text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
- Special Sections
- Public Notices
SANTA FE – What’s the deal with New Mexico’s New Deal art? We have a whole lot of it – and should have even more.
Back during the Great Depression, from 1933 to 1943, the U.S. government had some honking big jobs programs. You’ve probably heard of the Civilian Conservation Corps and the Works Progress Administration. There also were programs to employ thousands of artists nationwide. Being a favorite spot for artists, New Mexico had a big share of those programs.
In New Mexico, a committee of well-known artists was chosen to travel the state interviewing artists and inspecting their art.
The artists chosen produced murals, paintings, photographs, furniture, dishes, wrought iron fixtures, copper items, weavings and other decorative items.
The pieces were not purchased. The artists were paid a regular weekly salary, depending on their level of expertise, to produce more art. Since the artists worked for the government, their work belonged to the government.
It was placed in public buildings throughout the state.
Almost every school building had at least one piece of art. In addition, art was placed in all manner of other public buildings, including court houses, libraries, post offices, county and municipal buildings and universities.
The committee that chose artists also chose locations where the art would appear.
Some of the most impressive works are murals painted on the walls of court houses built during that period.
Evidently, little time was spent documenting where the art was placed. Over the years, public officials and employees came and went and institutional memory concerning the art works was lost.
During the 1984-85 school year, Clayton home economics teacher Joanne Butt assigned her students to assemble all the New Deal art works in the school district. The treasure hunt located 38 paintings plus dozens of other objects. It is the largest number of paintings in any of the state’s public school collections.
Possibly the Clayton hunt was better organized than any other in the state. It is hard to imagine that the Clayton schools would have been favored over other agencies in the state. The population of Clayton is only a fraction of one percent of the state’s population. I’ll leave you to do the math on how many items were distributed around the state during that 10-year period.
The Clayton Public Schools system has recently authorized transfer of its New Deal art collection to the Hertzstein Museum in Clayton. The move is intended to provide more public visibility and better storage and maintenance opportunities.
The Taos Public Schools’ art collection was recently transferred to the Harwood Museum in Taos. High School librarian Lynn del Margo is the latest in a series of people who were responsible for the initial development and caring for the Taos collection.
Wouldn’t it be great if all public agencies that were beneficiaries of these wonderful gifts could follow the lead of the Clayton and Taos schools?
For anyone interested in helping with a local treasure hunt, there are resources available. The National New Deal Preservation Association has its headquarters in New Mexico. Kathryn Flynn is its executive director.
Flynn has compiled many of the state’s Blue Books and also has written a valuable reference book, “Treasury of New Mexico Trails: Discover New Deal Art and Architecture.”
It is available from Sunstone Press in Santa Fe. The book provides information on the New Deal artists and the locations of their work in New Mexico.
And maybe you know the location of some previously undiscovered New Deal art in New Mexico.
Flynn’s organization is always interested in finding what it calls “mystery artwork.” Over the past 12 years, the NNDPA has spent over $550,000 in New Mexico conserving many pieces of art that have been determined to be in need of immediate attention.
If you want to become involved, you can contact Flynn at 505-690-5845 or at [email protected].
Jay Miller is a syndicated columnist based in Santa Fe. | <urn:uuid:614c32d4-ffea-4940-9056-c442a26439ac> | {
"date": "2017-03-27T21:32:05",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189525.23/warc/CC-MAIN-20170322212949-00156-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9747853875160217,
"score": 3.046875,
"token_count": 840,
"url": "http://www.lamonitor.com/content/where-are-state%E2%80%99s-new-deal-art-treasures?mini=calendar-date%2F2013-02"
} |
The Eta Aquarids should be visible before dawn in the south-southeastern sky if it's clear. / AccuWeather
After a long, cold winter, skywatchers finally can enjoy a meteor shower late tonight without shivering, especially across portions of the southern USA.
The Eta Aquarid meteor shower, also known as the Aquarids, will put on a show "in the wee hours before dawn" Tuesday morning, according to astronomy website EarthSky. Though mainly visible in the tropics and in the Southern Hemisphere, people across the southern USA also should be able to enjoy the show.
"The Aquarids can be viewed in the southeastern portion of the sky, with 10-20 meteors an hour at the peak prior to dawn on Tuesday," according to AccuWeather meteorologist Mike Doll.
The moon will have set by that time, helping the view of the meteors.
Most of the southern tier of the nation should be cloud-free overnight, according to AccuWeather. Much of the northern USA, in addition to having fewer meteors to see, will have sky-obscuring clouds.
The name of the Eta Aquarid meteors came from tracing their paths backward. They all seem to radiate from in front of the constellation Aquarius, according to EarthSky. In particular, they come from the faint star Eta Aquarii, so the meteor shower is named in honor of this star.
The Eta Aquarid is one of Earth's two meteor showers that come from the debris trail of the famed Halley's Comet. The other is the Orionid meteor shower, which occurs each October.
The meteors are pieces of dust and ice from the comet that hurl into the atmosphere at 148,000 mph.
Though the shower will be at its peak early Tuesday, some meteors will be visible early Wednesday morning.
Copyright 2014 USATODAY.com
Read the original story: May meteors: Shooting stars light southern USA tonight | <urn:uuid:abd5ea6a-828a-481c-b95b-f9d5de7537fd> | {
"date": "2014-07-23T00:20:53",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997869778.45/warc/CC-MAIN-20140722025749-00192-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9331068992614746,
"score": 2.765625,
"token_count": 416,
"url": "http://www.thestarpress.com/usatoday/article/8726261"
} |
Spawning cod packed with vitamins
Cod migrate from the Barents Sea to the Lofoten Islands in North Norway to spawn every winter. The fishing season for these large spawning cod, called skrei in Norwegian, is currently open. A traditional North Norwegian serving of the fish is a super source of vitamin D.
Norwegian chefs say that skreimølje, which consists of the white meat of an adult spawning cod, its liver and a slice of roe, usually served with boiled potatoes, has become trendy. This is terrific from a nutritional viewpoint, because just a few servings provide heaps of vitamin D. The vitamin gets stored in our bodies and comes in handy through the dark winter months.
A single meal of this traditional northern Norwegian fare provides twelve daily doses of vitamin D, according to Magritt Brustad.
Brustad is head of the Department of Community Medicine at UiT, the Arctic University of Norway, in Tromsø. Her doctorate involved a study of the impact of traditional North Norwegian consumption of fish on residents’ vitamin D status.
We all depend on vitamin D. Foods that contain it are particularly important for those who live north of the Arctic Circle, where the sun is below the horizon for much of winter. Fatty fish and cod liver oil are both great sources of vitamin D.
Brustad was keen on studying what the traditional dish skreimølja does in the way of providing North Norwegians their vitamin D. She measured vitamin D levels in people before and after a meal of the spawning cod with its traditional trimmings.
The results were remarkable.
“Those who started with low levels of vitamin D enjoyed a measurable increase after one meal of spawning cod, liver and roe,” she says.
Mølja compensates for lack of sun
The biggest mølje eaters live mainly in North Norwegian coastal communities.
When the researchers investigated levels of vitamin D in inhabitants of Andenes in Vesterålen, they found them to have winter levels of vitamin D that matched their summer levels, Brustad said.
The researchers determined that mølja is significant for public health up north and largely compensates for the lack of winter sun.
How about youngsters?
Skreimølje has long been a key element of the North Norwegian diet. Nutrition studies indicate that it still is. At the start of the new millennium, some 70 percent of the residents of North Norway confirmed they ate this traditional meal regularly. Many had it more than seven times over the course of the spawning cod season, which is from January to March.
“We have reason to believe that young people in North Norway don’t eat as much fish as the older generations, and that vitamin D levels among the youngest are comparably lower. But we don’t have much data on that. It’s high time for us to check it out,” says Brustad.
Cool to eat skrei
North Norwegian chefs say that it is trendy to order skreimølje in Tromsø restaurants.
Espen Vesterdal Larsen, a prize-winning Norwegian chef at the Culinary Academy in Oslo says that the skrei trend is working its south.
“Skrei has always been popular. Now we see that it reaching new segments of the population – not just people with links to North Norway," he says.
Plenty of restaurants in the capital are currently advertising that “skreien er kommet” – the spawning cod has arrived. But the chef has his doubts about how many will have the full dish with liver and roe on their menus.
“We see that chefs are curious and put their hearts into making use of the entire fish. A lot of them will also experiment with liver and roe, but perhaps in a more refined way than a serving of skreimølje,” Vesterdal Larsen says.
Spawning cod makes its way to tables round the world
Vesterdal Larsen has recently returned from a trip to the USA, where he promoted Norwegian skrei to American chefs.
Skrei has a fantastic history that makes it easy to sell abroad. More importantly though, Vesterdal Larsen boasts about its special quality.
Skrei come from one of the world’s major stocks of cod and spends most of their lives in the Barents Sea. When the fish reaches sexual maturity it migrates to the Norwegian coast to spawn. It is then usually five years old and is called skrei, rather than torsk [cod]. The term stems from the Old Norse skrida, which means “to travel”.
About ten percent of the cod stock finds its way back, preferably returning to where it hatched as fry. This spawning cod has fattened up more than an ordinary cod and built up muscle mass along its swim to the Norwegian coast.
Master chefs in France and elsewhere are wild about it.
Milk is less important
Some scientists might think it’s enough just to point out the health benefits of vitamin D.
Brustad says scientists currently have only solid empirical evidence for saying that the vitamin is important for bone health and muscle strength.
She says butter or margarine that has been enriched with vitamin D is also a good source. Vitamin D enriched milk, however, is less preferable because it contains too little of the vitamin, she adds.
“The new Nordic dietary recommendations call for a daily intake of ten micrograms of vitamin D for adults. You need to drink more than two litres of milk to reach that level,” she says.
Solariums – tanning salons – can also be a source of vitamin D. Our skin synthesizes the vitamin even with the help of artificial sunlight. But medical authorities and cancer prevention organisations advise against using these to get our vitamin D. Tanning salons have a documented negative effect on health, raising the risk of skin cancer.
“We recommend that people take cod liver oil and eat fatty fish to ensure they get enough vitamin D in the winter,” says Brustad.
Translated by: Glenn Ostling | <urn:uuid:87daaadb-8ee5-43a4-9a9c-42566726fb0e> | {
"date": "2020-01-23T23:17:45",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.959426760673523,
"score": 2.8125,
"token_count": 1304,
"url": "https://sciencenorway.no/agriculture--fisheries-cod-fish/spawning-cod-packed-with-vitamins/1395906"
} |
Eliot attempts to sidetrack the readers train of though away from the feeling of depression due to the description of the current society by describing his surrounds in dept. This shadows the ‘overwhelming question’ of ‘what happens to society after World War 1?’ and gives the reader hope in the form of reassurance that there will be “time” for answers later, allowing them to carry on with their lives.
This stanza links the theme ‘going it alone’ through Eliot’s optimism of the future. The current mood among society is dark and depressed due to World War one and Eliot’s opinion would not have been shared by the majority.
* Eliot uses the repetition of “the will be time” highlights that he his attempting to convince society that although the conditions are bad, with “time” they will improve. * “To lift and drop a question” reflects the way society is attempting to grasp an idea on the current issues but cannot hold on to them therefore metaphorically dropping them.
The author uses the metaphor “the yellow fog that rubs its back upon the window panes” to describe that the depression and anxiety of the outcomes of WW1 are “there” or “present with us”. Shortly after describing this the author says that even though all the emotions and hardships and “with us”, they should go on with their lives and try to live with the presence of these things.
Jake Meincke and James Nadin
And indeed there will be time| |
To wonder, “Do I dare?” and, “Do I dare?”| |
Time to turn back and descend the stair,| |
With a bald spot in the middle of my hair—| 40| (They will say: “How his hair is growing thin!”)| |
My morning coat, my collar mounting firmly to the chin,| | My necktie rich and modest, but asserted by a simple pin—| | (They will say: “But how his arms and legs are thin!”)| | Do I dare| 45|
Disturb the universe?| |
In a minute there is time| |
For decisions and revisions which a minute will reverse.| |
Explain what you understand the poet to be saying in your stanza.
The poet is explaining to the reader how the character has lived a rich, eloquent, overeducated yet boring life. The character wishes to descend into a life outside of his comfort zone and explore new, daring ideas. Prufrock is questioning himself as to whether or not he should disturb his own universe – his life.
Explain how you believe your stanza can link to the idea of going it alone.
This stanza is the tipping point of Prufrock, where he is on the precipice to change, and must make the difficult decision – to disturb his universe or continue along his familiar and comfortable life. He is alone in his decision, and the pressure and consequences of his choice ride only on his shoulders.
Make a link between the going It alone idea and examples of techniques used in your stanza.
The concept of going it alone is represented through the line, “Time to turn back and descend the stair” the use of metaphor presents the stairs as a societal pathway that descends into new lifestyles and ideals. Through this change the idea of ‘disturbing the universe’ is brought forward. This is enforced through repetition “To wonder, ‘Do I dare?’ and, ‘Do I dare?’” which indicates to the reader that this is a major component of Prufrocks decent into a new and unexplored life. Stanza Five
For I have known them all already, known them all:
Have known the evenings, mornings, afternoons,
I have measured out my life with coffee spoons;
I know the voices dying with a dying fall
Beneath the music from a farther room.
So how should I presume?
1. The stanza is expressing a pessimistic view on the tediousness and boredom due to repetitive daily life. 2. Our stanza shows that being a victim to daily life leaves a negative impact on a person’s emotion. Showing that going it alone, and taking risks and a... | <urn:uuid:290d8a35-f06f-412b-ae29-2c38d9432f3f> | {
"date": "2017-04-29T02:34:11",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123172.42/warc/CC-MAIN-20170423031203-00472-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9619165658950806,
"score": 2.859375,
"token_count": 923,
"url": "http://www.studymode.com/essays/Mr-Nick-1520866.html"
} |
Today I have another set of free ancient world history notebook pages for you. These review a few facts about Ancient Egypt, Sumer, Akkadia, Babylon, and Mohenjo-Daro (in the Indus River Valley).
My youngest and I are reading Story of the World (affiliate link) together while my older two are working on research papers. This is a fabulous book for young learners. The stories are engaging and she definitely begs me to read more!
These notebook pages go along with the chapters we just read. If you are using the Story of the World, these can be used after reading up through Chapter 9. (Last week I shared the Ancient Egypt notebook pages (also free).)
You can download these pages here. Be sure to drop us a note if they were helpful. ~Liesl
So, that’s it for today. Coming soon… the China Geography Pack (see a preview of that down below!)
See you again soon here or over at our Homeschool Den Facebook Page. That’s also a great place to see if you’ve missed any other previous posts that might be of interest! Don’t forget to Subscribe to our Homeschool Den Newsletter! ~Liesl
You might also be interested in these related posts:
Do your kids know the 4 largest countries? Which countries have the most people? The longest river? This packet covers basic world and U.S. facts.
Hieroglyphic Word Generator Fun for kids to try! | <urn:uuid:204fc3c5-82b8-4f24-a30e-18385e747e84> | {
"date": "2017-04-26T23:26:36",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121752.57/warc/CC-MAIN-20170423031201-00294-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9230157136917114,
"score": 2.953125,
"token_count": 316,
"url": "http://homeschoolden.com/2016/11/11/free-ancient-world-worksheets/"
} |
The Environmental Protection Agency’s climate rules aimed at phasing out coal-fired power in favor of low-carbon fuels will come at a high cost, according to a newly released report.
Over the next two decades, the EPA’s rules to fight global warming will cost the economy $2.23 trillion, raise energy prices and lower families’ incomes.
Using economic models based on the federal government’s National Energy Model System, the conservative Heritage Foundation found that, by the end of 2023, EPA climate regulations will cost the U.S. nearly 600,000 jobs and reduce a family of four’s income by $1,200.
EPA rules would also raise energy prices and cost the economy $2.23 trillion from 2015 to 2038.
“Higher energy prices as a result of the regulations will squeeze both production and consumption. Since energy is a critical input for most goods and services, Americans will be hit repeatedly with higher prices as businesses pass higher costs onto consumers,” writes Nick Loris, a Heritage Foundation economist and co-author of the report.
“However, if a company had to absorb the costs, high energy costs would shrink profit margins and prevent businesses from investing and expanding,” Loris adds. “The cutbacks result in less output, fewer new jobs, and less income.”
Last summer, President Obama unveiled his Climate Action Plan, which heavily relied on capping carbon dioxide emissions from coal-fired power plants. Federal regulators moved quickly to craft rules that would limit power plant emissions, eventually publishing such a rule earlier this year.
Obama doubled down on his climate agenda this year, saying that he would continue his push to move the country away from fossil fuels and towards low-carbon energy.
“The shift to a cleaner energy economy won’t happen overnight, and it will require tough choices along the way,” Obama said in his 2014 State of the Union Address. “But the debate is settled. Climate change is a fact. And when our children’s children look us in the eye and ask if we did all we could to leave them a safer, more stable world with new sources of energy, I want us to be able to say, ‘Yes, we did.’”
But the EPA’s power plant emissions limits faced intense criticism for setting emissions limits for new coal plants impossibly low, effectively banning them unless they used carbon capture and storage technology (CCS). Such technology, however, is not commercially proven and the only known projects in the U.S. are federally funded.
Related: Rogers urges Congress to pass bill to stop EPA’s ‘War on Coal’
House Republicans have questioned the legality of requiring new coal plants use CCS, when the Energy Policy Act of 2005 specifically prohibits the EPA from using federally-funded projects to prove that a technology is commercially proven.
“No credible basis exists to state that CCS is adequately demonstrated today, since no large-scale power plant in the U.S. has CCS,” reads the Heritage report, adding that one large-scale CCS project under construction in Mississippi has gotten $400 million from the federal government.
The Heritage report urges Congress to block the EPA from imposing such strict standards that would cripple the coal industry. Congress has made several efforts to block the EPA from regulating carbon emissions — the most recent one being a bill proposed by West Virginia Democratic Sen. Joe Manchin and Kentucky Republican Rep. Ed Whitfield.
The Manchin-Whitfield bill limits the EPA’s ability to regulate carbon emissions by requiring that any such regulation must be proven to be economically feasible and have a positive environmental impact.
“To truly ensure that the technology is cost-effective, Congress should strip away all subsidies and Department of Energy spending for CCS in order to prevent the federal government from presenting a handful of fundamentally uneconomic CCS plants as proof that the standards are legitimate,” Heritage notes. “However, the most effective policy solution would be to prohibit the EPA and all agencies from regulating greenhouse gas emissions.” | <urn:uuid:78579668-b6de-4303-92d3-948294faafee> | {
"date": "2015-01-31T19:07:29",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122030742.53/warc/CC-MAIN-20150124175350-00237-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9507567882537842,
"score": 2.765625,
"token_count": 856,
"url": "http://yellowhammernews.com/nationalpolitics/report-epas-global-warming-agenda-will-cost-economy-2-23-trillion/"
} |
The Greatest Explorer
[Part 2 of 5]
From Submariner to SEA-DWELLER
In September 1962, Jacques Cousteau immersed his Calypso crew into their most ambitious adventure to date known as the Conshelf Project. The Conshelf project was the brainchild of a U.S. Navy Medical Corps., Captain named Dr. George Bond. Dr. Bond conceived a new method of diving known as the "saturation method" which became know as "saturation diving."
Saturation diving created an underwater habitat where the divers could live in an underwater house/structure/habitat so they could work on the sea floor, without having to decompress by coming up to the ocean's surface after each dive.
Dr. Bond submitted his plan to build this underwater habitat for saturated divers to the U.S. Navy and the U.S. Navy initially rejected the idea–so Dr. Bond submitted his idea to Jacques Cousteau and his Calypso diving team–and after careful evaluation Cousteau decided to undertake the project.
Conshelf I [September 1962] Location: Frioul Island, Marseille, France
Conshelf I got underway in September of 1962, and according to Jacques Cousteau, the objective was "Two men living for one week in a small building at a depth of 37 feet and working several hours a day at 65 feet." The Conshelf I structure was essentially a huge drum about the size of an industrial shipping container that was ballasted with an open hatch for the divers to enter and exit the underwater house.
In the photo below we see Conshelf I's barrel shaped habitat being tested for leakage before being submerged for the experiment. I may be wrong, but I think I recognize fellow DEEP-SEA Submariner, Jacques Piccard up on the top deck, leaning back, in the white shirt with dark slacks filming with a camera in his hand.
Jacques Coustea previously worked with Jacques Piccard on the Bathyscaphe Project, and would work with Piccard again in 1964 on a new floating laboratory nicknamed "Mysterious Island" and again in 1965 from April 13 to May 10 on a geophysical and acoustical mission along the south coast of France.
It is kind of shocking we have never seen a photo of the two Jacques together, but this may be the first one. Cousteau, of course, is located in the bottom right hand corner of the photo on the deck of the Calypso.
The First SEA-DWELLER's In History
Albert Falco and Claude Wesly of the Calypso diving team (pictured below wearing red caps) swam into history when they became the first "Oceanauts [French]" or "Aquanauts [American]" or "SEA-DWELLERS [ROLEX]" to live or "DWELL" under the sea. Also in the photo below we see Jacques Cousteau visiting with Falco and Wesly inside the Conshelf I habitat.
As I mentioned earlier, Albert Falco was Jacques Cousteau's lead diver and right-hand-man. The photo of Falco below was taken 7 years earlier on the deck of the Calypso in 1955 during the filming of The Silent World.
The Conshelf I project was extremely successful and Cousteau went directly on to the much more ambitious Conshelf II Project. Conshelf II explored the effects of a much longer duration stay living under the sea–for a month. Conshelf II also explored the effects of a week-long stay at 82 feet in a habitat filled with an oxygen-helium mixture with the inhabitant divers leaving the habitat to do daily work below 160 feet.
Conshelf II [June 1963] Location: Shab Rumi, Sudan, Red Sea
The photo below is of "The Starfish House" floating in the water on the right side of the photo, which was the primary structure of Conshelf II complex. The big circular structure on the left is the garage for the diving saucer which is being assembled for submersion. (Notice in the water color illustration above that the diving saucer located in the bottom right hand side of the image has left the garage and is headed for much deeper water). The Calypso diving team that lived aboard Conshelf II really were dwelling in the sea or SEA-DWELLERS.
Shab Rumi, located in the Red Sea, off the coast of Sudan was intentionally chosen since it was so far away from the location of Conshelf I. This was proof of concept that a huge industrial undertaking like this could be executed in a far-away, remote area.
In the photo below, two of the Cousteau Conshelf II divers relax over a game of chess in the Starfish house and enjoy a cigarette.
In 1965 Calypso undertook its most ambitious and last Conshelf project named Conshelf III which was a spherical structure designed to house six Cousteau team divers including Jacques Cousteau's son Philippe.
Conshelf III Location: Cape Ferrat, Off the coast of Villefranche
The photo below is of three of Cousteau's Conshelf III divers checking in their equipment after a daily work dive at close to 400 feet. | <urn:uuid:c4e4c2cf-2b0f-43ee-b6dd-7cd91f3ed5fe> | {
"date": "2014-04-17T19:22:24",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530895.48/warc/CC-MAIN-20140416005210-00379-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9550236463546753,
"score": 3.09375,
"token_count": 1109,
"url": "http://rolexblog.blogspot.com/1998/02/jacques-yves-cousteau-greatest-explorer.html"
} |
Answer: It depends…
Typically we think that water will work to put out a fire, but that is not always the case. What if there is an electrical fire? Water probably isn’t the best solution to use on your computer or other electronic equipment; it will most likely do more harm than good. Not only could water destroy your electrical equipment making it unusable, but the water could also conduct electric shocks harming the people trying to put out the fire. In addition, did you know that adding water to a Class D fire fueled by combustible metals can actually make the fire worse?
Hopefully, you won’t encounter a fire, but if you do…you should be prepared! Prevention is the best form of fire safety, so it is important to train your employees if fire risk is high or at least designate fire safety leaders if there is a low fire risk. Learning how to prevent fires and contain small fires could prevent the fire from spreading and becoming a real disaster.
It is also important to know the fire evacuation route. Usually office buildings will have the evacuation route posted; if not you should request one from the building manager. If your building is on fire, you should know the best escape route so that you can quickly get to safety. There should be someone appointed that will do a walk-through to make sure everyone has evacuated and no one is in danger. Practicing fire drills is a common habit in office buildings as well as schools and other highly populated buildings. A practice fire drill should help inform employees what to do in case of a real fire danger.
Fires require heat, oxygen, and fuel to exist. Eliminating one of these three components will put out the fire. Let’s review 4 classes of fire, as defined by the National Fire Protection Association (NFPA), that are adopted in the United States. I will review Class A, Class B, Class C and Class D fires, and I will also discuss the best way to extinguish each Class of fire and why water may not always be the best solution.
Fueled by: paper, trash, wood, cloth, rubber, etc.
Best to extinguish with: water
Fueled by: flammable liquids, greases, and gas
Best to extinguish with: liquid foam
Why not water: a solid stream of water can cause the fuel to scatter which will spread the flames
Fueled by: burning wires, electrical fires, and energized electrical equipment
Best to extinguish with: carbon-dioxide based extinguishers
Why not water: water can damage equipment and conduct electricity causing electric shock
Fueled by: combustible metals (sodium, titanium, magnesium, etc.)
Best to extinguish with: copper-based dry powder or sodium chloride
Why not water: water can make Class D fires worse! Water helps fuel these fires.
Note: This is not the entire list of fire classes as defined by the NFPA, but it includes the most common classes. In addition, Europe and other countries have their own set of guidelines and fires classes that differ from the United States. | <urn:uuid:bb54176a-81bc-495f-8929-96c41290c48f> | {
"date": "2018-09-20T21:50:49",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156622.36/warc/CC-MAIN-20180920214659-20180920235059-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.946483314037323,
"score": 3.484375,
"token_count": 637,
"url": "http://eimagine.com/fire-safety-should-water-always-be-used-to-put-out-a-fire/"
} |
Much research and debate exists about the effectiveness of simulations as a learning and assessment tool. The questions that are typically raised are: “How effective is a simulation as a pedagogical tool?” and “How do we know that students have really learned something from the simulation?” The purpose of this paper is to present the design of a simulation game that includes both automated coaching to enhance student learning and graded exercises. The automated coach serves as a timely consultant to students to identify functional areas in the game that need closer attention to improve performance. The graded exercises serve two educational purposes: (a) to provide feedback to the students on their understanding of the theoretical principles embodied in the game; and (b) to serve as an assessment instrument for the instructor and college program.
Date of creation, presentation, or exhibit
Department, Program, or Center
Gold, Steven, "Design and demonstration of an online managerial economics game with automated coaching for learning and graded excercises for assessment" (2008). Accessed from
RIT – Main Campus | <urn:uuid:55a3c43b-6cb7-4d51-9c67-befc5b28febf> | {
"date": "2017-09-23T02:13:28",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689413.52/warc/CC-MAIN-20170923014525-20170923034525-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9509627223014832,
"score": 2.5625,
"token_count": 214,
"url": "http://scholarworks.rit.edu/other/658/"
} |
What do people do a lot every day that’s generally considered as a waste-generating activity? Pee, that’s what. I remember seeing a show on TV where they featured a woman who’d pee in a jar so she could use it to water her plants (now that I think of it, it was an episode of Extreme Cheapskates where people were being, well, extreme cheapskates.)
Well, if this concept becomes a reality–and if it’s proven to actually work–then people could be getting more from pee than just compost or fertilizer for plants.
The concept is called the ECO-Urinal and it proposes using urine to power fuel cells. Apparently, urea reacts with the hydrogen ions freed from the water by running an electric current through it. The generated electricity can then be used to power the urinal itself and even the bathroom fixtures.
Of course, this is all in theory and nothing has been validated or proved yet.
The ECO-Urinal was designed by Liu Yi, Yue-Bo Shen, and Fang-Tian Ying.
VIA [ Yanko Design ] | <urn:uuid:1c4c7cfb-840e-4aca-ae4d-c4eb4147b86a> | {
"date": "2016-02-08T10:18:06",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152987.97/warc/CC-MAIN-20160205193912-00331-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9757288694381714,
"score": 3.0625,
"token_count": 239,
"url": "http://www.ohgizmo.com/2013/08/09/concept-urinals-aim-to-harness-the-power-of-pee/"
} |
Mercedes Built the First Car… Ever.
That’s right. The first automobile anywhere ever was a Mercedes. Some might object by saying there were other motor powered vehicles before the Benz, and they’d be right. But the Benz Patent-Motorwagen was the first one designed to use an engine for propulsion. It was also the first one to bet patented. So, legally, it’s the first one.
It wasn’t exactly a speed demon with about 2/3 hp, but later models were able to hit a blistering 10 mph. They might not have been faster than a horse and carriage, but they were definitely less smelly. | <urn:uuid:7a053aca-edb2-4bfb-a075-b87a3dd04b2e> | {
"date": "2015-10-10T16:06:41",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737958671.93/warc/CC-MAIN-20151001221918-00020-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.987643301486969,
"score": 2.59375,
"token_count": 139,
"url": "http://mbworld.org/articles/mercedes-built-the-first-car-ever/"
} |
Sharks have been swimming in Earth’s oceans since before the time of the dinosaurs. In recent years however, they have faced rapid population declines and most shark species are considered in danger of extinction - mostly due to threats from human activities. We hope these handknit toys can help teach kids about these sharks and what we can do to help save them!
The Philippines is home to many shark species, including these! Yes, there have been Great White Shark sightings in the Philippines, the more recent one was in January 2018 in Aurora. Hammerhead Sharks, though seasonal in the Philippines, can consistently be found in Malapascua Island in Cebu and in Cabilao, Bohol. While Donsol is thought to have the largest congregation of Whale Sharks in the world!
Our soft and floppy Whale Shark measures approximately 12 inches long, while the stuffed Great White and Hammerhead are around 16 inches long. Do remember, that each hand knit item is unique and sizes may vary slightly.
Hand knit with love by a mama who also plants rice in the rice terraces (take a look at the P20 bill to see what they look like).
Knitting Expedition was begun as a way to provide supplementary income for the women of Ifugao to maintain the rice terraces. Instead of leaving the region to find better paying jobs, the income from the sales of the products allows them to stay and tend to the rice terraces that are not only an awe-inspiring legacy of their town but also of the Philippines and which has provided sustenance for generations of their families. The brand Knitting Expedition also signifies the journey of founders, Candy and Aueeie, as knitters and the distance that the hand-knit products have to travel to make it to your homes.
*pattern by Amanda Berry | <urn:uuid:23933422-b66c-4f53-9904-63fd9e647999> | {
"date": "2019-06-20T01:04:42",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999130.50/warc/CC-MAIN-20190620004625-20190620030625-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9665967226028442,
"score": 2.546875,
"token_count": 371,
"url": "https://knitting-expedition.myshopify.com/products/shark"
} |
Photo by: David Mao on Pexels
It was a regular day when a woman was going to get her morning coffee. She pulled up into the drive thru and ordered her coffee, though she was appalled by the lack of response. She moved her car forward to complain about the service; however the people at the window said she had never ordered her coffee. As it so seems she was actually ordering her coffee from a trash can and had not talked to anyone. If this happened to her, could it happen to you?
Sleep? Is it actually needed?
Sleep is necessary, as we cannot function without it. Coffee and energy drinks are a nice short-term solution for fatigue, however they will not actually benefit your body in any way. When we sleep, our brain has time to get rest and transfer information into long-term memory.
Why Coffee Can’t Replace Sleep
Coffee is caffeinated so it will only keep you energized for a short time. In a study conducted in November of 2008, 61 people took place in an experiment where they were given coffee, a nap, or a placebo. “Naps vs. Coffee. Which Is a Better Choice for the Sleep-Deprived Musician?” outlines the effects of the experiment. The test showed us that people who drank the coffee were more alert at the beginning, but they did not have the energy to stay alert for long. The people who took the naps overall had better performance. They had better verbal memory and motor skills. The difference between the morning and afternoon tests showed significant differences between the placebo effect and the people who took the nap. The coffee drinkers showed no improvement in the afternoon session. It seems the coffee drinkers couldn’t improve, considering their brains did not have time to process the recently learned information. So overall the coffee drinkers did not have higher performance; they would perform without as much emotion and their motor memory was visibly worse.
Extreme Sleep Loss
Many different things happen to your body after having no sleep. It can differ from person to person.
In an article by WebMD, it’s stated your consciousness is impacted when you don’t sleep. This makes accidents more likely to happen. Simply driving to work turns into a major risk for everyone on the road. You will have delayed reaction time, which could cause you to crash into the car in front of you. Sleep loss can cause you to experience a lack of knowledge where the recollection of things happens at a slower rate. Sleep is a vital part of the cognitive process of transferring information and recalling previously learned things.
WebMD also discusses how lack of sleep will age your skin. The stress hormone is released into the skin at a faster rate causing too many cortisols in your body. They start to decompose the collagen, the protein that keeps your skin smooth.
Picture by: geralt on Pixabay
At 24 hours without sleep your decision making and judgment are severely impacted. You now are at an equivalent of 0.10 percent on the blood alcohol level. Your hand eye coordination drops, along with your hearing. You are more likely to eat while you are sleep deprived. The portion size will most likely be bigger and filled with fattening food. Without proper rest, your immune system does not have time to replace the old blood cells. Your brain will start to lose brain cells resulting in what could be major problems down the line.
At 36 hours, recollection of things that just happened might become foggy. The feeling of dehydration will start to appear and it may be harder to become motivated. Inflammatory markers get into the bloodstream which can lead to cardiovascular disease and high blood pressure.
At 48 hours, you may start to experience periods of time where the body will briefly shut down to take a microsleep. This is where the body will, in a sense, blackout while the person does not comprehend what is happening. These microsleeps can last anywhere between half a second and half a minute.
You may find yourself forgetting words you were about to say and it may be harder to pronounce them, so you might end up stumbling on words.
At 72 hours, it may be harder to concentrate on tasks, stay motivated, and your perception will be severely lowered. Simple tasks start to seem like hard jobs. Hallucinations may occur. Things may aggravate you faster and you won’t have the patience you normally do.
You may experience signs of hallucination. Seventeen year old high school student, Randy Gardner, stayed up for 11 days without any sleep. On the last day, his doctor studied his behavior and found that his “hallucinations mimicked a 90-minute cycle of REM dream sleep.” This meant he was starting to see things that weren’t actually there. He was slowly losing his grasp of reality.
A gentleman from China in the article, “Man Dies After Going 11 Days Without Sleep: What Are The Health Risks Of Sleep Deprivation?“, given the fake name of Jiang Xiaoshan, was in relatively good health so he didn’t think anything of watching a soccer marathon. He had not been sleeping much in the nights before and “he drank and smoked during the soccer matches, triggering this condition.” He was awake for 11 days straight and on the last day, he was found dead in his living room.
A Way To Avoid These Effects
Sleep. There is no reason a person should feel the need to stay up for 11 days or more. The article “11 Surprising Health Benefits of Sleep“ states that sleep will help your body improve memory, reduce inflammation, increase creativity, improve grades, increase attention, maintain a healthy weight, lessen stress, have a lower risk of an accident and be less apt to become depressed. Coffee and energy drinks are not effective in the long run so they should not be used as an alternative to sleep.
How Sleep Benefits Your Body
In the article, “6 Ways A Good Night’s Sleep Can Change Your Life”, it talks about how sleep can have different effects on your everyday life. The first way is by having a positive attitude. When you get enough sleep needed for your body to rejuvenate you tend to be less stressed, resulting in an overall positive attitude. The next thing is the ability to lose weight. When you are sleep deprived your body produces a hormone that stimulates your cravings for unhealthy foods. Also, sleep will improve your overall cognitive state. It will be easier to understand information and recall previously learned information. Getting sleep is one of the best ways to stay healthy, as stated in the article “23 Incredible Benefits of Getting More Sleep“. You will have energy you normally wouldn’t and will be able to work harder and longer.
As you can see by the passages above, sleep cannot be replaced by coffee, as sleep is vital for everyday life. Without sleep your body will not function correctly. You could find yourself not being able to complete everyday tasks with ease. This could result in some negative outcomes for you and others. So remember to get at least eight hours of sleep per night or over time you may start to experience some of these symptoms. | <urn:uuid:cb509d4d-f5bd-4284-a8b5-6c1353e40b2e> | {
"date": "2017-04-29T13:24:37",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00590-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9700559377670288,
"score": 2.875,
"token_count": 1484,
"url": "http://mrkantor.com/who-needs-sleep-when-we-have-coffee/"
} |
The results are the first to suggest a trans-generational contributor to the developmental disorder.
The study, published in the journal JAMA Psychiatry, is the first to examine the potential legacy that a mother’s experience with childhood abuse could have on the health of her own children. The findings are especially sobering given the latest statistics released from the Centers for Disease Control, which found a significantly higher rate of autism spectrum disorders (ASD) — one in 50 compared to one in 88 from a report released in 2012 — among school-aged children than previously thought.
The authors of the JAMA Psychiatry paper studied more than 50,000 women enrolled in the Nurse’s Health Study II, who were asked about any history of abuse before they were 12. The questions delved into both physical and emotional abuse, as the women evaluated whether they had been hit hard enough to leave bruises, as well as whether adults or caregivers had insulted, screamed or yelled at them. They also filled out questionnaires about whether their own children were diagnosed with autism spectrum disorders. The scientists also had access to the nurses’ health records, so they could adjust for other maternal health factors known to influence autism risk, including nine pregnancy-related conditions such as preeclampsia, gestational diabetes, alcohol consumption and smoking.
Women who reported physical, emotional, or sexual abuse when they were young were more likely to have a child with autism compared to women who were not abused. The more severely the women were abused, the higher their chances of having a child with autism; compared to women who weren’t abused, those who endured the most serious mistreatment were 60% as likely to have an autistic child.
Because it’s possible that a mother’s exposure to abuse as a child could also lead her to engage in behaviors associated with harming the fetus — such as smoking, drinking during pregnancy, using drugs, being overweight, having preterm labor or giving birth to a premature or low birth weight baby — the scientists also calculated how much these factors contributed to the risk of ASD in the next generation. To their surprise, these conditions explained only 7% of the heightened risk among the abused women. That meant that abuse was exerting more lasting effects on the women’s bodies that were translating into an increased risk of autism in their children.
How? The researchers believe that some of the lifestyle circumstances associated with abuse, such as poor nutrition, could be responsible for some of the association. It’s also possible that abuse causes biological changes in a woman’s immune system, including disruption of the stress response, that could lead to harmful effects on a developing fetus. Studies have shown that autistic children showed abnormal stress responses, and it’s possible that a mother’s altered stress reaction could be passed on to her child. “Maternal inflammation affects the developing brain, and maternal inflammation and immune function have been hypothesized to be causes of autism,” the researchers write.
The researchers also speculate that childhood abuse can leave women in a state of chronic stress; the constant release of stress-related hormones could also increase a developing child’s chances of developing autism, since such androgens have been associated with autistic symptoms. Finally, a mother’s childhood abuse could be an indicator of a genetic risk for mental illness, which is often associated with abuse of youngsters. Studies showed that mental illness and autism may share genetic risk factors, “therefore, the perpetration of child abuse by grandparents and experience of abuse in childhood by the mother may be indicators of genetic risk for autism in the child,” the study authors write.
“Childhood abuse is associated with a wide array of health problems in the person who experiences it, including both mental health outcomes like depression and anxiety, and physical health outcomes like depression and anxiety, and physical health outcomes like obesity and lung disease,” said senior study author Marc Weisskopf, an associate professor of environmental and occupational epidemiology at Harvard School of Public Health, in a statement. “Our research suggests that the effects of childhood abuse may also reach across generations.”
Is that legacy enough to explain the apparent rise in ASD documented in the most recent government data? The CDC data was based on parental reports of autism; a representative sample of parents were asked whether a doctor had diagnosed their child with autism, and some experts caution that such reports are not as reliable as health records documenting the disorder. Still, the latest statistics suggest that at least awareness of ASDs is increasing, and with it, potential explanations for what might be contributing to the disorder.
If childhood abuse turns out to be one of these reasons for the rise in autism cases, then efforts to prevent it take on new urgency, since such interventions can benefit more than just one victim. | <urn:uuid:8ddeb598-57d8-42fa-bc4a-3f50f7d1278f> | {
"date": "2016-05-05T03:00:31",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860125857.44/warc/CC-MAIN-20160428161525-00072-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9769774079322815,
"score": 2.984375,
"token_count": 983,
"url": "http://healthland.time.com/2013/03/21/study-women-abused-as-kids-are-more-likely-to-have-children-with-autism/?iid=sp-article-mostpop2"
} |
When the Belfast Hebrew Congregation commissioned its new synagogue in 1964, it chose a circular building held up by concrete beams marked out in the shape of a Star of David. Tall, narrow windows and triangular peepholes allowed shafts of lights to penetrate the space.
Today, a thin wall cuts across the center of the synagogue, slicing the Star of David into two parts. As the city’s Jewish population declined to 80, down from a peak of 2,000 in the 1940s, the synagogue’s committee decided that the space had become too large for the dwindling congregation, so it separated the building into a smaller worship space and a community area for more informal gatherings.
Presently only half of this aging community is observant, and with 11 or 12 men attending prayer services regularly, it has come dangerously close to losing its minyan.
“Apathy has set in,” said Norma Simon, stalwart of the community and columnist for the Belfast Jewish Record, the region’s only Jewish publication. “If the weather is bad or there’s some other reason, [the men] don’t turn up. It is very disheartening when there are only nine.” This may be the end for the Belfast Jews.
“I am saddened,” said Michael Black, chairman of Belfast’s Jewish community, “that my generation will, likely, be the last that can offer a Jewish way of life in Belfast, but I am very proud that, although our numbers were small, we will have played our part in making Northern Ireland a better society for all.”
Belfast’s Jewish community has a rich history. From the impressive synagogue to the notoriously sinkable Titanic — constructed by the biggest shipyard in the world at the turn of the 20th century — its influence is evidenced in all quarters of the city. The city was even the birthplace of Israel’s sixth president, Chaim Herzog, who immigrated to Palestine in 1935 at age 17.
The first Jews arrived in Belfast around 1840, when Richardson & Auden, local linen suppliers, invited Daniel Joseph Jaffe, a German merchant, to come to Belfast and set up an export business, delivering locally sourced linen across the globe.
Following a long period of religious persecution in the mid-19th century, a second wave of Russian Jews made its way to this capital city in the 1880s.
The community’s peak came just after World War II, when the Jewish population numbered about 2,000. Though not a large number, they succeeded in making a mark on the city’s business, commercial and artistic landscapes. Jewish-owned businesses popped up along York Street in the city center. Mostly they were involved in furniture, clothes and jewelry.
With the growing community came kosher restaurants — Nemtzov’s and Diamond’s butchers shops provided meat, and Levey’s kosher grocery provided rye bread and fresh herring flown in from Glasgow — and the establishment of the Jaffe School for the Jewish Children of Belfast, founded by Otto Jaffe, the first and only Jewish lord mayor of Belfast.
It was during the start of the “Troubles” — a 40-year violent political conflict between Northern Ireland’s Unionist and Republican contingents in the late 1960s — that Belfast’s Jewish community first began to lose its numbers. But the primary turning points, Simon said, came in the ’70s and ’80s, when attacks were made on key Jews. The 1977 shooting of local business mogul Leonard Steinberg, though purely economic, made the community uneasy. Steinberg survived, and when he relocated to Manchester, England, much of the community followed.
The unease deepened in 1980 when Steinberg’s friend, local antiques dealer Leonard Kaitcer, was kidnapped for ransom and then murdered. Gillian Price, who relocated to Manchester with three other families, said that at that point, “a lot of Jewish families, especially those with children, decided they didn’t want to live there anymore.”
Eventually, Belfast’s kosher butcher and Hebrew school shuttered. Since giving their children a Jewish education was a top priority for members of the Orthodox community, many of them moved away.
Today, the declining population is affecting all facets of Belfast’s Jewish community. “Children go away for university now, and they don’t come back,” Simon said. The Belfast Jewish Record once produced 10 issues per year; now it produces three. Its December issue documented the Jewish Belfast reunion that took place in November. More than 125 ex-Belfasters traveled from across the globe to reunite with friends and relatives. “We finished up with a very emotional rendition of ‘Hatikvah,’ and with hearts bursting with pride in our heritage, we said farewell,” columnists Joy Brown and Barbara Abraham-Vazana wrote.
While the majority of the community seems resigned to the continued diminishment of its numbers, some are intent on not allowing the marks of Jewish culture to fade. Katy Radford, who recently won an MBE, or an Order of the British Empire — an honor bestowed by the queen — for her service to community relations in Northern Ireland, received for the second year in a row a grant from the European Union to exhibit and promote Jewish arts and culture in the region. Events in 2011 will include a jazz work based on the book “The Chronicles of Narnia,” by local composer and drummer David Lyttle and Israeli pianist prodigy Ariel Lanyi, and an exhibition of a series of cartoons on the Middle East conflict, by several Pulitzer Prize-winning artists. “I think in a community that is getting smaller… and where there are challenges to how the most observant are able to live, it was important to me that the contribution made by Jews in Ireland was allowed to be celebrated,” Radford said.
Rabbi Menachem Brackman, leader of the Belfast Synagogue, also refuses to think in terms of the end. He’s fundraising for a new mikveh — the old one was lost in a real estate transaction in the 1980s — in hopes of attracting more Jews to the area, and he continues to strive to convince those Belfast Jews that have turned away from their faith to reassess. “Anything is possible,” he said. “People have predicted the demise of Jewish communities all over the world, and people have been wrong. Jews are unpredictable.”
Katherine Clarke is a journalist from Northern Ireland who is based in New York City. Her work also has appeared in The New York Observer and The Wall Street Journal. | <urn:uuid:e7e14068-4c0b-44da-9a50-0344ef131473> | {
"date": "2015-03-31T20:46:49",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131301015.31/warc/CC-MAIN-20150323172141-00146-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9644132852554321,
"score": 2.59375,
"token_count": 1409,
"url": "http://forward.com/articles/136985/a-dwindling-community-s-fight-to-survive/"
} |
Civil War Drawings from the Becker Collection
The privately held Becker Collection, now digitally archived at Boston College, contains approximately 650 previously unexhibited drawings by mid-19th-century American artist-reporters Joseph Becker and colleagues.
On assignment for Frank Leslie's Illustrated Weekly, the era's leading illustrated periodical, a group of so-called Special Artists accompanied Union troops during the Civil War to produce firsthand drawings for publication, giving a glimpse into the life of an artist embedded within the armed forces.
Civil War Drawings from the Becker Collection is curated by Judith Bookbinder and Sheila Gallagher and the traveling exhibition is organized by Curatorial Assistance Traveling Exhibitions, Pasadena, California. The exhibition is generously sponsored by the Roanoke Arts Commission.
Drawings from the Becker Collection premiered at the McMullen Museum at Boston College in the exhibition First Hand: Civil War Era Drawings from the Becker Collection, which was organized by the McMullen Museum and underwritten by Boston College and Patrons of the McMullen Museum. | <urn:uuid:2644a17c-8721-49a6-997e-5c653a3d32cd> | {
"date": "2014-10-01T06:00:17",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663365.9/warc/CC-MAIN-20140930004103-00272-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9490805864334106,
"score": 2.59375,
"token_count": 212,
"url": "http://www.taubmanmuseum.org/main/exhibitions/civil-war-drawings-becker-collection"
} |
For the first time in recorded history, scientists agree with 13-year-olds the world over: It’s all mom's fault. According to a spate of recent economic research, in-utero shocks to the mother can produce deleterious consequences for the infant's adult economic outcomes. In English, this means that a soon-to-be mother's health could affect her infant's health and/or baseline ability, which could in turn snowball to impact the infant's chances at succeeding in school and finding a job much later in life. For example, according to one new working paper, if your mother gets sick when she's pregnant, it could cause you to make as much as 10 percent less income as an adult. At the median US income of roughly $50,000, that means mom carelessly getting ill while you were helplessly trapped in her body could be costing you $5,000 every single year.*
Other notable maternal betrayals include:
- If a parent of the mother dies during pregnancy, the resulting grief may increase risk of complications at birth.
- If the mother lives in a more violent region during her first trimester — for example, if she lives in a region of Colombia that just happens to have more landmine explosions than other parts of the country at that time, birthweight decreases, which in turn depresses test scores.
- If your mother's just especially stressed for whatever reason (and this might be the reason behind all of the above) verbal IQ drops by about half a standard deviation — e.g., if you would have been of exactly average verbal intelligence, which is to say at least as smart as 50 percent of the population, now you're only at least as smart as about 30 percent of the population.
Known as the “Fetal Origins” hypothesis, this idea has been around for a while in the biological literature — that in-utero conditions can have long-lasting consequences for the resulting adults — but only recently have economists started to look at how these physical harms can manifest in money terms. Aside from serving as excellent ammo in arguments with your mother, the theory also describes an important channel for the perpetuation of inequality: poor people are more likely to live in violent areas, are more likely to have poorer preventative care, and just generally are more likely to experience greater stress. The suffering that these mothers endure during pregnancy could harm their children for the rest of their lives, and contribute to the already heavy burden of being born into poverty. So ensuring that every mother has adequate access to health resources – including adequate access to psychological support — is part and parcel with the fight against inequality.
Although it's also worth noting that only an economist would think that telling stressed-out moms that stressing out will cause their children lasting harm (all your fault, mom, unless you calm down right now!!!) is somehow a good idea. Because people are rational, right?
* To any terrified mothers reading this, don't actually worry: These studies all look at average effects over large groups of people, and may very well not describe your individual case. Also, effects only manifested for very, very extreme situations, such as living in a war-torn region or experiencing the death of a parent; and according to the study even the death of a parent, while it is associated with birth complications, does not produce any other visible effect on the infant after the birth. So really, don't panic, you're a great mom. Despite the title (and entire body) of this blog post, it wasn't actually until middle school that you ruined your child's life.
Photo Credit: By Andrew Vargas (Flickr: motherly love, via Wikimedia Commons) | <urn:uuid:965ea9bb-594e-4594-87be-06631e78e671> | {
"date": "2017-02-20T19:20:04",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00580-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9703150391578674,
"score": 2.90625,
"token_count": 757,
"url": "http://bigthink.com/think-tank/how-mom-ruined-your-life-and-economic-prospects-before-you-were-born"
} |
Hemorrhoids are swollen veins in the lowest part of your rectum and anus. Sometimes the walls of these blood vessels stretch so thin that the veins bulge and get irritated, especially when you poop.
Swollen hemorrhoids are also called piles.
Hemorrhoids are one of the most common causes of rectal bleeding. They're rarely dangerous and usually clear up in a couple of weeks. But you should see your doctor to make sure it's not a more serious condition. He can also remove hemorrhoids that won't go away or are very painful.
Internal hemorrhoids are far enough inside the rectum that you can't usually see or feel them. They don't generally hurt because you have few pain-sensing nerves there. Bleeding may be the only sign of them.
External hemorrhoids are under the skin around the anus, where there are many more pain-sensing nerves, so they tend to hurt as well as bleed.
Sometimes hemorrhoids prolapse, or get bigger and bulge outside the anal sphincter. Then you may be able to see them as moist bumps that are pinker than the surrounding area. And they're more likely to hurt, often when you poop.
Prolapsed hemorrhoids usually go back inside on their own. Even if they don't, they can often be gently pushed back into place.
A blood clot can form in an external hemorrhoid, turning it purple or blue. This is called a thrombosis. It can hurt and itch a lot and could bleed. When the clot dissolves, you may still have a bit of skin left over, which could get irritated.
Some people may be more likely to get hemorrhoids if other family members, like their parents, had them.
A buildup of pressure in your lower rectum can affect blood flow and make the veins there swell. That may happen from extra weight, when you're obese or pregnant. Or it could come from:
People who stand or sit for long stretches of time are at greater risk, too.
You may get them when you have constipation or diarrhea that doesn't clear up. Coughing, sneezing, and vomiting could make them worse.
Eat fiber. A good way to get it is from plant foods -- vegetables, fruits, whole grains, nuts, seeds, beans, and legumes.
Drink water. It will help you avoid hard stools and constipation, so you strain less during bowel movements. Fruits and vegetables, which have fiber, also have water in them.
Exercise. Physical activity, like walking a half-hour every day, is another way to keep your blood and your bowels moving.
Don't wait to go. Use the toilet as soon as you feel the urge. | <urn:uuid:c9ce544a-8d80-46dc-a006-c41fb179ebe0> | {
"date": "2020-01-27T08:33:13",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251696046.73/warc/CC-MAIN-20200127081933-20200127111933-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.969027042388916,
"score": 3.015625,
"token_count": 576,
"url": "http://bestclinic.co.in/subinnerpage?id=10"
} |
The new method synthesizes many different compounds at once in complex mixtures. Then, because of the presence of a molecular target, its components naturally will evolve into the best candidate molecules.
"This method employs basic principles of Darwinian evolution," said Eliseev. "It's survival of the fittest. Our method increases the amount of the desirable compounds and decreases the amount of the undesirable ones."
Unlike other combinatorial methods, the UB method works by using molecular recognition -- the ability of molecules to bind to a target -- to simultaneously form and screen mixtures of many chemicals for the best ones.
During a stage the scientists call equilibration, or variation, the components of these mixtures are manipulated by the presence of the molecular target to "evolve" higher fractions of the best compounds.
"Our mixture circulates through two chromatographic columns," explained Eliseev. "In one of them, which we call the selection chamber, the effective components bind to the immobilized target compound. In the other one, the remaining mixture is brought to an equilibrium, where the mixture regenerates the fraction of the effective binders it just lost."
In the same way that natural evolution plays out over the course of many generations, chemical evolution occurs over the course of many repeated cycles during which the chemical library continually reforms itself, evolving a much larger subset of effective components.
These components then are isolated from the mixture and analyzed to identify potential drug leads.
The method has been proven in a model system.
The UB scientists are using it to develop drug candidates against the enzyme pepsin, which is found in the stomach and involved in the formation of ulcers. | <urn:uuid:19473d2b-22fc-4075-b5cd-9fdcc2322041> | {
"date": "2014-08-20T08:47:45",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500801235.4/warc/CC-MAIN-20140820021321-00072-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9300495386123657,
"score": 3.1875,
"token_count": 342,
"url": "http://news.bio-medicine.org/biology-news-2/UB-Researcher-Developing-Method-That-Employs--22Evolution-22-To-Identify-New-Drug-Leads-14594-2/"
} |
Oregon's Other Threatened Species: The Timber Worker
MILL CITY, OREGON — ALONG the North Santiam River, which flows out of Detroit Lake about an hour east of Salem, Oregon, log trucks thunder out of the Cascade Mountains and into the Young & Morgan mill yard, kicking up dust. Screaming steel blades are soon whittling the loads of giant fir into lumber, overseen by Jim Morgan whose father and uncle started the business. Mr. Morgan has 450 employees, three mills, and 75 log trucks to keep an eye on, which makes his operation the biggest employer in this canyon. But his focus is largely on Washington, D.C., these days where politicians and bureaucrats are deciding the future - and maybe the fate - of the Northwest timber industry. It's a situation he finds to be ``nothing but scary.''
With the listing of the northern spotted owl as a threatened species July 23, there is little doubt in the woods and in the mills and in the little towns that dot Oregon, Washington, and northern California that changes are coming. Forest ecology is no longer being left to local or regional officials and business interests. Managing national forests in the interests of all Americans has become a political fact. The key question here is: Will jobs and a unique way of life be preserved along with the controversial bird?
Environmentalists and government scientists say the spotted owl is an ``indicator species'' whose decline warns of ill health for old-growth forests. The listing under the Endangered Species Act of 1973 confirms that. At the moment, the Bureau of Land Management and the Forest Service are working against a Sept. 1 deadline to produce comprehensive plans to protect spotted-owl habitat, most of which is on federal land.
The Bush administration is looking for a way to balance the human/environmental equation, perhaps by changing the Endangered Species Act so that economic factors may be considered in making official listings.
But initial indications are that the listing of the owl and the consequent removal of millions of acres of habitat from logging indeed will be scary for many in the region: 25,000 direct timber jobs could be lost, plus at least that many jobs in secondary occupations for a total of $1.2 billion in lost wages in Oregon. (Timber industry economists warn the total owl-related job losses in Oregon and Washington could be higher than 100,000, not counting the 44,500 jobs likely to disappear over the next decade anyway due to modernization of equipment and planned reductions in cutting.) Counties in Oregon stand to lose nearly $500 million in timber revenues; especially hard hit could be those 158 communities state officials list as ``timber dependent.''
Out in the shack where Young & Morgan drivers are filling out their paperwork, Harold Millard typifies the older generation of timber workers. He started out logging with horses, lives in a community of about 1,700, and predicts ``they'll flat break most of the mills'' if major timber withdrawals come to pass.
``People that owe for their trucks - they'll lose 'em, the stores will close, you'll see ghost towns all up and down here,'' he says.
Fellow driver Ken Woodworth, a generation younger with two kids in grade school, says his philosophy these days is ``prepare for the worst, hope for the best - pay off all my bills and put as much away in savings as I can.'' He wouldn't mind retraining for other employment ``as long as they do it right and not just send us off to flip hamburgers.'' Like virtually every other logger and millworker one meets, he stresses that ``we're not asking for unemployment, we're not asking for a handout.''
``I just hope it doesn't come to the point where I have to look elsewhere,'' says Ron Harksen, who started out in the woods as a ``choker setter,'' the dangerous job of setting cables around logs. ``The guys here work real hard, and that's all they want is the opportunity to do that,'' says Mr. Harksen, who supervises 23 men operating a planer. ``I respect nature. I don't want to see any species extinct, but I don't want to see my job or me extinct either.''
Over in the state capital in Salem, University of Washington sociologist Robert Lee is explaining to a special legislative committee that ``the traditional American values of independence, hard work, risk-taking, and inventiveness'' characterize timber workers, and these traits make it especially difficult for them to adjust.
They are not as mobile as urban workers or those in the military who also need to shift with the national economy, says Dr. Lee, who spent five years studying timber communities in the Northwest after the regional recession of the early 1980s. Timber workers have not been honored in the media or by well-known entertainers, as have farmers in financial trouble. Instead, they have been vilified along with the ``timber barons'' who historically have cut trees on private land faster than the trees grow back.
Dr. Lee calls this negative stereotyping a textbook case of ``blaming the victim,'' the dehumanizing aspect of what seems to be an inevitable conflict between the traditional culture represented by loggers and millworkers and ``an information-based, technological society in which people increasingly don't understand where we get our goods - how we get our meat and potatoes and wood.''
He warns of family problems, substance abuse, even suicide. ``Some people will adjust, especially younger people, but a lot won't,'' Lee tells the sober lawmakers. ``People aren't marbles who simply roll across the table and fall into the proper slots.''
``The people who are my age, [who] have college educations, will survive,'' says Dan Newton, a young forester who manages 75,000 acres of private timber for the Lone Rock Timber Company in Roseburg, 134 miles south of the state capital. ``But it is the people - and there are a large number of them - who've devoted their entire lives to the trade; those people are going to have a real rough go of it.'' Mr. Newton says his company will lay off one shift of 60 to 70 men this summer.
Roseburg is the county seat for Douglas County, which grows more trees than any other county in the United States and depends on timber for two-thirds of its jobs and two-thirds of its county government's revenue. Some here who depend on timber workers to support their businesses are pulling up stakes.
One of these is Bob Chappelle, who recently sold his interest in an automobile dealership and is moving to San Diego.
``If you can't make a living, you've got to move on,'' says Mr. Chappelle, whose two sons are approaching college age. ``You've got to go where you can support your family.'' In Mr. Chappelle, Roseburg is losing a community leader who is active in volunteer charitable work.
An hour and a half to the East, up in the Umpqua National Forest, Steve Briggs and his crew of eight are hauling out the last logs from a recent cut. Mr. Briggs is a ``gyppo'' logger out of Myrtle Creek, one of many independents who operate on contract to bigger companies throughout the Northwest.
Because of the threat of fire, the crew has to quit work at 1 p.m. when the dry, dusty heat of the day reaches its maximum. The men got up at 2:30 a.m. to be in the woods by 5, and there's been no break for lunch. Mr. Briggs, burly and bearded, is enjoying his first sustenance since daybreak: a quart of Gatorade.
His 16-year old son, helping secure cables around the logs, may or may not be the fourth generation of Briggses to spend his working life in the woods. ``I won't encourage him or discourage him,'' explains the boy's father. ``I do want him to know what it's about.'' Regarding the inevitable changes in the timber business, Briggs is sure of one thing: ``There's going to be a third less of us when this is all over.''
Gary Bixby, one of Briggs's crewmen, typifies the timber worker who would rather spend all his time in these spectacularly beautiful forests than do anything else. An example of the kind of man sociologist Robert Lee talks about, he hauls his 35-foot travel trailer from job site to job site explaining ``I always stay in the woods.'' His friends joke that ``he's a hermit.''
Before going to work for logging companies, Mr. Bixby was a Forest Service firefighter for seven seasons. In the evenings now, he lurks around old-growth forests with a government biologist friend as an unofficial ``owl hooter.'' Only one night has gone by this summer, he says, when they haven't found at least one northern spotted owl by mimicking its call. On the previous night they encountered seven. ``I like the owl,'' he says. ``He's a cute little critter.''
``We'll have to change logging practices somewhat, but we can log without hurting the owl,'' he says. ``We want to live out here. We know better than to waste it. Give us a chance. We can figure out something to make it work.'' | <urn:uuid:e5fba434-6435-4d56-b959-370a28347d45> | {
"date": "2017-07-27T18:12:34",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428325.70/warc/CC-MAIN-20170727162531-20170727182531-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9636945724487305,
"score": 2.765625,
"token_count": 1921,
"url": "https://www.csmonitor.com/1990/0809/ztree.html"
} |
Every family was following some morals and ethics in daily life previously. ‘Morality‘ simply means the principle which tells us the distinction between right or wrong and good or bad. The elders in a family used to tell the youngsters that the head of the family will punish if the morals and ethics are not followed. So, the youngsters were following them, without questioning.
Nowadays, we see the violation of morals and ethics everywhere. In India, the youngsters simply fly in their two-wheelers, overtaking all the vehicles and violating all traffic rules. Giving respect to elders is considered as “old-fashion”. In majority of movies, the heros are smoking, drinking & doing rowdyism and that has been liked by the heroines. The younsters also like such movies and follow the actions of heros and heroines. If a guest comes to a house, only elders show hospitality. The youngsters in the family never bother to know who the guest is. They pretend to be busy. In schools and colleges, the students mock teachers, other students and the Principal. The elders in the family also have changed a lot. When somebody is absent, the other members in the family immediately start to gossip about that person. What morality the younsters will take from them!
Another serious drawback is all the people, irrespective of age, are getting addicted to the social media. They believe whatever the media says. They are not checking whether the information given through social media is right or wrong. Another big thing is everybody wants to lead a selfish life without bothering about anything and anybody.
Ethics on the other part are set of common realized values of the entire society. These are the codified or normative version of do’s and dont’s. It is always taken that the person with the ethical values will always have high moral values. If morals are followed in all families, ethics in the society can also be easily followed.
We have to think about this and try to follow morals in the family so that ethics in the society will also be restored properly.
Whether you believe it or not, I was talking from January 2019 itself, regarding visiting Kancheepuram to have the darshan of Lord Athivaradhar. I had read about Him long back, in newspaper and magazines. I didn’t expect that people will flood to Kancheepuram from the nook and corner of the world to see Him.
Very casually, we booked tickets by bus to Kancheepuram from Coimbatore. Fortunately, we got a room in a hotel after trying some 10 hotels for 24th July 2019. We are reading and seeing the news about Athivaradhar darshan almost daily. We sat readily 4 days before the darshan date for booking the darshan ticket through online. But, after trying for more than 45 minutes, we couldn’t do. But, after few minutes, we saw in the website that the booking for 24th was closed. How could it happen, we don’t know. Later, we have read in a newspaper that the website is not working properly. Then, how the booking is done daily, that also we don’t know.
We made up our mind to stand in general queue and definitely will have the darshan of Athivaradhar. After reaching the hotel on 24th morning, we quickly got ready and caught a bus to reach the temple. All the vehicles were stopped 2 KM before the temple and we have to cross the distance by walk only. We never minded walking. So, we happily started to walk and joined the queue. When we reached the East Gopuram, the policeman asked us whether we wished to join in Senior Citizen queue and we agreed. He collected some 50 people and allowed inside. I think the crowd is comparatively less in Senior Citizen queue than in general queue. Nobody in the queue pushed or try to overtake us. Everybody walked like a procession until we reached Vasantha Mandapam.
In the same manner the queue proceeded and we got the historical moment in our life of having the darshan of Lord Athivaradhar. I cann’t describe it in words. There is a saying in tamil, “Kaana kann kodi vaendum”. Yes, we could stand for one full minute and had His darshan from foot to head. Oh, that minute was wonderful in my life and we walked out happily with full contentment. Hardly it took one hour and 45 minutes after getting down from the bus, for walking and having His darshan. | <urn:uuid:b0e3c2c4-6e3a-4fa1-b259-0399d58d1cf3> | {
"date": "2020-01-22T13:32:49",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607118.51/warc/CC-MAIN-20200122131612-20200122160612-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9719208478927612,
"score": 2.53125,
"token_count": 959,
"url": "https://sweetnothingsinlife.wordpress.com/2019/08/"
} |
The Personal Development Center offers articles, books, and translations resulting from over 35 years of non-profit teaching, researching, and publishing. PDC publications showcase two fundamental qualities of humankind: the greatness of humans to evolve and their drive to bring forth advanced civilizations. Ironically, the knowledge and cultivation of this greatness has become increasingly obscured by the political power and control of institutions.
The Personal Development Center, in contrast, describes a union between ancient science and modern science which proves the existence of inner creative powers within individuals and the existence of a universal, unifying Mind. This union of ancient and modern science has been obtained in large part by means of the Center’s ability to translate, understand and verify ancient scientific documents which previously had been redacted and published primarily to denigrate the ancient methods. Over the years, hundreds of PDC volunteers have tested the methods outlined in the ancient writings and offered testimony as to their claims of increased awareness, inner vitality and union.
Currently the Personal Development Center is summarizing modern research on the individuality and innate inner powers of infants and young children. This information, combined with the ancient methods of self-development, further substantiates the ability of increasing these inner powers in adulthood.
Abraham Maslow, the founder of Humanistic Psychology, made an unusual statement in 1968 about the “growing tip ” of nearly perfected creative people in comparing them to children.
“As the child looks out upon the world with wide, uncritical, innocent eyes, simply noting or observing what is the case, without either arguing the matter or demanding that it be otherwise, so does the self-actualizing person look upon nature in himself and in others.” 1
Alison Gopnik, a psychologist and philosopher, recently wrote an article in the prestigious journal Science which proves that,
“very young children’s learning and thinking are strikingly similar to much learning and thinking in science.” 2
Gopnik’s earlier book concluded with her notice of children missing in the discussion of philosophers and that even though people feel that,
“…children help give their lives meaning… children have been almost invisible to the deepest thinkers in human history.” 3
The Personal Development Center’s upcoming book answers the obvious unspoken questions raised by Maslow and Gopnik with the presentation of a 3,000 year old Sanskrit text found hidden in an obscure medieval treatise. This Sanskrit document explains a science built upon the perfection of the inner creative power of children and used to create the remarkable Indus Valley Civilization, a millennia ahead of the rest of the world in its technology and its egalitarian social structure.
1. Mary Harrington Hall, A Conversation with Abraham H. Maslow, Psychology Today, (July 1968)
2. Alison Gopnik, Scientific Thinking in Young Children…, Science Vol. 337 (2012)
3. Alison Gopnik, The Philosophical Baby: What Children’s Minds Tell Us About Truth, Love, and The Meaning Of Life (New York: Farrar, Straus and Giroux, 2009) p. 236 | <urn:uuid:7c9e0ae8-4850-4bf6-be1d-0371f6eaac4d> | {
"date": "2016-10-22T11:42:05",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00417-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.923490047454834,
"score": 2.515625,
"token_count": 636,
"url": "http://personaldevcenter.com/"
} |
To determine the incidence of autism among children in Olmsted County, Minnesota.
Through the Rochester Epidemiology Project, all inpatient and outpatient diagnoses are indexed for computerized retrieval. This computerized diagnostic index was used to identify children with any developmental disorder. A glossary of symptoms of autism was used to review medical and school records of these children for symptoms consistent with Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV) criteria for autistic disorder.
Olmsted County, Minnesota.
All residents of Olmsted County 21 years or younger between 1976 and 1997.
Main Outcome Measure
The incidence of research-identified autism based on DSM-IV criteria for autistic disorder.
The age-adjusted incidence of research-identified autism was 5.5 (95% confidence interval, 1.4-9.5) per 100 000 chidren from 1980 to 1983 and 44.9 (95% confidence interval, 32.9-56.9) from 1995 to 1997 (8.2-fold increase). This increase was confined to children younger than 10 years who were born after 1987.
The incidence of research-identified autism increased in Olmsted County from 1976 to 1997, with the increase occurring among young children after the introduction of broader, more precise diagnostic criteria, increased availability of services, and increased awareness of autism. Although it is possible that unidentified environmental factors have contributed to an increase in autism, the timing of the increase suggests that it may be due to improved awareness, changes in diagnostic criteria, and availability of services, leading to identification of previously unrecognized young children with autism. | <urn:uuid:26399f2c-306e-41a4-8eda-e02ac063325a> | {
"date": "2016-08-28T05:14:43",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982932823.46/warc/CC-MAIN-20160823200852-00070-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9294607639312744,
"score": 2.6875,
"token_count": 330,
"url": "http://archpedi.jamanetwork.com/article.aspx?doi=10.1001/downloadCitation.aspx&format=bibtex&articleid=485907"
} |
CCRYPT(1) Encryption CCRYPT(1)NAME
ccrypt - encrypt and decrypt files and streams
ccrypt [mode] [options] [file...]
ccencrypt [options] [file...]
ccdecrypt [options] [file...]
ccat [options] file...
ccrypt is a utility for encrypting and decrypting files and streams. It
was designed to replace the standard unix crypt utility, which is noto‐
rious for using a very weak encryption algorithm. ccrypt is based on
the Rijndael block cipher, which was also chosen by the U.S. government
as the Advanced Encryption Standard (AES, see http://www.nist.gov/aes).
This cipher is believed to provide very strong cryptographic security.
Unlike unix crypt, the algorithm provided by ccrypt is not symmetric,
i.e., one must specify whether to encrypt or decrypt. The most common
way to invoke ccrypt is via the commands ccencrypt and ccdecrypt.
Encryption and decryption depends on a keyword (or key phrase) supplied
by the user. By default, the user is prompted to enter a keyword from
the terminal. Keywords can consist of any number of characters, and all
characters are significant (although ccrypt internally hashes the key
to 256 bits). Longer keywords provide better security than short ones,
since they are less likely to be discovered by exhaustive search.
ccrypt can operate in five different modes. If more than one mode is
specified, the last one specified takes precedence. The aliases ccen‐
crypt, ccdecrypt, and ccat are provided as a convenience; they are
equivalent to ccrypt -e, ccrypt -d, and ccrypt -c, respectively.
-e, --encrypt Encrypt. This is the default mode. If filename arguments
are given, encrypt the files and append the suffix .cpt
to their names. Otherwise, run as a filter.
-d, --decrypt Decrypt. If filename arguments are given, decrypt the
files and strip the suffix .cpt from the filenames, if
present. Otherwise, run as a filter.
-c, --cat Decrypt one or more files to standard output. If no
filename arguments are given, decrypt as a filter.
Change the key of encrypted data. In this mode, ccrypt
prompts for two passwords: the old one and the new one.
If filename arguments are given, modify the files. Oth‐
erwise, run as a filter.
Simulate the old unix crypt command. Note: the cipher
used by unix crypt has been broken and is not secure.
Please use this option only to decrypt existing files.
If filename arguments are given, decrypt the files to
stdout. Otherwise, run as a filter. Note that for the
unix crypt format, there is no easy way to detect
whether a given key matches or not; thus, for safety,
this mode does not overwrite files.
The following options are supported in addition to the modes described
-b, --brave When reading an encryption key from the terminal, ask
the user only once for the key. By default, ccrypt will
ask the user to enter such keys twice, as a safeguard
against accidentally destroying data due to a mistyped
key. Using the --brave option disables this safety
check. Never use it, unless you know what you are doing.
See also --timid.
-E var, --envvar var
Read the keyword from the environment variable var.
Note that this might be unsafe on certain systems,
namely where users can use the ps command to see the
environment of a process owner by another user. On most
modern systems, however, such behavior of ps is disabled
and the -E option should be safe there. Also, as an
added security measure, ccrypt erases the keyword from
its environment immediately after reading it.
-f, --force Overwrite existing files or operate on write-protected
files without asking any questions. Also, override
ccrypt's reluctance to write or read encrypted data to
or from a terminal.
-F var, --envvar2 var
Same as -E, except for second keyword (in keychange
-h, --help Help. Print usage information and exit.
-H key, --key2 key
Same as -K, except for second keyword (in keychange
-k file, --keyfile file
Read the keyword as the first line from the named file.
In keychange mode, two keywords are read as the first
two lines of the file. The filename "-" may be given for
reading keywords from standard input. Using the -k-
option and sending the keyword on stdin is probably the
safest way to pass a keyword to ccrypt from another pro‐
gram or script.
-K key, --key key
Specify the keyword on the command line. This is unsafe,
because any other user can see the command line by run‐
ning the ps command. Only use this option for testing
purposes, and never with a real keyword.
-y file, --keyref file
In encryption or keychange mode, check the encryption
key against the named file, which must have been previ‐
ously encrypted with the same key. Exit with an error
message if the key does not match. This option is useful
as an alternative to --timid, to guard against mistyped
keys in situations where several files are encrypted
with the same key. This option implies --brave, unless
the --timid option is explicitly given after the
-l, --symlinks Force encryption/decryption of symbolic links. By
default, symbolic links are ignored except in cat or
unixcrypt mode. Note that with the -l option, encryp‐
tion/decryption of a symbolic link causes the suffix
.cpt to be added/removed from the name of the link, not
the name of the file pointed to.
-L, --license Print license info and exit.
-m, --mismatch Normally, ccrypt refuses to decrypt data with a key that
does not seem to match. The -m option overrides this
restriction. This can sometimes be useful in recovering
data from a corrupted file (see RECOVERING DATA FROM
CORRUPTED FILES). To avoid irretrievable loss of data
when decrypting with a wrong key, this option cannot be
used with modes that overwrite the input file.
-P prompt, --prompt prompt
Use prompt instead of the default prompt "Enter encryp‐
tion/decryption key: ". This may be useful in some
-q, --quiet Suppress most warnings.
-Q prompt, --prompt2 prompt
Same as -P, except for second keyword (in keychange
Traverse subdirectories recursively.
Traverse subdirectories recursively, and also follow
symbolic links to subdirectories.
Refuse to encrypt files that already have the .cpt suf‐
fix (or that selected with -S). This can be useful when
adding some files to a directory of already encrypted
files. This option has no effect in decryption or key‐
-S .suf, --suffix .suf
Use the suffix .suf instead of the default suffix .cpt.
-t, --timid When reading an encryption key from the terminal, ask
the user to enter the key twice. If the two entered keys
are not identical, abort. This is a safeguard against
accidentally destroying data by encrypting it with a
mistyped key. Note: this behavior is now the default,
and can be overridden with the --brave option.
-T, --tmpfiles This option causes ccrypt to use temporary files during
encryption/decryption, rather than overwriting the file
contents destructively. This method leaves the original
file contents lying around in unused sectors of the file
system, and thus is less secure than the default behav‐
ior. However, in situations where this loss of security
is not important, the --tmpfiles option can provide a
measure of protection against data being corrupted due
to a system crash in the middle of overwriting a file.
-v, --verbose Print progress information to stderr.
-V, --version Print version info and exit.
-- End of options. Any remaining arguments are interpreted
as filenames. This also turns off filter mode, even if
zero filenames follow. This might be useful in the con‐
text of shell pattern expansion; ccrypt -- * will behave
correctly even if no files match the pattern *.
NOTES ON USAGE
The user interface of ccrypt intentionally resembles that of GNU gzip,
although it is not identical. When invoked with filename arguments,
ccrypt normally modifies the files in place, overwriting their old con‐
tent. Unlike gzip, the output is not first written to a temporary file;
instead, the data is literally overwritten. For encryption, this is
usually the desired behavior, since one does not want copies of the
unencrypted data to remain in hidden places in the file system. The
disadvantage is that if ccrypt is interrupted in the middle of writing
to a file, the file will end up in a corrupted, partially encrypted
state. However, in such cases it is possible to recover most of the
data; see RECOVERING DATA FROM CORRUPTED FILES below. If you want to
force ccrypt to use temporary files, use the --tmpfiles option.
When ccrypt receives an interrupt signal (Ctrl-C) while updating a file
in place, it does not exit immediately, but rather delays the exit
until after it finishes writing to the current file. This is to prevent
files from being partially overwritten and thus corrupted. If you want
to force ccrypt to exit immediately, just press Ctrl-C twice quickly.
The encryption algorithm used by ccrypt uses a random seed that is dif‐
ferent each time. As a result, encrypting the same file twice will
never yield the same result. The advantage of this method is that simi‐
larities in plaintext do not lead to similarities in ciphertext; there
is no way of telling whether the content of two encrypted files is sim‐
ilar or not.
Because of the use of a random seed, decrypting and re-encrypting a
file with the same key will not lead to an identical file. It is pri‐
marily for this reason that ccrypt refuses to decrypt files with a non-
matching key; if this were allowed, there would be no way afterwards to
restore the original file, and the data would be irretrievably lost.
When overwriting files, special care is taken with hard links and sym‐
bolic links. Each physical file (i.e., each inode) is processed at most
once, no matter how many paths to it are encountered on the command
line or in subdirectories traversed recursively. For each file that has
multiple hard links, a warning is printed, to alert the user that not
all paths to the file might have been properly renamed. Symbolic links
are ignored except in cat mode, or unless the -l or -R option is given.
Unlike gzip, ccrypt does not complain about files that have improper
suffixes. It is legal to doubly encrypt a file. It is also legal to
decrypt a file that does not have the .cpt suffix, provided the file
contains valid data for the given decryption key. Use the --strictsuf‐
fix option if you want to prevent ccrypt from encrypting files that
already have a .cpt suffix.
Regarding encryption and compression: encrypted data is statistically
indistinguishable from random data, and thus it cannot be compressed.
But of course it is possible to compress the data first, then encrypt
it. Suggested file suffixes are .gz.cpt or .gzc.
RECOVERING DATA FROM CORRUPTED FILES
Encrypted data might be corrupted for a number of reasons. For
instance, a file might have been partially encrypted or decrypted if
ccrypt was interrupted while processing the file. Or data might be cor‐
rupted by a software or hardware error, or during transmission over a
network. The encryption algorithm used by ccrypt is designed to allow
recovery from errors. In general, only a few bytes of data will be lost
near where the error occurred.
Data encrypted by ccrypt can be thought of as a sequence of 32-byte
blocks. To decrypt a particular block, ccrypt only needs to know the
decryption key, the data of the block itself, and the data of the block
immediately preceding it. ccrypt cannot tell whether a block is cor‐
rupted or not, except the very first block, which is special. Thus, if
the encrypted data has been altered in the middle or near the end of a
file, ccrypt can be run to decrypt it as usual, and most of the data
will be decrypted correctly, except near where the corruption occurred.
The very first block of encrypted data is special, because it does not
actually correspond to any plaintext data; this block holds the random
seed generated at encryption time. ccrypt also uses the very first
block to decide whether the given keyword matches the data or not. If
the first block has been corrupted, ccrypt will likely decide that the
keyword does not match; in such cases, the -m option can be used to
force ccrypt to decrypt the data anyway.
If a file contains some encrypted and some unencrypted data, or data
encrypted with two different keys, one should decrypt the entire file
with each applicable key, and then piece together the meaningful parts
Finally, decryption will only produce meaningful results if the data is
aligned correctly along block boundaries. If the block boundary infor‐
mation has been lost, one has to try all 32 possibilities.
DESCRIPTION OF THE CIPHER
Block ciphers operate on data segments of a fixed length. For
instance, the Rijndael block cipher used in ccrypt has a block length
of 32 bytes or 256 bits. Thus, this cipher encrypts 32 bytes at a time.
Stream ciphers operate on data streams of any length. There are several
standard modes for operating a block cipher as a stream cipher. One
such standard is Cipher Feedback (CFB), defined in FIPS 81 and ANSI
X3.106-1983. ccrypt implements a stream cipher by operating the Rijn‐
dael block cipher in CFB mode.
Let P[i] and C[i] be the ith block of the plaintext and ciphertext,
respectively. CFB mode specifies that
C[i] = P[i] ^ E(k,C[i-1])
Here ^ denotes the bitwise exclusive or function, and E(k,x) denotes
the encryption of the block x under the key k using the block cipher.
Thus, each block of the ciphertext is calculated from the corresponding
block of plaintext and the previous block of ciphertext. Note that in
fact, each byte of P[i] can be calculated from the corresponding byte
of C[i], so that the stream cipher can be applied to one byte at a
time. In particular, the stream length need not be a multiple of the
Assuming that blocks are numbered starting from 0, a special "initial"
ciphertext block C[-1] is needed to provide the base case for the above
formula. This value C[-1] is called the initialization vector or seed.
The seed is chosen at encryption time and written as the first block of
the encrypted stream. It is important never to use the same seed more
than once; otherwise, the two resulting ciphertext blocks C could be
related by a simple xor to obtain information about the corresponding
plaintext blocks P. If the same seed is never reused, CFB is prov‐
ably as secure as the underlying block cipher.
In ccrypt, the seed is constructed as follows: first, a combination of
the host name, current time, process id, and an internal counter are
hashed into a 28-byte value, using a cryptographic hash function. A
fixed four-byte "magic number" is combined with this value, and the
resulting 32-byte value is encrypted by one round of the Rijndael block
cipher with the given key. The result is used as the seed and appended
to the beginning of the ciphertext. The use of the magic number allows
ccrypt to detect non-matching keys before decryption.
ccrypt is believed to provide very strong cryptographic security,
equivalent to that of the Rijndael cipher with 256-bit block size and
256-bit key size. Another version of the Rijndael cipher (with a
smaller block size) is used in the U.S. government's Advanced Encryp‐
tion Standard (AES, see http://www.nist.gov/aes). Therefore, this
cipher is very well studied and subject to intensive public scrutiny.
This scrutiny has a positive effect on the cipher's security. In par‐
ticular, if an exploitable weakness in this cipher were ever discov‐
ered, this would become widely publicized.
In practical terms, the security of ccrypt means that, without knowl‐
edge of the encryption key, it is effectively impossible to obtain any
information about the plaintext from a given ciphertext. This is true
even if a large number of plaintext-ciphertext pairs are already known
for the same key. Moreover, because ccrypt uses a key size of 256 bits,
an exhaustive search of the key space is not feasible, at least as long
as sufficiently long keys are actually used in practice. No cipher is
secure if users choose insecure keywords.
On the other hand, ccrypt does not attempt to provide data integrity,
i.e., it will not attempt to detect whether the ciphertext was modified
after encryption. In particular, encrypted data can be truncated, leav‐
ing the corresponding decrypted data also truncated, but otherwise con‐
sistent. If one needs to ensure data integrity as well as secrecy, this
can be achieved by other methods. The recommended method is to prepend
a cryptographic hash (for instance, an SHA-1 hash) to the data before
ccrypt does not claim to provide any particular safeguards against
information leaking via the local operating system. While reasonable
precautions are taken, there is no guarantee that keywords and plain‐
texts have been physically erased after encryption in completed; parts
of such data might still exist in memory or on disk. ccrypt does not
currently use privileged memory pages.
When encrypting files, ccrypt by default accesses them in read-write
mode. This normally causes the original file to be physically overwrit‐
ten, but on some file systems, this might not be the case.
Note that the use of the -K option is unsafe in a multiuser environ‐
ment, because the command line of a process is visible to other users
running the ps command. The use of the -E option is potentially unsafe
for the same reason, although recent versions of ps don't tend to dis‐
play environment information to other users. The use of the -T option
is unsafe for encryption because the original plaintext will remain in
unused sectors of the file system.
There is an emacs package for reading and writing encrypted files.
(Note that this package currently only works with emacs, not with
xemacs.) This package hooks into the low-level file I/O functions of
emacs, prompting the user for a password where appropriate. It is
implemented in much the same way as support for compressed files; in
fact, the package, whose name is jka-compr-ccrypt, is based directly on
the jka-compr package, which is part of GNU Emacs. It handles both
encrypted and compressed files (although currently not encrypted com‐
To use the package, simply load jka-compr-ccrypt, then edit as usual.
When you open a file with the ".cpt" extension, emacs will prompt you
for a password for the file. It will remember the password for the buf‐
fer, and when you save the file later, it will be automatically
encrypted again (provided you save it with a ".cpt" extension). Except
for the password prompt, the operation of the package should be trans‐
parent to the user. The package also handles compressed ".gz", ".bz2",
and ".Z" files, and it should be used instead of, not in addition to,
jka-compr. The command M-x ccrypt-set-buffer-password can be used to
change the current password of a buffer.
The simplest way to use this package is to include the lines
(setq load-path (cons "path" load-path))
(require 'jka-compr-ccrypt "jka-compr-ccrypt.el")
in your .emacs file, where path is the directory that holds the file
jka-compr-ccrypt.el. You may also need to disable loading of the old
jka-compr package, since the two packages are not compatible with each
other (and in any case, jka-compr-ccrypt contains all the functionality
Limitations of the emacs package: there is no guarantee that unen‐
crypted information cannot leak to the file system; in fact, the pack‐
age sometimes writes unencrypted data to temporary files. However,
auto-saved files are normally treated correctly (i.e., encrypted). For
details, see the comments in the file jka-compr-ccrypt.el.
The exit status is 0 on successful completion, and non-zero otherwise.
An exit status of 1 means illegal command line, 2 is out of memory, 3
is a fatal i/o error, 4 is a non-matching key or wrong file format, 6
is interrupt, 7 is mistyped key in --timid mode, 8 is a non-fatal i/o
error, and 9 means that no key was obtained because the user failed to
enter it, or because the specified keyfile or environment variable
could not be read. An exit status of 10 means that the file specified
by the --keyref option could not be read, or did not match the
requested encryption key.
Fatal i/o errors are those that occur while processing a file that is
already open. Such errors cause ccrypt to abort its operation immedi‐
ately with an exit status of 3. Non-fatal i/o errors are those that
occur while handling files that are not already open; typically, such
errors are caused by files that are missing, not readable, or can't be
created. When encountering a non-fatal i/o error, ccrypt simply con‐
tinues to process the next available input file. The exit status of 8
is delayed until after all the files have been processed.
Non-matching keys and wrong file formats are also considered non-fatal
errors, and cause ccrypt to continue with processing the next available
input file. In this case, an exit status of 4 is given after all the
files have been processed. If there is a conflict between exit status 4
and 8, then 8 is returned.
The former exit status 5 ("wrong file format") has been eliminated, and
is now covered under exit status 4 ("non-matching key or wrong file
format"). Note that ccrypt does not really have a "file format" in the
proper sense of the word; any file of length at least 32 bytes is
potentially a valid encrypted file.
While ccrypt can handle keywords of arbitrary length, some operating
systems limit the length of an input line to 1024 characters.
The renaming of files (adding or removing the .cpt suffix) can go wrong
if a filename is repeated on the command line. In this case, the file
is only encrypted/decrypted once, but the suffix may be added or
removed several times. This is because ccrypt thinks it encountered
different hardlinks for the same file.
The --strictsuffix option can behave in unexpected ways if one file has
several hardlinks, some of which have the suffix and some of which
don't. In this case, the inode will be encrypted/decrypted, but the
suffix will be changed only for those filenames that allow it. Simi‐
larly, if a file cannot be renamed because a file of the given name
already exists, the file may still be encrypted/decrypted if it has
Peter Selinger <selinger at users.sourceforge.net>
Copyright (C) 2000-2009 Peter Selinger
This program is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the
Free Software Foundation; either version 2 of the License, or (at your
option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of MER‐
CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
Public License for more details.
You should have received a copy of the GNU General Public License along
with this program; if not, write to the Free Software Foundation, Inc.,
59 Temple Place, Suite 330, Boston, MA 02111-1307, USA. See also
Version 1.9 August 2009 CCRYPT(1) | <urn:uuid:8ec62770-993b-4134-972a-bab98a929d86> | {
"date": "2018-07-21T06:10:54",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592387.80/warc/CC-MAIN-20180721051500-20180721071500-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8749514818191528,
"score": 2.71875,
"token_count": 5635,
"url": "http://www.polarhome.com/service/man/?qf=ccat&tf=2&of=AIX&sf=1"
} |
BOSTON — Astounding. Remarkable. Revolutionary.
Those are some of the ways scientists are describing the news that researchers at Boston’s Brigham and Women’s Hospital and in Japan have found a relatively simple way to create embryonic stem cells without using embryos.
Their method is detailed in a study published Wednesday in the journal Nature, and when WBUR’s All Things Considered host Sacha Pfeiffer spoke with the study’s lead author, the Brigham’s Dr. Charles Vacanti, he described his reaction to his team’s surprising discovery.
Dr. Charles Vacanti: I was delighted and relieved. We actually have been working on this concept for almost a decade, and in our minds we were sure that we were correct. We’ve been trying to prove it scientifically, so I would say that I was more relieved than anything else.
Sacha Pfeiffer: What you’ve done, as I understand it, is that rather than genetically manipulating a cell, you basically stressed it. You put it under some kind of environmental stress. Could you explain what you did and what the result was?
The premise was that when you injure yourself — if you have a normal injury, you’re walking down the street, you bump your leg, you have a burn injury, a chemical injury — the premise was that perhaps, rather than stem cells existing in the tissue doing the repair, perhaps the mature cells are now in an environment, a very stressful environment, that causes them to revert back to stem cells that then do the repair.
And they could regenerate and become a new type of tissue, like if you had lost some portion of your tissue?
Yes, so the cells in the tissue — maybe a muscle cell, a nerve cell — actually revert back to a very immature cell, like a baby cell, that now can turn into anything.
So you did something in your lab involving adult blood cells that you were able to get to turn into or revert into embryonic cells?
This is correct. So what we thought we would do is see if we could take known mature cells — so we took blood cells, in this case lymphocytes — and expose them to the same type of environment that injured tissue would see, and see if that caused them to revert back to stem cells, or embryonic stem cells, which could then turn into any type of cell.
You put them in an acid bath? That was the environmental stress?
That was one was one of them. We actually put them in several different environmental stresses.
And it got the intended result of turning those adult blood cells into the equivalent of embryonic cells?
As stage one, yes, the adult stem cells became immature. But they were not perfect embryonic stem cells. And then when we added another nutrient to the media, that pushed them all the way back to embryonic stem cells.
The advantage of a true embryonic stem cell, if we can call it that, is that it can develop into any other kind of cell in the body. So what do you think is the potential, then, of these induced embryonic stem cells that you’ve created?
The main advantage of doing your own embryonic stem cells is that they are you. So you are using cells to start with now that cannot be rejected. They will not be rejected. They are your cells. And then the other side advantage is, or the big advantage is, you do not need to create an embryo. So in order to study embryonic stem cells, one has believed you needed to create an embryo, and then you need to destroy this embryo. That’s very controversial.
Of course, the religious and ethical…
Many concerns. So if you can take mature cells and make them become embryonic stem cells without becoming an embryo, you’ve skipped all that controversy.
Is this also a cheaper and faster method?
This can be reproduced, I think, very easily in a good college biology laboratory. So it’s very easy to do. You can produce these cells consistently, in a very short period of time, in very high numbers.
So huge potential. Now, this has only happened so far in mice and maybe another type of animal? Has it happened yet in humans? Are you working on it in humans?
We have thus far only reported it in mice. We’ve done some preliminary work in several species, including humans, and the cells appear to develop exactly in the same fashion as they did in our mice studies.
What you’ve done has been described by some scientists as what sounds quite simple — so simple that some people seem surprised it didn’t happen before. Now, I’m sure that understates to some degree how complex this is. But does it surprise you that something that seems relatively simple created this seemingly amazing result?
This is the most surprising part. Our greatest concern over the years was this is so simple, why is nobody seeing this? It’s too simple. And perhaps that’s why we figured it out, is, I do not have PhD.
You’re an anesthesiologist by training?
I’m an anesthesiologist by training. And I suppose if I had had the rigorous background as some of these fabulous scientists, I would have never considered it. I would have thought, “This is a foolish idea.” But fortunately, I was foolish enough to not know it was foolish! And that’s probably the only reason we explored it. | <urn:uuid:c41f2fd0-73b0-4841-b4e3-55b4b9abe207> | {
"date": "2014-03-07T09:01:20",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999639602/warc/CC-MAIN-20140305060719-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9770114421844482,
"score": 3.015625,
"token_count": 1146,
"url": "http://www.wbur.org/2014/01/29/embryonic-stem-cells-discovery"
} |
Early infancy androgen effects are the least understood. In the first weeks of life for male infants, testosterone levels rise. The levels remain in a pubertal range for a few months, but usually reach the barely detectable levels of childhood by 4–7 months of age. The function of this rise in humans is unknown. It has been theorized that brain masculinization is occurring since no significant changes have been identified in other parts of the body. The male brain is masculinized by the aromatization of testosterone into estrogen, which crosses the blood–brain barrier and enters the male brain, whereas female fetuses have α-fetoprotein, which binds the estrogen so that female brains are not affected.
Exercise is the original testosterone booster, and it’s one of the most powerful full-body hacks around. Men see a sharp increase in both testosterone and human growth hormone (HGH) after lifting weights, and the boost is greater with shorter rest time between sets (1 minute rest outperforms 3 minutes rest) . With the shorter rest time, women also get a large boost in HGH.
Between 10 and 88% of patients diagnosed with cancer experience sexual problems following diagnosis and treatment. The prevalence varies according to the location and type of cancer, and the treatment modalities used. Sexuality may be affected by chemotherapy, alterations in body image due to weight change, hair loss or surgical disfigurement, hormonal changes, and cancer treatments that directly affect the pelvic region.
Attention, memory, and spatial ability are key cognitive functions affected by testosterone in humans. Preliminary evidence suggests that low testosterone levels may be a risk factor for cognitive decline and possibly for dementia of the Alzheimer's type, a key argument in life extension medicine for the use of testosterone in anti-aging therapies. Much of the literature, however, suggests a curvilinear or even quadratic relationship between spatial performance and circulating testosterone, where both hypo- and hypersecretion (deficient- and excessive-secretion) of circulating androgens have negative effects on cognition.
Radical prostatectomy for the treatment of prostate cancer poses a significant risk of ED. A number of factors are associated with the chance of preserving erectile function. If both nerves that course on the lateral edges of the prostate can be saved, the chance of maintaining erectile function is reasonable. The odds depend on the age of the patient. Men younger than 60 years have a 75-80% chance of preserving potency, but men older than 70 years have only a 10-15% chance.
Several pathways have been described to explain how information travels from the hypothalamus to the sacral autonomic centers. One pathway travels from the dorsomedial hypothalamus through the dorsal and central gray matter, descends to the locus ceruleus, and projects ventrally in the mesencephalic reticular formation. Input from the brain is conveyed through the dorsal spinal columns to the thoracolumbar and sacral autonomic nuclei.
Having learned a great deal more about erectile dysfunction including its risk factors and causes, you should be equipped to assess your own erectile function. If you have experienced erectile issues or you have some of the risk factors mentioned above, it may be worth making a trip to your doctor’s office. If you choose to seek help, give your doctor as much information as you can about your symptoms including their frequency and severity as well as the onset. With your doctor’s help, you can determine the best course of treatment to restore sexual function.
The hypogonadal-obesity-adipocytokine cycle hypothesis. Adipose tissue contains the enzyme aromatase which metabolises testosterone to oestrogen. This results in reduced testosterone levels, which increase the action of lipoprotein lipase and increase fat mass, thus increasing aromatisation of testosterone and completing the cycle. Visceral fat also promotes lower testosterone levels by reducing pituitary LH pulse amplitude via leptin and/or other factors. In vitro studies have shown that leptin also inhibits testosterone production directly at the testes. Visceral adiposity could also provide the link between testosterone and insulin resistance (Jones 2007).
The chemical synthesis of testosterone from cholesterol was achieved in August that year by Butenandt and Hanisch. Only a week later, the Ciba group in Zurich, Leopold Ruzicka (1887–1976) and A. Wettstein, published their synthesis of testosterone. These independent partial syntheses of testosterone from a cholesterol base earned both Butenandt and Ruzicka the joint 1939 Nobel Prize in Chemistry. Testosterone was identified as 17β-hydroxyandrost-4-en-3-one (C19H28O2), a solid polycyclic alcohol with a hydroxyl group at the 17th carbon atom. This also made it obvious that additional modifications on the synthesized testosterone could be made, i.e., esterification and alkylation.
Exercise and lifestyle modifications may improve erectile function. Weight loss may help by decreasing inflammation, increasing testosterone, and improving self-esteem. Patients should be educated to increase activity, reduce weight, and stop smoking, as these efforts can improve or restore erectile function in men without comorbidities. Precise glycemic control in diabetic patients and pharmacologic treatment of hypertension may be important in preventing or reducing sexual dysfunction.
^ Jump up to: a b Sapienza P, Zingales L, Maestripieri D (September 2009). "Gender differences in financial risk aversion and career choices are affected by testosterone". Proceedings of the National Academy of Sciences of the United States of America. 106 (36): 15268–73. Bibcode:2009PNAS..10615268S. doi:10.1073/pnas.0907352106. PMC 2741240. PMID 19706398.
Think of erectile dysfunction as your body’s “check engine light.” The blood vessels in the penis are smaller than other parts of the body, so underlying conditions like blocked arteries, heart disease, or high blood pressure usually show up as ED before something more serious like a heart attack or stroke. ED is your body’s way of saying, “Something is wrong.” And the list of things that cause erectile dysfunction can include:
Erectile dysfunction - (ED) or impotence is sexual dysfunction characterized by the inability to develop or maintain an erection of the penis during sexual activity. A penile erection is the hydraulic effect of blood entering and being retained in sponge-like bodies within the penis. The process is most often initiated as a result of sexual arousal, when signals are transmitted from the brain to nerves in the penis.
Several studies accessed the prevalence of ED. The Massachusetts Male Aging Study reported a prevalence of 52%.2 The study demonstrated that ED is increasingly prevalent with age: approximately 40% of men are affected at age 40 and nearly 70% of men are affected at age 70. The prevalence of complete ED increased from 5% at age 40 to 15% at age 70.2 Age was the variable most strongly associated with ED.
A vacuum erection device is a plastic tube that slips over the penis, making a seal with the skin of the body. A pump at the other end of the tube makes a low-pressure vacuum around the erectile tissue, which results in an erection. An elastic ring is then slipped onto the base of the penis. This holds the blood in the penis (and keeps it hard) for up to 30 minutes. With proper training, 75 out of 100 men can get a working erection using a vacuum erection device.
The symptoms of erectile dysfunction include difficulty achieving an erection, trouble maintaining an erection, and a reduced interest in sex. Because male sexual arousal is a fairly complex process, it can sometimes be difficult to identify a specific cause. Arousal starts in the brain but it also involves the nerves, muscles, and blood vessels and can be impacted by hormones and emotions. If a problem develops with any of these things, erectile dysfunction could be the consequence.
What you need to know about delayed ejaculation Delayed ejaculation is a sexual disorder that can be distressing for a man and his partner and may disrupt a relationship. There are many reasons why delayed ejaculation occurs, including tissue damage, age, drugs, and the side effects of medication. They may be physiological or psychological. Find out how to get help. Read now
I’m telling you all of this because no matter who you are, keeping your testosterone levels balanced is more important now than ever before. Modern living has not been kind to our hormones. In American men, serum testosterone levels have declined by about 1% each year for the past 30 years , and you can make a few educated guesses about why. Hormone-disrupting chemicals are more prevalent than ever before, physical activity is less and less common, veganism is popular (I was a raw vegan for a while), and many doctors insist on pushing a low-fat, low-cholesterol diet for health (by the way, the concept of a low-fat diet began in the mid-70s, shortly before the nationwide testosterone decline. It could be a coincidence, but I doubt it).
Health Tools Baby Due Date CalculatorBasal Metabolic Rate CalculatorBody Mass Index (BMI) CalculatorCalories Burned CalculatorChild Energy Requirements CalculatorDaily Calcium Requirements CalculatorDaily Fibre Requirements CalculatorIdeal Weight CalculatorInfectious Diseases Exclusion Periods ToolOvulation CalculatorSmoking Cost CalculatorTarget Heart Rate CalculatorWaist-to-hip Ratio Calculator Risk Tests Depression Self-AssessmentErectile Dysfunction ToolMacular Degeneration ToolOsteoporosis Risk TestProstate Symptoms Self-Assessment
show that total testosterone levels increase after exercising, especially after resistance training. Low testosterone levels can affect your sex drive and your mood. The good news is that exercise improves mood and stimulates brain chemicals to help you feel happier and more confident. Exercise also boosts energy and endurance, and helps you to sleep better. Fitness experts recommend 30 minutes of exercise every day.
Stanley A Brosman, MD is a member of the following medical societies: Alpha Omega Alpha, American Academy of Pediatrics, American Association for the Advancement of Science, American Association for Cancer Research, American College of Surgeons, American Medical Association, American Urological Association, Society for Basic Urologic Research, Society of Surgical Oncology, Society of Urologic Oncology, Western Section of the American Urological Association, Association of Clinical Research Professionals, American Society of Clinical Oncology, International Society of Urology, International Society of Urological Pathology
Overall there is evidence that testosterone treatment increases lean body mass and reduces obesity, particularly visceral obesity, in a variety of populations including aging men. With regard to muscle changes, some studies demonstrate improvements in maximal strength but the results are inconsistent and it has not been demonstrated that these changes lead to clinically important improvements in mobility, endurance or quality of life. Studies are needed to clarify this. Changes in abdominal obesity are particularly important as visceral fat is now recognised as predisposing the metabolic syndrome, diabetes and cardiovascular disease.
Testosterone is also important for maintaining bone strength and lean muscle mass in women, as well as contributing to overall well-being and energy levels. This hormone plays a key role in a woman’s sex drive and is responsible for enhancing sexual pleasure during intercourse. However, the levels of testosterone produced by females is still between ten and times less than the amount produced by men.
Before assessing the evidence of testosterone’s action in the aging male it is important to note certain methodological considerations which are common to the interpretation of any clinical trial of testosterone replacement. Many interventional trials of the effects of testosterone on human health and disease have been conducted. There is considerable heterogenicity in terms of study design and these differences have a potential to significantly affect the results seen in various studies. Gonadal status at baseline and the testosterone level produced by testosterone treatment in the study are of particular importance because the effects of altering testosterone from subphysiological to physiological levels may be different from those of altering physiological levels to supraphysiological. Another important factor is the length of treatment. Randomised controlled trials of testosterone have ranged from one to thirty-six months in duration (Isidori et al 2005) although some uncontrolled studies have lasted up to 42 months. Many effects of testosterone are thought to fully develop in the first few months of treatment but effects on bone, for example, have been shown to continue over two years or more (Snyder et al 2000; Wang, Cunningham et al 2004).
If you have symptoms of ED, it’s important to check with your doctor before trying any treatments on your own. This is because ED can be a sign of other health problems. For instance, heart disease or high cholesterol could cause ED symptoms. With a diagnosis, your doctor could recommend a number of steps that would likely improve both your heart health and your ED. These steps include lowering your cholesterol, reducing your weight, or taking medications to unclog your blood vessels.
Interestingly, the Belgian company Solvay, acquired for €4.5 billion in 2010 by American pharmaceutical giant Abbott, didn't put its own or its product's name on the website. As AdWeek pointed out when the campaign launched, "One of the advantages of taking the unbranded route for Androgel is that the company does not have to warn consumers quite so prominently about Androgel's side effects."
Erectile dysfunction or disorder (ED) is the inability to develop and maintain an erection for satisfactory sexual intercourse or activity. Erectile dysfunction or erectile disorder are the preferred terms as opposed to impotence. There are no uniform criteria defining how consistent the problem has to be and for what duration it must be present to considered ED. The Diagnostic and Statistical Manual of Mental Disorder-5 specifies a duration of at least 6 months in its definition of ED.1
In rare cases, the drug Viagra ® can cause blue-green shading to vision that lasts for a short time. In rare cases, the drug Cialis® can cause or increase back pain or aching muscles in the back. In most cases, the side effects are linked to PDE5 inhibitor effects on other tissues in the body, meaning they are working to increase blood flow to your penis and at the same time impacting other vascular tissues in your body. These are not ‘allergic reactions'.
Low testosterone levels can cause mood disturbances, increased body fat, loss of muscle tone, inadequate erections and poor sexual performance, osteoporosis, difficulty with concentration, memory loss and sleep difficulties. Current research suggests that this effect occurs in only a minority (about 2%) of ageing men. However, there is a lot of research currently in progress to find out more about the effects of testosterone in older men and also whether the use of testosterone replacement therapy would have any benefits.
In comparison, 37% of men who had received external radiotherapy as their primary therapy reported the ability to attain functional erections suitable for intercourse, along with 43% of men who had received brachytherapy as primary treatment. Pretreatment sexual health-related quality of life score, age, serum prostate-specific antigen (PSA) level, race or ethnicity, body mass index, and intended treatment details were associated with functional erections 2 years after treatment.
CONDITIONS OF USE: The information in this database is intended to supplement, not substitute for, the expertise and judgment of healthcare professionals. The information is not intended to cover all possible uses, directions, precautions, drug interactions or adverse effects, nor should it be construed to indicate that use of a particular drug is sage, appropriate or effective for you or anyone else. A healthcare professional should be consulted before taking any drug, changing any diet or commencing or discontinuing any course of treatment.
Male hypogonadism is a clinical syndrome caused by a lack of androgens or their action. Causes of hypogonadism may reflect abnormalities of the hypothalamus, pituitary, testes or target tissues. Increases in the amount of testosterone converted to estrogen under the action of the enzyme aromatase may also contribute to hypogonadism. Most aspects of the clinical syndrome are unrelated to the location of the cause. A greater factor in the production of a clinical syndrome is the age of onset. The development of hypogonadism with aging is known as late-onset hypogonadism and is characterised by loss of vitality, fatigue, loss of libido, erectile dysfunction, somnolence, depression and poor concentration. Hypogonadal ageing men also gain fat mass and lose bone mass, muscle mass and strength.
Psychological factors — Psychological issues such as depression, anxiety, guilt or fear can sometimes cause sexual problems. At one time, these factors were thought to be the major cause of impotence. Doctors now know that physical factors cause impotence in most men with the problem. However, embarrassment or "performance anxiety" can make a physical problem worse.
Some men report being helped by an oral medication called yohimbine, which comes from the bark of a tree that grows in India and Africa. This drug, which needs to be taken every day, has been reported to help about 20 to 25 percent of the men taking it. A relatively new but widely used oral medication called Viagra requires a careful medical evaluation by your doctor. | <urn:uuid:63c51d20-3fbc-461d-a8d2-7287f92ab999> | {
"date": "2019-02-16T23:30:56",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481249.5/warc/CC-MAIN-20190216230700-20190217012700-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9317809343338013,
"score": 2.9375,
"token_count": 3621,
"url": "https://vascuwavetreatment.com/new-drugs-to-treat-erectile-dysfunction.html"
} |
Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Thermoregulation
Skin Dense hair (soft fur) found on rabbits helps to insulate them and prevent heat loss at times when the external temperature is colder than their internal temperature. Areas on the rabbit which are more sensitive to heat loss, contain more fur than other areas.
There is little fur found on the ears as they are responsible for heat loss whereas there is more fur on the rest of the jackrabbits body. Integumentary System:
Fur Capillaries are small blood vessels that branch out from arteries that ensure that every cell in an organisms body has access to blood. The walls of capillaries are only 1 cell thick which allows thermal energy to pass easily from the external environment into the internal environment and vice-versa. Areas where there are networks of capillaries are regions where thermal energy is controlled and maintained. The network found in jack rabbits ears is largely responsible for thermoregulation. Not only do the ears have a large surface area, but the concentration of capillaries in the small area allows for fast heat exchange. Circulatory System:
Capillaries Rabbits have a four chambered heart. Their heart has a similar structure as humans with four chambers. The heart has a left and right atrium and a left and right ventricle. The significance of the heart having four chambers is that it provides two cycles. One cycle is when the deoxygenated blood travels from the right atrium to the right ventricle to the lungs where the blood becomes oxygenated. Then the blood travels into the left atrium, to the left ventricle and then out of the heart and travels all around the body. This means that only oxygenated blood is traveling to the bodies organs and cells. This increases the efficiency of the organism specifically the efficiency of the rabbits thermoregulation. Circulatory System:
Four Chambered Heart Rabbits are endotherms which means that they use internal organs and organ systems to maintain their internal temperature. In order for the rabbit to maintain enough energy to control and monitor their temperature, they must consume enough energy from their food. Rabbits are herbivores which means they receive all of their nutrients and energy from grass and leaves they eat. As a result, their stomachs must be able to hold a large volume of food in order to sustain life. The stomach is the location where the food is held until in passes through the pylorus into the small intestines. Digestive System:
Stomach The small intestines in rabbits is extremely long. This is because the rabbit needs to absorb as much energy and nutrients from their food as possible. As the food travels through the small intestines, nutrients and minerals are absorbed which are necessary for the rabbit to survive. The first section of the small intestines is called the duodenum which is a loop where the food first enters the small intestines. The pancreas, gall bladder and liver, supply fluids into the small intestines to further digest the food such as bile. The small intestines continues to form sacculus rotundus which is an enlarged sac that is specific to rabbits. Following the sacculus rotundus is the large intestine which is the final stage where the rabbits are able to absorb nutrients. The length of the intestines is extremely important for the survival of the rabbit. Digestive System:
Small and Large Intestines Here is a diagram of the digestive system of a rabbit. As you can see, the stomach is quite large in relation to other organs and structures on the rabbit. The stomach is almost as big as the rabbits head which demonstrates how large the stomach needs to be in order to hold the food consumed by the rabbit
The food enters the stomach through the esophagus and leaves through the plyorus. The length of the small intestines and large intestines are important as the majority of the energy and nutrients in grass and leaves is absorbed during these stages. The different sections of the intestines are labeled which highlights the length of both the small and large intestines The picture on the left is a picture of a jack rabbits ears. As you can see, the skin and fur on the ears is extremely thin. With the thin skin, you are able to see the network of capillaries that are responsible for thermoreguation in rabbits. The picture on the right highlights what happens in the capillaries. This diagram highlights the four chambers of the heart found in rabbits. Works Cited
Integumentary System (Skin). (2010, April 2). Retrieved from Hub Pages: http://hotbabefatchicks.hubpages.com/hub/Integumentary-System-Skin
Anatomy and Physiology of Animals/The Gut and Digestion. (2013, March 22). Retrieved from Wiki Books: http://en.wikibooks.org/wiki/Anatomy_and_Physiology_of_Animals/The_Gut_and_Digestion
Rabbit Digestive System. (2013). Retrieved from Pet Care Gt: http://www.petcaregt.com/rabbits/rabbitdigestivesystem.html
Rabbit: Circulatory System. (2013). Retrieved from Go Bookee: http://www.gobookee.com/get_book.php?u=aHR0cDovL3d3dy5mb2Z3ZWIuY29tL0VsZWN0cm9uaWNfSW1hZ2VzL09uZmlsZXMvU2NpQW5pQW5hdDgtNTdjLnBkZgpSYWJiaXQ6IENpcmN1bGF0b3J5IFN5c3RlbQ==
Alnaimy, A., Fayez , I., Habeeb , M., & Marai , M. (1994). Thermoregulation in rabbits. Retrieved from CIHEAM: http://om.ciheam.org/om/pdf/c08/95605277.pdf
Johnson-Delaney, C. A. (2006). Anatomy and Physiology of the Rabbit and Rodent. Retrieved from http://www.aemv.org/documents/2006_aemv_proceedings_2.pdf
THERMOREGULATION OF THE JACKRABBIT. (n.d.). Retrieved from UMN Bio-Inspired Design GD3 Studio 2012: http://umnbioinspired2012.files.wordpress.com/2012/11/berger_weisman_print.pdf | <urn:uuid:b97eb658-7cec-4531-9d38-04904e07efe0> | {
"date": "2017-02-24T14:12:42",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00500-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9147666096687317,
"score": 3.21875,
"token_count": 1521,
"url": "https://prezi.com/cqb2ehmujjrh/thermoregulation/"
} |
During the summer slump, two United Nations agencies – United Nations Economic, Social and Cultural Organization (UNESCO) and the United Nations Population Fund (UNFPA) – issued highly controversial new guidelines for sexuality education of children around the world. These groups have a long history of pushing “reproductive health care,” and the new report, International Guidelines on Sexuality Education, builds on an earlier report released by the International Planned Parenthood Federation to promote the “need and entitlement” for sexuality education for children beginning at age five.
Not surprisingly, both documents argue for “guaranteeing” the sexual rights of children and for integrating sexuality education as an essential aspect of human rights. The Center for Reproductive Rights is cited as the source for the assertion of the absolute human “right” of young people to have sexuality education, access to condoms, and abortion-on-demand.
Additionally, in the view of the United Nations, sexuality education is the responsibility of “education and health authorities” not parents. Teachers and doctors, so the liberal line goes, understand the big picture and have the conceptual understanding necessary – the “rights based approach” that excludes parents and incorporates appropriate “practitioner experience and expert opinion.” Excluding parents from the process keeps them from being aware of how frequently “sexuality education” indoctrinates against traditional values, especially “discrimination based on sexual orientation.”
At the outset, the report makes it clear that “good” sexuality education should “take priority over personal opinion” – which, being translated, means trample all over traditional morality. One whole section of the report counters the “common concerns” of those who “resist” sexuality education. The implication is that the report’s “evidence-based” approach is “non-judgmental” and should prevail over those “custodians of culture” who dare to put values ahead of the “needs of young people.” The report states as fact that “teachers remain the best qualified and most trusted providers of information and support for most children and young people.” Yet, parents remain their children’s most trusted advisors.
The report paints a very dire picture of young people’s supposed “inadequate preparation for their sexual lives” – especially the “conflicting and confusing messages about sexuality and gender.” Naturally, the report identifies both “gender” and “diversity” as “fundamental characteristics of sexuality.” The term “gender” is used nearly 200 times in the 54-page report. The “inadequacy” of current sexuality education, the report contends, leaves young people “vulnerable to coercion, abuse and exploitation, unintended pregnancy, and sexually transmitted infections (STIs) including HIV.”
In other words, we learn later on in the report, if kids would just learn how to masturbate at around five years of age they could avoid abuse and exploitation and the other problems mentioned above. “Masturbation” the report emphasizes, “is a safe and valid expression of sexuality.” All this information must be conveyed, of course, in the “school setting” as part of a “formal curriculum” for maximum impact and effectiveness. After all (get ready for high-powered scare tactics!) ignorance and misinformation can be life threatening.
The report recommends “age-specific standard learning objectives for sexuality education.” The authors stress the importance of addressing “beliefs, values and skills that are amendable to change.” Thus, they let us know at the outset that authoritative – timeless – beliefs and values are unacceptable.
The authors stress that their report is not a curriculum. Instead, it is a strategic plan – “a global template,” if you will – “to introduce and strengthen sexuality education.” Ah! The purpose is clear: this is a “how to” manual for getting around those pesky parents and their “misplaced” concerns. It is, after all, (as is mentioned repeatedly) “rights based” and “respectful of sexual and gender diversity.” There are sections that tell readers how to develop a case for sexuality education in the face of opposition. Another section describes how to plan for implementation. So, let’s get this right: schools now must teach reading, writing, math and sexuality.
UNESCO and UNFPA repeatedly refer to their recommendations as “scientifically accurate, age appropriate and evidenced based.” Yet, they spend an inordinate amount of space describing the limits and inadequacies of their studies and evaluation designs. Even so, we are told that the recommendations “provide a platform for those involved in policy, advocacy and the development of new programmes.” The bottom line is that the research is primarily from the Sexuality Information and Education Council of the United States (SIECUS). The report admits that SIECUS guidelines “provide the overall organizing framework for the topics and learning objectives.” In addition, UNESCO conducted interviews and held a consultation with experts from 13 countries. No conservatives were included, of course.
Once again, the worst of U.S. radical ideology is being exported around the world through these guidelines based on SIECUS recommendations. All the children are taught that family structure doesn’t matter and that any group of people can be a family. They are all warned against “rigid” gender roles and responsibilities that reflect “gender inequality.” All children are taught that “people do not choose their sexual orientation or gender identity” and that expressing your sexuality “can enhance well-being.” And they repeat the mantra that all “children should be wanted, cared for, and loved.”
Five- to eight-year-olds are told that “touching and rubbing one’s genitals … ‘can feel pleasurable.’” They learn about “gender stereotypes” and that anybody (regardless of sexual status) can “raise a child and give it the love it deserves.” Nine- to twelve-year-olds learn how to get and use condoms, emergency contraception, the “signs and symptoms” of pregnancy, and all about sexual pleasure and orgasm. They learn that abortion is safe and discuss “homophobia, transphobia and abuse of power.” They learn about their rights – to decide for themselves about whether to become a parent and to have access to anti-retroviral therapy (ART). Twelve- to fifteen-year-olds are told about their right to safe abortions and post abortion care, how to use emergency contraception, and that the size and shape of the penis or breasts does not affect sexual pleasure.
The very first paragraph in the section, “Young people’s sexual and reproductive health,” complains that the “burden of disease” among young people stems from “sexual and reproductive ill health.” In other words, they admit that early sexual activity is not healthy, but they nevertheless advocate “being sexual” as an important part of young people’s lives and contend that “abstinence is only one of a range of choices available to young people.”
Amazingly, the official press release declares that the guidelines are “to help young people learn how to protect themselves against HIV and against abuse and exploitation.” You’ve got to love the way the left spins their craziness – just cloak all the controversial stuff in lofty goals and protective rhetoric. Over half of the new STDs every year occur among young people, so don’t promote abstinence. Instead lament that more than half have never been taught how to use a condom or where the local sexual health office is located, and rejoice that there is greater access to anti-retroviral therapy (ART). More than four million girls will seek abortions every year, so don’t promote abstinence. Instead, “introduce and strengthen sexuality education.” Remove the stigma against sexual activity, and then introduce worldwide programs to remove the stigma against STDs, and establish a bureaucracy to teach masturbation and contraception. | <urn:uuid:5858c35c-c804-4e63-8a44-f7d48579f4bd> | {
"date": "2016-05-06T01:47:44",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861700326.64/warc/CC-MAIN-20160428164140-00186-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9430352449417114,
"score": 2.953125,
"token_count": 1743,
"url": "http://www.cwfa.org/a-report-on-the-u-n-s-shocking-sexuality-guidelines/"
} |
NASA has taken some hits for having decades-old computer technology running the shuttle program and the International Space station. For example, the space agency uses some technology that the moon programs relied on in the 1960s and the space station uses processors more than two decades old. Sounds like a typical government operation? Well, no, when you have scientists explain it.
A silicon.com article reports:
When it comes to spacecraft, design reliability - and not bleeding edge technology - is the watchword, with onboard chips having to undergo extensive testing to prove their robustness and compatibility with the spacecraft's onboard software.
. . . "A spacecraft is not accessible - once it is launched it is there, so you have to be extremely sure that things work," said [Alessandro] Donati, [head of the advanced mission concepts and technologies office at the European Space Agency's Space Operations Centre at Darmstadt, Germany].
Upgrading computing hardware is another task that is normally straightforward on the ground but that becomes an expensive and time-consuming job in space.
Simply put, any upgrade or new technology has to work from the beginning -- always, or else. That's why it takes nearly three years to do a software upgrade. Everything has to be tested and tested again.
But NASA plans to upgrade processors on the space station next year - "the station's first major avionics computer redesign in the 12 years it has been in orbit," silicon.com reports. | <urn:uuid:ffce127a-1021-4de7-96d0-d43cd86c1f2c> | {
"date": "2015-07-31T03:05:24",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988048.90/warc/CC-MAIN-20150728002308-00051-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9503610134124756,
"score": 3.421875,
"token_count": 298,
"url": "http://www.nextgov.com/technology-news/tech-insider/2010/09/why-legacy-it-works/53851/"
} |
Thursday, Jan. 31 — Peter Yarrow's music is not anachronistic. It's as much about the compelling efforts toward civil liberties today as it was in the '60s. Yarrow is Peter of Peter, Paul & Mary, a folk trio whose career began within the framework of the U.S. civil rights movement and the Vietnam War.
Peter Yarrow's music is not anachronistic. It's as much about efforts toward civil liberties today as it was in the '60s.
Yarrow is Peter of Peter, Paul & Mary, a folk trio whose career began within the framework of the U.S. civil rights movement and the Vietnam War. Influenced by early folk artists Woody Guthrie and Pete Seeger and his Weavers, Peter, Paul & Mary were at the helm of a commercial folk revolution in the early '60s.
"Folk musicians exhorting social commentary would have been blacklisted by the McCarthy witch hunt before the '50s and '60s," Yarrow says during a telephone interview. "The end of the McCarthy era is what precipitated the folk renaissance."
Seeger's Weavers morphed out of a New York City-based folk group, called the Almanac Singers, that was active between 1940 and 1943. Its members — Seeger, Lee Hays, Millard Lampell and Woody Guthrie — specialized in songs advocating anti-war, anti-racism and pro-union philosophies.
The group disbanded after World War II, and the Weavers formed in 1948. The new folk quartet based itself in Greenwich Village and sang traditional songs from around the world, as well as blues, gospel and labor songs. It had a driving, string-band style that helped inspire the folk boom that followed in the '50s and '60s.
"Peter, Paul & Mary were the bridge to '60s folk music," Yarrow says. "It happened to others, of course. Judy Collins, Joan Baez and Bob Dylan."
Yarrow's songwriting helped create some of Peter, Paul & Mary's most famous songs, including "The Great Mandala," "Light One Candle," "Day is Done" and "Puff, the Magic Dragon."
"There was a predisposition in the country to examine what our culture had handed us, and to see whether it conformed with our ideas of America," Yarrow says. "We saw the remnants of slavery, lynchings in the South, and we thought it was blatantly inconsistent with the Pledge of Allegiance. Folk music is a way to create community. To offer people a sense of connection to one another, so that those who feel excluded know they have a voice."
Highlights of Peter, Paul & Mary's fame include performing at Martin Luther King Jr.'s March on Washington in 1963 and a 1969 march on Washington, D.C., to end the Vietnam War.
"Those events were an overwhelming confirmation that we don't have to rely on change coming from the top. It can emerge from the grass roots and profoundly affect the nation," Yarrow says. "I think Peter, Paul & Mary were on the official or unofficial list of Nixon's enemies."
Activism still is a way of life for the 74-year-old Yarrow. He's busy organizing a Feb. 10 concert at Ridgefield Theater Barn near Newtown, Conn., "that will bring people together in caring and healing after the Sandy Hook shootings," he says. In 1999, Yarrow founded Operation Respect, a nonprofit organization committed to providing children with safe and compassionate climates of learning free from bullying, ridicule and violence.
"There's something about being an activist that gives you a certain courage," Yarrow says. "I don't just look back at those events in the '60s. The issues have changed, but the core principles of justice, equity and peace are the same. It's imperative that every generation continue to work toward these principles."
Peter, Paul & Mary ended when Mary Travers died in 2009.
"I sing the Peter, Paul & Mary repertoire," Yarrow says. "I contextualize the songs with a sense of yesterday's history and today's imperatives. That is my music, and I carry it on. It will continue after I am gone." | <urn:uuid:599a9210-f008-41c3-8f56-9467a33151cf> | {
"date": "2018-01-22T04:50:30",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890991.69/warc/CC-MAIN-20180122034327-20180122054327-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9788132309913635,
"score": 2.6875,
"token_count": 883,
"url": "http://www.mailtribune.com/apps/pbcs.dll/article?AID=/20130124/TEMPO/301250301"
} |
Color is a critical element of good design. Learn how to make expert-level color choices in Graphic Design Fundamentals: Color with Justin Seeley
In this class, you’ll learn about the fundamental principles for working with color and how those insights can help you create cohesive color palettes. You’ll learn about:
- The Psychology of Color
- Color Modes & Models
- The Anatomy of Color
- Using Color as a Guide
- Creating a Color Palette
Justin will share tips for working with color that will improve the overall quality of all of your design work and help you get great results every time.
In Graphic Design: Color with Justin Seeley you’ll learn a fool-proof system for selecting color that you’ll return to again and again.
Adobe Illustrator CC 2018 | <urn:uuid:3403bb60-1251-4de0-ac40-34d23c157724> | {
"date": "2019-05-19T20:48:01",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255165.2/warc/CC-MAIN-20190519201521-20190519223521-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8509014844894409,
"score": 2.78125,
"token_count": 172,
"url": "https://www.creativelive.com/class/graphic-design-fundamentals-color-justin-seeley/lessons/demo-adobe-color-cc"
} |
Home of Mount Everest and culturally diverse, Nepal suffers frequent natural disasters and severe rural hardship.
A magnet for adventure tourists, the country’s striking landscape ranges from humid plains in the south to the Himalayas in the north.
But Nepal is the poorest country in Asia and the 15th poorest in the world. Dalits, indigenous populations and Muslims are the most marginalised groups.
From 1996 to 2006, a civil war between the government and Maoist guerrillas killed thousands of people, destroyed infrastructure and caused massive displacement. Nepal was declared a democratic republic and the ruling monarchy was abolished.
Most Nepalis are farmers, but many villages suffer food shortfalls – their vulnerability increased by drought, earthquakes, fires, epidemics, avalanches and windstorms.
More than a hundred caste and ethnic groups have distinct languages, cultural traditions and religious practices. Nepal’s 1990 constitution forbids discrimination on the basis of caste, race, sex or religion. However, lower castes continue to be neglected by the state, especially Dalit women.
The first Nepali church was established in the 1950s, and there are now an estimated 800,000 Christians in 6,000 congregations. After years of persecution, since 2006 churches have had new freedoms. | <urn:uuid:dc145868-882c-47bc-a35c-32e0ad6665fd> | {
"date": "2014-10-20T21:11:06",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443438.42/warc/CC-MAIN-20141017005723-00361-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9483569264411926,
"score": 3.203125,
"token_count": 257,
"url": "http://www.tearfund.org/en/about_us/what_we_do_and_where/countries/asia/nepal/nepal2/"
} |
|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Optical metamaterials - bending the laws of physics
If you have a question about this talk, please contact Tim Wilkinson.
Tea is served from 6pm
Metamaterials are artificial materials with properties that do not exist normally in nature. Advances in nanoscale fabrication allow for the realization of optical metamaterials which allow us to manipulate light in ways that were orignially not thought to be possible. These materials are composed of subwavelength electromagnetic structures place very close to one another. Due to mutual coupling between the individual structures, they present properties to incident electromagnetic radiation (such as light) that are different from those associated with the material from which the structures are comprised of. In this talk we use periodic arrays of multiwalled carbon nanotubes as subwavelength structures to produce optical metamaterials that exhibit artificial dielectric properties and band gaps within the optical regime.
This talk is part of the IET Cambridge Network - Lectures series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsGraduate Seminars Religion, Conflict and its Aftermath talks metabolism
Other talksPsychometric application of bifactor modelling for multidimensional mental health phenotype: a population based genotype‐trait association study Serre weights and de Rham cohomology of Shimura curves Annual General Meeting An introduction to Origins of the Afro Comb exhibition The Immunology of a successful pregnancy Under the bonnet of the Ferrari of the virus world - Norovirus replication and immune evasion | <urn:uuid:16d52ac2-4113-48b7-b2af-fceb5fde033c> | {
"date": "2013-05-25T12:35:52",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9169572591781616,
"score": 2.53125,
"token_count": 346,
"url": "http://talks.cam.ac.uk/talk/index/39123"
} |
“The people of Georgia have cast their lot with the Free World. And we will not cast them aside.”
In clear and uncompromising terms, President George W Bushexplains why the United States of America supports Georgia, criticizing Russia’s incursionand insisting South Ossetia will remain with Georgia.
Some brief excerpts transcribed from the video …
… Georgia’s sovereignty and territorial integrity must be respected. Moscow must honor its commitment to withdraw its invading forces from all Georgian territory.
… Georgia has become a courageous democracy.
… Since the Rose Revolution in 2003 the Georgian people have held free elections, opened up their economy, and built the foundations of a successful democracy.
…. Georgia has sent troops to Afghanistan and Iraq to help others achieve the liberty that they struggled so hard to attain. To further strengthen their democracy, Georgia has sought to join the free institutions of the West.
… Unfortunately, Russia has tended to view the expansion of freedom and democracy as a threat to its interests.
…a contentious relationship with America is not in Russia’s interests
… Bullying and intimidation are not acceptable ways to conduct foreign policy in the 21st Century | <urn:uuid:d5c1a4e2-cb1d-454f-b84b-b3266fa47393> | {
"date": "2014-04-16T07:14:00",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00347-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9426676630973816,
"score": 2.703125,
"token_count": 243,
"url": "http://prodos.thinkertothinker.com/2008/08/"
} |
This past week, I was asked to model a lesson in a grade 2 classroom using technology. They were just beginning non standard measurement so I decided to use the book, "Inch by Inch" by Leo Lionni. If you have not read this book, it is a wonderful story about a vulnerable inch worm that is about to be eaten but shows his predators that he is valuable by measuring them.
I read the story to the class and then I told them that we were going to do some measuring with worms. (No, not real worms, I bought rubber worms at the dollar store). We then talked about how to accurately measure an object. We specifically talked about how to line the worms up correctly making sure that they were not overlapping and making sure that we lined up the worms with the edge of the object we were measuring.
I then had volunteers come up and measure items with the worms. I wanted the students to have to do a bit of additional thinking so I posed this task for them to do:
|Download Task Card Here| | <urn:uuid:cde6d9ac-03bc-4b5d-9e12-79f2c81ff868> | {
"date": "2017-04-29T21:29:40",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123590.89/warc/CC-MAIN-20170423031203-00002-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.990216076374054,
"score": 3.609375,
"token_count": 214,
"url": "http://www.mrswideen.com/2016/04/ipads-worms-and-non-standard-measurement.html"
} |
When it comes to the design industry, there are many different areas in which you can take your career. However, in addition to creativity and flair, the designers of today – in any area of design – also need to have the appropriate qualifications and skills in order to enjoy a successful career. This is an exciting area, and can be very rewarding, but the competition is fierce, and the need for increasingly qualified professionals in the field is also on the rise.
There are a number of courses and qualifications that can aid anyone interested in a career in design. Those already working within this area but wishing to pursue career advancement can also benefit from various courses offered these days. Many of these courses are available as online courses, which means that those already working in design – or any other job – can also benefit without having to compromise work or other commitments.
Some of the areas and courses available for those interested in a career in design are outlined below:
Advertising degrees: Advertising is a very creative career, and one that combines a special skill and knowledge involving communication and artwork blended together to create a product or service that people will want. There is a very special skill involved in advertising, and in order to succeed in this cutting edge career it is important to sharpen that skill and to be creative, focused, and well informed in order to create and manage the perfect advertising campaign and get the response you want.
Architectural degrees: Architecture is an exciting and very rewarding profession, and one that enables you to use creativity and get involved in some wonderful building projects. However, a good architect is not only involved in the aesthetics of a building or structure, but also in other crucial aspects such as the safety, practicality, and cost effectiveness of the building.
Computer aided degrees: Design is one of the many areas that has become very computer-reliant, and in order for designs to be successfully created on computer, there is a need for experienced and trained professionals to create these computer aided designs.
Computer animation degrees: Computer animation is big business these days, and those with computer animation skills and qualifications can find themselves working in a variety of different and exciting environments.
Fashion design degrees: We all love keeping up with the latest fashions, and today’s fashion designers enjoy a fast paced and exciting career as they help us to enjoy a wide range of fashion for every season.
Graphic design degrees: If you want to enjoy a career that combines creative and visual skills with computerized design and communication of expression, then a career in graphic design could be just the thing for you.
Industrial design degrees: For those craving a career that enables them to use their creativity and flair, industrial design is an excellent choice. Fast paced, exciting, and rewarding, you could find yourself designing all sorts of products in the industrial design sector, from vehicles and appliances to furniture and toys.
Interior design degrees: In an ever changing world with a variety of needs, interior designers play a crucial role in society. An interior designer uses specialized skills and artistic flair to improve the environment for a person, a group of people, and even communities.
Online design degrees: Online design degrees offer the perfect solution for those wanting to break into the world of designing. Although design degrees have been around for many years in bricks and mortar colleges, it is only over recent years that online design degrees have become available.
Video game design degrees: Over recent years video games have come a long way in terms of entertainment value, graphics, and all round quality. This is thanks to advancements in technology coupled with the ability and caliber of today’s video game designers.
Visual communication degrees: In this age of computer technology and state of the art graphics, those with skills and knowledge when it comes to visual communications are highly valued and in demand.
Web design degrees: Web design is a specialist profession and is also part of a very competitive world, as both the financial rewards and job satisfaction in this type of career can be excellent. | <urn:uuid:eb0c7b42-db00-4973-89ad-f5ba58b2371e> | {
"date": "2015-07-29T22:00:53",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986646.29/warc/CC-MAIN-20150728002306-00196-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9672563672065735,
"score": 2.625,
"token_count": 815,
"url": "http://www.pondered.org/design-degrees/"
} |
From the Wurstfest’s “Ten-Day Salute to Sausage” in New Braunfels to the bottles of Shiner Bock lining the bars in every central Texas dance hall, Germans have made their mark on the culture of the Lone Star State. A new book, The Material Culture of German Texans, considers the tastes and artistic influence of the early settlers whose homes, churches, and graveyards still dot the state’s landscape today.
The first German to set his sights on Texas was a man named Johann Friedrich Ernst, who sailed his family across the Atlantic and made his way to the Mexican province of Texas in 1831. He farmed tobacco, rolled cigars, and then wrote letters back to the motherland about the beauty and opportunity he found. A surge of German immigrants flooded the region to start businesses and cultivate the land throughout the mid-nineteenth century.
Newly independent from Mexico in 1836, Texas began forming an identity tinged with European and Hispanic elements that continued after its American statehood in 1846. By 1930, the U.S. Census Bureau noted that people born in Germany or whose parents were born there made up one of the largest ancestries in the state. Eventually, the largest European ethnic group in Texas was German.
Author Kenneth Hafertepe is chair of the department of museum studies at Baylor University in Waco, Texas. For this book, he spent more than a decade researching the history of Germans in Texas—visiting historic home sites and interviewing curators, archivists, historians, and descendants of pioneers.
Hafertepe examines buildings and furniture from rural, small town, and urban settings spanning East Texas and the Hill Country. In essays, interviews, sketches, and nearly 400 images, he reveals not only the tale of one immigrant group, but also the story of a nation coming of age.
“To understand the way in which German material culture became Texan and then American,” Hafertepe writes, “Is to understand the way in which these people refashioned themselves, their families, and their communities.” | <urn:uuid:6a5882ba-541d-4f55-b3ee-13694e4f7163> | {
"date": "2019-06-16T17:26:28",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998288.34/warc/CC-MAIN-20190616162745-20190616184745-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9679471254348755,
"score": 3.265625,
"token_count": 439,
"url": "https://gardenandgun.com/articles/willkommen-yall-a-history-of-germans-in-texas/"
} |
Root canal treatment involves the removal of dead or diseased pulp tissue from within a tooth as well as the cleaning and shaping of the root canal thereafter to receive a filling. The common causes of pulpal injury are decay, trauma and excessive wear.
Benefits of treatment.
Root canal treatment saves natural teeth that have sustained irreversible pulpal injury. It prevents (or delays in some cases) the need for teeth extraction and the accompanied need for their replacement. It is also used to as an option of last resort to treat hypersensitive teeth that do not respond to conventional treatment. Occasionally it is used as part of a treatment plan to restore teeth that are maligned.
What will the dentist do?
The dentist will initially numb the tooth to be treated using local anaesthetic and isolate the treatment area using a rubber dam. The rubber dam prevents saliva contamination and accidental ingestion of root canal instruments and materials used during the procedure. The dentist will thereafter proceed to remove decayed areas and gain access to the pulp chamber using the dental drill. Infected (or dead) pulp tissue is subsequently removed using hand instruments and the root canal system is cleaned using a mild disinfectant solution. The root canal is shaped using small files before being sealed with an inert material called gutta-percha. Your dentist may use various devices, such as x-ray imaging equipment, apex locator, loupes or a dental microscope to aid him during the procedure.
How long will it take?
Root canal visits takes about 60 minutes on average and may require multiple visits, depending on the shape and number of canals present as well as the nature of your condition. Front teeth have the advantage of being in a more convenient location and usually have a single large ovoid canal whereas back teeth usually have multiple fine canals which are harder to access. Patients who present with chronic infection, resulting in damage to the surrounding tissues (e.g. sinus tract, cystic changes etc.) should expect a longer follow-up period with their attending dentist.
What is the experience like?
The experience is variable depending on the nature of the pulpal injury. Existing inflammation and infection can reduce the effectiveness of local anaesthetic agents, resulting in a “hot tooth”. In such an event, medication are often prescribed by your dentist to calm the tooth down prior to root canal treatment.
Fortunately, such situations are uncommon and most patients will experience little or no pain during the procedure. Your dentist may use root canal medicaments and place a temporary filling in between visits.
What to expect after treatment?
The tooth and its surrounding gum may feel slightly tender over the next few days due to inflammation. Your dentist may prescribe you analgesics to help you manage the discomfort. After a short observation interval, your dentist will likely recommend that the root canal treated tooth be protected from the potential risk of fracture with either a crown or an onlay. A root canal treated tooth functions like any other normal tooth and can potentially last a life time with good personal oral hygiene and professional care.
Are the any risks involved?
Root canal treatment is a common and safe procedure with high success rates (>90% for first treatments). Failures are often associated with the presence of complicated canal systems, recalcitrant infections or tooth fracture. Root canal treatment when carried out in vertically cracked teeth have a guarded prognosis as it is hard to predict or prevent crack propagation from occurring during and after the completion of treatment.
Other potential risks include the possibility of root canal wall perforations, fractured instruments, apical irritation from instruments and disinfectant solutions. The prevalence of these complications have reduced with the adoption of modern materials, technique and equipment. A very small number of patients have also been reported to have swallowed small root canal instruments or experienced soft tissue irritation from the disinfectant solution used during the procedure when it was not possible to use a rubber dam. | <urn:uuid:6bac8b88-a910-4282-8073-d7a96396c8fa> | {
"date": "2018-05-25T18:43:41",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867173.31/warc/CC-MAIN-20180525180646-20180525200646-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9460873007774353,
"score": 2.984375,
"token_count": 791,
"url": "http://parkwaydental.com.sg/medicenter_gallery/root-canal-treatment/"
} |
Lake Lowell Water Quality Assessment
Deer Flat National Wildlife Refuge
Planning Aid and Contaminant Study
Lake Lowell has persistent problems with water quality including extensive algal blooms, oxygen depletion, and fecal coliform bacteria counts which often exceed Idaho's water quality standards. The Lake is on the State's 1998 303(d) (of the Clean Water Act) list for nutrients as pollutant. Inflows to the reservoir are a combination of diverted Boise River water and irrigation return flows. Water is withdrawn from the reservoir during the irrigation season (April through August), but reservoir levels normally rise from September through April. Nutrient rich inflows from the New York Canal and irrigation return flows, combined with the shallow depth and high water exchange rate in the Lake have led to reports of dense blue-green algal blooms for over 60 years. Open drains that collect surface and irrigation runoff are common throughout the area. This runoff includes drainage from agricultural industrial and residential areas around the Lake area. In addition to water quality issues, fish contamination is also a primary concern. Aquatic organisms are likely exposed to a broad range of agricultural and industrial chemicals including dieldrin, DDT and analogs, dacthol, PCB's, hexachlorobenzene, and pentachlorophenol and heavy metals which can potentially affect the food chain. Sediment, water, and biological samples were collected and analyzed to evaluate alternatives to improve water quality in Lake Lowell at Deer Flat National Wildlife Refuge (NWR) by the U.S. Fish and Wildlife Service who are assisting the US Bureau of Reclamation in performing the study.
Methods: This reconnaissance investigation selected 15 locations for collection of water and sediment samples. Eight of these locations were irrigation return flows that enter the Lake. The New York Canal was also selected as a sample site because it is the main source of water to the Lake and has the potential to become contaminated as it passes through 40 miles of agricultural land and urban areas in the Boise-Nampa area. Six sampling sites were within the Lake. Surface water samples were collected to determine what contaminants were entering the lake at a given point in time while sediment samples are used to evaluate what constituents may have been in the water in the past. Fish tissue samples from three different locations were also collected. Whole body and fillets samples from each location were submitted to the laboratory for mercury analysis. The investigation focus was on pesticides and herbicides that have been used in the past and may be currently used in local agricultural practices. Water samples were also analyzed for common ions and nutrients to assess the effect of eutrophication along with toxic contamination. The main interest in the fish tissue sampling was mercury. Mercury had been found in the water column samples at concentrations that exceeded the chronic criteria and it was also detected in the sediment samples. Since mercury is known to bioaccumulate, it is likely that the fish are exposed and contaminated with mercury which, in turn may affect birds that feed on the fish in the lake.
Results: A total of 16 sediment, 32 water, 2 botanical, and 60 fish tissue samples were collected and submitted for laboratory analysis of inorganic and organic constituents. From the samples collected and analyzed from Lake Lowell in 1998 there may be three problems occurring within the Lake: elevated mercury concentrations within the water column, elevated levels of DDT and it metabolites, and algae blooms or eutrophication of the Lake. Mercury was detected during the first round of sampling in Lake water at concentrations above Idaho's chronic water quality criteria. The Mercury may have been in the algae bloom that was occurring during the first round of sampling. The actual source and frequency of elevated mercury concentrations should be determined. This study shows that the inflows to the Lake are likely contributing to the algae bloom problem. Reducing the amount of nutrients entering the Lake would likely reduce the amount and severity of the algae blooms.
Future Recommendations: The study recommends that water samples be obtained on a weekly basis and be analyzed for mercury. The extent of DDT contamination needs further review, and a round of sampling for pH and dissolved oxygen should be conducted for a 24-hour period. This would determine if large changes in these parameters are occurring during the time when algae are not photosynthesizing but are respiring. This can cause very large swings in the pH which can allow metals to become dissolved and enter the water column at night and precipitate out during the daylight hours.
Learn more by reading the following full report: Burch, Susan & Judson King, 1998 Lake Lowell Water Quality Assessment Deer Flat National Wildlife Refuge Planning Aid and Contaminant Study, USFWS Snake River Basin Office, Boise, Idaho. May 2000. ( Prepared for US Bureau of Reclamation Snake River Area Office, Boise, Idaho)
Return to the Boise Field Office Reports
Visit the: Pacific Region - Environmental Contaminants-Investigating and Monitoring | <urn:uuid:5e6a2760-33e3-49c3-8d9a-0f88c5fa1fc4> | {
"date": "2015-07-01T00:10:18",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094629.80/warc/CC-MAIN-20150627031814-00026-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9590460658073425,
"score": 3.375,
"token_count": 995,
"url": "http://www.fws.gov/pacific/ecoservices/envicon/pim/reports/Idaho/waterquality.html"
} |
Source: TwitterThe fact is.....millions of slaves were brought to the Western Hemisphere.
Source: American History Rules
How Many Slaves Landed in the U.S.? by Henry Louis Gates, Jr. (PBS, originally posted on The Root)
The most comprehensive analysis of shipping records over the course of the slave trade is the Trans-Atlantic Slave Trade Database, edited by professors David Eltis and David Richardson. (While the editors are careful to say that all of their figures are estimates, I believe that they are the best estimates that we have, the proverbial “gold standard” in the field of the study of the slave trade.) Between 1525 and 1866, in the entire history of the slave trade to the New World, according to the Trans-Atlantic Slave Trade Database,Related reading:
- 12.5 million Africans were shipped to the New World.
And how many of these 10.7 million Africans were shipped directly to North America? Only about 388,000. That’s right: a tiny percentage.
- 10.7 million survived the dreaded Middle Passage, disembarking in North America, the Caribbean and South America.
Rapid Natural Increase in U.S. Slave Population. (Economic History Association)
He may have been a brilliant neurosurgeon, but on every other topic on which he expounds, he seems just not to get it.
Dual senses of 'obtuse' provided by Merriam-Webster
Ben Carson just referred to slaves as 'immigrants'. (USA Today, 3/6/2017)
Aboard the Underground Railroad: The Slave Trade. (National Park Service)
Equating the slave trade with immigration is just....well, actually, it's not all that surprising coming from a member of the Trump administration. | <urn:uuid:4b3a997c-ebe7-434e-8e98-b4c149f36f82> | {
"date": "2017-08-18T04:58:45",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104565.76/warc/CC-MAIN-20170818043915-20170818063915-00656.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9298391938209534,
"score": 3.515625,
"token_count": 374,
"url": "https://paulsnewsline.blogspot.com/2017/03/photo-of-hud-secretary-ben-carson.html"
} |
National Oceanic and Atmospheric Administration (NOAA),
Earth System Research Laboratory (ESRL)
What does this program measure?
The ESRL GMD Meteorology program measures ambient and dewpoint temperatures, relative humidity, precipitation (in inches), and wind speed and direction.
How does this program work?
The dewpoint hygrothermometer measures ambient and dewpoint temperatures, from which relative humidity is calculated. Precipitation is continuously measured (in inches) with a tipping bucket.
A Mauna Loa PC based system utilizes RS-485 serial communications to collect data from the instruments. The data is recorded as one minute averages, except for precipitation. Precipitation is measured as a daily total accummulation.
|Air Temperature||Aspirated thermistor, 2m, 9m, 37mm heights||continuous|
|Air Temperature||Max/Min thermometers, 2-m height||daily|
|Temperature gradient||Aspirated thermistor, 2m, 9m, 37m heights||continuous|
|Dew point temperature||Dew point hygrometer, 2m height||continuous|
|Relative Humidity||TSL 2m height||continuous|
|Wind (speed and direction)||10m, and 38m heights||continuous|
Why is this research important?
In order to monitor the trends in meteorological parameters, and to assist in the interpretation of other parameters such as aerosols.
Are there any trends in the data?
Day rose and night rose (below) show the wind direction at the observatory. Note that the night rose shows only the southerly component which is the desired downslope conditions.
MLO press and MLO temps (below) is the running record since 1977. There is a slightly increasing trend in the ambient temperature since 1977.
How does this program fit into the big picture?
What is it's role in global climate change?
It allows us to see how changes in other atmospheric variables affect the meteorology of the station. | <urn:uuid:1e7174f4-7357-41d9-a9c8-5c8ecbb3e758> | {
"date": "2016-06-27T18:46:04",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00178-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.861086905002594,
"score": 3.484375,
"token_count": 431,
"url": "http://www.esrl.noaa.gov/gmd/obop/mlo/programs/esrl/met/met.html"
} |
Government is Urging Us to Return to the Stone Age
The White House and U.S. National Institute of Standards and Technology (NIST) are urging Americans to return to the stone age for their own safety.
"After discovering that ‘thermal expansion’ of steel from a low-temperature fire led to the collapse of World Trade Center building 7," said NIST spokesperson Noh Wei, "we started realizing that other metal objects might also be at risk".
So NIST scientists tested other metallic objects using state-of-the-art computer models. The models predicted that every oven and barbeque in the country could disintegrate at any time, leading to a progressive collapse of entire houses.
"We also determined that car engines, airplane engines, and boat engines could all suddenly fail due to thermal expansion," said Wei. "Indeed, we soon realized that almost all industrial processes could lead to catastrophic failure, other than, perhaps, those used in freezers."
White House spokesman Phil Johnson agreed, saying
"Once you understand this principle of thermal expansion, you start to realize that even household showerheads and faucets are dangerous. The hot water flowing through them could wreak havoc. The President is committed to leading the way back to a safer time, and a return to proven, traditional materials - which may not be flashy like metal - but remain rock-solid even when warm."
A Fact Sheet from NIST provides recommendations and safety guidelines based on the new thermal expansion discoveries:
Is Metal Safe?
While it was previously assumed that metal was safe, scientists have now discovered that steel and other metals can suddenly fail due to exposure to heat. NIST urges everyone to stop using metal, and to reassess possible replacements with stone materials.
Sunlight can warm up metal. Therefore, no metal should be used where any sun exposure is possible.
If people choose to continue using metal, we urge them to live underground, to protect against the dangers of sunlight.
August 24, 2008 - source George Washington’s Blog
I guess our government must think we are a nation of babbling fools... S.I.A. | <urn:uuid:9e29b58e-a6b3-4cc0-ab33-b3fa019c4b67> | {
"date": "2015-11-27T02:44:44",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447906.82/warc/CC-MAIN-20151124205407-00346-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9384794235229492,
"score": 2.859375,
"token_count": 443,
"url": "http://www.knowthelies.com/node/2614"
} |
CORMIER, PIERRE, settler; b. 3 Aug. 1734 in Rivière-des-Héberts (near River Hebert), N.S., son of Pierre Cormier and Cécile Thibodeau (Thibaudeau); d. 24 March 1818 in Memramcook, N.B.
Pierre Cormier’s family moved about 1750 to the French-controlled side of the Chignecto Isthmus, perhaps in response to the blandishments of Jean-Louis Le Loutre*, and in 1752 they were living at Aulac (N.B.). Early in 1755 Pierre married Anne Gaudet, daughter of Augustin Gaudet and Agnès Chiasson of nearby Tintemarre (Tantramar). Anne was often called Nannette; hence Pierre came to be nicknamed Pierrot à Nannette. They were to have five sons and two daughters.
Cormier’s repute derives from the colourful tradition of his escape from the British on the eve of the Acadian deportation of 1755 [see Charles Lawrence*]. There is more than one version of this tradition, but the greatest credibility may be given that recorded in 1877 by the genealogist Placide Gaudet*, who had the advantage of consulting many of Cormier’s grandchildren. According to Gaudet’s account, Pierrot, taken prisoner with his brothers at Jolicœur (Jolicure, N.B.), was put aboard a Carolina-bound deportation vessel but slipped overboard the night before its departure. By creeping through the tall hay on shore he attained an aboiteau guarded by British soldiers and, when their backs were turned, clambered onto the butt of a timber over the water. Swinging from one butt end to another, he succeeded in crossing the aboiteau unobserved. On the other bank he again crept through the fields until he was able to break for the woods. After narrowly evading a band of soldiers tracking him with a dog, he arrived at an extent of water separating him from an Acadian encampment. Once recognized he was soon crossed over. Learning from these families that his own had fled the night before toward Quebec, Pierrot immediately left in search of them. The Cormiers were reunited at Sainte-Anne (near Fredericton, N.B.), where they remained until Robert Monckton*’s raids persuaded them to move to Kamouraska (Que.), likely in 1758.
According to another tradition, Pierrot, Jacques, and François Cormier were serving in the militia at the fall of Quebec in 1759. Subsequently they joined a French frigate at Pointe-Lévy (Lauzon and Lévis), lured with other young Acadians by promises of passage to France. After engagement with two British war vessels near the fîlets Jacques-Cartier, the frigate ran aground. Only about 60 of 160 crew members managed to swim ashore through the icy April waters, but these included the three Cormier brothers. This tradition likely refers to the encounter off Cap-Rouge between Jean Vauquelin* and Robert Swanton* in May 1760.
Pierre Cormier and Anne Gaudet resided at L’Islet (Que.) between 1761 and 1764, but about 1765 they returned to Sainte-Anne with his mother and four brothers. By July 1783 Pierrot had cleared 20 acres of a tract he had continuously occupied for 13 years. The Acadians of Sainte-Anne had not secured title to their farms, however, and grants to disbanded soldiers and loyalists were soon encroaching on what they considered to be their land. They deemed the small acreage reserved to them insufficient to support their families. Learning of vacant land on the west side of the Memramcook River, about 20 families removed there between autumn 1786 and summer 1787, including those of Pierre Cormier and four of his married children. Pierrot had meantime lost his Nannette, and his aged mother died during the trip.
The vacant land at Memramcook had been granted to Joseph Goreham* and then sold to Joseph Frederick Wallet DesBarres*. On 5 June 1792 the Cormiers and others presented a memorial to the New Brunswick government complaining of the “extravagant” demands of DesBarres’s assign, Mary Cannon*, and arguing that his land should be escheated and granted to them in consideration of the substantial improvements made during their occupation. Their efforts were thwarted by DesBarres and his agents, but it was not until after 1809 that they were turned out to find other places to live in the Memramcook valley.
AD, Charente-Maritime (La Rochelle), État civil, Beaubassin, 1712–48 (mfm. at CÉA). AN, Section Outre-mer, G1, 466, no.30. Arch. paroissiales, Saint-Thomas (Memramcook, N.-B.), Reg. des baptémes, mariages et sépultures (mfm. at CÉA). CÉA, Fonds Placide Gaudet, 1.28-6,1.33-7, 1.64-24; “Notes généalogiques sur les familles acadiennes, c.1600–1900,” dossier Cormier-3. PANB, RG 10, RS108, Petition of William Anderson, 1785; Petition of Charles Bickle, 1785; Petition of French inhabitants of Dorchester, 1809; Petition of John Jouett, 1785; Petition of John Ruso, 1785; Petition of Joseph Sayre, 1786. PANS, RG 1, 409. Tanguay, Dictionnaire, 3: 129. Clément Cormier, “La famille Cormier en Amérique,” L’Évangéline (Moncton, N.-B.), 8 août 1951: 4–5; 10 août 1951: 5. Placide Gaudet, “La famille Cormier,” Le Moniteur acadien (Shédiac, N.-B.), 22, 29 janv. 1885.
Cite This Article
Stephen A. White, “CORMIER, PIERRE,” in Dictionary of Canadian Biography, vol. 5, University of Toronto/Université Laval, 2003–, accessed October 22, 2014, http://www.biographi.ca/en/bio/cormier_pierre_5E.html.
The citation above shows the format for footnotes and endnotes according to the Chicago manual of style (16th edition). Information to be used in other citation formats:Permalink: http://www.biographi.ca/en/bio/cormier_pierre_5E.html
|Author of Article:||Stephen A. White|
|Title of Article:||CORMIER, PIERRE|
|Publication Name:||Dictionary of Canadian Biography, vol. 5|
|Publisher:||University of Toronto/Université Laval|
|Year of publication:||1983|
|Year of revision:||1983|
|Access Date:||October 22, 2014| | <urn:uuid:c22dafd1-f326-49fc-8cf8-ae82d6b19e94> | {
"date": "2014-10-22T08:16:09",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507446323.3/warc/CC-MAIN-20141017005726-00360-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9388383030891418,
"score": 2.75,
"token_count": 1567,
"url": "http://www.biographi.ca/en/bio/cormier_pierre_5E.html?revision_id=1611"
} |
Public opinion is the aggregate of individual attitudes or beliefs held by the adult population. It can be influenced by public relations and the political media. Additionally, the mass media utilizes a wide variety of advertising techniques to change the minds of people. A continuously used technique is propaganda. Public opinion is frequently measured using opinion polls that use the statistical method of survey sampling, which can still run the risk of bias. The results of opinion polls have themselves been found to influence public opinion, particularly with regard to political elections during which time the tide of public opinion becomes increasingly crucial. The formation of public opinion is considered of great importance in a free society, since there is an implicit assumption that the actions of the public will be guided by their opinions. Those in positions of authority invest considerable resources in efforts to sway public opinion in their favor, with results that may or may not prove beneficial to society as a whole.
The English term public opinion dates from the eighteenth century and derives from the French l’opinion publique, first used by Montaigne two centuries earlier in 1588. "Public opinion" developed as a concept with the rise of a "public" in the eighteenth century. This came about through urbanization and other political and social forces.
Adam Smith referred to it in his Theory of Moral Sentiments, but Jeremy Bentham was the first British writer to fully develop theories of public opinion. He reasoned that public opinion had the power to ensure that rulers would rule for the greatest happiness of the greater number.
Using the conceptional tools of his theory of Gemeinschaft and Gesellschaft, the German sociologist Ferdinand Tönnies argued that "public opinion" has the equivalent social functions in societies (Gesellschaften) that religion has in communities (Gemeinschaften).
The German philosopher Jürgen Habermas contributed the idea of "Public Sphere" to the discussion of public opinion. Public Sphere, as he argued, is where “something approaching public opinion can be formed.” This public sphere should have the attributes of universal access, rational debate, and disregard for rank. However, these three features that support the formation of public opinion have generally not been in place in western democracy. Thus, public opinion is highly susceptible to elite manipulation.
American sociologist Herbert Blumer proposed a somewhat different conception of the "public," as a form of collective behavior which is made up of those who are discussing a given public issue at any one time. Given this definition, there are many publics; each of them comes into being when an issue arises and ceases to exist when the issue is resolved. Blumer claimed that since people participate in a public to different degrees, public opinion polling cannot measure the public: an archbishop's participation is more important than that of a homeless or unemployed person. The "mass," in which people independently make decisions about, for example, which brand of toothpaste to buy, is a form of collective behavior different from the public.
Public opinion is a strange, fickle creature. Many things influence the constitution of public thought, sometimes seemingly at random. The mass media, word of mouth, economy, sense of community, advertising, and propaganda all have some effect on public opinion.
The mass media plays a crucial role in forming and reflecting public opinion: it communicates the world to individuals, and it reproduces modern society's self-image. Critiques in the early-to-mid-twentieth century suggested that the media destroys the individual's capacity to act autonomously - sometimes being ascribed an influence reminiscent of the telescreens of the dystopian novel by George Orwell 1984. Later studies, however, suggested a more complex interaction between the media and society, with individuals actively interpreting and evaluating the media and the information it provides.
Advertising and propaganda are two forms of altering opinion through the mass media. Advertising is a more overt method of doing so by promoting the strengths of certain products or ideas (be it for retail products, services, or campaign ideas). Propaganda is covert in its actions but also serves to subtly influence opinion. Propaganda is traditionally used more for political purposes while advertising has been used for commercial purposes.
People are not entirely immersed in mass media, however. Local communication still plays a large role in determining public opinion. People are affected by the opinions of those with whom they work, attend religious services, friends, family, and other smaller scale interpersonal interactions. Other factors of the formation of public opinion include the economy, the state of which has a great effect on people's happiness; popular culture, which can be dictated by the mass media, but can also develop as small social movements; and massive global events such as the terrorist attacks of September 11th, which shifted public opinion drastically.
Paul Lazarsfeld argued that the public forms its opinion in a two-stage process. He thought most people rely on opinion leaders. These opinion leaders are affected by world events and then pass opinions down to less active members of society. Lazarsfeld believed that the mass media was the main source of information for opinion leaders, but his theory may have missed the tremendous impact the mass media has over every citizen, not just a select few. Most people gather all of their information regarding current events from some outlet of the mass media be it large newspapers, television news, or the internet. The information these people retain is largely colored by the opinions of those presenting them. As a result, many people take on the opinions of their news presenters (although one could also argue that they gravitate to those broadcast outlets because of similar shared opinions).
The long-term consequences of the relationship between the mass media and the crafting of public opinion are significant. Continuing concentration of ownership and control of the media have led to accusations of a "media elite" having a form of "cultural dictatorship." Thus the continuing debate about the influence of "media barons" such as Rupert Murdoch. For example, the Guardian reported the Murdoch-owned HarperCollins' refusal to publish Chris Patten's East and West, because of the former Hong Kong Governor's description of the Chinese leadership as "faceless Stalinists" possibly being damaging to Murdoch's Chinese broadcasting interests. In this case, the author was able to have the book accepted by another publisher, but this kind of censorship may point the way to the future. A related, but more insidious, form is that of self-censorship by members of the media in the interests of the owner, in the interests of their careers.
The agenda-setting process is partly one which is an almost unavoidable function of the bureaucratic process involved in newsgathering by the large organizations which make up much of the mass media. (Just four main news agencies – AP, UPI, Reuters and Agence France-Presse – claim together to provide 90 percent of the total news output of the world’s press, radio, and television.) For example, in order to get into the news, events have to happen in places convenient for the newsgathering agencies, come from a reliable and predictable source, and fit into journalists’ framework of news values:
[J]ournalists, who are better seen as bureaucrats than as buccaneers, begin their work from a stock of plausible, well-defined and largely unconscious assumptions. Part of their job is to translate untidy reality into neat stories with beginnings, middles and denouements. … The values which inform the selection of news items usually reinforce conventional opinions and established authority. At the same time, a process of simplification filters out the disturbing or the unexpected. The need of the media to secure instant attention creates a strong prejudice in favor of familiar stories and themes, and a slowness of response when reality breaks the conventions.
The effects of the mass media on public opinion relate not merely to the way newsworthy events are perceived (and which are reported at all), but also to a multitude of cultural influences which operate through the mass media. Thus Lang and Lang claimed that "The mass media force attention to certain issues. They build up public images of political figures. They are constantly presenting objects suggesting what individuals in the mass should think about, know about, have feelings about."
Stuart Hall has pointed out that because some of the media produce material which often is good, impartial, and serious, they are accorded a high degree of respect and authority. But in practice the ethic of the press and television is closely related to that of the homogeneous establishment, providing a vital support for the existing order. But independence (such as of the BBC) is not “a mere cover, it is central to the way power and ideology are mediated in societies like ours.” Hall suggested that the public are bribed with good radio, television, and newspapers into an acceptance of the biased, the misleading, and the status quo. The media are not, according to this approach, crude agents of propaganda. They organize public understanding. However, the overall interpretations they provide in the long run are those which are most preferred by, and least challenging to, those with economic power.
Political advertising targets people with existing beliefs formed over long periods of time, which they are correspondingly reluctant to change, not on blank-sheet individuals. Moreover, the people who are most exposed to the media are those who know from the outset whom they will vote for, and are therefore least likely to be influenced by propaganda. Thus it may be that the notion that the people who switch parties during the campaign are mainly the reasoned, thoughtful people convinced by the issues, is completely unfounded.
Lazarsfeld claimed that the real influence on undecided voters is the "opinion leader," the individual whose own vote intention is secure, and who is well informed on the issues. Thus personal influence is primarily of greater importance than media influence, albeit using information initially acquired through the media. This may be related to trust and authority: both opinion leaders and the general public will select the evidence and information which supports their view, placing greater weight on more trustworthy sources. For the opinion-leader theory to be true, then, the general public would have to place greater trust in opinion leaders than in the media, so that the opinion leaders act as mediators between the public and the media, personalizing and making authoritative the information the media provides. Thus "… the person-to-person influence reaches the ones who are more susceptible to change and serves as a bridge over which formal media of communications extend their influence." From a psychological viewpoint, we may understand the personal influence of the opinion leaders in terms of group association: perceived as representing the group's desirable characteristics, other group members will aspire to the leaders’ viewpoints in order to maintain group cohesiveness and thus (indirectly) self-assurance. However, the separation of group leaders from the general public is arguably an over-simplification of the process of media influences.
Although such researchers did not ascribe significant direct influence over public opinion to the media, some findings indicate that it has such power over individuals. Lazarsfeld, Berelson and Gaudet noted in The People’s Choice that 58 percent of voting changes were made without any remembered personal contact and were very often dependent on the mass media, changes being widely distributed among those who changed their opinion. But this effect was ignored in their conclusion of little direct media influence. Other studies supporting the opinion leader theory failed to distinguish between opinion leading in consumer and political behavior. In political behavior opinion leading tends to correlate positively with status, whereas this is not the case in consumer behavior (choosing breakfast cereals and such items). So for political behavior, the general conclusion that the media merely fixes (confirms) people’s opinion is not supported.
Carl Hovland, using techniques from experimental psychology, found significant effects of information on longer-term behavior and attitudes, particularly in areas where most people have little direct experience (such as politics) and have a high degree of trust in the source (such as broadcasting). It should be noted that since social class has become an increasingly less good indicator of party (since the surveys of the 1940s and 1950s) the floating voter today is no longer the apathetic voter, but likely to be more well-informed than the consistent voter - and this mainly through the media.
Public opinion is measured by opinion polls—statistical surveys of public opinion using sampling. They are usually designed to represent the opinions of a population by asking a small number of people a series of questions and then extrapolating the answers to the larger group.
The first known example of an opinion poll was a local straw vote conducted by The Harrisburg Pennsylvanian in 1824, showing Andrew Jackson leading John Quincy Adams by 335 votes to 169 in the contest for the United States Presidency. Such straw votes—unweighted and unscientific—gradually became more popular; but they remained local, usually city-wide phenomena. In 1916, the Literary Digest embarked on a national survey (partly as a circulation-raising exercise) and correctly predicted Woodrow Wilson's election as President. Mailing out millions of postcards and simply counting the returns, the Digest correctly called the four following presidential elections.
In 1936, however, the weakness in the Digest method was revealed. Its 2.3 million "voters" constituted a huge sample; however they were generally more affluent Americans who tended to have Republican sympathies. The Literary Digest did nothing to correct this bias. The week before election day, it reported that Alf Landon was far more popular than Franklin D. Roosevelt. At the same time, George Gallup conducted a far smaller, but more scientifically-based survey, in which he polled a demographically representative sample. Gallup correctly predicted Roosevelt's landslide victory. The Literary Digest went out of business soon afterwards, while the polling industry grew quickly.
Gallup launched a subsidiary in the United Kingdom, where it correctly predicted Labour's victory in the 1945 general election, in contrast with virtually all other commentators, who expected the Conservative Party, led by Winston Churchill, to win easily. By the 1950s, polling had spread to most democracies. Nowadays they reach virtually every country, although in more autocratic societies they tend to avoid sensitive political topics. In Iraq, surveys conducted soon after the 2003 war helped to measure the true feelings of Iraqi citizens to Saddam Hussein, post-war conditions, and the presence of US forces.
For many years, opinion polls were conducted mainly face-to-face, either in the street or in people's homes. This method remains widely used, but in some countries it has been overtaken by telephone polls, which can be conducted faster and more cheaply. However, due to the common practice of telemarketers to sell products under the guise of a telephone survey and the proliferation of residential call screening devices and use of cell phones, response rates for telephone surveys have been plummeting. Mailed surveys have become the data collection method of choice among local governments that conduct a citizen survey to track service quality and manage resource allocation. In recent years, Internet and short message service surveys have become increasingly popular, but most of these draw on whomever wishes to participate rather than a scientific sample of the population, and are therefore not generally considered accurate.
There exist a number of potential inaccuracies when relying on opinion polls. These include sampling errors, nonresponse bias, response bias, poor wording of questions, and coverage bias.
Sampling error reflects the effects of chance in the sampling process. The uncertainty is often expressed as a margin of error. A poll with a random sample of 1,000 people has margin of sampling error of three percent for the estimated percentage of the whole population. A 3 percent margin of error means that 95 percent of the time the procedure used would give an estimate within three percent of the percentage to be estimated. The margin of error can be reduced by using a larger sample, however if a pollster wishes to reduce the margin of error to 1 percent they would need a sample of around 10,000 people. The margin of error does not reflect other sources of error, such as measurement error.
Nonresponse bias occurs because some people do not answer calls from strangers, or refuse to answer the poll, so poll samples may not be representative samples from a population. Because of this selection bias, the characteristics of those who agree to be interviewed may be markedly different from those who decline. If the people who do not answer have different opinions then there is bias in the results. Response bias occurs when respondents deliberately try to manipulate the outcome of a poll, for example by advocating a more extreme position than they actually hold in order to boost their side of the argument or give rapid and ill-considered answers in order to hasten the end of their questioning. Respondents may also feel under social pressure not to give an unpopular answer.
It is well established that the wording of the questions, the order in which they are asked, and the number and form of alternative answers offered can influence results of polls. On some issues, question wording can result in quite pronounced differences between surveys. One way in which pollsters attempt to minimize this effect is to ask the same set of questions over time, in order to track changes in opinion. Another common technique is to rotate the order in which questions are asked. Many pollsters also split-sample, a technique that involves having two different versions of a question, with each version presented to half the respondents.
Another source of error is the use of samples that are not representative of the population as a consequence of the methodology used, known as coverage bias. For example, telephone sampling has a built-in error because in many times and places, those with telephones have generally been richer than those without. Alternately, in some places, many people have only mobile telephones. In areas where pollsters cannot call mobile phones (due to it being unlawful to make unsolicited calls to phones where the phone's owner may be charged simply for taking a call), such individuals are not included in the polling sample. If the subset of the population without cell phones differs markedly from the rest of the population, these differences can skew the results of the poll. Polling organizations have developed many weighting techniques to help overcome these deficiencies, to varying degrees of success. Several studies of mobile phone users by the Pew Research Center in the U.S. concluded that the absence of mobile users was not unduly skewing results, at least not at the time of their research.
By providing information about voting intentions, opinion polls can sometimes influence the behavior of electors. The various theories about how this happens can be split up into two groups: bandwagon/underdog effects, and strategic ("tactical") voting.
A "Bandwagon effect" occurs when the poll prompts voters to back the candidate shown to be winning in the poll. The idea that voters are susceptible to such effects is old, stemming at least from 1884 where it was first used in a British political cartoon in the magazine Puck. It has also remained persistent in spite of a lack of empirical corroboration until the late twentieth century. George Gallup, Jr. spent much effort in vain trying to discredit this theory in his time by presenting empirical research.
The opposite of the bandwagon effect is the "Underdog effect." This occurs when people vote, out of sympathy, for the party perceived to be "losing" the elections. There is less empirical evidence for the existence of this effect than there is for the existence of the Bandwagon effect. Related to these effects is the "Boomerang effect" where the likely supporters of the candidate shown to be winning feel that he or she is safe and that their vote is not required, thus allowing another candidate to win.
The second category of theories on how polls directly affect voting is called strategic or tactical voting. This theory is based on the idea that voters view the act of voting as a means of selecting a government. Thus they will sometimes not choose the candidate they prefer on ground of ideology or sympathy, but another, less-preferred, candidate from strategic considerations. An example can be found in the United Kingdom general election, 1997. Then Cabinet Minister, Michael Portillo's constituency of Enfield was believed to be a safe seat but opinion polls showed the Labour candidate Stephen Twigg steadily gaining support, which may have prompted undecided voters or supporters of other parties to support Twigg in order to remove Portillo.
Jerry Mander, a former advertising executive wrote Four Arguments for the Elimination of Television, in 1977 where he took a negative view on the current state of mass media affected public opinion. Mander argued that television has become the new transmission mechanism for cultural influences, but that because of the nature and structure of the medium, it encourages a global homogeneity of culture based on American cultural influences. He gave as an example the introduction of television to the Northwest of Canada, populated mainly by Dene Indians and Inuit. Television led to the erosion of traditional values, pastimes, and occupations, and increased the desire of the young to learn English and acquire material possessions such as cars. The previous mode of cultural transmission - nightly story-telling - ended almost completely with the introduction of television, destroying “a bond of love and respect between the young and the old that was critical to the survival of native culture. Mander described television as “the instrument for re-shaping our internal environments – our feelings, our thoughts, our ideas and our nervous systems – to match the re-created artificial environment that increasingly surrounds us: Commodity life; Technological passivity; Acceleration; Homogenisation.” (emphasis in original).
Mander’s theory is related to Jean Baudrillard’s concept of "hyperreality." We can take the 1994 O.J. Simpson trial as an example, where the reality reported on was merely the catalyst for the "simulacra" (defined by Baudrillard as a copy of a copy which has been so dissipated in its relation to the original that it can no longer be said to be a copy, and therefore stands on its existing as another reality) or images created, which defined the trial as a global event and made the trial more than it was. Essentially, hyperreality is the concept that the media is not merely a window on to the world (as if a visiting alien were watching television), but is itself part of the reality it describes. Hence, the media’s obsession with media-created events.
For the future, the internet may play a role in reclaiming the public sphere for debate. The various means of communication available on the internet present the public with more outlets through which to express their opinions and for formerly marginalized groups of people to come together in central (virtual) locations, giving one voice to formerly disparate peoples. The internet offers newly focused discussion for these groups of people with the potential that their newfound single voices will be much louder in the public sphere. This could lead to the broaching of previously taboo or outlandish topics in mainstream culture and even the eventual shifting of that culture as a result.
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
Note: Some restrictions may apply to use of individual images which are separately licensed. | <urn:uuid:a0f1ec90-f8b8-40f2-89e8-b30c2e1cf2c9> | {
"date": "2015-09-03T02:31:55",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645298065.68/warc/CC-MAIN-20150827031458-00346-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9591780304908752,
"score": 3.609375,
"token_count": 4844,
"url": "http://www.newworldencyclopedia.org/entry/Public_opinion"
} |
“I preferred to do nothing without your consent in order that your goodness might not be by compulsion but of your own accord” (Phile. 14).- Philemon 14
Paul’s letter to Philemon is remarkable for a variety of reasons, one of which is the apostle’s reticence to come right out and command Philemon to do that which Paul wanted him to do. We know, for example, that Paul desired to see Onesimus and Philemon reconciled, with Philemon forgiving his runaway slave for past wrongs (vv. 15–16). Yet the apostle does not directly lay out all that this reconciliation would mean. Nevertheless, we are able to discern from the apostle’s words the direction that he hoped Philemon would take. In this case, it seems almost certain that Paul finally wanted to see Philemon release from bondage his new Christian brother.
Today’s passage points us to this conclusion. Paul refers to the “goodness” that he hoped to see from Philemon, a word that is perhaps better translated “good deed,” as in other English versions of the Bible. Several Jewish writers in Paul’s day, when they were talking about slavery, spoke of the manumission of slaves as a good deed that pious Jews could perform. Philo, the eminent first-century Jewish philosopher, for instance, wrote about this in The Contemplative Life. It is hard to know how acquainted Paul was with Philo’s thinking, but it is plain that he was well-versed in the Mosaic law, which provides for the manumission of a Jewish slave who has served for six years unless the slave desires to continue working for his master (Ex. 21:1–6). It is reasonable to assume Paul would have applied this principle to his own setting, believing that Christian slavemasters should eventually free their Christian slaves if the slaves wanted to go and if they could make it on their own.
Even if Paul never says it directly, the epistle before us makes it fairly clear that he wanted Philemon to release Onesimus. There appears to be several reasons why the apostle never makes his desire explicit, but one may be that he wanted Philemon to display Christian maturity and make the right decision without having to be told what was right, guided by the Spirit and motivated by love for God and neighbor. In his desire to do nothing without Philemon’s consent and without compelling him (v. 14), Paul uses language that alludes to making a choice after thoroughly considering the matter and settling upon a course of action in one’s heart. The apostle wants the right decision truly to be Philemon’s own, reflecting the formation of a true Christian character.
Today’s passage reminds us, as John Calvin says, that “no sacrifices are acceptable to God but those which are freely offered.” Because we still struggle with the presence of sin in our hearts and minds, we must daily be working to nurture godly motivations for our good works. Daily we should be praying that the Lord would fill us with a love for Him and our neighbors that would move us to do what is right without compulsion.
Passages for Further Study
1 Chronicles 22:19a
2 Corinthians 9:7
1 Peter 5:1–3
Permissions: You are permitted and encouraged to reproduce and distribute this material in any format provided that you do not alter the wording in any way, you do not charge a fee beyond the cost of reproduction, and you do not make more than 500 physical copies. For web posting, a link to this document on our website is preferred (where applicable). If no such link exists, simply link to www.ligonier.org.
Please include the following statement on any distributed copy: From Ligonier Ministries, the teaching fellowship of R.C. Sproul. All rights reserved. Website: www.ligonier.org | Phone: 1-800-435-4343 | <urn:uuid:e947904c-79e7-48ec-aecd-47e587de8cc3> | {
"date": "2015-01-25T18:37:36",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115861305.18/warc/CC-MAIN-20150124161101-00140-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9571441411972046,
"score": 3.078125,
"token_count": 843,
"url": "http://www.ligonier.org/learn/devotionals/free-consent/"
} |
The World Health Organization blames millions of deaths a year on inadequate fruit and vegetable intake (see also here, here). Thankfully, the 2010 USDA Guidelines introduced MyPlate, which caught up with the science and recommended a shift to a plant-based diet that emphasizes fruits and vegetables (see also here). Nine servings of fruits and vegetables a day are now recommended (see also here). But based on the 2005 Dietary Guidelines, 9 out of 10 Americans did not reach the minimum recommended daily serving for vegetables. In terms of nutrients per calorie, vegetables are the healthiest food source (greens especially). And variety is important because different vegetables have different phytonutrients (see also here). A healthy eating index can be calculated based on the phytonutrient content of your food (phytonutrients come from plants). Even a low carb diet, if based on plant foods, has been found to be health-promoting.
The World Cancer Research Fund’s official recommendation for cancer prevention is to choose a plant-based diet rich in fruits, vegetables, nuts, and beans (see also here, here). The cruciferous and allium families of vegetables may be the best for cancer prevention. Higher levels of green tea consumption in Asia are thought to be responsible for lower lung cancer rates, despite higher smoking rates. Green tea also induces a relaxed state of mind. Similarly, lignans (from flax seeds) are thought to be protective against breast cancer and may improve survival. And mushrooms may even be effective in the treatment of breast cancer.
Broccoli appears to protect against DNA damage. Sulforaphane, a phytonutrient produced by cruciferous vegetables such as broccoli, may inhibit breast cancer stem cells (see also here, here). It is likewise thought to prevent lung cancer metastases and increase bladder cancer survival rates. It also boosts the liver’s detoxifying enzymes. The safe upper limit for broccoli consumption is probably about 100 cups a day (see here, here, here). Luckily, growing your own broccoli sprouts is one of the most economical vegetable sources.
Purple cabbage (see also here), beets, and artichokes are very high in antioxidants (see also here). And the more antioxidants you eat, apparently the more you benefit. On average, plant foods have 64 times more antioxidants than animal foods (see also here). Antioxidants are also thought to increase stool size, which appears to decrease cancer risk. And the best cooking method for preserving the nutrients in cooked vegetables has been found to be microwaving. Cooking is preferable to raw for some vegetables as cooking can boost the absorption of certain phytonutrients.
Vegetables (especially greens) contain nitrates, which treat hypertension, high blood pressure, and protect against heart attacks (see also here, here, here, here). Kale has been found to boost the immune system. Kale juice also reduces bad cholesterol, boosts good cholesterol, and is rich in antioxidants. Carotenoids (found in greens such as kale) have been found to improve the appearance of skin (see also here). Lutein and zeaxanthin, phytonutrients protective against cataracts and macular degeneration, can be found in high levels in kale, collard greens, and carrots. Purslane has been found to effectively treat oral lichen planus. And beets have been found to improve athletic performance (see here, here, here, here, here, here).
There may be some obesogens in conventionally grown fruits and vegetables because some of the chemicals are used as fungicides (although relatively little compared to fish). The benefits of fruit and vegetable consumption well outweigh any risks. Kimchi, however, has been associated with an increased cancer risk. Moderate alcohol consumption by relatively healthy people appears to have no effect on health. And Juice Plus+ may just be an overpriced vitamin supplement that does not likely provide the same benefits as fruits and vegetables.
See also the related blog post: Using Greens to Improve Athletic Performance | <urn:uuid:5e753141-2ae6-4ba3-8fa6-89b0a7a793e0> | {
"date": "2016-08-26T19:57:19",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296571.15/warc/CC-MAIN-20160823195816-00136-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9454333186149597,
"score": 3.375,
"token_count": 823,
"url": "http://nutritionfacts.org/topics/vegetables/page/4/"
} |
Why display flags in this manner anytime? M.E. does not have an answer to that question, nor a clue to what such an awkward, display contraption actually cost taxpayers.
More importantly, of course, is what it cost the USS Cheyenne (SSN-773)
in unnecessary storage space and added safety considerations for whomever had to haul the clumsy contraption to the bridge and mount it in such a congested area.
What we do know, however, is a bit of history that makes a case why this flag arrangement shown is probably an ill-conceived idea.
British J-class submarines had three screws, which enabled a speed of 19.5 knots (surfaced) against German vessels of WW1. One boat, HMS J6, was sunk by another British warship. Why? Check the dopey flag arrangement on the Cheyenne and read on:
Note that the above sub is not even fully surfaced. What's the point of showing colors? We know some of you are thinking this photo was not taken in a combat situation (TRUE, this time); others think modern technology would eliminates the kinds of human errors (poor judgement is not uncommon during the chaos of war) that sunk J6 in actual war (FALSE).
At least one U.S. sub
was likely sunk (all hands lost) by its own navy: [USS] Rowell's commanding officer knew he was in a safety lane, but, having failed to get word [USS] Seawolf [(SS-197)] was behind schedule, believed there was no U.S. submarine nearby and chose to attack. Rowell [(DE-403)] established sonar contact on the submarine, which then sent a series of dashes and dots which Rowell stated bore no resemblance to the existing recognition signals. Believing this an attempt to jam her sonar, Rowell attacked with Hedgehog. The second attack was followed by underwater explosions, and debris rose to the surface.
Post-war examination of Japanese records shows no attack listed that could account for the loss of Seawolf
. While it is possible Seawolf
was lost to an operational casualty or as a result of an unrecorded enemy attack, it is more likely she was sunk by friendly fire. 62 officers and men as well as 17 Army passengers were lost. She was the thirty-fourth U.S. submarine lost in the Pacific War, the second (after Dorado
) to friendly fire.
Labels: USS Cheyenne (SSN-773) HMS J HMS Cymric Q Ship USS Dorado | <urn:uuid:6a1c6b7c-c461-4c6f-ab5e-e9eeee84933c> | {
"date": "2015-07-01T06:35:15",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094690.4/warc/CC-MAIN-20150627031814-00096-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9693810939788818,
"score": 2.859375,
"token_count": 536,
"url": "http://aquilinefocus.blogspot.com/2009/11/potentially-bad-fast-boat-idea.html"
} |
Increasing fuel efficiency and reducing CO2 emissions are not entirely dependent on the long-term development of alternative technologies. Automotive decision makers may be surprised to discover that existing technologies can increase fuel efficiency and reduce emissions today.
Infrared (IR) reflective film laminated into automotive glass is an ancillary load-reduction technology being used in more than 20 million vehicles. Of the 7 billion gal (26 billion L) of gasoline used each year to power air-conditioning, IR reflective glass, by reflecting the sun’s heat and maintaining a cooler cabin temperature, reduces A/C power consumption up to 20% and increases overall mpg by up to 5% while lowering emissions.
According to the U.S. Department of Energy (DOE), some 230 million vehicles in the U.S. consume those 7 billion gal of fuel annually to power A/C. This is equivalent to 5.5% of the total domestic light-duty vehicle petroleum consumption. Furthermore, A/C use can increase fuel consumption of high-efficiency vehicles by as much as 35%.
Though IR reflective glass has been offered since 1993 as an OEM option by Maserati, Mercedes-Benz, Volvo, Volkswagen, and others, it has been marketed to improve passenger comfort, not increase vehicle fuel efficiency. The focus is changing.
In a parked vehicle, the solar energy transmitted through windows represents 50% to 75% of the thermal energy entering the passenger compartment which is absorbed by the car’s interior mass. IR reflective glass used in DOE-tested vehicles reduced the cabin and seat temperatures by 34% and 35%, respectively, reducing the A/C usage required to reach a comfortable cabin temperature. In a moving vehicle, IR reflective glass also maintained a lower cabin temperature, similarly reducing the need for A/C.
A/C load reduction can decrease fuel consumption because the systems are designed to maximize capacity, not efficiency. Testing a Cadillac STS, DOE determined that by using IR reflective glass, solar-reflective paint, and solar-powered ventilation, the vehicle’s cooling capacity of 5.7 kW could be reduced by 30% to 4.0 kW while maintaining the same cool-down performance of 30 min. Simulation showed that reducing the A/C load by 30% also decreased A/C fuel consumption by 26%.
IR reflective glass and smaller A/C systems can benefit not only passenger vehicles but also large trucks and buses.
There are two approaches for making automotive glass that is IR reflective. The first approach requires that the glass manufacturer bond an IR reflective coating directly onto the glass itself. This technology, called sputter coating, involves processing glass through a vacuum deposition chamber, which creates high-density plasma of various heat-reflective metals. Atoms are deposited on the glass in thin transparent layers only 5 to 30 nm (0.2 to 1.2 µin) thick, or about 1/10,000 of the diameter of a human hair. Due to high capital and operational costs, automotive glass direct-coating capacity in the U.S. is limited, and differences in the performance, reliability, and price of IR reflective glass are significant.
As an alternative to conventional direct-coat IR reflective glass, Southwall Technologies’ sputters an IR reflective coating directly to clear polyethylene terephthalate (PET) film, eliminating the need to coat glass. This XIR coated film, which consists of transparent layers of indium, tin oxides, and noble metals, is available off-the-shelf to automotive glass manufacturers, who laminate it with uncoated glass to create IR reflective glass for OEM and aftermarket products.
Because IR reflective film is laminated into uncoated glass to meet a range of heat-rejection and visibility transmission standards, any automotive glass manufacturer can produce IR reflective glass without the need for expensive glass coating equipment. Coated film makes IR reflective glass cost-effective for low- to mid-volume model runs and for aftermarket replacement glass that otherwise could never justify the fixed costs associated with glass coating production.
Michael Johnson, Manager of Automotive Sales–Americas for Palo Alto, CA-based Southwall Technologies Inc., wrote this article for SAE Magazines. | <urn:uuid:7e3e299a-c866-44a6-9fd9-12871a95dc11> | {
"date": "2018-01-20T05:34:14",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889325.32/warc/CC-MAIN-20180120043530-20180120063530-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9220089912414551,
"score": 3.484375,
"token_count": 867,
"url": "http://articles.sae.org/6407/"
} |
The imminent departure of Energy Secretary Steven Chu highlights the political struggle President Obama has faced in trying to enact even a portion of the sweeping clean-energy and climate change agenda he envisioned when he ran for the White House in 2008.
Obama tapped the Nobel physicist to lead his fight to stop global warming and transform the nation’s energy economy but the broad climate bill the president hoped would become part of his legacy never made it through Congress and Chu later found himself embroiled in the political controversy over the bankrupt solar company Solyndra.
Several people close to the administration have said Chu was not planning to stay on in a second Obama administration. Bloomberg reported on Thursday that the secretary's departure could be announced as early as next week.
At the time Chu took the helm at the Energy Department, it actually played very small role in shaping energy policy. Its chief purview was to oversee the nation’s nuclear weapons arsenal. Obama's plan was to push a comprehensive energy and climate change bill through Congress, raising $150 billion for clean energy research over a decade. Chu was to oversee a transformation of the department into an international driver of clean energy development. And he did oversee the federal government’s single biggest investment in clean energy in history – a one-time shot of $35 billion from the 2009 stimulus law.
In 2010, the climate change bill died in Congress. And the following year, Chu’s star fell and he and the Energy Department became a political target when the solar company Solyndra, which received $535 million in stimulus funding, went bankrupt and became the subject of an FBI probe. But Chu also won high praise from all quarters for his central role in stopping the disastrous 2010 Gulf of Mexico oil spill. And while the ambitious plan to expand and transform the Energy Department into a juggernaut of clean energy research wasn’t realized, Chu brought in some of the greatest scientific minds of the country to help launch small but cutting-edge new clean energy research and development agencies, which have been hailed as some of the most innovative and important in the nation.
Chu was the first Nobel prize winner to be appointed to a U.S. Cabinet post. When he took office, he was already a star in the scientific community. He came to Washington from University of California, Berkeley, where he was a professor of physics and molecular biology and director of the Energy Department’s Lawrence Berkeley National Laboratory. When the new president declared that tackling global warming was a top priority, and that Chu was the man to take it on, the self-styled nerd was catapulted into a spotlight, and his stardom transcended the worlds of Washington and academia. In June 2009, Rolling Stone published a profile of him entitled “Secretary of Saving the Planet.”
Chu had almost no political experience when he came to Washington – a qualification that, at the beginning, often endeared him to lawmakers. He testified regularly before congressional committees and his warm but wonky style won plaudits even from Republicans, when he launched into enthusiastic explanations about energy and climate science.
When pressed on political questions by the press, Chu would sometimes quip, “I’m a scientist, not a politician!”
Susan Tierney, an assistant energy secretary in the Clinton administration, who worked with the Obama 2008 transition team to help prepare Chu for his new job, recalled the excitement over the new secretary.
“It’s not an accident that a Nobel prize winning scientist was chosen…the president had had a plank of wanting to be very much more scientifically based. Decarbonizing the energy supply was a big scientific goal. That was part of the excitement of bringing someone like him in,” she said.
Later, that lack of political experience would prove a challenge.
Obama’s first signature piece of clean energy legislation was his 2009 economic stimulus law, which injected $800 billion into the ailing economy – including $35 billion to the Energy Department for a massive jump-start in clean energy projects, such as wind, solar, geothermal and energy efficiency installations. The stimulus was both the biggest federal investment in clean energy in U.S. history, and an unprecedented sum for the agency, which typically has an annual budget of only about $28 billion -– of which only about $2 billion per year had previously gone to clean-energy funding.
The Obama administration saw the sum as a down payment on future clean-energy funding that would flow more freely once Congress passed a cap-and-trade law.
The money came with a deadline – it had to be spent in two years. In theory, the cash should have been a dream come true – but in practice, it created a logistical nightmare as the agency struggled to ramp up staff and resources in an area in which it had little expertise.
“It was an immense challenge to get that amount of money out the door in a Department that had never done it,” said Paul Bledsoe, an energy policy consultant and a senior energy official in the Clinton administration. “The agency just was not equipped to do what they were being asked to do.”
Among the most high-profile recipients of the new Energy Department funding was the California solar company Solyndra, which received a $535 million loan guarantee from the stimulus. In August 2011, Solyndra went bankrupt, and the FBI soon opened up an investigation against the company. House Republicans launched a high-profile probe of the Solyndra loan, and White House emails revealed that the administration had asked the Energy Department to hurry the process for approving the Solyndra funds, in order to make the company a poster child for the stimulus. Later, when it became clear that the company was struggling, the Energy Department restructured the loan rather than allowing the company to fail. And Republicans also took aim at the fact that Obama donor George Kaiser is the billionaire behind the George Kaiser Family Foundation, which has a subsidiary that was a major investor in Solyndra. House Republicans hauled Chu on the carpet to question and slam him over the deal, and Americans for Prosperity, the superPAC linked to the oil conglomerate Koch Industries, ran an ad charging, “Wealthy donors with ties to Solyndra give Obama hundreds of thousands of dollars. What does Obama give them in return? Half a billion in taxpayer money to help his friends at Solyndra, a business the White House knew was on the path to bankruptcy.”
To date, investigations of the Solyndra loan have not found evidence that the Energy Department was pressured to approve the loan to benefit political contributors. And the vast majority of the companies that received stimulus funding remained solvent. But the controversy tarnished Chu and the Energy Department –- and also froze future prospects for more federal clean energy funding.
Alternative Energy Lab
Despite the dust-up over Solyndra, Chu’s scientific chops shone at Energy - he won praise for the work he did to begin to transform the Energy Department into a leading clean-energy research and development facility in its own right. Chu used the stimulus money to start a cutting-edge alternative energy lab known as ARPA-E, or Advanced Research Projects Agency-Energy. The lab was modeled after the famous Pentagon DARPA (Defense Advanced Research Projects Agency) lab, a high-risk, high-rewards research program that helped birth technology like the Internet, the microwave, and stealth fighter planes. Today, ARPA-E is leading the way in funding energy research in fields from electrofuels (in which microbes harvested from the ocean absorb hydrogen and carbon dioxide to produce clean-burning oils) to batteries that could allow cars to travel 300 miles on one charge.
The lab has won almost universal praise from the scientific, commercial and even political communities. During the 2012 Presidential campaign, even Republican nominee Mitt Romney praised ARPA-E, and promised to continue funding for the program.
“There are some Secretaries of Energy that don’t leave a market – ARPA-E will leave a significant mark on the country,” said retired Sen. Byron Dorgan, D-N.D., who chaired the Senate panel that funded the Energy Department and now heads up the Bipartisan Policy Center’s energy program. If you fast forward 10 years from now, ARPA-E will be a permanent part of the landscape. It’s a very significant legacy.”
Point Man on Fukushima, BP
While Chu’s star fell during the Solyndra episode, he had also built up tremendous capital in the White House. He was Obama’s point man during the 2011 meltdown of Japan’s Fukushima nuclear plant, which triggered new oversight of the U.S. nuclear power fleet, and during the catastrophic 2010 Gulf of Mexico oil spill. Obama has credited Chu himself with designing the cap that ultimately plugged the gushing oil well (although other reports have said Chu chose the designs from thousands of submissions).
“He’s a brilliant scientist. But he is also real-world smart,” said former Congressman Bart Gordon, who was Chairman of the House Science Committee. “During the Gulf incident, the president called on Chu to do something. And he and [ARPA-E chief scientist] Arun Majumder put together a strike team and they went down there – and they were the ones who figured out how to cap that well.”
Republicans also praise his role in stopping the disaster. “His high point was his direct role in handling the Macondo problem,” said Bob McNally, a senior energy official in the George W. Bush White House, who now runs an energy consulting firm, The Rapidan Group. “His skill were applicable to the highest degree.”
A Less Muscular Role For Energy Department
It’s unlikely, in a second term, that the Energy Department will take on the muscular clean-energy engine role that Obama had once envisioned. But the small clean-energy research programs that Chu launched, particularly ARPA-E, do appear likely to keep going strong.
Among the top contenders to succeed Chu are Dorgan, and former Colorado governor Bill Ritter. Both are skilled politicians who have championed both clean energy and the boom in oil and gas extraction. The controversial extraction method known as “fracking” has benefitted both of their home states. Christine Gregoire, who this week wrapped up her tenure as governor of Washington state, has also been mentioned for the job. Gregoire is also being considered for secretary of the interior or head of the Environment Protection Agency.
Also on the list are Dan Reicher, who served as Clinton’s assistant secretary of energy efficiency and renewable energy, and from 2007 to 2011 was Google’s director of climate-change and energy initiatives. He currently heads the Center for Energy Policy and Finance at Stanford University, where Chu was once a professor of physics. Another possibility is John Podesta, chairman of the liberal think tank Center for American Progress, who was Clinton’s chief of staff. Their progressive pedigrees could be stumbling blocks to Senate confirmation but if either ended up in the job, they would continue the clean-tech work started by Chu.
“There is a real focus on energy R and D that had never been seen before,” said Josh Freed, director of energy policy at the Democratic think tank Third Way. “That evidence will endure beyond Steven Chu." | <urn:uuid:e43405e8-780c-493f-876a-c4c910a8961b> | {
"date": "2016-05-06T19:07:24",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461862047707.47/warc/CC-MAIN-20160428164727-00188-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9734464883804321,
"score": 2.578125,
"token_count": 2361,
"url": "http://www.govexec.com/technology/2013/01/education-energy-secretary-steven-chu/60753/?oref=ge-flyin"
} |
As part of UHPSI’s larger hydrological research program and community outreach programming, Megan Brakeley and Charlie Bettigole will spearhead a short series of snow science lessons at the Clearmont Elementary and the Arvada-Clearmont Junior High Schools during March of 2014. The two will work with local educators to develop lesson plans for students in several grades. In moving from classroom to field, they will guide students in measuring and mapping the extent of snow coverage at several spatial scales, in quantifying snow characteristics such as density and snow-water equivalence using transects, and in considering how snow pack in the mountains influences ground and surface water resources during the warm season. Students will gain exposure to Geographic Information Systems, GPS technology, snow science techniques and measurement equipment, and gain a broader understanding of how winter conditions drive the natural world at their own homes.
In preparation for their trip to Wyoming, Megan led the production of a short video (below) to introduce herself and Charlie, and to introduce the basic material that would be covered during their time at the school. After the workshop has been held, we’ll add addition information here or on our news feed. | <urn:uuid:b2c9d0d9-5f00-42d2-be97-2d59d4632391> | {
"date": "2017-08-20T15:23:11",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106779.68/warc/CC-MAIN-20170820150632-20170820170632-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9495128393173218,
"score": 3.046875,
"token_count": 245,
"url": "http://highplainsstewardship.com/snow/"
} |
Does unnessesary and dangerous c-style cast.
you can simply write: char * abc = "1ns";
But any attempt to change abc sting value like abc = 'T'; will lead to segfault.
Best variant: constchar * abc = "1ns";: it is safe and syntaxically correct.
(char*)something is a c-style cast. In C++ you should use static_cast<char*>(something)
strcopy() works fine when you are using it for initial variable ititialization. Beacause you know in advance both array and literal constant size. My code with it was just an example of what that code equivalent to.
1) We are declaring data variable points to as const. You still can change where pointer is point to.
2) Sorry, my bad. Drop the const: char abc = "1ns"; | <urn:uuid:dff918e5-b683-4c31-bba8-9299574bb953> | {
"date": "2014-10-22T08:01:19",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507446323.3/warc/CC-MAIN-20141017005726-00360-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8838574290275574,
"score": 2.921875,
"token_count": 191,
"url": "http://www.cplusplus.com/forum/beginner/95553/"
} |
The Net is the Automation.
|-> home > standardization > iso > tc 184 > sc5 > working group 2 > mms introduction >
Introduction to the
- This tutorial applies to MMS Version 1990 and 1999 -
© Copyright 2000. Karlheinz Schwarz*
MMS (Manufacturing Message Specification) is a messaging system for modeling real devices and functions and for exchanging information about the real device, and exchanging process data - under real-time conditions - and supervisory control information between networked devices and/or computer applications. MMS is an international standard (ISO 9506) that is developed and maintained by the ISO Technical Committee 184 (TC184) - Industrial Automation - of the International Organization for Standardization (ISO).
The object models and messaging services provided by MMS are generic enough to be appropriate for a wide variety of devices, applications, and industries. Whether the device is a Programmable Logic Controller (PLC) or a robot, the MMS object models, services and messages are identical. Similarly, applications as diverse as material handling, fault annunciation, energy management, electrical power distribution control, inventory control, and deep space antenna positioning in industries as varied as automotive, aerospace, petro-chemical, electric utility, office machinery and space exploration have put MMS to useful work.
We hope you will find it both interesting and informative and that it will encourage you to consider carefully the use of MMS as part of your strategy to adopt Open Systems standards in the development of your automation systems.
All Rights Reserved. Permission is hereby granted by the author for any individual or educational institution to copy and distribute this document freely provided that
DISCLAIMER: This document is provided "as is" without warranty of any kind. While the information contained herein is thought to be accurate at the time of publication, the author accepts no liability or responsibility of any kind for any use of this document.
The tutorial is a non-normative document, which means that it does not provide a definitive (from the ISO TC 184 SC5's point of view) specification of the MMS standard. The examples and other explanatory material in this document are provided to help you understand MMS, but they may not always provide definitive answers. In such cases, you will need to refer to the standard ISO 9506.
* The author has integrated some material into this tutorial from and granted by:
Client-Server and VMD. The Virtual Device represents the whole real device as seem from another device.
MMS Objects and Services. Description of Objects and Services.
MMS Context Management. Managing the context of communications between two MMS nodes on a network.
ASN.1 Introduction. Introduction into the use of ASN.1 | <urn:uuid:6b125fdf-0e26-4676-9165-eece956bacd4> | {
"date": "2017-11-19T02:52:38",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805265.10/warc/CC-MAIN-20171119023719-20171119043719-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.895758867263794,
"score": 2.5625,
"token_count": 565,
"url": "http://www.nettedautomation.com/standardization/ISO/TC184/SC5/WG2/mms_intro/"
} |
A Question of Choice -
Are you a student facing a multiple choice exam soon ? A teacher tempted to give your students multiple choice tests ? Got to pass a multiple choice test such as an IQ test or something similar? Do you know what you are getting yourself in to ?
Science in Action : Probability and statistics in Multiple Choice, or how to beat the odds and pass a multiple choice test effortlessly (or : a fair way of preventing your students from doing so).
Students often prefer multiple choice tests because they think it's easier then open questions. They count on the fact that they can recognize the correct answer when they see it, while formulating a correct and complete answer from scratch (or from memory) is conceived more difficult.
However, a skilled teacher can formulate the options of a multiple choice question so, that you really need to know your stuff in order to pick the only 100% correct and complete answer.
Some teachers prefer to give their students multiple choice exams because they're easy to mark : an answer is either correct, or not - they don't have to read the answer and evaluate it, they only have to compare the answers to their list of 'correct answers'.
However, this only goes if the questions and answers are well formulated. If the student that takes the test interpretes the question differently from what the teacher intended, he may give an answer that is correct in his interpretation of the question. The teacher may consider this answer 'wrong', because he does not realize a different interpretation of the question is possible, or because he assumes that the student lacks the knwoledge that would allow him to interprete the question in a different context.
In a highschool Physics exam, the teacher may ask questions and propose answers in an implicitely assumed Newtonian context, unaware that a student may have read and understood a few things about Einstein's relativity theory or about quantum mechanics. Questions about speed, position, acceleration, sense and direction of movements etc. can have several correct answers, depending on whether you take Newton's point of view, Einstein's curved space, or the weird world of quantum particles as a starting point.
Multiple choice allows the students to gamble. Even if they don't know the answer to a question, they know the odds (1 out of 3, 1 out of 4, ...) of picking the correct answer by chance. They may also reason that, over the whole test, there will be a more or less equal distribution of A, B, C, D, ... as correct answer : every answer has equal chance of being correct, so that if you're sure about some answers and count how many times the correct answer was A, how many times B, how many times C, etc., you can easily fill in the rest. Like : if 'answer C' clearly has not yet been choosen as often as A and B, you may prefer answer C for the questions you don't know, except for the questions where answer C is clearly nonsense.
In some tests, students may notice that the answers for each question are not really in random order, but that the person who designed the test, unknowingly, applied a system to provide answers to the questions. Maybe A and B are usually the correct answer, as if the teacher wrote 1 correct and 1 obvious wrong answer to each question he came up with, and added two (wrong) answers (C and D) afterwards. In this case, gambling between A and B for questions you can't answer gives better odds (1 out of 2) than random gambling (1 out of 4).
An other system that may have been applied to the answers is somthing like
So here, 'C' would be your preferred bet for answers you don't know the answer to.
Of course, this is all a bit 'twilight zone' : perhaps, as a student taking the test, you think you see a system, but there is none. Then all your guesses will be based on wrong assumptions. Or your teacher knows you'll be looking for a system so he pretends to be using one but doesn't, or orders the answers so that your understanding of the system will lead to incorrect answers. It becomes a ''who's fooling who?'' situation.
To avoid all this guessing and gambling, teachers will
It's this ''subtract points for wrong answers'' that is often misunderstood. Teachers often pick arbitrary, but rather high numbers as a deterrent for gambling, like ''each correct answer is worth 5 points, and I subtract 3 points for each incorrect answer, so if you're not sure about your answer, you better leave it blank in stead of guessing'', or even worse : ''a correct answer = 1 point, no answer = 0 points, a wrong answer is -1''
Sounds fair : if you don't guess, you'll just get all the points for the correct answers you've given. But what if you don't gamble, but still answer wrong : maybe you've miscalculated something, or remembered wrong, or so. People do make mistakes. And your wrong answer will make you loose points that you rightfully earned on other questions.
This does not sound so fair any more. Say that, out of 20 questions, you answer 13 correctly. With 5 points to each question, you'd pass the test with 65/100. Not too bad, that. However, you loose 7x3 = 21 points (7 wrong answers, 3 points lost at every wrong answer) on the wrong answers. Suddenly your score drops to 65-21 = 44/100, and you fail spectacularly.
On a multiple choice test where every question has 4 possible answers, completely random answers (i.e. a student ho doen't know a thing, and answers randomly to each question), will - statistically- result in a score of 25%. Statistically, that is : if, say 100 000 students gamble on this test, their average result will be a somewhat near 25/100.
The thing with averages is that they even out the extremes : among those 100 000 students, some will score 0 or 1/20, while some may score close or over 50/100 and pass the test. There's even a small change that a student guesses all answerts correctly.
A small example : consider a test with only 2 questions, and 2 possible answers (A or B) to each questions. When filled out randomly, there are 4 possible results :
When 100 students take this tests, and they all gamble (give random answers), 25 will have answered as in result 1, 25 others will have given result 2, etc. Now lets consider the outcome. If the correct solutiuon to this test was result 4, the 25 students who (by chance) answered 'B' to each question will score 100% (2 out of 2) on the test. 50 other students (25 with result 2, 25 with result 3) will score 50% : they've answered 'B' to 1 question. So if the minimum score to pass for this test was 50%, 75 out of 100 gambling students will pass. The probability of passing (by giving random answers) is 75/100.
It stands to reason that a teacher will not want to see 3 quarters of the class pass a test without studying, so he'll want to discourage gambling by subtracting points for incorrect answers. The point is : how much is fair ?
The easiest approach to this problem is : make sure that a student who gambles on all questions, will score - on average - 0 points.
Consider a question with 4 possible answers. A correct answer is worth 3 points. A gambling student has 1/4 chance to guess the correct answer, and 3/4 chance to guess wrong. Thus, if 1 point is subtracted for a wrong answer, this evens out : on a larger number of questions and/or a larger number of studens, the average score of the gambling students will be near 0 : for each chance to win 3 points there are 3 chances to loose 1 point.
The rule to apply here that the points to subtract for wrong answers is related to
The formula : with
Pi = points to subtract for a wrong answer
Pc = points to be earned with a correct answer
A = number of multiple choice answers to a question
Pi = Pc /(A-1)
It works best when all questions have an equal number of options, and the points to be earned with each question is the same for each question. If this is not the case, you can use the total of points to be won on the whole of the test, and the total of incorrect answers in the test. The average will work out roughly the same.
This is a first, rather straightforward approach to dealing with multiple choice : on average, a gambling student will score 0 points. That's fair to me.
It's also fair in a realistic scenario : a student will study, and take the test with at least some knowledge. Let's assume he answers 6 out of 10 questions, convinced that they are correct. If he leaves it at that, he may score 6/10, or 18 out of 30. If he guesses at each of the remaining questions, he's likely to guess 1 correct, and 3 wrong (if there's 4 options to a question). So he'll win 3 points, and loose them again with his wrong answers, and his score remains the same : guessing doesn't work. If he only answers 1 or 2 questions, there's 3 times more change to loose 1 or 2 points (so he'll fail) than there is to win 3 points.
As illustrated earlier, averages even out extremes. A statistician had to cross a river. Knowing the average depth was 2 ft (60 cm), he thought is was save to wade through it. He drowned. Even if the average score of the gambling students is near 0, there may be some who score far better than that. Maybe even enough to pass. That would depend on the number of questions, and the number of answers, as illustrated in the 2 questions, 2 answers case, where a student would have a 75% probability of passing the test by random guessing.
The question here is : how many different ways are there to complete the test, and who many of those result in a score that is high enough to pass.
In the simple example earlier, we saw that 2 questions with 2 answers each can be answered in 4 different ways. This is the 'population' : the total of situations to consider.
s = 'space', possible situations
Q = number of questions
A = number of possible answers to each question
P = A ^ Q (i.e. A to the power of Q)
So, as we've seen, 2 questions with 2 possible answers each give 4 possible sollutions, 3 questions with 2 answers each give 2 ^ 3 = 8 possible results, 3 questions with 3 answers each give 27 situations, etc. The probability to pass by guessing is the answer to the following questions :
The first part, ''How many questions do you need to answer correctly to pass ?'', is arbitrary. It is a given : the teacher (or the school, or the ministry of education) decides that you need to score 50%, or 60% or whatever, to pass. And the teacher may also decide how many points to win per question, and maybe also how many points you'll loose for an incorrect answer.
With these givens, you can deduct that
Q = number of questions
n = points needed to pass te test
t = points to be earned with a correct answer
f = points to subtract for a wrong answer
c = number of correct answers given by student
w = number of incorrect answers given by student
a student's score = the points earned with correct answers - points lost for wrong answers
score = c*t - w*f
where w = number of questions - correct answers = Q - c
so that, in order to pass, the folowing statement must be true
ct - (Q-c)f = n
Now use simple algebra to calculate c, the (minimum) number of questions a student has to answer correctly to pass the test, taking into account the points deducted for incorrect answers.
ct - (Q-c)f = n
=> ct - Qf + fc = n
=> ct + cf = n + Qf
=> c.(t+f) = n + Qf
=> c = (n + Qf) / (t + f)
As this will probably be a decimal (real, not integer) number, so it will need to be rounded up, because it represents the minimal number of questions to be answered correctly in order to pass.
c = INT ( (n + Qf) / (t + f) ) +1
We have found how many possible ways there are to solve a multiple choice test, and what the minimal score is to pass. Next question is : how often does this happen : how many of the randomly filled out tests will show a passing score.
To examen this question, lets have another look at a simple situation, like a test consisting of 2 questions, each with 3 possible answers. There are 3 ^ 2 = 9 ways this test can be filled out.
For the sake of argument, let's assume that the correct answers were A for question 1, and B for question 2. You'll find that in situation 2, that's the answers our gambler will give. This situation occurs once out of 9; the probability of scoring 100% correctly on this test (by pure guesswork), is 1/9 or 11.1 %.
Any other situation were you answer B to question 2 OR A to question 1, you score half of the points (and pass - we're not deducting points for wrong answers here). This happens in 4 situations (situations 1, 3, 5 and 8) out of 9.
Everything added up, there are 5 out of 9 situations where gambling results in a passing score of at least 1 out of 2 questions right. That's a probability of 5/9 or 55.5%. This means something like : if 1000 students take this test without knowing any answer, 555 will still pass. Those are betting odds - for the sudents. Note that, because we take a general approach to all possible situations, the odds remain the same for every combination of 'correct answers'.
Of course, no teacher will give a test with only 2 questions, 3 answers each. And as the number of questions increases, it gets more complex to write down all possibele situations, and count the 'winning' situations to calculate your odds (see graphs at the end of this paper). You need a formula. The teacher will also introduce a rule such as ''3 points for a correct answer, -1 for a wrong answer'', which makes counting the winning situations also rather complicated.
We've already deduced a formula to tell us how many answers need to be correct, and a formula that tells us how many situations there are to consider. The only thing we still need is a formula to show how many times a 'winning situation' will show up in the total collection of possible situations, because those are our odds of passing the test without knowing 1 answer.
We've established that, as we're considering every possible situation, it does not really matter which really are the correct answers. Say you've established that you need to have 3 answers right to pass a test of 6 questions. There are a number of ways to get at least 3 out of 6 right : You can get 3 out of 6, 4 out of 6, 5 out of 6, and 6 out of 6.
There's only 1 way to get 6 out of 6 : you have to get al questions right : 1-2-3-4-5-6.
To get 5 out of 6, there are already a number of ways : 1-2-3-4-5, 1-2-3-4-6, 1-2-4-5-6, etc. This is the subject of the mathematical theory of combination and permutation. The number of possible combinations and permutations can be calculated by factorials. The formula for the number of combinations of k elements out of n is
n! / ( k! * (n-k)! )
Since we are interesting in 'at least' k out of n, we have to repeat this for k+1, k+2, k+3 etc.until k=n, and add up the results. The theory of binomial probability teaches us that we also have to consider the chances to succes or failure on each question. E.g. when there are 4 answers given to each question, and only one is correct, there is 1/4 chance to success against 3/4 chances for failure. That's a lot of calculations, so we'll get a small program to do that for us. Most staticicians do.
Here's a graphical representation of how chances drop while the number of questions increases, for the 3 scenarions (without loosing points for wrong answers, loosing points in a fair way, etc). Especially at when the number of questions is limited, there is an additional disadvantage ad even and uneven numbers : e.g. to score 'at least half' on 3 questions, you need to score 2 out of 3, while with 4 questions, you need to score only 2 out of 4. It's obvious that the latter is easier. That accounts for the curves.
Your chance to guess r questions right on a multiple choice test with n questions, each with a answers given is
C(n,k) * p ^(k) * q ^(n-k)
C(n,k) = n! / ( k! * (n-k)! )
probability for success = p = 1 / a
probability of failure = q = (a-1)/a
Throw it all in a bowl, add a grain of salt, and you'll find that the probability to score 5 out of 10 on a multiple choice test with 4 options to each question is 7.8 %. Adding the disadvantage of points lost for wrong answers - say the fair deal : 3 points for a correct answer, -1 for a wrong answer - , reduces your chances to 0.35 %. Sound's OK to me; I mean, no student in his right mind is going to gamble 1:300 to pass a test. There seems to be no reason for even harder punishment, such as 1 point for a correct answer, -1 for a wrong answer (which reduces the probability of passing to 0.041 % or 1:2500, by the way), as we have demonstrated earlier that the 'average for gambling = 0 points', while it may not keep the students from guessing, it will keep them from gaining anything from it.
Furthermore, because of the exponential effect (total number of possible sollutions increases exponentially as number of questions increases), the probability of passing by gambling drops dramatically (less then 0.0001 %) when the number of questions reaches 15 or more (see graphs). So adding questions to the tests is, for the teacher, a better strategy than subtracting points for wrong answers.
Now, If I spend some time on studying, in stead of developing this theory on multiple choice tests and calculating the odds of passing without studying, I would pass that test for sure. I guess.
The probability of passing a multiple choice test depends primarily of the number of questions, because, as the number of questions increases, the possible solutions increases exponentially, and therefore your chances drop accordingly
While 3 or 4 questions with each 3 opr 4 possible answers still give rather good odds,
the number of possible sollutions explode between 15 and 16 questions : student is left without a chance : | <urn:uuid:03beb43f-50d4-45d7-b0ec-1c088232b370> | {
"date": "2015-04-28T19:48:37",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246662032.70/warc/CC-MAIN-20150417045742-00254-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.954123854637146,
"score": 3.15625,
"token_count": 4120,
"url": "http://users.telenet.be/mydotcom/upub/sia/mchoice.htm"
} |
Djibouti is a country in east Africa. In Djibouti, 95 percent of the people practice the Islamic religion. In Djibouti Religion, there is no constraint on the practicing of other religions. In the country about one percent of the people belong to other religion like the Roman Catholic, or to the Baha'i Faith or Protestant.
The only Djibouti Holiday that falls in the category of non-Muslim holiday is that of Christmas, which is celebrated in the country with glory. The religions of Djibouti also consist of minorities in Orthodox Greek and Protestant. Roman Catholicism is also practiced in Djibouti. In Djibouti, there is no state religion and the political parties do not support or oppose any particular religion.
The Somali society and the Afar believe in the Islamic faith. For the Catholics of the country there is one bishopric. There are as such no holy places for the Islamic people in the country. There are tombs of saints at Djibouti where the people go to show respect and pay homage.
Both Islamic and Christianity guidelines follow the belief that souls are immortal and they either go to heaven or move down to hell. The dead bodies of the persons following both Islamic religion and Christianity are buried under the ground.
To know more about Djibouti Religion the following links can be used: | <urn:uuid:25b89e11-2064-4380-ad44-abef0d30b5a5> | {
"date": "2017-01-18T20:05:27",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280319.10/warc/CC-MAIN-20170116095120-00450-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9236379861831665,
"score": 2.703125,
"token_count": 282,
"url": "http://www.mapsofworld.com/djibouti/culture/religion.html"
} |
It is vital to provide wound treatment right away until a healthcare professional can be seen. Nevertheless, most wounds or injuries that usually occur at home, school or in the workplace are not life-threatening and do not require further medical care once first aid measures are provided.
Common wounds at home
The usual wounds and injuries that occur at home include the following:
- Bites and stings – usually from animals or insects and even humans.
- Thermal injuries – caused by cold or hot objects and surfaces that came in contact with the skin such as a hot stove, boiling water or prolonged contact with ice.
- Skin penetrating wounds – include punctures from sharp objects or gunshot wounds
- Chemical injuries – caused by exposure to corrosive substances particularly with some home cleaning agents or chemicals in laboratories and industrial facilities.
- Blunt injuries – these include lacerations, concussions and abrasions
- Electrical wounds – burns on the skin or shock injuries due to contact with an electrical current that has high voltage
Importance of first aid
For a minor skin wound or life-threatening injury, all forms of wounds must be managed with wound treatment on site without any delay since it can save a limb or a life.
Providing first aid can control any bleeding, minimize the risk for infection or halt the spread of venom in the body in case of bites or stings.
Immediate care can also prevent the need for further medical care that can be costly as well as allow the wound to heal with minimal scarring.
Disclaimer / More Information
The information posted on this page on wound treatment at home is for learning and educational purposes only. To learn to manage wounds at home and provide proper wound care, register for first aid training at one of our training centers located throughout Canada. The training centers are location in Edmonton, Calgary, Vancouver, Surrey, Kelowna, Winnipeg, Toronto, Ottawa and Halifax.
Wound treatment at home
The application of topical antibiotics, covering wounds using a dry bandage and using pain medications to reduce the pain are useful for all forms of wounds. The specific measures on wound treatment include the following:
- Chemical injuries – rinse the wound site under running tap water until the chemical is thoroughly washed away and apply a clean bandage with or without an antibiotic cream.
- Thermal injuries – you have to remove the source and remove any clothing from the burned area and wash using cool water. An alternative is to place a cold compress until the pain settles and apply a clean bandage.
- Blunt injuries – rinse using tap water and clean with a disinfectant solution. Apply a topical antibiotic ointment and cover using a clean bandage.
- Stings and bites – irrigate the wound using running tap water and apply a disinfectant or topical antibiotic ointment. Cover with a clean bandage and seek medical care.
- Electrical injuries – turn off the power source if possible or move the individual away from the source using an insulated object such as plastic tools or a wooden stick. Minor electrical burns can be managed using cool water. Apply a mild antibiotic ointment after cleaning and cover the wound. | <urn:uuid:ff2f5f9f-b65f-44ed-841a-0d5fee40abcf> | {
"date": "2019-01-23T00:44:59",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583879117.74/warc/CC-MAIN-20190123003356-20190123025356-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9198015332221985,
"score": 3.421875,
"token_count": 639,
"url": "https://torontofirstaidcpr.ca/wound-treatment-at-home/"
} |
Some crops migrate north with warmer temperatures
Statewide, North Dakota's growing season since 1879 has lengthened by 12 days, says state climatologist Adnan Akyuz at North Dakota State University. Before the 1970s, corn just wasn't grown north of Bismarck. "Now we're seeing it all the way up to the Canadian border," he says.
According to Akyuz's calculations "16% of the total heat necessary to mature a corn plant in Fargo is due to the climate change."
Climate change a net positive
The United States has the largest amount of arable land of any nation, and climate change has only made it better.
"We have more area where production is limited by cold rather than by heat. So on net, we come off a bit better," McCarl says.
In North Dakota, that has contributed to an economic boom. Growers are getting harvests that would have been unimaginable years ago, says Mike Ostlie, an agronomist at the Carrington Research Extension Center of North Dakota State University, about 150 miles northwest of Fargo. "Used to be, every three to five years there was a crop failure. Now I don't know when that last happened."
Things are so good that the long drain of children moving off farms is beginning to reverse, says Steve Metzger, a farm management expert at Carrington. | <urn:uuid:52642998-d355-449b-a713-3c41a7e7e3f5> | {
"date": "2018-02-19T07:50:27",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812556.20/warc/CC-MAIN-20180219072328-20180219092328-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9684851765632629,
"score": 3.140625,
"token_count": 288,
"url": "http://tomnelson.blogspot.com/2013/09/change-net-positive-for-us-farmers-of.html"
} |
I just read a blog about how important it is to read science stories to your daughter. I completely agree! Pull out the nonfiction alongside the fairytales!
I also feel it is equally important or more important to encourage your daughters to be curious learners. Read the books, but also get them outside to enable them to have their own experiences with the world around them. Take them on walks in the woods. Show them how much fun a museum can be. Listen to all kinds of music. Providing your daughter with all of those experiences will help them conquer anything that comes there way. Teach them to question. And also show them that there is hardly ever one right answer (except in math). Even science doesn't answer everything.
Explore books of all kinds. Read the fairytales and come up with different endings. And yes, pull out the nonfiction, but don't just read it - explore it! | <urn:uuid:742e29db-9fbf-4da1-b41f-010a1b8e3fe9> | {
"date": "2017-12-11T22:58:43",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948514113.3/warc/CC-MAIN-20171211222541-20171212002541-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.976153552532196,
"score": 2.625,
"token_count": 187,
"url": "http://nancycastaldonaturespeak.blogspot.com/2015/02/raising-daughter-creating-curious.html?showComment=1423249016925"
} |
A research group led by Freiburg pharmacologist Prof. Dr. Klaus Aktories and their American colleagues have discovered the cell receptor for the toxin CDT of the bacterium Clostridium difficile. These germs often cause an inflammation of the colon in patients who have recently received a treatment with antibiotics.
The results of the study were published in the Proceedings of the National Academy of Sciences (PNAS).
Antibiotics damage bacteria of the normal intestinal flora, allowing Clostridium difficile germs to proliferate freely. The germs produce two typical toxins that cause an inflammation in the mucous membrane of the colon and destroy it. The consequences are diarrhea and psudomembranous colitis, an infection that is often lethal in older patients.
Due to the rapid proliferation of Clostridium difficile spores, their resistance to many disinfectants, and the frequent use of antibiotics, infections with Clostridium difficile are a major medical and hygienic problem in hospitals around the world. Particularly alarming is the appearance of so-called hypervirulant strains of Clostridium difficile, which produce more of these typical toxins, are resistant to antibiotics, and also produce a third cytotoxin (CDT) that attacks the cytoskeleton directly.
The Freiburg researchers and their colleagues from the Whitehead Institute, USA, identified the cell receptor of this additional toxin of particularly virulent clostridia. In order to find the receptor, the scientists used a new genetic procedure focusing on cancer cells that only possess one set of chromosomes. These cancer cells are susceptible to the CDT toxin of Clostridium difficile and die off from its poisonous effect. It was already known that this CDT toxin binds to a receptor on the surface of the cells, from where it can penetrate into the cell's interior by way of a complex procedure. However, the receptor itself was previously unknown.
The researchers succeeded in demonstrating that cells that are resistant to the CDT toxin are made susceptible to it by the receptor. The findings will enable scientists to develop new strategies to prevent the toxin from entering target cells.
- P. Papatheodorou, J. E. Carette, G. W. Bell, C. Schwan, G. Guttenberg, T. R. Brummelkamp, K. Aktories. Lipolysis-stimulated lipoprotein receptor (LSR) is the host receptor for the binary toxin Clostridium difficile transferase (CDT). Proceedings of the National Academy of Sciences, 2011; DOI: 10.1073/pnas.1109772108
Cite This Page: | <urn:uuid:f09d64bb-c46d-401c-95bb-fd6ca9d05134> | {
"date": "2015-03-04T08:41:32",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463460.96/warc/CC-MAIN-20150226074103-00088-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9201890230178833,
"score": 3.25,
"token_count": 561,
"url": "http://www.sciencedaily.com/releases/2011/09/110926094749.htm"
} |
World Vision says a one major problem that remains prevalent around the world is violence against women and girls, which is a particular problem either during an emergency or immediately in its aftermath.
“As the aid response to the Philippines disaster intensifies, and horrors continue to emerge from the war in Syria, the prevention of violence against women and children must be at the front of everyone’s minds. We know from experience working in emergencies for more than 60 years, that sadly, in emergencies children are at their most vulnerable. Studies show violence increases and it is often women and girls who suffer the most. And yet, protecting them is the most consistently under-funded aspect of emergency responses, receiving on average less than a third of what is needed.” said David Thomson, head of policy and programmes for child-focused aid agency World Vision.
Whilst governments and UN agencies debate how to prevent violence against women and girls during emergencies World Vision says efforts should focus on prevention and improving what it calls “survivor led accountability”
Mr. Thompson said the agency will know it is doing a good job when victims say so. Violence often worsens in response to lack of shelter, cramped conditions and a general lack of privacy. In many cases victims are simply too afraid to report violence or they do not know how. For this reason raising awareness and focusing on prevention is key.
As the world has been reminded with the impact of the typhoon in the Philippines and the continuing violence in Syria focusing on root causes will help prevent child abuse. | <urn:uuid:b55129e1-6a0d-433e-8a0a-45dcb02bf444> | {
"date": "2014-09-03T04:35:01",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00227-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9660448431968689,
"score": 3.203125,
"token_count": 313,
"url": "http://www.donation4charity.org/blog/page/2/"
} |
It was 1889 when one cyclist landed in a rubber factory, owned by two brothers Édouard Michelin and André Michelin in Clermont-Ferrand, France. Cyclists tyre was glued to the rim and needed to get repaired, it took three hours to remove the tyre from the rim and then they had to leave the tyre overnight. The next day, Édouard Michelin took the repaired bicycle into the factory yard to test. After only a few hundred metres, the tyre failed.
Édouard was enthusiastic about the pneumatic tyre, and he and his brother worked on creating their own version, one that did not need to be glued to the rim.
Michelin was incorporated on 28 May 1889.
In 1891 Michelin took out its first patent for a removable pneumatic tyre which was used by Charles Terront to win the world’s first long distance cycle race, the 1891 Paris–Brest–Paris. In 1934, Michelin introduced a tyre which, if punctured, would run on a special foam lining; a design now known as a run-flat tyre (self-supporting type).
With this Michelin developed a key innovation in tyre history.
1 September 2008, Michelin is again the world’s largest tyre manufacturer after spending two years as number two behind Bridgestone. Michelin produces tyres in France, Spain, Germany, the USA, the UK, Canada, Brazil, Thailand, Japan, Italy and several other countries and as per 2011 report Michelin is one of the three largest tyre manufacturers in the world along with Bridgestone and Goodyear.
Michelin participation in MotoGP
Michelin participated in MotoGP from 1972 to 2008. They introduced radial construction to MotoGP in 1984, and multi-compound tyres in 1994. They achieved 360 victories in 36 years, and from 1993 to 2006, the world championship had gone to a rider on Michelins. Due to riders choosing Bridgestone over Michelin they had to withdraw from the series altogether.
After these many years of their absence they finally have confirmed their return to MotoGP as of the 2016 season as official tyre supplier after Bridgestone’s withdrawal from the series at the end of the 2015 season.
The spectators will see the coloured strips around the edges of the tyre which will tell the spectator of which compound the tyre is made of, as well will help to differentiate wet and dry.
For more information about Michelin tyre click here: Michelin Tyres | <urn:uuid:a1100fef-3147-4df5-b5ce-1a9f9e5fd175> | {
"date": "2019-09-20T18:23:40",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574058.75/warc/CC-MAIN-20190920175834-20190920201834-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9737319946289062,
"score": 2.609375,
"token_count": 523,
"url": "https://www.motorcyclediaries.in/motography/rider-stories/brand-invented-removable-tire-achieved-360-victories-motogp/"
} |
Information from a variety of instruments – be it in-situ or satellites – collected over decades show us how various aspects of the Earth system have changed over time. ‘Reanalysis’ merges these measurements with numerical models to improve our assessment of the changing climate.
In addition to climate monitoring, the merged information can be used for a variety of applications such as hydrology, renewable energy, the insurance sector, extreme weather events or agriculture.
The latest developments in data reanalysis, together with its scientific and economic gain, is the focus of the 5th International Conference on Reanalysis being held in Rome this week.
Organised by ECMWF’s Copernicus Climate Change Service (C3S) and the World Climate Research Programme (WCRP), the weeklong conference brings together some 240 experts in reanalysis and representatives from the user community to review current reanalysis activities and discuss user needs.
“Bringing together research and services is key,” said Michel Rixen, Senior Scientific Officer at WCRP.
“WCRP coordinates climate research at the international level to ensure that the best observations and models are combined into robust reanalysis. Part of the coordination includes sharing a massive amount of observations, reanalysis and climate simulations with the scientific community.”
Climate reanalyses are used by a wide range of stakeholders, including the scientific community, public organisations and private sector entities in need of climate information – from research and practical applications to climate services and policy-making.
The UN Global Framework for Climate Services was established in 2011 to reduce the vulnerability of society to climate-related hazards through better provision of climate services, and C3S is Europe’s contribution to this framework.
“C3S aims to provide authoritative climate information to support environmental policies at both European and international levels. It is essential that the service relies on the state-of-the-art, underpinning science to provide credible and high-quality information,” said Jean-Noël Thépaut, Head of C3S at ECMWF.
“The conference this week brings together reanalysis experts from around the world, and the outcome will certainly feed into the high-quality products that we expect from C3S.”
Follow the conference via live webstream at: https://climate.copernicus.eu/follow-conference
Join in the conversation on Twitter: #ICR5 | <urn:uuid:e16faf02-bfdd-403c-a1a2-32ab5c9c22f1> | {
"date": "2019-01-17T06:47:19",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658844.27/warc/CC-MAIN-20190117062012-20190117084012-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9191602468490601,
"score": 2.578125,
"token_count": 505,
"url": "https://climate.copernicus.eu/index.php/reanalysis-conference-kicks"
} |
A National Endorsement for Competency-Based Education and Student-Centered Learning
Congress repealed No Child Left Behind last week—along with its singular focus on high stakes testing as a means to measure student success. This is momentous and opens the doors for a new era of personalized, student-centered learning in the United States under the reauthorization of the 1965 Elementary and Secondary Education Act.
The US Senate passed bipartisan legislation known as the Every Child Succeeds Act in a vote of 87-10, with the US House of Representatives voting 381-41, rolling back federal mandates and allowing for greater state control over student learning and accountability for performance. President Barack Obama signed the bill into law on December 10th.
Instead of the federal government’s reliance on high-stakes testing to police school districts, the new legislation empowers states to design their own “college and career ready” standards to measure and assess success in the classroom and administer intervention protocols when those standards cannot be demonstrated proficiently.
Schools will still be held accountable for success and will have to report out annually based on disaggregated data identifying students’ race, income and disability status. Performance-based testing will still be required to be administered in certain grades, and states will need to ensure that at least 95% of the student population participates.
The bill gives states the authority to design assessments for student-centered learning. In the state of NH, schools are already utilizing performance-based assessments to demonstrate accountability for student learning and college and career readiness. The bill emphasizes training and funding for early childhood education as well as integrated technology and innovation to address the digital equity gap that prevails across the United States.
Virginia Barry, Commissioner of Education, has been working for years with state and local officials to write performance-based standards in core subject areas and design performance-based assessments that focus on real-world application and authenticity in their measure of student performance.
“This is a huge turning point in our country,” Barry said. “It moves the focus to the children. … This is a great opportunity to be sure students are growing and learning the competencies they need.”
How New Hampshire is Filling in the Gaps
New Hampshire designed its own rigorous Performance Assessment in Competency Education (PACE) pilot that requires participating schools to adopt competencies written by the state. They work with state officials in the design of rigorous, local performance assessments that provide opportunities for students to demonstrate learning in an authentic, personalized and measurable way.
Competency-based education (CBE), has gained momentum nationally in recent years as school districts struggled under No Child Left Behind to document actual student learning, not just testing. CBE uses standards to measure student learning with a focus of becoming college and career ready. The trend does not stop in K-12 schools and is exploding in higher education as well. Inside Higher Ed recently reported that there has been a nearly 1200% growth rate in the last year as 52 colleges and universities reported moving to competency-based education in 2014 and over 600 colleges and universities report moving to CBE in 2015.
Why Legislation is Only a Start
With the nation looking to enable student-centered learning through competency-based education, districts are finding that their move to a proficiency system requires more than just legislation—they also need innovation and the technology to support it. Students, parents, teachers and administrators can expect more transparency when assessment no longer focuses on traditional multiple-choice quantitative data and on greater empirical evidence that results from highly individualized performance-based assessment.
Traditional learning management systems that most schools use to keep track of student performance do not meet the needs of such a robust shift to the approach created at the state level and provisioned by the Every Child Succeeds Act. This more personalized, competency-based model cannot be successful without Learning Relationship Management (LRM). LRM allows for real-time measurement of student progress as they work towards mastery of competencies and provides for transparent and effective feedback to students as they complete performance-based assessment.
This is an exciting time for education. The Every Child Succeeds Act is a national endorsement for competency-based education that highlights the need to create learning environments that support student-centered learning. But this is only the first step, the opening of a new door. As our models of education drastically change for the better, states need to enable their schools to succeed with the right training and tools—including educational technology that promotes transparency and increased engagement, graduation readiness and strengthens relationships through more personalized learning. | <urn:uuid:254f47bc-61ef-4906-8ef3-83156361d09d> | {
"date": "2019-04-24T11:48:30",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9566318988800049,
"score": 2.625,
"token_count": 936,
"url": "http://motivislearning.com/insights/no-child-left-behind-repeal/"
} |
|Slow Dynamics of Orbital Domains in Manganite|
At the ALS, an international team of researchers has used low-energy coherent x rays to extract new knowledge about the correlated motion of groups of self-assembled, outer-lying electrons in the extremely complex electronic system found in manganites. The manganite family of materials has puzzled physicists for years by defying standard models for the motion of electrons in crystals. By controlling the properties of the incident x rays, the researchers were able to map the complexity of a "half-doped" manganite into a far-field speckle diffraction pattern to study the manganite's domain dynamics. Their results suggest the material undergoes a transition characterized by the competition between a pinned orbital domain topology that remains static and mobile domain boundaries that exhibit slow, temporal fluctuations.
One conundrum involving the manganites is colossal magnetoresistance, a hot topic in correlated electron physics with promising applications in electronics, energy conservation, and nanodevice switching. Scientifically, this family of materials is also exciting because of the enormous range of phenomena it exhibits. Charge, orbital, lattice, and magnetic order are all intertwined to create an array of patterns, all interrelated in a nontrivial way. Orbital ordering occurs when specific electron wave functions self-organize. Interactions between these electron shells determine the patterns formed by the orbitals and, among other things, will even affect the system's magnetism.
To perform this study, the researchers used the coherent magnetic scattering endstation at ALS Beamline 12.0.2, which is specifically designed to deliver "laser-like" x rays that propagate in unison, like musicians in a marching band. It includes an 11-flanged vacuum chamber (dubbed the "flangosaurus" after its resemblance to a prehistoric creature) that allows signal detection over a broad range of scattering angles.
These coherent x rays are also resonant. This means they are tuned precisely to a specific absorption edge of a particular atomic species in the crystal to enhance the sensitivity to the local environment. In other words, by changing the energy of the x rays to particular values, they can "see" things that are invisible at all other energies.
The researchers measured a diffraction peak that is due solely to the orbital ordering of the d-electron shells in a single crystal of half-doped manganite, Pr0.5Ca0.5MnO3. Because of the coherent illumination, constructive and deconstructive interference occurs between waves scattered from different domains, and the peak exhibits a "speckle" pattern, a unique characteristic pattern that acts as a fingerprint of the microscopic domain structure. Just as it is not easy to directly connect the fingerprint of a person to the face, extracting the domain structure from the speckle pattern is not straightforward. However, to better understand the orbital domain physics, one can measure the dynamics of the domains by noting that any small changes in this unique speckle pattern indicate changes in the domain configuration, the same way that a different fingerprint uniquely correlates to a different person.
Overall, the speckle patterns did not change significantly over time. However, near a transition temperature of about 232 K, small-amplitude fluctuations "turned on" before the domains completely melted. The domain walls are pinned except for close to the transition, where they execute small-amplitude motion. This behavior contrasts with that of most systems, where things usually behave in one of two ways: fluid-like, where everything is dynamic, or solid-like, where everything is static. Here a mixture of the two was found. Another surprising finding was that the fraction of the sample that was dynamic moved quite slowly, slower than typical electron domain behavior in other types of systems. The cause is unclear, but something is impeding the motion of the domain walls, up to a time scale on the order of several minutes. These slow dynamics may even be the reason the manganites form these disordered states in the first place.
Research conducted by J.J. Turner (University of Oregon and ALS), K.J. Thomas and J.P. Hill (Brookhaven National Laboratory), M.A. Pfeifer (La Trobe University, Australia), K. Chesnel (National Pulsed Magnetic Field Laboratory [LNCMP], France), Y. Tomioka and Y. Tokura (National Institute of Advanced Industrial Science and Technology, Japan), and S.D. Kevan (University of Oregon).
Research funding: U.S. Department of Energy, Office of Basic Energy Sciences (BES), and the National Science Foundation. Operation of the ALS is supported by BES.
Publication about this research: J.J. Turner, K.J. Thomas, J.P. Hill, M.A. Pfeifer, K. Chesnel, Y. Tomioka, Y. Tokura, and S.D. Kevan, "Orbital domain dynamics in a doped manganite," New J. Phys. 10, 053023 (2008). | <urn:uuid:7c750411-1d2a-4916-be25-2c1947e8d31e> | {
"date": "2015-09-02T08:33:58",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645258858.62/warc/CC-MAIN-20150827031418-00170-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.918944239616394,
"score": 3.375,
"token_count": 1050,
"url": "http://www-als.lbl.gov/index.php/research-areas/physics/195-slow-dynamics-of-orbital-domains-in-manganite.html"
} |
German helmet Information, Historical facts and dates
As a German helmet collector I explored the web and the literature to knowledge. There is a lot out there. But compact easy to read information is scarce. So I decided to make a sort of recapitulation myself.
The German word for “steel helmet” is “Stahlhelm”. In 1916 the Imperial German Army began to replace the Pickelhaube with the Stahlhelm. The term Stahlhelm not only refers to the generic steel helmet but more specifically to the well known German design. The Stahlhelm has become an instantly recognizable icon for military imagery and the second World War. The three (combat) models developed in the NS period are he M35, the M40 and the M42.
Use the menu for more information about the German helmet
If you came here by Google and you want to read more. Then use the menu of this side (all about German helmets). | <urn:uuid:64ade3b4-1582-4cfb-b883-e8b389f17a5a> | {
"date": "2018-07-17T03:53:17",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589557.39/warc/CC-MAIN-20180717031623-20180717051623-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9275310635566711,
"score": 2.875,
"token_count": 197,
"url": "http://www.feldgrau.nl/?page_id=88"
} |
Cloud computing refers to the concept of sharing software, resources, and information via a network connection such as the Internet. In a cloud structure, the cloud servers save the end-users information, data, and can serve the service application(s) as well reducing the need for storage space on client computers. End-users have the freedom to access information wherever one can obtain an Internet connection and do not have to worry about upgrading service applications with the latest version to be released. This allows users to edit files such as PowerPoint presentations, or documents on mobile devices or tablets without having to have specified software installed on the computing device being used while away from home or the office
Cloud computing offers businesses a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extending IT’s existing capabilities. Most Cloud services fall into two basic categories. | <urn:uuid:08b37b82-b1be-45b4-a814-cf5e861f3cda> | {
"date": "2019-01-19T08:51:19",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662863.53/warc/CC-MAIN-20190119074836-20190119100836-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.889049232006073,
"score": 3,
"token_count": 204,
"url": "https://working-technology.com/glossary/cloud-computing/"
} |
"Digital citizenship" is an umbrella term that covers a whole host of important issues. Broadly, it's the guidelines for responsible, appropriate behavior when one is using technology. But specifically, it can cover anything from "netiquette" to cyberbullying; technology access and the digital divide; online safety and privacy; copyright, plagiarism, and digital law, and more. In fact, some programs that teach digital citizenship have outlined no less than nine elements that intersect to inform a well-equipped digital citizen. It's an overwhelming array of skills to be taught and topics to explore.
But while there is much talk about the importance of teaching digital citizenship in this information society, not many are sure what that really looks like. What tools are out there for teaching it? And how in the world can teachers make time in an already overcrowded curriculum? This playlist is intended to offer tools to make the case that it's critical to teach this, and then launchpad videos to seed classroom discussions once you've carved out that precious time.
Video Playlist: Teaching Digital Citizenship
Watch the player below to see the whole playlist, or view it on YouTube.
- What is Digital Citizenship? (05:19)
This succinct video from BeCyberwise describes why digital citizenship is so important. Includes a clip of Howard Gardner speaking about his GoodPlay project and a peek at Common Sense Media's comprehensive Digital Citizenship curriculum.
- Be a Digital Citizen (02:13)
Need a quick and simple clip to introduce the concept of digital citizenship to parents or students? This video gives some statistics about internet and social media usage and then describes the many ways in which we are all affected on a daily basis by our technology use.
- Go Figure 2 -- Online Safety Version (04:15)
Produced by the international Family Online Safety Institute (FOSI), this animated video zips through a flurry of statistics about young people and online safety. It paints a powerful picture of how important it is to get these conversations started.
- Out Of Your Hands (01:06)
Watch in dismay as an inappropriate photograph travels from one poor naive teen girl to an online stalker, ending with the admonition "Think before you post." This interactive series of videos was produced by public service announcement (PSA) veterans the Ad Council.
- TEDxUIUC - Sherry Turkle - Alone Together (16:24)
Thought-provoking TED Talk by MIT professor Sherry Turkle, who has spent much of the last 30 years researching how people relate with technology. It's a long clip at sixteen minutes, but would make a fabulous discussion starter for a lesson on how we function in this culture of connectivity.
- Digital Dossier (04:24)
This fascinating narrative follows the digital journey of the fictional "Andy" from pre-birth to adulthood by tracking his "digital footprint." It can be illuminating to stop and think about how much personal information we're putting out on the Web. Produced by the Digital Natives Project.
- YouTube Digital Citizenship Curriculum (01:35)
Another option for free digital literacy curriculum is this one developed by Google and YouTube, who have strong motivations for training young people to be savvy tech users. If YouTube is blocked in your school, please do check out YouTube for Schools, a portal that allows your school to access white-listed educational YouTube content safely and securely.
- Invasion of the Data Snatchers: How To Protect Your Online Privacy (04:02)
This animated video from Reputation.com manages to be at once cute and menacing. Though geared towards adults, it's a great wake-up call about online privacy issues, and although they're ultimately pushing a paid product, they have some good free resources and privacy protection tools.
- Our Kids' Connected Culture - Overview for Parents and Teachers (05:56)
This is a great video from Common Sense Media. The MySpace references make it feel little dated, but the issues the teen girl is talking about are just as typical today. It's nice to hear directly from young people about their experiences, and there is a section of tips at the end that are really useful. Also worth watching: this video on their cyberbullying curriculum.
- Digital Citizen (01:00)
Here's a great idea for a classroom project that teaches about copyright and usage issues while also exploring the themes of digital literacy: have kids create a slideshow video with Creative Commons images about the big questions of digital citizenship.
- Netiquette - Playing Nice on the Internet (03:20)
Look past the slightly cheesy opening -- this video is a tidy roundup of the basics of good netiquette, something all of us could use a refresher on. Did you know the rules of netiquette pre-date the Web as we know it?
More Resources for Learning About Digital Citizenship
While we haven't solved the problem of finding time in the schedule to teach these essential topics, there is a wealth of great free resources to be found -- many of them aligned to standards, either the Common Core ELA standards, or ISTE's NETS, or both. Whatever the angle you'd like to focus on, you should be able to find some strong materials to supplement your work. Here's a list of resources, organizations, and reading materials to help you get started.
- Edutopia's Digital Citizenship Resource Roundup
- #digcit hashtag on Twitter
- The Nine Elements of Digital Citizenship
- Digital Literacy and Citizenship Classroom Curriculum (Grades K-12) from Common Sense Media
- Curriculum: Understanding YouTube & Digital Citizenship (Grades 7-12) from Google in Education
- Cable in the Classroom's Digital Citizenship Resource Page
- Cyberwise Website
- Netsmartz Teacher Page from the National Center for Missing & Exploited Children
- Born Digital Video Series from Youth and Media's Digital Natives Project
- Digital Community, Digital Citizenship by Jason Ohler (he also offers a Digital Citizenship resources page) | <urn:uuid:3d510341-2c17-4592-8538-279daab94480> | {
"date": "2015-05-23T10:47:17",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927458.37/warc/CC-MAIN-20150521113207-00189-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.914391040802002,
"score": 3.734375,
"token_count": 1242,
"url": "http://www.edutopia.org/blog/film-festival-digital-citizenship"
} |
Where else but the annual SAMPE gathering can you find not only the latest developments in composites and other advanced materials, but also new ways to join, design, and fabricate them? Here's a sampling of technologies from this year's exhibition, which took place in Long Beach, CA:
Materials for the heavens and Earth
NASA highlighted new materials technologies it has made available for license. For thin-film applications, NASA's Glenn Research Center has synthesized UV-curable polyimides with glass transition temperatures as high as 300F. NASA Langley Research Center has come out with an environmentally friendly polyimide for use as a matrix resin. Marshall Space Flight Center has developed a process to make layered composite tanks and pipes to store "aggressive" fluids such as cryogenic fuels or caustic fluids. These storage vessels consist of four layers: a corrosion-resistant liner fabricated by thermal spray or electrodeposition; a structural layer of woven graphite and epoxy; an insulating foam layer; and an impact fighting layer of Kevlar or impregnated glass outer coating. The resulting tanks weigh in at 25% lighter than a comparable aluminum structure and 20% lighter than those made from aluminum or fiberglass.
... BP Amoco Polymers Inc. has developed EnerGraph DBX, a series of ultra-high crystallinity graphites for use in lithium battery anodes. Suitable for both liquid or polymer-thin-film battery systems, anodes using EnerGraph reportedly generate 30% less heat and exhibit 20% higher activation energy than anodes using non-fibrous graphite.
... BP Amoco has also expanded its line-up of pitch fibers for thermal-management, frictional, and structural applications. And the company has added to its line of ultra-high thermal conductivity fibers with a Thornel K-800X 2K graphite fiber that offers a fiber thermal conductivity of 800 W/mK and a composite thermal conductivity of 400 w/mK.
Ciba Specialty Chemicals Performance Polymers introduced an optically clear, UV stable urethane adhesive for bonding fiberglass, glass, metal, and a variety of thermoplastics—including PC, ABS, and acrylic. Urelane 6100-A/B exhibits polycarbonate-to-polycarbonate lap shear strength of 950 psi at room temperature and an elongation of 400%.
... As a low-cost alternative to traditional brazed or welded joints, NASA's Marshall Space Flight Center has cooked up new thermal elements that hold static joints together. Placed in the joint under a preload and heated, these gasket-like elements carry a coating that melts to form a connection in the joint. Depending on the application, the thermal elements can be heated with either an electrical current or external heat source. The coatings can be adhesives, thermoplastics, or braze alloys. Potential applications for the new joints include automotive engine cooling system housings, piping, sealed electrical housings, and housings for marine engines and transmissions.
... SP Systems introduced new epoxy adhesives in a range of viscosities, including adhesives with fire retardant and quickset capabilities. Also among the new products is SpaBond 735, which combines a shear strength of up to 43 MPa on steel, cleavage strength in excess of 12kN, and a glass-transition temperature above 110C—all in a low-viscosity formulation.
Speedy turnarounds for composite parts
A new soft-tooling technique for close-tolerance composite parts has been developed by Ciba Specialty Chemicals and The Boeing Co.'s Rotorcraft Program . Called LCTC—short for "Low Cost Tooling for Composites"—the technique produces tools from Ciba's Ren seamless epoxy patties for a reported 70% cost savings versus traditional tooling methods. To go right from CAD data to the model surface, LCTC requires three steps: applying the patties to an undersize core, oven curing, and CNC machining. The resulting tools can make short-run parts in an autoclave or prepreg prototypes. The epoxy used for the tools, Ren TDT 177-150 offers machining rates of more than 200 ipm, temperature performance up to 380F, CTE values comparable to aluminum, and thermal transfer better than metal molds. | <urn:uuid:39e7e34c-9a4c-4596-baaa-31c44bbe214e> | {
"date": "2015-10-08T22:22:33",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737904854.54/warc/CC-MAIN-20151001221824-00116-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8890931010246277,
"score": 2.515625,
"token_count": 915,
"url": "http://www.designnews.com/document.asp?doc_id=217145"
} |
37 acres of Sandhills land in Santa Cruz County to be protected
An additional 37 acres of ancient seabed will be protected from development under a new conservation easement in Santa Cruz County.
This month, the Land Trust of Santa Cruz County acquired the easement for the property, known as the Sandhills land. It's located near Lockhart Gulch and Green Valley Road in Scotts Valley.
The easement restricts development on the property, ensuring it will be remain Sandhills habitat forever. The land remains privately owned and on tax rolls, however.
The Sandhills make up an ancient seabed, and sand dollars, seashells and fossils of extinct sea mammals can be found there. The area is home to seven species of plants and animals that biologists say exist nowhere else on earth. That includes the Mount Hermon June Beetle, the Zayante band-winged grasshopper, the Santa Cruz kangaroo rat, the Ben Lomond spineflower, the Santa Cruz wallflower, the Silverleaf manzanita and the Ben Lomond buckwheat.
"The Sandhills are a rare habitat, threatened by development and destructive human use,” said Land Trust Executive Director Terry Corwin. “We are excited to add these 37 acres to the 230 acres of Sandhills the Land Trust already protects in the area.”
Copyright © 2014, KION. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. | <urn:uuid:4c2d9b64-e4f1-4fa4-a7b0-b0bbc14826e1> | {
"date": "2014-11-22T08:39:32",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400376728.38/warc/CC-MAIN-20141119123256-00240-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9156772494316101,
"score": 2.65625,
"token_count": 311,
"url": "http://m.kionrightnow.com/-37-acres-of-sandhills-land-in-santa-cruz-county-to-be-protected/25719404"
} |
Is your child ready to read? Launch your little learners in the Start to Read! Early Reading Program. The Level One Collection is a first step to building the foundation a preschooler or first grader needs to experience reading success in school.
This set contains:
- 5 Beginning Readers that present charming stories with beginning vocabulary
- 1 Read-Along & Songs CD that includes all 5 stories (narrated) and 10 original songs
- 1 Comprehension Workbook that corresponds to the 5 stories to test and reinforce reading skills
- 1 Parent Guide that offers tips and ideas for following a 3-step approach: listen, read and review
The stories in the readers are fun, easy to follow, and colorfully illustrated. Repetition, rhyming words, and short sentences introduce and reinforce essential language and listening skills. Each story has one track on the CD dedicated to uninterrupted reading and another narrated track, with turn-the-page signals to help your child follow along in the book. The CD also has 10, fun-to-memorize songs that make bedtime, bathtime, or any time more playful.
A comprehension workbook provides additional activities and extra practice of newly learned skills, while testing your child’s understanding of each story. A Parent Guide offers tips and ideas for you to enhance and support his or her reading progress. Originally developed by educator and School Zone co-founder Dr. James Hoffman, the updated sequence-based series, which consists of storybooks and complementary materials across three progressive reading levels, is designed to build a solid literary foundation for any child while teaching kids that reading is fun. This Level 1 collection makes a great start. Follow this program, and you and your child will celebrate reading success every day!
- Fun Features & Big Benefits:
- Memorable stories and characters
- 3-step approach to reading
- Whimsical, age-appropriate songs
- Pencil-and-paper workbook activities
- Story narration on audio CD
- An exceptional value!
- Level 1 Story Books – beginning sight words; 9-50 new vocabulary words; word recognition; letter recognition; beginning sounds; letter-sound association; problem solving; rhyming; vocabulary building
- Read-Along & Songs CD – creativity; memorization; sound recognition; reading comprehension; listening; following directions
- Comprehension Book – reading comprehension; focus; problem solving | <urn:uuid:e52629ad-52ff-47cd-a94e-b611e0e4288f> | {
"date": "2018-07-17T14:57:39",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589752.56/warc/CC-MAIN-20180717144908-20180717164908-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9185997247695923,
"score": 2.9375,
"token_count": 492,
"url": "http://www.preksuccess.com/prek_product/start-to-read-level-one/"
} |
- Full Description
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic techniques for modeling, understanding and solving algorithmic problems. This book is a concise introduction addressed to students and professionals familiar with programming and basic mathematical language. Individual chapters cover arrays and linked lists, hash tables and associative arrays, sorting and selection, priority queues, sorted sequences, graph representation, graph traversal, shortest paths, minimum spanning trees, and optimization. The algorithms are presented in a modern way, with explicitly formulated invariants, and comment on recent trends such as algorithm engineering, memory hierarchies, algorithm libraries and certifying algorithms. The authors use pictures, words and high-level pseudocode to explain the algorithms, and then they present more detail on efficient implementations using real programming languages like C++ and Java. The authors have extensive experience teaching these subjects to undergraduates and graduates, and they offer a clear presentation, with examples, pictures, informal explanations, exercises, and some linkage to the real world. Most chapters have the same basic structure: a motivation for the problem, comments on the most important applications, and then simple solutions presented as informally as possible and as formally as necessary. For the more advanced issues, this approach leads to a more mathematical treatment, including some theorems and proofs. Finally, each chapter concludes with a section on further findings, providing views on the state of research, generalizations and advanced solutions.
- Table of Contents
Table of Contents
- Appetizer: Integer Arithmetic.
- Representing Sequences by Arrays and Linked Lists.
- Hash Tables and Associative Arrays.
- Sorting and Selection.
- Priority Queues.
- Sorted Sequences.
- Graph Representation.
- Graph Traversal.
- Shortest Paths.
- Minimum Spanning Trees.
- Generic Approaches to Optimization.
- App. A
If you think that you've found an error in this book, please let us know by emailing to [email protected] . You will find any confirmed erratum below, so you can check if your concern has already been addressed. No errata are currently published | <urn:uuid:459230cb-9559-44ee-8a69-3a75918938ef> | {
"date": "2016-07-28T14:39:44",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828283.6/warc/CC-MAIN-20160723071028-00128-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9000828862190247,
"score": 3.171875,
"token_count": 495,
"url": "http://www.apress.com/springer/computer-science/algorithm-analysis-and-problem-complexity/9783540779773"
} |
Since 2005, reported laser attacks from people on the ground directed towards arriving and departing aircraft have increased over 300%. A laser aimed at the windshield of an aircraft startles a pilot and may cause injury. This study determined empirical evidence of laser intensity in the flight deck and the potential for harm to the human eye at various distances. Results of this study revealed that relatively low-powered lasers had measured intensity levels through cockpit windshields at the 200 and 500 feet distances that may cause damage to crewmembers’ eyes according to standards established by the federal government. At longer distances of 1000, 1500, and 2000 feet, these same lasers did not reveal measured intensities at levels to cause damage to crewmembers’ eyes; however, they were considered as having potentially distracting visual effects in flight that were further categorized as temporary flash blindness, glare or disruption, and distraction or startle.
DeMik, Randal J.; Harriman, Stanley; Phillips, Ryan S.; Crowder, Charles; Pfeifer, Jennifer A.; McHugh, Shane F.; Foster, Steven J.; De Waard, Elizabeth R.; Streit, Michael; Antoniolli, Richard B.; Knight, Ernest W.; York, David S.; and Luedtke, Jacob
"Measuring Intensity of Laser Light Penetrating Flight Decks in Laser Illuminations,"
Journal of Aviation Technology and Engineering:
1, Article 2.
Available at: https://doi.org/10.7771/2159-6670.1068 | <urn:uuid:0c8df251-7404-4d77-bf57-0373d6366947> | {
"date": "2019-01-18T23:06:05",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660818.25/warc/CC-MAIN-20190118213433-20190118235433-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9181668162345886,
"score": 3.34375,
"token_count": 312,
"url": "https://docs.lib.purdue.edu/jate/vol3/iss1/2/"
} |
January 29, 1715: Georg Christoph Wagenseil is born in Vienna, Archduchy of Austria of the Holy Roman Empire.
June 25, 1755: Le cacciatrici, a festa teatrale by Georg Christoph Wagenseil (40) to words of Durazzo, is performed for the first time, at the Laxenburg Palace, near Vienna.
January 12, 1756: Georg Christoph Wagenseil (40) presents himself to request royal permission to publish his instrumental music in France. It will be granted for a period of ten years and made retroactive to this date.
March 4, 1756: Il roveto di Mosè, an oratorio by Georg Christoph Wagenseil (41) to words of Abbate Pizi, is performed for the first time, in Vienna.
August 16, 1756: Georg Christoph Wagenseil (41) receives a leave of absence from his duties at the Austrian court.
February 15, 1757: The publication of six symphonies op.3 (25, 44, 55, 31, 45, 28) of Georg Christoph Wagenseil (42) is advertised in Annonces, Paris.
April 2, 1757: Antoine Huberty receives a royal privilege to publish the works of Georg Christoph Wagenseil (42) in France.
May 2, 1757: Georg Christoph Wagenseil (42) receives a second ten-year royal privilege to print his music in France, retroactive to 4 April.
January 14, 1762: Publication of the Symphony no.37 of Georg Christoph Wagenseil (46) is advertised in Annonces, Paris.
March 24, 1762: Georg Christoph Wagenseil’s (47) serenata Prometeo assoluto to words of Migliavacca is performed for the first time, in the Hofburgtheater, Vienna, in honor of Archduchess Isabel of Austria. The overture is actually Wagenseil’s Symphony no.13.
July 20, 1762: Publication of two harpsichord concertos op.7 by Georg Christoph Wagenseil (47) is announced in Mercure de France, Paris.
October 13, 1762: Wolfgang Amadeus Mozart (6) and his sister Nannerl perform at Schönbrunn Palace before Emperor Franz I, Empress Maria Theresia, Archduchess Marie Antoinette and the music teacher to the imperial family, Georg Christoph Wagenseil (47). Leopold (42) writes home to Salzburg, “Everyone is amazed, especially at the boy, and everyone whom I have heard says that his genius is incomprehensible.” (Solomon, 41)
October 30, 1769: Georg Christoph Wagenseil (54) relinquishes his position of Hofklaviermeister at the Austrian court due to physical disability.
March 1, 1777: 09:00 Georg Christoph Wagenseil dies in his home at Hof- Riemerischen Haus in d. Waldzeill no.811 an d. Lungsucht, Vienna, Archduchy of Austria, aged 62 years and one month. | <urn:uuid:d331a210-578e-4c8a-975d-b213ac4d5b63> | {
"date": "2019-08-20T23:00:47",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315681.63/warc/CC-MAIN-20190820221802-20190821003802-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8799837231636047,
"score": 2.796875,
"token_count": 686,
"url": "http://www.musicandhistory.com/composers/8398"
} |
March 10, 2009
DNV project promises safer navigation in ice areas
A three-year research project initiated by classification society DNV has led to the development of an ice load monitoring system that provides bridge personnel with real-time information about the actual ice loads on the ship's hull and shows satellite information about the ice integrated into electronic navigation maps.
Shipping activity in ice infested waters is one area where global warming may actually be opening up new business opportunities. But ship and crew are placed at risk if the ice loads encountered exceed those the ship was designed to withstand.
DNV is developing technological solutions to ensure that Arctic operations are safe and environmentally sound. The ice load monitoring project is an example of how DNV identifies critical risks and then works to find mitigating solutions.
The project culminated in 2008 with the development of a comprehensive decision support tool for transiting ice that has been tested over the last two winter seasons onboard the Norwegian Coast Guard vessel KV Svalbard.
The system includes fiber optic sensors that measure shear strain on the vessel's hull and electromagnetic equipment that measures the thickness of the ice at the bow. This information is analyzed and displayed on the bridge. Additionally, meteorological and satellite data about the ice is integrated into electronic charts allowing for optimum route selection. The project is the first to monitor the actual ice loads to be presented in real time at the bridge as a part of a decision support system. The system is ready to be installed for both new buildings and ships in operation.
"Based on the success of the ice load monitoring project and a thorough understanding of the risks associated with Arctic operations, our conclusion is that technology will not be a showstopper for conducting safe, well-planned ship operations in Arctic waters," said Morten Mejlænder-Larsen, DNV Maritime's program director for Arctic shipping.
"Our goal is to maintain high competence levels and updated rules and notations so that DNV is able to provide owners, yards and oil majors with the support they need to safeguard their cold climate activities," said Mejlænder-Larsen. The experience from the development and operation of the Ice Load Monitoring system will be implemented in a new DNV Notation securing same standard. | <urn:uuid:aa4750f6-234a-48ac-8eb3-3ed1d9ca97e3> | {
"date": "2014-10-21T20:01:25",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444774.49/warc/CC-MAIN-20141017005724-00027-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9356731176376343,
"score": 2.796875,
"token_count": 455,
"url": "http://www.marinelog.com/DOCS/NEWSMMIX/2009mar00101.html"
} |
Mars Express mission extended
ESA’s Mars Express mission has been extended by one Martian year, or about 23 months, from the beginning of December 2005.
The decision, taken on 19 September by ESA’s Science Programme Committee, allows the spacecraft orbiting the Red Planet to continue building on the legacy of its own scientific success.
Co-ordinated from the beginning with the Mars science and exploration activities of other agencies, Mars Express has revealed an increasingly complex picture of Mars.
Since the start of science operations in early 2004, new aspects of Mars are emerging day by day, thanks to Mars Express data. These include its present-day climate system, and its geological ‘activity’ and diversity. Mars Express has also started mapping water in its various states.
In building up a global data set for composition and characteristics of the surface and atmosphere, Mars Express has revealed that volcanic and glacial processes are much more recent than expected.
It has confirmed the presence of glacial processes in the equatorial regions, and mapped water and carbon dioxide ice, either mixed or distinct, in the polar regions. Through mineralogical analysis, it found out that large bodies of water, such as lakes or seas, might not have existed for a long period of time on the Martian surface.
Mars Express has also detected methane in the Martian atmosphere. This, together with the possible detection of formaldehyde, suggests either current volcanic activity on Mars, or, more excitingly, that there are current active ‘biological’ processes.
This hypothesis may be reinforced by the fact that Mars Express saw that the distribution of water vapour and methane, both ingredients for life, substantially overlap in some regions of the planet.
Furthermore, the mission detected aurorae for the first time on the Red Planet. It has made global mapping of the density and pressure of the atmosphere between 10 and 100 kilometres altitude, and studied atmospheric escape processes in the upper layers of the atmosphere. This is contributing to our understanding of the weather and climate evolution of the planet.
There is still much to be discovered by the extraordinary set of instruments on board Mars Express. First, the 23-month extension will enable the Mars Express radar, MARSIS, to restart Martian night-time measurements in December this year.
MARSIS will continue its subsurface studies mainly in the search for liquid and frozen water. By combining subsurface, surface and atmospheric data, Mars Express will provide an unprecedented global picture of Mars and, in particular, its water.
So far, the High Resolution Stereo Camera has imaged only 19% of the Martian surface at high resolution. In the extended phase, it will be able to continue the 3D high-resolution colour imaging. After the Viking missions, Mars Express is building today’s legacy of Mars imagery for present and future generations of scientists.
Thanks to the extension, Mars Express will also be able to study for a second year the way the atmosphere varies during different seasons, and to observe again variable phenomena such as frost, fog or ice.
Finally, Mars Express will be able to revisit those areas where major discoveries, such as new volcanic structures, sedimentary layering, methane sources, nightglow and auroras, have been made, thus allowing to confirm and understand all aspects related to these discoveries.
Notes to editors:
ESA’s Mars Express mission was successfully launched on 2 June 2003 from Baikonur, Kazakhstan, on board a Russian Soyuz rocket with a Fregat upper stage. Besides being Europe’s first mission to Mars, Mars Express is the first fully European mission to any planet.
Following the Mars Express spacecraft commissioning at Mars in January 2004, most experiments on board began their calibration and testing phase while already acquiring scientific data. This phase lasted until June 2004 when all the commissioned instruments started their routine operations. The MARSIS radar antenna deployment was postponed for technical reasons until May 2005, and it became operational in July 2005.
Further to providing an impressive wealth of scientific results on its own, Mars Express has also successfully co-operated with NASA’s Mars Exploration Rovers, in terms of co-ordinated scientific observations and to test Mars Express in relaying the rover data to Earth. Further scientific collaboration between Mars Express and both rovers and Mars Odyssey is expected during the remainder of the nominal mission and the extended mission, and with NASA’s Mars Reconnaissance Orbiter mission during the extended mission.
For more information:
Agustin Chicarro, ESA Mars Express Project Scientist
E-mail: agustin.chicarro @ esa.int
Fred Jansen, ESA Mars Express Mission Manager
E-mail: fjansen @ rssd.esa.int | <urn:uuid:6583d858-a1ad-4e57-bff5-a481cb51c448> | {
"date": "2014-11-22T18:12:52",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400378446.58/warc/CC-MAIN-20141119123258-00124-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9319920539855957,
"score": 3.34375,
"token_count": 973,
"url": "http://www.esa.int/Our_Activities/Space_Science/Mars_Express/Mars_Express_mission_extended"
} |
The endless innovative concept design has once again knocking on the door of the eco-concept for the better future environment. Designed by a highly earth caring and creative people, this Turbine Light Concept promises to light up the highways just by using the winds created by the high-speed vehicles crossing the highways. The winds will move the turbine which has designed to capture winds and turn them into a usable energy enough to power up the light above the turbine.
This might sounds fresh because no one yet to use Turbine as the energy leverage. There is one downside though. Highways are not always crowded with fast-moving vehicles. So the turbine light might goes off eventually. Unless the designer found a way to integrated more technology into these Turbine Lights, such as adding battery for storing the unused energy or getting on a solar panels install on the entire surface, this design is probably gonna fail.
However, it’s a good start to create a better lighting system for the highways. It’s always a great alternative if we can free from relying on government generated electricity. | <urn:uuid:572a4466-c289-45ce-ad3f-f50a0c8d27d0> | {
"date": "2017-09-19T18:50:25",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685993.12/warc/CC-MAIN-20170919183419-20170919203419-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9411655068397522,
"score": 2.640625,
"token_count": 220,
"url": "http://www.hardwaresphere.com/2010/02/08/eco-concept-turbine-light-for-hightways/"
} |
by Kaisa Pankakoski (Cardiff University)
Open borders, superdiversity and globalisation have enabled the formation of a large amount of families where children are potentially multilingual and may have more than one native language. The parents of multilingual children have different strategies, methods and principles in place to promote intergenerational language transmission or passing a non-native language to their offspring.
What principles and other factors influence bringing up a trilingual child? How do the potentially multilingual children feel about their complex language repertoires? Is there a link between a certain method and the children’s attitudes towards their languages?
In my thesis I investigate trilingual families; the factors influencing language transmission; and the perspectives of the multilingual children in my two home cities: Helsinki and Cardiff. The reason why these two capital cities are compared is that they have very different approaches to bilingual education and heritage language promotion while having several similarities from a visible minority language population to substantial support from the governments for the minority languages. The two countries are also officially bilingual, which offers a different foundation for trilingual language transmission than for instance monolingual countries.
There are various aspects influencing the transmission of minority languages in the home. These consist of linguistic environment factors such as families’ language strategies and methods of transmission; sociocultural factors including parental and societal attitudes, the roles of the languages or parental and societal support; and finally familial factors that may involve siblings, extended family and possible family mobility.
The most recent research strand of multilingualism, Family Language Policy (FLP), looks at the importance of parental strategies which are fluid and may change over time. Much like any multilingualism research most of FLP and language transmission research is based on bilingual context rather than multilingual context.
Previous work has not looked at trilingual children’s perceptions or the link between perceptions and language strategies. Furthermore, most multilingualism studies fall into the category of linguistics and language acquisition rather than sociolinguistics. There is no transmission research in contexts with a community majority and minority language.
Funding from PhilSoc to carry out fieldwork in Helsinki
From April 2017 until August 2017 I was based in Finland at the University of Helsinki, Department of Modern Languages. This enabled me to interview seven multilingual case study families living in the Helsinki Metropolitan Area. The families were settled in the country and each had at least one trilingual primary school aged child speaking two official languages of the country (Swedish and Finnish) and one or more additional language(s).
The methodological approach draws from qualitative, mixed-methods approach to data collection and analysis. First the parents filled in an online questionnaire to clarify the family’s language pattern. Then semi-structured interviews and observations within the family homes explored issues that affect language acquisition within families. Both parents and children aged five to twelve were interviewed.
I spent three to six hours with each family in their homes. The data collected includes fourteen filled in questionnaires, fifteen hours of audio recorded interviews, seven hours of recorded audio and/or video observation as well as photographs and notes of each family participating in the research.
This winter possible extended family members will be sent an online questionnaire which will hopefully reveal their perspectives. After completing the fieldwork in Helsinki I will carry out the interviews and observations in Cardiff.
The PhilSoc Travel and Fieldwork bursary covered a part of the expenses of the fieldwork allowing me to take time off work while I concentrated full-time on my PhD research.
More information about the research
There is a news item on the Cardiff University website as well as a Welsh-language BBC article about my research and fieldwork in Helsinki. For more information about my research questions and methods, see my Cardiff University page.
Braun, A., 2006. The effect of sociocultural and linguistic factors on the language use of parents in trilingual families in England and Germany.
Bryman, A., 2015. Social research methods. Oxford university press.
Murrell, M. 1966. Language acquisition in a trilingual environment: notes from a case-study. Studia linguistica 20(1), pp. 9-34.
Ronjat, J., 1913. Le développement du langage observé chez un enfant bilingue.
Sṭavans, A. and Hoffman, C. 2015. Multilingualism. Cambridge: Cambridge University Press.
Yamamoto, M. 2001. Language use in interlingual families: A Japanese-English sociolinguistic study. Multilingual Matters. | <urn:uuid:6981eff9-7494-4ab8-b5b8-1b7f50d176b3> | {
"date": "2019-12-13T07:48:36",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540551267.14/warc/CC-MAIN-20191213071155-20191213095155-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9056639075279236,
"score": 2.875,
"token_count": 947,
"url": "https://blog.philsoc.org.uk/tag/sociolinguistics/"
} |
Remember – call and join the conversation – 612-341-0980 – or Tweet us @TTTAndyDriscoll or post onTruthToTell’s Facebook page.
Watch us from Studio 5! TruthToTell is now seen live on Livestream and later on Blip.tv or in iTunes
HELP US BRING YOU THESE IMPORTANT DISCUSSIONS OF COMMUNITY INTEREST – PLEASE DONATE HERE
Time was when we sauntered through the days and years not only not worried about the mercury we lived with, but rather fascinated by all of its apparent properties…dangerous properties, it turns out, for many – fatal. Our mouths could be full of it, our thermometers have always relied on it for taking temperatures, we’re injected with it, we swim in pools where it’s part of the purification system (chlorine), and we light our spaces with it – in both bulbs and switches.
A lot of the descriptions of the terrible things mercury can do to us can be found on a variety of websites, including the Minnesota Pollution Control Agency (MPCA), and some of it is enlightening, if not as cautionary as it might be. Here’s part of what the MPCA’s description says:
Mercury is a silvery, liquid metal at room temperature - the only metal known to exist in liquid form naturally. It is sometimes referred to as one of the "heavy metals." Like water, mercury can evaporate and become airborne. Because it is an element, mercury does not break down into less toxic substances. Once mercury escapes to the environment, it circulates in and out of the atmosphere until it ends up in the bottoms of lakes and oceans. Depending on its chemical form, mercury may travel long distances before it falls to earth with precipitation or dust..
Bacteria and chemical reactions in lakes and wetlands change the mercury into a much more toxic form known as methylmercury. Fish become contaminated with methylmercury by eating food (plankton and smaller fish), which has absorbed methylmercury.
As long as the fish continue to be exposed to mercury, mercury continually builds up in their flesh. Fish that eat other fish become even more highly contaminated. Thus, the fish most desirable for many anglers -- bass, walleye and northern pike -- become the most affected, and larger fish tend to be the most contaminated.
When people eat contaminated fish, methylmercury remains in their bodies for a long time. If they eat fish containing methylmercury faster than their bodies can get rid of it, the methylmercury accumulates in their bodies and can be toxic. Many states, including Minnesota, have fish consumption advisories to inform people about how many meals of fish they can safely eat over a period of time.
That should be frightening enough, but we also take the deadly mercury into our bodies and blood streams by several other common means – our dental fillings (amalgams), flu shots and, although less so these days, other vaccines. Mercury amalgam fillings alone are believed to give off more mercury – which we breathe and swallow – than all the fish we eat and foul air we breathe combined, say researchers.
Many groups and agencies have been fighting to rid us of mercury absorption. Most of them are focused on reducing the mercury emissions from coal plants or getting rid of medical thermometers and keeping schools, where it’s already banned, free of the stuff.
As the world’s biggest exporter of mercury, the US is nevertheless banned from exporting “elemental” mercury – the kind you can see in beads rolling around a tray or in your hand, as we used to do. We can’t do much about “atmospheric” mercury, except stop burning coal and other minerals that contain the stuff.
The effort to put tough controls on the use and production of mercury in our lives is global, but powerful forces with vested billions in its use are at work to minimize those controls. Money controls the controls.
TTT’s ANDY DRISCOLL and MICHELLE ALIMORADI discuss the serious toxic health threats we face from the various sources and uses of mercury with a variety of mercury watchdogs.
KAREN MONAHAN – Environmental Justice Organizer, Sierra Club Central Region
LEA FOUSHEE – Director of Environmental Justice, North American Water Office; Author, Sacred Water: Water for Life
LEO CASHMAN – Executive Director, Dental Amalgam Mercury Solutions (DAMS)
BRUCE MONSON – Research Scientist, Environmental Analysis & Outcome Division, Minnesota Pollution Control Agency (MPCA)
TruthToTell Nov 28: HPV AND VACCINATIONS: Dangerous Liaisons?-AUDIO BELOW
HELP US BRING YOU THESE IMPORTANT DISCUSSIONS OF COMMUNITY INTEREST – PLEASE DONATE HERE!
Should 12-year-old girls (and boys, for that matter) be forced into vaccinations against the now ubiquitous sexually transmitted disease (STD), human papillomavirus – or HPV – in anticipation of their eventual sexual encounters and the likelihood of infection? HPV has been shown as a major cause of cervical cancer in women. Other manifestations include genital warts.
The issue of mandatory HPV vaccinations was brought into sharp relief during one of the half million Republican debates this year when candidate Minnesota Rep. Michele Bachmann stated – erroneously, it turned out – that a mandatory vaccination for HPV had resulted in “mental retardation” (developmental disability) in one girl. The issue’s been on the front burner ever since, for which anti-vaccination advocates have cheered. Still, other reactions to the drugs have raised concerns, especially in those for whom a regular pap smear has been so effective.
Because adverse reactions to these vaccines can be severe, advocates are raising serious questions about the haste involved in their approval, the quickly passed mandates in some states to vaccinate children, and the adverse effects the vaccines are having on many of those girls, some of whom have died in the wake of the series of shots required for the immunity to take, others of whom have been reported as permanently disabled. Far fewer adverse events have been reported for Cervarix, but its use has been very low.
Despite the near-epidemic nature of this genital disease – there are 30-plus HPV types, the FDA-approved vaccines themselves –Merck Pharmaceuticals’ Gardasil (approved 2006) and Glaxo-Smith-Kline’s Cervarix (2009) – treat the four most common types in boys and girls 9-26 years old (10-25 for Cervarix). In most cases, it appears, the reaction has been an allergic one. Glaxo-Smith-Kline, for example warns loudly that anyone with a latex allergy should not be vaccinated with Cervarix.
Over 20,000 adverse events have been reported to the CDC’s Vaccine Adverse Event Reporting System (VAERS) following Gardasil injections, nearly all of them involving females. Officially, VAERS recorded 71 Gardasil deaths as of September, but the CDC takes care to warn about half are medically confirmed. Others, like Vaccine Safety Council of Minnesota, the National Vaccine Information Center, and Citizens for Health see deeper issues – like politicians’ ties to drug companies.
The disputes seem to lie between VAERS and those who believe the adverse reactions are enough to fight the drugs’ use altogether, especially the state mandates that leave little room for parents to refuse the shots, unless medically ordered or religiously violating.
We’ve assembled a cadre of medical and ethical luminaries along with some advocates to try putting the issues in perspective and give guidance to listeners/viewers and families. Join TTT’s ANDY DRISCOLL and MICHELLE ALIMORADI as we query guests about the rights and wrongs and the dilemmas of both the diseases and the vaccines developed to conquer them.
ARTHUR CAPLAN, PhD –Director of the Center for Bioethics; Sydney D Caplan Professor of Bioethics, University of Pennsylvania in Philadelphia; former Professor and Director of the University of Minnesota’s Center for Bioethics.
DIANE HARPER, MD, MPH, MS – Obstetrician/Gynecologist, Researcher, University of Missouri-Kansas City; researcher, clinician and educator in the field of HPV associated diseases, especially focused on the prevention of cervical cancer; a developer of Gardasil® and Cervarix®
MARK BLAXILL – author of The Age of Autism and Editor-at-Large of a web daily newspaper of the same name. Mr. Blaxill, has researched and written many articles for many publications, including a lengthy three-part series – A License to Kill?: How A Public-Private Partnership Made the Government Merck’s Gardasil Partner – on the intimate and conflicting relationships between the drug companies and the federal government regarding the use and peddling of Gardasil as well as a record of recorded deaths attributed to Gardasil.
Vaccine Safety Council of Minnesota
National Vaccine Information Center – Minnesota Chapter
Citizens for Health
The Age of Autism Web Newspaper
A License to Kill? Part 1: How A Public-Private Partnership Made the Government Merck’s Gardasil Partner | <urn:uuid:0698fbc4-0286-47f8-bca0-2d307abf5aca> | {
"date": "2015-01-31T19:08:24",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122030742.53/warc/CC-MAIN-20150124175350-00237-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9317848682403564,
"score": 3.265625,
"token_count": 1978,
"url": "http://www.truthtotell.org/category/tags/genital-wart"
} |
Also found in: Dictionary, Thesaurus, Medical, Legal, Encyclopedia, Wikipedia.
coordinationthe process of combining together the work of ORGANIZATION members and departments to achieve the desired end-product or goals of the organization. Coordination is necessary at two levels:
- the bringing together of production tasks to achieve production goals with the minimum of waste, buffer stocks, etc.;
- the coordination of all organizational functions to achieve effective and efficient operations and the maintenance of the organization as a viable entity.
Coordination of a complex range of activities is fraught with problems, and it is a central issue in the design and running of organizations. Some organizations seek to achieve coordination by formulating a range of rules and procedures to guide and govern the work of employees and departments. Others prefer to rely on the skills, knowledge and commitment of their employees to interpret what forms of coordination are necessary (see MECHANISTIC AND ORGANISMIC, CULTURE). Most organizations adopt a combination of the two. In all organizations, however, the need for coordination is embodied in the formal structure. Some adopt a FUNCTIONAL STRUCTURE, some a PRODUCT-BASED STRUCTURE, whilst others adopt a MATRIX STRUCTURE explicitly to tackle problems of coordination. | <urn:uuid:b6df78cf-a32a-4d77-859e-3f1112cf19c3> | {
"date": "2018-01-23T02:12:37",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891705.93/warc/CC-MAIN-20180123012644-20180123032644-00456.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.90338534116745,
"score": 3.53125,
"token_count": 263,
"url": "https://financial-dictionary.thefreedictionary.com/coordination"
} |
[Click on BLUE links for sources and more information]
sin maíz no hay país—without corn, there is no country
Americans love Mexican food. We consume nachos, tacos, burritos, tortas, enchiladas, tamales and anything resembling Mexican in enormous quantities. We love Mexican beverages, happily knocking back huge amounts of tequila, mescal, and Mexican beer every year. We love Mexican people—we sure employ a lot of them. Despite our ridiculously hypocritical attitudes towards immigration, we demand that Mexicans cook a large percentage of the food we eat, grow the ingredients we need to make that food, clean our houses, mow our lawns, wash our dishes, and look after our children.
Anthony Bourdain, Bourdain’s Field Notes: Mexico
Anthony Bourdain’s perceptions of Mexico and its people are spot on. His Field Notes on Mexico are worth reading in their entirety and so is his article Can Mexican Corn Be Saved? You may wonder why Mexico’s corn needs to be saved. In this era of disputes over borders and immigration, it turns out that the history, politics and economics of corn provides many of the answers. Here are a few facts.
NAFTA, U. S. subsidies, and changes in Mexican and U.S. Government corn policies have disadvantaged Mexico’s indigenous farmers and forced many off their farms. Many of these Mexican farmers traveled north to find jobs. Mexico has lost about 2 million agricultural jobs since NAFTA was passed in 1994. John Vaillant in his fine novel The Jaguar’s Children has a passage that clearly explains the irony in what has happened to Mexico.
A few of us students were worried about these transgénicos coming into Mexico, not as food but as seed, because that corn is all the same—the diversity is gone so one disease can kill it. It’s happened before and we didn’t want some corn invented in a lab last year to be mixing with native maize that has taken thousands of years to develop. But NAFTA and the Mexican government allowed SantaMaize into Mexico—only in the north, they said, on an experimental basis, but that’s like saying migrantes will only work in Texas. Corn is a migrante too. So we put together a petition calling for a moratorium on GMO corn. The problem for us is that NAFTA isn’t interested in some indio with a little milpa of one hectare growing native corn and taking a bag to market a couple times a year. NAFTA wants big farms and all the same corn—lots and lots, all the time, and this is who our government is subsidizing now, not the campesino. They’re telling us to leave the pueblos and work in the maquiladoras. Well, would you send your kids to Tijuana or Ciudad Juárez? But Mexicanos want their tortillas, right? They want them right now, and who do you think wants to sell the seed to grow the corn to make all those tortillas? This is the magical realism of NAFTA, Tito—Mexico, the birthplace of corn, is now importing surplus corn from el Norte—millions of tons driving the price down so campesinos can’t afford to grow it. Exporting people and importing corn. It is backwards, no? The Jaguar’s Children, John Vaillant
GMO seeds imported into Mexico from the United States are destroying native varieties of corn that have evolved over centuries. Some varieties are becoming extinct. Mexico still grows and cooks 59 varieties of corn but for how long? In reality there may be hundreds or thousands of variations depending on soil, sun, water and other environmental factors. Corn depends on the terroir just like wine or mezcal.
It’s ridiculous for a country like Mexico whose people are often hungry to use its best land to grow produce for a country where food is so abundant that its people are obese … cheap corn has driven the growth of animal feedlots, sewage concentration and water and air pollution … This genetic diversity, the product of 10,000 years of human-maize co-evolution, represents some of the most precious and irreplaceable information on Earth, as we were reminded in 1970 when a fungus decimated the American corn crop and genes for resistance were found in a landrace in southern Mexico. Michael Pollan
Mexico’s native corn varieties (landraces) evolved over centuries to grow in diverse conditions including rugged mountainous terrain and steamy swamplands. These unique corn varieties may prove extremely valuable as the impacts of global warming increase. One type of corn in southern Mexico actually makes its own fertilizer. It is cheaper to grow and more environmentally sound and may be especially useful in poor countries that cannot afford commercial fertilizer.
Tortillas are at the very heart of Mexican cuisine. As one who loves to cook and learn about food and its preparation, I have gotten quite an education about corn. It is a very big deal here and transgenico corn is a major political issue. There are literally thousands of varieties of corn here. In certain villages there may be as many as 26 different varieties growing, each dependent on differing amounts of sun, soil condition, etc. Having lots of different varieties helps the plants to be more insect and disease resistant. Chris Stowens, Oaxaca – The Year After
These varieties of corn might at some point save humanity … In the sierra here, there are varieties of corn that grow as high as 3,000 meters,” Gonzalez said, or nearly 10,000 feet. “There are varieties that can be planted in swampy land or that you can plant in semidesert areas. They may not be very productive but they have allowed people to survive. Aldo Gonzalez
America’s largest export may be obesity. GMO corn and corn products together with an American “fast food” mentality have created an obesity crisis not only in Mexico but around the world.
In 1980, 7 percent of Mexicans were obese, a figure that tripled to 20.3 percent by 2016, according to the Institute for Health Metrics and Evaluation at the University of Washington. Diabetes is now Mexico’s top killer, claiming 80,000 lives a year, the World Health Organization has reported. The phenomenon is not limited to Mexico. Research shows free trade is among the key factors that have accelerated the spread of low-nutrient, highly processed foods from the West, “driving the obesity epidemic in China, India, and other developing countries worldwide,” according to the T.H. Chan School of Public Health at Harvard.
Consumers sacrifice both taste and nutritional value as cheap GMO corn replaces the ancient Mexican landraces. Sadly only the rich can now afford the traditional corn products that originated in Mexico and so many Mexicans grew up on. Much of the food that Mexico grows is exported to the United States.
Another fiesta that we have is the fiesta of corn. We give thanks every December 30 to nature, which has given us corn. We are people of corn. We have created our own world, our own gods, and our basic philosophical ideas begin with the cultivation of corn. If you don’t eat corn in Zaachila, then you are not Zachileño. We Are The Face Of Oaxaca, Lynn Stephen
While corn was first cultivated in Mexico thousands of years ago, today Mexico imports much of its corn from the United States although recently Mexico has been exploring other sources in Brazil and Argentina because of the anti-Mexican rhetoric of the current American President.
In the short term, GMO corn may be more productive and cheaper to grow. This has undoubtedly reduced hunger and starvation around the world. But, the long-term costs include a loss of culture, diversity, tradition and jobs that cannot be ignored.
In current political discussions of immigration, it is common to hear “without a border there is no country.” When it comes to corn, many Mexicans would agree. Cheap corn invading Mexico from the United States has changed Mexico, not always in a good way.
The result of all this change, according to Mier, is that 59 varieties of heirloom corn native to Mexico are on the verge of extinction, as are the many regional dishes they are supposed to be made with. Another byproduct is the health issues that have been plaguing Mexico. The substitution of junk food and bad tortillas have had a strong hand in the country’s ranking second-highest in the world for obesity, first for childhood obesity, and as a world leader in diabetes diagnoses. Mier says that if people ate real tortillas made from local corn, a lot of these problems will be alleviated. Anthony Bourdain
Our deep relationship with corn enables us to sustain our families, and it comes with the responsibility that we must treat the corn as we would treat our family. We pray to god when we sow the fields, asking for help in bringing the corn to harvest. Because corn is the giver of life. Corn is our religion. Floriano Garcia Delfín
Masienda is one California company that is making a positive difference for both Mexicans and Americans, We suggest you go to their website and read about what they are doing, how and why. There are so many fascinating stories about corn that we cannot tell them all in our short blog. One thing we do know, however, is that when it comes to Mexico, it’s all about the corn.
Some additional photos of note: | <urn:uuid:839bf93f-b67a-414c-b97a-eabe68efdbcc> | {
"date": "2019-07-22T11:38:29",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528013.81/warc/CC-MAIN-20190722113215-20190722135215-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9578192830085754,
"score": 2.53125,
"token_count": 1984,
"url": "https://thinkinthemorning.com/its-all-about-the-corn/"
} |
According to this report from last week, “a
According to a report on the same story that appeared in the New York Times (http://www.nytimes.com/2009/06/20/arts/music/20arts-192MILLIONFI_BRF.html), “a lawyer for the Recording Industry Association of America, which filed the suit, said that she “infringed my clients’ copyrights and that she then tried to cover it up.”
This case raises many interesting issues in terms of music ownership, legal philosophy and social justice. Suppose instead of merely sharing a few songs, these children (or their mother, or her ex-boyfriend) planted some seeds from patented genetically engineered lemons bought from a local supermarket, raised a new tree, and then sold around $24 of lemonade produced from its lemons on the nearby street corner, according to American custom. Or, suppose they merely performed these songs on that street corner upon a stage constructed of wood from the tree derived from patented seeds, or on wooden flutes they carved from the tree branches, without explicitly crediting the tree’s corporate developer or paying the music industry for performance rights to the songs. Or, suppose the true origins of the patented lemon could be traced to a group of indigenous peoples in the Southern hemisphere who had cultivated citrus trees for generations, and from whom the original parent tree had been stolen, and from which a relatively insignificant genetically engineered modification was patented by a corporation in the Northern hemisphere. Suppose the precise mineral content of the water on which the lemon tree was raised had been patented by the local reservoir, and the mother and children had unknowingly violated its terms by failing to offer a royalty payment to the civic engineers for commercial use of the water. The notion of intellectual property certainly can be (and has been) taken too far at times, and it seems that proportionality should be a guideline when it comes to meting out punishments for these kinds of cases.
The act of sharing a few songs does not seem to constitute such a grave criminal offense, and no matter how much one might try to make lemonade out of these lemons, a $1.92 million fine seems excessive in this case. But perhaps not to music industry executives. One cannot help but wonder, are there any musicians living today in modern industrialized societies who have not at some point shared music with others in a way that the industry would now like us to regard as unconscionable and illegal? Does this incriminate us all?
Music educators should bear in mind the possibility of becoming the next target of this kind of lawsuit. Fair use for educational purposes is a principle that may be lost if educators are not vigilant in defending its continued relevance in the contemporary world. But for now, hopefully we can enjoy our lemonade as we freely share what we still can of music with our students.
Here is a link to a recommended article by Charles R. Nesson on related issues:
UPDATE (August 3, 2009) - Here is a link to another case like this one: | <urn:uuid:5997a695-919d-4c0c-9d35-34c7854bf613> | {
"date": "2018-09-20T02:52:09",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156376.8/warc/CC-MAIN-20180920020606-20180920040606-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9739404320716858,
"score": 2.515625,
"token_count": 630,
"url": "http://sociomusicology.blogspot.com/2009/06/desperation-in-recording-industry.html"
} |
The clocks, based on atoms of the element ytterbium, act like pendulums or metronomes that swing back and forth with perfect timing for a period comparable to the age of the universe, they said.
The stability of the ytterbium clocks -- measured as how precisely the duration of each "tick" matches every other tick -- creates timekeeping 10 times more accurate than any other atomic clock to date, a NIST release reported Thursday.
The ytterbium clock ticks are stable to within less than two parts in 1 quintillion (1 followed by 18 zeros), the researchers said.
"The stability of the ytterbium lattice clocks opens the door to a number of exciting practical applications of high-performance timekeeping," NIST physicist Andrew Ludlow said.
The breakthrough has the potential for significant impacts on a broad range of sensors measuring quantities that have tiny effects on the ticking rate of atomic clocks, including gravity, magnetic fields and temperature, the researchers said.
Results of the experiments have been published in the journal Science Express. | <urn:uuid:b79c5f3b-9096-4b4a-9d0f-42c8dbadf417> | {
"date": "2014-09-18T15:49:27",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657128304.55/warc/CC-MAIN-20140914011208-00158-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9365622401237488,
"score": 2.90625,
"token_count": 223,
"url": "http://www.upi.com/Science_News/2013/08/23/US-scientists-announce-atomic-clock-with-most-stable-tick-ever/UPI-21281377292605/?spt=hs&or=sn"
} |
Fireplace and wood-stove ashes retain enough heat to ignite other combustible materials for several days after a fire. It is important to learn the following ways to dispose of fireplace and wood-stove ashes properly:
· DO NOT discard your ashes into any combustible container like a paper or plastic bag, a cardboard box, or a plastic trash can.
· DO put ashes into a non-combustible metal container with a lid.
· DO pour water into the container to make sure the ashes are cool.
· DO keep your can OUTSIDE the home, away from combustibles.
· DO teach all family members to be safe with ashes from your fireplace or wood stove.
As always, please make sure you test your smoke alarms monthly and replace batteries twice a year. Practice and plan a family home escape plan. | <urn:uuid:a3f58812-62fb-4e49-aea0-8cd5ff461493> | {
"date": "2017-09-23T14:37:33",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689686.40/warc/CC-MAIN-20170923141947-20170923161947-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8626872301101685,
"score": 2.90625,
"token_count": 172,
"url": "http://mcfrs.blogspot.com/2012/03/dispose-of-fireplace-and-wood-stove.html"
} |
Skin color linked to social inequality in contemporary Mexico, study showsOctober 6th, 2010 in Other Sciences / Social Sciences
Despite the popular, state-sponsored ideology that denies the existence of prejudice based on racial or skin color differences in Mexico, a new study from The University of Texas at Austin provides evidence of profound social inequality by skin color.
According to the study, individuals with darker skin tones have less education, have lower status jobs, are more likely to live in poverty, and are less likely to be affluent.
Andrés Villarreal, an associate professor in the Department of Sociology and the Population Research Center affiliate, published his findings in the October 2010 issue of the American Sociological Review.
He found a high level of agreement among respondents of a nationally representative survey of more than 2,000 participants about who belongs to three basic skin color categories (blanco/güero - or white; moreno claro - or light brown; and moreno oscuro - or dark brown). In addition, he investigated how skin color is associated with a person's socioeconomic status.
Respondents who are light brown have 29.5 percent lower odds of having a college education or more compared to those who are white, while those who are dark brown have 57.6 percent lower odds.
The difference in occupational status between light-brown and white respondents, and especially between dark-brown and white respondents, is substantially reduced once education level is introduced as a predictor. In other words, the disparity in access to education among respondents in different color categories may explain a large part, but not all, of the observed differences in occupational status.
Respondents in the lowest occupational categories, such as domestic workers, manual workers, drivers, and security guards, are much more likely to be in the dark-brown category and less likely to be in the white category than are respondents in the highest status occupations, such as office supervisors, professional workers, and employers. Only 9.4 percent of manual workers are considered white, compared with 28.4 percent of professionals. Light-brown workers have 25.2 percent lower odds of being a professional worker than whites, while a dark-brown respondent has 35.9 percent lower odds of being in the top two occupational categories than a white respondent.
"These differences in socioeconomic outcomes are, of course, insufficient to demonstrate the persistence of discriminatory practices against individuals based on the color of their skin," Villarreal says. "However, the fact that differences in occupational status across skin color categories cannot be fully explained by other factors, suggests that Mexicans with darker skin tones may in fact face discrimination in the labor market."
Provided by American Sociological Association
"Skin color linked to social inequality in contemporary Mexico, study shows." October 6th, 2010. http://phys.org/news205585751.html | <urn:uuid:7a3e6dbd-aa1a-473b-b66f-c9d9f1834daf> | {
"date": "2014-11-27T20:14:41",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009084.22/warc/CC-MAIN-20141125155649-00180-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.940442681312561,
"score": 3.296875,
"token_count": 582,
"url": "http://phys.org/print205585751.html"
} |
Wayne National Forest must be protected
Many of us love forests, and Marietta has long prided itself on being a tree city, but forests are not just beautiful to look at. Recent news reports have highlighted their importance to humans and the rest of life.
The August report of the Intergovernmental Panel on Climate Change recommended tree planting as perhaps the best way to combat climate change; trees sequester carbon and thereby help to neutralize emissions. Reports on the Amazon fires have stressed that tropical rainforest’s role as “the lungs of the planet,” lungs endangered as the wildfires release all the carbon stored in those massive trees. And trees do not only help to counteract humans’ carbon emissions: ongoing research has revealed that more than half of the world’s terrestrial species live in tree canopies, making healthy forests havens of biodiversity. However, deforestation has contributed to the 30% decline in bird populations documented in a study published this month.
The eastern United States has experienced a regrowth of many of its forests since misguided clearcutting in earlier centuries. Appalachia’s forests, home to plant and animal communities found nowhere else, are recognized as one of the world’s most biodiverse regions. Our eastern forests are used by migratory songbirds as rest and feeding spots on their spring and fall migrations. Some, like the climate-threatened cerulean warbler, breed only in mature deciduous forests. Southeastern Ohio’s Wayne National Forest, which since the 1930s has transformed from a stretch of denuded hillsides to a mature forest, is part of this global treasure. So many bird species, including the cerulean warbler, breed in Ohio’s only national forest that the Audubon Society has added the Wayne to its international list of Important Bird Areas.
Besides their importance to biodiversity, the large trees in older forests actually put on more growth each year and remove more carbon from the atmosphere than young trees do; this ability to offset large quantities of humans’ carbon emissions makes the protection of old forests essential in the fight against climate change. The forests of the eastern US are recognized as carbon sinks on par with the Amazon rainforest, absorbing, by some estimates, twenty percent of the country’s CO2 emissions; some of the planet’s “lungs” are right here in Ohio. With large swaths of South American forests lost to this year’s fires, protection of our closer-to-home resource only makes sense.
Unfortunately, for more than two years, the Bureau of Land Management has been leasing portions of the Wayne for oil and gas drilling. Just a few days ago, an auction for coal mining leases began. Drilling and mining endanger the health of a forest that protects the health of humans and other living things. The Wayne deserves protection, not exploitation. | <urn:uuid:70ab3c21-c1e7-4047-8872-022a889b6d4e> | {
"date": "2019-10-14T09:04:03",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986649841.6/warc/CC-MAIN-20191014074313-20191014101313-00256.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9478325247764587,
"score": 3.515625,
"token_count": 591,
"url": "http://www.mariettatimes.com/opinion/letters-to-the-editor/2019/10/wayne-national-forest-must-be-protected/"
} |
As you may have heard, a near-Earth asteroid, 2000 EM26, was supposed to orbit around Earth on Monday. With all eyes set on the Potentially Hazardous Asteroid, PHA, 2000 EM26 failed to show up, and Slooh has put an all-points bulletin to find the wayward object.
Slooh called the loss of a PHA as a bit "spooky," and asteroid 2000 EM26, with a diameter of 885 feet, roughly three football fields, has been quite elusive since its discovery. According to broadcast, the asteroid was discovered in 2000 and was observed 32 times but has not been seen since March 14, 2000.
Slooh, an international team of observatories, was set up at its Canary Islands observatory to monitor asteroid 2000 EM26's close approach to Earth. The live stream started with a discussion of the one year anniversary of asteroid 2012 DA14's flyby and the Chelyabinsk meteorite. But over the hourlong broadcast, the asteroid known as "Moby Dick" failed to appear.
Space agencies and astronomers track asteroids soon after they are discovered. NASA's Jet Propulsion Lab's Near-Earth Object Program was established to monitor asteroids like 2000 EM26. According to JPL, asteroid 2000 EM26 was supposed to make its close approach to Earth on Saturday at a distance of 8.8 lunar distances. Each lunar distance is approximately 238,900 miles.
According to the broadcast, asteroid 2000 EM26 has an orbit of 269 days but was not seen ahead of its close approach. Losing asteroids is pretty unusual as their trajectories and orbits get refined through multiple observations.
Michael Paolucci, CEO of Slooh, said in a statement, "We are calling on amateur astronomers to find this asteroid, and as a reward we will promote their accomplishment on our homepage for one year."
Astronomer Bob Berman and Slooh technical director Paul Cox says the disappearance of asteroid 2000 EM26 points out the need to continue observing and tracking near-Earth asteroids. Better observations can lead to the discovery of potential threats much earlier. For example, residents of Chelyabinsk, Russia, could have been warned of the meteorite explosion, which might have led to fewer injuries. | <urn:uuid:f1165238-acf7-474f-96c8-c17f013e09aa> | {
"date": "2016-10-25T22:58:54",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00469-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9750866293907166,
"score": 2.84375,
"token_count": 463,
"url": "http://www.ibtimes.com/asteroid-2000-em26-lost-space-885-foot-wide-asteroid-fails-show-projected-1556438"
} |
MONTHLY QUIZ: Concerning the reason we got CLL, choose the correct statement below:
- CLL can be familial, but that is rare.
- CLL incidence is increased in those exposed to Agent Orange in Vietnam.
- CLL incidence is increased in those exposed to radiation from Chernobyl.
- CLL is linked to benzene exposure.
- All of the above.
- 1, 2 and 3 are correct.
ANSWER: The correct answer is #6.
CLL mostly occurs episodically with no known cause, but a small percentage of CLL runs in families. Agent Orange is a recognized risk for CLL and exposed veterans who develop CLL maybe entitled to compensation. For a long time, radiation was not considered a risk due to the lack of increase of CLL after Hiroshima, but we now know from the Chernobyl experience, that Hiroshima was the exception due to the very low baseline incidence of CLL in Japanese. Benzenes and other solvents may increase the risk of other blood cancers, but there has been no link found with CLL. Usually we just don’t know why we got CLL.
THE BASICS: Watch and Wait
Watch and Wait or Active Observation, or as patients often call it, Watch and Worry is at first glance one of the most counter-intuitive concepts in CLL management. With many types of cancer early detection is everything and the prognosis gets worse with more advanced stages of the disease. That is the whole philosophy behind regular PAP smears, mammograms, colonoscopies, and skin check—catch the cancer early.
But in CLL until the study reported above, data showing that earlier treatment at the time of diagnosis helps, and in fact there is some old data that it doesn’t. There are two main reasons for this:
- Until recently, all treatment options were either relatively toxic or ineffective.
- Some patients will never need treatment so treating only exposes them to toxicities with no benefits.
This may change for some patients with this new data, but with treatment moving towards fixed duration with novel agents, the place for this early intervention approach is controversial. Why take a medicine for years that you may never need and has not yet been shown to improve overall survival when taken early? Is taking it when needed just as good? Outside of a clinical trial, watch and wait is still the smart option.
June 2019: At the EHA (European Hematology Assoc.) Annual Congress, for the 1st time a clinical trial that compared ibrutinib to placebo in asymptomatic early stage high risk patients proved that ibrutinib significantly improves progression free and event free survival and time to next treatment. There were no significant differences in adverse events between the two groups.
ACRONYM OF THE MONTH: TKI
TKIs or tyrosine kinase inhibitors are drugs that work by blocking activation of different proteins. In CLL, they inhibit signaling pathways, preventing the cancer cell from communicating with other cells. Ibrutinib, idelalisib, and duvelisib are oral TKIs approved to treat CLL and others are in development.
If the CLL Society has helped you or a loved one, please consider making a donation. | <urn:uuid:815cacfe-9c31-4c96-8d43-2cb05d5a22e3> | {
"date": "2019-09-16T14:12:28",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572744.7/warc/CC-MAIN-20190916135948-20190916161948-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9500011205673218,
"score": 2.6875,
"token_count": 689,
"url": "https://cllsociety.org/2019/07/july-2019-cll-bloodline/"
} |
The Australian Government recently released a Green Paper describing in more detail its proposal for an Emission Reduction Fund (ERF), the principle component of its Direct Action climate policy. The ERF will sit alongside renewable energy and reforestation policies, but is designed to do the bulk of the heavy lifting as the Government looks for some 430 million tonnes of cumulative reductions (see below) over the period 2014 to 2020. The ERF will have initial funding of about AU$ 1.55 billion over the forward period, with the money being used to buy project reductions (as Australian Carbon Credit Units or ACCUs) from the agriculture and industrial sectors of the economy by reverse auction. These reductions will be similar to those that are created through the Clean Development Mechanism (CDM) available under the Kyoto Protocol.
Although the fund and reverse auction process are discussed in some detail and appear as central to the policy framework, this may not be the case as the system is rolled out and the full framework developed. The issue that comes from such an approach to emissions reduction is that despite buying project reductions from the economy, the overall emissions pathway for the economy as a whole still does not follow the expected trajectory. The ERF may also encounter a number of issues seen with the CDM, all of which are some form of additionality;
- Determining if there would have been higher emissions had the project not happened. Perhaps the reduction is something that would have happened anyway or the counterfactual position of higher emissions would never have actually happened. For example, an energy efficiency gain is claimed in terms of a CO2 reduction but the efficiency gain is subject to some amount of rebound due to increased use of the more efficient service, therefore negating a real reduction in emissions. Further, the counterfactual of higher emissions might never have existed as the original less efficient process would not have operated at the higher level.
- Double counting – the project presumes a reduction that is already being counted by somebody else within the economy as a whole. For example, an energy efficiency gain in a certain part of the supply chain is claimed as an emissions reduction, but this is already intrinsic to the overall emissions outcome for another process.
- Rent seeking – project proponents seek government money for actions already underway or even construct an apparent reduction.
The Australian emissions inventory will be measured bottom up based on fuel consumption, changes in forest cover and land use and established estimates / protocols for agriculture, coal mine fugitive emissions, landfill etc. It will not be possible to simply subtract the ERF driven reductions from such a total unless they are separate sequestration based reductions, e.g. soil carbon. This is because the ERF reductions are themselves part of the overall emissions of the economy.
The Green Paper clearly recognizes theses issues and proposes that the overall emissions pathway through to 2020 must be safeguarded. In Section 4 it discusses the need for “An effectively designed framework to discourage emissions growth above historical levels . . . “, with associated terminology including phrases such as “covered entities”, “baseline emission levels”, “action required from businesses” and “compliance”. The safeguarding mechanism, rather than being a supplementary element of Direct Action, could end up becoming the main policy measure for decarbonisation if significant CO2 reductions are not achieved under the ERF. While this may not be the objective that the Government seeks, it does mean that the implementation of the safeguard mechanism needs to incorporate the design thinking that would otherwise be applied to the development of intended emission trading systems, such as the Alberta Specified Gas Emitters Regulation.
As currently described, the safeguarding mechanism looks like a baseline-and-credit system, with the baseline established at facility level either on an intensity or absolute emissions basis (both are referred to in the Green Paper). Should a facility exceed the baseline it could still achieve compliance by purchasing ACCUs from the market, either from project developers or other facilities that have over performed against their own baselines. Although the Government have made it very clear that they will not be establishing a system such as cap-and-trade that collects revenue from the market, facilities will nevertheless face compliance obligations and may have to purchase reduction units at the prevailing market price.
The level of trade and the need for facilities to purchase ACCUs will of course depend on the stringency of the baselines and this remains to be seen, however in setting these the Government will need to be mindful of the overall national goal and its need to comply with that. The development of a full baseline and credit trading system also raises the prospect of the market out-bidding the Government for ACCUs, particularly if the Government sets its own benchmark price for purchase, as is indicated in the Green Paper.
As Australia moves from a cap-and trade system under the Carbon pricing Mechanism (CPM) to the ERF and its associated safeguarding mechanism, the main change for the economy will be distributional in nature, given that a 5% reduction must still be achieved and the same types of projects should eventually appear. However, the biggest challenge facing any system in Australia could be around speedy design and implementation, given that the time remaining before 2020 is now very limited and the emission reduction projects being encouraged will themselves take time to deliver. | <urn:uuid:25d944a1-157b-4d10-9122-7e6d3c1eeddc> | {
"date": "2017-04-28T18:01:37",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123046.75/warc/CC-MAIN-20170423031203-00060-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9553739428520203,
"score": 2.578125,
"token_count": 1076,
"url": "http://www.theenergycollective.com/davidhone/347531/emissions-trading-direct-action-australia"
} |
What is Grace?
Grace refers to those gifts that bring about a supernatural friendship with God. Supernatural means an elevation of human nature beyond what it is naturally capable of attaining.
Grace is a sharing in the life of God, as his adopted children, making us heirs to the kingdom of heaven. This life of grace far exceeds the mere forgiveness of our sins and our worldly improvement as human beings. In this new and supernatural life we become partakers of the divine nature, co-heirs of Christ and temples of the Holy Spirit.
Grace is first bestowed in this present life. It is fulfilled in the sharing of God’s own happiness in the glory of heaven.
My dear friends, we are already God’s children, but what we shall be in the future has not yet been revealed. We are well aware that when he appears we shall be like him, because we shall see him as he really is. 1 John 3:2
There are two main kinds of grace. Sanctifying grace makes us children of God. Actual grace refers to the particular prompts and assistance that God gives us to help us act in ways leading to holiness. All grace comes to us from God by means of Jesus Christ and his Church. The sacraments, in particular, plant, nourish or restore the life of grace in us.
The life of grace
Just as natural human life develops towards maturity, so too does the life of grace. As grace matures, building on our human nature, it also brings this nature to its own perfection.
|LIFE OF NATURE||LIFE OF GRACE|
|Natural birth||Baptism (supernatural birth)|
|Philosophical virtues (e.g. prudence)||Theological virtues (faith, hope, charity)|
|Food and drink||The Eucharist|
|Human society||The Church|
|Growth to adulthood||Growth in holiness|
|Human happiness||The vision of God|
Mistakes regarding grace
Pelagianism is the belief that we can save ourselves. In this mistaken understanding, ‘grace’ is only the forgiveness of sins and the example of Christ. Determinism holds that ‘grace’ determines absolutely the eternal outcome of our lives and that our free wills have no significant role. Modernism holds that ‘grace’ is the same as nature. It claims that by nature we are one with God, or part of God or gradually becoming ‘God’.
What are the Beatitudes?
The Beatitudes are eight states of blessedness proclaimed by Christ in the Sermon on the Mount. These states manifest the life of heaven on earth, bringing a foretaste and promise of joy even amid earthly suffering.
Blessed are the poor in spirit, for theirs is the Kingdom of Heaven.
Poverty of spirit enables us not only to use the goods of this world (such as riches and honours) in moderation, but to be willing to surrender all of them joyfully for the sake of the kingdom. (Mt 19:21)
Blessed are those who mourn, for they shall be comforted.
Mourning might not seem blessed because earthly joys are not themselves evil, although they can still come to dominate our lives. However, by grace we set our hearts on heaven and are dissatisfied with anything less. (Jn 16:20)
Blessed are the meek, for they shall inherit the earth.
Meekness refuses even a proportionate and just response to evil. Jesus showed us the meaning of meekness when he submitted to being scourged, mocked and crucified without striking back. (Lk 6:29)
Blessed are those who hunger and thirst for righteousness, for they shall be satisfied.
Hunger and thirst for righteousness goes beyond doing our duties to our neighbour. It is an eager desire, like an appetite of hunger and thirst, to do works of mercy, so that those around us and ourselves grow in holiness. (Mt 6:31-33)
Blessed are the merciful, for they shall obtain mercy.
Mercy exceeds human benevolence and natural pardon for wrongdoing. It is a lavish bestowing of our time and goods on those who cannot repay us. It is also the gift of forgiving even outrageous wrongs against us. (Mt 5:43-44)
Blessed are the pure in heart, for they shall see God.
Purity of heart is far more than preserving oneself from the stain of sin. It is the gift of a God-like heart, to love God for his own sake with a single minded clarity and passion, and to love others as God loves them. (Jn 13:34-35)
Blessed are the peacemakers, for they shall be called sons of God.
Peacemaking goes beyond tranquil good order in earthly relations. It is the gift of establishing unity with others in a friendship founded on the desire for their supernatural good, that is, to reach our home with God in heaven. (Jn 14:27)
Blessed are those who are persecuted for righteousness’ sake; be glad, for your reward is great in heaven.
Persecution refers specifically to the trials that Christians face for preaching and living the Gospel. It blesses us in that it conforms us to Christ crucified, and holds the promise of great reward in heaven. (Jn 16:33)
This article is originally from ‘CREDO: The Catholic Faith explained’ by CTS. | <urn:uuid:84ed04cb-d8d7-46ef-90a4-c5289312ff72> | {
"date": "2019-07-15T18:42:43",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195523840.34/warc/CC-MAIN-20190715175205-20190715200239-00050.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.942502498626709,
"score": 2.625,
"token_count": 1174,
"url": "https://dowym.com/discover/grace-beatitudes/"
} |
The Jacques Cartier Bridge spans the St. Lawrence River and Seaway facing St. Helen’s Island. The bridge is located between the Victoria Bridge and Louis H. Lafontaine bridge-tunnel some 4.5 miles (7 km) upstream from the latter.
On the South Shore, the bridge has a direct connection with Highways 132, 134 and 116. On the Island of Montreal, the bridge is connected to De Lorimier Avenue, northbound to Sherbrooke Street (Highway 138) and southbound to the Ville Marie Expressway (A720).
Access and exit ramps, located in the middle of the bridge, provide access to St. Helen’s Island.
In 1962, an estimated 18 million vehicles crossed the Jacques Cartier Bridge annually.
Approximately 35.8 million vehicles now cross the Jacques Cartier Bridge every year.
Lane Signalling System (September 28, 1961)
A lane signalling system has been in place since September 28, 1961 to reverse the direction of traffic in the middle lane of the bridge. This creates three lanes in one direction and two lanes in the other according to rush hour traffic needs.
Lighting System (1976)
The bridge is lit by 195 light standards installed in 1976. However, in 2001 and 2002, major work was carried out on the lighting system.
The bridge can be divided into three parts, consisting of 9 sections
Today, the deck of the bridge is 72 feet, 6 inches (22.1 m) wide, including 8 feet 2 inches (2.5 m) for a cantilevered bike path on one side and 4 feet, 11 inches (1.5 m) for cantilevered sidewalks on the other side, and 60 feet (18.3 m) of roadway between the curbs. The deck is supported by riveted trusses resting on concrete piers (south approach) or steel towers (north approach). In the cantilevered section, studs were used to permit articulation of some structures, including the anchoring of trusses to the piers (axis 23 and 26).
The bridge has three curves, two of them on the north side.
The first curve is a 10.5 jog before the section that passes over St. Helen’s Island. In order to keep the piers from being exposed to undue turbulence caused by the currents that run at slightly different angles on either side of the Island, the engineers had two options: keep the deck in a straight line and compensate for the different angles with an asymmetrical structure, or keep the structure symmetrical and curve the deck. The second option was chosen as being the most technically feasible at the time!
The second curve, named the “Craig Curve”, was designed to align the axis of the deck with the axis of the north>south traffic lanes on the Island of Montreal. To change the longitudinal and transverse profile of the road, major repairs were carried out in 2002 during the bridge deck replacement.
The last curve meets De Lorimier Avenue. According to the initial plans, the traffic on the bridge was to travel onto Bordeaux Street. However, a man by the name of Hector Barsalou, the owner of a soap factory on De Lorimier Avenue near De Maisonneuve Blvd, obstinately refused to let his building be expropriated to make way for the entrance to the bridge. As the expropriation laws were different from those today, the engineers had to come up with a way to circumvent this obstacle. | <urn:uuid:62df71e3-aa64-4083-88b9-2e972178e5b7> | {
"date": "2014-04-17T06:41:27",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00035-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.952424168586731,
"score": 2.75,
"token_count": 730,
"url": "http://jccbi.ca/bridges-structures/jacques-cartier-bridge/the-bridge/"
} |
- 5th April 2013 at 10:04 #15204
This is quite a open question. Research says that the sources of conflict are often resources, time and money. Think about you day to day practice what at the main sources fo conflict? Remeber each paragraph needs 2-3 sentances.5th April 2013 at 16:45 #15206
Here’s my answer… Took 18 mins, but had to rush to think up examples, which may be a bit lame!
Conflict Management is the process of identifying and addressing differences, which if left unmanaged could impact on project objectives. Effectively, this prevents differences becoming destructive elements. Conflict can exist throughout the phases of the project with some of the following sources :
1. Concept phase – Conflict can come in this phase with regards to why the project is actually required. Stakeholders may view the project as un-needed and potentially hostile and disruptive to the project team. The definition of the scope of the project may cause conflict as some stakeholders will want the project to achieve more than the what’s possible with the allocated funds. An example of this could be the residents near a planned train line extension being hostile with regards for why the line is taking the route proposed.
2. Definition – during this phase, conflict may come in the requirements gathering process. Users and Stakeholders will need to prioritise which of the requirements are most beneficial and with a project under fiscal constraints, some may be classified as “nice to have” and left out of the project. Conflict can be good at this stage, as it can often drive better decisions, provided it is controlled and managed. An example could be the local MP on the train line extension being consulted by the angry residents, and to overcome the negative sentiment, the project includes larger safety barriers.
3. Implementation – Conflict in this stage could come from the change control & risk management areas. Change requests are likely and risks will materialise which may cause conflict with existing requirements or impact the progress which has already been made. Justification of the change may be required for everyone to see the benefits of the change and to overcome the conflict, but this may lead to rework or other requirements being dropped, leading to further conflict. The requirement to continue delivering to budget and time, will be impacted and will have conflicting implications in this scenario. An example of this could be a request to change to overhead power cables on the train line extension, causing lots of rework.
4. Handover and closeout – in this phase, conflict could come from the subjective acceptance of the completed project. If quality criteria has not been fully defined, there will be scope for differing interpretations of quality, leading to conflict. The transition to BAU, could also be a source of conflict with the functional dept. unwilling to take ownership, leading to conflict between the PM and the functional managers. An example of this could be the finished train line extension having too many defects for the train operators to run to a defined schedule.
5. All Phases – Personal conflict can and will occur during all phases. This will include conflict between the PM and Functional managers over resource usage in a matrix organisation. It could also include conflict between staff and the PM over the team members work priorities and differing day-to-day roles & responsibilities from the project demands. Conflict can also occur between team members for numerous reasons, and this will need to be controlled and managed to prevent the consequences of the conflict impacting on motivation, costs, moral and team performance.
Any feedback much appreciated.
Paul7th April 2013 at 19:22 #15205
Paul, I really like this answer. I like the way you have structured around the lifecycle and the examples you use seem realistic enough for me. ten more like this and you should pass without too much difficulty
You must be logged in to reply to this topic. | <urn:uuid:6ec1f832-be17-410f-afb8-0a0df39a1dac> | {
"date": "2018-09-26T05:46:00",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163326.85/warc/CC-MAIN-20180926041849-20180926062249-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.958673357963562,
"score": 2.625,
"token_count": 796,
"url": "https://www.parallelprojecttraining.com/forums/topic/describe-in-five-short-paragraphs-the-sources-of-conflict-in-the-project-life-cycle/"
} |
The Fraser Canyon is an 84 km landform of the Fraser River where it descends rapidly through narrow rock gorges in the Coast Mountains en route from the Interior Plateau of British Columbia to the Fraser Valley. Colloquially, the term "Fraser Canyon" is often used to include the Thompson Canyon from Lytton to Ashcroft, since they form the same highway route which most people are familiar with, although it is actually reckoned to begin above Williams Lake, British Columbia at Soda Creek Canyon near the town of the same name.
The canyon was formed during the Miocene period (23.7–5.3 million years ago) by the river cutting into the uplifting Interior Plateau. From the northern Cariboo to Fountain, the river follows the line of the huge Fraser Fault, which runs on a north-south axis and meets the Yalakom Fault a few miles downstream from Lillooet. Exposures of lava flows are present in cliffs along the Fraser Canyon. They represent volcanic activity in the southern Chilcotin Group during the Pliocene period and the volcanic vents of their origins have not been discovered.
The canyon extends 270 kilometres (170 mi) north of Yale to the confluence of the Chilcotin River. Its southern stretch is a major transportation corridor to the Interior from "the Coast", with the Canadian National and Canadian Pacific Railways and the Trans-Canada Highway carved out of its rock faces, with many of the canyon's side-crevasses spanned by bridges and trestles. Prior to the double-tracking of those railways and major upgrades to Highway 1 (the Trans Canada Highway), travel through the canyon was even more precarious than it is now. During the frontier era it was a major obstacle between the Lower Mainland and the Interior Plateau, and the slender trails along its rocky walls - many of them little better than notches cut into granite, with a few handholds - were compared to goat-tracks.
North of Lytton, it is followed by BC Highway 12, then from Lillooet to Pavilion by BC Hwy 99 (the farther end of the Sea-to-Sky Highway, though not carrying that name in this area). The British Columbia Railway (the BC Railway is now owned and operated by the CN) line follows the same stretch of canyon from Lillooet to just beyond Pavilion. Between there and the mouth of the Chilcotin River there are only rough ranching roads, and the terrain is a mix of canyon depths flanked by arid benchland and high plateau. Between Pavilion and Lillooet, the river's gorge is at its maximum depth, with the river throttled through a series of narrow gorges flanked by high cliffs, though still flanked above those cliffs by wide benchlands which stand on the foreshoulder of the mountain ranges flanking the gorge.
At Hells Gate, near Boston Bar, the canyon walls rise about 1,000 metres (3,300 ft) above the rapids. Fish ladders along the river's side permit migrating salmon to bypass a rockslide that diverted the river during the blasting of the Canadian Northern Railway line in 1913. The area around Hell's Gate carries the name Black Canyon, which may either be a reference to the colour of the rocks when it rains, or the name of a community built on the cliffsides here during the Fraser Canyon Gold Rush. Today there is a specially-built air-tram, like the kind used in ski resorts, which takes tourists down to Hells Gate, where visitors may view the fish ladders as well as the boiling rush of the Fraser's waters. A set of tourist pavilions with shops and café now occupies the site of the workmen's housing seen in the accompanying image.
At Siska, a few minutes south of Lytton, there are the Cisco bridges—a pair of railway bridges at the throat of a rocky gorge. From south to north, the Canadian Pacific has been on the west side of the canyon, while the Canadian National has been on the east side. Here Cisco (Skiska), the two railways switch sides: the CP—(520-foot (160 m))-long truss bridge—crosses to the east, the CN—on a 810-foot (250 m) steel-arched bridge over the CP—is now on the west. The two railways now have an agreement to allow directional running through the canyon as far as Basque. All eastbound trains—CN, CP, and Via Rail's eastbound Canadian—run on the CP line. All westbound trains—CN, CP, Via Rail's westbound Canadian—use the CN tracks.
Upper Fraser Canyon
Just north of Lillooet, narrow rock ledges choke the river just at the confluence of the lower canyon of the Bridge River, forming an obstacle to migrating fish that has made this spot the busiest aboriginal fishing site on the river, from ancient times to the present. Concentrations of First Nations people here, from all tribes of the Interior, were believed to have been in excess of 10,000.
Many stretches of the Fraser are named in their own right, starting with the Little Canyon between Yale and Spuzzum, which is officially the lowest reach of the Fraser Canyon (although in regional terms Hope, 20 miles (32 km) farther south, is considered a canyon town and to be the southern outlet of the canyon because the highway became more difficult from that point; the river is navigable to Yale). Between the Spuzzum and Boston Bar was known in the gold rush as the Big Canyon or Black Canyon; there are several named subcanyons of the Big Canyon, most famously Hells Gate Canyon (in some descriptions the Black Canyon is below Hell's Gate). Above the Big Canyon there are the Lillooet Canyon, Fountain Canyon, Glen Fraser Canyon, Moran Canyon, High Bar Canyon, French Bar Canyon and more all the way up to Soda Creek Canyon near Quesnel. Upstream from there the river flows in wider country, but in the Robson Valley between Prince George and Tête Jaune Cache, the river enters the Grand Canyon of the Fraser. The Black Canyon was the site of a shantytown of the same name, much of which was on catwalks on the ramparts of its dark-rock cliffs.
Nearly all tributaries of the Fraser have canyons of varying scale; the few exceptions include the Pitt and the Chilliwack in the Lower Fraser Valley. The Thompson Canyon, from Lytton to Ashcroft, is a sequence of large canyons of its own, some of them also named, although most British Columbians and travellers think of it as part of the Fraser Canyon. Other important canyons on tributaries include Coquihalla Canyon, the Bridge River Canyon, Seton Canyon and adjacent Cayoosh Canyon, Pavilion Canyon, Vermilion Canyon (Slok Creek) and Churn Creek Canyon. The Chilcotin River also has several subcanyons, as does the Chilko River, notably Lava Canyon and another Black Canyon.
There are other canyons on the Fraser that are not considered part of the canyon, notably at Soda Creek, between Williams Lake and Prince George. The official but comparatively diminutive Grand Canyon of the Fraser is in the river's upper stretch through the Rocky Mountain Trench, about 115 km (71 mi) upstream from Prince George and about 20 km (12 mi) upstream from the Fraser's confluence with the Bowron River. Despite its name, the Grand Canyon of the Fraser is only one treacherous switchback rapid in a shallow rock gorge, and it has neither the roughness of water nor the depth and severity of canyon as is found in the area south from Big Bar to Lillooet or between Boston Bar and Yale.
Almost all of the rivers and creeks feeding the Fraser from Williams Lake south have their own canyons which open onto the Fraser, or are just up side-valleys a few miles. These include Marble Canyon, Churn Creek, the Chilcotin River, the Bridge River, Seton Lake and Cayoosh Creek, the Stein River, the Nahatlatch River, the Coquihalla River and the innumerable smaller creeks flanking the river between Kanaka Bar and Yale.
The Fraser Canyon Highway Tunnels were constructed from the spring of 1957 to 1964 as part of the Trans-Canada Highway project. There are seven tunnels in total, the shortest being about 57 metres (187 ft); the longest, however, is about 610 metres (2,000 ft) and is one of North America's longest. They are situated between Yale and Boston Bar.
In order from south to north, they are: Yale (completed 1963), Saddle Rock (1958), Sailor Bar (1959), Alexandra (1964), Hell's Gate (1960), Ferrabee (1964) and China Bar (1961). The Hell's Gate tunnel is the only tunnel that does not have lights, while the China Bar tunnel is the only tunnel that requires ventilation.
The China Bar and Alexandra tunnels have warning lights that are activated by cyclists before they enter the tunnels. This was required because the tunnels are curved. It is expected that the Ferrabee tunnel will get the same warning lights as it too is curved.
At the mouth of the Canyon, an archeological site documents the presence of the Stó:lō people in the area from the early Holocene period, 8,000 to 10,000 years ago after the retreat of the Fraser Glacier. An archaeological dig farther upriver at Keatley Creek, near Pavilion, is dated to 8000 BP and dates from a time when a huge lake filled what is now the canyon above Lillooet, created by a slide a few miles south of the present-day town.
During the Fraser Canyon Gold Rush of 1858–1860, 10,500 miners and an untold number of hangers-on populated its banks and towns. The Fraser Canyon War and the opera buffa farce of a series of events known as McGowan's War occurred during the gold rush. Other important histories connected with the Canyon include the building of the Cariboo Wagon Road and the construction of the Canadian Pacific Railway.
The river is navigable between Boston Bar and Lillooet and also between Big Bar Ferry and Prince George and beyond, although rapids at Soda Canyon and elsewhere were still difficult waters for the many steamboats which piloted the river in the 19th and early 20th centuries. The Skuzzy was the first sternwheeler to make it through the rapids, which was built with multiple-compartment hulls to preserve it from sinking from rock damage. It was used to haul equipment and supplies during the construction of the Canadian Pacific Railway.
With the construction of the Canadian Pacific Railway in the 1880s came the destruction of key portions of the Cariboo Wagon Road, as there was no room for both railway and road on the narrow, steep mountainsides above the river. As a result, the towns of Lytton and Boston Bar were cut off from road access with the rest of the province, other than by the difficult wagon road to Lillooet via Fountain. During the automotive age and following the construction of the Canadian Northern Railway in 1904–05, a newer version of the road was built through the canyon. The Fraser Canyon Highway was surveyed in 1920 and constructed in 1924–25 with a through-route available after the completion of the (second) Alexandra Suspension Bridge in 1926. This was known as the Cariboo Highway and Highway 1 until the construction and designation of the Trans-Canada Highway (circa-1962).
- Anderson River
- Bridge River
- Chilcotin River
- Churn Creek
- Coquihalla River
- Fraser River
- Nahatlatch River
- Thompson River
- Stein River
Towns and localities
- Riske Creek
- Big Bar
- Boston Bar-North Bend
- Emory Creek
- Hill's Bar
- Kanaka Bar
- Big Bar Ferry
- Dewdney Trail
- Hudson's Bay Brigade Trail
- Marble Canyon
- Skagit Trail
|Wikimedia Commons has media related to Fraser Canyon.|
- BCGNIS entry "Black Canyon"
- Lorraine Harris, Fraser Canyon: From Cariboo Road to Super Highway, Hancock House, 1984. | <urn:uuid:5941f08c-cf67-4a39-92a8-bf31cc048105> | {
"date": "2014-12-17T20:12:02",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802764752.1/warc/CC-MAIN-20141217075244-00035-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9552602171897888,
"score": 3.421875,
"token_count": 2573,
"url": "http://en.wikipedia.org/wiki/Fraser_Canyon"
} |
Grooming pubic hair may be linked to an increased risk of contracting a sexually transmitted disease, according to a new study.
The study, published in the Sexually Transmitted Infections journal, surveyed 7,580 people between the ages of 18 and 65. The researches asked the participants whether they trimmed or shaved their pubic hair; how often they did so and what tools they used. Researches also asked the participants how many sexual partners they've had and whether they've had a sexually transmitted infection.
The results showed that participants who trimmed or shaved their pubic hair had a higher rate of contracting an STI, but did not prove a direct correlation between the two.
Participants who regularly groomed their pubic hair were 80 percent more likely to report contracting an STI than those who never groomed, according to the study.
The researchers note small tears in the skin created during grooming could allow STI-causing bacteria to infect someone who shaves their private parts.
But the correlation could also be accounted for if the people who groom tend to have more sexual partners, thus putting them at greater risk of contracting an STI.
The study had other limitations, like not asking participants if they used condoms during sex, Debby Herbenick, an associate professor at Indiana University Bloomington, told Live Science. | <urn:uuid:e55e2d31-c99d-4faa-aab2-25819b90fe6d> | {
"date": "2017-09-23T20:13:27",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689775.73/warc/CC-MAIN-20170923194310-20170923214310-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.970272421836853,
"score": 2.828125,
"token_count": 273,
"url": "http://www.nbcdfw.com/news/national-international/Grooming-Private-Parts-may-Increase-Risk-of-STIs-Study-405274305.html"
} |
At the bottom of the Thames River last week, Navy divers dug up the sensors and cables that measure magnetic signatures of military ships and submarines.
Even though the Navy is replacing the 20-year-old underwater range with a new one, most people don't know the range exists. And even those who have heard about it sometimes don't understand what it really does.
A steel-hulled ship is surrounded by a magnetic field. As the ship moves through the water and traverses the Earth's natural magnetic fields between the North and South poles, the ship's magnetic field changes.
The Navy checks its vessels to make sure the magnetism present in the hulls will not trigger magnetic mines or make the ships easier to detect.
The only Magnetic Silencing Facility in the Northeast is operated by the Naval Submarine Base in Groton. When military ships pass over the sensors and cables at the center of the channel, the information is converted into a computer file and Preston E. Tone-Pah-Hote Jr., who oversees the range operations, interprets the results.
The information is relayed to Navy officials, who determine whether the magnetization needs to be reduced. The range is also used by Coast Guard vessels and NATO ships.
Removing or neutralizing a magnetic field is a process known as degaussing, and the local range is often called a "degaussing range." It is even described as such on a chart in Tone-Pah-Hote's office.
But, Tone-Pah-Hote said, it technically is not. He does not have the ability to help a ship calibrate the degaussing equipment it has on board. Coils are wound in specific locations within the hull and the electric current that flows through them can be adjusted to reduce the ship's effect on the Earth's magnetic field.
The range is a "check range" since it checks ships' magnetic characteristics. Because those measurements fall under the umbrella of degaussing, the name "degaussing range" seems to have stuck.
Surface ships in the Atlantic normally go through a similar range in Norfolk, Va., or one in Mayport, Fla. The USS Bainbridge (DDG 96) and other ships used the local range when the one in Norfolk was repaired from 2010 to earlier this year. A magnetic treatment facility in Kings Bay, Ga., can minimize the level of permanent magnetism.
Tone-Pah-Hote, who served 24 years in the submarine force, estimates he takes about 300 measurements a year - anytime a naval ship enters or leaves the harbor he checks it. His office on the water's edge near Fort Trumbull has a great view, but none of the quirky equipment one might expect when hearing the name "Magnetic Silencing Facility."
The work on the new range, which began Nov. 1, is expected to cost $3.5 million and be finished in August. Tone-Pah-Hote said he does not expect any channel closures while the work is being done. | <urn:uuid:90ec1912-4b67-4dd0-b5a3-65332423c26e> | {
"date": "2013-06-19T12:56:02",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9508847594261169,
"score": 3.453125,
"token_count": 628,
"url": "http://www.theday.com/article/20121203/NWS09/312039940/1070/Chris-Murphy-for-US-Senate-seat"
} |
|No such thing as a small change|
split and join
Regular expressions are used to match delimiters with the split function, to break up strings into a list of substrings. The join function is in some ways the inverse of split. It takes a list of strings and joins them together again, optionally, with a delimiter. We'll discuss split first, and then move on to join.
A simple example...
Let's first consider a simple use of split: split a string on whitespace.
@simpsons now contains "Bart", "", "Lisa", "Maggie", "Marge", and "Homer".
There is an empty element in the list that split placed in @simpsons. That is because \s matched exactly one whitespace character. But in our string, $line, there were two spaces between Bart and Lisa. Split, using single whitespaces as delimiters, created an empty string at the point where two whitespaces were found next to each other. That also includes preceding whitespace. In fact, empty delimiters found anywhere in the string will result in empty strings being returned as part of the list of strings.
We can specify a more flexible delimiter that eliminates the creation of an empty string in the list.
@simpsons now contains "Bart", "Lisa", "Maggie", "Marge", and "Homer", because the delimiter match is seen as one or more whitespaces, multiple whitespaces next to each other are consumed as one delimiter.
Where do delimiters go?
"What does split do with the delimiters?" Usually it discards them, returning only what is found to either side of the delimiters (including empty strings if two delimiters are next to each other, as seen in our first example). Let's examine that point in the following example:
The delimiter is something visible: 'humility'. And after this code executes, @japh contains four strings, "Just ", "another ", "Perl ", and "hacker.". 'humility' bit the bit-bucket, and was tossed aside.
If you want to keep the delimiters you can. Here's an example of how. Hint, you use capturing parenthesis.
@list now contains "alpha","-", "bravo","-", "charlie", and so on. The parenthesis caused the delimiters to be captured into the list passed to @list right alongside the stuff between the delimiters.
The null delimiter
What happens if the delimiter is indicated to be a null string (a string of zero characters)? Let's find out.
Now @letters contains a list of four letters, "M", "o", "n", and "k". If split is given a null string as a delimiter, it splits on each null position in the string, or in other words, every character boundary. The effect is that the split returns a list broken into individual characters of $string.
Split's return value
Earlier I mentioned that split returns a list. That list, of course, can be stored in an array, and often is. But another use of split is to store its return values in a list of scalars. Take the following code:
What happened to the person's sex? It's just discarded because we're only accepting four of the five fields into our list of scalars. And how does split know what string to split up? When split isn't explicitly given a string to split up, it assumes you want to split the contents of $_. That's handy, because foreach aliases $_ to each element (one at a time) of @mydata.
Words about Context
Put to its normal use, split is used in list context. It may also be used in scalar context, though its use in scalar context is deprecated. In scalar context, split returns the number of fields found, and splits into the @_ array. It's easy to see why that might not be desirable, and thus, why using split in scalar context is frowned upon.
The limit argument
Split can optionally take a third argument. If you specify a third argument to split, as in @list = split ( /\s+/, $string, 3 ); split returns no more than the number of fields you specify in the third argument. So if you combine that with our previous example.....
Now, $everything_else contains Bart's phone number, his age, and his sex, delimited by ":", because we told split to stop early. If you specify a negative limit value, split understands that as being the same as an arbitrarily large limit.
Unspecified split pattern
As mentioned before, limit is an optional parameter. If you leave limit off, you may also, optionally, choose to not specify the split string. Leaving out the split string causes split to attempt to split the string contained in $_. And if you leave off the split string (and limit), you may also choose to not specify a delimiter pattern.
If you leave off the pattern, split assumes you want to split on /\s+/. Not specifying a pattern also causes split to skip leading whitespace. It then splits on any whitespace field (of one or more whitespaces), and skips past any trailing whitespace. One special case is when you specify the string literal, " " (a quoted space), which does the same thing as specifying no delimiter at all (no argument).
The star quantifier (zero or more)
Finally, consider what happens if we specify a split delimiter of /\s*/. The quantifier "*" means zero or more of the item it is quantifying. So this split can split on nothing (character boundaries), any amount of whitespace. And remember, delimiters get thrown away. See this in action:
@letters now contains "H", "e", "l", "l", "o", "w", "o", "r", "l", "d", and "!".
Using split versus Regular Expressions
There are cases where it is equally easy to use a regexp in list context to split a string as it is to use the split function. Consider the following examples:
In the first example you're defining what to throw away. In the second, you're defining what to keep. But you're getting the same results. That is a case where it's equally easy to use either syntax.
But what if you need to be more specific as to what you keep, and perhaps are a little less concerned with what comes between what you're keeping? That's a situation where a regexp is probably a better choice. See the following example:
That type of a match would be difficult to accomplish with split. Try not to fall into the pitfall of using one where the other would be handier. In general, if you know what you want to keep, use a regexp. If you know what you want to get rid of, use split. That's an oversimplification, but start there and if you start tearing your hair out over the code, consider taking another approach. There is always more than one way to do it.
That's enough for split, let's take a look at join.
join: Putting it back together
If you're exhausted by the many ways to use split, you can rest assured that join isn't nearly so complicated. We can over-simplify by saying that join, does the inverse of split. If we said that, we would be mostly accurate. But there are no pattern matches going on. Join takes a string that specifies the delimiter to be concatenated between each item in the list supplied by subsequent parameter(s). Where split accommodates delimiters through a regular expression, allowing for different delimiters as long as they match the regexp, join makes no attempt to allow for differing delimiters. You specify the same delimiter for each item in the list being joined, or you specify no delimiter at all. Those are your choices. Easy.
To join a list of scalars together into one colon delimited string, do this:
Whew, that was easy. You can also join lists contained in arrays:
Use join to concatenate
It turns out that join is the most efficient way to concatenate many strings together at once; better than the '.' operator.
How do you do that? Like this:
As any good Perlish function should, join will accept an actual list, not just an array holding a list. So you can say this:
Which puts humility between each word in the list.
By specifying a null delimiter (nothing between the quotes), you're telling join to join up the elements in @array, one after another, with nothing between them. Easy.
Hopefully you've still got some energy left. If you do, dive back into the Tutorial.
Credits and updates | <urn:uuid:c82b1c4f-a8e8-4bc2-b77d-268085097fd7> | {
"date": "2014-08-01T14:08:47",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274987.43/warc/CC-MAIN-20140728011754-00432-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9088472723960876,
"score": 4.40625,
"token_count": 1873,
"url": "http://www.perlmonks.org/?parent=591988;node_id=3333"
} |
How to Manage Pests
UC Pest Management Guidelines
American Plum Borer
Scientific Name: Euzophera semifuneralis
(Reviewed 3/14, updated 3/14)
In this Guideline:
Description of the pest
The adult moth is gray with a wing expanse of 0.75 to 1 inch (19–25 mm) and brown and black markings on the wings. Adult females lay eggs near where callous tissue has developed, such as at pruning wounds, crown galls, or scaffold crotches. Larvae bore into the tree to feed on vascular tissue. Mature caterpillars are dusky white or pinkish and are about 1 inch long. American plum borer overwinters in a protective cocoon spun in a sheltered location on the tree; pupation takes place in spring. There are three to four generations each year.
Larvae attack soft, spongy, calluslike tissue, which occurs at graft unions, tree wounds, and in olive knots. They can continue to feed into normal tissue, girdling limbs, which can cause small branches to break. Gummy frass and liquid exudate may occur around injured wood.
Monitor trees in spring and summer for frass and gum pockets. The borer can be detected by brownish frass and webbing at feeding sites. If larvae are present, remove and destroy infested wood if possible. If wood cannot be removed, spray trees with a hand held sprayer from one foot above the scaffold crotch to one foot below, two to three times during the growing season. The first application should be mid- to late April and subsequent applications at 6-week intervals. Efficacy is improved if the trunk is painted immediately following a trunk spray with a latex paint to protect against sunburn. The paint helps to preserve the insecticide and give protection over a longer period of time.
UC IPM Pest Management Guidelines: Olive
Insects and Mites
F. G. Zalom, Entomology, UC Davis | <urn:uuid:bc028ada-986a-41c9-84dd-69bd6ecd0bb5> | {
"date": "2015-02-27T11:39:06",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00059-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9349223971366882,
"score": 2.9375,
"token_count": 426,
"url": "http://ipm.ucdavis.edu/PMG/r583301211.html"
} |
fiddler crab, common name for small, amphibious crabs belonging to the genus Uca. They are characterized by a rectangular carapace (shell) and a narrow abdomen, which is flexed under the body. They are called fiddler crabs because the males have one enormous claw, held in front of the body like a fiddle. This claw often contrasts in color with the rest of the body, and is used by the male at certain times of the year to attract females in a complicated courtship display procedure, characteristically different in each species of Uca. The claw also functions to warn off intruders and to establish territories. The female Uca has two small claws on the first appendages. Some species of fiddler crabs live on sandy beaches that are somewhat protected from extreme wave action. Others live in muddy marshes and estuaries. The Uca species living on sandy beaches, such as the common Atlantic fiddler, U. pugilator, make burrows about 1 ft (30 cm) deep, just below the high tide line. The sand is carried to the surface by specialized legs of the crab, and pushed away from the entrance. Fiddler crabs are poor swimmers and rarely enter the water during their adult lives. During the spring and summer, the fiddlers remain in their burrows only during high tide periods. The entrances of the burrows are covered with sand, and the burrows contain a bubble of air, which the crabs use for respiration. When the tide ebbs, the fiddlers emerge and scurry about, collecting food in the drift lines left by the ebbing water. Both claws of the female and the smaller claw of the male are used to scoop up sand and pass the grains to the mouthparts. Certain specialized appendages (the first and second maxillipeds) have spoon-shaped setae, used to scour organic matter from the sand grains and pass it to the mouth. The sand grains are then rejected in the form of small sand balls. After mating, the female fiddler crab carries the fertilized eggs under her flexed abdomen. Certain cyclic changes occur in Uca (as well as in some other crustaceans), such as changes in pigmentation. During the day the crabs are dark; at night they are pale. Fiddler crabs are classified in the phylum Arthropoda, subphylum Crustacea, order Decapoda.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. | <urn:uuid:7b3f665d-7695-4436-90ec-56e476f4c0be> | {
"date": "2016-07-25T08:20:47",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824217.36/warc/CC-MAIN-20160723071024-00208-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9498154520988464,
"score": 4.1875,
"token_count": 518,
"url": "http://www.factmonster.com/encyclopedia/science/fiddler-crab.html"
} |
|Radke, J - RETIRED ARS|
|Laflen, J - RETIRED ARS|
Submitted to: Journal of Soil and Water Conservation
Publication Type: Peer Reviewed Journal
Publication Acceptance Date: September 13, 2000
Publication Date: N/A
Interpretive Summary: Oat and rye cover crops have the potential to reduce erosion following soybean in Iowa, but cover crop growth between soybean harvest and corn planting is limited. Overseeding oat and rye cover crops into soybean in August establishes the cover crops before soybean leaf drop and results in more growth in the fall. An oat cover crop will winterkill in the northern Corn Belt, but rye regrows in the spring. This research showed that overseeding oat and rye cover crops into soybean in August can reduce erosion in the spring, especially on sites where overland water flow occurs. Additionally, in management systems or in years when the soybean crop does not produce adequate residue to cover the soil, the oat and rye cover crops will supplement residue cover and anchor existing residues. Thus, oat and rye cover crops can improve soil conservation between soybean harvest and corn planting in the upper Midwest. These findings will be of use to action agencies and farmers alike.
Technical Abstract: Oat and rye cover crops have the potential to reduce erosion following soybean in Iowa. Oat and rye cover crops were overseeded into no-till soybeans in August of 1995, 1996, and 1997 on a sloping site. Infiltration, runoff, and erosion were measured in April of 1996, 1997, and 1998 using an oscillating sprinkler-head rainfall simulator that applied water at approximately 125 mm hr**-1. Rill erosion was measured by making flow additions to the upslope end of plots. All measurements were made concurrently on tracked and untracked interrows. Cover crops had no effect on erosion or infiltration in 1996. In 1997, both oat and rye cover crops reduced interrill erosion, but in 1998 only rye increased infiltration and reduced interrill erosion and runoff. Untracked interrows had less interrill erosion and runoff, and more infiltration than tracked interrows. In 1997 and 1998, both oat and rye cover crops reduced rill erosion resulting from overland water flow. Wheel traffic had no measurable effect on rill erosion. Thus, oat and rye cover crops can improve soil conservation between soybean harvest and corn planting in the upper Midwest. | <urn:uuid:80a22300-ad25-49df-9b93-8ebfe04b8838> | {
"date": "2015-10-14T02:45:44",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738095178.99/warc/CC-MAIN-20151001222135-00226-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9491927623748779,
"score": 2.953125,
"token_count": 511,
"url": "http://www.ars.usda.gov/research/publications/publications.htm?SEQ_NO_115=110753"
} |
By ABBY SLANKER
As third- and fourth-grade C.H. Campbell Elementary School students entered the school’s classroom polling place, they saw what every other voter in the country saw — voting booths by precinct and a ballot box. It was all part of the school’s mock presidential election Nov. 6.
The students were also greeted by red, white and blue decorations and posters of the presidential candidates and political parties. Each student was required to fill out a voter registration card in order to vote, which included choosing a kids voter declaration, such as ‘I will register to vote when I turn 18,’ and ‘I will encourage my parents to vote.’
With their teachers serving as polling place workers, the students turned in their registration cards and were assigned a precinct which corresponded to their classroom number. In keeping with the rules of the official election, students were required to sign their name as proof they were the ones voting.
The students were given their ‘official’ ballots and were sent to the voting booth to make their choice. Once their vote was cast, each student put their ballot in the ballot box to be counted.
“With this mock election, we want the students to learn to be good citizens. We want them to know that they will have a voice in their community when they are old enough. Also, as part of the curriculum, the students have been learning about the right to vote amendment and this was a great opportunity to actually show them the process,” said Heidi Snyder, C.H. Campbell fourth-grade teacher.
Of course, as with any election, after they voted, the students were given the all-important ‘I voted today’ sticker, which they wore with pride.
“The students were very excited about voting today. It is a big deal to them and they couldn’t wait to cast their ballots,” Snyder said.
Probably the biggest difference between C.H. Campbell’s election and the nationwide election was the fact that there were no long lines for the elementary school voters. There was a time limit on the students’ voting, as they had to get back to class.
According to Snyder, the votes would be tallied after all third- and fourth-graders had voted and the results would be announced at the end of the school day. | <urn:uuid:c81c3ed4-d17b-4b06-a421-22c97c33a194> | {
"date": "2013-12-09T19:19:18",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163996785/warc/CC-MAIN-20131204133316-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.993290901184082,
"score": 2.65625,
"token_count": 492,
"url": "http://www.vindy.com/news/2012/nov/16/chc-students-get-out-the-vote/?newswatch"
} |
Three basic designs of Japanese tanks have been encountered in Southern
Asia and the Southwest Pacific. The "tankette" is a lightly-armored machine-gun
carrier of from 3 to 4.5 tons, which has had many models. The light tank, of
from 7 to 9 tons, which mounts one 37-mm gun and two machine guns, has also
appeared in several variations. The medium "cruiser" tank, mounting a 57-mm gun
and either two or three machine guns, weighs from 14 to 16 tons. This latter
model may also be encountered fitted with a 47-mm or other caliber gun in place
of the 57-mm weapon. A larger tank, of from 25 to 28 tons, is known to exist but
has not yet been met with in any theater of operation.
A report from Australia on a Japanese light tank, (see sketch) a variation
of Model 2595, captured at Milne Bay draws attention to the following features
not included in the "Handbook on Japanese Military Forces" published last
September as TM 30-480.
(1) Exceedingly cramped fighting compartment;
(2) High quality of workmanship, material, and excellence of design
(3) Solidly constructed Carden-Loyd type suspension with the weight of
the vehicle supported by horizontal compression springs, protected by curved
4-mm (.16 in) armor plate;
(4) Adequate provision of exits for all personnel;
(5) Exceedingly fine workmanship on all transmission components, with
extravagant use of self-aligning ball bearings;
(6) All gears are profile-ground, and mating surfaces of gear boxes and
housings are hand-scraped for accuracy. Transmission gears are not
case-hardened, but are heat-treated;
(7) Ball races are either of German manufacture or else have no name
or type number imprinted on them;
(8) Combined rivetted and welded construction of hull, the whole being
built around a channel- and angle-iron frame;
(9) Design generally very light, with extensive use of aluminum and
(10) Lightly armored, the maximum thickness of armor being .47 inch
even for the vertical plate at the rear;
(11) Insulation of the engine compartment against heat from outside
sources and to prevent the heat from the engine penetrating to the fighting
(12) Woven asbestos paddings, separated from the inside surfaces of the
tank by an air space, to prevent direct radiation from the hull to the crew in
hot climates, and also to guard against injury to the crew when travelling over
(13) Numerous vision slits at vital points, but unprotected by glass visor-blocks
except directly in front of driver,
(14) Sturdy air-cooled Diesel engine;
(15) High power-weight ratio (approximately 25 HP per ton).
b. Comparison with the German PzKw 2
The Jap light tank and the PzKw 2 are of about the same vintage.
They compare as follows:
||Jap Lt Tk||
|| PzKw 2 |
| Weight (in action)||8-9 tons||9-10 tons|
| Length||14 ft 4 1/2 in||15 ft 5 in|
| Width||6ft 9in||7ft 3in|
| Height||7 ft 0.5 in||6 ft 6 in|
| Clearance||15.5 in||13 in|
| Front||.47 in||.79 in|
| Sides||.47 in to .39 in||.71 in|
| Rear||.47 in||.71 in|
| Turret||.47 in||.79 in|
| Top||.35 to .24 in||.59 in|
|Armament||1 37 mm||1 20 mm|
| ||1 MG (in turret, right rear)||1 MG (coaxial, in turret)|
| ||1 MG (in hull, forward)|| |
||6 cyl in line OHV Diesel, 240 HP at 2,000 rpm, air cooled, 5.12 in bore, 7.09 in stroke compr. ratio 15.05:1||
||Maybach, 6 cyl OHV gasoline, 140* HP, water cooled|
|Speed||28 mph||25 to 36 mph|
|Fuel capacity||29 gal||44 gal|
*Rated hp; the engine would probably develop considerably more actual
power than the Japanese at about 1,800 rpm.
The German tank would appear to be the better of the two.
c. Additional Details of the Japanese Tank
The .47 inch armor is face-hardened; the .35 inch, is non-machineable
homogeneous plate, only slightly softer than the .24 inch, which is homogeneous
hardened. The recoil mechanism of the 37-mm gun is protected by a manganese
steel casting, and the machine guns by hardened pressed steel sheaths.
(2) Ammunition Carried
For the 37-mm gun, 130 rounds are carried and for the machine guns, 2,340.
(3) Engine and Drive
On a fighting weight of 9 tons, power-weight ratio is 26.7 HP per ton. Fuel
is carried in a main tank of 23 gallons with six in the reserve. The clutch is
of the multi-disk type bolted to the fly-wheel, operating through a manual-control
gear box with four speeds forward, one reverse. The steering is of the clutch-brake
principle, with multi-disk clutches working external contracting type
brake drums and operated by steering levers. The suspension is front drive
sprocket, rear idler, with 4 bogie wheels in pairs on bell cranks, sprung by
The tracks are full floating, of manganese steel, 10 inches wide. Ground
contact is 7 feet 8 inches, giving a pressure of 9.9 pounds per sq inch.
The communication system is by radio.
Comment: The light armor and unprotected vision slits would seem to
make this tank rather vulnerable, even to rifle and machine-gun fire. Japanese
tanks are not manufactured on the assembly-line system; consequently, several
variations of the original design will be encountered. Improvised mechanized
units have been used by the Japanese in China repeatedly with considerable success.
Such units, while probably without elaborated tables of organization and equipment,
are organized on the basis of expediency and availability of materiel with the usual
reconnaissance, ground-holding, shock, and supply components which characterize
the mechanized brigades and divisions of foreign armies. | <urn:uuid:ade766f7-ac4c-4505-b9ed-799e082831ba> | {
"date": "2017-02-22T13:16:24",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00192-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9049314856529236,
"score": 3.296875,
"token_count": 1426,
"url": "http://lonesentry.com/articles/ttt/japanese-light-tank-tankette.html"
} |
LEDs, a new generation of lighting
Browse main article categories
Light emitting diodes (LEDs) lead a new and exciting era of modern ecological lighting. They have been evolving over the last decade and are now maturing into a viable economic alternative to the incandescent bulb and CFL.
LEDs, all things bright and beautiful
Many LEDs on the market are still too low power and expensive as a replacement, but there is a new breed of powerful LED that easily matches the standard 100 watt light bulb in brightness (over 1000 Lm.) There are also versions that can exceed the brightness required for domestic lighting and provide sufficient illumination for street, exhibition and space lighting in large areas.
In the past LED lighting has been criticised for its harsh quality of light that has been too cold and lacking the warmth and rich spectrum of incandescent bulbs. This too has been greatly improved with newer LED manufacturing processes and units can now achieve true warm light and multiple colour variations. LEDs, unlike the CFL can also be dimmed to provide mood lighting as well as extreme white for utility use.
LEDs safe, cheap to run and environment friendly
[quote] Due to their low voltage, low heat and robust design LEDs can be safely housed in places unsuitable for incandescent bulbs or CFLs. Their lifetime can be safely estimated between 50-100,000 hours which means accessibility for maintenance and replacement is no longer a major design issue.
Typical of emerging technologies, LED prices in the consumer market place are still held high as a specialist and niche product. A few years ago, the compact fluorescent light (CFL) was in a similar position, but now, thanks to a nod from politicians and green movement quarters, production has gone mainstream making them even cheap enough to give away.
CFLs are not a good alternative for lighting
At best the CFL provides a cheaper and longer running time, but this superficial benefit comes with a nasty sting in the tail. Unfortunately, the CFL is not the best eco green alternative, in fact it never has been. Due to the fragility of the glass construction and mercury content in every unit, the CFL is easily broken and when it does, it releases mercury vapour into the environment. The CFL is only a miniaturised fluorescent strip light and still holds the drawbacks of flickering, slow start up and cold temperature sensitivity. CFLs are also difficult to dim and due to the mercury content need specialised disposal when broken or reaching end of life.
LEDs have superior benefits for everyone
The LED has none of these drawbacks and several extra benefits that make it a clear leader in economic as well as ecological lighting. LED technology is still improving, but right now, given the right market forces, there is a range of superior LED devices that will fulfil the needs of home, commercial and municipal lighting requirements, offering superior lighting in every way, including greater efficiency and economy, safer lighting infrastructure and greatly reduced post user waste.
These benefits are good for users, as they provide a cheap alternative of quality lighting. The low power requirements and long lifetimes of LEDs mean they can be used in areas that has restricted the use of conventional mains driven lighting. LEDs must supersede the CFL, not only because they are the best green lighting, but also because they are more efficient, they lasts 10 x longer and at life end is safer and easier to dispose of.
LEDs run on very low voltage and current requirements. They produce significantly less heat and are the perfect complement to micro generation methods such as solar and wind in conjunction with battery power supplies. LEDs are tiny semiconductor devices that can occupy the space of a match-head or can be built in arrays to provide extensive possibilities in design and architecture.
So where is the big rush for LEDs?
If it’s so good, you might wander why there are so little LED lighting available in the shops. Like the CFL, the LED is suffering the market reluctance of a new technology. In addition, many manufacturers have been too hasty to market under-powered LEDs with the promise that they can replace a conventional light bulb. Those rushing to enjoy the new green technology have been dissapointed with performance and price. For the user, the light has to be the right quality as well as the price, or the product will fail to gain popularity. In the haste to provide a super green alternative, many LED lights have failed to provide the brightness or quality of light and this may have contributed to a reluctance to buy from the general consumer.
Coming here soon …
Over the next few articles, I’m going to dig deep into the shiny world of LEDs and bring to light some of the real practical alternatives, both available commercially and also by detailing some experimental units I’ve built with the latest LED technology that hasn’t hit the retail stores yet. I’ll show you how to make LED lights that give superb lighting that is easy to live with and more than adequate for utility and mood lighting. Once you’ve seen proper designed LEDs, you’ll never go back to a CFL or incandescent bulb again. In addition, I’ll show you how to run your new LED lighting for free, using solar energy to power off-the-grid installations.
Forget about those inadequate cold-hue lights you paid so much for… You’ll be amazed just how bright the future is going to be with the LED, once we apply the technology correctly and learn the requirements of LED lighting design!
In Northern Europe, around 12 million people suffer from Seasonal Affective Disorder (SAD). Symptoms range from mild such as feeling a little…
You’ve all been waiting patiently to begin making your own household cleaners. You know some of the nasties you want to avoid… | <urn:uuid:6818224a-6dd2-440b-8c16-8df7702746a1> | {
"date": "2019-07-24T06:39:42",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195531106.93/warc/CC-MAIN-20190724061728-20190724083728-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9542322754859924,
"score": 3.015625,
"token_count": 1190,
"url": "https://littlegreenblog.com/green-technology/energy-saving/leds-a-new-generation-of-lighting/"
} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.