greater depth penetration. Courtesy of Minelab World Adventurer 1999 edition & Product Catalog. Notice:The Webmaster is more than willing to help anyone learn more about the various Minelab Metal Detectors. You can contact him by Email or phone 623-362-1459. | Back to Main Site | Back to Article Page |
<urn:uuid:deca15f1-7d7b-458d-9ae3-e6abc86afeaa>
{ "date": "2015-04-25T23:18:15", "dump": "CC-MAIN-2015-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246651873.94/warc/CC-MAIN-20150417045731-00148-ip-10-235-10-82.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9077160358428955, "score": 3.421875, "token_count": 1159, "url": "http://www.nuggethunting.com/detector_technology.htm" }
7 Steps to Managing Bats in Buildings 1) Know the Bat Basics - Bats are an ecologically & economically valuable group of species and are protected from harm by the BC Wildlife Act. - Bats can only be evicted in the appropriate season in a safe and sensitive manner. 2) Assess the situation - Where are bats roosting? The figure at right shows all the places bats could enter into or use in a house. - Is this a night roost? Night roosts are places that bats use temporarily during the night to rest between feeding bouts and include covered patios, door ways, and carports. Bats are rarely seen but droppings are observed in the morning. - Is bat eviction necessary? There’s no reason to evict them if there is little chance for contact with people. 3) Protect human living space - Prevent guano and bats entering inside the human living quarters by sealing spaces in floor joists and other entry points between roost and human living spaces. 4) Identify entry and exit points - Look for telltale signs of bat entry. These could include brown stains on walls where they squeeze in or accumulated guano below the entry point. 5) Install a bat house prior to eviction - Providing alternate roosting habitat increases the chances of successful and safe eviction of bats. - Install bat houses as high as possible (at least 3 1/2m (12’) high), on south facing exposures to receive at least 6 to 10 hours of sun. Bat houses should be installed in an uncluttered location without branches, buildings, or poles in front or below it. - Use only large, multi-chambered designs like a four-chamber nursery box or a two-chamber rocket box. - Designs can be found at www.bcbats.ca. 6) Evict bats using one-way exit device at appropriate time of year - Use a one-way exit device (such as a bat cone) to avoid trapping bats inside the building. This will allow bats to exit but not re-enter. - Evictions and exclusions are not permitted during the maternity season from May 1 to September 1. Ideally, evictions should take place in fall (September or October). - Check for presence of bats prior to doing an eviction. 7) Seal roost to exclude bats from building - Clean out guano and remove soiled insulation. - All entry and exit points have to be sealed completely as bats can enter through 12mm (1/2”) holes and cracks.
<urn:uuid:c0bca5f0-f23e-46da-bee8-0f3d5badc0dd>
{ "date": "2019-03-20T15:15:28", "dump": "CC-MAIN-2019-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202433.77/warc/CC-MAIN-20190320150106-20190320172106-00176.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9253773093223572, "score": 3.09375, "token_count": 596, "url": "https://westsidepestcontrol.com/white-rock-pest-control-service/bat-eviction/" }
Hurricane Harvey was the first major storm to hit the Gulf Coast after the region experienced a renaissance in energy and petrochemical production. It was the first hurricane that had a truly global impact, resulting in a series of chemical plant shutdowns that disrupted supply chains both in the US and around the world. On the first anniversary of Harvey, ICIS explores the effects of the storm and why future storms will disrupt not just petrochemical markets on the Gulf Coast, but throughout the world. Get a better understanding of the past and possible future effects. Download your insight and map here. Complete your details to access the content.
<urn:uuid:3682e436-5eed-49f4-8cf3-a0822e0ae5cc>
{ "date": "2018-09-24T22:03:27", "dump": "CC-MAIN-2018-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9379206895828247, "score": 2.859375, "token_count": 129, "url": "https://www.icis.com/contact/in-harveys-wake/" }
Posted by Big Gav in biomimicry FastCompany has a post on a (not all that inspiring) example of biomimicry that reminded me of the floating surveillance platform's in William Gibson's recent book "Zero History" - It's a Bird! It's a Plane! It's ... a New Seagull-Like Robot Spy Drone!. A new robotic flying drone, styled like a seagull, has arrived on the scene. It doesn't squawk, poop or steal french fries from your hand, but it's an example of incredible bio-mimicking design that could be the future of airborne robots. We've met a Festo robot before--a robotic manipulator/gripper arm with a design that's heavily inspired by elephant trunk muscles--and so we know about the company's penchant for using bio-inspired thinking in its robot engineering. Festo actually has a whole suite of innovations under its Bionic Learning Network umbrella, but the Smart Bird is the most eye-popping among them. In fact the robot is so astonishingly convincing in flight it really could pass for a genuine seagull from a distance--a feat of biomimicry that Festo is clearly proud of. The company notes: "Festo has succeeded in deciphering the flight of birds." If true, that solves a riddle as old as time. The robot isn't stuffed with helium, instead it relies on ultra-light materials like carbon-fiber and sensitive control electronics to give it a total mass of around 0.4 kilograms (33% less than an iPad 2). The design secret behind its seemingly effortless flight is the fact its wings don't simply beat up and down like many other ornithopter designs (the technical term for flying drones like this) but they also twist at "specific angles" much like a real gull's wing will do--positioning the wing tips at the best angle for generating lift and spilling less waste air. An "active articulated torsional drive" is at the heart of it, aided by clever wing joints, accurate sensors for calculating the wing's position in real time, and a low-weight motor that eats up just 25 watts. The bird even communicates its flight data back to the remote operator in real time, letting them adjust fine parameters like wing torsion in real time to achieve optimum flight.
<urn:uuid:69a60f33-39f3-4971-a77c-62a38474cd20>
{ "date": "2017-01-22T01:47:45", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00064-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9405937194824219, "score": 2.71875, "token_count": 488, "url": "http://peakenergy.blogspot.com/2011/04/festo-new-seagull-like-robot-spy-drone.html" }
Tepehuán refers to two closely related languages which are spoken in northern Mexico by about 25,500 people. They belong to the Piman branch of the Uto-Aztecan language family. The two languages are known as Northern Tepehuán and Southern Tepehuán. The former is spoken in the Mexican state of Chihuahua by about 8,000 people. The later is divided into southeastern and southwestern groups. The southeastern group is spoken in Mezquital Municipio in the state of Durango by about 9,937 people. The southwestern group is spoken by about 8,187 people in the southwest of Durango state. There are some broadcasts in Tepehuán on radio stations in Chihuahua. Information about Tepehuán
<urn:uuid:0d06c2f7-4b93-4792-a7ed-4ef1ccf46cad>
{ "date": "2015-07-03T15:38:09", "dump": "CC-MAIN-2015-27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096156.35/warc/CC-MAIN-20150627031816-00036-ip-10-179-60-89.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8695987462997437, "score": 2.734375, "token_count": 161, "url": "http://omniglot.com/writing/tepehuan.htm" }
Freedom House has released the subcategory scores from Freedom in the World for the past ten years, as well as the aggregate scores from the previous 12 editions of the report. Freedom in the World is an annual comparative assessment of political rights and civil liberties that this year covers 195 countries and 15 related and disputed territories. Since the report began in 1972, each country and territory has been assigned two numerical ratings—one for political rights and one for civil liberties—based on a 1 to 7 scale. Underlying those ratings are more detailed assessments of country situations based on a 40-point scale for political rights and a 60-point scale for civil liberties. Freedom House now releases these aggregate scores for political rights and civil liberties for each country in order to provide more nuanced information about country trends beyond the 7-point rating scales used previously. In addition, in order to generate debate and discussions within countries as to areas that are most in need of reform, Freedom House releases the scores for the seven subcategories that fall under political rights and civil liberties. These subcategories, drawn from the Universal Declaration of Human Rights, represent the fundamental components of freedom, which include an individual's ability to: - Vote freely in legitimate elections; - Participate freely in the political process; - Have representatives that are accountable to them; - Exercise freedoms of expression and belief; - Be able to freely assemble and associate; - Have access to an established and equitable system of rule of law; - Enjoy social and economic freedoms, including equal access to economic opportunities and the right to hold private property. We trust that this information will provide greater transparency and a better understanding of how Freedom House measures political rights and civil liberties. For a more detailed description of the Freedom in the World methodology, please click here.
<urn:uuid:cd2988e4-6c0b-4656-98b3-32d068640425>
{ "date": "2015-09-02T14:48:35", "dump": "CC-MAIN-2015-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645265792.74/warc/CC-MAIN-20150827031425-00111-ip-10-171-96-226.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9362533092498779, "score": 2.53125, "token_count": 367, "url": "https://freedomhouse.org/report/freedom-world-aggregate-and-subcategory-scores" }
Hoover, George W. (1915–1998) George Hoover was an early advocate of American satellite launches and instigator of Project Orbiter. Hoover entered the Navy in 1944 and became a pilot before moving to the Office of Naval Research to conduct a program in all-weather flight instrumentation. Later he helped develop the idea of high-altitude balloons for use in a variety of projects. These included Skyhook which supported cosmic-ray research and served as a research vehicle for obtaining environmental data relevant to supersonic flight. In 1954 Hoover was project officer in the field of high-speed, high-altitude flight, with involvement in the Douglas D558 project leading to the X-15. He was also instrumental in establishing Project Orbiter with von Braun and others, resulting in the launch of Explorer 1, the first American satellite. Related category AEROSPACE ADMINISTRATORS Home • About • Copyright © The Worlds of David Darling • Encyclopedia of Alternative Energy • Contact
<urn:uuid:1adc1361-adda-435b-b1c2-2c73f7b3decd>
{ "date": "2016-09-28T23:56:42", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661768.23/warc/CC-MAIN-20160924173741-00282-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9323818683624268, "score": 2.765625, "token_count": 204, "url": "http://www.daviddarling.info/encyclopedia/H/Hoover.html" }
Happy and Passive Means More Productive Animals WEST LAFAYETTE, Ind. — Breaking up families can be sad, but in a new method for selecting passive livestock animals, that’s a main ingredient for better long-term productivity, according to a Purdue University geneticist. The new breeding program, designed to get the best out of the animals, is the first major advance in classical breeding in 20 years, said William Muir of the Purdue Department of Animal Sciences. By picking less aggressive individual animals from a broad range of families, the same breeding program can be used for hundreds of generations. The new program enables breeders to have optimal improvement in productivity while minimizing the health risks associated with inbreeding, he said. At the same time, the program overcomes competition among animals for resources that often means less aggressive animals suffer from lack of nutrition and increased injury. In a group composed of both aggressive and passive animals, even those at the top of the pecking order are harmed from overeating, which wastes food because their bodies can’t properly utilize the nutrition. “Genes not only control your own behavior but also impact others,” Muir said. “For instance, if my genes make me more competitive and aggressive, it almost always comes at the expense of someone else. If a pig or chicken rises to the top of the ladder by stepping on the shoulders, or heads, of others, then a breeding program doesn’t make progress.” Muir, who previously researched and advocated a group-selection theory to obtain a kinder, gentler bird, refines this breeding approach in a study published in the current issue of the journal Genetics. In Muir’s new plan, individuals are chosen for their passiveness based on equations that identify whether an animal is so aggressive that it will negatively affect its penmates’ health and productivity. In the original group-selection program, families of animals that produced less aggressive animals were kept together. The unfortunate side effect is that such inbreeding can have dangerous genetic consequences, meaning the program could only be used for only a few generations. Muir’s new breeding plan avoids the problems of inbreeding. Because animal well-being is an important factor in livestock breeding and because animals need to be housed in groups, not only can selecting for less aggressive animals increase productivity of individual animals, but also that of the group as a whole, Muir said. Muir calls this the associative effects of genetics. “It’s important in a group setting that the animals’ genes not have a negative effect on others,” Muir said. “If one pig is aggressive, his genes are negatively impacting 16 pigs. So, if we select pigs or other animals that get along together, then we can have animals that grow well.” In groups with aggressive animals that overeat, productivity of all the animals tends to decrease because the animals that eat more than required use the food less efficiently, meaning they waste food and energy. “In terms of energy, you can waste energy by maintaining a pecking order,” Muir said. “But if animals don’t care about a pecking order and they get along, that energy is transferred to production. So, it’s a winning situation.” Muir has worked with pig breeders to establish this type of selective program but used Japanese quail in the current study to validate the practice. He chose the birds because they tend to be very aggressive, even cannibalistic. In addition, they were a good study model because they reach maturity in about six weeks, are easily tagged and bred so pedigrees can be maintained, and it takes little room and feed to breed and raise them. While beak trimming is used in some poultry breeding programs to minimize birds injuring each other, Muir’s birds weren’t beak trimmed so that their natural behavior could be observed. “In my quail experiment, we have definite data and facts showing how the birds react in different size groups,” Muir said. “We could assess how much negative impact aggressive birds were having on other birds. “Aggressive birds were causing a weight decrease in the other birds by 25 percent compared with birds housed in non-aggressive groups.” Muir found that in just two generations of picking more passive quail, the flocks had a dramatic decrease in aggressive behavior and injuries. The study also showed that when classical breeding approaches were used, competition became worse and productivity declined, he said. The only way to solve this problem is through accounting for competition in the breeding program, as the new method does. This breeding program is easy to implement, requiring only that computer programs be used to define competitors and set up breeding and growth groups, Muir said. “This will enhance production traits that are influenced by associative effects while also improving animal well-being, which leads to a successful situation for producers, consumers and animals,” he said. The old adage that athletes are born and not made may be even truer of animals. “If you’re born with really, really passive genes, it will be hard for you to become nasty and aggressive,” Muir said. “Animals don’t have the ability to see into the future and decide that ‘if I’m really aggressive, I can get ahead.’” Muir’s study also examines genetic benefits that can be obtained by using the theory to track productivity in plants. This is evident when documenting the performance of trees where larger trees and certain types of trees have competitive advantage for nutrients and sunlight. “Researchers recognized this in tree breeding even before plant breeding,” Muir said. “They have often seen it when they thinned a stand of trees, it had much better yields. The key to making this system work for increased productivity is tracking the pedigree of plants and animals to know which ones are most likely to be passive.” Muir also is director of the Molecular Evolutionary Genetics Graduate Training Program. On the World Wide Web:
<urn:uuid:1fb7aab4-9c6d-464c-b527-baff998ff2bd>
{ "date": "2014-03-07T04:02:40", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999635677/warc/CC-MAIN-20140305060715-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9533064961433411, "score": 2.984375, "token_count": 1286, "url": "http://www.redorbit.com/news/oddities/196226/happy_and_passive_means_more_productive_animals/" }
In the black cohosh article below you will find some information about menopause, pregnancy, labour and hot flashes & flushes. Menopausal Symptoms and hot flushes Traditionally, Black cohosh has been used mainly by women for alleviating hot flushes and other menopausal symptoms. Black cohosh (known as both Actaea racemosa and Cimicifuga racemosa), a member of the buttercup family, is a plant that is native to North America. However, its popularity has grown to all parts of the world. Black cohosh was used in North American Indian medicine for malaise, gynecological disorders, kidney disorders, malaria, rheumatism, and sore throat. It was also used for colds, cough, constipation, hives, and backache and to induce lactation. It was often called Black Snake root as it was sometimes used to help combat poison spreading from snake bites. More information about how and where it grows The plant likes to grow in woodland areas, especially in small clearings between established trees. It is thought that is prefers damp areas, whilst tending to not grow well in areas with too much moisture. In the field of plant categorisation, it has held positions in a few different families of plant, before currently being classified in the Actaea category. A plant with a similar name "Blue Cohosh" is not in fact related and it has no similar historic health uses. It is actually the root of the plant that is the most commonly used part. The Woman's Herb It has been used for centuries to help with conditions that affected women's reproductive organs (including menstrual problems, inflammation of the uterus or ovaries, infertility, threatened miscarriage, and relief of labour pains). Studies have shown that black cohosh is a root that has estrogenic properties; it supplies estrogenic sterols which are the beginnings for steroid hormones like estrogen, progesterone and tester one. It is said to possess relaxant properties which may affect uterine contractions so that heavy bleeding is decreased. This herb may also contain substances that act as pain relievers and sedatives. - Each capsules contains approximately 350mgs of pure organic Black - Take one to three capsules daily or as recommended by a health practitioner. - This product should not be used if you are pregnant or trying to become pregnant or if you are breastfeeding. - Do not take this product for more than six months. Other common names include black snakeroot, bugbane, bugwort, rattleroot, rattletop, rattleweed, and macrotys. Insects avoid it, which accounts for some of these common names. If you would like details of any of the various studies done on Black Cohosh then please drop us an e-mail and we will gladly send you some information.
<urn:uuid:4cff7ed1-71b7-4dae-9ad5-149549513a4f>
{ "date": "2017-03-28T21:38:59", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189903.83/warc/CC-MAIN-20170322212949-00511-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9556224346160889, "score": 2.75, "token_count": 596, "url": "https://www.organicnutrition.co.uk/products/herbal-remedy/black-cohosh.htm" }
An illustration of an iron derrick, a lifting device composed of one mast or pole which is hinged freely at the bottom. It is controlled by lines (usually four of them) powered by some means such as man-hauling or motors, so that the pole can move in all four directions. A line runs up it and over its top with a hook on the end, like with a crane. It is commonly used in docks and onboard ships. Some large derricks are mounted on dedicated vessels, and are often known as "floating derricks".
<urn:uuid:638a0d24-01bc-44aa-9856-74b8033dea19>
{ "date": "2014-10-24T08:00:27", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119645432.37/warc/CC-MAIN-20141024030045-00178-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9783770442008972, "score": 2.734375, "token_count": 113, "url": "http://etc.usf.edu/clipart/55200/55253/55253_derrick.htm" }
American Bombing of Iraq Left Legacy of Deformed Babies Remember Falluja? That city in central Iraq was the scene of two furious attacks in 2004 by American Marines. That spring, they went on a bombing, shooting rampage to avenge the murder and mutilation of four American mercenaries. Instead of targeting the estimated 2,000 insurgents, the Marines almost leveled the city of 300,000, without conquering it. Seven months later, they attacked again with artillery and bombs in what was described as the bloodiest urban warfare involving Americans since the Vietnam War. Remember Basra? That southern Iraqi city has been suffering since the first Gulf War, in 1991. Radioactive residue from the 800 tons of bombs and 1 million rounds of ammunition used was soon showing up in babies born with huge heads, abnormally large eyes, stunted arms, bloated stomachs and defective hearts. Later in the 1990s, Basra was hit as part of maintaining the American no fly zone on Saddam Hussein. It was attacked yet again in the 2003 American-British invasion and subsequent occupation. Now we see that the children of Falluja and Basra are suffering a staggering rise in birth defects, primarily from the metals released by bombs, bullets and shells — the dust that gets into food, water, air, soil and crops. A recent study by an environmental toxicologist at the University of Michigan attributes the defects to the presence of high levels of lead, mercury and other contaminants in the bodies of both parents and their afflicted children. It substantiates what horrified doctors at Falluja General Hospital had been reporting since 2005. In September 2009, they had asked the United Nations to investigate why a quarter of the 170 babies born there that month had died within seven days and a staggering 75 per cent of the dead babies were deformed. In 2010, the University of Ulster reported that increases in congenital birth defects, leukemia and infant mortality in Falluja were higher than in Hiroshima and Nagasaki in 1945. Later that same year, Mozhgan Savabieasfahani of the University of Michigan’s School of Public Health published an epidemiological study, also showing shocking levels of birth defects in Falluja children. Since then, she and her collaborating team of doctors in Iraq and neighboring Iran have broadened their research in Falluja and Basra. Last month, they published their findings in the Bulletin of Environmental Contamination and Toxicology. They followed 56 families from Falluja General Hospital and also thousands of records at the department of obstetrics and gynecology at Basra maternity hospital. Between 2004 and 2006, almost half the pregnancies among those Falluja families resulted in miscarriage. Between 2007 and 2010, more than half the children born in them had some form of birth defect (compared to less than 2 per cent in 2000). Abnormalities included heart defects, malformed or missing limbs, cleft palates, swollen heads, single eyes, bloated tummies and body organs spilling out of defective abdominal walls. Among the children with birth defects, lead levels were five times higher and mercury levels six times higher than for normal children. In Basra, birth defects had gone up to 23 per 1,000 births by 2003, a 17-fold increase since 1994. Mercury levels in children with defects were three times higher than among normal children. The enamel portion of the deciduous tooth from a child with birth defects showed nearly three times higher lead levels than the teeth of children from other areas. Their parents had 1.4 times higher lead levels in tooth enamel compared to parents of normal children. If anything, the data underestimates the epidemic, says Savabieasfahani. Many parents tend to hide their children with defects and abnormalities. The American and British governments try to deflect such damning studies by saying they were “not aware of them,” or that the findings may not be definitive. But Savabieasfahani told me on the phone from Ann Arbor, Mich., that there’s “a clear footprint of metal in the population” in Falluja and Basra. “There is compelling evidence linking the staggering increases in Iraqi birth defects to neurotoxic metal contamination following the repeated bombardments. There is no other explanation. There has been no volcano eruption, for example.” Meanwhile, the World Health Organization is also studying the crises not only in Falluja and Basra but also seven other “high-risk” Iraqi cities. Its report is due out next month. These studies should be required reading for anyone who still wonders why the Arab and Muslim world remains so angry at America and its allies. © 2012 Toronto Star
<urn:uuid:9e671e16-06bd-4bf7-8de9-0470aeaa1be7>
{ "date": "2014-11-20T20:38:44", "dump": "CC-MAIN-2014-49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400372202.67/warc/CC-MAIN-20141119123252-00048-ip-10-235-23-156.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.963904082775116, "score": 2.890625, "token_count": 972, "url": "http://www.commondreams.org/views/2012/10/21/american-bombing-iraq-left-legacy-deformed-babies" }
Will Galveston Bay go down the drain? Galveston Bay National Estuary Program MetadataShow full item record This video gives an overview on environmental issues the Galveston Bay National Esuary Program is working on to maintain the ecological balance of Galveston Bay. The Galveston Bay Plan is supported in this video as a neccessary comprehensive conservation and management plan to address threats to the bay resulting from pollution, development, and overuse.
<urn:uuid:e39c4486-d79a-460d-a3ba-b40007888668>
{ "date": "2016-05-04T19:18:32", "dump": "CC-MAIN-2016-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860123845.65/warc/CC-MAIN-20160428161523-00182-ip-10-239-7-51.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.860705554485321, "score": 2.71875, "token_count": 96, "url": "http://repositories.tdl.org/tamug-ir/handle/1969.3/25383" }
Teacher resources and professional development across the curriculum Teacher professional development and classroom resources across the curriculum About the Workshops Workshop 1: The Many Faces of Learning Reflect on your own personal beliefs about learning, and discover why it is important for teachers to examine and reexamine the learning process. Workshop 2: Intellectual Development Share ways to elicit, accept, and build on students' ideas, and discover the connection between student ideas and intellectual development. Workshop 3: Conceptual Thinking Consider how students learn by assimilating new concepts into their already existing frameworks. Workshop 4: Inquiry Explore why inquiry learning is essential in mathematics and science, and develop several strategies for inquiry-based teaching. Workshop 5: Idea-Making Investigate how facilitating the construction of students' own mathematical ideas has a positive effect on learning. Workshop 6: The Mind's Intelligences Review Gardner's theory of multiple intelligences and learn how to create learning environments that support the full spectrum of students' intelligences and abilities. Workshop 7: Design, Construction, and Technology Examine the effect of technology on learning when students design and develop tools to support their own inquiries. Workshop 8: Intellectual Development Analyze differences in curricula, textbooks, and teaching practices around the world, and discuss how these differences affect student learning in mathematics and science. Video Clip Descriptions In the Dark Richard and Karen, grade 8, discuss their ideas of light and vision Looking at Learning . . . Again Guest educators explain why it is important to continually examine learning. Batteries and Bulbs Kris Newton's 9th grade class at the Cambridge Rindge & Latin School (Cambridge, MA) begins a unit on batteries and bulbs. Tea for 40 (T-440) A group of teachers who have worked with Eleanor Duckworth for more than 15 years meets once a month to share activities and discuss their own learning. Mission Hill School (Boston, MA) Eleanor Duckworth conducts a workshop in which teachers, parents, and staff examine their own understandings about a particular phenomenon. Rocks and Minerals Tom Vaughn's 9th grade earth science class at Arlington High School (Arlington, MA) makes concept maps on atomic structure as they begin a unit on rocks and minerals. Plane Geometry Colleen Schultz's 8th grade algebra class at the Vestal Middle School (Vestal, NY) makes concept maps to review a unit on plane geometry before a test. Wetlands Erien Gordon's 5th grade class in Methuen, MA, observes the wetlands behind their school in order to come up with questions for an investigation. Pendulums Margarita Manso-Rosa's students in a 5-8th grade bilingual (Spanish) class in Cambridge, MA, share their results of a pendulum investigation and ask each other questions about what they've learned. Paper Trusses Nancy Cianchetta's 8th grade students in Everett, MA move from disinterest to involvement when they are presented with a paper truss challenge. Mental Addition Meredith Livings's 2nd grade class at the South Shades Crest School (Hoover, AL) engages in "mind mathematics" as the students solve double digit addition problems in their heads. Mental Multiplication Sherry Parrish's 4th grade students at the South Shades Crest School describe and defend their strategies for solving double digit multiplication problems in their heads. Ross School (E. Hampton, NY) See a number of multiple intelligence strategies in practice: Girl Scouts Clubhouse At a computer clubhouse run by the Patriot Trail Girl Scouts (Boston, MA), girls ages 8 to 11 design projects on the computer, under the guidance of teenage mentors. Robots In Ronnie Ranere's K-1 class at the Bronx New School (Bronx, NY), students use robots to figure out distance on number lines. Crickets In Mark Hardy's 4th and 5th-grade class at the Bronx New School, students use "crickets" to collect temperature data before and after a walk. Third International Mathematics and Science Study (TIMSS) A high school math class in Japan works on a challenging geometry problem. Round Table A group of teachers, administrators, and parents discuss how the TIMSS results reflect cultural and societal values and share their own ideas about what we, as a society, can do to improve our education system for our children.
<urn:uuid:7fbfc5d8-f081-4de0-a47b-90c05375fa82>
{ "date": "2014-10-26T03:00:24", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119654194.47/warc/CC-MAIN-20141024030054-00028-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.901883065700531, "score": 3.875, "token_count": 927, "url": "http://www.learner.org/workshops/lala/lalaprintfm2.html" }
The Venn diagram above is split into 8 regions labelled A-H. Each letter represents the number of people in the group. For example, B, C and D represent the number of people owning only a rabbit, cat or dog respectively. In this problem the interlocking parts of the central circles represent owners of more than one pet. B+G+H+E=16 rabbit owners E+H+F+D=24 dog owners G+H+F+C=17 cat owners H=2 cat, dog and rabbit owners F=cat and dog owners, G=cat and rabbit owners, F=G+1 E=9 dog and rabbit owners A=0 do not own a dog, cat or rabbit There is an ambiguity about the 39 pet owners: does this mean they own no more than one of cat, dog or rabbit; or it means they own at least one type of pet? In the first case B+C+D=39; in the second case B+C+D+E+F+G+H=39. Now we can begin to plug in figures. B+G=16-2-9=5, F+D=24-2-9=13, and G+1+D=13, so G+D=12 G+H+F+C=17; G+2+G+1+C=17; 2G+C=14 If we assume B+C+D+E+F+G+H=39, then (B+G)+(G+1+D)+(C+9+2)=39 5+13+C+11=39; C=39-(5+13+11)=39-29=10; 2G+C=14, so 2G=14-10=4 and G=2; and so there are 2 cat and rabbit owners. (Also, since B+G=5, B=3 who only own a rabbit; and D=12-2=10 only own a dog.)
<urn:uuid:1eec5b89-1c8d-4bbe-b7c8-dffa459b9153>
{ "date": "2018-06-20T11:42:14", "dump": "CC-MAIN-2018-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863518.39/warc/CC-MAIN-20180620104904-20180620124904-00576.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8361191749572754, "score": 3.359375, "token_count": 438, "url": "https://www.mathhomeworkanswers.org/240852/how-many-have-both-rabbit-and-cat" }
There are many ways to strike a deal. Courts use the following terms to describe different forms of plea bargaining: - Charge bargaining. The defendant pleads to a crime that’s less serious than the original charge, or than the most serious of the charges. Example: The prosecution charges Andrew with burglary, but he pleads guilty to trespassing and the prosecution dismisses the burglary charge. - Count bargaining. Many consider count bargaining to fall under charge bargaining. Here, the defendant pleads to only one or more of the original charges, and the prosecution drops the rest. Example: The prosecution charges Joey with both robbery and simple assault. The parties agree that Joey will plead to the assault charge, and that the prosecution will dismiss the robbery charge. - Sentence bargaining. The defendant takes a guilty or no contest plea after the sides agree what sentence the prosecution will recommend. Example: Max agrees to plead to the charge of misdemeanor resisting arrest, and the prosecution agrees to recommend that the judge not sentence him to jail time. - Fact bargaining. The defendant pleads in exchange for the prosecutor’s stipulation that certain facts led to the conviction. The omitted facts would have increased the sentence because of sentencing guidelines. Example: The government files an indictment against Cole for drug trafficking. Federal agents caught him with over five kilograms of cocaine. Five kilograms triggers a sentence involving many years in prison, so Cole agrees to plead guilty to the offense in exchange for the prosecution’s stipulation that he possessed less than five kilograms. For further discussion of the kinds of plea bargains—and the process by which judges decide whether to accept or reject them—see How Judges Accept and Reject Plea Deals.
<urn:uuid:f5ee0089-58cb-4a9b-9627-03c45ac607d5>
{ "date": "2018-05-25T13:21:06", "dump": "CC-MAIN-2018-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867092.48/warc/CC-MAIN-20180525121739-20180525141739-00096.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9151831269264221, "score": 3.328125, "token_count": 375, "url": "https://www.nolo.com/legal-encyclopedia/what-the-different-kinds-plea-bargains.html" }
"How The Supreme Court Acknowledged That Gay People And Their Families Exist" Today’s decision overturning Section 3 of the Defense of Marriage Act was, as President Obama tweeted, “a historic step forward” for marriage equality. Beyond the issue of marriage, however, the ruling created a new recognition for gay people — both under the law and in reality — that must be highlighted. In these decisions, the Court had the opportunity to apply a level of heightened scrutiny based on sexual orientation. Though the Justices stopped short of an “intermediate” or “strict” scrutiny legal determination, they still acknowledged that “careful consideration” is required when determining if a law is motivated by improper animus or purpose. It could have overturned DOMA by simply ruling that the federal government overstepped its authority by limiting the definition of marriage, but it went a step further and ruled that the law violated same-sex couples’ right to equal protection under the Fifth Amendment. Writing for the Majority, Justice Kennedy explicitly explained how DOMA “seeks to injure” and stigmatize gay people as a class: DOMA’s unusual deviation from the usual tradition of recognizing and accepting state definitions of marriage here operates to deprive same-sex couples of the benefits and responsibilities that come with the federal recognition of their marriages. This is strong evidence of a law having the purpose and effect of disapproval of that class. The avowed purpose and practical effect of the law here in question are to impose a disadvantage, a separate status, and so a stigma upon all who enter into same-sex marriages made lawful by the unquestioned authority of the States. In a sense, Kennedy has avoided directly addressing questions like whether homosexuality is immutable, but by referring instead to same-sex couples as a class, the effect is largely the same. DOMA, he wrote, treats same-sex marriages as “second-class marriages,” and “writes inequality” into the law: DOMA’s principal effect is to identify a subset of state-sanctioned marriages and make them unequal. The principal purpose is to impose inequality, not for other reasons like governmental efficiency. Responsibilities, as well as rights, enhance the dignity and integrity of the person. And DOMA contrives to deprive some couples married under the laws of their State, but not other couples, of both rights and responsibilities. […] This places same-sex couples in an unstable position of being in a second-tier marriage. The differentiation demeans the couple, whose moral and sexual choices the Constitution protects and whose relationship the State has sought to dignify. And it humiliates tens of thousands of children now being raised by same-sex couples. The law in question makes it even more difficult for the children to understand the integrity and closeness of their own family and its concord with other families in their community and in their daily lives. The Court’s recognition of these children and their families — including recognition later in the opinion that they experience “financial harm” because of DOMA — is key. Opponents of marriage regularly asserted that “marriage” was somehow about what’s best for children, but they never had any comment to offer about the children already being raised by same-sex parents and how they would benefit from marriage. That is the reality of the gay community. Lives have already been underway in spite of discriminatory laws. Conservatives always treated the issue as if gay people simply were not part of society — if they could just keep the laws discriminatory, then the gay community would never flourish, even though it already was. For the first time in legal history, the Court has validated these lives and ordered their equal treatment under the law. This is a step that cannot be taken back.
<urn:uuid:0c4a60fb-2622-49da-abd2-88f054949f68>
{ "date": "2015-04-27T09:16:12", "dump": "CC-MAIN-2015-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246657868.2/warc/CC-MAIN-20150417045737-00201-ip-10-235-10-82.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.967552900314331, "score": 2.65625, "token_count": 790, "url": "http://thinkprogress.org/lgbt/2013/06/26/2218921/how-the-supreme-court-acknowledged-that-gay-people-and-their-families-exist/" }
For the first time, we have telescopes strong enough to see the radioactivity at the heart of the supernova known as Cas A. What scientists have seen there helps unravel the mystery of how a star dies. Marie Curie, the scientist who coined the word radioactivity and won not one but two Nobel prizes, was born on this day 144 years ago. Google's home page features a celebration of Edmond Halley, of Halley's Comet fame. Superman will tremble when confronted with a batch of DIY fluorescent candy made to look like Kryptonite. Tiny amounts of radiation from the stricken nuclear power plant have spread across the Pacific. An expert from Columbia's Center for Radiological Research assesses the health risks. For more than 40 years, the U.S. government tested nuclear weapons deep in the Nevada desert. Now the site is a reminder of what a scary world that was. CNET Road Trip 2012 investigates. A nuclear expert with Physicians for Social Responsibility says there is no "safe" level of radiation. But for now, he advises caution, not panic. Anxiety over Japan's damaged nuclear plant increases as top U.S. nuclear regulator calls situation worse than reported by Japanese government and says "extremely high" radiation levels could hamper containment efforts. The inventor of the light bulb and phonograph was named the greatest innovator of all time among 52 percent of the young people polled, surpassing the late Apple leader at 24 percent.
<urn:uuid:8d9c77d3-329f-41e0-87b1-c2f3811a389d>
{ "date": "2014-04-18T15:48:49", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00067-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9394261837005615, "score": 2.90625, "token_count": 302, "url": "http://www.cnet.com/search/?query=radioactivity" }
The idea of edible packaging is nothing new, but it is a lot closer to the mass market than it ever has been before. People have long been intrigued with the concept of being able to eat the food bag, as well as the goods within. It certainly would go a long way toward reducing the waste that piles high as we throw away Styrofoam, cardboard boxes, and even some flexible packaging. It is easy to imagine how our world would be impacted on a global level if, suddenly, the majority of packaging was edible (or, at very least, easily dissolved into a earth-friendly liquid). This is exactly what researchers are working toward, and it is very possible that we will see new food pouches and other food product packaging made entirely of edible materials in the near future. In fact, right now, two large scale experiments are underway using unexpected materials as packaging – mushrooms and milk. Not milk exactly, but a milk protein called casein. This is an entirely biodegradable and, yes, edible material, which could soon be used to package cheeses and other dairy products. Not only can this material be used to protect the food within, say researchers, but it could also add a nutritional boost, because it is a natural protein. The combination of water, casein, glycol, and citrus pectin produces a thin, malleable material that would rival the plastics currently used in the mass market. In yet another lab, there are a couple of young scientists and entrepreneurs who are developing an entirely different type of packaging material, which undoubtedly excites every packaging company. One of the challenges of trying to abide by eco-friendly practices is the fact that there is no strong alternative to Styrofoam inserts, which are often help to keep products in place, and safe when transported and shelved. However, these young forward thinkers have come up with a way of using mushrooms as the base for a new type of Styrofoam that will biodegrade. You can read more about their efforts at Business Insider. With such innovation, it is easy to picture the day that we no longer have to worry about the waste created by throwing away plastic pouches and other such materials.
<urn:uuid:40987b39-01f2-41c3-a810-8805609414ea>
{ "date": "2017-07-26T18:31:16", "dump": "CC-MAIN-2017-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426372.41/warc/CC-MAIN-20170726182141-20170726202141-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9702754616737366, "score": 2.984375, "token_count": 455, "url": "http://pplv.co/packaging-made-milk-mushrooms/" }
The 282 photographic prints in this collection document voyages of the United States Revenue Cutters “Bear,” “Corwin,” and “Richard Rush” to Alaska and the Arctic Ocean in the 1880s and 1890s. The images depict the boats, Captain Michael A. Healy, and the crewmen, as well as Alaskan natives and their homes; and various views of the Alaskan wilderness and towns. The collection provides insight into the people and events the “Bear” and “Corwin” encountered on their voyages. Michael A. Healy was born September 22, 1839, in Georgia to an Irish cotton planter, Michael Morris Healy, and a mulatto woman, Eliza Clark. Even though his father sent him and his brothers north to be educated (and hence escape slavery), Healy always ran away from the schools he was enrolled in, and eventually joined the clipper ship "Jumna" in 1855. For the next ten years, he sailed on merchant vessels until he was commissioned as a Third Lieutenant in the United States Revenue Service in 1865; that same year, Healy married Mary Jane Roach, the daughter of Irish immigrants to Boston. 282 photographs in 8 boxes; photographs 19.5 x 24 cm (8 x 9 in) + 1 preservation microfilm copy reel. All requests for permission to publish photographs must be submitted in writing to the Curator of Photographs. Permission for publication is given on behalf of the Huntington as the owner of the physical items and is not intended to include or imply permission of the copyright holder, which must also be obtained. The collection is open to qualified researchers by prior application through the Reader Services Department. For more information, please visit the Huntington's website: www.huntington.org.
<urn:uuid:1c6b2366-a023-442b-a7d9-5454b95b4dc1>
{ "date": "2015-04-19T22:57:29", "dump": "CC-MAIN-2015-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246642012.28/warc/CC-MAIN-20150417045722-00034-ip-10-235-10-82.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9553478956222534, "score": 2.59375, "token_count": 392, "url": "http://oac.cdlib.org/findaid/ark:/13030/c8q23z64/" }
in Trees of California. THE WOODS OF THE WEST. Oh, woods of the west, leafy woods that Where through the long days I have heard The prayer of the wind in the branches above, And the tremulous song of the bird. Where the clust’ring blooms of the dog-wood hang o’er— White stars in the dusk of the pine, And down the dim aisles of the old forest pour The sunbeams that melt into wine! * * * * * Oh, woods of the west, I am sighing today For the sea-songs your voices repeat, For the evergreen glades, for the glades far away From the stifling air of the street, And I long, ah, I long to be with you again And to dream in that region of rest. Forever apart from this warring of men— Oh, wonderful woods of the west! in At the Shrine of Song. The Mohave yucca is a remarkable plant, which resembles in its nature both the cactus and the palm. It is found nowhere save in the Mohave Desert. It attains a height of thirty or forty feet, and the trunk, often two or three feet in diameter, supports half a dozen irregular branches, each tipped with a cluster of spine-like leaves. The flowers, which are of a dingy white color, come out in March and last until May, giving off a disagreeable odor. The fruit, however, which is two or three inches long, is pulpy and agreeable, resembling a date in flavor. ARTHUR J. BURDICK, in The Mystic Mid-Region. JULY 13 AND 14. Throughout the coast region, except in the extreme north, this Live Oak is the most common and characteristic tree of the Coast Range valleys which it beautifies with low broad heads whose rounded outlines are repeated in the soft curves of the foothills. Disposed in open groves along the bases of low hills, fringing the rich lands along creeks or scattered by hundreds or thousands over the fertile valley floors, the eyes of the early Spanish explorers dwelt on the thick foliage of the swelling crowns and read the fertility of the land in these evergreen oaks which they called Encina. The chain of Franciscan Missions corresponded closely to the general range of the Live Oak although uniformly well within the margin of its geographical limits both eastward and northward. The vast assemblage of oaks in the Santa Clara Valley met the eyes of Portola, discoverer of San Francisco Bay, in 1769, and a few years later, Crespi, in the narrative of the expedition of 1772, called the valley the “Plain of Oaks of the Port of San Francisco.” Then came Vancouver, Englishman and discoverer. Although he was the first to express a just estimate of the Bay of San Francisco, which he declared to be as fine as any port in the world, nevertheless it is his felicitous and appreciative description of the groves of oaks, the fertile soil (of which they were a sign), and the equable climate that one reads between his lines of 1792 the prophecy of California’s later empire.
<urn:uuid:5971bc42-1b60-488f-9a95-f99548bd0d7c>
{ "date": "2017-08-23T18:21:54", "dump": "CC-MAIN-2017-34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886123312.44/warc/CC-MAIN-20170823171414-20170823191414-00256.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9286444783210754, "score": 3.015625, "token_count": 694, "url": "http://www.bookrags.com/ebooks/13298/54.html" }
Cloud Computing: A Cloudy World There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium – although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or gas. The term is not new; vendors such as Salesforce.com have provided Cloud services in different guises for many years. Other players have been swift to get on board, including Microsoft, HP, IBM, Amazon and Google, to name but a few. Put simply, users now have the choice of a new way to consume computing power, applications and data. No longer is it necessary to buy software on a floppy disk or a CD. Instead, you can have immediacy of delivery through the Internet for an application you want now. Users have been educated into this way of working with iTunes and app stores, and they’ve come to expect a seamless link between their locally run application and data and information from the Internet – and at a very digestible and economic price point. Buying a robust, polished application or game for below £1 is now taken for granted. As an average user you are also likely to be using cloud computing in the form of webmail, Flickr, YouTube, Facebook and a plethora of other services; storing what you would consider private information in the Cloud without knowing where it is in reality… or even caring. In effect, Cloud has become a very simple and trendy way of describing all things that occur outside the firewall whether it be on a corporate network or on your home PC. And Cloud computing is already helping to shape the way we digest IT both at home and in the workplace. It is simply a new ‘form factor’, a new way of delivering a solution to a customer. We have seen new form factors disrupting and changing many market sectors already. Think of Blockbuster Video, once the darling of the entertainment world and now struggling to survive against the new delivery factors of Netflix and LOVEFiLM. Tower Records, once a worldwide brand, has been put out of business by the ability for users to now purchase music faster and cheaper via iTunes and online music stores. The same trends are occurring in computing. The extraordinary speed at which Cloud computing has come to dominate the landscape has caught many by surprise. None deny it is the Zeitgeist for 2010 when looking back at the past year. With bold press statements such as “Cloud computing will boost UK economy by £30bn a year” grabbing headlines, it’s no wonder it is at the centre of so much discussion and scepticism. With Cloud computing expected to enjoy an adoption rate and growth of between 30 to 40 per cent per year, every year for the next five years, vendors are rushing to launch and push their cloud offerings. From a customer point of view, it is obviously a good thing to have more choices – although you should be aware that in reality there is a wide range of maturity levels amongst vendors, with some of them taking their first steps and looking for their first few candidates for experimental purposes. The major brands, Microsoft, Google, HP, etc are all endorsing cloud as key to their future (Microsoft recently announced the majority of its developers have been moved to its cloud platform), and in both business and at home it will certainly change the way we do so many things. Cloud computing offers substantial benefits including efficiencies, innovation acceleration, cost savings and greater computing power. No more 12-18 month upgrade cycles; huge IT burdens such as system or software updates are delivered automatically with cloud computing and both consumers, small and large organisations can now afford to get access to cutting-edge innovative solutions. Cloud computing also brings green benefits such as reducing carbon footprint and promoting sustainability by utilising computing power more efficiently. But be warned… There will be some cloud negatives to go with all the positives. For example, with so much reliance on applications and data stored at the Internet level, what happens when you lose your Internet connection, can’t get a mobile 3G connection or the service itself isn’t available for a period? In all cases, due to circumstances outside your control, you cannot access your data, your photos or perform the action when and where you wanted. More worryingly, we have also seen a continued increase in threats coming from the Internet from spam, phishing (fake eBay, bank, etc. e-mails asking you to login in order to steal your details), viruses, spyware and scams. There was more malware on the internet in the last 18 months than the last 18 years combined. Never in the field of internet conflict has so much impact caused by so few to so many. The attackers have gone Cloud and are also utilising the great virtual computing power base to their advantage. We are already starting to see malware targeting non-PC devices. It’s in its early stages, but it is inevitable we will see more targeting of smartphones, tablets and perhaps even Apple Macintosh as the data that users send to the Cloud becomes more valuable – and the wider range of applications used to access it grows at a rapid rate. Today’s generation of users expect to be able to access their applications from their iPhone, iPad, BlackBerry or Android device, and they expect web-based applications and resources to be readily available to those devices. We are entering a time when seemingly infinite IT power and information is available to a user on the smallest of devices, on the move and at a price affordable to the average consumer. Looking back, who would have expected that in 2011 you could have a 59p application on your phone which could ‘listen’ to a music tune being played in a bar and in seconds, using the internet (accessing massive Cloud power to do the look up and recognition analysis), present to you the details of the track and a ‘click here’ to pay for immediate download of the song! The chances are that Cloud will accelerate this affordable power still further. Just imagine where we will be in ten years time! With so much happening so fast, the pressure is on IT experts to not only deliver more innovation but also greater security to defend it. As devices get more powerful, the internet faster, the demand and supply of Cloud applications will sky rocket and the power in the hands of the user will be greater than we have ever delivered before. Remember with great power, comes great responsibility and your responsibility is to protect the data, your ID and the information valuable to you. You would not go out and leave your front door open. Therefore, don’t leave your ‘virtual’ front door open when connecting to the internet and such powerful applications. By all means be a Cloud user, but be safe and be secure in doing so. By Ian Moyse - Fully Autonomous Cars: How’s It REALLY Going To Work? - August 26, 2016 - How Identity Governance Can Secure The Cloud Enterprise - August 25, 2016 - Significant Emerging Technologies To Lookout For In 2017 - August 25, 2016 - In The Fast Lane: Connected Car Hacking A Big Risk - August 24, 2016 - Having Your Cybersecurity And Eating It Too - August 24, 2016
<urn:uuid:aa2fdd5b-35f0-400d-ba7d-d7fa43af2eda>
{ "date": "2016-08-28T10:17:42", "dump": "CC-MAIN-2016-36", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982937576.65/warc/CC-MAIN-20160823200857-00176-ip-10-153-172-175.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.952926516532898, "score": 2.703125, "token_count": 1518, "url": "http://cloudtweaks.com/2012/01/cloud-computing-a-cloudy-world/" }
Prepayment of student loans is a common strategy to save money on interest over the life of the loan. Borrowers make “prepayments” on their student loans when they pay more than the amount due, often long before the debt is due. Some borrowers choose to pay a little bit extra when they can afford it, while other borrowers make large lump sum payments in order to pay off a loan entirely. Both approaches will pay off a loan faster, but also come with risks. How is the early/extra payment processed? Lenders procedures for handling prepayments can vary from company to company. Generally speaking, loan prepayments are handled in the following order: - Penalties and Fees – If a borrower has been charged any fees or penalties, such as late fees or charges for a bounced check, prepayment funds will first be used to eliminate these balances. - Accrued Interest – Prepayments are then use to pay down interest that the student loan has generated. If a borrower continues to make regular payments, none of the prepayment should be applied towards interest. - Principal Balance – Once fees and interest have been paid, the remaining funds reduce the principal balance. Knocking down the principal balance is the goal of prepayments. When making large or extra payments, borrowers should pay close attention if they have multiple loans with the same lender. Typically, borrowers will want the entire extra payment to be applied to the loan with the highest interest rate. Some lenders will apply the prepayment equally across all loans if they are not given special instructions. When one lender holds multiple loans it is important to give specific instructions for extra payments AND to follow up to make sure that your instructions were followed. Some lenders also use prepayments to delay the due date for future payments. For borrowers that pay a large lump sum, it could mean that the next payment isn’t due for a number of years. Lenders do this to allow interest to build back up on the account. Borrowers who make large payments are usually better off if they continue to make their regular payments, whether they get a bill or not. This practice varies from lender to lender. One thing to keep in mind is that some loans do come with prepayment penalties. In the student loan world these are very uncommon, but borrowers should be aware. If you are considering paying extra towards your student loans, it is a good idea to your lender to verify that there are no prepayment penalties associated with your loans. Advantages of paying extra… There are three major benefits to paying extra on your student loans. - Less spending on interest – When the principal balance is lowered, it means that the loan generates less interest each day. That means paying an extra $100 today will save money every month for the life of the loan. Paying a loan off entirely ends the lender profit stream and frees up money each month for the borrower. - Improved finances – Paying off a loan can dramatically improve your finances. Applications for mortgages and other loans are more likely to be granted. In the event of a job loss, emergency funds will last longer when there is less debt. - Peace of Mind – Dealing with student loans and finding the cash to make monthly payments can be a great source of stress. For many, eliminating debt is eliminating things to worry about. Deciding on the student loan to prepay Paying a little bit extra on all of your student loans will save money in the long run. However, targeting a specific loan to attack is often the optimal strategy. Planning and strategy are very important. If you have multiple student loans, there are a couple approaches that can use with your extra payment: Option 1: Pay Down the Highest Interest Loan – This one is usually the recommended approach. The plan is very simple. Use whatever extra money you have to pay down the balance of your student loan with the highest interest rate. Mathematically, this is almost always the most efficient use of your money. Option 2: Pay Off a Small Loan in Full – If you have enough money to pay off a loan in full, this can be a very tempting option. Even if you can’t pay the entire loan off now, attacking a small loan first can get debt wiped off the ledger as fast as possible. Paying off a loan completely will eliminate a monthly payment for you going forward. This win can help your monthly balance sheet, provide some financial flexibility, and help you find the motivation to attack the rest of your student debt. What not to do: Split the payment evenly across all of your loans – Doing this is better than just paying the minimum, but it is still a lousy strategy. It lacks the interest saving power of option 1 and it lacks the flexibility and motivation of option two. Risk of Early Payments The big danger with prepayment is that once the money is paid, you never get it back. Just because you are $500 ahead on your payments does not mean the lender will send you a check for $500 if you find yourself strapped for cash. For this reason it is important to have an emergency fund in place to deal with any potential financial hardship. Having an emergency fund in place is critical to smart financial planning. The general recommendation is to have three to six months worth of expenses saved away in case of an emergency. For people with lots of student debt who do not have children dependent upon them, this number can get shaved down a bit. An individual’s ability to find new work or additional income quickly will also impact how much money should be set aside in an emergency fund. While there is some room for debate about the proper amount to set aside, there is no debating the necessity of having an emergency fund. With an emergency fund in place, you can more easily deal with a job loss, car trouble, or unexpected medical expenses. Without an emergency fund, one problem can quickly become many. The other concern with prepayment is the opportunity cost. Money used for a prepayment is no longer available for a home down payment or to start a business. For this reason, some borrowers elect to refinance their loans with another lender at a lower interest rate. Going this route allows for saving money on interest while still having the cash on hand to pursue other opportunities. Paying extra towards student loans is a great way to spend less on interest and secure a stronger financial future. Some lenders do require a little babysitting to make sure they process payments correctly, but the extra effort is well worth the savings.
<urn:uuid:ec4cabbc-4161-435d-96dd-364adb9dfef1>
{ "date": "2019-07-20T22:00:59", "dump": "CC-MAIN-2019-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526714.15/warc/CC-MAIN-20190720214645-20190721000645-00456.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9611859917640686, "score": 2.6875, "token_count": 1351, "url": "https://studentloansherpa.com/understanding-student-loan-prepayment/" }
Send the link below via email or IMCopy Present to your audienceStart remote presentation - Invited audience members will follow you as you navigate and present - People invited to a presentation do not need a Prezi account - This link expires 10 minutes after you close the presentation - A maximum of 30 users can follow your presentation - Learn more about this feature in our knowledge base article The Diary of Anne Frank Transcript of The Diary of Anne Frank DEATH DATE: March 1945 PLACE OF BIRTH: Frankfurt, Germany PLACE OF DEATH: Lower Saxony, Germany The adults females would wear their hair up while the younger ones would where theirs down. Margot would have hers half up half down; To symbolize her age in the contrast between the adults and Anne. As the play went on slowly they would loose their inhibitions and let their hair down or at least less neat; to symbolize all the time they spend hiding in the Secret Annex. I would choose to dress my actors in bright vibrant solid colors to star the show and as the show progressed their wardrobe would get increasingly darker and duller. The Van Daan’s and the Frank’s clothes would start the show in complementary colors but as the show went on their colors would change to that of contrasting. The Van Daan's would be dressed in cool colors while the Frank's are in warm colors. Mr. Van Daan’s clothes would grow darker slower because he is stealing food. Peter’s clothes would change to compliment the Franks rather than his own parents. Anne's clothes would remain bolder than the others and dim even slower than theirs, because of her optimistic and somewhat naive personality. No green. GREEN=Green Police The Diary of Anne Frank Holocaust victim ,Anne Frank, and her family spent two years and one month hiding in the Secret Annex in Amsterdam during World War II, during this time she kept a diary. Anne Frank's diary, which was published by her father after the war and has been read by millions of people around the world, records both the tensions and difficulties of living in such a confined space for that long a time, as well as Anne's struggles with becoming a teenager. Since the publication of her diary, Anne Frank has become a symbol of the children that were murdered in the Holocaust. lights/set design : The set would be something small and cramped. I would choose not to use the entire stage, as it would be too much space. I would prefer to make it more realistic to the Franks' experience; small and cramped. The lights at start would be filled with color, symbolizing the passion and hope the two family's have. But as the play goes on the colors would fade into lighter and whiter light until there was nothing left, but white on the stage. Thus symbolizing their loss of hope and passion. Except in the Hanukkah scene where everyone's spirits are lifted. there I would add a flash of color. The Secrete Annex Franks and Van Daans of Anne Frank World War II German invasion of Amsterdam World War 2 is historically recognized as beginning in September of 1939 with Germany’s invasion of Poland, although Japan had been at war with China since 1937. The launch of Europe into war, however, ultimately entangled the world’s greatest powers in the conflict, resulting in World War 2. It is estimated that between 50 and 70 million people died during World War 2. When Allied troops finally advanced into German territory, they discovered what Hitler had termed his “final solution” for the Jews: concentration camps in which millions of Jews had been systematically murdered. World War 2 in Europe ended in May of 1945. The United States’ war with Japan did not end until August of that year when the United States dropped atomic bombs on Hiroshima and Nagasaki, two Japanese cities. WW2 & Adolf Hitler Adolf Hitler, the head of the Nazi Party, was elected Chancellor of Germany in 1933. Prior to the military invasion that instigated World War 2, Hitler had slowly been rebuilding Germany’s army, which was devastated after the First World War. He also began undermining the rights of the Jews in Germany and devising his plan to take over Europe and eradicate the Jewish people entirely. After Hitler invaded Poland, France and England declared war on Germany, but did not offer sufficient support to derail Hitler’s Nazis. In May of 1940, Germany invaded many more European countries, including France and Holland, and many of them fell to Nazi forces within weeks. By the end of September in 1940, the major power players of World War 2 had divided into two groups: the Allies, including England, France, Poland, and the U.S., and the Axis powers, comprised of Germany, Italy, and Japan. With the attack on Hawaii’s Pearl Harbor by Japanese bombers in 1941, the Americans were drawn into the fray against both in the Pacific and in Europe. Germany invades the Netherlands. Rotterdam is destroyed by the Luftwaffe, (air force) but Amsterdam suffers only minor damage before surrendering. The Allies liberate the southern Netherlands, but the north and west of the country are cut off from supplies. Thousands of Dutch perish in the bitter ‘Hunger Winter’. The involvement of the Netherlands in World War II began with its invasion by Nazi Germany on 10 May 1940. The Netherlands had originally hoped to stay neutral when war broke out in 1939, but this wish was ignored. On 15 May 1940, one day after the bombing of Rotterdam, the Dutch forces surrendered. Subsequently the Dutch government and the royal family went into exile in London. Following the defeat, the Netherlands was placed under German occupation,.Active resistance was carried out by a small minority which grew in the course of the occupation. The Germans deported the majority of the country's Jews to concentration camps, with the cooperation of the Dutch police and civil service; the Netherlands saw one of the highest levels of collaboration during the Holocaust of any occupied country. 75% of the country's Jewish population were killed during the conflict; a much higher percentage than comparable countries, like Belgium and France. Most of the south of the country was liberated in 1944. The rest, especially the west of the country still under occupation, suffered from a famine at the end of 1944, known as the "Hunger Winter". On 5 May 1945, the whole country was finally liberated by the total surrender of all German forces. The joyous festival of Hanukkah begins on 25 Kislev of the Jewish calendar. It celebrates two miracles --a great Jewish military victory and a miraculous supply of oil for the Temple. Hanukkah marks the Macabees' long-ago defeat of the much-larger Greek-Syrian army that had invaded Israel. The Macabees were just a small group of Jews. But they organized themselves into a guerrilla army and, with God's help, proved stronger than their powerful enemy. Following the Macabees' victory, the Jews rededicated the Holy Temple in Jerusalem and, once again, were able to worship freely. Although Hanukkah celebrates a military victory, its major symbol — the Hanukkah menorah, — reminds us of the miracle of the oil. As the Jews purified the Holy Temple, they found only one flask of the oil for the eternal lamp — enough to keep it burning for just one day. But a miracle occurred, and the oil lasted eight days and nights until more oil could be brought from afar. This miracle explains why we celebrate Hanukkah for eight days and also why Hanukkah is also known as the Festival of Lights. Development of the play: The first adaptation, The Diary of Anne Frank, was written by Frances Goodrich and Albert Hackett and opened in 1955. It was later adapted into a film by the same name.
<urn:uuid:b05c3b65-cc2d-4c87-92e1-0717af5313b1>
{ "date": "2019-01-21T05:24:11", "dump": "CC-MAIN-2019-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583763149.45/warc/CC-MAIN-20190121050026-20190121072026-00016.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9673317074775696, "score": 2.640625, "token_count": 1657, "url": "https://prezi.com/qxgnwcgzbll0/the-diary-of-anne-frank/" }
|Gjergj Kastrioti Skanderbeg| |Portrait of Skanderbeg in the Uffizi, Florence.| |Born||6 May 1405 |Died||17 January 1468 (aged 62) |Burial||Saint Nicholas church of Lezha, Albania| Gjergj Kastrioti Skanderbeg (6 May 1405 – 17 January 1468; Albanian: Gjergj Kastrioti Skënderbeu, widely known as Skanderbeg, Turkish İskender Bey, meaning "Lord Alexander" or "Leader Alexander"), or Iskander Beg, was a prominent historical figure in the history of Albania and of the Albanian people. Known as the Dragon of Albania, he is the national hero of the Albanians and initially through the work of his main biographer, Marin Barleti, is remembered for his struggle against the Ottoman Empire, whose armies he successfully ousted from his native land for more than two decades. According to Gibbon, Skanderbeg's father, was Gjon Kastrioti, lord of Middle Albania, which included Mat, Krujë, Mirditë and Dibër. His mother was Vojsava a princess from the Tribalda family, (who came from the Pollog valley, north-western part of present-day Republic of Macedonia), or from the old noble Muzaka (Musachi) family. Gjon Kastrioti was among those who opposed the early incursion of Ottoman Bayezid I, however his resistance was ineffectual. The Sultan, having accepted his submissions, obliged him to pay tribute and to ensure the fidelity of local rulers, George Kastrioti and his three brothers: Reposh, Kostandin, and Stanisha, were taken by the Sultan to his court as hostages. After his conversion to Islam, he attended military school in Edirne and led many battles for the Ottoman Empire to victory. For his military victories, he received the title Arnavutlu İskender Bey, (Albanian: Skënderbe shqiptari, English: Lord Alexander, the Albanian) comparing Kastrioti's military brilliance to that of Alexander the Great. He was distinguished as one of the best officers in several Ottoman campaigns both in Asia Minor and in Europe, and the Sultan appointed him General. He even fought against the Greeks, Serbs and Hungarians, and some sources say that he used to maintain secret links with Ragusa, Venice, Ladislaus V of Hungary, and Alfonso I of Naples. Sultan Murat II gave him the title Vali which made him General Governor. Skanderbeg came to lead a cavalry unit of 5,000 men with which he subdued a large part of Anatolia. On November 28, 1443, Skanderbeg saw his opportunity to rebel during a battle against the Hungarians led by John Hunyadi in Niš as part of the Crusade of Varna. He switched sides along with 300 other Albanians serving in the Ottoman army. After a long trek to Albania he eventually captured Krujë by forging a letter from the Sultan to the Governor of Krujë, which granted him control of the territory. After capturing the castle, Skanderbeg abjured Islam and proclaimed himself the avenger of his family and country. He raised a flag with the double-headed eagle, his family's own motif and the historical representation of Christian Empires, most notably the Holy Roman Empire and the Byzantine Empire. This flag and symbol are still in use today by Albania (see Albanian flag) and various other states and authorities of the Balkans, Eastern Europe and Central Europe. Skanderbeg allied with George Arianiti (born Gjergj Arianit Komneni, who shared a distant relation with the Byzantine Komnenos dynasty from one of his great grandmothers) and married his daughter Andronike (born Marina Donika Arianiti). Following the capture of Krujë, Skanderbeg managed to bring together all the Albanian princes in the town of Lezhë (see League of Lezhë, 1444). Gibbon reports that the "Albanians, a martial race, were unanimous to live and die with their hereditary prince" and that "in the assembly of the states of Epirus, Skanderbeg was elected general of the Turkish war and each of the allies engaged to furnish his respective proportion of men and money". With this support, Skanderbeg built fortresses and organized a mobile defense force that forced the Ottomans to disperse their troops, leaving them vulnerable to the hit-and-run tactics of the Albanians. Skanderbeg fought a guerrilla war against the opposing armies by using the mountainous terrain to his advantage. Skanderbeg commanded an army of about 18,000 soldiers, but only had absolute control over 3,500 men from his own dominions and had to convince his colleagues that his policies and tactics were the right ones. In the summer of 1444, in the field of Torvioll, the united Albanian armies under Skanderbeg faced the Ottomans under direct command of the Turkish general Ali Pasha, with an army composed of 25,000 to 40,000 men. Skanderbeg had under his command 7,000 infantry and 8,000 cavalry. 3,000 cavalry were hidden behind the enemy lines in a nearby forest under the command of John Musachi (Albanian: Gjon Muzaka) . At the given signal, they descended, encircling the Turks and giving Skanderbeg a much needed victory. About 8,000 to 22,000 Turks were killed and 2,000 were captured. His victory echoed across Europe because this was one of the few times that an Ottoman army was defeated in a set piece battle on European soil. In the coming years, Skanderbeg defeated the Turks two more times, once in 1445 in Moker (Dibra), and once more in 1447 in Oranik (Dibra). In 1447, Skanderbeg was also involved in a conflict with the Republic of Venice, (Albanian-Venetian War (1447–1448)) due to the capture of a castle in Northern Albania (Danja) by the Republic of Saint-Marc. During the conflict, Venice invited the Ottomans to attack Skanderbeg simultaneously from the east, provoking a double-sided conflict for the Albanians. Skanderbeg, who had besieged a few castles that were possessed by Venice in Albania, was forced to fight an Ottoman Army under the conduct of Mustafa Pasha. In 1448 he won the battle against Mustafa Pasha in Dibër; some days later he won in Shkodra another battle against a Venetian Army led by Andrea Venerio. At the same time he besieged the towns of Durrës and Lezha which were under Venetian rule. This forced the Venice to offer a peace treaty to Skanderbeg The peace treaty was signed between Skanderbeg and Venice on 4 October 1448 and soon after Skanderbeg left to join John Hunyadi in Kosovo. Although it is commonly believed that Skanderbeg took part in the Second Battle of Kosovo in 1448, he actually never arrived. He and his army were en route to reinforce the mainly Hungarian army of John Hunyadi, but Hunyadi did not wait for Skanderbeg while he was delayed by Brankovic. About the time of the battle, Murad II also launched an invasion of Albania in order to keep Skanderbeg busy. Although Hunyadi was defeated in the campaign, Hungary successfully resisted and defeated the Ottoman campaigns during Hunyadi's lifetime. In 1449 an Ottoman army led by Sultan Murad II laid siege to the castle of Sfetigrad. The Albanian garrison in the castle resisted the frontal assaults of the Ottoman Army, while Skanderbeg harassed the besieging forces with the remaining Albanian army under his personal command. In late summer 1449 due to lack of potable water the Albanian garrison surrendered the castle with the condition of a safe passage through the Ottoman besieging forces, a condition which was accepted and respected by the sultan. In June 1450, an Ottoman army numbering approximately 100,000 men led again by Sultan Murad II himself laid siege to Krujë. Following a practise of scorched earth (thus denying the Ottomans the use of necessary local resources), Skanderbeg left a protective garrison of 1,500 men under one of his most trusted lieutenants, Vrana Konti (also known as Kont Urani), while with the remainder of the army he harassed the Ottoman camps around Krujë and attacked the supply caravans of the sultan's army. Three major Ottoman direct assaults on the city walls were repelled by the garrison, causing great losses to the besieging forces. Ottoman attempts at finding and cutting the water sources failed and the same happened with a sapped tunnel, which crumbled suddenly. An offer of 300,000 aspra (Turkish money) and a graduation to the Turkish army made to commander of the garrison Vrana Konti was disdainfully rejected by him. By September the Ottoman camp was in disarray as morale sank and disease ran rampant. Murad II acknowledged the castle of Krujë would not fall by strength of arms and in October 1450, he lifted the siege and made his way to Edirne, leaving behind losses amounting to 20,000 dead. Soon thereafter in the winter of 1450–1451, Murad died in Edirne and was succeeded by his son Mehmed II. Although achieving a great success at resisting the Sultan himself, the country couldn't reap the harvest and famine was widespread. Following Skanderbeg's requests king Alfons of Naples helped him in this situation and the two parties signed in 1451 the Treaty of Gaeta, which was later used as an excuse for Skanderbeg in his Italian campaign. Also, in 1451 Skanderbeg married the daughter of Gjergj Arianiti, one of the most influential Albanian noblemen, strengthening the ties between them. For the next five years Albania was allowed some respite as the new sultan set out to conquer the last vestiges of the Byzantine Empire, though a couple of minor battles took place in the meanwhile at the Albanian frontiers, all of which were won by the Albanian Army. Christianity in the Balkans was dealt an almost fatal blow when the Byzantine Empire was extinguished after the Fall of Constantinople in 1453. The first real test between the armies of the new sultan and Skanderbeg came in 1455 during the Siege of Berat that would end in the most disastrous defeat Skanderbeg would suffer. Skanderbeg besieged the town's castle for months, causing the demoralized Turkish officer in charge of the castle to promise his surrender. At that point Skanderbeg relaxed the grip, split his forces and left the siege location. He left behind one of his generals, Muzakë Topia and half of his cavalry at the bank of the river Osum to finalize the surrender. It would be a costly error. The Ottomans saw this moment as an opportunity for attack. They sent a large cavalry force from Anatolia to Berat as reinforcements. The Albanian forces had become overconfident and lulled into a false sense of security. The Ottomans caught the Albanian cavalry by surprise while they were resting in the shores of the Osum. Almost all the 5,000 Albanian cavalry laying siege to Berat were killed. Most of the forces belonged to Gjergj Arianiti and this defeat minimized his role as the greatest supporter of Skanderbeg. This defeat affected somewhat the attitude of other Albanian noblemen. One of them Moisi Arianit Golemi defected to the Turks and in 1456 returned to Albania as a commander of a Turkish army of 15,000 strong, but was defeated by Skanderbeg in a swift battle. Later that year a remorseful Moisi Arianit Golemi returned to Albania asking for Skanderbeg's forgiveness, and once acquitted, remained loyal up to his death in 1464. In the beginning of 1457, another nobleman, Hamza Kastrioti, Skanderbeg's own nephew, defected to Turks. In the summer of 1457 an Ottoman army numbering approximately 70,000 men invaded Albania with the hope of destroying Albanian resistance once and for all; this army was led by Isa beg Evrenoz, the only commander to have defeated Skanderbeg's forces in the battle of Berat, and Hamza Kastrioti, Skanderbeg’s nephew. After wreaking much damage to the countryside the Ottoman army set up camp at the Ujebardha field (literally translated as "White water"), halfway between Lezhë and Krujë. After having avoided the enemy for months, calmly creating the impression to the Turks and European neighbours that he was defeated, on September 2, Skanderbeg attacked the Ottomans in their encampments and defeated them. This was one of the most important and glorious victories of Skanderbeg over the Ottomans, which led to a five-year peace treaty with Sultan Mehmed II. Hamza was captured and sent to detention in Naples. On 17 April 1461 Skanderbeg signed a three-year armistice with the sultan. This allowed him to launch in late summer 1461 a successful campaign against the Angevin noblemen and their allies (Francesco Piccinino) who sought to destabilize King Ferdinand I of Naples. For his services he gained the title of Duke of San Pietro in the Kingdom of Naples. After securing the Neapolitan kingdom, a crucial ally in his struggle, he returned home, informed of the Ottoman movements within the borders. There were three Ottoman armies approaching: the first one, under the command of Sinan Bey, was defeated in the Battle of Mokra (near Dibër); the second one, under the command of Hasan Bey, was defeated in the Battle of Ohër where the Turkish commander was captured; and the third one was defeated in the region of Shkupi. This forced the sultan to agree to a ten-year armistice which was signed in April 1463. Inspired by the Crusade declared by Pius II and hearing of the Pope and crusaders army presence in Ancona, in the beginning of August 1464 Skanderbeg's forces attacked and defeated Sheremet Bey's forces near Ohrid lake. But when the pope died and the crusade dispersed, Skanderbeg's forces remained alone against sultan. In April 1465 at the First Battle of Vajkal Skanderbeg fought and defeated Ballaban Badera, an Albanian Ottoman general. However, during an ambush in the same battle, Ballaban managed to capture some important Albanian noblemens, including Moisi Arianit Golemi, a cavalry commander; Vladan Giurica, the chief army quartermaster; Muzaka of Angelina, a nephew of Skanderbeg, and 18 officers. These men were sent immediately to Constantinople (Istanbul) where they were skinned alive for fifteen days and later cut to the pieces and thrown to the dogs. Skanderbeg's pleas to have these men back, by either ransom or prisoner exchange, failed. Later that same year two other Ottoman armies appeared on the borders. The commander of one of the Ottoman armies was Ballaban Badera, who together Jakup Bey, the commander of the second army, planned a double-flank movement: firstly, Skanderbeg attacked Ballaban's forces at the Second Battle of Vajkal where the Turks were defeated, but this time all the Turkish prisoners were slain in an act of revenge for the previous execution of Albanian captains; the other Turkish army, under the command of Jakup Bey, was also defeated some days later in Kashari field near Tirana. In 1466 Sultan Mehmed II personally led an army into Albania and laid siege to Krujë as his father had attempted sixteen years earlier. The town was defended by a garrison of 4,400 men, led by Prince Tanush Topia. After several months of siege, destruction and killings all over the country, Mehmed II (Fatih-The Conqueror), like Murad II, saw that seizing Krujë was impossible for him to accomplish by force of arms. Subsequently, he left the siege to return to Constantinople (Istanbul). However, he left a force of 40,000 men under Ballaban Pasha to maintain the siege, even building a castle in central Albania, which he named Il-basan (the modern Elbasan), to support the siege. Durrës would be the next target of the sultan, in order to be used as a strong base opposite the Italian coast. Skanderbeg spent the following winter in Italy, unsuccessfully seeking aid in Rome and Naples. However, on his return he allied with Lekë Dukagjini, and together on 19 April 1467 they first attacked and defeated, in Kërraba region, the Turkish reinforcements commanded by Jonima, the brother of Ballaban Pasha, while Jonima himself was killed. Four days later, on 23 April 1467, they attacked the Ottoman forces and laying siege to Kruja. The Second Siege of Kruja was eventually broken, resulting in the death of Ballaban Pasha by an Albanian arquebusier named Gjergj Aleksi. After these events, Skanderbeg's forces besieged Elbasan, but lacked artillery and sufficient numbers to capture it by direct assaults. The destruction of Ballaban Pasha's army and the siege of Elbasan, forced Mehmed II to march again in summer 1467 against Albania. He energetically pursued the attacks against the Albanian strongholds, while sending detachments to raid the Venetian possessions and to keep them isolated. The Ottomans failed again to take Kruja and subjugate the country, but the degree of destruction was immense. During the annual Ottoman incursions, Albanians suffered a great number of casualties, especially to the civilian population and the economy of the country was in ruin. The above problems, the loss of many Albanian noblemen and the new alliance with Lekë Dukagjini caused Skanderbeg to call together in January 1468 all the remaining Albanian nobleman to a conference in the Venetian stronghold of Lezhë to discuss the new war strategy and restructuring what remained from the League of Lezhe. During that period Skanderbeg fell ill to malaria and soon died on 17 January 1468. After his death none of the remaining Albanian nobleman had the authority and the stature to make organized resistance to the Turkish forces. Kruja was besieged again in 1474 and in 1478 was finally captured by the Ottoman forces. In 1479 an Ottoman army, headed by the Sultan himself, besieged and captured Shkodra and this marked the end of organised Albanian resistance. Skanderbeg's military successes evoked a great deal of interest and admiration from the Papal States, Venice, and Naples who were threatened by the growing Ottoman power. As an active defender of the Christian cause in the Balkans, Skanderbeg was also closely involved with the politics of four popes, including Pope Pius II, who hailed him as the Christian Gideon. Skanderbeg's relations with the Papal States were intensified under Pope Calixtus III. But Skanderbeg's military undertakings involved considerable expense, which the contribution of Alfons V of Aragon was not sufficient to defray. Following the Ottoman invasion in 1457 Skanderbeg requested help from Pope Calixtus III who was in financial difficulties. The pope could do no more than send Skanderbeg a single galley and a modest sum of money, promising more ships and larger amounts of money in the future. But Ragusa refused bluntly to release the funds which had been collected in Dalmatia for the crusade and, which according to the pope, were to have been distributed in equal parts to Hungary, Bosnia and Albania. The Ragusans even entered into negotiations with Mehmed. At the end of December 1457, Pope Calixtus III threatened Ragusa with an interdict and when this failed he repeated it in February 1458. After the victory of Ujëbardha on December 1457, Pope Calixtus III appointed Skanderbeg as captain general of the Curia in the war against the Turks, but once again Venice destroyed the prospects for a favorable turn in Albania by raising new claims. As the captain of the Curia, Skanderbeg appointed as a lieutenant in his native land, the duke of Levkas (Santa Maura), Leonard III Tocco, formerly the prince of Arta and "despot of the Rhomaeans" a figure virtually unknown except in Southern Epirus Profoundly shaken by the fall of Constantinople in 1453, Pope Pius II tried to organize a new crusade against the Ottoman Turks, and to that end he did his best to come to Skanderbeg's aid, as his predecessors Pope Nicholas V and Pope Calixtus III had done before him. The latter named him captain general of the Holy See. They gave him the title Athleta Christi, or Champion of Christ. Pope Pius II planned a crusade in which he would assemble 20,000 soldiers in Taranto and another 20,000 would have been gathered by Skanderbeg. They would have been summoned in Durazzo under Skanderbeg's leadership and would have organized the central front against the Ottomans. This plan forced Skanderbeg to break his 10 year peace treaty with the Ottomans signed in 1463, by attacking the Turkish forces near Ohrid. But Pope Pius II died at the crucial moment when the crusading armies were gathering and preparing to march in Ancona, in August 1464 and Skanderbeg was again left alone facing the Ottomans. The papacy was generous with praise and encouragement, but its financial subsidies were limited. It is possible tha curia only provided to Skanderbeg 20,000 ducats in all, which could have paid the wages of twenty men over the whole period of conflict. During the winter of 1466–7 when the situation was critical Skanderbeg spent several weeks in Rome trying to persuade Pope Paul II to give him money. At one point, he was unable to pay for his hotel bill, and he commented bitterly that he should be fighting against the Church rather than the Turks. Only when Skanderbeg left for Naples did Pope Paul II give him 2,300 ducats. The court of Naples, whose policy in the Balkans hinged on Skanderbeg's resistance, was more generous with money, armaments and supplies. Ragusa and Venice helped when it was their interest to do so. But it is probably better to say that Skanderbeg financed and equipped his troops largely from local resources, richly supplemented by Turkish booty. In the beginning of the Albanian insurrection, Venice was supportive of Skanderbeg, considering his forces to be a buffer between them and the Ottoman Empire. Accordingly, the League of Lezha was held in Venetic territory with the approval of Venice. The later affirmation of Skanderbeg and his rise as a strong force in their borders was seen as a menace to the interest of the republic and this led to a worsening of relations, leading to the case of Danja which triggered the Albanian-Venetic War of 1447–1448. Not withstanding the forces of Skanderbeg they sought by every means to overthrow, or bring about the death of, this "formidable one" , even offering a life pension of 100 ducats annually for the person who could do so. In that period they also requested the help of the sultan and when Skanderbeg defeated the Venetic army at Shkodra and the Turkish army at Oronik, they requested armistice and a peace treaty with "buoni amici e vicini" (good friends and neighbours) was signed on 4 October 1448. Venice agreed to pay Skanderbeg 1,400 ducats for keeping Danja and its environs but would cede to Skanderbeg the territory of Buzëgjarpri at the mouth of the river Drin, and also Skanderbeg would enjoy the privilege of buying, tax-free, 200 horse-loads of salt annually from the Venetic customs. During the First Siege of Krujë, the Venetic merchants furnished the besieging Ottoman army. The attack by Skanderbeg on their caravans raised tension between the parties, but the case was resolved with the help of the bail of Durrës which would not allow any Venetic merchants to furnish the Ottoman army. The senate of Venice further resented Skanderbeg's alliance with the Kingdom of Naples, an old enemy of the republic. Frequently they delayed their tributes to Skanderbeg and this was long a matter of dispute between the parties, with Skanderbeg threatening and Venice conceding. The position of the republic changed when they entered in their first war with the Turks (1463–1479). During this period the republic saw Skanderbeg as an invaluable ally, and in 1464 the peace treaty was renewed and this time other conditions were added: the right of asylum in Venice; an article precising that any Venetian treaty with the Turks would include a guarantee of Albanian independence; and allowing the presence of two Venetian ships in the Adriatic waters around Lezha. After the death of Skanderbeg, with the request of Skanderbeg's wife, a number of Venetian soldiers were added to the Albanian garrison of Kruja, while she went to take refuge to the Kingdom of Naples together with her 11 year old son Gjon Kastrioti and in this way, Venice was the de facto controller of what was once Skanderbeg's territory. The eventual defeat of Venice and of what remained of their Albanian allies at the Siege of Shkodra in 1479, marked the end of the organised Albanian resistance. According to some scholars, Skanderbeg and King Alfons kept secret contact when Skanderbeg was suba at Kruja around 1438. After his ascendance in 1443 they become part of Skanderbeg's diplomacy. The intensification began in 1447 when Skanderbeg got into conflict with Venice. King Alfons I was the main rival of Venice in the Adriatic and his dreams for an empire were always opposed by Venice. In 1448 Alfonso V of Aragon suffered a rebellion caused by certain barons in the rural areas of his kingdom in southern Italy. He needed reliable troops to deal with the uprising, so he called upon Skanderbeg for assistance. Skanderbeg responded to Alfonso's request for aid by sending to Italy a detachment of Albanian troops commanded by General Demetrios Reres. These Albanians were successful in quickly suppressing the rebellion and restoring order. King Alfonso rewarded Demetrios Reres for his service to Naples by appointing him Governor of Calabria. Two years later, in 1450, another detachment of Albanian troops was sent to garrison Sicily against a rebellion and invasion. This time the troops were led by Giorgio and Basilio Reres, the sons of Demetrios. In 1451 Albania was in ruin after sultan Murad II was successfully defeated at Kruja and now it was Skanderbeg's turn to ask for help from King Alfons. He sent his emissaries to Naples, and after some negotiations, Skanderbeg's representatives, Stephan the Bishop of Kruja and the Dominican Nichola de Berguzzi, signed on 26 March 1451 the Treaty of Gaeta. The treaty was signed not only in the name of Skanderbeg but also "... e de soi parenti, baruni in Albania, de la parte altra" (..... his relatives, barons in Albania, of the other part). According to the Treaty, Skanderbeg recognized King Alfons's sovereignty over his lands, in exchange for the help that King Alfons would give to him in his war against the Ottomans. Skanderbeg even promised to put the lands he and his relatives would eventually conquer from the Ottomans under King Alfons' sovereignty. King Alfons pledged to respect the old privileges of Kruja and Albanian territories and to pay Skanderbeg an annual 1,500 ducats, while Skanderbeg pledged to make his fealty to King Alfons only after the full expulsion of the Ottomans from the country, a condition never reached in Skanderbeg's lifetime. This fact (the oath never took place) expressively stated in the agreement has raised debate among scholars: was Skanderbeg to be called a vasal of King Alfons or not? Some maintain that although it looked like a typical vasal treaty, since this treaty was a conditional agreement and the condition was not fulfilled, then Skanderbeg was not even de jure a vasal of Aragon. What is generally accepted is that Skanderbeg de facto had full soverainity over his territories, while Naples archives have registered payments and supplies sent to Skanderbeg, they do not mention any kind of payment or tribute by Skanderbeg, except for various Turkish war prisoners and banners sent by him as a gift of King Alfons. At the same time Alfons V signed different treaties with other Albanian noblemen, including Golem Arianit Komneni and also the Despot of Morea Demeter Paleologue These movements of Alfons showed that he indeed was thinking about a crusade from Albania and Morea, a crusade which never took place. Following this treaty in the end of May 1451, a small detachment of 100 Catalan soldiers, headed by Bernard Vaquer, was established at the castle of Kruja. In May 1452 another Catalan nobleman, Ramon d’Ortafà, came to Kruja with the title of viceroy. In 1453 Skanderbeg paid a secret visit to Naples and the Vatican, probably discussing the new conditions after the fall of Constantinople and the planning of a new crusade which Alfons would have presented to the Pope Nicholas V in a meeting of 1453–1454. In November 1453 Skanderbeg informed King Alfons that he had conquered some territories and a castle and Alfons replied some days later that soon Ramon d’Ortafà would have returned to continue the war against the Ottomans (now more than ever) and also promised more troops and supplies. In the beginning of 1454 Skanderbeg and the Venetians informed King Alfons and the Pope about a possible Ottoman invasion and asked for help. The Pope sent 3,000 ducats while Alfons sent 500 infantry and a certain sum of money, along with a message directed to Skanderbeg. In June 1454 Ramon d’Ortafà returned after a long absence to Kruja, this time with the title of viceroy of Albania, Greece and Slavonia with a personal letter to Skanderbeg as the Captain general of the armed forces in Albania. Along with Ramon d’Ortafà, King Alfons V also sent to Albania the clerics Fra Lorenzo da Palerino and Fra Giovanni dell’Aquila with a tabby flag with an embroided white cross as a symbol of the Crusade which was about to begin. Even though this crusade never begun, the Neapolitan troops were used in the siege of Berat where they were almost entirely annihilated and there were never replaced. On 27 July 1458, King Alfons V the greatest supporter of Skanderbeg died at Naples while Skanderbeg sent three emissaries, Tanush Topia, Vladan Givrici and Angjelin Muzaka, to his son King Ferdinand. According to Marinescu the death of King Alfons marked the end of the Aragonese dream of a Mediterranean Empire and also the hope for a new crusade in which Skanderbeg was assigned a leading role. The relationship of Skanderbeg with the Kingdom of Naples continued even after Alfonso V's death. The situation changed; the natural son and heir of Alfons V Ferdinand I of Naples was not as able as his father and now it was Skanderbeg's turn to help King Ferdinand to regain and maintain his kingdom. In 1460 King Ferdinand had serious problems with another uprising of Angevins and asked for help from Skanderbeg. This invitation worried King Ferdinand's opponents, while Malatesta declared that if King Ferrante of Naples received Skanderbeg, Malatesta would go to the Turks. Ferdinand's main rival Giovanni Antonio Orsini, Prince of Taranto in a correspondence with Skanderbeg tried to dissuade him from this enterprise and even offered him an alliance. This did not affect Skanderbeg and in the beginning of 1461 Skanderbeg dispatched a company of 500 cavalry under his nephew, Gjok Stres Balsha. When the situation became critical, Skanderbeg made a three year armistice with the Ottomans and in late August 1461 landed himself in Puglia with an expedition of 1,000 cavalry and 2,000 infantry. At Barletta and Trani, he managed to defeat the Italian and Angevin forces of Giovanni Antonio Orsini, Prince of Taranto and only after he secured King Ferdinand's throne, did Skanderbeg returned to Albania. King Ferdinand was very grateful with Skanderbeg for this intervention and not only gave to him and his descendants the castle of Trani, properties of Mount Saint Angel and Saint John Rotondo, but also continued to support Skanderbeg with money and supplies. Skanderbeg paid another visit to Naples after he visited Rome in the winter of 1466–67 asking in vain for help. King Ferdinand's gratitude toward Skanderbeg continued even after his death. In a letter dated to 24 February 1468, he expressively stated that "Skanderbeg was like a father to us" and "We regret this (Skanderbeg's) death not less than the death of King Alfons", offering protection for Skanderbeg's widow and his son. It is relevant to the fact that the majority of Albanian leaders after the death of Skanderbeg found refuge in the Kingdom of Naples and this was also the case for the common peoples trying to escape from the Ottomans, which formed Arbëresh colonies in that area. The Albanian resistance went on after the death of Skanderbeg for an additional ten years under the leadership of Dukagjini, though with only moderate success and no great victories. In 1478, the fourth siege of Krujë finally proved successful for the Ottomans. Demoralized and severely weakened by hunger and lack of supplies from the year-long siege, the defenders surrendered to Mehmed, who had promised them to leave unharmed in exchange. As the Albanians were walking away with their families, however, the Ottomans reneged on this promise, killing the men and enslaving the women and children. In 1479 the Ottoman forces captured the Venetian-controlled Shkodër after a fifteen-month siege. Shkodër was the last Albanian castle to fall to the Ottomans and Venetians evacuated Durrës in 1501. Albanian resistance continued sporadically until 1912 when Albania was no longer part of the Ottoman Empire. The union which Skanderbeg had maintained in Albania did not survive him. Without Skanderbeg at their lead, their allegiances faltered and splintered until they were forced into submission. The defeats triggered a great Albanian exodus to southern Italy, especially to the kingdom of Naples, as well as to Sicily, Greece, Romania, and Egypt. Albania remained a part of the Ottoman Empire until 1912. The Ottoman Empire's expansion ground to a halt during the time that Skanderbeg and his Albanian forces resisted. He has been credited with being the main reason for delaying Ottoman expansion into Western Europe, giving the Italian city-states time to better prepare for the Ottoman arrival . While the Albanian resistance certainly played a vital role in this, it was one piece of numerous events that played out in the mid-15th century. Much credit must also go to the successful resistance mounted by Vlad III Dracula in Wallachia and Stephen III the Great of Moldavia, who dealt the Ottomans their worst defeat at Vaslui, among many others, as well as the defeats inflicted upon the Ottomans by Hunyadi and his major Hungarian forces. Stephen III the great and Hunyadi having also achieved the title of Athleti Cristi, Defenders of the Christian faith along with Skanderbeg. The particularity of Skanderbeg was the maintaining of such an important and difficult resistance for a long period of time (25 years) against the strongest power of the 15th century's world, by possessing very limited economical and human resources. His leading, political, diplomatical and military abilities was the main factor for the small Albanian principate to achieve such a success. Skanderbeg’s family, the Kastrioti Skanderbeg, were invested with a Neapolitan dukedom after the Turkish pressure became too strong. They obtained a feudal domain, the Duchy of San Pietro in Galatina and County of Soleto (Lecce, Italy). John, Scanderbeg’s son, married Irene Palaeologus, last descendent of the Byzantine imperial family, the Palaeologus. Thus, the Castriota Scanderbeg today represent the only descendants left of the last imperial family of Byzantium. Two lines of the Castriota Scanderbeg family live onwards in southern Italy, one of which descends from Pardo Castriota Skanderbeg and the other from Achille Castriota Skanderbeg, both being natural sons of Duke Ferrante, son of John and Scanderbeg’s nephiew. They are part of the Italian nobility and members of the Sovereign Military Order of Malta with the highest rank of nobility. The only legitimate daughter of Duke Ferrante, Irina Castriota Skanderbeg, born from Andreana Acquaviva d'Aragona from Nardò dukes, inherited the paternal estate, bringing the Duchy of Galatina and County of Soleto into the Sanseverino family after her marriage with prince Pietrantonio Sanseverino (1508 - 1559). They had a son, Nicolò Bernardino Sanseverino (1541 - 1606), but the legitimate Castrioti name was forever lost with Irina Castriota. His names have been spelled in a number of ways: George, Gjergj, Giorgi, Giorgia, Giorgio, Castriota, Kastrioti, Capriotti, Castrioti, Castriot, Kastriot, Skanderbeg, Skenderbeg, Scanderbeg, Skënderbeg, Skenderbeu, Scander-Begh, Skënderbej or Iskander Bey. The name, Skanderbeg has the following explanation: The name which can also be written "Skenderbeu" is the Albanian way of writing the Turkish name Iskender (derived from Alexander) and the Turkish Bey (Lord or prince). The last name Kastrioti refers to a toponym in northern Albania called Kastriot in Dibra, where Skanderbeg was born. His name was Gjergj Kastrioti and "Skander Bey" was not part of his name, "Skender" was given by the Sultan and he later also gave him the "Bey" title as he was awarded by the Turkish Sultan, meaning Lord Alexander, comparing Skanderbeg's military skill to that of Alexander the Great's. Thus his name was Gjerg Kastrioti and his title was "Lord Alexander". A seal ascribed to Skanderbeg has been kept in Denmark since it was discovered in 1634. It was bought by the National Museum in 1839. The seal is made of brass, is 6 cm in length and weighs 280 g. The inscription (laterally reversed) is in Greek and reads ΒΑΣΙΛΕΥΣ.ΑΛΕΞΑΝΔΡΟΣ.ΕΛΕΩ.ΘΥ. ΑΥΤ.ΡΩΜ.ΟΜΕΓ. ΑΥΘ.ΤΟΥΡ.ΑΛΒ. ΣΕΡΒΙ.ΒΟΥΛΓΑΡΙ. Most of the words are abbreviated, but an English translation might be: King Alexander, by the grace of God, Emperor of the Romans, the great ruler of the Turks, Albanians, Serbs, [and] Bulgarians. If this seal is authentic, it indicates that George Kastrioti declared himself king, using the name Skender in its Greek form. (Greek or Latin were the customary languages for royal inscriptions in the Middle Ages.) The titles highly exaggerate his actual power, but this was often the case for Medieval rulers. Skanderbeg is apparently seen as a successor of the Byzantine emperors, as shown by the title and the double-eagled crest, during this period a symbol of Byzantine power. After the fall of Constantinople in 1453 AD, such claims were also made by the Russian Czars. The "Dragon of Albania" Skanderbeg, is also credited with the greatest body count. He is said to have slain three thousand Turks with his own hand during his campaigns. Among stories told about him was that he never slept more than five hours at night and could cut two men asunder with a single stroke of his scimitar, cut through iron helmets, kill a wild boar with a single stroke and cleave the head off a buffalo with another. Skanderbeg today is the national hero of Albania. Many museums and monuments, such as the Skanderbeg Museum next to the castle in Krujë, have been raised in his honor around Albania and in predominantly Albanian-populated Kosovo. Skanderbeg's struggle against the Ottoman Empire became highly significant to the Albanian people, as it strengthened their solidarity, made them more conscious of their national identity, and served later as a great source of inspiration in their struggle for national unity, freedom, and independence. James Wolfe, commander of the British forces at Quebec, spoke of Skanderbeg as a commander who "excels all the officers, ancient and modern, in the conduct of a small defensive army". On October 27, 2005, the United States Congress issued a resolution "honoring the 600th anniversary of the birth of Gjergj Kastrioti (Scanderbeg), statesman, diplomat, and military genius, for his role in saving Western Europe from Ottoman occupation." Skanderbeg gathered quite a posthumous reputation in Western Europe in the 16th and 17th centuries. With virtually all of the Balkans under Ottoman rule and with the Turks at the gates of Vienna in 1683, nothing could have captivated readers in the West more than an action-packed tale of heroic Christian resistance to the "Moslem hordes". Books on the Albanian prince began to appear in Western Europe in the early 16th century. One of the earliest of these histories to have circulated in Western Europe about the heroic deeds of Skanderbeg was the Historia de vita et gestis Scanderbegi, Epirotarum Principis (Rome ca. 1508–1510), published a mere four decades after Skanderbeg's death. This History of the life and deeds of Scanderbeg, Prince of the Epirotes was written by the Albanian historian Marinus Barletius Scodrensis, known in Albanian as Marin Barleti, who after experiencing the Turkish occupation of his native Shkodër at firsthand, settled in Padua where he became rector of the parish church of St. Stephan. Barleti dedicates his work to Donferrante Kastrioti, Skanderbeg's grandchild, and to posterity. The book was first published in Latin and has since been translated in many languages. The work was widely read in the sixteenth and seventeenth centuries and was translated and/or adapted into a number of foreign language versions: German by Johann Pincianus (1533), Italian by Pietro Rocca (1554, 1560), Portuguese by Francisco D'Andrade (1567), Polish by Ciprian Bazylik (1569), French by Jaques De Lavardin, Seigneur du Plessis-Bourrot (Histoire de Georges Castriot Surnomé Scanderbeg, Roy d'Albanie, 1576), and Spanish by Juan Ochoa de la Salde (1582). The English version, translated from the French of Jaques De Lavardin by one Zachary Jones Gentleman, was published at the end of the 16th century under the title, Historie of George Castriot, surnamed Scanderbeg, King of Albinie; containing his Famous Actes, his Noble Deedes of Armes and Memorable Victories against the Turkes for the Faith of Christ. Gibbon was not the first one who noticed that Barleti is sometimes inaccurate in favour of his hero; for example, Barleti claims that the Sultan was killed by disease under the walls of Kruje. Kastrioti's biography was also written by Franciscus Blancus, a Catholic bishop born in Albania. His book "Georgius Castriotus, Epirensis vulgo Scanderbegh, Epirotarum Princeps Fortissimus" was published in Latin in 1636. Voltaire starts his chapter "The Taking of Constantinople" with the phrase |“||Had the Greek Emperors acted like Scanderbeg, the empire of the East might still have been preserved.||”| A number of poets and composers have also drawn inspiration from his military career. The French 16th century poet Ronsard wrote a poem about him, as did the 19th century American poet Henry Wadsworth Longfellow. For Gibbon, "John Huniades and Scanderbeg... are both entitled to our notice, since their occupation of the Ottoman arms delayed the ruin of the Greek empire." |“||Land of Albania! where Iskander rose, Theme of the young, and beacon of the wise, And he his namesake, whose oft-baffled foes Shrunk from his deeds of chivalrous emprize: Land of Albania! let me bend mine eyes On thee, thou rugged nurse of savage men! The cross descends, thy minarets arise, And the pale crescent sparkles in the glen, Through many a cypress grove within each city's ken." Canto II, XXXVIII. "Fierce are Albania's children, yet they lack not virtues, were those virtues more mature. Where is the foe that ever saw their back? Who can so well the toil of war endure? Their native fastnesses not more secure Than they in doubtful time of troublous need: Their wrath how deadly! but their friendship sure, When Gratitude or Valour bids them bleed Unshaken rushing on where'er their chief may lead.||”| Canto II, LXV.George Castriot, surnamed Scanderbeg, King of Albania. Ludvig Holberg, a Danish writer and philosopher, claimed that Skanderbeg is one of the greatest generals in history. Sir William Temple considers Skanderbeg to be one of the seven greatest chiefs without a crown, along with Belisarius, Flavius Aetius, John Hunyadi, Gonzalo Fernández de Córdoba, Alexander Farnese, and William the Silent. The Italian baroque composer Antonio Vivaldi composed an opera entitled Scanderbeg (first performed 1718). Another opera entitled Scanderbeg was composed by 18th century French composer François Francœur (first performed 1763). The Great Warrior Skanderbeg is a 1953 Albanian-Soviet biographical film. Skanderbeg fought in many major battles, most of which ended in victory for the Albanian side. Ballaban Pasha (Ottoman ocupation) |Prince of Kastrioti 28 November 1443 – 2 March 1444 |Head of League of Lezha 2 March 1444 – 17 January 1468
<urn:uuid:07d380c3-dfd1-4d64-8e89-7207c654314c>
{ "date": "2015-05-23T05:49:15", "dump": "CC-MAIN-2015-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927245.60/warc/CC-MAIN-20150521113207-00224-ip-10-180-206-219.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.970008909702301, "score": 2.859375, "token_count": 10401, "url": "http://www.thefullwiki.org/George_Kastriota" }
- 2 updates In order to develop a new DNA test that can identify men at high risk of recurring prostate cancer, scientists analysed biopsy tissue samples taken from 126 treated men with the disease who were thought to be at intermediate risk of their cancer returning. - Researchers then looked at each patient's whole genetic code, searching for missing, extra, or irregular sections of DNA so they could identify signature patterns linked to a high or low risk of recurring cancer - The test was used to predict outcomes for a second group of 150 patients who had their prostate tumours removed by surgery. - A secondary study found that tumours affected by hypoxia - starved of oxygen - were most associated with worse survival - Men with low levels of genetic changes and low hypoxia had the best outcomes, with 93% lasting five years without their cancer recurring - Only 49% of men with high levels of genetic alterations and high hypoxia escaped a cancer recurrence for five years. A new DNA test can identify men at high risk of recurring prostate cancer with almost 80% accuracy, say scientists. The biopsy test singles out patients likely to relapse after surgery or radiotherapy by looking for specific genetic changes at 100 sites in DNA. Researchers from the University of Toronto, Canada, believe the "genetic signature" test will help doctors determine which patients need extra help after initial treatment. Professor Robert Bristow, lead scientist, said: "Existing methods for identifying high risk patients are imperfect, so new tests are required that are better at predicting which patients will have their cancer recur. "These men can then be offered additional treatments, such as chemo and hormone therapy, that will combat the prostate cancer throughout their entire body, rather than therapies solely focused on the prostate, in order to improve their chances of survival. "This is the first report of a test using information derived from biopsy samples that can predict with close to 80% accuracy which men are at high or low risk of their prostate cancer recurring."
<urn:uuid:6f429040-daa5-45cb-957c-7dd3db71e9fb>
{ "date": "2016-05-05T03:33:22", "dump": "CC-MAIN-2016-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860125857.44/warc/CC-MAIN-20160428161525-00072-ip-10-239-7-51.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9584444165229797, "score": 2.765625, "token_count": 411, "url": "http://www.itv.com/news/story/2014-04-05/genetic-signature-breakthrough-in-prostate-cancer-tests/" }
About this book Lectures on scientific data, educational lectures, and the various other forms of oral presentation are the basis for every medical meeting. Physicians are not professionally trained in giving lectures. This becomes very obvious when you visit a medical meeting. Often the message of the presentation is lost because of poor preparation, slides that fail to communicate effectively, and a generally unconvincing performance by the lecturer. To give a high-quality lecture that will be remembered for its content and form, one first has to learn some basic rules about preparation, PowerPoint slides, and oral communication. After reading this book you will be able to overcome all the common presentation mistakes and to start a new career as a professional lecturer and esteemed faculty member. Medical Meeting Power Point Presentation communication education planning
<urn:uuid:141a58f2-ea44-4a47-81a8-a9861366a3a4>
{ "date": "2019-08-25T17:46:48", "dump": "CC-MAIN-2019-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330786.8/warc/CC-MAIN-20190825173827-20190825195827-00536.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9458923935890198, "score": 2.984375, "token_count": 157, "url": "https://link.springer.com/book/10.1007/978-3-642-12408-2" }
From Cape Canaveral, Florida, the space shuttle Challenger is launched into space on its second mission. Aboard the shuttle was Dr. Sally Ride, who as a mission specialist became the first American woman to travel into space. During the six-day mission, Ride, an astrophysicist from Stanford University, operated the shuttle's robot arm, which she had helped design. Her historic journey was preceded almost 20 years to the day by cosmonaut Valentina V. Tereshkova of the Soviet Union, who on June 16, 1963, became the first woman ever to travel into space. The United States had screened a group of female pilots in 1959 and 1960 for possible astronaut training but later decided to restrict astronaut qualification to men. In 1978, NASA changed its policy and announced that it had approved six women to become the first female astronauts in the U.S. space program. The new astronauts were chosen out of some 3,000 original applicants. Among the six were Sally Ride and Shannon Lucid, who in 1996 set a new space endurance record for an American and a world endurance record for a woman during her 188-day sojourn on the Russian space station Mir.
<urn:uuid:58b5266e-9d0c-43f8-9277-0eb7af2a160e>
{ "date": "2013-12-07T20:47:16", "dump": "CC-MAIN-2013-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163055810/warc/CC-MAIN-20131204131735-00002-ip-10-33-133-15.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.980839729309082, "score": 3.90625, "token_count": 238, "url": "http://www.history.com/this-day-in-history/first-american-woman-in-space" }
Monday October 18 2010 Luteolin, an antioxidant found in celery, improved memory in mice The Daily Mail reported, “remembering to eat your celery could halt memory loss”. It said that a plant compound called luteolin found in celery and peppers “reduces inflammation in the brain, which is associated with ageing and its related memory problems”. This news story reported on a small animal study, in which aged mice that were fed 20mg of luteolin a day performed better on a test of spatial memory. Using cells in the laboratory, the researchers also showed that luteolin could prevent the release of molecules that cause inflammation. Although this is interesting basic research that may give insight into at least one of the processes involved as the brain ages, its direct relevance to humans is limited. The mice were given a relatively high supplement of pure luteolin. There is not sufficient evidence to suggest that normal dietary consumption of luteolin–rich vegetables such as celery can improve memory in humans. Where did the story come from? The study was carried out by researchers from the University of Illinois. It was funded by The National Institute of Health in the US. The study was published in the peer-reviewed Journal of Nutrition. The Daily Mail’s report has exaggerated the relevance of this study to humans and the effect that eating celery might have on human memory. What kind of research was this? This laboratory study investigated how luteolin, an antioxidant found in celery, affected the inflammatory response of cells in tissue culture. The researchers then looked at how supplementing the diet of aged mice with luteolin affected their learning and memory. What did the research involve? This research was carried out in two parts. The first part investigated the effect of treating mouse cells with luteolin. The second part supplemented the diets of mice with luteolin and tested their spatial memory in a maze. The cells in the first part were from a cell line called BV-2, which is a mouse microglial cell line. Microglia are a type of cell found in the brain, and they play a role in the brain’s inflammatory response to infection. The researchers made the cells have an inflammatory response by treating them with a chemical called lipopolysaccharide (LPS). Some of these microglial cells were also incubated with luteolin and their response to LPS then assessed. The researchers also wanted to see whether inflammatory molecules released by the BV-2 cells in response to LPS would be toxic to neurones. To investigate this, they collected the liquid in which the BV-2 cells had been grown and placed this on a neurone cell line, then measured the amount of cell death. In the second part of the study, the researchers compared the performance of older mice (two years old) and younger mice (three to six months old) in a maze, and examined whether a dietary supplement of luteolin affected this performance. The maze, a water maze, is designed to test spatial memory. The researchers suggested that aged mice may have more brain inflammation and therefore worse memories, so should normally perform worse in the test. Here they wanted to test how luteolin might affect this. They used 26 adult mice and 26 aged mice. Half of each group was given a standard diet while the other half was also given a supplement of 20mg of luteolin a day for four weeks. After the experiment, the researchers assessed how much luteolin had been absorbed into the mouse blood. They also looked at which genes had been switched on in the hippocampus, a region of the brain that is associated with spatial memory. They determined the activity of the genes by looking at how much RNA was produced by each gene. What were the basic results? When exposed to LPS alone, the inflammatory response in the BV-2 cells was characterised by a greater release of a peptide called interleukin -1β (IL-1β) and an increased activity in the gene that produces IL-1β and three other genes involved in inflammation that were measured. BV-2 cells that had been treated with 50μmol/L of luteolin released 70% less IL-1β when exposed to LPS. Luteolin also reduced the activity of the gene that produced IL-1β and partially prevented the activity of the three other genes from being increased. When the liquid (in which the BV-2 cells had been grown and treated with LPS) was mixed with neurone-like cells, some of the neurone-like cells died. However, BV-2 cells that had also been treated with luteolin caused a reduced amount of death of the neurone-like cells. The researchers found that aged mice performed poorer on the water maze task, swimming further before they found the target. However, aged mice that had been given luteolin performed as well as the younger adult mice on this task. There was no difference in the performance of younger adult mice that had the luteolin-supplemented diet or normal diet. The aged mice had higher levels of IL-1β mRNA in their hippocampus than adult mice, indicating that the IL-1β gene is more active in aged mice. The IL-Iβ gene was less active in the aged mice that had been fed luteolin. How did the researchers interpret the results? The researchers suggest that luteolin improves spatial working memory in aged mice by affecting the microglial-associated inflammation in the brain's hippocampus. They suggest that luteolin consumption may be beneficial in preventing or treating conditions that involve increased microglial cell activity and inflammation. This small animal study demonstrated that luteolin can interfere with microglial-mediated inflammation and improve spatial memory in aged mice, suggesting that microglial inflammation may play a role in spatial memory loss in mice. This is a small animal study, and its relevance to human memory loss is limited. The mice were given 20mgs of luteolin per day, corresponding to 0.6% of their food intake. It is not clear if humans would need the same proportion to have a similar effect, whether this is feasible, or even if microglial–mediated inflammation plays a major role in memory impairment in normal ageing in humans. This study provides further information into the basic science of ageing. Although it is common sense to eat vegetables such as celery and peppers as a source of fibre and vitamins, there is insufficient evidence to suggest that normal dietary consumption of luteolin–rich vegetables can improve memory.
<urn:uuid:d0e5b69f-9a4a-4f55-8482-d586472d12b8>
{ "date": "2017-03-23T06:17:30", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186780.20/warc/CC-MAIN-20170322212946-00396-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9763042330741882, "score": 2.796875, "token_count": 1374, "url": "http://www.nhs.uk/news/2010/10October/Pages/celery-superfood-improved-memory-claim.aspx" }
Cool video, but there's nothing in that which indicates sentience- every apparent emotion or reaction or speech could be no higher awareness than the computer doing what it was programmed to do. This dude named Searle had shown the Turing test wasn't adequate- a computer for example which has the power to communicate with a user so that the user cannot distinguish from a human being does not after all actually indicate the computer is self aware or understands what it is communicating. Searle showed in a hypothetical thought experiment that a person could act similarly as a computer, but not have any idea what he is communicating. Suppose, says Searle, you don't read, speak, or understand Chinese. You are placed in an isolated room where someone on the outside pushes through slips of paper with Chinese characters printed on them. Suppose there are instructions available that gives you possible responses as outputs to the inputs you received, you just look them up, like a program. By analogy, you would be acting in the same way as a computer, although you don't actually have understanding of what you are communicating. Well yes, it is not relevant to make proof of something with the analogy of another, and when this other thing is only hypthetical . IF the instructions given are not outside the person who doesn't speak nor understand Chinese, but inside him, he speaks and understands Chinese, simply. And isn"t a computer program inside the machine ?
<urn:uuid:54649017-03d7-4035-baed-fcc4b8472ba4>
{ "date": "2015-04-19T19:07:35", "dump": "CC-MAIN-2015-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246639414.6/warc/CC-MAIN-20150417045719-00164-ip-10-235-10-82.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.977775514125824, "score": 2.734375, "token_count": 288, "url": "http://simhq.com/forum/ubbthreads.php/ubb/showflat/topic/354604/gonew/1.html" }
Imagine a population in which nine of every 10 people who tested positive for HIV, the virus that causes AIDS, hadn't known they had it, and might be transmitting it to their partners. That was the one finding presented in July at the global AIDS conference in Barcelona. The study was not conducted in Africa or Asia or somewhere else far away. It was conducted by the federal Centers for Disease Control and Prevention, and the population it examined was young men who have sex with other men. The study surveyed 5,700 gay and bisexual men of all races between the ages of 15 and 29 in six major U.S. cities. It found that 573 of them had the virus, but 77 percent of the infected men were unaware of their HIV status. That was mainly because they had not been tested recently -- if at all -- and didn't consider themselves at high risk. Breaking it down by race, the researchers reported that 60 percent of whites and 70 percent of Hispanics didn't know they were infected; the comparable figure for blacks was 91 percent. The subset of black men was so small that projecting that percentage to a larger population is problematic. Still, the implications are frightening. The study suggests that the relatively stable rate of AIDS cases in this country (about 40,000 new diagnoses a year) may be masking a future upsurge in the disease. The study also adds to evidence that the burden of this life-wasting illness is falling disproportionately on ethnic minorities, especially blacks. Blacks represent more than half of all new HIV infections. And they make up 75 percent of the HIV infections among heterosexuals -- a sector that has been increasing steadily since 1994. Experts list numerous reasons for this. Black men have higher levels of poverty, less access to health care and higher rates of incarceration. Homosexuality also tends to carry more of a stigma in the black community, and young men may not think of themselves as gay even if they have sex with other men. There is also widespread mistrust of the health system. If you believe AIDS is a conspiracy, that coda relieves you of personal responsibility.
<urn:uuid:24ad0a98-4851-4e8f-afd5-8a3deb21a5b6>
{ "date": "2017-03-23T06:31:24", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186780.20/warc/CC-MAIN-20170322212946-00396-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9817489385604858, "score": 2.765625, "token_count": 429, "url": "http://articles.sun-sentinel.com/2002-08-04/news/0208010722_1_black-men-hiv-infections-bisexual-men" }
Continuing on with the theme of Connected Educator Month for the month of August we have a great presentation from a teacher in Indonesia who is blazing the trail! When: Wednesday, August 22nd, 8-9pm, Melbourne, Australia time (gmt+10, utc+10) About this session: Ben Sheridan will share strategies and techniques for connecting teachers and classrooms as well as give examples of collaborative classroom projects. He will talk about how to use these connections allow children to work collaboratively on various projects. The tools discussed will include : Twitter, Blogs, Skype, Google Documents, Wikis, iPads and more! About our Presenter: Ben Sheridan is currently a kindergarten teacher and technology coach at Pasir Ridge International School in Balikpapan, Borneo Indonesia. He has also taught 4th and 5th grades as well as Pk through high school technology. Over the course of his teaching career he has had the opportunity to teach in Cambodia, Korea and the United States. This past year he has presented at 21st Century Learning Hong Kong as well EARCOS in Bangkok on how to connect teachers and classrooms. Come along, learn some amazing ways of using technology to connect and share in the conversations. Here is the link to the recording Have you used these tools to connect teachers and classrooms? If so, which are your favourite and how have you used them?
<urn:uuid:df737729-5a1e-4159-b988-11496253ab2e>
{ "date": "2018-01-19T01:54:29", "dump": "CC-MAIN-2018-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887692.13/warc/CC-MAIN-20180119010338-20180119030338-00656.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9658299684524536, "score": 2.8125, "token_count": 286, "url": "https://murcha.wordpress.com/2012/08/22/etlking-connecting-teachers-and-classrooms/" }
Samizdat was the underground literature of the Soviet Union. Since many authors were banned, and could not publish their works, people used typescripts to circulate their work. Penalties for being caught with copies of banned works was severe. Owning a printing press required permission, and all forms of printing required a licence. However, typewriters were common and, with the aid of carbon paper, many copies of the best works were produced and circulated. Once samizdats were in circulation, they sometimes got into the West. Several important works were published from samizdat and translated, before they were published in the Soviet Union.
<urn:uuid:d6432d98-f1bf-41b6-ab5b-4ec177054cbc>
{ "date": "2016-02-06T18:37:18", "dump": "CC-MAIN-2016-07", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701147492.21/warc/CC-MAIN-20160205193907-00264-ip-10-236-182-209.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9934398531913757, "score": 3.25, "token_count": 131, "url": "https://simple.wikipedia.org/wiki/Samizdat" }
Astronomy Picture of the Day Discover the cosmos!Each day a different image or photograph of our fascinating universe is featured, along with a brief explanation written by a professional astronomer. 2011 September 9 Explanation: Sweeping through planet Earth’s night sky, last weekend Comet Garradd (C/2009 P1) visited this lovely star field along the Milky Way in the constellation Vulpecula. Suggestively oriented, the colorful skyscape features stars in the asterism known as the Coat Hanger with the comet’s tail pointing toward the southeast. Also known as Al Sufi’s Cluster, the Coat Hanger itself is likely just a chance alignment and not a cluster of related stars. But compact open star cluster NGC 6802 does grace the field of view just right of the Coat Hanger, near the edge of the frame. Below naked eye visibility but approaching 7th magnitude in brightness, Comet Garradd has been a good target for binoculars and small telescopes. Still, bright moonlit skies this week will make the comet harder to spot.
<urn:uuid:a62644bb-1e4d-486b-a4ab-4d05a61e1b50>
{ "date": "2016-09-30T10:01:17", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662159.54/warc/CC-MAIN-20160924173742-00282-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.900122344493866, "score": 3.046875, "token_count": 222, "url": "https://witchesofthecraft.com/2011/09/09/astronomy-picture-of-the-day-for-sept-9th/" }
When harvested, fresh fruit continues to undergo chemical changes which can cause spoilage and deterioration of the product. Therefore, these products should be frozen as soon after harvest as possible and at their peak degree of ripeness. Fresh produce contains chemical compounds called enzymes which cause the loss of color, loss of nutrients, flavor changes, and color changes in frozen fruit. In fruit, these enzymes can cause brown colors and the loss of vitamin C. The most common control chemical is ascorbic acid (vitamin C). Ascorbic acid may be used in its pure form or in commercial mixtures with sugars. To maintain top quality, frozen fruit should be stored at 0 degrees F or lower. Most frozen fruit maintains high quality for 8 to 12 months. Unsweetened fruit loses quality faster than fruit packed in sugar or sugar syrups. Use high quality containers which are moisture and vapor proof so that moisture can be kept in the product and air kept away from it. Rigid containers made of plastic are suitable for all packs and are especially good for liquid packs. There are three ways to pack fruit for freezing: sugar pack, syrup pack, and unsweetened pack. Sugar pack: sprinkle the required amount of sugar over the fruit. Gently stir until the pieces are coated with sugar and juice. Sugar syrup: dissolve the needed amount of sugar in cold water. Stir the mixture and let stand until the solution is clear. To Freeze Fruit - Wash and sort fruit carefully and discard parts that are of poor quality. - Prepare fruit as you will use it. - Check the chart for fruit being frozen to see if an anti-browning treatment is suggested. Use ascorbic acid preparation as recommended in the chart or in the manufacturer's instructions. - Use dry sugar, or sugar syrup in proportions suggested in the chart. Dissolve sugar needed in cold water. Stir. Allow to stand until sugar is completely dissolved. Do not heat. You may hold sugar syrup 2 days in the refrigerator. If you are preparing a sugarless pack of fruit that browns, be sure to treat with ascorbic acid or other anti-browning agents. - Pack into plastic freezer bags, freezer containers, or freezer jars. Allow ½ inch headspace for expansion. Pack fruit, such as peaches, that tends to darken, in rigid containers and under the syrup by placing crumpled wax paper between lid and fruit. - How to Prepare Fruits for Freezing - Freezing Food: Questions and Answers - Mini module: Freezing Fruit for Sweet Success - Syrup Pack for Freezing Fruits — National Center for Home Food Preservation Reviewed by Suzanne Driessen 2014
<urn:uuid:b5c847d9-2498-40c9-87b0-3a3602e41b20>
{ "date": "2016-10-27T15:04:33", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721347.98/warc/CC-MAIN-20161020183841-00562-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9221006035804749, "score": 3.234375, "token_count": 558, "url": "http://www.extension.umn.edu/food/food-safety/Preserving/fruits/freezing-fruit/" }
WILLSBORO — For those tending vegetable gardens in the North Country, tomatoes are most likely the most common and treasured crop. They can also be beset with problems. Cornell Cooperative Extension (CCE), in conjunction with the Baker Research Farm in Willsboro, has been at the forefront in developing new varieties, preserving and promoting heritage assortments and finding ways to combat molds and other problems that plague the juicy fruits. VALUED CROP STATEWIDE According to CCE, “In 2013, Empire State farmers planted 2,900 acres of tomatoes for an estimated value of $32.4 million. Most field production is devoted to determinate cultivars with plastic mulch, drip irrigation and stake-and-weave trellises essential production elements for early and quality yields." Determinate tomatoes, also called bush tomatoes, grow to a compact height, approximately four feet. They stop growing when fruit sets on the top bud, ripen all their crop at or near the same time usually over a two-week period, and then they die. Indeterminate varieties, or vining tomatoes, produce fruit all season until killed by frost and can reach heights of 10 feet. Greenhouse and high-tunnel production is on the rise in New York with structures of less than one tenth to in excess of 40 acres under protection. High tunnel is a fairly large, semi-circular tent-like plastic covering. Indeterminate, greenhouse lines, as well as heirloom varieties, are grown under protected cultivation. Tomatoes are a popular crop with New York fresh market vegetable farmers due to high demand and fair prices. The Cornell Vegetable Program conducts a number of research projects each year addressing improved tomato production. “A lot of people want the heirloom varieties, and many don’t want to try the new ones as they claim they don’t taste as good,” said Amy Ivy, Cornell Extension educator. She then had attendees at a workshop at the Baker Farm taste approximately 10 varieties, which in addition to the heirloom varieties had names like Primo Red, Red Deuce, Clermon, Geronimo and Rebelski. Several of the aforementioned varieties are intended for greenhouse production, and thus are not as common as the garden varieties such as Beefsteak. COVERED CULTIVATION POPULAR Judson Reid, a state vegetable specialist from Cornell Cooperative Extension, provided insight about high-tunnel agriculture, more specifically growing tomatoes in these structures. High tunnel and greenhouse agriculture can be more profitable due to higher yields, generally 20 pounds per plant but as much as 30 pounds have been recorded. There is also the ability to plant earlier and extend into the fall due to more moderate temperatures. However, once mold or other pathogens have been introduced on a few plants, the rest are more susceptible in the semi-enclosed environment. “A challenge to tomato growers is how to prune. It takes a lot of attention. You don’t just prune once. Pruning also allows more nutrients to go to the tomatoes and allows for better air flow between plants. It’s primarily a job you have to stay ahead of,” Reid said. Determining which variety to produce for sale is generally determined by customer preferences. How tomatoes look is more likely to attract more business, especially in the supermarkets. At farm stands and farmers markets, the consumer can be given a sample to taste. “What we are trying to produce are disease-resistant plants, but they are not always the best tasting,” Reid explained. The workshop terminated at the Carriage House Garden Center in Willsboro to allow for Michael McCauliffe to discuss a variety of problems he has been having growing tomatoes. To counteract leaf mold, McCauliffe showed off his plants in which the leaves were coated with copper hydroxide. Email Alvin Reiner at: [email protected]
<urn:uuid:d92f2293-27ed-4d73-9172-ffdf699cec4f>
{ "date": "2014-07-25T08:58:10", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894140.11/warc/CC-MAIN-20140722025814-00072-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9510756731033325, "score": 2.71875, "token_count": 823, "url": "http://pr-business.pressrepublican.com/agribusiness/x611403235/Tomato-growing-delightful-but-dicey" }
The technological parameters of laser direct metal deposition (DMD) were researched by DMD forming experiments using 2Cr13 powder. Fixing other parameters, the lower of laser power, the smaller the characteristic sizes of cladding layer are. Increasing of laser power, cladding height would firstly increase and then decrease, cladding width would firstly increase and then almost maintain constant, while cladding depth would gradually increase. When other parameters are invariable, with increasing of powder feeding speed, cladding height would increase, cladding width and cladding depth would decrease. When other parameters are invariable, cladding width, cladding height and cladding depth would decrease with the adding of scanning speed. The microstructure of single track cladding had three typical patterns, cellular dendritic, column dendritic and equiaxed crystal. The patterns depended on the temperature gradient and the solidification velocity. Under different technical parameters, the average hardness of specimens would change from 300HV0.2 to 550HV0.2.
<urn:uuid:16fd9d38-d620-4e5c-9dd7-9f1b82ef91a3>
{ "date": "2017-05-24T12:29:31", "dump": "CC-MAIN-2017-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607813.12/warc/CC-MAIN-20170524112717-20170524132717-00359.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8793748617172241, "score": 2.640625, "token_count": 211, "url": "https://www.scientific.net/AMR.69-70.54" }
Henry Purcell has been one of my greatest favourites for several years, and I believe he is the greatest British composer ever. I am not alone to believe this. A couple of years ago, Classic CD had this as their cover story. View the cover here (108 Kb). Henry Purcell was born into a family of musicians, and he has a musical upbringing as a boy chorister (as have many other British composers). It was very fortunate for young Henry that he was born at the time he was, and not earlier. Cromwell's regime ended in 1660, and it was a good thing for the musical establishment. Cornwall destroyed the musical establishment in Britain, and they had to began all over again when Charles II entered the throne. So, there were few musicians around when Purcell was born. Purcell worked with the British Court until the 1680's, where he began composing more for the theatre (f.ex his semi operas.). Purcell made some of his greatest music for the royals. As good examples I can mention his odes, welcome songs, anthems and services. He also made instrumental music. During the 1690's Purcell wrote mostly for the theatre (f.ex. the Fairy queen, King Arthur and the Indian queen), but he did also write a beautiful and move ode on the death of Queen Mary in 1695 (and the same music were performed in his own funeral a few months later). My favourite Purcell work is his opera "Dido & Aeneas". It lasts normally around fifty minutes. It is not complete as some of the music has been lost. We are not sure when it was completed either. Some sources suggest 1684 and others 1689. The last one is confirmed, but there are some insecurity about the first date. No complete score excist from Purcell's own time, the oldest is from around 1770. I have attended two concerts with music by Henry Purcell. That was back in 1995. It was one recital with James Bowman and a conctertant performance of Dido & Aeneas. Both backed by Robert King and The King's Consort. See the program cover here.
<urn:uuid:496fc6b0-881d-46ef-a4ee-83867afdd4c1>
{ "date": "2018-10-20T03:18:38", "dump": "CC-MAIN-2018-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512501.27/warc/CC-MAIN-20181020013721-20181020035221-00376.warc.gz", "int_score": 3, "language": "en", "language_score": 0.988996684551239, "score": 2.8125, "token_count": 453, "url": "http://www.steenslid.com/music/purcell/index.htm" }
The Tundra swan is a small swan that lives in Holarctic regions. Its feathers are white, though sometimes its head and neck feathers become slightly red if it is in an area of iron-rich food. It has black legs, feet and beak and close to its eyes there is a distinctive yellow mark. Babies are gray with pink beak, feet and legs. They develop adult plumage within two years. Tundra swans are natives of regions of North America, Asia, Europe, north Africa, and the Caribbean. Tundra swans of North America are migratory and consist of two populations: an eastern population and a western one. During the summer mating season, the western birds inhabit Alaska's southwestern coast, from the Aleutian Islands to Point Hope, and above Canada's Arctic circle. During the winter, they live in the Arctic slope in Alaska to the Californian Central Valley. In the summer mating season, the eastern birds live in the Pacific Ocean and migrate southward via Canada, and into North America's Great Lakes region. During the wintering season, the swans inhabit Maryland, Virginia, Georgia, North Carolina, South Carolina, and Florida. Tundra swans live in freshwater pools, lakes, grasslands, and marshes. At the time of migration, they occur in lakes and rivers along their migratory route. Tundra swans are social birds and interact with others within their population. The most stable unit for a swan is the family, which consists of both parents, the 3 to 7 cygnets they have produced that year, and sometimes young from previous years. These swans forage by dipping their heads and upending while in shallow water. They graze on land, digging with their bills. They will sometimes feed when it is a moonlit night. Aggressive encounters are related to dominance in a hierarchy. Males establish dominance by fighting to protect their families. Swans in the same family use pre-flight signals to ensure that family members take off at the same time. Males tend to lead flights in the autumn and the females in the spring. Such signals include opening the wings, head bobbing, neck stretching and bending repeatedly prior to flight, and other visual displays. Tundra swans are herbivorous and consume plants, including grasses, sedges, and smartweed. Grasses they eat include mannagrass and seagrass. The swans prefer the flowers, stems, tubers and roots. They eat some invertebrates like shellfish. Tundra swans are monogamous, staying with the same mate over their lifetime. They choose mates of similar age and size, and so the largest and oldest pairs are generally more dominant. To help in establishing dominance, males fight in order to protect their mates. Mating pairs breed every year, in late May until late June, both parents helping in raising their young. They build nests of vegetation, often sedges, moss and grasses, placing the material on dry elevated ground. Females lay 3-5 yellowish to white eggs and incubation lasts for 31-32 days. The cygnets are cared for by both male and female and remain in the nest for three days. The young fledge around 60-75 days after they hatch. Until about the age of 2, the cygnets follow their mother closely. Sometimes siblings will rejoin their family, either with a mate or without one. Tundra swans can reproduce at 3 years old, but may not begin mating until the age of 4 or 5. Tundra swans are threatened by the loss and degradation of wetland habitats as a result of drainage (e.g. peat-extraction, petroleum pollution, and changing wetland management practices) and the mowing and burning of reeds. The Arctic breeding habitat is threatened by gas and oil exploration. The species is further threatened by oil pollution (oil spills) in pre-migrational staging and molting areas, from collisions with powerlines, from lead poisoning from fishing weights and lead shot ingestion on wintering grounds and during migration. The Tundra swan is a victim of poaching in north-west Europe and hunting for sport in North America as well as hunting for subsistence in all of its range. The global population of the Tundra swan, according to the Birdlife resource, is estimated to be 317,000-336,000 individuals, including 5,000-6,000 pairs in Europe, 50-10,000 wintering birds in China and 100-10,000 breeding pairs in Russia. Currently Tundra swans are classified as Least Concern (LC) on the IUCN Red List.
<urn:uuid:7a01ece2-c0fc-413c-ae9b-6d70be3be934>
{ "date": "2018-12-14T19:24:45", "dump": "CC-MAIN-2018-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826306.47/warc/CC-MAIN-20181214184754-20181214210754-00296.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9564352631568909, "score": 3.96875, "token_count": 973, "url": "http://animalia.bio/tundra-swan" }
The Nebraska Legislature is proud to offer the following programs and features for use in the classroom. To learn more information or participate in one of our civic education programs, e-mail the Unicameral Information Office or call (402) 471-2788. America's Legislators Back to School Program: Sponsored by the National Conference of State Legislatures, this program brings senators into the classroom to visit with students about lawmaking and democracy. Since the program's inception in 2000, Nebraska senators have visited more than 70,000 students across the state. Capitol Classroom: This is a unique curriculum that teaches students about the nation’s only unicameral legislature by providing a committee hearing simulation, floor debate simulation and public policy development exercise. Unicameral Kids: This teaching tool is designed for use in a classroom of fourth-graders. Featuring videos, coloring pages and fun facts about the Legislature, the site prepares students for an upcoming field trip to the Capitol. Unicameral Youth Legislature: The Unicameral Youth Legislature combines a three-day legislative simulation with leadership-building and social activities to help young Nebraskans better understand the workings of our representative democracy. The youth legislature, designed for students ages 14-17, takes place at the Nebraska State Capitol and the University of Nebraska-Lincoln. Warner Institute for Education in Democracy: Named for the late Nebraska Sen. Jerome Warner, the Warner Institute is a comprehensive collection of civic education programs that includes projects available to teachers and students across Nebraska. It is hoped that students who participate in these programs will gain a greater understanding of their role as citizens and an appreciation for representative democracy. Visit our publications page to learn about and order printed materials about the Nebraska Legislature.
<urn:uuid:12d107c1-47a8-49d6-b790-338dcdb3b8b1>
{ "date": "2014-03-09T04:48:46", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999673133/warc/CC-MAIN-20140305060753-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9203470945358276, "score": 2.71875, "token_count": 358, "url": "http://uniweb.legislature.ne.gov/education/student_programs.php" }
Laura Overdeck knelt in the driveway of her Tudor home, smashing an eggbeater with a hammer. She wasn’t wreaking vengeance for a failed omelet or fallen meringue. She wanted to take it apart to show how it worked. In 2012, Ms. Overdeck, who majored in astrophysics at Princeton, founded Bedtime Math, a nonprofit organization that aims to improve children’s number skills by teaching that “math is playtime,” as she puts it. She sees the Oxo Good Grips eggbeater as a beautiful exemplar of simple mechanics: how force exerted over a short distance (one turn of the crank) produces force over a longer distance, at higher velocity (five and a half spins of the beaters). But unlike the skeletal eggbeaters of old, the Oxo model hides its cogs inside a plastic casing. This makes cleanup easier — no errant flecks of egg congealing on naked gears — and deconstruction more difficult. (The beater blades, by contrast, conveniently pop off with the push of a button for tossing into the dishwasher.) Ms. Overdeck had spent 15 minutes worrying the joint between the plastic and the processed-rubber handle with a flathead screwdriver before resorting to the hammer. (The tools were a gift from her father; as a child, she dismantled and repaired her parents’ turntable, which they still use today.) Now the eggbeater lay in two pieces on the asphalt outside her home in Short Hills, N.J., its gears exposed, large toothed wheels nestled against smaller ones. A second eggbeater had been kept in reserve should the evening’s dinner plans require whipped cream, as they often do. Ms. Overdeck is a spirited cook, with a special concentration in the field of dessert, but also a proponent of cooking as a stealth method of teaching fractions, algebra and geometry. She may ask her three children, ages 6 to 11, to calculate the measurements for making one and a half times a recipe. “Kids are motivated to make more cookies,” she said. Food is the theme of her next book in the Bedtime Math series, collections of slightly madcap, exuberantly illustrated math problems, meant to be as fun and essential a part of a child’s nightly routine as a bedtime story. (Additional problems are posted online daily.) Bedtime Math grew out of experiences with her own children: When her oldest was 2, they started counting the noses and ears of her stuffed animals before bed. Five years later, all three children were demanding customized math problems at night, often involving ninjas. “In our house, math is like dessert,” Ms. Overdeck said. She picked up the split-open eggbeater. “It’s basically Lego inside,” she said, comparing the gears to a Lego Crazy Action Contraptions kit, one of her children’s favorite toys. Later, she was able to reattach the beater blades and found that it still worked. She now uses it instead of the intact one, she said, “because it’s just that much more interesting.”
<urn:uuid:8ec4e459-87a2-4105-8c9d-aa6d32180823>
{ "date": "2019-01-16T08:56:27", "dump": "CC-MAIN-2019-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657097.39/warc/CC-MAIN-20190116073323-20190116095323-00496.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9654796123504639, "score": 2.671875, "token_count": 678, "url": "https://www.nytimes.com/2015/05/27/dining/bedtime-math-founder-laura-overdeck-eggbeater.html" }
A file is a named collection of related data that appears to the user as a single, contiguous block of data and that is retained in storage. Storage refers to computer devices or media which can retain data for relatively long periods of time (e.g., years or decades), such as disk drives and magnetic tape. This contrasts with memory, which which retains its contents only briefly and which physically consists of RAM (random access memory) chips. Executable files consist of instructions that have been translated from their original source code into machine code, also called machine language or object code through the use of a specialized program called a compiler so that the CPU can use them directly and without further translation. Machine code consists entirely of zeros and ones, which represent the off and on states of the CPU logic circuits and memory cells. The object code files and any other necessary files (e.g., library files) are then linked together using a linker to create the executable. Linkers are generally included in compilers, and the linking is performed automatically. Executable files are usually stored in one of several standard directories on the hard disk drive (HDD) on Unix-like operating systems, including /bin, /sbin, /usr/bin, /usr/sbin and /usr/local/bin. Although it is not necessary for them to be in these locations in order to be operable, it is often more convenient. When a program is launched, its executable file is copied into memory by the operating system so that its machine code will be immediately available to the CPU. In operating systems in which the type of file is indicated by appending an extension after its name, executables are indicated by extensions such as .exe, .com or .bin. Such extensions are generally not necessary in Unix-like operating systems. Although application programs usually come to mind when the term executable is used, this term also refers to scripts, utilities and even operating systems. A script is a small program written in a scripting language (i.e., a type of simplified programming language). Scripts are stored in plain text files that must be interpreted (i.e., converted on the fly into machine language) by a shell (a program that provides the traditional, text-only user interface for Unix-like operating systems) or other program each time they are executed, rather than being compiled in advance. Unix-like operating systems make extensive use of scripts for controlling the operation of the system. vmlinuz is the Linux kernel executable. A kernel is a program that constitutes the central core of a computer operating system. In addition to being an executable, vmlinuz is also bootable. This means that it is capable of loading the operating system into memory so that the computer becomes usable and other executables can then be run. Created July 9, 2005. Updated June 3, 2006.
<urn:uuid:83eee29c-4877-4ae4-af6c-40efa26a0c85>
{ "date": "2014-07-25T08:56:40", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894140.11/warc/CC-MAIN-20140722025814-00072-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9580040574073792, "score": 3.796875, "token_count": 587, "url": "http://www.linfo.org/executable.html" }
A Tragedy of the Commons archetype occurs when multiple agents acting in rational self interest escalate their actions such that they deplete a shared, erodible resource. Each individual’s action does not create a noticeable dent, but all the commons acting together amplifies the damage, leading to a situation that none of them are happy about. This occurs because each actor that engages in the tragic behavior reaps benefits, while the costs are shared by all in the system. For example, farmers sharing a patch of land have the incentive to purchase more cows in order to increase each farmer’s profit. But too many cows on the shared grasses leads to overgrazing, and no more grass for any cow down the line – everyone suffers. Fisherman may over-fish during one season, depleting the fish population entirely so that there aren’t enough fish left to reproduce and regrow the fish population for the next fishing season. If we didn’t have traffic lights or stop signs today, cars at intersections would each try to cross, leading to massive traffic jams. Oil companies wanting to grow profits will compete with each other to drill for oil, not paying attention to the possibility that they may reach the resource’s limits. When a small percentage of people use health insurance-covered services, they may accumulate enough costs to exceed the current budget capacity, which may mean higher health insurance premiums for all. During emergency evacuations, every one running for the stairs can crowd the limited space and make every one slower at exiting. Even the Federal Budget is a shared resource that costs everyone (we all pay taxes). Therefore, we get into heated debates about where the budget money is going – entitlement programs, for example, benefit a particular group of people only; meanwhile, those that do not benefit from these programs often times pay the most in taxes. Tragedy of the Commons occurs because the actors do not pay attention to the effects of their actions – there is too long of a delay. Therefore, they continue their undesirable behavior until it’s too late to undo or fix the resource. Other times, the actors are very well aware of the situation, but it is not in their interests to slow down if they recognize that others will reap all the benefits. How to Fight It Tragedy of the Commons can be combatted in 3 ways: - Educating people (this can eliminate the delay in feedback between the resource depletion and the actors being aware of their behaviors causing this to occur) - Enforcing laws limiting use of a resource - Privatizing the resource so that each participant must pay for the the direct impact of his/her actions Index of Archetypes:
<urn:uuid:931c6579-c57f-4d29-bf0e-ce7904f0dfad>
{ "date": "2020-01-21T17:51:29", "dump": "CC-MAIN-2020-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250604849.31/warc/CC-MAIN-20200121162615-20200121191615-00456.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9470600485801697, "score": 3.234375, "token_count": 553, "url": "https://systemsandus.com/archetypes/tragedy-of-the-commons/" }
Researchers at ETH Zurich have manufactured transparent electrodes for use in touchscreens using a novel nanoprinting process. The new electrodes are some of the most transparent and conductive that have ever been developed. From smartphones to the operating interfaces of ticket machines and cash dispensers, every touchscreen we use requires transparent electrodes: The devices' glass surface is coated with a barely visible pattern made of conductive material. It is because of this that the devices recognise whether and where exactly a finger is touching the surface. Researchers under the direction of Dimos Poulikakos, Professor of Thermodynamics, have now used 3D print technology to create a new type of transparent electrode, which takes the form of a grid made of gold or silver "nanowalls" on a glass surface. The walls are so thin that they can hardly be seen with the naked eye. It is the first time that scientists have created nanowalls like these using 3D printing. The new electrodes have a higher conductivity and are more transparent than those made of indium tin oxide, the standard material used in smartphones and tablets today. This is a clear advantage: The more transparent the electrodes, the better the screen quality. And the more conductive they are, the more quickly and precisely the touchscreen will work. "Indium tin oxide is used because the material has a relatively high degree of transparency and the production of thin layers has been well researched, but it is only moderately conductive," says Patrik Rohner, a PhD student in Poulikakos' team. In order to produce more conductive electrodes, the ETH researchers opted for gold and silver, which conduct electricity much better. But because these metals are not transparent, the scientists had to make use of the third dimension. ETH professor Poulikakos explains: "If you want to achieve both high conductivity and transparency in wires made from these metals, you have a conflict of objectives. As the cross-sectional area of gold and silver wires grows, the conductivity increases, but the grid's transparency decreases." The solution was to use metal walls only 80 to 500 nanometres thick, which are almost invisible when viewed from above. Because they are two to four times taller than they are wide, the cross-sectional area, and thus the conductivity, is sufficiently high. Ink-jet printer with tiny print head The researchers produced these tiny metal walls using a printing process known as Nanodrip, which Poulikakos and his colleagues developed three years ago. Its basic principle is a process called electrohydrodynamic ink-jet printing. In this process scientists use inks made from metal nanoparticles in a solvent; an electrical field draws ultra-small droplets of the metallic ink out of a glass capillary. The solvent evaporates quickly, allowing a three-dimensional structure to be built up drop by drop. What is special about the Nanodrip process is that the droplets that come out of the glass capillary are about ten times smaller than the aperture itself. This allows for much smaller structures to be printed. "Imagine a water drop hanging from a tap that is turned off. And now imagine that another tiny droplet is hanging from this drop - we are only printing the tiny droplet," Poulikakos explains. The researchers managed to create this special form of droplet by perfectly balancing the composition of metallic ink and the electromagnetic field used. The next big challenge will now be to upscale the method and develop the print process further so that it can be implemented on an industrial scale. To achieve this, the scientists are working with colleagues from ETH spin-off company Scrona. They have no doubt that once it is upscaled, the technology will bring a host of advantages compared with existing methods. In particular, it will likely be more cost-efficient, as Nanodrip printing, unlike the production of indium tin oxide electrodes, does not require a cleanroom environment. The new electrodes should also be more suitable for large touchscreens due to their higher conductivity. And finally the process is also the first to allow you to vary the height of the nanowalls directly while printing, says ETH PhD student Rohner. Another possible future application could be in solar cells, where transparent electrodes are also required. The more transparent and conductive they are, the more electricity that can be harnessed. And lastly, the electrodes could also play a role in the further development of curved display using OLED technology. Explore further: Transparent, electrically conductive network of encapsulated silver nanowires Julian Schneider et al. Electrohydrodynamic NanoDrip Printing of High Aspect Ratio Metal Grid Transparent Electrodes, Advanced Functional Materials (2015). DOI: 10.1002/adfm.201503705
<urn:uuid:a47ce7af-700c-4c5d-b069-213096317717>
{ "date": "2017-01-23T17:18:04", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00082-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.931210458278656, "score": 3.765625, "token_count": 986, "url": "https://phys.org/news/2016-01-nanowalls-smartphones.html" }
Effects of Fires on Foraging and Breeding Wading Birds in the Everglades Nests, eggs, and chicks of nesting wading birds were unharmed by two fires in the Everglades. However, at least 50 adult White Ibises (Eudocimus albus) foraging away from the breeding colonies were killed during one fire. These results are counter-intuitive given that well-flighted adult birds seem more capable of escaping a fire than immobile nests or eggs. Nests probably were unharmed because of their location in wet willow (Salix carolina) and buttonbush (Cephalanthus occidentalis) islands. The adult birds foraging in a small cattail (Typha angustifolia) stand may have been trapped by flames in surrounding tall sawgrass (Cladium jamaicense) or debilitated by smoke inhalation. These observations provide insight into the direct effects of fire on wading bird breeding colonies and individual survival.
<urn:uuid:1d612a4a-b660-49f8-a6a4-0e30fc0feb1a>
{ "date": "2017-05-25T18:07:18", "dump": "CC-MAIN-2017-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608120.92/warc/CC-MAIN-20170525180025-20170525200025-00135.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9342811703681946, "score": 3.15625, "token_count": 205, "url": "http://scholarworks.boisestate.edu/bio_facpubs/112/" }
In its newly released annual report, the Consumer Financial Protection Bureau lays out a pretty solid case for doubling down on financial education. One in four adults in the U.S. fails to pay all their monthly bills on time and 44% cannot cover an emergency expense of $400 without borrowing or selling something, the report states. Most people compare prices when shopping for a car but about half do not compare loan prices or terms to buy the car. Many also do not comparison shop before obtaining common financial products like a credit card, the report states. Student loan borrowers seem to walk blindly into years of crushing debt payments. According to the FINRA 2015 National Financial Capability Study, which is sourced in the CFPB annual report, many student loan borrowers do not understand their loan terms. A majority do not estimate monthly payments before obtaining a student loan. Most say that if given a second chance they would take a different course of action. More than half of U.S. adults surveyed in the FINRA study had not tried to figure out how much they need to save for retirement. The FINRA study also found that many misuse credit in ways that increase the cost of that credit. An OECD assessment of the financial literacy of 15-year-olds in countries around the world, also sourced in the CFPB annual report, found that students in the U.S. ranked between seventh and ninth in financial literacy among 15 participating developed economies. In the U.S., 21.6%—about one in five—do not reach the baseline level of proficiency in financial literacy.
<urn:uuid:6478c4cb-77d9-4a06-aa6c-e6fd24c79931>
{ "date": "2019-08-19T07:39:21", "dump": "CC-MAIN-2019-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314696.33/warc/CC-MAIN-20190819073232-20190819095232-00296.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9632543325424194, "score": 2.59375, "token_count": 321, "url": "http://www.rightaboutmoney.com/by-the-numbers-why-we-need-financial-education/" }
As part of a series of electronic professional development experiences for educators, the NASA Explorer Schools project and the National Science Teachers Association are hosting a 90-minute live professional development Web seminar for educators on Dec. 19, 2012, at 6:30 p.m. EST. This Web seminar will introduce the Forces and Motion: Balloon Aerodynamics Challenge for students. This activity provides firsthand information about density, neutral buoyancy and drag, which is then used to solve a problem. The activity provides many opportunities for incorporating national mathematics, science and technology learning standards into your curriculum. This seminar will be repeated on Apr. 17, 2013. For more information and to register online, visit http://learningcenter.nsta.org/products/symposia_seminars/NES3/webseminar19.aspx. To learn more about the NASA Explorer Schools project, visit http://explorerschools.nasa.gov. Email any questions about this opportunity to the NES Help Desk at [email protected].
<urn:uuid:646096ea-b71b-4cc3-9a3c-ca985bb3ad9f>
{ "date": "2015-03-29T22:24:03", "dump": "CC-MAIN-2015-14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298755.8/warc/CC-MAIN-20150323172138-00198-ip-10-168-14-71.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8271933197975159, "score": 2.828125, "token_count": 219, "url": "http://spaceref.com/news/viewsr.html?pid=42949" }
A task which depends on members of the group noticing the needs of others and responding. Imagine starting with one yellow cube and covering it all over with a single layer of red cubes, and then covering that cube with a layer of blue cubes. How many red and blue cubes would you need? We can show that (x + 1)² = x² + 2x + 1 by considering the area of an (x + 1) by (x + 1) square. Show in a similar way that (x + 2)² = x² + 4x + 4 List any 3 numbers. It is always possible to find a subset of adjacent numbers that add up to a multiple of 3. Can you explain why and prove it? Pick a square within a multiplication square and add the numbers on each diagonal. What do you notice? Create some shapes by combining two or more rectangles. What can you say about the areas and perimeters of the shapes you can make? Think of a number and follow my instructions. Tell me your answer, and I'll tell you what you started with! Can you explain how I know? Crosses can be drawn on number grids of various sizes. What do you notice when you add opposite ends? How to build your own magic squares. Jo has three numbers which she adds together in pairs. When she does this she has three different totals: 11, 17 and 22 What are the three numbers Jo had to start with?” There is a particular value of x, and a value of y to go with it, which make all five expressions equal in value, can you find that x, y pair ? Account of an investigation which starts from the area of an annulus and leads to the formula for the difference of two squares. Water freezes at 0°Celsius (32°Fahrenheit) and boils at 100°C (212°Fahrenheit). Is there a temperature at which Celsius and Fahrenheit readings are the same?
<urn:uuid:0f8b9828-b264-42fb-aef4-e100b9e59080>
{ "date": "2014-09-23T16:25:28", "dump": "CC-MAIN-2014-41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657139314.4/warc/CC-MAIN-20140914011219-00212-ip-10-234-18-248.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9222950339317322, "score": 3.625, "token_count": 426, "url": "http://nrich.maths.org/public/leg.php?code=-58&cl=2&cldcmpid=6945" }
This lesson is a branch from Area 4 from the Playbook for Beginners and Beyond main lesson. Visit the main lesson to see my philosophy on the five different areas of learning to play. In the first two parts of this series, we talked about The Note Names and Intervals. As usual, open this chart and practice: [INDENT]Do Re Mi Play the note scale Play the chord scale See and hear the connection Sing or hum as you play[/INDENT] If you don't know what this means, please open up the first lesson, The Major Scale Chord Chart: Part 1. Be sure to read each line of the chart from left to right. The Chords: Harmonizing the Major Scale Harmonization of the major scale is achieved by beginning with the root note, the 1st scale degree note, and then skipping every other note to play a total of 4 notes. This routine continues using the same note names and intervals within a key until you have seven sets of notes, creating chords. Although this is a huge topic, I want to present the basics because this is how we come up with The Chords. Let's stay with the key of C to begin. - Looking only at the line of notes within the key of C (C, D, E, F, G, A, B and back to C), if we start with C and begin playing every other note until we have 4 notes, then we come up with C, E, G and B notes to give us the Cmaj7 chord. - Staying with the line of notes within the key of C, we begin with the 2nd scale degree note: D. If we play D and then play every other note until we have 4, then we come up with D, F, A and C, which gives us the Dm7. - Then we start with the third scale degree, E, which gives us the E, G, B and D notes; the Em7. - The F, A, C and E notes gives us the Fmaj7 chord. - The G, B, D and F notes together are the G7 chord. - The A, C, E and G notes give us the Am7 chord. - The B, D, F and A notes make up the Bm7b5 chord. Break it Down If you then look at the collection of each set of notes, you can understand why the chords were named as they were: - The maj7 chord uses the 7th note of the major scale which is only a half step under the root. - The minor chords are minor because the 3rd scale degree is following Rule #1, which makes the chord have a third note which is flatted by a half step from the regular major chord (the full harmonized minor chords also have the characteristic of having the 7th degree of the scale being flatted). - The G7, which is the 5th chord degree, is called a dominant 7 chord because it is a major chord using the major 3rd scale interval note which also uses a 7th scale degree note which is a full-step behind the root (hey, it's only following the Rule #1!). One of the original names for this chord was the 'major minor' chord because the front triad has major intervals (G, B and D notes) but the back triad has minor intervals (B, D and F notes). - The m7b5 is minor chord for previous described reasons, but it also has a flatted 5th scale degree note. It's also only following Rule #1! We've stayed in the key of C because there are no sharps and flats. It makes it easier to see the theory in whole. When we move forward to the key of D, we begin to experience notes that are sharp. Why is that? Why is it that when we get to the key of F we a flat note (Bb)?? Figure it out. It's all in the chart. I'll give you a hint: it has to do with the first two statements of the chart. For a more robust conversation on this issue, check out this thread here at GfB&B. These are how The Chords are made. You'll notice that the chord names in the chart have been shortened to their basics. To let you know what's going on, please check out the next lesson in this series, The Major Scale Chart: Part 4.
<urn:uuid:4788c54d-e016-4193-846c-22932f264e15>
{ "date": "2014-12-23T04:24:33", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802778085.5/warc/CC-MAIN-20141217075258-00051-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9558942914009094, "score": 4.03125, "token_count": 941, "url": "http://www.guitarforbeginners.com/forum/topic/10095-the-major-scale-chart-part-3-all-levelsany-styletheory/page__pid__603689" }
We are coming to the end of National Bullying Prevention Month, a good time to ask just how does the U.S. compare with other countries when it comes to bullying? Ranking countries on their bullying records isn’t easy. For one, the word “bully” has different connotations in different languages. For another, children are – for understandable reasons – not always forthcoming on the topic. - The Health Behavior in School-Aged Children (HBSC) survey examined bullying among approximately 200,000 school-aged children in 40 countries (2005-2006). Still, this global survey on bullying behaviors across 40 countries reveals some fascinating and sometimes surprising facts. To explore the results yourself, launch the data explorer. - Boys reported higher rates of bullying in all countries. Girls are more likely to employ indirect forms of aggression. These include gossiping and spreading rumors. - Physical aggression tends to decrease as children age. Although verbal aggression–think insult and threats–increases as children get older. As to national differences… - The differences between countries can be pretty stark. Among Swedish girls, for example, fewer than 5 per cent reported any involvement in bullying activities, compared to nearly 36 per cent of Lithuanian girls. - The United States is bang in the middle of the rankings – not the best but certainly not the worst either. - Countries with the lowest reported incidents of bullying are Hungary, Norway, Ireland, and Finland. The highest rates are in Lithuania, Latvia, and Greece. Here are some more interesting facts and figures from around the world: In Japan and South Korea, bullying is more likely to focus on social exclusion rather than any beating up among classroom peers. An entire classroom might discriminate against one individual. In Japan, this form of social segregation is known as ijime. The prize-winning documentary below tells the story of one Japanese teacher determined to tackle bullying and other problems by making his students talk openly, in class, about their feelings. The general consensus among experts is that bullying is not on the rise. What’s changing is how it’s expressed because of new media technologies. Take Indonesia. It’s the fourth most populous country in the world and the largest Muslim country. And it’s also one of the most socially networked. Indonesia has the third-largest community of Facebook users in the world. It also produces 15% of the world’s tweets! A recent poll suggests that Indonesian children are among the most cyberbullied. In fact, more than 50 per cent of Indonesian adults reported that they know of a child who has been bullied online. The U.S. and Canada take a hard line with bullying: zero tolerance policies are more likely than not. That’s in contrast to Europe and Australia where policymakers have tended to see the problem as an education issue that requires training for both bullies and victims. Does zero tolerance work? Experts say not necessarily. McGill University’s Shaheen Shariff points to new legislation in Ontario that requires schools to punish offenders as well as to federal legislation that calls for “harsher and lengthier sentences for younger, and younger offenders.” Shariff warns: “If you’re going to expel these kids, or put them through the criminal justice system, where is the educational value?” Anti-bullying measures developed in the Nordic countries are broadly viewed as the gold standard. Norwegian researcher Dan Olweus [who has spoken exclusively with Latitude News] has developed one of the most popular intervention programs to date. Now, a new type of anti-bullying program out of Finland is generating significant interest among bullying experts worldwide. Known as KiVA, the program aims to involve all students and teachers in tackling bullying, including bystanders. The results have been so promising that 90 per cent of comprehensive schools in the Finland have implemented the program. This is an updated version of an article that originally appeared on February 20.
<urn:uuid:69ee18ee-43f2-4f74-9f55-15aa94cfee24>
{ "date": "2014-07-25T08:58:08", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894140.11/warc/CC-MAIN-20140722025814-00072-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9497772455215454, "score": 3.296875, "token_count": 830, "url": "http://www.latitudenews.com/story/what-country-has-the-most-bullies-2/" }
Bereans Honor MLK, Jr. 1/17/2007 Author(s): Jay The Berea College community celebrated the life and vision of Dr. Martin Luther King, Jr. during several public events beginning January 14. Bereans march to city hall during during Martin Luther King, Jr. Day Following a street march to City Hall, Bereans gathered in Phelps Stokes Chapel to hear activist Carl Ray recount witnessing his fatherís brutal 1962 murder by a white supremacist. Ray is a former engineer and stand-up comedian. Later that evening, Ray performed ďA Killing in Choctaw," a one-man, two-act play he wrote that depicts his life growing up in Alabama and the hate killing of his father. Through the end of January Hutchins Library will feature a timeline exhibit showing scenes from the struggle for civil rights.
<urn:uuid:d9a0b466-26cd-41f7-a55d-0be9073701b6>
{ "date": "2013-05-18T17:37:35", "dump": "CC-MAIN-2013-20", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9791247844696045, "score": 2.703125, "token_count": 176, "url": "http://webapps.berea.edu/bcnow-archive/story.asp?ArticleID=921" }
First Solar, GE Energy Financial Services, and Verve Energy announced today a partnership to build Australia's first utility-scale solar plant. At 10 megawatts, Greenough River Solar Farm will be the largest operating solar plant in the country, and the solar energy it generates will be put to a very specific use. All of its energy will go toward supporting a seawater desalination plant in Western Australia currently under expansion. The Southern Seawater Desalination Plant in Binningup, Australia, which is run by the WA Water Corporation, has signed a 15-year contract to purchase all of the solar energy generated from the solar farm. Theto staving off a water crisis in Australia, which has not seen the rainfall needed to support its growing population in Western Australia, including the Perth metropolitan area. In early August, it was announced that the desalination plant capacity would have to be doubled within a year to make up for a lack of rainfall in the area, and meet the expected water demands of 2012 and 2013. "The expansion of the SSDP was necessary because we can no longer rely on rainfall run-off into our dams as a major source of drinking water. This was never more apparent than at the end of the 2010 winter which was the driest since records began. We had to act decisively as a government and take direct action now. This decision is a major step in providing security to our water supplies even in the driest of years," said Simone Knox, Australian minister for water, in a statement. When the expansion is complete the desalination plant is expected to generate approximately 50 gigaliters (over 13 billion gallons) of drinking water annually. "Last year only 13 billion liters flowed into the dams, which is a fraction of the volume of water we rely on from the dams to meet supply. This year, we have also only had around 13 billion liters of inflow with the winter months two thirds over. Normally we would expect around 36 billion liters by this time of year," according to the WA Water Corp. Financial Services and Verve Energy will each own a 50 percent stake in the solar plant. will provide 150,000 of its photovoltaic modules, as well as provide the engineering design, construction, and maintenance of the 10-megawatt solar plant. The project is part of the Australian federal government's plan for the country to be on 20 percent renewable energy by 2020.
<urn:uuid:ffa5e7ae-abeb-4a15-8d4a-183d6969dc83>
{ "date": "2014-07-31T23:24:31", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273676.54/warc/CC-MAIN-20140728011753-00408-ip-10-146-231-18.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9677425622940063, "score": 2.859375, "token_count": 505, "url": "http://www.cnet.com/news/australia-to-get-its-first-utility-scale-solar-plant/" }
Only a fraction of the scientific data recorded with everything from big radar dishes to a 10-meter telescope with adaptive optics to the large IR satellite Herschel have been reported yet, but it can already be stated 2005 YU55 will probably be the best studied minor planet (not directly visited by a spacecraft) ever: a live-blog tracked the news from Nov. 6 til 10 and has many pictures, videos and links; since wrapping I've seen more videos here, here, here, here and here - also an improved radar movie, a late wire story and a simulation of what would have happened had YU55 impacted Earth. In other planetary system news a long press release on a meteorite found by a Missouri farmer - a 17-kilogram pallasite! - and pictures of a bright Dutch bolide of Nov. 12. • Another - very faint - detection of (ex-)Elenin on Nov. 8, a great picture of comet Garradd of Oct. 30 - and C/2010 S1 (LINEAR) approaching the Bubble Nebula on Nov. 12. • How Venus & Mercury were easy - when you were in Australia. • Some selected Jupiter images of Nov. 13, Nov. 6 (more) and Oct. 23 - and a breathtaking animation of Jupiter images taken with the Pic du Midi 1 m telescope in October! The huge sunspot group 1339 is almost history after - despite breathless articles like here, here and here - crossing the solar disk w/o further incidents: some selected pictures of a fine prominence today, the white and H-Alpha Sun (more) and a huge filament on Nov. 12, the white Sun full of spots on Nov. 11, a spotted sunrise on Nov. 10, the full disk + detail on Nov. 9, the group at the center on Nov. 8, the group and a spotty sunset (another one = an APOD) on Nov. 7, the full disk, detail, H-Alpha and spotty sunset on Nov. 6, detailled drawings of Nov. 5 (also a photo) of Nov.5 and earlier drawings of AR 1339. • Plus no superflares (more), strange jumping sundogs - and the likely end of the leap second.
<urn:uuid:f5867acc-cb40-4585-9ce3-405bc2def209>
{ "date": "2017-02-20T01:45:36", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00144-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8820654153823853, "score": 2.578125, "token_count": 462, "url": "http://cosmos4u.blogspot.com/2011/11/earth-visit-of-big-dark-asteroid-widely.html" }
Experiments showed that we underestimated possibilities of spiders to hear the world: they distinguish a sound perfectly and already from several meters. Spiders have no ears, but it doesn’t mean that they hear nothing. Numerous thin tactile hairs (trikhobotriya) on their extremities right there react to vibration of air or a solid surface – a floor or a wall. It is considered that it allows them “to hear”, catching acoustic vibrations, though it isn’t too good, from distance to several centimeters. However, judging by the new data published in Current Biology log we strongly underestimated abilities of arachnoid and their sensitive hairs. The experiments made by the American researchers led by Gil Menda showed that they perfectly hear also at a distance in several meters. Scientists used North American spiders-skakunchikov of Phidippus audax into whose nervous system they entered microelectrodes. It allowed to register activity of neurons and to show that those are activated even in response to the sound made from 3-5 m – for example, cotton or a scratch of the moved chair. Taking into account the sizes of a body of these spiders, one may say, that their sensitive hairs allow them to hear everything within the room from a distance about 350 lengths of a body of the spider as though the person heard everything from 600 m. Authors marked that in response to low frequency oscillations (within 80-400 Hz) force P. audax to fade: this frequency corresponds to a sound which is made by waves of wings of the predatory wasps dangerous to these spiders. Perhaps, led need to note approximation of threat to development in them of such excellent hearing.
<urn:uuid:c8e24a45-49e8-4705-8d8b-3d1523c73623>
{ "date": "2017-01-18T20:12:56", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280319.10/warc/CC-MAIN-20170116095120-00450-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9610627889633179, "score": 3.671875, "token_count": 351, "url": "http://earth-chronicles.com/science/scientists-have-measured-acoustical-abilities-of-spiders.html" }
BRINGINGSCIENCE Agricultural Experiment Station / Cooperative Extension ServiceTO YOURLIFECOLLEGE OFAGRICULTURE ANDHOME ECONOMICSThe U.S. Dairy Industryand International Tradein Dairy ProductsTechnical Report 42 Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 1The U.S. Dairy Industry andInternational Trade in Dairy ProductsThe U.S. Dairy Industry produced over $20billion in sales in 2002. New Mexico rankedseventh nationally in dairy products sales,contributing over $730 million to the stateeconomy in 2002 (U.S. Census Bureau,2004). The Dairy sector accounted forapproximately 11% of national agriculturalsales in 2002, and dairy is the top contributorto the New Mexican economy, accounting for37% of agricultural cash receipts in 2003. Theimportance of this sector to New Mexicowarrants the need for a comprehensive reportof industry issues and challenges, both from adomestic production standpoint as well as aninternational trade perspective.The Structure of U.S. Dairy ProductionLocationAlthough milk is produced in all 50 states,the bulk of U.S. dairy production is heavilyconcentrated in only a few states. In 2004,five states accounted for 52% of milkproduction and 10 states accounted for 71%of milk produced. These states are, in orderof importance, California, Wisconsin, NewYork, Pennsylvania, Idaho, Minnesota, NewMexico, Michigan, Texas and Washington.(NASS, 2004).There are 10 dairy production regions inthe United States.: Northeast, Lake States,Corn Belt, Northern Plains, Appalachian,Southeast, Delta States, Southern Plains,Mountain and Pacific (Table 1). TheNortheast, Lake States and Corn Belt areThe U.S. Dairy Industry andInternational Trade in Dairy ProductsEreney Hadjigeorgalis1generally known as the traditional dairyregions (Blayney, 2002). Idaho, New Mexicoand Washington State, which are located inthe Mountain and Pacific Regions,respectively, have displaced the traditionaldairy states of Iowa, Ohio and Missouri inrecent years. The importance of Westernregions as major sources of milk supplies isnow a significant feature of the U.S. dairyindustry (Blayney, 2002).The fastest-growing milk-producingstates are Idaho and New Mexico (NASS,2004). From 2000-2004, milk productionincreased 28% in New Mexico and 26% inIdaho. This increase is attributable to increasesin both cow numbers and production percow. Texas has also grown rapidly since 2002.1Assistant Professor, Department of Agricultural Economics and Agricultural Business, New Mexico State University, Las Cruces, N.M.Table 1: U.S. Dairy Production RegionsRegion StatesNortheast Maine, Vermont, New York,Pennsylvania, Maryland, Connecticut,New Hampshire, Delaware, RhodeIsland, Massachusetts, New JerseyLake States Michigan, Minnesota, WisconsinCorn Belt Iowa, Missouri, Ohio, Illinois, IndianaNorthern Plains North Dakota, South Dakota,Nebraska, KansasAppalachian Virginia, West Virginia, Kentucky,Tennessee, North CarolinaSoutheast Florida, South Carolina, Georgia,AlabamaDelta States Mississippi, Louisiana, ArkansasSouthern Plains Texas, OklahomaMountain Arizona, New Mexico, Colorado,Utah, Nevada, Wyoming, Idaho,MontanaPacific California, Washington, OregonSource: Blayney, 2002 Agricultural Experiment Station / Cooperative Extension Service • Technical Report 422Milk production there increased 13% from2002 to 2004.Most U.S. dairy cows are Holsteins,which generally are more productive thanother breeds (USDA-b, 2002). In 2004,there was an average of 9 million milk cowsin the United States, with an average annualproduction per cow of 18,957 pounds. Milkcow operations totaled 81,440, with anaverage number of cows per operations ofjust over 110 (NASS, 2004).Farm SizeThe U.S. dairy industry is dominated bysmall, family operations. Over 70% of dairyfarms were family owned or familycorporations in 2002 (Blayney, 2002).However, in recent years there has been anincrease in the importance of large-scale dairyoperations. In 2004, 77.7% of productioncame from operations of 100 cows or more,up from 52.2% in 1993. Approximately 43%of herd inventory corresponded to operationsthat had 500 or more cows. Although theselarge farms (greater than 100 cows)accounted for nearly half of the milkproduced, they only represented 22% of alloperations (NASS, 2004). Several of thesedairies are multiple herd operations spreadover wide geographical areas (Blayney, 2002).Most dairy farmers belong to producer-owned cooperatives, which assemblemembers’ milk and move it to processors andmanufacturers (USDA b, 2002). Milk can besold as fluid milk or cream, or it can beprocessed into an array of manufactureddairy products. Sales of fluid milk productstypically represent only one-third of totalmilk supply (USDA-b, 2002). Half of themilk supply is used to produce cheese, ofwhich cheddar is the most popular followedby mozzarella (USDA-b, 2002).U.S. milk production has remainedlargely flat over 2002-04. There were largesurplus stocks of nonfat dry milk in 2003.Food aid shipments, subsidized exports andinternal issues are expected to reduce endingstocks by nearly a quarter, and production ofnonfat dry milk is also forecast to fall for asecond year in a row (USDA-FAS, 2003).Dairy Production in New MexicoNew Mexico has been one of the fastestgrowing dairy states. It is ranked seventh inthe nation for milk production and eighthfor cheese production (Dairy producers ofNew Mexico). There are currently about 180dairies in New Mexico, with the highestnumber in Chaves County. There wereapproximately 326,000 head of dairy cattlein 2004 (NASS, 2004), giving an averageherd inventory of 1,811 milk cows per dairy.Large-scale dairies clearly dominate in thestate. In 2004, 98% of herd inventorycorresponded to operations with at least 500head of dairy cows, while only 0.2%corresponded to operations with less than100 head of dairy cows (NASS).Milk cows in New Mexico produced anaverage amount of 20,583 pounds of milkper cow in 2004, which is above the nationalaverage (NASS). This is equivalent toapproximately 2,573 gallons of milk.Approximately half of all milk produced isprocessed locally into cheese (Dairy Producersof New Mexico). One of the largest mozzarellacheese manufacturers worldwide, Leprino, islocated near Roswell, New Mexico. Leprinoalone processes approximately 4.5 millionpounds of fluid milk per day. (NM agriculture).U.S. Dairy PolicyThe dairy industry in the United States, as inmost countries, receives a significant amountof assistance from the federal government.The major programs in place to assist thedairy sector include federal Milk MarketingOrders, a price support program, directpayments to producers, and the Dairy ExportIncentive Program (DEIP).Federal Milk Marketing Orders werefirst established under the AgriculturalMarketing Agreement Act of 1937 (USDA-c, 2002). They are intended to help establish Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 3orderly marketing conditions for the benefitof both producers and consumers and arebased on a classified pricing system andrevenue pooling (USDA-c, 2002). The firstreform of these orders came with the 1996Farm Act, which reduced the total numberof orders from 33 to 11. It also establishednew methods for determining class pricesand standardized the language betweenorders (USDA-c, 2002).The dairy price support program wasinstituted under the Agricultural Act of 1949(USDA-c, 2002). Under this program theCommodity Credit Corporation has agreedto purchase at current support prices anybutter, cheddar cheese or nonfat dry milkthat meets specifications (USDA-c, 2002).The price support program was originallyslated to end at the end of 1999 but wastwice extended through 2001. Under the 2002Farm Act, the program has been extended athird time through 2007. Elimination of thedairy price support program is a necessarycondition under the Uruguay Roundagreement (USDA-c, 2002).The Dairy Export Incentive Program(DEIP) has played an important part in themilk price support system since the 1990Farm Act. The DEIP effectively pays asubsidy to dairy product exporters by payingthem cash bonuses that allow them topurchase at higher U.S. prices and sell atlower international prices. These bonusesapply to exports of nonfat dry milk, butterfatand certain cheeses (USDA-c, 2002).International Dairy TradeOnly 5% of the total cow’s milk producedglobally is traded on international markets(USDA-a, 2002). Dairy trade is primarily inbutter, cheese and dry milk powders, withlimited trade in fluid milk products, icecream, yogurt and dry whey products.Trade Agreements Governing Dairy ProductsThe Agreement on Agriculture of the UruguayRound is the principal document governingmultilateral trade liberalization in dairyproducts. For a short time, trade in dairyproducts was also regulated by theInternational Dairy Agreement, which enteredinto effect on January 1, 1980, after the TokyoRound of Multilateral Trade Negotiations.Signatories to the International DairyAgreement included Argentina, Bulgaria,Chad, the EC(15), Japan, New Zealand,Norway, Romania, Switzerland and Uruguay(World Trade Organization [WTO], 1997).The agreement was terminated in 1997 due tothe establishment of the WTO Committeeson Agriculture and Sanitary and PhytosanitaryMeasures, which made the International DairyAgreement redundant (WTO, 1997).Bilaterally, the most important tradeagreements that have included dairy productshave been the NAFTA agreement, the CloserEconomic Relations (CER) Agreementbetween Australia and New Zealand, and theU.S. and Australia Free Trade Agreement.Under the NAFTA agreement, all tariffshave been phased out for trade with Mexico.The Canadian portion of the NAFTAagreement excluded dairy products. TheNAFTA agreement entered into force onJanuary 1, 1994. Under the CER Agreement,all dairy trade was liberalized betweenAustralia and New Zealand.The U.S.–Australia Free Trade Agreemententered into force on January 1, 2005. Underthis agreement, Australia guarantees duty-freetariff treatment for all U.S. dairy products.The U.S. agreed to eliminate all tariffs ondairy products that had previously beengoverned by tariff-rate quotas under theUruguay Round. Australia also gains additionalaccess to the U.S. market through theestablishment of several duty free tariff-ratequotas on dairy products not previouslyimported from Australia. These new duty-freequotas will grow by 3 to 6 percent per year andall tariffs will be completely phased out overan 18-year period. The over-quota and safeguardduty rates on all dairy products, however,remain unchanged (USDA-FAS-b, 2004). Agricultural Experiment Station / Cooperative Extension Service • Technical Report 424Trade Disputes and Contentious IssuesUnder the Agreement of Agriculture of theUruguay Round (UR) in 1994, membercountries agreed to limit both the volume andvalue of subsidized exports, with varyingrestrictions placed on different countries. In1998, the United States and New Zealandfiled a formal dispute with the WTO thatclaimed that Canada was exceeding its exportsubsidy limits under the UR. The WTO ruledin favor of the United States and Canada in1999. In an effort to comply with thisdirective, Canada eliminated its direct dairyexport subsidies and replaced them with a newexport program in each province. TheCommercial Export Milk (CEM) programallowed Canadian processors to purchaselower-priced milk and use it to make cheeseand other dairy products for export (USTRPress Release, 2002). The United Statesargued, and the WTO agreed, that thegovernmental provision of lower priced milkto processors for export constituted an illegalexport subsidy. On April 30, 2003, Canadaeliminated the CEM program, and as ofAugust 1, 2003, Canada has eliminated allsubsidized dairy exports to the United States,and limited such exports to other foreignmarkets (Agriview Online, 2003).A second contentious issue on the tradefront in dairy products was the 2003introduction of a bill in the U.S. Congress,the Milk Import Tariff Equity Act, whichincluded milk protein concentrates (MPC)and casein under the current dairy importquota structure. The bill was re-introducedin February of 2005 as HR 521, and iscurrently in the House Subcommittee onTrade. MPC and casein are not produced inthe United States; they are imported chieflyfor use in highly processed cheese productsand specialized sports nutrition products.Use of MPC in other dairy products isrestricted by the FDA. The controversysurrounding MPC imports is that they serveas a lower-cost substitute for nonfat dry milkin certain processed dairy products. Thus,MPCs displace nonfat dry milk, which mustbe later bought back by the government’sDairy Price Support Program.U.S. Dairy Tariff Rate QuotasPrior to the Uruguay Round Agreement, theUnited States operated a system of dairyimport quotas. These have all been replacedby tariff rate quotas. While a quota limits thetotal amount of a product that may enter animporting country in a given year, a tariffrate quota establishes a two-tier tariff forimports. Imports below a pre-specified quotalimit enter the country duty free or at areduced tariff rate, while imports above thislimit enter at a higher rate, which is generallyprohibitive. See Table 2 for tariff-rate quotasfor major categories of dairy products.Production and Export Supplyof Dairy ProductsMajor exporters of dairy products worldwideinclude the European Union (EU), NewZealand and Australia. Milk output in the EUis controlled by quotas and has remainedrelatively stable (USDA-FAS, 2003). Thisquota regime has been extended until 2014-15, following the EU’s recent Mid-TermReview, which concluded in July 2003(USDA-FAS, 2003). It is expected that surplusmilk supplies in the EU will be used to supplygrowing cheese production with a consequentdecrease in the EU’s production of butter andnonfat dry milk (USDA-FAS, 2003).EU exports of cheese and nonfat dry milkare subsidized; therefore, they are limited bythe Uruguay Round Agreement. Currentlythe EU exports approximately 60% of its milkpowder via export subsidy programs, and islimited to subsidized cheese exports of321,300 tons. However, a growing portion ofpremium quality cheeses are exported withoutany aid (USDA-FAS, 2003).While milk production in the EU hasbeen stable, New Zealand milk productionhas been increasing. Most of New Zealand’sproduction is controlled by Fronterra Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 5Dairies. Fronterra has been reducinginventory and tightening export supply in anattempt to lower their supply chain costs(USDA-FAS-d, 2004). New Zealand exportsof butter are expected to decrease by 2.6%for the 2004-05 season to 381,000 tons.Cheese production is expected to increase2% to 319,000 tons in 2004-05, but exportswill remain unchanged from the previousyear. Although milk powder production isexpected to increase on the order of 4.7 to4.9% in 2004-05, exports are forecasted toincrease by less than 4%. New Zealand isexpected to be the main beneficiary of theexpanding world market for whole milkpowder since the EU is constrained by theUruguay Round limits on subsidized exportsto 240,000 tons, and Australian productionis still recovering from the 2002-03 drought(USDA-FAS-c, 2004).For the 2004-05 season, Australian milkproduction is forecast to increase by only1%, 6.4% below the pre-drought levelattained in 2001-02 (USDA-FAS, 2003).Recent data indicate, however, that waterconditions have improved for Australiandairy farmers, and two-thirds report thatthey have returned to pre-droughtproduction levels. Heavy rainfall wasreported in November 2004 in Victoria,where most of Australia’s milk production isconcentrated. Milk exports, however, areforecast to remain unchanged from 2004-05,as domestic consumption has increased by1.5% (USDA-FAS-c, 2004).High world prices for nonfat dry milkbenefited the United States in 2004. U.S.exports of nonfat dry milk powder increasedby more than 77% in 2004, but at the cost ofa reduction in stocks on the order of 43% toTable 2: Tariff-Rate Quota Limits and Tariff RatesProduct TRQ Limit Within Limit Tariff Out of Limit Tariff(US$/kg) (US$/kg)Fluid Milk, 1-6% Fat (liters) 11,356,236 0.04 0.15Fluid Milk and Cream 6-45% 6,694,840 0.032 0.772Fat, Sour Cream <45% Fat (liters)Fluid Milk and Cream and 6,997,000 0.123 1.541 to 1.646Sour Cream >45% Fat, ButterMilk Powder < 3% Fat 5,261,000 0.033 0.865Milk Powder 3-35% Fat, 3,321,300 0.068 1.092Dried Sour Cream 6-35% FatWhole Milk Powder and 99,500 0.137 1.556Dried ButtermilkEvaporated and Condensed Milk 6,857,300 0.022 to 0.033 0.313 to 0.496Dried Buttermilk and Dried Whey 296,000 0.033 0.876Dairy Spreads and AMF Butter 6,080,500 0.154 1.996Substitutes and Butter OilFresh Cheeses 48,327,859 10% 1.509Blue Mold Cheese 29,891,001 10-20% 2.269(Other than Stilton)Cheddar Cheese 13,506,306 10-16% 1.227American Type Cheese 3,772,556 10-20% 1.055Edam and Gouda Cheese 7,066,402 10-15% 1.803Italian Type Cheese 13,731,064 7.5-25% 2.146Swiss, Emmantaler and 8,104,833 6.4-10% 1.386Gruyere CheeseCheese with <0.5% fat and 5,724,907 10% 1.128margarine cheeseSources: Harmonized Tariff Schedule of the United States, 2004; U.S. Dairy Product Trade: ModelingApproaches and the Impact of New Formulations. Agricultural Experiment Station / Cooperative Extension Service • Technical Report 426250,000 tons. (USDA-FAS 2004). Whereasthe support price for nonfat dry milk is fixedat $1,764/MT by the Commodity CreditCorporation, world prices have hoveredaround $2,150-$2,350/MT. Nonfat dry milkis currently being exported without anysubsidies so it is not subjected to UruguayRound limits on such exports.Consumption and Import DemandImport demand for cheese remains fairlystrong in key markets such as Japan andRussia. In Russia, in particular, cheeseimports have expanded considerably,doubling in volume from 2002-04. Giventhat Russian milk production has beendeclining while disposable income has beengrowing, cheese imports demand will mostlikely continue to rise (USDA-FAS-f, 2004).Russia is also one of the top butter importmarkets of the world (USDA-FAS, 2003).For 2004, import demand for milkpowders increased in Algeria, where 47% ofdomestic milk consumption is reconstitutedmilk (USDA-FAS-g, 2004). Algeria hasinadequate domestic milk production anddepends on imports to meet demands.Algerian imports of dairy products accountfor approximately 22% of total agriculturalproduct imports (USDA-FAS-g, 2004).China is an emerging market for milkpowder that is expanding rapidly. Chineseimports of whole-milk powder are expected toincrease by 24% in 2005 to reach 113,000tons. The increased demand is attributed todemand from higher income groups anddecreased confidence in the safety of domesticmilk supplies after 12 cases of infant deathwere reported due to contaminated milkpowder (USDA-FAS-e, 2004).World Dairy Product PricesDairy prices for major dairy commoditieshave been climbing since mid-2002 dueprimarily to the weakening U.S. dollar, theAustralian drought and a rebound of majoreconomies (USDA-FAS, 2003). Reducedsupplies, coupled with increasing incomes arelikely to stimulate import demand and keepprices relatively strong in 2005.U.S. Export and Import Markets forDairy ProductsSince 2002, the United States has been a netimporter of dairy products, primarily cheese.A substantial percentage of U.S. imports ofdairy products originate in the EU, whichaccounted for 33% of all U.S. dairy productimports in 2004 (fig. 1). The EU is followedby New Zealand (19%), Canada (13%) andto a lesser degree China (6%) and Mexico(5%). U.S. imports from both New Zealandand Canada have increased dramatically since1997. Imports in 2003 from the EU wereapproximately 40% higher than 1997 levels,and imports from New Zealand have increasedby approximately 110% during the sametime period. In 2004, imports from the EUincreased 9.8%, thanks to its enlargementfrom 15 to 25 countries in May of 2004.In 2004, U.S. dairy products wereexported to nine main markets: Mexico,China, Canada, Japan, Philippines, Republicof Korea, Taiwan, Thailand, and Indonesia(fig. 2). The main export market for dairyproducts as an aggregate are the NAFTAcountries—Canada and Mexico—whichjointly accounted for 34% of all U.S. dairyproduct exports in 2004. Recently, Chinahas also become an important export marketfor U.S dairy products, absorbing 9% ofsuch exports in 2004. Exports to China haveincreased dramatically since 2001. Totalquantity exported in 2004 to China was almostthree times the quantity exported in 1999.Fluid Milk and CreamThe principal export destination for U.S.fluid milk and cream in 2004 was Mexico,which absorbed almost 60% of all such exports(fig. 3). Canada was the second-largest exportmarket, accounting for 33% of all U.S. exportsof fluid milk and cream. Thus, the NAFTAcountries jointly accounted for approximately Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 793% of all U.S. dairy exports of fluid milkand cream.U.S. imports of fluid milk and cream in2004 came principally from Canada (39%)and New Zealand (32%) (fig. 4). Mexico is agrowing import source of fluid milk andcream for the United States. In 1995, Mexicoaccounted for a little over 1% of imports,whereas in 2004, this share had risen to13%. The EU has also increased its sharefrom less than 1% of all such imports in1996 to approximately 11% in 2003.ButterThe United States is a net importer of butter.Total quantity imported in 2004 was 36,995metric tons, and 6,108 metric tons wereexported. The newly enlarged EU accountedfor 35% of all butter imported in 2004 andwas a close second, accounting for 33% of allbutter imported in 2004. Other importantimport sources are Uruguay, Israel andAustralia (fig. 5).On the export side, the main exportdestinations of U.S. butter are the NAFTAcountries of Canada and Mexico, whichtogether absorbed 75% of all butter exports in2004 (fig. 6). Mexico was the principal exportdestination for U.S. butter from 1994through 2000, except 1996, when the UnitedArab Emirates imported an unusually largeamount of U.S. butter. Since 2001, however,exports to Mexico have been lower than thoseto Saudi Arabia, in 2001 and 2002, and toCanada in 2003 and 2004. The NAFTAcountries were followed in importance byKuwait and the United Arab Emirates.Imports of butter over the 10-year periodfrom 1995 to 2004 have been cyclical, withinordinately large increases from the majorimport sources in both 1998 and 2002.Imports of butter from all sources, however,increased substantially from 2003 to 2004,with imports from the EU and New Zealandincreasing two-fold and almost ten-fold.Nonfat Dry MilkThe United States is a net exporter of nonfatdry milk products. While exports of otherdairy products have remained fairly stablesince 1996, exports of nonfat dry milk haveincreased substantially from a low of 21,598metric tons in 1996 to 254,002 metric tonsin 2004. The principal export market forU.S. nonfat dry milk is Mexico, which in2004 received 36% of these exports (fig. 7).Other markets are of limited importance,with the Philippines following Mexico at 9%of U.S. exports. Although Mexico remainsthe principal export destination for U.S.nonfat dry milk, exports to this country haveexhibited cyclical behavior since 1999. Exportsto other major markets have remained stableover the last decade.The United States imported 8,065 metrictons of nonfat dry milk in 2004. The majorimport sources for the U.S. of nonfat drymilk are, in order of importance, New Zealandand Mexico, which together accounted for 78%of nonfat dry milk imports in 2004 (fig. 8).In general, imports of nonfat dry milk overthe past 10 years have been increasing for themajor import sources. Imports from NewZealand have increased 1,912% since 1994.Those from Mexico have increased 911%during the same time period. In 2002, Chilebegan exporting nonfat dry milk to theUnited States for the first time in small quantities.CheeseThe United States is a net importer of cheesefrom a diversified group of countries. In 2003,the largest single source of U.S. cheese importswas the European Union, which accounted for60% of all imports (fig. 9). Imports from theEU have remained fairly stable over the pastdecade while imports from New Zealand havefollowed a rising trend.Mexico is the principal destination forU.S. cheese exports, accounting for 35% ofsuch exports in 2004 (fig. 10). The NAFTAcountries together accounted for 44% of all Agricultural Experiment Station / Cooperative Extension Service • Technical Report 428Figure 1: Import Shares of U.S. Dairy Imports (2004)Figure 2: Export Shares for U.S. Dairy Export Markets (2004) Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 9Figure 3: Principal Export Markets for Fluid Milk and Cream (2004)Figure 4: Principal Countries of Origin for U.S. Fluid Milk and Cream Imports (2004) Agricultural Experiment Station / Cooperative Extension Service • Technical Report 4210Figure 5: Principal Countries of Origin of U.S. Butter Imports (2004)Figure 6: Principal Export Markets for U.S. Butter (2004) Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 11Figure 7: Principal Export Markets for U.S. Nonfat Dry Milk (2004)Figure 8: Principal Countries of Origin for U.S. NFDM Imports (2004) Agricultural Experiment Station / Cooperative Extension Service • Technical Report 4212Figure 9: Principal Countries of Origin for U.S. Cheese Imports (2004)Figure 10: Principal Export Markets for U.S. Cheese (2004) Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 13U.S. cheese exports in 2004. Japan was alsoan important cheese export market, absorbing15% of U.S. exports in 2004. Exports to Japanhave leveled off in the past few years, however,as shipments to Mexico rise substantially. In1999, Mexico accounted for 13% of U.S.exports of cheese and imported 5,090 metrictons. In 2004, it imported 21,353 metrictons, more than three times the 1999 level.YogurtThe United States is a net importer of yogurt.In 2004, more than 4,388 metric tons ofyogurt were imported, and 3,980 metric tonswere exported. Seventy-five percent of importscame from the EU. The EU was followed inimportance by Canada, which accounted foronly 6% of U.S. yogurt imports in 2004(fig. 11). Imports from the EU skyrocketedafter 1999. Imports of yogurt from theEuropean Union in 2003 were 3,154% ofthose in 1999. Of the major import sourcesfor yogurt, only Mexico has leveled off in theamount of yogurt that it exported to theUnited States in the 2001-04 period.In 2004, the NAFTA countries absorbed62% of U.S. yogurt exports, followed byAustralia, which accounted for only 4% ofU.S. exports of yogurt (fig. 12). Over the pastdecade, yogurt exports to the major marketshave been stable, after dropping off precipitouslyto Mexico during the 1994-96 period.Ice CreamThe United States is a net exporter of icecream, with most exports going to theNAFTA countries and the EU. In 2004,23,831 metric tons of ice cream wereexported and slightly more than 18,613metric tons were imported (figs. 13 and 14).Canada accounted for 80% of all ice creamimports in 2004 and has consistentlyincreased its ice cream exports to the UnitedStates since 1997. On the export side, earlyin the past decade Japan was an importantexport destination for U.S. ice cream.However, its importance has diminished justas Mexico has increased its imports of U.S.ice cream.ConclusionThis report has provided a comprehensivedescription of the current state of the U.S.dairy industry and the major players involvedin international trade in dairy products. It isa valuable compendium and summary ofinformation for researchers, extension agents,industry and policymakers.The dairy sector remains highly protectedand regulated by the U.S. government.Liberalization has been slow in this sector butis proceeding at a steady pace as exemplifiedby advances in tariff reduction and quotaelimination in the NAFTA and U.S–AustraliaFree Trade Agreements. Although some tradedisputes have been resolved, notably withCanada, other issues, such as inclusion of milkprotein concentrates and casein in the currentdairy product quota system, are on-going.Domestically, the trend has been toward aconcentration of dairy production amonglarger establishments and a reduction in thetotal number of dairy operations nationwide.This trend has been uneven, however; somestates, particularly New Mexico and Idahohave witnessed rapid growth in dairyproduction in recent years. In the future, wecan expect these trends in domestic productionto continue, as the international arena of dairytrade becomes more important. Agricultural Experiment Station / Cooperative Extension Service • Technical Report 4214Figure 11: Principal Countries of Origin for U.S. Imports of Yogurt (2004)Figure 12: Principal Export Markets for U.S. Yogurt (2004) Agricultural Experiment Station / Cooperative Extension Service • Technical Report 42 15Figure 13: Principal Export Markets for U.S. Ice Cream (2004)Figure 14: Principal Countries of Origin for U.S. Imports of Ice Cream (2004) Agricultural Experiment Station / Cooperative Extension Service • Technical Report 4216Works CitedAgriview Online, 2003, “United States andCanada Reach Agreement Ending IllegallySubsidized Canadian Dairy Exports to theU.S.,” May 16, 2003, Vol. 67, No. 10, http://www.vermontagriculture.com/Agriview%20Online/Agriview051503/agriviewonline2.htmBlayney, Don P. The Changing Landscape of U.S.Milk Production ERS, USDA, StatisticalBulletin No. 978, (June 2002).Blayney, Don P. and James J. Miller, ERS, USDA,International Dairy Markets and the WTO.Dairy Producers of New Mexico, FrequentlyAsked Questions About New Mexico Dairies,Retrieved July 19, 2004, http://www.nmdairy.org.faq1.htm.Harmonized Tariff Schedule of the United States,2004.National Agricultural Statistics Service(NASS),USDA, 2004New Mexico Dairy Facts, <http://www.nmagriculture.org/new_mexico_dairy_facts.htm>Nicholson, C.F. and P. M. Bishop, “U.S. DairyProduct Trade: Modeling Approaches and theImpact of New Product Formulations” FinalReport for NRI Grant #2001-35400-10249,March 2004.U.S. Census Bureau, Statistical Abstract of theUnited States, 2004.USDA, Foreign Agricultural Service, (FAS),Market and Trade Data, 2004.USDA, Foreign Agricultural Service (FAS)-a,Dairy: World Markets and Trade, CircularSeries No. FD 2-03 (2003).USDA, FAS-b, “United States and Australia FreeTrade Agreement, Commodity Fact Sheet forDairy, June 2004. Retrieved June 15, 2005http://www/fas/usda/gov/info/factsheets/AusFTA/dairy.html.USDA, FAS-c, “Australia Dairy and ProductsAnnual 2004,” GAIN Report No. AS4039,http://www.fas.usda.gov/gainfiles/200412/146118216.pdf.USDA, FAS-d, “New Zealand Dairy andProducts Annual 2004,” GAIN Report No.NZ4019. http://www.fas.usda.gov/gainfiles/200410/146117882.pdf.USDA, FAS-e, “China, People’s Republic ofDairy and Products Annual 2004,” GAINReport No. CH4050. http://www.fas.usda.gov/gainfiles/200410/146117830.pdf.USDA, FAS-f, “Russian Federation Dairy andProducts Annual 2004,” GAIN Report No.RS4061. http://www.fas.usda.gov/gainfiles/200411/146118005.pdf.USDA, FAS-g, “Algeria Dairy and ProductsAnnual 2004,” GAIN Report No. AG4005.http://www.fas.usda.gov/gainfiles/200412/146118306.pdf.USDA-a, ERS. ERS USDA Briefing Room-Dairy Trade. 08/30 2002. <http://www.ers.usda.gov/Briefing/Dairy/Trade.htm>.USDA-b, ERS. ERS USDA Briefing Room -Dairy: Background. 7/25 2002 <http://www.ers.usda.gov/Briefing/Dairy/Background.htm>.USDA-c, ERS. ERS USDA Briefing Room —Dairy: Policy. 25/7 2002 <http://www.ers.usda.gov/Briefing/Dairy/Policy.htm>.USTR, “U.S. Wins in WTO Challenge toCanadian Dairy Subsidies,” press release,December 20, 2002. http://www.ustr.gov/Document_Library/Press_Releases/2002/December/Section_Index.htmlWTO. Signatories Terminate WTO PlurilateralAgreements on Meat and Dairy Products.WTO / News - Agreements on Meat andDairy Products - PRESS/78. 30 September1997. 10/5/04 <http://www.wto.org/english/news_e/pres97_e/pr78_e.htm>.AcknowledgementsThe author thanks Dustin Vendreley, forexcellent research assistance, Sylvia Evansand Sylvia Beuhler for editorial assistanceand Hillary Sullivan, Jim Libbin andOctavio Ramirez for helpful comments on aprevious draft. All remaining errors andomissions are the sole responsibility of theauthor. This research was financed throughsupport from the New Mexico AgriculturalExperiment Station. To find more resources for your home, family or business,visit the College of Agriculture and Home Economics on the WorldWide Web at www.cahe.nmsu.edu.New Mexico State University is an equal opportunity/affirmative actionemployer and educator. NMSU and the U.S. Department of Agriculturecooperating.September 2005 Las Cruces, NMElectronic Distribution September 2005
<urn:uuid:4420f2af-0c96-4b9e-9a86-bb692ad61808>
{ "date": "2017-06-23T17:17:39", "dump": "CC-MAIN-2017-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320077.32/warc/CC-MAIN-20170623170148-20170623190148-00697.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8728569149971008, "score": 2.75, "token_count": 7942, "url": "https://www.slideshare.net/johnwalton31521/us-dairy-to-world" }
No matter how many times we have experienced it, it is still pretty impressive that one of our hands is capable of writing Shakespeare, while the other hand can barely work out how to pick up a pen. As a marker of difference throughout our lives, we’ve all wondered why we end up being right or left-handed, without seemingly having any choice in the matter. The reason for our right and left-handedness was long presumed by scientists to be a result of activity in the right and left hemispheres of our brain during foetal development. But now a new study has shown that it is actually the spinal cord that is to blame, not the brain. The team, from Ruhr-Universitat Bochum, Germany, used foetal ultrasounds to try and trace the earliest signs of gene activity in marking asymmetry and preference. They saw that as early as eight weeks, a preference for the right or left hand can be seen. And from the thirteenth week of pregnancy, the foetus will suck either their right or left thumb. It is well known that arm and hand movements are initiated by the motor cortex in the brain, which sends a signal to the spinal cord. However, at eight weeks development, the motor cortex hasn’t yet made this connection, meaning that precursors of handedness are apparent before the brain is telling the spinal cord what to choose. From this, authors Dr Sebastian Ocklenburg, Judith Schmitz and Dr Onur Güntürkün, concluded that the spinal cord is responsible for the distinction, not the brain. Explaining: “These results fundamentally change our understanding of the cause of hemispheric asymmetries.”
<urn:uuid:3254fb76-1f19-4b77-b403-37213465c2b0>
{ "date": "2019-02-22T09:48:26", "dump": "CC-MAIN-2019-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247515149.92/warc/CC-MAIN-20190222094419-20190222120419-00136.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9381258487701416, "score": 3.484375, "token_count": 365, "url": "https://www.huffingtonpost.co.uk/entry/why-are-we-right-handed-left-handed-spine_uk_58aab47de4b07602ad561094" }
Chris Abram, associate professor of English in Notre Dame’s College of Arts and Letters, is interested in the literary cultures of early medieval northern Europe, especially Anglo-Saxon England and Viking-Age and later Norway and Iceland. His work often deals with the region’s transition from paganism to Christianity and its impact on literary production. “I’m interested in how things started,” he says. “A really important part of that is how people became Christian. But in order to find out what kind of Christians they became, we have to know what sort of people they were before.” In this video, Abram discusses the large body of manuscripts found in Scandinavia written in Old Norse and what the stories within can tell us about pre-Christian culture across northern Europe. You can also watch this video on YouTube.
<urn:uuid:28bb413f-3aec-41b1-a43c-048e05ebf0d4>
{ "date": "2019-03-19T17:05:28", "dump": "CC-MAIN-2019-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202003.56/warc/CC-MAIN-20190319163636-20190319185636-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9735827445983887, "score": 2.90625, "token_count": 176, "url": "https://al.nd.edu/news/latest-news/video-english-professor-chris-abram-on-pre-christian-culture-in-northern-europe/" }
Music and sound effects: Sonata is a musical term describing something written specifically for two musical instruments Music is a linking device throughout the play Sonata is symbol that occurs throughout the play Bridie and Sheila burst into song at the end of the first interview session Their performance effectively takes us back to her past Aurally (what one hears) and visually historical information is conveyed When Jerusalem reaches a crescendo, scene of the Japanese invasion are juxtaposed on the backdrop screens, ironically contrasting image and triumphal song Lacking real instruments, we are told the prisoners had to improvise using their voices alone Even when numbers were decimated and the choir couldn’t sing anymore Bridie and Sheila fill the gap They thought “It was up to us to carry on… we sang our sonata whenever we could so the camp would know there was still music left” Music becomes pivotal to their survival Music is an aural symbol of willpower and determination We’d sit in our hut at night and hum. “We’d do it while we dug the graves”. Bridie laconically observes, “It probably sounded bloody awful. But not to us. To us we still had harmony… and the ‘japs’ could never take that away. Voice and spirit are fused, “We forgot the Japanese – we forgot our hunger – our boils – barbed wire – everything… Together we made this glorious sound that rose about the camp- above the jungle-above the war-rose and rose and took us with it” Sheila also sums up its psychological importance, “Fifty voices set us free” Sound effects add atmospheric detail and mood An example is in the opening at where the women describe the sinking of the ship or machine gunning of helpless women and children, “We hear the distant sound of lapping waves” Visual reinforce the script, the use of photographic images reinforces the context and historic authenticity of what is being said. Evocative glimpses through slides of ships burning in Singapore Harbour, the Japanese invasion and the shocking conditions of the prisoners of war. Distinctively visual methods are used to allow the audience to witness the horrific reality of the period – This augments the simple set design and the use of a two character cast while helping develop the plays irony and humour – This is evident when images released by the Australian Defence Department, showing healthy, clean and happy women are dramatically juxtaposed with those that showed them as they were liberated Lighting and Stage Directions Light is a key dramatic device that helps develop themes and characters Misto supplies detailed stage directions which specify tone, mannerisms or line delivery to create a particular mood or atmospheric context Directions such as ‘fondly’, ‘slightly surprised’ disapprovingly, ‘very calmly’ ‘ironic smile’ ‘casually trying to make light od it’ position the audience’s interpretive response They also focus attention on Sheila and Bridie’s emotions, building tension and suspense as their relationship fluctuates. The opening stage directions read: “darkness. Out of the silence comes the voice of Bridie” and after her first line of dialogue, she is visually spot lit. Stage lighting gradually reveals the ‘on air’ sign establishing our perception of the TV studio context The interplay of light and dark, via spotlighting, blackouts and fade outs, help develop atmosphere or mood for the rest of the play When Bridie and Sheila are emotionally separated, they are often lit separately, whereas once reconciled by the end of the play. They are lit in partnership. As they dance, the light gradually fades away, while a ‘very bright spot light’ highlights the shoehorn – This visually signifies its symbolic importance as something that first brought them together, then forced them apart, and now, once again, reunites them.
<urn:uuid:b7261158-1dbf-40b4-8691-89bdb23952af>
{ "date": "2016-10-22T19:53:23", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719041.14/warc/CC-MAIN-20161020183839-00149-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9440749287605286, "score": 3.03125, "token_count": 812, "url": "http://studymoose.com/%ef%bb%bfthe-shoe-horn-sonata-essay" }
Over the last decade the U.S. government has enacted a number of rules designed to reduce smog and air pollution in cities and towns. Many of the regulations focus on two culprits: nitrogen oxide (NOx) and particulate matter (PM) like tiny chemical, metal, soil and dust particles. The most stringent of these rules, called Tier 4 emission standards, will kick in for locomotives on January 1, 2015. They will slash particulates by 70 percent and NOx by 76 percent from the current Tier 3 emission levels for every new engine. “The demands on the industry have grown exponentially,” says Len Baran, heavy-haul platform leader at the locomotive maker GE Transportation. GE has built the world’s first locomotive that solves the problem in an ingenious way. The Tier 4 standards, which were announced in 2004, put industry engineers in a tight spot. One of the easiest ways out involved adding a large filter and a 4,000-pound catalytic converter, as heavy as a passenger car, on top of the engine. The converter uses many gallons of urea, a chemical compound first discovered in urine, to break up NOx in diesel exhaust into nitrogen and water. But the solution has a big downside. The converter hampers access to the engine and adds extra maintenance. Railroads would also have to invest an estimated $1.5 billion in urea distribution infrastructure. “We took a different track,” Baran says. “We decided to solve the problem inside the engine and cut out the need for urea, converters and PM filters altogether.” Since 2005, GE has invested $600 million in the development of a Tier 4 locomotive that eliminates the need for any NOx and PM exhaust “after-treatment,” the catch-all industry term for filters, converters and similar technology. Engineers from GE Transportation and GE Global Research spent several years in the lab, building and experimenting with a new engine design. The team built a single cylinder engine for testing, gathered detailed measurements of the exhaust and plugged the information into custom software models designed to simulate a full-scale engine. “We realized early on that we had to keep the temperature inside the cylinder at an optimal level to reduce NOx and PM,” Baran says. “So we devised an ingenious system that pipes in some of the hot exhaust gas. That’s the simple explanation.” Today, GE’s new Tier 4 Evolution Series Advance Power 4, which is ecomagination certified, locomotive is the only engine that meets the EPA’s Tier 4 requirements without any after-treatment technology. GE has already built and started testing two of the locomotives on a track in Pennsylvania. Another set of Tier 4 diesel engines is going through endurance tests inside a GE locomotive plant. “We don’t need a filter and we don’t need a converter,” Baran says. “It’s a game-changer.”
<urn:uuid:6cff7cc2-6a8a-437c-81f6-ac9ae6712021>
{ "date": "2017-06-28T05:25:43", "dump": "CC-MAIN-2017-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322870.59/warc/CC-MAIN-20170628050821-20170628070821-00337.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9471908807754517, "score": 3.09375, "token_count": 635, "url": "http://www.gereports.kr/ge-greener-locomotive/" }
North West Frontier This is a place where India meets Asia. This is a fort originally built by the Sikhs, which is populated by British soldiers in 1885. This is a moment at which everything changes on the planet. This is a signaling device of a mirror on a tripod. This is the name given to Indian Troopers in 1888. This is a unit of infantrymen. This is the name given to the beings responsible for the shift by those affected by it. This is a capsule in which astronauts can enter the atmosphere again. This is a place that means Heaven and Earth and is located within a long-lost city. This is a place where two armies of staggering size meet and battle. Temple of Marduk This is a place located within the lost city that houses the biggest eye... This section contains 260 words (approx. 1 page at 300 words per page)
<urn:uuid:a9a32229-cc0e-47bb-810a-b8d591d17c1f>
{ "date": "2018-01-23T12:56:26", "dump": "CC-MAIN-2018-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891926.62/warc/CC-MAIN-20180123111826-20180123131826-00456.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9411541223526001, "score": 2.765625, "token_count": 193, "url": "http://www.bookrags.com/lessonplan/times-eye/objects.html" }
News reports portray a dreary start to March 18, 1925 with heavy rain in the morning but nothing that would foretell the disaster that was to come. Before the day was over, parts of Missouri, Illinois and Indiana would be torn asunder and nearly 700 people would be dead. Today marks the 85th anniversary of what we now call the Tri-State Tornado. The deadly twister was of the likes that had never been seen before – and hasn’t been seen since. That morning, the U.S. Weather Bureau’s forecast called for “rains and strong shifting winds.” Nothing that would indicate the horror that was to come. The first reports of the tornado happened at 1:01pm near Ellington, Missouri. As it moved to the northeast the twister tore through the towns of Annapolis, Redford, Cornwall, Biehle, and Frohna. By the time it exited Missouri, 11 people were dead. Illinois bore the brunt of the tornado as it continued on its deadly path. It crossed the Mississippi River and tore through Gorham, Johnston City, Murphysboro, De Soto, Hurst-Bush and a half dozen other Illinois towns. Entire towns were reduced to rubble, over a thousand people were injured and 613 people in the state were dead. Far from over, the twister crossed into Indiana where the towns of Griffin, Owensville, and Princeton were hit. 71 people are thought to have died in the state. The horror finally came to an end at 4:30pm, three and a half hours after it started. The tornado dissipated southwest of Petersburg, Indiana but not until after it had covered a path of at least 219 miles and left death and destruction the entire way. From southeastern Missouri, completely across southern Illinois and into southwestern Indiana, the tornado was the longest tracking twister ever recorded.
<urn:uuid:94982e5e-a5dd-4678-ac2f-9df7a1e4c8a9>
{ "date": "2014-04-25T02:25:33", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207985.17/warc/CC-MAIN-20140423032007-00523-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9825388193130493, "score": 2.921875, "token_count": 391, "url": "http://www.thorntonweather.com/blog/severe-weather/85-years-ago-today-the-nations-deadliest-tornado/" }
Professor Donald E. Knuth doesn’t need an introduction: he created TeX (a powerful typesetting system) and METAFONT (a program to design fonts). He also designed a font family, called Computer Modern, which is the default choice of TeX. Mr. Knuth is known to write sharp and enlightening books. His books about typesetting are no exception: he wrote five books dedicated to these topics, and Addison-Wesley now sells them all in one box, entitled “Computers & Typesetting Millennium edition”. The five books are: - “The TeXbook” - “TeX The Program” - “The METAFONTbook” - “METAFONT The Program” - “Computer Modern Typefaces” The TeXbook and The METAFONTbook are reference handbooks that describe the commands, capabilities and drawbacks of TeX and METAFONT. If you want to learn anything about TeX and METAFONT, these books are a must. These two programs are released as free software—Knuth describes their source code in detail in the books TeX The Program and METAFONT The Program. Finally, the fifth book describes how Knuth programmed METAFONT to output Computer Modern font family. One interesting feature of the book is that they have plenty of exercises (all of the solutions are published in the appendices). Who are these books for? The occasional reader might believe that these books are for TeX or METAFONT users. Well, that’s not exactly right. I would say instead: “They are for TeX and METAFONT programmers”. TeX is a powerful typesetting system, but it isn’t visual. Everybody could start using a visual product without reading a handbook (not necessarily obtaining good results), whereas using TeX or METAFONT needs preliminary study. So, why should anybody use TeX rather than a visual product? Once you program TeX to obtain a certain kind of typesetting results, you can obtain these results with any input documents. This means that if you have a set of articles to typeset, you don’t have to worry about their final aspect: TeX will do it for you. When you use a visual product, you normally have to apply every style by hand, and humans are surely more error prone than a program. Readers can find advice concerning typography too. So, these books could be a useful read for typographers and font designers as well (as long as they have some programming skill!). TeX and METAFONT have their own programming languages. Since Prof. Knuth has done a great job, studying the exercises, the examples and the source code will be useful to programmers using any programming language. Everything I have written in this review should be considered Pros. Moreover, the quality of the edition is very high, thanks to years of bug hunting and fixing (Knuth rewards anyone who finds and reports real bugs); the covers are very elegant; the paper is fine. Of course, the author expresses the concepts using his precise and polished style—even when he slips into his humorous approach. |Title||Computers & Typesetting| |Author||Donald E. Knuth|
<urn:uuid:dda41d5e-81ed-4c85-8728-84965c204d93>
{ "date": "2015-03-01T12:51:50", "dump": "CC-MAIN-2015-11", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462331.30/warc/CC-MAIN-20150226074102-00235-ip-10-28-5-156.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9226109385490417, "score": 2.75, "token_count": 690, "url": "http://www.freesoftwaremagazine.com/articles/book_review-typesetting/" }
Britain will soon become the first country in the world to allow the creation of babies with DNA from three people, after laws allowing the controversial procedure were passed through parliament. But while opponents of the procedure are warning about the perils of creating a generation of ‘designer babies’ and the moral implications of having three parents, those in favour say it will not change the traditional family structure – but it will save countless lives. About 2,500 women in Britain are at risk of passing on to their babies faulty mitochondria, the genetic material around a cell’s nucleus. Mitochondrial DNA (mDNA) is passed through the mother and mitochondrial diseases cause symptoms ranging from poor vision to diabetes and muscle wasting. By passing the new legislation, British MPs have voted to legalise a technique that could prevent serious inherited diseases being passed on from mother to child. Politicians in the House of Commons voted by 382 to 128 in favour of legalizing the technique, which involves allowing IVF babies to be created with DNA from three people. As well as receiving the usual ‘nuclear’ DNA from its mother and father, the embryo would also include a small amount of healthy female donor. According to scientists a tiny fraction of the child’s DNA would come from the donor, none of which will determine characteristics or traits. Despite some religious and ethical groups arguing that the ethics and morality of such a technique have not been adequately explored, the bill is expected to be passed by the House of Lords later this month, paving the way for the procedure to begin in the UK next year.
<urn:uuid:a8e78242-e11e-4d3d-810c-e6ad6923395c>
{ "date": "2019-10-17T16:16:48", "dump": "CC-MAIN-2019-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986675409.61/warc/CC-MAIN-20191017145741-20191017173241-00336.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9634411931037903, "score": 3.109375, "token_count": 328, "url": "http://www.thebabyproject.com.au/2015/02/three-parent-ivf/" }
I am 58-year-old man in good health who runs about 30 miles per week. When I started running last October I watched my resting heart rate drop from a constant 60 BPM (beats per minute) to around 45 BPM. I am in much better shape now than I was in October, but I notice that I get quite lightheaded when I stand up. I need to hold onto something for a few moments before everything stabilizes. I feel fine all other times. Any ideas?—Brett Feeling lightheaded when you move to a standing position is a relatively common occurrence in endurance athletes. It happens to me regularly, especially if I let my fluid intake slip a bit. You have noted the drop in resting heart rate that occurs with effective training. This is primarily due to increased vagal tone. The vagus nerve slows the heart and this decrease in resting heart rate gives you an increased “reserve” for the demands of exercise and the potential to markedly increase your cardiac output when needed for prolonged exercise. I think of lightheadedness this way: you are sitting or squatting and the blood pools in your legs. As you suddenly change position to standing, gravity holds the blood in your lower extremities and your slowed heart rate does not respond fast enough to pump an adequate blood volume to your head to maintain good cerebral blood flow. As a result, you feel dizzy. The medical term for this is orthostatic dizziness or orthostatic hypotension, and it is normal in runners who are well-trained. The cure is simply to move from lying to sitting and pause, then move from sitting to standing and pause. It can get dicey if you hop out of bed and start walking without allowing time to let the system reach equilibrium. There are other causes that might affect runners like dehydration or low energy stores. So be sure that you are eating adequate calories and drinking enough fluid to keep your urine light yellow, like lemonade color. Orthostatic changes can also be associated with diseases like diabetes and certain neurological disorders. If you are not feeling well, you should consult your physician. This is also a very common phenomenon for people, especially the elderly, who are on certain medications. (Not that 58 is elderly!) Heart and blood pressure medications, medications that shrink the prostate, and antidepressants are common culprits. I hope this helps and you keep running. It appears that your exercise program is working. Chances are that you're experiencing one of the benefits of regular cardiovascular activity. Have a question for the Sports Doc? E-mail him at [email protected]. NOTE: Due to the volume of mail, we regret that Dr. Roberts cannot answer every e-mail.
<urn:uuid:cdbc6565-f890-4fb5-a78b-b3b9da01f0c7>
{ "date": "2016-10-24T16:03:05", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00108-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9487370252609253, "score": 2.53125, "token_count": 557, "url": "http://www.runnersworld.com/ask-the-sports-doc/i-get-dizzy-when-i-stand-up-why" }
ARTEFACTS from Devizes’ Roman past, or even earlier, could emerge from a community archaeology project being planned in the town by Wiltshire Heritage Museum. Although the origins of the town are thought to date back only to the Norman Conquest, when the first castle was built by Roger, Bishop of Salisbury, there is evidence of settlement dating back 14,000 years. Museum director David Dawson, who is spearheading the scheme, said: “We have a stone axe, made from stone that came from Cornwall, that dates back to 12,000BC. “In 1714 Roman figurines of gods were unearthed on the Green. “I can’t tell you what a sensation that caused at the time. It was before the discovery of Pompeii and it came as a huge culture shock. They came from an England people had only read about in Latin texts.” In the 1880s a Roman villa was discovered in the area of Southbroom School and many wonders were unearthed from a burial site in the area. These included an exquisite glass jar that possibly came from Syria, complete with the perfume manufactured in that area. When the county’s archaeology field group carried out a geophysical survey on The Green, they found evidence of archaeological features which could date back to the Second World War or even earlier. The archaeology project will examine various areas in the town and involve local schoolchildren. Mr Dawson said: “We would like to work closely with local schools and youth groups to engage and involve as many people as possible. “We have already discussed the possibility of a project with Tom Strickland, head of history at Devizes School, where the Year 7 history students study the Roman period and Year 12 students might be involved in excavating Second World War features in support of their A-level course. “All the local primary schools cover the Romans and local history topics.” The project will culminate in an open day on the Green to coincide with the Festival of British Archaeology in July. Any groups that would like to take part can call Mr Dawson at the museum on (01380) 727369.
<urn:uuid:59c4d8d0-9638-4f10-bb3d-1ee1bfd8b8c1>
{ "date": "2017-04-25T10:34:34", "dump": "CC-MAIN-2017-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120338.97/warc/CC-MAIN-20170423031200-00587-ip-10-145-167-34.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9697515964508057, "score": 2.5625, "token_count": 459, "url": "http://www.gazetteandherald.co.uk/news/10198156.Digging_into_town___s_past/?ref=rss" }
Please be sure to visit Google Classroom to follow the instructions on how to create your own website and blog as part of our classroom website. Weebly student accounts allow them to share and have their work read by others without sharing their personal information and identity. Students are reminded to practice good digital citizenship and be respectful and responsible in their written posts/blogs, and in all communications with others (e.g., comments). Our class is going to be participating in blogging activities with other Grade 6 classes around the globe over the coming weeks and months. Two of these activities that we will be starting within the next few days are: the 2015 Global Read Aloud: Fish in a Tree, and The Not Perfect Hat Club. Stay tuned for more information about these activities! Click to set Tweets by @KaarinaLosey custom HTML
<urn:uuid:9a895429-9f27-4171-ad10-dd454e8265c2>
{ "date": "2018-02-25T01:41:43", "dump": "CC-MAIN-2018-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816083.98/warc/CC-MAIN-20180225011315-20180225031315-00256.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9292895197868347, "score": 2.890625, "token_count": 173, "url": "http://gr6losey.weebly.com/news--updates/kidblog-setup" }
GardenSMART :: Deer are Already Prepared for Winter Deer are Already Prepared for Winter By Bobbex, Inc. Photographs courtesy of Bobbex, Inc. Like many mammals, deer physically prepare for winter by better insulating their bodies. In the fall, deer gradually trade their summer coats for a warmer winter one, which is more substantial and has thicker, longer, darker hairs called "guard hairs" to protect their fur and skin from rain and snow. Their winter coat naturally absorbs more sunlight and traps more body heat than their warm-weather coat, so provides an exceptional amount of protection from the cold. Deer also have oil-producing glands in their skin that helps make their hair water resistant, which is especially valuable in the snow. For even further insulation, their bodies naturally begin to retain more fat in winter. Deer also alter their behavior to survive the harsh winter weather. They generally become less active, sometimes dropping their metabolism by half, which allows them to save energy. Deer can hunker down during particularly harsh winter weather and survive on their fat, but eventually they have to eat something, although their preferred food sources are long gone. Although amazing, deer do survive harsh winters when vegetation they prefer is nearly impossible to find. Deer's usual winter diet includes food that is not particularly nutritious, but it's above the snow and available to feed on, like twigs, leaves, bark and evergreen shrubs and trees like yews and arborvitae. Arborvitae is a popular tree and a common backyard hedging solution that grows moderately fast and looks pretty around the perimeter of any yard. During a harsh winter, deer can decimate arborvitae trees, turning them into trees that look like lollipops! Because food is so scarce during winter and high deer populations mean more competition for food, deer are likely to be more resistant to efforts to evacuate them. They'll return to areas, like your yard, where they found plentiful pickings in warm weather and be more inclined to stay put until your yard is stripped clean of all possible food sources. A single adult deer eats about 7 pounds of food a day and does usually occupy the same 3- to 4-square-mile area for their entire lives. That means if you've had deer in your yard before, it is more than likely your yard is already on their list to forage food this winter, so your shrubs and trees — your most expensive landscaping — is at risk this winter. To save your shrubs and trees from deer damage in winter and strike a blow against deer's voracious appetites you'll need a reliable, proven effective defense that's easy to use in the cold months of winter. Your best defense against deer is the continual use of a proven-effective repellent, like easy-to-use Bobbex Deer Repellent foliar spray. The product is an environmentally-friendly, nontoxic and long-lasting deer deterrent that's safe for people, pets, wildlife and aquatic life. Ingredients include putrescent eggs, fishmeal, fish oil, garlic, and other natural ingredients — all materials that offend a deer's sensitive sense of smell and taste. Additional ingredients such as urea and Epsom salts contain natural fertilizer components, which are actually beneficial for all plantings. Bobbex Deer mimics predator scents, which deer have an aversion to and is classified as a fear repellent; it also tastes terrible to deer, adding another layer of protection. Because it contains effective sticking agents, the repellent won't wash off even in harsh winter weather. And it's been 3rd party tested against 10 other like-repellents and is rated #1 for protection against deer browse. The experts at Bobbex recommend a steady course of repellent application in every season as deer shift their feeding patterns. Since we know deer learn from experience, maintaining repellent applications throughout the year will "school" them to continually bypass your yard in favor of less objectionable fare elsewhere. Left undeterred, deer can strip bare your landscape's most expensive and susceptible plantings in winter, leaving you with an unattractive yard and high repair bills when warm weather arrives. Preparing now and taking preventive steps against the ravages of deer can help ensure they'll learn to leave your yard alone throughout the winter, and with continued use you can keep them at bay all year long. By Joan Casanova, Bonnie Plants, Photographs courtesy of Bonnie Plants Temperatures are rising and high heat can wreak havoc in the vegetable garden. When temps climb to the upper 80's and sometimes soar into the 90's and 100's, plants need some assistance in fending off the Fahrenheit. Click here to sign up for our monthly NEWSLETTER packed with great articles and helpful tips for your home, garden and pets!
<urn:uuid:3efe2748-d123-4009-a939-641f207fff79>
{ "date": "2019-07-19T01:25:08", "dump": "CC-MAIN-2019-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525973.56/warc/CC-MAIN-20190719012046-20190719034046-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9598004221916199, "score": 3.203125, "token_count": 1004, "url": "https://www.gardensmart.tv/?p=articles&title=Deer_are_Already_Prepared_for_Winter" }
HOME FRUIT PRODUCTION-ORANGES Julian W. Sauls, Ph.D. Professor & Extension Horticulturist Texas Cooperative Extension Sweet oranges, which are native to northeastern India, are the most widely grown species of citrus. They spread rapidly along trade routes between Asia, Europe and Africa, so little is known of their actual introduction to Europe. Columbus reportedly established a planting in Hispaniola on his second voyage in 1493. Spanish explorers introduced oranges throughout the New World, including to Florida when they founded San Augustine in 1565. While Texas is noted for its red grapefruit, orange trees are common throughout areas of the state where citrus can be grown. Oranges are grown throughout the world in tropical and subtropical areas, but they achieve the best quality under subtropical conditions. For the most part, the warm, humid conditions of south Texas produce a thin-skinned, yellowish orange fruit with yellowish orange flesh that is quite sweet and juicy. By contrast, cooler climates such as California and Arizona produce fruit having brightly colored, thick, peel and orange flesh. Mature, healthy orange trees that are well-hardened by exposure to previous cool weather can tolerate temperatures in the middle to low 20's without leaf or twig damage, but ice will form in the fruit after 3 to 5 hours at or below 27. Severe freezes, however, do kill orange trees in south Texas, so long-term success will sooner or later require cold protection measures. SOILS AND SITE SELECTION Orange trees on sour orange rootstock are well-adapted to deep, well-drained soils. Loamy soils are preferred while heavy clays and poorly-drained soils will result in poor growth and production as well as shorter life. For maximum cold protection, oranges in the home landscape should be planted on the south or southeast side of the house. Distance from the house or other buildings and driveways or walkways should be at least 12 feet to allow adequate room for the tree to grow to its mature size. While large, overhanging shade trees will provide some cold protection, orange trees grow and produce best in full sun. Sweet oranges are generally classified as round oranges, navel oranges, pigmented or blood oranges and acidless oranges. Too, they are classified as seedy or seedless (0-9 in Texas) and by season of maturity. Early season oranges mature in September or October. Mid-season oranges mature in late November to early January, and late season oranges mature in February or March. Most of the world's orange production is the round oranges, all of which are rather difficult to peel. Navel oranges are characterized by the presence of a secondary fruit embedded in the blossom end of the fruit, creating a "navel" opening. The navel can be small and almost inconspicuous to large and protuberant. Navel oranges are fairly easy to peel and are the premier orange for eating out-of-hand. Blood oranges contain red anthocyanin pigments in the flesh, but the pigmentation requires cool night temperatures to develop. In Texas, few of the blood oranges have more than a few flecks of pigment. The acidless oranges are insipid and of poor quality; no varieties are grown in Texas. Round orange varieties in Texas comprise about 7,000 acres in commercial production. 'Parson Brown' originated as a chance seedling at the home of Reverend N.L. Brown near Webster, FL, in 1865. Its fruit are round, medium large, has a thick, pebbly peel and contains 10-20 seeds. It usually matures in early September in the Valley. Both peel and juice color are poor, as is juice quality. 'Hamlin' originated as a chance seedling in an orchard planted in 1879 near Deland, FL. Its fruit are round, small to medium, commercially seedless (0-6 seeds) and has a smooth, thin peel. Both peel and juice color are poor. It matures in late September in the Valley. 'Marrs' arose as a limb sport of 'Washington' navel in 1927 in Donna, TX. The tree is small by comparison to other oranges. Its fruit are medium large, round to slightly oblate, with a thin, smooth, moderately thick peel that is easily bruised during harvest. It can contain as many as nine seeds. The peel is yellowish, as is the juice, but quality is not particularly good because of low acidity, although the flavor is sweet. It matures in late September. 'Pineapple' orange originated from seedlings planted about 1860 near Citra, FL. Its fruit are medium large, somewhat flattened on both ends, with a moderately thick, smooth peel that develops good orange color under cool night conditions. Juice color and quality are very good. It usually contains 15-25 seeds. 'Pineapple' matures about Thanksgiving in the Valley. Unfortunately, the name 'Pineapple' has been used in Texas to designate seedy oranges, which includes both 'Parson Brown' and true 'Pineapple' orange. Basically, if the orange in question matures well before Thanksgiving, it isn't 'Pineapple'. 'Jaffa' was introduced to Florida in 1883 from Palestine, but it does not appear to be quite the same as the original variety. Its fruit are small to medium, commercially seedless, with a thin, smooth peel. Peel color is yellow as is juice color. The flesh is melting in texture and of very high quality, producing a thick, nectar-like juice. 'Jaffa' usually achieves maturity in the Valley about Christmas. By some accounts, 'Jaffa' in Texas may be better described as Palestine Jaffa Blood Orange, as flecks of pigment often occur in the fruit during cooler winter conditions in the Valley. 'Valencia' orange is the most widely planted orange variety in the world. It originated in either Spain or Portugal, but no one knows which. It was introduced to Florida in 1870. 'Valencia' fruit are medium large, commercially seedless, with a moderately thick peel. It is usually slightly oblong in shape. Peel color, juice color and eating or juice quality are excellent, setting the standards to which other round oranges are compared. It matures in early February and holds well on-tree into the summer. Fruit will regreen at the time of the spring growth flush. Navel oranges supposedly originated in the Mediterranean area from which they were taken to Brazil. They were introduced by the U.S.D.A. to the United States from Brazil in 1873. A number of varieties have been tested in the Valley, but there has been little advantage of one over another. 'Washington' is a large, oblong fruit with a protuberant navel that is considered parent to most other navel oranges. 'Thompson' is similar to 'Washington', as are 'Atwood', 'Fisher', 'Summerfield', 'Texas' and a number of others which originated from 'Washington'. The two most widely planted navel orange varieties in Texas are 'Everhard' and 'N33E'. 'Everhard' is similar to the 'Baianinha Piracicaba' of Brazil, having rather smaller fruit that are oval to round. The navel is very small and closed, commonly being inconspicuous or absent altogether. The fruit is thin skinned, of very good flavor, and it reaches maturity in late September. 'N33E' is a local selection which was discovered as a limb sport of 'Marrs' orange in the late 1960's near Edinburg, TX. While the fruit is similar to 'Washington' navel, the trees are more productive and more consistent than 'Washington'. In some years, 'N33E' suffers extensive fruit splitting in August-September, yet production still remains high. The blood oranges are similar to round oranges in their growth and appearance, the exceptions being in internal flesh characteristics. The flavor of blood oranges is rich and sprightly. There are a few blood oranges in Texas, including both highly colored types and those with only flecked coloration in the flesh. Even the highly colored types in Texas do not develop the dark red coloration for which the blood oranges are noted. 'Moro' and 'Sanguinelli' are usually seedless and develop the most intense color, while 'Ruby' is lightly flecked at best, with 10-15 seeds. 'Ruby' and 'Moro' are considered mid-season, while 'Sanguinelli' is late season. Other citrus varieties, that are called "oranges", such as 'Temple' and 'Ambersweet', are actually hybrids and are discussed in Home Fruit Production--Mandarins. Either T-budding or inverted T-budding onto sour orange seedling rootstocks is the primary means used to propagate oranges in Texas. Because of the high degree of nucellar embryony (seeds come true-to-type) in most orange varieties, they can be grown from seed. However, seedage has two major drawbacks: 1) the seedling-grown trees will be short-lived because of their susceptibility to Phytophthora disease (both foot rot and root rot) and 2) fruit production will usually be delayed for up to 15 years until the seedling trees grow through juvenility and become capable of bearing. PLANTING AND ESTABLISHMENT Most orange trees propagated in the Lower Rio Grande Valley are grown in field nurseries. Such trees are then dug as if they will be balled-and-burlapped, but instead of wrapping the root ball with burlap, nurserymen commonly use a strip of burlap under the tree to lift it into a two-gallon container. Since the root ball is intact and includes the soil in which it was growing, such trees can be transplanted directly from the container. Some orange trees, however, are container-grown entirely in an artificial, soilless medium--which requires special treatment at transplanting. After the planting hole is ready, remove the tree from the container and use a gentle stream of water from the garden hose to wash an inch or so of the medium from all around the root ball, thereby exposing the peripheral roots. Thus, the outer roots are placed in contact with the soil of the planting site and growth commences almost immediately. Under no circumstances should soil around the proposed planting site be removed to form a shallow basin for watering--to do so almost guarantees that the young tree will contract foot rot and die before its fifth year. The soil in the planting site should be at least as high as the surrounding yard, if not higher. In addition, the tree should be set slightly higher than it was in the nursery container to assure that the budunion will remain well above the soil. Mixing topsoil, compost, peat or other materials with the backfill soil is neither necessary nor desirable in good soils. Set the tree in the hole, backfill about halfway, then water sufficiently to settle the backfill around the lower roots. Finish backfilling the hole and then cover the root ball with about in inch of soil to seal the growing medium from direct contact with the air and thereby prevent rapid drying of the root ball. To facilitate watering, bring soil from the garden or elsewhere to construct a watering ring atop the ground around the newly planted tree. The ring should be about two feet across and several inches high and thick. To water, just fill the water ring immediately after planting. After the water soaks in, it may be necessary to add a little soil to any holes formed as the soil settled around the roots. The watering interval should be every few days for the first couple of weeks, then gradually increased to 7 to 10 days over the next couple of months. The watering ring will gradually melt into the surrounding soil, at which time the young orange tree can be considered to be established. All weeds and lawngrass should be completely eliminated inside the watering ring, as the developing tree cannot compete well. A systemic, contact herbicide will work very well, so long as it is not allowed to contact the young tree leaves or green bark. The best way to protect the young trunk from herbicide damage and, at the same time, to prevent sprouts along the trunk is to crimp an 8-inch by 18-inch piece of heavy duty aluminum foil around the trunk from the ground to the scaffold limbs. Fold the foil lengthwise, bring the long edges past the trunk on both sides, crimp the two edges together and lightly squeeze the foil around the trunk. While mulching of citrus trees is commonly practiced in southeast Texas where there is an abundance of materials to use, mulching is not recommended for oranges because it increases the possibility of the tree contracting foot rot, for which there is no cure for home gardens. If you insist on mulching, keep the mulch at least a foot away from the trunk. Fertilizer should be withheld until after growth commences. During the first year, a single cupful of ammonium sulfate (21-0-0) split into three or four applications is adequate. Use two cups in the second year and three in the third. Just scatter the fertilizer on the ground around the tree and water thoroughly. In areas other than the Valley, use whatever fertilizer analysis that is in general use in the area for trees and shrubs--simply adjust the rate based upon nitrogen content. Cold protection measures for orange trees will be required sooner or later. Soil banks are very effective for young trees; the soil should be put up about Thanksgiving and left in place until early March. Exercise care when taking down the soil bank, as the bark underneath will be extremely tender. Blankets, tarps or similar covers are also very effective and have the advantage of being quickly draped over the young tree. The corners should be stretched outward and tied down. More elaborate protection can be provided by erecting a frame structure of wood or PVC pipe over the plant to facilitate the use of plastic or large tarps during particularly severe cold weather. Supplemental heat can also be provided under the covers; incandescent bulbs and heat lamps are useful. MATURE TREE CARE Watering should be slow and thorough; probably every couple of weeks would suffice in any but the very sandy soils. Nutrition should continue at about one cup of ammonium sulfate per year of tree age annually in split applications in February, May and September, i.e. a 6-year-old tree should receive about six cups of 21-0-0 for the year. Adjust the rate for other fertilizers based upon the relative nitrogen content. Lawngrass should be kept back about a foot from the canopy of the tree. Other than cold damage, no pruning should be necessary, as the orange tree will develop its natural shape without pruning. While mulching is not recommended for citrus trees, if you must mulch, keep the mulch at least one foot away from the tree trunk. PRODUCTION, MATURITY AND USE Budded orange trees, if properly planted and grown, will bear harvestable fruit in the third season after transplanting. Any fruit that might set in the first and second seasons should probably be removed so that all of the young tree's energy is directed into growth. Production of navel oranges could approach 10-15 pounds in the third season, increasing to around 100-150 pounds at full maturity in the tenth season. Early and midseason oranges could start at about 20-25 pounds in the third season and increase to around 200-250 pounds per tree by the tenth season. 'Valencia' orange production will be a little less than that of early oranges. Oranges do not "ripen" in the general sense of the word as it is applied to other fruits; instead, they mature to good eating quality. Too, peel color is no indicator of maturity, as the peel undergoes natural degreening in November and December, and peel color of 'Valencia' oranges often regreens after the spring growth flush occurs. Oranges are classified by their season of maturity, i.e., early, midseason and late oranges. Early oranges include 'Parson Brown', 'Marrs', navels and 'Hamlin', in order of maturity from early September through early October. Midseason oranges include true 'Pineapple' and 'Jaffa', with 'Pineapple' usually maturing about Thanksgiving and 'Jaffa' about Christmas. The only late orange in Texas is 'Valencia' which matures about early February. Most oranges do not hold well on-tree; as they become overmature, they soften and drop. Overmature navel oranges also begin to dry out on the stem end, especially the larger, more oblong fruit. 'Marrs' and navels may hold into early February, especially in seasons having fairly cool weather in December and January. Midseason oranges typically hold through late February to March. 'Valencia' oranges hold much better than other oranges, often into June or July. Within limits, the longer the fruit stays on the tree, the sweeter it becomes. Navel oranges are typically peeled and eaten out-of-hand, the others are more commonly sliced or sectioned for fresh consumption or juiced for drinking. Seedy varieties are often referred to as "juice oranges" since juicing is about the easiest means to remove the seeds. Navel oranges can be juiced for immediate consumption, but navel orange juice becomes bitter after a few hours. With the exception of navel, the other oranges can be sectioned for freezing and the juice can also be frozen for later use. The pest and diseases which affect oranges in Texas are detailed in Home Fruit Production-Citrus, Table 2. In addition, the Asian citrus leafminer attacks the new flushes of growth when the developing leaves are only about an inch long, leaving serpentine trails from their feeding and causing stunting and distortion of the leaf. Occasionally, trails or mines occur on fruit as well. Each growth flush is susceptible to attack and there will be four growth flushes annually. The spring flush is least damaged, since the leafminer does not overwinter well, but the later flushes can be devastated. There are no chemical controls available for home use, although citrus spray oils do deter infestation if the application is timed to the development of a new flush of growth. Otherwise, it is best to try to ignore the damage; leafminer will not kill the tree and indiscriminate spraying kills a lot of the natural predators and parasites that help to keep leafminer populations down. There are very few orange tree problems that are life-threatening--and the home gardener cannot do anything about those anyway. Many of the rest of the insects and diseases that afflict oranges can generally be ignored in the home garden, as blemishes to the peel affect only the appearance and, in some cases, size of the fruit. If one must spray, first identify the problem, then select the appropriate material and apply it properly and at the appropriate time to control the pest while minimizing damage to the complex of beneficial organisms that exist in citrus. Home | Texas Citrus Industry | Citriculture | Pest Management | Harvest and Handling | Marketing Orchard Economics | Resources | Urban Citrus and Subtropical Fruits This page revised July 26, 2005
<urn:uuid:ad53aca5-0e7f-46e7-b03b-9ba159169214>
{ "date": "2016-10-01T03:19:39", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662507.79/warc/CC-MAIN-20160924173742-00282-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9541237354278564, "score": 3.71875, "token_count": 4050, "url": "http://aggie-horticulture.tamu.edu/citrus/oranges.htm" }
Wednesday, August 20, 2008 Want to introduce a discussion of annoying phrases that your students should edit from their writing? This cartoon may help . . . it shows two squirrels, with one saying to the other, "Must you always begin every sentence with 'To put it in a nutshell'?!" Have a great first day/week of classes.
<urn:uuid:41c9073f-f6f5-44eb-bce9-c1227dea17e1>
{ "date": "2014-09-01T14:55:09", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00464-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9173661470413208, "score": 2.609375, "token_count": 72, "url": "http://lawprofessors.typepad.com/legalwriting/2008/08/to-illustrate-a.html" }
By Shing Wai Chan on Sep 26, 2008 - compressionMinSize (in OCTET) compression = forceand compression = offrespectively. And one can also turn on the compression if the content-length is unknown or known to be greater than a certain size. There are two properties related to this: compression and compressionMinSize. In this blog, we will discuss various ways to accomplish this scenario in GlassFish v3. compression vs compressionMinSize |property||possible value if set||Default| |compression||on, force, off, integer||off| There are several possible combinations. We will summarize the behaviors of GlassFish v3 in the below table. In the following, α and β are integers. |on||β||compression with min size β| |on||not set||compression with default min size (2048)| |force||β or not set||compression with no size constraint| |α||β or not set||compression with min size α| |off or not set||β or not set||no compression| So, roughly speaking, whenever there is conflicting information between compression and compressionMinSize, the compression property will take precedence. Since we use strict inequality to check for known content length, the following are equivalent: compression = force compression = onand compressionMinSize = any negative integer How to test it?If one has turned on compression in GlassFish, then one will get HTTP compression if the HTTP request is - using HTTP 1.1 - with a HTTP header: - the content-length is unknown or greater than the compression minimum size compression = force) - Content-Encoding: gzip
<urn:uuid:45a5b759-ff6a-4861-8513-467dd51b5c24>
{ "date": "2015-04-21T08:48:27", "dump": "CC-MAIN-2015-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246641054.14/warc/CC-MAIN-20150417045721-00286-ip-10-235-10-82.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.7136228680610657, "score": 2.546875, "token_count": 370, "url": "https://blogs.oracle.com/swchan/tags/compression" }
Language: The Algonquian language Menominee (or Menomini) is today spoken by only a few tribal elders in Wisconsin, though some younger Menominees hope to revive the language. Menominee is a polysynthetic language with complex verbs and fairly free word order. People: The Menominee Indians called themselves Mamaceqtaw, but their Algonquian relatives called them Menomini, "wild-rice people," and the name stuck. Original inhabitants of Wisconsin and Upper Michigan, the Menominee people were traditional enemies of the Fox (Mesquakie). Around 7000 Menominee Indians live in Wisconsin today. History: The Menominee tribe was the victim of immigration pressure before Europeans ever reached the Americas. Of all the surviving Native American peoples in Wisconsin, the Menominee and the Winnebago are the only ones who claim to be original to that area: the Fox and Sauk, Dakota, Illinois, and Cheyenne migrated from elsewhere, and the Menominee Indians, never a large tribe, couldn't do much to stop it. After European contact, things became worse--population pressures increased as the Ojibwe and Huron tribes were forced into Wisconsin by European and Iroquoian expansion. Then the white settlers themselves arrived. Most small Algonquian tribes of Wisconsin were wiped out by the fighting and epidemics of that era, but not the Menominee tribe. Due to a combination of good fortune and political adroitness, the Menominee managed to maintain friendly relations with the powerful Dakota and Ojibwe even as those two nations fought each other. The near-annihilation of the Winnebagos, tragic though it was, provided relief for the overcrowded region, and the Menominee tribe was able to claim some of that land. Later attempts by the Americans to relocate the Menominee to Minnesota were successfully fended off by Menominee Chief Oshkosh, and the tribe's pioneering work in sustainable forest management under his guidance was so effective that the US government actually terminated their status as an Indian Nation in 1961, declaring Menominee lands no longer in need of protection. The results of this termination were disastrous, and the US reversed policy 12 years later.
<urn:uuid:d022cbfd-a1e0-4a0f-93b6-1f5bf56a14f9>
{ "date": "2017-01-21T06:27:19", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00266-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9607475399971008, "score": 3.828125, "token_count": 512, "url": "http://www.native-languages.org/menominee.htm" }
Heart Disease is really a potential threat to huge numbers of people worldwide. A killer disease like cardiac arrest can strike anytime, and threaten individuals with improper diet, life styles and certain genetic preconditions. Coronary Heart Disease affects about 14 million People in america. Reason For Heart Disease Symptoms Of Heart Disease is triggered with a buildup of body fat and tissue within the arterial blood vessels, the ships that carry bloodstream from heart to numerous areas of the body. The arterial blood vessels are clogged using the buildup leading to improper bloodstream flow. This will cause Heart Disease because the heart cannot receive oxygen transported by bloodstream. This kind of solidifying of arterial walls is called arteriosclerosis. You will find several risks for Heart Disease. They include cholesterol, tobacco, body fat that contains diet and sedentary lifestyle. Weight problems, diabetes and bloodstream pressure may also cause Heart Disease. Genetics is yet another major predictor of Heart Disease. Should you lead a demanding existence, then likelihood of Heart Disease will also be high. Risks has sorted out into flexible and non-flexible based on regardless of whether you can help to eliminate the danger by manipulating the risks. Genetics, gender and age are non-flexible risks, while cholesterol, smoking, diabetes and bloodstream pressure are flexible risks. Would Be The Risks Good Predictors Of Heart Disease? Heart Disease is triggered through the interplay of numerous risks, including cholesterol. Cholesterol is among the major predictors of Heart Disease. Genetics, as pointed out, is yet another people whose family people happen to be stricken by Heart Disease is going for normal screening. Signs and symptoms Of Heart Disease Heart Disease might be known, like a quiet killer because the start of the center attack can frequently be fatal. However, you will find certain signs and symptoms you need to be careful for. 1. Discomfort within the chest. 2. Discomfort in upper abdomen. 3. Panting after strenuous activity. 4. Vomiting and nausea. 5. Dizzy spells. Timely medical assistance can spell the main difference between existence and dying. Stopping Heart Disease Stopping Heart Disease is simple along with a couple of safeguards will go a lengthy means by reducing your odds of getting cardiac arrest. Keeping bad levels of cholesterol low is essential. Traditional risks can identify people most in danger, so you should consult a clinical specialist and make certain that risk is reduced. Changes in lifestyle may have a huge effect on occurrence of Heart Disease. If you don’t lead an energetic existence, likelihood of Heart Disease increase multiple occasions. Stress is yet another major reason for Heart Disease. To be able to prevent Heart Disease, you have to be physically active and also have a low-calorie, high fiber diet. Smoking and an excessive amount of alcohol may also make Heart Disease a hard condition to deal with. Tests For Heart Disease Your physician may request for tests to verify Heart Disease if he suspects you fall within the high-risk category. The obvious signs doctors search for inside a routine check include irregular heartbeat and murmurs. Tests include coronary angiography, ECG or electrocardiogram and CT scan. Your medical specialist will recommend the very best test. A chest x ray could also be suggested. Symptoms Of Heart Disease could be avoided through change in lifestyle by reducing mental stress. Healthy diet, exercise along with a relaxed lifestyle go a lengthy means by countering one of the main murders from the modern day. Medicine has additionally found possible ways for stopping Heart Disease, for individuals vulnerable to it because of hereditary along with other factors. For those who have entered age 30 and think you’re in the moderate or high-risk category, you need to go to your medical specialist today and obtain an intensive check-up done.
<urn:uuid:f4b7d444-cc76-4ebf-8b4a-2b320a67f895>
{ "date": "2016-12-08T02:00:40", "dump": "CC-MAIN-2016-50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542323.80/warc/CC-MAIN-20161202170902-00360-ip-10-31-129-80.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9206244945526123, "score": 3, "token_count": 782, "url": "http://symptomsofheart.com/" }
By Silvia Casabianca, Voxxi The Violence Against Women Act (VAWA) waits in limbo for reauthorization in Congress. While legislators discuss content, thousands of women are suffering the physical and mental consequences of abuse, and abusers go on with impunity. Among those women, uncounted undocumented Latinas continue to be unaware of their right to be protected by the law. They aren’t likely to report domestic violence incidents out of fear of being deported, of seeing their families split, and of enraging their partners making violence even worse. President Bill Clinton first signed the Violence Against Women Act in 1994 with bipartisan support. The act has been reauthorized in 2000 and 2005 thanks to bipartisan endeavors until it expired last year. However, this year Republicans proposed significant changes to the Act that will very likely weaken protection for the victims. Legislators currently discuss two versions of the Act. In April, the Senate passed an Act that increases the number of U visas. This version adds provisions to offer visas to undocumented victims of domestic abuse, extends protection to victims in the gay community, and grants more authority for American Indian victims to denounce and go after non-Indian perpetrators. However, more recently, and arguing that undocumented aliens are using the current law fraudulently, the House passed their own version that allows the immigration officials to interview the accused abuser. Domestic violence specialists believe that calling the abuser to the courts might alert and prompt him to impose harsher chastisement on their victims. This House version doesn’t include protections for LGBT victims and limits the number of temporary visas offered to those women who agree to testify, which would probably discourage reporting. The FBI has reported that a woman is physically abused by her partner every nine seconds in the United States. However, the number must be considerably higher. Domestic violence cases go unreported among the general population but more so and for many reasons among undocumented Hispanics. Immigrant women living under the radar fear not only their men. They have to face the language barrier, the lack of awareness of the law, the lack of resources, and more importantly, religious and cultural beliefs that make women pledge allegiance to their mates and make immense sacrifice to keep families intact. Abusers are controllers. They typically isolate their victims, have power over them financially, and systematically crush their spirit to the point that victims come to believe they deserve being abused. Women whose immigration status has not yet being established are controlled and manipulated by their batterers to keep them in the abusive relationship. Emotional and verbal abuse will not even be the matter of enforcement. And police won’t get involved in cases of domestic violence if there are no bodily injuries or death threats. Protected under the law Non-profit organizations that shelter women in danger are not always aware that they are explicitly exempt from verifying immigration status as a condition for providing services and may deny services to the victims. However, Attorney General’s order states that services “necessary for the protection of life and safety” be provided without regard to immigration status. On the other hand, many shelters offer human trafficking and immigration services that may include helping the victim get a U visa. The purpose of the U visa is to give victims of certain crimes temporary legal status and work eligibility in the United States for up to 4 years. Is the progress brought by VAWA compromised? Since VAWA’s implementation, local, state, and national laws have started to change. Programs, business and communities have started to respond to victim’s needs in a more efficient way. Studies show that rates of violence and reporting of crime are going up. Moreover, thanks to increased awareness brought on the issue of domestic violence, more than 660 state laws have passed to combat abuse including, dating violence, sexual assault and stalking. Also, a larger number of victims are reporting violence. “Domestic violence can happen to anyone, anywhere and our laws should reflect that,” said Representative Judy Biggert (R-IL), a key co-sponsor of the last VAWA reauthorization in 2005. “We cannot allow VAWA to fall victim to partisan gridlock. House and Senate leaders should act now to resolve their differences and send the President a strong bill that provides life-saving services for victims of abuse, assault and rape.” Programs and services provided or funded by VAWA would be at risk if the law is not reauthorized. Among them, community violence prevention programs; protection for victims who have been evicted from their homes due to domestic violence incidents; funding for rape crisis centers and hotlines; programs supporting immigrant women, women with disabilities and women from other ethnicities and legal aid for survivors. CORRECTION: An earlier version of this article included an incorrect spelling of the author's name. HuffPost Latino Voices regrets the error and any confusion it may have caused.
<urn:uuid:5895ffe9-414d-4ff6-bc21-1351afb0345e>
{ "date": "2016-10-01T04:30:51", "dump": "CC-MAIN-2016-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662507.79/warc/CC-MAIN-20160924173742-00282-ip-10-143-35-109.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9527227282524109, "score": 2.53125, "token_count": 1010, "url": "http://www.huffingtonpost.com/2012/08/15/domestic-violence-latina-women-undocumented_n_1778731.html" }
Billable Medical Code for Acidosis Diagnosis Code for Reimbursement Claim: ICD-9-CM 276.2 Code will be replaced by October 2015 and relabeled as ICD-10-CM 276.2. Metabolic acidosis is also known as acidosis metabolic, alcohol induced ketoacidosis, alcoholic ketoacidosis, ketoacidosis due to acute alcohol intoxication, ketoacidosis due to acute alcoholic intoxication, ketosis, lactic acidosis, metabolic acidosis, metabolic acidosis w increased anion gap, metabolic acidosis increased anion gap, metabolic acidosis increased anion gap (IAG), and respiratory acidosis. This excludes diabetic acidosis (249.1, 250.1). This applies to acidosis: NOS, lactic, metabolic, and respiratory. Metabolic Acidosis Definition and Symptoms Metabolic acidosis is a disorder where the body is producing too much acid and the kidney is not removing enough acid. This can be a very serious condition resulting in coma or even death. Symptoms include rapid breathing, lethargy, confusion, and shock.
<urn:uuid:b732c8a2-13e1-460e-815e-97e97ed0842b>
{ "date": "2017-04-25T16:21:37", "dump": "CC-MAIN-2017-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00646-ip-10-145-167-34.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8402241468429565, "score": 2.6875, "token_count": 234, "url": "http://healthresearchfunding.org/metabolic-acidosis-icd-9-code-2/" }
Bullying Among Children and Youth with Disabilities and Special Needs By: HRSA Stop Bullying Now! Campaign Children with learning disabilities and special needs may be at increased risk of being bullied. Further, a child’s disability can make it difficult to identify the type of bullying that is occurring. It is important for both teachers and parents to take the time to clearly define and describe bullying behaviors for children with disabilities, so they can identify bullying and notify adults if they experience or witness bullying. In order to help children involved in bullying, their families, their educators, and other people involved in helping them, The U.S. Department of Health and Human Services' (HHS) Health Resources and Services Administration (HRSA) and their partners developed the Stop Bullying Now! Campaign to raise awareness about bullying and promote effective prevention efforts in schools and communities across the country. What Is Bullying? Bullying is aggressive behavior that is intentional and that involves an imbalance of power or strength. Often it is repeated over time. Bullying is not the same thing as conflict. Conflict involves antagonism among two or more people. Any two people can have a conflict (or a disagreement or a fight), but bullying only occurs where there is a power imbalance. Bullying can take many forms. Direct bullying can involve hitting, kicking, shoving, spitting, taunting, teasing, racial slurs, verbal harassment, threatening, and obscene gestures. Indirect bullying can involve getting another person to bully someone for you, spreading rumors, deliberately excluding someone from a group, and cyberbullying. The research that has been conducted on bullying among children with disabilities and special needs indicates that these children may be at particular risk of being bullied by their peers. - Although little research has been conducted on the relation between learning disabilities (LD) and bullying, available information indicates that children with learning disabilities are at greater risk of being teased and physically bullied. - Children with Attention Deficit Hyperactivity Disorder (ADHD) are more likely than other children to be bullied. They also are somewhat more likely than others to bully their peers. - Children with medical conditions that affect their appearance (e.g., cerebral palsy, muscular dystrophy, spina bifida) are more likely to be victimized by peers. Frequently, these children report being called names related to their disability. Obesity also may place children at higher risk of being bullied. - Children with hemiplagia (paralysis to one side of their body) are more likely than other children their age to be victimized by peers, to be rated as less popular than their peers, and to have fewer friends than other children. - Children who have diabetes and who are dependent on insulin may be especially vulnerable to peer bullying. As harassment is a serious issue in our nation’s schools, the Stop Bullying Now! Campaign strives to communicate that sometimes there can be debilitating results of being bullied. Children who are bullied are more likely than their peers to be depressed; anxious; have low self-esteem; suffer from headaches, stomach aches, and fatigue; be apprehensive about going to school; and think of suicide. There are steps parents can take if they think their child is being bullied. What Is the Law for Students with Learning Disabilities and Special Needs? Under the Rehabilitation Act of 1973 and Title II of the Americans with Disabilities Act of 1990, bullying behavior may cross the line to become “disability harassment,” which is illegal. According to the U.S. Department of Education, disability harassment is “intimidation or abusive behavior toward a student based on disability that creates a hostile environment by interfering with or denying a student’s participation in or receipt of benefits, services, or opportunities in the institution’s program” (U.S. Department of Education, 2000). This harassment can take different forms, including verbal harassment, physical threats, or threatening written statements. Disability harassment can occur in any location that is connected with the school: in classrooms, in the cafeteria, in hallways, on the playground, or athletic fields, or on a school bus. It also can occur during school-sponsored events (Education Law Center, 2002). What Can Parents Do? It is important to always be supportive of your child and listen to your child’s experiences. Be sure to tell your child that it isn’t their fault. Do not encourage your child to fight back. Write down as much information as possible about your child’s experiences and share this with your child’s teacher to see if he or she can help to quickly resolve the problem. If the bullying or harassment is severe, or if the teacher does not fix the problem quickly, contact the principal and put your concerns in writing. Parents of children with learning disabilities and special needs can ask the school district to convene a meeting of the Individualized Education Program (IEP) team or the Section 504 team, a group convened to ensure that the school district is meeting the needs of students with disabilities. These teams are trained to listen to your concerns and needs and will provide them an opportunity to review your child’s IEP or 504 plan to ensure the school is taking steps to stop the bullying and or harassment. This also provides an opportunity for you to mention if your child needs counseling or other supportive services because of the bullying and or harassment. Additionally, sometimes children and youth who are bullied also bully others. Parents should ask their children questions to find out if their child is bullying peers or younger children. If this is possible, the child’s IEP may need to be modified to include assistance in changing the aggressive behavior. Take a Stand. Lend a Hand. Stop Bullying Now! Campaign Resources Recently, the Stop Bullying Now! Campaign introduced two new resources to help prevent bullying. These materials include the Stop Bullying Now! Activities Guide and the Stop Bullying Now! DVD Video Toolkit for schools and communities. The Stop Bullying Now! Activities Guide provides guidance and creative ideas to help make the many Campaign resources work in your school and community. Containing tips on organizing events, working with local media, and more, the Stop Bullying Now! Activities Guide is a great resource for any parent, teacher, community leader, or young person to use to prevent bullying. The Stop Bullying Now! DVD Video Toolkit contains all of the Stop Bullying Now! video content — previously only available online — and packages it in a user-friendly DVD that can be played in any classroom or community setting with a TV and a DVD player. The disc contains material for youth and adults, including 12 animated webisodes, public service announcements and video workshops. The Video Toolkit also comes with an Instructor’s Guide that provides guidance on how to put the video content to work in a school or community. Also available is the Stop Bullying Now! Resource Kit. The kit is comprised of tip sheets that address the needs and interests of parents, educators and administrators, health and safety professionals, and others who confront bullying everyday. The Stop Bullying Now! Resource Kit articulates the ways in which adults interacting with youth can work successfully on their own and collaboratively to respond to bullying. All Resource Kit materials are available in high-quality, printable format on the Stop Bullying Now! Campaign website. Hard copies of the Resource Kit can be obtained by calling 1-888-ASK-HRSA. The Stop Bullying Now! Campaign’s website is the central hub for all campaign activities, and includes two full sections – one for youth and one for adults. Both sides of the website have information and materials to help visitors learn about bullying and how to effectively prevent bullying. For more information, visit the Stop Bullying Now! Campaign website – http://stopbullyingnow.hrsa.gov. Susan P. Limber, PhD, MLS, Professor & Associate Director, Institute on Family and Neighborhood Life, Clemson University, South Carolina wrote this article exclusively for LD OnLine at the request of the HRSA Stop Bullying Now Campaign. (2007).
<urn:uuid:f7b23631-ef31-4fc4-a4aa-06013f301b8c>
{ "date": "2016-05-30T12:38:46", "dump": "CC-MAIN-2016-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051002346.10/warc/CC-MAIN-20160524005002-00191-ip-10-185-217-139.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9567145705223083, "score": 3.703125, "token_count": 1675, "url": "http://www.ldonline.org/article/20001" }
- About Extension - Get Involved - Statewide Locations Fight fire with plants? You bet. July 20, 2012 CORVALLIS, Ore. – With summer and wildfire season upon us, it's a good time to look at your yard and see if it's a fire hazard. One way to reduce the risk of a fire engulfing your house is by surrounding it with fire-resistant plants. Such plants do not readily ignite. They may be damaged or even killed by fire, but their foliage and stems do not significantly contribute to a fire's intensity, said Amy Jo Detweiler, a horticulturist with the Oregon State University Extension Service. In essence, they can create a living wall that reduces and blocks intense heat. Detweiler emphasized, however, that fire-resistant plants will burn if not watered and pruned. Plants that are fire-resistant have moist, supple leaves and tend not to accumulate dry, dead material within the plant. Their sap is water-like without a strong odor. Most deciduous trees and shrubs are fire-resistant. Annuals and lawns also can be part of a fire-resistant landscape if sufficiently watered and maintained. Plants that are highly flammable generally have fine, dry or dead leaves or needles within the plant. Their leaves, twigs and stems contain volatile waxes or oils and the leaves have a strong odor when crushed. Their sap is gummy, resinous and also has a strong smell. Some have loose or papery bark. One highly flammable shrub is juniper, said Detweiler, adding that bark mulch can also easily ignite. Use gravel or decorative rock instead, she advised. Detweiler said that conifers and other large trees that are next to your house should be pruned on the first 15-20 feet of their trunks (or to just above the lower roofline) to keep fire from reaching the house or tree tops. She recommends selecting the following fire-resistant plants in the Pacific Northwest and other western states. Check with your local Extension office or a nursery, however, to find out which plants are suitable for your area and to avoid planting invasive ones. The plants, accompanied by color photos, are described in a 48-page guide, Fire-Resistant Plants for Home Landscapes (PNW 590), published by the OSU Extension Service. The guide is available free online, or purchase a printed copy from the Extension catalog. Carpet bugleweed, pink pussytoes, kinnikinnick, rock cress, mahala mat, snow-in-summer, dianthus, garden carnation or pinks, yellow iceplant, purple iceplant, wild strawberry, dead nettle, Japanese pachysandra, creeping phlox, sedum or stonecrops, hens and chicks, creeping thyme and speedwell. Yarrow, chives, columbine Sea thrift, basket of gold, heartleaf bergenia, sedges, trumpet vine, tickseed, delphinium, coneflower (Echinacea), fire weed, blanket flower, grayleaf cranesbill, sun rose, daylily, corabells, hosta lily, iris, torchlily (red hot poker), lavender, blue flax, honeysuckle, lupine, evening primrose, oriental poppy, beardtongue, prairie coneflower (Mexican hat), salvia (sage), lambs ear, yucca. Shrubs: Broadleaf Evergreen Point reyes ceanothus, orchid rockrose, Carol Mackie daphne, cranberry cotoneaster, Oregon grapeholly, creeping holly, salal, Oregon boxwood, Pacific rhododendron. Vine maple, serviceberry, rocky mountain maple, blue mist spirea, redosier dogwood, dwarf burning bush, oceanspray, mockorange, Russian sage, tall hedge, western sandcherry, fernleaf buckthorn, western azalea, sumac, flowering currant, hardy shrub rose, wood's rose, willow, bumald spirea, snowberry, western spirea, lilac, compact American cranberry. Western larch, ponderosa pine. Amur maple, bigleaf maple, red maple, horse chestnut, mountain alder, red alder, birch, Western catalpa, common hackberry, eastern redbud, flowering dogwood, Hawthorn (not European Hawthorn), green ash, European beech, white ash, thornless honeylocust, Kentucky coffee tree, walnut, American sweetgum, crabapple, quaking aspen, Western or California sycamore, chokecherry, Oregon white oak, Canada red chokecherry, pin oak, purple robe locust, red oak, mountain ash.
<urn:uuid:aa7ca865-1d78-46f5-af3c-3d3c3bd00bdb>
{ "date": "2015-01-29T14:52:44", "dump": "CC-MAIN-2015-06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115855094.38/warc/CC-MAIN-20150124161055-00039-ip-10-180-212-252.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8696818351745605, "score": 3.125, "token_count": 1037, "url": "http://extension.oregonstate.edu/gardening/fight-fire-plants-you-bet" }
These interactive tools give you an opportunity to get your hands on some data so you can further explore what you've learned from Against All Odds. The Stemplots tool organizes data — either your own input or randomly generated — into a stemplot. Students can use it to gain insight into the shapes of data, describe patterns in data, and practice calculating the mean and median. You’ll find examples of stemplot use in Units 2 and 4. The Wafer Thickness tool generates data (represented as a histogram) on the thickness of polished silicon wafers manufactured under specified levels of three controls. It gives students the opportunity to describe the shape, center, and spread of a histogram, compare histograms, and compute numeric summaries. You’ll find useful information for this activity in Units 3 and 31. The Control Chart interactive allows the user to play the role of a semiconductor quality control manager in charge of monitoring the thickness of polished silicon wafers used in the manufacture of microchips. You’ll find an activity to accompany this interactive tool in Unit 23.
<urn:uuid:bbcc3da8-d5f2-4317-9b8d-0d4455e4cc53>
{ "date": "2014-09-16T23:31:07", "dump": "CC-MAIN-2014-41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657120057.96/warc/CC-MAIN-20140914011200-00138-ip-10-196-40-205.us-west-1.compute.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.8345868587493896, "score": 3.953125, "token_count": 228, "url": "http://www.learner.org/courses/againstallodds/interactives/index.html" }
|Part of a series on| Entrepreneurship is the process of designing, launching and running a new business, which is often initially a small business. The people who create these businesses are called entrepreneurs[need quotation to verify] Entrepreneurship has been described as the "capacity and willingness to develop, organize and manage a business venture along with any of its risks in order to make a profit". While definitions of entrepreneurship typically focus on the launching and running of businesses, due to the high risks involved in launching a start-up, a significant proportion of start-up businesses have to close due to "lack of funding, bad business decisions, an economic crisis, lack of market demand—or a combination of all of these. A broader definition of the term is sometimes used, especially in the field of Economics. In this usage, an Entrepreneur is an entity which has the ability to find and act upon opportunities to translate inventions or technology into new products: "The entrepreneur is able to recognize the commercial potential of the invention and organize the capital, talent, and other resources that turn an invention into a commercially viable innovation." In this sense, the term "Entrepreneurship" also captures innovative activities on the part of established firms, in addition to similar activities on the part of new businesses. - 1 Elements - 2 History - 3 Types - 4 Entrepreneurial Behaviors - 5 Psychological makeup - 6 Entrepreneurship Training and Education - 7 Resources and Financing - 8 Predictors of success - 9 See also - 10 References - 11 Bibliography - 12 Further reading Entrepreneurship is the act of being an entrepreneur, or "the owner or manager of a business enterprise who, by risk and initiative, attempts to make profits". Entrepreneurs act as managers and oversee the launch and growth of an enterprise. Entrepreneurship is the process by which either an individual or a team identifies a business opportunity and acquires and deploys the necessary resources required for its exploitation. Early 19th century French economist Jean-Baptiste Say provided a broad definition of entrepreneurship, saying that it "shifts economic resources out of an area of lower and into an area of higher productivity and greater yield". Entrepreneurs create something new, something different—they change or transmute values. Regardless of the firm size, big or small, they can partake in entrepreneurship opportunities. The opportunity to become an entrepreneur requires four criteria. First, there must be opportunities or situations to recombine resources to generate profit. Second, entrepreneurship requires differences between people, such as preferential access to certain individuals or the ability to recognize information about opportunities. Third, taking on risk is a necessary. Fourth, the entrepreneurial process requires the organization of people and resources. The entrepreneur is a factor in and the study of entrepreneurship reaches back to the work of Richard Cantillon and Adam Smith in the late 17th and early 18th centuries. However, entrepreneurship was largely ignored theoretically until the late 19th and early 20th centuries and empirically until a profound resurgence in business and economics since the late 1970s. In the 20th century, the understanding of entrepreneurship owes much to the work of economist Joseph Schumpeter in the 1930s and other Austrian economists such as Carl Menger, Ludwig von Mises and Friedrich von Hayek. According to Schumpeter, an entrepreneur is a person who is willing and able to convert a new idea or invention into a successful innovation. Entrepreneurship employs what Schumpeter called "the gale of creative destruction" to replace in whole or in part inferior innovations across markets and industries, simultaneously creating new products including new business models. In this way, creative destruction is largely responsible for the dynamism of industries and long-run economic growth. The supposition that entrepreneurship leads to economic growth is an interpretation of the residual in endogenous growth theory and as such is hotly debated in academic economics. An alternate description posited by Israel Kirzner suggests that the majority of innovations may be much more incremental improvements such as the replacement of paper with plastic in the making of drinking straws. The exploitation of entrepreneurial opportunities may include: - Developing a business plan - Hiring the human resources - Acquiring financial and material resources - Providing leadership - Being responsible for both the venture's success or failure - Risk aversion Economist Joseph Schumpeter (1883–1950) saw the role of the entrepreneur in the economy as "creative destruction" – launching innovations that simultaneously destroy old industries while ushering in new industries and approaches. For Schumpeter, the changes and "dynamic disequilibrium brought on by the innovating entrepreneur [were] the norm of a healthy economy". While entrepreneurship is often associated with new, small, for-profit start-ups, entrepreneurial behavior can be seen in small-, medium- and large-sized firms, new and established firms and in for-profit and not-for-profit organizations, including voluntary-sector groups, charitable organizations and government. Entrepreneurship may operate within an entrepreneurship ecosystem which often includes: - Government programs and services that promote entrepreneurship and support entrepreneurs and start-ups - Non-governmental organizations such as small-business associations and organizations that offer advice and mentoring to entrepreneurs (e.g. through entrepreneurship centers or websites) - Small-business advocacy organizations that lobby governments for increased support for entrepreneurship programs and more small business-friendly laws and regulations - Entrepreneurship resources and facilities (e.g. business incubators and seed accelerators) - Entrepreneurship education and training programs offered by schools, colleges and universities - Financing (e.g. bank loans, venture capital financing, angel investing and government and private foundation grants)[need quotation to verify] In the 2000s, usage of the term "entrepreneurship" expanded to include how and why some individuals (or teams) identify opportunities, evaluate them as viable, and then decide to exploit them. The term has also been used to discuss how people might use these opportunities to develop new products or services, launch new firms or industries, and create wealth. The entrepreneurial process is uncertain because opportunities can only be identified after they have been exploited. Entrepreneurs tend exhibit positive biases towards finding new possibilities and seeing unmet market needs, and a tendency towards risk-taking that makes them more likely to exploit business opportunities. "Entrepreneur" (// ( listen)) is a loanword from French. The word first appeared in the French dictionary entitled Dictionnaire Universel de Commerce compiled by Jacques des Bruslons and published in 1723. Especially in Britain, the term "adventurer" was often used to denote the same meaning. The study of entrepreneurship reaches back to the work in the late 17th and early 18th centuries of Irish-French economist Richard Cantillon, which was foundational to classical economics. Cantillon defined the term first in his Essai sur la Nature du Commerce en Général, or Essay on the Nature of Trade in General, a book William Stanley Jevons considered the "cradle of political economy". Cantillon defined the term as a person who pays a certain price for a product and resells it at an uncertain price, "making decisions about obtaining and using the resources while consequently admitting the risk of enterprise". Cantillon considered the entrepreneur to be a risk taker who deliberately allocates resources to exploit opportunities in order to maximize the financial return. Cantillon emphasized the willingness of the entrepreneur to assume the risk and to deal with uncertainty, thus he drew attention to the function of the entrepreneur and distinguished between the function of the entrepreneur and the owner who provided the money. Jean-Baptiste Say also identified entrepreneurs as a driver for economic development, emphasizing their role as one of the collecting factors of production allocating resources from less to fields that are more productive. Both Say and Cantillon belonged to French school of thought and known as the physiocrats. Dating back to the time of the medieval guilds in Germany, a craftsperson required special permission to operate as an entrepreneur, the small proof of competence (Kleiner Befähigungsnachweis), which restricted training of apprentices to craftspeople who held a Meister certificate. This institution was introduced in 1908 after a period of so-called freedom of trade (Gewerbefreiheit, introduced in 1871) in the German Reich. However, proof of competence was not required to start a business. In 1935 and in 1953, greater proof of competence was reintroduced (Großer Befähigungsnachweis Kuhlenbeck), which required craftspeople to obtain a Meister apprentice-training certificate before being permitted to set up a new business. In the 20th century, entrepreneurship was studied by Joseph Schumpeter in the 1930s and other Austrian economists such as Carl Menger, Ludwig von Mises and Friedrich von Hayek. While the loan from French of the word "entrepreneur" dates to the 1850, the term "entrepreneurship" was coined around the 1920s. According to Schumpeter, an entrepreneur is willing and able to convert a new idea or invention into a successful innovation. Entrepreneurship employs what Schumpeter called "the gale of creative destruction" to replace in whole or in part inferior offerings across markets and industries, simultaneously creating new products and new business models, thus creative destruction is largely responsible for long-term economic growth. The idea that entrepreneurship leads to economic growth is an interpretation of the residual in endogenous growth theory[clarification needed] and as such continues to be debated in academic economics. An alternate description by Israel Kirzner suggests that the majority of innovations may be incremental improvements such as the replacement of paper with plastic in the construction of a drinking straw that require no special qualities. For Schumpeter, entrepreneurship resulted in new industries and in new combinations of currently existing inputs. Schumpeter's initial example of this was the combination of a steam engine and then current wagon making technologies to produce the horseless carriage. In this case, the innovation (i.e. the car) was transformational, but did not require the development of dramatic new technology. It did not immediately replace the horse-drawn carriage, but in time incremental improvements reduced the cost and improved the technology, leading to the modern auto industry. Despite Schumpeter's early 20th-century contributions, the traditional microeconomic theory did not formally consider the entrepreneur in its theoretical frameworks (instead of assuming that resources would find each other through a price system). In this treatment, the entrepreneur was an implied but unspecified actor, consistent with the concept of the entrepreneur being the agent of x-efficiency. For Schumpeter, the entrepreneur did not bear risk: the capitalist did. Schumpeter believed that the equilibrium was imperfect. Schumpeter (1934) demonstrated that the changing environment continuously provides new information about the optimum allocation of resources to enhance profitability. Some individuals acquire the new information before others and recombine the resources to gain an entrepreneurial profit. Schumpeter was of the opinion that entrepreneurs shift the production possibility curve to a higher level using innovations. Initially, economists made the first attempt to study the entrepreneurship concept in depth. Alfred Marshall viewed the entrepreneur as a multi-tasking capitalist and observed that in the equilibrium of a completely competitive market there was no spot for "entrepreneurs" as an economic activity creator. In the 2000s, entrepreneurship has been extended from its origins in for-profit businesses to include social entrepreneurship, in which business goals are sought alongside social, environmental or humanitarian goals and even the concept of the political entrepreneur.[according to whom?] Entrepreneurship within an existing firm or large organization has been referred to as intrapreneurship and may include corporate ventures where large entities "spin-off" subsidiary organizations. Entrepreneurs are leaders willing to take risk and exercise initiative, taking advantage of market opportunities by planning, organizing and deploying resources, often by innovating to create new or improving existing products or services. In the 2000s, the term "entrepreneurship" has been extended to include a specific mindset resulting in entrepreneurial initiatives, e.g. in the form of social entrepreneurship, political entrepreneurship or knowledge entrepreneurship. According to Paul Reynolds, founder of the Global Entrepreneurship Monitor, "by the time they reach their retirement years, half of all working men in the United States probably have a period of self-employment of one or more years; one in four may have engaged in self-employment for six or more years. Participating in a new business creation is a common activity among U.S. workers over the course of their careers". In recent years, entrepreneurship has been claimed as a major driver of economic growth in both the United States and Western Europe. Entrepreneurial activities differ substantially depending on the type of organization and creativity involved. Entrepreneurship ranges in scale from solo, part-time projects to large-scale undertakings that involve a team and which may create many jobs. Many "high value" entrepreneurial ventures seek venture capital or angel funding (seed money) in order to raise capital for building and expanding the business. Many organizations exist to support would-be entrepreneurs, including specialized government agencies, business incubators (which may be for-profit, non-profit, or operated by a college or university), science parks and non-governmental organizations, which include a range of organizations including not-for-profits, charities, foundations and business advocacy groups (e.g. Chambers of commerce). Beginning in 2008, an annual "Global Entrepreneurship Week" event aimed at "exposing people to the benefits of entrepreneurship" and getting them to "participate in entrepreneurial-related activities" was launched.[who?] Relationship between small business and entrepreneurship The term "entrepreneur" is often conflated with the term "small business" or used interchangeably with this term. While most entrepreneurial ventures start out as a small business, not all small businesses are entrepreneurial in the strict sense of the term. Many small businesses are sole proprietor operations consisting solely of the owner—or they have a small number of employees—and many of these small businesses offer an existing product, process or service and they do not aim at growth. In contrast, entrepreneurial ventures offer an innovative product, process or service and the entrepreneur typically aims to scale up the company by adding employees, seeking international sales and so on, a process which is financed by venture capital and angel investments. Successful entrepreneurs have the ability to lead a business in a positive direction by proper planning, to adapt to changing environments and understand their own strengths and weakness. The term "ethnic entrepreneurship" refers to self-employed business owners who belong to racial or ethnic minority groups in the United States and Europe. A long tradition of academic research explores the experiences and strategies of ethnic entrepreneurs as they strive to integrate economically into mainstream U.S. or European society. Classic cases include Jewish merchants and tradespeople in large U.S. cities in the 19th and early 20th centuries as well as Chinese and Japanese small business owners (restaurants, farmers, shop owners) on the West Coast. In the 2010s, ethnic entrepreneurship has been studied in the case of Cuban business owners in Miami, Indian motel owners of the U.S. and Chinese business owners in Chinatowns across the United States. While entrepreneurship offers these groups many opportunities for economic advancement, self-employment and business ownership in the United States remain unevenly distributed along racial/ethnic lines. Despite numerous success stories of Asian entrepreneurs, a recent statistical analysis of U.S. census data shows that whites are more likely than Asians, African-Americans and Latinos to be self-employed in high prestige, lucrative industries. The American-born British economist Edith Penrose has highlighted the collective nature of entrepreneurship. She mentions that in modern organizations, human resources need to be combined in order to better capture and create business opportunities. The sociologist Paul DiMaggio (1988:14) has expanded this view to say that "new institutions arise when organized actors with sufficient resources [institutional entrepreneurs] see in them an opportunity to realize interests that they value highly". The notion has been widely applied. According to Christopher Rea and Nicolai Volland, cultural entrepreneurship is "practices of individual and collective agency characterized by mobility between cultural professions and modes of cultural production", which refers to creative industry activities and sectors. In their book The Business of Culture (2015), Rea and Volland identify three types of cultural entrepreneur: "cultural personalities", defined as "individuals who buil[d] their own personal brand of creativity as a cultural authority and leverage it to create and sustain various cultural enterprises"; "tycoons", defined as "entrepreneurs who buil[d] substantial clout in the cultural sphere by forging synergies between their industrial, cultural, political, and philanthropic interests"; and "collective enterprises", organizations which may engage in cultural production for profit or not-for-profit purposes. A feminist entrepreneur is an individual who applies feminist values and approaches through entrepreneurship, with the goal of improving the quality of life and well-being of girls and women. Many are doing so by creating "for women, by women" enterprises. Feminist entrepreneurs are motivated to enter commercial markets by desire to create wealth and social change, based on the ethics of cooperation, equality and mutual respect. Social entrepreneurship is the use of the by start up companies and other entrepreneurs to develop, fund and implement solutions to social, cultural, or environmental issues. This concept may be applied to a variety of organizations with different sizes, aims, and beliefs. For-profit entrepreneurs typically measure performance using business metrics like profit, revenues and increases in stock prices, but social entrepreneurs are either non-profits or blend for-profit goals with generating a positive "return to society" and therefore must use different metrics. Social entrepreneurship typically attempts to further broad social, cultural, and environmental goals often associated with the voluntary sector in areas such as poverty alleviation, health care and community development. At times, profit-making social enterprises may be established to support the social or cultural goals of the organization but not as an end in itself. For example, an organization that aims to provide housing and employment to the homeless may operate a restaurant, both to raise money and to provide employment for the homeless. A nascent entrepreneur is someone in the process of establishing a business venture.. In this observation, the nascent entrepreneur can be seen as pursuing an opportunity, i.e. a possibility to introduce new services or products, serve new markets, or develop more efficient production methods in a profitable manner . But before such a venture is actually established, the opportunity is just a venture idea. In other words, the pursued opportunity is perceptual in nature, propped by the nascent entrepreneur’s personal beliefs about the feasibility of the venturing outcomes the nascent entrepreneur seeks to achieve. Its prescience and value cannot be confirmed ex ante but only gradually, in the context of the actions that the nascent entrepreneur undertakes towards establishing the venture,. Ultimately, these actions can lead to a path that the nascent entrepreneur deems no longer attractive or feasible, or result in the emergence of a (viable) business. In this sense, over time, the nascent venture can move towards being discontinued or towards emerging successfully as an operating entity. The distinction between the novice, serial and portfolio entrepreneurs is an example of behavior-based categorization. Other examples are the (related) studies by, on start-up event sequences. Nascent entrepreneurship that emphasizes the series of activities involved in new venture emergence,, rather than the solitary act of exploiting an opportunity. Such research will help separate entrepreneurial action into its basic sub-activities and elucidate the inter- relationships between activities, between an activity (or sequence of activities) and an individual’s motivation to form an opportunity belief, and between an activity (or sequence of activities) and the knowledge needed to form an opportunity belief. With this research, scholars will be able to begin constructing a theory of the micro-foundations of entrepreneurial action. Scholars interested in nascent entrepreneurship tend to focus less on the single act of opportunity exploitation and more on the series of actions in new venture emergence,,. Indeed, nascent entrepreneurs undertake numerous entrepreneurial activities, including actions that make their businesses more concrete to themselves and others. For instance, nascent entrepreneurs often look for and purchase facilities and equipment; seek and obtain nancial backing, form legal entities, organize teams; and dedicate all their time and energy to their business Project entrepreneurs are individuals who are engaged in the repeated assembly or creation of temporary organizations. These are organizations that have limited lifespans which are devoted to producing a singular objective or goal and get disbanded rapidly when the project ends. Industries where project-based enterprises are widespread include: sound recording, film production, software development, television production, new media and construction. What makes project-entrepreneurs distinctive from a theoretical standpoint is that they have to "rewire" these temporary ventures and modify them to suit the needs of new project opportunities that emerge. A project entrepreneur who used a certain approach and team for one project may have to modify the business model or team for a subsequent project. Project entrepreneurs are exposed repeatedly to problems and tasks typical of the entrepreneurial process. Indeed, project-entrepreneurs face two critical challenges that invariably characterize the creation of a new venture: locating the right opportunity to launch the project venture and assembling the most appropriate team to exploit that opportunity. Resolving the first challenge requires project-entrepreneurs to access an extensive range of information needed to seize new investment opportunities. Resolving the second challenge requires assembling a collaborative team that has to fit well with the particular challenges of the project and has to function almost immediately to reduce the risk that performance might be adversely affected. Another type of project entrepreneurship involves entrepreneurs working with business students to get analytical work done on their ideas. The term "millennial entrepreneur" refers to a business owner who is affiliated with the generation that was brought up using digital technology and mass media—the products of Baby Boomers, those people born during the 1980s and early 1990s. Also known as Generation Y, these business owners are well equipped with knowledge of new technology and new business models and have a strong grasp of its business applications. There have been many breakthrough businesses that have come from millennial entrepreneurs such as Mark Zuckerberg, who created Facebook. Despite the expectation of millennial success, there have been recent studies that have proven this to not be the case. The comparison between millennials who are self-employed and those who are not self-employed shows that the latter is higher. The reason for this is because they have grown up in a different generation and attitude than their elders. Some of the barriers to entry for entrepreneurs are the economy, debt from schooling and the challenges of regulatory compliance. The entrepreneur is commonly seen as an innovator—a designer of new ideas and business processes. Management skills and strong team building abilities are often perceived as essential leadership attributes for successful entrepreneurs. Political economist Robert Reich considers leadership, management ability and team-building to be essential qualities of an entrepreneur. Uncertainty perception and risk-taking Theorists Frank Knight and Peter Drucker defined entrepreneurship in terms of risk-taking. The entrepreneur is willing to put his or her career and financial security on the line and take risks in the name of an idea, spending time as well as capital on an uncertain venture. However, entrepreneurs often do not believe that they have taken an enormous amount of risks because they do not perceive the level of uncertainty to be as high as other people do. Knight classified three types of uncertainty: - Risk, which is measurable statistically (such as the probability of drawing a red color ball from a jar containing five red balls and five white balls) - Ambiguity, which is hard to measure statistically (such as the probability of drawing a red ball from a jar containing five red balls but an unknown number of white balls) - True uncertainty or Knightian uncertainty, which is impossible to estimate or predict statistically (such as the probability of drawing a red ball from a jar whose contents, in terms of numbers of coloured balls, are entirely unknown) Entrepreneurship is often associated with true uncertainty, particularly when it involves the creation of a novel good or service, for a market that did not previously exist, rather than when a venture creates an incremental improvement to an existing product or service. A 2014 study at ETH Zürich found that compared with typical managers, entrepreneurs showed higher decision-making efficiency and a stronger activation in regions of frontopolar cortex (FPC) previously associated with explorative choice. "Coachability" and advice taking The ability of entrepreneurs to work closely with and take advice from early investors and other partners (i.e. their coachability) has long been considered a critical factor in entrepreneurial success. At the same time, economists have argued that entrepreneurs should not simply act on all advice given to them, even when that advice comes from well-informed sources, because entrepreneurs possess far deeper and richer local knowledge about their own firm than any outsider. Indeed, measures of coachability are not actually predictive of entrepreneurial success (e.g. measured as success in subsequent funding rounds, acquisitions, pivots and firm survival). This research also shows that older and larger founding teams, presumably those with more subject expertise, are less coachable than younger and smaller founding teams. Strategies that entrepreneurs may use include: - Innovation of new products, services or processes - Continuous process improvement (CPI) - Exploration of new business models - Use of technology - Use of business intelligence - Use of economical strategics - Development of future products and services - Optimized talent management Designing individual/opportunity nexus According to Shane and Venkataraman, entrepreneurship comprises both "enterprising individuals" and "entrepreneurial opportunities", so researchers should study the nature of the individuals who identify opportunities when others do not, the opportunities themselves and the nexus between individuals and opportunities. On the other hand, Reynolds et al. argue that individuals are motivated to engage in entrepreneurial endeavors driven mainly by necessity or opportunity, that is individuals pursue entrepreneurship primarily owing to survival needs, or because they identify business opportunities that satisfy their need for achievement. For example, higher economic inequality tends to increase entrepreneurship rates at the individual level, suggesting that most entrepreneurial behavior is based on necessity rather than opportunity. Opportunity perception and biases The ability of entrepreneurs to innovate relates to innate traits, including extroversion and a proclivity for risk-taking. According to Joseph Schumpeter, the capabilities of innovating, introducing new technologies, increasing efficiency and productivity, or generating new products or services, are characteristic qualities of entrepreneurs. One study has found that certain genes affecting personality may influence the income of self-employed people. Some people may be able to use[weasel words] "an innate ability" or quasi-statistical sense to gauge public opinion and market demand for new products or services. Entrepreneurs tend to have the ability to see unmet market needs and underserved markets. While some entrepreneurs assume they can sense and figure out what others are thinking, the mass media plays a crucial role in shaping views and demand. Ramoglou argues that entrepreneurs are not that distinctive and that it is essentially poor conceptualizations of "non-entrepreneurs" that maintain laudatory portraits of "entrepreneurs" as exceptional innovators or leaders Entrepreneurs are often overconfident, exhibit illusion of control, when they are opening/expanding business or new products/services. Differences in entrepreneurial organizations often partially reflect their founders' heterogenous identities. Fauchart and Gruber have classified entrepreneurs into three main types: Darwinians, communitarians and missionaries. These types of entrepreneurs diverge in fundamental ways in their self-views, social motivations and patterns of new firm creation. Entrepreneurs need to practice effective communication both within their firm and with external partners and investors in order to launch and growth a venture and enable it to survive. An entrepreneur needs a communication system that links the staff of her firm and connects the firm to outside firms and clients. Entrepreneurs should be charismatic leaders, so they can communicate a vision effectively to their team and help to create a strong team. Communicating a vision to followers may be well the most important act of the transformational leader. Compelling visions provide employees with a sense of purpose and encourage commitment. According to Baum et al. and Kouzes and Posner, the vision must be communicated through written statements and through in-person communication. Entrepreneurial leaders must speak and listen to articulate their vision to others. Communication is pivotal in the role of entrepreneurship because it enables leaders to convince potential investors, partners and employees about the feasibility of a venture. Entrepreneurs need to communicate effectively to shareholders. Nonverbal elements in speech such as the tone of voice, the look in the sender's eyes, body language, hand gestures and state of emotions are also important communication tools. The Communication Accommodation Theory posits that throughout communication people will attempt to accommodate or adjust their method of speaking to others. Face Negotiation Theory describes how people from different cultures manage conflict negotiation in order to maintain "face". Hugh Rank's "intensify and downplay" communications model can be used by entrepreneurs who are developing a new product or service. Rank argues that entrepreneurs need to be able to intensify the advantages of their new product or service and downplay the disadvantages in order to persuade others to support their venture. Links to sea piracy Research from 2014 found links between entrepreneurship and historical sea piracy. In this context, the claim is made for a non-moral approach to looking at the history of piracy as a source of inspiration for entrepreneurship education as well as for research in entrepreneurship and business model generation. Stanford University economist Edward Lazear found in a 2005 study that variety in education and work experience was the most important trait that distinguished entrepreneurs from non-entrepreneurs A 2013 study by Uschi Backes-Gellner of the University of Zurich and Petra Moog of the University of Siegen in Germany found that a diverse social network was also important in distinguishing students that would go on to become entrepreneurs. Studies show that the psychological propensities for male and female entrepreneurs are more similar than different. Empirical studies suggest that female entrepreneurs possess strong negotiating skills and consensus-forming abilities. Asa Hansson, who looked at empirical evidence from Sweden, found that the probability of becoming self-employed decreases with age for women, but increases with age for men. She also found that marriage increased the probability of a person becoming an entrepreneur. Jesper Sørensen wrote that significant influences on the decision to become an entrepreneur are workplace peers and social composition. Sørensen discovered a correlation between working with former entrepreneurs and how often these individuals become entrepreneurs themselves, compared to those who did not work with entrepreneurs. Social composition can influence entrepreneurialism in peers by demonstrating the possibility for success, stimulating a "He can do it, why can't I?" attitude. As Sørensen stated: "When you meet others who have gone out on their own, it doesn't seem that crazy". Entrepreneurs may also be driven to entrepreneurship by past experiences. If they have faced multiple work stoppages or have been unemployed in the past, the probability of them becoming an entrepreneur increases Per Cattell's personality framework, both personality traits and attitudes are thoroughly investigated by psychologists. However, in case of entrepreneurship research these notions are employed by academics too, but vaguely. According to Cattell, personality is a system that is related to the environment and further adds that the system seeks explanation to the complex transactions conducted by both—traits and attitudes. This is because both of them bring about change and growth in a person. Personality is that which informs what an individual will do when faced with a given situation. A person's response is triggered by his/her personality and the situation that is faced. Innovative entrepreneurs may be more likely to experience what psychologist Mihaly Csikszentmihalyi calls "flow". "Flow" occurs when an individual forgets about the outside world due to being thoroughly engaged in a process or activity. Csikszentmihalyi suggested that breakthrough innovations tend to occur at the hands of individuals in that state. Other research has concluded that a strong internal motivation is a vital ingredient for breakthrough innovation. Flow can be compared to Maria Montessori's concept of normalization, a state that includes a child's capacity for joyful and lengthy periods of intense concentration. Csikszentmihalyi acknowledged that Montessori's prepared environment offers children opportunities to achieve flow. Thus quality and type of early education may influence entrepreneurial capability. Research on high-risk settings such as oil platforms, investment banking, medical surgery, aircraft piloting and nuclear power plants has related distrust to failure avoidance. When non-routine strategies are needed, distrusting persons perform better while when routine strategies are needed trusting persons perform better. This research was extended to entrepreneurial firms by Gudmundsson and Lechner. They argued that in entrepreneurial firms the threat of failure is ever present resembling non-routine situations in high-risk settings. They found that the firms of distrusting entrepreneurs were more likely to survive than the firms of optimistic or overconfident entrepreneurs. The reasons were that distrusting entrepreneurs would emphasize failure avoidance through sensible task selection and more analysis. Kets de Vries has pointed out that distrusting entrepreneurs are more alert about their external environment. He concluded that distrusting entrepreneurs are less likely to discount negative events and are more likely to engage control mechanisms. Similarly, Gudmundsson and Lechner found that distrust leads to higher precaution and therefore increases chances of entrepreneurial firm survival. Researchers Schoon and Duckworth completed a study in 2012 that could potentially help identify who may become an entrepreneur at an early age. They determined that the best measures to identify a young entrepreneur are family and social status, parental role modeling, entrepreneurial competencies at age 10, academic attainment at age 10, generalized self-efficacy, social skills, entrepreneurial intention and experience of unemployment. Some scholars have constructed an operational definition of a more specific subcategory called "Strategic Entrepreneurship". Closely tied with principles of strategic management, this form of entrepreneurship is "concerned about growth, creating value for customers and subsequently creating wealth for owners". A 2011 article for the Academy of Management provided a three-step, "Input-Process-Output" model of strategic entrepreneurship. The model's three steps entail the collection of different resources, the process of orchestrating them in the necessary manner and the subsequent creation of competitive advantage, value for customers, wealth and other benefits. Through the proper use of strategic management/leadership techniques and the implementation of risk-bearing entrepreneurial thinking, the strategic entrepreneur is therefore able to align resources to create value and wealth. Leadership in entrepreneurship can be defined as "process of social influence in which one person can enlist the aid and support of others in the accomplishment of a common task" in "one who undertakes innovations, finance and business acumen in an effort to transform innovations into economic goods". This refers to not only the act of entrepreneurship as managing or starting a business, but how one manages to do so by these social processes, or leadership skills. Entrepreneurship in itself can be defined as "the process by which individuals, teams, or organizations identify and pursue entrepreneurial opportunities without being immediately constrained by the resources they currently control". An entrepreneur typically has a mindset that seeks out potential opportunities during uncertain times. An entrepreneur must have leadership skills or qualities to see potential opportunities and act upon them. At the core, an entrepreneur is a decision maker. Such decisions often affect an organization as a whole, which is representative of their leadership amongst the organization. With the growing global market and increasing technology use throughout all industries, the core of entrepreneurship and the decision-making has become an ongoing process rather than isolated incidents. This becomes knowledge management which is "identifying and harnessing intellectual assets" for organizations to "build on past experiences and create new mechanisms for exchanging and creating knowledge". This belief draws upon a leader's past experiences that may prove useful. It is a common mantra for one to learn from their past mistakes, so leaders should take advantage of their failures for their benefit. This is how one may take their experiences as a leader for the use in the core of entrepreneurship-decision making. The majority of scholarly research done on these topics have been from North America. Words like "leadership" and "entrepreneurship" do not always translate well into other cultures and languages. For example, in North America a leader is often thought to be charismatic, but German culture frowns on such charisma due to the charisma of Nazi leader Adolph Hitler. Other cultures, like some European countries, view the term "leader" negatively, like the French. The participative leadership style that is encouraged in the United States is considered disrespectful in many other parts of the world due to the differences in power distance. Many Asian and Middle Eastern countries do not have "open door" policies for subordinates and would never informally approach their managers/bosses. For countries like that, an authoritarian approach to management and leadership is more customary. Despite cultural differences, the successes and failures of entrepreneurs can be traced to how leaders adapt to local conditions. With the increasingly global business environment a successful leader must be able to adapt and have insight into other cultures. To respond to the environment, corporate visions are becoming transnational in nature, to enable the organization to operate in or provide services/goods for other cultures. Entrepreneurship Training and Education Michelacci and Schivardi are a pair of researchers who believe that identifying and comparing the relationships between an entrepreneur's earnings and education level would determine the rate and level of success. Their study focused on two education levels, college degree and post-graduate degree. While Michelacci and Schivardi do not specifically determine characteristics or traits for successful entrepreneurs, they do believe that there is a direct relationship between education and success, noting that having a college knowledge does contribute to advancement in the workforce. Michelacci and Schivardi state there has been a rise in the number of self-employed people with a baccalaureate degree. However, their findings also show that those who are self-employed and possess a graduate degree has remained consistent throughout time at about 33 percent. They briefly mention those famous entrepreneurs like Steve Jobs and Mark Zuckerberg who were college dropouts, but they call these cases all but exceptional as it is a pattern that many entrepreneurs view formal education as costly, mainly because of the time that needs to be spent on it. Michelacci and Schivardi believe that in order for an individual to reach the full success they need to have education beyond high school. Their research shows that the higher the education level the greater the success. The reason is that college gives people additional skills that can be used within their business and to operate on a higher level than someone who only "runs" it. Resources and Financing An entrepreneurial resource is any company-owned asset that has economic value creating capabilities. Economic value creating both tangible and intangible sources are considered as entrepreneurial resources. Their economic value is generating activities or services through mobilization by entrepreneurs. Entrepreneurial resources can be divided into two fundamental categories: tangible and intangible resources. Tangible resources are material sources such as equipment, building, furniture, land, vehicle, machinery, stock, cash, bond and inventory that has a physical form and can be quantified. On the contrary, intangible resources are nonphysical or more challenging to identify and evaluate, and they possess more value creating capacity such as human resources including skills and experience in a particular field, organizational structure of the company, brand name, reputation, entrepreneurial networks that contribute to promotion and financial support, know-how, intellectual property including both copyrights, trademarks and patents. At least early on, entrepreneurs often "bootstrap-finance" their start-up rather than seeking external investors from the start. One of the reasons that some entrepreneurs prefer to "bootstrap" is that obtaining equity financing requires the entrepreneur to provide ownership shares to the investors. If the start-up becomes successful later on, these early equity financing deals could provide a windfall for the investors and a huge loss for the entrepreneur. If investors have a significant stake in the company, they may as well be able to exert influence on company strategy, chief executive officer (CEO) choice and other important decisions. This is often problematic since the investor and the founder might have different incentives regarding the long-term goal of the company. An investor will generally aim for a profitable exit and therefore promotes a high-valuation sale of the company or IPO in order to sell their shares. Whereas the entrepreneur might have philanthropic intentions as their main driving force. Soft values like this might not go well with the short-term pressure on yearly and quarterly profits that publicly traded companies often experience from their owners. One consensus definition of bootstrapping sees it as "a collection of methods used to minimize the amount of outside debt and equity financing needed from banks and investors". The majority of businesses require less than $10,000 to launch, which means that personal savings are most often used to start. In addition, bootstrapping entrepreneurs often incur personal credit-card debt, but they also can utilize a wide variety of methods. While bootstrapping involves increased personal financial risk for entrepreneurs, the absence of any other stakeholder gives the entrepreneur more freedom to develop the company. Many successful companies, including Dell Computer and Facebook, started by bootstrapping. Bootstrapping methods include: - Owner financing, including savings, personal loans and credit card debt - Working capital management that minimizes accounts receivable - Joint utilization, such as reducing overhead by coworking or using independent contractors - Increasing accounts payable by delaying payment, or leasing rather than buying equipment - Lean manufacturing strategies such as minimizing inventory and lean startup to reduce product development costs - Subsidy finance This section includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (July 2014) (Learn how and when to remove this template message) Many businesses need more capital than can be provided by the owners themselves. In this case, a range of options is available including a wide variety of private and public equity, debt and grants. Private equity options include: Debt options open to entrepreneurs include: - Loans from banks, financial technology companies and economic development organizations - Line of credit also from banks and financial technology companies - Microcredit also known as microloans - Merchant cash advance - Revenue-based financing Grant options open to entrepreneurs include: - Equity-free accelerators - Business plan/business pitch competitions for college entrepreneurs and others - Small Business Innovation Research grants from the U.S. government Effect of taxes Entrepreneurs are faced with liquidity constraints and often lack the necessary credit needed to borrow large amounts of money to finance their venture. Because of this, many studies have been done on the effects of taxes on entrepreneurs. The studies fall into two camps: the first camp finds that taxes help and the second argues that taxes hurt entrepreneurship. Cesaire Assah Meh found that corporate taxes create an incentive to become an entrepreneur to avoid double taxation. Donald Bruce and John Deskins found literature suggesting that a higher corporate tax rate may reduce a state's share of entrepreneurs. They also found that states with an inheritance or estate tax tend to have lower entrepreneurship rates when using a tax-based measure. However, another study found that states with a more progressive personal income tax have a higher percentage of sole proprietors in their workforce. Ultimately, many studies find that the effect of taxes on the probability of becoming an entrepreneur is small. Donald Bruce and Mohammed Mohsin found that it would take a 50 percentage point drop in the top tax rate to produce a one percent change in entrepreneurial activity. Predictors of success Factors that may predict entrepreneurial success include the following: - Establishing strategies for the firm, including growth and survival strategies - Maintaining the human resources (recruiting and retaining talented employees and executives) - Ensuring the availability of required materials (e.g. raw resources used in manufacturing, computer chips, etc.) - Ensuring that the firm has one or more unique competitive advantages - Ensuring good organizational design, sound governance and organizational coordination - Congruency with the culture of the society - Business-to-business (B2B) or business-to-consumer (B2C) models can be used - High growth market - Target customers or markets that are untapped or missed by others - Growing industry - High technology impact on the industry - High capital intensity - Small average incumbent firm size - Large, gender-diverse and racially diverse team with a range of talents, rather than an individual entrepreneur - Graduate degrees - Management experience prior to start-up - Work experience in the start-up industry - Employed full-time prior to new venture as opposed to unemployed - Prior entrepreneurial experience - Full-time involvement in the new venture - Motivated by a range of goals, not just profit - Number and diversity of team members' social ties and breadth of their business networks - Written business plan - Focus on a unified, connected product line or service line - Competition based on a dimension other than price (e.g. quality or service) - Early, frequent intense and well-targeted marketing - Tight financial controls - Sufficient start-up and growth capital - Corporation model, not sole proprietorship - Wealth can enable an entrepreneur to cover start-up costs and deal with cash flow challenges - Dominant race, ethnicity or gender in a socially stratified culture |Wikiversity has learning resources about Entrepreneurship| - AK Yetisen; LR Volpatti; AF Coskun; S Cho; E Kamrani; H Butt; A Khademhos\\seini; SH Yun (2015). "Entrepreneurship". Lab Chip. 15 (18): 3638–3660. doi:10.1039/c5lc00577a. PMID 26245815. - Katila, Riitta; Chen, Eric L.; Piezunka, Henning (7 June 2012). "All the right moves: How entrepreneurial firms compete effectively" (PDF). Strategic Entrepreneurship Jnl. 6 (2): 116–132. doi:10.1002/sej.1130. Retrieved 18 May 2017. - "Business Dictionary definition". Business Dictionary. - Belicove, Mikal E. (2 August 2012). "How to Properly Close Your Business". - Audretsch; et al. (2002). "The Economics of Science and Technology". The Journal of Technology Transfer. 27 (2): 157. doi:10.1023/A:1014382532639. - "entrepreneur". Dictionary.com Unabridged. Random House. Retrieved 2018-04-04. - Drucker, P. F. (1993). Innovation and entrepreneurship: practice and principles. New York: HarperBusiness. - Shane, S. A. (2003). A general theory of entrepreneurship: the individual-opportunity nexus. Northampton, Massachusetts: E. Elgar. - Hisrich, Robert D. (2011). Entrepreneurship. McGraw-Hill Education. ISBN 978-0-07062-017-9. - "Entrepreneurial Ambition - Innovation Provincial Rankings - How Canada Performs". - Clifford, Catherine. "Why everyone will have to become an entrepreneur". entrepreneur.com. Retrieved 8 May 2016. - "Venture Investment - Regional Aggregate Data". National Venture Capital Association and PricewaterhouseCoopers. Retrieved 23 April 2016. - Scott, S.; Venkatraman, S. (2000). "The promise of entrepreneurship as a field of research". Academy of Management Review. 25: 217–226. doi:10.5465/amr.2000.2791611. - Brush, C.; et al. (2003). "Doctoral education in the field of entrepreneurship". Journal of Management. 29 (3): 309–331. doi:10.1016/s0149-2063(03)00014-x. - Ramoglou, S.; Tsang, E.W.K.; et al. (2016). "A realist perspective of entrepreneurship: Opportunities as propensities". Academy of Management Review. 41 (3): 409–434. doi:10.5465/amr.2014.0281. - S.X. Zhang; J. Cueto (2015). "The Study of Bias in Entrepreneurship". Entrepreneurship Theory and Practice. 41 (3): 419–454. doi:10.1111/etap.12212. - Black, Ervin L.; Burton, F. Greg; Wood, David A.; Zimbelman, Aaron F. (August 2010). "Entrepreneurial success: differing perceptions of entrepreneurs and venture capitalists". The International Journal of Entrepreneurship and Innovation. 11 (3): 189–198. doi:10.5367/000000010792217272. Retrieved 28 July 2016. - Navale,, Ashok Bhanudas (October 2013). "Developing Entrepreneur Skills for Corporate Work" (PDF). Research Directions. 1 (4). ISSN 2321-5488. - Carlen, Joe (2016). A Brief History of Entrepreneurship: The Pioneers, Profiteers, and Racketeers Who Shaped Our World. New York, NY: Columbia University Press. p. 1. ISBN 9780231542814. - Brewer, Anthony (1992). Richard Cantillon: Pioneer of Economic Theory. Routledge. ISBN 978-0-415-07577-0. - William Stanley Jevons (January 1881). Richard Cantillon and the Nationality of Political Economy. Contemporary Review. The Contemporary Review Company. pp. 333–360. - Cantillon, Richard (1755). Essai sur la nature du commerce en général. London: MacMillan. - Stevenson, H.; Jarillo, J. (26 May 2007). Cuervo, Álvaro; Ribeiro, Domingo; Roig, Salvador, eds. A Paradigm of Entrepreneurship: Entrepreneurial Management, in. Entrepreneurship: Concepts, Theory and Perspective. Springer Science Business Media. pp. 5–. ISBN 978-3-540-48543-8. - • Landström, H. & SpringerLink 2005, Pioneers in entrepreneurship and small business research, Springer Science+Business Media, New York, N.Y. - Enterprise: Entrepreneurship and Innovation. p. 5. ISBN 978-0-7506-6920-7. - Rostam-Afschar, D. (2013) "Entry regulation and entrepreneurship: a natural experiment in German craftsmanship" (PDF; 495 kB) - Schumpeter, Joseph Alois (1976). Capitalism, Socialism and Democracy. Routledge. ISBN 978-0-415-10762-4. - Schumpeter, Joseph Alois (1934). The Theory of Economic Development: An Inquiry Into Profits, Capital, Credit, Interest, and the Business Cycle. Transaction Publishers. ISBN 978-0-87855-698-4. - Landstrom, H. (31 December 2007). Pioneers in Entrepreneurship and Small Business Research. Springer. ISBN 978-0-387-23633-9. - Marshall, Alfred; Guillebaud, C. W. (1961). Principles of Economics. 9th (variorum) Ed. Macmillan. - Shane, Scott Andrew (2000). A General Theory of Entrepreneurship: The Individual-opportunity Nexus. Edward Elgar Publishing. ISBN 978-1-78100-799-0. - Deakins & Freel 2009. - Johnson, D. P. M. (2005). "A Glossary of Political Economy Terms, 2005". Auburn University. Archived from the original on 20 July 2014. - Paul D. Reynolds (30 September 2007). Entrepreneurship in the United States: The Future Is Now. Springer. ISBN 978-0-387-45671-3. - Mark Van Osnabrugge; Robert J. Robinson (2000). Angel Investing. John Wiley & Sons. ISBN 0-7879-5202-8. - Driessen, Martyn P.; Zwart, Peter S. (2010). "The role of the entrepreneur in small business success: the Entrepreneurship Scan" (PDF). - "Out Of Print : Ethnic Enterprise in America: Business and Welfare Among Chinese, Japanese, and Blacks : Ivan Light - University of California Press". www.ucpress.edu. Retrieved 2016-01-16. - Chaudhary, Ali R. (2015-06-01). "Racialized Incorporation: The Effects of Race and Generational Status on Self-Employment and Industry-Sector Prestige in the United States". International Migration Review. 49 (2): 318–354. doi:10.1111/imre.12087. ISSN 1747-7379. - Penrose, Edith T. (1959). The Theory of the Growth of the Firm. New York: John Wiley. - DiMaggio, P. 1988 'Interest and agency in institutional theory'. In Institutional patterns and culture, L. Zucker (ed.), Cambridge, MA: Ballinger Publishing Company: 3-22. - Levy, D.; Scully, M. (2007). "The institutional entrepreneur as modern prince: The strategic face of power in contested fields". Organization Studies. 28 (7): 971–991. doi:10.1177/0170840607078109. - Khan, F., K. Munir, and H. Willmott 2007 'A Dark Side of Institutional Entrepreneurship: Soccer Balls, Child Labour and Postcolonial Impoverishment'. Organization Studies 28/7: 1055—1077. - Hardy, C., and S. Maguire: "Entrepreneurship" in Handbook of organizational institutionalism. R. Greenwood, C. Oliver, K. Sahlin-Andersson and R. Suddaby (eds). - Almeida, J., de Paula, N., Pessali, H. 'Institutional entrepreneurship in building the Brazilian market of functional yogurts.' British Food Journal, vol. 116, p. 2-15, 2014. - Christopher Rea and Nicolai Volland, "The Business of Culture" (UBC Press, 2015), pp. 4-7. (See also pp. 9-31: "Enter the Cultural Entrepreneur") - Orser, Barbara; Elliott, Catherine (2015-03-25). Feminine Capital: Unlocking the Power of Women Entrepreneurs. Stanford Business Books. p. 214. ISBN 9780804783798. - Barbara J. Orser; Catherine Elliott; Joanne Leck (2011-11-08). "Feminist attributes and entrepreneurial identity". Gender in Management: an International Journal. 26 (8): 561–589. doi:10.1108/17542411111183884. ISSN 1754-2413. - Orser, Barbara, and Joanne Leck. "Physician as feminist entrepreneur: The gendered nature of venture creation and the Shirley E. Greenberg Women’s Health Centre." Women entrepreneurs and the global environment for growth (2010): 284-302. - The New Heros, What is Social Entrepreneurship, Oregon Public Broadcasting, 2005 - "The Meaning of Social Entrepreneurship," J. Gregory Dees, 1998, rev 2001 "The Meaning of Social Entrepreneurship". caseatduke.org. Retrieved 2013-05-03. - Thompson, J.L. (2002). "The World of the Social Entrepreneur". The International Journal of Public Sector Management. 15 (4/5): 413. - Reynolds, P. D. and White, S. (1997). The Entrepreneurial Process. Westport, CT: Quorum Books. - Casson, M., 1982. The entrepreneur: An economic theory. Rowman & Littlefield. - Shane, S. and Venkataraman, S. (2000). ‘The promise of entrepreneurship as a field of research’. Academy of Management Review, 25, 217–26. - Davidsson, P. (2006). ‘Nascent entrepreneurship: empirical studies and developments’. Foundations and Trends in Entrepreneurship, 2, 1–76. - Dimov, D. (2007b). ‘Beyond the single-person, single-insight attribution in understanding entrepreneurial opportunities’. Entrepreneurship Theory and Practice, 31, 713–31. ‘From opportunity insight to opportunity intention: the importance of person-situation learning match’ - Dimov, Dimo (July 2007). "From Opportunity Insight to Opportunity Intention: The Importance of Person-Situation Learning Match". Entrepreneurship Theory and Practice. 31 (4): 561–583. doi:10.1111/j.1540-6520.2007.00188.x. SSRN . - Shepherd, D. A., McMullen, J. S. and Jennings, P. D. (2007). ‘The formation of opportunity beliefs: overcoming ignorance and reducing doubt’. Strategic Entrepreneurship Journal, 1, 75–95. - Sarasvathy, S. D. (2001). ‘Causation and effectuation: toward a theoretical shift from economic inevitability to entrepreneurial contingency’. Academy of Management Review, 26, 243–63. - Ucbasaran, D., Westhead, P. and Wright, M., 2009. The extent and nature of opportunity identification by experienced entrepreneurs. Journal of business venturing, 24(2), pp.99-115. Vancouver - Bozward D. and Rogers-Draycott, M., (2017) Developing a Staged Competency Based Approach to Enterprise Creation. Proceedings of the International Conference for Entrepreneurship, Innovation and Regional Development. ISSN 2411-5320 - Alsos, G.A. and Kolvereid, L., 1998. The business gestation process of novice, serial, and parallel business founders. Entrepreneurship: Theory and Practice, 22(4), pp.101-102. - Delmar, F. and Shane, S. (2004). ‘Legitimizing first: organizing activities and the survival of new ventures’. Journal of Business Venturing, 19, 385–410. - Gartner, W.B., 1985. A conceptual framework for describing the phenomenon of new venture creation. Academy of management review, 10(4), pp.696-706. - Lichtenstein, B. B., Carter, N. M., Dooley, K. J., & Gartner, W. B. (2007). Complexity dynamics of nascent entrepreneurship. Journal of Business Venturing, 22(2), 236–261. - Delmar, F. and Shane, S. (2004). ‘Legitimizing first: organizing activities and the survival of new ventures’. Journal of Business Venturing, 19, 385–410. - Kim, P.H., Longest, K.C. and Lippmann, S., 2015. The tortoise versus the hare: Progress and business viability differences between conventional and leisure-based founders. Journal of Business Venturing, 30(2), pp.185-204. - Lichtenstein, B. B., Carter, N. M., Dooley, K. J., & Gartner, W. B. (2007). Complexity dynamics of nascent entrepreneurship. Journal of Business Venturing, 22(2), 236–261. - Carter, N.M., Gartner, W.B. and Reynolds, P.D., 1996. Exploring start-up event sequences. Journal of business venturing, 11(3), pp.151-166. - Ferriani, S., Cattani, G., C. Baden-Fuller (2009) "The Relational Antecedents of Project-Entrepreneurship: Network Centrality, Team Composition, and Project Performance", Research Policy, 2009, 38 (10): 1545–1558. - Faulkner, R. R.; Anderson, A. B. (1987). "Short-term projects and emergent careers: evidence from Hollywood". American Journal of Sociology. 92 (4): 879–909. doi:10.1086/228586. - DeFillippi, R., & Spring, S. 2004 Project entrepreneurs for project-based enterprises: Extension or complement to project management competencies? Projects and Profits, 4(2): 50-57. - "The 10 Richest Millennial Entrepreneurs in America". Inc.com. December 12, 2016. Retrieved June 6, 2017. - Bell, D'Vaughn. "Top Successful Millennial Entrepreneurs". Retrieved October 16, 2017. - Wilmouth, Daniel. "The Missing Millennial Entrepreneurs" (PDF). U.S. Small Business Administration. Retrieved June 2, 2017. - Investopedia; Investopedia.com; access date. - Prive, Tanya (19 December 2012). "Top 10 Qualities That Make A Great Leader". Forbes. Retrieved 1 August 2013. - Cantillon, Richard (1755). Essai sur la Nature du Commerce en Général. - Drucker, Peter F. (1985). Innovation and Entrepreneurship. attributes the coining and defining of "entrepreneur" to Jean-Baptiste Say in his A Treatise on Political Economy; (1834). - Knight, Frank Hyneman (2005). Risk, Uncertainty and Profit. Cosimo, Inc. ISBN 978-1-59605-242-0. - Laureiro-Martínez, Daniella; Canessa, Nicola; Brusoni, Stefano; Zollo, Maurizio; Hare, Todd; Alemanno, Federica; Cappa, Stefano F. (22 January 2014). "Frontopolar cortex and decision-making efficiency: comparing brain activity of experts with different professional background during an exploration-exploitation task". Frontiers in Human Neuroscience. 7: 927. doi:10.3389/fnhum.2013.00927. - Timmons, Jeffry A.; Bygrave, William D. (1986). "Venture capital's role in financing innovation for economic growth". Journal of Business Venturing. 1 (2): 161–176. doi:10.1016/0883-9026(86)90012-1. - Qureshi, Hamid (3 September 2015). "Decoding Right Strategies for Entrepreneurship". Greater Kashmir. Retrieved 30 March 2016. - Shane, S. (2000). "THE PROMISE OF ENTREPRENEURSHIP AS A FIELD OF RESEARCH". Academy of Management Review. 25 (1): 217–226. doi:10.5465/AMR.2000.2791611. - Reynolds PD, Hay M, Bygrave WD et al. (2002) Global Entrepreneurship Monitor: 2002 Global Executive Report. Kansas City, MO: Kauffman Foundation. - Xavier-Oliveira et al. (1 July 2015). What motivates entrepreneurial entry under economic inequality? The role of human and financial capital. Human Relations 68(7): 1183-1207, Sage. - Mike Smith. "Why risk-taking is Important as an Entrepreneur". Best Business Books Blog. Retrieved 22 Aug 2017. - "The basic characteristics of a successful entrepreneur". - Shane, S.; Nicolaou, N. (2013). "The genetics of entrepreneurial performance". International Small Business Journal. 31 (5): 473–495. doi:10.1177/0266242613485767. - Miller 2005, p. 278. - Scheufele & Moy 2000. - Ramoglou, S. (2013). "Who is a 'non-entrepreneur'? Taking the 'others' of entrepreneurship seriously". International Small Business Journal. 31 (4): 432–453. doi:10.1177/0266242611425838. - Gartner, William B. (2001). "Is There an Elephant in Entrepreneurship? Blind Assumptions in Theory Development; Business research" (PDF). Entrepreneurship Theory and Practice. 25 (4): 27–39. Archived from the original (PDF) on 2012-08-09. - Fauchart, E; Gruber, M. (2011). "Darwinians, Communitarians, and Missionaries: The Role of Founder Identify in Entrepreneurship". Academy of Management Journal. 54 (5): 935–957. doi:10.5465/amj.2009.0211. - Hackman, M.Z.; Johnson, C.E. (2009). Leadership: A communication perspective (5th ed.). Long Grove, IL: Waveland. - Baum, Robert J.; Locke, Edwin A.; Kirkpatrick, Shelley A. (1998). "A longitudinal study of the relation of vision and vision communication to venture growth in entrepreneurial firms". Journal of Applied Psychology. 83 (1): 43–54. doi:10.1037/0021-9010.83.1.43. - Kouzes, J.M; Posner, B.Z. (1987). The leadership challenge: How to get extraordinary things done in organizations. San Francisco: Jossey-Bass. - Locke, E.A.; Kirkpatrick, S.; Wheeler , J.K; Schneider, J; Niles, K.; Goldstein, H; Welsh, K; Chah, D.O. (1991). The essence of leadership. New York: Lexington Books. - Clarke, J.; Cornelissen, J (2011). "Language, communication, and socially situated cognition in entrepreneurship. Academy Of Management Review". Academy of Management Review. 36 (4): 776–778. doi:10.5465/AMR.2011.65554783. - Euler, M; Vollmar, B. H.; Kraus, S. (2011). "Communication matters--Network constellations in entrepreneurship". International Journal of Economics and Business Research. 3 (3): 283–301. doi:10.1504/ijebr.2011.040021. - Giles, H; Wiemann, J.M (1987). Language, social comparison and power. The handbook of communication science. pp. 350–384. - Ting-Toomey, S (1985). Toward a theory of conflict and culture in communication. Culture & Organizational processes. pp. 71–86. - Rank, H (1976). Teaching about public persuasion. National Council of Teachers of English. - Lawrence, D. (2014) Disruptors are just pirates on the high seas of capitalism. The Globe and Mail Special on Business Education, 5 November 2014. Available at https://www.theglobeandmail.com/report-on-business/careers/business-education/disruptors-are-just-pirates-on-the-high-seas-of-capitalism/article21443149/ - Roth, S (2014). "Booties, bounties, business models: a map to the next red oceans". International Journal of Entrepreneurship and Small Business. 22 (4): 439–448. doi:10.1504/ijesb.2014.064272. - Roth, S (2014). "The eye-patch of the beholder". International Journal of Entrepreneurship and Small Business. 22 (4): 399–407. doi:10.1504/ijesb.2014.064271. - Lazear, Edward (2005). "Entrepreneurship" (PDF). 23 (4). Journal of Labor Economics. Retrieved 24 February 2015. - Backes-Ge1llner, Uschi; Moog, Petra (December 2013). "The disposition to become an entrepreneur and the jacks-of-all-trades in social and human capital". The Journal of Socio-Economics. The Journal of Socio-Economics. 47: 55–72. doi:10.1016/j.socec.2013.08.008. Retrieved 24 February 2015. - Baer, Drake (19 February 2015). "Scientists have discovered a personality difference between entrepreneurs and employees". Retrieved 25 February 2015. - Muljadi, Paul (ed.). Entrepreneurship. Paul Muljadi. Archived from the original on December 31, 2013. - Hanssan, Asa (2012). "Tax policy and entrepreneurship: empirical evidence from Sweden". Small Business Economics. - Sørensen, J.; Nanda, R. (July 2010). "Workplace Peers and Entrepreneurship" (PDF). Management Science. 56 (7): 1116–1126. doi:10.1287/mnsc.1100.1179. Retrieved 30 June 2013. - "Peers Influence Decision to Become an Entrepreneur". Stanford Graduate School of Business; News. 1 September 2009. Retrieved 30 June 2013. - ENTREPRENEURIAL BEHAVIOR, Retrieved 17 December 2014. - Csikszentmihalyi, Mihaly (13 October 2009). Flow. HarperCollins. ISBN 978-0-06-187672-1. - Christensen, Clayton; Johnson, Curtis W.; Horn, Michael B. (14 May 2008). Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. McGraw Hill Professional. ISBN 978-0-07-164174-6. - Montessori, Maria (1967). The Absorbent Mind. New York: Holt, Rinehart and Winston. - Rathunde, Kevin; Csikszentmihalyi, Mihaly (May 2005). "Middle School Students' Motivation and Quality of Experience: A Comparison of Montessori and Traditional School Environments". American Journal of Education. 111 (3): 341–371. doi:10.1086/428885. - Conchie, S. M.; Donald, I. J. (2007). "The functions and development of safety-specific trust and distrust". Safety Science. 46 (1): 92–103. doi:10.1016/j.ssci.2007.03.004. - Gudmundsson, S.V.; Lechner, C. (2013). "Cognitive Biases, Organization, and Entrepreneurial Firm Survival". European Management Journal. 31 (3): 278–294. doi:10.1016/j.emj.2013.01.001. - Kets de Vries, M. (2003). "The entrepreneur on the couch". INSEAD Quarterly. 5: 17–19. - Schoon, Ingrid; Duckworth, Kathryn (2012). "Who becomes an entrepreneur? Early life experiences as predictors of entrepreneurship". Developmental Psychology. 48 (6): 1719–1726. doi:10.1037/a0029168. - Hitt, M. A., Ireland, R., Sirmon, D. G., & Trahms, C. A. (2011). Strategic Entrepreneurship: Creating Value for Individuals, Organizations, and Society. Academy of Management Perspectives, 25(2), 57-75. doi:10.5465/AMP.2011.61020802 - Chemers, M. An integrative theory of leadership. Lawrence Erlbaum Associates, Publishers. ISBN 978-0-8058-2679-1. - Hitt, M. A., Ireland, R. D., Hoskisson, R. E.. (2011). Strategic Management. (9th ed.). Mason, Ohio: South-Western Cengage Learning. - Heaton, L. H. (2008) Knowledge Management. International Encyclopedia of Communication. Boston: Blackledge. - Boyacigiller, N. & Adler, N. J. (1991). The Parochial Dinosaur: The Organizational Sciences in Global Context. Academy of Management Review. - Grauman, C. F. (1986). Changing Conceptions of Leadership. - Hofestede, G. (1991). Cultures and Organizations: Software of the Mind. - Hofstede, G. (1980). Motivation, Leadership and Organization: Do American Theories Apply Abroad? Organizational Dynamics. - Adler, N. J. % Gundersen, A. (2008). International Dimensions of Organizational Behavior. - Michelacci, Claudio (24 June 2015). "Are They All Like Bill, Mark, and Steve? The Education Premium for Entrepreneurs" (PDF). EIEF. Retrieved 27 November 2015. - Anna Grandori; Laura Gaillard Giordani. Organizing Entrepreneurship. Routledge. ISBN 978-0-415-57037-4. - Charles W. L. Hill; Gareth R. Jones. Strategic Management Theory: An Integrated Approach. South-Western College Pub. ISBN 978-0-538-75107-0. - R. Duane Ireland; Robert E. Hoskisson; Michael A. Hitt. Understanding Business Strategy: Concepts and Cases (Strategic Management). South-Western College Pub. ISBN 978-0-324-57899-7. - Charles W. L. Hill; Gareth R. Jones. Essentials of Strategic Management. South-Western College Pub. ISBN 978-0-547-19432-5. - Bhide, Amar (1999). The Origin and Evolution of New Businesses. http://www.bhide.net/books/Origin%20and%20Evolution/part1.pdf: Oxford University Press. p. 40. ISBN 978-0195170313. - Ebbena, Jay; Johnson, Alec (2006). "Bootstrapping in small firms: An empirical analysis of change over time". Journal of Business Venturing (published November 2006). 21 (6): 851–865. doi:10.1016/j.jbusvent.2005.06.007. Retrieved 29 July 2014. Bootstrapping has taken on many definitions in the literature, but there has been some recent consensus that it is a collection of methods used to minimize the amount of outside debt and equity financing needed from banks and investors (Winborg and Landstrom, 2001 and Harrison and Mason, 1997). - Quickbooks, Writer at (1 August 2014). "Did You Know? Most Small Businesses Start With $10,000 Or Less". Intuit. - "Ten Successful Companies That Started by Bootstrapping". Richtopia. Retrieved 21 May 2016. - Narayanan, V. K.; Colarelli O'Connor, Gina (15 March 2010). Encyclopedia of Technology and Innovation Management. John Wiley & Sons. p. 60. ISBN 978-1-4051-6049-0. - Gooding, Donald (1 June 2017). "What Are The Four Colors of Money for Entrepreneurs?". - "Your First Investor". Your First Investor. - Gooding, Don (November 2017). "Business Plan Competitions for College Students". The Four Colors of Money for Entrepreneurs. Archived from the original on 22 December 2017. - Meh, Cesaire Assah (2002). "Entrepreneurial Risk, Credit Constraints, and the Corporate Income Tax: A Quantitative Exploration". Bank of Canada, Working Papers 2002-21. - Bruce, Donald and John Deskins (2012). "Can state tax policies be used to promote entrepreneurial activity?". Small Business Economics. - Asoni, Andrea and Tino Sanandaji (2012). "Taxation and the quality of entrepreneurship". J Econ. - Bruce, Donald and Mohammed Mohsin (2006). "Tax Policy and Entrepreneurship: New Time Series Evidence". Small Business Economics. - D.S Adegbenro I.C.T Poytechnic Lecture on EED 126, 2015">Entrepreneurship Lecture( EED 126) in D.S adegbenro Polytechnic, on 1 July 2015. Nigeria - Scott A. Shane (1 October 2008). "7". The Illusions of Entrepreneurship: The Costly Myths That Entrepreneurs, Investors, and Policy Makers Live By. Yale University Press. ISBN 0-300-15006-7. - Perry-Rivers, P. (October 2014). "Stratification, Economic Adversity, and Entrepreneurial Launch: The Converse Effect of Resource Position on Entrepreneurial Strategy". Entrepreneurship Theory & Practice. 40 (3): n/a. doi:10.1111/etap.12137. - Deakins, D.; Freel, M. S. (2009). "Entrepreneurial activity, the economy and the importance of small firms". Entrepreneurship and small firms. McGraw-Hill Education. ISBN 978-0-07-712162-4. - Miller, K. (2005). Communication theories: perspectives, processes, and contexts (2nd ed.). New York, NY: McGraw-Hill. - Scheufele, D.; Moy, P. (2000). Twenty-five years of the spiral of silence: A conceptual review and empirical outlook. International Journal of Public Opinion Research. 12. pp. 3–28. doi:10.1093/ijpor/12.1.3. ISSN 0954-2892. |Wikibooks has a book on the topic of: Entrepreneurship| - Blackburn, Robert (2008). "Small Business and Entrepreneurship". doi:10.4135/9781446263433. ISBN 9781412934374. - Bowman, Erik (July 2011). Entrepreneur Training Manual, Third Edition: Certified Entrepreneur Workbook. Guanzi Institute Press. ISBN 978-0-9837862-9-0. - Bruder, Jessica (September 2013). "The Psychological Price of Entrepreneurship." Inc. (Winner 2014 Annual Awards Contest of the Deadline Club) - Dana, Leo Paul 2010, "Nunavik, Arctic Quebec: Where Co-operatives Supplement Entrepreneurship," Global Business and Economics Review 12 (1/2), January 2010, pp. 42–71. - Duening, Thomas N.; Hisrich, Robert A.; Lechter, Michael A. (21 October 2009). Technology Entrepreneurship: Creating, Capturing, and Protecting Value. Academic Press. ISBN 978-0-08-092288-1. - Foo, M.D. (2011). "Emotions and entrepreneurial opportunity evaluation". Entrepreneurship Theory and Practice. 35 (2): 375–393. - James W. Halloran. (2014). Your Small Business Adventure: Finding Your Niche and Growing a Successful Business. ALA/Huron Street Press. ISBN 978-1-937589-44-8. - Leitão, João; Baptista, Rui (10 June 2009). Public Policies for Fostering Entrepreneurship: A European Perspective. Springer Science Business Media. ISBN 978-1-4419-0249-8. - Lundstrom, Anders; Stevenson, Lois A. (30 March 2005). Entrepreneurship Policy: Theory and Practice. Springer. ISBN 978-0-387-24140-1. - Minniti, M.; Moren, L. (2010). "Entrepreneurial types and economic growth". Journal of Business Venturing. 25 (3): 305–314. doi:10.1016/j.jbusvent.2008.10.002. - Rea, Christopher; Volland, Nicolai (2015). The Business of Culture: Cultural Entrepreneurs in China and Southeast Asia, 1900-65. UBC Press. ISBN 9780774827829. - Shane, S.; Venkataraman, S. (2000). "The Promise of Entrepreneurship as A Field of Research". Academy of Management Review. 25 (1): 217–226. doi:10.5465/amr.2000.2791611. JSTOR 259271. - Shane, S. (2013). "The genetics of entrepreneurial performance". International Small Business Journal. 31 (5): 473–495. doi:10.1177/0266242613485767. - Zahra, Shaker A. (2009). "A typology of social entrepreneurs: Motives, search processes and ethical challenges". Journal of Business Venturing. 24 (5): 519–532. doi:10.1016/j.jbusvent.2008.04.007. - Zhang, S.X.; Cueto, J. (2015). "The Study of Bias in Entrepreneurship". Entrepreneurship Theory and Practice. 41 (3): 419–454. doi:10.1111/etap.12212.
<urn:uuid:f419332a-f20a-4e7b-9dc1-edfbea57937c>
{ "date": "2018-04-25T14:56:09", "dump": "CC-MAIN-2018-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947822.98/warc/CC-MAIN-20180425135246-20180425155246-00456.warc.gz", "int_score": 4, "language": "en", "language_score": 0.8837889432907104, "score": 3.84375, "token_count": 17049, "url": "https://en.wikipedia.org/wiki/Bootstrapping_(business)" }
Alternate Names : Closed Head Injury, Postconcussive Syndrome How is the injury recognized? A concussion can be diagnosed by a healthcare professional with a standard neurological exam and complete history. An EEG, or electroencephalogram, may be ordered to check for abnormalities in the brain waves. Tests such as a cranial CT scan, X-ray, and cranial MRI may also be used to determine the amount of damage to the brain. Often, all tests will be normal because the injury is not severe enough to detect.
<urn:uuid:a80ea3d1-6574-4bb2-b199-1482d52adc81>
{ "date": "2014-07-25T13:40:41", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894275.63/warc/CC-MAIN-20140722025814-00064-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.909554660320282, "score": 3.375, "token_count": 121, "url": "http://www.3-rx.com/concussion/diagnosis.php" }