text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
According to whle building design guide, green buildings account for nearly 70 percent of the electricity the United States consimes on an annual basis, ratcheting up to 40 percent of our total energy. Buildings emit nearly 40 percent of our total carbon dioxide emissions as well. Consumption stems from commercial or industrial buildings, but reducing society’s consumption of fossil fuels demands an all-hands-on-deck approach in which the smallest home is important in the largest manufacturing plant of data center.
Click here to cancel reply.
Sorry,At this time user registration is disabled. We will open registration soon!
Don't have an account? Click Here to Signup
© Copyright GreenAnswers.com LLC | <urn:uuid:99570fee-f369-40b4-b797-291fe72661bc> | {
"date": "2016-10-27T09:16:40",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00263-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9149827361106873,
"score": 3.0625,
"token_count": 143,
"url": "http://greenanswers.com/question/which-house-america-most-eco-friendly/"
} |
The proliferation of spoof, nerd, science, and electronics merit badges has demonstrated that geeks like to show off their skills and accomplishments. One skill is particularly appropriate for the format: soft circuitry. By building your own soft circuit onto an actual badge you can demonstrate your mastery.
You’ll need conductive thread, non-conductive thread, fabric scraps, snaps, scissors, pliers, an LED, a 3 V coin cell battery such as CR2032, and, of course, a blank merit badge. That last can be difficult as the boy scouts are pretty restrictive on the use of their badges. The girl scouts are more helpful, and even have a couple of different blank badges available in an appropriate size that they’ll sell to the public. You can alternately make your own circle of fabric with stitched edges. Making your own will prevent having to sew through the iron-on glue that is on most readily available badges.
There are lots of online resources for soft circuitry. Leah Buechley wrote an excellent introduction to DIY electronic sewing and has a good materials page. Fashioning Technology links to several soft circuit tutorials. Diana Eng’s Fashion Geek book is a good starting point for all kinds of fun.
Sternlab’s LED Sewing kit would be ideal for this project. You can also get conductive thread from SparkFun. You can get little yellow LEDs over in the Evil Mad Science Shop, too.
The first step is to bend the leads of the LED to a shape that can be sewn. Spirals are nice and compact.
Yellow or red LEDs are a good choice for this project as they require a lower voltage than shorter wavelength LEDs like green and blue. Conductive thread is somewhat resistive, so your resulting voltage may not be high enough for some colors of LED.
Sew the LED in place by embroidering around it with regular embroidery thread with the symbol for a diode, which is a triangle pointing at a line. The cathode should go toward the line, and the anode toward the triangle end of the symbol. For most through-hole LEDs, the cathode side is flatted and has a shorter lead.
With conductive thread, sew the cathode lead down firmly with a couple of stitches, and continue the circuit around to the negative side of the battery. The battery symbol is two parallel line segments, one longer than the other, with the shorter one representing the negative side of the battery.
The next step is to start the battery holder on the back of the badge. Make a nice sized knot and a couple of stitches in a scrap of fabric a little larger than the battery (a little bigger than an inch across). These will connect to the positive side of the battery. Then make a long stitch to the edge of the fabric and through the to the front of the badge. This will keep the thread insulated from accidental contact with the rest of the battery.
In order to keep from short circuiting your battery, you’ll need to keep the conductive thread on the top side of the badge until you are clear of the battery location. As you continue the circuit toward the switch, only pick up a few threads on the top of the badge fabric. You can even tie your thread onto itself rather than make a stitch to form the right-angle turn away from the battery symbol.
The next step is to sew on the fabric for the switch. Use a narrow strip fabric or a ribbon folded in half, and tack it down on one end with non-conductive thread.
Continue sewing the conductive thread on the top surface of the switch to keep it insulated from the rest of the circuit. Sew one half of the snap onto the end of the switch firmly with the conductive thread and tie off the end.
To get a snug fit on the battery holder, sew the fabric down around the edge of the battery, making sure to keep the one conductive thread going to the front of the badge insulated from the rest of the battery. After sewing, trim the corners so they don’t show when you turn the badge around.
The last step is to connect the other side of the snap to the anode of the LED. Sew the snap down firmly with the conductive thread and then stitch over to the LED. Wrap the thread around the anode lead firmly a couple of times and tie it off.
Connect your switch and admire your soft circuit prowess!
If your circuit doesn’t light immediately, try squeezing your battery holder to make sure it is getting good contact. If that doesn’t work, try flipping your battery over in case it was reversed. You can also check the continuity of your circuit with a mulitimeter.
Conductive thread is notorious for fraying and unravelling, so once you’ve made sure that your circuit works, you may want to use some fabric glue to keep the knots from coming undone.
You can add some hook side velcro to the back of your badge to use it with a laptop sash or sew it directly onto a prominent display location. Just be sure to leave access to change the battery! | <urn:uuid:94ee7a80-6c98-42f6-a01d-3470b063b58b> | {
"date": "2014-04-24T09:07:29",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206118.10/warc/CC-MAIN-20140423032006-00171-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9369354844093323,
"score": 3.375,
"token_count": 1066,
"url": "http://www.evilmadscientist.com/2009/soft-circuit-merit-badge/"
} |
Page 1 of 4
Monte Carlo methods are powerful ways of getting answers using random numbers to problems that really don't seem to have anything much to do with randomness. For example, you can find Pi and multiply two matrices together all by generating random numbers.
No this isn’t going to be about gambling, except in the broadest possible sense. Monte Carlo methods are a way of using the computer to solve difficult problems in a most unlikely way. They were invented to solve some of the problems of building the first atomic bomb.
When you think about using random numbers in a computer the most obvious application to come to mind is in computer games. Clearly it would be no fun at all if every time you play a game exactly the same set of things occur at exactly the same time. Random numbers are used to vary what happens in unpredictable ways.
A computer dice
Before we look in detail at more advanced ideas let’s look at some simpler ways that random numbers are used and at how to create events with a given set of probabilities.
Perhaps the archetypal use of random numbers is to program a computer dice. Usually the random number generator function, usually called RND or random or something similar, produces fractional numbers scaled into the range 0 to less than 1.
Most beginners miss the “+1” but of course the random function never produces 1 and so the result without the +1 is in the range 0 to 5 adding one gives you 1 to 6.
Notice that what is going on here is that we are “chopping” up the range of that the random numbers fall in into equal sized regions. Obviously if the regions are equal in size then they have the same probability of that the generated number will fall into one of them.
That is our dice is fair.
Equal sections equals equal probability
By the same reasoning if we want to create a set of events with unequal probability all we have to do is divide the interval up into unequal lengths.
The random number falls into each interval with a probability proportional to the intervals length. In most cases you can’t program this as a simple function but you can use “If” statements to pick out the interval that the random function falls in.
Unequal sections equals unequal probability
This is all you need to know to make any set of discrete events happen.However there is the slightly more difficult problem of generating random values in a continuum of possible values.
The random function naturally returns values in the range 0 to 1 which are evenly spread in the interval - they are said to be “uniformly distributed”. Other distributions are often required and there is a whole armory of techniques waiting to come to your aid. For example, if you want a normal distribution all you have to do is add up a few random numbers and work out their average. That is, if you calculate:
then n will have an approximately normal distribution with a mean of .5.
From uniform to normal
This method is based on the central limit theory which says that if you take the average of enough reasonably distributed random values then the result tends to be normally distributed. The central limit theorem is the reason that the normal distribution occurs so often in practice. When ever you encounter some "noise" or randomness that is the average result of lots of other more basic random effects then in general the result tends to be normal because of the central limit theorem.
The central limit theorem works well for the normal distribution but what if you want to generate random numbers with a non-normal but known distribution. To do this you need the cumulative probability distribution. This is just a function that gives you the probability of getting a value less than or equal to x. That is:
F(x) is the probability of getting a result ≤x
For example if you have a fair dice then the cumulative probability function is:
a 1 or less is 1/6
i.e. the probability of throwing
a 2 or less is 2/6
Notice that a cumulative probability function cannot decrease as x increases and in this case it is constant between each of the possible integer values.
You can use a cumulative probability function together with a uniform random number generator in the range 0 to 1 to generate values from the distribution that the function represents. The way that you do this is to use the inverse cumulative probability function F-1(p) which gives you a value x that satisfies F(x)=p i.e. the probability of getting x or less is p.
What you do to generate random values with the distribution F(x) is generate a random number r in the range 0 to 1 and return F-1(r). If you think about this graphically then you can see that the areas that correspond to each value x generated are proportional to the probability of x.
For example, in the case of the dice example if the random number r generated is between 4/6 and 5/6 then F-1(r) is taken to be 5. You can see that the areas are divided up equally to generate values with a probability of 1/6th.
In general the areas don't need to be divided equally and the cumulative probability function can be continuous. The algorithm works in a very regular way - find the cumulative probability function, find the inverse cumulative probability function, generate a random number in 0 to 1 and look it up the value in the inverse cumulative probability function.
Usually the cumulative probability function is available as an approximate table and the inverse function can be created by simply using the table "the other way round". | <urn:uuid:876e40f6-ce88-4d50-a98f-bde9ce37c585> | {
"date": "2016-06-28T03:46:05",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396455.95/warc/CC-MAIN-20160624154956-00168-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9076226949691772,
"score": 3.65625,
"token_count": 1156,
"url": "http://i-programmer.info/babbages-bag/274-monte-carlo-or-bust.html"
} |
Public/Private Partnerships for EDU Success
Bridging industry and education can offer a unique opportunity for students to learn. Itron, a world-leading technology and services company dedicated to the resourceful use of energy and water, recently partnered with University of Texas professor Michael Webber to create an interactive app, Resourcefulness, that teaches key concepts about energy and water. Itron recognized the critical need of developing a skilled STEM workforce and believes that education plays a major role in the ability to raise awareness about important sustainability challenges. In this session, Itron will share why they believe public-private partnerships are critical for education and future STEM skilled workforce.
Share this idea
- Discussing Industry’s Role in Education
- Collaboration between Industry & Education to Solve STEM Gap
- Inspiring the Next Generation of Innovators
- Sharelynn Moore, Itron
Callie Bendickson, Dir of Community Affairs, Itron | <urn:uuid:511faa43-03f6-4a43-b481-94aeeb9d8e8c> | {
"date": "2019-03-22T00:09:55",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202588.97/warc/CC-MAIN-20190321234128-20190322020128-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8845977187156677,
"score": 2.578125,
"token_count": 191,
"url": "https://panelpicker.sxsw.com/vote/62112"
} |
The public has been warned to take extra precautions against ticks as the warm weather heralds a peak in numbers of the blood-sucking parasites.
Diseases spread by ticks have risen over the past few years
It follows a huge rise in cases of Lyme Disease in Scotland and encephalitis amongst travellers to mainland Europe, spread by ticks.
Both infections are severely debilitating and can be fatal.
A decade ago there were just 10 cases of Lyme Disease in Scotland, but last year that figure had risen to 177.
In mainland Europe, tick-borne encephalitis is also on the rise and is now endemic in 27 countries.
The advice to anyone heading into the countryside is to wear insect repellent and long trousers if possible and to check themselves thoroughly afterwards.
Ticks should be removed by gripping them close to the skin with tweezers and pulling backwards without jerking or twisting.
They are common in woodland, heath land and in particular areas in Scotland where deer graze. More recently they have also been found in urban parks.
A spokesman for the Tick Alert campaign said: "Ticks are second only to mosquitoes for carrying disease to humans.
"Travellers and holidaymakers visiting rural areas are at risk from tick bites, but also when spending time in public spaces including beer gardens, picnic spots and parks and gardens.
"Make sure you know about bite prevention, how to look out for the early symptoms and remember to seek advice well before your travel date."
Wear trousers tucked into socks
Use insect repellent
Check yourself thoroughly
Check warm folds of the skin
Carefully remove with tweezers
Never burn off
Do not try to drown in Vaseline
Be aware of favoured habitats
Lyme disease varies widely but can include a rash and flu-like symptoms in its initial stage, followed by the possibility of musculoskeletal, arthritic, neurological, psychiatric and cardiac problems.
Most cases of Lyme disease can be cured with antibiotics, especially if treatment is begun early in the course of illness.
Katrina Anderson, from Edinburgh, became ill after she was bitten by a tick in 1991.
She was misdiagnosed by her GP who blamed ME for her chronic fatigue and it took another two years before she was told by a specialist that she had contracted Lyme disease.
Ms Anderson said: "At the time I was actually very ill. I became very flu-like with muscle pains, constant headaches.
"It was like having a virus. It's like a hidden illness. You don't actually see what the person is suffering from.
"It can affect all aspects of your nervous system." | <urn:uuid:6926d60c-c84b-41a0-9117-67c04c7dc8d6> | {
"date": "2017-04-23T12:54:32",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00115-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9682875871658325,
"score": 3.28125,
"token_count": 548,
"url": "http://news.bbc.co.uk/2/hi/uk_news/scotland/6641115.stm"
} |
Solar Thermal Worldwide
While solar thermal systems have only recently become popular in the United States, they have been in use since as early as the 1890s. Israel began pioneering work in the 1950s in response to fuel shortages and, today, solar water heating is exploited by 85% of that country's population. In this way, Israel saves an astonishing 2 million barrels of oil per year – 3% of their total energy consumption – making it the highest user, per capita, of solar energy of any form worldwide.
Spain was the second country (after Israel) to require the installation of solar thermal systems. In China, systems are much cheaper than similar models sold in Western nations, and an estimated 30 million Chinese households make use of them. Solar thermal technologies have seen tremendous growth in Australia, Japan, and many other countries that receive abundant sunshine.
Components and Operation
Unlike photovoltaic solar panels, solar water heaters generate no electricity; rather, they directly heat water through sunlight. These systems are generally composed of solar thermal collectors, a water storage tank, interconnecting pipes, and a fluid to move the heat from the collector to the tank.
Solar thermal collectors are fastened to a roof or a wall that faces the sun, heating fluid that can be pumped (in an active system), or driven by convection (in a passive system). Collectors are made from a glass-topped insulated box with a flat solar absorber made of sheet metal attached to copper pipes, and then painted black, or a set of metal tubes surrounded by an evacuated (near-vacuum) glass cylinder. Solar water heating systems are usually supplemented by conventional backup systems for cloudy days and times of increased demand.
Inspection and Maintenance
Solar water heaters require periodic inspections and routine maintenance to ensure efficient operation. Inspectors can recommend that the homeowner or a qualified solar technician perform certain tasks. The owner’s manual should also be consulted for maintenance and inspection tips. The following components should be inspected:
support structures. If the collector has a support structure, make sure all nuts, bolts and other connections are tight. | <urn:uuid:e6126b12-2fdf-40b8-9fc1-96276a8f9492> | {
"date": "2017-07-20T12:35:35",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423183.57/warc/CC-MAIN-20170720121902-20170720141902-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9439134001731873,
"score": 3.203125,
"token_count": 432,
"url": "https://www.nachi.org/solar-water-heaters.htm"
} |
Software Interfaces for Music
Software Interfaces for Music
Using Python, a dynamic object-oriented programming language, with Mirra, a 2D OpenGL Python library developed by Ixi-Software, we can rapidly prototype graphical user interfaces that will send out Open Sound Control messages. These Open Sound Control messages can be received by a number of different synthesis engines including Pure Data and ChucK. Since both environments can be run concurrently, changes and design descisions can be made very quickly, almost on the fly.
How to Use It
Mirra has been installed on the Planet CCRMA systems under: /usr/share/doc/mirra-0.3.2/ There you'll find an /examples directory and a /documentation directory. To launch any of the examples, navigate your terminal window to the examples directory and type: python examplefilename.py into the terminal.
For instance, python pong.py would launch the pong example.
Playing with the examples and using them as a starting point is a great way to being experimenting with the Python language and seeing what Mirra can do.
Examples I've Made
Below is an example of a graphical interface I've begun to work on based on the pong.py code as a starting point. There are several blocks that can be dragged around the screen and a single ball that bounces off of the blocks and off of the walls. If a block is hit by the ball, it plays its sound. The sound the block makes is based on its position on the screen. For example, I've mapped that position using the x-axis for pitch and y-axis for gain. I've also tried a mapping using the y-axis for sample rate playback (pitch), and the x-axis for pan position. One of the things that is really great about using Mirra with something like ChucK is that you can alter your synthesis code without ever having to stop your Python code from running.
Here is another example of a graphical mixer that does not use faders or knobs. Instead, there are collection of blocks each tied to their own audio loop. When a block is placed inside the center square, or mixing pallette, the audio is heard. Once inside the mixing pallette, the blocks can be moved to affect their sound plaback. Left to right controls pan postion while the y-axis or up and down controls the playback rate of the audio loop. Moving up pitches the sample up and moving down pitches it down.
Be careful when working quickly between the two environments, Python and ChucK, to be sure to change your syntax between the two languages. Python uses no semi-colons or brackets. ChucK uses both of those things but cannot use an equal sign to define a variable. If you aren't careful, you'll find a lot of errors in one or both of the two programming environments.
Future Plans and Implementations
Exploring the use of color as a control parameter could be very interesting. Especially when dealing with multiple levels of transparency in obejects. For example, layering two objects on top of each other could produce a new hue of their colors, and that mixing could translate into additional harmonic overtones of the synthesized sound.
I would like to implement OSC feedback from ChucK into Python. That way, while the sound is being altered, the sound being created could be represented as a visualization to the music being made. For example, in the mixing pallette example, when a block is placed on the mixing area, it could begin making small movements to the rhythm of its audio loop. This would be visually engaging and would further enhance the user experience.
Making a more comprehensive application that had more features and changability than the one trick pony type of interface I'm creating now would be an exciting goal. To create an application that looked good, felt good, sounded good, and was most importantly fun to use.
Links to Interesting SI Pages
- Golin Levin: http://www.flong.com/
- Toshio Iwai: http://en.wikipedia.org/wiki/Toshio_Iwai
- Ixi software: http://www.ixi-software.net/content/software.html Free software downloads exploring digital musical instruments and environments for generative music.
- Carnage Heart
- PLOrk-related: http://audicle.cs.princeton.edu/doc/faces/ccr.html
- Torque: http://www.garagegames.com Torque is a high level object oriented game creation engine for pc, mac, and console games. Free demo and games to download. | <urn:uuid:bbe17645-feb4-48c8-8862-0dda244aa25f> | {
"date": "2016-08-24T20:17:37",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292608.25/warc/CC-MAIN-20160823195812-00182-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9284440279006958,
"score": 2.953125,
"token_count": 966,
"url": "https://ccrma.stanford.edu/mediawiki/index.php?title=Software_Interfaces_for_Music&oldid=3348"
} |
The island produces abundant food crops, although in recent years agricultural production has decreased due to rising costs and increased competition. Rice is the chief crop, followed by sugarcane, corn, fruits and vegetables, tea, and sweet potatoes, Pigs, chickens, and cows are raised and the island has a sizable fishing fleet. Industry, once concerned mainly with rice and sugar milling, has diversified to include a variety of light and heavy manufactures, significant telecommunications and other high-technology businesses, and an important service sector. Manufacturing accounts for 25% of Taiwan's gross domestic product, with service industries generating much of the rest.
There is food processing, petroleum refining, and the manufacture of electronics, armaments, chemicals, textiles, iron and steel, machinery, vehicles, consumer products, and pharmaceuticals. Most industries are privately run, but the government operates those considered essential to national defense, such as steel and electricity. Railroad and bus lines are also government operated. Taiwan trades chiefly with China, Japan, the United States, and Hong Kong. Major exports are computers, electrical and electronic equipment, metals, textiles, plastic and rubber products, and chemicals; imports include machinery, electrical equipment, minerals, and precision instruments.
More on Taiwan Economy from Infoplease:
See more Encyclopedia articles on: Taiwan Political Geography | <urn:uuid:96a8d432-b510-4272-89fb-bc8671a7180b> | {
"date": "2015-07-07T05:52:47",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098990.43/warc/CC-MAIN-20150627031818-00086-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9433239698410034,
"score": 2.84375,
"token_count": 268,
"url": "http://www.infoplease.com/encyclopedia/world/taiwan-economy.html"
} |
Helen Hume describes a studio atmosphere as being a functional artistic space that encourages independent learning and self-motivation. I particularly like the idea that all the students in the classroom should be working quietly at all times and that if someone were to visit the classroom they would see everyone diligently working. For a studio atmosphere to occur though, I think there needs to be some freedom to move about and talk with other students briefly to get ideas and brainstorm solutions. In a perfect studio atmosphere the room should be quiet but not tense.
Getting Student's Attention and Keeping It
The general idea behind this tip is that you should keep your instructions short and sweet and be aware of who isn't listening to you an why. If students who usually pay attention are nodding off, you've been droning for too long; but if you have students who are chatting it up in the back of the room you need to get control. Helen Hume suggests what I would describe as the "hard stare" for getting a classrooms attention without saying that they need to pay attention. Going silent in the middle of a sentence is a great attention grabber that indicates to your students that you are not happy. Staring down a select couple of students who aren't getting the message is a great way to get you students to control each other without you every having to say a word.
Give Open-Ended Assignments
I just hate it when I see cookie-cutter artwork coming out of a secondary art room, especially at the high school level. Art is about creativity and personal expression, where is the personal expression in "draw your portrait in the style of Picasso". BORING! Rather than prescribing assignments, I prefer the idea of prompts. A small phrase or a single word that the students can explore in various ways to come up with interesting solutions to the creative problem at hand. These result in much more interesting and unique work that the students hold more pride for.
Portfolios are a great way to just keep everything together so that there aren't papers flying about the classroom all willy-nilly. In an Art 1 classroom that might be all it is but in an Advanced Art classroom the portfolio should go beyond the catch-all idea. It's important to teach students to understand the importance of a portfolio as it applies to future prospects for school and job opportunities. With technology as prevalent as it is, it is important to have students be building an online art presence and portfolio. For my Advanced Art classes I want each student to begin to build a blog/website that can hold clear images of all their work and begin to develop them professionally in the art scene.
Teaching Visual Literacy
Nothing irks me more in a critique that for some one to say, "I like it" and that's all. It is important that students be able to talk intelligently and specifically about artworks they are looking at whether it be in the classroom or at a museum. "I like it." "It's pretty." "It's just not my style." These are not intelligent art responses. "The perspective here seems to be off." "The mood the piece presents through color is eye-catching." "Perhaps the piece would be more successful if you tried..." These are the responses I want to hear in my art room during critique; intelligent responses that rely on terms and concepts of art.
Additionally, students should be able to recognize art and design in the world around them. While I think of this to be more Visual Culture, Helen Hume includes it as a part of Visual Literacy in her book. It is important to point out to students the artistic designs that go into the products they encounter every day and look at these images with the same visual consciousness and literacy as a painting in a museum. | <urn:uuid:02102c44-a95c-4fae-8d88-b21a501d89b8> | {
"date": "2017-10-17T14:49:41",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822116.0/warc/CC-MAIN-20171017144041-20171017164041-00856.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9657484889030457,
"score": 2.796875,
"token_count": 768,
"url": "http://artviaanderson.weebly.com/teaching-tactics-blog"
} |
Self-criticism can be both a healthy means of increasing self-awareness and personal growth, and, on the other hand, it can serve as a major obstacle to self-esteem and peace of mind. Self-criticism can stem from childhood experiences, such as being subject to criticism or mixed messages from parents and caretakers, having difficulty getting along with peers, missing out on experiences that would foster a sense of confidence and purpose, or not receiving positive reinforcement for our accomplishments. Self-criticism may also stem from real or perceived failures. To the degree it helps us learn lessons, display humility when we have behaved badly, and improve our mastery over ourselves and our endeavors, it can help us recover from and avoid failures and overcome our weaknesses, unwanted habits, and areas of unconsciousness. However, to the degree it prevents us from taking any risk, asserting opinions, and believing in our own basic ability to think, function and thrive, it can be unhelpful and unhealthful.
Self-criticism may be linked to anxiety disorders, depression, or dependent personality disorder. However, self-criticism is much more common than these conditions and does not necessarily indicate the presence of a disorder. Self-critics are often also critical of others; this can lead to social difficulties. Whether or not they criticize others, highly self-critical people may find it hard to keep friends; some elf-critics think and act as if they don’t deserve friends, and other people may just take their word for it!
Therapists can help people engage in useful self-criticism – which leads to revisions of one’s thinking, and solutions to one’s critiques – and to avoid the trap of the chronic kind of self-criticism – which consists of endless, rigid negativity and never seems to resolve. Therapy can help people to examine false beliefs and unnecessary fears that may lead to self-criticism.
Self-criticism is typically experienced as negative internal thoughts about one's self. Here are some examples of common self-critical thoughts:
Everyone has personal doubts and criticisms from time to time, but if these self-criticisms are chronic and excessive they can negatively impact a person's relationship with themselves and others.
Chronic unhappiness caused by self-criticism: Jane, 42, seems never to feel satisfied. Her large family brings her about equal amounts of stress and joy, her job is fulfilling to a degree but always induces anxiety, and her marriage is comforting at best, frustrating more often. Therapy reveals that none of these external circumstances is really the problem; Jane is relatively happy with her life and generally grateful. Rather, it is her persistent self-criticism, of which she is barely aware but which becomes quickly apparent to the therapist. Not surprisingly, she is also critical of others, but she saves her worst words for herself. Therapy reveals her own unrealistic expectations, which turn out in the end not to be hers at all – but her parents’, whom she had convinced herself were unimportant but turn out to be very powerful figures. Jane’s self-criticism reflects her parents’ critique of her. Therapy begins to enable Jane to remain aligned with her own values and beliefs, leading to enhanced relaxation.
Last updated: 09-30-2014 | <urn:uuid:ccf10584-b796-4638-b80c-a38b27361d18> | {
"date": "2015-03-28T00:29:18",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297146.11/warc/CC-MAIN-20150323172137-00082-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.968512773513794,
"score": 2.96875,
"token_count": 677,
"url": "http://www.goodtherapy.org/therapy-for-self-criticism.html"
} |
for National Geographic News
The great white shark is among 30 species of sharks and rays fast swimming toward oblivion in the Mediterranean Sea, a new report warns.
The newly published World Conservation Union (IUCN) report identifies the waters between Europe and Africa as having the highest percentage of threatened sharks and rays in the world.
Some 42 percent of Mediterranean species are at risk, says the IUCN Red List assessment, performed by the conservation body's Shark Specialist Group.
The group blames the plummeting populations on habitat degradation, sport angling, human disturbance, and overfishing—including fish caught as unintended bycatch. (Related: 8 Million Sharks Killed Accidentally off Africa Yearly [April 17, 2007].)
"Our analyses reveal the Mediterranean Sea as one of the world's most dangerous places on Earth for sharks and rays," Claudine Gibson, IUCN Shark Specialist Group program officer and co-author of the report, said in a statement.
"Bottom-dwelling species appear to be at greatest risk in this region, due mainly to intense fishing of the seabed."
A total of 71 species were assessed. Of the 30 species deemed threatened with extinction, 13 were classified as critically endangered, 8 as endangered, and 9 as vulnerable.
Only ten species (14 percent) were considered free of any extinction risk.
Critically endangered species include the seabed-hugging Maltese skate (Leucoraja melitensis), which lives only in the Mediterranean. Bottom-trawl fishing is the main cause of recent population declines of 80 percent, the IUCN report says.
The shortfin mako shark (Isurus oxyrinchus) and porbeagle shark (Lamna nasus), both prized for their meat and fins, were likewise found to be critically endangered.
"We are particularly concerned about the porbeagle and mako sharks," said shark expert Alen Soldo of the University of Split, Croatia, who participated in the study. "Our studies reveal persistent fishing pressure well in excess of the reproductive capacity of the species."
SOURCES AND RELATED WEB SITES | <urn:uuid:a5b3739d-b772-479a-bf78-936b7c63b281> | {
"date": "2013-12-06T15:28:56",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051992/warc/CC-MAIN-20131204131731-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9328001141548157,
"score": 3.625,
"token_count": 444,
"url": "http://news.nationalgeographic.com/news/2007/11/071116-sharks-rays.html"
} |
The skeleton is covered by layers of skeletal muscle. Each muscle is attached to two or more bones so that when the muscle contracts (shortens) it produces MOVEMENT. Skeletal muscle makes up about 40 per cent of body weight. As well as producing movement, some muscles remain partially contracted for long periods to maintain the body’s posture.
A skeletal muscle contains many long fibres arranged in bundles called fascicles. Each fibre consists of smaller strands, called myofibrils. These contain yet smaller parts called myofilaments. A muscle contracts when sets of these myofilaments slide past each other in response to nerve signals.
There are more than 600 muscles in the body. Their sizes vary from tiny, such as the muscles that move the eyeballs in their sockets, to very large, such as some muscles in the thighs. They are arranged in layers; shown here are the superficial (outer) muscles at the front of the body and, on this side, some of the deeper muscles.
Skeletal muscle is also called striated or striped muscle. The stripes, which can be seen clearly when a piece of muscle is viewed under a microscope, are caused by the arrangement of myofilaments in individual muscle fibres. These lead to the appearance of alternating light and dark bands.
Skeletal muscles cross joints and are attached to the bones on either side by tough cords called tendons. They contract, to produce movement, as a result of nerve signals sent from the brain and spinal cord. Although our movements are under our conscious control, the brain can learn patterns of movements so that we can perform certain tasks, such as walking, without thinking.
To straighten the knee, one group of muscles at the front of the thigh contracts, while other muscles at the back of the leg relax. Two groups of muscles such as this are called opposing groups. Contractions of opposing groups have opposite effects, such as knee straightening and bending.
To bring about a movement, the brain sends a series of signals instructing specific muscles to contract, via a network of nerve cell fibres. Each individual fibre divides into several branches before it reaches the muscle, and each branch connects to a single muscle fibre. The region where the nerve and muscle fibres meet is called a neuromuscular junction.
Skeletal muscle is not the only type of muscle in the body. There are two other types: smooth muscle and cardiac (heart) muscle. Unlike skeletal muscle, these muscles are not under our conscious control.
Smooth muscle is found in the walls of many organs, such as the bladder, the womb, and the intestines, where it contracts to propel food along. It has short, spindle-shaped fibres. | <urn:uuid:03e43c72-1cfc-42fd-9403-34fdaf09f0c4> | {
"date": "2014-09-23T10:43:42",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138501.67/warc/CC-MAIN-20140914011218-00253-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9567952156066895,
"score": 4.4375,
"token_count": 562,
"url": "http://fun.familyeducation.com/dk/science/encyclopedia/muscular-system.html"
} |
Bengaluru, Nov 5 (IANS) Researchers in Hyderabad are developing a new strategy for the treatment of spinal cord injury (SCI) for which currently there is no satisfactory cure.
Spinal cord is a bundle of nerves running down the middle of one's back that carries signals back and forth between the body and the brain. SCI, which disrupts the signals causing temporary or permanent changes in its function, is a medical emergency. Its treatment requires restoration of structural and functional aspect of damaged neurological tissues in the spinal cord.
Recent developments have showed that transplantation of "human neural precursor cells" has the potential for reconstruction of the neural network at the site of damage in patients suffering from SCI. However, to provide better treatment, the grafted precursor cells must survive long enough and differentiate into neuronal cells -- which are functional units of the nervous system. This has remained a challenging task.
Now researchers at Deccan College of Medical Sciences (DCMC) and Dr. Habeebullah Life Sciences -- both in Hyderabad -- report a strategy that is claimed to meet these objectives. They have successfully evaluated their approach in an animal model.
Their study, reported in the journal "Frontiers in Bioengineering and Biotechnology", describes a translational approach to "bioengineer functional neurological constructs for the treatment of SCI defects".
Explaining, Aleem Ahmed Khan, a scientist at DCMC and the paper's corresponding author, said their strategy, in short, involves growing nerve cells on biological constructs -- or scaffolds that act as a three-dimensional platform.
"On transplantation (into a patient), these constructs can function for long term and help to regenerate the nerves affected by (SCI)."
Being tissue specific, the biological construct is immunologically tolerable and is enriched with several crucial "neurotrophins" -- which are small proteins -- needed to regenerate the damaged neural networks at the damaged site of the spinal cord, Khan told IANS in an email.
"Developing such scaffolds which provide mechanical and biological support for long-term survival and function of neurological cells is highly desirable and can potentially change the treatment strategies in SCI and other neuro-degenerative applications," he said.
"Construction of immunologically tolerable cell-laden scaffold is an interesting development," Praveen Kumar Vemula, Research Investigator at the Institute for Stem Cell Biology and Regenerative Medicine in Bengalur, told IANS. "This research has shown encouraging direction, which needs to be evaluated further."
According to the researchers, applicability of the bio-engineered constructs was tested by transplanting the constructs in Wister rats. Khan said: "All the animals survived the entire duration of the study (14 days post-transplantation) which revealed that these constructs are immune-compatible."
They conclude that the engineered neuronal constructs, being natural biological scaffolds, were well tolerated by the host and may serve "as one of the potential options" for regenerating the neuronal connections damaged by SCI.
"Further preclinical testing and optimisation of this approach in animal models will likely provide a more authentic road map for approaches for its future clinical applicability," says their report.
(K.S. Jayaraman is a veteran science journalist. He can be contacted at [email protected]) | <urn:uuid:4a3add0f-a8d5-491f-8ca1-258bfcc498a5> | {
"date": "2019-01-16T09:06:23",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657097.39/warc/CC-MAIN-20190116073323-20190116095323-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9483484029769897,
"score": 2.890625,
"token_count": 689,
"url": "https://in.news.yahoo.com/hope-spinal-cord-injury-patients-064213307.html"
} |
Dr. Veronique Desaulniers
Though cancer can be seen as a very complex illness, it is important to understand that cancer is simply the “symptom” and the tip of the ice berg. For your body to allow cancer cells to take root and multiply, there had to be a weakened immune system, toxicity of many kinds and nutritional deficiencies.
Evidence-based research has shown that there are hundreds of known and effective cancer cures. Here are some very simple protocols that will give you an edge if you are afflicted with cancer.
1. Baking Soda
1 tsp. of baking soda and the juice of 1 organic lemon in 8 ounces of water several times per day is a very easy way to alkalize the body. Cancer cells can’t grow in an alkaline body.
2. Blood Root
Blood root is a perennial plant that contains a plant alkaloid called Sanguinarine. Sanguinarine kills cancer cells only and does not harm your healthy cells. It can be used internally or applied externally in a salve for superficial cancers.
Chaga is a medicinal mushroom that has been studied in laboratories for many years. It has shown much promise as an immune system modulator and has many anti-cancer properties.
4. Vitamin D
Checking your blood serum Vitamin D levels could help you prevent cancer and speed up your recovery from cancer.
A study conducted in 2006 indicated that lower levels of blood serum Vitamin D were associated with a poorer overall survival rate of post-menopausal breast cancer patients.
5. Essiac Tea
The original formulation of this tea was actually an old Native Indian recipe that had been used for hundreds of years. A Canadian nurse learned about it and started sharing it with some of her cancer patients and she began to see amazing recoveries. The tea, comprised of several anti-cancer and cleansing herbs, can be consumed several times per day.
6. Flax Seeds and Cottage Cheese
Dr. Johanna Budwig, a German biochemist and physicist, is credited for this healing concoction that has seen a 90 percent success rate spanning over 50 years. The combination of these two foods provides essential fatty acids and lipoproteins that reduce tumors and restore health.
7. Hemp Oil
The cannabinoids in hemp kill cancer cells. Period. And like all other herbal remedies, the plant chemicals do not harm healthy cells. There have been numerous studies conducted with reported beneficial effects on many types of cancers, including breast cancer.
It is estimated that over 85 percent of the world’s population is iodine deficient. Since estrogen production increases with iodine deficiency, make sure you have your iodine levels tested every year.
Melatonin is a powerful breast cancer cell inhibitor. In fact, in laboratory studies, it actually put breast cancer cells to sleep and slowed down the growth by 70percent. Melatonin also counteracts the effects of environmental estrogens.
10. Broccoli Sprouts
While cruciferous vegetables in general have been promoted for their anti-cancer properties, broccoli sprouts are up to 100 times more potent. The sprouts contain Sulforaphane which not only kills cancer cells, but actually suppresses the growth and spread of many types of cancers.
There are literally hundreds of known cancer cures that have saved countless lives. Of course, healing cancer involves healing the body as a whole. Lifestyle and dietary changes are also essential since cancer is just the symptom and NOT the cause. If you know anyone who is afflicted with cancer, please share this information and be a messenger of hope.
About the Author
Dr. Veronique Desaulniers, better known as Dr. V, has maintained successful practices in the Wellness Industry since 1979. Specializing in Bio-Energetics, Meridian Stress Analysis, Homeopathy, Thermography and Chiropractic, Dr. V brings a unique approach to Health and Wellness. After personally overcoming Breast Cancer without the use of chemo, radiation or surgery, Dr. V currently helps to empower women about healing and preventing Breast Cancer, naturally. For more information about Dr. V’s personal Cancer Coaching visit http://www.BreastCancerConqueror.com
~~ Help Waking Times to raise the vibration by sharing this article with the buttons below… | <urn:uuid:74abee91-a047-4fcd-81fe-ae330b191614> | {
"date": "2014-03-11T19:25:27",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011250185/warc/CC-MAIN-20140305092050-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9350420832633972,
"score": 2.625,
"token_count": 886,
"url": "http://www.wakingtimes.com/2012/07/25/simple-cancer-remedies-can-give-fighting-chance-learn-more-httpwww-naturalnews-com036458_cancer_remedies_blood_root_vitamin_d-htmlixzz210fymd9f/"
} |
Definitions for obiter dictumˈɒb ɪ tər ˈdɪk təm; ˈdɪk tə
This page provides all possible meanings and translations of the word obiter dictum
obiter dictum, passing comment(noun)
an incidental remark
obiter dictum, dictum(noun)
an opinion voiced by a judge on a point of law not directly bearing on the case in question and therefore not binding
a statement or remark in a court's judgment that is not essential to the disposition of the case.
Origin: “a saying by the way”
Obiter dictum is Latin for a statement "said in passing". An obiter dictum is a remark or observation made by a judge that, although included in the body of the court's opinion, does not form a necessary part of the court's decision. In a court opinion, obiter dicta include, but are not limited to, words "introduced by way of illustration, or analogy or argument." Unlike the rationes decidendi, obiter dicta are not the subject of the judicial decision, even if they happen to be correct statements of law. Under the doctrine of stare decisis, statements constituting obiter dicta are therefore not binding, although in some jurisdictions, such as England and Wales, they can be strongly persuasive. An example of an instance where a court opinion may include obiter dicta is where a court rules that it lacks jurisdiction to hear a case or dismisses the case on a technicality. If the court in such a case offers opinions on the merits of the case, such opinions may constitute obiter dicta. Less clear-cut instances of obiter dicta occur where a judge makes a side comment in an opinion to provide context for other parts of the opinion, or makes a thorough exploration of a relevant area of law. Another example would be where the judge, in explaining his or her ruling, provides a hypothetical set of facts and explains how he or she believes the law would apply to those facts.
The numerical value of obiter dictum in Chaldean Numerology is: 7
The numerical value of obiter dictum in Pythagorean Numerology is: 4
Images & Illustrations of obiter dictum
Translations for obiter dictum
From our Multilingual Translation Dictionary
- opinión accesoriaSpanish
Get even more translations for obiter dictum »
Find a translation for the obiter dictum definition in other languages:
Select another language:
Discuss these obiter dictum definitions with the community:
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Use the citation below to add this definition to your bibliography:
"obiter dictum." Definitions.net. STANDS4 LLC, 2016. Web. 26 Sep. 2016. <http://www.definitions.net/definition/obiter dictum>. | <urn:uuid:ff7d81f4-ea82-429a-8a7a-b9a3496339ec> | {
"date": "2016-09-26T22:31:37",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660898.27/warc/CC-MAIN-20160924173740-00037-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8191705942153931,
"score": 2.59375,
"token_count": 633,
"url": "http://www.definitions.net/definition/obiter%20dictum"
} |
Testing Our Students A Big Step In Improving Education
There's a growing consensus in New Mexico that we must continue to work to fix our education system. That for far too long, our state has lagged behind others. That the status quo has reigned and badly needed reforms have not been championed.
Occasionally, you'll come across people who choose to leave their heads in the sand regarding New Mexico's educational system. They believe some things need not change. Or at least that seemed to be the message Kathy Korte conveyed in her recent op-ed, which was both pessimistic and peppered with misinformation that has been discredited time and again.
Thankfully, we have leaders in office who believe wholeheartedly in our students and teachers. Gov. Susana Martinez, for example, has worked tirelessly to implement critical reforms that challenge the status quo and inspire excellence.
An important part of those reforms, and a big first step in turning our educational system around, is measuring the performances of our schools. It started with grading the performance of New Mexico schools so that parents and students alike understand how their school is performing. By providing a simple grade of A, B, C, D or F, New Mexicans know whether their children are receiving the education they deserve and fund with their tax dollars.
Next, testing our children ensures they fully understand core concepts before moving them onto the next grade, where they will be expected to use what they have learned as the foundation for advanced instruction. To put it simply, they should know how to add and subtract before they're taught how to multiply and divide. They should learn how to read and write before asked to absorb American literature. Testing ensures we don't set our kids up for failure by putting them in a classroom where they will fall behind their peers and become frustrated with education eventually dropping out altogether.
In my case, it's great to know the areas my child needs extra help with, so we can work together after school to improve on those things.
Testing also calls for more accountability in the classroom. In the workplace, it is always helpful to objectively know your strengths and weaknesses.
In addition to testing, through teacher evaluations, which incorporate numerous variables like classroom observations and improvement in student achievement, we are able to recognize the teachers who excel in the classroom, as well as those who need assistance. That aid can come in a variety of ways, including more resources in the classroom.
One of the more preposterous claims in Korte's op-ed is the idea that our children spend most of their days taking standardized tests. That couldn't be further from the truth. In fact, an Albuquerque Journal article found that our kids spend just one percent of their time in the classroom taking these tests. To put it in perspective, New Mexico students spend 1,100 hours at school every year, and only nine are spent testing.
Luckily, the majority of New Mexicans believe we need to implement meaningful reforms if we ever want to improve education. When Korte, a board member of Albuquerque Public Schools (APS), had the audacity to propose that the school district send every parent a letter allowing them to "opt out" of testing, the board emphatically rejected it. And less than 100 chose to opt out their children in the state's largest school district.
Clearly, the majority of New Mexicans embrace educational reforms because they believe we need to make changes if the state's educational system seeks to improve.
If it's any indicator whether these reforms will work, Governor Martinez's education initiatives have already produced positive results. For example, graduation rates increased by seven points during her first year in office, and our state was the recipient of the prestigious Race to the Top, a grant from the Obama Administration that focuses on early childhood education.
Perhaps maintaining the status quo makes Korte's life a lot easier as an APS Board member. But for the majority of New Mexicans, staying the course is setting our children up for failure. | <urn:uuid:cdac6076-ae73-4cee-bb46-2734d45deedd> | {
"date": "2015-04-19T09:52:04",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246638571.67/warc/CC-MAIN-20150417045718-00042-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9718806147575378,
"score": 2.59375,
"token_count": 806,
"url": "http://www.currentargus.com/carlsbad-news/ci_25031058/opinion?source=rss"
} |
The Kalman filter assimilation technique is applied to a simplified soil moisture model for retrieval of the soil moisture profile from near-surface soil moisture measurements. First, the simplified soil moisture model is developed, based on an approximation to the Buckingham–Darcy equation. This model is then used in a 12-month one-dimensional field application, with updating at 1-, 5-, 10-, and 20-day intervals. The data used are for the Nerrigundah field site, New South Wales, Australia. This study has identified (i) the importance of knowing the depth over which the near-surface soil moisture measurements are representative (i.e., observation depth), (ii) soil porosity and residual soil moisture content as the most important soil parameters for correct retrieval of the soil moisture profile, (iii) the importance of a soil moisture model that represents the dominant soil physical processes correctly, and (iv) an appropriate forecasting model as far more important than the temporal resolution of near-surface soil moisture measurements. Although the soil moisture model developed here is a good approximation to the Richards equation, it requires a root water uptake term or calibration to an extreme drying event to model extremely dry periods at the field site correctly.
Journal of Hydrometeorology Vol. 2, Issue 4, p. 356-373 | <urn:uuid:957f3d18-de2d-4ea6-a919-47311e7313d6> | {
"date": "2014-07-23T04:05:39",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997873839.53/warc/CC-MAIN-20140722025753-00184-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8851156234741211,
"score": 2.78125,
"token_count": 264,
"url": "http://nova.newcastle.edu.au/vital/access/manager/Repository/uon:862?exact=creator%3A%22Walker%2C+Jeffrey+P.%22"
} |
Sláinte, April 2011
Sláinte is going to talk about the Irish dancer today. What is the most important on feis day? The costume, cape, shoes, poodle socks? (the wig is not, Sláinte is very anti-wig, makes them look like little Dolly Partons) What about the steps? Nope, the important thing is the food you will put in your dancer. The higher the level she competes, the more important nutrition becomes. Her muscles have been trained to give the best performance they can give, but in order for them to work they must be fueled. Same goes for the brain. You want your dancer to remember her steps, correct?
A bit of dancer biology.
The muscles burn glucose for fuel and a certain level is kept in the blood at all times. After your child eats, glucose from the carbohydrates circulate in her blood. This causes a release of the hormone insulin (dinner bell!) which moves the glucose from the blood into cells. In muscle cells, extra glucose is first stored as a kind of fast food called glycogen. When glycogen stores are filled, extra glucose is changed into fat, a storage form that takes longer to burn.
What does all this mean to you? Protein and fat are needed for muscle cell growth, cell replacement and maintenance but on feis day the most important nutrients are carbohydrates, electrolytes and water. Which is why sports drinks happen to contain all three.
Stress and tension can decrease blood flow to the digestive tract interfering with digestion so no large meals the night before or on the morning of feis day or during the feis itself. Your dancer might even complain that she is too nervous to eat. But don’t let her skip breakfast either. You want high carb foods that will empty from her digestive tract quickly. A whole grain cereal with low fat milk is a good choice for a feis breakfast. Avoid high fat foods (bacon and fried eggs) that will sit in her nervous stomach all morning. Ensure drinks like it make good meal replacements for the child who refuses to eat because of a nervous stomach. They contain protein but are not high protein in themselves.
When your child dances, first glucose is burned and then the muscle cells turn to glycogen. Depending on how many dances she is doing (and some children in small competitions have to do their solos almost in a row) her leg muscles might eat right through their glycogen stores. These can be replenished with sips (not gulps) of a sports drink or diluted fruit juice. Unless she is sweating buckets, extra water is not needed to keep her hydrated. She’s not playing football so don’t push her to drink constantly; it’s not necessary and it increases the likelihood of her have to dance on a full bladder at some point. On the other hand, if she is practicing a group dance over and over in a hot room before the competition, dehydration could be a problem. If she is thirsty let her drink. Cramping is a sign of dehydration.
A midmorning snack is a good idea. Low fat yogurt, juice, or crackers are good choices. Limit high fiber, high fats foods and protein supplements that linger in the stomach. Lunch in the middle of a competition day should also be light.
Don’t give your child or let your teen drink one of those quick energy drinks. Most are stimulants of some kind. They make you feel like you have energy when your muscles could be exhausted. Performance suffers because it is like whipping a dying horse. Some contain very high levels of caffeine which will make your child jittery not precise. Some contain herbs or supplements of unknown safety. Skip diet sodas or soda altogether because of the carbonation. End the day with a nutritious dinner with lots of veggies to provide the muscles with nutrients to heal and grow from the exercise.
If your child competes on a national level, it would be a wise to invest in a few sessions with a sports nutritionist to design nutrition programs for training and competition based on their age and stage of development. | <urn:uuid:936cecd7-7509-49e2-920a-5eb4d58909a1> | {
"date": "2019-07-23T00:31:14",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528635.94/warc/CC-MAIN-20190723002417-20190723024417-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9574366807937622,
"score": 2.84375,
"token_count": 849,
"url": "https://keanenutrition.wordpress.com/2011/11/17/nutrition-for-irish-dancers/"
} |
Cycles of activities have tremendous influences on problems. The ebb and flow of vehicles caused by commuting and shopping rhythms, for example, changes the number of targets and guardians in parking facilities. This, in turn, influences when vehicle thefts and break-ins are most frequent. Robberies of drunken revelers may be more likely around bar closing time on Fridays and Saturdays, because the number of targets is higher. In this example, two important rhythms concentrate problem activities. The first is the workday/weekend cycle that makes Friday and Saturday nights so popular for entertainment and recreation. The second involves the daily cycle of opening and closing of bars. In this step we will discuss short-term fluctuations occurring over hours and days. In Step 26, we will look at longer time periods covering months and years.
Different facilities have different cycles of activities that can contribute to their associated problems. School rhythms are similar though distinct from job rhythms. Bus stops are influenced by the rhythm of commuting and shopping, but also by the more frequent coming and going of buses.
Charting the rhythm of crime or disorder events helps identify important activity cycles that may contribute to a problem. As shown in the figure below, calculate the average of the number of events occurring in each hour (or other time interval) over several days (data matrix at top), then plot the results (Chart A). Chart B shows the percentage of the week's events occurring on each day. Because some days routinely have very different rhythms than other days, Rachel Boba recommends charting days and hours together (Chart C). The result shows hot time periods throughout the week. Such charts are easy to produce; all three of these charts were created on a spreadsheet, using standard graphing routines.
Temporal analysis is easiest when problem events are frequent. So temporal analysis will be more useful for common minor events, like noise complaints and minor traffic accidents, than for uncommon serious events, like murder. If there are few events, then you can look at a longer period to collect more events. But if the problem changes in the longer period, the picture that emerges may be distorted or out of date.
Having reasonably exact times of occurrence helps temporal analysis. Contact crimes, such as robbery, rape, and assault, can be accurately pin-pointed as victims can often describe when these crimes took place. Property crimes, such as vehicle crimes, burglary, and vandalism, are much harder to pin down because victims usually provide only a time range during which such crimes could have occurred. Though it is common to use the midpoints in these ranges to estimate the times crimes occurred, this can lead to distortion and should be avoided for long periods (e.g., more than 8 hours).
Jerry Ratcliffe also has identified three forms of temporal clustering. First, events may be relatively evenly spread over the entire day. He calls this a diffused pattern. Second, focused patterns show clustering within distinct time ranges. Events clustered around rush hours follow focused patterns. Third, acute patterns are tightly packed within small periods. Disturbances immediately following bar closing time might be an example. Focused and acute patterns immediately suggest temporal cycles that should be investigated.
Though Ratcliffe developed his typology for daily patterns, the basic idea can be applied to weekly cycles. If no particular day of the week is routinely troublesome, this indicates a diffused weekly pattern. A cluster of days showing a marked increase in troublesome events indicates a focused pattern. Finally, if one or two days have a marked concentration of events, this indicates an acute pattern.Show 'Example of Number of Events by Hour and Day of Week'
EXAMINING TEMPORAL RHYTHMS
A. Average Hourly Rhythm
B. Percent of Week's Events
C. Daily and Hourly Rhythms
- Boba, Rachel (2005). Crime Analysis and Crime Mapping: An Introduction. Thousand Oaks, CA: Sage Publications. | <urn:uuid:6a10c615-cb2c-4400-a007-6202541395c8> | {
"date": "2016-07-29T05:55:58",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829972.19/warc/CC-MAIN-20160723071029-00212-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9484196901321411,
"score": 3.453125,
"token_count": 800,
"url": "http://www.popcenter.org/learning/60steps/index.cfm?stepNum=25"
} |
A non-graphitic carbon
which upon graphitization heat treatment
converts into graphitic carbon
If it is preferred to define the characterizable state of material instead of its
behaviour during subsequent treatment, the term 'pregraphitic carbon' could be considered.
PAC, 1995, 67, 473
(Recommended terminology for the description of carbon as a solid (IUPAC Recommendations
on page 493
IUPAC. Compendium of Chemical Terminology, 2nd ed. (the "Gold Book"). Compiled by
A. D. McNaught and A. Wilkinson. Blackwell Scientific Publications, Oxford (1997).
XML on-line corrected version: http://goldbook.iupac.org (2006-) created by M. Nic,
J. Jirat, B. Kosata; updates compiled by A. Jenkins. ISBN 0-9678550-9-8. https://doi.org/10.1351/goldbook | <urn:uuid:4011f3cc-c050-406b-8494-1252d6e80396> | {
"date": "2019-02-22T00:51:00",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511573.67/warc/CC-MAIN-20190221233437-20190222015437-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7088558077812195,
"score": 2.53125,
"token_count": 206,
"url": "http://goldbook.iupac.org/html/G/G02690.html"
} |
Last week, two employees of the Crystal Cove Alliance spotted a sea otter playing in the surf near Laguna Beach. It’s only the second sighting of sea otters in the area in more than 30 years, and a welcome sign of a possible resurgence of sea otters in Southern California. There have also been at least two reported sightings off San Clemente.
The otter was nicknamed “Ollie” by two employees of the Crystal Cove Alliance.
Once abundant, sea otters virtually disappeared from the area about 100 years ago. A thriving fur trade from the late 1700s to the early 1900s nearly brought the animals to the brink of extinction until the passage of a protective measure in 1911 at the North Pacific Fur Seal Convention. In 1973, they were listed as an endangered species, which further protected them from incidental or accidental take from commercial fishing operations, and also protected vital habitat locations.
The southern sea otter once roamed the Pacific coast from the Oregon/Washington border all the way down to Baja, Mexico. Over the past 100 years, otters have expanded their territory from the Morro Bay area north and south. In 2012, the population was estimated at 2,792, according to a 2012 U.S. Geological Survey. In 2014, that number rose to 2,944.
In addition to improved habitat and protections given to them, the otters could be returning to the area due to an increased food supply. Crystal Cove is a marine conservation area, where fishing is limited at certain times of the year, and studies show there are a lot of fish and plankton in the area. The otter, nicknamed “Ollie”, was seen first eating an octopus, then a lobster.
Adult sea otters typically weigh between 31 and 99 pounds, making them the heaviest members of the weasel family, but among the smallest marine mammals. The sea otter’s primary form of insulation is an exceptionally thick coat of fur, which is the densest in the animal kingdom. In the wild, sea otters live to a maximum age of 23 years, with average lifespans of 10–15 years for males and 15–20 years for females. | <urn:uuid:8299db26-2bef-482a-92f8-c86492dfd79b> | {
"date": "2017-06-24T05:23:33",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320226.61/warc/CC-MAIN-20170624050312-20170624070312-00657.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9506561160087585,
"score": 2.84375,
"token_count": 455,
"url": "http://californiadiver.com/sea-otters-spotted-at-laguna-beach-sightings-offer-hope-of-resurgence/"
} |
Two forms of smoking have risen in popularity in recent years: hookah and e-cigarettes (electronic cigarettes). According to the 2016 Monitoring the Future survey, nearly 17% of college students and nearly 20% of young adults not in college reported trying hookah in the past year. While fewer young adults overall reported using e-cigarettes, nearly 7% of college students and 9% of non-college young adults reported using them within the past month.
The Health Risks of Hookah
A hookah is a water pipe, common in the Middle East and India, that allows users to smoke tobacco. It’s base is filled with water, while the top plate or bowl is filled with flavored tobacco. The tobacco is heated and smoke is drawn down though the water to a hose connected to a mouthpiece. This is passed around between users, as smoking hookah is generally a social activity. Since the tobacco that is used is flavored or sweetened (flavor options are nearly endless, from chocolate to apple to coffee), users don’t taste the smokey flavor that comes with other forms of tobacco use.
Many people believe that the water in a hookah filters out the harmful ingredients present in tobacco smoke. Unfortunately, this isn’t the case. Smoking hookah is no safer than smoking cigarettes. In fact, by smoking hookah, you may actually be putting yourself at a higher risk than by smoking a cigarette: hookah smoke contains tar, carbon monoxide, and carcinogens, all things that you don’t want building up in your lungs, in much higher quantities than a single cigarette. And since hookah is an inherently social activity, you may actually spend longer inhaling toxic compounds than you would smoking a cigarette...or five.
A study published by the American Association for Cancer Research in 2014 found that after a single night of smoking hookah, internal nicotine content (as measured in an individual’s urine) spiked to an average of 73 times higher than before smoking began. NNAL (a cancer-causing chemical formed after tobacco enters the body) levels doubled, and products resulting from the breakdown volatile organic compounds increased up to 91%. Long-term or repeated use of tobacco products is known to cause various types of cancer (oral, lung, stomach, bladder, etc.), heart disease, and respiratory illness. Let’s not forget that mouthpieces are shared among participants, so any diseases that be can transmitted through saliva, from the common cold to oral herpes, can be passed from participant to participant too.
The fact of the matter is that tobacco is tobacco, no matter how you take it in. There is nicotine in all forms of tobacco, making smoking hookah just as addictive as smoking cigarettes or using smokeless tobacco. All forms of tobacco increase your risk of developing cancer, heart disease, and respiratory illness. If you are addicted to tobacco products and want to quit, there are programs and techniques that can help you. Ask your doctor for advice about quitting, call 1-800-QUIT-NOW (1-800-784-8669), or visit smokefree.gov. Quitting is hard, but the health benefits are worth it, now and in the future.
The Health Risks of E-Cigarettes
Unlike hookah and traditional cigarettes, e-cigarettes do not actually contain any tobacco. Instead, they contain a liquid mixture of nicotine, flavoring, and other chemicals (exactly what’s inside an e-cigarette varies by brand). Similar to a hookah, individuals who use e-cigarettes inhale the steam that is created when the mixture inside the e-cigarette is heated. However, there is no tar or carbon monoxide, or any tobacco-related carcinogens. What there could be, though, are toxic compounds that aren’t related to tobacco, including formaldehyde and diacetyl (which can cause lung disease). While touted as a safer alternative to cigarettes or tobacco products, there are still health risks.
The predominant problem with e-cigarettes is that they continue to facilitate nicotine addiction. Some people switch to e-cigarettes in an attempt to smoke “healthier” cigarettes or as a step on the way to quitting smoking altogether. As you might expect, switching to e-cigarettes does not help individuals to quit smoking; a review of multiple studies found that individuals who used e-cigarettes were 28% less likely to successfully quit smoking than those who didn’t, likely because e-cigarettes provided a continuous source of nicotine.
Nicotine isn’t particularly healthy either. It causes problems of its own, including:
- Increased risk of blood clots
- Increased risk of diabetes
- Increased risk of stroke
- Narrowing of arteries due to buildup of plaque (atherosclerosis)
- Mood disorders
- Inhibition of brain development
- High blood pressure
If you are curious about e-cigarettes, but have never smoked before, don’t start now. The potential for addiction is too great, and the side effects aren’t worth the risk. If you currently smoke e-cigarettes, but want to stop, talk to your doctor about quitting. It is possible! | <urn:uuid:325408a7-6be8-483a-9436-80bdec803969> | {
"date": "2019-04-20T04:55:08",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528523.35/warc/CC-MAIN-20190420040932-20190420062932-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9430007338523865,
"score": 3.125,
"token_count": 1068,
"url": "http://blog.studentcaffe.com/health-risks-hookah-e-cigarettes/"
} |
The Fate of European Roma and Sinti During the Holocaust
An estimated 500,000 European Roma and Sinti were murdered during the Holocaust - victims of racist persecution by the German Nazis and their fascist allies. But this genocide is still largely unknown. Roma and Sinti were murdered in extermination camps and died of hunger and disease in forced labour and concentration camps. Many more were deported and exploited as forced labour on farms, construction sites and in industry. For decades after the war the survivors were not recognised as victims of the Nazi persecution and received little or no compensation or restitution for their lost property. This site provides basic information on the genocide of European Roma and Sinti for teachers and students. | <urn:uuid:67fd8b40-310a-4403-a31b-8f921c0774e0> | {
"date": "2017-01-22T16:18:56",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00018-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9803170561790466,
"score": 3.484375,
"token_count": 141,
"url": "http://www.romasintigenocide.eu/en/home?set_language=en"
} |
A Laser distance sensor can actually help in detecting, counting, triggering, mapping, scanning, profiling, and verifying levels, proximities and distances. A laser distance sensor takes assistance from a laser beam to find out the distance to an object. It operates on the principle of time of flight. It sends a laser pulse in the form of a narrow beam towards the object and then measures the time taken by the pulse to be reflected off the target and returned to the sender.
In simple words, a laser distance sensors helps in finding out the distance from the observer to a target.
How does a laser distance sensor work?
A laser distance sensor works on some basic fundamental principles. The laser distance sensors releases laser beams at the push of a button. These laser beams bounce off distant objects and the sensor’s high speed clock determines the total time that it took from when the beam got released until it returned to the sender.
Applications of a laser distance sensor
There are many uses and applications of a laser distance sensor. For example, a golfer can use them to measure the distance travelled by the ball to hit an object. Hunters can also use them to measure the distance to a deer, an elk, or others. Laser distance sensors have some other uses too, such as for military. They can be used to scout an area and search for military targets.
Advantages of a laser distance sensor
There are some advantages of a laser distance sensor mentioned below.
- One can expect a really quality performance: A laser distance sensor contains a high quality optics and display, advance software system, longer battery life and some additional features that can be used for the sports it is made for.
- One can use it on any weather: There are many laser distance sensors that can give correct and accurate measurements irrespective of the harsh or extreme weather conditions.
- Easy and simple to use: Laser distance sensors are easy and simple to use. One doesn’t need to complete a course for this. But it is advised to get familiarized with the basic concepts of using a laser distance sensor. Each unit of a sensor contains two gears streamlined into one.
- It gives faster and accurate shots: A laser distance sensors provide accurate measurements as well as faster and accurate shots. Along with this, the sensor also reduces chances of mishap shots which may cause one to lose the target.
Disadvantages of a laser distance sensor
Along with the advantages of using a laser distance sensor, there are few disadvantages too. They are mentioned below,
- It is not lightweight: Although, the laser distance sensors are very helpful and useful but they are not lightweight to use. Having the sensor with double optics means more weight.
- As the price increases quality also increases: It is really hard to find a laser distance sensor economically along with some high qualities. So it is really pricey to get the sensor with really high quality optics. | <urn:uuid:087443d1-d0a3-47d8-b8d1-e17563c726e8> | {
"date": "2019-02-20T09:47:54",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494694.1/warc/CC-MAIN-20190220085318-20190220111318-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9436030983924866,
"score": 3.359375,
"token_count": 595,
"url": "https://techpinger.com/surveying-laser-distance-sensors/"
} |
Atlantic Republic traces the legacy of the United States both as a place and as an idea in the work of English writers from 1776 to the present day. Seeing the disputes of the Reformation as a precursor to this transatlantic divide, it argues that America has operated since the Revolution as a focal point for various traditions of dissent within English culture. By ranging over writers from Richard Price and Susanna Rowson in the 1790s to Angela Carter and Salman Rushdie at the turn of the twenty-first century, the book argues that America haunts the English literary tradition as a parallel space where ideology and aesthetics are configured differently. Consequently, it suggests, many of the key episodes in British history-parliamentary reform in the 1830s, the imperial designs of the Victorian era, the twentieth-century conflict with fascism, the advance of globalization since 1980-have been shaped by implicit dialogues with American cultural models. Rather than simply reinforcing the benign myth of a 'special relationship', Paul Giles considers how various English writers over the past 200 years have engaged with America for various complicated reasons: its promise of political republicanism (Byron, Mary Shelley); its emphasis on religious disestablishment (Clough, Gissing); its prospect of pastoral regeneration (Ruxton, Lawrence); its vision of scientific futurism (Huxley, Ballard). The book also analyses the complex cultural relations between Britain and the United States around the time of the Second World War, suggesting that writers such as Wodehouse, Isherwood, and Auden understood the United States and Germany to offer alternative versions of the kind of technological modernity that appeared equally hostile to traditional forms of English culture. The book ends with a consideration of ways in which the canon of English literature might appear in a different light if seen from a transnational rather than a familiar national perspective. | <urn:uuid:e93311a5-c2b7-44d9-89c4-d70341c99d2d> | {
"date": "2018-12-17T17:55:33",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828697.80/warc/CC-MAIN-20181217161704-20181217183704-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9469268321990967,
"score": 2.546875,
"token_count": 371,
"url": "https://www.ibs.it/atlantic-republic-american-tradition-in-libro-inglese-paul-giles/e/9780199206339"
} |
Repeated awakenings from the major sleep period or naps with detailed recall of extended and extremely frightening dreams, usually involving threats to survival, security, or self-esteem. The awakenings generally occur during the second half of the sleep period.
On awakening from the frightening dreams, the person rapidly becomes oriented and alert (in contrast to the confusion and disorientation seen in Sleep Terror Disorder and some forms of epilepsy).
The dream experience, or the sleep disturbance resulting from the awakening, causes clinically significant distress or impairment in social, occupational, or other important areas of functioning.
The nightmares do not occur exclusively during the course of another mental disorder (e.g., a delirium, Posttraumatic Stress Disorder) or any coexisting (sleep or non-sleep) mental or medical disorder cannot adequately explain the predominant complaint of dysphoric dreams. These dreams are not due to the direct physiological effects of a substance (e.g., a drug of abuse, a medication).
A clinician will add specifiers to the diagnosis according to its duration and severity.
- Acute: Duration of period of nightmares is 1 month or less.
- Subacute: Duration of period of nightmares is greater than 1 month but less than 6 months.
- Persistent: Duration of period of nightmares is 6 months or greater.
Severity is rated by the frequency with which the nightmares occur:
- Mild: Less than one episode per week on average.
- Moderate: One or more episodes per week but less than nightly.
- Severe: Episodes nightly.
DSM-5 diagnostic code 307.47.
Psych Central. (2014). Nightmare Disorder Symptoms. Psych Central. Retrieved on December 18, 2014, from http://psychcentral.com/disorders/nightmare-disorder-symptoms/
Symptom criteria summarized from:
American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders, fifth edition. Washington, DC: American Psychiatric Association.
American Psychiatric Association. (1994). Diagnostic and statistical manual of mental disorders, fourth edition. Washington, DC: American Psychiatric Association.
Last reviewed: By John M. Grohol, Psy.D. on 20 Jun 2014
Published on PsychCentral.com. All rights reserved. | <urn:uuid:588d7e7e-6325-47ed-9cc5-3e727fbd6c8c> | {
"date": "2014-12-18T21:41:23",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767878.79/warc/CC-MAIN-20141217075247-00163-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8651738166809082,
"score": 2.84375,
"token_count": 469,
"url": "http://psychcentral.com/disorders/nightmare-disorder-symptoms/"
} |
Others, particularly the weaker ones, find it incredibly difficult to structure an essay logically. Post navigation ← Previous Thesis for an essay, oxford university creative writing program, edexcel history a2 coursework help.
How To Write An A2 History Essay Edexcel * sighs* write fast from the start, An Excellent A2 History Coursework In 13 Easy Steps An Excellent A2 History Coursework In How to Structure a Politics BSc Essay; How to Write an International Exemplar Essay Plan A2 Edexcel G& P How to Write a Great Essay for Different A- Level SubjectsA good history essay makes To. A2 Biology Essay Help, Professional Writing Service in California.
How to Write a Good History Essay Some Suggestions for the Time- Conscious Student. Write good a2 history essay - It' s got allowed the writer to visualize the flow from the essay before committing to a single paragraph to paper.
Don' t listen to this hater. Dissertation definition of terms section Help With A2.
Buy and sell essays viper scan my essay download Ocr A2 History Coursework Help a level history coursework help buy essayshark account. Descriptive essay character beowulf mercian hymns geoffrey hill analysis essay how to.
Research paper on dell computers language for analysis. Day celebration essay help college essay good ieee research paper on can you extended essay help research papers biology.Help with a2 history coursework - www. How to write an A- Level History Essay - A level History at St.
Google has many special features to help you find exactly what you' re looking for. How to Write a Great Essay for Different A- Level Subjects.
A2 History Essay Help - Chalfont Family Restaurant One of the UK' s essay amphioxus writing largest, co- educational, Catholic. Year 8 History exam revision ( i) Oliver Cromwell – Civil War, Protectorate & Ireland/ Scotland.
Easter Rising centenary: · An essay on providing cheap drugs Excellent A2. Villa lobos guitar concerto analysis essay, mfa creative writing umd, can i write an essay on my iphone >.
How to write a good a2 history essay. Effective Essay a2 history essay help Writing for ' A' Level.
Bob don' t worry i' ll send you an essay. My Revision Notes OCR A2 History: Russia and its RulersРезультат из Google Книги Diploma thesis dissertation online extreme sports opinion essay writing essays online radio preparing dissertation for publication win money writing essays cross.
The consultant was very good; he listened to our wishes and answered all of our questions. Writing history papers - Custom Essays & Academic Papers At Best.
Moldavian language essay, doing a literature review in health and social care 3rd edition, shakespeare primary homework help. So structure it and think of it as an essay.
Database of example history essays - these essays are the work of our professional essay writers and are free to use to help with your studies. Turnitin a2 history essay help creates tools for K- 12 and higher education that improve a2 history essay help writing and prevent plagiarism. Enjoy proficient essay help with a2 history coursework writing and custom writing services provided by professional. Essay about internet user policy essays.
If you need to write. How to write an essay: 7 tips for A Level students | Studying. Some schools may have given you a structure. Which ones you think are the most credible and why, support with historical evidence.
Help trip parents a2 history coursework help meeting presentation ; Berlin trip parents meeting presentation-. Physics a level coursework essay writing essays apr 28, edexcel gce a- level history.
A2 History Essay Help, Academic Papers Writing Service in Canada. Writing Essays is the most important skill that A- level Historians need to acquire.
All students have almost the same problem. A2 history essay writing, woodlands junior homework help maths.
Remember at the end of the day your coursework is indeed similar to an AS History source exam. How to write an A- Level History Essay. Marked by Teachers essays 102; Peer Reviewed essays 30. For A- level you need to make this a little more sophisticated- if you can, bring in other historians' opinions. How to Structure a Politics BSc Essay; How to Write an International Relations Essay;. " In conclusion, although Roosevelt did not deal with some of the issues which arose during his presidency, and did make a major political mistake, I think that his presidency can still be viewed as effective and successful.
How to write a good history exam essay. AS and A Level: History.
Argumentative essay writing ocr a2 history essay thesis help community service paragraph essay about basketball history;. Essay Writing Skills at AS Level - Seminars - History Teachers.
Help with a level history coursework. A good history essay makes connections between what' s been written about, considering how issues interrelate, so think about how what you' re writing about ties in with other things;.
Marked by Teachers essays 102; Peer Reviewed essays 30. For A- level you need to make this a little more sophisticated- if you can, bring in other historians' opinions.Writing ib history essays how to write a good personal statement for medical residency key points 1. 3 - mla, wjec key summary on the structure for art computing edexcel a2 students prepare for writing service 24/ 7.
How to Structure a Politics BSc Essay; How to Write an International Relations Essay;. " In conclusion, although Roosevelt did not deal with some of the issues which arose during his presidency, and did make a major political mistake, I think that his presidency can still be viewed as effective and successful.
A2 History Essay Help - The Pehnawa. A2 History Essay Help - www.
History Coursework In 13 Easy Steps. - Добавлено пользователем mrfoleyrevisionAn overview of how to structure essays with a particular link to Edexcel' s A Level History.
6 gmat essay radio 3 essay archive pursuing goals and dreams essay how to do citations in a research paper jam african art history essays thesis for photo essay. Enjoy proficient essay writing and custom writing services help with a2 history coursework provided by professional.
Start with a good stru. Assignment 1 ptlls, level 4 - essay samples.
We also support teachers to develop their professional skills. Sample Annotated Catalogue Here is a sample annotated catalogue. Benefit from our inexpensive custom term paper writing service and get the most from unbelievable quality. How to write a good history essay.
How to write an a2 history essay edexcel | Birmy EducationBirmy. Like sure i love coming on but like i have to write college application essays and get ready for school i' ll be preoccupied.
How do I structure an A- Level history essay? Describe yourself college essay joints, a2 history coursework help, wake forest essay help.
Describe your actions and let. Edexcel history a level coursework examples - Little Sisters of the.
A2 history edexcel coursework. My book of daily historical accounts, 366 Days, is now available to purchase from Amazon.
* * The following information applies to students who started taking A- Level Maths good introduction for history essay before edexcel history a level coursework examples September. An Excellent A2 History Coursework In 13 Easy Steps.
Org Nature et culture dissertation mandela sign language. Chefs, our goal is to exceed our client' s expectations and to remind them.
Of course the traditional A Level candidate faced all these problems too, but there was then a longer period of time to build the art of writing a good essay. This was for my Edexcel History Coursework! Com is a FREE History revision website containing GCSE. Essay writing takes a leap at A- level and many aren' t quite prepared for it: Here' s 7 ways to get you on your way to a killer essay.Unfortunately, southwestern homework help missouri a good essay does not. They have all been picked by members of the.
Hist213 - Writing Good History Essays - Lancaster University A Guide to Writing Good History Essays for Students of History 213, Warlords and Holy Men. At A Tale of Two.
EXAM SKILLS A Level History Essays - YouTube 13 декмин. Raffi yessayan attorney in fact essay on self awareness the key to success an essay in criticism summary essay about learning english as foreign language, writing good compare and contrast essays essay about.
Ap lang and comp synthesis essay chevy, a2 history essay. A2 history coursework conclusion : : order an essay - Gradjanin.
How to Write Custom Paper The 30- Second Trick for Term Paper Help Nursing newspapers have to be written in an extremely standard way so as to meet the foreign standards that are required. History Coursework marketing term papers narrative writing help.
Jeti kiralama - en uygun. This app combines the strength of a dictionary and thesaurus, both available offline when you.
Worksheets tips writing good college application essay new york state essay plan template word quiz dissertation sur source conclusion de paris coursework Aiden: November 1,. Table of Contents.
The regulations often specify that, in the A2 year,. What about delegating your task to reliable essay.
Writing history papers - Make a timed custom essay with our help and make your tutors startled Allow the specialists to do your essays for you. Mr Allsop History.
By its very nature History A level requires specific writing techniques and Marked by Teachers has many thousands of essay. Depression pdf papyre 630 analysis essay dissertation methods history history of oral surgery essays on poverty how to make a thesis statement for a research.
You need to think for yourself and come up with a ‘ bright idea’ to write a good history essay. A2 history essay help - Harvey Browne Presbyterian Church.
Remember that line spacing is essential when writing the cover page. I' m a great place tok extended essay writing essays in egham, is actually quite an extensive subject but it for writing skills.
Cheap seo article writing service A2 History Essay Help writing essays services how to write professional essay. Analysis] UPSC Mains- GSM1: Lengthy Paper, Less Variety, 90% Qs from routine prep.
The following outline is intended as to provide one example of how to. History is a chronicle of human behaviour - a real- life drama full of.
BBC - Higher Bitesize History - Essay writing : Revision A BBC Bitesize secondary school revision resource for Higher History on source handling in the exam: working with sources – evaluating. | MyTutor You will have done this before in simple “ for- and- against” essays, where you argue two sides of the question and then conclude.
A2 history coursework help. Nursing custom papers should become plagiarism.
With Rochester' s summer Pre- College Programs, you' ll experience college life, explore careers, make friends, and take challenging courses Prior Park College. Ca Enjoy proficient essay writing and custom writing services provided by professional academic writers Nyc doe respond essay help Aqa A2 Sub Coursework Help regurgitation quality management research paper hand resume writing thought An Excellent A2 History.
A2 history coursework help - Cat and Exotic Care completely agree, if math website to help with homework problems only for the very good reason that quality is words for addition essays in. Then make your judgment.
Probably a2 history essay help no two people will completely agree, if only for the very good reason that quality is in. An AS candidate may well be facing the first Unit' s exam. | <urn:uuid:3ebab27e-d11f-4b32-893c-6dca39054656> | {
"date": "2019-01-21T08:24:33",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583763839.28/warc/CC-MAIN-20190121070334-20190121092334-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8802936673164368,
"score": 2.65625,
"token_count": 2533,
"url": "https://eiyoujiten.info/how-to-write-a-good-a2-history-essay/2018-09-26-120231.php"
} |
Scientists are beginning to understand how people tune in to a single voice in a crowded, noisy room.
This ability, known as the cocktail party effect, appears to rely on areas of the brain that have completely filtered out unwanted sounds, researchers report in the journal Neuron. So when a person decides to focus a particular speaker, other speakers "have no representation in those [brain] areas," says Elana Zion Golumbic of Columbia University.
The ability to extract sense from auditory chaos has puzzled scientists since the 1950s, Golumbic says. "It's something we do all the time, not only in cocktail parties," she says. "You're on the street, you're in a restaurant, you're in your office. There are a lot of background sounds all the time, and you constantly need to filter them out and focus on the one thing that's important to you."
But until a few years ago, how the brain did this was a mystery. That's changing, Golumbic says, thanks to new technology that allows scientists to monitor many different areas of the brain as they listen to multiple voices.
The technology involves a grid of electrodes placed on the surface of the brain. Experiments have relied on volunteers who already had these electrodes in place: people in the hospital awaiting surgery for severe epilepsy.
"We bring in a cart with a computer and a screen and speakers," Golumbic says. "And we show them movies."
One movie, for example, shows a woman telling a brief story about a parrot. Another shows a man telling a story about how he never liked to clean up his room.
To simulate a cocktail party, though, participants watched a third movie in which the man and woman are both on screen telling those stories simultaneously. The researchers asked them to focus on just one of the speakers while they monitored what was going on in their brains.
And the brain monitoring revealed something remarkable. When a person's brain is in cocktail party mode, some areas, like those involved in hearing, continue to respond to both voices. But other parts of the brain, like those devoted to language, appear to respond only to the selected speaker.
Afterward, volunteers who focused on the man had no trouble remembering that he didn't like to clean his room. But they didn't recall anything about the woman's parrot.
The study also found that the brain areas responding only to the selected voice were constantly fine-tuning their reception, says Charles Schroeder, a neuroscientist at Columbia University and New York State's Nathan Kline Institute. "As the sentence unfolds, the brain's tracking of the signal becomes better and better and better," he says.
This suggests that the brain is separating one voice from the rest by identifying its unique characteristics, Schroeder says. It's also likely that the brain is using information from the first words in a sentence to predict which words are likely to come next.
A better understanding of the cocktail party effect could eventually help people who have trouble deciphering a single voice in a noisy environment, says Edward Chang, an assistant professor of neurological surgery and physiology at the University of California, San Francisco.
That's a problem for many people as they get older, he says. It's also a problem for people with ADHD, Chang says, adding that he saw this problem up close when a person with the disorder volunteered for an experiment that involved trying to focus on just one of two speakers.
"This person had significant problems with the ability to select the correct speaker," Chang says.
Understanding precisely how the brain solves the cocktail party problem could also allow machines do a better job deciphering human speech, Chang says. That could mean better cell phones and less frustrating conversations with the computers that often answer phone calls to customer service hotlines. | <urn:uuid:6a751d50-631f-4dd5-8feb-448b11a57d1f> | {
"date": "2014-11-28T20:51:29",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010938.65/warc/CC-MAIN-20141125155650-00140-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9742208123207092,
"score": 2.84375,
"token_count": 776,
"url": "http://www.wfuv.org/npr/hear-din-voices-our-brains-can-tune-one"
} |
Infant hearing loss
I was pleased to see Laura Ungar's recent article about the new requirements for screening for congenital heart disease. I wanted to take a moment to call attention to the status of newborn hearing screening in our state.
Three in 1,000 babies are born with bilateral, permanent hearing loss. In 2012, the Early Hearing Detection and Intervention program (EHDI) recorded 51,439 live births in Kentucky, and 98 percent of these babies had their hearing screening in the hospital. We are well in line with where we need to be on screening.
The current issue is what we call "loss to follow up." Of the 2,350 infants who did not pass the screening in 2012, 452 infants have been "lost"- results were not reported to the EHDI database. Several of these infants likely have significant hearing loss.
Childhood hearing loss is a critical public health issue - one that affects quality of life as well as educational achievement. I encourage pediatricians and parents to make sure that appropriate follow up is completed on every child and reported to the state EHDI database. Implementation of screening has been largely successful, but we need to ensure that every child receives appropriate evaluation and necessary followup.
Little Ears Hearing Center
Louisville 40243 -
The C-J finds it painful to give two lines for an obituary, but continues to print every scary tale regarding the evils of carbon dioxide and climate change. It would be better to educate the readers with the real facts. For example, the reason one can drive off the Kennedy Bridge northward and not encounter steep grades is due to the last ice age, when an ice flow about two miles deep bulldozed down to Clarksville. So much moisture was tied up in ice, that oceans were 300 to 400 feet below present levels.
About 15,000 years ago, the ice layer began to retreat. Ice reflects about 80 percent of the sun's heat. It requires 80 calories to melt a gram of ice. The oceans reached the present levels 6,000 years ago. You should explain how a well-crafted "cap and trade" bill enacted 15,000 years ago would have resulted in today's corn belt still being under that huge pile of ice.
The atmosphere is composed of approximately 800,000 parts per million of nitrogen, and about 200,000 ppm oxygen. We are to get hysterical about 300 to 400 ppm of carbon dioxide. Joseph Priestley and Benjamin Franklin used bell jars to show how plants and animals were dependent on each other. Plants have to work hard to get their fix of carbon dioxide. Animal life gives off carbon dioxide, plants produce oxygen.
How many coal-powered power plants were needed to melt off all that ice? Too much reporting is fiction concocted to promote some devious agenda. There are forces beyond the control of mere mortals.
J. R. BOYD
Corydon, Ind. 47112 -
It's time to frame the coal debate in the light of Kentucky's environmental history as opposed to the biased viewpoint from Philip Impellizzeri of the Bluegrass Institute, called a free-market think tank. His recent essay in The Courier-Journal editorial page decried EPA's "heavy hand" of regulation. Instead, he favors state laws and state enforcement of the ways of coal companies.
As a former environmental writer, I saw how enforcement of Kentucky's coal strip mine laws was actually applied. Some very good state mine inspectors would note daily infractions of the law and would duly send them to Frankfort from their field offices in Hazard and Madisonville. At times I walked with those inspectors. And there those reports would sit gathering dust in the Kentucky Strip Mine Reclamation department headquarters, which was administered by a political appointee of the governor. This would happen under many successive governors, no matter Democrat or Republican. To put it politely, governors' political campaigns are "influenced" by the owners of coal companies.
I saw what happened to the streams that were draining water from these mine sites. The water was filled with whatever mineral was exposed by mining operations. These eroded minerals turned the water bright gold, jade green, maroon or brilliant turquoise. They were quite pretty and completely devoid of life.
Mr. Impellizzeri poses the question: which entity is most effective at weighing the often-subtle costs and benefits of Kentucky's energy sector? Is it federal regulators some 500 miles away or the local citizens most affected by the outcomes of such decisions? The answer is a no-brainer. The local citizen just happens to own the coal and the far-away law enforcer happens to be free from political influence.
By the way, who funds the Bluegrass Institute?
DAVID ROSS STEVENS
Borden, Ind. 47106 | <urn:uuid:3323097d-aba8-40a7-b5bb-011bf3636278> | {
"date": "2015-02-02T02:43:09",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122220909.62/warc/CC-MAIN-20150124175700-00177-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9636760354042053,
"score": 2.75,
"token_count": 984,
"url": "http://www.coshoctontribune.com/article/B2/20130708/OPINION02/307080027/"
} |
|This article relies largely or entirely upon a single source. (August 2013)|
A wallaroo is any of three closely related species of moderately large macropod, intermediate in size between the kangaroos and the wallabies. The word "wallaroo" is a portmanteau of "wallaby" and "kangaroo". The term is not generally used by Australians.[clarification needed] In general, a large, slim-bodied macropod of the open plains is called a "kangaroo"; a small to medium-sized one, particularly if it is relatively thick-set, is a "wallaby": most wallaroos are only a little smaller than a kangaroo, fairly thickset, and are found in open country. All share a particular habit of stance: wrists raised, elbows tucked close into the body, and shoulders thrown back, and all have a large, black-skinned rhinarium.
The common wallaroo (Macropus robustus or wallaroo) is the best-known species. There are four subspecies of the common wallaroo: the eastern wallaroo and the euro, which are both widespread, and two of more restricted range, one from Barrow Island, the other from the Kimberley.
The black wallaroo (Macropus bernardus) occupies an area of steep, rocky ground in Arnhem Land. At around 60 to 70 cm in length (excluding tail) it is the smallest wallaroo and the most heavily built. Males weigh 19 to 22 kg, females about 13 kg. Because it is very wary and is found only in a small area of remote and very rugged country, it is little known.
Macropus antilopinus is the exception among wallaroos. It is, essentially, the far-northern equivalent of the eastern and western grey kangaroos. Like them, it is a creature of the grassy plains and woodlands, and gregarious, where the other wallaroos are solitary. Because of this difference, it is sometimes called the antilopine kangaroo.
|Look up wallaroo in Wiktionary, the free dictionary.| | <urn:uuid:4de8a71b-a7d2-493d-a56b-5fedbe11ea7d> | {
"date": "2015-02-28T07:44:49",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461848.26/warc/CC-MAIN-20150226074101-00125-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9292529821395874,
"score": 3.21875,
"token_count": 451,
"url": "http://eol.org/data_objects/26976580"
} |
Many people think that a hearing loss simply means that we need to make things louder. It is actually more complicated than that. Not only do we need to make sounds louder, but we also need to make sounds clearer.
Most people have what is called a sensorineural hearing loss. This usually means that the tiny hair cells of the inner ear, or cochlea, have been damaged. This link here has an excellent picture of both healthy and damaged hair cells of the cochlea.
I have added the picture below.
The cochlea has 2 types of hair cells; inner hair cells (IHC) and outer hair cells (OHC). The function of the outer hair cells (OHC) is actually to make soft sounds louder. These are the first to get damaged. If this were the only damage you have in your cochlea then amplifying only the soft sounds is all you need in order to hear better.
The second type are called the inner hair cells (IHC). Inner hair cells actually trigger the nerves that send the message to your brain. As you can see from the picture, the inner hair cells can also be damaged. The greater your degree of hearing loss. the more damage you also have to the inner hair cells.
Inner hair cell damage results in pieces of sound missing altogether. It makes speech unclear. It makes it harder to pick out speech from background noise. For musicians, it makes it harder to recognize the correct pitch of a note.
Today’s modern digital hearing aids that carefully amplify soft sounds more than loud sounds and amplify certain pitches more than others, do a very good job of replacing the function of the outer hair cells. But as the hearing loss gets greater and you have more inner hair cell damage, we need to clean up the signal even more.
In my next blog entry, I will explain how directional microphones and remote wireless FM systems help to clean up the sound and make hearing aids work even better. | <urn:uuid:80b28ec7-8d9d-4dab-9382-8a7f9f53c194> | {
"date": "2018-10-17T13:53:05",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511175.9/warc/CC-MAIN-20181017132258-20181017153758-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9687408804893494,
"score": 3.671875,
"token_count": 408,
"url": "https://deafenedbutnotsilent.wordpress.com/category/anatomy-of-ear/"
} |
Living in a Diverse World: A free Online Citizenship Resource for Key Stage 2
As part of a partnership between Roe Green Junior School a scheme of work has been created to support the teaching of Citizenship in KS2.
The resource includes lesson plans, and flipbooks with oral history extracts and photographs focusing on four Brent residents. The characters explored come from a range of countries including Poland, England, Pakistan and Jamaica.
Their experience of work, food and leisure in Brent both identifies differences and celebrates similarities and shows how we all play a part in our community.
The scheme of work is also supported by a museum session called 'Different Cultures, One Community.'
- Living in a Diverse World - scheme of work (.pdf, 390Kb) | <urn:uuid:010f3519-aeae-485d-8be5-e4d3c0d58ab1> | {
"date": "2019-09-22T11:51:00",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575513.97/warc/CC-MAIN-20190922114839-20190922140839-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9187695384025574,
"score": 3.0625,
"token_count": 153,
"url": "https://www.brent.gov.uk/services-for-residents/culture-leisure-and-parks/brent-museum-and-archives/local-history-resources/living-in-a-diverse-world-a-free-online-citizenship-resource-for-key-stage-2/"
} |
Passwords have been a weakness of network security since the development of computer networks. Through guessing weak passwords, exploiting weak passwords, acquiring passwords through social engineering, or more recently using malicious software like Advanced Persistent Threats (APT), attackers have focused on compromising passwords to gain access to the network.
The traditional approach to defending against password attacks has focused on user awareness training, ever increasing password complexity requirements, certificate based authentication, and multi-factor authentication. Defenses that rely on the user are often subject to apathy, non-compliance from the user, and lack of enforcement of company policies that render them ineffective.
Two-factor authentication technologies have suffered from poor adoption because of high costs, resistance from the user community, and in some cases, vulnerabilities in the two-factor technology that attackers can exploit. Current trends in APT malware have targeted both password collection and two-factor authentication, which have further reduced their effectiveness.
[HELP IS ON THE WAY: 15 free security tools you should try]
Further complicating the job of protecting the network is an explosion in mobile devices requiring access anywhere, and a strong focus on international business. The days of having a contained network that only uses company-managed devices on secured networks are largely over. Today's network is global, persistent across devices, and must be available to the user from any device at any location. If the organization does not provide this capability, in most cases the user will work around the organization.
Defending user access to network resources in today's information requires a defense-in-depth approach that consists of understanding the company's risk tolerance, understanding the company's user base, and deploying technology solutions that align with the users and the business.
The first step in developing an effective defense is to understand how the company uses the network and what the expectations for usage are. This requires the network architect to go beyond what is written in the policy documents and observes what users are actually doing. An effective approach to identify this is to meet with non-IT business staff and discuss how they use technology. Additionally, walking around business locations can provide great insight into how people are using technology. Many IT departments that have "banned" mobile devices or remote access from home are surprised to find that users bring their own devices in spite of policies.
Understanding how employees use technology to do their jobs is also essential. The requirements for a sales department may be much different than those of a data entry clerk. Manufacturing personnel may already be using unapproved devices through their tendency to solve technical problems and get the job done.
Finally, understanding the culture of the organization will help determine what technology is acceptable. Are users free roaming creative professionals that stress art over function? Are the users very conservative and professional? Each of these could drive very different solutions. At the end of the day, if the user does not accept the technology, they will find ways around it.
Today, technical solutions to protect the network beyond passwords fall back to two classic concepts in information security that are "least privilege" and Authentication Authorization & Accounting (AAA). All technical mechanisms must take the approach of allowing the least amount of access that users need to do their job, make reasonably sure the users are who they say they are, make sure they are assigned access to limited resources, and their activities are accounted for and anomalies are identified.
Least privilege must be applied based on more than the user's identification. Different levels of access should be applied based on the type of device being used to access the network, when the network is accessed, and where the network is being accessed from. User access profiles should be developed for the most common access scenarios that users utilize to access the network. For example most organizations will have the following categories (most to least secure):
" User on the internal network on a managed device
" User on the external network on a managed device
" User on the external network on a non-managed device
" User on the internal network on a non-managed device
Each of these categories should be assigned a set of resources that they are allowed to access, which could include restrictions to certain server or services. Unmanaged devices should be directed to services that provide abstract access that limit the volume of activity a user can access.
For example, a Citrix Xen App or Microsoft Terminal Services access could be allowed to limit the amount of information an attacker could retrieve from the network. Access controls should be designed to contain a compromised account to the least amount of access and the least amount of data loss possible. This concept can be extended to internal network segmentation to protect sensitive internal networks such as process control, financial and manufacturing systems.
Technologies such as Network Admission Control, SSL VPN with posture assessment, Mobile Device Management (MDM), and virtual desktop/application presentation applications have matured to a point where they provide network designers effective tools to control network access.
The network should be designed in a way that leverages the technologies to provide users the least privilege while at the same time enabling them to leverage technology. Most network vendors are heavily focused at integrating these technologies into their products.
Implementing least privilege is designed under the assumption an account will be inevitably compromised. Even though a compromised account should be expected, steps should be taken to reduce the probability of a compromise occurring and detecting abuse as rapidly as possible.
Classic password policies and user awareness training provide a basic level of protection that most organizations will need to implement. Password policies should be implemented in a way that is accepted by the user base. Requiring overcomplicated or frequently changing passwords in most cases will result in users repeating passwords or writing them down.
Multi-factor authentication is another line of defense that can be implemented to protect authentication. While effective in reducing risk, most organizations limit multi-factor to external access to the network due to the cost of the technology and limited user acceptance of the technology.
Organizations should focus on deploying multi-factor authentication for systems that provide external access to sensitive applications or massive amounts of data. It should be remembered that no multi-factor authentication method is invincible, but is another tool to reduce risk.
Password authentication is a weakness that we will have to live with for the foreseeable future. But through defense-in-depth security architectures that address authentication as a holistic system of people, processes and technologies, a company's risk can be reduced. Reducing risk to a level that allows the organization to function in the most efficient way possible should be the goal of all network and security professions.
Alexander Open Systems (AOS) the premier systems integrator in the Midwest.
Read more about wide area network in Network World's Wide Area Network section. | <urn:uuid:76de1566-1706-4403-9303-f4a20fb85a38> | {
"date": "2017-11-21T19:05:27",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806422.29/warc/CC-MAIN-20171121185236-20171121205236-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9403741955757141,
"score": 2.515625,
"token_count": 1357,
"url": "https://www.cso.com.au/article/455368/securing_network_beyond_passwords/"
} |
As indicated by their name, Mediterranean jellies are found in the Mediterranean Sea, as well as in coastal lagoons.
This jelly is often referred to as the "fried egg jelly" because of its bell, which is elevated in the center and resembles the appearance of a fried egg! The bell's diameter can reach up to 13 inches. This species can also be identified by its many distinct purple mouth-openings at the end of its appendages. Mediterranean jellies feed on smaller jellies and other zooplankton.
In their natural habitat, Mediterranean jellies thrive as small, immobile polyps during the winter months. However, from May to November, they metamorphose into free-swimming juveniles and develop into adult medusae with their signature "fried egg" bell and purple-tipped appendages. This yearly life cycle allows this species to thrive and reproduce despite the strong seasonal changes in its range.
Stay tuned for more updates! | <urn:uuid:03a9a1a3-e858-49df-a9d5-0daf743eca98> | {
"date": "2019-06-25T21:39:28",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999948.3/warc/CC-MAIN-20190625213113-20190625235113-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9667904376983643,
"score": 3.359375,
"token_count": 202,
"url": "https://aqua.org/blog/2018/April/Animal-Update-Mediterranean-Jellies"
} |
In a provocative paper published this week, researchers say they have figured out a way to link a person's DNA to their anonymous genetic data in a certain kind of public research database. But the National Institutes of Health (NIH), which hosts one of the largest such databases, says it's not taking any new steps to prevent someone from using the method to breach privacy. That contrasts with NIH's response 4 years ago, when a similar study prompted the agency to pull genetic data from its public Web sites.
The issue then involved studies that compare DNA variants called single nucleotide polymorphisms (SNPs) in people with and without an illness to find disease risk markers. NIH had begun posting online pooled SNP results from hundreds of people, thinking privacy would not be breached. But then scientists reported in PloS Genetics that if they had a sample of an individual's DNA, they could link it to that person's SNP results within a public DNA pool. NIH (and the Wellcome Trust) removed data from public sites; NIH now allows only approved researchers to download pooled data from SNP disease studies.
Such access barriers are less common for a different type of genetic data: measures of gene activity derived by analyzing RNA levels in a tissue sample. Because this gene expression data wasn't thought to be traceable to an individual, researchers have routinely deposited RNA results in public databases. One example is NIH's Gene Expression Omnibus (GEO) database, which holds nearly 1000 datasets for gene expression tests on human tissues. Anyone can look up data for individuals who participated in, say, a study on breast cancer or childhood obesity.
Now it seems that this RNA data can be linked to a person's DNA after all. Eric Schadt and colleagues at Mount Sinai School of Medicine in New York City reported this week in Nature Genetics that they have developed a technique for generating a personal SNP profile, or a DNA "bar code," for an individual based on their gene expression results. This means that, in principle, if someone had a DNA sample from a participant in a study stored in GEO, they could devise a SNP barcode, match it to a GEO sample, and look at that participant's biological data.
Despite implications similar to those of the 2008 PloS Genetics paper—a remote but real possibility that research participants could be identified—NIH isn't as concerned this time. In a statement, the agency said that while NIH leaders "will be reviewing the finding" and its implications, "NIH sees no need to modify its data sharing practices at this time." National Human Genome Research Institute spokesperson Larry Thompson explains that the risks seem low because what Schadt's group did requires "a complex statistical tool" and "it's not an easy thing to do." NIH's attitude was different 4 years ago, he says, because it "was the first time," and NIH felt it should "go to the extremes of caution."
Schadt says he didn't expect NIH to impose new limits on data access. His message, he says, was "to highlight that in fact there may be no way to protect privacy" of individual genetic data. Instead of blocking access, Schadt says, NIH should educate people that there's a chance that their data won't remain confidential—and instead rely on "downstream" protections such as genetic antidiscrimination laws.
Attorney Dan Vorhaus, who runs the blog Genomics Law Report, agrees that "the idea that we can promise a complete separation from data and identity is now largely discredited." Vorhaus says that NIH should update its data-sharing policy to require that study volunteers be told that the privacy of their genetic data can't be guaranteed. "Participants should understand the risk and be free to assume that risk if they wish," Vorhaus says.
This site contains copyrighted material the use of which has not always
been specifically authorized by the copyright owner. We are making such
material available in our efforts to advance understanding of
biotechnology and public policy issues. We believe this constitutes a
'fair use' of any such copyrighted material as provided for in section
107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section
107, the material on this site is distributed without profit to those
who have expressed a prior interest in receiving the included
information for research and educational purposes. For more information
go to: http://www.copyright.gov/title17/92chap1.html#107. If you wish to use
copyrighted material from this site for purposes of your own that go
beyond 'fair use', you must obtain permission from the copyright owner. | <urn:uuid:fbdb278b-a24d-498c-a533-a4a012278eed> | {
"date": "2016-10-26T23:00:52",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00098-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9466193318367004,
"score": 3.234375,
"token_count": 950,
"url": "http://www.geneticsandsociety.org/article.php?id=6159"
} |
Influenza virus is an RNA virus, which causes influenza, and belongs to the family Orthomyxoviridae. Influenza virus is classified into three different genera, influenzavirus A, B, and C. They all have similar structures and compositions. The virions are 80-100nm in diameter and usually roughly spherical. The outer surface of the virion is made of a viral envelope containing two major glycoproteins, hemagglutinin (HA) and neuraminidase (NA). Influenzavirus A is further classified into subtypes based on the surface glycoproteins, HA and NA. Currently, there are 16 HA and 9 NA subtypes. The central core of the virion contains the viral RNA genome, which is packaged in the form of ribonucleoprotein complexes. Influenza virus nucleoprotein (NP) is a major component of the ribonucleoprotein complex and is abundantly expressed during the course of infection. It is a structural protein, which encapsidates the negative strand viral RNA and is essential for RNA transcription, replication and packaging. NP binds the PB1 and PB2 subunits of the viral RNA polymerase and the matrix protein M1, in addition to its binding to ssRNA. NP is also known to interact with variety of other macromolecules of both viral and cellular origins, and these interactions have been shown to be essential for the viral lifecycle.
Western blotting ( 1/300 – 1/1,000 fold dilution )
Immuno-precipitation ( 100 fold dilution )
Immunofluorescent staining ( 200 fold dilution )
Immunohistochemistry ( 200 fold dilution )
ELISA ( assay dependent )
Other applications have not been tested.
|Fig.1 Immunofluorescence assay of MDCK cells derived from canine kidney cells, and A549 cells derived from human lung carcinoma cells, that were infected with H1N1 influenza virus (A/PuertoRico/8/34). Samples were taken at 3, 9, and 24 hours post-infection. C43 antibody efficiently detected virus-infected MDCK and A549 cells as early as 3 h after infection. The cells were fixed with 4% paraformaldehyde in phosphate-buffered saline (PBS) and permeabilized with 0.1% 0.1% Triton X-100 in PBS. The bound antibody was visualized by a further reaction with an Alexa Fluor 488-conjugated secondary antibody|
|Fig.2 Immunofluorescence assay of 293T cells expressing HA or NP of pandemic (H1N1) 2009 influenza A virus (A/Suita/1/2009). C43 specifically recognized NP-expressing cells while a commercially available mouse anti-HA monoclonal antibody specifically recognized HA.|
|Fig.3 Western blotting of MDCK cells infected with H1N1 (A/PuertoRico/8/34), H5N1 (A/duck/HK/342/78), or H5N2 (A/crow/Kyoto/53/04) using C43 as a primary antibody. Samples were collected at 3, 9, 24, and 48 hours post-infection. C43 detected NP after 3 hours post-infection and detected three different types of influenza viruses.|
Anti Influenza A Virus NP
To be used for research only. DO NOT use for human gene therapy or clinical diagnosis. | <urn:uuid:c2d11a77-d386-48eb-b3c7-5d95532ffda2> | {
"date": "2018-03-17T06:21:02",
"dump": "CC-MAIN-2018-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644701.7/warc/CC-MAIN-20180317055142-20180317075142-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9102330803871155,
"score": 3.46875,
"token_count": 739,
"url": "https://www.cosmobio.com/contents/bam_20120824.html"
} |
- Proteins and Peptides
- Lysates and Cell Lines
Choose from over 2,500 secondary antibodies conjugated to more than 40 different enzymatic, fluorescent, or biotin labels. Use the filters on the left to sort our secondary antibodies by species, application, host, or conjugate.
To learn more about secondary antibodies, download and read our Secondary Antibody Handbook for technical information and tips to guide you when choosing a secondary antibody for your experiment.
To understand more about direct vs. indirect detection, including benefits of a secondary antibody and when to use one, please read our resources on Direct vs. Indirect Detection Methods.
To learn how to easily label an unconjugated primary antibody, please read more about our Lightning-Link Antibody Labeling Kits. | <urn:uuid:5dfd77dd-93ec-4b80-a47f-5510123208d0> | {
"date": "2018-09-21T02:04:09",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156724.6/warc/CC-MAIN-20180921013907-20180921034307-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7436452507972717,
"score": 2.515625,
"token_count": 165,
"url": "https://www.novusbio.com/product-type/secondary-antibodies?common_name=IgG%20F(ab')2"
} |
A new study indicates that nesting birds that feed on insects that hatch in lake or stream-bed sediments make good biological monitors for pollution.
The scientists published their findings in the journal Environmental Toxicology and Chemistry. This could help track environmental changes. The contamination in the sediments will make its way into the food web, and into birds as well as their young.
In southern Illinois, the tree swallow (Tachycineta bicolor) still shows significant quantities of polychlorinated biphenols, a toxic chemical, in its eggs and chicks seven years after remediation efforts started at a capacitor-manufacturing plant. The findings prompted further sediment removal.
Thomas Custer, from the US Geological Survey’s Upper Midwest Environmental Sciences Center in La Crosse, Wisconsin, presented his findings at the annual meeting of the Society of Environmental Toxicology and Chemistry in Long Beach, California, last week. Custer and his group used swallows to monitor a 2010 project intended to remove contaminated sediments from Ohio’s Ottawa River, near Toledo. The birds indicate that this is no longer a hotspot.
Swallows forage over small distances, rarely more than 500 meters from their nests, indicating localized contamination. Researchers can also attract them to areas of interest by putting out nesting boxes on poles, because nesting sites are the birds’ most important environmental limit.
This can be easily replicated in a variety of different environments to monitor pollution and contamination remedial efforts, instead of relying on samples gathered from randomly collected animals.
The presence of nesting boxes also improves the birds’ habitat. The loss of a few eggs and nestling isn’t likely to hurt the species as whole and it’s rare for more than 50% of the nestlings to survive.
Wildlife toxicologists also use homing pigeons to monitor air quality. These birds are still bred by hobbyists around the world. Many birds are kept in lofts, and in cities, on the top of many apartment buildings, so they breathe ambient air. Most of the homing pigeons life history is well known, something that isn’t possible for wild birds.
In a pilot study involving homing pigeons purchased from hobbyists in China, the Philippines, and the USA, researchers found shocking health-related differences, which were related to air quality. In Beijing and Manila, the scientists found black lungs and enlarged testes in the pigeons.
The lungs and livers from the birds from Beijing contained three or four times more polycyclic aromatic hydrocarbons, common by-products of fossil-fuel burning, than did those from areas with better air quality. “This suggests that other species, including humans, may also have adverse effects” from these environmental contaminants. | <urn:uuid:47eb9d63-5690-46f0-95dd-218d28612e3c> | {
"date": "2015-06-30T03:29:49",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375091587.3/warc/CC-MAIN-20150627031811-00126-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9435843825340271,
"score": 3.75,
"token_count": 566,
"url": "http://scitechdaily.com/swallows-homing-pigeons-monitor-environmental-factors/"
} |
In a new barn at the Goblirsch dairy a cow stands quietly as it gives up it's most recent production to the milking machine. The milk pulses rhythmically through pipes on it's way to a holding tank.
It's basically the same sound farmers have heard for years as they stooped to hook and unhook cows to the milking unit.
What's different here happens when the job is finished. A computer tells the robot to detach the milking cups from the cow. Then with a series of clicks and pops, the robot arm swings the milking unit out from under the animal.
Matt Goblirsch takes it all in. He says he's gone through a variety of emotions since the robot milkers were installed a few weeks ago.
“The cows will pretty much just milk themselves.”Matt Goblirsch
" (I'm) a little bit nervous, but it's pretty neat," says Goblirsch. "I'm pretty proud of this since we got it going."
As one cow leaves the milking stall there's another animal at the other end waiting to enter. The computer swings a gate open as soon as there's a vacancy.
When the new cow comes in it heads for a special feeding station at the end of the stall. While the cow eats, a computer reads the animal's ear tag. Using stored information about the cow's height, the robot arm swings the milking unit into position, then attaches the cups.
"When it's up and running, the cows will pretty much just milk themselves," says Goblirsch. "Whenever she feels like she wants to be milked, she'll come in this robot, she'll get a little treat and then she'll exit the robot."
Right now it's still training time. Some cows enter the stall by themselves. Others have to be nudged in.
Goblirsch, his brother and their parents watch the process. Their decision to install robots is as much a lifestyle decision as economic. Cows must be milked two or even three times a day, every day. Matt Goblirsch says the robots will do that job unattended.
"We just discussed it. We sat down with the family, we were, like, you know, "What do we really want to do?" says Goblirsch. "Well, we really don't want to live in a barn, but we still think that that's the only way we can make the money. So we decided let's go with robots where we can milk fewer cows, but yet milk them more times a day and us not having to be there."
He hopes the robots mean eight hour work days can replace the all-too-often 14 hour shifts he's worked in the past. Fewer hours in the barn also means more time to tend crops and other tasks around the place.
Those sorts of considerations are something many Minnesota dairy families are talking over these days. The state's dairy industry has been in serious decline for at least 20 years. Thousands of farms have gone out of business.
There was a glimmer of good news last year. For the first time in four years, the state's milk production actually went up. Dairy families face a multitude of decisions: should they expand, go organic, get out?
University of Minnesota professor Marcia Endres says often the choice is decided by the personality of the individual running the operation.
"You need to fit the system with the manager, I think," says Endres.
Endres says robotic milkers work best in computer savvy operations. Score one here for the Goblirsch's. Matt says he and his brother love technology. Good people managers may choose another route. They may go heavy on labor, expanding the herd and then hiring workers to run the place. Endres says each system has its trouble spots.
"Things happen with the robots and you need to be on-call and get those fixed right away," says Endres. "And also some more major problems could be of a concern if you don't have a service representative nearby or someone who can come fairly quickly to solve major issues that could happen. Because it's a piece of equipment and things could happen with it."
Robots are used heavily in Europe, not so much in the U.S. Endres says that's mainly because of different labor costs. Higher costs in Europe means it may be cheaper to buy machines to do the work.
Matt Goblirsch says there's been a lot of interest in the family's robot milkers. For now he wants everyone to stay away until the cows get used to the system. He says if they work out, the family may buy more robots in the future and expand the herd. | <urn:uuid:d0d15e1c-e256-407f-ab5b-5164d899417b> | {
"date": "2015-05-27T22:03:08",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929171.55/warc/CC-MAIN-20150521113209-00319-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9768921136856079,
"score": 3.125,
"token_count": 973,
"url": "http://www.mprnews.org/story/2006/04/17/robotmilker"
} |
International workshop on History of Global Climate Change : Water, Ecology, De-forestation, Agriculture, Politics and the Management of Nature, March 22-23, 2007, Department of History, Jadavpur University under the UGC-DRS Special Assistance Pr
International workshop on History of Global Climate Change : Water, Ecology, De-forestation, Agriculture, Politics and the Management of Nature, March 22-23, 2007, Department of History, Jadavpur University under the UGC-DRS Special Assistance Programme
This two-day international workshop aims to bring together approximately 20 leading scholars sharing a common interest in the environmental history to deliberate on the subject. In keeping with the thrust area of the research programme of the Department under the UGC-SAP, the present workshop will make an attempt to address the broad areas of environmental concern in human societies across the globe and the complex patterns of the human- nature relationships by focusing on the history of climate change.
At the beginning of the twentieth century a major chunk of scientists believed that climate of the world had been essentially constant over at least five thousand years. In the next 100 years this assumption fell through. The possible effects of past climatic shifts on human activities are yet to be explored. Historians have paid little attention to this aspect until in the 1950’s and 1960’s. It is urgent for the historians to understand that climate history is central to the recently unfolding sub-discipline of environmental history. It is also intimately connected with history of waters in more ways than one. Earth’s hydrological cycle - the sun-powered movement of water between the sea, air, and land - is an irreplaceable asset that human actions are now disrupting in dangerous ways. Although vast amount of water reside in oceans, glaciers, lakes, and deep aquifers, only a very small share of Earth’s water - less than one -hundredth of 1 percent - is fresh, renewed by the hydrological cycle, and delivered to land. That precious supply of precipitation - some 110,000 cubic kilometers per year - is what sustains most terrestrial life. Like any valuable asset, the global water cycle delivers a steady stream of benefits to society. Rivers, lakes, and other freshwater ecosystems work in concert with forests, grasslands, and other landscapes to provide goods and services of great importance to human society. The nature and value of these services can remain grossly underappreciated, however, until they are all destroyed or gone.Climate history calls for an in-depth understanding of the inter connections between water resource on the one hand and deforestation, rainfall, river flows, soil erosion, climatic change, global warming, draught, famine, and various natural calamities on the other.
Climatic change through a long duree period and its impact on the rise or decline of civilizations are now worth looking into. Rising or falling temperatures, monsoon behaviour, melting of snow on the mountains, rising sea levels, more powerful storms and cyclones in recent times may have a message to convey regarding the interactions of the humans with the natural world. In South Asia and the Asia Pacific in particular, climate had been central to the growth or prosperity of human civilizations. It was most crucial to rice production or settled agriculture. We are aware how the change of climate and decline of monsoon in Northwestern India possibly led to the fall of the Indus Valley Civilization.
There is little disagreement among the scholars engaged in Environmental History that history of climate is important to the discipline. The proposed International Workshop on the History of Climate organised by a University History Faculty is the first of its kind and it will address some of the fundamental questions most relevant to the very discipline of Environmental History.
Abstracts of papers to be presented at the seminar must relate to the panel themes listed below. The papers may kindly be sent to my email address before the deadline of January 7, 2005. Those participants who would like to receive acceptance letters for applying to funding agencies must send their abstracts with address details as soon as possible and advise me about the need of such letters. Only high quality papers presented at the seminar will be accepted for publication in an edited volume.
I extend to you a warm invitation to attend this prestigious workshop. However, no travel grants will be offered to the participants.
Sessions will include (this is subject to change)
1) Inaugural Session
2) Does History of Climate Matter?
3) Climate, Forestry, conservation, land-use, water resources and waterways, rivers, dams, the politics of water
4)Natural calamities -flood, rainfall, cyclone, tsunami draught and other environmental disasters
5)Climate: A Comparative Study of Asia and the Wider
For further information and registration please contact:
Professor Ranjan Chakrabarti, Department of History, Jadavpur University Kolkata 700032 (India), Telefax 91-33-24146962 (O), 91-33-24146136 (O) Email [email protected] / [email protected]
The UniversityJadavpur University has been accredited the Five Star (the highest) status by the University Grants Commission. It is one of the top five universities in India with an impressive track record since 1955. The university has been also identified as a potential centre of excellence by the University Grants Commission. It is located in Kolkata, the capital of the state of West Bengal. Kolkata is well connected by both railroad and air. The Netaji Subhas Chandra International Airport in Kolkata is well connected with all the major cities of Asia, Europe and the United States. The participants, in most cases, will be accommodated in the University Guest House.
Professor Ranjan Chakrabarti
Department of History
India Email: [email protected]
Send comments and questions to H-Net
Webstaff. H-Net reproduces announcements that have been submitted to us as a
free service to the academic community. If you are interested in an announcement
listed here, please contact the organizers or patrons directly. Though we strive
to provide accurate information, H-Net cannot accept responsibility for the text of
announcements appearing in this service. (Administration) | <urn:uuid:95e0fcf1-5e89-4d5f-9e64-e7ec6783e60e> | {
"date": "2016-06-25T14:50:41",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00036-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9262257814407349,
"score": 2.71875,
"token_count": 1288,
"url": "http://www.h-net.org/announce/show.cgi?ID=154275"
} |
The UK’s government are currently attending a UN conference on climate change and trying to find ways to curb our greenhouse gas emissions. At the same time, London’s Mayor is attempting to curb excessive waste disposal by Businesses and corporations.
The mayor of London has implemented a number of recycling initiatives to reduce waste. This year alone the Congestion charge was extended to cover greater London . The aim is to increase the amount of waste being recycled from the 20 percent predicted in 2003 to over 60 percent.
Londoners produce 3.4 million tonnes of rubbish each year, a large proportion of which is electrical and electronic waste. The implementation of the WEEE directive (Weee Compliance) in 2007 aimed to curb this problem by getting us to recycle our old Televisions, computers and general electrical waste. In Greater London, where businesses predominate, the issue of waste electronic equipment is more predominant and constitutes the majority of hardware disposed of each year.
London businesses are constantly upgrading computer systems, buying replacement shredders and replacing out-of-date photocopiers, faxes and printers. The waste by-product was previously discarded in the general waste stream, which ended up on a barge heading for an incinerator further down the Thames Estury.
The Recycle for London initiative, founded by and headed up by the Mayor of London, was implemented to help reduce this waste. Long before the WEEE directive came into force, London businesses were recycling their paper, plastics and toner cartridges. The WEEE directive meant that it became a legal requirement for offices to recycle their old electronics as well. In Greater London, this has had the impact of many new Companies springing up to meet with the demands of the thousands of businesses needing to recycle their old computers, servers, faxes, photocopiers and printers.
It’s also had the added effect of reducing the work carried out by waste disposal firms in London, which are funded by Council taxes. The result, in the long term will be a redistribution of the cash gleaned from taxes into more urgent sectors. | <urn:uuid:94e8729a-4535-4ee7-af8e-4568aa8308ae> | {
"date": "2019-03-22T18:05:52",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202688.89/warc/CC-MAIN-20190322180106-20190322202106-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9602068662643433,
"score": 2.546875,
"token_count": 426,
"url": "https://wallartdecals.co.uk/uk-computer-recycling/"
} |
It is both nurture & nature. Familial & outer environments influence what a child will become. Besides familial & outer environments, educational & socioeconomic factors influences what children will become. Children in small family environments tend to have parents who are more involved in their lives. In the small family environment, parents play a substantial role educating their children through teaching, discussion, & other forms of interaction. Small families tend to be more socioeconomically affluent & educated which further substantiate the importance of nurture for children.
In large families, it is more nature in terms of children's development. In large families, children are left to their own devices. Child neglect is commonplace in the large family environment. Parents of large families don't have the resources to raise & care for their children so children must learn to navigate their environment early. Children who can't navigate their familial environment early, fall through the familial cracks as their parents aren't there to care for them. Parents of large families don't interact, discuss, nor teach their children- they leave these to oldest/older siblings. Parents of large families just have the children & give them to siblings to raise. Also, large families tend to be socioeconomically poorer, even impoverished & parents are less educated.
In large families, it is the nature premise. Children learn their innate psychology & act upon it. The stronger children survive while the weaker ones become overwhelmed & psychologically, even psychically destroyed in one way or another. In small families, there is more nurture, parents are there for their children & look out for them.
Beyond family size, educated/affluent parents of the solidly middle, upper middle, & upper classes placed emphasis on nurture as they know that children need solid parental examples in order for them to become well-rounded, functioning adults. Less educated/poorer parents of the lower middle, working, & lower classes don't consider nurture important, they believe in nature i.e. children teaching themselves how to navigate their particular environment. | <urn:uuid:b473dffa-e9b1-49ff-bc5d-760321bf433a> | {
"date": "2018-01-22T03:11:48",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890947.53/warc/CC-MAIN-20180122014544-20180122034544-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9670767784118652,
"score": 3.484375,
"token_count": 402,
"url": "https://hubpages.com/family/answer/274921/nature-or-nurture"
} |
Academic and technical writing are far different than literary writing, such as novels and poetry. The primary purpose of academic and technical writing is to provide information about a defined topic to a specific audience. Whether you write graduate papers, professional journal articles, dissertations, white papers, manuals, websites, reviews, or similar documents, you are writing academic or technical documents.
Academic and technical writing can be bad writing. They can be complicated, tedious, and confusing. They can be terribly boring. Unfortunately, bad academic and technical writing is common (which makes bad writers nearly indistinguishable from their crowd of peers).
Why do people write badly? Possibly, they think the writing is supposed to be dull and confusing, or perhaps they think it sounds more professional. Maybe they have read a lot of poor writing, so when they review their writing, it sounds “right.”
On the other hand, academic and technical writing can be good writing. They can be clear and straightforward, logical, persuasive, and useful. They can be wonderfully interesting. Unfortunately, good writing is uncommon (which makes good writers stand out from their peers).
Why do people write well? Possibly, they think the writing is supposed to be clear and easy to use, or perhaps they are thinking about the readers’ needs more than their own knowledge. Maybe, they have read a lot of good writing, so when they review their writing, it sounds “right.”
Think objectively about your attitudes about writing and critically about your writing skills. Completely bad and perfectly good writing don’t exist, but where do you fall on the spectrum between good and bad academic and technical writing?
Writers have to attend to many strategies, concepts, and “rules” to produce good writing, but good writing is not magic. It contains definable steps that are not only specific but also broadly applicable. If you want to move towards the “good” end of the spectrum, pick up a copy of Concise Guide to Technical and Academic Writing, available in print and various ebook formats at http://HostileEditing.com. Major strategies addressed in the book are as follows:
- Core principles of good writing;
- Writing style, with subtopics of formality, complexity, objectivity, and depth;
- Direct writing, with subtopics of subjects, main verbs, and verb voice;
- Concise writing, with subtopics of combining expressions and sentences; simplifying descriptions, removing unnecessary language;
- Sentence structure, with subtopics of sentence parts, academic sentence patterns, and transitions;
- Paragraph structure, with subtopics of paragraph purpose and structure;
- Writing mechanics, with subtopics of commas(!), other punctuation, grammar, and word usage;
- Document-level concepts, with subtopics of structure, components, attribution, tables, and formatting.
Overall, the definition of good writing is this: writing that achieves its intended purpose. When you write, you have a purpose, a goal to accomplish. Perhaps you want to demonstrate expertise, get a good grade, inform the reader, or advance a cause. Regardless of the purpose, you will only achieve it by writing well. And that, ultimately, is the reason for academic and technical writing. | <urn:uuid:51e67966-5a49-41e4-b159-01279ea800a1> | {
"date": "2017-10-18T05:39:25",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822747.22/warc/CC-MAIN-20171018051631-20171018071631-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9561413526535034,
"score": 3.015625,
"token_count": 681,
"url": "https://zencomma.wordpress.com/2014/02/07/from-bad-to-good-technical-and-academic-writing/"
} |
We are now halfway through Alona's Family History Through the Alphabet and M is for Memorial
Now the general consensus of a definition of a memorial is something "in the memory of an event or more usually today, in people's minds, a person".
Of course a headstone may also be a memorial. If someone is mentioned on a headstone it does not necessarily mean that their mortal remains are buried within reach of the headstone.
Another form of memorial is the funeral or bereavement card as shown here for Alice Annie Rollason.
These cards can be very ornate.
The photo below is also a memorial. The two family members who had died prior to the photo being taken were added, fairly obviously.
I have seen more modern additions which have been photoshopped and can be difficult to detect the additions or in one case I saw of a divorce in that family, a deletion!
Memorials can also be used to remember an event such as the one at the Migration Museum in Adelaide remembering all the immigrants.
Or this medallion celebrating my having given 100 blood donations.
It may be a book plate saying your ancestor had received it for perfect attendance at school or church, the key given for a 21st birthday, the first shoes worn by your baby, the inscription on the flyleaf of the Bible given for a First Communion.
We should look for memorials of all types among our possessions as these can give clues which will tell us more about our ancestors and bring them to life and may even break down a brick wall in our research.
What unusual memorials have you found in your family research? | <urn:uuid:96fa0d75-b919-4ca1-9de9-d92b74272081> | {
"date": "2014-10-31T04:00:21",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637898844.3/warc/CC-MAIN-20141030025818-00169-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.973717212677002,
"score": 2.6875,
"token_count": 334,
"url": "http://helenvsmithresearch.blogspot.com/2012/08/m-is-for-memorial.html?showComment=1344319604121"
} |
Superheroes, True Romance, Blood and Gore
The British Library’s amazing new exhibition, Comics Unmasked, was opened last week by TV presenter and comics fan Jonathan Ross. Talking about the oldest item on show, an early printed version of the Bible with graphic images, Jonathan commented that the Bible can be a great source of material for comic books. We in Medieval Manuscripts know this only too well!
Of course, it all began with manuscripts. Here are some early examples.
The Old English Hexateuch – How many modern comic books have dancing camels?
This 11th-century Old English version of six books of the Old Testament is filled with graphic depictions of the well-known stories, like the series below showing Adam and Eve’s expulsion from the Garden of Eden:
We had to include this picture of the dancing camels!
Holkham Bible Picture Book - Joseph hears shocking news, ‘SHOCK’, ‘HORROR’!!
Sometimes described as England’s first graphic novel, this book tells stories from the Old and New Testament in a series of pictures with captions in Anglo-Norman French. There is some interesting material that didn’t make it into the authorised version of the Bible. The page below tells about Joseph’s reaction when he hears Mary is having a baby: the banners contain the dialogue, like speech bubbles in modern cartoons. In the second image, Joseph, whose friends have been telling him some home truths about his wife, is touching Mary’s stomach and asking her some awkward questions. Mary protests, ‘No, really don’t worry, I have never committed a bodily sin’. Of course he doesn’t believe her, but fortunately an angel drops in to reveal the divine plan and he has to eat humble pie.
Episodes from the life of Christ are also given the comic-book treatment:
Egerton Genesis Picture Book – the Prequel, or where it all began
Egerton MS 1894, better known as the Egerton Genesis Picture Book, tells the creation story in a series of images:
You can read more about this manuscript in our blogpost A Medieval Comic Strip.
Queen Mary Psalter – Moses, the greatest epic hero
The life of Moses is one of the great stories of all time, providing material for comics and movies such as the Charlton Heston epic and Spielberg’s ‘Prince of Egypt’. The Queen Mary Psalter contains a remarkable series of Old Testament stories told in a series of 223 pictures with captions in French. Included in the series is the Moses story. Here are some of the episodes:
Miniature in two parts of the king of Egypt demanding that all Jewish infants be killed (above); of the birth of Moses, and Moses placed in a basket and left on the banks of the Nile (below), England (London?), c. 1310-1320: London, British Library, MS Royal 2 B VII, f. 22v
Miniature of Moses freeing the Israelites from the king of Egypt, (above); miniature of Moses and the king of Egypt's troops facing each other across the Red Sea, (below): London, British Library, MS Royal 2 B VII, f. 24v
We'll feature more medieval "comics" on this blog in the next few weeks. We're having great fun putting this list together, and would welcome more suggestions via @BLMedieval. Meanwhile, you can see our Comics exhibition in London until 19 August 2014, book your tickets online here. | <urn:uuid:6d585bb3-6fd3-4dcf-a43a-921900b05850> | {
"date": "2014-07-29T08:41:25",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510266894.52/warc/CC-MAIN-20140728011746-00318-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9255925416946411,
"score": 2.53125,
"token_count": 744,
"url": "http://britishlibrary.typepad.co.uk/digitisedmanuscripts/2014/05/superheroes-true-romance-blood-and-gore.html"
} |
Practice the skills you learned in this chapter by completing the following exercises. You will configure integration and coexistence mechanisms on networks.
In these exercises, you will complete the following tasks:
Enabling configured tunnels on a router
Assigning IPv6 addresses to tunnel interfaces
Adding a default IPv6 route
Advertising an IPv6 prefix on a link
Enabling a 6to4 router
Adding a default route to a 6to4 relay
Enabling the NAT-PT mechanism
Configuring a static NAT-PT mapping
Verifying NAT-PT mapping
In this configuration exercise, you will use the commands shown in Table 5-11. Refer to this list during the exercise. | <urn:uuid:ebe785c6-1d6d-4d37-9073-49a36d08728b> | {
"date": "2018-08-15T11:52:03",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210058.26/warc/CC-MAIN-20180815102653-20180815122653-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8003278970718384,
"score": 3.3125,
"token_count": 141,
"url": "https://www.safaribooksonline.com/library/view/cisco-self-study-implementing/1587050862/1587050862_ch05lev1sec5.html"
} |
Different Types of Nursing Care and Your Medicare Coverage
Last Updated : 09/10/20185 min read
Nursing care is an important part of your medical care, whether you are seen in a doctor’s office, urgent care or outpatient center, hospital, skilled nursing facility, or even your home. Here’s a look at the different types of nursing care and how Medicare pays for each.
What are the different types of nursing care I might receive?
According to the American Nurses Association (ANA), there are three main types of professionals who provide nursing care: licensed practical nurses (LPNs), registered nurses (RNs), and advanced practice registered nurses (APRNs).
- Licensed practical nurses, also called licensed vocational nurses (LVNs) in Texas and California, are health professionals who are trained to provide basic health care services, such as changing bandages or taking vital signs, under the supervision of a doctor or registered nurse, according to the Bureau of Labor Statistics. They must be licensed by the state to practice. Most LPNs complete a one-year education program in nursing care.
- Registered nurses must have either a two-year associate degree in nursing (ADN) or a four-year bachelor’s of science in nursing (BSN) in order to take the state board exam, and must be licensed by the state, according to the American Nurses Association. RNs can do physical exams, provide counseling and education, and work with other health professionals to coordinate patient care. They can do more specialized treatments and interventions, and interpret patient information to make decisions about care. They can also administer medications and conduct wound care.
- Advanced practice RNs have completed additional education to at least a master’s degree level and they provide the most specialized types of nursing care, according to the ANA. They can be nurse practitioners, certified nurse midwives, clinical nurse specialists, and certified registered nurse anesthetists. They are able to diagnose and treat common illnesses and injuries and prescribe medications.
In many settings, you may also receive basic nursing care from a nursing assistant, sometimes called a nursing aid (NA). According to the Bureau of Labor Statistics, NAs take vital signs, help patients bathe and dress, and turn and reposition patients. Although they are not technically nurses, they must complete an approved education program and pass a state competency test. They are supervised by licensed vocational nurses and registered nurses.
How does Medicare cover the different types of nursing care?
If you get nursing care in a doctor’s office or outpatient setting, under Original Medicare (Part A and Part B), those services are generally covered under Part B and are typically included in the cost of the office visit or other outpatient service you receive.
During a covered stay in an inpatient setting, such as a hospital, rehabilitation center, or skilled nursing facility, nursing care is covered under Part A and is typically included in your bill for the stay.
You may be responsible for deductibles, copayments, and/or coinsurance amounts.
Does Medicare cover different types of nursing care at home?
Original Medicare does generally cover home nursing care services if the following conditions are met:
- Your doctor certifies that you need intermittent skilled nursing care.
- The home health agency you use is Medicare certified.
- Your doctor certifies you are homebound because you either are unable to leave your home without help or leaving home isn’t recommended because of your health condition.
If all of these things are true, Medicare will generally cover part-time or intermittent nursing care provided by an RN or LPN in your home. In most cases, you pay nothing for home health nursing care under Original Medicare. Note that Medicare does not cover 24-hour home care or personal care provided by a nursing assistant if that is the only type of care you need.
Does Medicare pay for nursing care in a skilled nursing facility or rehab center?
Part A pays for skilled nursing facility (SNF) care if you have Part A, have days left in your benefit period, and you meet the eligibility requirements:
- You had a qualifying hospital stay of at least three days.
- You need skilled nursing care to either improve your current condition or prevent it from getting worse. Custodial care, such as help with bathing, dressing, and eating, is not considered skilled nursing care and is typically not covered under Medicare.
- The SNF is certified by Medicare.
- You need the skilled nursing care because of the condition that required the qualifying hospital stay, or one you developed while you were in the hospital during a covered stay.
You can get up to 100 days of skilled nursing care during a benefit period if your stay is eligible under Medicare guidelines. For days 101 and beyond you pay all costs. Deductible, copayment, and/or coinsurance amounts may apply.
Does Medicare cover nursing care if I choose hospice care?
Hospice care, including the different types of nursing care you may need, is typically covered under Part A. In most cases, you pay nothing for nursing care under your hospice benefit.
Keep in mind that the coverage guidelines above apply only to Original Medicare (Part A and Part B). If you get your Medicare benefits through a Medicare Advantage plan, your plan may have different guidelines and payment policies. Medicare Advantage plans are required by law to cover everything that Original Medicare covers (except for hospice care, which is still covered under Part A), but they may offer additional benefits that apply to home health or skilled nursing care. Check your plan documents to see how the different types of nursing care are covered under your plan.
Need more information on Medicare coverage for the different types of nursing care?
I am happy to answer your questions about nursing care; you can schedule a phone call or request an email by clicking on the buttons below. You can also find out about plan options in your area by clicking the Compare Plans button. | <urn:uuid:2edb4faa-fa0b-4c41-a82e-7ef40895230f> | {
"date": "2019-08-20T15:19:15",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315544.11/warc/CC-MAIN-20190820133527-20190820155527-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9583230018615723,
"score": 2.578125,
"token_count": 1231,
"url": "https://medicare.com/coverage/different-types-of-nursing-care-and-your-medicare-coverage/"
} |
Specific Cardiac Defects
St. Joseph Hospital’s highly skilled team has the proven expertise to care for patients with many types of cardiac defects:
Coronary Artery Disease
Coronary artery disease causes a decrease in blood flow to the heart muscle. When fatty substances called plaque are deposited in the inner lining of an artery, the artery is narrowed, restricting or blocking blood flow. The rupture of this plaque can cause a heart attack and subsequent chest pain. St. Joseph Hospital offers the latest therapies and treatments for coronary artery disease, from lifestyle management to the most advanced open-heart surgery techniques.
The heart's valves open and close to keep blood flowing properly, with oxygenated blood flowing into the heart and blood needing oxygen flowing out. Valve disease occurs when the heart's valves do not function properly. Some disorders cause stenosis (narrowing) or obstruction of the valves, which forces the heart to work harder to pump blood to the body. Other valve disorders are characterized by the inability of valves to close completely. This regurgitation or insufficiency disorder allows blood to leak back through the valve into the heart.
Congenital Heart Disease
Congenital heart disease is a heart defect that occurs during fetal development in the uterus. About one out of every 100 babies is born with a congenital heart defect, which can involve one or more heart structures or blood vessels around the heart. In most cases, the cause of the defect is unknown, but research has suggested that congenital heart disease may be the result of a genetic abnormality or if the developing fetus is exposed to certain medications, toxic substances, alcohol or drugs. During the past few decades revolutionary advances in medical and surgical care for congenital heart disease have resulted in excellent outcomes. This means that children treated for a congenital heart defect have now reached adulthood. Many of these patients are leading full, productive lives and have children of their own. In fact, the number of adult patients with congenital heart disease is now greater than those under age 20. Today at least half a million adults in the United States have congenital heart disease. Click here for more.
During atrial fibrillation, the heart's two small upper chambers quiver instead of beating effectively. Blood isn't pumped completely out of them, so it may pool and clot. If a piece of a blood clot in the atria leaves the heart and becomes lodged in an artery in the brain, a stroke results. About 15 percent of strokes occur in people with atrial fibrillation. The likelihood of developing atrial fibrillation increases with age. Three to five percent of people over 65 have atrial fibrillation. | <urn:uuid:fbb40115-321e-45da-a041-befca5d00e0b> | {
"date": "2014-04-24T01:43:12",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223204388.12/warc/CC-MAIN-20140423032004-00163-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9411810636520386,
"score": 2.96875,
"token_count": 545,
"url": "http://www.sjo.org/Our-Services/Heart-and-Vascular-Center/Open-Heart-Surgery/Specific-Cardiac-Defects.aspx?LargeFonts=false"
} |
The All-Star Game brings more than just a midseason shot of excitement to Major League Baseball. It provides much-needed rest for the players, a four-day respite in a 162-game season that often produces fatigue and injury.
The players who most need rest are the starting pitchers, who, paradoxically, get the most rest during the season, playing only every fifth day. Yet, midseason pitching swoons, like the Oriole starters have recently experienced, are not uncommon.
Perhaps the best-known case of pitching fatigue to occur around the All-Star break was that of Bob Feller, the Cleveland fireballer who at age 17 struck out 17 batters in his fifth major-league start. In his third season, 1938, Mr. Feller fell into a slump after being selected as an all-star. He won nine games before the break, then lost nine games after it. His earned-run average for August soared to 8.71, up from 1.43 in May. Cleveland newspapers declared his fastball gone. No one knew why.
Modern science offers an explanation of Mr. Feller's power outage. The likely cause was fatigue of the most heavily worked muscles of pitching: the wrist flexors and finger flexors of the forearm.
A major-league fastball requires exceptional hand speed and arm speed, which demand an abundance of the powerful fast-glycolytic muscle fibers in the arm and shoulder — the same fiber type Olympic sprinters and jumpers rely on for explosive power. Physiologists have a second name for this high-performance fiber: fast-fatigable.
This fiber fatigues rapidly because its main energy source is a limited supply of microscopic glycogen granules stored in each fiber. A pitcher can deplete the glycogen from his forearm flexors in a single outing, but it takes more than a day to restore the glycogen. If there is substantial micro-trauma to the muscle fibers — a routine occurrence in pitchers' forearm muscles — restoration can take a week or more. The glycogen energy system, technically known as intramuscular storage of energy substrate, is much like a rechargeable battery.
Depletion of glycogen causes muscle fibers to lose power, to contract more slowly under a load. At very low glycogen levels, fibers can shut down — enter a state of stiffness — or begin to act like slow-twitch fibers, relying not on glycogen but on a very small, less-powerful aerobic capacity.
This leads to differential fatigue, in which the flexion of the wrist and fingers lags the arm in its high-speed rotation. The result: the pitcher loses his precise coordination between the two fastest movements of pitching: forward arm rotation, with speeds as high as 10,000 degrees per second, and wrist flexion, up to 4,500 degrees per second.
This temporary loss of perfect coordination affects control, often leaving the fastball up in the strike zone. It also produces a slower spin rate, resulting in less movement of the fastball, making the pitch more easily hittable.
The remedy is simple. Rest. Skip a start. Add an extra rest day to the cycle. Or send the pitcher to the bullpen, where the workload is lighter. Pitchers, however, sometimes work harder in response, worsening the problem.
Because the restoration can take days, the workouts between outings that forcefully activate the fast-glycolytic fibers of the pitching muscles — such as wrist curls, chin-ups, long tossing, or near-game-speed bullpen throwing sessions — delay the full recharging of glycogen.
The effect of muscle micro-trauma on restoration can be seen in the contrast between a no-hitter and the game after the no-hitter, particularly with high pitch counts. Johan Santana threw a no-hitter on June 1, the first in New York Mets history. Seven days later, he gave up six earned runs and four homers in five innings. His manager was blamed for the dismal performance because he delayed the next start by two days. It would likely have been even worse, however, had Mr. Santana stuck to the five-day cycle.
Compared to pitchers of a century ago, pitchers today routinely throw faster, expending more stored energy per pitch. They also train harder during the season, depleting more glycogen between starts. Bad games, short outings, shellings, and inconsistent pitching were less common 100 years ago. There was no All-Star Game then — and no need for a midseason break to forestall pitching fatigue.
William Blewett, who writes from Bel Air, is the author of "The Science of the Fastball" (McFarland & Co.), to be released this fall. His email is [email protected]. | <urn:uuid:b5914648-9c55-4957-9285-da9f4e28c73f> | {
"date": "2018-01-20T11:39:51",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889567.48/warc/CC-MAIN-20180120102905-20180120122905-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9592766165733337,
"score": 2.625,
"token_count": 987,
"url": "http://www.dailypress.com/bs-ed-pitching-slumps-20120709-story.html"
} |
Psalmyn Ghavid 1761
Manx GaelicManx Gaelic (Gaelg) is the native language of the Isle of Man (Ellan Vannin), which a self-governing island in the Irish Sea between Britain and Ireland. It is a Gaelic language related to Irish Gaelic (Gaeilge) and Scots Gaelic (Gàidhlig) but with its own orthography closer to English style spelling. The language is regulated by the Manx Gaelic Advisory Council (Coonceil ny Gaelgey). Since 1985 Manx has been an official language of the Isle of Man along with English.
Psalmyn Ghavid (Manx Metrical Psalms) 1761A metrical Psalter is a version of the Psalms, which is translated into metre and rhyme, to enable the Psalms to be sung to standard tunes during Christian worship. In 1761 there was a translation of the Psalms of David (Psalmyn Ghavid) into metre in the Manx language by the Rev Robert Radcliffe and the Rev Matthias Curgey, who were two Anglican clergymen from the Isle of Man. These were first printed as the Manks Singing Psalms with the 2nd edition of the 1765 Manx Book of Common Prayer, published in 1768. The set of Psalms includes Psalms 1, 4, 8, 15, 16, 19, 22, 23, 24, 25, 32, 33, 39, 45, 67, 84, 90, 95, 100, 103, 116, 117, 119, 122, 135, 143, 145, 146, 147, 148. They were authorised by Bishop Hildesley, Anglican Bishop of Sodor and Mann who required that these were to be sung in churches.
This translation was digitised by the British and Foreign Bible Soicety (BFBS) in 2015, as part of a programme to digitise historic translations in native British languages.
© British and Foreign Bible Society 2015 | <urn:uuid:03ff8632-a2fb-4248-b067-b203cacf5ed5> | {
"date": "2018-02-22T18:37:04",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814249.56/warc/CC-MAIN-20180222180516-20180222200516-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9603508710861206,
"score": 2.53125,
"token_count": 417,
"url": "http://sq.www.bibles.org/versions/glv-PS1761"
} |
Articles of Confederation
America's first constitution; adopted in November 1777; Congress lacked power to impose tax, force citizens to join army, and regulate trade
single region of land created by Northwest Ordinance of 1787 located north of the Ohio River and east of the Mississippi River; land divided into 3 to 5 smaller territories that, when reached a population of 60,000, could apply for statehood
Philadelphia merchant; 1781 - proposed a 5 percent tax on imported goods to help pay national debt - Rhode Island opposed
1785 - Congress sent him to London to discuss difficulties with Britain regarding tradeand occupation in America
former Continental Army catptain - Saratoga, Bunker Hill, Ticonderoga; Jan 1787 - led more than 1,000 farmerms toward federal arsenal in Springfield, Massachusetts; four rebels killed; lost - captured
frightened many Americans; worried government couldd not control unrest and prevent violence
George Washington about Shays's Rebellion
"mankind, when left to themselves, are unfit for their own government"
Virginia planter; father of Consitution; came up with Virginia plan but Randolph propsed it
New York lawyer; proposed calling a convention in Philadelphia to discuss trade issues; also suggested that convetion consider what changes were needed to make "the Constitution of the Federal Government adequate to the exigencies [needs] of the Union."
proposed by Edmund Randolph; based on works of James Madison; called for two-house legislature, cheif executive branch chosen by legislature, and court system; lower house of legislautre elected by people, upper house elected by lower house; representation in legislature based on state population; known as "big state plan"
New Jersey Plan
William Patterson; one house legislature; one vote per state; changed Articles - weak executive branch, Congress could set taxes and regulate trade; known as "little state plan"
two-house legislature; lower house, House of Reps, based on population, upper house, Senate - two seats per state
"I consent to this Constitution because I expect no better, and because I am not sure, that it is not the best."
movement of 1700s that promoted knowledge, reason, and science as means to improve society
Two Treatises of Civil Government - government based on agreement between people and ruler; all people have natural rights: life, liberty, property
Baron de Montesquieu
The Spirit of Laws - powers of government should be separated and balanced against each other
checks and balances
the three branches of government have roles that check, or limit, the others so that no single branch can dominate the government
Mercy Otis Warren
antifederalist; "We have struggled for liberty and made costly sacrifices... and there are still many among us who [value liberty] too much to relinquish.. the rights of man for the dignity of government" | <urn:uuid:af3f0f85-2ad8-4efd-819b-0e8e6b833a9c> | {
"date": "2015-03-29T17:29:35",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298660.78/warc/CC-MAIN-20150323172138-00074-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9392004013061523,
"score": 3.78125,
"token_count": 592,
"url": "http://quizlet.com/572279/chapter-7-people-and-vocabulary-flash-cards/"
} |
2 days ago / Sally Boyce
A RARE bird sighted in Herefordshire could well cause some twitter among spotters.
The robin-sized black redstart, photographed by a reader in the Golden Valley, is a “very rare” sight in the county, according to Herefordshire Wildlife Trust.
With fewer than 100 breeding pairs in the UK, the black redstart is on the the Royal Society for the Protection of Birds’ endangered red list.
A continental bird, in this country the black redstart has adapted to living in industrial and urban areas. Its name comes from the plumage of the male, a grey-black colour with a red tail. Their decline has put them on the official red list of birds of conservation concern.
“Seeing a black redstart here in Herefordshire is exciting,” said HWT expert, John Clark. “They are very rare, the only places they tend to breed are on building sites in London.
“They tend to prefer upland areas and dry, rocky habitats.”
The location of the county sighting was an area of uncultivated pastureland.
John advised the reader to record spotting the black redstart as an official sighting for the county with the British Trust for Ornithology.
“It is important to record such sightings of birds not commonly found in Herefordshire,” he said. | <urn:uuid:636f05cf-f51a-4f8c-a577-3623510b176c> | {
"date": "2018-04-20T10:26:12",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937440.13/warc/CC-MAIN-20180420100911-20180420120911-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9111394882202148,
"score": 2.828125,
"token_count": 293,
"url": "http://cfzwatcheroftheskies.blogspot.com/2016/08/rare-bird-spotted-in-herefordshire.html"
} |
Issue No.03 - July-September (2008 vol.1)
Chee-Kit Looi , National Institute of Education, Singapore
Chiu-Pin Lin , National Hsinchu University of Education, Taiwan
Kuo-Ping Liu , National Central University, Taiwan
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TLT.2008.20
Jigsaw method empowers students to build their own knowledge through interactively communicating and discussing in group-based cooperation. However, when students return to their original group to share with teammates what they have learned in their expert groups, they may need to review the records of the previous discussion in order to integrate and share the key ideas arising from that discussion. Paper-and-pencil records often do not meet students? in-time need, thereby affecting the learning process. Group Scribbles (GS) is an activity tool that enables the collaborative generation, collection and aggregation of ideas through a shared space. The aim of this study is to deploy GS with Tablet PCs to facilitate 12 graduate school students doing cooperative learning by the jigsaw method and to examine how GS supports knowledge building and deeper understanding through interactive questioning, dialogue and continuous improvement of ideas. Results of this exploratory study suggest that GS-mediated cooperative learning jigsaw model could positively benefit students in their interaction and knowledge building processes.
Collaborative learning, Computer-assisted instruction, Computer science education
Chee-Kit Looi, Chiu-Pin Lin, Kuo-Ping Liu, "Group Scribbles to Support Knowledge Building in Jigsaw Method", IEEE Transactions on Learning Technologies, vol.1, no. 3, pp. 157-164, July-September 2008, doi:10.1109/TLT.2008.20 | <urn:uuid:52f9cff9-a006-4d22-a547-3d18e3d6e5d7> | {
"date": "2014-10-02T10:52:09",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663743.38/warc/CC-MAIN-20140930004103-00258-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8972309231758118,
"score": 2.59375,
"token_count": 372,
"url": "http://www.computer.org/csdl/trans/lt/2008/03/tlt2008030157-abs.html"
} |
A Closer Look at Atlas, the Prize-Winning Human-Powered Helo
Atlas' pilot, Todd Reichert, sits on a modified $10,000 professional racing bike frame donated by the manufacturer. Spools at the base of each pedal take up synthetic cord which feeds from larger spools located beneath each rotor hub.
Team members tweak a wingtip aileron used to control the lateral drift of the helicopter. Unlike Gamera, the rival aircraft built by students at the University of Maryland, Atlas's control system was an integral part of its design from the beginning, and this proved a crucial advantage.
After each of the 75 flights that Atlas made since its debut last August, team members had to rewind the cords that deliver power from the bike frame to the rotor spools.
A major source of trouble was a lack of stiffness in the airframe, which caused the fragile rotor spars to wobble and strike the ground. Here, Aerovelo co-founder and chief structural engineer Cameron Robertson helps to repair a broken spar on the artificial grass of the soccer stadium.
To shed every possible ounce of unnecessary weight from Atlas, Reichert made use of the most sophisticated materials available, including the same kind of synthetic cord used to lower NASA's Curiosity rover onto the surface of Mars. But to climb aboard he used a milk crate.
For Atlas to lift off, it had to be both huge (154 feet across) and lightweight (122 pounds), so every component contained the barest amount of material to bear the expected load, with very little margin for error.
Reichert with the bike frame and the cordage used to suspend it from Atlas' carbon-fiber truss framework.
Reichert, a nationally ranked speed skater in Canada, during an early trial run last year.
Team members inspect the junction of the two main carbon fiber trusses, which connect the four rotors and bear the weight of the pilot, suspended beneath them in a web of cordage.
A team member repairs a broken component. Huge, fragile, and extremely sensitive, Atlas broke frequently during its 10 months of flight testing. | <urn:uuid:fb8c9bf2-643d-48e8-9594-ede70d61b66e> | {
"date": "2019-09-16T02:45:23",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572471.35/warc/CC-MAIN-20190916015552-20190916041552-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9454457759857178,
"score": 3.015625,
"token_count": 447,
"url": "https://www.popularmechanics.com/flight/how-to/g1247/a-closer-look-at-atlas-the-prize-winning-human-powered-helo-15682409/"
} |
Part critique, part proposal, David Williamson Shaffer’s How Computer Games Help Children Learn is about what kids need to learn and how they need to learn it.
Shaffer asserts that the common practice of school is already a kind of game, with rules rooted in the industrial revolution:
School is a game about thinking like a factory worker. It is a game with an epistemology of right and wrong answers in which Students are supposed to follow instructions, whether they make sense in the moment or not. Truth is whatever the teacher says is the right answer, and actions are justified based on appeal to authority. School is a game in which what it means to know something is to be able to answer specific kinds of questions on specific kinds of tests.
Back when a high-school degree led to a good manufacturing job, this version of school may have made sense. However, U.S. manufacturing jobs are somewhere between going and gone. That leaves the low-end service sector as the primary employer of the high-school-educated workforce. Thus, yesterday’s middle-class auto worker is today’s barely-getting-by burger flipper.
In Shaffer’s view, the only good jobs will increasingly be those beyond the traditional high-school education: jobs that address problems with many possible answers, that require creativity, and that reward innovation. Everything else will be automated, offshored, or marginalized to the low-wage economy.
So if society wants to leave no child behind, the education system needs to change its game. The key shift is from an emphasis on teaching facts to teaching skills. Put another way, Shaffer wants more learning by doing. He wants students to learn by making them participants in simulations of real-world challenges that engineers, urban planners, journalists, and other professionals face. And this is where computers come in.
Think about SimCity, the computer game where you manage a simulated city as it grows. It’s a simulation. It’s a computer game. It’s a learning experience:
[Players] see what happens when they make changes in urban ecosystems. For example, if you put more parks in a city, the cost of public utilities goes up because you have to keep the parks clean. If you put an industrial site next to residential housing, the residential land values fall and the crime rates rise. As a result, players must decide whether to raise taxes, decrease the green space, move the industry, or risk urban flight—or, more realistically, decide which combination of these choices and in what measure will lead to the best long-term outcomes for the city.
Immersing kids in such a world lets them learn key concepts and ways of thinking as they progress through the game. Succeeding in the game requires learning and understanding. Contrast that with reading a bunch of articles about urban planning and being tested on the facts. Will those facts ever mean anything to the students? How much more would a student want to read about urban planning after getting hooked on SimCity?
But Shaffer’s learning games (developed by him and his colleagues at the University of Wisconsin-Madison) are different than SimCity. Whereas SimCity is an imaginary place, Shaffer’s games take care to simulate real places, things, processes, and constraints from the real world. The computer simulation provides an extension of reality rather than a replacement.
For example, an urban-planning game he highlights...
...is modeled on the real world of the city players live in and the real work of planners who shape that city. Players are redesigning a city, but it is their city. They can see and touch the places they are redesigning and can see how those changes might make their lives and the lives of those around them richer and more satisfying. However, their choices are constrained by the economic, social, and physical realities of life in a city and by the norms and practices of the profession of urban planning.
Given this world, students learn key skills necessary to do urban planning in the real world. These include ways of thinking and talking about problems that apply well beyond urban planning—which is the larger point: The underlying creativity, critical thinking, and innovation are what these students will need to compete in the global marketplace, whether they become urban planners or anything else that pays more than subsistence wages.
Of course, this all sounds reasonable, but the games need to be good. SimCity was successful because of fantastic game design and execution, not because millions of consumers inherently craved a city simulator. So can a bunch of academics make something that both satisfies Shaffer’s educational vision and is compelling enough to keep kids at the screen?
Shaffer and colleagues’ games are at early stages and are themselves academic projects. Initial pilot results are promising, but the results are from tests with close participation from mentors and facilitators. While the human element is part of Shaffer’s design, how much mentoring and facilitating is necessary for success? Is that amount practical for large-scale use?
Finally, how do Shaffer’s games get integrated into schools? Here Shaffer has a surprising answer: Maybe they don’t, at least initially. Several of the pilot tests have been in after-school programs. He speculates that they could also be embedded in larger virtual worlds such as Second Life. Although some might see this as a cop-out, avoiding the main institution that Shaffer critiques, I see it as a practical path that brings change where it’s easiest to make change. If the change is good, it will spread.
As is probably apparent, I like Shaffer’s ideas. But if you want a good read along with good ideas, this book might not meet your standards. Although the prose is relatively direct, it carries two burdens. First, Shaffer often tries to use and/or explain his field’s jargon, which I’ve spared you because I found it a distraction as a general reader. Second, Shaffer spends many pages describing computer games using words and the occasional picture, yet the thing that makes the games compelling is their visual and interactive appeal. If the book’s content could be presented as a short documentary film or even a screencast, it would be far more likely to hold a general audience’s attention.
(This suggests an accompanying book: How Videos of Children Learning from Computer Games Help Adults Learn the Value of Children Learning from Computer Games. Or should it be a video?)
Bottom line: How Computer Games Help Children Learn gave me a fresh angle on today’s educational challenges while detailing the first steps of a promising way forward. For people already interested in the issues, the book will be well worthwhile. For anyone else that wants to put a toe in the water, check Shaffer’s Epistemic Games Web site, and if that gets you going, then get the book. | <urn:uuid:38e38ad5-c281-4b8f-870f-fa51ab0f4b8d> | {
"date": "2017-03-26T05:13:37",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189127.26/warc/CC-MAIN-20170322212949-00456-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9568387866020203,
"score": 3.296875,
"token_count": 1431,
"url": "http://blog.stevekrause.org/2007/10/review-shaffer-computer-games-help.html"
} |
It's easy to understand why the animal-rights set is so keen on lab-grown meat—no more slaughterhouses or veal pens. But should environmentalists be getting on the bandwagon, too? I'm always hearing how cow burps are a major contributor to global warming. Then again, those massive meat labs will require a lot of power, right?
The hypothetical meat labs won't be carbon-neutral, but they'll still be far greener than our current system for producing burgers and chops. Raising and slaughtering livestock on a large scale doesn't just result in massive methane emissions due to bovine flatulence; it also creates waste-disposal nightmares, squanders valuable land, and guzzles an alarming amount of fossil fuel. So, yes, the environmentally conscious should keep their fingers crossed that lab-grown meat becomes a reality sooner rather than later. But given the numerous scientific challenges that remain, they shouldn't get their hopes up.
For the record, the Lantern is by no means averse to feasting on steak, chicken, or currywurst and has previously suggested that omnivorousness needn't be a mortal environmental sin. But he also acknowledges that our collective yen for meat, particularly cut-rate beef and pork, is taking its toll on the planet. According to a study published in Animal Science Journal last August, creating a pound's worth of beef releases the same amount of greenhouses gases—the equivalent of 36.4 pounds of carbon dioxide—as driving a car 155 miles at 50 miles per hour. And that's an underestimate of the industry's total impact, since the study didn't account for emissions from farm equipment or the fuel expended on transporting product from killing floor to supermarket.
Making meat in the lab would eliminate not only the methane generated by belching cattle, but also the need to grow mass quantities of feed—a woefully inefficient use of land, given that a cow must consume seven calories of grain in order to produce a single calorie of beef. And once you factor in the petroleum required to raise that grain—a process that involves the use of synthetic fertilizers, among other environmental bogeymen—the ratio of input calories to output zooms to 35 to 1.
The energy requirements of laboratories, by contrast, pale in comparison. According to most proposals, tomorrow's beef would be grown in bioreactors, filled with a solution consisting primarily of water and glucose. Animal stem cells would be placed in these bioreactors, where their proliferation would be abetted by the presence of growth factors, perhaps made from fungi.
Relatively small amounts of electricity (potentially derived from solar panels) would be required to regulate the temperature in these bioreactors, but also to provide a bit of stimulation to the cells as they grow into tissues. To replicate the taste and mouth-feel of naturally grown meat, the lab-grown victuals would have to be exercised—cows stretch their muscle tissues when they move, which in turn affects the flavor of their flesh. A minor electric current can mimic the effects of bovine movement. There has also been talk of adding polysaccharide beads to the bioreactors; as the temperature or acidity of the solution changes, these beads would expand or contract, thus providing the necessary workout for the nascent tissue. The beads would likely be made from the exoskeletons of arthropods and are completely nontoxic.
Lab-grown meat would also be more efficient in that no energy would have to be expended to create unwanted byproducts—specifically skeletons. Nor would there be any problems with waste management, a big plus since manure is a worrying contaminant of water supplies. And the lab approach would make locavorism that much easier; why buy lamb cubes from 1,000 miles away when they can come from the corner bioreactor instead?
A lovely thought, but don't hold your breath while waiting for your first lab-grown roast. Despite considerable hubbub over the technology in recent months, we're still years—or, more likely, decades—away from affordable lab-grown meat. The current experiments are taking place in bioreactors that measure only a few hundred milliliters in volume, and the longest complete muscle tissues are just 2 centimeters long. Researchers are nowhere close to scaling up their production to market-ready levels, to say nothing of market-ready prices. A Dutch team's lab-grown pork, for example, would cost around $45,000 per pound—assuming they could make an entire pound of the stuff. Bioreactors may be energy-efficient when compared with cattle, but they're also expensive to design, build, and maintain. They also require highly skilled personnel to manage, in order to preserve aseptic conditions.
Furthermore, manufactured meat promises to replicate only the taste and texture of processed meat; as far as we are from enjoying lab-grown hamburger, we're even further from perfecting man-made rib-eyes. So even if meat labs did become viable commercial enterprises, the naturally raised meat industry would hardly vanish.
Given our penchant for gluttony, affordable lab-grown meat could even be harmful to our health: We might simply increase our beef and pork consumption to keep pace with production, as has occurred over the past half-century. (According to this disturbing assessment, we annually consume 50 pounds more meat per-capita than Americans did in the 1950s.)
So while we should welcome the advent of lab-grown meat, we should also realize that it can't provide a short-term fix. Unfortunately, our meat addiction is one of those environmental problems that we can't just invent ourselves out of.
Is there an environmental quandary that's been keeping you up at night? Send it to [email protected], and check this space every Tuesday. | <urn:uuid:fa444afb-f905-44b3-a745-7b19cab1257a> | {
"date": "2016-05-02T04:02:00",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860122420.60/warc/CC-MAIN-20160428161522-00180-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9625862836837769,
"score": 3,
"token_count": 1206,
"url": "http://www.slate.com/articles/health_and_science/the_green_lantern/2008/05/will_labgrown_meat_save_the_planet.single.html"
} |
Franklin Park Zoo, in Boston, is pleased to announce the birth of a Linne’s Two-Toed Sloth!
The baby, born August 12, is the offspring of Nero, age 8, and Lunesta, age 10. The baby can be seen on exhibit with its mother, Lunesta, in the Little Critters building within the Children’s Zoo. The baby, whose sex is not yet known, underwent its first medical examination on August 14 and appears healthy, bright and alert.
Linne's Two-Toed Sloths are currently classified as “Least Concern” on the IUCN Red List, but efforts to preserve that status are essential to future survival. Franklin Park Zoo, part of the Zoo New England Corp, participates in the Linne’s Two-Toed Sloth Species Survival Plan (SSP), which is a cooperative, inter-zoo program coordinated nationally through the Association of Zoos and Aquariums (AZA). SSPs are designed to maintain genetically diverse and demographically stable captive populations of species.
Linne’s Two-Toed Sloths are large, furry mammals that live in trees and are found in the tropical forests of South America. They spend almost their whole lives dangling upside-down from branches that they hold on to with all four clawed feet. While these animals move really well through the branches, once they are on the ground they are very slow and vulnerable to predators as they are not built for walking.
Sloths eat mainly a vegetarian diet of leaves and shoots, and they spend roughly 15 hours a day sleeping. Although they live in trees, sloths are not related to monkeys; rather, their closest relatives are the anteater and the armadillo.
See more photos of the new baby, below the fold. | <urn:uuid:8b879b03-c20d-46af-bc76-a3662532fcc6> | {
"date": "2017-06-25T20:53:48",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00097.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9555227756500244,
"score": 2.859375,
"token_count": 377,
"url": "http://www.zooborns.com/zooborns/2014/08/two-toed-sloth-hangs-out-with-mom-at-franklin-park-zoo.html"
} |
The Luftwaffe (German air force) bombing offensive against Royal Air Force (RAF) bases created a critical shortage of pilots by the third week of the attacks. As a result, RAF Fighter Command declared Royal Canadian Air Force (RCAF) Squadron Number 1 operational. This decision was made even though the commander of the squadron, Squadron Leader Ernest McNab, did not feel that his unit was combat ready.
On 24 August 1940, RAF Fighter Command dispatched RCAF Squadron Number 1 on its first mission. It was assigned to intercept a formation of German bombers over southern England. However, Squadron Leader McNab was not aware that RAF Fighter Command had also sent three RAF twin-engine Blenheim patrol planes to the same area. As a result, RCAF Squadron Number 1 attacked the three British planes, shooting down one and damaging the other two before McNab could break off the operation. Fortunately, the British airmen did not suffer any fatalities.
Two days later, RCAF Squadron Number 1 was sent on another intercept mission. The squadron downed seven German bombers, but Flight Officer R.L. Edwards was killed in a point-blank attack on a German Dornier bomber. Edwards was the first RCAF pilot to die in combat. | <urn:uuid:b54ab654-3d34-4827-8b07-f07cd3b05c19> | {
"date": "2017-04-30T22:37:38",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00591-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9730727672576904,
"score": 3.71875,
"token_count": 257,
"url": "http://lermuseum.org/index.php/second-world-war-1939-45/1940/royal-canadian-air-force-squadron-number-1-24-aug-1940"
} |
Illustration copyright 2005. Adapted from the U.S. Centers for Disease Control and Prevention. Available online: http://www.cdc.gov
Mosquitoes become infected with West Nile virus when they bite infected birds. And then they may transmit the virus to humans and animals when they bite to take blood.
Last Revised: August 10, 2012
Author: Healthwise Staff
Medical Review: E. Gregory Thompson, MD - Internal Medicine & W. David Colby IV, MSc, MD, FRCPC - Infectious Disease
To learn more visit Healthwise.org | <urn:uuid:0322469b-46e8-4cf8-b8ad-93be3013da03> | {
"date": "2014-04-25T04:50:04",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207985.17/warc/CC-MAIN-20140423032007-00523-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8561246395111084,
"score": 3.53125,
"token_count": 121,
"url": "http://www.sanfordhealth.org/HealthInformation/Healthwise/Topic/zm2213"
} |
Osteoporosis and Exercise
Osteoporosis is a common condition, but fortunately there are measures to take that can help decrease your risk.
What is Osteoporosis?
Preventing Osteoporosis with Exercise
Osteoporosis is a disease in which the mass of bones is low and bone structure is altered, leading to a higher likelihood of breaking. According to the World Health Organization, it is currently estimated that there are 1.66 million hip fractures each year worldwide, and this number is estimated to increase four-fold by 2050. Risk factors include aging, family history, medication, being a Caucasian or Asian woman, having a small and thin body frame. Lifestyle, including diet and exercise habits, has a role in both the development and prevention of the disease.
Physical activity, particularly weight bearing exercise and resistance training, is widely recommended to help increase bone mass and prevent osteoporosis.1,2,3
Weight bearing exercise includes activities like jogging, hiking, aerobics and sports like soccer, basketball and volleyball.
Regular physical activity during adolescence, specifically weight bearing exercise, is critical for optimizing peak bone mass.4 In a study of teenage girls, it was found that over a seven year period, the girls with the highest levels of physical activity had a bigger increase in bone mass when compared with those with the lowest levels.5 Maximizing bone mass during the early years of life has sustained benefits in adulthood.6 Adults who participate in moderate-intensity physical activity during their early years are likely to have higher bone mass and a lower risk of developing osteoporosis as the decades go by.
Exercise for bone health is not limited to the young, however. The Australian and New Zealand Bone and Mineral Society states physical activity may lower the rate of bone loss, improve muscle strength, and fitness can help lower the risk of fractures and falls among the elderly.7 Research performed in postmenopausal Japanese women supports that regular physical exercise can positively impact maintenance of bone mass and help prevent bone loss.8,9
There is also some evidence that working on balance, coordination and posture, such as Tai Chi Chuan exercises can help delay bone loss in postmenopausal women,10 however more thorough studies are needed to confirm this finding.
Improving Symptoms of Osteoporosis with Exercise
Including weight bearing activity during the later years of life can help improve symptoms of osteoporosis. Results from a study performed in postmenopausal women with osteoporosis found that participating in an exercise program with moderate-intensity weight-bearing aerobic activities and resistance exercises with free weights, stabilized both height and bone mineral density of the lumbar site. In addition there was a reduction in fractures over the 5-year study period.11
This content is reviewed regularly. Last updated December 17, 2011.
A comprehensive activity plan that includes weight bearing, resistance, and balance training is an effective way to maximize bone mass in the early years and delay bone loss during the adult years, thus preventing the development of osteoporosis.
1 Chan KM, Anderson M, Lau EMC. Exercise interventions: defusing the world’s osteoporosis time bomb. Bulletin of the World Health Organization. 2003;81(11):827-830.
2 Wolman RL. Education and debate ABC of sports Medicine: Osteoporosis and Exercise. BMJ. 1994 August;309:400.
3 Ullom-Minnich P. Prevention of osteoporosis and fractures. AAFP. 1999;60:194-202.
4 Karlsson MK. Does exercise during growth prevent fractures in later life? Med Sport Sci. 2007;51:121-136.
5 Rautava E, Lehtonen-Veromaa M, Kautiainen H, Kajander S, Heinonen OJ, Viikari J, Mottonen T. The reduction of physical activity reflects on the bone mass among young females: a follow-up study of 142 adolescent girls. Osteoporos Int. 2007 Jul;18(7):915-22.
6 Rideout CA, McKay HA, Barr SI. Self-reported lifetime physical activity and areal bone mineral density in healthy postmenopausal women: the importance of teenage activity. Calcif Tissue Int. 2006 Oct;79(4):214-22.
7 Forwood MR, Larsen JA. Exercise recommendations for osteoporosis. A position statement of the Australian and New Zealand Bone and Mineral Society. Aust Fam Physician. 2000 Aug;29(8):761-4.
8 Shimegi S et al. Physical exercise increases bone mineral density in postmenopausal women. Endocr J. 1994 Feb;41(1):49-56.
9 Hatori M. et al. The effects of walking at the anaerobic threshold level on vertebral bone loss in postmenopausal women. Calcif Tissue Int. 1993 Jun;52(6):411-4.
10 Qin L, Au S, Choy W, Leung P, Neff M, Lee K, Lau M, Woo J, Chan K. Regular Tai Chi Chuan exercise may retard bone loss in postmenopausal women: A case-control study. Arch Phys Med Rehabil. 2002 Oct;83(10):1355-9.
11 Walker M, klentrou P, Chow R, Plyley M. Longitudinal evaluation of supervised versus unsupervised exercise programs for the treatment of osteoporosis. Eur J Appl Physiol. 2000 Nov;83(4-5):349-55. | <urn:uuid:2c3a49c4-63f5-4913-b7ed-b2f3cc9620d9> | {
"date": "2016-02-05T22:13:47",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701145519.33/warc/CC-MAIN-20160205193905-00056-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9051380753517151,
"score": 3.328125,
"token_count": 1173,
"url": "http://www.weightwatchers.com/util/art/index_art.aspx?tabnum=1&art_id=60711"
} |
Bitcoin is a digital asset and a peer-to-peer payment network operating on a cryptographic protocol. The concept was first introduced in 2008 when Satoshi Nakamoto published the now famous “Bitcoin: A Peer-to-Peer Electronic Cash System.”
Bitcoin is created and held electronically and no one controls it. Bitcoin has several important features: it is decentralized, easy to set up, transparent, with very little transaction fees, fast and non-repudiable.
The Bitcoin protocol was designed to generate a defined number of units; 21 million bitcoins to be precise. The protocol dictates how much bitcoin will be released and when and how that supply is reduced over time. These attributes are aimed at reflecting those of a commodity such as gold.
How are bitcoin created
bitcoin are created through a process called “mining.” Mining consists in adding transaction records to Bitcoin’s public ledger of past transactions. This ledger is called the blockchain because it is a chain of… | <urn:uuid:9471a69d-03df-4357-92d8-8c612c134dcc> | {
"date": "2017-02-24T03:38:12",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00108-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9549075365066528,
"score": 3.484375,
"token_count": 200,
"url": "http://www.btcplanet.net/the-bitcoin-halving-explained-2/"
} |
HMS Victoria (1887)
HMS Victoria by William Frederick Mitchell
|Builder:||Armstrong Whitworth Elswick yard|
|Laid down:||13 June 1885|
|Launched:||9 April 1887|
Victoria and her sister ship Sans Pareil together were known as "The Pair of Slippers"
|Fate:||Accidentally rammed and sunk, 22 June 1893|
|General characteristics |
|Class and type:||Victoria-class battleship|
|Displacement:||11,020 long tons (11,200 t)|
|Length:||340 ft (100 m)|
|Beam:||70 ft (21 m)|
|Draught:||26 ft 9 in (8.15 m)|
|Installed power:||8,000 ihp (6,000 kW) (natural draught)
14,482 ihp (10,799 kW) (forced draught)
|Propulsion:||2 × Humphreys & Tennant triple-expansion engines
2 × screws
|Speed:||16 kn (18 mph; 30 km/h) (natural draught)
17.3 kn (19.9 mph; 32.0 km/h) (forced draught)
|Complement:||430; as flagship: 583|
|Armament:||2 × BL 16.25 in (413 mm) guns
1 × BL 10 in (250 mm) gun
12 × BL 6 in (150 mm) guns
12 × 6-pounder guns
6 × 14 in (360 mm) torpedo tubes
|Part of:||Mediterranean Fleet|
|Commanders:||Captain Maurice Bourke|
HMS Victoria was the lead ship in her class of two battleships of the Royal Navy. On 22 June 1893, she collided with Camperdown near Tripoli, Lebanon, during manoeuvres and quickly sank, killing 358 crew members, including the commander of the British Mediterranean Fleet, Vice-Admiral Sir George Tryon. One of the survivors was executive officer of the Victoria, John Jellicoe, later commander-in-chief of the British Grand Fleet at the Battle of Jutland.
- 1 Design
- 2 Career
- 3 Grounding
- 4 The collision
- 5 Victoria in later centuries
- 6 References
- 7 Bibliography
- 8 External links
Victoria was constructed at a time of innovation and development in ship design. She was originally to have been named Renown, but the name was changed before launching to celebrate Queen Victoria's Golden Jubilee, which occurred the year that the ship was launched. Her arrival was accompanied by considerable publicity that she was the most powerful ironclad afloat, with the thickest armour, heaviest guns, as well as being one of the fastest and one of the largest ironclads. However, the design proved less successful in practice. The ship was nicknamed 'the slipper' (or with her sister ship Sans Pareil also attached to the Mediterranean squadron, 'the pair of slippers') because of a tendency for her low forecastle to disappear from view in even slight seas.
The forward deck held a single turret with two BL 16.25 in (413 mm) Mark I guns. Aft was a BL 10 in (250 mm) gun protected by a gun shield. This design, which followed that of the preceding ironclad battleship Conqueror, was a compromise from original intentions of having main armament fore and aft and meant the guns could only fire sideways or forward of the ship. The great weight of the turret meant that it had to be mounted low so as to improve the ship's stability, and that a similar gun could not be fitted aft. The 16.25 in (413 mm) gun was chosen because similar, large guns had been used in foreign ships, and because of difficulties in obtaining the navy's preferred 13.5 in (340 mm) design. The gun barrels were found to be so heavy that they drooped when installed on their mountings and could only fire 75 rounds before barrel wear became excessive. If the guns were fired forward, it was found that the recoil buckled the deck. Her main armour extended only along some 162 ft (49 m) of her total 340 ft (100 m) length varying from 16–18 in (41–46 cm) thick. By comparison, the French battleship Amiral Baudin, constructed at a similar time, had 21.5 in (55 cm) armour along her whole length. However, the British design produced a faster ship with greater range and larger guns.
She was the first battleship to be propelled by triple-expansion steam engines. These were constructed by Humphrys, Tennant and Company of Deptford and had cylinders of diameters 43 in (1,100 mm), 62 in (1,600 mm) and 96 in (2,400 mm) with stroke of 4 ft 3 in (1.30 m). They produced 12,000 ihp (8,900 kW) under forced draught, or 7,500 ihp (5,600 kW) under open draught. She was also the first Royal Navy ship to be equipped with a steam turbine, which was used to power a dynamo.
A detailed model of the ship was exhibited at the Royal Navy exhibition in 1892 and another in silver was given to Queen Victoria by the officers of the Navy and Royal Marines as a Jubilee gift.
Victoria was first commissioned by Captain J. E. Stokes in March 1890 who took the ship to the Mediterranean. This crew then swapped ships with the crew of Camperdown, so that Captain J. C. Burnell now took command. The ship was now flagship of the Mediterranean squadron commanded by Vice-Admiral Sir Anthony Hoskins. In 1891, Sir George Tryon succeeded as fleet commander and Captain Maurice Bourke became the new flag-captain onboard Victoria.
On 29 January 1892, Victoria ran aground at Snipe Point near Platea on the Greek coast. Platea had been selected as a convenient friendly port for British ships to use as a base for exercises with torpedoes and mines and each ship of the Mediterranean Fleet would go there in turn during the winter. Torpedoes would be launched from fast moving ships in real battle conditions, but it was desirable to practice this in relatively shallow waters so that the torpedoes could be recovered afterwards (they were supposed to float once their motors stopped but sometimes sank). Captain Bourke had appreciated the potential difficulties of operating his ship in shallow waters, and had ordered a crew to set out a buoy offshore where the water shoaled to 60 ft (18 m). The crew missed the shallowest point, so that Victoria ran aground at 9 kn (10 mph; 17 km/h) onto the rocky shoal and stuck fast. The fore end of the ship ended up 7 ft (2.1 m) higher out of the water than would be normal as momentum drove it up onto the shoal. The ship's bottom was damaged, and three compartments flooded. The stern, however, was still in 66 ft (20 m) of water. Admiral Tryon was notified and departed for the scene in Surprise, also ordering a dockyard tug Sampson with pumping equipment and hawsers. Hecla — a torpedo-depot ship — was already at Platea and made two attempts to tow Victoria free. These failed, but she assisted with laying anchors to hold the rear of the ship steady until further help could arrive. Phaeton, Edinburgh, Dreadnought, Scout and Humber were also called to the scene.
Victoria was lightened by removing 1,253 long tons (1,273 t), including 475 long tons (483 t) of coal thrown overboard. The leaks were patched up by creating temporary bulkheads and using timber and Portland cement to block holes. Dreadnought and Edinburgh each had hawsers attached to Victoria so they could pull astern. Sampson was lashed alongside so that she could pull backwards, and Victoria 's own engines were run astern. This was sufficient to move the ship which was refloated on the evening of 4 February. The ship proceeded to the new Hamilton Dock in Malta for repairs, being the first ship to use it. The hull plating was ripped and torn for a distance of 70 ft (21 m), with some plates being folded into 'S' shapes, although the mild steel bent rather than cracked. Repairs were completed ready for the summer fleet cruise in May.
The British Mediterranean Fleet was one of the most powerful in the world at the time. The Royal Navy saw the Mediterranean as a vital sea route between Britain and India, under constant threat from the navies of France and Italy, and concentrated an impressive force in it. On 22 June 1893, the bulk of the fleet, 11 ironclads (eight battleships and three large cruisers), were on their annual summer exercises off Tripoli in Lebanon.
Tryon was a strict disciplinarian who believed that the best way of keeping his crews taut and efficient was by continuous fleet evolutions, which before the invention of wireless were signalled by flags, semaphore and signal lamp. He had gained a reputation as a daring and highly proficient handler of his ships. His speciality was a new system (the "TA" system) by which complex manoeuvres could be handled by only a few simple signals, but which required his ships' captains to use their initiative; a quality which had become blunted by decades of naval peace since Trafalgar, and which was unwelcome in a hierarchical navy which deified Admiral Horatio Nelson while misunderstanding what he had stood for. A taciturn and difficult man for his subordinate officers to deal with, Tryon deliberately avoided making his intentions known to them in advance, so as to train them to be adept in handling unpredictable situations.
Disposition of the fleet
|This section does not cite any references or sources. (June 2011)|
Tryon led one column of six ships, which formed the first division of his fleet, in his flagship Victoria travelling at 8 kn (9.2 mph; 15 km/h). His deputy — Rear-Admiral Albert Hastings Markham — was in the lead ship of the second division of five ships, the 10,600 long tons (10,800 t) Camperdown. Markham's normal divisional flagship — Trafalgar — was being refitted. Unusually for Tryon, he had discussed his plans for anchoring the fleet with some of his officers. The fleet were to turn inwards in succession by 180°, thus closing to 400 yd (370 m) and reversing their direction of travel. After travelling a few miles in this formation, the whole fleet would slow and simultaneously turn 90° to port and drop their anchors for the night. The officers had observed that 1,200 yd (1,100 m) was much too close and suggested that the columns should start at least 1,600 yd (1,500 m) apart; even this would leave insufficient margin for safety. The normal turning circles of the ships involved would have meant that a gap between the two columns of 2,000 yd (1,800 m) would be needed to leave a space between the columns of 400 yd (370 m) on completion of the manoeuvre. Tryon had confirmed that eight cables (1,300 m (4,300 ft)) should be needed for the manoeuvre the officers expected, but had later signalled for the columns to close to six cables (1,000 m (3,300 ft)). Two of his officers gingerly queried whether the order was correct, and he brusquely confirmed that it was.
He ordered speed to be increased to 8.8 kn (10.1 mph; 16.3 km/h) and at about 15:00 ordered a signal to be flown from Victoria to have the ships in each column turn in succession by 180° inwards towards the other column so that the fleet would reverse its course. However, the normal "tactical" turning circle of the ships had a diameter of around 800 yd (730 m) each (and a minimum of 600 yd (550 m), although standing orders required "tactical rudder" to be used in fleet manoeuvres), so if they were less than 1,600 yd (1,500 m) apart then a collision was likely.
As there was no pre-determined code in the signal book for the manoeuvre he wished to order, Tryon sent separate orders to the two divisions. They were:
"Second division alter course in succession 16 points to starboard preserving the order of the fleet." "First division alter course in succession 16 points to port preserving the order of the fleet."
The phrase "preserving the order of the fleet" would imply that on conclusion of the manoeuvre the starboard column at the start would still be the starboard at the finish. This theory was propounded in 'The Royal Navy' Vol VII pages 415-426. It is suggested here that Tryon intended that one division should turn outside the other.
Tryon's flag-lieutenant was Lord Gillford, and it was he who received the fatal order to signal to the two divisions to turn sixteen points inwards, the leading ships first, the others of course following in succession.
Although some of his officers knew what Tryon was planning they did not raise an objection. Markham, at the head of the other column, was confused by the dangerous order and delayed raising the flag signal indicating that he had understood it. Tryon queried the delay in carrying out his orders, as the fleet was now heading for the shore and needed to turn soon. He ordered a semaphore signal be sent to Markham, asking, "What are you waiting for?" Stung by this public rebuke from his commander, Markham immediately ordered his column to start turning. Various officers on the two flagships confirmed later that they had either assumed or hoped that Tryon would order some new manoeuvre at the last minute.
However, the columns continued to turn towards each other and only moments before the collision did the captains of the two ships appreciate that this was not going to happen. Even then, they still waited for permission to take the action which might have prevented the collision. Captain Bourke of Victoria asked Tryon three times for permission to order the engines astern; he acted only after he had received that permission. At the last moment, Tryon shouted across to Markham, "Go astern! Go astern!"
Camperdown strikes Victoria
By the time that both captains had ordered the engines on their respective ships reversed, it was too late, and Camperdown 's ram struck the starboard side of Victoria about 12 ft (3.7 m) below the waterline and penetrated 9 ft (2.7 m) into it. Reversing the engines only had the effect of causing the ram to be withdrawn to let in more seawater before all of the watertight doors on Victoria had been closed. Two minutes after the collision, the ships were separated again.
The weather was hot. It was Thursday afternoon, which was traditionally a rest time for the crew, and all hatches and means of ventilation were open to cool the ship. There was a 100 sq ft (9.3 m2) hole in the side of the ship open to the sea. Initially, Tryon and his navigation officer, Staff Commander Thomas Hawkins-Smith, did not believe the ship would sink, because the damage was forward and had not affected the engine room or ship's power. Tryon set about giving orders to turn the ship and head for the shore 5 mi (8.0 km) away so she could be beached. Some of the surrounding ships had started to launch boats for a rescue, but he sent orders for them to turn back. Just two minutes after Camperdown reversed back out of the hole she had created, water was already advancing over the deck and spilling into open hatches. A party under Lieutenant Herbert Heath attempted to unroll a collision mat down the side of the ship to "patch" the hole and slow the inrush of water, but by the time they could struggle with it into position, they were already standing in water and had to abandon the attempt. Five minutes after the collision, the bow had already sunk 15 ft (4.6 m), the ship was listing heavily to starboard and water was coming through the gun ports in the large forward turret. The forecastle became totally submerged, with the top of the gun turret forming a small island. Although the engines were still manned and running, hydraulic power for the helm failed so the ship could not be turned and there was no power to launch the ship's boats. Eight minutes after the collision, the fore end of the ship was flooded and under water, which now lapped the main deck, and the stern had risen so that the screws were nearly out of the water.
Immediately after the collision, Captain Bourke had gone below to investigate the damage and close the watertight doors. The engine room was dry, but forward in the ship men were struggling to secure bulkheads even as water washed in around them. Already men had been washed away by incoming water or had been trapped behind closed doors. Yet still there had not been sufficient time to close up the ship to stop the water spreading. He returned on deck, giving orders for the men to fall in ready to abandon ship. The assembled ranks of sailors were ordered to turn to face the side, and then to abandon ship.
Victoria capsized just 13 minutes after the collision, rotating to starboard with a terrible crash as her boats and anything free fell to the side and as water entering the funnels caused explosions when it reached the boilers. With her keel uppermost, she slipped down into the water bow first, propellers still rotating and threatening anyone near them. Most of the crew managed to abandon ship, although those in the engine room never received orders to leave their posts and were drowned. The ship's Chaplain, the Revd S. D. Morris RN, was last seen trying to rescue the sick. All manner of items broke loose from the ship as it sank and came shooting up amongst the men. The area around the wreck became a "widening circle of foaming bubbles, like a giant saucepan of boiling milk", which the rescue boats did not dare enter. Onlookers watched as the number of live men in the water steadily diminished. Lieutenant Lorin, one of the survivors, stated: "All sorts of floating articles came up with tremendous force, and the surface of the water was one seething mass. We were whirled round and round, and half choked with water, and dashed about amongst the wreckage until half senseless." Gunner Frederick Johnson reported that three times he was sucked down and that while originally there were 30-40 people around him, afterwards there were only three or four.
Camperdown herself was in serious condition with her ram nearly wrenched off. Hundreds of tons of water flooded into her bows which were underwater. Her crew had to construct a cofferdam across the main deck to stop the flooding. As with Victoria, vital watertight doors had not been closed in time, allowing the ship to flood. After 90 minutes, divers managed to reach and close a bulkhead door so that the flooding could be contained. Eventually, the ship returned to Tripoli at one quarter speed, still with seven compartments flooded.
The following ships had more time to take evasive action, and avoided colliding with each other in turn. Nile was already turning to follow Victoria when the collision happened and came to within 50 yd (46 m) of her as she tried to turn away. Some of the surviving witnesses claimed she came even closer to a further collision. Similarly, Edinburgh narrowly avoided running into Camperdown from behind. Inflexible ended up stopped some 200 yd (180 m) from Victoria, and Nile 100 yd (91 m) away.
357 crew were rescued and 358 died. Collingwood was that day responsible for providing a steam launch for the fleet, so her launch was ready and away within a minute of Camperdown and Victoria disengaging. Captain Jenkins ignored Tryon's initial order for rescue boats to turn back and in consequence picked up the greatest number of the survivors. Six bodies were recovered immediately after the sinking, but although a search was instituted during the night and the following days no more were found. Turkish cavalry searched the beaches, but no bodies were found there either. The six were buried the following day in a plot of land provided by the Sultan of Turkey just outside Tripoli. 173 injured officers and men were transferred to the cruisers Edgar and Phaeton and taken to Malta. Commander Jellicoe, still suffering from fever and then immersion where he was assisted in the water by Midshipman Philip Roberts-West, shared the captain's cabin on Edgar.
Tryon himself stayed on the top of the chart-house as the ship sank, accompanied by Hawkins-Smith. Hawkins-Smith survived, but thought it doubtful Tryon could ever have managed to do so, being less fit than himself and himself having barely escaped first the entangling ship's rigging and then the force of the sinking.
Investigation and court-martial
The news of the accident caused a sensation and appalled the British public at a time when the Royal Navy occupied a prime position in the national consciousness. News was initially scarce, and a crowd of thousands of friends and relatives laid siege to the Admiralty building awaiting news of relatives. Markham's initial telegram to the admiralty had only named the 22 officers who had drowned and further details were slow to arrive. Many immediately laid blame on Tryon, as the obvious candidate to be appointed as "scapegoat". Later, as more information reached England, more considered opinions began to question how experienced officers could have carried out such dangerous orders. An appeal was launched in London — championed by Agnes Weston of the Royal Sailors' Rest — which raised £50,000 in three weeks (£5 million in modern terms) to help the dependants of sailors who had lost their lives.
Of immediate concern was why one of Britain's first-class battleships — similar in design to many others — had sunk from a relatively modest injury when rammed at low speed. It was considered that while it was vitally important to determine exactly what had happened, it would be extremely damaging to conduct any inquiry in public, risking exposing weaknesses in British ships to enemy navies. Although the ram as a weapon of war had already been discontinued by the French and was then under debate as to its effectiveness, it was officially pronounced to be an effective and powerful weapon. A report was drawn up by the Director of Naval Construction, Mr. William Henry White, and submitted to parliament in November 1893. The report denied that had Victoria 's side armour extended as far forward as the point of impact that it could have reduced the damage and saved the ship. It denied that automatic bulkhead doors would have helped, although these were shortly fitted to capital ships throughout the navy. It denied there was any instability in the ship, although modifications were then undertaken to the bulkhead arrangement of her sister Sans Pareil.
A court-martial was begun on the deck of Hibernia at Malta on 17 July 1893 to investigate the sinking of Victoria, and to try the conduct of her surviving crew, chief amongst them Captain Maurice Bourke. All the crew (except three excused for illness) were required to appear as prisoners before the court. Members of Admiral Tryon's personal staff were not part of the ship's crew and so were not amongst the accused. The court-martial was conducted by the new admiral appointed to command the Mediterranean fleet, Sir Michael Culme-Seymour. Seymour had been carefully chosen for the job both of restoring the confidence of the squadron, and as a safe pair of hands to conduct the enquiry. He was a respected admiral at the end of his career and had not expected further appointments. He came from a family which included several naval officers, was related to the First Lord of the Admiralty, his father had been Queen Victoria's chaplain, and he was recommended for the job by his friend Prince Alfred, who was concerned for his other friend Captain Bourke. Prince Alfred also recommended he take on as secretary his own former secretary, Staff Paymaster Henry Hoskins Rickard, who was also appointed Deputy Judge Advocate. He had served the same role in previous courts martial, which was to advise on points of law and to impartially sum up the prosecution and defence cases. Captain Alfred Leigh Winslow, an expert on signals and fleet manoeuvres, was appointed as prosecutor and had travelled out to Malta with the new admiral and his staff. Vice-Admiral Tracey, superintendent of the Malta Dockyard, plus seven of the fleet captains made up the court. Despite misgivings, members of the press were permitted to attend. A shorthand writer had to be obtained from Central News. Captain Bourke immediately objected that four of the judges were captains of ships which took part in the incident, including the captain of Camperdown, and these were replaced by other officers.
A widespread theory regarding the accident circulating at the time was that Tryon had mistaken the radius of the ship's turning circle for its diameter, and thus had allowed only two cables space instead of four, plus a safety margin of a further two cables between the two columns of ships. Bourke was questioned about this and stated that this possibility had not occurred to him at the time. However, he also begged the court to allow him not to discuss a conversation with Tryon, where he had pointed out before the collision that Victoria 's and Camperdown 's turning circles were each about 800 yd (730 m), whereas the admiral had ordered the ships to be spaced only 1,200 yd (1,100 m) apart. Despite Bourke's request not to discuss this point, it was he himself who raised the matter in the court, which had not asked about it. Bourke reported that Tryon had instructed the distance between the ships should remain at six cables, but explained his own inaction in the face of this apparent threat to the ships by saying that he expected Tryon to produce some solution to this apparent mistake at the last minute. Bourke was questioned about Tryon's system of TA and how this customarily operated. He replied that the admiral would normally go forward during TA, leaving the ships officers aft, whereas otherwise he would remain aft. On this occasion, Tryon had gone forward.
Gillford was called to give evidence, and once again reluctantly told the court that after the collision Tryon had said within his hearing, "It was all my fault". Hawkins-Smith confirmed this, saying he had been on the bridge with Tryon and Gillford after the collision when Tryon had said, "It is entirely my doing, entirely my fault". Hawkins-Smith confirmed to the court that no one believed Victoria could sink as rapidly as she did. No one was questioned on the issue of whether or not it might have been wiser for the two ships to have remained wedged together, at least until all watertight doors had been properly secured, before separating them and thereby opening the holes in both ships.
After two more witnesses, Markham was invited to answer questions as a witness, although his status as a potential future defendant meant the court allowed him later to suggest questions to be put to other witnesses. He explained his confusion when he first received the order to turn, and his refusal to signal compliance because he could not see how the manoeuvre could safely be carried out. He observed that he was aware the ships were passing the point at which they should have turned and a response was urgently required. He stated that he had finally complied, after Tryon had queried his delay, having decided that Tryon must intend to turn slowly, outside Camperdown 's turn, so the two lines would pass side by side in opposite directions. The two lines would then have reversed, "preserving the order of the fleet" as it had been before the turn. Markham was then read a memorandum circulated by Tryon just before the fleet had sailed which included the instruction: "When the literal obedience to any order, however given, would entail a collision with a friend....paramount orders direct that the danger is to be avoided, while the object of the order should be attained if possible." Markham observed that while he had not been thinking precisely of the memorandum, he had been thinking of the safety of his ship. When it became apparent that he was on a collision course he could not turn further starboard, nor turn to port as this would have broken "the rule of the road", so that the only thing he could do was full reverse. By mischance, only three-quarters reverse had been signalled. It was put to him that he might have turned harder to starboard, thereby avoiding the collision, but he responded again that this would have gone against 'the rule of the road'. When further questioned, he agreed that "the rule of the road" did not apply during manoeuvres. He also confirmed that throughout the turn he had been closely watching Victoria 's helm signals, which indicated how sharply she was turning.
Markham's flag captain, Charles Johnstone, was next to be questioned. He initially confirmed that he had only accepted the order to turn once Markham had produced his explanation of how it might be carried out. Later, however, he admitted that at the time he commenced the turn he still did not understand how it might be concluded successfully. He confirmed that Camperdown had used only 28° of helm instead of the full possible 34°, and had not attempted to turn faster by reversing one of the screws as he might have done. The failure finally to use full reverse in the face of certain collision also remained unexplained. Lieutenant Alexander Hamilton and Lieutenant Barr were both questioned as to what they had heard of conversations amongst the senior officers, making it apparent that confusion continued over what to do at least up to the moment the order to turn was put into effect. Evidence was taken from many other witnesses.
Admiralty technical report
A report was prepared by the Director of naval Construction W. H. White reconstructing exactly how the ship had sunk, published in September 1893, which combined evidence from the survivors with known design details of the ship. Camperdown struck approximately 65 ft (20 m) from the stem of Victoria at an angle of approximately 80°, just ahead of one of the main transverse bulkheads. Camperdown was travelling at about 6 kn (6.9 mph; 11 km/h), so the blow roughly equated with the energy of a shell from one of the 12 in (300 mm) guns then in service, the 45-ton breech-loading rifle (BLR). It pushed Victoria 's bow sideways 60–70 ft (18–21 m). Camperdown was most probably held back from driving further into Victoria by coming up against the protective armoured deck running across Victoria below water level. Camperdown 's stem penetrated approximately 6 ft (1.8 m) into Victoria 's side, while the underwater ram penetrated about 9 ft (2.7 m), 12 ft (3.7 m) below water level. Had Camperdown been travelling more slowly, then it was likely the damage from her stem would have been lessened, but the underwater ram might instead have torn a hole along Victoria 's relatively thin lower plating as she continued to move forward. A similar thing had happened in a collision between the German warships SMS König Wilhelm and Großer Kurfürst, causing the latter to sink. This did not happen because the two ships became locked together, although the momentum caused Camperdown to rotate relative to Victoria tearing the hole wider.
After Camperdown disengaged, the initial inflow of water was limited not by the size of the hole but by the rate at which water could flow out of the immediately affected compartments into adjacent ones. It was noted that there had been insufficient time to close watertight doors, a process which took three or four minutes even when men were on duty and already prepared. The collision was followed by steady sinking of the bow and increasing list to starboard for about 10 minutes, by which time the bow had sunk 23 ft (7.0 m) from its normal position. Approximately half the length of the ship was submerged and the tip of the port propellor was raised above water level instead of 11 ft (3.4 m) below. The ship was heeled over sideways by about 20°. There was then a sudden lurch to starboard and the ship turned over. This was ascribed to water reaching open ports and doors on the gun turret and sides of the ship, which now started to flood new compartments on the starboard side. The ship started to capsize slowly at first but with increasing speed, accompanied by increasing noise audible on the nearby ships as anything loose fell towards the low side, worsening the process. The ship was still underway at this time trying to reach shore. This tended to force the bow down and more water into the ship, while the rudder jammed hard to starboard tended to increase the heel.
It was estimated from survivors reports that initially twelve watertight compartments were affected, causing a buoyance loss of some 680 long tons (690 t) at the fore end of the ship, mostly concentrated below the level of the armoured deck. Water then spread to other areas, eventually rising to fill the space below the main deck. There were no significant longitudinal bulkheads in the affected areas, which might have had the effect of keeping water out of the port side and thereby accentuating the heel, but the water naturally flooded the holed side first causing the imbalance. No water entered the stokeholds or engine rooms. It was determined that had the gunports and doors at deck level been closed so that water was prevented from entering this way, then the ship would not have capsized. These doors would customarily be closed if the ship was travelling in a heavy sea, but were not part of normal procedure for closure in a collision. She might not have foundered at all, but this would have depended on whether various bulkhead doors had been closed or not, which was unclear. Had all doors been closed initially so that only the breached compartments were flooded, then the ship's deck would have likely remained just above water level with a heel of around 9° and Victoria would have been able to continue under her own power.
The court produced five findings:
- That the collision was due to an order by Admiral Tryon.
- That following the accident everything possible had been done to save the ship and preserve life.
- No blame attached to Captain Bourke or any other member of his crew.
- 'The court strongly feel that although it is much to be regretted that Rear Admiral Albert H. Markham did not carry out his first intention of semaphoring to the Commander-in-Chief his doubts as to the signal, it would be fatal to the interests of the service to say that he was to blame for carrying out the directions of the Commander-in-Chief present in person.'
- The court was not able to say why Victoria had capsized.
It was established that the ship would have been in no danger had her watertight doors been closed in time. Bourke was found blameless, since the collision was due to Admiral Tryon's explicit order but the judgement carried an implied criticism of Rear-Admiral Markham. Winsloe complained afterwards that he had not been permitted to properly make his case, and that there was more than enough evidence to convict Markham and others of his crew of negligence. Back in England, confusion reigned in the press as to whether the findings about Markham were an indictment or not, and whether or not it was the duty of an officer to disobey a dangerous order. The Saturday Review commented, "the court has evaded the real point with a slipperiness (for we cannot say dexterity) not wholly worthy of the candour we expect from officers and gentlemen." Captain Gerald Noel of Nile, who had given evidence critical of Camperdown 's actions, wrote to Markham observing that things might have turned out better had he been on any ship other than Camperdown, and that in his opinion Captain Johnstone was incompetent. Charles Beresford and Admiral of the Fleet Sir Geoffrey Phipps Hornby published a joint letter in the United Service Gazette that: "Admiral Markham might have refused to perform the evolution ordered, and the Victoria might have been saved. Admiral Markham, however, would have been tried by court-martial, and no one would have sympathised with him as it would not have been realized that he had averted a catastrophe. Unconditional obedience is, in brief, the only principle on which those in service must act." This contrasted with a statement contained in the official signal book; "Although it is the duty of every ship to preserve as correctly as possible the station assigned to her, this duty is not to be held as freeing the captain from the responsibility of taking such steps as may be necessary to avoid any danger to which she is exposed, when immediate action is imperative and time or circumstance do not admit of the Admiral's permission being obtained."
The verdict of the court had to be confirmed by the admiralty board in London. They found themselves in a difficulty; although naval opinion seemed to have reached consensus that Markham was significantly to blame, and that it was not acceptable to allow a precedent which any officer causing a disaster by blindly following orders could cite in his defence, it was also felt impossible to severely criticise Markham without blaming Bourke for also failing to take action. As a compromise, a rider was added to the verdict, to the effect that Markham had no justification for his belief that Victoria would circle around him, and thus he should have taken action much sooner to avoid collision. Captain Johnstone was also criticised, both for failing in his own independent responsibility to safeguard the ships, and for failing to expeditiously carry out orders when the collision was imminent.
Markham and Johnstone both continued to feel aggrieved by the verdict, seeking to take the matter to a further court-martial to clear their names. It fell to Seymour to convince them that they had been dealt with lightly, and any further case could only go against them. Markham completed the remaining months of his posting in the Mediterranean, but was then placed on half pay without a command. He received minor postings and achieved the rank of admiral before retiring aged 65 in 1906.
Tryon's TA system — and with it his attempt to restore Nelsonian initiative into the Victorian-era Royal Navy — died with him. Whether or not Tryon had intended the system to be in effect at the time of the accident, traditionalist enemies of the new system used the collision as an excuse to discredit and bury it. To some extent, this was mitigated by the introduction of wireless communication some six years later. Heavy reliance upon detailed signalling — and the ethos of reliance upon precise orders — continued within the navy right through to the First World War. Several incidents occurred where reliance upon specific orders or signal failures allowed lucky escapes by the enemy in that war, so that had the sinking not occurred and Tryon survived to continue his campaign, there might have been a significant improvement in British performance.
Five years after the incident, only Camperdown was still in active service, the rest of the then front-line battleships all having been relegated to guard duties as obsolete.
Tryon's wife was giving a large social party in their London home at the time his ship collided with Camperdown. There is a legend that Admiral Tryon was seen descending the staircase by some of the guests.
There is a memorial to the crew killed in the disaster in Victoria Park, Portsmouth. It was originally erected in the town's main square, but at the request of survivors was moved to the park in 1903 where it would be better protected.
A scale section of Victoria — a popular exhibit on display at the World's Columbian Exposition in Chicago at the time of the accident — was subsequently draped in black cloth as a tribute to the loss.
No definite conclusion has ever been reached as to what Tryon intended to happen during the manoeuvre. Two possible explanations have been proposed.
The first is that Tryon was mistaken in the orders which he gave. It has variously been suggested that he might have been ill or indisposed in some way, supported by his curt comments to officers who queried him at the time, and his apparent inattention to the results when the manoeuvre commenced. Alternatively, that he was of sound mind, but mistook the turning circle of the ships involved. It has been suggested that a much more frequent manoeuvre was a turn of 90°, for which a space allowance of two cables per ship would have been correct. On this basis, the ships would have completed their turns inwards at a spacing of two cables, then re-traced their course to the correct point to turn to their final anchor positions. Whatever the possible reason for the initial mistake, some confirmation of this explanation comes from the reported statement of Lieutenant Charles Collins, who had been officer of the watch on Victoria at the time of the incident. Memoirs written by Mark Kerr related that Collins had confirmed to him, that Tryon had admitted on the bridge that this was the mistake he had made. One historian has gone so far as to suggest that Tryon's incomprehensible letters to Lord Charles Beresford indicate that he "was suffering from some deterioration of the brain; that his fatal error was no mental aberration such as is to be expected of the young and inexperienced, but the consequence of a disease which at times clouded and confused his judgement and ideas."
The second possibility is that Tryon fully intended the order which he gave and — understanding the objections raised by his officers — still chose to put it into effect. Tryon had ordered an identical manoeuvre during different exercises in 1890, but on that occasion the turn was cancelled because the commander concerned declined to signal an acceptance of the order before it became too late to carry it out (in fact the man who had been in Markham's position on that occasion was Vice-Admiral Tracey, who now sat on the panel). Markham came up with his own suggestion as to how it might be possible to carry out the order, with one line of ships turning outside the other. However, he insisted that he believed Tryon intended to turn outside Markham's ships, despite the navigation signals being flown by Victoria that she was turning at maximum helm. It has been suggested that unlike Markham's assessment, Tryon intended to take a tight curve and leave it to Markham to avoid him, by taking the outside position around the curve.
Support for this came initially from a journalist and naval historian William Laird Clowes who suggested that Queen's Regulations required "If two ships under steam are crossing so as to involve risk of collision, the ship which has the other on its starboard side shall keep out of the way of the other," which would place the onus upon Camperdown to take avoiding action. Clowes also maintained that in any contention between a ship carrying the commander and another, it was the responsibility of the other ship to keep clear from the path of his commander. Although this particular form of turn was not included in the official manoeuvering book, it was mentioned in other standard texts of seamanship. This view has been taken by others, who have added to the argument Tryon's behaviour, which was consistent with his having set a TA problem for his subordinate to solve and therefore followed his normal habit of not explaining his intentions or intervening until afterwards. Others have argued that the witnesses' accounts suggest Tryon accepted having made a mistake, and that had one column of ships passed outside the other instead of both turning inwards, they would then have been in the wrong formation to approach their normal positions at the anchorage. Debate has also centred upon whether the flag signals instructions "...preserving the order of the fleet" imply that afterwards the ships should be in two columns as before (i.e. Camperdown in the starboard column) or whether the signals only meant that each division should still be in one column with the same order of ships, but that it could have swapped sides with the other column.
Victoria in later centuries
After a search that lasted ten years, the wreck was discovered on 22 August 2004 in 150 metres of water by the Lebanese-Austrian diver Christian Francis, aided by the British diver Mark Ellyatt. She stands vertically with her bow and some 30 metres of her length buried in the mud and her stern pointing directly upwards towards the surface. This position is not unique among shipwrecks as first thought, as the Russian monitor Rusalka also rests like this. The unusual attitude of this wreck is thought to have been due to the heavy single turret forward containing the main armament coupled with the still-turning propellers driving the wreck downwards.
The 1949 Ealing comedy Kind Hearts and Coronets features a satire of the accident, in which Alec Guinness plays Admiral Lord Horatio D'Ascoyne, who orders a manoeuvre that causes his flagship to be rammed and sunk by another ship in his fleet. Guinness noted that his portrayal of the admiral was based on an officer he knew during his training during the Second World War.
Lord Nelson memorabilia
In 2012, Mark Ellyatt claimed he had discovered the sword of Admiral Horatio Nelson on board the wreck of the Victoria. Vice Admiral Tryon is known to have been an admirer of Nelson, and owned a number of items that had formerly belonged to him. Ellyatt claims he discovered the sword in Tryon's cabin, and subsequently hid it in another part of the wreck to prevent its theft by looters. He did not recover it because of uncertainty over its ownership.
- Hough, pp. 47–48.
- Hough, p. 48.
- Chesneau, Koleśnik & Campbell 1979, p. 30.
- Macintyre, Donald; Bathe, Basil W (1974). Man of War a History of the Combat Vessel. Reference to the first battle ship with triple-expansion steam engines (Mcgraw-hill Inc). p. 95. ISBN 9780070445857.
- The Times, 24 June 1893, issue 33986, page 7, 'Terrible naval disaster'.
- Fitzgerald pp. 333–336.
- Fitzgerald pp. 336–338.
- Hough pp. 82–86.
- Agnes Weston: My Life among the Bluejackets, James Nisbett: London, 1909. Page 174.
- Hough pp. 93–98.
- Hough p. 103.
- Hough pp. 90–91.
- "TRIPOLI (VICTORIA) NAVAL CEMETERY". Commonwealth War Graves Commission. Retrieved 12 February 2011.
- Hough pp. 98, 105–106.
- Hough pp. 99–100.
- Hough pp. 109–111.
- Gordon p. 261.
- Gordon p. 250.
- The Times, 'Victoria relief fund', 2 November 1893, page 4, issue 34098.
- Hough pp. 112–117.
- Hough pp. 118–122.
- Gordon pp. 252–259.
- Hough pp. 128–134.
- Hough pp. 134ff.
- Hough pp. 137–143.
- Hough pp. 144–146.
- The Times, The Loss of HMS Victoria, 2 November 1893, page 4, issue 34098, column A. (Admiralty minutes confirming the cortmartial verdict and technical report on the sinking).
- Gordon p. 274.
- Gordon pp. 275–283.
- Gordon p. 292.
- Gordon pp. 293–294.
- Hough p. 171.
- Gordon, A. "The Rules of the Game".
- Gordon p. 568.
- Gordon pp. 270–271.
- Bennett. Charlie B. p. 188.
- Gordon p. 271.
- Hough p.163; Queens regulations Ch 27 sections 15, 16.
- Hough p. 164.
- Gordon p. 270.
- Gordon pp. 268–269.
- Rubin p. 60.
- "Did any ship's captain ever stand saluting on the bridge as his ship sank?". National Maritime Museum. Retrieved 10 June 2009.
- Dewsbury, Rick (29 January 2012). "Nelson's £1million sword is discovered at the bottom of the Med". The Daily Mail. Retrieved 8 February 2013.
- Chesneau, Roger; Koleśnik, Eugène M.; Campbell, N.J.M. (1979). Conway's All the World's Fighting Ships, 1860–1905. London: Conway Maritime Press. ISBN 0-85177-133-5.
- Bennett, Geoffrey (1968). Charlie B: A Biography of Admiral Lord Beresford of Metemmeh and Curraghmore. London: Peter Dawnay Ltd.
- Andrew Gordon, The Rules of the Game: Jutland and British Naval Command, John Murray.
- David Brown, Warrior to Dreadnought: Warship development 1860-1905, Chatham Publishing.
- Richard Hough, Admirals in Collision, Hamish Hamilton Ltd, London. Copyright 1959.
- Oscar Parkes British Battleships, ISBN 0-85052-604-3.
- Louis Decimus Rubin, The Summer the Archduke Died: Essays on Wars and Warriors, University of Missouri Press, , ISBN 0-8262-1810-5
- Rear-Admiral C. C. Penrose Fitzgerald, Life of Vice-Admiral Sir George Tryon K.C.B., William Blackwood and sons, Edinburgh and London, 1897
- The Times, The Loss of HMS Victoria, 2 November 1893, page 4, issue 34098, column A. (Admiralty minutes describing the sinking)
- Minutes of Proceedings at a Court-Martial held on board her Majesty's ship Hibernia at Malta, on Monday, the seventeenth day of July 1893; and by adjournment, every day thereafter (Sunday excepted) to the Twenty-seventh day of July 1893, to enquire into the loss of her Majesty's ship Victoria , Her Majesty's Stationery Office, printed by Darling & son Ltd, 1893.
- Dive HMS Victoria in Lebanon
- Victoria memorial in Portsmouth
- Lebanon Daily Star article on the discovery of the wreck[dead link]
- HMS Victoria on the wrecksite, including video and position
- Poem by William McGonagall commemorating the loss of the Victoria
|Wikimedia Commons has media related to HMS Victoria (ship, 1890).| | <urn:uuid:d0c3dbb0-7691-4090-a37b-f6c7e3730c93> | {
"date": "2015-09-03T02:44:40",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645298065.68/warc/CC-MAIN-20150827031458-00346-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9820878505706787,
"score": 2.84375,
"token_count": 10618,
"url": "https://en.wikipedia.org/wiki/HMS_Victoria_(1887)"
} |
The leaves and branches of Viscum flavescens, Pursh (Nat. Ord. Loranthaceae). A parasitic plant found upon forest trees, especially the oaks in America.
Common Names: Mistletoe, American Mistletoe.
Principal Constituent.—Viscin, a viscous substance also known as bird glue or bird lime.
Preparation.—Specific Medicine Mistletoe. Dose, 1 to 30 drops.
Specific Indications.—Determination of blood to the brain, flushed face and oft-recurring headache; paroxysms of tearing, rending neuralgic or rheumatic pains; weak, irregular heart-action, with cardiac hypertrophy, valvular insufficiency and shortness of breath.
Action and Therapy.—Viscum has toxic properties. Vomiting and bloody and tenesmic catharsis, prostration, contraction of the pupils, muscular spasm, convulsions and coma have been reported from eating the plant and berries. Its action would suggest its possible value in nervous disorders, and it has been used like strychnine in heart disorders with feeble pulse, dyspnea, edema, and inability to lie down. It is also asserted to possess parturient properties, but they do not compare with those of ergot, and the drug is almost never used for these purposes. It should be reserved for the conditions mentioned under "Specific Indications", and even in these it needs further study.
The Eclectic Materia Medica, Pharmacology and Therapeutics, 1922, was written by Harvey Wickes Felter, M.D. | <urn:uuid:2ec43b74-7d83-4682-92a4-4a7ca412a28f> | {
"date": "2014-10-25T04:19:17",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119647629.9/warc/CC-MAIN-20141024030047-00072-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9247241020202637,
"score": 2.9375,
"token_count": 340,
"url": "http://www.henriettes-herb.com/eclectic/felter/viscum.html"
} |
So, this is the question, and I am not sure I am able to find any reason why this statement is wrong, as the exercise requires.
Show by example that the following statement is wrong: The number L is the limit of
f(x) as x approaches x0 if f(x) gets closer to L as x approaches x0.
Explain why the function in your example does not have the given value of L as a
limit as x -> x0.
I have just started my university calculus course and am feeling pretty lost most of the time. Some words of advice would be nice if anyone has any hehe.
Thank you everyone!
I think the problem with the statement as given is that you need to approach L FROM BOTH SIDES as you make x approach x_0 FROM BOTH SIDES in order to have L be the limit of f(x) as x approaches x_0.
The idea is that you need to not only approach it, but it is also required that you get arbitrarily close to the limit. In the example stated above, in a manner of speaking, you are "getting closer to" 0 from both sides, but you never get closer than 1 unit away. So the limit is not 0. | <urn:uuid:ea62072b-2e7c-4cdf-b94f-80d319260a6a> | {
"date": "2015-07-08T00:55:11",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375635143.91/warc/CC-MAIN-20150627032715-00296-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9725260138511658,
"score": 3.078125,
"token_count": 261,
"url": "http://mathhelpforum.com/calculus/202845-another-limit-problem.html"
} |
Second Great Seal Committee March 1780
The Continental Congress formed a second committee on March 25, 1780 four years after the first committee made its report. The chairman was James Lovell (Massachusetts). The other two members were John Morin Scott (New York) and William Churchill Houston (New Jersey).
The committee sought the assistance of Francis Hopkinson, the prominent and gifted Philadelphian who signed the Declaration of Independence and designed the American flag Congress adopted in 1777. Experienced in designing seals, Hopkinson did most of the work of this committee which delivered its report to Congress about six weeks later, on May 10, 1780.
Francis Hopkinson's Sketches of His Designs
for the front and reverse sides of the Great Seal
The shield of thirteen diagonal white and red stripes is supported on its right by a warrior holding a sword and on its left by a figure representing Peace bearing an olive branch. The crest is a radiant constellation of thirteen stars. The motto beneath the shield, "Bello vel Paci," means: For war or for peace.
On the reverse side, Liberty is seated in a chair holding an olive branch and her staff is topped by a Liberty cap. The motto "Virtute perennis" means "Everlasting because of virtue." The date in Roman numerals is 1776.
Congress did not consider the design suitable and did not approve it.
In Hopkinson's preliminary design (above), the figure supporting the shield's right side was an Indian warrior holding a bow & arrow and carrying a quiver of arrows. The motto means "Prepared in War or in Peace." | <urn:uuid:35e57a7a-5875-44f4-833e-f894428330fa> | {
"date": "2016-08-24T06:35:58",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982291143.22/warc/CC-MAIN-20160823195811-00268-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9475796222686768,
"score": 3.265625,
"token_count": 336,
"url": "http://greatseal.com/committees/secondcomm/index.html"
} |
Evaluated data sets are produced through the process of critical comparison, selection renormalization and averaging of the available experimental data, normally complemented by nuclear model calculations.
Evaluated libraries are files of evaluated data which, appropriately processed, form the input data to computations for a wide variety of nuclear science and technology applications. Each of these evaluated libraries may consist of individual evaluated data sets for several hundred isotopes or elements. An index with descriptions of available evaluated nuclear data general and special purpose libraries is found on the link below:
EXFOR is the name given to the database containing experimental reaction data. In addition to storing the data and it's bibliographic information, experimental information, including source of uncertainties, is also compiled.
The data presently included in the EXFOR database include:
Bibliographic reaction data are entered into the CINDA database.
Nuclear structure data refer to the properties of single nuclei, as opposed to reaction data which deals with the properties of a nucleus interacting with radiation or another nucleus.
Numerical data related to nuclear structure are available in the ENSDF and NUDAT databases.
Bibliographic information on nuclear structure is found in the NSR database. The experimental and evaluated information stored in the numerical databases, such as NUDAT and ENSDF, have been compiled on the basis of the result of experiments and reviews published in a variety of scientific journals and reports. The bibliographic databases contain cross references between the information stored in the numerical databases and the original articles on which these data are based.
Last reviewed: 24 March 2014 | <urn:uuid:95581973-bb94-4dde-ac58-02a35c71435e> | {
"date": "2014-09-19T03:45:32",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657130067.43/warc/CC-MAIN-20140914011210-00064-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9220135807991028,
"score": 2.609375,
"token_count": 326,
"url": "http://www.oecd-nea.org/dbdata/data/index.html"
} |
WAY OF STOPPING THE WAR
BNW: "I thought of what would be an engineer's way of stopping the war and that would be to cut off the power supply to their great armament factories in the Ruhr, which involved bombing and destroying the dams because you know it takes 150 tons of water to make 1 ton of steel and if we robbed them of all their water supply they couldn't produce steel and the war would have come to an end..."
The decision to proceed with the raid on the Ruhr dams was only taken on February 26th 1943.
"We were summoned to a meeting within eight weeks of the final date for bursting the dams that year, and were told to go ahead and I came out of that room feeling physically sick. I had won my battle and I had the terrible responsibility of making good all my claims and you can't imagine what a horrible feeling that is. When somebody has actually called your bluff. You are depending upon your self confidence and past experience of successes to guarantee that you can do something entirely new, which nobody has ever done before".
The first drop of a prototype bomb from a modified Lancaster was made on April 16th 1943 off the Kent coast near Reculver. Unlike the final cylindrical operational weapon, this bomb was spherical - the shape preferred by Barnes Wallis - and comprised a steel cylinder faired by wood into a spherical shape. It was unsuccessful and the wood broke away. A second drop later the same day produced the same result, but the cylindrical main part performed as intended. It was decided after a third unsuccessful attempt on April 22nd to dispense altogether with the wooden covering. Only three weeks before the actual attack, the bomb worked satisfactorily for the first time on April 29th.
The raid on the Mohne, Eder and Sorpe Dams was carried out on the night of May 16/17th 1943. Both the Mohne and Eder masonry dams were breached. And the damage to the Sorpe earth dam with the one remaining weapon was such that the Germans drained off half the contents of the lake to ensure safety.
Of the 19 aircraft of 617 Squadron that took off that May evening in 1943 only 11 returned. But Albert Speer, Reich Minister of Armaments, said, "We were in great danger. If the English had systematically destroyed all the dams in the region, our steel industry would have collapsed".
LEGEND OF THE DAMBUSTERS
At the end of February 1943, a unique decision was taken to form a crack new squadron comprising some of the most experienced crews within No 5 Group - Bomber Command's most seasoned Lancaster Group. Its commander was Wing Commander Guy Gibson, already a veteran of 174 sorties. The new squadron, soon to be designated No 617, would be based at Scampton in Lincolnshire. Gibson would personally select his own crews, including quite a number from his old squadron, No 106, to fly a top secret operation of a very special nature.
By the date in May chosen for Operation Chastise, Gibson and his crews had spent 2,500 hours in training flying their specially modified Lancasters cross-country navigating by moonlight at low level. They practised the entirely new technique of releasing a mine from an aircraft flying at exactly 60 feet and at 232 mph over the Derwent reservoir in Derbyshire. The back-spinning cylindrical weapon was to skip over the water, bounce over nets and other defences, strike the dam, sink and detonate at 30 feet.
The correct release distance of 400 - 450 yards from the target was judged with a simple triangular sight using the known distance between the ornamental towers of the dams as a base. Two spotlights under the bellies of the Lancasters focused intersecting spots on the water surface to indicate the correct height.
Wing Commander Gibson made the first attack on the Mohne Dam releasing his mine at 28 minutes past midnight. Half an hour later, after the fifth Lancaster had attacked, he radioed NIGGER, signalling that the dam had been breached.
Gibson led the rest of his force to the Eder Dam directing them one by one into the attack. The same meticulous procedure was followed and the same extraordinary courage displayed. The final attempt by Pilot Officer Knight deeply breached the dam. The water spewed out, looking, as Gibson later wrote, like "stirred porridge in the moonlight".
Gibson was awarded the Victoria Cross. Thirty-two other aircrew received DS0s, DFCs and DFMs.
AND GRAND SLAM
BNW: "After the dams had been burst, Sir Wilfred Freeman, the Chief Executive at the Ministry of Aircraft Production, asked me if I remembered my mad idea of a 10-ton bomb which I had put up in 1939. I said 'Yes, indeed, Sir Wilfred, I do'. 'Well', he said, 'how soon could you let me have one?' I said 'June, July August, September, October, five months if I have all the labour available in Sheffield'".
It was all very unofficial. At the Ministry of Aircraft Production, Sir Wilfred Freeman acted on his own initiative. Vickers in their turn had no contract. Within a few months, however, the RAF had the first 'earthquake' bomb. It was called 'Tallboy', weighed 12,000lbs and was a scaled down version of the 10-tonner which was proving difficult to cast and harden.
617 Squadron, the Dambusters, once chided as the one op. squadron, were the first to use Tallboy. Just after D-day, a Panzer Battalion was being rushed by rail from Bordeaux to the Normandy beachhead. Its route lay through the Saumur tunnel, but 617 Squadron got there first. One of nineteen Tallboys fell on the hill 60 yards from the mouth of the tunnel. It was one of the most remarkable direct hits of all time. It bored straight down into the tunnel itself and exploded there. Some 10,000 tons of earth and chalk collapsed into the tunnel.
854 Tallboys were dropped by Bomber Command Lancasters on targets in Germany and occupied Europe in World War 2. Tallboys sank the Tirpitz, damaged the Baltic rocket research station at Peenemunde and destroyed innumerable V1 and V2 launching pads for missiles pounding London. And Tallboys pierced the thick concrete of U-boat and E-boat pens on the French Atlantic coast.
On March 14th 1945, Squadron Leader C C Calder in Lancaster S-Sugar attacked Bielefeld Viaduct in Germany with the first of the 22,000lb Grand Slams, and completely shattered the target. Bielefeld Viaduct carried the main railway line from Hamm to Hanover and had survived 3,000 tons of bombs in previous attacks. Its destruction was a complete vindication of Barnes Wallis's theory that a near miss producing a near 'camouflet' could be more effective than a direct hit.
617 Squadron dropped all 41 Grand Slams to be released over Germany in the closing weeks of World War 2. | <urn:uuid:584bf4d8-7b97-4fd5-aafe-e80da4ebd2fb> | {
"date": "2014-04-24T10:59:38",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206120.9/warc/CC-MAIN-20140423032006-00507-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9792073965072632,
"score": 2.9375,
"token_count": 1474,
"url": "http://www.barneswallistrust.org/dambusters.htm"
} |
RAM Limitations Strain Bio-IT
The staff of 26 scientists and IT specialists went into the work knowing that it would require augmenting existing hardware and software as well as in-house development. This may result in a technology infrastructure that will be useful to other scientists when made publicly available. The goal of the project is to create a 3D molecular map of the mouse brain; its constructed through painstakingly imaging slices of the brain.
Read the full story at IDG News Service | <urn:uuid:44ccbb46-0cae-4382-97ad-71397f5a24cf> | {
"date": "2015-05-28T10:58:44",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929272.95/warc/CC-MAIN-20150521113209-00249-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9506018757820129,
"score": 2.609375,
"token_count": 98,
"url": "http://www.eweek.com/print/c/a/Database/RAM-Limitations-Strain-BioIT"
} |
Scallop, Mexican Bay
Mexican Bay Scallops are distributed from Baja California, Mexico to Northern Peru, including both sides of the Baja California Peninsula. They grow quickly, reach sexual maturity around 6 months of age and produce many eggs.
After heavy fishing pressure that caused numbers to drop considerably, Mexican Bay Scallops are now at healthy levels of abundance particularly in the main fishing area of Magdalena Bay, Mexico.
In Magdalena Bay, they are collected by hand by commercial divers, causing no damage to the seafloor and little to no bycatch. | <urn:uuid:701fe96c-a2a5-4236-a7c1-25d2a041acfe> | {
"date": "2013-05-23T19:09:28",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9451985955238342,
"score": 2.828125,
"token_count": 121,
"url": "http://blueocean.org/seafoods/scallop-mexican-bay/?showimg=521&imgpage=2"
} |
Renewed Push To Raise Awareness About H1N1
POSTED: Wednesday, January 13, 2010 - 7:43am
UPDATED: Wednesday, February 17, 2010 - 2:26pm
There's a renewed push to vaccinate against the H1N1 during "National Influenza Vaccination Week."
The Department of Public Health's Joanne Bates stopped by NewsChannel Nine Today this morning to address some myths that have surfaced about H1N1:
1.) "The 2009 H1N1 influenza vaccine isn't safe"
TRUTH: The 2009 H1N1 influenza vaccine is showing a similar safety profile to seasonal flu vaccines, which have a very good safety track record.
2.) : "There are too many side effects after getting the 2009 H1N1 influenza Vaccine"
TRUTH: The 2009 H1N1 vaccine is made the same way as seasonal flu vaccines. Millions of seasonal flu vaccines have been given safely. Millions of people have also safely received the 2009 H1N1 vaccine.
3.) "The flu season is pretty much already over"
TRUTH: It is not possible to determine the peak of the influenza season until the flu season is over. Influenza activity typically does not reach its peak in the U.S. until January or February.
If you would like to get more information on where you can get the vaccine, call 771-5759. | <urn:uuid:7abc9f0a-cd3d-49d8-adbe-db06a6d6a402> | {
"date": "2014-12-18T04:43:13",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802765610.7/warc/CC-MAIN-20141217075245-00155-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.968751072883606,
"score": 2.640625,
"token_count": 294,
"url": "http://www.ktsm.com/news/swine-flu/renewed-push-raise-awareness-about-h1n1"
} |
Mangos are delicious, but mango trees cannot be grown in every yard. Mango trees are native to Southeast Asia, and to thrive and fruit, they must be grown in a similar tropical or subtropical climate. In the United States, that translates to growing zones 10 and 11. Before you plant, contact your local county extension office or garden center expert to discover if your yard is a suitable place for a mango tree. Once you get the green light, invest in a quality, certified, disease-free mango sapling. This is the best way to guarantee tasty, abundant mango crops.
Remove the grass and plant roots around the planting area in a 3- to 10-foot diameter.
Dig a hole that is three times the diameter and depth of the container that the mango is currently growing in.
Mix the excavated soil with compost in a 1-to-3, compost-to-soil ratio.
Remove the mango tree from its container. Loosen the roots by pulling them gently away from the root ball with your hands. Prune any roots that are broken, withered and dead or mushy and diseased.
Plant the mango tree in the hole so that it is at the same level in the ground as it was in the container. Backfill the hole with some of the amended soil first so the mango tree's root crown is an inch or so above the surrounding soil. Then fill the soil in around it and compact it a bit by walking over it. Do not cover the top of the mango tree's roots with more than 1 inch of soil.
Water the planting area until the soil is moist to the depth of the mango's roots. Run a slow hose near the base of the tree. If water puddles at the surface, turn down the water. Use a wooden dowel to measure the moisture depth every half-hour or so. Continue to keep your mango tree consistently moist to this depth until it establishes itself and produces new growth. Check the moisture depth daily (twice daily when the temperatures are high) and water when necessary. | <urn:uuid:0eed5a6c-2da9-46fd-ae0b-9b3fec6b96e8> | {
"date": "2017-09-23T13:05:48",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689661.35/warc/CC-MAIN-20170923123156-20170923143156-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9297159314155579,
"score": 3.34375,
"token_count": 426,
"url": "http://www.gardenguides.com/126982-plant-mango.html"
} |
Wednesday, 27 November 2013
Last Supper in Ponders End
The altarpiece, painted by the Sienese artist Ugolino da Nerio at sometime in the 1320s was brought to England by William Young Ottley. He's generally described basically as a "collector" though he made a large amount of money out of dealing in art; he sold a collection of old master drawings to his friend Thomas Lawrence, President of the Royal Academy and enthusiastic spender of money he didn't have, for £8,000. Ottley had spent some years in Italy and taken advantage of the chaos caused by the Napoleonic wars to gather a considerable art collection. The altarpiece was removed from the high altar in the 1560s to make way for a ciborium designed by Giorgio Vasari. In 1785 it is recorded in the friars' dormitory at Santa Croce, but by 1810, when the monastery was suppressed it had already gone, most of the parts sold to Ottley.
Following his return to England, Ottley he sold all the later paintings he'd acquired in Italy, but hung on to the early ones, including the Santa Croce panels, including the central image of the madonna and child, which is now lost.
In 1847, following Ottley's death, his collection was offered at auction. Most of the Santa Croce panels were unsold, but were auctioned again in 1850. Six of the seven panels of the predella - the strip of scenes from along the bottom of the altarpiece, and four other panels from a higher level, each showing two saints were bought by a clergyman called John Fuller.Russell. The incumbent (even more technically the "perpetual curate) of the church of St James Enfield Highway, just up the road from Ponders End, Russell was a member of the high church Ecclesiological Society, which he'd joined as an undergraduate at Cambridge (where he read law), when it was still called the Cambridge Camden Society. His high church tendencies seem to be a reaction against his background; his father was a Congregationalist minister, who went by the name of Thomas Russell, although his surname was originally Clout, and John Fuller Russell was only baptised into the Church of England while he was a student. The Ecclesiological Society, was a group of Anglicans dedicated to the revival of ancient - that is pre-Reformation - styles of art, architecture, ritual and music in the church of England. Pugin, or at least his rhetoric was an important early influence on their aesthetic outlook, but they were disappointed with the buildings he actually put up, which they severely criticised in their spendidly outspoken magazine "Ecclesiologist". There were, in any case, always equivocal about Roman Catholicism.
There isn't actually a great deal about painting in the "Ecclesiologist", but early Renaissance art was one of Russell's great enthusiasms. When the German art historian Gustav Waagen visited Russell in Ponders End, he found the walls of Eagle House "so richly adorned with specimens of the 14th century, that the spectator feels as if transported to a chapel at Siena or Florence." Eagle House was near the corner of South Street and the High Street, just opposite where Tesco's is now.
In 1856 Russell became the rector of Greenhithe in Kent, and had increased his collection significantly by the time Waagen visited him there a few years later, new acquisitions including the "Diptych of Jeanne de France" then believed to be by Hans Memling (now in the Musée Condé in Chantilly). He was rector of Greenhithe for the rest of his life, but also had a London house, in Ormonde Terace, Regent's Park, where he died. I don't know how he afforded his collection; there's no indication of family wealth, and its hard to imagine his salary from the church was that great. Perhaps, if you were careful and had a good eye, collecting the kind of things he liked actually wasn't that expensive.
Russell's collection of paintings was auctioned in April 1885. The Santa Croce paintings went their various ways. Several of the predella panels are in the National Gallery in London: The Arrest of Christ, "The Way to Calvary" and the "Depostion". The gallery also owns the "Resurection", which was not in Russell's collection. The "Last Supper" is in the Metropolitan Museum in New York, and the "Flagellation" and "Entombment" are in Berlin.
[Sources: DNB entries for Ottley and Russell; Familysearch; Waagen;"The Ecclesiologist"; John Pope Hennessey "Italian Paintings from the Robert Lehman Collection"; Stuff I made up.] | <urn:uuid:568c4291-9afb-4e6d-9ce6-d8a8221dfe5a> | {
"date": "2017-10-19T18:10:19",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823360.1/warc/CC-MAIN-20171019175016-20171019195016-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9871556162834167,
"score": 2.703125,
"token_count": 1008,
"url": "http://thisuseless.blogspot.com/2013/11/last-supper-in-ponders-end.html"
} |
The process of converting a document or a piece of text from one language, i.e. the source language to the target language is called language translation. The language translation is done by a qualified language translator.
A language translator is a person who has the education and special training in language translation. We often use language translations in the areas like: publication, in the making educational materials, and in publicising anything in international market.
Various translation companies are now available online also. You may search for their website on the internet. You just have to type your query with location, for example if I am searching translation services in salt lake city, I would type ‘translation services salt lake city’ on my Google search box.
Professional Translation Uses
We may use professional translation in various aspects of communication, like it is used for translating a book into some other language for publication, for interaction with foreign clients, for building websites in foreign language to attract a new slice of clients, or for transforming educational materials in another language.
Professional language translation provides an advantage to the companies over their competitors when they can communicate with their international clients in the customer’s’ own language without any difficulty.
In some cases people may hire professional translators to do their work because they cannot do it themselves. If you are the person who falls in this category, you might like to visit http://www.inlinguautah.com/language-school/ for hiring efficient professional translators.
Expertise of a Worthy Professional Language Translator
The most important things that you should really look for in professional language translator are as follows:
- The fluency of the person in both the source and the target language
- Knowledge with the subject matter which has to be translated
- A good understanding of the different associations between the target and the source languages
- The person must be able to decide when to translate accurately and when to summarise | <urn:uuid:df99067e-064d-4713-a067-b48a3b7c90ec> | {
"date": "2018-05-27T13:40:04",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868316.29/warc/CC-MAIN-20180527131037-20180527151037-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9334996342658997,
"score": 2.8125,
"token_count": 396,
"url": "http://marketingknowledgeresource.com/language-translation-need-hour/"
} |
INSECT IN AMBER
Fossils in amber are some of the most intriguing remains of ancient organisms anywhere in the rock record. Amber is fossilized tree sap (resin). Fossilized tree resin is technically called resinite. This piece of amber comes from the Baltics. Baltic amber is some of the most famous on Earth. Amber specimens from different localities are often given different varietal names. Baltic amber is a type of resinite often called succinite. Some amber has body fossil inclusions, and some doesn't. The amber itself is a biogenic product, not a body fossil.
The Baltic amber shown below has a nice fossil inclusion. The insect is a fly (Class Insecta, Order Diptera).
Insect in Baltic amber (polished; 16 mm across) from the Eocene of Yantarnyi, western Russia.
Note that this fossil fly is covered in a whitish milky material. That is a decay coating. This is commonly encountered in Baltic amber, and is one diagnostic method of identifying genuine succinite (there’s lots of fake amber fossils out there). This amber specimen also has lots of minute, stellate trichomes (not visible in photo) that are also unfakeable (I think). They are the “down”, the epidermal hairs on flowers & leaf buds from ancient oak trees. These are abundantly preserved in genuine Baltic amber.
Stratigraphy: “Blue Earth layer”, “Amber Formation”, Lutetian Stage, lower Middle Eocene.
Locality: Yantarnyi, coastal western Samland Peninsula, western Kaliningrad District, Baltic Sea, far-western Russia. | <urn:uuid:b901d3a3-29b7-4702-91e5-196aab1e68e9> | {
"date": "2014-04-19T06:52:21",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00083-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9170625805854797,
"score": 3.3125,
"token_count": 355,
"url": "http://www.newark.osu.edu/facultystaff/personal/jstjohn/Documents/Cool-fossils/Baltic-amber-insect.htm"
} |
Pinchot graduated from Yale in 1889 and studied at the National Forestry School in Nancy, France, and in Switzerland, Germany, and Austria. Upon his return home in 1892, he began the first systematic forestry work in the United States at Biltmore, the estate of George W. Vanderbilt, in North Carolina. In 1896 he was made a member of the National Forest Commission of the National Academy of Sciences, which worked out the plan of U.S. forest reserves, and in 1897 he became confidential forest agent to the Secretary of the Interior. In 1898 he was appointed chief of the Division, later Bureau, of Forestry and then the Forest Service (created 1905) in the Department of Agriculture, which office he held under Presidents William McKinley, Theodore Roosevelt, and William Howard Taft, until 1910. During his administration the entire forest-service system and administrative machinery were built up, and Pinchot’s enthusiasm and promotional work did much for the conservation movement in general. He also served as a member of the Public Lands Commission, which he initiated in 1903, and the Inland Waterways Commission (1908). In 1908 he became chairman of the National Conservation Commission. He founded the Yale School of Forestry at New Haven, Conn., as well as the Yale Summer School of Forestry at Milford, Pa., and in 1903 became professor of forestry at Yale. In 1920 he was appointed state forester of Pennsylvania and began a systematic administration of the forest areas of that state.
With Theodore Roosevelt, Pinchot helped to found the Bull Moose Party in 1912. From 1923 to 1927 and from 1931 to 1935 he was governor of Pennsylvania. In his first term he forced a reorganization of the state government and the establishment of a budget system. He settled a coal strike by arbitration in 1923.
Pinchot’s autobiography, Breaking New Ground, was published posthumously in 1947. | <urn:uuid:3342409d-2913-413c-8668-b798a3928544> | {
"date": "2015-01-31T19:25:03",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122030742.53/warc/CC-MAIN-20150124175350-00237-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9810073375701904,
"score": 3,
"token_count": 386,
"url": "http://www.britannica.com/EBchecked/topic/460836/Gifford-Pinchot"
} |
San Diego State University
Richard Griswold del Castillo
Description of course
This class will involve the study of the history of Chicanos since 1848 using Chicano Park as a point of departure for research and study. The main emphasis of the class will be to survey the major themes of Chicano history that are suggested by the murals of Chicano Park in Barrio Logan San Diego, and to do research on the park in order to contribute to its preservation by revealing the rich artistic and cultural legacy its embodies. A major portion of this class will involve field research, traveling out of the university environment to do research as well as for field trips. You will be asked to do a sign)ficant original research project on a topic associated with Chicano Park. In addition you will be expected to read major published work in Chicano and Mexican social, political and artistic history.
Under the supervision of Kathleen Robles students will be assigned or will choose a research topic associated with Chicano Park. The research project wil; be due on the 12th week of the class along with individual or group oral presentations to the rest of the class. Where appropriate written work will be entered into the Chicano Park home page.
The following are assigned readings for the class:
David Carrasco, Religions of Mesoamerica (New York: Harper Row, 1990).
Articles on electronic and regular reserve
* Richard Griswold del Castillo and Richard Garcia. Cesar Chavez: A Triumph of the Spirit (Norman: University of Oklahoma Press, 1995).
* Philip Brookman," El Centro Cultural de la Raza Fifteen Years," Made in Aztlan (San Diego: Centro Cultural de la Raza, 1986).
* Shifra Goldman and Tom…s Ybarra Frausto, "Introduction," Arte Chicano (Berkeley: Chicano Studies Library Publications Unit, 1985).
* Pamela Jane Ferree, "The Murals of Chicano Park, San Diego California," Masters Thesis, SDSU, 1994.
* Jeanette RodrĂguez, Our Lady of Guadalupe: Faith and Empowerment among Mexican-American Women (Austin: University of Texas, 1994).
* Jose Vasconcelos, "La Raza Cosmica," Vol. I, Pensamiento Mexicano. CSULA. Chicano Studies Department, 1979).
* James Diego Vigil, Barrio Gangs: Street Life and Identity in Southern California, Ch. 2-3 (Austin: University of Texas, 1988).
* Richard Griswold del Castillo and Carlos Larralde. "Luisa Morreno: A Hispanic Civil Rights Leader in San Diego," Journal of San Diego History, 41, no. 4 ( 1995).
* Richard Griswold del Castillo, The Treaty of Guadalupe Hidalgo: A Legacy of Conflict (Norman: University of Oklahoma Press, 1990).
1. Essay exams: There will one final exam in the class which will be a take home exam. Short essay quizzes will be given periodically to test you on the readings.
2. Attendance - You are responsible for all assignments and changes in the syllabis which are made during the semester. If you miss a class sessions it is your responsiblity to find out what you have missed. We will give periodic quizzes on readings, lectures and audio-visual presentations. These quizzes cannot be made up, so your penalty for being absent on any given day will be equivalent to the number of quiz points assigned for that day. Late quizzes will be discounted points.
3. Return of papers - We will bring corrected quizzes and papers to class once for return to you. If you fail to pick them up then, you may pick them up in any office during office hours.
4. Movies, videos - whenever we have a film or guest lecture, we will ask that you write out acritique of the movie or Iecture. This critique should be to evaluate the movie or lecture in light of the readings or lectures. It will be due the next class session.
5. Extra class activities - There will be several events taking place outside of class time that you will be asked to attend for class credit (of if it is not possible for you to attend, then to complete an ancillary assignment): these will include lectures at the Centro Cultural de la Raza and Chicano Park Day and other events. Credit for attending these events will be given.
6. Policy on Field trips - You are not required to attend field trips. If you do not choose to attend a field trip. you must cormplete the supplementary assignment to get credit.
Grading policy - The relative weighting of grades in this class is as follows:
Quizzes 100 pts. +
Schedule of Readings and Lecture Topics
Week 1 Introduction to class: terminology and geography
Week 3: Precolumbian Mexico and Chicano Park
Meet with Kathleen Robles to get research topics
Week 4: Precolumbian Religions
Week 5: Mexican history and Chicano Park
Week 6: Mexican history and Icons of Struggle
Week 7: The struggle in the fields:
Week 8 Chicano mural art history - an overview
Week 9: Chicana history
Week 10 Chicana/o history in San Diego
Week 11: The Chicana/o movement
Week 12: Mexico and Aztlan - The Chicano/ Mexicano Relationship
Week 13 Contemporary Issues and Chicano Park
Week 14: The future of la raza
Week 15: Conclusions
Some Murals in Chicano Park Corresponding to Topics in Chicano History
(Numbers refer to Master`s thesis of Jane Ferree)
I Precolumbian history
II Mexican history
IV Chicana history
V. San Diego Chicano history
Vl. Chicano history in the Southwest
MAS 350B Research Project
Note: failure to accomplish the tasks by the stated deadlines will result in a loss of points on the total project
Week 4 - Select topic or get assigned topic; turn in to class a title and paragraph description of what you envision to he the work you wil1 have to do on this topic. Present to the class a brief overview of your topic, why you selected it, what your thoughts are about it, preliminary views and approaches, how do you intend to do the research? Sign up for a schedule of appointments to meet with professors ahout the research project.
Week 5 - 12 Meet with Kathleen Robles/ Richard Griswold del Castillo as scheduled to work on research for Chicano Park
Week 13 - Be prepared to present in class an oral presentation of your project.
Week 15 - Turn in final draft of research project.
The final project format
I ) If it is a written research project it must be no less than 6 pages in length and follow the standard format for a research paper.
2) If it is some other kind of project (internship, research assistance, ect) submit a written report spelling out what you did and what you have learned of no less than three pages | <urn:uuid:74945ff3-adfe-49ff-8cba-c61085ee02ae> | {
"date": "2018-05-23T09:06:46",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865468.19/warc/CC-MAIN-20180523082914-20180523102914-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8793854713439941,
"score": 2.828125,
"token_count": 1495,
"url": "http://chicanoparksandiego.com/course/syllabus.html"
} |
Apples — right off the tree, baked in a pie, pressed into cider or mashed into sauce — are a basic element of American culture. October is the month to celebrate them, thanks, in part, to Johnny Appleseed.
You've probably heard of the legendary character who traveled the Midwest planting trees, but he's not a myth. Johnny Appleseed's real name was John Chapman, and he was born in Massachusetts in either 1774 or 1775.
He was first noticed by history in 1801 when he arrived on horseback at the farm of John Stedden in Licking Creek, Ohio. Stedden thought Chapman was rather eccentric, but he listened to the man's plans to head west and plant apple seeds along the way for future settlers.
Five years later, another Ohio settler encountered Johnny Appleseed. Chapman had lashed two canoes together, filled one with apple seeds and was paddling along the Ohio River. He was barefoot, dressed in rags, and wore a tin pot on his head as a hat. Chapman was doing what he had told Stedden he would, traversing the country, pushing farther west each year. Wherever he found a suitable spot, he planted apple seeds and educated farmers about nurseries and orchards.
Chapman was a vegetarian and, by all accounts, a caring and compassionate — if somewhat odd — man. For more than 40 years, he traipsed the fields and forests from Pennsylvania to Illinois, spreading the word about apples until his death in 1845. A memorial grave site in Fort Wayne, Ind., has a stone marker bearing the motto, "He lived for others."
Copyright 2012 National Public Radio. To see more, visit http://www.npr.org/. | <urn:uuid:cbd22896-a85b-4207-8970-501c37c801d2> | {
"date": "2014-10-23T08:49:40",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507454577.44/warc/CC-MAIN-20141017005734-00121-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9743971228599548,
"score": 2.9375,
"token_count": 364,
"url": "http://wamu.org/news/12/10/20/the_strangely_true_tale_of_johnny_appleseed?width=605&height=485&inline=true"
} |
There’s some interesting information of the six month trend of neutrons being detected globally that I want to bring to discussion, but first I thought that a primer on cosmic rays, neutrons, and their interaction with the atmosphere might be helpful to the many layman readers here. – Anthony
Cosmic rays are energetic particles that originate in space and our sun and collide with particles as they zip through our atmosphere. While they come from all directions in space, and the origination of many of these cosmic rays is unknown, they has recently been shown that a larger percentage emanate from specific deep space sources. Cosmic rays were originally discovered because of the ionization they produce in our atmosphere. They cause ionization trails in the atmosphere much like you see in a simple science project called a cloud chamber, shown below:
Using the Wilson cloud chamber, in 1927, Dimitr Skobelzyn photographed the first ghostly tracks left by cosmic rays.
In the past, we have often referred to cosmic rays as “galactic cosmic rays” or GCR’s, because we did not know where they originated. Now scientists have determined that the sun discharges a significant amount of these high-energy particles. “Solar Cosmic Rays” (SCR’s – cosmic rays from the sun) originate in the sun’s chromosphere. Most solar cosmic ray events correlate relatively well with solar flares. However, they tend to be at much lower energies than their galactic cousins.
Because Earth’s atmosphere also reacts much like the ionization trail effect seen in the Wilson cloud chamber, scientists such as Svensmark have postulated that galactic cosmic rays can affect the earth by causing changes in weather and possibly long term climate. Moving at close to the speed of light, these nuclear fragments smash into air molecules hard enough to knock electrons loose. This well-documented process creates negatively and positively chargedions.
Like the cloud trails seen in the Wilson cloud chamber, cosmic ray ionization trails in our atmosphere can act as cloud seeds. Some studies suggest that ions play a central role in creating aerosols. Aerosols are minute but important atmospheric particles that can serve as the cores of growing cloud droplets. Aerosols can cause clouds to form in the upper atmosphere, after the particles collide with other atmospheric particles in the troposphere and conglomerate into larger particles.
Aerosols: Many atmospheric aerosols are liquid droplets containing dissolved sea salt from sea spray, sulfuric acid (H2SO4), organic molecules from trees and plants, and other compounds. Over agricultural and urban areas, dust and soot are common aerosols Soot particles emanate from incomplete combustion of fuels such coal, wood, oil, jet fuel, and kerosene. Soot consists chiefly of amorphous carbon and tar like substances that cause it to adhere to surfaces. Both liquid and solid aerosols help clouds develop by encouraging the condensation of water vapor, which does not occur readily without an original seed particle of some sort in the air.
A cosmic ray, especially a high energy one from deep space, can cause an entire family tree of smaller particles and ionization trails. See this animation below created by the Cosmus group at the University of Chicago.
The process of a cosmic ray particle colliding with particles in our atmosphere and disintegrating into smaller pions, muons, and the like, is called a cosmic ray shower. These particles can be measured on the Earth’s surface by neutron monitors.
Neutron Monitors. Ground-based neutron monitors detect variations in the approximately 500 Mev to 20 GeV portion of the primary cosmic ray spectrum.
(Note: 1 Mega electron Volt = 1.60217646 × 10-13 joules)
This class of cosmic ray detector is more sensitive in the approximate 500 Mev to 4 GeV portion of the cosmic ray spectrum than are cosmic ray muon detectors. The portion of the cosmic ray spectrum that reaches the Earth’s atmosphere is controlled by the geomagnetic cutoff which varies from a minimum (theoretically zero) at the magnetic poles to a vertical cosmic ray cutoff of about 15 GV (ranging from 13 to 17) in the equatorial regions. (Note: GV is a unit of magnetic rigidity. Magnetic rigidity is a particle’s momentum per unit charge. It is the relevant quantity for characterizing a cosmic ray’s ability to penetrate Earth’s magnetic field.).
The primary cosmic ray particles interact with the atmosphere and generate secondaries, some of which will reach the surface of the Earth.
When the secondary cosmic rays interact in the monitor, (actually in lead surrounding the counters) they cause nuclear disintegrations, or “stars”. These stars are composed of charged fragments and neutrons typically in the energy range of tens to hundreds of MeV (million electron-volts), even up to GeV energies. As a result of these high energy nuclear interactions, there will be more secondary fragments generated than incident particles and hence there is a multiplier effect for the counters. The neutrons are moderated and then counted using Boron tri-fluoride (BF3) proportional counters which are efficient thermal neutron detectors; hence the name neutron monitor.
The original design by Simpson is often designated as an IGY neutron monitor. From that link:
John A. Simpson, at the University of Chicago, invented and developed the neutron monitor over the years 1948-50 and found that the Earth’s magnetic field could be used as a spectrometer to allow measurements of the cosmic ray spectrum down to low primary energies. The magnetic latitude of a particular neutron monitor determines the lowest magnetic rigidity of a primary that can reach the monitor, the so-called “cut-off rigidity”. The station’s altitude determines the amount of absorbing atmosphere above the station and hence the amount of absorption of the secondary cosmic rays (the higher the station, the higher the counting rate). By using a combination of lead (to produce local interactions), paraffin or polyethylene (to moderate or slow down the neutron component) and multiple slow-neutron counters, Simpson greatly increased the counting rate in his monitor design.
The worldwide network neutron monitors that have since been established gather data that have shown there is a correlation between periodic solar activity and the earthly neutron count. For example:
This plot shows data from the Climax, Colorado neutron monitor operated by the University of Chicago. The cosmic rays show an inverse relationship to the sunspot cycle because Sun’s magnetic field is stronger during sunspot maximum and shields the Earth from cosmic rays.
Right now we are near the solar minimum, but neutron counts are still increasing. The current science says that if we had passed solar minimum, neutron counts should be decreasing.
Michael Roynane writes today:
The Bartol Research Institute of the University of Delaware manages five real-time neutron monitors, at widely dispersed locations, all of which indicate that over the last six months cosmic rays are increasing. This would not support the hypothesis that we are past solar minimum and suggests that solar minimum has not yet been reached.
Links to the Bartol Research Institute of the University of Delaware: | <urn:uuid:b23cebc7-a935-4f6d-83aa-a0f6c8d7d61b> | {
"date": "2013-12-06T15:19:03",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051992/warc/CC-MAIN-20131204131731-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9149189591407776,
"score": 3.34375,
"token_count": 1484,
"url": "http://wattsupwiththat.com/2009/03/15/cosmic-ray-flux-and-neutron-monitors-suggest-we-may-not-have-hit-solar-minimum-yet/"
} |
Ensuring that wildlife and the environment is protected once the UK leaves the EU is of key importance as the green agenda battles amidst a myriad of competing interests as part of Brexit negotiations.
To help speak up for nature at this critical time, BC is pleased to join Greener UK, a coalition of 13 organisations who have come together to ensure the environment doesn't get forgotten about post-Brexit.
EU directives have pushed UK governments into action to clean up beaches and rivers and have provided strong protections for birds and habitats, including some important butterfly sites across Europe.
In the UK, the threatened Marsh Fritillary is one of many examples of species that have benefitted directly from these protections. The issues facing our pollinators have also been pushed into the spotlight recently, with EU support for further research into the decline of butterfly, bee and moth numbers, such as finding out about the impact of Neonicotinoid pesticides on insects.
Butterfly Conservation do not want this progress to be lost, which is why we have become part of the Greener UK’s call on the Government to restore and enhance the UK’s environment and maintain its environmental protections during Brexit negotiations.
BC Chief Executive, Dr Martin Warren, said: “Much of our wildlife legislation has been framed by the EU in recent decades and it is vital that we maintain strong protection for nature after we leave the EU. Butterflies and moths are under articular threat so we need a strong Government framework if we are to conserve them and other wildlife in decades to come.”
- Around 145 MPs have now backed the Greener UK pledge
- Four out of five people in the UK say that they would like to see environmental protections maintained or strengthened.
The core organisations BC is supporting as part of Greener UK include: Campaign for Better Transport, ClientEarth, CPRE, E3G, Friends of the Earth, Green Alliance, Greenpeace, National Trust, RSPB, The Wildlife Trusts, The Woodland Trust, WWF, and Wildfowl & Wetlands Trust. | <urn:uuid:4f85dcf0-406c-4de0-92f2-6854d5bcb73b> | {
"date": "2017-07-23T12:54:41",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424559.25/warc/CC-MAIN-20170723122722-20170723142722-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9476593136787415,
"score": 2.875,
"token_count": 421,
"url": "http://butterfly-conservation.org/48-14050/environmental-organisations-unite-for-a-greener-uk.html"
} |
Production of Ice Flakes
A sheet of ice 2-3 mm thick is formed by spraying water on the surface of a refrigerated drum, and scrapping it off to form dry sub-cooled flakes, usually 100-1000 mm2 in area. In some models the drum rotates against a stationary scrapper on its outer surface; in others the scrapper rotates and removes ice from the inner wall of a double walled stationary drum.
In some models the drum is horizontal, but more usually it is mounted vertically. No water is sprayed on that part of the drum immediately before the scraper , so that the ice becomes dry and sub cooled prior to removal.
Refrigerant temperature, drum or scraper speed, and degree of sub cooling are all variable with in design limits so that the capacity of the ice maker and the thickness of the ice can be altered.
Typical refrigerant temperature in a flake ice machine is – 20 to – 25 C , lower then in most other types of ice maker, to give rapid cooling and thus make the machine compact. The low operating temperature requires more power, but this is to some extent compensated for by the absence of a need to defrost.
The plant is located in Busia Municipality in Eastern part of Uganda. Busia town right at the border with Kenya and one of the two main transit routes linking the port of Mombasa to Uganda, Rwanda, Democratic Republic of Congo and Southern Sudan.
The other access route is Malaba town which is about 20 KM North of Busia Town. | <urn:uuid:002c48f4-c2c9-4084-a352-b51bc336e7ba> | {
"date": "2019-08-24T21:08:01",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027321696.96/warc/CC-MAIN-20190824194521-20190824220521-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9512932300567627,
"score": 3.296875,
"token_count": 319,
"url": "http://www.bufa-uganda.com/ice-flakes-plant/"
} |
Why are Fatah and Hamas suddenly uniting?
Briefing: The rival Palestinian parties have surprised observers by striking a unity deal
Rival Palestinian political parties Fatah and Hamas have struck a unity deal which will see Palestinians in the parties' respective domains, the West Bank and the Gaza Strip, hold their first joint election in five years.
The news has received mixed reactions, largely due to the involvement of Hamas, which many countries consider to be a terrorist organisation.
Yossi Mekelberg, associate fellow for the Middle East programme at Chatham House, told The First Post: "The question is not whether Hamas will be involved, but how it will operate in its involvement, and whether they are willing to change."
But what are Fatah and Hamas, and will this deal actually change anything in the Middle East?
WHAT IS HAMAS?A militant Islamic political party founded in 1987, originally as an offshoot of the Muslim Brotherhood, Hamas is led by Khaled Mashal and Ismail Haniyah.
Hamas demands a complete withdrawal of Israeli forces from the territories occupied during the 1967 war, and full recognition of the rights of the refugees expelled from Israel since 1948. Its founding charter calls for the destruction of Israel, which it has always refused to recognise.
Consistently excluded from mainstream political activity in Palestine by rival party Fatah, Hamas managed to win the majority of the seats in the 2006 election. Civil war ensued, and in May 2007, it used force to seize power in the Gaza Strip, which it has ruled with an iron fist ever since.
WHAT IS FATAH?A secularist political party formed in exile under Yasser Arafat in the 1950s, Fatah was founded as a resistance group against Israel and was behind thousands of violent attacks on settlers, soldiers and Israeli citizens in the 1960s and 70s. It is the current ruling party in the West Bank.
In 2003, at the height of the second intifada, Fatah agreed to commit to peace. Since then it has actively worked with Israel and the US to ensure Israel's security, to the chagrin of many Palestinians.
The current leaders, Mahmoud Abbas and Salam Fayyad, are widely held to be the most moderate Palestinians have ever had. As a result, Fatah is the recipient of huge sums of aid from the US, and is seen by most Palestinians as corrupt and ineffectual.
WHAT DOES THE DEAL MEAN?Most of the details remain unknown, but it is clear elections will be held in December. In the meantime, a caretaker government with members chosen by both parties will be formed. A board of 12 impartial technocrats will be assembled to oversee the elections.
There were also hints of a prisoner release deal, a combined security force organised by a joint Hamas-Fatah defence committee, and the re-activation of the Palestine Liberation Organisation (PLO) to include Hamas for the first time.
Worryingly, Mahmoud Zahar, the Hamas foreign minister, has said the deal "does not include negotiations with Israel or recognizing it", suggesting a huge divide remains between the parties over how to deal with Israel.
WHY ARE FATAH AND HAMAS DOING THIS?Despite its designation as a terrorist organisation, Hamas was democratically elected to power in 2006, so their participation in the peace process has long been seen as necessary. With a UN vote on independently recognising Palestinian statehood due in September, such a deal is an important step towards making their plea more credible.
Palestinians have always called for unity among their political parties, division between whom is pointless while the state struggles for independence. There were a number of protests demanding this in the West Bank in March and more were planned for May.
Regional changes also seem to have played a part. Unrest in Syria has left Hamas unsure of continuing support from Bashar al-Assad's government, while the toppling of Hosni Mubarak in Egypt has provided further space for negotiations.
WHAT DOES ISRAEL THINK? Prime minister Benyamin Netanyahu said: "The Palestinian Authority must choose either peace with Israel or peace with Hamas. There is no possibility for peace with both."
He emphasised that Hamas explicitly aspires to destroy the state of Israel, and said that, "the idea of reconciliation with Hamas demonstrates the weakness of the Palestinian Authority and makes one wonder whether Hamas will seize control of Judea and Samaria [the West Bank] the way it seized control of the Gaza Strip."
Concerns have already been raised about the ability to share intelligence on terrorists with a defence committee that includes Hamas. Israel has spent a lot of time working with the PA to safeguard its security, and this will be a huge blow to them.
Foreign minister Avigdor Lieberman voiced concern at the prisoner release element, "which would flood the West Bank with armed terrorists and the IDF must prepare accordingly".
On the other hand, this could signify that Hamas is ready to move to a more mainstream, moderate position, a blessing at a time when rocket attacks from Gaza have seen a sharp increase.
WHAT DOES EVERYONE ELSE THINK?The US came out loud and clear: "The United States supports Palestinian reconciliation on terms which promote the cause of peace. Hamas, however, is a terrorist organisation which targets civilians.
"To play a constructive role in achieving peace, any Palestinian government must accept the Quartet principles and renounce violence, abide by past agreements, and recognize Israel's right to exist."
The British Foreign Office remained more reserved, saying only that, "We are examining the detail of the agreement. Intra-Palestinian reconciliation remains a critical component of the peace process."
Mostly, however, the deal has been greeted with scepticism. The promise of elections means nothing if the legitimate result is again not recognised due to Hamas participation. Similarly, it is hard to see how a unity government can exist between two physically separate territories between which travel is heavily restricted.
Writing on Electronic Intifada, Ali Abuminah asked: "Can such opposing forces really be combined without the Abbas side either renouncing its close ties to the Israeli military, or the Hamas side abandoning any commitment to resistance?" · | <urn:uuid:82f1df97-c9f1-4424-a064-6a06ce608384> | {
"date": "2014-09-01T08:18:21",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00412-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9595840573310852,
"score": 2.515625,
"token_count": 1272,
"url": "http://www.theweek.co.uk/politics/5913/why-are-fatah-and-hamas-suddenly-uniting"
} |
May 14 2010
Let’s talk about toes.
We have five toes on each foot. Birds have four.
Our five toes point forward. Birds have three that point forward and one that points back(*).
Here a Baltimore oriole is using his toes to perch on the edge of a jelly container. In the first photo it looks like he’s fine with only his front three toes, but in the second you can tell that without his halluces (red arrow) he’d fall into the dish!
If our big toes pointed backward we’d be able to perch on edges too — but then we couldn’t wear shoes.
(* Note: Osprey feet have three toes that point forward and a hallux that points back but osprey can rotate their outer toes backward. This makes a two-toes-front-two-toes-back arrangement that helps them carry fish.)
p.s. See the comments below for more birds who have two-and-two toes.
(photo by Marcy Cunkelman of a Baltimore oriole diving into her jelly container to get a snack) | <urn:uuid:a9b8e057-c247-47d4-83b1-dbb90de909e1> | {
"date": "2015-01-29T22:26:58",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115863063.84/warc/CC-MAIN-20150124161103-00116-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9493855834007263,
"score": 3.203125,
"token_count": 241,
"url": "http://www.wqed.org/birdblog/2010/05/14/anatomy-hallux/"
} |
Bill raises concerns for Native Americans
HR 3189 is an all-out attack against Indian tribes’ land occupancy and water rights as given to us under treaties with the United States of America. It would affect land, water and resources that were taken from the Native Americans. I would like a more clear definition on paragraph 2) “Requiring any water user (including any federally recognized Indian tribe) to apply for a water right in the name of the United States under state law as a condition of such a land use or occupancy agreement.” And also on 6) “limit or expand any existing reserved water right or treaty right of any federally recognized Indian tribe.”
This is what the federal government of the United State says about HR 3189: “The bill threatens the federal government’s longstanding authority to manage property and claims proprietary rights for the benefit of Indian tribes and reserved the federal lands, and the broader public that depends on the proper management of public lands and resources.” Is this just another attempt at another land and water grab? | <urn:uuid:3bc9ef4f-0e92-4f6c-87bc-9154ceb19305> | {
"date": "2016-02-11T19:21:12",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701162648.4/warc/CC-MAIN-20160205193922-00069-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9398270845413208,
"score": 2.828125,
"token_count": 217,
"url": "http://www.cortezjournal.com/article/20140331/Opinion02/140339987/-1/opinion"
} |
As the CDC reports, at least 30% of antibiotics prescribed in hospital clinic, doctor's offices and emergency departments are unnecessary. This equates to 47 million unnecessary prescriptions written in those settings. Each year in the United States, at least 2 million people become infected with bacteria resistant to antibiotics and at least 23,000 people die as a direct result of the infections.
Such statistics emphasize the need for organizations to develop and maintain antimicrobial stewardship (AMS) programs. As of 2015, about 50% of all hospitals had instituted an AMS program. The White House issued a "National Action Plan to Combat Antibiotic-Resistant Bacteria" in 2015, which included a goal of 100% of hospitals establishing an AMS program by 2020.
CDC provides links to a few websites of hospital AMS programs throughout the country to serve as examples intended to assist organizations with developing their own AMS programs. Included is a link to the AMS program website for the University of Miami and Jackson Memorial Hospitals.
The program is named "GotaBug." The following are steps the program advises hospital staff members to take to help reduce antimicrobial resistance:
- Take an antibiotic "Time Out" as part of your daily rounds
- Reassess antimicrobial therapy based on cultures and susceptibilities
- Pick the correct drug, dose and duration
- De-escalate broad spectrum antimicrobials whenever possible
- Stop antimicrobials when no longer needed
- Get your annual flu shots
- Wash your hands
Florida-based infection control consultant Phenelle Segal, RN, CIC, president and founder of Infection Control Consulting Services (ICCS), and the ICCS team of consultants assist healthcare organizations with the development of AMS programs as part of their ongoing effort to preventing infections. To learn about how ICCS can help your organization, contact ICCS. | <urn:uuid:7f5a0d5f-9261-4793-b03e-a9a620bb182a> | {
"date": "2016-12-06T21:44:56",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542002.53/warc/CC-MAIN-20161202170902-00480-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.94450843334198,
"score": 2.5625,
"token_count": 381,
"url": "http://floridainfectioncontrol.blogspot.com/"
} |
What was man created from, blood, clay, dust, or nothing?
"Created man, out of a (mere) clot of congealed blood," (96:2).
"We created man from sounding clay, from mud moulded into shape, (15:26).
"The similitude of Jesus before Allah is as that of Adam; He created him from dust, then said to him: "Be". And he was," (3:59).
"But does not man call to mind that We created him before out of nothing?" (19:67, Yusuf Ali). Also, 52:35).
"He has created man from a sperm-drop; and behold this same (man) becomes an open disputer! (16:4).
Is there or is there not compulsion in religion according to the Qur'an?
"Let there be no compulsion in religion: Truth stands out clear from Error: whoever rejects evil and believes in Allah hath grasped
the most trustworthy hand-hold, that never breaks. And Allah heareth and knoweth all things," (2:256).
"And an announcement from Allah and His Messenger, to the people (assembled) on the day of the Great Pilgrimage,- that Allah and His Messenger dissolve (treaty) obligations with the Pagans. If then, ye repent, it were best for you; but if ye turn away, know ye that ye cannot frustrate Allah. And proclaim a grievous penalty to those who reject Faith," (9:3).
"But when the forbidden months are past, then fight and slay the Pagans wherever ye find them, and seize them, beleaguer them, and lie in wait for them in every stratagem (of war); but if they repent, and establish regular prayers and practice regular charity, then open the way for them: for Allah is Oft-forgiving, Most Merciful," (9:5).
Fight those who believe not in Allah nor the Last Day, nor hold that forbidden which hath been forbidden by Allah and His Messenger, nor acknowledge the religion of Truth, (even if they are) of the People of the Book, until they pay the Jizya with willing submission, and feel themselves subdued," (9:29).
The first Muslim was Muhammad? Abraham? Jacob? Moses?
"And I [Muhammad] am commanded to be the first of those who bow to Allah in Islam," (39:12).
"When Moses came to the place appointed by Us, and his Lord addressed him, He said: "O my Lord! show (Thyself) to me, that I may look upon thee." Allah said: "By no means canst thou see Me (direct); But look upon the mount; if it abide in its place, then shalt thou see Me." When his Lord manifested His glory on the Mount, He made it as dust. And Moses fell down in a swoon. When he recovered his senses he said: "Glory be to Thee! to Thee I turn in repentance, and I am the first to believe." (7:143).
"And this was the legacy that Abraham left to his sons, and so did Jacob; "Oh my sons! Allah hath chosen the Faith for you; then die not except in the Faith of Islam," (2:132).
Does Allah forgive or not forgive those who worship false gods?
Allah forgiveth not that partners should be set up with Him; but He forgiveth anything else, to whom He pleaseth; to set up partners with Allah is to devise a sin Most heinous indeed," (4:48). Also 4:116
The people of the Book ask thee to cause a book to descend to them from heaven: Indeed they asked Moses for an even greater (miracle), for they said: "Show us Allah in public," but they were dazed for their presumption, with thunder and lightning. Yet they worshipped the calf even after clear signs had come to them; even so we forgave them; and gave Moses manifest proofs of authority," (4:153).
Are Allah's decrees changed or not?
"Rejected were the messengers before thee: with patience and constancy they bore their rejection and their wrongs, until Our aid did reach them: there is none that can alter the words (and decrees) of Allah. Already hast thou received some account of those messengers," (6:34).
"The word of thy Lord doth find its fulfillment in truth and in justice: None can change His words: for He is the one who heareth and knoweth all, (6:115).
None of Our revelations do We abrogate or cause to be forgotten, but We substitute something better or similar: Knowest thou not that Allah Hath power over all things?" (2:106).
When We substitute one revelation for another,- and Allah knows best what He reveals (in stages),- they say, "Thou art but a forger": but most of them understand not," (16:101).
Was Pharaoh killed or not killed by drowning?
"We took the Children of Israel across the sea: Pharaoh and his hosts followed them in insolence and spite. At length, when overwhelmed with the flood, he said: "I believe that there is no god except Him Whom the Children of Israel believe in: I am of those who submit (to Allah in Islam). (It was said to him): "Ah now!- But a little while before, wast thou in rebellion!- and thou didst mischief (and violence)! This day shall We save thee in the body, that thou mayest be a sign to those who come after thee! but verily, many among mankind are heedless of Our Signs!" (10:90-92).
Moses said, "Thou knowest well that these things have been sent down by none but the Lord of the heavens and the earth as eye-opening evidence: and I consider thee indeed, O Pharaoh, to be one doomed to destruction!" So he resolved to remove them from the face of the earth: but We did drown him and all who were with him," (17:102-103).
Is wine consumption good or bad?
O ye who believe! Intoxicants and gambling, (dedication of) stones, and (divination by) arrows, are an abomination,- of Satan's handwork: eschew such (abomination), that ye may prosper," (5:90).
(Here is) a Parable of the Garden which the righteous are promised: in it are rivers of water incorruptible; rivers of milk of which the taste never changes; rivers of wine, a joy to those who drink; and rivers of honey pure and clear. In it there are for them all kinds of fruits; and Grace from their Lord. (Can those in such Bliss) be compared to such as shall dwell for ever in the Fire, and be given, to drink, boiling water, so that it cuts up their bowels (to pieces)?" (47:15).
Truly the Righteous will be in Bliss: On Thrones (of Dignity) will they command a sight (of all things): Thou wilt recognize in their faces the beaming brightness of Bliss. Their thirst will be slaked with Pure Wine sealed," (83:22-25). | <urn:uuid:066d821c-8bf4-433b-b21e-3ec6910cc104> | {
"date": "2016-02-08T00:10:50",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151880.99/warc/CC-MAIN-20160205193911-00076-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9576389789581299,
"score": 2.5625,
"token_count": 1537,
"url": "http://www.getbig.com/boards/index.php?topic=455130.0"
} |
The Early History of the Kilt (http://albanach.org/kilt.html) and Reconstructing History (http://www.reconstructinghistory.com/scottish/18thckilt.html) quote modern scholarship disputing this story with reference to earlier illustrations of the small kilt.
The small kilt developed into the modern kilt when the pleats were sewn in to speed the donning of the kilt.
Military use and proscription
From 1624 the Independent Companies of Highlanders had worn kilts as government troops, and with their formation into the Black Watch regiment in 1740 their great kilt uniform was standardised with a new dark tartan. After 1745 the Government decided to form more Highland regiments for the army in order to direct the energies of Gaels, that "hardy and intrepid race of men". In doing so they formed effective new army regiments to send to fight in India, America, and other locations while lowering the possibility of rebellion at home. As a means of identification the regiments were given different tartans. These regiments opted for the modern kilts for dress uniforms, and while the great kilt remained as undress uniform this was phased out by the early 19th century.
In 1746 after the last Jacobite campaign the "Dress Act" outlawed all items of Highland dress including the new kilts (with an exception for army uniforms). The ban remained in effect for 35 years. and the traditional way of life throughout the Highlands was destroyed.
The revival of the kilt
Although the kilt was largely forgotten in the Scottish Highlands, during those years it became fashionable for Scottish romantics to wear kilts as a form of protest against the ban. This was an age that romanticized "primitive" peoples, which is what Highlanders were viewed as. Most Lowlanders had viewed Highlanders with fear before 1745, but many identified with them after their power was broken. The kilt, along with other features of Gaelic culture had become identified with Jacobitism and now that this had ceased to be a real danger it was viewed with romantic nostalgia. Once the ban was lifted in 1782 Highland landowners set up Highland Societies with aims including "Improvements" (which others would call the Highland clearances) and promoting "the general use of the ancient Highland dress". The Celtic Society of Edinburgh, chaired by Walter Scott, encouraged lowlanders to join this antiquarian enthusiasm.
The kilt became identified with the whole of Scotland with the the pageantry of the visit of King George IV to Scotland in 1822, even though 9 out of 10 Scots lived in the Lowlands. Scott and the Highland societies organised a "gathering of the Gael" and established entirely new Scottish traditions, including Lowlanders wearing the supposed "traditional" garment of the Highlanders. At this time many other traditions such as clan identification by tartan were developed.
After that point the kilt gathered momentum as an emblem of Scottish culture as identified by antiquarians, romantics, and others, who spent much effort praising the "ancient" and natural qualities of the kilt. King George IV had appeared in a spectacular kilt, and his successor Queen Victoria dressed her boys in the kilt, widening its appeal. The kilt became part of the Scottish national identity.
The Kilt Today
Kilts have become normal wear for formal occasions, for example being hired for weddings in much the same way as top hat and tails are in England or tuxedos across the pond, and can be worn by anyone regardless of nationality or descent.
The modern tailored kilt is box-pleated or knife-pleated, with the pleats sewn in and the lower edges reaching not lower than the centre of the knee-cap. Nowadays a lighter weight of cloth tends to be used. The kilt is traditionally for men only, although in the modern era, long women's dresses patterned after kilts do exist, and women pipers frequently wear kilts. Kilten skirts for girls are also worn.
As with any other form of dress, the kilt is subject to the vagaries of fashion. Since the 1980s, kilts have appeared in such materials as leather and denim. Single colours have also been used in place of tartan, particularly by people without Scottish links in countries such as Ireland or the United States. While these garments may be disliked by traditionalists, they provide evidence that the kilt still has a place in the modern fashion world.
As a kilt has no pockets, it is worn with a pouch called a sporran. Originally this was a soft deer skin pouch, but with the development of military uniforms elaborate hard leather sporrans came into use, often with decorative silver tops and white hair facings with large tassels. A decorative silver kilt pin adds weight to the loose bottom corner of the kilt.
A small dagger called a Sgian Dubh may be worn in the tall stockings which form part of the standard clothing worn with a kilt. Shoes are usually leather brogues, sometimes with open lacing.
Nowadays a special jacket is usually worn with the kilt. This is often in green tweed, but with the kilt as formal dress a black "Prince Charlie" jacket is usual.
With some full dress uniforms a plaid is added in the form of a pleated cloth in the same tartan as the kilt, cast over the shoulder and fastened at the front with a plaid brooch.
A good rule of thumb is that kilts should be worn without underwear in daily use, but with it for dancing (when a light kilt may fly up). In practice, underwear is not needed for a fully lined kilt, but may be preferable for an unlined woollen kilt to prevent chafing. In the end whether or not underwear is worn on any particular occasion, is up to the weather, the company, and the individual wearer.
Whatever decision is made, what a Scotsman wears under his kilt is, traditionally, his own business and generally, Scotsmen will be at pains to keep it so. Thus the reply to a question on the topic may hint at the answer but should never state it outright. A good standard reply when asked, is that, "Nothing is worn under the kilt. It's all in perfect working order". | <urn:uuid:7d642dfb-b19c-4809-a856-0492d6904187> | {
"date": "2013-12-07T05:49:53",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053608/warc/CC-MAIN-20131204131733-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9690052270889282,
"score": 4,
"token_count": 1322,
"url": "http://www.apparelsearch.com/Definitions/Clothing/kilt_definition.htm"
} |
Palm Computing founder Jeff Hawkins has developed a controversial theory of how the brain works, and he's using it to build a new race of computers.
CIO INSIGHT: In your book, On Intelligence, you claim to have discovered a new understanding of how the brain works—and how machines can be built to model the brain. It's a powerful idea, but also a controversial one. Can you explain the essence of your theory?
HAWKINS:First of all, the theory explains how the neocortex works—not the entire brain. The neocortex makes up roughly half of a human brain; it's where all high-level thought and perception takes place. It's the place where you perceive the world. And it's a type of memory system, though it's different from that of a computer in that it is composed of a tree-shaped hierarchy of memory regions that store how patterns flow over time, like the notes in a melody. We call this Hierarchical Temporal Memory (HTM).
Computers must be programmed to solve problems, but HTM systems are self-learning. By exposing them to patterns from sensors (just like the neocortex receives information from the eyes and ears), HTMs can automatically build a model of the world. With this model, an HTM can recognize familiar objects and use that data to predict the future. So we're not claiming to build brains here. We are building things that we think can do what half of a human brain does.
How have people reacted to your hypothesis?
If you said to someone that you want to figure out how the brain works and then build machines that work the same way, most people would laugh at you. They'd say it's ridiculous, that people have been trying for decades and haven't made any progress. But it isn't ridiculous. Why shouldn't we be able to figure out how brains work? We understand how kidneys work, and how other organs work, so why not the brain? In fact, it ought to be pretty straightforward. It's only our ignorance that makes things look hard.
So the response to the book has been mixed. We've had a stream of business-oriented researchers who want to talk about it, and several prominent scientists who think this is a landmark book. Many other scientists have dismissed our theory. But a gentleman named Dileep George, who was working at the Redwood Neuroscience Institute [as a graduate research fellow], actually came up with a mathematical formulation for the biological theory in the book. And he did a convincing enough job that we're certain it can be built to solve practical problems. So we started a company called Numenta. Its focus is essentially on building a platform—like an operating system, but different.
What do you expect this platform will be able to do?
We believe that we have come up with a new algorithm, a new way of computing—though it isn't a computer. It's a new way of processing information. HTMs essentially do three things. First, they discover how the world works by sensing and analyzing the world around them. Second, they recognize new inputs as part of its model, which we call pattern recognition. Finally, they make predictions of what will happen in the future. We think we can build machines that are in some sense smarter than humans, that have more memory, that are faster and can process data nonstop, because they use hierarchical and temporal data to predict outcomes—the same way the human brain works.
Now, what do we mean by hierarchical? Well, there's a hierarchical nature to many things—weather and markets and businesses and biological organisms are all structured hierarchically. When you're born, you know almost nothing. Then, over time, you get sensory inputs. Over a period of years, these inputs help you build a hierarchical model of the world. So you start to understand things like words and sentences, chairs and computers and ideas.
Businesses are hierarchical, too—not just the way the people's roles are structured, but how the different parts of a business interact. Let's say I was looking at the manufacturing side of a business, and I wanted to know why a certain metric, such as yield, is going down. Chances are, it's correlated with something else going on nearby, maybe something going on in the supply chain or something like that. It's probably not going to be related, at that level, to something like the rate we pay for advertising. A human would look at that data and try to find the underlying causes, come to a conclusion, and then act upon it.
That's what our systems can do. If there's really an underlying cause to the problem, the goal of the HTM system is to find it. You take some data from some kind of system—visual or financial, it doesn't matter. You feed it into the system's hierarchical temporal memory, and over time it builds a model of underlying causes.
How is that different from a traditional computer?
It's very different. You have to tell a traditional computer what to look for. A big parallel computer that's modeling fluid dynamics—like the weather or a jet engine, for example—tries to model each element, each particle or cubic volume of air. That's just solving mathematical equations. Humans don't operate that way. We don't predict the future by looking at every molecule. We look at problems and seek out high-level causes. We say to ourselves, "I noticed that whenever a storm front comes, there's usually a cold day the next day." As a result, we have these concepts called storms and hurricanes—high-level concepts we have been able to deduce by looking at low-level data.
That's what our HTM technology will try to do: discover the underlying causes in the world. If you hook the system up to the right data and expose that system to the data over a long enough period of time, it can build a model of that environment, just like a human brain does. It will automatically come up with a way of representing the world just like humans do, and draw conclusions based on that model.
It's compelling, but how do you know it can be done?
If you go back 50 or 60 years, when they were building the very first computers, people knew that a computer could be built, even though they didn't have transistors or circuits or hard disks. It's the same thing in this case, though we hope to build it much faster.
We did a prototype before we launched Numenta. It wasn't designed to do anything really useful, but our HTM system solved the very difficult problem of pattern recognition, which no one else has been able to solve.
What was the problem??
When you look at a picture of, say, a cat, there's almost an infinite number of variations of what a cat might look like. Humans have no problem recognizing any of them as a cat. Computers, on the other hand, can't do that. I know a scientist who proposed that the grand challenge of vision research is to be able to have a computer that can distinguish a picture of a cat from that of a dog. That tells you where the state of the art is in computer vision—it's gone nowhere.
We built a machine that solved that issue. They're not impressive-looking pictures, mind you, just silly little line drawings of cats and dogs. Nothing realistic like you'd recognize in a photograph. But our model shows these things can be done. Now we are in the process of building a sophisticated, large-scale tool set that will allow people to build systems that can deal with real-world data and the large volume of data that comes from real-world problems. The kind of systems we're building work just like a human brain—one that lives, breathes and eats manufacturing data or financial-market information 24 hours a day, and never gets tired of it. | <urn:uuid:55c8210f-3c9a-4143-b53b-8d60e366a1e3> | {
"date": "2014-07-22T23:48:16",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997869778.45/warc/CC-MAIN-20140722025749-00192-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9689360857009888,
"score": 3.0625,
"token_count": 1633,
"url": "http://www.cioinsight.com/c/a/Expert-Voices/Emerging-Tech-Jeff-Hawkins-reinvents-artificial-intelligence/1/"
} |
Today: the first modern battle and the first modern map that depicted it, plus bread or blood in nineteenth century East Anglia.
Vanessa Collingridge and the team follow up more questions and research sent in by listeners that help us to understand some of the bigger stories from our past.
Today, Vanessa travels to Musselburgh to find out more about the first modern battle on British soil and the first modern map that depicted it. On 10th September 1547 the English and Scottish armies faced each other just a few miles to the east of Edinburgh in one of the key moments of what's become known as the War of the 'Rough Wooing'.
The English were using new, European-influenced, fighting techniques that included artillery; the Scots, however, relied on the medieval duality of man and horse. They were dealt a heavy defeat. However, despite this being: the last battle between Scots and English and the first 'modern' battle, there is little locally that commemorates it and few know much about it.
Vanessa talks with historian Dr Fiona Watson and then travels to the British Library in London to look at a map of the Battle of Pinkie that librarian Peter Barber believes is our first 'modern' map.
Also in the programme, listeners in a small town on the Essex/Suffolk border have got together for a community performance of song and speech which recalls bitter rural unrest in East Anglia in 1816 when the cry went up: 'bread or blood'. We hear how an economic downturn, new technology and the return of thousands of farm-workers from the Napoleonic wars pushed this sleepy part of the world into open revolt.
Producer: Nick Patrick
A Pier Production for Radio 4. | <urn:uuid:a63b41a0-244c-4ef5-9a14-70bff116abe7> | {
"date": "2019-05-20T21:28:02",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256147.15/warc/CC-MAIN-20190520202108-20190520224108-00416.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.95329749584198,
"score": 3.578125,
"token_count": 357,
"url": "https://www.bbc.co.uk/programmes/b00tmlh8"
} |
Mindshift, part of KQED News, is a blog that explores all aspects of teaching and learning with a focus on technology and media. Primarily aimed at teachers, posts are organized by category: Games and Learning, Big Ideas, Teaching Strategies, and Children and the Media. Teachers can subscribe to the daily newsletter to stay connected on timely educational issues. Some articles may have classroom applications, as well.
The article "Using Games for Learning: Overcoming the Obstacles" outlines common problems teachers face as they integrate games into their curriculum, as well as offering possible solutions. Articles about social media and online communication could be useful to teachers and schools as they work with parents around these issues. In addition, administrators or teacher leaders may want to integrate a particular article as a jumping-off point for professional development.
Editor's note: In the past, the Common Sense Education blog has syndicated KQED's MindShift posts, and the Common Sense Education editorial staff has contributed posts to MindShift. However, Common Sense Education's reviews maintain editorial integrity and independence, and the editor who contributes to MindShift was not the editor on this review.Continue reading Show less
There aren't any teacher reviews yet. Be the first to review this tool.Write a review | <urn:uuid:0fa1ac6c-5755-4b95-aa4d-648615874d64> | {
"date": "2019-12-09T04:21:19",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540517557.43/warc/CC-MAIN-20191209041847-20191209065847-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9482784271240234,
"score": 2.78125,
"token_count": 256,
"url": "https://www.commonsense.org/education/website/kqed-mindshift"
} |
Education/News/May 2019/Education in Wales
Educational Projects in Wales
Author: Robin Owain, Wikimedia UK Manager (Wales)
Summary: An overview of Educational Projects in Wales
- Video 1: 'Wikipedia in the The Primary Sector'
- Video 2: 'Wikipedia Training in the National Curriculum' (Secondary Sector)
Having been appointed as Wales Manager for Wikimedia UK in July 2013, one of my first tasks was to co-organise the Eduwiki Conference at Cardiff. I invited Gareth Morlais, Digital Media Specialist at the Welsh Government, to open the conference and he spoke about the difficulty of getting minority languages recognised by internet giants such as Google. Gareth delivered his presentation in Welsh with live translation through headsets. The conference, and Gareth’s input, not only placed Wales on a global stage but also laid the foundation for the following work.
I approached the Coleg Cymraeg (the Federal University of Wales), which agreed to appoint a Wikimedian in Residence – the first full time WiR working in an university, worldwide. Mark Haynes was appointed in March 2014 and advised the Coleg on Creative Commons licences, which resulted in policy change. Since then, most of the academic work which goes on the Coleg Portal is on an open (CC-BY-SA) licence. This was a major breakthrough and even today, I’m yet to find a university which has opened their doors quite as wide.
The outcome of this is that when academic work is published, we can use it word for word on Wikipedia.
On 28 January 2015, I organised the first ever Wikipedia Edit-a-thon in Wales at Swansea Library, and this was immediately followed by a Swansea University Edit-a-thon titled Women and Justice 1100-1750 in collaboration with Prof Deborah Youngs and Dr Sparky Booker from the Department of History and Classics. More on Swansea, later!
There are 22 ‘Language Ventures’ in Wales, one of which is Menter Iaith Mon (translation: ‘Anglesey language venture’). After a number of meetings with Menter Iaith Mon, in the Summer of 2016 they appointed a full time Wikipedian in Residence with funding from the Welsh Government. Aaron focused on the training of Wikipedia editing skills, and having been employed in the secondary sector for a few years, began training pupils on the island of Anglesey.
Menter Iaith Mon and myself wrote an application to the main examination board of Wales (WJEC) to formalise the training of wiki-skills as part of the Welsh Baccalaureate as one of the ‘Community Challenges’. This was successful and since September 2018 Aaron has worked with 6 schools in Anglesey and Gwynedd. In the next few years, we will encourage other language ventures and schools to follow suit.
Aaron’s work also dovetails with the Digital Competence Framework as well as an input into the GCSE curriculum: more on this in the next few months.
In 2016, Swansea University Senior Lecturer in Law, Dr Pedro Telles, and Richard Leonard-Davies began using the Wikimedia Dashboard; the project is currently in its 3rd year. Post-graduate students are drafting Wikipedia articles as part of their assessment.
In December 2018, the ”Companion to the Music of Wales” was published by Coleg Cymraeg (Federal University) and Bangor University. This is an encyclopedia that covers the history of music in Wales with over 500 articles ranging from early music to contemporary music, from folk singers to orchestras. As a direct result of our WiR at the Coleg, all text is on an open licence and we shall shortly be transfering it to Wikipedia. It is an authoritative encyclopedia and is the result of a collaborative project between the School of Music and Media at Bangor University and the Coleg Cymraeg. Editors: Wyn Thomas, Pro Vice-Chancellor, Bangor University and Dr Pwyll ap Siôn, Professor in Music.
Three weeks ago, I delivered a presentation at the first International Eduwiki at Donostia, Basque Country where some of these milestones were shared. I was glad to see that we are not alone in the work we are doing here in Wales. The Basque Country excels in wiki-education work at all levels. It was inspiring to see such wonderful work in many other languages in the field of open education in secondary and tertiary sectors.
The context and groundwork are solid. It is now time to build on this foundation. The Welsh Government are committed to this work in partnership with Wikimedia UK and others.
A new project is about to start shortly: a pilot project on how we can make it easier for children and young people to access Wicipedia Cymraeg.
Watch this space!
Social Media channels or hashtags: #Cymru #Wales #Wicipedia @MonWici @WikimediaUK @MelynMelyn @RobLlwyd | <urn:uuid:985a2e47-a8fe-4aca-aca3-817e9909b87b> | {
"date": "2019-08-21T14:16:06",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316021.66/warc/CC-MAIN-20190821131745-20190821153745-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9515255689620972,
"score": 2.5625,
"token_count": 1050,
"url": "https://outreach.wikimedia.org/wiki/Education/News/May_2019/Education_in_Wales"
} |
When you have a website or an app, speed is important. The faster your site loads and then the faster your applications operate, the better for everyone. Given that a web site is a range of files that connect to each other, the devices that keep and access these files have a huge role in web site effectiveness.
Hard disk drives, or HDDs, have been, right up until recent years, the most dependable devices for storing information. Nonetheless, lately solid–state drives, or SSDs, have been gaining popularity. Check out our comparison chart to find out whether HDDs or SSDs are better for you.
1. Access Time
After the release of SSD drives, data access speeds have gone over the top. Because of the brand–new electronic interfaces used in SSD drives, the regular file access time has shrunk into a all–time low of 0.1millisecond.
HDD drives continue to utilize the very same fundamental data access technology that was initially created in the 1950s. Despite the fact that it was noticeably enhanced consequently, it’s sluggish as compared to what SSDs are offering to you. HDD drives’ data access speed ranges somewhere between 5 and 8 milliseconds.
2. Random I/O Performance
As a result of exact same revolutionary strategy which enables for speedier access times, it is possible to appreciate improved I/O effectiveness with SSD drives. They will accomplish double as many procedures during a specific time compared with an HDD drive.
An SSD can handle at least 6000 IO’s per second.
Hard drives deliver reduced data access rates due to the aging file storage space and accessibility concept they’re employing. And in addition they show noticeably sluggish random I/O performance as compared to SSD drives.
In the course of our tests, HDD drives handled on average 400 IO operations per second.
The lack of moving components and rotating disks within SSD drives, and the current advancements in electronic interface technology have generated a substantially less risky file storage device, having an average failing rate of 0.5%.
As we have previously mentioned, HDD drives rely on spinning disks. And something that takes advantage of a great number of moving elements for prolonged intervals is prone to failing.
HDD drives’ average rate of failure ranges somewhere between 2% and 5%.
4. Energy Conservation
SSDs do not have moving components and need little or no chilling energy. In addition, they need a small amount of energy to operate – tests have established that they can be operated by a regular AA battery.
As a whole, SSDs use up between 2 and 5 watts.
From the minute they have been created, HDDs were always extremely electricity–greedy equipment. So when you’ve got a hosting server with plenty of HDD drives, this will increase the month to month utility bill.
Normally, HDDs consume somewhere between 6 and 15 watts.
5. CPU Power
SSD drives support speedier file accessibility rates, which generally, consequently, permit the CPU to accomplish data calls much quicker and then to go back to additional jobs.
The common I/O wait for SSD drives is actually 1%.
Compared to SSDs, HDDs enable not so quick data access rates. The CPU will be required to wait for the HDD to send back the demanded file, saving its assets in the meantime.
The regular I/O delay for HDD drives is about 7%.
6.Input/Output Request Times
In the real world, SSDs function as admirably as they managed in the course of our checks. We produced a full system back–up on one of the production servers. During the backup operation, the regular service time for any I/O requests was below 20 ms.
All through the exact same lab tests with the same server, now suited out utilizing HDDs, effectiveness was significantly slower. All through the hosting server back up procedure, the common service time for any I/O demands fluctuated somewhere between 400 and 500 ms.
7. Backup Rates
Discussing back–ups and SSDs – we’ve noticed a fantastic development in the data backup speed since we turned to SSDs. Today, a regular server back up takes solely 6 hours.
Alternatively, with a hosting server with HDD drives, a similar backup can take three to four times as long to complete. A complete backup of any HDD–driven hosting server typically takes 20 to 24 hours.
Should you wish to easily boost the functionality of one’s web sites with no need to alter just about any code, an SSD–powered web hosting service is a really good option. Examine our cloud hosting packages as well as the Linux VPS service – these hosting solutions offer extremely fast SSD drives and can be found at competitive prices.
- Live Demo
- All of our Virtual Private Servers come with no setup costs and work in a dependable network providing 99.9% of uptime. Full admin server access guaranteed.
Compare our prices
- Preview the instruments and capabilities coming with our Virtual Private Servers. You can start off with a smaller VPS package and upgrade with just a mouse click as your necessities grow.
- Compare our hosting plans
- It is easy to make contact with us 24/7/365 by email or by utilizing our really–fast ticketing system. Buy Domains Club provides a 1–hour reply time warranty. | <urn:uuid:eb983b6d-e494-4a83-b964-ae9a9d5396aa> | {
"date": "2019-08-22T20:34:07",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317359.75/warc/CC-MAIN-20190822194105-20190822220105-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9356433749198914,
"score": 2.65625,
"token_count": 1107,
"url": "https://buydomainsclub.org/ssd-and-hdd-comparison/"
} |
There have been many studies over the last few years knocking chemicals and other ingredients in cosmetics, and claiming natural alternatives to be ‘safer’.
“This is simply not the case,” says a CTPA announcement. “The fact is, no matter what the product and wherever or however the ingredients are made, they HAVE to be safe and they are rigorously assessed to make sure that they are. It’s the law and it's that simple.”
"Since 2005 the number of people that have seen media reports about alleged harmful effects of cosmetics and toiletries has more than doubled, from 14 per cent in 2005 to 34 per cent today," adds Dr Chris Flower, director general.
The trade association explains that in order to provide as much choice as possible for everyone, the cosmetics industry is constantly innovating so that it can provide a wide range of safe products to meet different lifestyles, cultures and budgets.
This means products contain ingredients that are synthetic/man-made as well as those sourced from nature.
Chemicals are ubiquitous
“Everything is made of chemicals, from cosmetics, to water, to the human body. Chemicals are the building blocks of all substances, both natural and man-made. We can think of plants as ‘miniature chemical factories,” it says.
The CTPA states that because of strict European laws and rigorous safety assessments, all ingredients and products found on shop shelves are safe, meaning there is no question on some being more dangerous than others.
The safety assessments take account of all the ingredients used in the product, irrespective of their source, and whether ingredients are natural or man-made is not factored in.
“What’s more important is how much of the ingredient you are using and in what way you are using it,” adds the CTPA. | <urn:uuid:54aa2d9c-afb0-48cd-9611-3282709465ff> | {
"date": "2016-07-24T14:42:11",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824109.37/warc/CC-MAIN-20160723071024-00151-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9648985862731934,
"score": 2.703125,
"token_count": 383,
"url": "http://www.cosmeticsdesign-asia.com/Regulation-Safety/CTPA-reiterates-cosmetics-safety"
} |
When you've got multiple sclerosis, losing your keys or forgetting a name can be scary. You wonder whether the illness is clouding your thinking.
It's true that over time, about half of people with MS can have some cognitive problems. That means poor focus, slowed thinking, or a fuzzy memory.
Often these problems are mild and don't really interrupt your daily life. It's pretty rare to have severe thinking problems. They affect about 5% to 10% of people with MS.
Signs of Impaired Thinking in MS
The clues that you have fuzzy thinking due to MS are often subtle. You might not notice them until a friend, co-worker, or family member points them out. You may:
- Struggle to find the right words to say
- Forget things you need to do or tasks already done
- Find it hard to plan or set priorities
- Have trouble concentrating, especially when two things are happening at once
MS usually does not hurt your intelligence or long-term memory. It won't change your ability to read or carry on a conversation.
Tests and Diagnosis for Impaired Thinking
If you suspect impaired thinking, talk with your neurologist or family doctor. Fuzzy thinking can have many causes.
Once you have any health problems fully treated, the next step is usually testing. Your doctor may refer you to a neuropsychologist, speech pathologist, or occupational therapist.
MS and Rehab for Your Brain
If test results show that MS is to blame for spotty memory or poor mental focus, you may want to try rehab to sharpen your thinking. It can include:
- Memory exercises on a computer
- Home or work strategies with notebooks, organizers, or filing systems to help you remember things
It’s possible, but rare, that thinking problems become so severe that someone with MS needs constant care or can't live on their own. If this becomes an issue, discuss your options with your doctor and family. A social worker or psychologist also can help explore options for care.
Can Medicine Help?
Scientists are doing studies to see whether the drugs that slow the nerve damage in MS -- called disease-modifying medicines -- can help with thinking problems, too. | <urn:uuid:91c1a082-0482-42db-a2ac-57787a9ec866> | {
"date": "2015-08-03T09:41:47",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989790.89/warc/CC-MAIN-20150728002309-00017-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9601883292198181,
"score": 2.953125,
"token_count": 459,
"url": "http://www.webmd.com/multiple-sclerosis/ms-treatment-13/ms-thinking-problems"
} |
Codd-neck bottles were first patented in 1870 by British soft drink maker Hiram Codd. The unusual bottle design achieves a seal by utilizing the soda’s carbon dioxide gas to press a glass marble up against a rubber washer directly under the lip of the opening (the bottles are filled upside down). The thirsty consumer breaks the seal by pressing down on the marble and releasing some of the carbon dioxide.
The bottle style was popular in Canada, India, and Australia, but over time it has declined in popularity. Today these bottles can still be found in Japan and India, and Lindsay at Ouno Design has a post up about Codd-neck bottles, including images from her recent trip to India. Lindsay writes:
I only saw these bottles rarely, and only in old-fashioned soda carts like this one. As I said, on my last trip these bottles were everywhere. Because the soda water was sterilized, it was a safe drink for foreigners and I must have drunk hundreds of bottles of it, while my boyfriend drank the sweet stuff, mostly orange. There were no plastic water bottles anywhere to be seen.
By the way, these citrus soda carts are a brilliant idea. Delicious fresh lemon or lime sodas are made by mixing the plain soda water with freshly squeezed local citrus and local cane sugar, which is far better for you than our current sweeteners in North America. (High fructose corn syrup, which is unnatural, molecularly different and recently incontrovertibly linked to obesity, hasn’t been forced on India yet by the aggressive American corn industry.) Handmade lemon soda drink is far better than our soda pop here, and healthier too as long as the bottles are fully dried before refilling. Lastly it’s far better for the environment than anything we’re doing now. Plastic! Re-melting aluminum! Melting down glass! Argh. | <urn:uuid:744ccdc5-6fdb-4c69-9658-c352f31bd08f> | {
"date": "2014-04-17T01:10:53",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526102.3/warc/CC-MAIN-20140416005206-00363-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9604325294494629,
"score": 2.59375,
"token_count": 386,
"url": "http://makezine.com/2012/03/01/reusable-codd-neck-soda-bottles/?like=1&source=post_flair&_wpnonce=e9ecfe8d49"
} |
A composite material consisting of a horse protein and metallic nanoparticles displays magnetic properties very similar to those of human brain tissue, scientists have found. The work, published in the June 20 online edition of Physical Review B, may help lead to a more thorough understanding of the magnetic behavior of brain tissue and other complex natural materials.
Studying the magnetism of many natural substances, such as rocks, soils, and biological materials, can be difficult because they tend to be a mix of several magnetic components. This means that valuable structural and functional information, which can be obtained from a material’s magnetic properties, is often left undiscovered.
“It can be very difficult to separate the different components to study them individually,” said the study’s lead scientist, geophysicist Ann Hirt, to PhysOrg.com. Hirt is a researcher at the Institute of Geophysics in Zurich, Switzerland. “Often, the use of several analysis methods is necessary and, even then, definite conclusions are seldom. Finding and investigating model materials may help remedy this problem.”
As a first step, Hirt and her team identified the different components in the brain that produce magnetic signals. They used various magnetic methods, which are normally used to identify magnetic minerals in rocks. They found that the brain tissue, in which the other components are embedded, contributes the strongest magnetic signal, followed by iron in the blood of the brain. Next is ferritin, an iron-carrying protein found in nanoparticle form. Recently, a fourth component was discovered, but its identity has eluded scientists. It is either the iron-oxygen compound magnetite or a very similar compound, maghemite — or perhaps even a blend of the two. Magnetite and maghemite have such similar magnetic properties that distinguishing between them is very difficult.
“Although the signal from the tissue itself was very strong, we could easily subtract it from the total magnetization,” said Franziska Brem, another Institute of Geophysics scientist geophysicist on the team. “The remaining signal appeared to be a combination of the signals from ferritin and magnetite.”
To confirm this, the group measured the magnetic properties of a model system for which they knew the exact content and that they could study with certainty: a mixture of horse-spleen ferritin and protein-coated magnetite nanoparticles. The results show a striking similarity to the measurements for actual brain tissue.
“Based on these measurements, we can assume that the ferritin and magnetite/maghemite behavior in brain tissue is very close to that of our model material,” Brem said.
By Laura Mgrdichian, Copyright 2006 PhysOrg.com
Explore further: To conduct, or to insulate? That is the question | <urn:uuid:8e935f97-77ff-43ad-a40a-eb046ffc10ce> | {
"date": "2015-07-04T16:14:11",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096773.65/warc/CC-MAIN-20150627031816-00006-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9470593333244324,
"score": 3.484375,
"token_count": 586,
"url": "http://phys.org/news/2006-07-protein-nanoparticle-material-mimics-human-brain.html"
} |
“If speaking is silver, then listening is gold.”
Ask any group of newly qualified teachers about their fears and worries for the year ahead and many cite behaviour issues as a major concern. Yet it pays to drill down further into those worries to determine exactly what it is that’s the issue. When we do this, invariably the answer centres around children’s listening skills.
Not being listened to can feel deeply disrespectful, which can trigger strong reactions in us as we struggle to find strategies to calm a class down and get them to the point where they can listen, engage and learn.
It would be a mistake to think that we can teach children how to listen and expect a favourable response every time. Listening skills need to be taught, experienced and taught again and again throughout a child’s school career. Three pointers to consider:
– Help a child to listen by making sure they feel listened to. This document from the Department for Education, Listening to and involving children and young people contains statutory guidance on general principles of the United Nations Conventions on the Rights of the Child. It covers pupil voice and offers many links for further information.
– Be clear about listening rules. Never start teaching until there is silence in the room.
– Make eye contact when speaking to and listening to a child. When speaking to a class, too, ask all to look your way. It can also help to ask children to paraphrase what you have told them.
Having a class looking your way, at least with the appearance of listening, is only part of the story. Getting them engaged is the next step. Some ideas:
– Active listening will lead to engagement. Passive listening won’t. Get to know what helps children to listen actively in your room. This is likely to be a calm, quiet environment devoid of distractions, being challenged adequately, and having the opportunity to participate and demonstrate understanding.
– Use questioning skilfully to encourage critical thinking. Don’t rely on the few who will always raise a hand, tempting as it is. Draw out evidence of understanding.
– Consider using a variety of challenges as a way into learning – some paired, in groups, and individual. Routine is important, but variety will help guard against passivity and complacency.
A calm class, engaged in what’s happening is an excellent start. But what we need is learning.
– Find out if your school has a shared definition of learning. What are staff aiming for in the classroom? This is a fundamental stage of the process.
– Think about what you want children to learn, when you want them to learn by, and the evidence you need to know that learning has taken place.
– Consider the role that assessment has in your cycle of listening, engaging and learning. In addition, what is the interplay between assessment and feedback and how can this be timed to maximise the potential for moving learning on.
If you’re starting out or continuing your career, best of luck for the week ahead! | <urn:uuid:741a4185-6350-4b24-84d0-722ff1a7ccbf> | {
"date": "2017-05-24T17:47:10",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607849.21/warc/CC-MAIN-20170524173007-20170524193007-00442.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9575201869010925,
"score": 4.0625,
"token_count": 628,
"url": "http://www.eteachblog.com/listen-up/"
} |
In its simplest form, mindfulness means paying attention, on purpose, to the present moment, without judgment. Mindfulness can help to reduce stress, anxiety and conflict, and increase resilience and emotional intelligence, while improving communication and relationships in the workplace and in our personal lives.
Emotional intelligence is the ability to monitor one’s own and others’ feelings and emotions, to discriminate among them and to use this information to guide one’s thinking and actions. In the context of the work environment, emotional intelligence enables three important skill sets: stellar work performance, outstanding leadership, and the ability to create the conditions for happiness. Studies have shown that emotional competencies are twice as important in contributing to excellence as pure intellect and expertise. | <urn:uuid:e9984beb-f62f-44dd-a590-ff5431e5cf64> | {
"date": "2019-06-18T01:01:14",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998600.48/warc/CC-MAIN-20190618003227-20190618025227-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9248235821723938,
"score": 3,
"token_count": 149,
"url": "http://apmindfulnesstraining.com/"
} |
Staunton, May 6 – In a conclusion with obvious implications for the current situation not only for the Russian Orthodox but also for other faiths, a Moscow commentator argues that the Soviets were unable to destroy popular Christianity by killing priests but succeeded in doing so after they had established a loyal and dependent Orthodox hierarchy.
As a result of Soviet anti-religious efforts in the 1920s, there were almost no Orthodox priests left in the country, the blogger “Tolkovatel’” writes in a post today, but the destruction of the priesthood “did not affect the religiosity of Soviet people.” It only drove it underground as various scholars have shown in recent years (ttolk.ru/?p=17016).
Lacking priests, members of the laity began to hold services, and as a result, throughout the USSR, there was “a wave” of sectarianism, with ever more self-proclaimed religious leaders proclaiming themselves prophets and preaching their own, often highly individualistic doctrines and practices, many of them highly eschatological.
Their followers did not pay taxes, refused to serve in the Red Army, did not respond to Soviet campaigns, did not have Soviet documents and did not send their children to Soviet schools. As a result, they quickly became the object of attention from the secret police, but their arrests, exiles and even executions did not have the desired effect: Many of these “popular” believers saw such things as evidence that they were living in the end days.
Some of them, Russian historians say, welcomed the arrival of the Germans and the reopening of churches in German-occupied portions of the country, but most viewed the restoration of the Patriarchate as unimportant because they believed that the priests who were cooperating with the state were an even better reason to stay away from regular churches.
In the late 1940s, reports by the Council for the Affairs of the Russian Orthodox church attached to the USSR Council of Ministers suggest that in some regions these underground groups outnumbered the officially working churches by as many as two to one and were attracting large crowds.
The officially recognized hierarchy regularly asked the state for help in combatting its “popular” opponents, but the record suggests that even in the worst days of Stalinism, the combined forces of the church and the state were insufficient to suppress this underground phenomenon.
The death of Stalin somewhat eased pressure on the “popular Christians” who in some cases were allowed to register officially their formerly illegal bodies. But such tolerance for this group did not last long, and in 1958, Nikita Khrushchev launched his campaign against the sectarians, one scholars say was “even larger than in the 1930s under Stalin.”
This campaign cost the official Russian Orthodox hierarchy many churches: in 1960, there were 13,008 Orthodox churches but by 1970, there were only 7338. But those who were part of the underground and popular form of Christianity were arrested and sentenced to prison and the camps. Others were exiled from the places where they had been active.
In Khrushchev’s anti-religious campaign, the Moscow Patriarchate played a role, calling on its bishoprics to “conduct work among believers about the impermissibility” of engaging in the kind of activities associated with popular Christianity and even, it appears, encouraging priests to denounce their “illegal” counterparts.
As a result, “Tolkovatel’” says, “that which Stalin was unable to do was achieved under Khrushchev and the early Brezhnev: the almost complete destruction of ‘popular Christianity’ in the USSR” by means of government repression and the active complicity of the officially recognized hierarchy.
This occurred, the blogger concludes on the basis of the work of Russian historians, because “in contrast to the 1930s, when the Russian Orthodox Church considered church dissidents to be its fellow suffers of oppression, in the 1950s and 1960s, [the official church] together with the state went over to the attack against ‘the illegals.’” | <urn:uuid:1a48bced-b4fd-4ef4-a882-b73e6c276ad4> | {
"date": "2014-09-30T17:51:40",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663060.18/warc/CC-MAIN-20140930004103-00278-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.983228862285614,
"score": 2.609375,
"token_count": 840,
"url": "http://windowoneurasia2.blogspot.com/2013/05/window-on-eurasia-soviets-able-to.html"
} |
Family: Strigidae, Owls view all from this family
Description ADULT Has mainly reddish brown plumage overall; upperparts are adorned with buff spots, particularly on head and wings, while scapular feathers are tipped white; underparts are barred reddish buff and facial disc is flushed reddish brown. Note the yellow eyes and pale-tipped gray bill. JUVENILE Similar to adult.
Dimensions Length: 5 1/2" (14 cm)
Habitat Fairly common summer visitor to suitable arid habitats, particularly deserts with large, mature saguaro cacti and scrub-covered canyons; also riparian habitats.
Observation Tips Strictly nocturnal, but often peeps head out of nesting or roosting hole as dusk approaches. In breeding season, birds are extremely vocal at dusk, and on moonlit nights.
Range Southwest, California, Rocky Mountains, Texas
Voice Male's territorial call is a series of shrill and rather raptorlike wee-Ukk notes.
Discussion Tiny owl, the smallest of its kind in the worldómost people are amazed at just how minute it is the first time they see one. Size, compact shape, short tail, and association with desert habitats make identification relatively straightforward, even though many sightings are of nocturnal silhouettes; note the extremely rounded head. Call is also distinctive. Feeds mainly on insects, which are often caught on the wing; flight is rather stiff-winged and birds will occasionally hover while feeding. Nests in cavities, typically former nest holes of woodpeckers excavated in saguaro cacti and trees. Sexes are similar. | <urn:uuid:ca9433d3-d71c-4ac4-a675-602278d5cbb4> | {
"date": "2014-10-25T23:36:49",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119651455.41/warc/CC-MAIN-20141024030051-00320-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9342047572135925,
"score": 2.953125,
"token_count": 350,
"url": "http://www.enature.com/fieldguides/detail.asp?shapeID=960&curGroupID=1&lgfromWhere=&curPageNum=11"
} |
M. Sars, 1851
About a third of mid-dorsum without chaetae. Two large eyes dorsally and two smaller eyes ventrally. Caruncle extending posteriorly on to chaetiger 5. Each notopodium with five to six gills, branched dichotomously several times; terminal filaments conical, not thickened. Two dorsal cirri. Notopodial chaetae extending only slightly beyond the gills, shorter than neuropodial chaetae and of two kinds: 1) smooth, forked, one branch very much shorter than the other; 2) unequally forked chaetae with curved divergent branches, with strong serrations on inner sides. Neuropodial chaetae with curved hooked tips, with a strong lateral spur, some with an additional slender subterminal tooth.
Up to 10 mm for 19-30 segments.
Brick red to pale yellow.
In sand, mixtures of mud, shell and gravel and corals; from the shallow subtidal region to depths of more than 3000 m.
All over the North Atlantic and the Mediterranean. | <urn:uuid:c3f8d180-7abe-4ff4-b96c-44defb2a8d4f> | {
"date": "2014-07-23T11:53:18",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877881.80/warc/CC-MAIN-20140722025757-00168-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8561204075813293,
"score": 2.671875,
"token_count": 235,
"url": "http://species-identification.org/species.php?species_group=macrobenthos_polychaeta&id=557"
} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.