text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
fallout can differ appreciably from that which might be expected from the
direction of surface winds.
b. Automatic Fallout Response.
The rapid onset of fallout, especially from small yields, within a few
kilometers of ground zero of a surface burst requires quick adoption of
The time after burst before onset of fallout near
ground zero will vary, depending on the yield of the nuclear detonation,
weather conditions, and type of terrain. Normally, use of shelter will be
automatic whenever nuclear bursts are observed, since these bursts should be
assumed to be fallout producing until monitoring and the passage of time
prove otherwise. During the period of uncertainty, precautionary measures
consistent with the mission are instituted. See FM 3-3, FM 3-4, and FM 3-
c. Physical Recognition of Fallout.
Fallout particles are often visible during hours of daylight. The arrival
and settling of dust-like particles after a nuclear burst occurs should be
assumed to indicate the onset of fallout unless monitoring shows no
The neutron-induced area is small by comparison with the fallout area
produced by the same yield nuclear weapon. It is often contained within the
area of great destruction and obstacles (tree blowdown, rubble, and fire).
Frequently there will be no need to enter the area. However, if friendly
troops are required to pass through ground zero or occupy positions in the
immediate vicinity of ground zero, induced radiation may be operationally
significant. Total dose predictions are based on actual dose rates obtained
e. Rate of Decay.
The rate of decay must be known to perform meaningful dose-rate or dose
This rate of decay is indicated by the decay exponent (n),
which may vary with time after burst and location of the contamination
within the fallout area.
The true decay exponent generally will not be
accurately determined until several series of dose-rate readings are
available for specific locations within the contaminated area. Therefore, a
decay exponent of n equals 1.2 has been established as standard and is used
by all units unless informed otherwise by higher headquarters. | <urn:uuid:203f9736-a162-4e73-a6d5-bb492b7ec3af> | {
"date": "2017-10-19T01:36:57",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00756.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.914055347442627,
"score": 3.625,
"token_count": 440,
"url": "http://armychemicaloperations.tpub.com/Cm5206b/Automatic-Fallout-Response-112.htm"
} |
At the age of 13, Lourdes Villarnova, an 8th grader at Elgin Academy, is a researcher involved in a worldwide project aimed at determining global patterns of acid rain.
Lourdes, who lives in Wayne, and her 21 classmates are among an estimated 10,000 children in 509 school classes in 44 states, 5 Canadian provinces and 6 other countries-the Soviet Union, Japan, Iceland, Indonesia, Singapore and Zambia-who are experiencing science firsthand rather than reading about it in textbooks.
The National Geographic Society, with a dual purpose of sparking interest in earth science and geography education, has joined forces with the U.S. Department of Commerce to develop an acid rain study using children as the researchers.
John Miller, deputy director of the department`s Air Resources Laboratory in Washington, is the scientist for the National Geographic Kids Network project.
He wrote to the student-scientists:
''We have been trying to answer questions such as: `How far does the wind transport acid substances?` and `What effects do acid substances have on forests, lakes and streams?` ''
Lourdes and the other Elgin Academy 8th graders from communities such as St. Charles, Barrington and Woodstock, are measuring the acid content of rainwater that falls in their back yards. They place plastic cups inside 2-liter plastic pop bottles cut in half, a measurement method they devised to ensure the water is not contaminated.
Using a sampling kit that consists of a chemically treated piece of paper that turns into various shades of yellow or green when dipped into rainwater and a little card with the colors and the acidic level for the different hues, the youngsters record their findings after heavy rains.
''It`s better than a textbook,'' Lourdes said. ''You are using your own hands to learn about science, not just reading about it. You do it.''
Though the National Geographic Kids Network asks the children to record their data, assemble it, put the information into a computer and transmit it to Miller, Elgin Academy is stretching the project to include work in English, mathematics, social studies and computer education.
Rand Briggs, the academy`s science teacher, said, ''I was looking for a way to bring science out of the textbook and into the real world.''
Last year, he saw an inch-long item from the National Geographic Society in a science teachers magazine inviting schools to participate in the acid rain project. But he wanted to use the opportunity to teach children much more than how real science research works.
First, Briggs asked the 8th graders to use their writing skills to develop a proposal to participate so it could be presented to the academy`s board of trustees for approval.
After that hurdle was cleared, Elgin Academy was placed in a cluster of 12 schools whose results will be analyzed in Washington to determine acid rain patterns within that group in addition to its role in the global study. Briggs assigned the youngsters to write to children in participating schools in places such as Vermont, California, Virginia and even Zambia and ask them to tell about their communities.
Their work has had spinoff effects in geography and mathematics and additionally, the 8th graders are loading up the computer with information about acid rain that will be used by other Elgin Academy youngsters in research reports on the issue.
Participating schools have a deadline of Friday to transmit by a computer hookup their acid rain information to Miller. He and a team of scientists will analyze the data and report their findings to every school. | <urn:uuid:01e537ad-3a18-4da4-92ea-ac4193cb741f> | {
"date": "2018-09-25T08:09:59",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161214.92/warc/CC-MAIN-20180925063826-20180925084226-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9548507928848267,
"score": 3.265625,
"token_count": 726,
"url": "http://www.chicagotribune.com/news/ct-xpm-1990-05-07-9002060568-story.html"
} |
I too agree that we cannot do your homework for you.
An excellent tool for getting started with perl is: Perl for Dummies--They spell everything out in this book.
Did you try searching this site on commands such as dir(). Many people have snippets of code where they read directories. Also use google to search on specific perl commands. They are many examples out there.
Once you have a good idea, come on back and ask a more specific question. We want to help, but want to know that you really are trying to understand the language: you task is not a difficult one.
Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
Read Where should I post X? if you're not absolutely sure you're posting in the right place.
Please read these before you post! —
Posts may use any of the Perl Monks Approved HTML tags:
You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.)
- a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
Link using PerlMonks shortcuts! What shortcuts can I use for linking?
See Writeup Formatting Tips and other pages linked from there for more info.
| & || & |
| < || < |
| > || > |
| [ || [ |
| ] || ] || | <urn:uuid:eba10444-5a10-4830-962f-359c31fe2e6a> | {
"date": "2015-10-07T08:37:13",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736682947.6/warc/CC-MAIN-20151001215802-00164-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.891363799571991,
"score": 2.515625,
"token_count": 407,
"url": "http://www.perlmonks.org/index.pl?parent=154187;node_id=3333"
} |
The Zetasizer Nano particle characterization system from Malvern
Instruments (Malvern, UK) is proving to be an ideal research tool for advanced
healthcare applications such as gene therapy and selective-target carrier molecules.
University of Washington researchers say that accurate zeta potential and particle
size measurements were critical to their successful development of fluorescent,
tumour-targeting iron oxide nanoparticles.
Able to safely cross the blood-brain barrier and selectively illuminate brain
cancer cells during a magnetic resonance imaging (MRI) scan, the innovative
molecules resulting from this research are set to make brain cancer imaging
"Safe molecular penetration of the blood-brain barrier depends on a particle's
size, fat content and electric charge. It wasn't until we obtained the Zetasizer
Nano in 2006 that we were able to efficiently measure, monitor and optimise
these properties and develop nanoparticles that deliver the desired half-life
in blood but remain stable long enough to support imaging," explained Professor
Miqin Zhang from the University of Washington's Department of Materials Science
The blood-brain barrier protects the brain from infection. Current imaging
techniques require the injection of both dyes and a drug to forcefully open
the barrier. Professor Zhang and her team have formulated particles approximately
33 nanometres in diameter. Three times smaller in wet conditions than anything
previously formulated in the lab, these particles can naturally penetrate the
blood-brain barrier without exposing the patient to the risk of infection, and
represent a highly significant advance in brain cancer imaging.
The Nanoparticle Lab within the University of Washington's Department of Materials
Science and Engineering focuses its research on cancer diagnosis and treatment
through imaging enhancement and targeted and controlled therapeutic payload
delivery. This is accomplished by use of nanoconjugates or multifunctional nanovectors.
A nanoconjugate is a chemically modified nanoparticle serving as a "vehicle"
that carries biomolecules to target cells. The term "nanovector" here
refers to a nanosized entity that plays a functional role in the perspective
The Zetasizer Nano which plays an integral part in the research work is one
of a series of instruments from Malvern Instruments that delivers particle size
and zeta potential monitoring capabilities at the nanometre scale. Widely used
for characterizing a broad range of nanosized materials from high concentration
colloids through to dilute protein solutions, the Zetasizer range supports the
current trends in frontline scientific research. | <urn:uuid:6f207742-5d96-4b9e-b664-68571daf2edf> | {
"date": "2015-10-07T02:41:37",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736680773.55/warc/CC-MAIN-20151001215800-00180-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9055546522140503,
"score": 2.625,
"token_count": 528,
"url": "http://www.azonano.com/news.aspx?NewsID=14963"
} |
Kuwait is facing a wide range of climate change challenges including sea level rise, water scarcity, desertification and loss of diversity. Kuwait is characterized by high temperature, high humidity and arid lands resulting in seriously degraded soil and land damage in addition to salt intrusion in the aquifers affecting the small scale agricultural lands thus enhancing the food security threat in the region. Since 1975, Kuwait has experienced 1.50C to 20C increase in temperature, which is significantly higher than the global average. In recent years, there has been a sharp change in rainfall pattern in Kuwait which may be attributed to climate change impacts. In addition, there has been marked increase in dust storms in last few decades which are noticeable signs of change in climatic conditions in Kuwait and neighbouring nations.
Rise in Sea Level
One of the main climate change impacts is sea level rise on coastal areas of all Arabian Gulf states. Kuwait is highly vulnerable to the impacts of sea level rise as it could lead to severe impacts on industrial and socio-economic development. Climate change-induced sea level rise may lead to flooding of low-lying urban infrastructure, inundation of coastal ecosystems and deterioration of groundwater quality. Inundation will severely affect cities, roads, agricultural areas, as well as beaches and salt marshes across Kuwait. Among the most vulnerable sites in Kuwait are Bubyan Island, Qaruh Island and Al-Khiran which are in real danger of disappearance on account of any potential sea level rise.
Continued use of non-renewable water is major factor in depleting groundwater reserves in Kuwait and put it a serious risk of climate change impacts. Being a highly water-scarce country, Kuwait is heavily dependent on desalinated water and fresh groundwater to meet drinking water needs. On a per capita basis, Kuwait has one of the highest per capita water consumption worldwide, apart from having world’s highest per capita production of desalination water. Water resource management is huge challenge for Kuwait as its per capita natural water availability is lowest in the world. With climate change, it is expected that balancing water supply and water demand will become an even greater challenge.
Kuwait is endowed with rich biodiversity of terrestrial flora and fauna, however the potential loss of terrestrial and marine biodiversity due to climate change is a major concern in Kuwait. Desert areas contain many species of annuals, which make up about 90% of plant species of Kuwait. Kuwait is also endowed with rich marine biodiversity. Many endemic species can be found including crabs, which are found on biota-rich inter-tidal Sabkha zones. An increase in seawater temperature will affect the reproduction period of fish and shrimp and may result in large-scale migration of fish to other areas which will have serious repercussions for the fish industry in Kuwait and neighbouring countries. Erratic rainfall and sand encroachment may lead to loss in plant cover thereby causing runoff and flooding.
Agriculture production is directly dependent on climate change and weather. The possible changes in temperature, precipitation and CO2 concentration are expected to significant impact on crop growth. The potential of agricultural development in Kuwait is very limited, as less than 1% of the land area is considered arable. Moreover, only a portion of arable land area is actually cultivated due to a hyper-arid climate, water scarcity, poor soils, and lack of technical skills. Because of the nature of the terrain and water scarcity, it is quite difficult to put new land into agricultural production. Interestingly, agriculture consumes around one-third of groundwater but account for less than 5 percent of the GDP.
Kuwait is both physically and biologically threatened by the climate change phenomenon. Over the next few decades, Kuwait could be potentially facing serious impacts of global warming in the form of floods, droughts, depletion of aquifers, inundation of coastal areas, frequent sandstorms, loss of biodiversity, significant damage to ecosystem, threat to agricultural production and outbreak of diseases. There is an urgent need to implement climate change mitigation and adaptation measures, and prepare a strong framework for socio-economic development which may be sustainable in the long-run. | <urn:uuid:25f7ea5e-300e-49a1-adfd-8d69a4bea6f6> | {
"date": "2017-08-19T03:35:46",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105297.38/warc/CC-MAIN-20170819031734-20170819051734-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9448637962341309,
"score": 3.421875,
"token_count": 834,
"url": "http://www.ecomena.org/climate-change-kuwait/"
} |
Ohio Biodiversity Database
The Natural Heritage Database was managed by the Division of Natural Areas & Preserves' Natural Heritage Program starting in 1976. In 2010, the Database was transferred to the Division of Wildlife and renamed the Ohio Biodiversity Database.
It now contains more than 19,000 records which represent known locations for Ohio's rare plants and animals, high quality plant communities and other natural features.
Data are obtained from a broad range of sources throughout the state.
In addition to the division's needs, data are used in the department's environmental review process and are provided to consulting firms, federal, state and local government agencies, researchers, conservation groups and private citizens.
To request Biodiversity data, please use the Biodiversity Database Data Form.
To provide data, please use the Datasheet.
Ohio Rare Plant List 2010-2011
Ohio Rare Plants with Abstracts
Ohio State-listed Species by County | <urn:uuid:b735f616-364f-463d-a427-25a0e9e6fdf8> | {
"date": "2013-12-05T19:56:10",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163047523/warc/CC-MAIN-20131204131727-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.911867082118988,
"score": 3.421875,
"token_count": 190,
"url": "http://www.ohiodnr.gov/heritage/default/tabid/2010/Default.aspx"
} |
Gender gaps in the labour market remain a pressing global challenge. Female labour force participation has risen in recent decades, but it is still nearly 27 percentage points lower than the rate for men, and no improvements are expected in the short term (ILO 2017a). Female participation rates have stagnated in recent years, casting doubts on the future tendency of this phenomenon and the reduction of gender gaps in the labour market. Gender inequality is not only observed in terms of participation rates: women who do participate are less likely to find a job than their male counterparts, and if they do manage to find employment, they often find additional obstacles: vertical and horizontal segregation, lower wages, etc.
The state of gender gaps in the labour market is worrisome per se, but the very slow rate of progress makes things even more shocking. According to the World Economic Forum’s last Global Gender Gap Report, the situation of women actually worsened for the second year in a row in 2017. If the current trend continues, economic gender equality will not be achieved for at least another 217 years (World Economic Forum 2017).
Both the state and the evolution of gender gaps highlight how relevant the obstacles to both the fulfilment of women’s rights and sustainable development are. First and foremost, the persistence of gender gaps in the labour market represents a violation of women’s economic rights, which have been recognised internationally through human rights commitments and specific women’s rights instruments (such as the Convention on the Elimination of All Forms of Discrimination Against Women—CEDAW—adopted in 1979 by the United Nations).
There is also a large body of research suggesting that there are substantial potential economic gains to be made by reducing gender gaps. This literature, which is briefly surveyed in this article, suggests that gender inequality is not only unfair but also inefficient. Narrowing and eliminating gender gaps may yield important economic returns, both nationally and globally.
Economic arguments for addressing gender gaps: three important channels
Gender labour gaps may affect economic performance in several ways. One obvious channel emphasises the underutilisation of talent associated with women’s lower participation in the labour market. Increasing their participation—by, for instance, exploiting the economies of scale of extending the supply of day care—would imply an increase in a country’s potential gross domestic product (GDP) and per capita income (OECD 2012; McKinsey Global Institute 2015; ILO 2017a).
A second channel through which gender gaps affect efficiency is the underinvestment in women’s human capital. Blackden et al. (2006) argue that gender inequality in education—in addition to that in the labour market—reduces both the actual and potential stock of human capital. The disadvantaged position of qualified women in labour markets and the artificial restriction posed on the pool of talent create inefficiencies and hamper economic growth. A similar argument can be made specifically regarding entrepreneurial talent, which is arguably distributed randomly among individuals independently of their gender. If women have fewer opportunities to reach management positions—a phenomenon known as the ‘glass ceiling’—the speed of innovation and technology adoption in the economy shrinks and, as a consequence, so do aggregate productivity and GDP per capita (Esteve-Volart 2009).
A third channel operates through the impact of gender inequality on the stock of human capital of the next generation. Sen (1990) and Klasen and Wink (2003), for instance, argue that asymmetries in employment and income undermine women’s bargaining power within the household. Since women are typically more likely than men to invest in their children’s well-being (Duflo 2003; 2012), their relative lower bargaining power may lead to underinvestment in children’s education and health. Similarly, Slotsky (2006) argues that increasing women’s decision-making power favours aggregate productivity in the long term, as they seem to have a stronger preference for goods and services that contribute to their children’s human capital (de Hoop et al. 2017). Finally, because the increase in female education levels renders women’s time more expensive, families tend to reduce the number of children they have and spend more on them. This leads, on average, to higher income per capita (Lagerlof 2003).
Economic returns of reducing gender gaps: some evidence
An increasing literature has documented and quantified the economic returns of reducing gender gaps in the economy. A group of studies has analysed how different aspects of the gender composition of boards of directors or managerial positions within a firm impact their performance. The Credit Suisse Research Institute (CSRI 2014), for instance, finds that within large companies—with market capitalisation greater than USD10 billion—those in which managing boards have a higher-than-average percentage of women outperformed those with fewer-than-average by 36 per cent in terms of stock market performance between 2005 and 2014. Similarly, Catalyst (2011) shows that Fortune 500 companies with a higher representation of women in senior management positions financially outperform companies with proportionally fewer women at the top: between 2004 and 2008, they obtained 26 per cent higher return on invested capital and 16 per cent higher return on sales. Kim and Starks (2016) show that women directors enhance the effectiveness of advisory boards due to a more diversified pool of skills. Greater director heterogeneity of expertise is associated with higher company value—a gender-diverse board has the potential to increase company value (Kim and Starks 2015). Ali et al. (2011) find evidence of an overall positive relationship between gender diversity and employee productivity in Australian companies. Finally, Cuberes and Teignier-Baqué (2011) estimate that male-dominated industries could increase their productivity by between 3 per cent and 25 per cent in many developing countries by improving female labour force participation.
Consistent with the evidence at the micro level, positive effects are estimated at the macroeconomic level. McKinsey Global Institute (2015) constructs an ideal future scenario in which women participate in the economy identically to men. According to its estimations, this could add up an extra USD28 trillion dollars in 2025 to annual global GDP, compared with a business-as-usual scenario. These numbers arise from closing different gaps. For instance, rising female participation in the labour force accounts for 54 per cent of the potential increase. Closing the gap in hours worked would generate 23 per cent of the estimated incremental GDP. Finally, women tend to be overrepresented in lower-productivity sectors, while men are overrepresented in those with higher-than-average productivity. Thus, shifting women into positions in higher-productivity sectors to match male distribution patterns would add another 23 per cent to the total potential incremental GDP.
Since this scenario seems unrealistic in the medium term, the report evaluates achievable scenarios more closely. For example, if all countries matched their progress in terms of gender parity with the best-performing country in the region, global GDP would increase by USD12 trillion by 2025. Similarly, the International Labour Organization (ILO) estimates the potential gains in terms of GDP if all countries were to meet the G20 target, established in 2014, of reducing the gap between male and female labour participation rates by 25 per cent by 2025. This amounts to an increase of USD5.3 trillion dollars in global GDP. Moreover, the report highlights the potential self-financing effects related to public investment that is attributed to closing gender gaps: it is estimated that this could increase global tax revenues by USD1.4 trillion dollars (ILO 2017b).
Observed gender gaps in the economy imply a straightforward disadvantage for women. The case for closing such gaps can and should be made in terms of fairness. An emerging literature suggests that the case could also be made in terms of economic efficiency and growth. Giving equal opportunities to women in the labour market is in many cases a good deal for individual companies, but it is clearly a good deal for societies as a whole.
Ali, M., C.T. Kulik, and I. Metz. 2011. “The gender diversity–performance relationship in services and manufacturing organizations.” International Journal of Human Resource Management 22(07): 1464–1485.
Blackden, M., S. Canagarajah, S. Klasen, and D. Lawson. 2006. “Gender and growth in Sub-Saharan Africa.” UNU-WIDER Research Paper No. 2006/37. Helsinki: United Nations University–World Institute for Development Economics Research.
Catalyst. 2011. The bottom line: corporate performance and women’s representation on boards (2004–2008). New York: Catalyst.
CSRI. 2014. The CS Gender 3000: Women in Senior Management. Zurich: Credit Suisse Research Institute.
Cuberes, D., and M. Teignier‐Baqué. 2011. “Gender inequality and Economic Growth.” Background paper for the World Development Report 2012. Gender Equality and Development. Washington, DC: World Bank.
De Hoop, J., P. Premand, F. Rosati, and R. Vakis. 2017. “Women’s Economic Capacity and Children’s Human Capital Accumulation.” IZA Discussion Paper No. 10501. Bonn: Forschungsinstitut zur Zukunft der Arbeit.
Duflo, E. 2003. “Grandmothers and Granddaughters: Old-Age Pensions and Intrahousehold Allocation in South Africa.” World Bank Economic Review 17(1): 1–25.
Duflo, E. 2012. “Women Empowerment and Economic Development.” Journal of Economic Literature 50(4): 1051–1079.
Esteve-Volart, B. 2009. “Gender discrimination and growth: Theory and evidence from India.” Working Paper. London: London School of Economics and Political Science.
ILO. 2017a. World Employment Social Outlook. Trends for Women 2017. Geneva: International Labour Office.
ILO. 2017b. “Economic impacts of reducing the gender gap. What Works.” Research Brief No. 10. Geneva: International Labour Office.
Kim, D. and L.T. Starks. 2015. “Board Heterogeneity of Expertise and Firm Performance.” Unpublished.
Kim, D. and L.T. Starks. 2016. “Gender diversity on corporate boards: Do women contribute unique skills?” American Economic Review 106(5), May: 267–271.
Klasen, S., and C. Wink. 2003. “Missing Women: Revisiting the Debate.” Feminist Economics 9.
Lagerlof, N. 2003. “Gender equality and long run growth.” Journal of Economic Growth 8: 403–426.
McKinsey Global Institute. 2015. The Power of Parity: How Advancing Women’s Equality can add $12 Trillion to Global Growth. New York: McKinsey & Company.
OECD. 2012. Gender Equality in Education, Employment and Entrepreneurship: Final Report to the MCM 2012. Paris: Organisation for Economic Co-operation and Development.
Sen, A. 1990. “Gender and Cooperative Conflicts.” In Persistent Inequalities, edited by I. Tinker. New York: Oxford University Press.
Stotsky, J.G. 2006. “Gender and Its Relevance to Macroeconomic Policy: A Survey.” IMF Working PaperWP/06/233. Washington, DC: International Monetary Fund.
World Economic Forum. 2017. The Global Gender Gap Report 2017. Geneva: World Economic Forum. | <urn:uuid:15807c47-9e9a-4666-b51d-e006edc85adf> | {
"date": "2019-08-21T09:43:10",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315865.44/warc/CC-MAIN-20190821085942-20190821111942-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9021171927452087,
"score": 3.140625,
"token_count": 2416,
"url": "https://www.cippec.org/textual/gender-labour-gaps-affect-gdp-through-underuse-of-talent-2/"
} |
Durante degli Alighieri, better known as Dante, (c. June 1, 1265 – September 14, 1321) was an Italian and Florentine poet. His greatest work, the epic poem The Divine Comedy, is considered the greatest literary statement produced in medieval Europe.
Much like Geoffrey Chaucer in England and Alexander Pushkin in Russia, Dante is credited not only with creating a magnificent poetry; he is also considered to be the father of the modern Italian language itself. This may be somewhat of an exaggeration, for while the very language of The Divine Comedy would become so widespread that it would form the basis from which the Italian language would emerge, Dante was by no means alone in writing luminous works in this formative period of Italian literature. He was a contemporary (and in some cases, a friend) of such luminaries as Guido Cavalcanti and Petrarch.
Dante is sometimes considered to be the most important poet of the Renaissance. Some have even gone so far as to suggest that the Renaissance begins with Dante; he made the first steps out of the ancient world and into the modern world. Often ranked with Homer and Virgil as one of the great epic poets, Dante is certainly the most modern. While the epic poets of ancient times tended to celebrate the greatness and heroism of their respective nations (for Homer, Greece; for Virgil, Rome) Dante's objective in his epic is decidedly different: to explore Hell, Purgatory, and Heaven and, in so doing, reconcile Europe's Hellenic past with its Christian present.
Dante's epic has no epic battles, nor any towering heroes. Its protagonist is Dante himself, a plain and (by his own admission) somewhat reserved Florentine. Its action consists, primarily, of Dante's encounters and conversations with the dead. In so doing, Dante establishes a dialogue with the past in a way never before realized, and leads the way into a future that would become the Renaissance—literally, the rebirth—of European culture, a recapturing and "baptizing" of its Hellenic past.
Early history and family
Dante was born in 1265 and by his own account, placed his birthday between May 18th and June 17th. As an infant, Dante was christened “Durante” in Florence's Battistero di San Giovanni or Baptistery in Florence.
He was born into the prominent Alighieri family of Florence, whose loyalties were to the Guelfs, a political alliance that supported the Papacy, in opposition to the Ghibellines, who were backed by the Holy Roman Emperor.
After the defeat of the Ghibellines by the Guelfs in 1289, the Guelfs themselves were divided into White Guelfs, who were wary of Papal influence, and Black Guelfs, who continued to support the Papacy. In the Divine Comedy, Dante (a White Guelf) pretended that his family descended from the ancient Romans (Inferno, XV, 76), but the earliest relative he can mention by name is Cacciaguida degli Elisei (Paradiso, XV, 135), from no earlier than the year 1100.
His father, Alighiero de Bellincione, was a White Guelf, but suffered no reprisals after the Ghibellines won the Battle of Montaperti, and this safety reveals a certain personal or family prestige.
Dante's mother was Donna Bella degli Abati. "Bella" stands for Gabriella, but also means "beautiful," while Abati (the name of a powerful family) means "abbot." She died when Dante was five or six years old, and Alighiero soon married Lapa di Chiarissimo Cialuffi. It is uncertain whether he really married her, as widowers had social limitations in these matters. However she definitely bore two children, Dante's brother Francesco and sister Tana (Gaetana).
When Dante was 12, he was promised in marriage to Gemma di Manetto Donati, daughter of Messer Manetto Donati. Contracting marriages at this early age was quite common, and was an important ceremony, requiring formal deeds signed before a notary. Dante had four children with Gemma; Jacopo, Pietro, Gabrielle, and Antonia Alighieri.
Education and poetry
Not much is known about Dante's education. It is believed he studied at home. He studied Tuscan poetry, at a time when the Sicilian School (Scuola poetica siciliana), a cultural group from Sicily, was becoming known in Tuscany. His interests brought him to discover Provençal minstrels and poets, and Latin culture with a particular devotion to Virgil.
It should be underlined that during the Secoli Bui or Dark Ages, Italy had become a mosaic of small states. Sicily was culturally and politically as far from Tuscany as was Provence. The regions did not share a language, culture, or easy communications. Nevertheless, Dante was keenly aware of intellectual and international interests.
At age 18, he met Guido Cavalcanti, Lapo Gianni, Cino da Pistoia, and soon after Brunetto Latini; together they became the leaders of Dolce Stil Nuovo (“The Sweet New Style”), which became one of the leading literary movements of medieval Italy. Brunetto later received a special mention in The Divine Comedy (Inferno, XV, 82), for his contributions to Dante's development.
When he was but nine years old, he met Beatrice Portinari, the daughter of Folco Portinari, with whom he fell in love "at first sight," and apparently without even having spoken to her. He saw her frequently, often exchanging greetings in the street, but they never became involved romantically. It is hard to decipher of what this love consisted, but something extremely important for Italian culture was taking place. Dante, along with the rest of the Stil Nuevo poets, would lead the writers of the Renaissance to discover the themes of romantic Love (Amore), which had never been so emphasized before. His love for Beatrice would become Dante's reason for poetry and for living, in a somewhat different fashion Petrarch would show for his Laura.
When Beatrice died in 1290, Dante, then 25, sought a refuge in Latin literature. From the Convivio it is known that he read Boethius's De consolatione philosophiae and Cicero's De amicitia. He then dedicated himself to philosophical studies at religious schools like the Dominican Santa Maria Novella. He took part in the disputes between the two principal mendicant orders, the Franciscans and Dominicans. The Franciscans adhered to a mysterical doctrine of the mystics and of San Bonaventura, the latter Saint Thomas Aquinas. Dante would use Beatrice to criticize his "excessive" passion for philosophy in the second book of The Divine Comedy, Purgatorio.
Dante, like many Florentines of his day, became embroiled in the conflict between the Guelphs and Ghibellines. He fought in the battle of Campaldino (June 11, 1289), with Florentine Guelf knights against Arezzo Ghibellines. In 1294 he was among those knights who escorted Carlo Martello d'Anjou (son of Charles of Anjou) while he was in Florence.
To further his political career, he became a doctor and a pharmacist; he did not intend to take up those professions. However, a law issued in 1295 required that nobles who wanted to assume public office had to be enrolled in one of the merchant guilds. Dante quickly obtained admission to the apothecaries' guild. The profession he chose was not entirely inapt, since at the time books were sold from apothecaries' shops. As a politician, he accomplished little of relevance, but he held various offices over a number of years in a city undergoing some political agitation.
Pope Boniface VIII was planning a military occupation of Florence, in 1301. The Pope appointed Charles de Valois, brother of King Philip IV of France, as peacemaker for Tuscany. At the time, Florence's city government was expecting a visit from him. They had treated the Pope's ambassadors poorly a few weeks earlier. Members of the city government openly feared Charles de Valois might have "unofficial" orders, so the council sent a pre-emptive delegation to Rome, in order to ascertain the Pope's intentions. Dante was made the chief of this delegation.
Exile and death
Upon the delegation's arrival, the pope summarily dismissed the representatives and asked Dante alone to remain with him in Rome. At the same time on November 1, 1301, Charles de Valois was entering Florence with Black Guelfs. For the next six days the Black Guelfs destroyed everything and killed most of their enemies. A new government was installed in Florence composed of Black Guelfs, with Cante dei Gabrielli di Gubbio appointed as mayor of Florence. Dante was still in Rome at the pope's request. He was therefore considered a deserter by the Florentines. As a result, Dante was exiled from his native city and ordered to pay a substantial sum to atone for his absence from the battle. Separated from his wealth, he could not pay his fine. Dante was condemned to perpetual exile with a price on his head. Had Florentine soldiers caught him, he would have been executed.
The poet took part in several attempts by the White Guelfs to regain Florence, but these all failed due mainly to treachery. Dante was bitter at the treatment he had received in Rome at the hands of his enemies. He also grew disgusted with the infighting and ineffectiveness of his erstwhile allies, and vowed to become a party of one. At this point he began sketching the foundations for the Divine Comedy as a work in 100 cantos divided into three books of thirty-three cantos each, with a single introductory canto.
Divesting himself of any allegiance, Dante went to Verona as a guest of Bartolomeo Della Scala. He then moved to Sarzana, and afterwards he is supposed to have lived for some time in Lucca with Madame Gentucca, who made his stay comfortable. She was later gratefully mentioned in Purgatorio (XXIV, 37). Some speculative sources have placed him in Paris, between 1308 and 1310. Other sources, less trustworthy, place him in Oxford in Great Britan.
In 1310 the German King Henry VII of Luxembourg invaded Italy. Dante saw in him the chance for revenge, so he wrote to Henry VII and to other Italian princes, several public letters attempting to incite them to destroy the Black Guelfs. Mixing religious and private concerns, he suggested several particular targets that coincided with his personal enemies.
In 1312, Henry VII assaulted Florence and defeated the Black Guelfs, but there is no evidence that Dante was involved. It is believed by some that he refused to participate in the assault on his city. Other suggestions include that his name had become unpleasant for White Guelfs also and that any trace of his passage had carefully been removed. In 1313 Henry VII died, and with him any residual hope for Dante to see Florence again. He returned to Verona, where a patron allowed him to live in security and, evidently, a fair degree of prosperity. Coincidentally, this patron would be, in Dante's poem, admitted to Paradise (Paradiso XVII, 76).
In 1315, Florence was forced militarily to grant an amnesty to all of its people in exile. Dante was on the list of citizens to be pardoned, but Florence required that in addition to paying a sum of money, these citizens agree to be treated as public offenders and recant in a religious ceremony. Dante refused this formula, calling it "outrageous" and remained in exile.
Dante still hoped late in life that he might be invited back to Florence on more honorable terms. For Dante, exile was akin to a form of death, stripping him of much of his identity. Dante addressed the pain of exile in Canto XVII (55-60) of Paradiso, where Cacciaguida, his great-great-grandfather, warns him what to expect:
- Tu lascerai ogne cosa diletta
- più caramente; e questo è quello strale
- che l'arco de lo essilio pria saetta.
- Tu proverai sì come sa di sale
- lo pane altrui, e come è duro calle
- lo scendere e 'l salir per l'altrui scale . . .
- You shall leave everything you love most:
- this is the arrow that the bow of exile
- shoots first.
- You are to know the bitter taste
- of others' bread, how salt it is, and know
- how hard a path it is for one who goes
- ascending and descending others' stairs . . ."
Dante describes wistfully the hope of returning to Florence, as if he had already accepted its impossibility, in Canto XXV of Paradiso (1-9):
- Se mai continga che 'l poema sacro
- al quale ha posto mano e cielo e terra,
- sì che m'ha fatto per molti anni macro,
- vinca la crudeltà che fuor mi serra
- del bello ovile ov'io dormi' agnello,
- nimico ai lupi che li danno guerra;
- con altra voce omai, con altro vello
- ritornerò poeta, e in sul fonte
- del mio battesmo prenderò 'l cappello . . .
- If it ever come to pass that the sacred poem
- to which both heaven and earth have set their hand
- so as to have made me lean for many years
- should overcome the cruelty that bars me
- from the fair sheepfold where I slept as a lamb,
- an enemy to the wolves that make war on it,
- with another voice now and other fleece
- I shall return a poet and at the font
- of my baptism take the laurel crown...
Dante never returned to Florence. Prince Guido Novello da Polenta invited him to Ravenna in 1318. He finished his epic poem there, dying in 1321 at the age of 56 while on the way back to Ravenna from a diplomatic mission in Venice, perhaps of malaria. Dante was buried in the Church of San Pier Maggiore (later called San Francesco). Bernardo Bembo, praetor of Venice, in 1483 took care of Dante's remains, organizing and re-interring his body in a better tomb.
On the grave are inscribed some verses of Bernardo Canaccio, a friend of Dante, dedicated to Florence:
- parvi Florentia mater amoris
- "Florence, mother of little love"
Eventually, Florence came to regret Dante's exile. In 1829, a tomb was built for him in Florence in the basilica of Santa Croce. That tomb has been empty ever since, as Dante's body remains still in its tomb in Ravenna, far from the land he loved so dearly, but which never allowed his return.
La Vita Nuova
La Vita Nuova contains 42 brief chapters with commentaries on 25 sonnets, one ballata, and four canzoni; one canzone is left unfinished, interrupted by the death of Beatrice Portinari, Dante's life-long love to whom all of the poems in the volume are dedicated.
Dante's commentaries explicate each poem, placing it within the context of his life. They present a frame story, which is not apparent within the sonnets themselves. The frame story is simple enough: it recounts the time from Dante's first sight of Beatrice when he was nine years old, and she was eight, all the way to Dante's mourning her death, and his determination to write of her "that which has never been written of any woman."
Each separate section of commentary further refines the poet's concept of romantic love as the initial step in a spiritual development that results in the capacity for divine love. Dante's unusual approach to his piece—drawing upon personal events and experience, addressing the readers, and writing in the vernacular rather than Latin—marked a turning point in European poetry, encouraging many writers to abandon highly stylized forms of writing for a simpler one.
Themes and Contexts
Dante wrote the work at the suggestion of his friend, the poet Guido Cavalcanti. Each chapter typically consists of three parts, the autobiographical narrative, the resulting lyric that arose from those circumstances, and an analysis of the subject matter of the lyric.
Though the result is a landmark in the development of emotional autobiography, the most important advance since Saint Augustine's Confessions in the fifth century, like all medieval literature it is far removed from the modern autobiographical impulse. Moderns think that their own personalities, motivations, actions and acquaintances are interesting. None of that, however, was of concern to Dante. What was interesting to him, and his audience, were the emotions of noble love, how they develop, how they are expressed in verse, and how they reveal the permanent intellectual truths of the divinely created world, how, that is, love can confer blessing on the soul and bring it closer to the divine.
Appropriately, therefore, the work does not contain any proper name, except that of Beatrice herself. Not even her surname is given, or any details that would assist readers to identify her among the many ladies of Florence: only the name "Beatrice,” because that was both her actual given name and her symbolic name as the conferrer of blessing. Dante does not name himself. He refers to Guido Cavalcanti only as "the first of my friends," to his own sister as "a young and noble lady ... who was related to me by the closest consanguinity," to Beatrice's brother similarly as one who "was so linked in consanguinity to the glorious lady that no-one was closer to her." The effect is that the reader cannot, as in a modern autobiography or novel, be distanced from the characters as one is distanced from one's own acquaintances. Instead, the reader is invited into the very emotional turmoil and lyric struggle of the unnamed author's own mind, and all the surrounding people in his story are seen in their relations to that mind.
There have been a variety of interpretations of La Vita Nuova. Among them is that of Mark Musa, who claims that rather than a serious autobiographical exploration of Love, La Vita Nuova is "a cruel commentary on the youthful lover" that points out the "foolishness and shallowness of his protagonist, a self-centered and self-pitying youth." Regardless of whatever Dante's true purpose in writing it was, La Vita Nuova is essential for understanding the context of his other works; principally The Divine Comedy.
The Divine Comedy
The Divine Comedy describes Dante's journey through Hell (Inferno), Purgatory (Purgatorio), and Paradise (Paradiso), guided first by the Roman epic poet Virgil and then by his beloved Beatrice. While the vision of Hell, the Inferno, is vivid for modern readers, the theological nuances presented in the other books require a certain amount of patience and scholarship to understand. Purgatorio, the most lyrical and human of the three, also has the most poets in it; Paradiso, the most heavily theological, has the most beautiful and ecstatic mystic passages, in which Dante tries to describe what he confesses he is unable to convey.
Dante wrote the Comedy in his regional dialect. By creating a poem of epic structure and philosophic purpose, he established that the Italian language was suitable for the highest sort of expression, and simultaneously established the Tuscan dialect as the standard for Italian. In French, Italian is nicknamed la langue de Dante. It often confuses readers that such a serious work would be called a "comedy." In Dante's time, all serious scholarly works were written in Latin (a tradition that would persist for many hundreds of years more, until the waning years of the Enlightenment), and works written in any other language were assumed to be comedic in nature.
The Divine Comedy is notable not just for its content, although that in itself is revolutionary. Dante is the first major poet to write an epic in the Christian tradition, and in so doing he demonstrated the durability of Biblical figures (such as Heaven and Hell, Satan and God) for telling stories of great drama and intrigue. Moreover, he is one of the first poets, major or otherwise, to tell a story not of heroes and battles but of personal crisis and introspection. Dante's ideal guide through Purgatory and Heaven is his true love, Beatrice; and in many ways it was through Dante that the ideal of a true, romantic love would come to permeate Western culture.
The Divine Comedy is also notable for its poetic techniques. For the poem, Dante invented a very simple but extremely powerful rhyme scheme called terza rima, where the poem is broken up into three-line tersest, which rhyme as follows:
The rhyme scheme of the Divine Comedy (which is sadly difficult to reproduce in English without sounding forced) gives the reader a sense of onward movement—each terset introduces a new rhyme—while at the same time continuing with rhymes seen from the previous terset, creating a sense of gradual progress much like Dante's description of his gradual ascent through the worlds of the afterlife. Terza rima has become so closely associated with Dante that the mere use of it is often enough to indicate that a poet is alluding to Dante's works.
Other works of Dante include Convivio ("The Banquet"), a collection of poems and interpretive commentary; Monarchia, which sets out Dante's ideas on global political organization; De vulgari eloquentia ("On the Eloquence of Vernacular"), on vernacular literature.
- Bonghi, Giuseppe. Glossario de Italiano Medioevale.
- Riccardo, Merlante. Dizionario della Divina Commedia. A dictionary of words used by Dante. Medieval Italian and Modern Italian.
- Gustarelli, Andrea. Dizionario Dantesco, per lo studio della Divina Commedia. Casa Editrice Malfasi, 1946. A dictionary of those words in The Divine Comedy whose meaning in Medieval Italian differs from that in Modern Italian.
All links retrieved September 20, 2012.
- "Digital Dante" – A resource page dedicated to Dante and his works.
- The Princeton Dante Project
- The Dartmouth Dante Project
- Danteworlds at UT Austin
- Read Dante Alighieri's works on Read Print – Free books for students, teachers, and the classic enthusiast.
- Henry Holiday's 'Dante and Beatrice'
- "Dante Alighieri on the Web", about his life, time, and (complete) work.
- Stanford Encyclopedia of Philosophy entry
- Società Dantesca Italiana (bilingual site) contains among other info a database of all the earliest manuscripts of Dante's works, with (for some) transcription of the text and page images
- Guardian Books "Author Page", with profile and links to further articles.
- Dante Alighieri - The Divine Comedy
- Dante Ravenna Tomb
- Dante Cenotaph Tomb
Dante Societies around the World
- Head Office - Rome Dante Alighieri Society
- Sydney Dante Alighieri Society
- Massachusetts Dante Alighieri Society
- Vienna Dante Alighieri Society
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
Note: Some restrictions may apply to use of individual images which are separately licensed. | <urn:uuid:db0d1951-8754-4a9e-a6be-1a17ed044205> | {
"date": "2014-10-26T07:42:29",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119660038.53/warc/CC-MAIN-20141024030100-00090-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9672232270240784,
"score": 3.65625,
"token_count": 5188,
"url": "http://www.newworldencyclopedia.org/entry/Dante_Alighieri"
} |
What is a Domain?
what is a domain?
What is a Domain?
Many people new to the Internet will commonly ask "What is a domain?". This hub attempts to provide the answer to the questions "What is a domain?" and other closely related matters.
A domain name is the internet equivalent of a property title. It is your website address on the internet superhighway. The same way that you have a physical address which identifies your physical location where you can be found or where you can receive your postal mail; a domain name represents the location of your website on the internet.
Computers connected to the internet are identified using a unique number known as an IP address. Each identifier is unique in that it distinguishes it from other computers connected to the internet. This number is composed of 4 sets of numbers separated by a dot such as, 172.27.225.96.
The exact IP addressing architecture is not the subject of this article. The point you need to understand to know "what is a domain" is why domain names were created and why they are necessary. Imagine trying to remember an IP address like the one above every time you needed to visit a website, it is a pretty daunting task even for someone with photographic memory. It can be compared to everyone using their social security numbers, passport numbers or similar complex numbers as their names. Imagine having to refer to a friend of yours as “SSN 987-65-4329” instead of just “John”. In the same manner it is easier to type “example.com” in the browser address bar than to type the IP address number. Thus, “example.com” is an example of a domain name. As you can see, domain names make life a lot easier.
Domain names are also unique in the sense that nobody else can own a domain you have registered. Once you register it, it becomes your property and no one else can register a similar name.
Domain names have at least two sections. In our example, “example” represents our preferred brand name while “.com” (pronounced dot com) represents the domain extension.
The Domain Name System is administered by the Internet Corporation for Assigned names and Numbers (ICANN). ICANN is a non profit institution that ensures that domain names are unique and that internet users can find all valid addresses. ICANN also accredits domain name registrars. Registrars are the companies that actually register a domain for you for a minimum of one year. We shall be discussing registrars later in this section. ICANN requires every accredited registrar to maintain a publicly accessible “WHOIS” database displaying all contact information for all domain names registered.
Domain Structure and Extensions
The next bit in understanding "what is a domain" is that there are two main kinds of domains, Top Level Domains (TLDs) and Second Level (SLD) / Lower Level domains.
Top Level domains are further categorized into two kinds;
Country Code Top Level Domains (ccTLDs)
These domains are based primarily on the two territory character codes of ISO-3166. The ISO – 3166 are country and territory codes established by the International Organization for Standardization (ISO). Thus, an example of a ccTLD is “Google.co.us” where “.us” is the country code for the USA.
Generic Top Level Domains (gTLDs)
In addition to the ccTLDs there are a number (originally seven) gTLDs whose extensions represent a set of name categories and organizational structure. The following are the current Generic Top Level Domain extensions:
· .com – this extension is the abbreviation of “commerce” and is currently available to everyone. It is the most common domain and the most easily recognizable.
· .net – this is the abbreviation of “network” and this domain extension is currently available for everyone. It is often used for internet infrastructure or related services.
· .org – this is the abbreviation for “organization” and is currently available for registration by all. It is mainly used by non profit organizations and entities. The best example would be “Wikipedia.org”, the online encyclopedia. It can also be used by businesses to showcase their charitable activities.
· .biz – this is the abbreviation of “business” and is also currently available for registration by every one. It is not a very popular domain extension but is excellent for ecommerce sites.
· .info – this is a fairly new extension and is an abbreviation for “information”. It is meant to be used by websites that are rich sources of information and is currently available to all.
· .mobi – this is also a fairly new domain extension having been created as a result of the mobile telephony and mobile applications revolution. It is the abbreviation for “mobile” and is mainly for use by sites that will mainly be viewed using mobile browsers.
· .edu – this is the abbreviation of “education”. This domain extension is reserved for educational institutions. You must be an educational institution to register a “.edu” extension.
· .gov – this is the abbreviation for “government” and is reserved for government institutions. An example would be whitehouse.gov.
· .me – this is also a fairly recent extension. It was developed as consequence of the popularity of blogs and blogging. It is useful where the domain is all about you. It is perfect for blogs, resumes or personal pages. It is a fun product for products aimed at younger audiences.
In addition to the ccTLDs and gTLds, there are also other popular domain name extensions that do not quite fall into either of the main categories. The best example of this is the “.ws”. This extension is the country code for the island nation of Western Samoa, hence “WS”. However, the government of Western Samoa went into a partnership with an American Firm to develop the domain into an alternative to the .com. as a result, the “.ws” domain is now widely recognized and used to denote “website”. It is also available for registration by anyone just like most of the main gTLDs. Hopefully this information has helped you answer your "what is a domain?" question. | <urn:uuid:15e7f5e6-0c79-44f5-90ce-c51d0b3f8d0f> | {
"date": "2017-12-14T21:23:58",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948550986.47/warc/CC-MAIN-20171214202730-20171214222730-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9381929039955139,
"score": 3.4375,
"token_count": 1342,
"url": "https://hubpages.com/technology/what-is-a-domain"
} |
Fracking pollutes our air and drinking water, hurts communities, worsens climate change, and is linked to earthquakes. It is unacceptable that the oil and gas industry profits off fracking at our expense. It’s time to say no to fracking, and yes to clean, renewable energy.
What Is Fracking?
Fracking, short for “hydraulic fracturing,” is a destructive process that corporations including Halliburton, BP and ExxonMobil use to extract oil and natural gas from rock formations deep underground. They drill a well and inject millions of gallons of toxic fracking fluid – a mix of water, sand and harsh fracking chemicals – at extreme enough pressure to fracture the rock and release the oil or gas.
Fracking Facts: The Dangers of Fracking
The entire fracking process — from drilling a well to dealing with the resulting toxic waste — endangers our water and the health of our communities. There is clear evidence of the growing damage caused by fracking:
- Fracking makes people sick. Some people who live near fracking sites have become seriously ill from polluted air and contaminated water. Others can light their tap on fire due to the amount of methane in their water.
- Chemicals used in fracking are toxic. Thanks to government loopholes, the oil and gas industry isn’t required to disclose the chemicals they use, but research has found that many are known endocrine disruptors and carcinogens.
- Fracking hurts communities. Communities with fracking have seen declines in property values, increases in crime, and losses in local tourism and agriculture. Pipelines, oil trains and other infrastructure to support fracking add to these harms.
- Fracking means more climate change. Methane, the primary component of natural gas, is a potent greenhouse gas driving climate change. Methane leaks from fracking industry sites, making natural gas as bad for the climate as coal and oil.
Why Should We Ban Fracking?
In the United States, drilling and fracking are exempt from the landmark environmental laws, including the Safe Drinking Water Act, thanks to loopholes Congress and regulators have carved out for oil and gas corporations – and spills and accidents are far too common. Food & Water Watch maintains that the fracking process, from constructing well sites to managing toxic fracking waste, is too risky to be regulated. Regulations can never make fracking safe. Fracking also prolongs our dangerous dependence on fossil fuels, delaying policies that will bring us truly clean, renewable energy. Claims that natural gas is a “bridge fuel” ignore the fact that it is a dangerous fossil fuel with serious climate impacts in its extraction, and relying on it does nothing to move us to renewable energy.
Corporate influence over our democracy is one of the biggest threats to our food and water, and has paved the way for more fracking. Learn more about how a handful of oil and gas companies control the public debate over energy and fracking, and discover the policies and influence peddling that have led to the growth of the fracking industry and how a growing movement is working to ban fracking in Frackopoly: The Battle for the Future of Energy and the Environment by our executive director, Wenonah Hauter.
The movement to stop fracking is strong and growing. Communities around the world are uniting around the call to ban fracking, and they’ve proven in New York, Maryland and in communities across the country that people power can win against corporations. Food & Water Watch has supported this growing movement in many ways: including with ground-breaking research and powerful grass-roots organizing in the United States and beyond, and by sponsoring the Global Frackdown. | <urn:uuid:0dfc5edf-4067-4415-8d92-ffc9c55abda5> | {
"date": "2017-02-24T10:31:01",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00152-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9439637660980225,
"score": 3.390625,
"token_count": 736,
"url": "http://www.foodandwaterwatch.org/problems/fracking"
} |
October 1st, 2013, 01:00 PM
Help a noob plz
Hi all, this is my first post on the forum!
Im really new to c-programming, wondered if someone can help me with the following....i want to design a temp controller for a sun heater that will work as follows.....measure water going into the heater and measure water temp going out of the heater, when the water going in is higher than that coming out, a pump relay should stop the water, when the temp outside is higher than the water the pump should start again.
Ill use a 18f2620, lm35 temp probe.
Id also like an lcd display to show the temp.
Any advice will be welcome
October 2nd, 2013, 11:57 AM
> Ill use a 18f2620
This is a chip
This is a devboard
Do you intend to produce your own hardware?
Given your question, I'd suggest you start with a board which already has an LCD on it, to save lots of messing about just to get the basics working.
When it comes to programming, all I can suggest is you make very small steps, and try specific functions in isolation.
- print a character on the screen.
- turn a relay on
- turn a relay off
- print 'A' if the probe temperature < x
- print 'B' if the probe temperature > y
Remember, the typical outcome of writing code on a bare machine is that it either locks up or reboots. Neither is particularly good when it comes to figuring out where you went wrong.
Getting the LCD working first gives you feedback options.
Taking small steps means you're never far away from what used to work. | <urn:uuid:b6c4d4ff-4b65-426d-9184-f385a5b5f14d> | {
"date": "2016-09-28T06:58:10",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661326.74/warc/CC-MAIN-20160924173741-00282-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9401775002479553,
"score": 2.90625,
"token_count": 363,
"url": "http://forums.devshed.com/programming/952461-help-noob-plz-last-post.html"
} |
1984 Nineteen Eighty-Four: Metaphor Analysis
Proles - The Proles represent the lowest working classes of society (the proletariat) and they also serve as a metaphor for hopelessness. Winston hopes, as did many real thinkers such as Marx, that the Proles could rise up against the Party and restore freedom for all citizens. But the history of Oceania written by Emmanuel Goldstein argues that Proles throughout history have rebelled against the state only to regenerate the same class structure and oppress new generations of Proles. Thus, the Proles in 1984represent hopelessness. While they live free and "savage" lives, they do not understand or choose not to understand, the nature of their oppression. While they far out number Party members, they remain powerless against their own ignorance.
Rats - Winston learns the meaning of Room 101 when O'Brien tortures him with rats. Room 101 represents a person's worst fear and Winston's worst fear is rats. So on one level rats represent fear. On another level, however, rats represent depravity. Throughout history, humans have associated rats with squalor and pestilence. Rats carry disease and thrive on human garbage. Rats rank among the world's most "beastlike" (as opposed to "humanlike") creatures. Winston's universe is filled with humans who act like and are treated like beasts. Outer Party members and Proles all eventually become drones-meaningless, inhuman cogs in the Party's machine. In essence, Winston and his fellow citizens become rats, trapped in Big Brother's cage. If people allow forces such as those represented by Big Brother to rule, then they will become no better than mindless, multiplying rats.
Song/Music - Orwell inserts verses of music and poetry throughout 1984. Winston hears propaganda music created by the Party and sung by a Prole and finds it oddly beautiful. He also hears a bird singing in a meadow and finds himself awake and hopeful for the first time. Songs play an important role in this book. Not only do songs foreshadow events and reveal details about the past, they represent culture. When chanted by crazed, Big Brother fanatics, propaganda music sounds to Winston like war cries. But when carelessly hummed by a Prole woman (who has no affiliation with the Party) as she works, the same music sounds sweet and uplifting to Winston. Winston longs for a time when music and culture belonged to people and nature rather than to the state.
Dreams - Winston's dreams reveal critical information about his past and foretell his future. Winston dreams about meeting O'Brien in a place "where there is no darkness" foreshadow his torture at O'Brien's hands. Winston's dreams of the Golden Country foreshadow his love affair with Julia. But dreams also represent history, and the freedom associated with history. The Thought Police can see everything except Winston's inner beliefs so Winston may go anywhere and think anything while dreaming as long as his outward behavior remains neutral. Through brainwashing and shock treatment, the Party ultimately controls Winston's dreams. Only then do they truly control Winston.
Winston's Mother - Winston often dreams about his mother. His mother and sister sacrificed themselves to save Winston. He remembers a time when war broke out and his mother protected him and gave him her food rations despite his ingratitude and selfishness. Winston's mother represents loss and human contact. As a child he did not understand or appreciate his mother's love but as an adult, Winston feels deep loneliness created by the loss of his mother and of natural human contact. Alienation and loss characterize Winston's entire existence. | <urn:uuid:749e4ddd-8766-4e50-a8fa-f01db059e980> | {
"date": "2014-03-09T10:29:59",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999677213/warc/CC-MAIN-20140305060757-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9597527384757996,
"score": 2.921875,
"token_count": 741,
"url": "http://www.novelguide.com/1984/metaphoranalysis.html"
} |
Tuesday, May 21
From CRISPR Basics to the Practical Aspects of Designing and Developing Gene Edited Animals and Cell Lines
10:00 – 13:00
Designing and developing cell lines using CRISPR method, although is a very popular method, it can be challenging for beginners as well as for experienced researchers when handling some difficult cell lines, particularly primary cells. This session aims to provide basics of CRISPR gene editing to create cell lines and provide practical insights and consideration to optimize editing in commonly-used and difficult-to-handle cell lines.
• Basics and practical considerations of designing CRISPR experiments for creating knockout/knock-in animals and cell lines
• Available tools for CRISPR KO/KI experiments
• Single cell cloning techniques and confirmation of clones
This workshop aims to help enhance editing in cell lines that are demanding to manipulate and will involve informative advice on best practices complemented by group discussions.
Associate Professor-Genetics, Director- Mouse Genome Engineering Core Facility
University of Nebraska Medical Center
How to Design and Implement a CRISPR Library for Internal Use
14:00 – 17:00
CRISPR libraries are becoming increasingly critical to help improve the efficiency of your processes, be it drug discovery, disease modelling, or target identification. There are many different approaches for designing a library and this workshop helps you evaluate which library will suit your processes best.
• Defining your exact library needs to build an effective and tailored roadmap towards implementation
• Comparative analysis on the types of libraries available to identify which one best matches your needs
• Development of easy, time- and cost-effective methods enabling large-scale screening approaches
• What should a useful computational pipeline deliver?
This workshop provides you with a 360° view on all the techniques and technologies currently being used to get the most out of CRISPR libraries. The aim is to leave this session with the information you need to ensure you can go back to the lab and set up the most up to date, efficient, accurate and reliable CRISPR library that complements and helps drive your current research to success. | <urn:uuid:367f4634-1231-4ebc-a9fc-e86d67544853> | {
"date": "2019-08-23T05:45:11",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317847.79/warc/CC-MAIN-20190823041746-20190823063746-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8948203921318054,
"score": 2.5625,
"token_count": 436,
"url": "https://crispr-congress.com/pre-conference-workshops/"
} |
In order to accurately predict the annual energy production of photovoltaic systems for any given geographical location, building orientation, and photovoltaic cell technology, models are needed that can accurately predict the response of photovoltaic systems for a wide range of environmental conditions. The Building and Fire Research Laboratory (BFRL) recently commissioned a Roof Photovoltaic Test Facility to provide the data needed to develop, improve, and validate the needed simulation models.
Specifications / Capabilities:
The facility is configured to accommodate six residential (sloped roof) and three commercial (flat roof) photovoltaic roofing products. The majority of the currently installed products are referred to as building integrated photovoltaics, as they provide both protection against the elements and produce electrical power. The electrical output of each photovoltaic product is measured every 5 seconds, with average values for these quantities being saved at five minute intervals. The characteristic current versus voltage (IV) curve is periodically swept throughout the day for each test specimen. In addition to the electrical performance of the photovoltaic roofing samples, measurements are made of the coincident ambient temperature, wind speed, and solar radiation incident upon the samples. In addition measurements of diffuse and beam solar irradiance are made by an adjacent meteorological station. The nine PV roofing products being monitored fall within three general categories of photovoltaic cell technology – single crystalline, poly crystalline, and amorphous silicon – while embodying different manufacturing processes, materials, and design features. The combination of features makes each of the nine roofing products unique and well suited to capture the robustness of simulation models used to predict their electrical performance. | <urn:uuid:6050309d-3901-4354-80d8-66e5029af21c> | {
"date": "2014-07-31T13:38:55",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273350.41/warc/CC-MAIN-20140728011753-00396-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9277294278144836,
"score": 3.046875,
"token_count": 344,
"url": "http://www.nist.gov/el/facilities_instruments/roof_photovoltaic_test_fac.cfm"
} |
CCGs and NHS England are under obligations in exercising their functions to have regard to the need to reduce health inequalities. Almost all public authorities are under obligations to have due regard to the need to reduce inequalities (including on race) under s. 149 of the Equality Act 2010.
Recently published guidance from Public Health England aims to support local and national action on ethnic inequalities in health. It provides: a summary of information and data by ethnic group in England; examples of practical approaches to address ethnic inequalities in health; and case studies of local action to address ethnic health inequalities. Interestingly no one group has
It builds on earlier guidance (September 2017) Reducing health inequalities: system, scale and sustainability and NHS England resources.
Equalities issues are frequently raised in judicial review challenges to service reconfiguration and commissioning decisions, so this guidance is a useful tool and headline synthesis of the national picture. It is important to remember, however, that there are other protected characteristics as well as race, which should also be considered.
Local action on health inequalities: understanding and reducing ethnic inequalities in health | <urn:uuid:201a1a34-412e-4d29-a01d-86ea5174d7f3> | {
"date": "2018-09-19T22:35:41",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156311.20/warc/CC-MAIN-20180919220117-20180920000117-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9542105197906494,
"score": 2.734375,
"token_count": 220,
"url": "https://blog.capsticks.com/post/102f0be/new-guidance-on-health-inequalities-and-race-published"
} |
(Photo: Penn Museum)
Did the Maya believe the world would end in December 2012? That is the question the University of Pennsylvania Museum of Archaeology and Anthropology (known as Penn Museum) in Philadelphia has taken to exploring in its newest exhibition opening in May.
The theory that the ancient Maya predicted a cataclysmic event at the end of their calendar has been gaining popularity over the recent years. According to the exhibition organizers, some believe that a celestial alignment will bring a series of devastating natural disasters. Others argue that this event will bring enlightenment and a new age of peace. Penn Museum scientists decided to address the issue, and attempt to answer the questions surrounding the mysterious calendar prophecy, especially having observed the public's increased curiosity about that ancient civilization and its knowledge regarding the end of time.
"MAYA 2012: Lords of Time," the exhibition, is set to compare the apocalypse predictions with their supposed origins in the ancient Maya civilization, says a statement released by Penn Museum. For that purpose, the museum mobilized some of its best curators, creating an interactive exhibition complete with sculptures and full-sized replicas of major monuments.
But most crucially, the exhibit aims to explain the Maya's complex calendar systems, which were based on an advanced understanding of astronomy and the night sky. Their most elaborate system, called the Long Count, encompasses trillions of years, and one of its important cycles comes to a close on Dec. 23, 2012 (Dec. 21, 2012, according to some scholars), according to the museum's statement.
"We wanted to tell the true story about the ancient Maya, their calendar, their understanding of time, and what all this 2012 stuff is about," Associate Curator of the American Section Simon Martin says in a video promoting the exhibit.
But the apocalyptic element is not everything, curators assure.
"MAYA 2012 offers visitors a rare opportunity to view spectacular examples of Classic Maya art – some of which have never before been seen outside Honduras – and delve into the Maya people's extraordinary, layered, and shifting concepts about time," Exhibition Curator Dr. Loa Traxler said in a statement. "MAYA 2012: Lords of Time uncovers a history and culture far richer and more surprising than commonly supposed." Traxler is an archaeologist, a leading Maya epigrapher, Mellon Associate Deputy Director of the Penn Museum, and co-author of The Ancient Maya.
Penn Museum, founded in 1887 and celebrating its 125th anniversary in 2012, is dedicated to the "study and understanding of human history and diversity." The Museum has sent more than 400 archaeological and anthropological expeditions to all the inhabited continents of the world, according to the museum website.
"MAYA 2012: Lords of Time" is presented in partnership with the Instituto Hondureño de Antropología e Historia of the Republic of Honduras. The exhibition will run through Jan. 13, 2013. | <urn:uuid:22441715-fe07-4d88-8a98-6fcc74f90f76> | {
"date": "2014-11-27T04:28:52",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931007797.72/warc/CC-MAIN-20141125155647-00204-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9536253213882446,
"score": 2.6875,
"token_count": 600,
"url": "http://www.christianpost.com/news/maya-2012-end-of-days-prediction-explored-in-new-exhibition-video-70874/print.html"
} |
Possibly the biggest detriment to the People's Party was the internal fighting of the party, caused by its fractured nature on several levels. First, people of a variety of ideologies made up the party. It drew its members largely from the Farmers' Alliance, but also included people from the Woman's Christian Temperance Union, the American Federation of Labor, and Christian Socialists (Kazin 28). These groups had enough in common to unite politically, but they were not totally similar. Obviously, their primary goals differed on some levels. Even before the 1892 election, the party was also split between "fusionists" and the "mid-roaders." Fusionists wanted to join with the Democrats to support a candidate who would most support their platform, but the mid-roaders wanted to avoid collaboration with major parties they viewed as corrupt and misdirected (McMath 174-5). The People's Party split between continuing to promote its core ideology, or seeking to gain an office through which it could enact
policy. In 1896, the party nominated the Democrat Bryan as its candidate,
effectively ending its existence as an independent political force. In
doing so, the People's Party suppressed much of its own ideology by
promoting the silver issue to the forefront (Taggart 35). Interestingly,
the free silver issue had not been previously considered a strong or
unique stance by the People's Party (Hofstadter 104). Both major parties
had free silverites, and the People's Party saw a need to try to unite
with these sources. In order to attempt to gain official power, the party
had to sacrifice much of its ideology. The focus of the movement shifted from creating change to winning power.
We also find that third-party movements contain inherent complexities that cause their own destruction. First, reform movements resist the mainstream system, but usually end up working within that system. Change could possibly come from outside, but the moment a group forms a new political party, it becomes part of the vehicle it resists. Either the major parties absorb the resistance effort or it is defeated by its own politicality. Referring to the populist movement at the end of the 19th Century, Hofstadter writes, "The attempt to make agrarianism into a mass movement based upon third party ideological politics also had to be supplanted by the modern methods of pressure politics and lobbying within the framework of the existing party system" (95). The tools available to fight the system were the same tools that made remaining politically independent impossible.
Furthermore, if the third party successfully advances its ideology, that ideology becomes part of the system, and the third party has no further reason for existence. In theory (and, at least in part, in reality) third parties exist for their platforms and not as machinations for gaining power. Success to a third party comes with the acceptance of its doctrine, and not necessarily through the acquistion of political office. When these doctrines are accepted, the party can go away. One scholar points out, "Third parties are like bees: once they have stung, they die" (Hofstadter 97). For this reason, minor parties have rarely (if ever) had cause for sustained existence. As the major party picked up on some populist ideology (particularly the silver issue), the People's Party could disappear without having been defeated in fact. This idea played out pragmatically after the 1896. Social movements flourished, but never coalesced into a unified political party, in large part because the people behind these movements did want the larger plans of political ascension and integration to overshadow the particular needs of the movement (Kazin 149-50). These people realized that getting their ideas put into action was more important than trying to establish a new order. Third party politicization gave way to less structural sorts of reform.
We realize, then, that we cannot measure the success of the People's Party or the Populist movement in terms of offices held or votes won. We must determine whether or not their ideology was advanced with the major parties after the movement ceased. | <urn:uuid:740ad34f-1c27-464b-b49d-a4896199090c> | {
"date": "2014-11-23T11:02:06",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379462.60/warc/CC-MAIN-20141119123259-00044-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9772990345954895,
"score": 3.453125,
"token_count": 832,
"url": "http://xroads.virginia.edu/~HYPER/INCORP/party/internal.html"
} |
Think about Arabia, and normally an image of deserts, endless sand dunes and camels comes to mind, not verdant green pasture, rivers, lakes and herds of grazing animals. Yet at various periods during the last few hundred thousand years, this is exactly what Arabia has looked like. Changes in global climate have periodically transformed Arabia from an arid desert into a more welcoming savannah landscape, replete with wildlife. Understanding when these wet periods occurred is critical for understanding human evolution. This is because Arabia lay at a bottleneck for early humans migrating out of Africa into Asia. Too dry and early humans would have faced an impenetrable desert barrier. This has sparked a considerable amount of scientific debate as to how early humans crossed out of Africa into Eurasia.
|The Al Sibetah quarry near Al Ain, a 42 m section in|
stratified alluvial fan sediments spanning160,000 years.
Professor Adrian Parker and Dr Ash Parton (upper
figure) for scale. Photo (c) A R Farrant.
Research just published by the British Geological Survey and Oxford Brookes University (Parton et al., 2015; Geology) has suggested that the latter scenario is most likely. By analysing river sediments near Al Ain in the United Arab Emirates, we unearthed a unique and sensitive record of landscape change in southeast Arabia spanning the past 160,000 years which provides evidence for several wet climatic interludes during both glacial and interglacial periods. These periodic wet phases allowed humans to migrate across the interior of Arabia several times during the past 160,000 years.
So how did we come to work on the climate of Arabia? The story began in 2002, when BGS was contracted by the UAE Ministry of Energy to undertake a comprehensive geological mapping project, covering the whole country. This included mapping the extensive alluvial fans emanating out from the Hajar Mountains and the dune sands of the Rub al Khali desert, popularly known as the ‘Empty Quarter’. During the mapping work, it soon became apparent that these Quaternary sediments were far more interesting than most people realise. Our mapping identified numerous quarries between Dubai and Al Ain which exposed thick alluvial fan and dune sediments. As alluvial fan systems only form during wet climatic periods, whilst dune sands accumulate during arid phases, these interbedded fan and dune sands had the potential to record a detailed palaeoclimate record spanning the last few hundred thousand years.
|Working in the 'empty quarter'|
So, in 2008, we were back mapping in the UAE. Logging the sections was not easy. Fieldwork in the UAE sounds glamorous, but the reality was working in a sun-scorched, smelly pit, strewn with rubbish and camel excrement with only flies for company and temperatures approaching 40°C. However, the hard work, dust and sweat paid off. Through painstaking sedimentological, geochemical and isotopic analyses, the latter with the help of Professor Melanie Leng of the NERC Isotope Geosciences Laboratory here at BGS, Ash constructed a detailed record of climatic and environmental change for this part of Arabia. Dating of the sediments was done by Dr Matt Telfer using a dating technique known as optically stimulated luminescence (OSL) dating.
showing location and photo of the study site (Sibetah) and extent of relict |
alluvial fan system in SE Arabia. Jebel Faya and other study sites are shown.
Our findings, published in the journal Geology have shown that wet climatic periods in Arabia were not driven by global ice volume changes during interglacial conditions every ~100,000 years. Instead the quarries at Al Ain demonstrate that the vast alluvial fans along the western Hajar and Oman Mountains became active approximately every 23,000 years since at least ~160,000 years ago. These wet periods were triggered by periodic northward shifts in the position and strength of the Indian Ocean Monsoon, driven by subtle changes in the Earth’s orbit every ~23,000 years. During these times the vast Arabian deserts were transformed into landscapes littered with freshwater lakes and active river systems, providing ample opportunities for humans to disperse across the region en route to the rest of Eurasia.
Moreover, this is but one of the academic spinoffs from the UAE geological mapping project. Dating of the desert sand across the UAE have clarified the timing of dune formation, stabilisation and links to past climate, whilst mineralogical analysis of the sand has yielded insights into the provenance and formation of the dune systems. BGS colleagues have also been busy studying the evolution of the UAE-Oman ophiolite complex, exquisitely exposed in the Hajar Mountains, and understanding salt dome evolution in the Arabian Gulf.
In short, geological mapping not only underpins the economic well-being of a country, but can also deliver some fantastic science.
|Working in the 'empty quarter'|
A. Parton, A. R. Farrant, M. J. Leng, M. W. Telfer, H. S. Groucutt, M. D. Petraglia, A. G. Parker. Alluvial fan records from southeast Arabia reveal multiple windows for human dispersal. Geology, 2015; DOI: 10.1130/G36401.1
Thanks to all the members of the BGS UAE mapping team, in particular Richard Ellison and Mike Styles, and to the UAE Ministry of Energy for funding the mapping in the first place.
Dr Andrew Farrant is a Principal Geologist at the British Geological Survey and led the geological mapping element of the UAE project from 2006-2012. He mapped the area around Al Ain including the Al Sibetah quarry. He continues to research climate change in Arabia.
Dr Ash Parton did his PhD research in the UAE whilst at Oxford Brookes University, part funded by the British Geological Survey. He is currently a member of the Palaeodeserts Project at the University of Oxford, which is seeking to better understand the relationship between environmental change in Arabia and the demography of early human populations. | <urn:uuid:19c3bb13-f4bd-4de1-b6bd-87e84c9f34f8> | {
"date": "2017-03-27T16:33:21",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189490.1/warc/CC-MAIN-20170322212949-00486-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.940602719783783,
"score": 4.0625,
"token_count": 1286,
"url": "http://britgeopeople.blogspot.co.uk/2015_02_01_archive.html"
} |
Chats Falls (in French: Chute des Chats, meaning "Cat Falls") were a set of waterfalls on the Ottawa River, near Fitzroy Harbour, Ontario, and Quyon, Quebec, Canada. A hydroelectric generating station is now located here, owned and operated jointly by Hydro-Québec and Ontario Power Generation. It lies within the cities of Ottawa and Pontiac, Quebec.
Prior to the construction of the dam and power generating station, the Chats Falls was a waterfall with a 10.7 meter (35 feet) drop in the river, and consisted of a series of chutes running from what is now the eastern end of the dam all the way to the western-most corner of Pontiac Bay. In their natural state the Chats Falls were quite a tourist attraction. In the years leading up to World War One it was fairly common to see large steam boats (paddle wheelers) heading up river with their decks full of sightseers.
Today, catfish lovers flock year-round to Lac des Chats (Lake of Cats), one of the best catfish holes in the Ottawa Valley, to fish for this perennial favourite.
The horse railway
In 1847, the Union Rail Road was established at Chats Falls. Passengers were treated to a horse-drawn railroad trip of 5.0 km (3.0 mi) through the dense forest skirting the rough waters. While the roof sheltered passengers from rain and sun, the sides were open to mosquitoes, which brought complaints from many of the river travelers.
In 1853, James Poole, editor of The Carleton Place Herald, wrote about the Chats Falls horse railway:
Construction on a run-of-river generating station and dam began in 1929 and was completed in 1932, destroying the falls and creating Lac des Chats reservoir behind the dam. The powerhouse is in the middle of the Ottawa River on the Ontario/Quebec border.
On March 2, 1953, a fire started in the morning, burning for 7 hours and destroying 2 generators and the building's roof. The station went completely down when the cables got damaged. Two of the eight generating units were brought back into operation the following day and another four units being brought on-line the following week. In all, $2 million of damage was done.
The power station has 8 turbines (4 managed by Ontario Power Generation and 4 managed by Hydro-Québec) with a head of 16.16 meter (53 feet), generating a total of 79 MW. | <urn:uuid:274dc83d-19e2-4570-8dcd-fc4d5512391a> | {
"date": "2016-10-26T06:09:50",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00201-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9672884941101074,
"score": 2.921875,
"token_count": 518,
"url": "http://openbuildings.com/buildings/chats-falls-profile-17668"
} |
CLASS TRAVELS TO U.S.-MEXICO BORDER WALL
Justice Journey illuminates Chicano culture in Texas in conjunction with the Latino/a Civil Rights Struggles course.
Originally published by TCU Magazine at https://magazine.tcu.edu/summer-2017/class-travels-to-u-s-mexico-border-wall/
Approaching the border wall — the one that already exists between the U.S. and Mexico — was an unforgettable experience for Alyssa Clark ’17.
“When you think about the border wall, it’s very symbolic to immigration,” said Clark, who earned a degree in political science in May. “Then you see it and for [immigrants], it’s concrete.”
Clark and 18 classmates visited the helicopter-patrolled border area near McAllen, Texas, as part of the TCU Justice Journey in March.
The wall wasn’t what Clark was expecting. Parts of it are made of wood or metal posts. In other areas, there are vast stretches of land with no wall at all.
“The concept we were struggling with [on the trip] was that borders are man-made,” Clark said, “and there is no reason for this wall to exist because the land across is the same as the land here.”
Bus Trip’s Origins
The Justice Journey bus trip during spring break took place in conjunction with the Latino/a Civil Rights Struggles course. Emily Farris, assistant professor of political science, and Max Krochmal, assistant professor of history, taught the course, which was modeled on examinations of the African-American civil rights movement.
For the spring semester, Farris and Krochmal focused on the Chicano movement of the 1960s, which sought to empower and achieve institutional equality for Mexican-Americans.
In discussing immigration law and delving into what it means to be a Chicano, the professors and students traveled to important locations in Chicano history in Texas, including Austin, San Antonio and the Rio Grande Valley.
The bus trip, Krochmal said, was “a chance for students to see normal people at the very bottom of our economy who have been able to come together and improve their situation and advocate for themselves.”
“Our mission as an institution is about preparing students to be active citizens and ethical leaders in a global community,” he said. “To do that, we have to expose students to a range of experiences and we have to help them think about differences and how certain communities have access to resources that others don’t.”
Students and Allies
Clark said she was excited about exploring her Latina heritage. “I wanted to learn about the history my [high] school didn’t teach me.”
Samuel Ramirez ’17, took the civil rights bus tour in 2016. He said he wanted to take the Chicano course because it pertained to his ethnic background.
“Growing up in Texas, I didn’t really get that side of history,” Ramirez said. “I didn’t really get a lot of insight on how people like me were able to advance in the U.S.”
But not all of the students on the Justice Journey identify themselves as Chicano or Latino.
Mackenzie Holst ‘17, who went on the trip, said more white people should fight for racial equality alongside people of color.
“I’m always striving to be a better ally, and that means more than just writing ‘Black Lives Matter’ on Facebook statuses,” Holst said. “Going on this trip actually gave me historical and cultural context for what we’re fighting for.”
Ramirez said people of all ethnic backgrounds should learn about cultures different from their own and the Justice Journey is important for more than the 12.1 percent of TCU students who identify as Hispanic or Latino. “It’s good for other people to take [the course] and become allies. It creates that unity between cultures.”
A Week to Remember
During the weeklong trip, students were immersed in Chicano culture through discussion panels with activists such as Rosie Castro, one of the first Chicanas to seek elected office in Texas. The students’ itinerary included tours of historical sites such as Mission Concepción in San Antonio, where Franciscan friars converted Native Americans to Catholicism.
At the border wall, students listened to undocumented immigrants tell stories about living in the United States. Some, whose parents brought them to the U.S. at a young age, “don’t know what life is like in Mexico,” Clark said. “They only know America. They told us how they are every bit as American as you and me except for they don’t have that paper. I learned that they are people, not a number.”
The students also visited two public murals in McAllen painted by local artists to depict the Chicano community and culture. Holst said she was moved by the contrast between the artwork and the imposing border wall.
“There are walls that divide us and walls that bring us together. It just depends how we use them,” she said. “You look at the [border] wall and it’s hateful, and then you drive just down the road and you see signs of love and community.”
In the wake of crackdowns in the U.S., Farris said, immigration and Chicano history were timely topics for class discussion. “Thinking about the issue of immigration, immigration rights and how Latinos have approached the question of immigration over time has helped inform students in thinking about how to approach this moment in time.”
In studying Latino voting power, students in the course registered Latino youth in Fort Worth to vote. Holst said the students registered more than 250 people overall.
Clark’s group registered about 50 people during visits to two high schools and a community center. “I really want to see that I can make an impact on Latino youth,” she said. “I really want to be that change. I hope that I can see that I’m doing something for the community.”
Ramirez said the national debate over immigration helped bring Latino issues to the forefront for him.
“This whole political climate is giving us a chance to speak up,” he said. “We grew up being proud of our culture and knowing that we are important, and it’s time to put that into action. This is the time. There is no other time to do it.”
Photos courtesy of Moisés Acuña-Gurrola | <urn:uuid:e53134c3-b416-42ff-a8d8-54e322c8163d> | {
"date": "2017-12-15T06:20:03",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948567042.50/warc/CC-MAIN-20171215060102-20171215080102-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9683689475059509,
"score": 2.796875,
"token_count": 1434,
"url": "https://professormax.org/2017/08/17/tcu-justice-journey-featured-in-tcu-magazine/"
} |
In BriefWith only a few months to go before the water levels in the city's major dams fall dangerously low, plunging Cape Town into crisis mode, entrepreneurs and visionaries look for solutions to produce, save, or recycle water.
In just over 100 days, researchers expect Cape Town to run out of water. The South African megacity has traditionally enjoyed abundant rains during winter and a warm, pleasant climate during summer, but after three years of drought, experts now expect the city’s water system to collapse on June 4, 2018.
Currently, Cape Town’s citizens have access to 13.2 gallons of water per day, about a quarter of what the average American uses daily and equivalent to little more than a six-minute shower. Experts predict water levels in the six dams that feed the city will fall below 13.5 percent of their capacity on June 4, effectively leaving the city dry. On that “Day Zero,” nearly four million residents could see their water rationed to 6.6 gallons per day per person.
As time runs out for Cape Town, the brightest minds in Africa and beyond are scrambling for last-ditch solutions to stave off the crisis. Here are some of the most ambitious ideas that may buy time while the city sets up desalination plants and hopes for rain.
Proposed solution: Drag an iceberg down to Western Cape
What is it? As wild as it sounds, computer simulations have shown we could transport a mammoth clump of ice thousands of miles while retaining more than half its mass during the journey. A 2009 study by French software firm Dassault Systemes showed that it is possible to tow an iceberg with a weight of seven metric tons from the Canary Islands to the northwest coast of Africa in under five months and with a loss of only 38 percent of its mass.
With a budget of approximately $10 million, engineers could fit the iceberg with an insulating skirt to reduce melting and then tether it to a boat traveling at a speed of about one knot (1.1 miles per hour).
How will it help? After docking, the water would have to be distributed across the city, which would presumably add to the staggering costs of the operation. However, with Day Zero looming, the investment may be worth it. The Abu Dhabi-based National Adviser Bureau told Gulf News that the average iceberg could provide up to 20 billion gallons of fresh water. The Daily Maverick did the math: If such a wild idea were to come true, it could solve Cape Town’s water crisis for almost half a year.
Proposed solution: I-Drop Water
What is it? Launched in 2015, this South African nonprofit distributes water purification systems to shops and grocery stores as a way to reach the most people while keeping water affordable. The filters remove viruses, bacteria, and sediments from the water, and a central station monitors the distribution units through an embedded SIM card, so shopkeepers pay for each gallon of dirty water they purify and sell.
How will it help? In the wake of the Cape Town crisis, Swedish group Bluewater, which also produces water purifiers, teamed up with I-Drop to distribute more systems across southern Africa. The goal is to keep the price of water lower compared to single-use bottles, while also tackling the growing problem of plastic pollution in the continent’s main urban centers. When Day Zero hits Cape Town and people are left with less than seven gallons a day, recycled dirty water could provide a life-saving top up.
Proposed solution: Greenchain Engineering
What is it? The South African startup targets the entire water supply chain, providing rain harvesting systems as well as improving the management of gray water, which is not drinkable but can be used to wash dishes, run a washing machine, or take a shower. Although a lack of rain is currently Cape Town’s main problem, citizens could harvest rain from short showers from their roofs. The system filters and distributes water collected this way.
How will it help? The startup has started a conversation with the Cape Town municipality to roll out their services on a large scale. While equipping every roof with a water harvesting system may not stop Day Zero from arriving, it could help the city manage the limited resources left and potentially prevent future crises once the rain comes back.
Proposed solution: Fog catchers
What is it? They come in various forms, from a simple square sail stretched between two poles to a complex tent-like structure, but their goal is the same: capture every droplet of moisture in the air and turn it into drinkable water.
The intricate fabric of a fog catcher traps condensation, be it from post-rain humidity or morning mist, and channels it into a container. The devices are designed to meet the needs of remote communities that have to rely on erratic rains for their daily water supply, and they’ve proven so popular people now use them everywhere in the world, from South America to Africa.
How will it help? Innovator Grant Vanderwagen is piloting a simple version of fog catchers in Cape Town. Although the idea is still little more than a proof of concept, the entrepreneur told VentureBurn that a single unit could produce up to 10,000 liters (2,200 gallons) of water per month, depending on the weather.
Proposed solution: #defeatdayzero
What is it? While the H2O (Hack Two Day Zero) hackathon held in Cape Town on February 9 and 10 was not a solution in itself, the array of fresh ideas generated could help the city get through the crisis.
How will it help? The participants had two days to work together and come up with a prototype that addresses short and long term implications of severe drought. The winning team created Tiny Loop, a battery-operated shower to prolong showers while using less water. They now have a cash prize to use to bring their project to life, and it could help citizens maintain proper hygiene during the crisis. | <urn:uuid:0efc9d36-2f02-437c-8870-11a47cdee04c> | {
"date": "2018-11-21T17:38:06",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039749562.99/warc/CC-MAIN-20181121173523-20181121195523-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9576252698898315,
"score": 3.328125,
"token_count": 1234,
"url": "http://futurism.in/2018/02/19/cape-town-day-zero-ideas/"
} |
The significance to the number 1851 is that the Constitution of the State of Michigan was amended by popular vote in November of 1850 to say, "the State shall not subscribe to or be interested in the stock of any company, association, or corporation," and also "the State shall not be a party to or interested in any work of internal improvement, nor engaged in carrying on any such work, except in the expenditure of grants to the State of land or other property." The new constitution banned state aid to railroads and canals. No longer would Michigan rely on state government to build its internal improvements. Voters decided to turn private entrepreneurs loose to build all future railroads and industries--from lumber to cars to cornflakes. This society honors those who believe, as did Michigan voters in 1850, that the government which governs least governs best. The amendment was ratified and put into law in 1851, hence the name, 1851 Society. | <urn:uuid:2e098d51-a2f7-46d8-980a-c6d19998749b> | {
"date": "2016-12-08T06:05:34",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542414.34/warc/CC-MAIN-20161202170902-00336-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9698242545127869,
"score": 2.953125,
"token_count": 189,
"url": "https://www.mackinac.org/5523"
} |
There are two big ice sheet regions, Antarctica and Greenland. Antarctica is split in two with East and West and we can ignore East Antarctica which is so high and cold it is not melting yet. This leaves West Antarctica which has enough ice to raise sea levels 4.8 meters and Greenland which has enough ice to raise 7.5 meters, they are both completely different and both of them have melted completely in the distant past.
The problem in forecasting a sudden collapse is working out the mechanism of how it happens and then putting a timescale to it. There are precedents in the recent past when sea level rose at 10 mm a year compared with the current 3.6mm a year. At 10mm a year or 100 mm every ten years or one meter in 100 years we could see some serious consequences with inundation of major cities and infrastructure but a sudden ice sheet collapse could bring this foreword in an irregular timescale. | <urn:uuid:c764ff99-9457-46f6-b9a2-801a9b667e24> | {
"date": "2019-09-19T19:39:51",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573570.6/warc/CC-MAIN-20190919183843-20190919205843-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.95998215675354,
"score": 3.515625,
"token_count": 187,
"url": "http://www.climateoutcome.kiwi.nz/latest-posts--news/archives/09-2014"
} |
Little kids love bad words. They love good words, too. They love all words. If you curse a blue streak in front of your children, chances are they'll soon be resorting to colorful language to express themselves, too. You'll need to examine your values and priorities and decide for yourself whether this is acceptable or out of bounds.
Swearing Versus Verbal Abuse
First of all, it's important to distinguish between simple swearing and verbal abuse. If your child spills her milk at breakfast and drops an "f-bomb," that's simple swearing. If she gets angry at you and exclaims, "F--- you, Mommy!" that's verbal abuse. The latter is quite a bit more serious. "Parents need to establish a zero tolerance policy for verbal abuse in the home," says author and behavioral therapist James Lehman, adding, "It is damaging, not just obnoxious."
Children Are Mimics
Young children are rapidly absorbing all the vocabulary they can -- it's their job, and it's developmentally appropriate for them to mimic everyone around them, especially adult caretakers. So if you swear in front of the kids, it's a good bet that they'll pick up that word and use it, possibly in front of Grandma or the director of your preschool.
Usage Versus Understanding
Just because your child uses profanity in a sentence, however, doesn't mean that he really understands what it means. Your child might simply notice that the word gets an unusual reaction and start using it more. This is similar to "potty talk," another completely normal developmental stage that just happens to coincide with when many kids learn to swear. Kids know that potty talk is shocking, and they love to explore that reaction by using potty words whenever and wherever possible. Same with swearing. This is how they learn boundaries -- by testing them.
A major issue to consider with children and profanity is the stigma attached to it. Parents won't want to bring their kids over for play dates. Schools may mark your child down as a troublemaker. Church might send her home. You might find profanity to be just a little naughty, but some words -- especially sexual terms and religious terms -- can be quite offensive to others. If you're trying to teach your child to be respectful and considerate of others, swearing might get in the way.
Maybe it's time to start the ever-popular "curse jar." Parents should toss a quarter into the jar any time someone in the house swears -- kid or adult. Teach your child to correct you when you swear by saying "Mommy, that's not a nice word" or something similar; then, pull out your wallet. Or simply explain to your child when you consider it appropriate to swear and when you don't. For example, alone with parents is OK but not when there are guests and never outside the house. You might be surprised at how fast your child picks up these distinctions -- and, with luck, adopts them without a fuss. | <urn:uuid:7128b07e-c518-45e1-b22a-d01ddebb23bb> | {
"date": "2019-09-15T16:42:09",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571651.9/warc/CC-MAIN-20190915155225-20190915181225-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9628353714942932,
"score": 2.578125,
"token_count": 615,
"url": "https://living.thebump.com/happens-parents-use-profanity-around-kids-15321.html"
} |
The Danube Delta can now be explored virtually on Google Maps
Posted on 23 November 2018
Over 1,500 kilometers of channels and roads are covered.
The Danube Delta is now available on Street View in Google Maps and can be explored by anyone in the world who has an internet connection. The Delta is present with all its beauty, from waterways to lakes and channels covered by vegetation, birds and flora, local architecture, and villages surrounded by water. In total, over 1,500 kilometers of channels and roads are covered.
Explorers can virtually enjoy pelicans taking their flight from the Trofilca channel, that winds through a flooded forest, marshes and lakes. Later on, they can row along the Șontea channel, among the wild vines, and beneath the willows hanging over the Rădăcinos channel, creating a spectacular vegetation tunnel.
A few clicks later the landscape changes: a lake with water lilies, snakes, egrets and pelicans. Bird lovers can see cormorants feeding on Lake Puiu or they can jump straight to Laguna Sacalin. On land, they can explore the traditional architecture of the Delta in Letea or walk through the narrow streets of Mila 23.
The image capturing project took place during June 2018. It was carried out by the WWF-Romania team who traveled along two of the main branches of the Danube River in the Delta. In order to reach as many places as possible, the Google Trekker was carried in every way imaginable and now people all around the world can enjoy not only street view and boat view, but also horse view. The WWF team traveled most of the Delta tourist routes, Mila 23, Sulina, Letea.
"The Danube Delta is a biodiversity hotspot, shelters hundreds of bird species, alongside prehistoric fish - such as sturgeons - and various plants. In addition, hundreds of years old traditions are preserved here,” says Camelia Ionescu, WWF-Romania National Freshwater Coordinator.
“You can meet craftsmen who make wooden boats or reed roofs, fishermen who know how to prepare the famous storceag fish soup. But if we lose nature, wild species, we also lose these traditions. And the first step to protect them both is to step onto a virtual boat, no matter where we are on the globe, and row, click after click, along the channels of the Delta. Once we feel closer, even if navigating online on Google Maps, it becomes more natural for us to get involved and protect the Delta."
"Three years ago, the Danube became a virtual waterway, after Street View images were published by Google Maps. Anyone could go on a virtual cruise on the Danube, from Bratislava to Cernavoda. From now on, everyone can also explore the Danube Delta,” explained Elisabeta Moraru, Country Business Development Manager Google Romania.
“This digitization project was possible thanks to our partner WWF-Romania, who traveled the Delta routes and photographed the places with the help of Google technology stored in the Trekker, the device we use in places inaccessible by car or tricycle. We want more and more people to discover the uniqueness of the Danube Delta, its beauty and its fragility, to realize that the protection of such a place depends on the efforts of each of us." Danube Delta: click to visit it, click again to protect it
The Danube Delta, an internationally protected UNESCO site, shelters over 5000 species of animals and plants, over 300 species of birds, most of them strictly protected, the largest pelican colony and Europe's largest compact reed area.
The Delta is also known for the underwater dinosaurs - sturgeon, the largest freshwater fish in the world. But decades of abuse, unsustainable exploitation of resources, has made the populations of freshwater species to be the most affected among all vertebrates, the decline being in this case 81%, more than double compared to land and sea species.
In addition, the legislation that protects Europe's waters, the Water Framework Directive, is now in peril. Having failed to put an end to the destruction that affects wetlands, lakes, rivers and groundwater - from infrastructure projects, to desiccations and agriculture that pollutes or uses too much water - the governments of the EU member states want to weaken the legislation. Fortunately, it’s now just as simple to explore, as it is to protect the Danube Delta - in a few clicks you can write to the European Commission on livingrivers.eu Retrieving Street View images from the Danube Delta was possible with the support of the Danube Delta Biosphere Reserve Administration. | <urn:uuid:2ea54e9d-af58-41af-9ac0-f9b0ca157439> | {
"date": "2019-02-16T17:38:47",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480905.29/warc/CC-MAIN-20190216170210-20190216192210-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9367285370826721,
"score": 2.640625,
"token_count": 970,
"url": "http://wwf.panda.org/wwf_offices/romania/?uNewsID=338992"
} |
Maryland Court of Appeals
The Court of Appeals, the highest court in the State of Maryland, was created by the Maryland Constitution of 1776. Its origins go back to 1694 when royal governor Francis Nicholson first established the Court of Appeals, our state's “supreme court.” Technically, the name of the court is the Court of Appeals of Maryland, but it is typically referred to as the Maryland Court of Appeals.
The court hears cases almost exclusively by way of certiorari, a discretionary review process. In other words, it only considers cases that it believes have issues are worth addressing. If the court does not believe there is an issue that needs to be given further consideration or analysis, it will deny certiorari and refuse to hear the case. A petition for writ of certiorari filed in the Maryland Court of Appeals seeking the court to overrule a decision of the Court of Special Appeals must be submitted no later than 15 days from the date of the order of the Court of Special Appeals.
Another important function of the Maryland Court of Appeals is that the court may adopt rules of judicial administration, practice, and procedure that have the force of law. The most notable example of this is Maryland Rules which sets forth the rules of practice and procedure for Maryland state courts.
The Maryland Court of Appeals also has the obligation to supervise the exercise of the disciplinary and reinstatement powers of the local courts, as the court of appeals has original and complete jurisdiction over attorney discipline matters.4 A court has a duty to insist upon the maintenance of the integrity of the Bar and to prevent the transgressions of an individual lawyer from bringing its image into disrepute.
There are currently six active Court of Appeals judges on what is a seven-judge panel. They are:
- Chief Judge Mary Ellen Barbera
- Judge Sally D. Adkins
- Judge Robert N. McDonald
- Judge Michele D. Hotten
- Judge Clayton Greene, Jr.
- Judge Shirley M. Watts
Judge Lynne A. Battaglia is now retiring, leaving five candidates competing for her spot. The are:
- Hon. Kathryn Grill Graeff from the Maryland Court of Special Appeals;
- Thomas Edward Lynch, III, a partner at Miles & Stockbridge;
- Andrew David Levy, a partner at Brown Goldstein Levy;
- Joseph Michael Getty, a former State Senator with deep Republican party ties; and
- Hon. Donald E. Beachley a Washington County Circuit Court judge.
In the past, there has been a struggle getting opinions back from the court. New Chief Judge Mary Ellen Barbera has done a fantastic job of turning that around and getting opinions decided in a reasonable time frame. | <urn:uuid:e30eecf9-6889-4454-8f0a-1bf11f502c4e> | {
"date": "2016-12-03T17:41:46",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541066.79/warc/CC-MAIN-20161202170901-00424-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9472675919532776,
"score": 2.734375,
"token_count": 555,
"url": "https://www.millerandzois.com/maryland-court-appeals.html"
} |
Anatomy & Physiology Lab 10: Biomechanics - Durable
This is a station activity that has students explore a variety of biomechanical characteristics of their own bodies. At Station A students will determine their rate of speed and acceleration. At Station B students will determine the range of motion of the elbow and knee joints. At Station C students will measure the amount of force generated by the triceps, biceps, quadriceps, and hamstrings. At Station D students will perform the Forestry Step Test to examine the link between muscle use and the increase in oxygen consumption by the body. Finally, at Station E students will determine the cadence, velocity, and stride length of their gait.
Items included in this Durable Lab are listed below.
Tape Measures, Goniometers, Spring Scales, Lanyards.
We Also Recommend | <urn:uuid:6ffe5f11-595b-42df-9e7d-04b2ad43bc95> | {
"date": "2018-10-19T15:11:02",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512411.13/warc/CC-MAIN-20181019145850-20181019171350-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.930011510848999,
"score": 3.234375,
"token_count": 177,
"url": "https://www.orderhaspi.com/products/copy-of-anatomy-physiology-lab-10-biomechanics"
} |
He was part of the great movement for reform in the 15th-century French church. His approach was to reform the recruitment and education of the clergy, along very ascetic lines, heavily influenced by the hermit saint Francis of Paola. To this end he founded many colleges, all of them strictly controlled and dedicated to poor students with real vocations. Chief amongst them was the Collège de Montaigu, latterly part of the University of Paris. He lived at a time when this model of reform was under increasing pressure from more thoroughgoing critiques—including that of one of his most famous students, Erasmus.
He was born in Mechelen (at that time part of the Burgundian Netherlands) into extremely humble circumstances, the son of a poor cobbler. He received his early education there but quickly transferred to Gouda, where the Brothers of the Common Life ran a famous school along monastic lines. Here Jan developed his preference for a mystical, as opposed to an intellectual, approach to religion, together with a determinedly ascetic approach to religious life. The education he received from the Brothers was a traditional Medieval one, including Grammar and Logic, conducted during long days, interrupted by religious devotions, and accompanied by frugal meals, cold beds and many punishments. However, the ancient writers were not neglected—Virgil, Ovid, Horace, Cicero and Cato were much studied with a view to producing a good Latin style and many moral messages. But he was warned against the views of these pagan authors, to counterbalance which he studied the Bible and the Church Fathers. In particular, he studied the Devotio Moderna; a mystical approach based on Thomas a Kempis's Imitation of Christ—in particular, imitation of his sufferings. Jan paid for his studies, as many poor boys did, by serving in the kitchen, or attending to richer students, and performing menial tasks, such as ringing the bell. According to the anonymous monk who was his first biographer (1519), he could not afford candles, so he read, after a hard day, high up in the bell tower by the light of the moon. He never managed to develop a good Latin style—it was apparently always rough and full of mistakes—and he knew nothing of the Greek that was kindling the enthusiasm of so many of his contemporaries, but he never lost his love of the severe religious life learned at Gouda.
On 22 November 1469 he enrolled at Leuven University but seems to have moved on to Paris very soon afterwards. Here he again performed menial services—this time for the monks of Sainte Genevieve—in return for his education. He got his degree in 1475. He was immediately asked to become Regent—that is, student-master—in the Collège de Montaigu, where he also began his (more advanced) studies in Theology. Soon afterwards, he visited a renowned Italian hermit who had been invited to France by the King, Charles VIII. This was St Francis of Paola, who had given up all possessions, (he had walked to France from Italy), including the personal use of money, and subjected himself to severe privations in terms of food, clothing, cleanliness, heat and bedding. Jan was tremendously struck by Francis's air of saintliness.
Collège de Montaigu
On 30 May 1483, he became Master of the Collège de Montaigu, a home for poor students from far away. The College had been founded in 1314 by Giles Aycelin, in Normandy, France—who was the Archbishop of Rouen from 1311 to 1319). Later that year, he was also made the librarian for the Sorbonne, the famous Theology Faculty of the University of Paris.
The College was in great disrepair when Jan Standonck took over—some of the walls were falling down. It had become known as the Collège de Montaigu, after the Archbishop's brother, and Jan was to make it famous. He imposed a very severe regime on the students. They could leave only with his permission and had to return before nightfall—he took the key from the porter every night. They wore only a single cloth gown and were given only a piece of bread each day to eat. They had to go to the door of a nearby monastery at eleven o'clock each morning to receive a hand-out of food. They were punished for the slightest fault, and were encouraged—out of pure charity—to inform of any misdemeanours, and to criticise each other's conduct. Erasmus, one of the students, later said he did not think anyone could forget—or even survive unscathed—their time at the College.
On 16 December 1485, Standonck was elected Rector of the University. The students rose up in violent protest, such was his reputation for severity and strictness. (On 10 April 1490 he made a formal complaint to the authorities that students were not attending his lectures).
Reform of the clergy
In 1490 he received his Doctorate in Theology, though he never made any original contribution to Theology. He just was not interested in this abstract speculation. Indeed, in the disputations that he is recorded as having carried out, with other University Doctors, he always comes off second best. He was more interested in the practical means of salvation—in his terms, a return to poverty and complete self-denial—and these he preached, in a Flemish accent, but in powerful French. He followed the rule of Francis of Paola very strictly and preached that all priests and monks should do so too. By 1493, there were 80 students at the College. They only left when they went to a monastery or to become a parish priest. Standonck hoped by this means to reform the church. In the same year, the King had set up a Commission to examine abuses in the church and he was asked to give a lecture to them, which he did on 12 November at Tours. In this he set out a long list of demands. Most of these were familiar to church reformers—only fit and proper persons should be priests, there should be no money charged for their services, or for accepting a post. There should be free election (by fit and proper priests) of their bishops, or monks of their abbots, and all other religious positions (including teachers at the University). He added demands that the priests and monks should lead exemplary lives. This meant his by now well known strictly ascetic life—including enforcing celibacy among the clergy.
Meanwhile, his reputation for saintliness was growing. He was made a Canon of Beauvais on 11 November 1493. In the following year, he asked the monks of Chartreux to oversee the spiritual welfare of his college, which he had set on a firmer footing, with regular rules, approved by the Chapter of Notre Dame Cathedral. The Admiral of France, Louis Malet de Graville gave him a property which brought in 120 livres a year, which he used for the College. The Admiral also paid for a new building. He got another gift to the same value the following year from Jean de Rochechouart, which he dedicated to the college. When he preached at St Georges at Abbéville during Lent in 1496, the only payment he asked for was some black and grey cloth to clothe his students.
In 1498, king Manuel I of Portugal complained officially to France for the sale of Portuguese merchandise taken by French corsairs via Admiral Graville. To appease the king, Standonck offered two scholarships for worthy Portuguese students in the college. The king accepted, becoming a benefactor of Collège de Montaigu, sending Diogo de Gouveia to study there in 1499.
His message of a reformed clergy was in great demand (though interestingly, he had to call for armed help from the Admiral's men to evict an Augustinian friar from the pulpit at Abbéville). Later that year he tried to bring a heretic to see the error of his ways. Jean Langlois was a priest who had travelled widely—in Spain, Provence, Italy and Bohemia where he had picked up some dangerous ideas. On 3 June 1496 he pushed the priest serving Mass at Notre Dame Cathedral and scattered the Hosts from the chalice before stamping all over them and declaring the idea of the real presence of Christ in them to be a superstition. He was also a brother of one of Standonck's students, so Jan visited him in prison to try to get him to repent, which he did. However, when he learned he was to be handed over to the civil authorities—to be put to death—he retracted his repentance. He was ceremoniously stripped of his priesthood in front of Notre Dame, and the public executioner chopped off the hand that had offensively touched the sacred chalice. He was then put backwards on a donkey and led to the pig market to be burned. Standonck followed him all the way, preaching and imploring him to repent until he was so exhausted he could not speak. Langlois repented just as he was being burned. Standonck declared that from henceforth he would maintain a strict Lenten fast.
The demands for his services were so much that he had to go for help to the Brothers of the Common Life of Windesheim in the Netherlands, who agreed to send him six priests, led by Jean de Bruxelles, and including an interpreter. These, along with Montaigu graduates, he sent to monasteries and bishops who asked for help in reforming their priests. They would work by setting an example of a strict ascetic life of prayer and devotion. Many monks began to suspect some order of take-over. Still others began resenting the suggestion they did not know how to live a holy life, while still others felt that Standonck's approach was too extreme. He had mixed success, and the Dutch brothers returned home. He won some powerful enemies in several prestigious convents, including St Victor.
On 27 October 1496, the Chapter of Notre Dame Cathedral ordered all the priests in the diocese to give up any women they were living with. There was violent opposition to this. The following year he got one vote in the election for Archbishop of Rheims and Jan was persuaded to use this as a challenge to the dubious methods used by the winner, the candidate of the King. Charles VIII had died and the new king, Louis XII was crowned by the new archbishop at Rheims Cathedral on 17 December 1498. To consolidate his position, Louis divorced his wife, Jeanne, and married the widow, Queen Anne, of the late King, who had been his nephew. Jan unwisely advised the Queen against the marriage and preached against divorce (interestingly enough, except in cases of adultery). Early the following year, he, along with the other Doctors in the University went on strike in protest against what they saw as unlawful interference in their affairs by the King. He was prominent in setting out their case. He also helped one of the more forceful opponents of the divorce escape. The King got his divorce and set about punishing his opponents. Standonck was lucky to get only two years exile. He handed over direction of the College to Noël Béda and John Mair and set off to Cambrai in his native Flanders, where he was welcomed by the Bishop.
He used the time in exile to continue preaching and he founded schools, based on the rule of the Collège de Montaigu in various towns, including his hometown of Mechlin, Breda and his old University of Leuven. Later he founded one at Beauvais, where he was canon of the Cathedral. In Brussels he preached to the Archduke Philip of Austria and he visited the Brothers at Windesheim and Gouda. Louis XII, under pressure, relented in 1500, signing very fulsome testimonial on 17 April. On 21 August that year, Pope Alexander VI formally agreed to the rules Standonck had set out for his colleges and the following year, he set out to visit new ones at Valenciennes, Leyden and Harlem, as well as re-Mechlin. In 1502, he received one vote for the Bishopric of Paris, but wisely did not follow this up. He tried to convert another heretic, but this time he failed, but he had not lost his typically medieval taste for litigation. In 1503, he took one of the College masters (Jacques Almain) to court for leaving, taking some students with him. They were ordered to return. He later fell ill with a fever, so bad that the doctors insisted he take some meat, which he did. He echoed St Francis of Assis in welcoming the fever bouts with "Welcome, Sister Fever!". He recovered a little but had a relapse in early 1504. He died during the night of 4 and 5 February, aged 50, and was immediately buried without ceremony at the door of the chapel, so that people could walk over his grave. The inscription was "Souvenez-vous du pauvre homme Standonck"—remember the poor man, Standonck.
There is no doubting the tremendous influence of Standonck at the time and the college founded was for centuries one of the most prestigious in the world, producing scholars and ardent reformers of all camps, including Béda, John Mair, Erasmus and later Calvin and Loyola. His form of reform—the education of exemplary clergy—was taken over in the Catholic Reformation but was rejected by the more radical reform demanded by Luther, Calvin and Knox, for whom personal mortification rather missed the point. The Catholic reformer Erasmus agreed. His judgement on Jan Standonk was that his intentions were good, but he lacked judgement. Erasmus's own judgement on the Collège de Montaigu was brutal indeed. Others—John Mair, for example—looked back on it with immense gratitude and respect.
- Renaudet, Augustin Jean Standonk, un réformateur catholique avant la réforme Paris, Société de l’histoire du protestantisme français, 1908. Extract from Bulletin de la Société de l’histoire du protestantisme français (Janvier-Février 1908) University of Michigan Library
- Renaudet, Augustin Préréforme et Humanisme à Paris pendant les premières guerres d'Italie (1494–1516) Bibliotèque del l'Institut Français de Florence (Université de Grenobles 1st series Volume VI)' Édouard Champion Paris 1916
- Renaudet, Augustin Humanisme et Renaissance : Dante, Pétrarque, Standonck, Érasme, Lefèvre d’Étaples, Marguerite de Navarre, Rabelais, Guichardin, Giordano Bruno. Geneva : E. Droz, 1958. 279 pp. Series: Travaux d’humanisme et Renaissance ; no 30
- Otherwise Gilles Aycelin (the elder), Gilles Asselin de Montaigu, or Montaigut.
- LACH, Donald F. (1994). Asia in the making of Europe: Volume II, A century of wonder. University of Chicago Press. p. 11. ISBN 0-226-46733-3.
- PELLERIN, Agnès, Anne Lima, Xavier de Castro (2009). Les Portugais à Paris: au fil des siècles & des arrondissements. France: Editions Chandeigne. p. 45. ISBN 2-915540-35-7. | <urn:uuid:0c3a0e09-7532-4843-87a5-a1ed9968a782> | {
"date": "2015-08-04T15:06:50",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990900.28/warc/CC-MAIN-20150728002310-00215-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9806798696517944,
"score": 3.484375,
"token_count": 3336,
"url": "https://en.wikipedia.org/wiki/Jan_Standonck"
} |
Document Number: 10930An Opportunity Culture for All: Making Teaching a Highly Paid, High-Impact Profession - The bad news: Between 1970 and 2010, per pupil spending went up almost 150%, but only 11 percent went to teachers. Teacher salaries and student outcomes stagnated. There's a better way, the authors argue. Junk the one-teacher-one-classroom model. Create teaching teams led by one excellent teacher so more kids get exposed. Use digital instruction and paraprofessionals to save money and spend that money on better teacher pay. Be more selective about which teachers enter, which teachers stay. (Emily Ayscue Hassel and Bryan C. Hassel, Public Impact, September 2013)...
Related IssuesTeaching Quality | <urn:uuid:33f8c0c8-e927-4e3b-8008-e0222685f07d> | {
"date": "2015-07-02T00:58:45",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095346.56/warc/CC-MAIN-20150627031815-00306-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9295859336853027,
"score": 2.625,
"token_count": 152,
"url": "http://www.ecs.org/html/Document.asp?chouseid=10930"
} |
How can you trisect an angle? It can be shown it's impossible to do this with ruler and compass alone, (using Galois theory) - so don't try it!!! But you may be able to find some good approximations. However, in origami, you can get accurate trisection of an acute angle.
You can read about this in several places, but since it's so neat, I thought I'd put instructions up here too - more people should be able to do this for a party trick!
Jim Loy has informed me that this construction is due to to Hisashi Abe in 1980, (see "Geometric Constructions" by George E. Martin). See Jim Loy's page at http://www.jimloy.com/geometry/trisect.htm for a description of many other ways to trisec an angle.
Since we're working with origami, the angle is in a piece of paper:
So what we want is to find how to fold along these dotted lines:
Note, if you don't start with a square, you can always make a square, here's the idea.
We're going to trisect this angle by folding. I'm going to try and describe this in a way so that you'll remember what to do.
Suppose we could put three congruent triangles in the picture as shown:
These triangles trisect the angle. So we need to know how to get them there.
Choose some height for the lower triangle, any height, and crease a horizontal line at this height; ie, just crease any horizontal line you want:
We need to get the blue line of the following picture somehow:
We can make a kind of "marked ruler" in the side of the paper, by folding over the paper again:
Now this "marked ruler" is used to find the bold line we needed:
To do this, fold the paper so point b touches line B, and point d touches line D:
You can check that this really does work out, and that the angles are the same for these triangles:
(Note, in the above, we don't really have a marked ruler as such, as we can't move the edge of the paper to any position, as it's attached to the rest of the paper.)
You can find another accounts of this construction at: | <urn:uuid:f1761d94-5a49-4849-aacf-b7c45ae33cdb> | {
"date": "2015-03-02T07:15:18",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462720.36/warc/CC-MAIN-20150226074102-00265-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9585968255996704,
"score": 3.515625,
"token_count": 498,
"url": "https://www.math.lsu.edu/~verrill/origami/trisect/"
} |
As more institutions, experts, as well as average citizens are publishing or broadcasting their content online, the Internet is becoming the ultimate place to learn new skills and acquire knowledge on a wide variety of subjects.
There are various platforms and sites that offer training and information on every possible subjects, often for free or at little cost.
Whether you want to learn yoga, design websites, learn to speak Mandarin, or get trained to be a mobile app developer, it’s available out there.
While internet censorship remains a complicated issue, as long as there is Internet freedom, the possibilities for anyone with access to the Internet to learn and develop new skills are limitless.
The infographic below highlights the benefits of online education and features popular sites and platforms that offer high quality training and information.
Get Internet Freedom with a VPN
Online education would not be possible without Internet freedom. Unfortunately, in some countries, internet freedom is limited due to censorship. You may find that certain sites are blocked by the government. To bypass internet censorship and unblock YouTube or unblock any site, you can use a VPN service. A VPN service enables you to connect anonynously to a server that is located in a place that has free access to the Internet. The content will then be passed to you via the VPN server, while protecting your privacy at the same time. | <urn:uuid:2fa0eccc-d9f4-47ff-a09b-6b060d082391> | {
"date": "2019-09-15T08:18:43",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514570830.42/warc/CC-MAIN-20190915072355-20190915094355-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9516667127609253,
"score": 2.6875,
"token_count": 273,
"url": "https://blog.hotspotshield.com/rise-online-education-infographic/"
} |
This first light image of the TRAPPIST national telescope at La Silla shows the Tarantula Nebula, located in the Large Magellanic Cloud (LMC) — one of the galaxies closest to us. Also known as 30 Doradus or NGC 2070, the nebula owes its name to the arrangement of bright patches that somewhat resembles the legs of a tarantula. Full Story.
Credit: TRAPPIST/E. Jehin/ESO
A new robotic telescope built to hunt for alien planets and comets from Chile has opened its camera eyes and taken its first photos of the night sky.
The first cosmic photos from the telescope, known as TRAPPIST, included stunning views of the Tarantula Nebula and spiral galaxy M83, but astronomers hope to use the advanced observatory to find two more elusive targets ? alien planets and comets that orbit the sun. The new photos were released this week.
?The two themes of the TRAPPIST project are important parts of an emerging interdisciplinary field of research ? astrobiology ? that aims at studying the origin and distribution of life in the Universe,? said astronomer Micha?l Gillon, who is in charge of the telescope's exoplanet studies for the European Southern Observatory, which is operating the new instrument.
TRAPPIST, short for TRAnsiting Planets and PlanetesImals Small Telescope, is located at ESO's La Silla Observatory in Chile's high Atacama desert. It will hunt for extrasolar planets by tracking the telltale dips in brightness of stars as planets pass in front of them as seen from Earth and block their light.
?Terrestrial planets similar to our Earth are obvious targets for the search for life outside the Solar System, while comets are suspected to have played an important role in the appearance and development of life on our planet,? said astronomer Emmanu?l Jehin, who leads the telescope's comet-hunting mission.
The TRAPPIST telescope is also equipped with special filters that are optimized to track comets in the southern sky. Researchers plan to use the telescope to make regular comet observations to track the icy wanderers as they orbit the sun, as well as determine what types of material they eject during their cosmic travels.
- The Strangest Alien Planets
- Photos: The Great 2007 Comet McNaught
- Telescopes for Beginners | <urn:uuid:20d9db01-9a60-4b56-ac05-d9605879547c> | {
"date": "2014-03-12T12:31:36",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021763647/warc/CC-MAIN-20140305121603-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9332215785980225,
"score": 3.578125,
"token_count": 491,
"url": "http://www.space.com/8571-planet-hunting-robot-telescope-takes-photos.html"
} |
For Moldovan environmentalist Aurel Lozan the oak tree is a mighty symbol of the country's forest.
Aurel Lozan is an environmentalist and works for various reforestation projects in the Republic of Moldova. But the oak tree is his particular favorite.
Oak trees have been around for about 12 million years. But in the Republic of Moldova the giant oak forests have all but disappeared. Lozan works for Forest Law Enforcement and Governance (FLEG), a forest protection program financed by the World Bank. Under FLEG, Lozan supervises the reforestation process. The environmentalist explains that oak forests are important for biodiversity. Up to 350 different kinds of insects can live on just one tree.
About 'My favorite'
With all the talk of endangered species, the value of biodiversity and the usefulness of ecosystems we sometimes forget why plants and animals are really worth protecting: because we love them, or depend on them for our very own wellbeing. People from all walks of life and in all parts of the world have a favorite species. The reasons are many - perhaps because it is beautiful, or fascinating, or it helps them secure a livelihood. Meet some of these people and their favorites in our series "My favorite." | <urn:uuid:b15c9a50-a863-46f9-9dd5-3c7a5b3e7f01> | {
"date": "2018-06-21T09:24:32",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864110.40/warc/CC-MAIN-20180621075105-20180621095105-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9432509541511536,
"score": 2.734375,
"token_count": 254,
"url": "http://www.dw.com/en/my-favorite-the-oak-tree/a-19027690"
} |
The interesting thing to me about the Higgs Boson, and the associated Higgs field (the boson is an elementary excitation of this field), is the intellectual or conceptual history of the idea. It seems crazy to think that as the universe cooled (very shortly after the big bang) a new field, the Higgs field, suddenly appeared, filling all space, and giving particles mass in proportion to how strongly they interact with that field. It would be a crazy idea if it were just a proposal pulled out of thin air. But the history is that Higgs' work (and the work of many others at the same time, the early 1960s) had very strong stimulation from the BCS theory of superconductivity of ordinary metals, which appeared in 1957.
That theory explained how superconductivity originates through the emergence below a critical temperature of a condensate of paired electrons (hence, bosons) which acts as an extremely sensitive electromagnetic medium. Try to impose a magnetic field inside a superconductor (by bringing a magnet close, for example) and this condensate or field will respond by stirring up currents which act precisely to cancel the field inside the superconductor. This is the essence of superconductivity -- its appearance changes physics inside the superconductor in such a way that electromagnetic fields cannot propagate. In quantum terms (from quantum electrodynamics), this is equivalent to saying that the photon -- the carrier of the electromagnetic fields -- comes to have a mass. It does so because it interacts very strongly with the condensate.
This idea from superconductivity is pretty much identical to the Higgs mechanism for giving the W and Z particles (the carriers of the weak force) mass. This is what I think is fascinating. The Higgs prediction arose not so much from complex mathematics, but from the use of analogy and metaphor -- I wonder if the universe is in some ways like a superconductor? If we're living in a superconductor (not for ordinary electrical charge, but for a different kind of charge of the electroweak field), then it's easy to understand why the W and Z particles have big masses (more than 100 times the mass of the proton). They're just like photons traveling inside an ordinary superconductor -- inside an ordinary metal, lead or tin or aluminum, cooled down to low temperatures.
I think it's fitting that physics theory so celebrated for bewildering mathematics and abstraction beyond ordinary imagination actually has its roots in the understanding of grubby things like magnets and metals. That's where the essential ideas were born and found their initial value.
Having said that none of this has anything to do with finance, however, I should mention a fascinating proposal from 2000 by Per Bak, Simon Nørrelykke and Martin Shubik, which draws a very close analogy between the process which determines the value of money and any Higgs-like mechanism. They made the observation that the absolute value of money is essentially undetermined:
The value of money represents a “continuous symmetry”. If, at some point, the value of money was globally redefined by a certain factor, this would have no consequences whatsoever. Thus, in order to arrive at a specific value of money, the continuous symmetry must be broken.In other words, a loaf of bread could be worth $1, $10, or $100 -- it doesn't matter. But here and now in the real world it does have one specific value. The symmetry is broken.
This idea of continuous symmetry is something that arises frequently in physics. And it is indeed the breaking of a continuous symmetry that underlies the onset of superconductivity. The mathematics of field theory shows that, anytime a continuous symmetry is broken (so that some variables comes to take on one specific value), there appears in the theory a new dynamical mode -- a so-called Goldstone Mode -- corresponding to fluctuations along the direction of the continuous symmetry. This isn't quite the appearance of mass -- that takes another step in the mathematics, but this Goldstone business is a part of the Higgs mechanism.
I'll try to return to this paper again. It offers a seemingly plausible dynamical model for how a value of money can emerge in an economy, and also why it should be subject to strong inherent fluctuations (because of the Goldstone mode). None of this comes out of equilibrium theory, nor should one expect it to as money is an inherently dynamical thing -- we use it as a tool to manage activities through time, selling our services today to buy food next week, for example. | <urn:uuid:6af57101-3d3f-4220-9a82-67dd6910159e> | {
"date": "2014-04-23T20:24:39",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203422.8/warc/CC-MAIN-20140423032003-00491-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9507303237915039,
"score": 3.046875,
"token_count": 939,
"url": "http://physicsoffinance.blogspot.com.au/2011_12_01_archive.html"
} |
We most commonly know Botox® (botulinum toxin) as being used for cosmetic purposes, but it is about to be made available to patients suffering from migraines through the UK’s National Health Service (NHS). Botulinum toxin is a protein and neurotoxin produced by the bacterium Clostridium botulinum. But is injecting a potentially deadly bacterial toxin really the way forward for treatment of migraine?
After receiving extra data from manufacturer Allergan, the National Institute for Health and Clinical Excellence (NICE) has published new draft guidance endorsing the use of Botox® to prevent chronic headaches. This is worrying, considering that Allergan was battling 3 lawsuits in 2011 alleging that Botox® could cause brain damage, and that the Botox® website itself claims: “It is not known whether BOTOX® and BOTOX® Cosmetic is safe or effective to prevent headaches in patients with migraine who have 14 or fewer headache days each month (episodic migraine)”. Allergan has also been accused of hiding Botox-related deaths from the US Food and Drug Administration (FDA), so where they've plucked these glowing analyses from is anyone’s guess.
The science behind using Botox® medically is that it denervates (or weakens) muscles, but this effect is only short-lived, lasting just 3 to 6 months. Therefore, to consistently stop headaches using this method, the patient may have to have Botox® injections every 3 months. This gives yet more cause for concern, as Botox® can bring about adverse effects in not only the target muscle but also non-target muscles. This decreases muscle strength and mass in both the injected muscle and muscles far removed from the injection site. And then once a muscle has been continually weakened, it can turn to fat!
Any discomfort, pain or ill-health is the body’s way of saying that something is out of balance. Conventional medicine happily hands out pills to mask these symptoms, and now they are offering injections of a “fatty toxin” that can cause botulism — a serious and life-threatening illness, to mask the symptoms of migraine. That these symptoms are enormously painful and debilitating is a powerful sign that something is out of balance, and requires attention. We strenuously question whether such an approach from a health care provider is either appropriate or responsible. When the body is screaming that something is wrong, using a toxin to render it mute without looking into other potential physiological considerations seems like sheer madness. The causes of headaches and migraines are well known to be numerous and often multifactorial. Many have gained significant benefit from such interventions as osteopathy, chiropractic, massage, nutritional changes and interventions, relaxation and breathing techniques and targeted lifestyle changes. Surely they're worth a try before turning to a toxin that may or may not damage your brain? To put it in very simple terms – if you had a gas leak, would you call the gas fitter to fix it, or would you just stick some tape over the hole and hope that no one lights a match?
It is common knowledge that the pharmaceutical pipeline is nearing empty and that the main patents on the blockbuster drugs are in the process of expiring. The new trick in town, at least in Pharma City, seems to be 'let's plunder existing products and try to find new indications and new uses on entirely new sectors of the population that have so far been untapped'. Fancy some botox anyone?
Updated: 16 May 2012
For our FREE Newsletter. | <urn:uuid:553169e0-738d-4088-8fa8-16ef36093c0f> | {
"date": "2013-12-13T11:35:35",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164936474/warc/CC-MAIN-20131204134856-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9501611590385437,
"score": 2.984375,
"token_count": 733,
"url": "http://anh-europe.org/news/UK+health+service+to+offer+Botox+injections+for+migraines"
} |
Synopsis by Alice Day
For young students who are interested in insects, Reading Rainbow: Bugs provides many topics that will keep their attention. The featured book is full of information regarding insects commonly found in backyards, and the field trip is to Cincinnati Zoo's Insect World to see its collections. Host LeVar Burton also invites viewers on a journey to Mexico to see the migratory destination of millions of monarch butterflies. In the kid-reviewed book segment, the young critics scrutinize Ladybug by Barrie Watts, Ant Cities by Arthur Dorros, and Backyard Insects by Millicent E. Selsam and Ronald Coor.
educational-television, reading, book, reading-skills, field-trip, learning-skills, literature, insects | <urn:uuid:c179edc3-a78c-424b-81fd-c50fedee1083> | {
"date": "2017-09-22T06:42:09",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688671.43/warc/CC-MAIN-20170922055805-20170922075805-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9184389114379883,
"score": 2.828125,
"token_count": 155,
"url": "http://www.allmovie.com/movie/reading-rainbow-bugs-v40462"
} |
ST. PAUL, Minn. – Looking into our eyes may help doctors predict who is at risk for stroke. A new study found that people with changes in the small blood vessels in their eyes are more likely to later suffer a stroke than people without these signs.
The results held true even after researchers took into account traditional risk factors for stroke such as smoking and high blood pressure, according to the study published in the October 11, 2005 issue of Neurology, the scientific journal of the American Academy of Neurology.
The study involved 3,654 Australians age 49 and older. Researchers took special photographs of the retina of the eyes of the participants and examined them for changes suggestive of small blood vessel damage, or retinopathy. These small vessel changes can be seen in the early stages of the condition, well before eyesight is affected.
"The blood vessels in the eyes share similar anatomical characteristics and other characteristics with the blood vessels in the brain," said Paul Mitchell, MD, PhD, of the University of Sydney in Australia. "More research needs to be done to confirm these results, but it's exciting to think that this fairly simple procedure could help us predict whether someone will be more likely to have a stroke several years later."
The researchers followed the participants for seven years, tracking which participants had strokes or transient ischemic attacks, also called mini-strokes. For those who died during the study, researchers examined the cause of death to determine whether stroke was involved.
Those with eye blood vessel damage were 70 percent more likely to have a stroke during the study than those without the damage. The risk was higher in those with small vessel signs in the eye but without severe high blood pressure; they were 2.7 times more likely to have a stroke than those without eye signs. The risk was also higher for those with more than one type of blood vessel lesion. (Because diabetes can cause this type of eye damage, these results did not include participants with diabetes, which is also a risk factor for stroke.)
The signs of damage include tiny bulges in the blood vessels, or microaneurysms, and hemorrhages, or tiny blood spots where the microaneurysms leak blood.
Source: Eurekalert & othersLast reviewed: By John M. Grohol, Psy.D. on 21 Feb 2009
Published on PsychCentral.com. All rights reserved.
Consistency is the last refuge of the unimaginative.
-- Oscar Wilde | <urn:uuid:3e55651a-e8bf-478f-8757-0866ca4343b6> | {
"date": "2013-06-18T22:44:14",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9663981795310974,
"score": 3.03125,
"token_count": 505,
"url": "http://psychcentral.com/news/archives/2005-10/aaon-emp100605.html"
} |
20 years of Treasure
On 24 September 1997 the common law of treasure trove, in place in England, Wales and Northern Ireland for more than 500 years, was replaced by the Treasure Act 1996. This marked a radical change in the fortune of objects found in these countries, allowing thousands of important finds to be acquired by public collections for all to enjoy.
The British Museum has a central role in administering finds from England reported under the Act. As this year marks the 20th anniversary of the commencement of the Act, we are celebrating its success with a season of Treasure under the banner of our #Treasure20 campaign, in partnership with The Telegraph.
The Telegraph has kicked off the campaign by inviting readers to choose their favourite Treasure find of the last 20 years, from a shortlist of 20 compiled by a panel of expert judges:
Michael Lewis – Head of Portable Antiquities and Treasure at the British Museum
Mary-Ann Ochota – anthropologist, author and broadcaster
Steve Trow – Director of Research for Historic England
Mike Heyworth – Chairman of the Council for British Archaeology
Edward Besly – numismatist and Assistant Keeper at National Museum Wales
Tim Pestell – Curator of Archaeology collections at Norwich Castle Museum
Keith Miller – journalist for The Telegraph
The judges had a spirited debate as they discussed the virtues of a host of Treasure finds, but eventually they selected their 20, based on these criteria:
1. The find should advance archaeological knowledge, whether that be of a particular period of time or for the locality in which it was found.
2. The find should have been recovered in a way that is an example of best practice. (For more information, see the Code of Practice for responsible detecting.)
3. The find should add value to the national collection, whether that be of a national or local museum.
Now it’s your chance to decide which of the top 20 deserves to be number one! Visit the Telegraph website to cast your vote before 14 May 2017. | <urn:uuid:1c0cbdbd-33d6-49d9-a031-f674bf2b4807> | {
"date": "2019-08-20T12:30:49",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315329.55/warc/CC-MAIN-20190820113425-20190820135425-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9464024305343628,
"score": 2.65625,
"token_count": 411,
"url": "https://blog.britishmuseum.org/20-years-of-treasure/"
} |
Historic vote protects sharks and manta rays at CITES
“This is a historic moment, where science has prevailed over politics, as sharks and manta rays are being obliterated from our oceans. This decision will put a major dent in the uncontrolled trade in shark meat and fins, which is rapidly destroying populations of these precious animals to feed the growing demand for luxury goods.”
“These timely decisions to have trade in sharks and manta rays regulated by CITES show that governments can muster the political will to keep our oceans healthy, securing food and other benefits for generations to come – and we hope to see similar action in the future to protect other commercially exploited and threatened marine species, both at the national and international level.”
Governments on Thursday reaffirmed the stronger protections for three species of hammerheads, in addition to porbeagles, oceanic whitetips, and two species of manta rays. The sharks and manta rays were listed on CITES’ Appendix II, seeking to regulate their international trade to sustainable levels.
Victory! Better protection through #CITES for sharks and manta rays upheld. Big sigh of relief after this historic moment.— WWF News (@WWFnews) March 14, 2013 | <urn:uuid:87ca5ec0-d30f-4cc9-949f-8c41ab02c1f5> | {
"date": "2014-04-19T10:32:39",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537097.26/warc/CC-MAIN-20140416005217-00419-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9384056329727173,
"score": 2.65625,
"token_count": 258,
"url": "http://wwf.panda.org/what_we_do/where_we_work/coraltriangle/news/coraltrianglenews/?207894/WWF-Governments-muster-political-will-to-protect-sharks-at-CITES"
} |
Orchid family (Orchidaceae)
Description: This perennial orchid is 1–2½' tall and usually unbranched. The central stem is round in circumference, rather stout, and densely covered with hair. Three or more leaves alternate along this stem. These leaves are up to 6" long and 4" across; they are oval-ovate to ovate, smooth along their margins, and pubescent. Parallel veins are readily observable along the upper surface of each leaf. The base of each leaf clasps the stem. The color of the foliage can vary from dark green to yellowish green, depending on growing conditions and the maturity of the plant. The central stem terminates in 1 or 2 flowers. Each flower is held above the foliage on a long stalk that has a single leafy bract behind the flower. This bract resembles the leaves, but it is smaller in size and lanceolate in shape. Like other orchids, each flower has 3 petals and 3 sepals. However, because two of these sepals are fused together, there appears to be only 2 sepals.
The lower petal is in the shape of a slipper or a pouch with an opening on top; it is bright yellow, shiny, and 1½–2" in length. Within the interior of this petal, there are frequently reddish brown dots. The 2 lateral petals are very narrow, more or less twisted, and 2–3½" in length. These 2 petals vary in color from greenish yellow to brownish purple and they have fine veins running from their bases to their tips. The sepals form an upper hood and a lower hood. They are broader and shorter than the lateral petals, otherwise their appearance is similar. Both the lateral petals and sepals are more or less pubescent. The reproductive organs are located toward the posterior of the slipper-like lower petal. The blooming period occurs from late spring to early summer and lasts about 3 weeks. There is usually no noticeable floral scent. If a flower is successfully pollinated by insects (often this doesn't occur), it will form a seedpod. When this seedpod splits open, the fine seeds are easily carried aloft by the wind. The root system consists of a tuft of fleshy fibrous roots. When several plants occur together, they are often clonal offsets of the mother plant.
Cultivation: The preference is partial sun to light shade, moist to slightly dry conditions, and a soil that consists of loam or sandy loam. Young plants require the presence of appropriate endomycorrhizal fungi in the soil in order to flourish. Starting plants from seed is the job of an expert, although it is possible to successfully transplant large plants that have been grown in a greenhouse. This is one of the easier orchids to maintain in a flower garden.
Range & Habitat: The native Yellow Lady's Slipper is an uncommon plant that is widely scattered across Illinois (see Distribution Map). It is less common than formerly, but still persists in colonies of variable size at several sites. Habitats include moist to dry deciduous woodlands, sandy woodlands and savannas, thinly wooded bluffs along rivers, wooded slopes, and forested bogs. The size of local populations can increase in response to fallen trees from windstorms, or occasional wildfires, as this reduces excessive shade from woody vegetation. Some authorities regard this orchid as a native variety of Cypripedium calceolus, which occurs in Eurasia. Under this system of classification, its scientific name is Cypripedium calceolus pubescens.
Faunal Associations: The showy flowers attract mostly small bees and various flies. In North America, Robertson (1929) and Stoutamire (1967) observed honeybees, little carpenter bees (Ceratina spp.), mason bees (Osmia spp.), Halictid bees (Agapostemon sp., Lasioglossum spp.), and Andrenid bees (Andrena spp.) visiting the flowers. Some of these bees were regarded as effective at cross-pollination of the flowers, while other bees became trapped in the flowers and died. Miscellaneous flies and beetles were also observed to visit the flowers, but they were regarded as ineffective pollinators. The showy flowers are deceptive because they induce insects to explore the flowers in the expectation of a reward, but they contain no nectar and their pollen is unavailable to them. Two insects have been observed to feed on the Yellow Lady's Slipper Orchid: adults and larvae of a weevil (Stethobaris ovata) and larvae of a Scathophagid fly (Parallelomma vittatum). Adults of this weevil feed on the shoots, buds, and flowers, while its larvae feed within the seedpods of this orchid. Larvae of the preceding fly are leaf-miners. White-tailed Deer readily consume the foliage of this and other orchids, and local populations may require a deer-resistant fence for protection where these animals are abundant.
Photographic Location: The slope of a wooded bluff in Vermilion County, Illinois.
Comments: This is one of the largest and most attractive orchids in Illinois. It is more abundant than most species of orchid, although by no means common. While the flowers are in bloom, it is easy to identify this plant as a Cypripedium sp. (Lady's Slipper Orchid) because of the slipper-like lower petals. The only other species that it can be confused with, Cypripedium parviflorum (Small Yellow Lady's Slipper), has similar flowers that are smaller in size. The lateral petals of its flowers are less than 2" long, while the slipper-like lower petal is about ¾–1¼" in length. The flowers of this species are more likely to be fragrant. The Small Yellow Lady's Slipper usually has a pair of leaves toward the base of the central stem, while Yellow Lady's Slipper usually has 3-5 leaves along the central stem. Some authorities classify the Yellow Lady's Slipper as a variety of the Small Yellow Lady's Slipper, or Cypripedium parviflorum pubescens, rather than a distinct species. Regardless of its classification, when this orchid is not in bloom, it can superficially resemble Polygonatum commutatum (Solomon's Seal) and similar species in the Lily family. However, the central stem of this orchid and the upper surfaces of its leaves are pubescent, while the latter plants have stems and upper leaf surfaces that are waxy and glabrous. | <urn:uuid:ab7844f1-1988-4a5b-8c8a-ec3ba35c3d9e> | {
"date": "2016-12-10T12:38:53",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543170.25/warc/CC-MAIN-20161202170903-00024-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9414138197898865,
"score": 3.328125,
"token_count": 1402,
"url": "http://www.illinoiswildflowers.info/woodland/plants/yl_ladyslipper.htm"
} |
Representational State Transfer (REST) is a style of software architecture for distributed hypermedia systems such as the World Wide Web. The term Representational State Transfer (REST) was introduced and defined in 2000 by Roy Fielding in his doctoral dissertation. Fielding is one of the principal authors of the Hypertext Transfer Protocol (HTTP) specification versions 1.0 and 1.1.
Conforming to the REST constraints is often referred to as being ‘RESTful’.
The REST architectural style was developed in parallel with the HTTP/1.1 protocol, based on the existing design of HTTP/1.0. The largest known implementation of a system conforming to the REST architectural style is the World Wide Web. In fact, REST can be considered as a post hoc description of the features of the Web that made the Web successful. REST exemplifies how the Web's architecture emerged by characterizing and constraining the macro-interactions of the four components of the Web, namely origin servers, gateways, proxies and clients, without imposing limitations on the individual participants. As such, REST essentially governs the proper behavior of participants.
REST-style architectures consist of clients and servers. Clients initiate requests to servers; servers process requests and return appropriate responses. Requests and responses are built around the transfer of "representations" of "resources". A resource can be essentially any coherent and meaningful concept that may be addressed. A representation of a resource is typically a document that captures the current or intended state of a resource.
At any particular time, a client can either be transitioning between application states or "at rest". A client in a rest state is able to interact with its user, but creates no load and consumes no per-client storage on the set of servers or on the network.
The client begins sending requests when it is ready to transition to a new state. While one or more requests are outstanding, the client is considered to be transitioning states. The representation of each application state contains links that may be used next time the client chooses to initiate a new state transition.
REST was initially described in the context of HTTP, but is not limited to that protocol. RESTful architectures can be based on other Application Layer protocols if they already provide a rich and uniform vocabulary for applications based on the transfer of meaningful representational state. RESTful applications maximize the use of the pre-existing, well-defined interface and other built-in capabilities provided by the chosen network protocol, and minimize the addition of new application-specific features on top of it.
HTTP, for example, has a very rich vocabulary in terms of verbs (or 'methods'), URIs, request and response headers, Internet media types, HTTP request and response codes etc. REST over HTTP works with and enhances these existing features, and thus allows existing layered proxy and gateway components to perform additional functions on the network such as HTTP caching and security enforcement.
SOAP RPC over HTTP, on the other hand, encourages each application designer to define a new and arbitrary vocabulary of nouns and verbs (for example
savePurchaseOrder(...)), usually overlaid onto the HTTP 'POST' verb. This disregards many of HTTP's existing capabilities such as authentication, caching, content type negotiation, etc. and may leave the application designer re-inventing many of these features within the new vocabulary. Examples of doing so may include the addition of methods such as
savePurchaseOrder(string customerLogon, string password, ...).
The REST architectural style describes the following six constraints applied to the architecture, while leaving the implementation of the individual components free to design:
The only optional constraint of REST architecture is code on demand. If a service violates any other constraint, it cannot strictly be referred to as RESTful.
Complying with these constraints, and thus conforming to the REST architectural style, will enable any kind of distributed hypermedia system to have desirable emergent properties, such as performance, scalability, simplicity, modifiability, visibility, portability and reliability.
The uniform interface that any REST interface must provide is considered fundamental to the design of any REST service.
Key goals of REST include:
REST has been applied to describe the desired Web architecture, helped to identify existing problems, to compare alternative solutions, and to ensure that protocol extensions would not violate the core constraints that make the Web successful.
Fielding describes REST's effect on scalability thus:
REST's client-server separation of concerns simplifies component implementation, reduces the complexity of connector semantics, improves the effectiveness of performance tuning, and increases the scalability of pure server components. Layered system constraints allow intermediaries—proxies, gateways, and firewalls—to be introduced at various points in the communication without changing the interfaces between components, thus allowing them to assist in communication translation or improve performance via large-scale, shared caching. REST enables intermediate processing by constraining messages to be self-descriptive: interaction is stateless between requests, standard methods and media types are used to indicate semantics and exchange information, and responses explicitly indicate cacheability.
An important concept in REST is the existence of resources (sources of specific information), each of which is referenced with a global identifier (e.g., a URI in HTTP). In order to manipulate these resources, components of the network (user agents and origin servers) communicate via a standardized interface (e.g., HTTP) and exchange representations of these resources (the actual documents conveying the information). For example, a resource that represents a circle may accept and return a representation that specifies a center point and radius, formatted in SVG, but may also accept and return a representation that specifies any three distinct points along the curve as a comma-separated list.
Any number of connectors (e.g., clients, servers, caches, tunnels, etc.) can mediate the request, but each does so without "seeing past" its own request (referred to as "layering," another constraint of REST and a common principle in many other parts of information and networking architecture). Thus, an application can interact with a resource by knowing two things: the identifier of the resource and the action required—it does not need to know whether there are caches, proxies, gateways, firewalls, tunnels, or anything else between it and the server actually holding the information. The application does, however, need to understand the format of the information (representation) returned, which is typically an HTML, XML or JSON document of some kind, although it may be an image, plain text, or any other content.
A RESTful web service (also called a RESTful web API) is a simple web service implemented using HTTP and the principles of REST. It is a collection of resources, with three defined aspects:
The following table shows how the HTTP verbs are typically used to implement a web service.
|Collection URI, such as
||List the members of the collection, complete with their member URIs for further navigation. For example, list all the cars for sale.||Meaning defined as "replace the entire collection with another collection".||Create a new entry in the collection where the ID is assigned automatically by the collection. The ID created is usually included as part of the data returned by this operation.||Meaning defined as "delete the entire collection".|
|Element URI, such as
||Retrieve a representation of the addressed member of the collection expressed in an appropriate MIME type||Update the addressed member of the collection or create it with the specified ID.||Treats the addressed member as a collection in its own right and creates a new subordinate of it.||Delete the addressed member of the collection.|
Unlike SOAP-based web services, there is no "official" standard for RESTful web service. This is because REST is an architecture, unlike SOAP, which is a protocol. Even though REST is not a standard, a RESTful implementation such as the Web can use standards like HTTP, URL, XML, PNG, etc.
REST can be found in a number of places on the public Web:
Software that may interact with a number of different kinds of objects or devices can do so by virtue of a uniform, agreed interface.
The Common Management Information Protocol (CMIP) was designed to allow the control of network resources by presenting their manageable characteristics as object attributes. The objects have parent-child relationships that are identified using distinguished names and attributes, which are read and modified by a set of CRUD operations. The notable non-restful aspect of CMIP is the M_ACTION operation although, wherever possible, designers of management information bases (MIBs) would typically endeavour to represent controllable and stateful aspects of network equipment through attributes. | <urn:uuid:0a67cadc-0b5d-4cb5-a3e1-7a3d8d47c4b5> | {
"date": "2015-11-29T10:34:35",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398457697.46/warc/CC-MAIN-20151124205417-00279-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.916056215763092,
"score": 3.578125,
"token_count": 1799,
"url": "http://www.thefullwiki.org/Representational_State_Transfer"
} |
The human interactome: each dot is a protein and each line an interaction.
In 1987, researchers in Switzerland described two sisters who were born separately but had similar abnormalities. A curl of tissue in their cerebellums was missing. Their hearts contained holes and clefts. One died aged three following cardiac surgery; her sister had a similar operation at age four, but survived. Because neither of the girls’ parents had these abnormalities, the researchers concluded that their daughters had inherited two copies of an atypical gene, leading to a previously unknown syndrome1.
The scrambled nucleotides responsible for the girls’ condition may reside in a single gene. Yet several other genes have subsequently also been associated with what has been dubbed Ritscher–Schinzel syndrome. The functions of those genes, and how they related to the syndrome, remained a mystery for years.
Today, those molecular underpinnings are coming into focus thanks to the systematic study of protein–protein interactions, a discipline called interactomics. By mapping the network of connections between proteins, three research teams independently discovered a complex called Commander that’s made up of proteins produced by the mutated genes2. Commander is an essential cell component that sorts and delivers proteins, and its malfunction causes the devastating defects of Ritscher–Schinzel syndrome.
Proteins and other biological molecules rarely work alone; they brush up against one another in fleeting interactions or band together to form complex cellular machines. Only through such partnerships can proteins perform their many functions. Breakdowns in those interactions can affect human health.
“If you break a gene coding a protein that goes into a complex, then that complex is dysfunctional in some way and that gives rise to a condition or disease,” says Edward Marcotte, a systems biologist at the University of Texas at Austin.
Biochemists have long studied the ways in which one or a few proteins interact with others. But now they are developing tools to chart more comprehensive sets of protein–protein interactions at levels from organellar to organismal. These interactomes typically look like dense starbursts, with protein dots or nodes joined by the interactions between them. Self-contained clusters of interconnected proteins that emerge from these webs may represent key complexes and communal functions or, as in the case of Ritscher–Schinzel syndrome, provide clues to the roots of disease.
In the past three years, research groups have published the first high-quality maps of the human interactome3, 4, 5, 6. Together, the most recent iterations of those maps have identified around 93,000 unique protein–protein interactions.
The technologies underlying these maps are not new; protein-interaction mapping dates back to the 1990s. And researchers have been producing interactome maps since at least the early 2000s. But methodological refinements as well as advances in protein purification, mass spectrometry and gene-editing techniques have empowered researchers to explore the interactome — and the insights it promises into development and disease — with ever-finer precision.
It isn’t easy: capturing all interactions is a challenge, as the set of protein partners varies across different tissues, cells and even time. The interactome is dynamic, breaking and forming connections as the cell responds to its environment. Mapping it to completion may require fresh methods and ways of thinking about systems biology.
Still, the field is yielding results. “New machines that are ubiquitous but deeply understudied — that’s fundamental biology coming out of the maps.” Marcotte says. “We’ve clearly passed a critical threshold.”
There essentially are two approaches to building interactome maps. The yeast two-hybrid assay tests for direct interactions between protein pairs by coupling gene expression to protein interactions in the cell. The second approach maps both direct and indirect protein contacts by isolating complexes with antibodies and identifying their component parts with mass spectrometry (see ‘Pick A or B’ and ‘Mapping tools’).
Box 1: Pick A or B
The two high-throughput methods for protein-interaction mapping have their supporters, but they are complementary.
Determining whether two proteins physically interact relies on yeast two-hybrid systems. The assay involves fusing the genes encoding two putative interaction partners to the two halves of a yeast DNA-binding protein. The strain carrying these hybrids can grow only when the target proteins interact and unite the halves of the yeast protein, which activates crucial genes. Sequencing the DNA from growing yeast colonies reveals the proteins involved in the interaction.
Yeast two-hybrid systems allow the quick screening of many protein pairs at once, although validating the interactions through further assays is essential: just because two proteins interact in the yeast nucleus does not mean that they partner in their native cell.
Researchers can also run protein complexes through a mass spectrometer. These instruments convert the complexes to a cloud of charged particles and identify the pieces by their mass. In one common approach, affinity purification followed by mass spectrometry, researchers label protein ‘baits’ with peptide or protein ‘handles’. Those handles provide a way to recover the bait proteins from cell slurries, along with their interaction partners or ‘preys’, which are identified by mass spectrometry. Alternatively, researchers can take the full mixture of proteins from cells and run it through a series of biochemical separation steps. The proteins that tend to co-purify (or ‘cofractionate’) in this approach are interaction partners.
Mass-spectrometry-based approaches allow researchers to work directly in the cells where proteins occur, rather than in yeast, but not all complexes can survive the extraction steps. Also, these approaches cannot distinguish between direct, physical interactions and looser associations.
Marcotte’s laboratory uses a variation on the second approach that involves biochemically separating proteins — for instance, using sucrose density gradients — to see which molecules tend to stay together.
The resulting maps allowed Marcotte and Anna Mallam, a postdoctoral researcher in his lab, to draw inferences about the Commander complex’s cellular role2. Previous studies revealed that two components were structurally similar to proteins that build and maintain eukaryotic hair-like structures called cilia and flagella; other components seem to move proteins across membranes. Those data and other findings suggest that Commander moves specific proteins from the cell membrane to a compartment called the Golgi apparatus, where they are recycled.
The largest maps encompass thousands of proteins, resembling tangled hairballs more than starbursts. But by unravelling them, researchers have identified signatures that distinguish cancer-causing genes from ‘normal’ ones, and that define key biological processes, such as chromosome segregation during cell division.
Even with multiple approaches, interactome maps are “still largely incomplete”, says computational biologist Katja Luck at the Dana-Farber Cancer Institute in Boston, Massachusetts. It’s a question of numbers. The human genome contains roughly 20,000 protein-coding genes. If one assumes that each protein has only one form — a massive oversimplification — there are approximately 200 million possible interactions. The real number is likely to be much smaller because many interactions are indirect; estimates for one-to-one interactions range from 120,000 to 1 million.
Proteins are incredibly diverse, biochemically speaking, and thus their interactions cannot be captured by every assay equally. Membrane- protein interactions, for instance, are difficult to study because when the membrane is stripped away, their shape and behaviour changes; they may not link with their typical partners. But, the extent to which this incompleteness alters the current maps isn’t yet clear. “We are just at the beginning of understanding the biases of different methods,” Luck says.
As a postdoctoral researcher in the lab of geneticist Marc Vidal, Luck has helped to implement protocols to eliminate errors in their two-hybrid approach. The core method dates back to the 1989. “We are just doing some tweaks to make it better,” she says. By tagging the protein genes with barcodes, the team can test more than one interaction at a time in a large range of growing yeast. Rigorous attention to detail, automation of key steps and sequencing in quadruplicate has allowed them to identify more than 60,000 interactions, the majority of which were previously unknown.
That data set forms the bulk of the interactions reported in the collaborative Human Reference Protein Interactome Mapping Project, and it is still growing. “By 2020 we want something that people will be able to refer to as a reference map for the human interactome,” Vidal says. The work hasn’t always gone smoothly. The early days of interactomics generated error-prone networks. Only about 3% of identified interactions had support from more than one method, according to one 2006 review7. “People were extremely cautious about using those data sets,” Vidal says. “But in ten years we have made really incredible progress.”
Better mapping with CRISPR
The eventual reference map Vidal envisions is likely to contain only a subset of all possible interactions. Cell and tissue variation as well as shifting cellular responses add up to many possible versions of the full interactome. For Matthias Mann, a biochemist at the Max Planck Institute of Biochemistry in Martinsried, Germany, those variations are daunting. But he is optimistic about the power of gene-editing technology, such as CRISPR–Cas9, to address them.
Mann’s mapping method involves libraries of cell lines expressing hundreds of proteins, which are tested for interactions using an ultra-high-resolution mass spectrometer called Orbitrap. The bait proteins are fused to a green fluorescent protein, producing a luminosity profile that allows the researchers to quantify interactions through live-cell imaging. In the late 2000s, creating the cell-line library was “quite laborious”, he says. “Now our method gets wings due to the CRISPR engineering that can be brought to bear.”
Since introducing the quantitative approach in 2010, Mann’s team has mapped and quantified the strength of more than 28,000 interactions. Interactions in which the partners exist in one-to-one ratios are considered ‘strong’ and are likely to exist in stable and abundant complexes. Without such information, “it is very hard to say something about the structure of the network”, Mann explains. Analysis of his team’s map showed that the human interactome is dominated by weak associations, which may reflect low-abundance regulatory proteins acting on more stable protein machines.
A common trend across the field is the adoption of relatively gentle protocols for sample preparation that aim to faithfully capture all protein–protein interactions in the cell.
“We are trying to find less disruptive methods,” says Rosa Viner, a biochemist at Thermo Fisher Scientific, a life sciences company in San Jose, California. The firm’s focus on improving sample preparation, workflow and mass-spectrometry technology aims to help researchers identify interactions as they exist in cells. “This is the hardest challenge: finding the methods that will give us the best picture without any artefacts,” she adds.
Artefacts can include protein complexes that fall apart before their interactions are detected. To hold complexes together, Viner has worked with researchers at the University of California, Irvine, to chemically fuse complexes, an approach called crosslinking, before mass-spectrometric analysis. A strategy called QMIX (quantitation of multiplexed, isobaric-labelled crosslinked peptides) has been developed that integrates crosslinking compounds with chemical labels to allow researchers to stabilize as well as track protein complexes8.
Good analysis also takes into account the blind spots of any given method. “There are still classes of proteins that are very challenging,” says Wade Harper, a cell biologist at Harvard Medical School in Boston. “When you do high-throughput analysis, you are limited in how much care you can take with individual protein.” That’s because such analyses tend treat every reaction the same, leaving little room for customization.
Harper and his colleague Steven Gygi, also at Harvard, created a lab group to fine-tune their approach. “With a relatively small team of four to six people we can create four or five hundred cell lines a month,” he says. That dedication has yielded the largest collection of human-protein-complex data yet achieved from a single pipeline. Their map, called BioPlex, includes around 120,000 interactions.
But to get a closer look at interactions, researchers must dive into the crowded landscape of the cell itself.
Anne-Claude Gingras, a biochemist at the University of Toronto in Canada, uses a technique called BioID, which tags proteins on the basis of their proximity to one another. The tagged protein of interest adds a chemical tag to nearby proteins, leaving evidence of its interactions like a crayon-wielding toddler’s trail through the house.
The result is a map of the physical neighbourhood surrounding the initial protein. Identifying a protein’s larger community is likely to reveal details about its cellular function, Gingras explains.
Proximity mapping also allows researchers to track proteins that cannot be picked up by other assays, such as difficult-to-isolate membrane-embedded proteins. “We and others have looked at proteins on chromatin, mapped the organization of the centrosome and detected interactions that span all kinds of membranes,” Gingras says. Using BioID, the group found new components in a signalling pathway that regulates organ size during development9.
Harper’s lab uses a similar method called APEX. In it, an engineered plant enzyme called ascorbate peroxidase chemically restricts the time window during which the protein of interest can tag others, resulting in a fainter but more spatially precise signal.
“If we are going to understand how cells are working, it is critical to connect all the protein–protein interaction maps with spatial maps within the cell.”
Having multiple approaches in interactomics means that when interactions appear on more than one map, they carry more weight. That is where the insights will come, says Jennifer Lippincott-Schwartz, a cell biologist at the Howard Hughes Medical Institute Janelia Research Campus in Ashburn, Virginia. “If we are going to understand how cells are working, it is critical to connect all the protein–protein interaction maps with spatial maps within the cell,” she says.
Cells are packed with large structures or organelles, all floating in the protein-rich soup of the cytoplasm. Understanding which proteins are interacting and why will require researchers to actually see what this world looks like.
Lippincott-Schwartz’s lab has developed an arsenal of tools for visualizing proteins inside living cells using fluorescent labels. These tools have revealed six organelles — the endoplasmic reticulum, the Golgi apparatus, lysosomes, peroxisomes and lipid droplets — moving and interacting in 3D. The team calls it the organelle interactome10.
The interactome, Lippincott-Schwartz says, is “a hypothesis generator” for cell biologists. “You go in and start testing once you see a protein you know interacting with a whole bunch of other proteins that have functions you didn’t know.”
With interactome maps finally becoming fleshed out with high-quality, abundant interactions, researchers can start putting those hypotheses to the test. | <urn:uuid:3377dad6-e051-47b5-88df-72d78a213a77> | {
"date": "2019-06-19T09:26:58",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998943.53/warc/CC-MAIN-20190619083757-20190619105757-00536.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9469771385192871,
"score": 3.59375,
"token_count": 3291,
"url": "https://dottdesign.000webhostapp.com/2017/09/14/protein-maps-chart-the-causes-of-disease/"
} |
Last July, Ravalli County staffers heard shrieks coming from the third floor of the administration building. The shrieks emanated from county employees who had just discovered dying bats crawling on the floor. Commissioner Ray Hawk says two dead bats were sent to state authorities to be tested for rabies, but came up clean. After that, Hawk says, the specimens were sent on to a laboratory in Michigan for an extensive toxicology test. In mid-January, Ravalli County officials finally received the results: The bats had died of DDT poisoning, and their corpses showed extraordinarily high levels of the poison—more than 4,000 parts per million.
"Not only had they ingested it in some way, but they had the powder on the bats themselves," Hawk says.
Dichloro-diphenyl-trichloroethane has been outlawed since 1972 due to its toxicity. Hawk says that since bats don't typically range very far from their roosts, he suspects that the source of the DDT is near the county administration building, which is in the middle of downtown Hamilton.
"Somewhere within a mile of here there's some heavy DDT, which could be anywhere. There's lots of old barns around here," Hawk says.
The state Agriculture Department has taken swabs of the county building to test for DDT residue, and will determine its next steps once results come back, according to Communications Officer Andy Fjeseth. Fjeseth says state officials have not yet searched the area around the building for signs of the DDT's source.
"Without knowing the location of the source, it's difficult to determine the threat level," Fjeseth says. "If anyone should find or come across any DDT, they should call us at the Department of Agriculture, and we can work with them to properly dispose of it."
Bryce Maxell, program coordinator for the Montana Natural Heritage Program, has studied bats for 12 years. He says he has no doubt that someone in Hamilton sprayed DDT directly onto the bats. In his experience, it's common for people to be overly alarmed when they encounter bats roosting in their roof.
"I've heard horror stories where there were big buildings where janitors were instructed to go up and spray pesticides directly on the bats, or bag them up, put them in garbage sacks and put them in the trash," Maxell says.
Bats roost in buildings only in the summertime. They spend winters hibernating in caves and other remote habitats. Maxell recommends that people take steps in early spring to prevent bats from roosting indoors. Non-lethal methods include sealing crevices and installing bat roost boxes by late April. He notes that residences with bat roosts report fewer mosquitoes in the summer, since bats are insectivores. | <urn:uuid:4c5b028b-27a4-402f-baea-f4b74fc38dc7> | {
"date": "2017-03-26T22:51:25",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189313.82/warc/CC-MAIN-20170322212949-00471-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9790195822715759,
"score": 2.65625,
"token_count": 583,
"url": "http://m.bigskypress.com/missoula/dead-bats-and-ddt/Content?oid=3382178"
} |
I've got a question! If you want to replace the adverbial clause of the following sentence by a participle construction, what would you say?
Since they were disappointed with the outcome, the workers went on strike.
-> Being disappointed with the outcome the workers went on strike.
-> OR: Disappointed with the outcome the workers went on strike.
Is there a difference in meaning? Our textbook suggests that you use the first construction (being disappointed) because the adverbial clause of reason has got an active meaning.
Is it possible to see it as follows: They had been disappointed by the outcome, therefore the adverbial clause also has passive meaning, which makes it possible to use a past participle construction, too?
Thanks in advance for your help! | <urn:uuid:12d6b2ce-ce03-4dd8-9a2a-7059fc113976> | {
"date": "2014-07-23T20:12:50",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883466.67/warc/CC-MAIN-20140722025803-00152-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9769600033760071,
"score": 2.578125,
"token_count": 160,
"url": "http://www.englishclub.com/esl-forums/viewtopic.php?p=416353"
} |
The misconception is that the toxins deposited in the body for decades, be eliminated in about ten days. On the contrary, it is a very complex process that requires patience and expertise.
Every day we are bombarded with advertisements for various medicines or detox diet which promises fast and efficient detoxification of the whole organism. The question is why we need detoxification. Unfortunately, today, all over the air, water and food are exposed to various toxins (heavy metals, pesticides, various chemicals …). In many cases, these pollutants precipitated us into the body faster than the agencies for purifying be out. Once you get into the body, these toxins can intensify inflammation, hormones and disrupt the cellular communication, DNA damage and weaken the functioning of the immune system. So increases the risk of cancer, cardiovascular and autoimmune diseases, joint diseases and allergies, as well as cause headaches, infections of the respiratory system and even mental symptoms. Therefore, the body needs detoxification once a year. However, rapid detoxification and sudden loss of weight, do not clean the body in a good way – but can cause health problems. For example, aggressive cleaning program can run large amounts of toxins from the place where it is stored by the body, which results in a lot of unpleasant symptoms. Also, any medicines or supplements for detoxification should not be taken prior consultation with a doctor and a complete check of the body.
Do not rush!
The point of detoxification is to feel better and livelier to alleviate the inflammation, stimulate digestion, strengthen immunity, accelerate metabolism, improve cognitive function, purify the skin and rid of the pain. However, if this process approaches the unprepared and under-informed, wishing to do this as quickly, we will only get worse. Those who begin aggressive detoxification (strict fast, strong herbal formulas or radical changes in diet) – often experience a so-called detox crisis. This happens in the reaction of the body to rapidly release toxins. Then it may appear a headache, weakness, visual disturbances, problems with digestion, insomnia, symptoms of the flu. These side effects are very unpleasant and can deter people from intention to cleanse the body. Once released into the bloodstream a lot of toxins, they must be completely eliminated in order not to redistribute in other vital areas, including the brain. However, detoxification crisis is not a normal consequence of detoxification, although many believe that this is proof that it works. Unpleasant symptoms are evidence that the process initiated abruptly. The body takes a time to accumulate all the toxins, but he’ll need more time to gradually ejected. Moreover, drastic diets do not provide your body enough calories or nutrients, that it would have enough energy to detoxify. The complex process of removing toxins and repair the damage that they inflict, requires a lot of energy and nutrients. Remember that the objective here is to improve health, not jeopardize it. Do not fasting and hunger longer period. Instead, the emphasis put on whole foods rich in nutrients, such as organic fruits and vegetables, high-quality protein. Another danger is dehydration. This is not an unusual problem for detoxification, because many of us are chronically dehydrated, but this time is particularly evident because we need plenty of fluids in order to expel toxins from the body. Insufficient hydration during the detoxification seems that the whole process stops halfway when toxins are drawn from several organs, or are not completely expelled from the body.
First, change your diet regime
You will not be able to detoxify the body, if you are eating based on industrially processed foods, which are rich in sugar, fat and preservatives. So, first change your diet regime, but not “overnight”, but gradually. The process of detoxification need to start cleaning the blood and organs of the digestive system with adequate diet (but not rigorous!). Then proceed to clean the vital organs and tissues, where the toxins accumulated in greater quantity. If thoroughly cleanse the bloodstream and blood circulation, will prepare the body for complete detoxification. Gradually eject industrial meat products from the diet and red meat keeps to a minimum (no more than 150 grams per week). Shunt sweets, snacks and soft drinks industry. Plant protein, especially those germs and fermented plant foods, they are easy to digest and stimulate detoxification with an abundance of enzymes and nutrients. Choose organic foods to reduce the intake of pesticides, antibiotics and other harmful compounds. Fermented vegetables such as sauerkraut, is an excellent source of fiber, enzymes and probiotic bacteria, which will help in detoxification of the digestive system. Fresh fruits and vegetables are the main points of the detoxification program, as it provides key nutrients and vital antioxidants. Antioxidants are especially important because detoxification can produce free radicals, molecules that damage the bad cells and cause greater toxicity. Alkaline vegetables like spinach, cucumber and avocado, is a counterbalance acidity and helps the body eliminate toxins. Eat plenty of broccoli and kale, because these vegetables contain compounds that furthering the establishment of balance hormones and stimulate detoxification of the body. Avoid everything that causes the inflammatory processes, such as sugar, salt, alcohol, processed foods and caffeine beverage. These foods can disrupt the metabolism, increase the number of toxins in the body and cause dehydration. Every day, drink plenty of fluids (water and unsweetened herbal tea) and regular exercise, because proper breathing and good blood circulation are very important part of detoxification. | <urn:uuid:86f88392-480a-482b-bce4-d4c489fa448f> | {
"date": "2017-11-25T07:46:49",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809695.97/warc/CC-MAIN-20171125071427-20171125091427-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9384853839874268,
"score": 2.578125,
"token_count": 1112,
"url": "http://stayhealthymagazine.com/detox-avoid-the-most-common-mistakes/"
} |
The National Park Service conducts the National Historic Landmarks Program to identify, designate, recognize, and protect buildings, structures, sites, and objects of national significance. These properties commemorate and illustrate the history and culture of the United States. This section explains how the secretary of the interior selects these properties, how they are recognized and protected, and includes a list of the national historic landmarks found in the Lower Mississippi Delta Region study area.
Landmark designation offers advantages to owners who wish to preserve their properties. It aids planning by government agencies, private organizations, and individuals because it is the primary federal means of weighing the national significance of historic properties.
The National Park Service conducts the program for the secretary of the interior. It is a cooperative endeavor of government agencies, professionals, and independent organizations sharing knowledge with the National Park Service and working jointly to identify and preserve national historic landmarks. The Park Service also offers advice and assistance to owners of landmarks. The program is an important aid to the preservation of many outstanding historic places that are not in the national park system.
Designation of National Historic Landmarks
Landmarks are identified by theme and special studies prepared or overseen by NPS professionals. Nominations for designation are then evaluated by the national park system advisory board, a committee of scholars and other citizens. The advisory board recommends properties that should be designated tot he secretary; however, decisions on designations rest with the secretary.
Criteria of National Significance
The following criteria are prescribed for evaluating properties for designation as national historic landmarks. The national park system advisory board applies them in reviewing nominations and in preparing recommendations to the secretary. Studies leading to designation are prepared by historians, archeologists, and anthropologists familiar with the broad range of the nation’s historic and prehistoric sites and themes. The criteria establish the qualitative framework in which comparative analysis of historic properties takes place.
Specific Criteria of National Significance
The quality of national significance is ascribed to districts, sites, buildings, structures and objects that possess exceptional value or quality in illustrating or interpreting the heritage of the United States in history, architecture, archeology, engineering, and culture. They are properties that possess a high degree of integrity of location, design, setting, materials, workmanship, feeling, and association, and:
(1) That area associated with events that have made a significant contribution to, and are identified with, or that outstandingly represent, the broad national patterns of United States history and from which an understanding and appreciation of those patterns may be gained; or
(2) That are associated importantly with the lives of persons nationally significant in the history of the United States; or
(3) That represent some great idea or ideal of the American people; or
(4) That embody the distinguishing characteristics of an architectural type specimen exceptionally valuable for the study of a period, style or method of construction, or that represent a significant, distinctive and exceptional entity whose components may lack individual distinction; or
(5) That are composed of integral parts of the environment not sufficiently significant by reason of historical association or artistic ment to warrant individual recognition but collectively compose and entity of exceptional historical or artistic significance, or outstandingly commemorate or illustrate a way of life or culture; or
(6) That have yielded or may be likely to yield information of major scientific importance by revealing new cultures, or by shedding light on periods of occupation over large areas of the United States. Such sites are those which have yielded, or which may reasonably be expected to yield, data affecting theories, concepts and ideas to a major degree.
Following is a table of national historic landmarks and a table of historic districts found in the Lower Mississippi Delta Region study area. | <urn:uuid:058dde2f-67fc-49c0-85eb-ea58e37b07f7> | {
"date": "2018-07-21T10:29:07",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592475.84/warc/CC-MAIN-20180721090529-20180721110529-00256.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9305099844932556,
"score": 3.71875,
"token_count": 751,
"url": "https://www.nps.gov/locations/lowermsdeltaregion/appendix-b-national-historic-landmarks-and-historic-districts.htm"
} |
News from the University
Conditions right for "conditional" canker diseases
By Dr. Glen Stanosz, Dept. of Plant Pathology, University of Wisconsin-Madison
Canker diseases are caused buy many different fungi that invade the bark, cambium and outer sapwood of the twigs, branches and main stems of trees. The killing of these tissues results in the symptom called a canker, which is the dead, often discolored, swollen or sunken, and cracked area of a stem. Some cankers expand rapidly up and down stems and grow around (or girdle) stems, resulting in death of all portions beyond the canker. Other cankers are localized and may be surrounded by healthy tissue called callus. Some canker pathogens aggressively attack and damage otherwise healthy trees. Many others are common on trees already subjected to factors that have adversely affected tree condition. Such "conditional" canker diseases are likely to become more prevalent and have severe impacts on street and landscape trees stressed by drought.
Conditional canker diseases (also referred to as saprobic canker diseases) often are caused by fungi that might normally be considered weak pathogens. In the otherwise healthy tree, these fungi might not cause disease, or produce only the most minor symptoms such as occasional twig death. When trees are grown outside their natural ranges, planted in poor sites, exposed to extremes in heat or cold, or subjected to defoliation or prolonged drought, however, they may be more aggressively attacked. The tree adversely affected by one of these conditions may be altered to become a better substrate for the growth of the fungus, or morphological and chemical resistance responses may be suppressed. Thus, the "weak" pathogen appears to become more aggressive and induces cankers that cause defect, dieback and even tree death.
A very large number and great variety of fungi associated with street and landscape trees are conditional canker disease pathogens. Several Cytospora and Fusarium species induce cankers of spruces and other conifers, poplars and willows, and maples, for example. Phomopsis species attack a wide range of trees from Douglas-fir to junipers to Russian olive. Diseases caused by numerous Sphaeropsis, Diplodia and Fusicoccum species cause diebacks of conifers and hardwoods, especially following drought or defoliation.
Identification of the cause of a particular conditional canker disease can be a challenge. Many conditional canker pathogens produce their fruiting bodies in abundance on portions of stems they have colonized and killed. These fruiting bodies are usually quite small, however, and may take considerable practice to notice in the field, even with a hand lens. Nonpathogenic fungi also very quickly colonize and produce fruiting bodies in dead tissues. Therefore, microscopic examinations of spores from these reproductive structures often is necessary to confirm the presence and identity of the pathogen. Contact your local government, university or private tree health expert for advice and assistance.
Regardless of the particular pathogen involved, several common measures can be taken to avoid conditional canker diseases and ameliorate their effects on trees. Treatments with fungicides are not usually practical or highly effective in preventing these diseases. But because the fungi that cause conditional canker diseases are responsive to tree conditions, choice of species or cultivar, site selection and planting preparation are very important. Trees should be well adapted to the region and particular location, and provided with adequate room for growth (especially root growth) in good soil. An adequate supply of water is especially important before, during and after transplanting. Protection from defoliating insects and diseases, and supplemental watering during prolonged droughts will avoid development of stress that stimulates conditional canker pathogens. Unnecessary nitrogen fertilization, which can stimulate activity of some conditional canker pathogens in trees and alter the balance between shoot growth and root growth, should be avoided.
If these diseases occur, sanitation pruning is necessary to eliminate the fungus and production of inoculum for further spread within the affected tree and to nearby trees. To avoid spread of fungal spores, pruning should be done in dry weather and tools should be surface-disinfected between cuts. Affected stems should be removed by cleanly cutting them at least six inches below any diseased wood and removed from the site for burning or burial. | <urn:uuid:84d6a504-0a9e-4d7e-8ccb-e6fc438a1a57> | {
"date": "2016-09-24T20:55:22",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659496.36/warc/CC-MAIN-20160924173739-00056-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9494446516036987,
"score": 3.34375,
"token_count": 898,
"url": "http://www.dnr.state.mn.us/fid/jun04/news.html"
} |
Japan’s prime minister Yoshihiko Noda has just completed a two-day visit to South Korea. Noda personally insisted on carrying with him five volumes of the 1,205 royal scrolls confiscated under Japanese colonial rule. Noda spent time with South Korean president Lee Myung-bak, and the tenor of the meeting suggested that the two Northeast Asian neighbors were determined to get their relations back on a more positive footing.
Economic relations were the highlight. Japan and South Korea agreed to a currency swap arrangement that sought to convey to markets that South Korea’s delicate won would have Japanese backing. Likewise, there is talk of Korean encouragement for greater Japanese foreign direct investment, yet another way for Japan to signal its confidence in a vibrant Korean economy.
Yet the real accomplishment was restarting bilateral talks on a Japan-South Korea free trade agreement. The effort to outline an FTA began in December 2003, but talks were suspended in November 2004. Japan was sensitive about its competition in agriculture, while South Korea worried about its auto market. The passage of the Korea-U.S. Free Trade Agreement this month may make this an easier discussion.
Japan’s Democratic Party arrived in power with a commitment to addressing some of the longstanding sore points in the relationship with South Korea, including the return of royal records from Korea’s Joseon Dynasty (1392-1910). Moreover, public sensitivities in Korea during the 100th anniversary of Japan’s occupation of South Korea created a challenge for Tokyo in 2010.
Contemporary security concerns, however, also created new opportunities. Pyongyang’s use of force, first in the Cheonan sinking and then in the shelling of Yeonpyeong Island, raised new fears of a conflict on the peninsula. By December 2010, U.S. secretary of state Hillary Clinton met with South Korean foreign and trade minister Kim Sung-hwan and Japanese foreign minister Seiji Maehara to produce the strongest joint statement of cooperation by the three countries ever. This led to a visit to South Korea for the first time by Japanese minister of defense Toshimi Kitazawa in January 2011, and the agreement to work with South Korea on an Acquisition and Cross-Servicing Agreement that would allow Japanese cooperation in the case of a conflict on the peninsula.
Historical sensitivities re-emerged this year, however, related to the islands claimed by both countries. At one point, South Korea was so incensed that it refused entry to three Japanese conservative lawmakers who wanted to visit the region. When Prime Minister Noda was elected, he too drew Korean wrath for his past statements about the status of Japanese wartime leaders. South Korean ire seemed to wane, however, after Prime Minister Noda clearly stated that he would not reopen the Yasukuni Shrine issue.
This latest round of Japan-ROK summitry comes at an important time in the region’s diplomacy. South Korean president Lee has just returned from a tremendously successful state summit with President Obama, and there are the beginnings of signs of a new push to engage with North Korea on how to stabilize—and denuclearize—the Korean peninsula.
Japan too has great interest in restarting the trilateral conversation with Washington and Seoul. With U.S. secretary of defense Leon Panetta heading for both Tokyo and Seoul this week, Prime Minister Noda and President Lee’s ability to forge a positive and forward-looking agenda for the two U.S. allies will bring new energy to trilateral U.S.-Japan-ROK cooperation. | <urn:uuid:3e8ae47c-86ce-4bdd-8be3-d2df4cd34881> | {
"date": "2015-07-29T02:41:16",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042985647.51/warc/CC-MAIN-20150728002305-00283-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.963219940662384,
"score": 2.578125,
"token_count": 726,
"url": "http://blogs.cfr.org/asia/2011/10/24/prime-minister-nodas-visit-to-seoul/"
} |
The roles of stakeholders in curriculum implementationPresentation Transcript
The Roles ofStakeholders in CurriculumImplementation
1. Learners2. Teachers3. Curriculum Managers and Administrators4. Parents5. Community Members6. Other Stakeholders
1. Learners the very reason a curriculum is developed the ones who are directly influenced by it make or unmake the curriculum by their active and direct involvement the primary stakeholders in the curriculum Since the learners are the primarystakeholders in the curriculum, the universalas well as the individual characteristics of the
students should be considered. Age, gender,physical, mental, emotional development,cultural background, interests, aspirationsand personal goals are some of the factorsthat should be considered in the implement-ation of any curriculum.
2. Teachers the other side of the coin in the teaching learning process his/her primary role is the planning and writing the curriculum a curriculum maker he writes a curriculum daily through a lesson plan, a unit plan or a yearly plan prepares activities for the students to do
addresses the goals, needs, interests of the learners by creating experiences where the students can learn designs, enriches and modifies the curriculum to suit learner’s characteristics as a curriculum developer, they are part of textbook committees, faculty selection boards, school evaluation committees or textbook writers themselves
3. Curriculum Managers and Administrators supervise curriculum implementation, select and recruit new teachers, admit students, procure equipment and materials needed for effective learning plan for the improvement of school facilities and physical plants have a great stake or concern about what kind of curriculum their schools offer and how these are implemented
4. Parents the best supporters of the school, especially because they are the ones paying for their child’s education the power of parents to influence curricula to include instructional materials and school activities is great, such that the success of the curricula would depend on their support
How do parents shape the curriculum andwhy they are considered as stakeholders?1. Effective parental involvement in school affairs maybe linked to parent educational programs which is central to high quality educational experiences of the children.2. The parents involvement extends from the confine of the school to the homes.3. In most schools the Parent Association is is organized.
5. Community Members success in the implementation of the curriculum requires resources the community members and materials in the existing local community can very well substitute for what is needed to implement the curriculum respected community members maybe included in school boards some can become resource speakers they can provide local and indigenous knowledge in school curriculum
6. Other Stakeholders Professional organizations have shown great influence in school curriculum they are asked by curriculum specialists to contribute in curriculum review since they have a voice in the licensure examinations, curriculum enhancement and many more often, professional organization have a better view of the industry where the graduates of the curriculum go.
Some of these organizations are those ofeach profession, like teachers’ organization,lawyers’ organization, medical doctors’association, engineers’ organization and manyothers. On the other hand, since all schools in thecountry, are under the regulation of thegovernment as provided for in the PhilippineConstitution, then the government has a greatstake in curriculum implementation.
The government is represented by the:1. Department of Education (DepEd) for basic education curricula2. Commission on Higher Education (CHED) for the tertiary and graduate education3. The Professional Regulations Commission (PRC)
The DepEd and the CHED have mandatoryand regulatory powers over the implementationof any curricula. PRC has high stake in theschool’s curricula because the graduates of thedifferent tertiary degrees must be certified asprofessionals. PRC through the ProfessionalRegulatory Boards, conducts examinations forsome degree programs like the LicensureExamination for Teachers, Accountants, Dentists,Engineers and Nurses among others while the
ssSupreme Court has a professional barexamination to certify lawyers and the PhilippineMedical Association through its Medical Board ofExaminers conducts medical board exams forthe licensure examination for doctors. | <urn:uuid:01ea6f86-88ed-4c05-b7f9-63d4c1c50c75> | {
"date": "2014-07-23T16:47:29",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997880800.37/warc/CC-MAIN-20140722025800-00160-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9463858008384705,
"score": 3.109375,
"token_count": 843,
"url": "http://www.slideshare.net/lourise/the-roles-of-stakeholders-in-curriculum-implementation"
} |
Fifty-three years ago, on this day the 2nd September in 1960, the Tibetan democratic system formally came into existence with the first directly elected representatives taking oath of office in accordance with the advice and wishes of Tibetan people’s supreme leader His Holiness the Dalai Lama, who believed that Tibet should follow the democratic system which was congruent with the general trend of the modern world. It is also more than two years since His Holiness the Dalai Lama devolved all the political and administrative authority to the people’s elected leaders. During this period, constant endeavour was made and continues to be so primarily to advance the Tibetan people’s struggle for truth and improve the efficiency of the main as well as the branch offices of the Central Tibetan Administration. These are a sign clearly indicating that the Central Tibetan Administration will be able to sustain firmly with progress and development until the issue of Tibet remains unresolved. However, all the Tibetan people must, as per the wishes of His Holiness the Dalai Lama, strive ceaselessly to improve the efficiency and progress of this fully democratic Administration.
More than 54 years have elapsed since the whole of Tibet was forcibly occupied by Communist China. During these years China has used various devious and coercive methods to completely destroy the Tibetan identity, religion, culture, language, custom, etc with the evil design of transforming Tibet into a Chinese land. Tibetan people are oppressed and discriminated. Tibet’s environment is being destroyed in every respect. Moreover, the Chinese government has carried out repressive measures against the Tibetan people, who with unwavering loyalty to His Holiness the Dalai Lama and adhering firmly to the unchanging Tibetan national spirit have opposed the Chinese government by expressing their resentment to the above policies. Through various campaigns against the authorities. Due to these repressive policies, so far, 120 Tibetan men and women have self-immolated themselves as a peaceful protest from 2009 till date, thus giving rise to the urgent situation. However, the Chinese government has not shown any understanding of its responsibility of probing into the demands and aspirations of the self-immolators. In addition, the Chinese government has humiliated the self-immolators; falsely implicated His Holiness the Dalai Lama and the Central Tibetan Administration for instigating them; attempted to conceal incidents of self-immolation from leaking out; imposed severe restriction in towns and monasteries which are the main sites of self-immolation; innocent relatives are accused, arrested and imprisoned; and are accused of murder for which some are even given death sentences. Such mistreatment and torture continues to be perpetrated. Therefore, contrary to respecting and maintaining the human rights of the Tibetan people, the Chinese government continues to carry out actions, totally disregarding all the appeals made by nations, leaders and organizations who value democracy, freedom, truth and justice.
Recently, Mr. Yu Zhengsheng, Chairman of National Political Consultative Committee and Member of Standing Committee of Political Bureau of the Government of the People’s Republic of China visited Tibet for inspection. At the time he said that the Dalai Lama’s demand for ‘Greater Tibet’ and ‘high degree of autonomy’ contravenes China’s constitution and regional national autonomy law, adding further that such demands breach the basic interest of Tibetan Buddhism. His Holiness the Dalai Lama and the Central Tibetan Administration have strifed for genuine autonomy for all Tibetans as per the provisions contained in the PRC constitution and autonomy law, which clearly spell out the right to regional ethnic autonomy. To say that this breaches the constitution clearly exposes the insincerity, hypocrisy and true face of Chinese communist autocrats who are illegally destroying Tibetan race, religion and culture. No prove is given which would suggest the breach of the PRC constitution. The Central Tibetan Administration has repeatedly explained to the Chinese government the essence of the mutually beneficial Middle Way Policy, which is based upon the coexistence of the two communities within the framework of PRC constitution and the entitlement of equal rights and prerogatives to the Tibetan people as is enjoyed by the other national minorities. However, the Chinese leaders have not only interpreted this incorrectly as breaching the constitution, the Tibetan people’s aspiration is intentionally misinterpreted as secessionist. This kind of publicity is a total disregard to all and opposed to the truth; a misrepresentation of reality and a shameless version of astonishing proportions.
Under the so-called policy of helping Tibetan monks, nuns and monasteries, the Chinese government has been forcing the monasteries to fly the Chinese National flag, display portraits of Chinese leaders and purposely carries out activities such as the resented ‘patriotic education’, purposely setting up of radio and television connections, in the monasteries for which are a source of disturbance to religious studies and meditation. For example, a total number of 6575 Chinese cadres have been stationed in 1787 monasteries in the so-called Tibet Autonomous Region alone. These cadres are used for the political objectives of the Chinese government. Such acts must be stopped and reforms must be carried out.
Since 1 July this year, an exhibition distorting the history of former resident Amban or Chinese Representative in Tibet has been on display, thus spreading lies to the domestic and international tourists and visitors. Likewise, the so-called ‘genuine background drama Wenchen-Kunjo has been performed in Lhasa beginning 1st August of this year for which the Chinese government has invested millions of dollars. This is a performance aimed at political necessity to indoctrinate and distort history. Therefore, people of the world including Tibetans and Chinese must be careful not to fall a prey to such deceit and enticement.
Safeguarding the ecology of Tibet is not only in the interest of Tibet and China, it is also linked to the lives of several hundred million sentient beings spread across the eastern and northern parts of the world. It has become a subject of major interest by global environmentalists and meteorologists. But, the Chinese government, on one hand, continues calling for building Tibet and strengthening of environment protection along with long-time stability, development and aid to challenge the opponents. On the other hand, every possible measure is taken to remove Tibetan nomads in order to facilitate the extraction of Tibet’s natural resources which is transforming the very appearance of the land. Implementing the so-called ‘Three-Red- Lines’ strategy as a principle for the extraction of minerals everywhere, the Chinese government has set up mines in all parts of Tibet to extract valuable minerals such as gold, silver, copper, iron and many other minerals. Huge amounts of Tibet’s mineral products and natural resources are transported to China. To fulfill the need of population transfer, the so-called Tibet -Tsongon railway is being expanded and new direct railway tracks are being laid from the railway station of NaGormo to many cities of China. Another project expanding the railway line from Lhasa to other parts of Tibet has been started. Similarly, under the pretext of modernization and development, numerous dams have been built and continue to be constructed in all parts of Tibet. Consequences of these will befall the globe in general, specially South-East Asia, and particularly severe damage will be caused to Tibet’s ecology and protection of Tibetan identity. It is therefore important for everyone to pay due attention to these activities.
Moreover, local Tibetan people of Tsongon, Yulshul and Zatoe counties have been living under critical situation since 12th August, 2013 following severe incidents of suppression unleashed on them in response to their lawful protests against the planned mining of white diamonds. As such, we firmly appeal to the Chinese government to respect the dignity and aspirations of the Tibetan people by immediately putting an end to repression and mining.
This year severe restriction was imposed in the Tibetan areas of Tawu, Kardze, Lithang, Drakgo, Golok Tawo, Labrang, Machu, Chabcha, Kumbum monastery, etc during the celebration of the 78th birthday of His Holiness the Dalai Lama. Particularly, when the monks and nuns of Nyatso and Gaden Choeling in Tawu together with Tibetan people of the locality were performing the incense offering ceremony on top of Machen Pomra Mountain as part of the birthday celebrations, four Chinese police vans and seven military trucks arrived at the site. Without listening to the explanation given by the Tibetan people, the Chinese police began beating and shots were fired against the gathering.
Similarly, Lama Dawa Rinpoche of Gaden Dargyeling monastery in Nagchu Shagrongpo was accused of maintaining communication with His Holiness the Dalai Lama over the reincarnation of Rongpo Choeje. The monastery was suppressed leading to the detention of monk officials, closure of the monastery, suicide of a monk, etc. These incidents clearly prove that the Chinese policy of religious freedom is a mere empty word.
The unbearable critical situation and problems faced by Tibetans inside Tibet, literally making days and nights extremely difficult to pass is caused, firstly, by the lack of democratic system in Tibet and China till date, and secondly, by the few hardline Chinese leaders. For Tibetans living in foreign countries, including India, it is a matter of great joy that they are able to enjoy a high degree of genuine democracy. Still, we need to tread forward in order to progress higher and higher. It may be pointed out that preparations be made in earnest to present this excellent system of democracy as a gift when Tibetans inside and outside are reunited after a solution to the Tibetan problem is found.
More than fifty-four years have passed since we sought refuge in India and other foreign countries. Especially, India has become like a second home for us. We are profoundly grateful for the extensive aid and protection provided by the people and government of India. Remembering and cherishing forever the kindness and seizing the opportunity provided by this auspicious occasion, we would like to express our heartfelt gratitude to both the people and government of India, and to the global leaders, nations, Tibet Support Groups as well as individuals who have been steadfastly supporting Tibet.
Pursuant to the profound advise continuously given by Tibet’s leader His Holiness the Dalai Lama, we are appealing to all the Tibetan people in exile to develop and maintain strong friendly relations with the people of host nations, thereby contributing to the Tibetan people’s reputation, dignity and security.
In conclusion, we sincerely pray that His Holiness the Dalai Lama live for as long as hundreds of aeons; may all His sacred wishes be fulfilled with spontaneity; and may the just cause of Tibet sees its fruition as swiftly as possible.
TIBETAN PARLIAMENT IN-EXILE
2 September, 2013 | <urn:uuid:ca1ef1ca-29ae-4f52-9195-2efa7eba8438> | {
"date": "2017-10-23T22:33:36",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826840.85/warc/CC-MAIN-20171023221059-20171024001059-00156.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9543548226356506,
"score": 2.765625,
"token_count": 2206,
"url": "http://tibetanparliament.org/statement-of-tibetan-parliament-in-exile-on-53rd-tibetan-democracy-day/"
} |
A Christmas Carol, by Charles Dickens
Stave 1 - Marley's GhostThis abridged version was edited for public reading by Theresa Race Hoffman. This version Copyright © 2006 by Theresa Race Hoffman. All Rights Reserved.
MARLEY was dead: to begin with. Old Marley was as dead as a door-nail. This must be understood, or nothing wonderful can come of the story I am going to relate.
Scrooge never painted out Old Marley’s name, though his old partner was – definitely - dead. The company was known as Scrooge and Marley. Sometimes people called Scrooge Scrooge, and sometimes Marley, but he answered to both names. It was all the same to him.
Oh! Scrooge was a selfish old sinner! And he didn’t thaw one degree at Christmas.
One dark Christmas Eve, old Scrooge sat busy in his counting-house. It was biting, foggy weather.
Scrooge had a very small fire. But his clerk’s poor fire was barely warm.
“Merry Christmas, uncle!” Scrooge’s nephew came into the room.
“Bah!” said Scrooge, “Humbug!”
“Christmas a humbug, uncle!” he said. “You don’t mean that?”
“If I could work my will,” said Scrooge indignantly, “every idiot who goes about with ‘Merry Christmas’ on his lips, should be boiled with his own pudding, and buried with a stake of holly through his heart!”
The nephew answered, “Don’t be angry, uncle. Come for Christmas to-morrow.”
“Why cannot we be friends?” cried Scrooge’s nephew. “Merry Christmas, uncle!”
“Good-bye!” said Scrooge.
His nephew even stopped to wish “Merry Christmas” to the clerk.
“My clerk, “muttered Scrooge, “fifteen shillings a week, and a wife and family, talking about a merry Christmas. Humbug!”
Scrooge’s nephew had let two other people in. They bowed to him.
“Mr. Scrooge, or Mr. Marley?” said one of the gentlemen.
“Mr. Marley,” Scrooge replied, “died seven years ago, this very night.”
“Mr. Scrooge,” said the gentleman, “a few of us are going to buy the Poor some meat and drink, and means of warmth. What would you like to give?”
“Nothing,” said Scrooge. “They can go to debtors’ prisons.”
“Many would rather die.”
“If they would rather die,” said Scrooge, “they had better do it, and decrease the surplus population. Good afternoon, gentlemen!”
Scrooge went back to his work.
Meanwhile the fog and darkness and biting cold thickened. One cold young boy stooped down at Scrooge’s keyhole to sing a Christmas carol: but at the first sound of
May nothing you dismay!”
Scrooge jumped up so, that the singer fled in terror, leaving the keyhole to the fog.
At length the hour of shutting up arrived. Scrooge nodded to the clerk, who instantly snuffed his candle out, and put on his hat.
“You’ll want all day to-morrow, I suppose?” said Scrooge.
The clerk observed that it was only once a year.
“A poor excuse for picking a man’s pocket every twenty-fifth of December!” said Scrooge. “Be here all the earlier next morning.”
Scrooge went home to his gloomy house. The yard was dark and the fog and frost hung about the house.
Now, the knocker on his door was very large and ordinary. But tonight it looked like - Marley’s face.
Marley’s face. The eyes were wide open, and its grayish colour made it horrible.
As Scrooge looked, it became a knocker again. He did look carefully, but there was nothing behind the door, so he said “Pooh, pooh!” and closed it with a bang.
He closed his door and double-locked himself in. He walked through his rooms to see that all was right and sat by the fire.
“Humbug!” he said. And then he heard it - a clanking noise, from the cellar, as if some person were dragging a heavy chain.
The cellar-door flew open with a booming sound, and then he heard the noise coming up the stairs; then straight towards his door.
“Humbug!” said Scrooge.
It came on through the heavy door, and passed into the room before his eyes.
“What do you want with me?” said Scrooge. “Who are you?”
“In life I was your partner, Jacob Marley.”
“Humbug, I tell you! humbug!”
At this the spirit raised a frightful cry, and shook its chain. Scrooge fell upon his knees.
Asked the Ghost, “Do you believe in me or not?”
“I do,” said Scrooge. “I must. But why do spirits walk the earth, and why do they come to me?”
“It is required of every man,” the Ghost returned, “that the spirit within him should walk abroad among his fellowmen,; and if that spirit does not go forth in life, it is condemned to do so after death!”
“You are chained,” said Scrooge, trembling. “Tell me why?”
“I wear the chain I forged in life,” replied the Ghost. “I made it link by link, and yard by yard; and of my own free will I wore it.” Scrooge trembled more and more.
“Do you know,” pursued the Ghost, “your chain was as heavy as this, seven Christmas Eves ago? You have made it longer, since then.”
“But you were always a good man of business, Jacob,” faltered Scrooge.
“Business!” cried the Ghost, wringing its hands again. “Mankind was my business. Kindness was my business!”
“I am here to-night to warn you,” pursued the Ghost. You will be haunted by Three Spirits.”
“Expect the first to-morrow,” said the Ghost, “when the bell tolls One.”
“Expect the second on the next night at the same hour. The third upon the next night at the last stroke of Twelve.”
When it had said these words, the spectre floated out upon the bleak, dark night.
The air was filled with moaning phantoms, and every one of them wore chains like Marley’s Ghost. They faded away. Scrooge closed the window, and examined the door by which the Ghost had entered. It was still as he had double-locked, with his own hands. He tried to say “Humbug!” but stopped. And he went straight to bed and fell asleep upon the instant.
Note: Family Christmas Online™ is a trademark of Breakthrough Communications(tm) (www.btcomm.com).
All information, data, text, and illustrations on this web site are Copyright (c) 2006, 2007 by Paul D. Race.
Reuse or republication without prior written permission is specifically forbidden.
For more information, please contact us
Counter Reset 12/08/2006 | <urn:uuid:46e5e64b-e21f-48ac-8bcf-be76146a0fdb> | {
"date": "2015-10-07T02:28:35",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736680773.55/warc/CC-MAIN-20151001215800-00180-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9734001755714417,
"score": 2.875,
"token_count": 1761,
"url": "http://www.familychristmasonline.com/stories_other/a_christmas_carol/very_shortened_text/very_shortened_carol_stave1.htm"
} |
Gold cyanidation - WikipediaGold cyanidation is a hydrometallurgical technique for extracting gold from low-grade ore by converting the gold to a water-soluble coordination complex. It is the most commonly used leaching process for gold extraction. Production of reagents for mineral processing to recover gold, copper,.gold mining chemical equation process,Gold Cyanidation Process - 911 MetallurgistApr 16, 2017 . To have the desired reaction take place, there must be enough cyanide present to dissolve all of the mineral. To have the necessary chemical reaction take place, oxygen must be added. To accomplish this, air is bubbled through the solution of cyanide and slurry. As you learned earlier in the flotation.
Comments About gold mining chemical equation process
gold mining chemical equation process,
The Metallurgy of Cyanide Gold Leaching – An Introduction
Oct 20, 2014 . A paper published by L. Elsner in 1846 first correctly identified the chemical reaction that forms the basis of all gold cyanide leaching processes: 4 Au + 8 NaCN + O2 + 2 H2O → 4 Na[Au(CN)2] + 4 NaOH. The equation is well known, but the successful application of this reaction in a gold mining operation is.
Cyanide Leaching Of Gold - Mine Engineer.Com provides mining .
information on cyanide leaching of gold leach plants. . These "extra" elements in the mineral compounds will often play havoc with a chemical reaction, as illustrated above. Copper is definitely worth . One is the Merrill-Crowe zinc precipitation process and the other is the adsorption of the gold onto activated carbon.
GOLD EXTRACTION PROCESS USING MERCURY
Partie 2 : Gold extraction process using cyanide leaching (durée 2 h). Partie 3 : Bioleaching of . Located in Peru at 5,500 m above sea level, La Rinconada is the highest gold mine in the world. Watch this video to see how .. Question 4 : Write the balanced equation of the dissociation of the acid. Question 5 : The control of.
What is the role of cyanide in mining | MiningFacts
Cyanide is the general term for chemicals which contain a cyano group (triple-bonded carbon and nitrogen with the chemical formula CN) that occur naturally or are . The process used to extract gold using cyanide was developed in Scotland in 1887, and was first used in large scale commercial mining by the New.
gold mining chemical equation process,
Gold processing | Britannica
Gold processing, preparation of the ore for use in various products. For thousands of years the word gold has connoted something of beauty or value. These images are derived from two properties of gold, its colour and its chemical stability. The colour of gold is due to the electronic structure of the gold atom, which absorbs.
Gold cyanidation - Wikipedia
Gold cyanidation is a hydrometallurgical technique for extracting gold from low-grade ore by converting the gold to a water-soluble coordination complex. It is the most commonly used leaching process for gold extraction. Production of reagents for mineral processing to recover gold, copper,.
Extraction of gold using cyanide - NZQA
Extraction of gold using cyanide. Gold is found in very low concentrations in the ore from which it is mined. To collect the gold from the ore it needs to be separated from the other minerals in the ore. To do this the gold needs to be made into a soluble form so that it can be separated from the other minerals as gold is.
chemical equation chinagrindingmill - Ore machinery manufacturing .
chemical processing gold mines in arizona BINQ Mining. Dec 15, 2012 · chemical processing gold mines in arizona. gold ore processing chemical equation chinagrindingmill. What is the chemical formula. 4.6/5(3.6K)Chat+.
Extracting Gold | HowStuffWorks
Leaching dissolves the gold out of the ore using a chemical solvent. The most common solvent is cyanide, which must be combined with oxygen in a process known as carbon-in-pulp. As the cyanide and oxygen react chemically, gold in the pulp dissolves. When workers introduce small carbon grains to the tank, the gold.
Gold Mining in Waihi - New Zealand Institute of Chemistry
electricity almost as well as silver. Gold is obtained by mining gold ore and then extracting the gold from it in a three step process as follows. Step 1 - Leaching . the normally unreactive elemental gold to be oxidised by the oxygen. This Au. + then forms a complex with the cyanide. The overall reaction occuring is as follows:.
The cyanide leaching process | Bodie
The remainder was dumped into large piles (these piles were called 'tailings') and left as a by-product of mining. Then the “cyanide leaching process” was developed. Mixing the tailings with a cyanide solution, or simply spraying the tailings with a cyanide solution, would cause a chemical reaction to take place. When gold.
Artisanal and Small-Scale Gold Mining Without Mercury - EPA
Gold Recovery. Direct Smelting; Chemical Leaching. Resources. In many countries, elemental mercury is used in artisanal and small-scale gold mining. Mercury is mixed with gold-containing materials, forming a mercury-gold amalgam which is then heated, vaporizing the mercury to obtain the gold. This process can be.
Dynamic simulation of the carbon-in-pulp and carbon-in-leach .
Metal recovery or concentration by adsorption on activated carbon has been the dominant process for gold extraction after leaching by cyanide in aerated alkaline .. chemical specie on a substrate in a closed reactor and at constant temperature can be described by equilibrium isotherms, which are empirical equations that.
Level 3 Chemistry internal assessment resource - NCEA on TKI
Write a report that demonstrates an understanding of the chemical processes involved in the extraction of gold from ore using cyanide and the consequences of . describe the chemical processes involved including appropriate chemistry vocabulary, symbols, conventions and equations to give an account of the chemical.
Cyanide Chemistry | International Cyanide Management Code (ICMI .
The process of extracting gold from ore with cyanide is called cyanidation. The reaction, known as Elsner's Equation, is: 4 Au + 8 CN- + O2 + 2 H2O = 4 Au(CN)2- + 4 OH-. Although the affinity of cyanide for gold is such that it is extracted preferentially, cyanide will also form complexes with other metals from the ore, including.
SESSION 14: CHEMICAL SYSTEMS Key Concepts X-planation
Gold mining. • Mining iron. • Phosphate mining. • Energy sources. X-planation. EXPLOITING THE LITHOSPHERE. • The lithosphere is the rocky outer layer of . 3. No chemical reaction needed, only heating. Gold - Au. 1. ELECTROLYSIS. Electrolysis is the splitting of a substance by running electric current through it, and it is.
gold mining chemical equation process,
Chemical ore processing of silver
Dec 5, 2016 . Now chatting: .leawaysschool/solution Contact Us: .leawaysschool gold ore chemical processing methods gold ore chemical proc.
How to Use Bleach on Gold Ore to Remove Gold | Sciencing
Apr 24, 2017 . Bleach is the chemical compound sodium hypochlorite. When combined with hydrochloric acid, the mixture produces chlorine that dissolves gold from gold ore. This was the first . and bleach. This is an exothermic process, meaning that the flask containing the acid-and-bleach mixture becomes very hot.
How to Extract Gold From Electronics: 11 Steps (with Pictures)
Aug 13, 2014 . Although this method of gold extraction calls for chemicals, that doesn't mean they are safe. Please be advised that you must handle these chemicals with care. Goggles, gloves, glass apparatus and a very well ventilated room with a fume hood (and a gas mask/respirator are needed as well) or.
Heavy Metal Pollution from Gold Mines: Environmental Effects and .
Oct 26, 2016 . The equation below explain how cyanide dissolves gold: 4Au(s) + . This is summarized in the equations below using pyrite as a typical example of gold bearing ores: 4Fe2+ + O2 + .. Another source of environmental pollution from gold mines is the chemicals used in processing the gold. An estimated.
Microwave Pretreatment for Thiourea Leaching for Gold . - MDPI
Oct 1, 2017 . Gold Concentrates. The gold concentrate (38–45 µm) was obtained through the flotation process from an operating gold mine (Haenam, Korea). Mineral composition of the gold ... Örgül, S.; Atalay, Ü. Reaction chemistry of gold leaching in thiourea solution for a turkish gold ore. Hydrometallurgy 2002, 67.
Fast and Effective Gold Leaching from a Desulfurized Gold Ore .
Nov 1, 2013 . The effects of various leaching conditions for gold extraction from sulfur-containing gold ore using acidic sodium chlorate solution were investigated. The contents of gold and sulfur from the ore were 55.7 g/ton and 11.67 wt %, respectively. It was found that the presence of sulfur greatly inhibited gold.
US4557759A - Iodine leach for the dissolution of gold - Google .
A process for the hydrometallurgical recovery of gold from materials containing gold comprising leaching the materials with a lixiviant containing iodine. . The oxidation of sulfide minerals or other iodine reducing species in the ore zone contacted by the iodine-bearing lixiviant yields iodide as a reaction product. | <urn:uuid:6f26ae56-a6c1-406e-8584-840e5312d09f> | {
"date": "2019-01-22T11:28:24",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583835626.56/warc/CC-MAIN-20190122095409-20190122121409-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.911942720413208,
"score": 3.296875,
"token_count": 2091,
"url": "http://rainbowgroups.org/4308_gold-mining-chemical-equation-process.html"
} |
Why get vaccinated?
These vaccines can protect your baby from childhood diseases:
- Signs and symptoms include a thick coating in the back of the throat that can make it hard to breathe.
- Diphtheria can lead to breathing problems, paralysis and heart failure.
- About 15,000 people died each year in the U.S. from diphtheria before there was a vaccine.
- Signs and symptoms include painful tightening of the muscles, usually all over the body.
- Tetanus can lead to stiffness of the jaw that can make it difficult to open the mouth or swallow.
- Tetanus kills 1 person out of every 5 who get it.
Pertussis (Whooping Cough)
- Signs and symptoms include violent coughing spells that can make it hard for an infant to eat, drink, or breathe. These spells can last for several weeks.
- Pertussis can lead to pneumonia, seizures, brain damage, or death.
Hib (Haemophilus influenzae type b)
- Signs and symptoms can include fever, headache, stiff neck, cough, and shortness of breath. There might not be any signs or symptoms in mild cases.
- Hib can lead to meningitis (infection of the brain and spinal cord coverings); pneumonia; infections of the blood, joints, bones, and covering of the heart; brain damage; and deafness.
- Before there was a vaccine, Hib disease was the leading cause of bacterial meningitis in children under 5 years of age in the U.S.
- Signs and symptoms include tiredness, diarrhea and vomiting, jaundice (yellow skin or eyes), and pain in muscles, joints and stomach. But usually there are no signs or symptoms at all.
- Hepatitis B can lead to liver damage, and liver cancer. Some people develop chronic (long term) hepatitis B infection. These people might not look or feel sick, but they can infect others.
- Hepatitis B can cause liver damage and cancer in 1 child out of 4 who are chronically infected.
- Signs and symptoms can include flu-like illness, or there may be no signs or symptoms at all.
- Polio can lead to permanent paralysis (can't move an arm or leg, or sometimes can't breathe) and death.
- In the 1950s, polio paralyzed more than 15,000 people every year in the U.S.
- Signs and symptoms include fever, chills, cough, and chest pain.
Pneumococcal disease can lead to meningitis (infection of the brain and spinal cord coverings), blood infections, ear infections, pneumonia, deafness, and brain damage.
These diseases are much less common than they used to be. But the germs that cause them still exist, and even a disease that has almost disappeared will come back if we stop vaccinating. This has already happened in some parts of the world. When fewer babies get vaccinated, more babies get sick.
Babies usually catch these diseases from other children or adults, who might not even know they are infected. A mother with Hepatitis B can infect her baby at birth. Tetanus enters the body through a cut or wound; it is not spread from person to person.
Five childhood vaccines can protect your baby from these seven diseases:
Your healthcare provider might offer some of these vaccines as combination vaccines—several vaccines given in the same shot. Combination vaccines are as safe and effective as the individual vaccines, and can mean fewer shots for your baby.
Some children should not get certain vaccines:
Most children can safely get all of these vaccines. But there are some exceptions:
- A child who is sick on the day vaccinations are scheduled might be asked to come back for them at a later date.
- Any child who had a life-threatening allergic reaction after getting a vaccine should not get another dose of that vaccine. A child who has a severe (life-threatening) allergy to a substance should not get a vaccine that contains that substance. Some of these vaccines contain neomycin, streptomycin, yeast, lactose, sucrose, or latex.
Tell your doctor if your child has any severe allergies, or has ever had a severe reaction after any vaccination.
Talk to your doctor before your child gets…
- …DTaP vaccine, if your child ever had any of these reactions after a previous dose of DTaP:
- A brain or nervous system disease within 7 days,
- Non-stop crying for 3 hours or more,
- A seizure or collapse,
- A fever of over 105°F.
- …Polio vaccine, if your child has a severe allergy to the antibiotics neomycin, streptomycin or polymyxin B.
- …Hepatitis B vaccine, if your child has a severe allergy to yeast.
- …PCV13 vaccine, if your child has a severe allergy to yeast, or ever had a severe reaction after a dose of DTaP (or other vaccine containing diphtheria toxoid), or after a dose of PCV7, an earlier pneumococcal vaccine.
Risks of a Vaccine Reaction:
Vaccines, like medicines, can cause side effects.
Most vaccine reactions are not serious: tenderness, redness, or swelling where the shot was given; or a mild fever. These occur soon after the shot is given and go away within a day or two. They happen with up to about half of vaccinations, depending on the vaccine.
Polio, Hepatitis B and Hib Vaccines have been associated only with these kinds of mild reactions.
Other childhood vaccines have been associated with additional problems:
- Mild Problems: Fussiness (up to 1 child in 3); tiredness or poor appetite (up to 1 child in 10); vomiting (up to 1 child in 50); swelling of the entire arm or leg for 1-7 days (up to 1 child in 30)—usually after the 4th or 5th dose.
- Moderate Problems: Seizure (1 child in 14,000); non-stop crying for 3 hours or longer (up to 1 child in 1,000); fever over 105°F (1 child in 16,000).
- Serious problems: Long term seizures, coma, lowered consciousness, and permanent brain damage have been reported following DTaP vaccination. These reports are rare.
- Mild Problems: Drowsiness or temporary loss of appetite (about 1 child in 2 or 3); fussiness (about 8 children in 10).
- Moderate Problems: Fever over 102.2°F (about 1 child in 20).
Problems that could happen after any vaccine:
- Brief fainting spells can happen after any medical procedure, including a vaccination. Sitting or lying down for about 15 minutes can help prevent fainting, and injuries caused by a fall.
- Severe shoulder pain and reduced range of motion in the arm where a shot was given can happen, very rarely, after a vaccination.
- Severe allergic reactions from a vaccine are very rare, estimated at less than 1 in a million doses. If one were to occur, it would usually be within a few minutes to a few hours after the vaccination.
As with any medicine, there is a very remote chance of a vaccine causing a serious injury or death.
The safety of vaccines is always being monitored. For more information, visit: www.cdc.gov/vaccinesafety/.
What if there is a serious reaction?
What should I look for?
- Look for anything that concerns you, such as signs of a severe allergic reaction, very high fever, or behavior changes.
- Signs of a severe allergic reaction can include hives, swelling of the face and throat, difficulty breathing, a fast heartbeat, dizziness, and weakness. These would usually start a few minutes to a few hours after the vaccination
What should I do?
- If you think it is a severe allergic reaction or other emergency that can't wait, call 9-1-1 or get the person to the nearest hospital. Otherwise, call your doctor.
- Afterward, the reaction should be reported to the Vaccine Adverse Event Reporting System (VAERS). Your doctor should file this report, or you can do it yourself through the VAERS web site at www.vaers.hhs.gov, or by calling 1-800-822-7967. VAERS does not give medical advice.
The National Vaccine Injury Compensation Program
The National Vaccine Injury Compensation Program (VICP) is a federal program that was created to compensate people who may have been injured by certain vaccines.
Persons who believe they may have been injured by a vaccine can learn about the program and about filing a claim by calling 1-800-338-2382 or visiting the VICP website at www.hrsa.gov/vaccinecompensation. There is a time limit to file a claim for compensation.
How can I learn more?
- Ask your doctor.
- Call your local or state health department.
- Contact the Centers for Disease Control and Prevention (CDC):
Your Baby's First Vaccines; 10/22/2014; 42 U.S.C. § 300aa-26 | <urn:uuid:6b9b28ae-ef03-405d-9b77-4c5d77acd1d7> | {
"date": "2014-11-24T05:13:04",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380394.54/warc/CC-MAIN-20141119123300-00144-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9323663711547852,
"score": 3.390625,
"token_count": 1940,
"url": "http://www.healthychildren.org/English/safety-prevention/immunizations/Pages/Your-Babys-First-Vaccines.aspx"
} |
Kindergarten Education system of Canada
Generally the education in Canada begins from Kindergarten. In two province of Canada named Ontario and British Columbia, Junior Kindergarten education system is also provided. In some of the areas of Canada there is also no need of Kindergarten education and in some areas of Canada, kindergarten education systems are not available. According to the rules a five years old child will be admitted in Kindergarten.
About the Author
Write a Comment
Gravatars are small images that can show your personality. You can get your gravatar for free today!
You must be logged in to post a comment. | <urn:uuid:0cd1ce19-d490-46ab-a61d-b6fa74ae78fe> | {
"date": "2016-09-30T10:01:03",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662159.54/warc/CC-MAIN-20160924173742-00282-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9418020248413086,
"score": 2.546875,
"token_count": 131,
"url": "http://study.result.pk/kindergarten-education-system-of-canada/"
} |
I liked your column about homemade cleaning products. I have a question, though: What’s up with baking soda? It’s frequently bandied about as an eco-friendly cleaner, but I have no idea what it is, where it comes from, or how it’s made.
Baking soda is sodium bicarbonate, a naturally occurring crystalline compound. I can be unusually precise about where it comes from: Green River, Wyo.
Turns out Wyoming holds the world’s largest reserves of trona, otherwise known as sodium sesquicarbonate — a key ingredient in your mysterious household staple. An estimated 100 billion tons or more sit right there under the high-steppe desert. Almost all baking soda made in the U.S. comes from there, and a quarter of the world’s supply too.
Trona room-and-pillar mining — picture miners standing in a sort of underground city — is a mainstay of the Sweetwater County economy, employing more than 2,000 Wyomingites. The ore is removed with boring equipment, then processed into soda ash. The ash — which can also be used to make glass, bread, and paper — is dissolved in water and bubbled with carbon dioxide, forming sodium-bicarbonate crystals. The crystals are harvested by little gnomes and packaged for delivery to a grocery store near you.
Here, because I know you are wondering, is the most pressing environmental concern I have found associated with trona mining: the wastewater is very salty, and when it is piped away to a holding pond, it can make the birds that visit said pond fall sick, and sometimes drown. I will let you decide for yourself whether this scourge is worth fretting about.
Now, as for the cleanser bandying, we can chalk that up to the magic of crystal alkalinity. Our messes and stinks often have an acidic component: there are fatty acids in grease and dirt, and unpleasant smells like sour milk have acidic sources. Chemically basic baking soda neutralizes these acids, which is why the smell goes away. It’s also a crystal, so it scrubs, but is soft and dissolves in water, so it doesn’t scratch. It’s amply present in our environment and our bodies to begin with, and appears to be nontoxic (although it should be kept away from the little ones). We use it for leavening and eat it. It is basically yummier dirt.
Baking powder, by contrast, combines baking soda (a base) and cream of tartar (an acid), which react together when moistened and produce carbon-dioxide bubbles. It’s not so effective for cleaning, since it doesn’t cancel out acid and doesn’t scrub well. But it sure comes in handy when we whip up our famous Grist biscuits. | <urn:uuid:6dac453b-35fa-40cc-ad78-3369cb4cd6a3> | {
"date": "2017-06-29T14:14:42",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329344.98/warc/CC-MAIN-20170629135715-20170629155715-00657.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9411004781723022,
"score": 2.625,
"token_count": 604,
"url": "http://grist.org/living/umbra-bakingsoda/"
} |
The HISTORIES OF CLEVELAND provide evidence of different intentions on the part of their authors. A general, if imperfect, trend can be described, leading from celebratory, even "boomerish," full-scale general histories to more limited analyses of specific historical segments. There have also been differences in authors' expectations of audiences, ranging from sophisticated history for an educated elite, to history intended for school use, to more popular accounts—with or without illustrations sufficient to merit ascription as "coffee-table" books. At the same time, attitudes and assumptions within the historical profession about the significance of local history have changed. In mid-19th-century America, when the first history of Cleveland was published, local and regional history was a respected field of endeavor. However, in the 20th century local history came to be considered fit only for amateurs and antiquarians: supposedly, serious historians needed at least the national canvas to frame significant questions about the past. Then, with the development of the "new" social history, local arenas again seemed particularly appropriate, as testing grounds for many historical hypotheses.
The economics of publishing have also determined the nature of the city's histories. With sales usually limited to interested residents, local histories traditionally depended on subsidies as well as sales. Some, if not most, pages of the older multivolumed histories of Cleveland are devoted to biographical sketches and/or photographs of significant subscribers. Corporate public-relations efforts are visible in recent popular histories in the inclusion of sketches of the commercial or industrial enterprises which provided funding. In all, there appear to have been 3 more or less distinct eras of writing and publishing histories of Cleveland: 1) the pioneer period (the second half of the 19th century), "between Whittlesey and Kennedy," in which talented men and women—though not professional historians—laid down the basic political and economic narrative about the city's past; 2) the first half of the 20th century, "from Orth to Rose," in which historians and others continued to produce general histories of the city, incrementally adding length to the narrative and increasing attention to cultural and social history; 3) since 1950—or "since Rose"—no full-scale documented general history of Cleveland has been published. Popular accounts continued to appear, as did monographs and studies of specific topics.
Before describing the histories and historians of these eras, a note should be added about other sources of Cleveland history. Sometimes very substantial information about Cleveland's past was incorporated into histories of the county, region, or state. Examples are histories of Cuyahoga County, such as Crisfield Johnson, comp., History of Cuyahoga County (Philadelphia: D. W. Ensign, 1879), and WILLIAM R. COATES, A History of Cuyahoga County and the City of Cleveland (3 vols., Chicago & New York: American Historical Society, 1924), described below. There are also histories of the WESTERN RESERVE, such as Harriet Taylor Upton's 3-volume History of the Western Reserve (Chicago & New York: Lewis Publishing Co., 1910). Upton treats each of the Western Reserve's 12 counties separately, but she provides topical chapters, too, and emphasizes the experience of women. There is also a history of the "north coast," Randolph Downes, History of Lake Shore Ohio (3 vols., New York: Lewis Historical Publishing Co., Inc., 1952), and histories of the state, including the 6 volumes CARL WITTKE edited, The History of the State of Ohio (Columbus: Ohio State Archeological & Historical Society, 1941-44). All of these include information about Cleveland's past.
The undoubted "father" of Cleveland history was CHARLES WHITTLESEY, a professional geologist and first president of the WESTERN RESERVE HISTORICAL SOCIETY. He published Early History of Cleveland, Ohio, Including Original Papers and Other Matter Relating to the Adjacent Country. With Biographical Notices of the Pioneers and Surveyors (Cleveland: Fairbanks, Benedict & Co., 1867). This 400-plus page history blends archeology and geology, beginning with a description of "Pre-Adamite History"—or the geology of the Cleveland area—and ending with a section on "Fluctuations in the Level of Lake Erie." In between there is the substance if not the form of history, or, as another Cleveland historian described it: "disconnected facts collected from original and widely diverse sources." But that same critic asserted that "no history of Cleveland can be written, in all time to come, that is not primarily based upon...the intelligent labor of Col. Whittlesey." Whittlesey set down an embryonic chronological structure that his successors borrowed, in whole or in part.
Twenty years after Early History of Cleveland was published, W. Scott Robison produced a 500-page History of the City of Cleveland: Its Settlement, Rise, and Progress (Cleveland: Robison & Crockett-The Sunday World, 1887), including a biographical segment describing 44 persons. This volume has Robison listed as editor; some chapters or parts thereof were written by other, identified, authors. The publishers' preface states their endeavor to present "a book that could be sold at a price considerably less than that of the average local work of this kind," explaining that "voluminous and elaborate local histories, with their proportionately high cost, have not proved commercial successes." Robison's volume claims to avoid "prolix statements of facts, long comments, expanded theories and tedious discussions" as well as "the history of the Indian tribes which inhabited this region..." Robison's story extends from the organization of the CONNECTICUT LAND CO. to 1887; he shows concern for culture and PHILANTHROPY as well as politics and economic circumstances, complementing Whittlesey's earlier volume. In 1893 a very different and, for its time, a very unusual perspective on Cleveland's past appeared with the publication of MARY BIGELOW INGHAM's Women of Cleveland and Their Work (Cleveland: W. A. Ingham, 1893). The book, divided into 30 chapters, is basically a biographical account of women who were active in institutions such as churches, asylums, sewing, and temperance organizations. But there are some descriptions of those institutions and organizations, too.
In 1896 the centennial of Cleveland's founding was marked by the publication of 2 histories. Clara A. Urann published a brief (120-page) Centennial History of Cleveland (Cleveland: J. B. Savage, 1896), undocumented but containing considerable primary-source quotations emphasizing social and cultural developments in the city, with less attention to economics and very little political history. Considerably larger in scope and purpose was JAMES HENRY KENNEDY's A History of the City of Cleveland: Its Settlement, Rise, and Progress, 1796-1896 (Cleveland: Imperial Press, 1896). Seven years earlier, Kennedy, a Cleveland journalist, had collaborated with Wilson M. Day in producing The Bench and Bar of Cleveland (Cleveland: Cleveland Printing & Publishing Co., 1889), a compilation of biographies of lawyers. Day was then editor of Iron Trade Review; he later headed the Cleveland Chamber of Commerce and served as director-general of the city's centennial celebration. Kennedy's illustrated and indexed history of Cleveland is documented but addressed to the general reader; it was intended to explain Cleveland's rise and progress.
During the first half of the 20th century, 5 "general" histories of Cleveland were published. The authors were, in order of their publications, SAMUEL P. ORTH, ELROY M. AVERY, William R. Coates, WILFRED H. ALBURN and Miriam Russell Alburn, and WILLIAM GANSON ROSE. As a group, these histories are more comprehensive, more "scientific," and more satisfying than their predecessors. Yet all of them now seem old-fashioned and inclined toward a rather naive faith in the march of Cleveland's progress. The first of these works was Samuel P. Orth's A History of Cleveland Ohio with Numerous Chapters by Special Contributors (3 vols., Chicago-Cleveland: S. J. Clarke Publishing Co., 1910). This history followed a standard format: the first volume, history, and the 2 that followed, biography, although Orth distanced himself from the publication's commercial aspects by informing his readers that he "has had no connection with the biographical volumes, and has no interest of any kind in them." Orth asserted that his history was not to be "a mere narrative in chronological sequence of the city's achievements," that it would "dwell particularly upon the sociological and the political city, rather than upon the commercial and industrial city." Orth divided his massive (815-page) historical volume into 10 divisions, including "The Geographical and Physical Relations of the City," "Population," "Governmental and Political," and "Social Life," with each topic divided into chapters, in most cases chronological. His collaborators included faculty members from the Cleveland Normal School, Case School of Applied Science, and Western Reserve Univ. (see CASE WESTERN RESERVE UNIV.), as well as local physicians, dentists, engineers, and cultural, religious, and philanthropic leaders. Orth's broad definition of history, though no less celebratory of Cleveland's progress than the centennial-year histories, is more inclusive. Almost a century later, it can still be consulted with profit.
Orth's successors faced the challenge of improving on his History of Cleveland. The first to try was Elroy McKendree Avery, a man who, like Orth, combined academic and civic activities. He published A History of Cleveland and Its Environs: The Heart of New Connecticut in 3 volumes in 1918 (Chicago: Lewis Publishing Co.). Avery explains his general lack of documentation: "For the sake of the reader, I have made very sparing use of footnotes..." His first volume (the "history" part) divides into 2 parts: the first 21 chapters (340 pages) are arranged chronologically; the rest of the 727-page volume is divided topically into chapters. Other writers contributed some chapters, especially H. G. Cutler, the general historian of Lewis Publishing, who, Avery explains, "came from Chicago to Cleveland and, for several weeks, was my genial and able assistant." The chronological segment spans the 19th century; only 2 chapters describe Cleveland between 1896-1918. The chapters range across educational, professional, literary, and religious topics, ending with "Trade, Commerce and Industry." While the writing is generally direct and concise, much of the information is derivative. Avery seems to sense the circumstance, for he indicates that he found Kennedy's 1896 history especially helpful; that "as Mr. Kennedy and I were continually dipping our buckets into the same wells of information, identity of matter is not conclusive proof of plagiarism."
William R. Coates offered his 3 volumes of local history in 1924, A History of Cuyahoga County and the City of Cleveland (Chicago & New York: American Historical Society). Like Orth and Avery, Coates divides his work between 1 volume of history and 2 of biography. Romantic and nostalgic, he "anticipated it will be a pleasant task to review the past as well as to take stock of the present." The first 23 of Coates's 38 chapters cover the history of the townships other than Cleveland that constitute Cuyahoga County in specific, even trivial, detail. After nearly 300 pages, Cleveland's allotted space is reached. A brief excursion from township through village through city organization rapidly gives way to topical chapters on churches, schools, bench and bar, physicians, newspapers, colleges, etc. The volume ends with a chapter on Cleveland in the world war, one of the first attempts to record the impact of WORLD WAR I on the municipality.
In 1932 Wilfred H. and Miriam Russell Alburn, who operated a syndication service for newspapers, published This Cleveland of Ours (4 vols., Chicago-Cleveland-Indianapolis: S. J. Clarke Publishing Co., 1933). This "last of the dinosaurs" was divided into 2 volumes (1,233 pages) of history and 2 volumes of biography. Almost as ambitious in structure as Orth's earlier work, this history represents well its place in time—years punctuated by the collapse of the American economy. It emphasizes Cleveland's industries, although the Alburns recognize the bleakness of such celebration as of 1932 (the year their narrative ends), pointing out in their foreword that "if the 'Technocrats,' with their pitiless charts and graphs, are right in their conclusions, a new generation may find curious reading in this portrayal of a virile American community in the heyday of private enterprise." The Alburns added an emphasis on the industrial and commercial aspects of Cleveland's development to earlier histories and extended the narrative of the city's development past 1896.
The final offering in this group, and the last attempt to construct a general history of the city, was William Ganson Rose's Cleveland: The Making of a City (Cleveland: World Publishing Co., 1950; reprint 1990, Kent State Univ. Press in cooperation with the Western Reserve Historical Society.). This effort differs substantially from all others. Inspired by the city's sesquicentennial celebration in 1946, it is a single-volume (1,272-page) chronological compendium, relentlessly arranged by decades, with a 153-page triple-columned index. At once frustrating and indispensable, this is, in the words of another Cleveland historian, "a volume that is more a collection of facts than a history," with no analysis or interpretation of the past. The quantity of data is enormous, and, of course, covers the 2 decades since the Alburns' history. Yet "history" of this sort gives the genre its reputation for inducing boredom. If Rose represents the culmination of almost a century of general histories of Cleveland, maybe rejoicing rather than regret should mark the demise of the species. Even so, in 1990, years after Rose's book went out of print, it appeared in a reprint (Kent: Kent State Univ. Press) with a useful new introduction by John J. Grabowski, placing the book in its historical context.
There were, of course, other efforts expended during the first half of the 20th century, including ELBERT J. BENTON's Cultural Story of an American City: Cleveland; "During the Log Cabin Phases, 1796-1823," "During the Canal Days, 1825-1850," and "Under the Shadow of a Civil War and Reconstruction, 1850-1877" (Cleveland: Western Reserve Historical Society, 1943-46). A professional historian and director of the WRHS after his retirement from WRU, Benton retreads the familiar terrain of Whittlesey and successors, but emphasizes the city's cultural development. Benton found that "a cultural history like a social history is difficult to define; both are fields less clearly established by custom than that of political or military history. Let us say that whatever contributes to refinement in manners and taste, whatever improves the moral and intellectual nature of man, is a cultural force or agency." He describes churches and libraries, newspapers and the lyceum, schools and colleges—as well as steamboats and RAILROADS, banks and currency. Despite the definitional problems, Benton's study is carefully constructed, written with economy of words and considerable charm. The volumes provide a bridge of sorts between the older, comprehensive histories and the monographic literature that would characterize the writing of Cleveland's past in future decades.
Since 1950 histories of Cleveland have differed markedly from earlier works. The only attempts to treat the full narrative of the city's story have been "popular" in nature—undocumented, generally written by journalists rather than professional historians, intended to find a reading audience in the "lay public." The most successful of these, probably, have been those written by George E. Condon: Cleveland: The Best Kept Secret (Garden City: Doubleday & Co., 1967) and Cleveland: Prodigy of the Western Reserve (Tulsa: Continental Heritage Press, Inc., 1979). Although attractive, well-written, and reasonably reliable, these works indulge in questionable historical explanations. There also have been histories designed for classroom use in public schools. F. Leslie Speir's Cleveland: Our Community and Its Government (Cleveland: Cleveland Public Schools, 1941) is a relatively informative overview of Cleveland's history and polity. In 1955 Harlan Hatcher (author of a history of the Western Reserve) and Frank Durham published Giant from the Wilderness: The Story of a City and Its Industries (Cleveland: World Publishing Co.). These authors present a hymn to urbanization and industrialization—as the title implies—but also incorporate cultural and ethnic information about the city and its people.
Sophisticated monographs have also appeared, providing institutional histories and analyses of the city's ethnic communities. Institutional histories have focused on the city's cultural and educational institutions, especially during anniversary years. Carl Wittke, The First Fifty Years: The Cleveland Museum of Art, 1916-1966 (Cleveland: Cleveland Museum of Art, 1966), commemorated that institutions's golden anniversary; Donald P. Gavin, John Carroll Univ.: A Century of Service (Kent: Kent State Univ. Press, 1985), celebrated the centennial of the founding of JOHN CARROLL UNIV.; and CLARENCE H. CRAMER, Case Western Reserve: A History of the Univ., 1826-1976 (Boston: Little, Brown & Co., 1976), marked that institution's sesquicentennial. All are admirable accounts by professional historians, as is Cramer's Open Shelves and Open Minds: A History of the Cleveland Public Library (Cleveland: Press of Case Western Reserve Univ., 1972). EDMUND H. CHAPMAN's Cleveland: Village to Metropolis: A Case Study of Problems of Urban Development in Nineteenth-Century America (Cleveland: Western Reserve Historical Society and Press of Western Reserve Univ., 1964) describes the city's built environment up to the mid-1870s, and ERIC JOHANNESEN's Cleveland Architecture, 1876-1976 (Cleveland: Western Reserve Historical Society, 1979) carries the story into the 20th century. These might be augmented by another 1979 publication, Roderick Boyd Porter, ed., Sacred Landmarks: A Selected Exhibit of Existing Ecclesiastical Structures in Cuyahoga County (Cleveland: Board of Cuyahoga County Commissioners and the Cuyahoga County Archives, 1979).
The history of ethnic Cleveland has a history of its own. The first attempts to explain the varieties of Cleveland's population coincided with the assimilation efforts of the World War I era. Brief accounts, such as ELEANOR LEDBETTER's The Czechs of Cleveland and Charles Wellsley Coulter's The Italians of Cleveland, were produced in 1919 by the city's Americanization Committee. A second turning to ethnic Cleveland accompanied the New Deal Writers' Program of the WORKS PROJECTS ADMINISTRATION. A compendium describing ethnic groups, from Albanians to UKRAINIANS, formed the unpublished manuscript "The Peoples of Cleveland," 1942. This alphabetical survey offered a little Old World description, a little history, and an inventory of each ethnic group in Cleveland in the late 1930s and early 1940s. A more comprehensive and systematic survey of the ethnic communities of the city, the Cleveland Ethnic Heritage Studies Monograph Series, was directed from CLEVELAND STATE UNIV. by Karl Bonutti. It began in 1975 with some general volumes, followed by works devoted to particular ethnic groups. These books combine the history of the particular Cleveland ethnic community with native-land history, folk and art customs, and traditions (see IMMIGRATION AND MIGRATION, also specific ethnic groups).
Several other monographs of high quality, significant because of their methodologies and/or analyses, were directed to other audiences. Josef J. Barton's Peasants and Strangers: Italians, Rumanians, and Slovaks in an American City, 1890-1950 (Cambridge: Harvard Univ. Press, 1975), uses European-language sources in a sophisticated manner and interprets Cleveland statistics of social mobility (occupation, property) and structures within the larger social-science literature. Lloyd P. Gartner, History of the Jews of Cleveland (Cleveland: Western Reserve Historical Society and Jewish Theological Seminary of America, 1978), fully documents the history of Cleveland JEWS AND JUDAISM from 1840-1945. Sidney Z. Vincent and Judah Rubinstein extended Gartner's work in Merging Traditions—Jewish Life in Cleveland: A Contemporary Narrative, 1945-1975, A Pictorial Record, 1839-1975 (Cleveland: Western Reserve Historical Society and Jewish Community Federation of Cleveland, 1978). Kenneth L. Kusmer, A Ghetto Takes Shape: Black Cleveland, 1870-1930 (Urbana: Univ. of Illinois Press, 1976), analyzes the growth of Cleveland's black ghetto in intelligent fashion. Four years earlier, RUSSELL H. DAVIS published Black Americans in Cleveland: From George Peake to Carl Stokes, 1796-1969 (Washington: Assn. for the Study of Negro Life & History in cooperation with the Western Reserve Historical Society), a more general compilation (see AFRICAN AMERICANS).
In the 1980s, a different approach to explaining Cleveland's past began to appear—collaborative efforts which combined the skills and understandings of different historians. These included David D. Van Tassel and John J. Grabowski, eds., Cleveland: A Tradition of Reform (Kent: Kent State Univ. Press, 1986), and Thomas F. Campbell and Edward M. Miggins, eds., The Birth of Modern Cleveland: 1865-1930 (Cleveland: Western Reserve Historical Society, 1988). But the major collaborative effort was the writing and publishing of The Encyclopedia of Cleveland History (Bloomington and Indianapolis: Indiana Univ. Press, 1987), edited by David D. Van Tassel and John J. Grabowski, a project that enlisted the talents of more than 200 persons. The Encyclopedia had a continuing life after publication. To conserve space for text entries, the illustrations in the volume had been limited to charts and maps. That deficiency was in part overcome with a series of illustrated volumes on selected topics, all under the general editorship of Van Tassel and Grabowski and published by Indiana Univ. Press. These included Carol Poh Miller and Robert Wheeler's Cleveland: A Concise History, 1796-1990 (1990); John J. Grabowski's Sports in Cleveland: An Illustrated History (1992); Holly Rarick Witchey's Fine Arts in Cleveland: An Illustrated History (1994), co-written with John Vacha; and Marian J. Morton's Women in Cleveland: An Illustrated History (1995). Additional volumes are planned.
Meanwhile, additional monographs on various topics continued to appear, expanding our understanding of the city's history. Among these might be mentioned Gary Edward Polster's Inside Looking Out: The Cleveland Jewish Orphan Asylum 1868-1924 (Kent: Kent State Univ. Press, 1990); Mark Gottlieb's The Lives of Univ. Hospitals of Cleveland (Cleveland: Wilson St. Press, 1991); and Diana Tittle's Rebuilding Cleveland: The Cleveland Foundation and Its Evolving Urban Strategy (Columbus: Ohio State Univ. Press, 1992); and Marian J. Morton's And Sin No More: Social Policy and Unwed Mothers in Cleveland, 1855-1990 (Columbus: Ohio State Univ. Press, 1993).
History, of course, is everywhere. This survey has taken no notice of the ways in which biographers and autobiographers skillfully recreate and preserve the past; it has not included the history that exists in structures (landmarked or not) or in the extraordinary artifacts of the past faithfully preserved in institutions such as the Western Reserve Historical Society. Nor can the assessment end with a sure-fire prediction of what will come next. Nonetheless, it does seem apparent that the current emphasis on social history and demography will continue to motivate historians to attempt to understand the cosmopolitan nature of the Cleveland community. Analysis of similarities and differences among Midwest, Great Lakes, "Rustbelt," or "Snowbelt" cities should enhance our understandings of population shifts, economic changes, social policies, and similar phenomena of modern urban life. And in 1996, the bicentennial year of the city's birth, we will probably see more celebratory histories of the way Cleveland got to be the way it is.
Case Western Reserve Univ. | <urn:uuid:b6d046bd-dbd5-4054-a42d-f0c88409464f> | {
"date": "2019-03-24T17:25:06",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203464.67/warc/CC-MAIN-20190324165854-20190324191854-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9264010787010193,
"score": 2.84375,
"token_count": 5155,
"url": "https://case.edu/ech/articles/h/histories-of-cleveland"
} |
Earthquake prediction can be a grave, and faulty science, and in the case of Italian seismologists who are being tried for the manslaughter of the people who died in the 2009 L'Aquila quake, it can have legal consequences.
The group of seven, including six seismologists and a government official, reportedly didn't alert the public ahead of time of the risk of the L'Aquila earthquake, which occurred on April 6 of that year, killing around 300 people, according to the U.S. Geological Survey.
But most scientists would agree it's not their fault they couldn't predict the wrath of Mother Nature.
"We're not able to predict earthquakes very well at all," John Vidale, a Washington State seismologist and professor at the University of Washington, told LiveScience.
Even though advances have been made, the day scientists are able to forecast earthquakes is still "far away," Dimitar Ouzounov, a professor of earth sciences at Chapman University in California, said this month regarding the prediction of the March 11 earthquake in Japan.
The decision to try the six members of a committee tasked with determining the risk of an earthquake in the area (along with a government official) was announced on Wednesday (May 25) by Judge Giuseppe Romano, according to a news article from the American Association for the Advancement of Science.
Some people said the committee should've seen it coming, because of the earthquake swarms that occurred days before the big one struck, Vidale said.
"We get swarms of earthquakes all the time without a big earthquake. There was nothing strange about this swarm to suggest a big earthquake," Vidale said in a telephone interview. [ Album: This Millennium's Destructive Earthquakes ]
Regarding the charges against the Italian seismologists, Vidale said "we're offended" that they are being charged with a crime "for telling the truth." That truth is, he added, there was nothing to say that the level of danger was enough to warrant any public action.
Why we can't see one coming
Talking with Vidale, one gets the impression that predicting an earthquake would take a miracle, as there are so many unknowns.
"One problem is we don't know how much stress it takes to break a fault," Vidale said. "Second we still don't know how much stress is down there. All we can do is measure how the ground is deforming." Not knowing either of these factors makes it pretty tough to figure out when stresses will get to the point of a rupture, and an earth-shaking quake, he explained.
Science news from NBCNews.com
To get measurements of the actual stresses, researchers have to drill miles beneath the surface — an engineering feat on its own — and would only be able to drill a couple places to put sensors along the fault. (Drilling has been done along the San Andreas fault, but no one has measured the stress at depth there, Vidale said.)
On top of all that, the L'Aquila region is a particularly complex nut to crack geologically. While mostly horizontal strike-slip faults, like the San Andreas, are much clearer faults to analyze, the L'Aquila fault system is complex, with several so-called "normal" faults moving mostly vertically.
And several tectonic processes are active in the region: The Adria micro-plate is being subducted under the Apennines from east to west, while at the same time continental collision is occurring between the Eurasia and Africa plates (responsible for the building of the Alps).
Digging into the past
With all the downers, earthquake prediction science, it seems, is coming back into fashion after a lull in the 80s when methods weren't showing any success, Vidale said. The key is to find some strange phenomenon that occurs before, days before, an earthquake, that seismologists can recognize.
While they haven't found any silver bullet, scientists are digging up data on past earthquakes along fault systems to give them an idea of the probability another will occur. Even so, probability of an earthquake coming "doesn't help with predictions a day before an earthquake," Vidale said.
Another method involves detecting evidence of unusual amounts of radon gas in the atmosphere. Right before an earthquake, the fault may release more gases, including radon. In fact, Ouzounov and colleagues found such anomalous signatures in the atmosphere above Japan days before the March 11 quake struck.
No one has ever predicted an earthquake from atmospheric data, and plenty of supposed earthquake precursors, from weird animal behavior to groundwater flowing the wrong way, have proven hit-or-miss.
Of the radon gas method, Vidale said, "now we're pretty confident that's not reliable."
- Image Gallery: This Millennium's Destructive Earthquakes
- Album: The Great San Francisco Earthquake
- Natural Disasters: Top 10 U.S. Threats
© 2012 LiveScience.com. All rights reserved. | <urn:uuid:1b283663-0fd6-4704-9774-6d2cf9bf9b90> | {
"date": "2016-09-30T16:54:35",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662321.82/warc/CC-MAIN-20160924173742-00082-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9599059820175171,
"score": 2.5625,
"token_count": 1034,
"url": "http://www.nbcnews.com/id/43187273/ns/technology_and_science-science/t/seismologists-tried-manslaughter-over-quake/"
} |
This insightful documentary revisits six key moments during America's first years, chronicling the efforts of George Washington, Benjamin Franklin, Thomas Jefferson, Alexander Hamilton, John Adams, James Madison and Aaron Burr to shape the country. The program delves into the disagreements and views that prompted Franklin's appeal to abolish slavery, Burr and Hamilton's fateful duel and other landmark events.
Rent DVDs for only $4.99 a month.
NRNot rated. This movie has not been rated by the MPAA.
Full Screen 1.33:1Subtitles
NoLanguage and sound
English: Dolby Digital 2.0 StereoOther features
Color; interactive menus; scene access.
Common Sense Note
- Age appropriate
- Not an issue
- Depends on your kid and your family
- Not appropriate for kids of the age most likely to want to see it | <urn:uuid:33536eba-95bc-4767-aa4f-7e41b4b526a2> | {
"date": "2017-05-25T18:50:13",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608120.92/warc/CC-MAIN-20170525180025-20170525200025-00135.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8681413531303406,
"score": 2.515625,
"token_count": 179,
"url": "https://dvd.netflix.com/Movie/Founding-Brothers/70026699"
} |
Teaching your puppy good manners
With the right amount of care and attention, and by following our dog training tips or attending puppy school, you can teach your puppy how to behave and grow up to become a model citizen!
Before you bring your new puppy home, it's important to agree some house rules with every member of the family, especially children. House training a puppy takes teamwork, and it’s up to all of you to decide what the rules are. Once the rules are agreed, it’s crucial that you all stick to them, because it will be very confusing for your puppy if one person allows one thing and another refuses. Some things to consider are:
- Do you want your puppy to get up on the sofa for a cuddle, or is this a big no-no? Training a puppy to understand the word “no” will help with this.
- Where the puppy will sleep? Decide on a puppy bed or crate before bringing your puppy home - and stick to it. Smuggling pets into your bed because they cry only teaches them that making noise brings a reward!
- Where is your puppy not allowed? Such as upstairs or the dining room, puppies shouldn't be allowed to climb stairs unsupervised in case they stumble. Stair gates are useful to restrict access to places that they shouldn’t go.
- Which vocal cues will you use during training and in general family life together? Consistency is vital here so that your puppy doesn’t get confused.
- Who will feed and exercise the puppy and when? During puppy training, teaching and grooming should be shared between all family members to build bonds. Draw up a rota and be consistent with each family member doing the same thing with the same rewards.
As well as deciding your personal house rules, you need to make everyone in the house aware of some basic puppy rules. To help your puppy settle in as part of the family, make sure everyone understands the following:
- Puppy sleeping habits include sleeping A LOT , which helps with their growth. When puppies are in their crate or bed, don't disturb them.
- Your puppy shouldn't be disturbed when eating. If anyone gets between a hungry puppy and food, it could result in a defensive nip!
- Never tease your puppy, particularly with food or toys or they will become frustrated.
- When house training a puppy, they should never be given scraps from the table, no matter how cute they look! Not only does this encourage begging, which will carry on into adulthood, but it could also upset their sensitive stomachs and otherwise balanced diet.
- Use dog treats to reward good behaviour, such as sitting quietly whilst the family eats dinner, but read the packaging to make sure you’re not giving them too many.
- Young children should not be alone with the puppy and shouldn't pick up the puppy without supervision and guidance.
- Puppies will chew, so it’s the responsibility of all family members and visitors to leave things out of your puppy’s reach. Not only could precious items get destroyed but, if swallowed, they could also cause health problems for the puppy.
- Read more about welcoming your new dog home here.
- Once your puppy knows their name it will make life easier for you both, particularly when you want them to come to you.
- From the minute your first meet your new four-legged friend, say their name over and over again when they’re having a good time, for example when they’re eating or you’re stroking them.
- Never use their name in anger – puppies must associate their names with good things or they might not respond to it when they’re called.
- Make sure all family members are consistent and don’t all use any nicknames. If your puppy's name is Ben, use Ben and not Benjamin, Bennie or Benji. This will help your puppy create a strong association with their name, and avoid overwhelming them.
Your puppy needs to learn that it's wrong to bite people. All puppies 'mouth', especially during teething, but this needs to be discouraged as if it continues into adulthood it could cause some serious damage. You can get chew toys for puppies to distract them from chewing you (or your furniture) but if your dog continues to mouth too strongly you could take them to puppy school or try out the following steps at home:
Make a loud, high-pitched yelp – even if they don’t actually hurt you - and then turn away from your puppy. This is a much more effective way of getting through to them than a reprimand or playing more roughly.
Your pup must then be ignored, to show the game stops when the mouthing starts.
This reaction will be familiar to your puppy as that’s how their littermates would have responded when they got hurt by another puppy, so your little friend will quickly understand that mouthing won’t bring any rewards.
It's important to introduce your puppy to as many new experiences with people and other dogs as possible while they are still young enough to take everything in their stride.
Their first big learning period begins at about three weeks, when their eyes and ears first open and they start to explore the big, wide world around them. At this point they will still be with mum and their playmates will be their brothers and sisters. Try to visit your new pup before you bring them home so they can get used to being with people other than their breeder.
The next big step is between about 7-12 weeks, which is when you’re advised to keep your puppy away from public places while their vaccinations take effect. As you can’t take your puppy outside, it’s important to find alternative ways to help your puppy stay socialised during this crucial development phase. But when they are between 12-20 weeks you can attend puppy socialisation classes, which can help with training and meeting other dogs too.
- If you can't take your puppy out into the world, bring the world to your puppy. Invite a range of friends into your home to help your puppy get used to different sexes, ages, heights, builds and races. Ask your visitors to wear different types of clothing and, to encourage friendly interaction, arm everyone with treats.
- Invite your dog-owning friends to bring their well-behaved dogs to your home - but check first that they’re up to date with their vaccinations.
- While your puppy’s vaccination's may stop them going into public places, they will still be welcome at puppy parties. These are a great way to introduce your new pet to pups of a similar age. Your vet surgery should know about reputable puppy parties in your area and they may even organise them themselves.
- Just because you can’t take your puppy to parks or the shops, it doesn’t mean they have to stay at home – you can take your puppy in the car for short car journeys. Not only will this help them get used to car travel, but it will also give them the chance to see the world through the windows and get them used to the sound of loud motorbikes, sirens, and other outside noises.
- Whenever your puppy encounters anything new, make sure you act confidently as if there's nothing to worry about. If you’re anxious, your puppy will pick up on your signals and think something’s wrong. An occasional ‘good dog’, a treat and a calm attitude is all you need.
Once you’ve had your vet’s approval to venture outside, it’s time to broaden your puppy’s experiences. Think about everything and everyone they’re likely to encounter in later life and write a checklist. Remember, repeated exposure is essential so try everything more than once until they’re happy, relaxed and well behaved.
- When you first start walking your puppy on the lead take them along pavements in quiet streets at first, slowly building up to busy traffic areas.
- Take your puppy to a shopping centre, sit on a bench and watch the world go by. Passers-by are bound to come up and say hello to your puppy, which is an added bonus.
- Take a trip on public transport and spend some time just sitting in a busy station getting used to the hustle and bustle.
- Visit dog-friendly shops, pubs and cafes – see our dog directory for places that welcome you and your furry friend.
- With many dog friendly beaches around the UK (check the local rules first) let your puppy experience the beach and the sea plus many other environments you can think of.
- Again, remember to repeat the experiences whenever possible.
The information contained in this article is not a substitute for individual veterinary or behavioural advice and is for information purposes only. You should always consult a veterinary surgeon if you have any concerns about your pet’s health. He or she will be able to take a complete medical history and physically examine your pet, to then recommend appropriate individual advice or treatment options. For detailed behavioural advice tailored specifically for your pet, we recommend that you contact a qualified pet behaviourist. For further details of local canine and feline behaviourists practising in your area and how they offer help for with problem pets, please contact The Coape Association of Pet Behaviourists and Trainers at www.capbt.org, or the Association of Pet Dog Trainers at www.apdt.co.uk. Do bear in mind that while dog trainers can take you on as a client directly, pet behaviourists will always require a referral from your veterinary surgeon. | <urn:uuid:00844f17-5d68-4757-9700-c8554f7c36fd> | {
"date": "2018-07-23T05:55:07",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594954.59/warc/CC-MAIN-20180723051723-20180723071723-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9566539525985718,
"score": 2.515625,
"token_count": 2016,
"url": "https://www.purina.es/dogs/key-life-stages/puppies/teaching-your-puppy-good-manners"
} |
|Event Date:||Event Title:||Event Description:|
|First Hot Air Ballons were Invented||The Montgolfier brothers invented the first ever hot air ballon, first time people had flown.
|First Plane was Flown||The Wright Brothers flew the first ever plane 120 feet, did not catch on until later though.
|Fist Helicopter was invented||First helicopter was invented, very unsuccessful.|
|The first flight across the Atlantic occured||Lindbergh had the first successful flight across the Atlantic Ocean, it took 33 hours.
|First Modern Helicopter was Invented||First Modern Helicopter was Invented|
|First year where planes carried more people across the Atlantic than ocean liners||For the first time ever, planes had become more popular than boats in terms of travel.|
|Boeing 707 took its first commercial airline flight||This flight inspired commercial airlines to begin, in a few years most major nations had commercial airlines.|
|Terrorist Attacks on the WTC, Pentagon, and the White House occured||These attacks caused an increased amount of air security, and a dip in air travel for a few years, major event in US history| | <urn:uuid:ec713c28-a4c5-40a3-ab9a-13d791bacfbc> | {
"date": "2016-07-25T14:10:46",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824230.71/warc/CC-MAIN-20160723071024-00227-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.954764187335968,
"score": 2.75,
"token_count": 255,
"url": "http://www.timetoast.com/timelines/history-of-air-transportation--4"
} |
School was called off throughout much of this sprawling city last Monday because of inclement weather.
It was not a freak spring snow storm, a heat wave or torrential rains.
Rather, it was an immense cloud of dust that blew in from China's fast-spreading deserts, about 750 miles away.
It hid Seoul from view throughout the morning, obscuring the sunrise just as surely as the heaviest of fogs. Clinics overflowed with patients complaining of breathing problems, drugstores experienced a run on cough medicines and face masks that supposedly filter the air, and parks and outdoor malls were nearly empty of pedestrians.
With the arrival of the huge dust storms for the third consecutive year, Koreans have begun to grimly resign themselves to the addition of an unwelcome fifth season -- already dubbed the season of yellow dust -- to the usual four seasons that any temperate country knows.
Like the harmattan in West Africa, when skies throughout that region turn a soupy gray for weeks at a time because of seasonal wind patterns that bring airborne dust southward from the Sahara, Korea's new season is a disturbing reminder for Asians of global interconnectedness and the perils of environmental degradation.Continue reading the main story
''There is no way for us to deter this,'' said Kim Seung Bae, deputy director of South Korea's national weather service. ''All we can do is try to forecast the yellow dust storms as early as possible, but with the current technology we can only detect it one day ahead of time at best. For now, our main innovation will be to add predictions of the intensity of the dust to our weather reports.''
In Seoul, a measurement of 70 micrograms of dust per cubic meter of air is considered normal during most of the year. At 1,000 micrograms, experts say, serious health warnings are indicated. Earlier this week, in the fourth storm of the season, a record measurement of 2,070 micrograms was reached in this city. Mr. Kim said two or three more storms could hit Korea this month.
Scientists say the dust storms, which are distinctly visible on regional satellite weather maps as gigantic yellow blobs, are the result of the rapid desertification in China and a prolonged drought affecting that country and other parts of Northeast Asia.
The term yellow dust refers to the color of the sand when it coats parked cars and windows rather than the color of the skies, which all this last week were a thick, acrid gray.
According to China's Environmental Protection Agency, the Gobi grew by 20,000 square miles from 1994 to 1999, and its steadily advancing edge now sits a mere 150 miles north of Beijing. As in West Africa, which weather experts say is the world's leading source of dust, China's environmental changes are accelerating because of overfarming, overgrazing and the widespread destruction of forests.
But unlike West Africa's dust, which is carried to the southern United States by winds known as the tropical easterlies, dust from the Gobi and Taklimakan deserts in rapidly industrializing China is binding with toxic industrial pollutants, including arsenic, cadmium and lead, increasing the health threat.
Changes like these have long made springtime synonymous with respiratory distress in Beijing.
But as the dust storms have grown, their impact has been spreading rapidly eastward, blighting the air over the Korean peninsula and beyond.
This has been an unusually dusty spring in Tokyo, for example, and fingerlike plumes of the airborne sand now travel 7,000 miles aboard the jet stream reaching Portland, Ore., and San Francisco, where the main effect so far has been to create breathtaking sunsets.
''There is no smoking gun yet that proves that man is causing this,'' said Charles S. Zender, a professor of earth system science at the University of California at Irvine, ''but rather lots of anecdotal evidence.''
''The puzzle of Asian dust is a huge question in weather science right now,'' he said, ''and if human activity is proven to be the cause, it stands to reason that this problem is going to keep getting worse.''
As a mood of resignation has set in over the persistence of this phenomenon, Koreans have already begun to focus on the economic costs. What was only recently regarded here as a minor nuisance is now seen as posing a serious threat in areas as diverse as public health, travel, retail shopping and even high-tech manufacturing.
This last week, for example, in addition to the school closures, scores of domestic flights have been canceled because of poor visibility. Workplace absenteeism has risen, too, and retail sales have dipped, as a result of people staying indoors.
''I've had a little bit of a cough,'' said Choi Byoung Su, 30, a businessman who was at a downtown pharmacy stocking up on medicine for a sore throat, which he said was caused by the dust storms. ''I'm not too concerned about my health for now, but it is really a hassle for my car,'' he said, explaining that he needed to have it washed at least once a day now.
Even South Korea's major industries are suddenly complaining about the worsening effects of the storms. Semiconductor manufacturers, for example, which are highly sensitive to contaminants, have reportedly had to change their sophisticated air filters much more frequently and require workers to take longer showers before beginning assembly work. Workers are also being discouraged from entering and exiting the factories any more than is strictly necessary.
Hyundai Motor, meanwhile, a major automobile manufacturer, has reportedly begun to wax its cars differently and shrink wrap them in plastic sheeting before export to protect them from the dust.Continue reading the main story | <urn:uuid:e255423f-cf07-4f94-8fb7-c2b8a39df612> | {
"date": "2017-09-21T13:23:10",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687766.41/warc/CC-MAIN-20170921115822-20170921135822-00616.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9624180197715759,
"score": 2.578125,
"token_count": 1159,
"url": "http://www.nytimes.com/2002/04/14/world/china-s-growing-deserts-are-suffocating-korea.html?pagewanted=all&src=pm"
} |
Next week, 40 of America's future scientists will head to Washington, D.C. to compete in the finals of the Intel Science Talent Search, a competition often referred to as the "junior Nobel Prize." They will present the results of their original research projects--a number of which involved the use of Mathematica. Last year, as a senior at Stuyvesant High School, then-17-year-old Varun Narendra was one of those 40 students.
Narendra used Mathematica to create a model that could help treat Gaucher's disease, a genetic disorder. Patients with Gaucher's disease need enzyme replacement therapy to properly metabolize fat cells. The therapy is effective in most cases, but it is not a cure. Because the cost of the lifelong treatments can exceed $300,000 per year, Narendra wanted to find a way to determine each person's optimal enzyme dosage.
Narendra learned to use Mathematica during an after-school program offered to Stuyvesant High School students by Hunter College in New York City. Although the class focused on Mathematica as a computational tool rather than a programming language, Narendra says, "Just from the class, I was able to get a general enough idea of the language so that I could apply it to my work."
Gaucher's disease is caused by a mutation in the enzyme that stores fat cells, or glycolipids. This mutation reduces the activity of the enzyme, causing the glycolipids to accumulate in the patients' macrophage cells, which are a type of white blood cell. When the macrophage cells become engorged, they are called Gaucher cells. In Type 1 Gaucher's disease, which Narendra studied, Gaucher cells accumulate in body tissues, particularly the spleen, where they cause painful swelling. The spleen irritation can lead to further complications such as swelling of liver and joint tissues, compression of the lungs, bone abnormalities, and anemia. Enzyme replacement therapy works by increasing the amount of enzyme available to metabolize glycolipids. This helps prevent the glycolipids from accumulating in and damaging body tissues.
Narendra analyzed 225 blood samples by studying enzyme activity levels. He allowed the enzyme to react with patient blood serum tagged with fluorescent markers. When the enzyme reacts with the blood serum, the fluorescent markers are separated from the cells. After allowing the reaction to continue for a specific amount of time, Narendra used a fluorometer to measure the amount of released fluorescence. This told him how much of the enzyme was needed to complete the reaction.
By varying the amount of enzyme combined with each patient's blood sample, with Mathematica Narendra was able to develop a mathematical representation of every relevant reaction occurring within the blood cells. He modeled the reactions in the cells over time by coding loops in his program. Says Narendra, "By studying how the glycolipid levels change over time with varying treatment plans, you get an idea of what plan is most cost-effective."
Now attending Harvard University, Narendra is planning to major in astronomy and astrophysics. He is seeking research opportunities on campus, saying "I hope to eventually get back into doing work with Gaucher, yet I would also like to explore other interests." | <urn:uuid:4912afc1-4ce9-4964-804c-6280fd9b83c5> | {
"date": "2014-04-24T19:26:12",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206672.15/warc/CC-MAIN-20140423032006-00515-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9568479061126709,
"score": 3.234375,
"token_count": 668,
"url": "http://www.wolfram.com/mathematica/customer-stories/mathematica-helps-student-in-intel-science-talent-search-contest.html"
} |
BERLIN (AP) — There is a strong chance Europe’s comet lander will wake up from hibernation as it nears the sun, raising hopes for a second series of scientific measurements from the surface next year, scientists involved in the mission said Monday.
The Philae lander, which became the first spacecraft to touch down on a comet Wednesday, has already sent reams of data back to Earth that scientists are eagerly examining. But there were fears its mission would be cut short because it came to rest in the shadow of a cliff.
Shortly before its primary battery ran out, the European Space Agency decided to attempt to tilt the lander’s biggest solar panel toward the sun — a last-ditch maneuver that scientists believe may have paid off.
“We are very confident at some stage it will wake up again and we can achieve contact,” Stephan Ulamec, the lander manager, told The Associated Press.
That should happen next spring, when Philae and the comet it is riding on — called 67P/Churyumov-Gerasimenko — get closer to the sun, warming up a secondary battery on board. A few days of sunshine on the solar panels should be enough to charge the battery sufficiently to conduct science runs, said Ulamec.
Before they can say for certain if they’ll be able to restore contact with Philae, scientists first need to find out where on the 4-kilometer (2.5-mile)-wide comet the washing machine-sized lander is, he added.
New pictures released Monday offer very good clues about where it has come to rest.
The high-resolution images taken from Philae’s mother ship Rosetta show the lander descending to the comet and again after its first and second bounce. These were caused by the lander’s failure to deploy its downward thrusters and harpoons.
Scientists at the German Aerospace Center, DLR, said Monday that an initial review of data the lander sent back 311 million miles (500 million kilometers) to Earth showed the comet’s surface is much tougher than previously assumed. There’s also evidence of large amounts of ice beneath the lander.
Scientists are still waiting to find out whether Philae managed to drill into the comet and extract a sample for analysis.
Material beneath the surface of the comet has remained almost unchanged for 4.5 billion years, so the samples would be a cosmic time capsule that scientists are eager to study.
One of the things they are most excited about is the possibility that the mission might help confirm that comets brought the building blocks of life — including water — to Earth.
Kirsten Grieshaber contributed to this report.
Copyright 2014 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. | <urn:uuid:b69759d0-d31e-4187-b503-494b24f1ddf1> | {
"date": "2018-05-26T23:01:56",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867949.10/warc/CC-MAIN-20180526225551-20180527005551-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9523751735687256,
"score": 2.96875,
"token_count": 590,
"url": "https://talkingpointsmemo.com/idealab/comet-scientists-confident-wake-up"
} |
Technology and Young Children: Infants and Toddlers
You are here
Effective Classroom Practice: Infants and Toddlers
Selected Examples of Effective Classroom Practice Involving Technology Tools and Interactive Media (PDF)
During the earliest years, infants and toddlers interact primarily with people. Their interactions with toys are usually in the context of human interaction as well. They need to freely explore, manipulate, and test everything in the environment. Increasingly in today’s world, this includes the exploration of technology tools and interactive media. Children of this age are drawn to push-button switches and controls. Technology tools that infants and toddlers might use must be safe, sturdy, and not easily damaged. If technology is used, it must be in the context of conversation and interactions with an adult.
Technology Tools and Interactive Media
- Allow children to explore digital materials in the context of human interactions, with an adult as mediator and co-player. As with shared book reading, use shared technology time as an opportunity to talk with children, use new vocabulary, and model appropriate use.
- Avoid passive screen time. While some parents may claim that baby videos calm an otherwise fussy child, there is little research to suggest that infants and toddlers learn from watching videos. If infants are distressed, they need the comfort of a caring adult, not an electronic toy.
- Use technology as an active and engaging tool when appropriate to provide infants and toddlers with access to images of their families and friends, animals and objects in the environment, and a wide range of diverse images of people and things they might not otherwise encounter (photos of children from other countries, for example).
- Incorporate assistive technologies as appropriate for children with special needs and/or developmental delays | <urn:uuid:50c7db7a-796a-4ba9-b67e-bfe9de56dda3> | {
"date": "2018-12-13T03:32:00",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824448.53/warc/CC-MAIN-20181213032335-20181213053835-00176.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9272697567939758,
"score": 3.90625,
"token_count": 356,
"url": "https://www.naeyc.org/resources/topics/technology-and-media/infants-and-toddlers"
} |
Above: Sledding in Brooklyn Heights, from the corner of Henry and Joralemon Streets, according to the caption, ca. 1872-1887. (Photographed by George Bernard Brainerd, courtesy Brooklyn Museum)
So far this has been pretty much been a low-accumulation winter in New York City, with only a half-inch of measured snow in Central Park so far this season. The worst snowfall was technically last fall, with that sloppy Nor'easter which hit just a few days after Sandy.
But many of New York City's most powerful blizzards have actually occurred in the months of February and March -- from the legendary Blizzard of 1888 to the most recent Snowicane from February 2010.
These images of a snowy city gone by will feel less interesting once the next big snowstorm happens. But until then, enjoy! And have a wonderful Martin Luther King Jr. Day and safe travels if you're headed to the presidential inauguration.
Click on the pictures for a larger view. In particular, the picture at top and the 1914 photo below definitely have some spectacular details seen up close:
Somewhere in Brooklyn, 1888. Yes, that's a dog in the sled. (Photographed by Breading G. Way. Courtesy Brooklyn Museum)
Central Park coasting with the kids, 1914 (Library of Congress)
Streets of snow in Harlem after a February blizzard in 1899. (LOC)
Manhattan streets after 1905 and 1910 snowstorms, rough going for horse-drawn vehicles. (LOC)
In the throes of a 1914 blizzard, literally stopping streetcars in their tracks. (LOC)
1948. (Courtesy LIFE/Cornell Capa)
And children in Central Park in 1954. Not so different from the scene above taken forty years earlier! (Peter Stackpole/LIFE)
George Washington, draped in snow on Wall Street, at the sub-treasury building (today Federal Hall), 1888. (LOC)
Seems they might have had the same idea one hundred years ago. The headline from the New York Tribune on January 19, 1913: | <urn:uuid:fdac852c-d603-443a-877c-5842b59af2cb> | {
"date": "2014-10-20T21:09:37",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443438.42/warc/CC-MAIN-20141017005723-00361-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.933768093585968,
"score": 2.578125,
"token_count": 439,
"url": "http://theboweryboys.blogspot.com/2013/01/ten-pictures-of-new-york-winter-we.html"
} |
Mason Neck National Wildlife Refuge was created to protect essential bald eagle nesting, feeding, and roosting habitats along the Potomac River. Along with active eagle nesting, the refuge hosts a rookery with more than 1200 nests for great blue herons. The 2276-acre refuge, in the Mason Neck State Park, contains about 2000 acres of hardwood forest, the largest freshwater marsh in Northern Virginia, and nearly six miles of shoreline.Visitors can view the refuge along two trails, one through woods and one in Great Marsh. In the spring, wildflowers fill the woods as songbirds migrate through the area and various types of ducks feed along the creeks and marsh. In the summer and fall, birds such as egrets and herons dominate the marshes before many of them travel south for the winter.From November to February, bald eagles breed and lay eggs.
Last Updated: 6/6/2013 2:11 PM | <urn:uuid:06340da3-5ce6-442b-8e4f-a21f49eb40c9> | {
"date": "2013-12-05T15:16:54",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046759/warc/CC-MAIN-20131204131726-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9354215264320374,
"score": 3.234375,
"token_count": 195,
"url": "http://www.virginia.org/Listings/OutdoorsAndSports/MasonNeckNationalWildlifeRefuge/"
} |
Just like people, sometimes cats are in need of a blood transfusion. Veterinary clinics (especially emergency and specialty clinics) are in need of donors so that they have blood on hand for emergency cases. By checking with your local specialty clinic, you can find out how your pet may help and if there are added benefits for your pet donating.
Why are blood donors needed?
There are a variety of reasons veterinary clinics need blood for transfusions. Cats that suffer from acute blood loss caused by trauma, internal bleeding or cancer would likely need a transfusion to survive. Blood transfusions are also helpful in cases of anemia (from kidney failure, immune problems or feline leukemia), clotting issues, hemophilia or other health issues.
Benefits of donating blood
When your cat donates blood, he or she is saving a life. Specialty clinics also offer incentives to blood donors like examinations, blood work monitoring and heartworm preventative if your pet is able to donate four to six times a year. Feline blood donors are screened for a number of infectious diseases, hemoglobin levels and metabolic screenings at no charge to you.
Who can donate?
Cats that are good candidates meet the following criteria –
- Healthy and up-to-date on vaccines
- Between 2 to 7 years old
- Has not had a blood transfusion
- Medication free except for heartworm and flea and tick prevention
- At least 10 pounds of lean body weight
- Indoor only
- Feline leukemia and feline immunodeficiency virus (FIV) negative
- Hasn’t been bred
Most cats do need to be sedated to give blood. Before signing up, talk to your own vet to see if your cat is a good candidate for donating blood.
Northern Illinois Cat Clinic is a full service cat-only veterinary clinic that has been providing exceptional cat care with state-of-the-art technology since 1982. Their goal is to make your cat feel at home in their comfortable, safe and loving environment. The American Association of Feline Practitioners has recently certified the Northern Illinois Cat Clinic as a Cat-Friendly Practice. Learn more at online, visit them at 295 Peterson in Libertyville, or follow them on Facebook at Northern Illinois Cat Clinic. | <urn:uuid:dd71c156-dcbb-4812-9467-af3ab23df723> | {
"date": "2018-01-17T04:33:39",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886794.24/warc/CC-MAIN-20180117023532-20180117043532-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9354077577590942,
"score": 2.578125,
"token_count": 469,
"url": "http://www.chicagotribune.com/suburbs/mundelein/community/chi-ugc-article-could-my-cat-be-a-blood-donor-3-2013-12-06-story.html"
} |
When you begin the process of seeking out a grant, whether it is a grant for a small business, for college, for maternity or any other sort, it is important to understand that a grant is different from an entitlement or a loan. A grant is a lump sum of money, often from a federal agency, that is given to a worthy individual to do something worthwhile, like go to college, start or sustain a non-profit or any number of interesting things.
Government grants are issued from one of the many branches or departments of the government. Each year in the United States, the government doles out millions of dollars in educational grants. These are the most common type of government grant and are frequently used to aid a student in pursuing a post-secondary education. Yet, government grants are awarded to individuals and organizations for a vast number of reasons. Many non-profits seek out government grants in order to continue valuable programs, whether they serve homeless animals or underprivileged families. Government grant is more or less a blanket term to describe the wide range of grants available from the federal government to promote important social growth in our country.
Small business grants are another common type of grant. Small business grants are often supplied by local government agencies, the federal government or by large corporations. Small business grants are often awarded to start-up businesses that are able to illustrate a great deal of potential to achieve success and garner economy boosting attention for a local community. Helping small businesses succeed boosts tax revenue and creates jobs, so even very small cities will have at least a few opportunities for entrepreneurs to apply for small business grants. The amount of money received is dependent upon the issuing entity and the particular grant opportunity.
Grants for college, however, are possibly the most plentiful and sought after kind of grant out there. With the price of college always increasing, grants are a wonderful way to finance one’s higher education. Unlike student loans, grants do not have to be paid back. Essentially, grants are meant to alleviate the financial burden of getting a college diploma. There are a wide variety of grants within the category of education grants including grants specifically for business school students, merit based grants, Federal Pell grants (based on financial need) and many, many more. Due to the large number of students seeking higher education in our country, the application process has become very competitive. Yet, there are an ever increasing amount of grants for college available through local and federal governments, charitable institutions and businesses. The dollar amount of these grants depends on the particular grant, and can range anywhere from a few hundred to several thousand dollars!
Maternity grants are also available to new or expecting mothers who qualify for federal or institution issued grants. These grants are for mothers to cover expenses while they cannot work during or after their pregnancy, as well as to help cover the many new costs of providing for an infant. Maternity grants are most often awarded to low income families in the immediate aftermath of a birth, but in some cases are often awarded during pregnancy or to help a family that has recently adopted a child. The amount of money given to those eligible for a maternity grant is often based on a sliding scale, but is usually somewhere between 700 and 1,000 dollars.
Now that you know about some of the different kinds of grants, what do you do? Well, the next steps are very personal and unique to you! If you know what kind of grant you are interested in, and you want to know if you qualify, than Click Here. If you would like to learn more about grants, types of grants and the application process, than check out the articles, information and resources we put together on this website. Grants provide ordinary individuals with the money to make their dreams come true and are a worthwhile pursuit for anyone with worthwhile and productive plans. | <urn:uuid:0ba5b1a3-1575-43b5-a2bb-f2b42f6a58ea> | {
"date": "2014-11-28T05:29:58",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009777.87/warc/CC-MAIN-20141125155649-00164-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9662341475486755,
"score": 2.90625,
"token_count": 770,
"url": "http://www.iwantagrant.com/"
} |
Stalag Luft III was a German POW camp in the province of Lower Silesia, built to house captured Allied airmen. The first “Kriegsgefangene” (POWs), arrived on March 21, 1942. The facility would grow to include 10,949 “kriegies”, comprising some 2,500 Royal Air force officers, 7,500 United States Army Air officers, and about 900 from other Allied air forces.
Barracks were built on pilings to discourage tunneling, creating 24” of open space beneath the buildings. Seismic listening devices were placed around the camp’s perimeter. In the German mind, the place was the next best thing, to airtight.
Kriegies didn’t see it that way, three of whom concocted a gymnastic vaulting horse out of wood from Red Cross packages.
A Trojan horse was more like it. Every day, the horse would be lugged out to the perimeter. Above ground, prisoners’ gymnastic exercises masked the sound while underground, kriegies dug with bowls into the sand, using the horse itself to hide diggers, excavated soil and tools alike. Iron rods were used to poke air holes to the surface.
Every evening for three months, plywood was placed back over the hole, and covered with the gray-brown dust of the prison yard.
On October 19, 1943, the three British officers made their escape. Lieutenant Michael Codner and Flight Lieutenant Eric Williams reached the port of Stettin in the West Pomeranian capital of Poland, where they stowed away on a Danish ship. Flight Lieutenant Oliver Philpot boarded a train to Danzig, and stowed away on a ship bound for neutral Sweden. Eventually, all three made it back to England.
RAF Squadron Leader Roger Bushell was shot down and forced to crash land on his first engagement in May 1940, but not before taking two Messerschmitt Bf 110 fighters with him. Taken to the Dulag Luft near Frankfurt, Bushell formed an escape committee along with Fleet Air Arm pilot Jimmy Buckley, and Wing Commander Harry Day.
For POWs of officer rank, escape was the first duty. Roger Bushell escaped twice and almost made it, but each time his luck deserted him. By October, Bushell found himself in the north compound of Stalag Luft III, where British officers were held.
By the following spring, Bushell had concocted the most audacious escape plot in the history of World War Two. “Everyone here in this room is living on borrowed time”, he said. “By rights we should all be dead! The only reason that God allowed us this extra ration of life is so we can make life hell for the Hun… In North Compound we are concentrating our efforts on completing and escaping through one master tunnel. No private-enterprise tunnels allowed. Three bloody deep, bloody long tunnels will be dug – Tom, Dick and Harry. One will succeed!”
The effort was unprecedented. Previous escape attempts had never involved more than twenty individuals. Bushell, soon to be known by the code name “Big X” was proposing to get out with two hundred.
Civilian clothes had to be fashioned for every man. Identification and travel documents forged. “Tom” began in a darkened hallway corner. “Harry’s entrance was hidden under a stove, “Dick”‘s entrance was concealed in a drainage sump.
The Red Cross distributed high calorie, dehydrated whole-milk powder called “Klim” (“Spell it backwards”) throughout German POW camps. Klim tins were fashioned into tools, candle holders and vent stacks. Fat was skimmed off soups and molded into candles, using threads from old clothing for wicks.
Of fifteen hundred prisoners in the compound, six hundred were involved in the attempt. 200 “penguins” made 25,000 trips into the prison yard, sacks sewn from the legs of long underpants, disposing of soil. The tunnels were some kind of engineering marvel. 30′ down to avoid seismic detection equipment, and only two-feet square, the three tunnels extended outward for the length of a football field and more.
Penguins were running out of places to put all that soil, around the time the camp was expanded to include “Dick’s” planned exit-point. From that time forward, “Dick” was refilled from the other two. “Tom” was discovered in September 1943, the 98th tunnel in the camp to be found out.
Flight Lieutenant Nathaniel Flekser reflected on his own experience: “How lucky I really was dawned on me when I later met RAF prisoners who were shot down while on bombing missions over Germany. They were attacked by angry civilians, brutally interrogated by the Gestapo, and packed into cattle cars. One crew was thrown into a furnace.” H/T warfarehistory.com
The escape was planned for the good weather of summer, but a Gestapo visit changed the timetable. “Harry” was ready by March. The “Great Escape” was scheduled for the next moonless night. March 24-25, 1944.
Contrary to the Hollywood movie, no Americans were involved in the escape. At that point, none were left in camp.
The great escape was doomed, nearly from the start. First the door was frozen shut, then a partial collapse required repair. The exit came up short of the tree line, further slowing the escape. When guards spotted #77 coming out of the ground, it was all over.
German authorities were apoplectic on learning the scope of the project. 90 complete bunk beds had disappeared, along with 635 mattresses. 52 twenty-man tables were missing, as were 4,000 bed boards and an endless list of other objects. For the rest of the war, each bed was issued with only nine boards, and those were counted, regularly.
Gestapo members executed German workers who had not reported the disappearance of electrical wire.
In the end, only three of the 76 made it to freedom: Norwegians Per Bergsland and Jens Muller made it back to England via Sweden. Dutch pilot Bram van der Stok made it to Gibraltar. Hitler personally ordered the execution of the other 73, 50 of which were actually carried out.
General Arthur Nebe is believed to have personally selected the 50 for execution. They were 22 Brits (including Bushell), 6 Canadians, 6 Poles, 4 Australians, 3 South Africans, 2 Norwegians, 2 New Zealanders, and one man each from Belgium, Czechoslovakia, France, Greece, and Lithuania. All but seven were RAF airmen.
Nebe himself was later implicated in the July 20 plot to assassinate Adolf Hitler and executed on this day in 1945. Roger “Big X” Bushell and his partner Bernard Scheidhauer were caught while awaiting a train at the Saarbrücken railway station. They were murdered by members of the Gestapo on March 29, who were themselves tried and executed for war crimes, after the German surrender.
New camp Kommandant Oberst Franz Braune was horrified that so many escapees had been shot. Braune allowed those kriegies who remained to build a memorial, to which he personally contributed. Stalag Luft III is gone today, but that stone memorial to “The Fifty”, still stands.
Dick Churchill was an HP.52 bomber pilot and RAF Squadron Leader. One of the 76 who escaped, Churchill was recaptured three days later, hiding in a hay loft. In a 2014 interview, Churchill said he was fairly certain he’d been spared execution, because his captors thought he might be related to Prime Minister Winston Churchill.
The last surviving veteran of the daring escape which inspired the 1963 movie died at his home near Crediton, Devon, England, on February 12. Five weeks ago. Dick Churchill was ninety-nine years old. | <urn:uuid:8674a4dc-d395-4102-8cca-c8ffb94d706d> | {
"date": "2019-03-22T05:38:31",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202628.42/warc/CC-MAIN-20190322034516-20190322060516-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9783531427383423,
"score": 3.203125,
"token_count": 1690,
"url": "https://todayinhistory.blog/2019/03/"
} |
No surprise here: arsenic is not good for you. In high doses, of course, it’s a deadly poison, but even at lower levels, exposure to arsenic can raise the risks of cancer and heart disease. It’s especially dangerous for young children in whom chronic arsenic exposure has been linked to lower IQ and poor intellectual function. And because arsenic can occur naturally in groundwater — where it can poison people via drinking water or through food grown in arsenic-contaminated soil — it can be difficult to avoid.
That’s why a new study in the journal Environmental Health Perspectives indicating that organic brown-rice syrup — a sweetener used in many organic and gluten-free foods, including baby formula — can be a source of arsenic is so worrying. Researchers from Dartmouth College and Dartmouth Medical School looked at foods that use organic brown-rice syrup and found evidence that some baby formulas, cereal bars and energy shots all contained levels of arsenic that were significantly higher than the 10 parts per billion (ppb) federal limit for drinking or bottled water.
Worst of all, despite the results, there are currently no U.S. regulatory limits for arsenic in food — which means there’s little to prevent consumers, and especially children, from being dosed with potentially harmful levels of the chemical. “In the absence of regulations for levels of arsenic in food, I would certainly advise parents who are concerned about their children’s exposure to arsenic not to feed them formula where brown-rice syrup is the main ingredient,” Brian Jackson, the lead author of the study, told Consumer Reports.
Some of the findings of the study include:
- Two of the 17 infant formulas tested listed brown-rice syrup as a main ingredient, and one had an arsenic concentration that was six times the federal limit on arsenic in water.
- Twenty-two of the 29 cereal bars or energy bars tested had at least one of four rice products — organic brown-rice syrup, rice flour, rice grain or rice flakes — among the main ingredients. Those bars had arsenic levels ranging from 23 to 128 ppb, all well above the federal limit on water.
- Tests of high-energy products known as “energy shots” showed that one of the three blocks contained 84 ppb of total arsenic, and the other two contained 171 ppb.
The reason brown-rice syrup was targeted for the research is that rice — which is grown in inundated soil — can be more easily contaminated by arsenic than other foods. (Indeed, this isn’t the first time arsenic has been found in rice products.) It also matters what kind of arsenic may be contaminating foods: organic or inorganic. Organic arsenic is usually seen as less harmful than inorganic arsenic, but it’s notable that most of the arsenic found in the bars and energy gels was inorganic, while the infant formula had mostly organic arsenic. It’s also notable that the infant formulas that used brown-rice syrup have a very low market share, so presumably few babies are being exposed to them.
For their part, rice growers contested the notion that their crop posed a risk to consumers:
“U.S. rice and rice products are safe to consume,” says Stacy Fitzgerald-Redd, a spokesperson for the USA Rice Federation. “When discussing the content of arsenic in foods, it is essential to distinguish between organic and inorganic arsenic.”
“Most of the arsenic found in rice is organic arsenic, the benign kind, and the U.S. rice industry is working with U.S. regulatory officials as they look into this issue,” she says.
But even researchers who weren’t involved in the study caution parents to avoid formulas made using brown rice. Very young children and infants are at greater risk for arsenic poisoning because their small bodies mean they get a bigger exposure of the chemical.
The real lesson from the study is the need for some form of federal regulation of arsenic in food. That may be coming — the Food and Drug Administration is looking at the issue, and regulatory agencies in Britain and Europe are already on the way to setting limits. Legislation was introduced earlier this month in the House of Representatives to push the FDA. It’s long since time to act. | <urn:uuid:7248e189-ca92-49c8-961e-08441023006b> | {
"date": "2017-04-25T10:41:12",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120338.97/warc/CC-MAIN-20170423031200-00587-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9606869220733643,
"score": 3.40625,
"token_count": 882,
"url": "http://healthland.time.com/2012/02/16/oh-baby-why-there-may-be-arsenic-in-your-infant-formula/?xid=rss-topstories"
} |
Marijuana Exposure in Pediatric Populations
To access this course, select Subscribe on the left. You will then be required to log-in or register if you do not already have an account.
The goal of this course is to enhance the knowledge of physicians and other healthcare providers about the health impacts of marijuana exposure among the pediatric population. By enhancing their knowledge, physicians and other healthcare providers can better assess pediatric patients who may suffer symptoms caused by marijuana exposure, provide informed guidance to their patients’ caregivers, and advocate for stronger legislation to support exposure prevention.
- Recognize the basic pharmacology, pharmacokinetics, and methods of marijuana use
- Explain marijuana urine testing
- Describe the clinical effects of marijuana exposure in children and treatment for pediatric marijuana intoxication
- Describe how marijuana legislation has affected the incidence of marijuana exposures in pediatric populations
- Identify strategies to prevent unintentional pediatric exposures.
George Sam Wang, MD, FAAP
Assistant Professor of Pediatrics
Section of Emergency Medicine, Medical Toxicology
Department of Pediatrics
University of Colorado Anschutz Medical Campus, Children's Hospital Colorado
Dr. Wang, completed his pediatric residency and pediatric emergency medicine fellowship at Children's Hospital Colorado/Anschutz Medical Campus, and his medical toxicology fellowship at the Rocky Mountain Poison and Drug Center at Denver Health. He is an Assistant Professor of Pediatrics at Children's Hospital Colorado/Anschutz Medical Campus where he is a PEM and toxicology attending.
Approximate Completion Time
Continuing Education Information
This course qualifies as continuing education for physicians, nurses, certified health education specialists and other professionals provided by the Centers for Disease Control and its partners.
Origination Date – 04/19/2017
Expiration Date – 04/19/2019
1.0 CME (for physicians)
1.0 CME (attendance for non-physicians)
0.8 CNE (for nurses)
0.1 CEU (for other professionals)
CME activities with Joint Providers: This activity has been planned and implemented in accordance with the Essential Areas and policies of the Accreditation Council for Continuing Medical Education through the joint providership of the Centers for Disease Control and Prevention and the American College of Medical Toxicology. The Centers for Disease Control and Prevention is accredited by the (ACCME®) to provide medical education for physicians. Physicians should claim only the credit commensurate with the extent of their participation in the activity.
The Centers for Disease Control and Prevention designates this enduring material for a maximum of 1.0 AMA PRA Category 1 Credits™.
CNE: The Centers for Disease Control and Prevention is accredited as a provider of Continuing Nursing Education by the American Nurses Credentialing Center's Commission on Accreditation.
This activity provides 0.8 contact hours.
CEU: The Centers for Disease Control and Prevention is authorized by IACET to offer 0.1 CEU's for this program.
DISCLOSURE: In compliance with continuing education requirements, all presenters must disclose any financial or other associations with the manufacturers of commercial products, suppliers of commercial services, or commercial supporters as well as any use of unlabeled product(s) or product(s) under investigational use.
CDC, our planners, content experts, and their spouses/partners wish to disclose they have no financial interests or other relationships with the manufacturers of commercial products, suppliers of commercial services, or commercial supporters with the exception of Carl Baum and he wishes to disclose that he serves as an expert witness in lead and mold medico-legal cases. These topics are discussed in the School Environment, Health, and Performance Course for which Dr. Baum served as a content reviewer and planner. And George Sam Wang and he wishes to disclose that he has written chapters on topics pertaining to marijuana, and is a CDPHE Med Marijuana Grant awardee, evaluating the pharmacokinctics of CBD in pediatric epilepsy patients.
Planning committee reviewed content to ensure there is no bias.
Content will not include any discussion of the unlabeled use of a product or a product under investigational use.
The Centers for Disease Control and Prevention and American College of Medical Toxicology are jointly providing the CNE for this activity.
CDC does not accept commercial support.
Acknowledgement: The U.S. Environmental Protection Agency (EPA) supports the PEHSU by providing partial funding to ATSDR under Inter-Agency Agreement number DW-75-95877701. Neither EPA nor ATSDR endorse the purchase of any commercial products or services mentioned in PEHSU publications.
- Marijuana Exposure in Pediatric Populations
- How To Obtain Continuing Education Credit | <urn:uuid:81fc0405-cce5-491c-bc0d-45ea67777f9f> | {
"date": "2017-08-18T08:46:42",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104631.25/warc/CC-MAIN-20170818082911-20170818102911-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9126850366592407,
"score": 2.53125,
"token_count": 964,
"url": "http://www.pehsuclassroom.net/lms/index.php?r=course/details&id=70"
} |
A flood of online information has caused school libraries to contemplate how they can stay relevant in today's digital world.
While stereotypical libraries might be quiet places where people check out books, that's no longer an accurate description of many school libraries across the country. They're becoming collaborative spaces where students learn how to attack information problems.
The mission of school libraries is to make sure students and school staff can effectively use ideas and information, said Joyce Kasman Valenza, teacher librarian at Springfield Township High School in Erdenheim, Penn. That includes teaching students how to evaluate resources in different formats such as infographics, tweets and digital images, which are often manipulated.
"If you believe that school libraries are just about prints, although that's a fine thing to be about, then you don't know school libraries," Kasman Valenza said. "We're about encouraging and motivating young people to be readers and to be excited about literature in all its new and glorious emerging formats."
Libraries can stay relevant in today's digital world by becoming information guides, keeping up with the times, moving resources to the cloud, working with teachers and helping students evaluate research materials.
In an era of digital resources, school libraries no longer function as warehouses of information, but as guides to information, said Debra Gottsleben, school library media specialist at Morristown High School in New Jersey. Students don't understand how to evaluate, sift through and use information from the Internet, and their parents don't either. That's why they need information experts to lead them, particularly since they'll be doing more of it given the Common Core State Standard's emphasis on research.
"We definitely still need school libraries now more than ever because of there being so many more places to find information, and not only are there more places to find the information, those sources have no editorial or vetting that goes on," Gottsleben said.
As more resources move from print to digital, school libraries need to reflect that shift, Gottsleben said. Libraries won't look relevant if they don't have digital resources, mobile devices and social media accounts.
Many libraries now have two front doors: A virtual door to the cloud and a physical door to a collaborative space, Kasman Valenza said. By keeping library doors open, schools provide equitable access to the digital research tools that students need to succeed, particularly in high school and college. These resources include e-books, databases, websites, subject directories and wikis.
"For about half the kids in our country, they do not have the access to the tools they need to explore the kind of investigation that kids ought to be doing at any level," Kasman Valenza said. "And part of the reason for that is because people don't get what they're eliminating when they eliminate libraries and librarians."
Librarians stressed the importance of keeping some physical books on hand because many students prefer them. But those books should be up to date, relevant and well-used to stay in school library collections, Gottsleben said.
By weeding out print collections and moving many of them to the cloud, libraries will free up room for learning spaces and provide access to digital resources 24/7, said Linda Conway, director of library media programming at Douglas County School District in Castle Rock, Colo. Through a library service called Libguides, librarians in the New Jersey district answer student questions online and put together guides for different areas including library orientation, language arts and chemistry, Gottsleben said.
In the first quarter of this school year, students have viewed 136 Libguides more than 25,000 times. That's nearly double the numbers from the first quarter of last school year. Circulation has doubled as well.
"We're at a crossroads with libraries, and one thing that I think helps us to stay relevant is not only to collaborate with the teachers, but also to take all those resources that we have available and push them up into the cloud," Conway said.
It's also important for librarians to plan lessons with teachers, Conway said. By planning lessons together, teachers and librarians can combine content knowledge with 21st century soft skills including critical thinking, communication, collaboration and creativity.
Through the library's physical door, school districts are reimagining what libraries look like. In Douglas County School District, 16 out of 80 school libraries have created learning commons that include maker spaces, brainstorming areas and cafe-style places. Learning spaces were designed to meet the needs of particular students and schools. Key components of these spaces include flexible furniture, flexible devices and flexible schedules.
But ultimately, it's not about the space. It's about the learning, Conway said. When the learning shifts to something like project-based or STEM style, the library space shifts to support that learning.
"Their primary function really is to serve almost as a collaborative workspace, and certainly as a gatekeeper for information, not necessarily for the access to that information, but certainly as a gatekeeper to guide people to the best places and resources for information," Gottsleben said.
You may use or reference this story with attribution and a link to | <urn:uuid:91e97307-6387-4c24-9f8f-89419e9ab89c> | {
"date": "2014-07-25T03:37:41",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997892806.35/warc/CC-MAIN-20140722025812-00080-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9542704224586487,
"score": 3.390625,
"token_count": 1064,
"url": "http://www.centerdigitaled.com/news/5-Ways-School-Libraries-Can-Stay-Relevant-in-the-Digital-Age.html"
} |
Mice and other rodents are known to carry a number of diseases that can spread to humans directly through contact with feces, urine, saliva or bites. Diseases can also spread from insects like fleas, ticks or mites that travel and feed on these rodents.
Rat bite fever this disease is more common in asia, and japan known as sodoku 18 may 2017 rats, mice other rodents can carry diseases that cause illnesses if most people who contract hantavirus.
Worldwide, rats and mice spread over 35 diseases. These diseases can be spread to humans directly, through handling of rodents, through contact with rodent feces, urine, or saliva, or through rodent bites. Diseases carried by rodents can also be spread to humans indirectly, through ticks, mites or fleas that have fed on an infected rodent.
Why Do Bee and Wasp Stings Hurt? Wasps, unlike honey bees, can sting more than once. Some people describe the sensation of a wasp sting as stabbing, fiery, burning, aching, excruciating, or all of the above. How much it hurts is an individual thing.What You Should Know About Mosquito Larvae WHAT YOU SHOULD KNOW ABOUT MOSQUITO CONTROL AND PESTICIDES .. How they work: mosquito larvae and pupae have air tubes that they use to breathe at the surface of the water. Surface films suffocate the mosquito larva or pupa by. 3 .Why Rodents Vacation In Our Comfy Abodes Wildlife Poses a growing pest control Problem for Homeowners The Essential Guide to Mosquitoes Additionally, a 2014 study found that tea tree essential oil had insecticidal and repellent effects against the insect species used in the study. 13. Clary Sage. This essential oil has a floral scent and is often used for improving mood. Clary sage oil can also be easily blended with a carrier oil and applied to the skin to protect against mosquitoes. It can also be used to discourage mosquitoes from entering a room or.Pest Control inspection is primarily looking for insect (termites, etc). They often fail to identify wildlife issues. critter control provides new home inspections to identify wildlife issues, or things that could potentially cause a problem in the future. Wildlife Problems in Boston, MA- Rent from people in Bright and comfy studio 10 minutes From Klcc, Kampung Berembang, Kuala Lumpur, Malaysia from $20/night.. The homestay features a well-equipped washroom and a furnished bedroom. The cosy abode is well-equipped with a range of amenities, including a swimming.
Historically rodents have played a profound role in the transmission of diseases to humans. The "Black Death" (Bubonic Plague), which claimed more than 25 million lives in 14th Century Europe, is perhaps the most documented case history of rats and disease.The plague bacterium (yersinia Pestis) was transmitted amongst rats and from rats to humans by the bite of the Oriental Rat Flea.
What many people do not realize, however, is that these pests can be much more than a nuisance. Rodents, such as rats, mice, prairie dogs and rabbits, are associated with a number of health risks. In fact, rats and mice are known to spread more than 35 diseases.
Why do rodents carry so many diseases? Update Cancel.. Do rats really spread disease and illnesses?. Indeed, rodents and mice are known to spread in excess of 35 sicknesses. These ailments can be spread to people straightforwardly, through treatment of live or dead rodents, through contact.
Second, yes, mice carry diseases and humans can get diseases from mice. Below, we’ll delve into the diseases mice carry, whether the diseases are harmful, how a person and/or a pet could become infected, symptoms of the diseases, and how to treat them. What Diseases Do Mice Carry? Mice and rats carry over 35 different diseases worldwide.
Neither rats nor mice are poisonous. They are both very dirty and carry many diseases, and so do the fleas that are on them. As to which is more of a disease factory, I don’t know.
What is a Cocoon? What May Be in Your Restaurant’s Drains? Why Are Bees Attracted To Me? Bees defending their colony are attracted to carbon dioxide, as the facial area is a sensitive place to sting. Heavy breathing around bees is therefore a bad idea. Remember that bees are far more likely to sting you around their home, where they have brood and honey to defend.Drain, OR Restaurant Guide. See menus, reviews, ratings and delivery info for the best dining and most popular restaurants in Drain.. Drain Restaurant guide. results 1 – 10 of 10 restaurants Rose Garden Inn ($) American, Seafood, Steakhouse.White House to Help Pollinators Like Bees and Butterflies cocoon and it is ready to use for producing raw silk in the next video i will show how the raw silk is made please wach my next video . to watch my next video please subscribe and like comment | <urn:uuid:1bcc833a-1994-4681-8827-d9df84c55876> | {
"date": "2019-09-18T05:41:17",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573184.25/warc/CC-MAIN-20190918044831-20190918070831-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9456021189689636,
"score": 2.8125,
"token_count": 1037,
"url": "https://www.urbanpestcontrolct.com/what-diseases-do-mice-rodents-carry-rodent-diseases/"
} |
For something we are all familiar with, life tends to be a remarkably difficult thing to define. Most definitions, however, include the ability to reproduce. Which means that a microbial community that has been discovered on the floor of the Pacific Ocean stretches the definition of what it means to be alive.
Bacteria are detected in the sediments down to the level of at least 20m, and are probably present (if rare) below that. But based on oxygen consumption, the cells are operating at a metabolism that appears to be right at the minimum energy flux needed to simply keep their cellular components operational. With no energy to spare, it's possible that these cells are not even able to reproduce.
The discovery of thriving ecosystems at deep-ocean hydrothermal vents helped revolutionize how we view life. Unlike familiar ecosystems on the surface, these organisms weren't ultimately dependent upon sunlight to power the base of the food chain, instead relying on chemical energy provided by the Earth's internal heat. Since then, other communities have been found that rely on unusual sources of energy. Deep in a mine, organisms appear to rely on radioactive decay to provide a source of hydrogen. Under an Antarctic ice sheet, another community grabs its energy by oxidizing iron exposed by the glaciers.
These organisms have provided us with insights about the broad range of energy sources that can be used to support life. But they've also helped tell us about just how little energy life needs to squeak by. The bacteria found in the South African mine, for example, get so little energy that they're probably able to divide only once every few hundred years. In contrast, a well-fed E. coli can divide every 20 minutes.
The newly described bacterial community may make those look positively energetic.
They were spotted by a research cruise that was taking sediment cores across the equatorial Pacific before turning north and sampling up past Hawaii. This path took it into the North Pacific Gyre, an area that has been made famous because circulating currents tend to trap a lot of our trash there. But biologically speaking, it was also an area of low biological activity. The surface waters are relatively nutrient-starved, and have a primary productivity that is nearly an order of magnitude lower than the open ocean nearby.
On the ocean floor, this seems to have produced a completely different ecosystem than many other areas of the globe. Generally, the sediment that falls to the ocean floor is rich in organic compounds created by the life above. These get rapidly digested by the microbes above, which burn through the sediments oxygen at a rapid clip while doing so. As a result, just a short distance from the surface, the oxygen gets very sparse, and anaerobic microbes take over.
The sediment in the gyre is nothing like that. It takes roughly a thousand years for just a millimeter to accumulate, and bacterial activity is so low that there's oxygen down to at least 30 meters—at which point, the sediment was probably deposited about 86 million years ago. If big numbers are a problem, think of it this way: that's back when dinosaurs dominated terrestrial ecosystems.
The authors searched their sediments for bacteria, and were able to detect them down to at least 20m, at which point there were only about 1,000 cells in every cubic centimeter of muck. There may be more below that, but they were below the authors' ability to detect them. Based on the density of the cells present and the rate at which oxygen decreased with depth, the authors were able to calculate how much oxygen was being used to keep these cells alive.
The results were pretty eye-popping. Thirty meters below the ocean floor, an entire liter of sediment would only burn through a nanomole of oxygen—in an entire year. At that rate, a single cell would be using just 100,000 oxygen molecules a day to stay alive. That's below the rate described for the slowest-growing cultures we've managed to maintain in a lab and probably closer to the oxygen use of bacteria in a quiescent, stationary phase of growth. "These microbial communities may be living at the minimum energy flux needed for prokaryotic cells to subsist and that the total available energy flux ultimately controls the microbial community size in the deep biosphere," the authors conclude.
In other words, they've only been receiving enough energy to do maintenance, and probably not enough to actually divide. Which stretches most definitions we have of what it means to be alive.
The biggest question lingering over the story is what's actually going on once oxygen use reaches its steady state level in these sediments. Given the difficulty of detecting cells, the authors haven't clearly demonstrated that a non-biological process doesn't take over below a certain depth. Gently adding some nutrients and a bit more oxygen might allow something to grow out of the sample, providing a clearer indication that there really is something alive down there.
And, if something does grow out, then we could actually subject it to DNA sequencing and figure out what exactly can live under such extraordinarily limiting conditions. | <urn:uuid:0fb3ddee-0ae1-439d-99eb-0242b64e9e99> | {
"date": "2014-07-28T04:57:25",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510256737.1/warc/CC-MAIN-20140728011736-00276-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9670512080192566,
"score": 4.4375,
"token_count": 1033,
"url": "http://arstechnica.com/science/2012/05/its-just-barely-sort-of-alive/"
} |
by Alejandra "Alex" Ruani — Get free science updates here.
Welcome to our Thursday’s Science Catch-up: curated links by The Health Sciences Academy. Get our email updates every other Thursday here (it’s free).
Let’s catch you up with studies and news that recently made the headlines!
Click on your favourite topics to read our summary:
Ready to learn? Begin reading below.
Is your cluttered kitchen making you eat more?
This new Cornell study tells us that messy kitchens are “caloric” kitchens. How cluttered and chaotic is your kitchen?
With dishes in the sink, newspapers on the table, and the phone ringing, study participants ate more of the indulgent snacks – twice as many cookies compared to those in organised and quiet kitchens.
The researchers suspect that this is because cluttered and chaotic environments can make you feel out of control and cause stress eating.
“Everything else is out of control, so why shouldn’t I be?”, they explain.
What to do?
To avoid overeating from this, de-clutter your kitchen before putting the first bite in your mouth!
If you can’t de-clutter or clean up, the researchers suggest to put yourself in an “in-control” mindset before reaching for the food. How? By thinking of a time when you were actually were in control despite the chaos.
Note: Besides your kitchen, there are hundreds of external influences on what, when, and how much you eat! Learn what these are here.
Overeating “switches off” feel-full hormone
Have you ever heard of the hormone uroguanylin? Most people haven’t! Uroguanylin is an appetite-suppressant hormone. It’s secreted by your gut cells, telling your brain to stop eating.
Scientists have just started investigating this hormone in relation to appetite, calorie burning, and even the generation of “brown” fat in your body – i.e. the only kind of fat that is metabolically active and actually burns white fat!
So, what happened in this study?
It appears that overeating calories stops the production of uroguanylin. In other words, you won’t be getting its “stop eating” signals. This can promote even more eating, eventually leading to obesity and metabolic syndrome.
This is an example of epigenetics “gone wrong”. Remember what epigenetics is? The switching of genes “on” or “off” by environmental signals.
In this case, overconsuming calories switches off the gene that is supposed to tell your gut cells to make this appetite-suppressant hormone.
The gene is called GUCY2C. But, with this gene inactive, overeating can lead to even more overeating.
When ketogenic dieting isn’t for everyone (or how fat becomes lethal, even without weight gain)
High-fat, low-carb dieting (AKA “ketogenic” dieting) may work for some.
However, scientists are now beginning to suspect that for those born with certain gene variants, going keto could be lethal.
According to new research, fat metabolism during ketosis can go haywire in those who are obese, type 1 diabetic, or born with genetic mutations that affect fat oxidation (such as errors in the CPT2 gene).
In this study, the mutated mice couldn’t handle the high-fat intake, and the ketogenic diet eventually killed them.
Yes, the diet dissolved all fat tissue throughout their bodies. But their livers were enlarged with fat molecules. How come?
Fat molecules freed up by fat cells are sent to the liver for oxidation (burning). However, the livers of mutated mice couldn’t burn those fat molecules, they just absorbed them and got too fat to function.
What happens next?
The truth is that some people can metabolise fats better than others, and your genetics play a role in that. For example, Eskimos can tolerate high amounts of fat without issues (see here).
But if you can’t metabolise high-fat intake properly, or have tolerance problems, please apply caution. You wouldn’t want to follow a trend to fix something, yet break something else!
The ‘Muffin Experiment’ for weight loss and metabolic syndrome
A typical muffin is loaded with saturated fat (from butter or lard). But not the muffin designed for this experiment.
What for? Because excessive saturated fat consumption has been shown to contribute to insulin resistance, metabolic syndrome, and unhealthy weight (fat) gain (Riccardi et al., 2004).
For this reason, the participants’ diets were designed to reduce saturated fat for 8 months. To ensure they were getting sufficient amounts of unsaturated fats, the researchers gave them the specially-enriched muffins.
In the last 6 months, the patients who consumed the special muffins made with poly-unsaturated fats (safflower oil) lost more weight, had better insulin sensitivity, lower triglycerides, and lower blood pressure, compared to those consuming the muffins make with mono-unsaturated fats (high-oleic sunflower oil).
By the end of the study, 25% of them didn’t have metabolic syndrome anymore!
The researchers believe that poly-unsaturated fats (but not mono-unsaturated fats) activate signalling in the brain to reduce appetite.
Before you start baking muffins with safflower oil thinking it’s a “miracle solution”, the scientists will experiment with richer sources of Omega 3s next, from plants (e.g. flaxseeds) or marine origin (e.g. oily fish).
High-fibre intake to combat food allergies?
According to this Australian study, mice are less likely to have allergic reactions to peanuts if they eat a high-fibre diet.
The researchers believe this is because a fibre-rich diet helps feed “good” bacteria, strengthening the immune system and preventing allergic responses.
Although there isn’t definitive evidence that high-fibre intake combats food allergies in us humans, some clues suggest it might.
For example, children in rural Africa eat twice as much fibre as European children, and allergies are rare, probably because of a different gut microbiota composition.
Fibre is rich in vegetables, pulses (beans and lentils), and wholegrains (e.g. oats, quinoa, brown rice).
Note: Could you have a food allergy? We help you find out in our Food Allergies and Intolerances course.
Available upon individual purchase. Learn more here!
Available upon individual purchase. Learn more here!
If you want to get the latest science and our tips, make sure you sign up to our Thursday emails HERE.
What has inspired you this week? What are your thoughts on some of these topics? Leave a comment and let us know! | <urn:uuid:6761b895-3af8-4923-bc1b-e0b558a76f12> | {
"date": "2017-01-22T16:21:05",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00018-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.931026816368103,
"score": 2.703125,
"token_count": 1489,
"url": "https://thehealthsciencesacademy.org/science-catch-up/science-catch-19/"
} |
Yesterday’s look at Sara Seager’s new equation pointed out that it was designed to estimate how many planets with detectable signs of life could be discovered in the near future. The interview Seager gave to Astrobiology Magazine contrasts her work with Frank Drake’s famous equation to estimate the number of extraterrestrial cultures able to communicate with us. The comparison is understandable given the high visibility of Drake, but what I have called the Seager Equation is really something other than a revision of the earlier Drake principles.
For Seager’s focus is on the detection of any kind of life, not just communicating technological cultures, and her work is especially attuned to M-class dwarf stars, the kind of stars on which we’re most likely to be able to perform the needed observations in the near term. The biomarkers we’re looking for will probably first be examined by the James Webb Space Telescope, which will analyze the light from a parent red dwarf as a planet transits its face. The changes in starlight will tell us much about what kind of gases are found in the planet’s atmosphere.
At the European Planetary Science Congress at University College London, now in session, Lee Grenfell (DLR Institute of Planetary Research, Berlin) has also been talking about biomarkers. Oxygen, ozone, methane, and nitrous oxide when detected simultaneously would be signs of likely life, and Grenfell’s interest is in how we might go about detecting them. Like Seager, he’s interested in M-class dwarfs. His team has developed computer models to simulate different abundances of the biomarker gases and how they would affect the starlight filtered through a planetary atmosphere. The choice of M-dwarfs was an obvious one, says Grenfell:
“In our simulations, we modeled an exoplanet similar to the Earth, which we then placed in different orbits around stars, calculating how the biomarker signals respond to differing conditions. We focused on red-dwarf stars, which are smaller and fainter than our Sun, since we expect any biomarker signals from planets orbiting such stars to be easier to detect.”
Grenfell and company have clarified the effect of ultraviolet radiation from the parent star on the biomarker gases. Weak UV leads to less production of ozone, making its detection problematic even with upcoming instruments like the European Extremely Large Telescope. Too much ultraviolet is also a problem, causing increased heating in the middle atmosphere that effectively destroys the biomarker signature. Ozone detection in these models relies on an intermediate UV value.
Image: GJ1214b, shown in this artist’s view, is a super-Earth orbiting a red dwarf star 40 light-years from Earth. Planets transiting red dwarfs may be the first upon which we can apply our biomarker detection methods. Credit: NASA, ESA, and D. Aguilar (Harvard-Smithsonian Center for Astrophysics).
We’re in the early days of biomarker studies, but it’s worth mentioning that we’ve already used the EPOXI mission (the combined extended mission of the Deep Impact spacecraft) to study the Earth from millions of miles away, and the Galileo spacecraft looked for our planet’s biomarkers when it made an Earth flyby back in 1990 on its way to Jupiter (Carl Sagan’s 1994 book Pale Blue Dot gives a wonderful account of just how tricky it is to take such readings, and what they can tell us). Studies like these are necessary warm-ups for future work around distant stars.
It could be said that in these cases and in Grenfell’s work, the limitation is the modeling of the exoplanet, which is explicitly based on Earth. But we start with Earth because it is obviously the world we know the most about, and the one most capable of being studied exhaustively with these methods. Learning how to look for biomarkers on our own planet will help us develop the tools we can apply to more exotic environments like that of an M-dwarf solar system. We’ll also need to distinguish between signals arising from life and those created by natural processes.
Sara Seager thinks there is at least a small chance that we’ll pull off such a detection within the next ten years using the JWST, but even if that’s an optimistic reading, the tools are falling into place to make a biomarker detection feasible within a few decades. If it does happen, then what many of us assume — that life forms readily in the universe — will begin to seem more likely. The larger question of intelligent life that can build a technological culture will presumably take much longer, unless a SETI reception suddenly answers both questions with a single paradigm-shattering signal. | <urn:uuid:04a7add2-5178-446c-934b-0f5114e5ecd5> | {
"date": "2015-09-04T03:46:17",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645335509.77/warc/CC-MAIN-20150827031535-00110-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9428532123565674,
"score": 3.515625,
"token_count": 993,
"url": "http://www.centauri-dreams.org/?p=28987"
} |
Culture and The Self. Sources of Cultural Differences. Evoked culture—produced by environmental differences (e.g., source of food). Transmitted culture—produced by communication of beliefs from generation to generation (e.g., morals). Individualist Individual success Take care of oneself
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Culture and The Self
Take care of oneself
Express individual identity
Take care of each other
Restrain self to fit in with the group | <urn:uuid:afe045cc-3c62-4d5d-b401-d37e851cd99c> | {
"date": "2017-03-28T04:30:38",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189667.42/warc/CC-MAIN-20170322212949-00496-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9221460819244385,
"score": 2.578125,
"token_count": 153,
"url": "http://www.slideserve.com/ting/culture-and-the-self"
} |
Earthwork for Foundations - 3 PDH
1. EARTHWORK: EXCAVATION AND PREPARATION FOR FOUNDATIONS
2. BACKFILL OPERATIONS
3. SPECIFICATION PROVISIONS
4. CONSTRUCTION CONTROL
Learn about problems encountered during excavation related to groundwater conditions, slope stability, and adverse weather conditions.
Learn the importance of accurate daily records such as of the quantity of water removed by the dewatering system and of the piezometric levels in the foundation and beneath excavation slopes.
Learn the importance of protection of exposed earthwork materials..
Learn the importance of checking exposed rock by a slaking test.
Learn how to minimize problems associated with the compaction of backfill by following good backfilling procedures.
Learn about open-zone compaction ofcoarse-grained soils that exhibit slight plasticity (clayey sands, silty sands, clayey gravels, and silty gravels) using either sheepsfoot or rubber-tired rollers.
Learn the general rules for lift thickness.
Learn guidelines for earthwork operations in freezing temperatures..
This course is intended for civil and geotechnical engineers and other infrastructure design and construction professionals who want an introduction to earthwork operations for foundations of buildings and other structures.
This course will introduce you to basic considerations when addressing excavation And backfill operations for structure foundations..
Upon completion of this course you will have an understanding of guidelines and approaches to earthwork operations for foundations of structures. | <urn:uuid:59310d2c-9efe-4d02-b09c-6bca7d15b3a7> | {
"date": "2017-09-20T14:27:44",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687324.6/warc/CC-MAIN-20170920142244-20170920162244-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8470705151557922,
"score": 3.4375,
"token_count": 311,
"url": "http://64.37.57.235/370/32/geotechnical/earthwork-for-foundations-3-pdh-detail.html"
} |
The Falklands War started on 2 April 1982 with the Argentine invasion and occupation of the Falkland Islands and South Georgia, and ended with the Argentine surrender on 14 June 1982. The conflict was the result of a protracted diplomatic confrontation regarding the sovereignty of the islands. Neither state officially declared war and the fighting was largely limited to the territories under dispute and the South Atlantic. The initial invasion was considered by Argentina as the re-occupation of its own territory, and by the UK as an invasion of a British overseas territory.
Britain launched a naval task force to engage the Argentine Navy and Argentine Air Force, and retake the islands by amphibious assault. After combat resulting in 258 British and 649 Argentine deaths, the British eventually prevailed and the islands remained under British control. However, as of 2008 and as it has since the 19th century, Argentina shows no sign of relinquishing its claim. Indeed, the claim remains in the Argentine constitution after its reformation in 1994.
The political effects of the war were strong in both countries. A wave of patriotic sentiment swept through both: the Argentine loss prompted even larger protests against the military government, which hastened its downfall; in the United Kingdom, the government of Prime Minister Margaret Thatcher was bolstered. It helped Thatcher's government to victory in the 1983 general election, which prior to the war was seen as by no means certain. The war has played an important role in the culture of both countries, and has been the subject of several books, films, and songs. The cultural and political weight of the conflict has had less effect on the British public than on that of Argentina, where the war is still a topic of discussion.
In the period leading up to the war, Argentina was in the midst of a devastating economic crisis and large-scale civil unrest against the military junta that had been governing the country since 1976, especially following the resignation of its most prominent member, Jorge Videla in late-March 1981. The Argentine military government, headed by General Leopoldo Galtieri, sought to maintain power by diverting public attention playing off long-standing feelings of the Argentines towards the islands, although they never thought that the United Kingdom would respond militarily. The ongoing tension between the two countries over the islands increased on 19 March when a group of hired Argentinian scrap metal merchants raised the Argentine flag at South Georgia, an act that would later be seen as the first offensive action in the war. The Argentine military junta, suspecting that the UK would reinforce its South Atlantic Forces, ordered the invasion of the Falkland Islands to be brought forward to 2 April.
Britain was initially taken by surprise by the Argentine attack on the South Atlantic islands, despite repeated warnings by Royal Navy captain Nicholas Barker and others. Barker believed that the intention expressed in Defence Secretary John Nott's 1981 review to withdraw the Royal Navy ship HMS Endurance, Britain's only naval presence in the South Atlantic, sent a signal to the Argentinians that Britain was unwilling, and would soon be unable, to defend her territories and subjects in the Falklands.
Word of the invasion first reached Britain via amateur radio. The retaking of the Falkland Islands was considered extremely difficult: the main constraint was the disparity in air cover (the British having 34 Harrier aircraft against Argentina's 220 jet fighters). The U.S. Navy considered a successful invasion to be 'a military impossibility.'
By mid-April, the Royal Air Force had set up an airbase at Wideawake on the mid-Atlantic island of Ascension, including a sizable force of Avro Vulcan B Mk 2 bombers, Handley Page Victor K Mk 2 refuelling aircraft, and McDonnell Douglas Phantom FGR Mk 2 fighters to protect them. Meanwhile the main British naval task force arrived at Ascension to prepare for war. A small force had already been sent south to re-capture South Georgia.
Encounters began in April; the British Task Force was shadowed by Boeing 707 aircraft of the Argentine Air Force during their travel to the south. One of these flights was intercepted outside the British-imposed exclusion zone, by a Sea Harrier; the unarmed 707 was not attacked because diplomatic moves were still in progress and the UK had not yet decided to commit itself to war.
On 23 April, a submarine alert was sounded and operations were halted, with the Tidespring being withdrawn to deeper water to avoid interception. On 24 April, the British forces regrouped and headed in to attack the submarine. On 25 April the ARA Santa Fe was spotted by a Westland Wessex HAS Mk 3 helicopter from HMS Antrim, which attacked the Argentine submarine with depth charges. HMS Plymouth launched a Westland Wasp HAS.Mk.1 helicopter, and HMS Brilliant launched a Westland Lynx HAS Mk 2. The Lynx launched a torpedo, and strafed the submarine with its pintle-mounted General Purpose Machine Gun; the Wessex also fired on the Santa Fe with its GPMG. The Wasp from HMS Plymouth as well as two other Wasps launched from HMS Endurance fired AS-12 ASM antiship missiles at the submarine, scoring hits. Santa Fe was damaged badly enough to prevent her from submerging. The crew abandoned the submarine at the jetty at King Edward Point on South Georgia.
With the Tidespring now far out to sea and the Argentine forces augmented by the submarine's crew, Major Sheridan decided to gather the 76 men he had and make a direct assault that day. After a short forced march by the British troops, the Argentine forces surrendered without resistance. The message sent from the naval force at South Georgia to London was, "Be pleased to inform Her Majesty that the White Ensign flies alongside the Union Jack in South Georgia. God Save the Queen." Prime Minister Thatcher broke the news to the media, telling them to "Just rejoice at that news!"
The Operation Black Buck raids comprised a series of five attacks on the Islands by RAF Avro Vulcan bombers of 44 Squadron, staged from Wideawake airbase on Ascension Island, close to the equator. The aircraft carried either 21 1,000 lb bombs internally or four Shrike anti-radar missiles externally. The overall effect of the raids on the war is difficult to determine, as the raids consumed precious tanker resources. The raids did minimal damage to the runway and damage to radars was quickly repaired. Commonly dismissed as post-war propaganda, Argentine sources were originally the source of claims that the Vulcan raids influenced Argentina to withdraw Mirage IIIs from the Southern Argentina to the Buenos Aires Defence Zone. This dissuasive effect was however watered down when British officials made clear that there wouldn't be strikes on air bases in Argentina. It has been suggested that the Black Buck raids were pressed home by the Royal Air Force as British armed forces had been cut in the late seventies, and the RAF may have desired a greater role in the conflict to prevent further cuts. A single crater was produced on the runway, rendering it impossible for the airfield to be used by fast jets. Argentine ground crew repaired the runway within twenty-four hours, but only to a level of quality suitable for the C-130 Hercules and Aermacchi MB-339 jets. Many sources claim that fake craters confounded British damage assessment, however, the British were well aware that the runway remained in use by C-130 and Pucara. The runway was also available for MB-339 Aermacchi jets.
On 1 May operations against the Falklands opened with the "Black Buck 1" attack on the airfield at Stanley. The Vulcan had originally been designed for medium-range stand-off nuclear missions in Europe and did not have the range to fly to the Falklands, requiring several in-flight refuellings. The RAF's tanker planes were mostly converted Handley Page Victor bombers with similar range, so they too had to be refuelled in the air. Thus, a total of 11 tankers were required for only two Vulcans, a huge logistical effort, given that both the tankers and bombers had to use the same strip. The attack yielded only a single hit on the runway.
The raids, at almost 8,000 nautical miles (13 000 km) and 16 hours for the return journey, were the longest-ranged bombing raids in history at that time (surpassed in the Gulf War of 1991 by USAF Boeing B-52G Stratofortresses flying from the continental United States but using forward-positioned tankers).
Only minutes after the RAF's Black Buck 1, nine Fleet Air Arm BAE Sea Harrier FRS Mk 1s from HMS Hermes followed up the raid by dropping BL755 cluster bombs on Stanley and the smaller grass airstrip at Goose Green. The Harriers destroyed one FMA IA 58 Pucará at Goose Green and caused minor damage to Stanley airfield infrastructure. The remaining runways were fully operational throughout the rest of the conflict. Other Sea Harriers had taken off from the deck of HMS Invincible for combat air patrols, and although Brian Hanrahan, a BBC reporter attached to the task force, was forbidden to divulge the number of planes involved, he came up with the memorable phrase "I counted them all out and I counted them all back.
The Argentines nevertheless claimed that two Sea Harriers were downed that morning in the general area of Stanley: the Commander of the 10th Mechanized Infantry Brigade, Brigadier-General Oscar Jofre, gave the serial numbers of the two Sea Harriers as XZ 458 and XZ 491, claiming that the first fell to a 35 mm gun and the second to a Roland missile. This claim has been dismissed by a number of English language sources, XZ 458 and XZ 491 both survived the Falklands war to be written off in accidents in 1984 and 1986 respectively.
The Falklands had only three airfields. The longest and only paved runway was at the capital, Stanley, and even it was too short to support fast jets. Therefore, the Argentines were forced to launch their major strikes from the mainland, severely hampering its efforts at forward staging, combat air patrols and close air support over the islands. The effective loiter time of incoming Argentine aircraft was low, and they were later compelled to overfly British forces in any attempt to attack the islands.
The first major Argentine strike force comprised 36 aircraft (McDonnell Douglas A-4 Skyhawks, Israel Aircraft Industries Daggers, English Electric B Mk 62 Canberras and Dassault Mirage III escorts), and was sent on 1 May, in the belief that the British invasion was imminent or landings had already taken place. Only a section of Grupo 6 (flying IAI Dagger aircraft) found ships, which were firing at Argentine defences near the islands. The Daggers managed to attack the ships and return safely. This greatly boosted morale of the Argentine pilots, who now knew they could survive an attack against modern warships, protected by radar ground clutter from the Islands and by using a late pop-up profile.
Combat broke out between Sea Harrier FRS Mk 1 fighters of No. 801 Naval Air Squadron and Mirage III fighters of Grupo 8. Both sides refused to fight at the other's best altitude, until two Mirages finally descended to engage. One was shot down by an AIM-9L Sidewinder air-to-air missile (AAM), while the other escaped but damaged and without enough fuel to return to its mainland air base. The plane made for Stanley, where it fell victim to friendly fire from the Argentine defenders.
As a result of this experience, Argentine Air Force staff decided to employ A-4 Skyhawks and Daggers only as strike units, the Canberras only during the night, and Mirage IIIs (without air refuelling capability or any capable AAM) as decoys to lure away the British Sea Harriers. The decoying would be later extended with the formation of the Escuadron Fenix, a squadron of civilian jets flying 24 hours-a-day simulating strike aircraft preparing to attack the fleet. On one of these flights, an Air Force Learjet was shot down, killing the squadron commander, Vice Commodore Rodolfo De La Colina, who was the highest-ranking Argentine officer to die in the War.
Stanley was used as an Argentine strongpoint throughout the conflict. Despite the Black Buck and Harrier raids on Stanley airfield (no fast jets were stationed there for air defence) and overnight shelling by detached ships, it was never out of action entirely. Stanley was defended by a mixture of Surface-to-air missile (SAM) systems (Franco-German Roland and British Tigercat) and Swiss-built Oerlikon 35 mm twin anti-aircraft cannons. Lockheed Hercules transport night flights brought supplies, weapons, vehicles, and fuel, and airlifted out the wounded up until the end of the conflict. The few RN Sea Harriers were considered too valuable by day to risk in night-time blockade operations, and their Blue Fox radar was not an effective look-down over land radar.
The only Argentine Hercules shot down by the British was lost on 1 June when TC-63 was intercepted by a Sea Harrier in daylight when it was searching for the British fleet north-east of the islands after the Argentine Navy retired its last SP-2H Neptune due to airframe attrition.
Two separate British naval task forces (surface vessels and submarines) and the Argentine fleet were operating in the neighbourhood of the Falklands, and soon came into conflict. The first naval loss was the World War II vintage Argentine light cruiser ARA General Belgrano — formerly the USS Phoenix, a survivor of the 1941 attack on Pearl Harbor. The nuclear-powered submarine HMS Conqueror, captained by Commander Christopher Wreford-Brown, sank Belgrano on 2 May with two (of three fired) Mk 8 Mod 4 torpedoes of interwar-vintage design; these were chosen as they carried a larger warhead and contact fuses and there were worries surrounding the reliability of the newer Tigerfish torpedoes. Three hundred and twenty-three members of Belgrano's crew died in the incident. Over 700 men were rescued from the open ocean despite cold seas and stormy weather. Losses from Belgrano totalled just over half of Argentine deaths in the Falklands conflict, and the Belgrano remains the only ship ever sunk by a nuclear submarine in combat, and only the second warship sunk by a submarine since the end of the Second World War (the first being the Khukri, an Indian frigate sunk during the Indo-Pakistani War of 1971).
In a separate incident later that night, British forces engaged an Argentine patrol gunboat, the ARA Alferez Sobral. At the time, the Alferez Sobral was searching for the crew of the Argentine Air Force English Electric Canberra light bomber shot down on 1 May. Two Royal Navy Lynxes fired four Sea Skua missiles against her. Badly damaged and with eight crew dead, the Sobral managed to return to Puerto Deseado two days later, but the Canberra's crew were never found.
Initial reports conflated the two incidents, contributing to confusion about the number of casualties and the identity of the vessel that sank. The Rupert Murdoch–owned British tabloid newspaper The Sun greeted the initial reports of the attack with the headline "GOTCHA". This first edition was published before news was known that the Belgrano had actually sunk (reporting instead, erroneously, that the gunboat had sunk) and carried no reports of actual Argentine deaths. The headline was replaced in later editions by the slightly more tempered "Did 1,200 Argies drown?".
The loss of ARA General Belgrano hardened the stance of the Argentine government and also became a cause célèbre for anti-war campaigners (such as Labour MP Tam Dalyell), who declared that the ship had been sailing away from the Falklands at the time, and was outside the exclusion zone, while sailing away from the area of conflict. The Total Exclusion Zone (TEZ) was an area declared by the United Kingdom on 30 April 1982 covering a circle of 200 nautical miles (370 km) from the centre of the Falkland Islands. During the Falklands War any sea vessel or aircraft from any country entering the zone may be fired upon without further warning. However, during war, under international law, the heading of a belligerent naval vessel has no bearing on its status. In addition, the captain of the Belgrano, Hector Bonzo, has testified that the attack was legitimate. In later years it has been claimed that the information on the position of the ARA General Belgrano came from a Soviet spy satellite which was tapped by the Norwegian intelligence service station at Fauske, Norway, and then handed over to the British. However, Conqueror had been shadowing the Belgrano for some days, so this extra information would have been unnecessary.
The sinking occurred 14 hours after President of Peru Belaúnde proposed a comprehensive peace plan and called for regional unity, although Mrs Thatcher and diplomats in London did not see this document until after the sinking of the Belgrano. Diplomatic efforts to that point had failed completely. There was no hope that additional diplomacy would lead anywhere. After the sinking Argentina rejected the plan but the UK indicated its acceptance on 5 May. The news was subsequently dominated by military action and it is not well known that the British continued to offer ceasefire terms until 1 June.
Regardless of controversies over the sinking, it had a crucial strategic effect: the elimination of the Argentine naval threat. After her loss, the entire Argentine fleet returned to port and did not leave again for the duration of hostilities. The two escorting destroyers and the battle group centred on the aircraft carrier ARA Veinticinco de Mayo both withdrew from the area, ending the direct threat to the British fleet that their pincer movement had represented.
British historian Sir Lawrence Freedman stated in the second volume of his Official History of the Falklands that intelligence about the Belgrano did not reach senior British commanders and politicians until the order to sink her was passed. Commander Christopher Wreford-Brown, commanding officer of HMS Conqueror, informed the Admiralty four hours before his attack that the Argentine cruiser had changed course, but this information was not passed to the Ministry of Defence or Rear-Admiral John “Sandy” Woodward (commander of the RN task force). However, as Admiral Woodward later stated, the Belgrano's course and speed at the time she was sunk were irrelevant, because they can change within seconds—from a strategic point of view, only her position and capabilities mattered.
On 4 May, two days after the sinking of Belgrano, the British lost the Type 42 destroyer HMS Sheffield to fire following an Exocet missile strike. The Argentine Navy had only 5 of these air-launched AM.39 Exocet anti-ship missiles when the war began. They had plenty of surface-launched MM.38 Exocets but they were unsuited for aircraft operation. Sheffield had been ordered forward with two other Type 42s in order to provide a long-range radar and medium-high altitude missile picket far from the British carriers. After the ships were detected by an Argentine Navy P-2 Neptune patrol aircraft, two Dassault Super Étendards (serial no. 202 and 203) were launched from their base at Río Grande, each armed with a single Exocet AM.39 missile. Refuelled by an KC-130H Hercules after launch, they went in at low altitude, popped up for a radar check at 50 miles (80 km) and released the missiles from a distance of 20 to 30 miles (30 to 50 km).
Glasgow, Sheffield’s sister ship and the northernmost of the three-destroyer picket, detected the two Étendards on their first pop-up, and warned the fleet-wide anti-air warfare coordinator in Hermes. Hermes dismissed the report as one of the many false alarms already that morning. Glasgow continued to monitor that bearing and detected the second pop-up, and this time the tell-tale Exocet seeker radar via the ship's electronic warfare support measures (ESM) equipment. Again Hermes ruled the detection as spurious, but Glasgow continued to broadcast handbrake, the codeword for Exocet radar detected.
The first missile missed HMS Yarmouth, due to the deployment of chaff in response to the warning, whilst Glasgow repeatedly tried, without success, to engage the other with Sea Dart missiles. Still Hermes ruled that this was a false alarm.
Sheffield was unable to detect directly the seeker radar as, in a case of bad timing, the SCOT satellite communications terminal was in use which deafened the onboard ESM equipment and was incompatible with the radar fitted to the Type 42. It is not known why she did not respond to Glasgow's warnings, but no chaff was fired and a shipwide warning of attack went out only seconds before impact when a watchkeeper (Lieutenant Commander Peter Walpole) identified rocket trails visually.
Sheffield was struck amidships, with devastating effect. Whether the warhead actually exploded is disputed, but raging fires started to spread, ultimately killing 20 crew members and severely injuring 24 others. The other missile (after missing HMS Yarmouth) splashed into the sea half a mile off her port beam. Whilst alongside rendering assistance, Yarmouth repeatedly broke off to fire anti-submarine weaponry in response to Sonar reports of torpedoes in the water (later believed to have been a misdiagnosis of the outboard motor of the small inflatables helping with firefighting), as well as visual reports of torpedoes (the Sheffield was ridding herself of torpedoes to prevent explosion).
Sheffield was abandoned several hours later, gutted and deformed by the fires that continued to burn for six more days. She finally sank outside the Maritime Exclusion Zone on 10 May, whilst under tow from Yarmouth, becoming an official war grave. In one sense Sheffield served her purpose as a part of the missile picket line — she took the missile instead of the aircraft carriers.
The tempo of operations increased throughout the second half of May as United Nations attempts to mediate a peace were rejected by the British, who felt that any delay would make a campaign impractical in the South Atlantic storms. The destruction of Sheffield had a profound impact on the British public, bringing home the fact that the "Falklands Crisis", as the BBC News put it, was now an actual 'shooting war'.
Given the threat to the British fleet posed by the Etendard / Exocet combination, plans were made to use Special Air Service troops to attack the home base of the five Etendards at Río Grande, Tierra del Fuego. The operation was code named "Mikado". The aim was to destroy the missiles and the aircraft that carried them, and to kill the pilots in their quarters. Two plans were drafted and underwent preliminary rehearsal: a landing by approximately fifty-five SAS in two C-130 Hercules aircraft directly on the runway at Rio Grande; and infiltration of twenty-four SAS by inflatable boats brought within a few miles of the coast by submarine. Neither plan was implemented; the earlier airborne assault plan attracted considerable hostility from some members of the SAS, who considered the proposed raid a suicide mission. Ironically, the Rio Grande area would be defended by four full-strength battalions of Marine Infantry of the Argentine Marine Corps of the Argentine Navy, some of whose officers were trained in the UK by the SBS years earlier.
After the war, Argentine marine commanders admitted that they were waiting for some kind of landing by SAS forces but never expected a Hercules to land directly on their runways, although they would have pursued British forces even into Chilean territory if they were attacked.
An SAS reconnaissance team was dispatched to carry out preparations for a seaborne infiltration. A Westland Sea King helicopter carrying the assigned team took off from HMS Invincible on the night of 17 May, but bad weather forced it to land 50 miles (80 km) from its target, and the mission was aborted. The pilot flew to Chile and dropped off the SAS team, before setting fire to his helicopter and surrendering to the Chilean authorities. The discovery of the burnt-out helicopter attracted considerable international attention at the time.
On 14 May the SAS carried out the raid on Pebble Island at the Falklands, where the Argentine Navy had taken over a grass airfield for FMA IA 58 Pucará light ground attack aircraft and T-34 Mentors. The raid destroyed the aircraft there.
During the night on 21 May the British Amphibious Task Group under the command of Commodore Michael Clapp (Commodore, Amphibious Warfare - COMAW), landed on beaches around San Carlos Water, on the northwestern coast of East Falkland facing onto Falkland Sound. The bay, known as Bomb Alley by British forces, was the scene of repeated air attacks by low-flying Argentine jets.
The 4,000 men of 3 Commando Brigade were put ashore as follows: 2nd battalion of the Parachute Regiment (2 Para) from the RORO ferry Norland and 40 Commando (Royal Marines) from the amphibious ship HMS Fearless were landed at San Carlos (Blue Beach), 3 Para from the amphibious ship HMS Intrepid were landed at Port San Carlos (Green Beach) and 45 Commando from RFA Stromness were landed at Ajax Bay (Red Beach). Notably the waves of 8 LCUs and 8 LCVPs were led by Major Ewen Southby-Tailyour who had commanded the Falklands detachment only a year previously. 42 Commando on the liner SS Canberra was a tactical reserve. Units from the Royal Artillery, Royal Engineers etc. and tanks were also put ashore with the landing craft, the Round table class LSL and mexeflote barges. Rapier missile launchers were carried as underslung loads of Sea Kings for rapid deployment.
By dawn the next day they had established a secure beachhead from which to conduct offensive operations. From there Brigadier Thompson's plan was to capture Darwin and Goose Green before turning towards Port Stanley. Now, with the British troops on the ground, the Argentine Air Force began the night bombing campaign against them using Canberra bomber planes until the last day of the war (14 June).
At sea, the paucity of the British ships' anti-aircraft defences was demonstrated in the sinking of HMS Ardent on 21 May, HMS Antelope on 21 May, and MV Atlantic Conveyor (struck by two AM39 Exocets) on 25 May along with a vital cargo of helicopters, runway-building equipment and tents. The loss of all but one of the Chinook helicopters being carried by the Atlantic Conveyor was a severe blow from a logistics perspective. Also lost on this day was HMS Coventry, a sister to HMS Sheffield, whilst in company with HMS Broadsword after being ordered to act as decoy to draw away Argentinian aircraft from other ships at San Carlos Bay. HMS Argonaut and HMS Brilliant were badly damaged. However, many British ships escaped terminal damage because of the Argentine pilots' bombing tactics.
In order to avoid the highest concentration of British air defences, Argentine pilots released ordnance from very low altitude so that their bomb fuzes did not have sufficient time to arm before impact. The low release of the retarded bombs (some of which had been sold to the Argentines by the British years earlier) meant that many never exploded, as there was insufficient time in the air for them to arm themselves. A simple free-fall bomb will, during a low altitude release, impact almost directly below the aircraft which is then within the lethal fragmentation zone of the resulting explosion. A retarded bomb has a small parachute or air brake that opens to reduce the speed of the bomb to produce a safe separation between the two. The fuze for a retarded bomb requires a minimum time over which the retarder is open to ensure safe separation. The pilots would have been aware of this, but due to the high concentration levels required in order to avoid the anti-aircraft defences of SAMs and AAA, as well as any British Sea Harriers, many failed to climb to the necessary release point. The problem was solved by the improvised fitting of retarding devices, allowing low-level bombing attacks as employed on 8 June.
In his autobiographical account of the Falklands War, Admiral Woodward blames the BBC World Service for these changes to the bombs. The World Service reported the lack of detonations after receiving a briefing on the matter from a Ministry of Defence official. He describes the BBC as being more concerned with being "fearless seekers after truth" than with the lives of British servicemen. Colonel H. Jones levelled similar accusations against the BBC after they disclosed the impending British attack on Goose Green by 2 Para. Jones had threatened to lead the prosecution of senior BBC officials for treason but was unable to do so since he was himself killed in action around Goose Green. Thirteen bombs hit British ships without detonating. Lord Craig, the former Marshal of the Royal Air Force, is said to have remarked: "Six better fuses and we would have lost although Ardent and Antelope were both lost despite the failure of bombs to explode. The fuses were functioning correctly, and the bombs were simply released from too low an altitude. The Argentines lost nearly twenty aircraft in the attacks.
From early on 27 May until 28 May, 2 Para, (approximately 500 men) with Artillery support from 8 (Alma) Cdo Bty RA, approached and attacked Darwin and Goose Green, which was held by the Argentine 12th Inf Regt. After a tough struggle which lasted all night and into the next day, 17 British and 55 Argentine soldiers had been killed, and 1,050 Argentine troops (including around 350 Argentine Air Force non-combatant personnel of the Condor airfield ) taken prisoner. The BBC announced the taking of Goose Green on the BBC World Service before it had actually happened. It was during this attack that Lieutenant Colonel H. Jones, the commanding officer of 2 Para was killed while breaking into the well-prepared Argentine positions at the head of his battalion. He was posthumously awarded the Victoria Cross.
With the sizeable Argentine force at Goose Green out of the way, British forces were now able to break out of the San Carlos bridgehead. On 27 May, men of 45 Cdo and 3 Para started walking across East Falkland towards the coastal settlement of Teal Inlet.
The Argentine Navy used their last AM39 Exocet missile attempting to attack HMS Invincible on the 30th of May. There are claims the missile struck, however the British have denied this, some citing that HMS Avenger shot it down.
On the 31 May, the Royal Marines Mountain and Arctic Warfare Cadre (M&AWC) defeated Argentine Special Forces at the Battle of Top Malo House. A 13-strong Argentine Army Commando detachment (Captain Jose Vercesi's 1st Assault Section, 602nd Commando Company) found itself trapped in a small shepherd's house at Top Malo. The Argentine commandos fired from windows and doorways and then took refuge in a stream bed from the burning house. Completely surrounded, they fought 19 M&AWC marines under Captain Rod Boswell for forty-five minutes until, with their ammunition almost exhausted, they elected to surrender. Three Cadre members were badly wounded. On the Argentine side there were two dead including Lieutenant Ernesto Espinoza and Sergeant Mateo Sbert (who were decorated for their bravery). Only five Argentines were left unscathed. As the British mopped up Top Malo House, down from Malo Hill came Lieutenant Fraser Haddow's M&AWC patrol, brandishing a large Union Flag. One wounded Argentine soldier, Lieutenant Horacio Losito, commented that their escape route would have taken them through Haddow's position.
Major Mario Castagneto's 601st Commandos tried to move forward on Kawasaki motorbikes and commandeered Land Rovers to rescue 602nd Commando Company on Estancia Mountain. Spotted by 42 Commando of the Royal Marines, they were engaged with 81mm mortars and forced to withdraw to Two Sisters mountain. Captain Eduardo Villarruel on Estancia Mountain realised his position had become untenable and after conferring with fellow officers ordered a withdrawal.
The Argentine operation also saw the extensive use of helicopter support to position and extract patrols; the Argentine Army 601st Combat Aviation Battalion also suffered casualties. At about 11.00 a.m. on 30 May, an Aerospatiale SA-330 Puma helicopter was brought down by a shoulder-launched Stinger surface-to-air missile (SAM) fired by the SAS in the vicinity of Mount Kent in which six National Gendarmerie Special Forces were killed and eight more wounded in the crash.
As Brigadier Julian Thompson commented, "It was fortunate that I had ignored the views expressed by Northwood that reconnaissance of Mount Kent before insertion of 42 Commando was superfluous. Had D Squadron not been there, the Argentine Special Forces would have caught the Commando before deplaning and, in the darkness and confusion on a strange landing zone, inflicted heavy casualties on men and helicopters."
By 1 June, with the arrival of a further 5,000 British troops of the 5th Infantry Brigade, the new British divisional commander, Major General Jeremy Moore RM, had sufficient force to start planning an offensive against Stanley.
During this build-up, the Argentine air assaults on the British naval forces continued, killing 56. 32 of the dead were from the Welsh Guards on RFA Sir Galahad and RFA Sir Tristram on 8 June. According to Surgeon-Commander Rick Jolly of the Falklands Field Hospital, more than 150 men suffered burns and injuries of some kind in the attack, including, famously, Simon Weston.
The Guards were sent to support a dashing advance along the southern approach to Stanley. On 2 June a small advance party of 2 Para moved to Swan Inlet house in a number of Army Westland Scout helicopters. Telephoning ahead to Fitzroy, they discovered the area clear of Argentines and (exceeding their authority) commandeered the one remaining RAF Chinook helicopter to frantically ferry another contingent of 2 Para ahead to Fitzroy (a settlement on Port Pleasant) and Bluff Cove (a settlement confusingly, and perhaps ultimately fatally, on Port Fitzroy).
This un-coordinated advance caused planning nightmares for the commanders of the combined operation, as they now found themselves with a 30 mile (48 km) string of indefensible positions on their southern flank. Support could not be sent by air as the single remaining Chinook was already heavily oversubscribed. The soldiers could march, but their equipment and heavy supplies would need to be ferried by sea. Plans were drawn up for half the Welsh Guards to march light on the night of 2 June, whilst the Scots Guards and the second half of the Welsh Guards were to be ferried from San Carlos Water in the Landing Ship Logistics (LSL) Sir Tristram and the landing platform dock (LPD) Intrepid on the night of 5 June. Intrepid was planned to stay one day and unload itself and as much of Sir Tristram as possible, leaving the next evening for the relative safety of San Carlos. Escorts would be provided for this day, after which Sir Tristram would be left to unload using an inflatable platform known as a Mexeflote for as long as it took to finish.
Political pressure from above to not risk the LPD forced Commodore Clapp to alter this plan. Two lower-value LSLs would be sent, but without suitable beaches on which to land, Intrepid's landing craft would need to accompany them to unload. A complicated operation across several nights with Intrepid and her sister ship Fearless sailing half-way to dispatch their craft was devised. The attempted overland march by half the Welsh Guards failed, possibly as they refused to march light and attempted to carry their equipment. They returned to San Carlos and were landed directly at Bluff Cove when Fearless dispatched her landing craft. Sir Tristram sailed on the night of 6 June and was joined by Sir Galahad at dawn on 7 June. Anchored 1,200 feet (370 m) apart in Port Pleasant, the landing ships were near Fitzroy, the designated landing point. The landing craft should have been able to unload the ships to that point relatively quickly, but confusion over the ordered disembarcation point (the first half of the Guards going direct to Bluff Cove) resulted in the senior Welsh Guards infantry officer aboard insisting his troops be ferried the far longer distance directly to Port Fitzroy/Bluff Cove. The intention was for the infantrymen to march via the recently repaired Bluff Cove bridge (destroyed by retreating Argentine combat engineers) to their destination, a journey of around seven miles (11 km).
The longer journey time of the landing craft taking the troops directly to Bluff Cove and the squabbling over how the landing was to be performed caused enormous delay in unloading. This had disastrous consequences. Without escorts, having not yet established their air defence, and still almost fully laden, the two LSLs in Port Pleasant were sitting targets for two waves of Argentine A-4 Skyhawks.
The disaster at Port Pleasant (although often known as Bluff Cove) would provide the world with some of the most sobering images of the war as TV news video footage showed Navy helicopters hovering in thick smoke to winch survivors from the burning landing ships.
On the night of 11 June after several days of painstaking reconnaissance and logistic build-up, British forces launched a brigade-sized night attack against the heavily defended ring of high ground surrounding Stanley. Units of 3 Commando Brigade, supported by naval gunfire from several Royal Navy ships, simultaneously assaulted in the Battle of Mount Harriet, Battle of Two Sisters, and Battle of Mount Longdon.
During this battle, 13 were killed when HMS Glamorgan, straying too close to shore while returning from the gun line, was struck by an improvised trailer-based Exocet MM38 launcher taken from ARA Seguí destroyer by Argentine Navy technicians. On this day, Sgt Ian McKay of 4 Platoon, B Company, 3 Para died in a grenade attack on an Argentine bunker which was to earn him a posthumous Victoria Cross. After a night of fierce fighting, all objectives were secured.
The night of 13 June saw the start of the second phase of attacks, in which the momentum of the initial assault was maintained. 2 Para captured Wireless Ridge at the Battle of Wireless Ridge, and the 2nd battalion, Scots Guards captured Mount Tumbledown at the Battle of Mount Tumbledown.
With the last natural defence line at Mount Tumbledown breached, the Argentine town defences of Stanley began to falter. In the morning gloom, one company commander got lost and his junior officers became despondent. Private Santiago Carrizo of the 3rd Regiment described how a platoon commander ordered them to take up positions in the houses and "if a Kelper resists, shoot him", but the entire company did nothing of the kind.
The commander of the Argentine garrison in Stanley, Brigade General Mario Menéndez, surrendered to Major General Jeremy Moore. 9,800 Argentine troops were made prisoners of war and some 4,167 were repatriated to Argentina on the ocean liner Canberra alone.
On 20 June the British retook the South Sandwich Islands, (which involved accepting the surrender of the Southern Thule Garrison at the Corbeta Uruguay base) and declared hostilities to be over. Corbeta Uruguay was established in 1976, but the Argentine base was contested only through diplomatic channels by the UK until 1982.
The war lasted 74 days, with 255 British and 649 Argentine soldiers, sailors, and airmen, and three civilian Falklanders killed.
In total 907 were killed during the 74 days of the conflict:
Of the 86 Royal Navy personnel, 22 were lost in HMS Ardent, 19 + 1 lost in HMS Sheffield, 18 + 1 lost in HMS Coventry and 13 lost in HMS Glamorgan. 14 naval cooks were among the dead, the largest number from any one branch in the Royal Navy.
33 of the British Army's dead came from the Welsh Guards, 21 from the 3rd Battalion, the Parachute Regiment, 18 from the 2nd Battalion, the Parachute Regiment, 19 from the Special Air Service (SAS), 3 from Royal Signals and 8 from each of the Scots Guards and Royal Engineers.
As well as memorials on the islands, there is a memorial to the British war dead in the crypt of St Paul's Cathedral, London. There is a memorial at Plaza San Martín in Buenos Aires for the Argentine war dead, Malvinas, por siempre argentinas 1.jpg in Rosario, and UshuaiaFalklandsWarVictimsMonument.jpg in Ushuaia.
There were 1,188 Argentine and 777 British non-fatal casualties, some of whom died of their injuries after the war. Further information about the field hospitals and hospital ships is at Ajax Bay, List of hospitals and hospital ships of the Royal Navy, HMS Hydra and Argentine Navy's ARA Almirante Irizar.
There are still 125 uncleared minefields on the Falkland Islands and UXOs are scattered all over the battle fields due to the soft peat ground. According to forcesmemorial.org.uk via Falklands 25's "Official Commemorative Publication" 30 British servicemen have died on the islands since the end of the hostilities.
The Argentine loss of the war led to ever-larger protests against the military regime and is credited with giving the final push to drive out the military government that had overthrown Isabel Perón in 1976 and participated in the crimes of the Dirty War. Galtieri was forced to resign and elections were held on 30 October 1983 and a new president, Raúl Alfonsín, the Radical Civic Union (UCR) party candidate, took office on 10 December 1983, defeating Italo Luder, the candidate for the Justicialist Party (Peronist movement).
For the UK, the war cost 255 men, six ships (ten others suffered varying degrees of battle damage), 34 aircraft and £2.778 billion, but the campaign was considered a great victory for the United Kingdom. The war provided a substantial boost to the popularity of Margaret Thatcher and undoubtedly played a role in ensuring her re-election in 1983. Several members of her government resigned however, including the Foreign Secretary Lord Carrington, the last time that a UK government minister resigned openly in response to a failure of his department (in not anticipating the war).
Criticism was leveled at Ted Rowlands, a former junior foreign minister in the preceding government, who disclosed in Parliament in April 1982 that the British had broken the Argentine diplomatic codes. Because the same code machines were used by the Argentine military, this disclosure immediately served to deny British access to valuable intelligence. This, and other responses to parliamentary questions, and leaks of information to the BBC has been alleged by historian Hugh Bicheno to be a deliberate attempt to undermine the Thatcher government on the part of a variety of individuals who had a vested interest in its fall.
The United States' international image was damaged because of the perception in Latin America that it had broken the Inter-American Treaty of Reciprocal Assistance (TIAR) by providing the UK with military supplies.
Some Latin Americans also perceived Chile to have broken the TIAR because it provided some support for UK troops. But, from Chile's point of view, the situation was seen differently. In 1978 Argentine forces had started (and few hours later aborted) the Operation Soberanía involving invasion of the islands south of the Beagle Channel and the possible invasion of continental Chile. Chile was officially considered an enemy by Argentina and "…anti-Chilean demonstrations in Buenos Aires during euphoric celebrations of the successful Falklands islands occupation…" were cause for concern in Santiago de Chile. The Beagle conflict was still smouldering, Argentina had refused to accept the Pope's arbitration proposal of 1980, and 6 weeks before the Falklands War Argentina provoked the (ARA Gurruchaga) incident with Chile at Deceit Island. Moreover, one of the reasons given for the absence of the Argentine Navy and higher numbers of professional soldiers during the Falklands War was to keep them in reserve in case they were needed against Chile and in his speech of 2 April, Galtieri called Operation Rosario the beginning of the recovery of Argentine sovereignty over the southern territories in general.
Hence the argument given by Chile for its abstention in the TIAR was the refusal of Argentina to follow resolution 502 of the United Nations. The real cause may be that the erratic Argentine foreign policy (support for USA policy in Central America and looking for support in the Non-Aligned Movement, the planning and starting of a war of aggression against Chile while looking for Chilean support at the TIAR, desire to become a first world country and breaking the cereals embargo against the Soviet Union after the Afghanistan occupation, etc) could bring this new impulse of Argentine nationalism again (as in 1978) to the frontiers of Chile, recognized by the arbitration award in 1977 (both countries submitted this question to binding arbitration under the auspices of the British Crown, but this was then unilaterally repudiated by Argentina). Such issues may also lie behind the improvement of the relations between Chile and UK, which had been seriously damaged by the Sheila Cassidy affair, the use of British made planes during the coup d'état in 1973, and the violations of human rights by the Agusto Pinochet regime. In September 2001 the President of Mexico Vicente Fox cited the Falklands War as proof of the failure of the TIAR.
Ultimately, the successful conclusion of the war gave a noticeable fillip to British patriotic feeling, with the mobilisation of national identity encapsulated in the so-called "Falklands Factor." Since the failure of the 1956 Suez campaign, the end of Empire and the economic decline of the 1970s which culminated in the Winter of Discontent, Britain had been beset by uncertainty and anxiety about its international role, status and capability. With the war successfully concluded, Thatcher was returned to power with an increased Parliamentary majority and felt empowered to press ahead with the painful economic readjustments of Thatcherism. A second major effect was a reaffirmation of the special relationship between the US and UK. Both Reagan and Weinberger (his Secretary of Defence) received honorary knighthoods for their help in the campaign, but the more obvious result was the common alignment of Britain and the USA in a more confrontational foreign policy against the Soviet bloc, sometimes known as the Second Cold War.
For the part of the Soviet/Warsaw Pact militaries, the Falklands War forced a re-examination of their estimates of the quality of Western troops, particularly from all-volunteer forces, vis-à-vis conscript-based militaries. The Soviets were under no illusions about how the British relied on the quality of its personnel to compensate for the extreme logistical difficulties the campaign presented, and observed how both sides were using many of the same weapons systems.
Mobilisation of national identity in Argentina, called the "Malvinas Spirit," has now developed in a constant recovery of the relevant aspects of the Falklands-Malvinas War that boost national self-image.
In 2007 the British government expressed regrets over the deaths on both sides in the war. Margaret Thatcher was quoted as saying "in the struggle against evil... we can all today draw hope and strength" from the Falklands victory, while former Argentinian President Nestor Kirchner claimed while in office that the UK won a colonial victory and vowed that the islands would one day return to Argentine sovereignty. He augmented this however, with an affirmation that the use of force could never again be used in an attempt to bring this about.
Militarily, the Falklands conflict remains the largest air-naval combat operation between modern forces since the end of the Second World War. In his Price of Admiralty, military historian Sir John Keegan noted that the brief conflict showed the irremediable vulnerability of surface ships to anti-ship missiles, and, most importantly, to submarines: despite the seemingly limited consequences of the war, it confirmed the dominance of the submarine in naval warfare. This is especially so, Keegan argues, because submarines are far less vulnerable than aircraft to counterattack, being able to approach and destroy their targets with almost complete impunity. However, Keegan's conclusions must remain conjectural since no other naval conflict of consequence has occurred since 1982.
Neither side achieved total air supremacy; nonetheless, air power proved to be of critical importance during the conflict, due to the isolated, rough landscape of the Falklands in which the mobility of land forces was restricted. Air strikes were staged against ground, sea and air targets on both sides, and often with clear results. All of the UK losses at sea were caused by aircraft or missile strikes (by both the Argentine Air Force and Naval Aviation). The French Exocet missile proved its lethality in air-to-surface operations, leading to retrofitting of most major ships with Close-in weapon systems (CIWS).
The air war in the Falklands vindicated the UK decision to maintain at least the STOVL aircraft carriers after the retirement of HMS Ark Royal. The domination of air power in major naval engagements was demonstrated, along with the usefulness of carriers and it proved the small but manoeuvrable Sea Harrier as a true fighter. Sea Harriers shot down 21 aircraft with no air-to-air losses themselves, although six Sea Harriers were lost to ground fire and accidents.
It should be noted that the disparity in figures, with the Argentine fighters failing to shoot down a single Sea Harrier, can be explained by several factors. The air combat training of the British pilots was indisputably superior; limited fighter control was provided by British warships in San Carlos Water, the then almost unparalleled Blue Fox radar, and the extreme manoeuvrability of the Sea Harrier. Additionally the British had the latest AIM-9L Sidewinder missiles, while the only Argentine planes with air-to-air missiles for self defence were the Mirages. The AIM-9Ls had a much wider angle of engagement than the earlier versions employed by the Argentines, which could only effectively engage the rear quarter of an enemy aircraft. The only advantage of the Argentine jets was their higher maximum speed, but Argentine pilots could not benefit from this unless they risked running out of fuel, as was seen in the first air combat of the war when a Mirage IIIEA was forced to attempt a landing at Stanley.
The logistical capability of the UK armed forces was stretched to the absolute limit in order to mount an amphibious operation so far from a land base, in mountainous islands with few roads. After the war much work was done to improve both the logistical and amphibious capability of the Royal Navy. Task force commander Rear Admiral Sir Sandy Woodward refers to the conflict as "a lot closer run than many would care to believe", reflecting the naval and military belief that few people understood — or understand — the extent to which the logistical dimension made the war a difficult operation for the UK. The ships of the task force could only remain on station for a limited time in the worsening southern hemisphere winter. With such a high proportion of the Royal Navy's surface fleet actively engaged, or lost in combat, there were few units available for northbound traffic. At the core of the fleet, Invincible could possibly have been replaced by the hastily-prepared Illustrious, but there was no replacement available for Hermes, the larger of the two British carriers. Woodward's strategy, therefore, required the land war to be won before Hermes, in particular, succumbed to the harsh environment. Woodward called the operation "a damned close-run thing", quoting the Duke of Wellington after the battle of Waterloo.
The usefulness of special forces units was reaffirmed. British special forces destroyed many Argentine aircraft (notably in the SAS raid on Pebble Island) and carried out highly informative intelligence-gathering operations. Contrary to popular understanding, the Argentine special forces also patrolled hard, in appalling climatic conditions, against a professional enemy and showed that they could sometimes get the upper hand.
The usefulness of helicopters in combat, logistic, and casevac operations was confirmed.
Nylon was shown to be a poor choice for fabric in uniforms, as it is more flammable than cotton and also melts with heat. Burning nylon adheres to the skin, causing avoidable casualties.
The importance of Airborne Early Warning (AEW) was shown. The Royal Navy had effectively no over-the-horizon radar capability. This was hastily rectified after the war, with Sea King helicopters fitted with retractable radomes containing a variant of the Nimrod ASW aircraft's Searchwater radar. These first travelled south after the war on the brand new HMS Illustrious, sister ship to Invincible.
Denis Healey, the Defence Secretary in 1966, once said that aircraft carriers were required only for operations regarding 'landing or withdrawal of troops against sophisticated opposition outside range of land-based air cover'. When the last conventional carrier in the Royal Navy, HMS Ark Royal, was decommissioned in 1978, the pro-carrier lobby succeeded in acquiring light carriers (euphemistically christened 'through deck cruisers') equipped with VTOL Sea Harriers as well as helicopters, justified by the fact that one of their primary roles was anti-submarine warfare.. John Nott's defence review concluded that anti-submarine defence would be performed more cheaply by a smaller number of destroyers and frigates. The carrier HMS Hermes was therefore to be scrapped and HMS Invincible sold to Australia. Under the review, the Royal Navy was focussed primarily on anti-submarine warfare under the auspices of NATO. Any out-of-area amphibious operations were considered unlikely. The entire Royal Marines was in jeopardy of being disbanded and the sale of HMS Intrepid and HMS Fearless was mooted.
In 1980 low funding caused many ships to be in harbour for months due to lack of spare parts and fuel. The largest cut in Royal Navy's conventional forces led to the resignation of the Navy Minister Keith Speed in 1981. Sea battles, mass convoys, amphibious landings and coastal bombardments were considered obsolete in the second half of the 20th century. The head of the admiralty, First Sea Lord Admiral Sir Henry Leach was still fighting the cuts in the Ministry of Defence together with the Chief of Defence Staff, who by chance, was also a naval officer — Admiral of the Fleet Sir Terence Lewin.
At the onset of the crisis, First Sea Lord Sir Henry Leach was summoned to brief the Prime Minister. He claimed that Britain was able to recapture the islands, and that it should be done. "Since here was a clear, imminent threat to British overseas territory that could only be reached by sea, what the hell was the point in having a Navy if it was not used for this sort of thing?. Aware of the necessity for speed, Leach had already given orders for the ships of a potential task force to be prepared for deployment. On 2 April, at a briefing at the House of Commons, Leach advised the Prime Minister that a task force was necessary and could sail within 48 hours. Lewin, who was forced to return from a scheduled visit to New Zealand also impressed on the War Cabinet that the primary objective for the United Kingdom should be: "to bring about the withdrawal of Argentine forces from the Falkland Islands, and the re-establishment of British administration there, as quickly as possible". Inspired, Thatcher ordered the despatch of the Task Force for the South Atlantic.
After the war, the sale of HMS Invincible to Australia was cancelled, with Hermes offered instead (eventually being sold to India as INS Viraat in 1986), and the operational status of all three support carriers was maintained. The proposed cutback in the surface fleet was abandoned and replacements for many of the lost ships and helicopters plus more Sea Harriers were ordered. The amphibious assault ships HMS Intrepid and HMS Fearless were not decommissioned until 1999 and 2002 respectively, being replaced by HMS Albion and HMS Bulwark. The Royal Navy confirmed its commitment to a carrier force with the order of two Queen Elizabeth class carriers in 2007.
The trials of one British patient, Robert Lawrence, MC, were chronicled in a book co-authored by him entitled When The Fighting is Over which was later adapted into a television film. Lawrence was shot at close range by an FN rifle and lost a large percentage of brain matter, but recovered to a degree not thought possible. After the war he became an outspoken critic of the British Army's treatment of Falklands veterans. He remains partially paralysed in the left side of his body.
Officers from the intelligence services were attached to the newspapers and 'leaked' information confirming the official communiqués from the government. The glossy magazines Gente and Siete Días swelled to sixty pages with colour photographs of British warships in flames - many of them faked - and bogus eyewitness reports of the Argentine commandos' guerrilla war on South Georgia 6 May and an already dead Pucará pilot's attack on HMS Hermes (Lt. Daniel Antonio Jukic had been killed at Goose Green during a British air strike on May 1st). Most of the faked photos actually came from the tabloid press.
The Argentine troops on the Falkland Islands could read Gaceta Argentina—a newspaper intended to boost the morale among the servicemen. Some of its untruths could easily be unveiled by the soldiers who recovered corpses.
HMS Invincible was repeatedly sunk in the Argentine press, and on 30 April 1982 the Argentine magazine Tal Cual showed UK's PM Thatcher with an eyepatch and the text: Pirate, witch and assassin. Guilty!
Three British reporters sent to Argentina to cover the war from the 'other side' were jailed until the end of the war.
The press was very dependent on the Royal Navy, and was censored on site. Many reporters in the UK knew more about the war than those with the Task Force.
The Royal Navy expected Fleet Street to conduct a World War Two style positive news campaign but the majority of the British media, especially the BBC, reported the war in a neutral fashion. Reporters referred to "the British troops" and "the Argentinian troops" instead of "our lads" and the dehumanised "Argies". The two main tabloid papers presented opposing viewpoints: The Daily Mirror was decidedly anti-war, whilst The Sun became notorious for its jingoistic and xenophobic headlines, including the 20 April headline "Stick It Up Your Junta!", and was condemned for the "Gotcha" headline following the sinking of the ARA General Belgrano.
It has been reported that two years after the war, Labour MPs demanded an inquiry into reports that a Resolution class submarine armed with the Polaris SLBMs had deployed to Ascension Island during the operation, ostensibly to prepare for a nuclear strike. The Ministry of Defence is reported to have denied the allegations, and Freedman's Official History does the same.
In 1982, British warships were routinely armed with the WE.177, a tactical nuclear weapon with a variable yield of either 10 kilotons or 0.5 kiloton, which could be used to attack land targets, or as a Nuclear Depth Bomb in an antisubmarine role. The Official History describes the contorted logistical arrangements that led to the removal of the nuclear depth bombs from the frigates, following political alarm in Whitehall. Eventually at least some of the depth bombs were brought back to the UK by an RFA vessel. In December 2003, Argentine President Néstor Kirchner demanded an apology from the British Government for this "regrettable and monstrous" act.
When the war broke out, we ourselves almost didn’t have any intelligence information from this area. It was here we got help from the Norwegians, who gave us a stream of information about the Argentine warships’ positions. The information came to us all the time and straight to our war headquarters at Northwood. The information was continuously updated and told us exactly where the Argentine ships were.
The British Ministry of Defence was accused several times of a systematic failure to prepare service personnel for the horrors of war and to provide adequate care for them afterwards.
There are allegations that the Ministry of Defence has tried to ignore the issue of Post Traumatic Stress Disorder (PTSD), which left many sufferers emotionally scarred and unable to work, immersed in social dislocation, alcoholism, and depression. Veterans have suffered prolonged personality disorders, flashbacks, and anxiety sometimes reaching pathological levels.
It was revealed that more veterans have committed suicide since the Falklands War ended than the number of servicemen killed in action The South Atlantic Medal Association (SAMA82), which represents and helps Falklands veterans, believes that some 264 veterans had taken their own lives by 2002, a number exceeding the 255 who died in active service, although no estimate is available for the expected number of suicides that would have occurred anyway.
A similar situation afflicts the veterans on the Argentine side, many of whom have similarly suffered from psychiatric disorders, drug and alcohol abuse, and social turmoil. The current Argentine suicide toll is 454, according to an Argentine film about the suicide of a Falklands veteran.
The 2006 movie This Is England deals with the effects of the war on the Skinhead culture in England.
This war is also occasionally written as The Falklands/Malvinas War, recognising the international split over the Islands' name. Other constructs such as Falklands Conflict and Falklands Crisis have also been used. The term Guerra de las Malvinas or Malvinas War is the one normally used in Spanish-speaking countries and has also been used by some socialist groups in English-speaking countries.
The name "Guerra del Atlántico Sur", meaning "War of the South Atlantic" is also used in Spanish. Unlike the term "Falklands/Malvinas War", this reflects the fact that some of the conflict occurred in South Georgia, and the deep ocean. | <urn:uuid:bb38935f-edaf-42b8-a3e2-a72dd004f6e6> | {
"date": "2014-04-23T19:48:36",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203422.8/warc/CC-MAIN-20140423032003-00491-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9699366688728333,
"score": 3.65625,
"token_count": 12898,
"url": "http://www.reference.com/browse/more+flammable"
} |
As the biggest solar eclipse since 1999 will plunge much of the country into darkness tomorrow, people are being urged to protect their eyes.
The UK hasn’t seen a total solar eclipse - where the Moon completely covers the Sun - since 1999, and won’t get another one until 2090.
Taking pictures of Friday’s solar eclipse on a smartphone could seriously damage eyes and even cause blindness, eye experts have warned.
The College of Optometrists says the danger comes should people look directly at the Sun as they position themselves for selfies or other snaps.
Glancing at the Sun - even briefly while setting up a photo - can lead to burns at the back of eye.
If you are taking a picture, never look directly at the Sun, even the small amount of Sun peeking out during an eclipse is enough to cause serious and permanent damage, never look at the Sun through binoculars or a telescope or through sunglasses - they will not protect your eyes.
Robin Scagell, vice-president of the Society for Popular Astronomy (SPA), who will be travelling on the P&O cruise ship Oriana to witness the eclipse, said the event will be “memorable” but warned people of the dangers of looking at it with the naked eye.
He said: “We won’t experience totality in the UK, but it will still be a memorable event.
“Unlike every other eclipse of any size, this one takes place right in the middle of the rush hour. It’s not the best time from a safety point of view.
“We’ve always had this problem with partial eclipses in particular. You need to cut down the light of the sun by an enormous amount before you can look at it safely.
A partial eclipse is more risky by far than a total eclipse because people don’t realise that even looking at a thin sliver of sun is dangerous. It’s absolutely true that there is a serious risk to people’s eyesight.Robin Scagell, vice-president SPA
“Sunglasses are useless and even things like food packing and bin liners that look as if they’re made of dense material can let through infrared light and burn your retina.
“A partial eclipse is more risky by far than a total eclipse because people don’t realise that even looking at a thin sliver of sun is dangerous.
“It’s absolutely true that there is a serious risk to people’s eyesight.
“If people can’t find a way to view the eclipse correctly then they shouldn’t look because they’re likely to damage their eyes.”
West Yorkshire Astronomical Society will be opening up the Rosse Observatory in Carleton, Pontefract for the event.
The facility, on Carleton Road, will open from 8am.
The Met Office has said they expect a lot of cloud around for Friday morning. There may be some clearer spells across central England, Wales and the south west England, with a chance of some breaks in the cloud either side of this.
It looks like Southern England, Northern England, Northern Ireland and Scotland will have cloud and this will be thicker the further north you go.
The next big partial eclipse in the UK will be in August 2026.
Will you be watching? Let us know what you think and don’t forget to share any photos - taken safely! | <urn:uuid:ab117aed-e074-4542-ba80-eb9cff1ef15e> | {
"date": "2018-10-15T19:32:18",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509690.35/warc/CC-MAIN-20181015184452-20181015205952-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9327971339225769,
"score": 2.546875,
"token_count": 726,
"url": "https://www.batleynews.co.uk/news/video-solar-eclipse-2015-what-you-need-to-know-1-7165132"
} |
This article from NASA discusses the preliminary results from the LCROSS mission to find water on the moon. The article summarizes the mission goals and confirms that water has been found on the moon. It also includes images from the LCROSS impact and data.
NASA Ames Research Center. LCROSS Impact Data Indicates Water on Moon. Moffett Field: NASA Ames Research Center, November 15, 2009. http://www.nasa.gov/mission_pages/LCROSS/main/prelim_water_results.html (accessed 25 September 2016).
%0 Electronic Source %D November 15, 2009 %T LCROSS Impact Data Indicates Water on Moon %I NASA Ames Research Center %V 2016 %N 25 September 2016 %8 November 15, 2009 %9 text/html %U http://www.nasa.gov/mission_pages/LCROSS/main/prelim_water_results.html
Disclaimer: ComPADRE offers citation styles as a guide only. We cannot offer interpretations about citations as this is an automated procedure. Please refer to the style manuals in the Citation Source Information area for clarifications. | <urn:uuid:995ea263-7d9e-467e-a174-43cab09a8c95> | {
"date": "2016-09-25T19:04:57",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660342.42/warc/CC-MAIN-20160924173740-00013-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8360000848770142,
"score": 3.09375,
"token_count": 239,
"url": "http://www.physicstogo.org/items/detail.cfm?ID=9967"
} |
Basic information about the Lake County
The Lake County is located in the state of Colorado. This county occupies 385 square miles, with 8 square miles being water areas. There are 7.310 inhabitants living in the county according to the 2010 Census. As for the racial makeup of Lake County citizens, the 3 largest groups are White (80.68%), followed by Some Other Race (13.52%) and Two or More races (3.6%). There are 2.953 households in the county, while 60,82% of them are family households and 39,18% represent non family households. There are 3 cities and towns in Lake County. The most populated city is Leadville city and the smallest town or village is Twin Lakes CDP. | <urn:uuid:e3325da7-2ac0-4feb-a499-578224fa2729> | {
"date": "2019-02-19T15:18:58",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247490225.49/warc/CC-MAIN-20190219142524-20190219164524-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9683694839477539,
"score": 2.65625,
"token_count": 150,
"url": "http://placesofusa.com/colorado/lake-county/"
} |
This test is based on the WCAG 2.0 Technique PDF6: Using table elements for table markup in PDF Documents
Document does not have correctly marked tables
The document contains tables that are not marked up correctly.
Why this may be a barrier
Users of screen readers or screen magnification rely on the correct mark up of the logical relationships within a table to understand the information. If it is not possible to determine the context of a table entry (such as: which are the row and column titles), the information contained in a table cell doesn't make sense.
Note that it is not sufficient if the relationship can be determined from the visual presentation of the table, it has to part of the tag structure as well.
Related WCAG 2.0 Technique
Related WCAG 2.0 Success Criteria
1.3.1 Info and Relationships “Information, structure, and relationships conveyed through presentation can be programmatically determined or are available in text. (Level A)”
Difi guidelines for universal design of electronic documents
- 4.9 Tabeller
- 4.10 Definere tabelloverskrifter
- 8.9 Legge til informasjon om tabelloverskrifter | <urn:uuid:413be415-69e8-4d6a-b6da-86760655bb59> | {
"date": "2015-03-31T05:21:20",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300313.14/warc/CC-MAIN-20150323172140-00066-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7729204893112183,
"score": 3.015625,
"token_count": 249,
"url": "http://accessibility.tingtun.no/en/tests/PDF/wcag_pdf_06/"
} |
‘Third Line’?
There is no indication in Tolkien’s writing that the Kings of Gondor were ever categorised into ‘lines’, as the Kings of Rohan were. I am aware of some secondary material that does so, and while it isn’t outrightly incorrect, I would point out that the Kingship of Rohan jumped from one line to the other in the female line, whereas all jumps in the Kingship of Gondor were to male sidelines. So I would like to avoid any impression that the use of term for the Gondorian royal house is authentic.
Moreover, if one does count ‘lines’ of the Kings of Gondor, the second line started with Eärnil I, the third with Calmacil and the fourth with Tarondor, so Eärnur belonged to the fifth ‘line’, not the third. I’m therefore correcting the number and putting the term in quotes. — Mithrennaith 00:25, 8 September 2010 (UTC) | <urn:uuid:7d1ddc61-dacf-4b78-9e35-e2cb9110c2ed> | {
"date": "2014-07-30T17:30:32",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270877.35/warc/CC-MAIN-20140728011750-00366-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9630265235900879,
"score": 2.546875,
"token_count": 222,
"url": "http://www.tolkiengateway.net/wiki/Talk:E%C3%A4rnur"
} |
Definition of knotgrass in English:
1A common Eurasian plant of the dock family, with jointed creeping stems and small pink flowers. It is a serious weed in some areas.
- Genus Polygonum, family Polygonaceae: several species, in particular P. aviculare
- The main weeds dying back were creeping thistle, couch and mature knotgrass.
Words that rhyme with knotgrasssawgrass • bluegrass
Definition of knotgrass in:
- US English dictionary
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
Most popular in the US
Most popular in the UK
Most popular in Canada
Most popular in Australia
Most popular in Malaysia
Most popular in India
Most popular in Pakistan | <urn:uuid:7db933b8-f705-4234-bbfd-7af6914fe697> | {
"date": "2015-02-27T17:39:37",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00081-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.917471170425415,
"score": 2.75,
"token_count": 171,
"url": "http://www.oxforddictionaries.com/definition/english/knotgrass"
} |
Latin for rich
Dives (Latin for rich).—The word is not used in the Bible as a proper noun; but in the Middle Ages it came to be employed as the name of the rich man in the parable of the rich man and Lazarus, Luke, XVI, 19-31. It has often been thought that in this lesson on the use of riches Christ spoke of real persons and events. The "House of Dives" is still pointed out in Jerusalem; but, of course, if such a house ever existed, it must have long since disappeared.
W. S. REILLY | <urn:uuid:a500fca6-b108-428a-bc95-9b8c9071ca42> | {
"date": "2013-12-12T10:33:42",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164580231/warc/CC-MAIN-20131204134300-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9583600163459778,
"score": 2.515625,
"token_count": 124,
"url": "http://oce.catholic.com/index.php?title=Dives"
} |
1.The child _________ on the couch all day long.
(A)lies (B)lays (C)laid (D)lazy
2.The reporter _________ from the principal's speech that he intended to resign.
(A)applied (B)preferred (C)supplied (D)inferred
3.The government will _________ a statement about tax increases soon.
(A)invent (B)issue (C)suggest (D)presume
4.Watch your manners. You are not supposed to be so _________.
(A)official (B)rude (C)lovely (D)slender
5.No one _________ the earthquake. All the villagers were killed in this unexpected accident.
(A)rejected (B)predicted (C)survived (D)neglected
6.They must be _________. They keep on yawning without a stop.
(A)formal (B)moral (C)patient (D)sleepy
7.It is hard for me to _________ with vendors. I usually take the first price they offer.
(A)bargain (B)capture (C)acquire (D)oppose
8.I _________ a shower when the phone rang. So I could not answer it in time.
(A)took (B)was taking (C)had taken (D)have taken
9.If I _________ a bird, I would fly anywhere I want.
(A)was (B)were (C)am (D)be
10.As soon as it _________ raining, we will go out for a movie.
(A)stops (B)stopped (C)will stop (D)would stop
11.I remember _________ you somewhere. It's possible that we went to college together.
(A)to see (B)seeing (C)see (D)saw
12.【已刪除】He was one of the few students that Mr. Wang liked in class.
In order to focus on my studies, I asked my brother don’t bother me.
(A) In order (B) focus on (C) asked (D) don’t bother
14.請選出劃 [ ] 部分錯誤的字或辭: Studying hardly is what I determined to do for the rest of the year.
(C)determined to do
(D)the rest of the year
15.請選出劃 [ ] 部分錯誤的字或辭:
Neither Jack nor I are responsible for the mistake.
(A)[Neither] Jack nor (B)[I] (C)[are] responsible (D)[for] the mistake.
16.A: Excuse me. Is this the investment consulting service?
(A)Yes. May I help you? (B)Yes, Who are you?
(C)Yes. What do you want? (D)Yes, please.
17.A: Have you finished writing your annual report?
B: Not yet. __________________________
(A)I plan to finish it this week. (B)I need to do that every year.
(C)We don't know of any reports. (D)We can think of many more.
18.A: Why didn't you call me?
(A)The teacher called you.
(B)He really talked on the phone a lot.
(C)I did, but your line was busy for a long time.
(D)Please call me when you are free.
19.A: Hi, John. How're you doing today?
(A)I'm riding a bike. (B)How do you do? (C)Fine. And you? (D)What can I do for you?
20.A: Excuse me. Do you speak English?
B: Yes, but not very well.
A: Can you direct me to Taipei station?
(A)Excuse me. (B)What did you say? (C)Please once more. (D)Pardon?
21.Why do we dream? Nobody knows, but everybody ______21______ . We dream during REM (rapid eye movement) sleep. In eight hours of sleep, people usually have four REM periods. But we ______22______ very little. We usually remember only 20 or 30 seconds of REM sleep.
There are many ideas about dreams. Some psychologists believe we dream because we need a safe way to do things we can't do where we're ______23______ . Some think we dream in order to work out our problems. ______24______ believe dreams don't have any special meaning. They are simply thoughts that come to us when we ______25______ . Whatever you believe, dreams prove one thing—some people have wonderful imaginations.
【題組】21 (A)understands (B)dreams (C)sleeps (D)does | <urn:uuid:0decde68-01da-44c7-a63e-13c9d7d32bcf> | {
"date": "2017-02-27T01:09:45",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00548-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9368342161178589,
"score": 2.515625,
"token_count": 1120,
"url": "https://yamol.tw/exam-095%EF%A6%8E+%E4%B8%AD%E8%8F%AF%E9%83%B5%E6%94%BF+%E5%B0%88%E6%A5%AD%E8%81%B7%28%E4%BA%8C%29%E5%85%A7%E5%8B%A4-7590.htm"
} |
How Stresemann single-handedly changed the course of a nation
Whenever you think of good diplomacy, Gustav Stresemann certainly has to come to mind. Winner of the Noble Peace Price in 1926, his achievement comes from Franco-German reconciliation between the World Wars, and granted, this reconciliation didn't last long with the eventual rise of National Socialism, but, had he not entered the scene of international relations when he did, tensions would've been much quicker to blow.
Back when the Great War had finished and the Treaty of Versailles had been signed, Stresemann was horrified with the details in the treaty. Germany took the blame of the war when it should've been the Austro-Hungarian empire, and they were thus responsible for paying reparations to the rest of Europe, eventually established as 132 billion marks, besides the fact that the size of the German army was severely hindered (100,000 troops, 6 battleships, no submarines, no air force) and they were forbidden from joining the League of nations. The Rhineland was demilitarized, Alsace-Lorraine returned to France, lands in the East were given to Poland, Danzig was made a free city, and the colonies were given as mandates to Britain and France. These terms were even harsher as time went on.
When Stresemann was prime minister he was hell-bent on making sure that the German resistance in the Rühr stopped in order to prevent chaos, and he made sure that the currency wouldn't fail under the dire circumstances that were surrounding the country. In 1924, as foreign minister, he was able to secure the Dawes Plan, in which the United States and Great Britain would lend money to Germany so they could pay reparations. Dawes himself was given a Nobel Prize for this, but the plan eventually failed in 1929 when the Great Depression came and was replaced with the Young Plan. Payments ceased after Germany's defeat, until West Germany paid off the debt and once the country was unified, the rest of the interest was paid off. The fact that this method of paying for reparations was able to be completed speaks a lot about the foresight Stresemann had.
His next big achievement was getting Germany into the League of Nations in 1926, and it is here where he and Aristide Briand were awarded the Nobel Peace Prize for restoring relations merely 8 years after the war had ended, and was pretty much unthinkable due to the hyperinflation that Germany suffered through as a result of the occupation of the Rhineland. It was here where he negotiated with the other European countries that Germany should be returned some of its colonies, its army be allowed to conscript anew, and besides the end of Anglo-French occupation of the Rhineland, it was seen to that France and Britain also disarmed, and with this he guaranteed peace on the West. He did not guarantee peace with Poland and always viewed Germany's claim on those territories as legitimate. The Kellog-Briand act of 1928 cemented the world's trust in his nation, because it renounced the use of violence to resolve international affairs. Until the crash in 1929, this allowed Germany to rebuild, and had he not been foreign minister the Depression surely would have been the end of the country.
What can we learn from this?
If Germany can recover multiple times from crisis that many regimes never return from, then you can see the necessity of perseverance. The important aspect in Stresseman's life was the fact that no matter what position his country was in, he could negotiate for more, and even though he did not live to see German prosperity in his lifetime, it only existed from then on because he was so tactful with the other world leaders.
Whenever you're stuck in a rut and feel trapped, like Germany was, always bargain for more. You have nothing to lose and much to gain, even if it's just a base to expand on later.
Read more about Stresemann here: | <urn:uuid:28e7dd36-2bba-4120-93f0-627a728c68e6> | {
"date": "2018-05-21T15:06:10",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864405.39/warc/CC-MAIN-20180521142238-20180521162238-00456.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9869706034660339,
"score": 3.578125,
"token_count": 817,
"url": "http://appofknowledge.blogspot.com/2017/06/lessons-from-gustav-stresemann.html"
} |
In a WSDL, XML Schema is the section where it define the message format for each operations, which eventually become the real API that users are interested. And it is the most tricky part of the WSDL. Nowadays there are many tools that you can design and use WSDLs without any needs in knowing the meaning of a single line of the WSDL. But there are situations that you may find it is better you have some knowledge in XML Schema section and in WSDL overall.
For this post I m taking a simple example of use of nillable=”true” and minOccurs=”0″. Take the following example.
<xs:element name="myelements"> <xs:complexType> <xs:sequence> <xs:element name="nonboth" type="xs:string"/> <xs:element minOccurs="0" name="minzero" type="xs:int"/> <xs:element name="nilint" nillable="true" type="xs:int"/> <xs:element name="nilstring" nillable="true" type="xs:string"/> <xs:element minOccurs="0" name="minzeronil" nillable="true" type="xs:string"/> </xs:sequence> </xs:complexType> </xs:element>
Just ignore the meaning of what nillable and minOccurs attributes for now. You can safely say the following XML is valid for the above Schema.
<myelements> <nonboth>i can't be either nil nor skipped<nonboth> <minzero>3<minzero> <nilint><nilint> <nilstring>i can have null, but i cant skipeed</nilstring> <minzeronil>i can be skipped and have the nil value<minzeronil> </myelements>
Take the first element ‘nonboth’ in the schema, It has not any minOccurs or nillable attribute. By default minOccurs equal to 1 and nillable equal to false. That mean it can’t have nil value nor it can not be removed from the xml.
Is that making an element nil and removing the element from the XML is same? No. Take the second element in the schema ‘minzerostring’. There you have minOccurs =”0″ but there are no nillable=”true”, mean it is non-nillable. The idea is whenever you don’t want that element in your xml, you can’t have the element keeping empty like
But you can remove the whole element from the XML (since it is minOccurs=0).
The opposite of the above scenario is nillable=”true” but minOccurrs != 0. Check the ‘nilint’ element in the schema. There you can’t skip the element ‘nilint’, you have to have the element <nilint/> but it can hold a nil value.
Note that the correct way to declare the nil element is,
<nilint xsi:nil="true" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/>
You can understand why when we look at the third element ‘nilstring’. Say you set message the following element
You can say that this is not nil, this is an empty string. In fact an empty string is nil in some other language, But if we take XML Schema as a language, then for someone to be nil, it have to have the xsi:nil attribute set to “true” or “1”.
So going back to the ‘minzero’ which is non-nillable, by theory you should be able to write the following xml,
Since you don’t have that xsi:nil=”1″ this is not a nil value, so the condition nillable=”false” condition is preserved. But unlike for string when you set an empty element for an integer, it doesn’t sound correct. So in practice whenever some schema says non-nillable you should set some valid value.
The last one is ‘minzeronil’ element which is both nillable=”true” and minOccurs=”0″. Whenever you don’t need to set a value for this element, you have the choice of either skipping the element or setting the value of the element to nil. It is obvious rather than setting a nil value it is better you just skip the element to make the XML shorter. This is really needed specially in web services where you need the payload to be minimum as much as possible.
Say you have to prepare the XML and you don’t have valid values for any of the element. So this can be the optimum XML you can create.
<myelements xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/> <nonboth><nonboth> <nilint xsi:nil="1"/> <nilstring xsi:nil="1"> </myelements> | <urn:uuid:ab2f5399-ab7f-4615-a9a1-658aaa9eacbc> | {
"date": "2019-07-21T06:32:55",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526931.25/warc/CC-MAIN-20190721061720-20190721083720-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7808660268783569,
"score": 2.6875,
"token_count": 1124,
"url": "http://www.dimuthu.org/blog/2008/08/18/xml-schema-nillabletrue-vs-minoccurs0/comment-page-1/"
} |
The country round Lake Eyre, where some of the land is actually below sea-level, comes under this heading.
To the north again stretches Lake Eyre, and to the west Lake Gairdner.
Tasmania and Victoria were separated by the foundering of Bass Strait, and at the same time the formation of the rift valley of Spencer Gulf, and Lake Torrens, isolated the South Australian highlands from the Eyre Peninsula and the Westralian plateau.
It is this tropical downpour that fills and floods the rivers flowing into Lake Eyre and those falling into the Darling on its right bank.
The rest of the southern coast west as far as 124° E., with the exception of the southern projection of Eyre Peninsula, which receives from 10 to 20 in., belongs to the 1 The literature of the geology of Australia is enumerated, to 1884, in the bibliography by Etheridge and Jack.
Eyre has ingeniously attempted to reconstruct the routes taken by the Australians in their advance across the continent.
Meantime, from the new colony of Adelaide, South Australia, on the shores of Gulf St Vincent, a series of adventurous journeys to the north and to the west was begun by Mr Eyre, who explored a country very difficult of access.
Eyre also explored the interior north of the head of Spencer Gulf, where he was misled, however, by appearances to form an erroneous theory about the water-surfaces named Lake Torrens.
When Mr Eyre viewed the country from Mount Deception in 1840, looking between Lake Torrens and the lake which now bears his own name, the refraction of light from the glittering crust of salt that covers a large space of stony or sandy ground produced an appearance of water.
He started in March 1860, passing Lake Torrens and Lake Eyre, beyond which he found a pleasant, fertile country till he crossed the Macdonnell range of mountains, just under the line of the tropic of Capricorn.
The Barcoo or Cooper's Creek and its tributary streams were traced from the Queensland mountains, holding a south-westerly course to Lake Eyre in South Australia; the Flinders, the Gilbert, the Gregory, and other northern rivers watering the country towards the Gulf of Carpentaria were also explored.
EYRE EVANS CROWE (1799-1868), English journalist and historian, was born about the year 1 799.
Clive was appointed its governor in 1756; in 1758 the French captured it, but abandoned it two years later to Sir Eyre Coote.
In 2778 the Few Remarks by a Gentleman (Francis Eyre), the Reply of Loftus, the Letters of Apthorpe and the Examination of Davies appeared.
His attack on the conduct of Governor Eyre in Jamaica was listened to, but with repugnance by the majority, although his action in this matter in and out of parliament was far from being ineffectual.
Mill's subscription to the election expenses of Bradlaugh, and his attitude towards Governor Eyre, are generally regarded as the main causes of his defeat in the general election of 1868.
See also C. Eyre, The History of St Cuthbert (1887); and J.
The chief officer of this, as of other forests, was the justice in eyre who held the justice seat, the highest forest court and the only court of record capable of entering and executing judgments on offenders; the lower courts were the Swainmote and Wodemote, the former of which is still held, in a modified form, in the Verderers' Hall of the King's House at Lyndhurst.
The circuit of the justices in eyre, or their deputies, continued down to 1635; they were virtually ended by the Act for the Limitation of Forests (1640), though Charles II.
Warren Hastings sent from Bengal Sir Eyre Coote, who, though repulsed at Chidambaram, defeated Hyder thrice successively in the battles of Porto Novo, Pollilur and Sholingarh, while Tippoo was forced to raise the siege of Wandiwash, ana Vellore was provisioned.
His father, Andrew Spottiswoode, who was descended from an ancient Scottish family, represented Colchester in parliament for some years, and in 1831 became junior partner in the firm of Eyre & Spottiswoode, printers.
In 1851 the first kiwi known to have reached England alive was presented to the Zoological Society by Eyre, then lieutenant-governor of New Zealand.
Yet even then he considered that the true leaders of the people were a peer and a dean, and there was no real inconsistency in the fact that at a later period he was among the most strenuous defenders of Governor Eyre in the measures adopted by him to put down the Jamaican disturbances.
He joined the committee for the defence of Governor Eyre in 1867; he also wrote in 1867 an article upon " shooting Niagara," that is, upon the tendency of the Reform Bill of that year; and in 1870 he wrote a letter defending the German case against France.
The final struggle was postponed until 1760, when Colonel (afterwards Sir Eyre) Coote won the decisive victory of Wandiwash over the French general Lally, and proceeded to invest Pondicherry, which was starved into capitulation in January 1761.
Sir Eyre Coote, the victor of Wandiwash, was sent by sea to relieve Madras with all the men and money available, while Colonel Pearse marched south overland to overawe the raja of Berar and the nizam.
The war was hotly contested, for Sir Eyre Coote was now an old man, and the Mysore army was welldisciplined and equipped, and also skilfully handled by Hyder and his son Tippoo.
On the 12th of October 1352 Henry Sturmy of Elvetham, sheriff and escheator of Hants, and frequently a justice in eyre for the forests of Hants and Wilts, at Winchester, describes William of Wykeham as "my clerk" in a power of attorney dated at Winchester, to deliver seisin of lands in Meonstoke Ferrand, Hants, which he had sold to William of Edyndon, bishop of Winchester (Win.
The place is chiefly famous for the battle in July 1781, in which Sir Eyre Coote with 8000 men defeated Hyder Ali with 60,000 and saved the Madras presidency.
While the All-Father belief is common in the tribes of southeastern Australia, the tribes round Lake Eyre, the Arunta (as known to Messrs Spencer and Gillen), and the other central and northern tribes, are credited with no germs of belief in what is called a supreme, and may truly be styled a superior being.
Meanwhile, among some of the Arunta of the centre, among the Dieri and Urabunna tribes near Lake Eyre and their congeners, and among the tribes north by east of the Arunta, no such belief has been discovered by Messrs Spencer and Gillen, from whom the tribes kept no secrets, or by Mr Siebert, a missionary among the now all but extinct Dieri.
From these itinerant commissioners (justices in eyre) descend the modern justices of assize.
The justice-seat is the court of the chief justice in eyre, who, says Coke, "is commonly a man of greater dignity than knowledge of the laws of the forests; and therefore where justice-seats are to be held some other persons whom the king shall appoint are associated with him, who together are to determine omnia placita forestae."
Abbott, Principles of Bacteriology (7th ed., London, 1905); Crookshank, Bacteriology and Infective Diseases (with bibliography, 4th ed., London, 1896); Duclaux, Traite de microbiologie (Paris, 1899-1900); Eyre, Bacteriological Technique (Philadelphia and London, 1902); Flugge, Die Mikroorganismen (3rd ed., Leipzig, 1896); Fischer, Vorlesungen fiber Bakterien (2nd ed., Jena, 1902); Gunther, Einfiihrung in das Studium der Bakteriologie (6th ed., Leipzig, 1906); Hewlett, Manual of Bacteriology (2nd ed., London, 1902); Hueppe, Principles of Bacteriology (translation, London, 1899); Klein, Micro-organisms and Disease (3rd ed., London, 1896); Kolle and Wassermann, Handbuch der pathogenen Mikroorganismen (Jena, 1904) (supplements are still being published; this is the most important work on the subject); Lofler, Vorlesungen fiber die geschichtliche Entwickelung der Lehre von der Bacterien (Leipzig, 1887); M`Farland, Text-book upon the Pathogenic Bacteria (5th ed., London, 1906); Muir and Ritchie, Manual of Bacteriology (with bibliography, 4th ed., Edin.
On the 15th of April 1356 schedules touching the New Forest and other forests in Hants and Wilts were delivered out of the Tower of London to William of Wykeham to take to the justices in eyre (Claus.
In the same year on the 24th of August Peteratte-Wode and William of Wykeham, clerk, were appointed keepers of the rolls and writs in the eyre for the forests of Hants and Wilts, of which Henry Sturmy was one of the justices.
The first of his tours independently performed, in 1858 and 1859, were around the South Australian lakes, namely, Lake Torrens, Lake Eyre and Lake Gairdner. | <urn:uuid:2f9b36a6-82a1-4ba2-9421-0051fe1e48a2> | {
"date": "2017-07-24T06:55:45",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424756.92/warc/CC-MAIN-20170724062304-20170724082304-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9646831750869751,
"score": 3.21875,
"token_count": 2102,
"url": "http://sentence.yourdictionary.com/eyre"
} |
Some examples of how Photoshop can be used to improve the appearance of your pictures.
Most digital photographs can benefit from careful color correction. In this example, the image matches the original Kodachrome slide, but color adjustment in Photoshop results in a more pleasing — if not entirely faithful — rendition.
Mouse over the image to correct the color.
Mouse over the image to change the contrast.
Compositing involves adding, removing, or combining image elements.
In this example, we scanned two 3.5" x 9.5" vintage prints and combined them into one 11" x 60" panoramic image. Tricky as the photos were shot from different camera positions.
This example was particularly challenging because not only was the treasured family photograph broken into numerous pieces, but silver in the emulsion had migrated to the surface. The silver is highly reflective and results in a poor scanned image.
We reassembled the board, photographed it on a copy stand through a polarizing filter using polarized lighting. This eliminated the reflections caused by the dichroic silver. Finally, we scanned the 4x5 copy transparency and brought the file into Photoshop for digital repair.
The finished print revealed detail not visible even in the original. | <urn:uuid:e3c2bbf6-bd64-49b2-8f5f-c4845f508ea4> | {
"date": "2018-10-17T09:14:33",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9194927215576172,
"score": 2.875,
"token_count": 251,
"url": "http://degasis.com/disamples.html"
} |
PAKISTAN'S earthquake measured 7.6 on a scale known as the moment magnitude. This measure, a successor to Richter, allows seismologists to compare the energy released by different earthquakes. At each step of the scale, about 32 times more energy is released than at the previous step. It has no upper limit, but the largest recorded earthquake was in southern Chile in 1960 and measured 9.5.
Earthquakes happen mostly where the earth's tectonic plates collide. In Pakistan, quake activity is mainly concentrated in the northern and western sections of the country, along the boundary of the Indian, Iranian and Eurasian plates. The Indian plate is moving north at about 5cm a year, resulting in a force on the southern edge of the Tibetan plateau—the force that generates the Himalayas. As a result, earthquakes occur along the Himalayas all the way to Myanmar. (The movement of the Indian plate also caused the devastating Sumatra-Andaman earthquake and tsunami late last year.)
In recent years, Pakistan has not suffered as greatly from earthquakes as its neighbours in the Himalayas, Afghanistan, Nepal, China and India. Its biggest earthquake in living memory occurred in Quetta in 1935, with 30,000 deaths. Nevertheless, Kashmir is seismically active on both sides of the border, with many regular, though less damaging, quakes. In 2002 in the Gilgit-Astore region, 100km (63 miles) north of Muzaffarabad, large earthquakes made about 16,000 people homeless.
Across the Himalayas there is what seismologists call a “slip deficit”—a lack of earthquakes to release the stress that is known to be accumulating. The Kashmir quake was in just such a region, where a great earthquake was overdue. Nevertheless, Roger Bilham, of the University of Colorado, says it is doubtful that the Kashmir quake released more than one tenth of the cumulative energy stored there. Furthermore, in the past half-century the Himalayan region has seen fewer powerful earthquakes than might be predicted from historical records. The most notable area of concern is the central Himalayan Gap, a 600km-long central arc of the Himalayas. Mr Bilham believes this area has the potential to generate several earthquakes of magnitude 8 or more, and is the most vulnerable (in terms of potential loss of life and damage) of the regions that could produce a great earthquake. The whole of Nepal is also a worry.
The Kashmir quake may be the worst recorded in the Indian subcontinent. Its deadliness was linked, among other things, to the weakness of buildings, the depth of the quake, the density of population, the fault and soil types, and the intensity of the shaking. The Bhuj earthquake, only 100km from the border of Pakistan, was of similar magnitude but killed 18,500.
Because of population growth and density in the Himalayas, hundreds of thousands may be at risk—particularly in India, where the government and the United Nations Development Programme have identified 38 cities with more than half a million people located in the most seismically active regions. A way has to be found to reduce the deadliness of quakes in the most vulnerable areas.
Yet earthquakes cannot be predicted accurately enough to know when people should be evacuated. It is all the harder in the Himalayan region, with hidden underground faults that are poorly monitored by seismic instruments. That leaves two options, other than fatalism: to put up better buildings, and to improve planning for responding to disasters.
Progress is slow. Key buildings in need of better earthquake-proofing have been identified in Delhi, and work is under way. Similar plans elsewhere have come too late to help the hospitals in Indian Kashmir. Though it is impossible to make buildings completely resistant to earthquakes, they can be made much safer. In both India and Pakistan, building codes exist; in both countries, they have been poorly enforced, with masses of unprotected housing stock in areas of great danger.
In India, to build more suitable housing would add only 2-4% to construction costs. But in the poorest regions, such as Kashmir, most houses are built of local materials by the people who then live in them. In fact, in India, 80% of housing is owner-built. Architects and engineers, who might improve building and design, are in short supply. It is lack of knowledge and skills that is the main problem, rather than the cost of the work.
Greater scientific knowledge about the region's earthquakes and faults would much improve understanding of which areas are most at risk. For this reason, Mr Bilham wants to gather evidence as quickly as he can before rain or earth-slips obliterate it. Astonishingly, he has been refused a visa. | <urn:uuid:3a614616-f466-4b25-b8db-133e9a99529f> | {
"date": "2014-09-21T06:34:13",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657134620.5/warc/CC-MAIN-20140914011214-00339-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9655367732048035,
"score": 4.40625,
"token_count": 977,
"url": "http://www.economist.com/node/5019727"
} |
is found only on Sulawesi and the Talaut Islands of Indonesia.
(George, 1987; USGS, 1996)
is an arboreal marsupial that lives in the upper canopy of lowland tropical rainforests.
(Dwiyahreni et al, 1999; Lee, 2000)
has a short face and short, furry ears. The pelage is composed of a fine, wiry underfur and coarse guard hairs. Coloration ranges from black to grey to brown with a lighter colored belly and tips of extremities, with variation depending on geographic location and age of the animal.
The prehensile, unfurred tail is half of the total body length and is used in conjunction with the forefeet (which have two opposable digits) and syndactylous hindfeet to move between trees.is the most primitive of all phalangerids, retaining primitive dentition and cranial features.
(George, 1987; Nowak, 1997; Myers, 1999; National Wildlife Federation, 2000)
Mating system and behavior is unknown.
(Hayssen et al, 1993)
An adult femalegives birth one or two times a year.
Young are born at an extrememly altricial stage and continue development in the mother's pouch. After eight months, development is sufficient to allow survival, although the young remains with the mother for an additional period. It is unknown at what agereaches developmental maturity.
tends to live in pairs or groups of three to four. They are arboreal, moving slowly from tree to tree using their prehensile tail and grasping forefeet. A great proportion of the day is spent resting or sleeping, with little time devoted to feeding and grooming and even less to social interactions. It has been hypothesized that activity is spread throughout the day and night, with periods of rest between feeding or other activity. Leaves, the main food source, contain low nutrient levels and the resting periods may be necessary to digest the cellulose.
(Dwiyahreni et al, 1999; Lee, 2000)
Ailurops urisinus eats the leaves of many different tree species, but three make up half of the total diet. Young leaves are much preferred, probably because they are easier to digest and contain fewer toxins. However, the bear cuscus prefers mature leaves of mistletoes, which have more protein than the young leaves. A small amount of flowers and unripe fruit (which contains more protein than ripe fruit) are also eaten.
Common foods eaten include: tree leaves (Garuga floribunda, Melia azedarach, Dracontomelum dao), mistletoe leaves (Cananga odorata, Palaquium amboinense), unripe fruit, flowers and buds.
(Dwiyahreni et al, 1999; Lee, 2000)
Although primarily a folivore,also consumes unripe fruit, flowers and buds. These have not yet completed the development necessary in order to be able to give rise to another plant. Thus, the bear cuscus tends to restrict the reproductive potential of some plants.
Although not much sought-after, the meat ofis still commonly found in the restaurants and markets of Indonesia.
Under the name Phalanger ursinus,has protected status in Indonesia. Hunting greatly threatens this animal because of its low reproductive rate, particularly because females with young in the pouch may be killed and the young then abandoned, almost certainly dying.
(The Indonesian Nature Conservation Database, 2000; National Wildlife Federation, 2000; Lee, 2000)
is the most primitive and plesiomorphic of all phalangerids, and is thus placed in a separate subfamily, Ailuropinae. It is hypothesized that was isolated on the island of Sulawesi when the island first emerged in the Miocene, accounting for the animal's morphological divergence from the rest of the family Phalangeridae.
(Flannery et al, 1987; George, 1987)
Tawny Seaton (author), University of Michigan-Ann Arbor, Bret Weinstein (editor), University of Michigan-Ann Arbor.
Living in Australia, New Zealand, Tasmania, New Guinea and associated islands.
young are born in a relatively underdeveloped state; they are unable to feed or care for themselves or locomote independently for a period of time after birth/hatching. In birds, naked and helpless after hatching.
having body symmetry such that the animal can be divided in one plane into two mirror-image halves. Animals with bilateral symmetry have dorsal and ventral sides, as well as anterior and posterior ends. Synapomorphy of the Bilateria.
uses smells or other chemicals to communicate
animals that use metabolically generated heat to regulate body temperature independently of ambient temperature. Endothermy is a synapomorphy of the Mammalia, although it may have arisen in a (now extinct) synapsid ancestor; the fossil record does not distinguish these possibilities. Convergent in birds.
parental care is carried out by females
union of egg and spermatozoan
an animal that mainly eats leaves.
A substance that provides both nutrients and energy to a living thing.
An animal that eats mainly plants or parts of plants.
fertilization takes place within the female's body
animals that live only on an island or set of islands.
having the capacity to move from one place to another.
the area in which the animal is naturally found, the region in which it is endemic.
rainforests, both temperate and tropical, are dominated by trees often forming a closed canopy with little light reaching the ground. Epiphytes and climbing plants are also abundant. Precipitation is typically not limiting, but may be somewhat seasonal.
reproduction that includes combining the genetic contribution of two individuals, a male and a female
uses touch to communicate
Living on the ground.
the region of the earth that surrounds the equator, from 23.5 degrees north to 23.5 degrees south.
reproduction in which fertilization and development take place within the female body and the developing embryo derives nourishment from the female.
2000. "International Wildlife Magazine - About this Issue January/February 2000" (On-line). Accessed October 10, 2001 at http://www.nwf.org/internationalwildlife/2000/abtjf00.html.
Colijin, E., M. Muchtar. 2000. "The Indonesian Nature Conservation Database" (On-line). Accessed September 25, 2001 at http://users.bart.nl/~edcolijn/diproto.html#ursinus.
Dwiyahreni, A., M. Kinnaird, T. O'Brien, J. Supriatna, N. Andayani. 1999. Diet and activity of the bear cuscus, *Ailurops ursinus*, in north Sulawesi, Indonesia. Journal of Mammalogy, 80 (3): 905-912.
Flannery, T., M. Archer, G. Maynes. 1987. The phylogenetic relationships of living phalangerids (Phalangeroidea: Marsupialia) with a suggested new taxonomy. Pp. 477-506 in M Archer, ed. Possums and Opossums: Studies in Evolution. Chipping Norton, N.S.W: Surrey Beatty & Sons Pty Limited in association with The Royal Zoological Society of New South Wales.
George, G. 1987. Characterisation of the living species of cuscus (Marsupialia: Phalangeridae). Pp. 507-526 in M Archer, ed. Possums and Opossums: Studies in Evolution. Chipping Norton, N.S.W: Surrey Beatty & Sons Pty Limited in association with The Royal Zoological Society of New South Wales.
Hayssen, V., A. van Tienhoven, A. van Tienhoven. 1993. Asdell's Patterns of Mammalian Reproduction. Ithaca, N.Y: Cornell University Press.
Lee, R. 2000. Back Home for Kuse. Wildlife Conservation, 103 (1): 52-55.
Myers, P. 1999. "Family: Phalangeridae" (On-line). Accessed September 26, 2001 at http://animaldiversity.ummz.umich.edu/chordata/mammalia/diprotodontia/phalangeridae.html.
National Wildlife Federation, 2000. "International Wildlife Magazine - About this issue J/F00" (On-line). Accessed September 29, 2001 at http://www.nwf.org/internationalwildlife/2000/abtjf00.html.
Nowak, R. 1997. "Walker's Mammals of the World" (On-line). Accessed September 25, 2001 at http://www.press.jhu.edu/books/walker/marsupialia.phalangeridae.ailurops.html.
USGS, 1996. "Country Distribution Maps of Mammals on the 1996 IUCN Redlist" (On-line). Accessed September 26, 2001 at http://www.mbr-pwrc.usgs.gov/geotech/redbook/mammal21.gif. | <urn:uuid:9d462447-2ea5-4bd6-a3c7-491f3ee48068> | {
"date": "2019-01-20T13:00:50",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583716358.66/warc/CC-MAIN-20190120123138-20190120145138-00136.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8724035620689392,
"score": 3.5625,
"token_count": 1963,
"url": "http://animaldiversity.org/accounts/Ailurops_ursinus/"
} |
|Etymology||Story||Photos / Slideshow||Map||Profile|
Wheeler Peak (13,020 ft.)
Named by BGN in 1911
The name was approved as 'Wheeler Ridge' by the BGN in 1911, but appeared as
'Wheeler Crest' on all editions of the Mt. Goddard
30' map and on the Mt. Tom 15' quad. It was not until
publication of the 7 1/2-minute quad in 1982 that the name finally became
'Wheeler Ridge' (INF)"
- Peter Browning, Place Names of the Sierra Nevada
A small register was placed on the highpoint along the ridge in 1979. In it, it is mentioned that a cairn and note dating from the 40's had been found (maybe now at Bancroft Library?), in which the point was referred to as "Wheeler Peak".
For more information see these SummitPost pages: Wheeler Peak
This page last updated: Sat Apr 7 17:02:15 2007
For corrections or comments, please send feedback to: [email protected] | <urn:uuid:274e0539-5912-48d3-9404-8d12a62a8012> | {
"date": "2014-10-24T12:44:31",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119645920.6/warc/CC-MAIN-20141024030045-00240-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9592379331588745,
"score": 2.8125,
"token_count": 230,
"url": "http://www.snwburd.com/bob/etymology/wheeler_s.html"
} |
Thomas Alva Edison, one of the greatest innovative
minds of all time, achieved his greatest success while working at
his laboratory and machine shop in Menlo Park, New Jersey and for
this reason he was dubbed the “Wizard of Menlo Park”.
Even in his life time Edison had become a folk hero of legendry
Alva Edison, Life Magazine’s Number One
Man of the Millennium is credited with holding 1093 US patents,
a record number for one person that still holds. Perhaps Edison
is the only person to have patent granted every year for sixty-five
consecutive years (1868-1933). Today it is not possible to imagine
life without Edison’s inventions. He is certainly one of the
greatest inventors in history. Among his many inventions included
incandescent electric light bulb, phonograph, the motion picture
projector, the automatic multiplex telegraph, the carbon telephone
transmitter and the alkaline storage battery. When Edison was born
there was no electric light but by the time he died, entire cities
were lit by electricity. Much of the credit for this goes to Edison.
Besides electric light he created and contributed to movies, telephones,
records and CDs. All his inventions are sill in use in some form
or other. Throughout his life he tried to invent products that everyone
could use. His inventions deeply affected the shaping of modern
society. Some people go to the extent of saying that Edison single-handedly
invented the 20th century. He was the most prolific inventor the
world has ever seen. He was tireless at experimentation but always
practical and commercial in his goals. Since his childhood he had
an insatiable appetite for knowledge and the skill of intense concentration.
Edison believed in team work. He could motivate people and encourage
creativity. For Edison a person’s formal educational qualifications
did not matter. What mattered was talent. He chose people he thought
were more knowledgeable on a subject than he. He had the uncanny
ability to take ideas and put them into practical results. He was
never stopped by failure, rather he saw every failure as a success.
We are told that he failed 10,000 times in his storage battery experiments.
But then Edison said: “Why, I have not failed. I have just
found 10,000 ways that won’t work”. Edison was often
able to see possibilities others missed. This was because he never
stopped learning. He was always looking for solutions to problems.
He simply loved the challenge of inventing. For Edison science was
Edison was born on February 11, 1847 in Millan,
Ohio, USA, youngest of seven children born to Samuel and Nancy Elliott
Edison. When Edison was seven his family moved to Port Huron, Michigan
after his father hired a as a carpenter at the Fort Gratiot military
post. Edison lived there till the age of sixteen. Edison had a very
little formal education as a child. He attended school only for
three months, the only formal schooling he ever had. He was taught
reading, writing and arithmetic by his mother, who was a school
teacher. Edison’s mother encouraged his curious son to learn
things for himself. When Edison was nine years old his mother gave
him an elementary science book which explained how to do some chemistry
experiments at home. Edison not only did all the experiments described
in the book but also developed an interest in chemistry. He spent
all his spare money buying chemicals from a local pharmacy and he
also collected bottles, wires and other items for experiments and
he built some kind of a science laboratory in the basement of the
family’s home when he was 10. In his later life Edison said
that his mother was greatly responsible for his success. He taught
himself by reading constantly and trying experiments. He never attended
any technical school or university. From his parents he developed
a test for good literature and history. Before he was 12 he had
read works by Charles Dickens (1812-70) and William Shakespeare
(1564-1616), Edward Gibbon’s (1737-94) –Fall of the
Roman Empire and Decline–and more.
Throughout his life he believed in self-improvement.
He also strongly believed in hard work, sometimes working 20 hours
a day. ”
It is interesting to note that Edison had been expelled from school
as retarded perhaps because of his deafness. No one is really sure
how Edison lost most of his hearing. However, one story goes that
Edison had began to lose his hearing after having scarlet fever
as a young child. It has also been reported that he lost his hearing
after being pulled by the ear from certain death from in front of
a speeding train. Whatever may be the reason his deafness increased
as he grew older until finally he was totally deaf in left ear and
had only ten percent hearing in his right ear. Edison once said:
“I have not heard a bird sing since I was 12 years old”.
He did not repent for his deafness. Rather it seems that he saw
advantage to being deaf. He was of the opinion that it helped him
to concentrate on his work. He once said “Deaf people should
take to reading. It beats the babble of ordinary” conversation”.
Edison started working at an early age at 13 he
took a job as a newsboy selling candy and newspapers on the local
railroad that ran through Port Huron to Detroit. Edison was involved
printing, publishing and selling his own newspaper on a moving train
when he was just 15 years old. This newspaper included local news
and advertisement for his father’s store. While selling newspaper
along the railroad, something happened that changed his life. One
day on noticing three-year-old Jimmie Makenzie, the son of the stationmaster,
wandering onto the train tracks he moved the child to a place away
from danger. The boy’s father J.U Mackenzie was so grateful
that he taught Edison how to use a telegraph. Edison during 1862-68
worked as a telegraph operator throughout the Central Western States
of USA as well as Canada.
Throughout this period he constantly studied and
experimented to improve the telegraphic equipment. ”In 1968
Edison arrived in Boston and where he changed his profession from
telegrapher to inventor. He got a job as an expert night telegraph
operator. Though he had night duty but he hardly slept during the
day. He kept himself busy in experimenting with electrical currents.
He worked hard to improve a telegraph machine that would send many
messages at the same time over the same wire. He borrowed money
from a friend and quit his job to spend all his time in inventing.
Edison moved to New York city in 1869. He had
no job or ” money. A friend let him sleep in a basement office
below Wall Street. While Edison was living in this basement he was
called in to carry out an emergency repair on a new telegraphic
gold-price indicator in the Gold Exchange. He repaired it so well
that he was taken as a supervisor to build a better one. Later he
remodelled the equipment and subsequently he was commissioned to
improve other equipment and his skill became legendary.
Edison’s first patented invention was the
Electrical Vote Recorder, a device intended to be used by Elected
bodies such as the US Congress to speed the election process. This
he patented in 1868. Edison could not find a buyer for his first
invention. The US Congress did not show any interest in purchasing
this as it counted vote too quickly. It is said that Edison vowed
not to invent anything unless there was a ‘commercial demand’
for it or in other words he would only invent things that he was
certain to have a market. The first invention that Edison was able
to sell was the Edison Universal Stock Printer. This alongwith other
related inventions was sold to General Lefferts, the Chief of the
Gold and Stock Telegraph company. There is an interesting episode
associated with it. Edison felt that his invention was worth US
$ 5,000 and he was ready to sell at US$ 3,000 but to his utter surprise
Lefferts said, “How would $40,000 strike you?” In later
years Edison reported that he almost fainted but somehow he managed
to stammer that the offer seemed to be fair enough. The proceeds
from this sale enabled Edison to setup his first small laboratory
and manufacturing facility in Newark, a city in northeast of New
Jersey, on Newark Bay in 1871. During the next ”five years
Edison worked at Newark. During this period he invented and manufactured
devices that greatly improved the speed and efficiency of the telegraph
. In 1876 Edison sold his Newark manufacturing concern and moved
to the small village of Menlo Park, 40 km South West of New York
City. Here he established the world’s first research and development
laboratory outside the university system. It had all the equipment
necessary to work on any invention and an impressive library. It
became a model for later modern facilities such as Bell Laboratories.
It is from here that Edison changed the world for ever and it is
sometimes considered to be the greatest invention made by Edison.
The first great invention made by Edison at Menlo
Park was the Tin Foil Phonograph — a machine that could record
and reproduce sound. His original instrument used a cylinder coated
with tin foil. The phonograph patented in 1878 is sometimes considered
to be the most original invention made by Edison. The machine was
assembled by Johan Kruesi and Charles Batchelor based on the sketch
prepared by Edison. When the machine was made Edison took a tin
foil and wrapped it around the cylinder in the middle and casually
said, ”This machine is going to talk” and he recited
“Mary had a little lamb” into the strange device. Low
and behold! To everyone’s amazement (even Edison’s)
Edison’s machine repeated the words exactly. In its original
version you needed to shout a short message into the piece on one
side of the cylinder while you turned the handle. Inside this piece
was a needle. Your voice would make the needle shake or vibrate
and the sound vibrations would go through the needle and make a
line or groove into the ” tin foil. A needle on the other
side would reproduce what you had recorded. The tin foil could not
be used for more than a few plays. Later phonographs played records.
Early records were in the shape of a cylinder with the music on
the outside. Later records were shaped like discs or large CDs.
The phonograph created a sensation and brought Edison international
fame. He traveled widely with his tin foil phonograph. He was also
invited to the White House to demonstrate it to President Rutherford
Hays in April 1878. The tin foil phonograph was sold to the public
from 1878-80 at prices ranging from US$10 to US$200.
After the phonograph Edison undertook his greatest
challenge the development of a practical incandescent electric light.
It may be noted that the idea of electric lighting was not new.
In fact before Edison undertook this problem a number of people
had worked on it and even developed forms of electric lighting.
Inventors before Edison who tried to light the world using electricity
worked with two kinds of electric light—arc and incandescent
lighting. In electric arc lamp the light is produced by an arc made
when current flows through ionised gas between two electrodes. An
icandescent lamp is an electric lamp that produces light when a
filament is heated white-hot in a vacuum by passing an electric
current through the filament. Charles Brush started his arc lighting
business in 1877 two years before Edison’s breakthroughs with
incandescent lighting. But nothing had been developed which could
be used in home. The light bulbs developed before Edison burnt out
after a few minutes. In his effort to produce electric light Edison
studied the entire history of ” lighting. He filled 200 notebooks
with over 40,000 pages on gas illumination alone. Edison started
searching for a suitable ‘filament’ or wire that would
be stable and give good light when electricity flowed through it.
To achieve this he sent his people to the jungles of the Amazon
and forests of Japan. He tested over 6,000 vegetable growths (baywood,
boxwood, cedar, hickory flax, bamboo etc.) as filament material.
In 1879 after spending US$40,000 and performing more than 1,200
experiments Edison succeeded. And so there is no wonder that Edison
one day would say: “Genius is one percent inspiration and
99 percent perspiration.” Edison developed an incandescent
lamp with a filament of carbonised sewing thread which burnt for
long enough to be of practical value. Edison not only developed
a practical incandescent lamp but he also developed an electric
lighting system with all the necessary components like dynamos to
make the electric power, wires and fuses, electric meters switches
to turn the lights on and off and soon to make the incandescent
light practical, safe and commercially viable. The first public
demonstration of the Edison’s incandescent lighting system
was in December 1879, when the Menlo Park laboratory complex was
electrically lighted. Once this was accomplished Edison tried to
create the electric industry. In 1880, Edison started the World’s
first electric power company in a warehouse at Wall Street, New
York. The power station located on Pearl Street in lower Manhattan
started functioning on September 6, 1882 and provided light to the
first offices JP Morgan and the –New York Times–that
had been linked by underground wire. He thus invented the electric
Edison worked in Menlo Park for over 10 years.
He could persuade some of the richest people of New York like John
Pierpont Morgan (1837-1913) and the Vanderbilts to become his business
partners. Together they formed the Edison General Electric Light
company in 1989. When Edison General Electric merged with its leading
competitor Thomson-Houston in 1892, Edison was dropped from the
name, and the company became simply General Electric.
In 1887 Edison built a bigger invention laboratory
or ‘invention factory’ in West Orange, New Jersey, where
he worked until his death in 1931. It had fourteen buildings and
six of which were devoted to the “business of inventing”
. It had space for machine shops, glass-blowing operations, electrical
power generation and other facilities. It was such a huge laboratory
that it not only allowed Edison to work an any sort of project but
also allowed him to work as many as ten or twenty projects at once.
The entire laboratory and factory complex covered more than 20 acres
and employed more than 10,000 people at its peak during first World
War (1914-1918). It was at West Orange that Edison improved the
phonograph using wax records, the alkaline storage battery, the
electric pen, the copy machine, the dictating machine and developed
the motion picture camera and silent and sound movies.
At times one invention may give an idea for another. From phonograph
Edison moved to motion picture. In October 1888 Edison ” wrote:
“I am experimenting upon an instrument which does for the
Eye what the phonograph does for the Ear.....” Edison and
his coworkers, built the strip kinetograph, which was a very early
movie camera. The ‘strip’ was a piece of long, flexible
film that had been invented for regular camera which could be wrapped
around a wheel or a spool. The strip kinetograph took pictures so
fast that they seemed to move. Edison and his coworkers built a
Kinetoscope, a machine to watch these movies. The first kinetoscope
parlour or movie theater, opened on April 14, 1894 in New York City.
Edison also built a stage for filming these movies.
If should be noted here that Edison was one of the inventors of
motion pictures. Many other inventors helped find pieces of the
puzzle. But Edison put the pieces of the puzzle together. ‘Motion’
picture do not really move but they only seem to move. In fact a
modern movie camera take still pictures like a regular camera does
but it takes 24 of these pictures or frames per second. When one
sees these pictures at a very fast rate they look like moving. Edison
also connected a motion picture camera to a phonograph so that he
could put sound with motion picture. In 1913 Edison introduced the
first talking moving pictures.
Whatever Edison invented was written down in excellent detail
in 3,500 notebooks. Edison’s notebooks included laboratory
records, early drafts of patent applications, letters, photos of
models and so on. A person can see the entire process of invention
— the emergences of the finished product from idea through
Edison applied for his first patent—‘the
Electric Vote Recorder’, on October 28, 1868 at the age of
21 and his last patent ‘Holder for Article to be Electroplated’
was filed in 1931 the year he died at the age of 84. The last patent
was granted after two years of Edison’s death. In 1882 Edison
completed 106 successful patent applications. A patent protects
any invention that is not common knowledge. An inventor is awarded
a patent for his invention only if it is novel or unique. It means
inventions should not be described in printed publication before
the patent is awarded. Otherwise the inventor might lose the patent
application. It may be noted here that one invention may require
several patents. Sometimes an invention may have many smaller parts
and in such case each part has to be invented and patented separately.
Further every time an invention is improved, the inventor must apply
for another patent. There are three important steps in obtaining
* Date of execution when the paperwork applying for a patent is
completed and signed by the inventor.
* Date of application–—the date the
Patent office received the patent application –Date of issue–—
when the Patent Office officially awards the inventor a patent for
a new invention. ”Most of Edison’s patents were utility
patents. A utility patent can cover an invention — product
or process—that is electrical, mechanical or chemical in nature.
He had also a dozen of design patents. ”Edison both made and
lost millions of dollars during his life. Henry Ford (1863-1947),
the automobile industrialist said: “Mr. Edison was comfortably
well off. He always had what he needed. He was not a money maker
... his own portion was mere nothing compared with the wealth he
created for the world”.
Thomas Alva Edison died on October 18, 1931 at
the age of 84. He was experimenting till he died. In tribute to
this great inventor electric lights in the USA were dimmed for one
minute on 21 October 1931.
In 1956 the US President Dwight D. Eisenhower
(1890-1969) made the research laboratory in West Orange, New Jersey,
a national monument. In 1962 Edison’s home, Glenmont (which
had 29 rooms) and his West Orange Laboratory Complex were renamed
the Edison National Historic Site.
At the end it should be emphasised that Edison
was basically a problem solver and he had scant respect for ideas
for thier own sake. To quote –Time–magazine (December
31, 1999). ‘His inventions not only reshaped modernity but
also promised a future bounded only by creativity’.
For Further Reading
1. Edison : Inventing the Century by Neil Baldwin. New York: Hyperion,
2. Edison : A Life of Invention by Paul Israel. New York : John
Wiley & Sons. 1998.
3. Edison : A Biography by Mathew Josephson. New York : John Wiley
& Sons. 1992 (Reprint)
4. Edison and the Business of Innovation by Andrew Millard. Baltimore
: Johns Hopkins University Press, 1990.
5. The Story of Thomas Alva Edison by Margaret Cousins. New York
: Random House 1965.
6. Edison at Work : The Thomas A. Edison Laboratory at West Orange,
New Jersey by David W. Hutchings. New York : Hastings House, 1969.
7. Thomas Alva Edison : Young Inventor by Louis Sabin. Mahwah, N.
J : Troll Associates , 1983.
8. Thomas A. Edison : A Streak of Luck by Robert E. Conot New York
: Da Capo 1986 (Reprint)
9. Edison Experiments You Can Do by Majorie van der Water. Southfield,
MI: Thomas Alva Edison Foundation, 1960.
10. Edison’s Electric Light : Biography of an Invention by
Robert Friedel & Paul Israel, New Brunswick, NJ : Rutgers University
1. Thomas Alva Edison
2. Edison with two of the electric bulbs which in 1880 produced
the ‘Edison effect’ – the outflow of electrons
into vacuum from a heated conductor. (Also known as thermionic emission)
3. Edison’s mill dynamo which powered a textile mill in Paisley,
Scotland, from 1866 to 1913
4. Stock ticker – the first invention sold by Edison
5. Edison’s first phonograph patented in 1877
6. Vote Recorder – the first invention patented by Edison | <urn:uuid:8dd99ed0-b00c-44f5-b832-8ace3bc61b67> | {
"date": "2017-02-26T03:27:17",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00416-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9669277667999268,
"score": 3.1875,
"token_count": 4702,
"url": "http://vigyanprasar.gov.in/scientists/TAEdison.htm"
} |
An empowerment counseling process provides a safe and honest environment between the counselor and individual. The counselor should provide the individual with an environment in which he can reveal sensitive information or personal issues without fear of being judged or facing retribution. The counselor in this case should possess good listening skills in which he lets the individual reveal their emotions without unnecessary interruptions.
Counseling is an exercise carried out by an individual trained in assisting individuals, groups and the community in dealing with personal, drug- or behavior-related issues. According to statistics provided by the U.S. Bureau of Labor Statistics, there were around 665,500 counselors in America as of 2008. Empowerment counseling seeks to build or regain an individual's personal strength and instill the power to maintain that strength in an individual.
Examination of the Problem
For the counseling process to commence the individual and the counselor need to first pinpoint the source of personal conflict in her life, the foundation of the problem and its effects. Going back to the root of a problem is essential in helping her to come in terms with the personal issue that challenges her personal strength and gives the counselor a fresh outlook on the issue and the possible solution.
Counselor Patient Dialogue
The counselor-patient dialogue involves a brainstorming session between the patient and counselor. Based on the provided information the counselor quizzes the patient on their personal issues or beliefs which may influence them in their daily lives. This involves questions touching on personal relationships or even childhood experiences. The exercise aims to make the client open up and delve into situations or emotions he may not consider relevant to his current personal issues, which may in fact be a strong influence.
The counselor comes up with personal advice based on the issues influencing the individual in her life. This involves an honest evaluation of the individual's problems and the circumstances surrounding the individual. Based on the training of the counselor he can coach the individual on what changes need to be undertaken to regain control in their own lives. Together, they should formulate a plan on what measures to embark on to regain full control of the direction of her lives. This may include encouraging her to confront influencing people in her life so as to attain closure.
After completion of the empowerment counseling session, the individual and the counselor should keep in touch to ensure he keeps in line with the self-empowerment process so as to ensure he does not back slide when faced with the difficulties of his everyday life. | <urn:uuid:37a3c7a0-8962-4221-88df-71af2de69a13> | {
"date": "2015-05-26T09:50:36",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928817.87/warc/CC-MAIN-20150521113208-00149-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9469005465507507,
"score": 2.765625,
"token_count": 491,
"url": "http://www.ehow.com/info_10024862_empowerment-counseling.html"
} |
New cancer classification system shows promise as lifesaver
Classifying by tumor type shows lifesaving potential
Updated 1:04 am, Friday, August 8, 2014
Classifying cancer tumors by their molecular structure rather than the tissue or organ where they were found, such as the breast or bladder, may lead to more accurate diagnoses and potentially better treatments and outcomes for patients, a new study finds.
In the largest undertaking to analyze and compare different cancer types based on genomic sequencing, researchers found at least 10 percent of tumors - and possibly as high as 30 to 50 percent - would be identified differently if oncologists determined their diagnoses by a tumor's molecular makeup.
"The old system classifying cancer by the tissue of where it arose is outdated. It's been in existence for over 100 years now, and we know it doesn't merit the true nature of the cancer," said Dr. Christopher Benz, a professor at the Buck Institute for Research on Aging in Novato and co-senior author of the study.
The results were published online Thursday in the journal Cell.
The project is part of a national effort, the Cancer Genome Atlas project, which started in 2006 and is funded by the National Institutes of Health. It brings together more than 150 scientists from around the country, including researchers from the Buck Institute and UC Santa Cruz, with the goal of studying the genomic changes in more than 20 cancer types.
12 types of cancer
In this latest study to come out of the effort, researchers analyzed more than 3,500 samples from 12 cancer types that had been sequenced. Those included breast, kidney, bladder, brain, colon, endometrial and lung, among others.
They found that in many of the cancer types, such as an aggressive form of brain tumor known as glioblastoma and a type of leukemia, the tumor samples matched up well with the tissue classifications, suggesting that a tumor's location is still important for certain types of cancers.
But with other cancer types, tumor samples on a molecular level appeared to look more like unrelated cancers. For example, a significant number of squamous head-and-neck cancers looked more like some squamous-cell cancers found in the lung.
"How we use that information for treatment is anybody's guess right now," said Josh Stuart, professor of biomolecular engineering at UC Santa Cruz and a senior author of the paper.
The discovery that some tumors shared molecular similarities with tumors from other parts of the body was particularly striking in bladder cancer as well as an aggressive subtype of breast cancer scientists call "basal-like" but is more commonly known as "triple negative."
Explains patient response
Researchers said the results may help explain why some bladder cancer patients respond much differently to treatment than others.
In the triple-negative breast tumors, named as such because they lack the three hormone receptors targeted by the most successful therapies, the researchers learned the molecular wiring looked so different from any other breast cancers that they think the disease may warrant a new classification.
"It actually looks like a different cancer completely," said Benz, who is also a breast cancer specialist at UCSF. "It's a totally independent type of cancer from a molecular point of view."
Scientists say more work needs to be done before doctors are able to make different treatment decisions based on the new research. Many cancers, such as prostate, liver, melanoma and cervical, have yet to be sequenced, and adding them to the genomic "map" may change results.
"What we want to do with these maps is figure out all these different ways of looking at these (tumors) molecularly and putting more of them in the map," Stuart said.
But Benz said the research may help scientists know how to design new clinical trials to figure out, for example, whether an existing therapy for one cancer will work for a subtype of a seemingly different cancer.
"We have to keep doing this for all these cancer types," he said, "to completely reorganize and form a new textbook on oncology." | <urn:uuid:3fcc7bf2-c425-43b4-9b20-3a96cb01adde> | {
"date": "2015-10-06T12:55:38",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678654.30/warc/CC-MAIN-20151001215758-00212-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9674665927886963,
"score": 2.78125,
"token_count": 831,
"url": "http://www.chron.com/health/article/New-cancer-classification-system-shows-promise-as-5675296.php?cmpid=rrhealth"
} |
Sometimes it's handy to be able to read/write to a byte buffer as though
it were a file. The ByteIterator class provides this kind of functionality - allowing
seeking, reading ints, longs, etc., from a byte buffer. You can even perform a readLine()
on the buffer. Also supported are static conversion classes of bytes to ints, longs,
shorts, and unsigned bytes (concoctX classes). Reverse constructions also exist for
decocting the same.
Here are the docs. Here's the
It also includes dumping bytes in hex and ASCII, as well as the Boyer-Moore search. The
ByteIterator class (in particular the dump() method) uses the Ctype class.
CACM87 Arithmetic Data Compression Class
This was translated from the C code hoping to use it in the FTP server above to store
the welcome message file. Since it didn't compress as well as I hoped on short files, it
was an good exercise in both translation and understanding the arithmetic compression
algorithm. The zip file containing the com.theorem.compression.cacm87 class, the source
and documentation is available here.
This is the documentation.
CRC32 - 32 bit Cyclic Redundancy Check
This class calculates the CRC32 - 32 bit Cyclic Redundancy Check The check is used in
numerous systems to verify the integrity of information. It's also used as a hashing
function. Unlike a regular checksum, it's sensitive to the order of the characters. It
produces a 32 bit (Java int). The source is here. A very good explanation of CRC's
is found at www.4d.com.
There have been a number of requests for the original C version. Here's the C code. There's another version here.
Mersenne Twister Pseudo Random Number Generator
This is a Java version of the C-program for MT19937: Integer version. The RNG has a
period of period 2**19937-1. My source is here.
There's another Java version here
(at the bottom of its page) which is more complete. It offers multithreading and other
features, However, it adds extra &'s to mask results where it should just use
">>>" shifts to perform unsigned right shifts. That and the
synchronized(this and that's) should make it a little slower. Some of the synchronization
is incomplete allowing for errors in assigning "mti" in nextInteger(). Assigning
mti = 0 is protected while incrementing y = mt[mti++]; is not.
The documentation in the C program says
genrand() generates one pseudorandom unsigned integer (32bit)
which is uniformly distributed among 0 to 2^32-1 for each
call. sgenrand(seed) set initial values to the working area
of 624 words. (seed is any 32-bit integer except for 0).
Of course, in Java, it runs one one eighth the speed of the compiled C program and
probably uses more space. More information can be found at http://www.math.keio.ac.jp/matumoto/emt.html.
Another pair of MersenneTwisters that are a drop-in subclass replacement for
and MersenneTwisterFast.java .
Under JDK 1.2.1 MersenneTwisterFast seems about 3 times faster than MersenneTwister. These
versions are brought to you by the generous Sean Luke
Text Searching Classes
Quickly search through lots of text (or binary data) can be slow by normal brute force
methods. Here we have two much quicker ways to do the job - the Boyer-Moore and
Knuth-Morris-Pratt text searches.
These implementations have an unusual twist, however. Usually the algorithms assume you
can place all the data you'll search in the text buffer. Nothing could be further from the
truth! The twist allows you to see if there's a partial match at the end of the buffer.
You can use this information to try to match a search with data in the next block read
(using something like PushbackInputStream).
This is the source to the Boyer-Moore
algorithm. This is the source to the
Knuth-Morris-Pratt algorithm. The Boyer-Moore is considered the more efficient of the two.
Tiny Encryption Algorithm (TEA)
This algorithm is extremely quick and quite hardy considering how small it is. There
are more extensive notes in the documentation.
There are two sources, one for the original TEA and one for the
newer variant that address some of the theoretical weakness - TEAV
The version 1.0 of TEA that was formerly published here had a benign bug whereby it
emulated the C version as if it were using signed longs instead of the unsigned
longs. Version 2.0 of TEA and Version 1.0 of TEAV have corrected this problem.
The buggy TEA did a fine job of encryption, but wasn't compatible with the C (and
other versions). The lack of unsigned values in Java is deplorable.
There's also a tiny key generator for TEA (which doubles as a darn good lottery number
picker too). Source is here. The TEA
class source code may freely distributed and may be modified to suit your needs.
The current version is 2.02.It has a number of improvements
over 2.0, including bug fixes. The major improvements concern reading DBT (DBase
memo files) &
FPT (Foxpro 2) files. While much of DBase's database has remained the same
the memo file format has changed. You can specify which kind of DBase memo
file to read. Sadly there is no easy way to determine programatically which
is which so you may have to do some experimenting using the three existing
handlers - DBASE III+, DBASE IV, and FOXPRO 2.
This was written out of frustration
with Lotus Approach which bombed on every effort to get it to use an ODBC database.
cut out the requirement
for Windows and allowed the database to be kept in MySQL on a Linux machine, accessed
by Approach and by the Java software running on Linux.
SELECT, UPDATE, and INSERT supported. No joins, expressions or field to field
comparisons yet. WHERE clause supports AND and OR and NOT, but not parenthesis. It's
a start towards a real JDBC driver. It uses JavaCC the Java compiler compiler to
parse the SQL. I had to write this when the latest MS ODBC driver decided that an
UPDATE statement wasn't an update and "Blowed up real good."
Much of this API is similar to the JDBC API, making it feel more familiar to JDBC
programmers. However, this is not a JDBC implementation. One major reason for writing this
is simply that most products using DBase are brain dead and don't have any form of SQL
access from Java or outside world programs. Some of us need to read a DBase table, at
least to copy it to a real, functioning database.
Minor problem: The implementation cares not a fig for the index files and doesn't
update them. This can cause problems in a DBase application when it believes the
index file is correct and won't see added records. There is a method to kill associated
index files so that the application might be force to recreate them If someone
knows the structure of these files please let me know.
More information can be found about DBase formats at http://www.e-bachmann.dk/computing/databases/xbase/
Some changes have been made - like including the source for some missing .java files, a
Test.java that shows it working, and a sample database with numeric, text and memo fields.
Here's the zip file.
FTP Server Daemon
This is currently running at ftp://ftp.theorem.com.
The original server source written
by S.Tanaka is available. It doesn't have any security at all, can't handle PASV mode and
so on, but it's a great starting point. The beginning of the file may look odd, but I
think it used to be Japanese comments or perhaps it's just corrupted data.
Virtual directories are configurable defined as are related permissions for each
virtual directory. Permission include general read and specific permissions covering read,
denial, and write on a login basis. Anonymous logins may be denied (default setting)
access to the server and a maximum number of anonymous logins configured.
This version of the AXL FTP Server is released under the Lesser General Public License. This
allows you to use the product in commercial and non commercial applications.
|Multiple virtual directories, with general and login specific permissions.|
|Your own welcome message.|
|Automatic updates itself when configuration files change. Doesn't need to be restarted.|
|Automatic display files on a CWD/CDUP (for example you could display a 00_index.txt
file, if it exists in the directory). [Note: not all browsers will show the entire
contents of a long file (Netscape 4.X, for example)]|
|Maximum session count can be specified|
|Anonymous login capability, with session count limits.|
|RADIUS server can provides Idle-Timeout values for individuals (Still retains manually
configurable session inactivity limits)|
|External authorization Java class (develop your own authorization scheme)|
|Home Directory support - especially handy for personal www pages in home directories.|
|Configurable FTP ports.|
|Supports REST command - used to restore interrupted sessions|
|Supports RADIUS attributes: Port-Limit, Idle-Timeout|
|Support for groups, including a notation for all real logons. (V 2.6+)|
|Support for external control of uploads and downloads. External classes can be called
before and after an upload or download. You can use this to trigger an event on an upload or download.|
The server is distributed as ftpd30_9.zip
by FTP or ftpd3_09.zip by HTTP. Here's a copy of the documentation. The zip file contains a
JAR file, example configuration files, and the documentation. | <urn:uuid:cb525083-907f-4141-889c-5677ae3bbf16> | {
"date": "2014-04-23T16:57:01",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203235.2/warc/CC-MAIN-20140423032003-00155-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8836799263954163,
"score": 2.703125,
"token_count": 2224,
"url": "http://www.axlradius.com/freestuff/Free.htm"
} |
A Brief History of Michigan's State Fair - Background Reading
The Michigan State Agricultural Society sponsored Michigan's first state fair in Detroit, September 25-27, 1849. It was the second state fair in the United States. The first was in New York. For the next several years, a different Michigan city hosted the state fair. Among the host communities were Adrian, Grand Rapids and Jackson.
Lansing, the state capital, was chosen as the permanent home of the state fair in 1889 because it was the state capital, near the home of the Michigan Agricultural College and centrally located with good rail service. The Michigan State Agricultural Society borrowed money to develop a fairgrounds in Lansing, but bad weather reduced the fair's income and the society had to sell its property to pay its debts. (The Lansing Businessmen's Association purchased the land and later sold it to R. E. Olds for his automobile factory.)
The state fair was designed to encourage interaction between rural agriculture and urban industry. It quickly evolved into a rich blend of education, recreation and entertainment. In 1853 the fair opened on September 28, a day that "was quite cool, but not sufficiently so to render it uncomfortable." The latest machinery, a Dry Land and Under Water Excavator ("an ingenious piece of mechanism" possessing "properties of an excavator [and] a pile-driver"), was shown alongside a screw-and-lever cheese press and a lightning rod and point. The Hall of Fine Arts displayed daguerreotypes and paintings near the Dairy and Field Crop building, which exhibited "one beast big enough almost to feed a regiment."
By 1855 the state fair covered "about 20 acres" and included a Mechanics' Hall. "No pain or expense is being spared to make everything complete," the Detroit Free Press reported prior to the opening of the 1858 Michigan State Fair. That year, the fairgrounds were located in Detroit on the west side of Woodward, between Duffield and Adams"just far enough from the centre of the city to make a pleasant walk."
A band of community leaders, including department store founder Joseph L. Hudson, brought the state fair to its present location in 1905. They purchased 135 acres just south of Eight Mile Road in Detroit and deeded it to the Michigan State Agricultural Society. Three years later the fairgrounds could be reached using city cars of the Detroit United Railway, which carried passengers from all railroad stations and all points of the city, for five cents. The fair settled in Detroit for good. The society managed the State Fair until 1921, when the property was transferred to the State of Michigan.
By 1913 the state fair's program included a Detroit Symphony Orchestra concert, a
girls' milking contest, vaudeville shows and the auction of two steers by Governor Wilber
M. Brucker. And in the husband-calling competition, Mrs. Effie Mills "proved her
A second Michigan State Fair was organized by farmers in Michigan's Upper Peninsula in the 1920s. Escanaba was favored as a location for the new fair because it was centrally located with good rail and road connections. The first Upper Peninsula State Fair was held in 1928 and continues today. Currently, the Michigan Department of Agriculture manages this fair.
The Aerial Circus entertained state fairgoers in 1938 with "The Human Bullet" and "The Aerial Demons," who performed without a net 150 feet above them. Also featured that year was the "Largest Animated Model Ever Constructed," boasting "More Than 750 Life Like Figures."
By the end of World War II, the nonagricultural side of the State Fair had grown, and the interdependency of agriculture and industry was stressed. This shift was due in part to the fair's more urban and industrial Detroit location.
During the 1948 state fair, the Women's Premium book listed all prizes awarded to women exhibitors in the home arts, including those for two classes of handmade button-holes ("bound by hand" and "handworked"). First prizes were $3.50.
Displays of produce and livestock continued to be the mainstay of the state fair. On August 27, 1950, The Detroit News featured a photo of Pete Hellner, a Washtenaw County farmers who had won more than 1,500 premium ribbons during his 24 successive years of exhibiting hogs.
Throughout the years buildings were added to the fairgrounds, including a bandshell, a poultry building, a coliseum, a dairy cattle barn, a horse exhibit and a grandstand. In 1951, Cunningham's Drug Stores provided two trains for free rides around the grounds.
Popular entertainers have long appeared at the state fair. Bob Hope, along with Governor G. Mennen Williams, led the 1951 state fair parade from the riverfront to Adelaide Street. Hope, the Ink Spots, Marilyn Maxwell and the Rockettes performed at the state fair that year.
During the 1950s and early 1960s, state fair attendance grew steadily, reaching one million in 1966.
The baby boom generation brought an emphasis on families and education to the state fair, which began to feature rides, folk singers, and rock-and-roll by the 1970s and country western events by the 1990s. Teens from the city assisted with the care of livestock being exhibited by 4-H members from the state's outlying rural communities.
As of the 1990s, all Michigan State Fair buildings had been renovated and the grounds landscaped. Popular with fairgoers is an exhibition where visitors see the live births of farm animals. In 1998, the 25-foot-high Michigan Stove, originally exhibited at 1893 World's Columbian Exposition in Chicago, was restored and placed on permanent exhibition at the fair.
Information about Michigan's State Fair based on introduction from Historical Directory of American Agricultural Fairs, by Donald B. Marti. New York: Greenwood Press, 1986. | <urn:uuid:a8eeb68a-83dd-4769-b02f-1996abcb3972> | {
"date": "2014-04-16T07:17:33",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00347-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9707647562026978,
"score": 3.453125,
"token_count": 1206,
"url": "http://www.michigan.gov/dnr/0,4570,7-153-54463_18670_18793-53223--,00.html"
} |
Sustainable Woody Plant Maintenance
Woody landscape plants provide structure and a sense of permanence in our landscapes. Unlike herbaceous landscape plants, most woody plants do not die back to the ground over winter, but will leaf out from above ground, woody stems. Woody plants are available from ground-hugging groundcover type plants to 100-foot towering trees.
Woody plants serve a wide variety of important purposes in our landscapes. They can provide a canopy or "ceiling" for our outdoor rooms, provide shelter from winter winds or shade from hot summer sun, create a backdrop for ornamental herbaceous plants, screen undesirable views, visually anchor or balance buildings in the landscape, and help us conserve energy in our homes. They can also provide food and shelter for wildlife, provide edible food for us, create spectacular seasonal interest with flowers, fruit, bark and twigs, and fill the air with fragrance.
Because woody trees and shrubs can get considerably large, it is important that careful consideration be given to the plant's location at planting time. Unlike herbaceous plants, it is often difficult, or even impossible, to transplant a mature woody plant. Species should be chosen for a site based on soil and moisture preferences, available sunlight, and available space. Plants given proper site conditions will be healthier and require less maintenance. Cultural practices such as mulching to control weeds and conserve moisture will reduce maintenance and help plants do their best.
The following section of SULIS provides basic information about types of woody plants and their maintenance needs.
| Deciduous Trees
||Deciduous trees include everything from 6-foot tall ornamental trees to towering 100-foot tall specimens. They also contribute a vast range of shapes, forms, colors and textures to our landscapes. While deciduous trees lose their leaves in winter, they still provide us with structure and interest all year long. There is some overlap between small trees and tall shrubs, as many larger shrubs can be pruned into "tree form," meaning there is a visible "trunk" with foliage at the top 2/3 or less of the plant. Trees can have a single trunk or be in clump form (multi-stemmed).|
| Deciduous Shrubs
||Deciduous shrubs can be ground-hugging groundcovers or thick, large, screening plants. They are the backbone of our foundation and border plantings, often mixed with trees and herbaceous plants. They provide us with a wide range of seasonal interest, even in winter when they have lost their leaves. Wildlife often depends on deciduous shrubs for shelter and food|
| Evergreen Trees and Shrubs
||Evergreen trees and shrubs maintain their foliage all year long, providing some structure and color in our winter landscapes. They can be short, spreading groundcovers or tall, majestic trees. The foliage is often needle-like or scale-like, though there are a few broad-leaf evergreens which are usually treated more like deciduous shrubs. Evergreens are used in foundation and border plantings, as well as for windbreaks and screens|
| Woody Vines
||Unlike herbaceous vines, woody vines usually grow each year from above-ground stems and do not die back to the ground during winter. Some woody vines will die back to the ground in colder climates, but not in warmer areas. While many need a trellis, arbor or other structure on which to grow, others are able to attach themselves directly to buildings, trees or other substrates. Woody vines can fill in where vertical height is needed, such as along a building, where there is not enough space to accommodate the width of a shrub.|
| Woody Groundcovers
||Some woody plants can spread through rhizomes or layering (rooting where branches touch the ground) and quickly fill in an area, providing valuable, yet attractive, erosion control. Other woody plants can be planted in masses to give a groundcover effect. Once established, groundcovers can be a low maintenance solution for areas not appropriate for other plants, and can be repeated to visually provide unity to a landscape.| | <urn:uuid:a3ddfc85-50f8-4a2d-bafc-ce8c4a2ef498> | {
"date": "2017-01-18T04:10:07",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00074-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9385882616043091,
"score": 3.703125,
"token_count": 866,
"url": "http://www.extension.umn.edu/garden/landscaping/maint/woody_maint.html"
} |
Subsets and Splits