text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Soon after the icebreaker Oden left the Arctic ice pack, it crossed a threshold into the Barents Sea, which technically is a part of the Arctic Ocean located north of Norway and Russia. On Monday, the crew of the Oden exchanged pleasantries with the crew of the Russian nuclear icebreaker Yamal, which was returning from an expedition to leave a Russian flag on the ocean bottom beneath the North Pole. The two ships passed in the fog, within radio range but unable to see each other in the mist. Around this time of year, the entire Barents Sea is more or less ice-free, but sea ice forms in the northern half during winter. The southern half of the sea remains ice-free year-round because the North Atlantic Current, an extension of the Gulf Stream, brings warmer waters to the region. | <urn:uuid:80857928-1714-49a8-81a4-8c11ef27f802> | {
"date": "2013-12-05T15:14:55",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046759/warc/CC-MAIN-20131204131726-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9476349353790283,
"score": 2.625,
"token_count": 169,
"url": "http://polardiscovery.whoi.edu/expedition2/journal-day37.html"
} |
The Territories After the Six-Day War
An overview of Israel's relationship to the Sinai, the Gaza Strip, Jerusalem, the West Bank, and the Golan Heights.
At the heart of the Palestinian-Israeli conflict is a land dispute--and in order to understand that dispute, it is necessary to know the history of the territory in question. The following article, part two of a four-part series on the topic, discusses the dispute over the territories as it evolved between the years 1967 and 1981. It was published in 1998, and is reprinted with permission from The Jewish Agency.
There were different and even conflicting views within the government on the issue of the territories.
There were those such as the finance minister, Pinhas Sapir, or the foreign minister, Abba Eban, who argued that incorporation of the territories would lead to economic dependence on cheap Arab labor or isolate Israel diplomatically. Members of some of the more hawkish parties, accompanied by certain voices within the Labor party, emphasized the historical and strategic significance of the territories. For the first time in 19 years, Israel's economic and demographic center would be out of the range of Arab artillery. Any attempt at invasion or air attack could be stopped before damage was caused to Israeli cities. Control of the Golan Heights released the Israeli settlements below from the constant Syrian shelling and sniping.
Probably the most influential member of cabinet was the defense minister, Moshe Dayan, who emphasized three points:
1. maintenance of security within the territories through the creation of a military government and a network of army bases;
2. normalization of Arab life by allowing Arab residents to maintain their Jordanian, Egyptian, or Syrian citizenship and through the inauguration of an "open bridges" policy that would allow visitors and goods to cross the border between Israel and Jordan;
3. the right of Jews to settle in the territories, which necessitated Israeli investment in infrastructure and encouragement of business and industry in the territories.
A plan was drawn up along these lines by Deputy Prime Minister Yigal Allon. In the West Bank/Judea-Samaria, a belt of Israeli settlements was to be established along the mostly uninhabited Jordan Valley in order to prevent any attempt at invasion from the East. A corridor at Jericho would allow movement between Jordan and the West Bank/Judea‑Samaria.
Jewish settlements in the Etzion Bloc, conquered by Arabs during the 1948 war, would be re‑established. Due to its strategic importance, the Golan was to be settled and kept for the most part under Israeli control. A few military outposts would be established in the Gaza Strip.
While most of the Sinai was ultimately to be returned to Egypt, the Rafiah Salient--which later included the town of Yamit and several moshavim [semi-collective communities]--was to remain in Israeli hands. Israel would interfere as little as possible in the lives of the Arab population which was to be permitted to govern itself in some form. Although the proposal was never officially adopted, it did serve as a basic plan for settlement in the territories.
Israel established a military government to administer the territories. The legal system which had been in effect was maintained, although additional ordinances were adopted by the military government, especially in the interest of maintaining security. At the head of the administration stood the defense minister, who delegated authority to a coordinator of activities in the territories and to regional military governors. The military government took on all of the normal functions of state government: health, finances, education, infrastructure, religious affairs, communications, utilities, etc.
Already in 1967, the Greater Land of Israel movement was formed with the goal of incorporating all of the territories into the state of Israel. After the Yom Kippur War of 1973 (in which Egypt and Syria attacked Israel in an effort to regain the Sinai and Golan respectively) and the blow to the Israeli government as a result of the intelligence and operational failures that surfaced in the following months, a new movement emerged. The movement was called Gush Emunim (Block of the Faithful, a segment of the National Religious Party).
As opposed to Allon’s proposal, which envisioned Jewish settlement in areas of low Arab concentration, Gush Emunim focused on the centers of Arab settlement territories as part of the unfolding messianic process. In the mid-1970s, members of the block initiated settlement attempts near the West Bank cities of Ramallah and Nabulus. These actions brought the group into confrontation with the Labor government (which relied on the National Religious Party), but on several occasions the government backed down and allowed the establishment of "temporary" settlements which soon evolved into permanent sites. During this time, direct negotiations were underway between Israel and Egypt over the separation of forces and the return of part of the Sinai to Egypt.
Likud, which came to power in 1977, had advocated the incorporation of the territories into the state of Israel for reasons of security and ideology. The territories provided an important buffer between Israel and its Arab neighbors as well as a significant obstacle to a potential Arab invasion. Their return to Arab hands would once again threaten Israeli security. Moreover, Judea and Samaria were in the heart of the historic Land of Israel.
After the Israeli‑Egyptian negotiations of the mid‑1970s under the Labor government and the unprecedented visit of Egyptian President Anwar Sadat to Jerusalem in 1977, relations between the two countries began to thaw. At the Camp David summit in 1978, Prime Minister Menachem Begin and President Sadat agreed that in exchange for the Sinai, including the Rafiah Salient, Egypt would agree to full normalization and diplomatic relations.
In a second set of accords, the two countries agreed that the Arabs in Gaza and the West Bank/Judea‑Samaria would be given autonomy for a five‑year period, during which time the final status of the territories would be negotiated among representatives of Israel, Egypt, Jordan, and the Palestinians. These accords were embodied in the Israeli‑Egyptian Peace Treaty in 1979, and the withdrawal from Sinai was carried out in stages until 1982. Those in the Likud who strongly opposed the withdrawal broke off in 1979 to form the Tehiya (Renaissance) Party.
Likud policy regarding other territories was more in line with the party's traditional position.
On December 12, 1981, the Golan Heights Law extended Israeli law, jurisdiction, and administration to the Golan Heights, effectively annexing the territory to Israel. Outright annexation of the Gaza Strip and the West Bank/Judea‑Samaria was seen as inadvisable as it would likely alienate both Egypt and the United States. Instead, the Likud proposed autonomy for the inhabitants of these areas. According to the plan presented by Begin in Knesset on December 28, 1977, these Palestinians would have control of their own education, religious affairs, finances, transportation, construction, housing, energy, industry, trade and tourism, health, labor and welfare, and refugee rehabilitation.
Their power, however, was to be over services and departments--not over territory. Sovereign rule would remain in the hands of Israel, which was to control security, public order, and foreign affairs. Local residents could decide to keep their foreign citizenship or they could opt to become Israeli citizens. Israelis would be free to settle in the territories and Arabs from the territories who chose to become Israelis would be free to settle in Israel.
As it can be assumed that few Arabs in the territories would elect to become Israeli citizens, the Begin proposal was essentially a way to hold on to the territories while withholding political rights from the Arab residents. The Likud version of autonomy was essentially different than the Egyptian, American, or even Labor Party understanding of autonomy.
Sadat envisaged a transitional stage of self‑rule leading to a final stage of Israeli withdrawal and Palestinian independence. While America frowned at the idea of a Palestinian state, it did see autonomy as leading to some form of self-rule independent of Israeli control. Labor suggested that this self-government be formed as part of a Jordanian-Palestinian entity.
The autonomy defined in the Camp David Accords of 1978 was very open: The residents of the territories were to elect a self‑governing authority that was to get autonomy after a five‑year period. However, the negotiations among the various parties never really got off the ground: Jordan didn't join, the Palestine Liberation Organization opposed the idea of autonomy, Israel dragged its feet, Sadat was assassinated in October 1981, and the Israeli war in Lebanon from 1982 to 1985 focused attention and diplomatic effort elsewhere.
Did you like this article? MyJewishLearning is a not-for-profit organization. | <urn:uuid:960395d1-18e5-44ab-8e03-ae45f4588d1b> | {
"date": "2014-11-27T14:14:43",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931008720.43/warc/CC-MAIN-20141125155648-00188-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9710119366645813,
"score": 3.265625,
"token_count": 1792,
"url": "http://myjewishlearning.com/israel/History/1967-1980/The_Territories.shtml?p=0"
} |
Translating Good Intentions Into Actions
By Kristen Berman, Wendy De La Rosa and Dan Ariely – Common Cents Lab, Duke University
According to recent research, 57 percent of American adults say they are struggling financially. Considering how powerfully financial well-being—or lack thereof—affects every other area of a person’s life, reducing this percentage should be an urgent priority. To put the matter into context, policymakers now devote great attention to the obesity epidemic, and obesity, while undoubtedly a serious issue, affects far fewer Americans (30 percent) than financial stress does.
Many organizations have tried to address financial health by investing in financial education programs. According to the Consumer Financial Protection Bureau, the United States spent more than $670 million in 2013 on financial education programs. The hope is that by teaching Americans the importance of savings, and how to save, Americans will in fact save.
However, recent research suggests that financial education alone is ineffective. Common Cents Lab recently surveyed almost 1,000 low- to middle-income Americans. When asked what they could do to increase their financial assets, survey respondents listed, on average, four specific steps they could take—and the steps they listed were very good ones.
This suggests that people have a clear idea what they need to do to improve their financial situation. Yet, 36 percent of these same people had less than $500 in savings. Why is it that despite knowing what they should do, people are not financially secure?
“But the reality is that we live in the moment and we make myopic decisions without thinking much about the big picture or the long term.”Dan Ariely
“The gap between what people want and what they do is described by social scientists as the ‘intention-action’ gap,” says Dan Ariely, professor and co-founder of the new Common Cents Lab at Duke University. “We know that we are supposed to think about all the things we want to spend on as ‘now’ versus ‘later.’ But the reality is that we live in the moment and we make myopic decisions without thinking much about the big picture or the long term. The problem is that thinking about money the right way is really, really hard. So we don’t think about money the right way, and sometimes we just don’t think about the implications of our spending at all.”
The Common Cents Lab, with generous funding from MetLife Foundation, is a three-year initiative aimed at using social science to build and test financial interventions that can help low- to middle-income Americans make better financial decisions. The lab focuses on solutions that address common but avoidable intention-action gap problems: situations where people should be taking cheaper loans, but don’t, or should be borrowing less, but don’t, or should put a little money aside, but don’t.
Reducing barriers to savings by ‘just starting.’
As one of its first projects, Common Cents, in partnership with a company called Retiremap, is building an app that expands access to financial planning expertise for the low- and middle-income market through automation and technology.
Automated financial management services, which typically use algorithms to optimize risk in a financial portfolio, are not new. In fact “robo-advisor” firms raised nearly $300 million in venture funding last year. The behavioral economics perspective that will drive Common Cents’ development, however, is that successful financial management depends less on effective ways to recalibrate portfolios and more on effective ways to build such basic human elements as confidence, trust, self-efficacy and the belief that one can reach the desired goal.
For example, in a three-year randomized experiment in which some parents were given a children’s college savings accounts, the children of those parents showed higher social and cognitive performance. The researchers hypothesize that the parents given college savings accounts changed how they thought about their child’s future. This intervention was not about optimizing the asset allocation decisions, but instead about creating a “college-bound” identity for the children in their parents’ minds.
Automatically opening child savings accounts has another benefit. Much in the way that simply putting on your running shoes and getting out the door overcomes one of the biggest barriers to your jogging habit, just opening a financial account removes a large perceived barrier to saving.
When cities started automatically opening 529 college savings accounts for parents, the average account balance unsurprisingly shot up, doubling in six years to reach an all-time high of $20,474 in 2015, according to The College Savings Plan Network.
These interventions seem simple, but human nature is not. Small barriers do decrease the likelihood of taking action, whether the obstacle in the way of opening an account involves lack of familiarity, complexity or that perennial self-defeating behavior, procrastination. By designing systems that incorporate insights into human behavior, Common Cents Lab aims to bridge the intention-action gap and ultimately to increase America’s bank balances.
(You can find the original article here) | <urn:uuid:8395d8ff-4fc8-460c-af68-2985ca23449d> | {
"date": "2016-10-23T01:20:14",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00448-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9513279795646667,
"score": 2.515625,
"token_count": 1067,
"url": "http://advanced-hindsight.com/blog/1840-2/"
} |
3.1 Access Modifiers
Access modifiers, when provided in keywords, alter the interface into which the definition of member name is placed. There are three interfaces, or levels of visibility, that dictate the context from which a member may be accessed, listed here from the most permissive to the least:
Accessible outside of C or any instance of C (e.g. ‘foo.publicProp’). Inherited by subtypes of C.
Not accessible outside of C or an instance of C (e.g. ‘this.protectedProp’ within context of C). Inherited by subtypes of C.
Not accessible outside of C or any instance of C. Not inherited by subtypes of C.
|Places member name in public interface (accessible outside of C
or instance of C; accessible by subtypes). Implied if no other access
modifier is provided (but see |
|Places member name in protected interface (accessible only within C or instance of C; accessible by subtypes).|
|Places member name in private interface (accessible only within C or instance of C; not accessible by subtypes); implicit if the member name is prefixed with an underscore, unless another access modifier is explicitly provided.|
Access modifiers have the following properties:
- Only one access modifier may appear in keywords for any given name.
- If no access modifier is provided in keywords for any member
name, member name is implicitly
public, unless the member name is prefixed with an underscore, in which case it is implicitly
|• Discussion:||Uses and rationale|
|• Example:||Demonstrating access modifiers| | <urn:uuid:50dc332c-a563-4155-8469-677a9c78d123> | {
"date": "2017-09-23T02:17:22",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689413.52/warc/CC-MAIN-20170923014525-20170923034525-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8523586988449097,
"score": 3.234375,
"token_count": 348,
"url": "http://www.gnu.org/software/easejs/manual/Access-Modifiers.html"
} |
- Methodology article
- Open Access
Induction of diploid gynogenesis in an evolutionary model organism, the three-spined stickleback (Gasterosteus aculeatus)
© Samonte-Padilla et al; licensee BioMed Central Ltd. 2011
- Received: 20 April 2011
- Accepted: 12 September 2011
- Published: 12 September 2011
Rapid advances in genomics have provided nearly complete genome sequences for many different species. However, no matter how the sequencing technology has improved, natural genetic polymorphism complicates the production of high quality reference genomes. To address this problem, researchers have tried using artificial modes of genome manipulation such as gynogenesis for fast production of inbred lines.
Here, we present the first successful induction of diploid gynogenesis in an evolutionary model system, the three-spined sticklebacks (Gasterosteus aculeatus), using a combination of UV-irradiation of the sperm and heat shock (HS) of the resulting embryo to inhibit the second meiotic division. Optimal UV irradiation of the sperm was established by exposing stickleback sperm to a UV- light source at various times. Heat shock parameters like temperature, duration, and time of initiation were tested by subjecting eggs fertilized with UV inactivated sperm 5, 10, 15, 20, 25, or 30 minutes post fertilization (mpf) to 30°C, 34°C, or 38°C for 2, 4, 6 or 8 minutes. Gynogen yield was highest when stickleback eggs were activated with 2 minutes UV-irradiated sperm and received HS 5 mpf at 34°C for 4 minutes.
Diploid gynogenesis has been successfully performed in three-spined stickleback. This has been confirmed by microsatellite DNA analysis which revealed exclusively maternal inheritance in all gynogenetic fry tested. Ploidy verification by flow cytometry showed that gynogenetic embryos/larvae exhibiting abnormalities were haploids and those that developed normally were diploids, i.e., double haploids that can be raised until adult size.
- Heat Shock
- Double Haploid
- Heat Shock Treatment
- Haploid Embryo
- Ploidy Determination
The genomics community has been enormously revolutionized by first- and next generation sequencing (NGS) technologies [1–3] that generated vast amounts of genetic data ranging from unicellular (bacteria) to multicellular (eukaryotic) genomes. However, no matter how good these technologies are, polymorphisms in a genome complicate the assembly process, results in lower quality, and the contiguity and completeness of assembly is significantly lower than would be expected from a homozygous template . Hence, there is a growing interest for the development of inbred lines, such as haploid and double haploid (DH) lines, which are particularly advantageous in genomics [5, 6] because of their homozygosity and their growth potential. Inbred lines are also useful in physical mapping and in genetic mapping which would enable precise positioning of the genes in the genome, and thus facilitate accurate identification of candidate genes. Furthermore, DHs are also useful for mutagenesis and genetic transformation studies [9–14].
An inbred line is normally produced by classical sibling mating which is not only time and space consuming, but also laborious and expensive, especially in organisms with long generation times. Alternatively, it can be produced via androgenesis or gynogenesis which both requires inactivation of the genetic material through chemical means or by ionizing radiations. For species with relatively large eggs (1.5 - 1.7 mm), with thick membrane that hardens upon contact with water and contains numerous oil globules like that of the three-spined stickleback, optimum inactivation of the genetic material of the eggs is difficult and hence gynogenesis should be favored. Gynogenesis is defined by Thorgaard as an all maternal type of inheritance wherein the genetic material of the sperm does not contribute to the resulting embryo. This process occurs naturally in some fish species like in crucian carp and in several species of poecilids [16–18]. Induction of diploid gynogenesis involves egg activation by irradiated homologous or heterologous sperm, and diploidization by retention of the second polar body (meiotic gynogenesis) or suppression of the first mitotic cleavage (mitotic gynogenesis) using strong physical treatments (i.e., shocks). The most commonly used treatments are either low or high temperatures (cold or heat shocks) or hydrostatic pressure. Under the influence of such treatments, the spindle fibers are destroyed and cell division stops resulting in the fusion of the daughter cells, thus forming diploid gynogenetic embryos. Mitotic gynogenesis was regarded as the fastest way to produce DH [completely inbred (homozygous) fish]. It requires only one round of gynogenetic manipulation. Production of DHs via meiotic gynogenesis, on the other hand, requires an additional 2-3 rounds of gynogenetic manipulations. Prior to the boom of the genomics era, artificial gynogenesis has already been applied in many fish species mainly because of its potential value in experimental genetics and aquaculture [20, 21]. Furthermore, it has played an important role in fish genetic improvement and control of reproduction . For instance, diploid gynogenetic fish were observed to grow faster and have stronger resistance to disease than haploids . Successful gynogenetic manipulations were done, e.g., in rainbow trout , medaka , common carp , muskellunge [25, 26], goldfish , Russian sturgeon and starlet , mud loach , sea lamprey , and in Wels- and channel catfish [6, 31].
The three-spined stickleback is a teleost that exhibits multiple examples of parallel evolution. It inhabits different marine, estuarine, and freshwater systems all over the Northern hemisphere and is characterized by rapid and repeated ecological and phenotypic divergence from the marine ancestor to the freshwater forms [32, 33]. Like other model systems, the linkage and chromosome maps of this fish have already been published [34, 35] and its genome sequenced . Genomic information has now been used to understand many fundamental evolutionary problems. For instance, the successful elucidation of the evolution of body armor reduction in three-spined sticklebacks from the phenotypic down to the gene level prompted Gibson to elevate the status of this species to an evolutionary supermodel. The advent of NGS has also advanced studies on the population genomics of this species . However despite all these developments, the problem with polymorphism remains and left a significant part of the genome unassembled. Thus, increasing the need for the production of an inbred three-spined stickleback.
In our knowledge, no inbred line is available in this species partly because the emphasis has always been on the study of natural populations. Information about effective modification of genotype in this species was limited only to ploidy manipulation using temperature shock that resulted in the production of triploid and haploid individuals [40, 41]. These haploids would be ideal for genomics but as in many attempts of fish haploid production, these haploids survived only until embryonic development [20, 42–46] or right after hatching [10, 47, 48] and hence do not provide enough template material for downstream processing.
Here, we present a working protocol for the induction of gynogenesis using a combination of sperm UV irradiation and heat shock (HS) treatment. This study aims at producing inbred lines of the three-spined stickleback suited not only for whole genome sequencing, physical and genetic mapping but also for future mutagenesis and experimental studies. Success of gynogenesis is confirmed by microsatellite DNA analysis and the ploidy of the gynogenetic embryos/larvae is verified by flow cytometry.
Screening for the optimum UV irradiation exposure
Embryonic survival of three-spined sticklebacks subjected to UV irradiation at 4 various times resulting to zero fertilization success
Length of UV Irradiation (min)
Number of eggs
Fertilization rate (%)
Hatched fry (%)
The normal controls, on the other hand, were not only successfully fertilized but also have high percentage of survival to the eyed stage (98%) and hatched as expected at day 6 or 7.
Effects of heat shock on chromosome diploidization of the activated stickleback eggs
The effectiveness of heat shock (HS) in promoting diploid gynogenesis, expressed by the number of gynogens produced (total gynogen yield), was clearly shown in two separate experiments. Gynogen yield was computed as the percentage of hatched, surviving fry over the total number of fertilized embryos.
All embryos in the HS controls developed into abnormal embryos/larvae which indicated that UV irradiation for 2 min successfully inactivated the genetic material of the sperms but retained the ability to induce the development of the eggs. Such haploid (n) eggs develop abnormally in the absence of HS treatment but become morphologically normal (2n) when optimal HS condition was applied to them.
Microsatellite DNA analysis of gynogenetic families
Summary of microsatellite genotyping data of the two gynogenetic families used to assess the mode of gynogenesis occurring in three-spined stickleback
Number of embryos
Number (%) of surviving
120 days old
Ploidy level of gynogenetic fry
Development of the gynogenetic embryos/larvae
Gynogenesis is regarded as a powerful tool in the production of an all female progeny, in studying mechanisms of sex determination, and in the production of completely inbred lines. Inbred lines are useful for whole genome sequencing and for production of mutational and developmental genetic screens. For an evolutionary model organism like the three-spined stickleback, optimization of this method will be immensely important.
In this study, UV irradiation of the sperm and heat shock (HS) of the resulting embryos were used to induce gynogenesis. UV irradiation was used because aside from being effective in deactivating the DNA of the sperm, it is cheap and easy to set-up as compared to ionizing irradiations which are more dangerous and require special containment area [20, 21]. Since DNA irradiation is a key step to successful gynogenesis, it is therefore important to determine optimal condition for sperm irradiation. UV irradiation should inactivate the sperm DNA maximally and avoids chromosome fragmentation, because partially inactivated sperm DNA interferes in the embryonic development whereas over-exposure to UV light may already kill the sperm . In this study, 2 to 4 minutes exposure to UV irradiation can be regarded as optimal with fertilization success of 93-97%. All the resulting embryos were morphological abnormal (Figure 5b and 6), confirmed to be haploids by flow cytometry, and had only the maternal genotype. However, UV exposure of more than 4 min in our case was already lethal to the sperms resulting in zero fertilization success. This was also indicated by the observed absence of sperm motility in these treatment groups after UV exposure. Although both 2 and 4 min UV irradiations were successful in inactivating the genetic material of the sperm, we used the former in the succeeding experiments to minimize possible "Hertwig effect" wherein haploid embryos resulting from the total destruction of the genetic material in the sperm by high doses of radiation would survive longer than those exposed to lower UV dosage [50, 51].
Application of HS was observed to be effective for the retention of the second polar body in eggs activated with UV irradiated sperms resulting in morphologically normal gynogenetic diploid larvae [25, 27, 52–54]. For HS to be successful, right combination of the different parameters namely temperature, duration, and initiation time of application is critical. From the review of Komen & Thorgaard , it is suggested that optimal temperature for HS is species-specific and could vary from 30°C to up to 42°C. Since HS acts through depolymerization of protein complexes, then the best temperature should be close to the upper limit of tolerance. Likewise, optimal time for applying heat appears to be slightly different [55, 56]. Timing of HS is very crucial as this decides the kind of gynogens produced. Generally, when HS is applied early, it targets second meiotic division leading to the retention of the second polar body, thereby producing diploid meiotic gynogens. Late application of heat treatment, on the other hand, results in suppression of the first mitotic cleavage, producing an all homozygote female fry (inbred clone). Here, the best yield of diploid gynogens (65%) was observed in eggs activated with UV irradiated sperm and heat shocked at 34°C 5 minutes post fertilization (mpf) for 4 minutes (Figure 2). Although aiming at different end products, the optimal temperature and duration of HS established here correspond to what was used by Swarup [40, 41] in his first attempt to produce haploid and triploid three-spined sticklebacks without UV irradiation. Independently tested, this clearly shows that HS at 34°C for 4 minutes can effectively destabilize and disorganize the microtubules of activated stickleback egg, thereby facilitating diploid gynogenesis. The comparatively low diploid gynogen yields at lower (30°C) and higher (38°C) temperatures indicates that 30°C can still be well tolerated by the developing embryo. The effect of temperature shock at 30°C is very minimal, whereas shock at 38°C could have already interfered in a wider range of developmental mechanisms resulting to further abnormalities that drives the embryos to death. Like in common carp , the present study clearly demonstrated that temperature, duration, and initiation time of HS play an important role in the success of diploid gynogenesis in three-spined sticklebacks.
Success of gynogenesis induction in three-spined stickleback is verified by microsatellite analysis. Microsatellite DNA technology is commonly used because of its PCR-based, co-dominant Mendelian inheritance, and highly polymorphic characteristics which facilitate molecular typing of the gynogenetic embryos/larvae [57, 58]. Success is measured by the absence of paternal alleles in the resulting gynogenetic individuals. In the six families tested here, it was clear that the paternal alleles are absent and only the maternal alleles are passed on to the gynogenetic embryos/larvae. The predominance of heterozygotes (97%) for the maternal alleles only suggests that the established optimum HS condition promotes retention of the second polar body, thereby producing mostly heterozygous meiotic diploid gynogens which have the expected high degree of homozygosity (Figure 3). With the relatively early timing of heat shock (5 mpf) and due to the mode of egg collection (mainly hand stripping), it could be that the eggs used in this study are still undergoing meiosis when the HS was applied. Flow cytometry remains the best method for ploidy determination in gynogenetic stickleback. This method clearly shows that stickleback gynogenetic embryos/larvae that developed normally were diploids (2n) whereas those that showed abnormalities were haploids (n) with peaks at mean channel numbers 460 and 230, respectively (Figure 4). We observed no mosaic or aneuploid, chromosomal anomalies that are also reliably detected through flow cytometry. With the accuracy of the result obtained here, we find no reason to use more laborious and time consuming classical methods of ploidy determination like chromosome preparation and silver staining of nuclear organizer regions (NORs). Since in the present study, possible effects of doublets on fluorescence were excluded in all samples, the observed predominance of haploid cells at n(G1) phase with a significant 5% of the cells staying at the n(G2/M) is quite striking (Figure 4a). This is comparable to what was observed in muskellunge by Lin and Dabrowski which suggests that haploid cells have an abnormal cell cycle that probably takes longer in time than that of their diploid counterparts. This could also mean production of lower cell numbers, hence the observed stunted growth of haploids.
In summary, a working protocol for the induction of diploid meiotic gynogenesis in three-spined sticklebacks is presented in this study. The optimal condition for the inactivation of the sperm and the HS treatment to effectively suppress the second meiotic division in stickleback eggs were established to be at 2 minutes UV irradiation and HS at 34°C 15 mpf for 4 minutes, respectively. Flow cytometry and microsatellites analysis proved to be an ideal combination of methods to determine the ploidy and the all maternal inheritance in the gynogenetic individuals produced.
Sticklebacks were collected from Grosse Plöner See (northern Germany) from November 2009 to February 2010. The fish were acclimatized first for 3 months in winter (4°C), another 3 months in spring (12°C), before finally being transferred to individual tanks and placed in summer condition (18°C) until they became reproductively mature. Stickleback males with conspicuously developed red-orange coloration on their throat region and gravid females with extended belly and dilated cloacal opening ready to spawn were used in this study.
Male fish was sacrificed by decapitation. The testes were carefully dissected out, and placed in a 40 μm cell strainer (Falcon, BD Biosciences, Europe) standing inside a small plastic petri-dish containing appropriate amount of Hank's Balanced Salt Solution (HbSS, Sigma). Using a mini pestle, the testes were carefully pressed against the mesh of the strainer to release all the sperms into the HbSS. The motility and relative quantity of the collected sperm was checked under the microscope. Only sperm solutions with active and motile sperms were used in the experiments. Likewise the gravid stickleback female was either sacrificed by decapitation and the ovaries were carefully dissected or hand stripped to collect the eggs. The latter method is advantageous because a female can be used several times.
Sperm Inactivation by UV Irradiation
Successful irradiation means finding the adequate radiation that will result to total genetic inactivation of the sperm without destroying their ability to initiate fertilization. To attain this, we first determined the appropriate duration of UV irradiation. The experiment was done twice and each consisted of two males and five female sticklebacks. Sperm from two male sticklebacks were pooled into a 2-ml sperm suspension which was further divided into five parts: one part was not exposed to UV irradiation and served as control. The other four parts were exposed to a UV light source for to 2, 4, 6, and 8 minutes irradiation, respectively. To ensure optimum irradiation, the sperm suspension was placed on thin watch glass and irradiated at a distance of 30 cm under a 280 ultra-violet (type C) light source with continuous gentle shaking at 20 rpm. The sperm was then used to fertilize groups of pooled eggs (58-93 eggs per group) 5 minutes after dilution and UV irradiation. Fertilization was terminated by addition of 7.5 ml hatchery water, which induces swelling of the egg and closure of the micropyle. Activated eggs were transferred to well-aerated breeding jars and grown at 18°C for 6 to 7 days. The breeding jars were kept in the dark in the first 24 hours to avoid possible photo-repair of the UV-inactivated sperm DNA. The number of fertilized and unfertilized eggs was counted on day 2. Unfertilized eggs were removed immediately to avoid fungal contamination and the embryos were allowed to develop until day 6 or 7. Survival to the eyed stage and hatching was observed and recorded at day 7.
Heat Shock (HS) Treatment to Promote DNA diploidization
Two experiments were conducted to determine the effects of HS on the diploidization of the stickleback egg activated with UV irradiated sperm. In both experiments, stickleback gametes were prepared as described above. Each of the experiments was repeated three times using independent sets of females allowing the effect of each treatment to be tested statistically. Since three-spined sticklebacks normally produce about 150-200 eggs at a time, the pooling of gametes strategy of Lin and Dabrowski was adopted to enable us to investigate a wider range of combinations of HS treatments. All UV irradiations from here on were performed for 2 min.
The first experiment was designed to estimate the effect of initial time of HS on chromosome diploidization. The properly mixed pool of stickleback eggs was divided into 25 groups, each containing around 20-35 eggs. One group served as HS control composed of eggs fertilized with UV-irradiated sperms but not heat-shocked. The other 24 groups were subjected to HS in a full factorial design at 30°C or 34°C regulated water baths for 2 or 4 minutes 5, 10, 15, 20, 25, or 30 mpf. To ensure homogeneous water temperature, the water bath was kept shaking at 30 rpm. A second experiment was intended to further explore the optimal level of temperature and HS duration. The pooled eggs were divided into 14 groups. Two groups that were not heat shocked but were fertilized with irradiated sperms served as controls: HS Control 1 was transferred to the breeding jar immediately 5 mpf whereas HS Control 2 was allowed to continue fertilization until all the HS treatments were finished. The remaining groups were heat-shocked at three different temperatures (30, 34, and 38°C) for 2, 4, 6, or 8 minutes, respectively. Breeding proceeded as previously described. Like in the UV irradiation experiments, the number of fertilized and unfertilized eggs was recorded on day 2. Unfertilized eggs were removed and the fertilized embryos were allowed to grow up to day 6 or 7 after which the embryos were collected and sorted into two groups based on their morphological features: normal embryos that hatched and exhibited normal development and abnormal embryos showing haploid syndromes.
Using the here established optimal condition for stickleback diploid gynogenesis induction, additional six gynogenetic families designated Family 1-6 were produced for microsatellite analyses. In families 1 - 4, all gynogenetic embryos/larvae were collected at day 7 and used to assess level of heterozygosity in the gynogenetic individuals. Families 5 and 6 were used to determine the type of gynogenesis that was induced in this experiment, hence only the embryos/larvae that hatched and survived past 120 days were collected and tested.
Genomic DNA isolation for microsatellite DNA analysis
Genomic DNA from 4-7 day old whole embryos or caudal fin clips from the surviving gynogenetic fry and stickleback parents was extracted using Qiagen DNAeasy Kit (Hilden, Germany). The quantity of the extracted DNA was measured using Nanodrop (PeqLab Biotechnology GmbH, Germany). A total of 9 microsatellites multiplexed in 2 polymerase chain reaction (PCR) protocols were used to confirm the exclusively maternal mode of inheritance of the resulting gynogenetic embryos and fry.
Ploidy determination by flow cytometry
Relative DNA content of embryonic/larval cells was used to infer ploidy of the gynogenetic stickleback embryos/fry. DNA content of cells was measured after DNA staining with propidium iodide by means of flow cytometry (FACS Calibur, BD Biosciences, Belgium) according to the combined protocols used for ploidy determination and for cell cycle analysis of stickleback leukocytes with some modifications. In brief, embryos and fry were collected between 11:00 to 13:00 and individually placed in a 40 μm cell strainer (Falcon, BD Biosciences, Europe) standing inside a small plastic Petri-dish containing 1 ml RPMI 1640 medium (Sigma) with 10% v/v distilled water (R-90). Single cell suspensions from embryos/larvae were produced by pressing it through the nylon mesh of the strainer with the help of a pestle. The resulting cell suspensions were transferred to individual wells of a 96 well deep-well micro titer plate and washed twice (600 × g, 10 min, 4°C) with 0.8 ml cold R-90 medium. After washing, cells were resuspended with 200 μl R-90 and fixed with 800 μl ice cold 99% ethanol. After fixation, plates were centrifuged (600 × g, 10 min, 4°C), the supernatant ethanol was removed and the cells were resuspended with 250 μl Sheath fluid (BD) containing RNAse (0.5 mg L-1) to remove background staining of RNA. The cell suspension was incubated for 10 minutes at room temperature before it was stained with propidium iodide (0.5 mg L-1, Sigma), a red fluorescence dye which intercalates with double stranded DNA. Red fluorescence characteristics of at least 10,000 cells were recorded per sample by means of flow cytometry. For analysis, doublet cells were subtracted from single cells as described by Wersto and co-workers . DNA content of single cells was analyzed by CellQuest (BD Immunocytometry Systems, San Jose, CA).
Statistical analysis was conducted using R stats v. 2.12.2. Data pertaining to UV and HS optimization were log transformed to meet normal distribution. Analyses of variance (ANOVA) were then conducted on fertilization rate using UV irradiation as independent variable and on diploid gynogen yield with the different HS parameters as independent variables. Values were taken as significant when P < 0.5.
Individual heterozygosity was calculated across all scored loci according to Coulson and co-workers with modification in terms of genotype scoring. In addition to the common genotype scoring of "1" (heterozygous) or "0" (homozygous), an individual homozygous for an allele shared by both parents was scored as "0.5". The difference between control and HS treatment was tested in an additional ANOVA.
The authors are grateful for the technical help extended by Stephanie Bartel, Roswithe Derner, and Ines Schultz. We are also thankful to Arne Traulsen and Mahesh Panchal who gave helpful comments on the manuscript.
- Mardis ER: Next-generation DNA sequencing methods. Annu Rev Genomics. Hum Genet. 2008, 9: 387-402. 10.1146/annurev.genom.9.081307.164359.View ArticlePubMedGoogle Scholar
- Mardis ER: The impact of next-generation sequencing technology on genetics. Trends Genet. 2008, 24: 133-141. 10.1016/j.tig.2007.12.007.View ArticlePubMedGoogle Scholar
- Imelfort M, Duran C, Batley J, Edwards D: Discovering genetic polymorphisms in next-generation sequencing data. J Plant Biotechnol. 2009, 7: 312-317. 10.1111/j.1467-7652.2009.00406.x.View ArticleGoogle Scholar
- Vinson JP, Jaffe DB, O'Neil K, Karlsson EK, Stange-Thomann N, Anderson S, Mesirov JP, Satou N, Satou Y, Nusbaum C, Birren B, Galagan JE, Lander ES: Assembly of polymorphic genomes: Algorithms and application to Ciona savignyi. Genome Res. 2005, 8: 1127-1135.View ArticleGoogle Scholar
- Talon M, Gmitter FG: Citrus genomics. International Journal of Plant Genomics. 2008, Article ID 528361-Google Scholar
- Waldbieser GC, Bosworth BG, Quiniou SM: Production of viable homozygous, double diploid channel catfish (Ictalarus punctatus). Mar Biotechnol (NY). 2010, 12 (4): 380-385. 10.1007/s10126-009-9221-2.View ArticleGoogle Scholar
- Gonzalez VM, Benjak A, Henaff EM, Mir G, Casacuberta JM, Garcia-Mas J, Puigdomenech PS: Sequencing of 6.7 Mb of the melon genome using a BAC pooling strategy. BMC Plant Biology. 2010, 10e-246Google Scholar
- Young WP, Wheeler PA, Coryell VH, Keim P, Thoorgard GH: A detailed linkage map of rainbow trout produced using doubled haploids. Genetics. 1998, 148 (2): 839-850.PubMed CentralPubMedGoogle Scholar
- Green MC: Genetic variants and strains of the laboratory mouse. 1981, New York: Gustav Fischer VerlagGoogle Scholar
- Scheerer PD, Thorgaard GH, Allendorf FW: Genetic analysis of androgenetic rainbow trout. J Exp Zool. 1991, 260: 382-390. 10.1002/jez.1402600312.View ArticlePubMedGoogle Scholar
- Hirsch N, Zimmerman LB, Grainger RM: Xenopus the Next Generation: X. tropicalis Genetics and Genomics. Dev Dynamics. 2002, 225: 422-433. 10.1002/dvdy.10178.View ArticleGoogle Scholar
- Noramly S, Zimmerman L, Cox A, Aloise R, Fisher M, Grainger RM: A gynogenetic screen to isolate naturally occurring recessive mutations in Xenopus tropicalis. Mech Develop. 2005, 122: 273-287. 10.1016/j.mod.2004.11.001.View ArticleGoogle Scholar
- Pelegri F, Dekens MPS, Schulte-Merker S, Maischein HM, Weiler C, Nusslein-Volhard C: Identification of recessive maternal-effect mutations in the zebrafish using a gynogenesis-based method. Dev Dynam. 2004, 231: 324-325. 10.1002/dvdy.20145.View ArticleGoogle Scholar
- Goda T, Abu-Daya A, Carruthers S, Clark MD, Stemple DL, Zimmerman LB: Genetic screens for mutations affecting development of Xenopus laevis. PloS Genetics. 2006, 2 (6): e91-10.1371/journal.pgen.0020091.PubMed CentralView ArticlePubMedGoogle Scholar
- Thoorgard GH: Ploidy manipulation and performance. Aquaculture. 1986, 57: 57-64. 10.1016/0044-8486(86)90180-8.View ArticleGoogle Scholar
- Hubbs C, Hubbs L: Apparent parthenogenesis in nature in a form of fish of hybrid origin. Science. 1932, 76: 628-30. 10.1126/science.76.1983.628.View ArticlePubMedGoogle Scholar
- Schartl M, Wilde B, Schlupp I, Parzefall J: Evolutionary origin of parthenoform, the amazon molly Poecilia formosa on the basis of a molecular genealogy. Evolution. 1995, 49: 827-835. 10.2307/2410406.View ArticleGoogle Scholar
- Mezhzherin SV, Kokodiĭ SV: Genetic structure of silver crussian carp Carassius (superspecies auratus) (Linnaeus, 1758) colonies from the Middle Dnieper basin. Genetika. 2010, 46 (6): 817-24.PubMedGoogle Scholar
- Pandian TJ, Koteeswaran R: Ploidy induction and sex control in fish. Hydrobiologia. 1998, 384: 167-243. 10.1023/A:1003332526659.View ArticleGoogle Scholar
- Chourrout D: Gynogenesis caused by ultraviolet irradiation of salmonid sperm. J Exp Zool. 1982, 223 (2): 175-81. 10.1002/jez.1402230209.View ArticlePubMedGoogle Scholar
- Komen H, Thorgaard GH: Androgenesis, gynogenesis, and the production of clones in fishes: A review. Aquaculture. 2007, 269 (1-4): 150-173. 10.1016/j.aquaculture.2007.05.009.View ArticleGoogle Scholar
- Yuan-Dong S, Chun Z, Shao-Jun L, Min T, Chen Z, Yun L: Induction of gynogenesis in Japanese crucian carp (Carassius cuvieri). Acta Genetica Sinica. 2006, 33: 405-412. 10.1016/S0379-4172(06)60067-X.View ArticleGoogle Scholar
- Naruse K, Iriji K, Shima A, Egami N: The production of cloned fish in the medaka (Oryzias latipes). J Exp Zool. 1985, 236: 335-341. 10.1002/jez.1402360311.View ArticlePubMedGoogle Scholar
- Bongers ABJ, Sukkel M, Gort G, Komen J, Richter CJJ: Development and use of genetically uniform strains of common carp in experimental animal research. Lab Anim. 1998, 32 (4): 349-363. 10.1258/002367798780599749.View ArticlePubMedGoogle Scholar
- Dabrowski K, Rinchard J, Lin F, Garcia-Abiado MA, Schmidt D: Induction of gynogenesis in muskellunge with irradiated sperm of yellow perch proves diploid muskellunge male homogamety. J Exp Zool. 2000, 287 (1): 96-105. 10.1002/1097-010X(20000615)287:1<96::AID-JEZ13>3.0.CO;2-N.View ArticlePubMedGoogle Scholar
- Lin F, Dabrowski K: Effects of sperm irradiation and heat shock on induction of gynogenesis in muskellunge (Esox masquinongy). Can J Fish Aquat Sci. 1996, 53: 2067-2075. 10.1139/cjfas-53-9-2067.Google Scholar
- Paschos I, Natsis L, Nathanailides C, Kagalou I, Kolettas E: Induction of gynogenesis and androgenesis in goldfish Carassius auratus (var. oranda). Reprod Domes Anim. 2001, 36 (3-4): 195-198.View ArticleGoogle Scholar
- Rekubratsii AV, Grunina AS, Barmintsev VA, Golovanova TS, Chudinov OS, Abramova AB, Panchenko NS, Kupchenko SA: Meiotic gynogenesis in the stellate, Russian sturgeon and starlet. Ontogenez. 2003, 32 (2): 121-131.Google Scholar
- Nam YK, Choi GC, Kim DS: An efficient method for blocking the 1st mitotic cleavage of fish zygote using combined thermal treatment, exemplified by mud loach (Misgurnus mizolepis). Theriogenology. 2004, 61: 933-945. 10.1016/S0093-691X(03)00258-9.View ArticlePubMedGoogle Scholar
- Rinchard J, Dabrowski K, Garcia-Abiado MA: High efficiency of meotic gynogenesis in sea lamprey Petromyzon marinus. J Exp Zool B Mol Dev Evol. 2006, 306 (6): 521-527.View ArticlePubMedGoogle Scholar
- Fopp-Bayat D: Induction of diploid gynogenesis in Wels catfish (Silurus glanis) using UV-irradiated grass carp (Ctenopharyngodon idella) sperm. J Exp Zool A Ecol Genet Physiol. 2010, 313 (1): 22-27.Google Scholar
- Bell MA, Foster SA: The evolutionary biology of the threespine stickleback. 1994, Oxford: Oxford University Press, 571-Google Scholar
- Cresko W, McGuigan K, Phillips P, Postlethwait J: Studies of threespine stickleback developmental evolution: progress and promise. Genetica. 2007, 129: 105-126.View ArticlePubMedGoogle Scholar
- Kingsley DM, Zhu BL, Osoegawa K, De Jong PJ, Schein J, Marra M, Peichel C, Amamiya C, Schluter D, Balabhadra S, Friedlander B, Cha YM, Dickson M, Grimwood J, Schmutz J, Talbot WS, Myers R: New genomic tools for molecular studies of evolutionary change in threespine sticklebacks. Behaviour. 2004, 141: 1331-1344. 10.1163/1568539042948150.View ArticleGoogle Scholar
- Peichel CL, Nereng KS, Ohgi KA, Cole BLE, Colosimo PF, Buerkle CA, Schluter D, Kingsley DM: The genetic architecture of divergence between threespine stickleback species. Nature. 2001, 414: 901-905. 10.1038/414901a.View ArticlePubMedGoogle Scholar
- Kingsley DM: Sequencing the genome of threespine sticklebacks (Gasterosteus aculeatus). National Human Genome Research Institute White Paper. 2003, [http://www.genome.gov/Pages/Research/Sequencing/SeqProposals/SticklebackSEQ.pdf]Google Scholar
- Colosimo PF, Hosemann KE, Balabhadra S, Villareal G, Dickson M, Grimwood J, Schmutz J, Myers RM, Schluter D, Kingsley DM: Widespread parallel evolution in sticklebacks by repeated fixation of ectodysplasin alleles. Science. 2005, 307: 1928-1932. 10.1126/science.1107239.View ArticlePubMedGoogle Scholar
- Gibson G: The synthesis and evolution of a supermodel. Science. 2005, 307: 1890-1891. 10.1126/science.1109835.View ArticlePubMedGoogle Scholar
- Hohenlohe PA, Bassham S, Etter PD, Stiffler N, Johnson EA, Cresko WA: Population genomics of parallel adaptation in threespine stickleback using sequenced RAD tags. PLOS Genetics. 2010, 6 (2): e1000862-10.1371/journal.pgen.1000862.PubMed CentralView ArticlePubMedGoogle Scholar
- Swarup H: Production of heteroploidy in the three-spined stickleback, Gasterosteus aculeatus (L.). Nature. 1956, 178: 1124-1125. 10.1038/1781124a0.View ArticleGoogle Scholar
- Swarup H: Production of haploidy in experimentally treated eggs of Gasterosteus aculeatus. Proc Natl Acad Sci India Sect B. 1957, 27: 274-27842.Google Scholar
- Purdon CE: Radiation induced gynogenesis and androgenesis in fish. Heredity. 1969, 24: 431-444. 10.1038/hdy.1969.59.View ArticleGoogle Scholar
- Chourrout D: Thermal induction of diploid gynogenesis and triploidy on the rainbow trout (Salmo gairdneri Richardson). Reprod Nutr Dev. 1980, 20: 727-733. 10.1051/rnd:19800415.View ArticlePubMedGoogle Scholar
- Streisinger G, Walker C, Dower N, Knauber D, Singer F: Production of clones of homozygous diploid zebrafish (Brachydanio rerio). Nature. 1981, 291: 293-296. 10.1038/291293a0.View ArticlePubMedGoogle Scholar
- Refstie T, Stoss J, Donaldson EM: Production of all female Coho salmon (Oncorhynchus kisutch) by diploid gynogenesis using irradiated sperm and cold shock. Aquaculture. 1982, 29: 67-82. 10.1016/0044-8486(82)90034-5.View ArticleGoogle Scholar
- Taniguchi N, Kijima A, Fukai J, Inada Y: Conditions to induce triploid and gynogenetic diploid in Ayu (Plecoglossus altivelis). Bull Jpn Soc Sci Fish. 1986, 52: 49-53. 10.2331/suisan.52.49.View ArticleGoogle Scholar
- Nagy A, Rajki K, Horvath L, Csanyi V: Investigation on carp Cyprinus carpio gynogenesis. J Fish Biol. 1978, 13: 215-224. 10.1111/j.1095-8649.1978.tb03428.x.View ArticleGoogle Scholar
- Chourrout D: Use of grayling sperm (Thymallus thymallus) as a marker for the production of gynogenetic rainbow trout (Salmo gairdneri). Theor Appl Genet. 1986, 72: 633-636. 10.1007/BF00289001.View ArticlePubMedGoogle Scholar
- Kunzt A, Radcliffe L: Notes on the embryology and larval development of twelve teleostean fishes. Washington Bull Bur Fish. 1915, 35: 87-134.Google Scholar
- Iriji K: Gamma-ray irradiation of the sperm of the fish Oryzias latipes and induction of gynogenesis. J Radiat Res. 1980, 21: 263-270.View ArticleGoogle Scholar
- Iriji K, Egami N: Hertwig effect caused by UV irradiation of sperm of Oryzias latipes (teleost) and its photoreactivation. Mut Res. 1980, 69: 241-248. 10.1016/0027-5107(80)90089-5.View ArticleGoogle Scholar
- Gomelsky B, Mims SD, Onders RJ, Shelton WL, Dabrowski K, Garcia-Abiado MA: Induced gynogenesis in black crappie. North American Journal of Aquaculture. 2000, 62 (1): 33-41. 10.1577/1548-8454(2000)062<0033:IGIBC>2.0.CO;2.View ArticleGoogle Scholar
- Khan TA, Bhise MP, Lakra WE: Early heat shock induced diploid gynogenesis in common carp (Cyprinus carpio L.). Isr J Aquacult-Bamid. 2000, 52: 11-20.Google Scholar
- Chakraborty BK, Miah MI, Mirja MJA, Habib MAB: Induction of gynogenesis in endangered sarpunti, Puntius sarana (Hamilton) and evidence for female homogamety. Aquaculture. 2006, 258: 312-320. 10.1016/j.aquaculture.2006.03.037.View ArticleGoogle Scholar
- Palti Y, Li JJ, Thoorgard GH: Improved efficiency of heat and pressure shocks for producing gynogenetic rainbow trout. Prog Fish Cult. 1997, 59: 1-13. 10.1577/1548-8640(1997)059<0001:IEOHAP>2.3.CO;2.View ArticleGoogle Scholar
- Palti Y, Shirack A, Cnaani A, Hulata G, Avtalion RR, Ron M: Detection of genes with deleterious alleles in an inbred line of tilapia Oreochromis aureus. Aquaculture. 2002, 206: 151-164. 10.1016/S0044-8486(01)00727-X.View ArticleGoogle Scholar
- Castro J, Bouza C, Sanchez L, Cal RM, Piferrer F, Martinez P: Gynogenesis assessment using microsatellite genetic markers in turbot (Scopthalmus maximus). Mar Biotech (NY). 2003, 5 (6): 584-592. 10.1007/s10126-003-0004-x.View ArticleGoogle Scholar
- Chen SL, Liu YG, Xu MY, Li J: Isolation and characterization of polymorphic microsatellite loci from an EST-library of red sea bream (Chrysophrys major) and cross-species amplification. Mol Ecol Notes. 2005, 5: 215-217. 10.1111/j.1471-8286.2005.00880.x.View ArticleGoogle Scholar
- Eizaguirre C, Yeates SE, Lenz TL, Kalbe M, Milinski M: MHC-based mate choice combines good genes and maintenance of MHC polymorphism. Mol Ecol. 2009, 18 (15): 3316-29. 10.1111/j.1365-294X.2009.04243.x. Epub 2009 Jun 11View ArticlePubMedGoogle Scholar
- Allen SK: Flow cytometry-assaying experimental polyploid fish and shellfish. Aquaculture. 1983, 33: 317-328. 10.1016/0044-8486(83)90412-X.View ArticleGoogle Scholar
- Scharsack JP, Koch K, Hammerschmidt K: Who is in control of the stickleback immune system: interactions between Schistocephalus solidus and its specific vertebrate host. P Roy Soc Lond B Biol. 2007, 274: 3151-58. 10.1098/rspb.2007.1148.View ArticleGoogle Scholar
- Wersto RP, Chrest FJ, Leary JF, Morris C, Stetler-Stevenson MA, Gabrielson E: Doublet discrimination in DNA cell-cycle analysis. Cytometry. 2001, 46: 296-306. 10.1002/cyto.1171.View ArticlePubMedGoogle Scholar
- Coulson TN, Pemberton JM, Albon SD, Beaumont M, Marshall TC, Slate J, Guiness FE, Clutton-Brock TH: Microsatellites reveal heterosis in red deer. Proc R Soc Lond B. 1998, 265: 489-495. 10.1098/rspb.1998.0321.View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | <urn:uuid:be5eec60-167a-4028-a550-1b55f1d7f2cb> | {
"date": "2019-01-23T18:01:05",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584336901.97/warc/CC-MAIN-20190123172047-20190123194047-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8797667026519775,
"score": 2.71875,
"token_count": 10100,
"url": "https://bmcdevbiol.biomedcentral.com/articles/10.1186/1471-213X-11-55"
} |
Ten and Out
- One marker (small chain, coin, or stone) per player
- Use chalk to draw the hopscotch court shown above.
- The first player stands in front of space one. He tosses his marker into that space, then hops on one foot into the space, bends over and picks up his marker, and hops up the court and back again on one foot, hopping in each space both up and back.
- He then tosses his marker into the next space, hops to that space, picks up his marker, and hops up the court and back again.
- He continues hopping in this way until he fouls out (hops on a line, puts both feet down, or misses his target when tossing his marker).
- The players take turns tossing and hopping in the same way.
- When it's the first player's turn again, he starts hopping from where he fouled out on his last turn.
- The winner is the first player to finish the entire sequence of tosses and hops, including the space labeled out.
More on: Activities for Kids
Copyright © 2001 by Patricia Kuffner. Excerpted from The Children's Busy Book with permission of its publisher, Meadowbrook Press.
To order this book visit Meadowbrook Press. | <urn:uuid:c3e931f9-a5bc-417e-8244-63e10e30afae> | {
"date": "2014-10-01T06:04:08",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663365.9/warc/CC-MAIN-20140930004103-00272-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9607423543930054,
"score": 3.21875,
"token_count": 269,
"url": "http://fun.familyeducation.com/activity/exercise/37231.html"
} |
Wednesday, May 18, 2011
On this date in 1927, Bath, MI became the scene of the largest school mass-murder in U.S. history. The massacre began when school board member Andrew Kehoe became upset over an increase in the school tax that he blamed for his financial ruination.
Kehoe began by killing his wife and detonating fire bombs in his farm buildings. While firefighters worked to put out the fires on Kehoe's property, Kehoe went to the Bath Consolidated School, where he detonated bombs he had previously planted in the school.
Kehoe left the scene after the explosion, but returned a short while later. He saw the school superintendent standing outside the school watching rescue and recovery efforts, and called to him. As the superintendent approached the car, Kehoe detonated a bomb inside the car. The blast killed Kehoe, the superintendent, two local men, and an 8 year old boy who had managed to escape the school bombing.
The Bath School Disaster resulted in 45 dead and 58 injured. In 1975, a park dedicated to the victims was built on the former site of the school.
truTV - Hell Comes to Bath
The Bath School Disaster
Wikipedia - Bath School Disaster | <urn:uuid:e3837ce2-52b7-4c68-b819-95fead86d936> | {
"date": "2013-12-05T06:07:47",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163040130/warc/CC-MAIN-20131204131720-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9838457107543945,
"score": 2.859375,
"token_count": 249,
"url": "http://armedrobbery.blogspot.com/2011/05/this-day-in-crime-history-may-18-1927.html"
} |
Designed to give children a providential view of history, this colorful and engaging book covers world history in an age appropriate manner, always careful to point out how God was at work during each age. Seamlessly weaving together vocabulary, world history, the Bible and geography, this integrated reader is filled with eye catching photos and illustrations to catch little ones' eyes, and the engaging text will keep older children engrossed. Words to Know, projects and reviews are included at the end of each chapter. 122 pages, softcover. Grade 1. | <urn:uuid:142af01b-cadd-4413-9663-642795494491> | {
"date": "2018-01-20T11:27:45",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889567.48/warc/CC-MAIN-20180120102905-20180120122905-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9475353956222534,
"score": 2.6875,
"token_count": 110,
"url": "http://christian-book-store.christiansunite.com/79900/History-for-Little-Pilgrims,-Grade-1.shtml"
} |
Salmonella in Swine: Microbiota Interactions.
Kim HB, Isaacson RE
Annu Rev Anim Biosci. Feb 2017. doi: 10.1146/annurev-animal-022516-022834
For the important foodborne pathogen Salmonella enterica to cause disease or persist in pigs, it has evolved an intricate set of interactions between itself, the host, and the indigenous microflora of the host. S. enterica must evade the host's immune system and must also overcome colonization resistance mediated by the pig's indigenous microflora. The inflammatory response against S. enterica provides the bacteria with unique metabolites and is thus exploited by S. enterica for competitive advantage. During infection, changes in the composition of the indigenous microflora occur that have been associated with a breakdown in colonization resistance. Healthy pigs that are low-level shedders of S. enterica also exhibit alterations in their indigenous microflora similar to those in ill animals. Here we review the literature on the interactions that occur between swine, S. enterica, and the indigenous microflora and discuss methods to reduce or prevent colonization of pigs with S. enterica. | <urn:uuid:ee403682-abf7-42bc-b7f6-909b101cfa62> | {
"date": "2019-02-18T21:03:51",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247488374.18/warc/CC-MAIN-20190218200135-20190218222135-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9054587483406067,
"score": 2.890625,
"token_count": 248,
"url": "https://era7bioinformatics.com/en/page.cfm?publication=809&title=salmonella-in-swine:-microbiota-interactions"
} |
| Breeder Directory | Enter the AlpacaSeller Site | About Alpacas | Alpacas For Sale |
| Alpaca Stud Services | Packages of Alpacas For Sale | Alpaca Articles | Links
It is generally well know that acorns are a seasonal problem for most livestock, except pigs, and certainly most alpaca owners would remove any acorns that were in their paddocks in the early autumn months. However what may well be news to all alpaca owners is that the leaves of the oak tree can, in certain circumstance, also be highly toxic.
This has been seen on one farm where oak trees are present in the fields and where alpacas and their crias have grazed for many years without mishap. Although there were no acorns this winter two young crias have died and in post mortem examination the deaths have been attributed to the ingestion of oak leaves.
The first case involved a two month old cria that presented with signs of depression, anorexia and weight loss followed by diarrhoea. Despite supportive therapy and treatment aimed specifically at the causes of enteritis the cria sadly died and was sent for a full post mortem examination. This revealed severe congestion of the blood vessels in the kidneys and also the presence of large volumes of leaf material in the gut that the pathologists tentatively identified as oak. With a provisional diagnosis of kidney failure secondary to oak leaf poisoning in mind they ran checks on the urea levels in the aqueous humor of the cria?s eye and indeed found that the levels were hugely elevated lending further support to their theory.
This was followed almost immediately by a second cria displaying similar signs although this one in particular had very runny eyes that were only half open. Unfortunately the urea and creatinine levels were massively raised in this animal too and despite aggressive fluid therapy this cria also died. Post mortem again revealed a large quantity of oak leaves within the stomach.
Tannic acid is the toxic agent in oak, and is present in high levels in acorns and also in fresh green leaves and buds. Clinical signs of poisoning take some days to appear after ingestion and poisoning is usually caused by long-term ingestion of large quantities over a period of several weeks. Death is usually brought about by chronic renal failure although secondary complications such as ulceration in the gut or pulmonary oedema can prevail.
The vets investigating these two deaths can only hypothesise that the unique cases this winter were due to a number of predisposing climatic conditions. A long, warm autumn has meant that leaves have not wilted on the trees, particularly oaks, but have remained relatively fresh and green and thus have contained higher levels of the poisonous tannins. Unusually high winds have meant a heavy fall of these still fresh leaves on to the ground allowing an opportunity for them to be ingested.
Adult alpacas have remained unaffected, probably due to their greater size requiring a much increased lethal dose rate, combined with their more selective grazing behaviour. However the crias at foot, which can often be seen mimicking their mothers? grazing activity as they follow on behind, have obviously found the oak leaves both easy to pick up and one can only assume relatively palatable.
There is no specific treatment for oak poisoning. Removal from the offending pasture is essential, followed by attempts to empty the gut either by gastric lavage or the administration of oral liquid paraffin in those showing clinical signs. Aggressive fluid therapy is also vital although mortality rate for this condition are very high. Obviously prevention is better than cure and so you are recommended to cast an eye over the trees that border your grazing and take appropriate steps to avoid exposure to acorns or fresh, green leaves. | <urn:uuid:574963e9-a15c-4de0-9fde-750073b7b47b> | {
"date": "2015-03-30T10:37:33",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299261.59/warc/CC-MAIN-20150323172139-00278-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.973922073841095,
"score": 2.671875,
"token_count": 772,
"url": "http://www.alpacaseller.com/info/viewalpacaarticle.php?ArticleID=68"
} |
Cloth Better than Disposable for People and the Planet
Pamela D. Maxwell/Shutterstock.com
Disposable diapers are the third most common consumer item in landfills. When even those labeled “eco-friendly” are covered by other debris after being discarded and hidden from sunlight and air, they don’t readily biodegrade.
Producing disposables also makes major demands on water, energy, nonrenewable resources like oil and renewables like wood. Many brands contain harmful ingredients such as polyacrylate, dioxin, phthalates and heavy metals that can be absorbed by a baby’s soft, developing skin and promote rashes.
According to SmallFootprintFamily.com, 90 to 95 percent of American babies annually generate 27.4 billion single-use plastic diapers, or 7.6 billion pounds of garbage. While comparable statistics on adult diapers aren’t available, Euromonitor International forecasts a 48 percent increase in U.S. sales to $2.7 billion in 2020, up from $1.8 billion in 2015. In a decade, sales of diapers for adults could surpass those for babies at Kimberly-Clark and Procter & Gamble, attributed to bladder control issues related to health and age, according to the Urology Care Foundation and Mayo Clinic.
The American Academy of Pediatrics and the American Public Health Association advise that in all cases, fecal matter and urine should be rinsed and flushed down the toilet instead of put in the trash, so that contaminants don’t enter groundwater and potentially spread disease. Traditional cloth diapers are the way to go for several reasons beyond budget:
• Using cloth facilitates earlier potty education by quickly communicating to the baby when they are wet. New cloth diaper systems like Nicki’s Diapers can be easily cleaned in regular and high-efficiency washing machines. Some popular brands are listed at DiaperPin.com.
• The nonprofit association at RealDiapers.org helps connect local groups of mothers to communicate and share best practices in use, cleaning and potty training, such as learning a baby’s cues for needing to go. It also hosts informative events such as the annual national Great Cloth Diaper Change.
• Cloth diapers in good condition can be resold on eBay and sites like DiaperSwappers.com.
Edit ModuleShow Tags
This article appears in the May 2017 issue of Natural Awakenings. | <urn:uuid:eb3612a7-2434-49c1-8fca-75d0edc319dc> | {
"date": "2018-10-15T16:03:17",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509326.21/warc/CC-MAIN-20181015142752-20181015164252-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.912248969078064,
"score": 2.734375,
"token_count": 507,
"url": "https://www.enaturalawakenings.com/Global-Briefs-Archive/Greener-Diapers/"
} |
There are different periods of the Assyrian empire. The first was called the Old Assyrian period which lasted from 2000-1550 BC. Then there was the Middle Assyrian period which lasted from 1550-1200 BC. The last was the Neo-Assyrian period which lasted from 1200-600 BC. The final phase of the Neo-Assyrian period is called the Assyrian Empire.
The Old and Middle Assyrian periods (2000 – 1200 BC)
The name Ashur was used by the Assyrians to designate not only their country, but also their most ancient city and their national god. The cities of Ashur (near modern al-Sharqat), Nineveh, and Irbil formed a triangle that defined the original territory of Assyria. Assyria’s early history was marked by frequent episodes of foreign rule. Assyria finally gained its independence around 2000 BC. About this time the Assyrians established a number of trading colonies in Cappadocia (central Anatolia), protected by treaties with local Hattic rulers. The most important of these was at Kultepe (Kanesh), north of present-day Kayseri, Turkey. Political developments Brought this enterprise to an end in 1750 BC. Assyria lost its independence to a dynasty of Amorite. Then Hammurabi of Babylon took over and established himself ruler of Assyria. The collapse of Hammurabi’s Old Babylonian dynasty gave Assyria only temporary relief. It soon fell under the control of the Mitanni, until that state was destroyed by the Hittites c.1350 BC.
The Early Neo-Assyrian Period (c.1200-600 BC)
After the collapse of Mittanni, Assyria regained its independence and was able to hold it thanks to the weakness of its neighbors. The most important event in Assyrian history during the 13 century BC, was the capture of Babylon by King Tukulti-Ninurta (r.1244-1208 BC). Although the conquest was short-lived the memory of it remained strong. In the following centuries the chief adversaries of the Assyrians were the Aramaeans, who settled in Syria and along the upper Tigris and the Euphrates rivers, where they founded a number of states. In the 9th century BC, under Ashurnasirpal II (r.883-859 BC) and Shalmaneser III (859-824 BC), the Assyrians finally managed to conquer Bit-Adini (Beth-Eden), the most powerful Aramaen state on the upper Euphrates. Shalmaneser then tried to invade the Syrian heartland, where he met with serious resistance from a coalition of kings that included Ahab of Israel. They successfully opposed him at the battle karkar in 853 BC. Internal disagreements marked the end of Shalmaneser’s reign, and many of his conquests were lost.
Assyrian power began with Tiglath-Peleser III (r. 745-727 BC) taking over the throne. He began on administrative reforms aimed at strengthening royal authority over the provinces. Districts were reduced in size and placed under governors directly responsible to the king. Outside Assyria, slave states were taken over and made into Assyrian provinces. In Syria, Tiglath-Pileser fought and defeated a number of anti-Assyrian alliances. In 732 BC he ruined Damascus, deporting its population and that of northern Israel to Assyria. In 729 he captured Babylon to guard against a Chaldean-led rebellion there and was proclaimed king of Babylon under the name Pulu (Biblical Pul). His administrative reforms and military victories laid the foundation of the Assyrian Empire. Tiglath-Peleser’s son, Shalmaneser V, is remembered for his siege of Samaria, the capital of Israel (recorded in 2 Kings: 17-18). H died during the siege and was succeeded by Sargon II, who took credit for the destruction of Samaria and the exile of its people in 722 BC.
The end of the Assyrian Empire
The Assyrian Empire was faced with many challenges, Babylon successfully resisted Assyrian attempts to remove a Chaldean tribal chief who allied with Elam for over 10 years, a crusade against the northern state of Urartu, which resulted in their defeat and battling with rebellious coastal cities. The war against his Elamite ally continued for several years with indecisive results. Finally, after another revolt in Babylon, Sennacherib conquered the city and destroyed in 689 BC. He was assassinated by members of his own family in 681 BC.
Esarhaddon (r.608-669 BC), son of Sennacherib, rebuilt Babylon and tried to appease the Babylonian’s. During his reign, incursions by the Cimmerians and Scythians posed serious threats to Assyrian possessions in Anatolia and Media (northwest Iran), the latter of which was a major source of horses for the Assyrian army. Esarhaddon’s principle accomplishment was the conquest of Egypt, begun by him in 675 BC, but completed by his son Ashurbanipal (r.668-627 BC). Ashurbanipal, was the last great king of Assyria and had to deal with many revolts. He led an expedition against Elam and captured Susa, its capital city. After his death, however, the empire gradually disintegrated. In 626 BC, Nabopalassar, a Chaldean nobleman, proclaimed Babylonian independence and, allied with the Medes, set out to challenge Assyria. In the years 614-609, Ashur and Nieveh were captured by the Medes, and the Assyrian king fled to Harran on the northwest frontier. In 605 BC, Nabopolassar’s son, Nebuchadnezzar, defeated an Egyptian army that had come to the aid of the Assyrians, thus completing the destruction of the Assyrian state.
Assyrian Society and Culture
Before the development of modern archaeology, the Bible was the chief source of information about Assyria. The image of Assyria by the biblical accounts is one of irresistible military might. It was seen as an instrument of God’s wrath against a sinful people. Archaeological excavations, have unearthed the monuments and written records of the Assyrians kings, confirming this picture of military prowess and terrible brutality. They maimed, burned, speared and denounced harshly their captives. They wanted to instill terror and discourage rebellion. They also deported to cities and farmlands the enemy populations.
Assyria dominated Babylonia politically, however, culturally was dependent on the south. The first major collection of cuneiform tablets discovered by 19th-century excavators–the library of Ashurbanipal at Nineveh–consists of myths, epics, rituals, lexical texts, wisdom literature, and prophetic and magical texts, providing a representative sample of Babylonian scholastic literature.
Assyrian art is usually associated with the colossal winged bulls and lions that guarded the entrances of their palaces, but even finer are the bas-reliefs on the palace walls and the carved ivories used to decorate their furniture. The bas-reliefs portray the Assyrian kings hunting, kneeling before their gods, or conquering foreign cities. | <urn:uuid:45c753fc-7e2b-4864-82ea-6e36faf64b1b> | {
"date": "2018-09-25T07:38:07",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161214.92/warc/CC-MAIN-20180925063826-20180925084226-00256.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9694867730140686,
"score": 4.125,
"token_count": 1537,
"url": "https://schoolworkhelper.net/the-assyrian-empire-culture-rise-fall/"
} |
The other day, Slate magazine posted a map titled “Literal Meanings of Places in the US.” It’s a fun graphic, I recommend it, but I will also mention a couple of caveats. These caveats may be obvious in themselves, but perhaps I can express them in a way that will suggest interesting thoughts.
First, what is the “literal meaning” of a name? When I think of that phrase, I ask two questions. First, is the name likely to bring that meaning to the minds of most of the people who are likely to hear it? And second, can the name be used independently to signify that meaning? For example, the name “Newfoundland” likely brings to the minds of most English speakers, not only the place Newfoundland and the breed of dogs named after it, but also the idea that a land has been newly found. With just a little typographical liberty, we can refer to places other than Newfoundland as new-found lands. So I don’t object to saying that new-found land is the “literal meaning” of Newfoundland.
What we see on this map are not, in that sense, the “literal meanings” of North American place names. They are etymological meanings, that is to say, meanings that have, at one time or another, been associated with words that have influenced the development of those names. For example, “New York” is supposed to “literally mean” “New Yew-Tree Village.” When the Latinism Eboracum was coined sometime before the year 95 of our era it probably represented an attempt to spell in Roman letters a Celtic word that meant “Place of the Yew Trees.” And Eboracum, evolving in tandem with that Celtic word, changed its pronunciation over the centuries to become “York.” But of course only scholars hear the word “York” and think “Place of the Yew Trees.” And by the time the word came to be pronounced “York” it was centuries past any connection with yew trees. I suspect that no one has ever looked at a place of yew trees and called it a “York.”
I think it would be reasonable to imagine the history of a word as something like an archaeological site, in which collections of material from different periods of history can be found concentrated on on top of another. So, two thousand years ago, Eboracum and its Celtic root may have meant “Place of the Yew Trees” to most of the people concerned with settlements in the far northeast of Roman Britannia.
At a a higher stratum, that is to say, a later period, very different meanings are associated with the word. The acts of the British crown which created the Province of New York in 1664, 1665, and 1674 and thus introduced the name “New York” into the English language were executed by a king who was not only ignorant of the Celtic etymology of the name “York,” but who was not likely giving much thought to the city of that name. The province was created under the patronage of the king’s brother, the Duke of York, and was named for him. That nobleman later became King James II of England and VII of Scotland, the last of the Stuart dynasty. James was York by title, but doesn’t seem to have been greatly involved with the city or its affairs, and he never visited the North American territory claimed in his name. It is as if we found that someplace named New Newfoundland was named, not for Newfoundland, but for a particular dog of the Newfoundland breed. At that point, the etymology of the name might have been glossed as something like “James’ new province,” or, considering James’ awkward position within the royal house in 1664, “We still care about you, James.”
If we dig further down to an earlier period, the root word might have meant something quite different. Various Celtic languages include words similar to Eboracum that refer to various trees; perhaps the root of those words meant something other than “yew tree.” It is possible that Phoenician merchants, whom we know to have been active in Cornwall and southern Ireland in Roman times, brought with them a word cognate with the Coptic ebu, “ivory,” and its Latin derivative ebor, eboris, and that this word was the base of those Celtic words. This may not be a particularly likely etymology, but I have never been one to miss an opportunity to bring up the Phoenicians.
A second point enters in with glosses like “of the monks” for Des Moines, Iowa. This appears to be a folk etymology that white settlers applied to mooyiinkweena, a name that the Peoria people used for certain neighbors of theirs. The opinion the Peoria had of those neighbors can be surmised from the fact that the parts of the word mooyiinkweena appear to be mooy, meaning “dung,” and iinkwee, meaning “face.” So, when they pointed at the site where Des Moines now stands and said mooyiinkweena, they were telling the whites that the people who lived there were shit-faces. I should add that the erudite sources I link to above are not where I first learned the etymology of “Des Moines”; I first saw it last week on Cracked.
Originally, the folk etymology of Des Moines might have been a mistake. But words mean what people use them to mean, not what they are supposed to mean. If Des Moines residents and others who are concerned with the city have thought that the meaning “of the monks” is part of the name’s history, then it is part of that history. And the fact that the name is now “Des Moines” rather than “Mooyiinkweena” is an example of the role that the folk etymology plays in that history. Therefore, a map listing etymological meanings of North American place names would have to include both “of the monks” and “shit-faces” for Des Moines. To return to the image of an etymology as an archaeological site stratified into layers, we might think of a three-dimensional map, on which both the geographic location of the places and the temporal development of the names’ meanings could be represented.
Even the two-dimensional map on Slate must be the result of a great deal of work; a three-dimensional map would require a great deal of drudgery, and even then it would be a severe oversimplification. So I mention it only to illustrate the point, not to find fault with the map or to take back my recommendation that everyone look at it. | <urn:uuid:79804cda-e9a9-4c49-a19f-b0bb2d40964d> | {
"date": "2017-04-23T08:06:47",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00056-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.977407693862915,
"score": 2.953125,
"token_count": 1462,
"url": "https://losthunderlads.com/tag/etymology/"
} |
The CVV number is a 3 or 4 digit number (associated with a credit card) that is used for verification in case of Card Not Present (CNP) transactions. CVV stands for Card Verification Value and is also called Card Security Code (CSC), Card Verification Code (CVC), Verification code (V-code or V code), and Signature Panel Code (SPC).
CVV numbers are used to authenticate the card, as an additional security measure when the card is used in online transactions. It is like an ATM pin.
I am unable to understand why the CVV number is printed on the card, whereas the ATM pin is provided to the card holder separately.
Every time the credit card is used (for swiping), the staff at the outlet have access to the card. They can copy/ remember all the details on the card and later the same details can be used to place online orders. Also, if the card is stolen, the thief has most of the details necessary to place online orders on many shopping sites.
Printing the CVV number on the card is like printing the ATM Pin on the card.
So, can someone please throw some light on why the CVV numbers are still being printed on credit cards, while the same card companies are resorting to sophisticated security systems to prevent fraud?
In the meantime, all of us may be safer if we smudge the CVV numbers from our credit cards.
Click here for an Economic Times article regarding the same:
By the way, the cards shown in this post are not mine :-). | <urn:uuid:6243b6cb-cde1-4333-8d47-32f48a0be2a1> | {
"date": "2018-10-19T02:54:36",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512268.20/warc/CC-MAIN-20181019020142-20181019041642-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9351890087127686,
"score": 2.6875,
"token_count": 328,
"url": "https://rajeshnaik.com/tag/credit-card/"
} |
Merging and changing lanes
Where two lanes merge into one (i.e. lane lines end) the vehicle in front has the right of way.
If there are dual lanes, and the lane you are in ends, give way to the vehicles in the lane you are moving into.
- Always use your indicator to signal your intentions to other drivers when merging;
- Keep a safe distance between your vehicle and the vehicle in front of you and take turns to merge if there are long lines of merging traffic;
- You need to match the legal speed of the road you’re merging into.
|Failing to give way when merging
|Failing to give way when changing lanes
The information available on our website provides a simple interpretation of the law and is not intended to constitute legal advice. Full details of traffic offences and penalties are contained in the Road Traffic Code 2000. | <urn:uuid:65299479-50dc-4c95-b064-fb91e0f0a7b7> | {
"date": "2019-04-26T01:50:26",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578747424.89/warc/CC-MAIN-20190426013652-20190426035652-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9079616665840149,
"score": 2.671875,
"token_count": 182,
"url": "https://www.rsc.wa.gov.au/Rules-Penalties/Browse/Merging"
} |
Today's high-tech world allows home security systems to protect loved ones and possessions, but it also gives more temptation for thieves. The introduction of smartphones allowed users to streamline their daily routine, combining a phone, music player and internet access into one device. The volume of personal information makes smartphones a prime target for robbers.
Being smart and safe Many used their cell phones in the open when texting became a popular means of communication. This posed a personal security hazard at a time when cell phones were expensive and not yet a commodity. As the cell phone market grew, prices lowered and the devices were more accessible. This limited the range of products that thieves would be interested in to only the newer models.
Texting continues to be a popular practice amongst cell phone users. This poses a risk, as the cell phone is held away from the body, making the device easy for thieves to grab. Phone calls usually require the phone to be held to the user's ear, creating a more secure posture. Potential robberies would have to be done at a closer range, allowing people a better reaction time and a greater chance of noticing the thief.
Try to limit the visibility of the device. Don't text when a short phone call will suffice. Refrain from playing games on the device in public. Keep your phone in a deep coat pocket or your purse. Don't make yourself an easy target by exposing your phone in public.
Removing personal information from a stolen device Earlier this year, a San Francisco district attorney and a New York attorney general met with representatives of Google and Apple to discuss the implementation of kill switches for users who had their phones stolen in an attempt to better protect their personal information.
Two months later in August, Google released the Device Manager for Android users, which allows owners to remotely wipe their devices in the event that it is stolen. Apple has also enabled this feature on iPhones. This added security precaution allowed victims to protect their personal information.
As technology advances and everyday routines are streamlined, it is important to be safe. In the event of a theft, never confront the robber during or after the incident. Notify your service provider and follow their instructions. Losing a phone can be devastating, but with the right precautions, it can be prevented or limited to minimal damage. | <urn:uuid:39a67540-7f66-469f-a7f3-c6aa526e0b5e> | {
"date": "2017-05-24T11:49:43",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607813.12/warc/CC-MAIN-20170524112717-20170524132717-00359.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.945286750793457,
"score": 2.671875,
"token_count": 462,
"url": "https://www.protectyourhome.com/en/blog/articles/2014/march/remote-wipe-applications-to-guard-against-smartphone-theft"
} |
Cold Viruses Point the Way to New Cancer Therapies
Source Newsroom: Salk Institute for Biological Studies
Newswise — LA JOLLA, CA---- Cold viruses generally get a bad rap----which they've certainly earned----but new findings by a team of scientists at the Salk Institute for Biological Studies suggest that these viruses might also be a valuable ally in the fight against cancer.
Adenovirus, a type of cold virus, has developed molecular tools----proteins----that allow it to hijack a cell's molecular machinery, including large cellular machines involved in growth, replication and cancer suppression. The Salk scientists identified the construction of these molecular weapons and found that they bind together into long chains (polymers) to form a three-dimensional web inside cells that traps and overpowers cellular sentries involved in growth and cancer suppression. The findings, published October 11 in Cell, suggest a new avenue for developing cancer therapies by mimicking the strategies employed by the viruses.
"Cancer was once a black box," says Clodagh O'Shea, an assistant professor in Salk's Molecular and Cell Biology Laboratory, who led the study. "The key that opened that box was revealing the interactions between small DNA tumor virus proteins and cellular tumor suppressor complexes. But without knowing the structure of the proteins they use to attack cells, we were at a loss for how these tiny weapons win out over much larger tumor suppressors."
O'Shea's team studied E4-ORF3, a cancer-causing protein encoded by adenovirus, which prevents the p53 tumor suppressor protein from binding to its target genes. Known as the "guardian of the genome," p53 normally suppresses tumors by causing cells with DNA damage----a hallmark of cancer----to self-destruct. The p53 tumor suppressor pathway is inactivated in almost every human cancer, allowing cancer cells to escape normal growth controls. Similarly, by inactivating p53, the E4-ORF3 protein enables adenovirus replication in infected human cells to go unchecked.
Two years ago, O'Shea discovered that E4-ORF3 clears the way for adenovirus to proliferate by deactivating genes that help the cell defend itself against the virus. "It literally creates zip files of p53 target genes by compressing them until they can no longer be read," she explains.
E4-ORF3 self-assembles inside cells into a disordered, web-like structure that captures and inactivates different tumor suppressor protein complexes. Horng Ou, a postdoctoral researcher in O'Shea's laboratory, says E4-ORF3 is unusual. "It doesn't resemble any known proteins that assemble polymers or that function in cellular tumor suppressor pathways," he says. "Most cellular polymers and filaments form uniform, rigid chains. But E4-ORF3 is the virus's Swiss army knife----it assembles into something that is highly versatile. It has the ability to build itself into all sorts of different shapes and sizes that can capture and deactivate the many defenses of a host cell."
In collaboration with scientists from the National Center for Microscopy and Imaging Research at University of California, San Diego, led by Mark Ellisman, the center's director, O'Shea's team used new techniques to reveal the ultrastructure of the remarkable polymer that E4-ORF3 assembles in the nucleus----something that previously had proven difficult since the polymer is effectively invisible using conventional electron microscopy. "What you see is the E4-ORF3 polymer bending and weaving and twisting its way through the nucleus," she says. "It does appear to have a single repeating pattern and creates a matrix that captures several different tumor suppressors and silences p53 target genes."
Initially, E4-ORF3 forms a dimer, made up of only two subunits. In this form, E4-ORF3 largely ignores its cellular targets. The researchers theorized that when E4-ORF3 assembles into a polymer, however, it binds to tumor suppressor targets far more aggressively. To test this theory, they genetically fused E4-ORF3 polymer mutants to lamin, a cellular protein that assembles intermediate filaments that provide stability and strength to cells. They showed that the lamin-E4-ORF3 fusion protein assembled into cylinder-like superstructures in the nucleus that bind and disrupt PML, a protein complex that suppresses tumors.
The Salk findings may help scientists develop small molecules----the basis for the vast majority of current drugs----capable of destroying tumors by binding and disrupting large and complex cellular components that allow cancer cells to grow and spread. Understanding how viruses overcome healthy cells may also help scientists engineer tumor-busting viruses, which offer a new and potentially self-perpetuating cancer therapy. Such modified viruses would destroy only cancer cells, because they could only replicate in cells in which the p53 tumor suppressor has been deactivated. When a cancer cell is destroyed it would release additional copies of the engineered viruses, which would seek out and kill remaining cancer cells that have spread throughout the body.
Engineering these viruses requires disabling the ability of the E4-ORF3 protein to inactivate p53 in healthy cells----otherwise, the virus could destroy healthy cells as well as cancer cells. At the same time, E4-ORF3 has certain important functions in allowing the virus to replicate in the first place, so it can't be completely removed from the virus's arsenal. Thus, the Salk researcher's work on understanding the protein's precise structure, functions and interactions is crucial to engineering viruses in which E4-ORF3's abilities have been precisely modified.
Other researchers on the study were Witek Kwiatkowski, Katherine Blain, Hannah Land, Conrado Soria, Colin Powers, James Fitzpatrick, Jeff Long and Senyon Choe from the Salk Institute; Thomas Deerinck, Andrew Noske, Xiaokun Shu and Roger Tsien of the University of California, San Diego; and Andrew May of Fluidigm.
The work was supported by the National Institutes of Health, American Cancer Society, Sontag Foundation, the Arnold and Mabel Beckman Foundation, and Anna Fuller Foundation. | <urn:uuid:e4ae64e7-3706-47f2-b2dd-06d244a98742> | {
"date": "2014-12-19T02:18:25",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768169.20/warc/CC-MAIN-20141217075248-00107-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9322129487991333,
"score": 3.234375,
"token_count": 1312,
"url": "http://www.newswise.com/articles/view/594955/?sc=rssn"
} |
China, India and Western Europe all have traditions of humanist thinking that can be traced back at least 2,500 years. This way of understanding the world, of finding meaning in life, and of grounding moral thinking is also found in many other cultures. You can trace the movement of humanist ideas through time in the following sections. You can also find out more about a selection of historical figures who have influenced humanist thinking or demonstrated humanist ideals in their lives or writings.
Many people have thought and expressed humanist ideas over many centuries all over the world, contributing to a humanist tradition. Though some of them may have believed in a god or gods, they were thoughtful, humane, open-minded people, and many of them fought against the ignorance and religious bigotry of their day, sometimes taking considerable personal risks to do so. Many of the great philosophers, scientists and moral thinkers were essentially humanist, because they did not accept traditional beliefs but thought for themselves and pushed human knowledge forwards.
A time of political and religious turmoil and the development of modern social science. Key figures include Jeremy Bentham, Charles Bradlaugh, the Curies, Charles Darwin, George Eliot, Thomas Hardy,George Holyoake, T H Huxley, Robert G Ingersoll, John Stuart Mill, and Percy Bysshe Shelley.
Modern humanist thinkers and writers had an enormous impact on the last century. Key figures include A J Ayer, Harold Blackham, Fenner Brockway, Joseph Conrad, E M Forster, Sigmund Freud, Thomas Hardy, Julian Huxley, Margaret Knight, G E Moore, Nehru, M N Roy, Gene Roddenberry, Bertrand Russell, John Maynard Smith, and ‘Gora’.
Many of the founders of the mid-20th century international co-operative institutions – Brock Chisholm, Peter Ritchie Calder and John Boyd Orr were humanists. You can read more about them and other philanthropists and social activists from the humanist tradition in Humanists working for a better world.
And go to the Humanist Philosophers’ pages, obituaries, and Patrons of Humanism to find out about more 20th and 21st century humanists. | <urn:uuid:f82b7e13-1453-45d9-9fa8-0aedb2976325> | {
"date": "2017-01-19T10:59:18",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00404-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9462060928344727,
"score": 3.734375,
"token_count": 461,
"url": "https://humanism.org.uk/humanism/the-humanist-tradition/?desktop=1"
} |
In English, many things are named after a particular country – but have you ever wondered what those things are called in those countries?
1(of academic work)revisión colegiada femenino
- These conclusions can then be scrutinized by other scientists in the form of peer review.
- Competent institutions incorporate peer review in all business processes.
- Secondly, it is part of science's code of conduct not to go public before having one's research appraised by peer review.
- The products that result from this effort are assessed for quality by peer review and made public.
- Evaluation and peer review should serve to improve standards.
- At an academic level, peer review is basically hole-punching and fault finding.
- In peer review, performance is reviewed by expert colleagues.
- Has the basis for the opinion survived peer review and has it been published?
- They tend to be people whose work has not been subjected to peer review within their profession.
- As a basis for this peer review, cancer service providers will be required to self assess their performance against the standards.
- This indicates the need for better use of guidelines in scientific editing and peer review.
- None of these books was put through any sort of scientific peer review before being published.
- The academics needed peer review and high quality publishing of their papers for success and status in their field.
- But the report has yet to be subjected to peer review, let alone be published in an academic journal.
- Scientists say if they didn't have peer review they would have to invent it.
- And, finally, why isn't peer review considered worthy of serious academic recognition?
- The scientific method and peer review may be distinctly anti-feminist.
- This, he says, will make it possible for medical professionals to evaluate each other in a process of peer review.
- Despite the sprint to publication, the paper did go through editing and peer review.
- One of the early precedents of open source intelligence is the process of academic peer review.
2(of colleague)revisión paritaria femenino
1(paper/article) revisar colegiadamente
2(colleague) revisar paritariamente
English has borrowed many of the following foreign expressions of parting, so you’ve probably encountered some of these ways to say goodbye in other languages.
Many words formed by the addition of the suffix –ster are now obsolete - which ones are due a resurgence?
As their breed names often attest, dogs are a truly international bunch. Let’s take a look at 12 different dog breed names and their backstories. | <urn:uuid:671a9362-a889-4e02-bde8-2c68e8c94cac> | {
"date": "2018-02-19T08:26:22",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812556.20/warc/CC-MAIN-20180219072328-20180219092328-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9457927942276001,
"score": 2.71875,
"token_count": 558,
"url": "https://es.oxforddictionaries.com/traducir/ingles-espanol/peer_review"
} |
[Name of the writer]
[Name of the institution]
Christianity in Japan
Japan has been a home for Shinto and Buddhist religions for centuries. The Christian missionaries during the 16th, 19th and 20th centuries worked hard to evangelize the Japanese nation but could not get desired success. There efforts in past failed partly due to sanctions imposed by the local rulers. The Jesuits missionaries traveled with Spanish and Portuguese traders to many areas of America and Asia-Pacific and established their churches and religious missions. They were funded, sponsored and trained by their respective governments in order to spread Christianity. At several places they preached the Christian faith by force but the aboriginal population did not accept it wholeheartedly. Initially the Jesuits targeted the elite class of the country and a large number was converted. The rulers also forced their subject to embrace the same faith. About 300,000 Japanese were converted in the first phase. Later on, Christianity was prohibited as the rulers started seeing them as a threat to their authority. Following a change of regime, the ban was lifted and missionaries were again allowed to enter Japan. Like many Native American tribes, the Japanese also resisted the new religion. As a result, presently Christians form only 1% of the total population in Japan. This paper is focused on how the Christian religion was introduced in Japan, the evolution of evangelism, establishment of churches, the restrictions and hurdles faced by the missionaries and priest of the new religion and the response of Japanese nation towards an alien faith. All these queries are answered in detail given as follows.
Christianity in Japan spread in various phases. Like many other parts of world, it was brought by religious missionaries and the European traders and invaders. It is almost in middle of the 16th century that the Portuguese traders arrived on the "land of rising sun". The... [continues]
Cite This Essay
(2004, 01). The Spread of Christianity to Japan. StudyMode.com. Retrieved 01, 2004, from http://www.studymode.com/essays/Spread-Christianity-Japan-45374.html
"The Spread of Christianity to Japan" StudyMode.com. 01 2004. 01 2004 <http://www.studymode.com/essays/Spread-Christianity-Japan-45374.html>.
"The Spread of Christianity to Japan." StudyMode.com. 01, 2004. Accessed 01, 2004. http://www.studymode.com/essays/Spread-Christianity-Japan-45374.html. | <urn:uuid:086f6564-7b11-453f-9a6e-3a356e2aef03> | {
"date": "2013-05-20T21:59:27",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9573701024055481,
"score": 2.828125,
"token_count": 519,
"url": "http://www.studymode.com/essays/Spread-Christianity-Japan-45374.html"
} |
National weather scientist James LaDue ’86 discussed extreme natural disasters and the state of meteorology during a presentation last semester in the Shineman Center for Science, Engineering and Innovation.
“Forecasting science has drastically improved,” said LaDue, who earned a B.S. in meteorology at Oswego. “We can tell with pretty good confidence where there will be a tornado. But while forecasting has improved, getting the desired reaction from the public remains a challenge.”
LaDue, a meteorologist instructor at the National Weather Service Warning Decision Training
Branch in Norman, Okla., said NWS is working to improve communications with the public, and mobile technologies can help NWS customize warnings to people based on their specific location.
“We can’t issue a one-size fits all warning and accommodate everyone,” he said. “Warnings have to be personalized.”
Through his work, he has witnessed devastating destruction as well as stories of good planning, preparation and execution of emergency plans. LaDue shared ideas of how we can improve the resiliency of our communities to severe weather through smarter building construction, different kinds of materials and better design.
He concluded the talk by predicting the future role of the human forecaster in meteorology will be more about risk management and interpretation of data than on creating models and calculating statistics, which computers are already doing better and faster than humans.
“I encourage meteorology students to take courses in crisis communications, risk management and human behavior in addition to their meteorology courses,” he said. | <urn:uuid:5014e056-294b-4e10-8bf5-63d9d1645fe8> | {
"date": "2018-10-19T01:27:03",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512161.28/warc/CC-MAIN-20181018235424-20181019020924-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9409781098365784,
"score": 2.640625,
"token_count": 331,
"url": "https://magazine.oswego.edu/2014/04/01/the-forecast-for-forecasters/"
} |
Current Access Through Your IP Address
Current Access Through Your Registered Email Address
A subscription to JoVE is required to view this article.
You will only be able to see the first 20 seconds.
Molecular cloning is a set of techniques used to insert recombinant DNA from a prokaryotic or eukaryotic source into a replicating vehicle such as plasmids or viral vectors. Cloning refers to making numerous copies of a DNA fragment of interest, such as a gene. In this video you will learn about the different steps of molecular cloning, how to set up the procedure, and different applications of this technique.
At least two important DNA molecules are required before cloning begins. First, and most importantly, you need the DNA fragment you are going to clone, otherwise known as the insert. It can come from a prokaryote, eukaryote, an extinct organism, or it can be created artificially in the laboratory. By using molecular cloning we can learn more about the function of a particular gene.
Second, you need a vector. A vector is plasmid DNA used as a tool in molecular biology to make more copies of or produce a protein from a certain gene. Plasmids are an example of a vector, and are circular, extra chromosomal, DNA that is replicated by bacteria.
A plasmid typically has a multiple cloning site or MCS, this area contains recognition sites for different restriction endonucleases also known as restriction enzymes. Different inserts can be incorporated into the plasmid by a technique called ligation. The plasmid vector also contains an origin of replication, which allows it to be replicated in bacteria. In addition, the plasmid has an antibiotic gene. If bacteria incorporate the plasmid, it will survive in media that contains the antibiotic. This allows for the selection of bacteria that have been successfully transformed.
The insert and vector are cloned into a host cell organism, the most common used in molecular cloning is E. coli. E. coli grows rapidly, is widely available and has numerous different cloning vectors commercially produced. Eukaryotes, like, yeast can also be used as host organisms for vectors.
The first step of the general molecular cloning procedure is to obtain the desired insert, which can be derived from DNA or mRNA from any cell type. The optimal vector and its host organism are then chosen based they type of insert and what will ultimately be done with it. A polymerase chain reaction, or PCR based method is often used to replicate the insert.
Then by using a series of enzymatic reactions, the insert and digest are joined together and introduced into the host organism for mass replication. Replicated vectors are purified from bacteria, and following restriction digestion, analyzed on a gel. Gel-purified fragments are later sent for sequencing to verify that the inset is the desired DNA fragment.
Let’s have a little more detailed look at how molecular cloning is conducted. Before beginning, you will want to plan out your cloning strategy, prior to making any cloning attempt at the bench. For example, any given plasmid vector, will provide you with a finite number of restriction sites to incorporate the insert via the multiple cloning site. You’ll need to choose restriction sites that are not found in your insert so that you do not cleave it. You might be left with a situation where you are forced to join a blunt end fragment with one that has an overhang. If so, then using the klenow fragment to set up a blunt end ligation might be your only option to get the insert into your desired vector. Understanding the various molecular cloning tools at your disposal, as well as coming up with a careful strategy before you begin cloning can be an immense time saver.
The source of DNA for molecular cloning can be isolated from almost any type of cell or tissue sample through simple extraction techniques. Once isolated, PCR can be used to amplify the insert.
Once the insert is amplified both it and the vector are digested by restriction enzymes, also known as restriction endonucleases.
Once digested, the insert and vector can be run on a gel and purified by a process called gel purification. With respect to the vector, this step will help to purify linearized plasmid from uncut plasmid, which tends to appear as a high molecular weight smear on a gel.
After gel purifying the digests, the insert is ligated or joined to the plasmid, via an enzyme called DNA ligase.
Generally speaking, it is always a good idea to set up ligations, so that the ratio of insert to vector is 3 to 1, which ensures that only a small amount of vector will self-ligate. Once the ligation has been set up on ice, it is incubated anywhere from 14-25˚C from 1 hr to overnight.
Next, transformation is performed to introduce the plasmid vector into the host that will replicate it.
Following transformation bacteria are plated on agar plates with antibiotic and incubated overnight at 37°C. Because the plasimid contains an antibiotic resistance gene, successful transformation will produce bacterial colonies when grown on agar plates in presence of antibiotics. Individual colonies can then be picked from the transformed plate, placed into liquid growth media in numbered tubes, and put into a shaking incubator for expansion. A small volume of liquid culture is added to a numbered agar plate, while the rest of the culture moves on to plasmid purification. The numbering scheme that denotes the identity of bacterial colonies from which the plasmids will eventually be purified is maintained throughout the plasmid purification process.
A sample of purified plasmid is then cut with restriction enzymes. The digest is then loaded and run on the gel in order to check for the presence of insert, which will verify that the bacterial colony was transformed with a plasmid containing an insert and not self-ligated plasmid. Bacteria verified to have been transformed with an insert-containing plasmid, are expanded for further plasmid purification. Sequencing is used performed as a final verification step to confirm that your gene of interest has been cloned.
Molecular cloning can be used for a near limitless number of applications. For instance, when an mRNA template is reverse transcribed to form cDNA, or complementary DNA, by an enzyme called reverse transcriptase and then PCR is used to amplify the cDNA, molecular cloning can be used to create a cDNA library – a library of all of the genes expressed by a given cell type.
Molecular cloning can also be employed to take a series of genes, or gene cluster from one bacterial strain, reorganize them into plasmids that are transformed in another strain, so an entire biosynthetic pathway can be recreated to produce a complex molecule.
Through molecular cloning, a mutant library can be generated by expressing a target plasmid in a special bacterial strain that uses an error prone polymerase when cultured at certain temperatures. The mutations can be characterized by sequencing. Bacteria transformed with mutant genes can then be tested with different drug or chemicals to see which bacterial colonies have evolved to have drug resistance.
Thanks to molecular cloning, reporter genes can be incorporated into DNA plasmids, a common reporter gene is green fluorescent protein or GFP, which emits a green fluorescence when exposed to UV light. A reporter gene can also be inserted into an alphavirus to show infection in mosquitoes and transmissibility in cells.
You’ve just watched JoVEs video on molecular cloning. You should now understand how molecular cloning works and how the technique can be used in molecular biology. As always, thanks for watching!
Molecular cloning is a set of methods, which are used to insert recombinant DNA into a vector - a carrier of DNA molecules that will replicate recombinant DNA fragments in host organisms. The DNA fragment, which may be a gene, can be isolated from a prokaryotic or eukaryotic specimen. Following isolation of the fragment of interest, or insert, both the vector and insert must be cut with restriction enzymes and purified. The purified pieces are joined together though a technique called ligation. The enzyme that catalyzes the ligation reaction is known as ligase.
This video explains the major methods that are combined, in tandem, to comprise the overall molecular cloning procedure. Critical aspects of molecular cloning are discussed, such as the need for molecular cloning strategy and how to keep track of transformed bacterial colonies. Verification steps, such as checking purified plasmid for the presence of insert with restrictions digests and sequencing are also mentioned.
JoVE Science Education Database. Basic Methods in Cellular and Molecular Biology. Molecular Cloning. JoVE, Cambridge, MA, doi: 10.3791/5074 (2015).
Reporter constructs can be incorporated into DNA plasmids using molecular cloning. A common reporter gene is green fluorescent protein (GFP), which emits a green fluorescence when exposed to UV light. A reporter gene was inserted into an alphavirus to show viral infection in mosquitoes and viral transmissibility in cells.
Here, molecular cloning is used to identify translation pause sites in mRNA in a gene of interest. The DNA template is transcribed and translated in vitro followed by the isolation and characterization of nascent polypeptides — newly developed amino acid chains.
This video article shows a step-by-step protocol for examining the epigenetic modifications of genomic DNA isolated from the brains of differentially-aged mice through molecular cloning. Molecular cloning techniques are used to analyze DNA methylation of samples from the brain.
1Department of Obstretrics & Gynaecology, Schulich School of Medicine and Dentistry, University of Western Ontario, 2Department of Biochemistry, Schulich School of Medicine and Dentistry, University of Western Ontario, 3Children's Health Research Institute
The goal of this experiment is to measure DNA methylation in a single oocyte, a female germ cell, with the use of molecular cloning. Nested PCR is used to amplify the regions of DNA followed by molecular cloning to show methylation at CpG dinucleotides, sites where cytosine is next to guanine.
Here, researchers collected native biomass samples to isolate pieces of genomic DNA and use molecular cloning to ligate DNA fragments of appropriate size into fosmid vectors. Fosmids are cloning vectors that are based on the bacterial F (fertility)-plasmid, which can hold relatively large inserts . DNA from the transformed bacteria is packaged into virus particles to create a phage genomic DNA library. | <urn:uuid:f8902c15-34de-4984-848d-0e516e7d180b> | {
"date": "2015-02-02T01:40:02",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122220909.62/warc/CC-MAIN-20150124175700-00177-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9379513263702393,
"score": 4.28125,
"token_count": 2189,
"url": "http://www.jove.com/science-education/5074/molecular-cloning"
} |
Energy: Transforming Renewable Resources – Biomass & Solar Energy
Environmental Educational Materials
Environmental Educational Videos
This program stresses the importance of caring for our environment and provides an overview of multiple energy sources such as biomass and solar energy. It documents how some states are trying to enact laws that require local power plants to increase their power provided by renewable energy. To preserve our planet’s health, scientists explore green projects involving ecologically friendly architecture and sustainable communities with solar homes and green housing developments.
**This product is a digital download from Ward's Science** | <urn:uuid:ea1ef354-1719-4638-810d-701b194e0944> | {
"date": "2020-01-23T13:38:54",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610919.33/warc/CC-MAIN-20200123131001-20200123160001-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8675051927566528,
"score": 3.140625,
"token_count": 114,
"url": "https://www.boreal.com/store/product/12010541/energy-transforming-renewable-resources-biomass-solar-energy"
} |
Jackson Pollock might be the PERFECT artist to study first when you begin exploring art history with your kids. His art is energetic, messy, and fun to make!
And right now you can enter for a chance to win a free copy of Action Jackson. It's a great kids storybook all about his interesting approach to making art!
I participate in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com. By purchasing your books through this site, your price does not increase, but a percentage of your purchase goes to supporting Art History Kids. Thank you!
To begin your study, you can check this book out from the library, or pick it up at your local bookstore.
Action Jackson is a great age appropriate introduction to the Jackson Pollock's life and art. He was know for his "drip paintings" where he would splatter, splash, and pour paint directly onto his canvas while it was flat on the ground.
Once you've read the book together, it's time to let your kids make their own art. You can keep it simple or you can get fancy. Here's what I recommend:
Gather your supplies
- washable tempera paint (3-4 colors chosen by your kids) in small open containers
- a strip of butcher paper, a large piece of poster board, or a piece of foam core
- utensils to "drip" the paint– popsicle sticks, paintbrushes, plastic spoons, etc.
Set up your area
Dress your kids in clothes that can get messy, and lay the paper or boards down on the ground outside where it will be easy for you to hose off the extra paint when you are done.
Create some drip paintings!
Give your kids the paints and utensils and invite them to create their art! As they start creating their art, you can act as a passive observer, and "narrate" their actions to help make them aware of their process. Point out how different utensils distribute the paint differently. You can tell them that Jackson Pollock was known for moving around his canvas like he was doing a dance with his painting. Invite them to apply paint from all sides. Jackson Pollock's art was all about being in the moment and focusing on the act of making art more than what the final product would look like.
Have fun, and remember to leave their art flat until it is completely dry, so it won't drip right off the paper.
I'd love to see your finished paintings! Post them on Instagram and use our hashtag #arthistorykids.
And, if your kids are ready to learn even more about Jackson Pollock and his Abstract Expressionist art, this guide is currently on sale... for a limited time only! Use the code JACKSON at checkout to get $5 off!!
This guide is a complete 2-4 week curriculum that talks all about:
- Who was Jackson Pollock
- Why was his art important
- What Abstract Expressionism was all about
- How abstract art can be a great way to express your emotions
- How Pollock's art connects to science, music, and geography
Enjoy this week's art time with your kids, and be sure to click the links below to stay connected on social media. | <urn:uuid:af598c80-a85c-4860-b212-7ce471346dfa> | {
"date": "2018-10-19T00:23:12",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512161.28/warc/CC-MAIN-20181018235424-20181019020924-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9671154022216797,
"score": 2.6875,
"token_count": 698,
"url": "http://www.arthistorykids.com/blog/2017/6/20/homeschool-art-jackson-pollock-for-kids"
} |
Re: [dogme] grammar and lexis
- Robert Wrote
I know the Storyline approach only as connecting a series of video segments or pieces of a book to form a narrative for learners. Public Broadcasting in the U.$.A. has created such series for learners of French and Spanish. So I'm not exactly sure how this might apply to my teaching context other than the fact that the ongoing narrative of students' lives (in their other classrooms) will inform and shape the content of our ESL class. Please let me know if I'm off track there.
Perhaps the following will provide some background information.
This is a quote from Steve Bell, one of the developers of the Storyline Method
The Storyline method is based on the theory that knowledge is complex and many layered; that meaning is guided by one's prior knowledge and experience. The Storyline creates a context for learning with active involvement of the child. It provides tasks which arise from the context in which the child sees as significant and meaningful within it. The Storyline gives the child opportunities to develop understanding and skills with the support of the context. The critical elements of the storyline are:
Setting the scene in a particular time or place.
People and/or animals.
A way of life to investigate.
Real problems to be solved
Each Storyline consists of a series of chapters and each chapter begins with a key question, designed to elicit the combined knowledge of the class about the subject to be explored. The children start from what they know and build their own hypothetical model of the area to be studied. They then use their imagination to hypothesise about the model they have, realise there are gaps in their knowledge and design their own questions to study further to fill in those gaps. They then test the model against any evidence they have and make any further changes necessary. This procedure is repeated for each chapter in a linear fashion as the storyline develops. With such a method children learn how to learn, they develop lifelong study skills.
The storyline to be used in a language classroom can be developed with teachers of other subjects and the key questions can relate to these subjects. This way the language classroom can reinforce/supplement the non-language curriculum with students having to use grammar and lexis about subjects that are meaningful and relevant to them.
As far as I know Storyline has only be used with young learners, but I do wonder if it could be adapted to suit teenagers and adults.
I have written an essay on the subject for my Masters if anyone wants to read it.
[Non-text portions of this message have been removed] | <urn:uuid:d24347b8-b686-4c6b-969a-ff133a6d4805> | {
"date": "2015-05-06T08:37:45",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430458431586.52/warc/CC-MAIN-20150501053351-00041-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9596517086029053,
"score": 3,
"token_count": 532,
"url": "https://groups.yahoo.com/neo/groups/dogme/conversations/topics/7878"
} |
As a result of improved technology, and a growing awareness of the relevance of micronutrients in health and development, an increasing number of biological indicators are being used to assess the vitamin and mineral status in populations, to evaluate risk factors and to generate estimates of the global burden of disease related to micronutrient deficiency.
Additionally, vitamin and mineral levels can be measured in food products and are done so in food fortification programmes as part of their regulatory monitoring activities. Other programmes also require the measurement of vitamin and mineral content of supplements as part of monitoring activities.
With this in mind, the Evidence and Programme Guidance Unit of the Department of Nutrition for Health and Development is working on a project to develop a global directory of laboratory capacity for assessment of micronutrients. The purpose of this database is to provide Member States and their partners with an interactive and user-friendly resource to identify national, regional, and global laboratory capacity for assessing vitamin and mineral status in populations and vitamin and mineral content of fortified staple foods such as salt, flours or condiments. | <urn:uuid:d78d067c-2d00-4e28-aadd-6416e6e672e5> | {
"date": "2016-07-25T14:03:06",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824230.71/warc/CC-MAIN-20160723071024-00227-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.919950544834137,
"score": 3.296875,
"token_count": 215,
"url": "http://www.who.int/vmnis/laboratory/en/"
} |
The women of Canterbury are drawn to the cathedral, knowing instinctively that they are drawn there by danger. There is no safety anywhere, but they have to bear witness. Archbishop Thomas Becket has been gone seven years. He had always been kind to his people, but he should not return. During the periods when the king and the barons ruled alternately, the poor had suffered all kinds of oppression. Like common people everywhere, the women had tried to keep their households in order and to escape the notice of the various rulers. Now they could only wait and witness.
The priests of the cathedral are well aware of the coming struggle for power. The archbishop has been intriguing in France, where he has enlisted the aid of the pope. Henry of Anjou is a stubborn king, however. The priests know that the strong rule by force, the weak by caprice. The only law is that of seizing power and holding it.
A herald announces that the archbishop is nearing the city and that they are to prepare at once for his coming. Anxiously, they ask whether there will be peace or war, whether the archbishop and the king have been reconciled or not. The herald is of the opinion that there had been only a hasty compromise. He does not know that when the archbishop had parted from the king, the prelate had said that King Henry would not see him again in this life.
After the herald leaves, one priest expresses the pessimism felt by all. When Thomas Becket was chancellor and in temporal power, courtiers flattered and fawned over him, but even then he had felt insecure. Either the king should have been stronger or Thomas weaker. For a time, the priests are hopeful that when Thomas returns he will lead them. The women think the archbishop should return to France. He would remain their spiritual leader, but in France he would be safe. As the priests start to drive out the women, the archbishop arrives and asks them to remain. Thomas Becket tells his priests of the difficulties he has encountered, and that rebellious bishops and the barons had sworn to have his head. They sent spies to him and intercepted his letters. At Sandwich, he had barely escaped with his life.
The first tempter arrives to talk with Thomas. When he was chancellor, Thomas had known worldly pleasure and worldly success. Many had been his friends, and at that time he knew how to let friendship dictate over principles. To escape his present hard fate, he needs only to relax his severity and dignity, to be friendly, and to overlook disagreeable principles. Thomas has the strength to give the tempter a strong refusal.
The second tempter reminds Thomas of his temporal power as chancellor. He could be chancellor again and have lasting power. It is well known that the king only commands, whereas the chancellor rules. Power is an attribute of the present; holiness is more useful after death. Real power has to be purchased by wise submission, and his present spiritual authority leads only to death. Thomas asks about rebellious bishops whom he had excommunicated and barons whose privileges he had curtailed. The tempter is confident that these dissidents will come to heel if Thomas were chancellor with the king’s power behind him. Again, Thomas has the strength to say no.
The third tempter is even easier to deal with. He represents a clique intent on overthrowing the throne. If Thomas will lead them, they can make the power of the Church supreme. No more will the barons as well as the bishops be ruled by a king. Thomas declines the offer to lead the malcontents.
The fourth tempter is unexpected. He shows Thomas how he can have eternal glory. As plain archbishop, the time will come when men will neither respect nor hate him; he will become a fact of history. So it is with temporal power, too: King succeeds king as the wheel of time turns. Shrines are pillaged and thrones totter. If, however, Thomas continues in his present course, he will become a martyr and a saint, to dwell forevermore in the presence of God. The archbishop faces a dilemma. No matter whether he acts or suffers, he will sin against his religion.
Early on Christmas morning, Thomas preaches a sermon on peace, saying that Christ left people his peace but not peace as the world thinks of it. Spiritual peace does not necessarily mean political peace between England and other countries or between the barons and the king.
After Christmas, four knights come to Canterbury on urgent business. Refusing all hospitality, they begin to cite charges against Thomas, saying that he owes all his influence to the king, that he has been ignobly born, and that his eminence is due solely to King Henry’s favor. The knights try to attack Thomas, but the priests and attendants interpose themselves.
The charges are publicly amplified. Thomas had gone to France to stir up trouble in the dominion and to intrigue with the king of France and the pope. In his charity, King Henry had permitted Thomas to return to his see, but Thomas had repaid that charity by excommunicating the bishops who had crowned the young prince; hence the legality of the coronation is in doubt. The knights then pronounce his sentence: He and his retinue must leave English soil.
Thomas answers firmly. In France he had been a beggar of foreign charity; he would never leave England again. He had no dislike for the prince; rather, he had only carried out the pope’s orders in excommunicating the bishops. These words availed little. In the cathedral proper, the knights fall on Thomas Becket and slay him.
The knights justify the slaying. It may have looked like four against one, an offense against the English belief in fair play, but before deciding, the people should know the whole story. First, the four knights would not benefit from the murder, for the king, for reasons of state, would deplore the incident, and the knights would be banished.
Second, the king had hoped, in elevating Thomas to the archbishopric, to unite temporal and spiritual rule and to bring order to a troubled kingdom; but as soon as Thomas was elevated, he had become more priestly than the priests and refused to follow the king’s orders. Third, he had become an egotistical madman. There is evidence that before leaving France he had clearly prophesied his death in England and he had been determined to suffer a martyr’s fate. In the face of this provocation, the people must conclude that Thomas had committed suicide while of unsound mind. After the knights leave, the priests and populace mourn. Their only solace is that so long as people will die for faith, the Church will be supreme. | <urn:uuid:9da3ec8e-66f8-4c49-a7fb-40e879b23bcc> | {
"date": "2015-09-04T10:59:51",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645340161.79/warc/CC-MAIN-20150827031540-00051-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9874765872955322,
"score": 3.46875,
"token_count": 1399,
"url": "http://www.enotes.com/topics/murder-cathedral"
} |
Books & Music
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
News & Politics
Religion & Spirituality
Travel & Culture
TV & Movies
Diastolic and Systolic
It's very important to understand how your blood pressure works. Your heart's pumping is made up of diastolic and systolic pressures.
Your heart is a fist sized organ in the center of your chest. It's pumping action pushes the blood all the way around your body, through your arteries and veins, through the lungs to get a fresh supply of oxygen, and finally back to the heart to get pumped around again. The heart doesn't affect the blood in any way - it simply pushes it out, pulse after pulse, to keep it moving around in a big circle. It's your lungs that add the oxygen, and your other organs that remove the impurities.
So when your heart presses in, the incoming flaps seal shut. The blood is forced out the outgoing flaps, heading on its journey through your body. This pumping out is the systolic pressure. This is the time your blood vessels are under the most pressure, when the heart is actively pushing blood out into them. If you had a blood pressure of
The 120 part is the systolic number, the pressure measured in milligrams of mercury. This is the highest pressure your blood vessels are under at any given time. You'd think they'd measure blood pressure in something standard like PSI (pounds per square inch) :) Ah well. There are always odd historical reasons for the things doctors do.
So now, on to when the heart rests. After the heart is done pressing blood out, it relaxes. This closes the outgoing flaps, and opens the incoming flaps so that more blood can enter the heart. The heart expands to draw that new blood into it. This is the diasotlic phase. So again if your blood pressure was
The 80 part is the diastolic pressure, i.e. the lowest pressure that your blood vessels are ever under.
There can be problems both if you have high blood pressure and if you have low pressure. If you have high blood pressure, I imagine you know how bad that is. The media is full of the dangers of high blood pressure and how critical it is to lower it. If you have low blood pressure, that can be troubling too - leading to dizziness and fainting.
Lisa Shea's Library of Low Carb Books
Content copyright © 2014 by Lisa Shea. All rights reserved.
This content was written by Lisa Shea. If you wish to use this content in any manner, you need written permission. Contact Lisa Shea for details.
Website copyright © 2014 Minerva WebWorks LLC. All rights reserved. | <urn:uuid:1ad49ebd-322c-46e6-a04b-99d891d55d23> | {
"date": "2014-07-28T16:36:08",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261249.37/warc/CC-MAIN-20140728011741-00294-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9131405353546143,
"score": 2.75,
"token_count": 575,
"url": "http://www.bellaonline.com/articles/art29755.asp"
} |
Right now, as you’re reading this blog post, Waymo (Google’s offshoot) is testing its self-driving cars and it’s nearly ready for mass production!
Quite soon, you can tap a button on your smartphone to summon your car that can drive you around the neighborhood or get you through the morning traffic while you sip your coffee and relax listening to your favorite music!
Are you a Star Wars fan? If so, do you want your own R2D2 to take care of your household chores?
Well, researchers at MIT are training robots by creating simulations of common household chores. In a few years from now, you can say goodbye to those boring mundane tasks!
By 2050, robots may take over all mundane, monotonous, and assembly-line jobs and provide goods very cheaply or nearly free! In such a case, you’ll be free to work on ‘creative’ jobs that are actually fun while your government provides you income!
All these scenarios will be possible only due to two vowels that hold the key to our future: AI!
Artificial Intelligence (AI) is at the heart of all such future changes that’s going to propel humanity to new heights for the better! Imagine C3PO and R2D2 in Star Wars and Ava in Ex Machina and JARVIS (Just a Rather Very Intelligent System) in Iron Man… All these examples are going to be part of our everyday lives in the next few decades!
And, in case, you were pondering about Terminator-like situations, AI researchers are working hard to prevent such events, so don’t worry about that.
I am going to write a series of blog posts on AI but before you take a deep dive, have a look at a brief overview of the important technical ideas and terminologies associated with AI in this post.
Artificial intelligence is the ability of the computer to think and perform actions without human intervention. An AI system will be able to make decisions and act on its own without any explicit instruction.
You probably want to apply AI to solve your problems. But AI is a huge field with multiple approaches and applications. Therefore, before you begin to apply AI to any problem, you first need to understand the different approaches or sub-fields of AI.
Types of AI
AI is classified into two types based on its scope:
- Strong or general AI
- Weak or narrow AI
What we now have in common use across most industries is called ‘Weak AI’ or ‘Artificial Narrow Intelligence’. It’s this AI that automatically performs specific tasks. It’s restricted to a particular problem’s domain.
This is the general-purpose AI that can perform any task. The AI you see in Star Wars and Westworld that has consciousness and can ‘think’ on its own, is called ‘Strong AI’ or ‘Artificial General Intelligence’ and that’s what scientists and engineers are working on.
OpenAI, a non-profit AI research startup founded by Elon Musk and Sam Altman, is actively working on such a general-purpose, friendly AI to help humanity.
Origins of AI
AI has been part of our imagination for a long time and research on it has been going on since the 1950s.
The first work in AI (even before the term was coined) was done by Alan Turing, who proposed that “If a human couldn’t distinguish between responses from a machine and a human, the machine could be considered ‘intelligent’.” The systems that satisfy this rule are called Turing-Complete.
It all began in 1956 at the Dartmouth Conference where scientists from MIT and CMU coined the term and gave birth to AI. They became the founders of AI. They developed several algorithms to play checkers, solve algebra, and speak English and were funded by the Department of Defense, USA.
But they faced several difficulties with the hardware and AI lost focus in the following decades beyond a few sci-fi books and movies. Then, as computation power began to increase rapidly in the 90s, AI began to rise again and was used in logistics and data mining.
After 2012, the rise of fast and cheap Graphic Processing Units (GPUs) and new neural network algorithms and access to large data caused the current AI boom.
Sub-fields of AI
The major sub-fields are:
- Machine Learning (ML)
- Computer Vision (CV)
- Reinforcement Learning (RL)
- Natural Language Processing (NLP)
Note: These sub-fields often blend with one another, may overlap, and share algorithms and techniques.
Machine Learning is the name of the game!
It’s a sub-field of AI where the machine learns by processing all the data provided to form a statistical model or pattern for the data, and based on the model, performs actions or makes predictions.
The initial data is called training data and the model is the trained model. Then, that model can be applied on new data for predictions and classifications.
For instance, you’re already using products powered by ML in your daily lives:
- Product recommendations on eCommerce websites, such as Amazon, and on music and video streaming services, such as Spotify and Netflix
- Google Search
- Virtual assistants, such as Siri and Alexa
- Targeted advertising done by Amazon, Facebook, and Google
ML systems are also accelerating research on:
- Self-driving and driver-less cars (yes, there’s a difference between the two!)
- Medical diagnoses and personalized medicines, including cancer detections and cures
- Identifying financial crises and recessions
Computer Vision makes machines ‘see’!
This sub-field deals with computers learning to read images and videos and generating images on their own. In other words, CV algorithms allow machines to recognize and understand images and videos.
These algorithms enable machines to:
- Identify texts in images and understand them (for instance, postal codes and addresses on packages)
- Identify and automate inspections on production lines
- Self-drive cars
- Identify cancers based on images of tumors
Reinforcement Learning allows machines to make decisions and move about!
RL is a sub-field of machine learning, which is concerned with decision-making and motor control. Watch an AI agent learning to walk by itself!
These algorithms work without any training data. Given an environment, these algorithms explore it and perform some actions, and based on the result, train themselves. These algorithms work by using the trial-and-error method.
The RL agent learns a policy that gives it a reward based on the action it performs and tries to improve the policy to maximize the reward.
RL is a very general-purpose algorithm that can be applied to any situation. It encompasses all problems that involve making a sequence of decisions. RL algorithms have started to achieve good results in many difficult environments.
Deep Blue, the machine that beat Gary Kasparov in the historic chess match in 1997 was based on an RL algorithm. Also, the latest robotic vacuum cleaners available in the market is an RL agent.
The OpenAI initiative, set up by Elon Musk, and DeepMind, started by Google, have created several environments for RL algorithms. They have made several game-changing breakthroughs and designed systems that can play traditional games, such as GO and chess and computer games, such as Dota.
Natural Language Processing enables machines to learn languages!
The NLP sub-field deals with learning and understanding human languages. These algorithms work with text and speech data and try to understand the speech and its context. This algorithm learns the semantics and grammar of the language and produces a set of rules based on which it creates its own content. It improves its rules by continuously learning based on interaction.
For instance, Google Translate, Google Assistant, Siri, and Alexa all work by using NLPs. Microsoft has even created a real-time language translator for skype by using NLP.
Artificial Neural Networks
All these sub-fields work together to build AI systems. One of the most important algorithm or technique used by all of these sub-fields is called Artificial Neural Networks (ANNs). ANNs are systems inspired by human brains. It is a collection of nodes called neurons.
Each neuron receives a signal, processes it, and signals other neurons. Thus, all the neurons collectively make a decision based on the input signal.
They are the most commonly used algorithms right now and there is hope that they’ll lead to Artificial General Intelligence. Deep learning is an implementation of ANN that uses several layers of neural networks.
Ahem, <coughs> ahem, I know this is getting to be a long post and I maybe frying your neural network… So, I’ll end this post with a short introduction on AI-based applications in FinTech! 😊
AI applications in FinTech
A mortgage model can be built using an ML algorithm to find the price of a house based on several parameters, such as sq. ft. size, area, facilities, etc.
Machine learning can be used to automatically find the best mortgage loan for a person and how likely is it that he/she will repay the loan or default on it.
ML can be used to build credit-risk models by capturing the data of borrowers and automatically audit the loans based on credit history and other parameters.
General financial outlook
ML systems can be used to monitor economic situations based on several parameters, such as interest rate, inflation, GDP, and build risk models and stress tests that will flag any anomaly or identify potential cause for recessions or financial downtrends.
For instance, BlackRock is using AI to predict the future of the economy. ML systems can ensure that events like the 2008 subprime mortgage collapse can be prevented.
ML systems are already being used for fraud detection. Every time you make a credit card transaction, AI systems are monitoring the transaction and deciding whether it is fraudulent or not. They monitor all user transactions to identify credit frauds and alert the banks for potential frauds.
Zensed, an AI-based startup, has developed a product to monitor and prevent frauds.
RL-based systems can be used to build high-frequency trading algorithms that’ll update themselves based on current market trends to predict stock prices and trends. RL algorithms can help in both technical analysis and fundamental analysis of a company as well as to learn trading strategies for various kinds of trading.
So, that’s all my friends… Hope you had a satisfying read. Bricks and bouquets are welcome! Leave a comment and I shall surely respond. Meanwhile, to whet your appetite on AI until I return with my next post, check out the following case-studies and research papers:
Stanford paper on the future of AI: https://ai100.stanford.edu/sites/default/files/ai_100_report_0831fnl.pdf
Hitachi case-study on AI in FinTech: http://www.hitachi.com/rev/archive/2016/r2016_06/pdf/r2016_06_104.pdf
A book published by Microsoft covering short stories on AI and ML among others: https://news.microsoft.com/futurevisions/
Please note that the views, thoughts, and opinions expressed in this blog post belong solely to the author, and not necessarily to the author’s employer, organization, committee or other group or individual. | <urn:uuid:1cf2669d-eb4f-4f42-a47f-bd80194d23d2> | {
"date": "2019-05-27T07:02:18",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262029.97/warc/CC-MAIN-20190527065651-20190527091651-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9413372874259949,
"score": 2.515625,
"token_count": 2405,
"url": "https://blog.brimmatech.com/understand-ai-before-you-regret-it/"
} |
Please Note: This article is written for users of the following Microsoft Excel versions: 97, 2000, 2002, and 2003. If you are using a later version (Excel 2007 or later), this tip may not work for you. For a version of this tip written specifically for later versions of Excel, click here: Spell-checking Uppercase Words.
by Allen Wyatt
(last updated December 3, 2016)
Excel includes a powerful spell-checker that, in reality, does a pretty good job. You can use this tool to locate potential spelling errors in your worksheets. If your worksheets contain lots of acronyms, you'll find that Excel flags most of them as misspelled words.
You can make sure that Excel ignores uppercase words in any spell-check by following these steps:
Figure 1. The Spelling tab of the Options dialog box.
The only downside to this, of course, is if you use all uppercase for section titles or for other special words. In this case, Excel still ignores them, since they are uppercase. Make sure you change the setting of this check box based on the type of work you are doing in your worksheet.
ExcelTips is your source for cost-effective Microsoft Excel training. This tip (3321) applies to Microsoft Excel 97, 2000, 2002, and 2003. You can find a version of this tip for the ribbon interface of Excel (Excel 2007 and later) here: Spell-checking Uppercase Words.
Program Successfully in Excel! John Walkenbach's name is synonymous with excellence in deciphering complex technical topics. With this comprehensive guide, "Mr. Spreadsheet" shows how to maximize your Excel experience using professional spreadsheet application development tips from his own personal bookshelf. Check out Excel 2013 Power Programming with VBA today!
The custom dictionary used in Excel contains the information you decide relative to spelling. After a while, you might start ...Discover More
When Excel does a spell-check of the information in a worksheet, you may want it to ignore words that contain numbers. All it ...Discover More
When you protect a worksheet, you can't use some tools, including the spell-checker. If you want to use it, you must ...Discover More
Got a version of Excel that uses the menu interface (Excel 97, Excel 2000, Excel 2002, or Excel 2003)? This site is for you! If you use a later version of Excel, visit our ExcelTips site focusing on the ribbon interface. | <urn:uuid:43615132-85a3-434f-904b-94291645ba03> | {
"date": "2017-08-22T20:43:29",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112682.87/warc/CC-MAIN-20170822201124-20170822221124-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.887066662311554,
"score": 2.609375,
"token_count": 527,
"url": "https://excel.tips.net/T003321_Spell-checking_Uppercase_Words.html"
} |
Big Data is as important to the U.S. economy as agricultural products, according to the team behind a new report about how the federal government can better use huge data collections. The report, from the TechAmerica Foundation, was released Wednesday.
Entitled Demystifying Big Data: A Practical Guide to Transforming the Business of Government, the report's aims are to define Big Data and provide policy guidance to the federal government.
The Five V's
In March, the Obama administration announced a new Big Data initiative, with more than $200 million in projects at six agencies designed to advance the technologies and develop the required workforce. Projects include a National Institutes of Health effort to make human genome data more accessible to the public.
Big Data, the report noted, is either structured information in relational databases, or unstructured information, such as e-mail, video, blogs, call-center conversations, or social media. Unstructured data currently constitutes about 85 percent of the data generated today and, the report noted, poses "challenges in deriving meaning with conventional business intelligence tools."
The characteristics of Big Data are its volume, velocity, variety and veracity. The volume is being driven by the increase in data sources and higher resolution sensors, and the velocity -- how fast data is being produced, changed, and processed -- is being driven by improved throughput connectivity and enhanced computing power of data generating deivces, as well as more data sources.
Variety, created by new sources and sources inside and outside the organization, is being pushed by social media, sensors, the rise of mobile and other factors. And veracity, or the quality of the data, is a key requirement of data-based decisions.
Values of Big Data
The report pointed to possible values of Big Data analysis for the federal government, including determining the most effective medical outcomes across large populations, analysis of health anomalies in the hospital or home through sensors, new levels of real-time traffic information, a better understanding of the most effective online learning techniques, better fraud detection, or improved weather predictions.
The report recommended that IT structures at the agencies evolve into massively scalable storage and network infrastructure designs, with planning for data protection, data sharing, data reuse, ongoing analysis, compliance, security and privacy issues, data retention and data availability.
Other recommendations include taking an inventory of data assets, an assessment of a deployment entry point based on current agency capabilities, and an evaluation of which data assets can be opened to the public in order to spur innovation.
Policy considerations include a formal career track for line-of-business and IT managers relating to Big Data management, establishment of a broader coalition with industry and academia, an expansion of national R&D strategy to encourage development of new techniques and tools, and further guidance on applying privacy and data protection practices.
The foundation's Big Data Commission, which generated the report, consisted of appointed commissioners from academia and industry, including representatives from IBM, Western Governors University, Amazon Web Services, SAP, MicroStrategy, EMC, Splunk, Dell and Microsoft. The foundation is the nonprofit arm of TechAmerica, an industry group. | <urn:uuid:9641b3e6-e161-4793-9298-5d460ec89aac> | {
"date": "2016-07-26T02:44:25",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824570.25/warc/CC-MAIN-20160723071024-00265-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9294909834861755,
"score": 2.78125,
"token_count": 642,
"url": "http://www.cio-today.com/article/index.php?story_id=030003MJ0SZI"
} |
Khmer Language, or Cambodian, is the language of the Khmer people and the official language of Cambodia. It is the second most widely spoken Austroasiatic language (after Vietnamese), with speakers in the tens of millions.
Related words in Khmer:
English: Khmer language
Please note: The last letter in the above Khmer script is a "r". In the Khmer version spoken in Cambodia, a final "r" is usually not pronounced. However, in the Khmer version spoken in the Southern part of Northeast Thailand, a final "r" is often sounded as "n", as this correspondents to the rules of the Thai language. In the Southern part of Northeast Thailand, the Khmer language is not tought in schools and not used in writing. Therefore, the Khmer version spoken in Thailand has undergone so many adaptations to Thai that the two versions are now as apart as Dutch and German, and not mutually understandable without some effort. | <urn:uuid:f56f8622-2b37-44cb-a412-8174d8fe6351> | {
"date": "2018-01-18T23:07:13",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887660.30/warc/CC-MAIN-20180118230513-20180119010513-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9505712389945984,
"score": 3.453125,
"token_count": 198,
"url": "http://cambodia-language.com/"
} |
What's Right for Me?When thinking about volunteering, ask yourself the following questions:
- How much time can I commit?
- What talents or skills can I offer?
- What do I want to gain from volunteering?
- Will I enjoy volunteering?
When you've selected or narrowed your volunteer interests, talk to your parents, friends, teachers, club sponsors, a counselor, or local resources such as government offices, churches, or synagogues to see if they have suggestions on how to go about making it happen. Also, read your local newspaper, and watch and listen to the television and radio news for ideas.
There are many reasons to volunteer. But one should be universal-to do something you can enjoy. After you've made a choice, commit yourself to it and keep the following in mind:
- Be flexible. It is rare to find the "perfect" fit right away.
- Keep an open mind. You might discover something new that interests you.
- Be persistent. Volunteer coordinators are often busy, so don't assume they're not interested in you if they don't call you right away.
- Take necessary training classes and attend orientation meetings held with regard to the activity you want to do. Informed volunteers are the best volunteers. Gaining the extra knowledge will help you do the best job possible.
- Be responsible. Show up on time and follow through with your commitments so that people know they can depend on you.
- Don't expect to start at the top. You have to work hard and prove your worth before you are given more responsibility.
- Expect to get plenty of personal enjoyment and satisfaction from your volunteer experiences. | <urn:uuid:615cbaf8-c626-44b6-a0b2-1e35e88beea4> | {
"date": "2015-08-30T15:53:39",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065324.41/warc/CC-MAIN-20150827025425-00113-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9512841701507568,
"score": 2.609375,
"token_count": 344,
"url": "http://spirit.prudential.com/view/page/soc/14840"
} |
Grow Sprouts to Eat
Growing sprouts for eating is fun, fast and delicious! Sprouts are rich in fiber, protein, amino acids, and sources of vitamins A, B, C and E. You can sprout a wide range of seeds for eating, from smaller seed such as cress, celery and dill for salad greens, to crunchier seeds such as mung and soy beans used in Asian cooking. You can use just about any vegetable seed for edible sprouts as long as they are not treated with any chemicals (Burpee does not treat any of its seeds). This easy Ògrow it yourselfÓ project will teach your kids how to sprout seeds that they can eat. They can exercise their artistic skills too as they decorate their containers. Note: Do NOT use tomato or rhubarb seeds for sprouting as they are toxic.
What You Need:
¥ Several hard boiled eggs per child
¥ Sharpie or marker and/or paints to decorate the egg shell
¥ Damp paper towels
¥ Clear plastic wrap to cover the seeds until they have sprouted
¥ Seeds for sprouting: Microgreens, BurpeeÕs Mix 62139; Broccoli Sprout seeds 66506S, Mung Bean Sprout Seed 66076S
¥ Egg cups or egg carton to hold the eggs upright
What To Do:
¥Before beginning the project with your kids, hard boil and cool the eggs. Make sure you have a few extra for learning curves.
¥Have the kids look at the different seeds and have them guess which will germinate first.
¥Carefully have the kids remove the top third-half of the egg and gently scoop out the egg. They can eat the egg or discard it.
¥Have the kids decorate the eggs with faces or any kind of design that would look cool with the sprouts on top. If they draw faces the sprouts will look like hair.
Fill the emptied shell with damp paper towel strips.
¥Have the kids press the seeds into the top of the paper towels, spreading them evenly and making contact with the paper towel. Gently water the seeds and cover with plastic wrap.
In a few days the seeds should start sprouting and are ready to eat!
Variations: You can use any kind of container for sprouting seeds as long as it is waterproof. You just need damp paper towels and the seed. | <urn:uuid:5a0bdb74-228d-418c-9d48-46566b0e6fbc> | {
"date": "2017-09-19T13:18:08",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685698.18/warc/CC-MAIN-20170919131102-20170919151102-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9374027252197266,
"score": 2.78125,
"token_count": 512,
"url": "http://www.burpee.com/gardenadvicecenter/standard-articles-and-videos/gardening-how-to-articles/grow-sprouts-to-eat/article11142.html"
} |
Getting Comfortable with Being Uncomfortable
The Matrix is a really simple, quick way to learn ACT. We use the diagram like a compass to guide us through life.
First of all the Matrix is about noticing your behaviour because that is the one thing you can control. By increasing awareness of what we do we can start to learn whether our actions take us towards the things that are important in life or away from them. ACT is about building a life that is worth living by increasing your towards behaviour and reducing your away behaviour. It is as easy as that, but incredibly hard to do.
It’s hard because normally people pay attention to negative thoughts and feelings, getting lost in trying to control these. It is the struggle to move away from uncomfortable experiences that takes us away from what is important. ACT is based on the idea that you need to learn to accept what you cannot control and in that way you get back in control of your life.
This is compared to the idea of driving a bus full of unruly passengers (your thoughts and feelings). On the front of the bus is the route number, which is the direction you would like to go in. However when you move forwards the passengers get unruly and make it really uncomfortable for the driver (you). Then the driver tries to get the passengers to quieten down or even tries to get them off the bus. Guess what happens to the bus!
We call this learning how to get comfortable with being uncomfortable | <urn:uuid:21495063-c75a-4429-b8f9-f0469e7378b6> | {
"date": "2014-11-01T09:20:52",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637905189.48/warc/CC-MAIN-20141030025825-00083-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9707854986190796,
"score": 2.90625,
"token_count": 300,
"url": "http://www.actpeerrecovery.com/?page_id=9"
} |
Produce ultrasonic recordings of internal organs for use by physicians.
Assist in the provision of food service and nutritional programs, under the supervision of a dietitian. May plan and produce meals based on established guidelines, teach principles of food and nutrition, or counsel individuals.
Plan and conduct food service or nutritional programs to assist in the promotion of health and control of disease. May supervise activities of a department providing quantity food services, counsel individuals, or conduct nutritional research.
Assess injuries, administer emergency medical care, and extricate trapped individuals. Transport injured or sick persons to medical facilities.
Conduct research or perform investigation for the purpose of identifying, abating, or eliminating sources of pollutants or hazards that affect either the environment or the health of the population. Using knowledge of various scientific disciplines, may collect, synthesize, study, report, and recommend action based on data derived from measurements or observations of air, food, soil, water, and other sources.
Investigate and describe the determinants and distribution of disease, disability, or health outcomes. May develop the means for prevention and control.
Specializes in working with elderly persons. They may have a degree in gerontology, or they may be trained in nursing, sociology, psychology, or other human service-related professions. The job roles of gerontologists fall under four broad categories: Direct Service, Education and Training, Program Planning and Evaluation, and Administration and Policy.
Provide and manage health education programs that help individuals, families, and their communities maximize and maintain healthy lifestyles. Collect and analyze data to identify community needs prior to planning, implementing, monitoring, and evaluating programs designed to encourage healthy lifestyles, policies, and environments. May serve as a resource to assist individuals, other healthcare workers, or the community, and may administer fiscal resources for health education programs.
Plans, develops, and administers health record systems for hospitals, clinics, community health centers, or similar facilities. The health information management professional collects, analyzes, and manages the information that steers the health care industry. In dealing with patient records, the health information manager must respect individual patient privacy yet contribute to quality care by organizing the medical data. These information specialists are skilled in the following areas: health care database and database systems, medical classification systems, flow of clinical information, relationship of financial information to clinical data, uses and users of health care information, and medical legal issues and security systems. | <urn:uuid:3574f832-24be-4477-91b6-db28c467128d> | {
"date": "2019-03-21T01:42:11",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202476.48/warc/CC-MAIN-20190321010720-20190321032720-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9202892780303955,
"score": 2.5625,
"token_count": 499,
"url": "https://arkansashealthcareers.com/careers/?pagenum=2"
} |
Australia’s federal government has announced it will ratify and implement the OPCAT Treaty, Optional Protocol to the Convention Against Torture, improving the conditions of detainees in all domestic places of detention and enhancing the independent bodies’ power of inspection so as to identify and address problems before they escalate into mistreatment.
The turning-point for a better change has been the case of Mark Holcroft, a knock-about Aussie bloke sentenced to seven months in prison for drunk driving; he died during a transfe from Bathurst prison to a minimum-security facility of a heart attack because the officers denied him to get medical help. No one deliberately wanted to harm Mark since the police just applied the regular policy, but system-wide problems put him at risk.
In Australia, mistreatment is almost never the result of a deliberate policy to do harm, but problems tend to be caused by the fact that policies and practices are not properly thought through or reviewed. In this sense, OPCAT may have a positive impact if governments recognize where detention problems exist and are then open to change.
According to the Treaty, when a person is detained, he remains human, and protecting his basic rights is in everybody’s interest. Treating detainees humanely is an opportunity for education, reform, and healing, and it shows a Country’s degree of civilization. The aim is entering prisons so as to make sure Australia lives up to the standards the country set for itself; however, this opportunity will amount to nothing unless it will be grasped by both government and civil society.
The gLAWcal Team
Sunday, 12 February 2017
(source: The Guardian) | <urn:uuid:4dbb5262-77af-4fcd-8ffc-29f67cc1c133> | {
"date": "2017-05-23T03:14:08",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607325.40/warc/CC-MAIN-20170523025728-20170523045728-00222.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.953464925289154,
"score": 2.59375,
"token_count": 341,
"url": "http://glawcal.org.uk/index.php/our-activities/talks-lectures/talks-past-events/9-news/943-the-opcat-treaty-could-revolutionize-australia-s-treatment-of-detainees.html"
} |
Fish have erythrocyte- and leukocyte-rich blood. Erythrocytes carry oxygen from the gills and distribute it throughout the body from the bloodstream while disposing of carbon dioxide through the opposite pathway. These cells rely on hemoglobin to work effectively. Leukocytes contain a variety of cells that contribute to a fish's bodily defense systems, fighting bacteria or parasites and clotting blood when necessary.
Some fish, such as the icefish, have blood that does not contain hemoglobin. They survive in oxygen-rich water by dissolving gases in their blood plasma. The lack of hemoglobin allows them to conceal themselves from predators.Learn more about Fish | <urn:uuid:e1706b18-180a-4b9d-92ae-d95f83862572> | {
"date": "2017-03-29T04:26:51",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190181.34/warc/CC-MAIN-20170322212950-00516-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9185824394226074,
"score": 3.734375,
"token_count": 138,
"url": "https://www.reference.com/pets-animals/fish-blood-a927c1e0cd26f570"
} |
11 Creepy Things About The Winter Solstice That You Probably Didn’t Know
If the increasingly short days that we've been experiencing since this year's summer solstice (which occurred on Jun. 21, to be exact) have you feeling blue right about now, I'm right there with you. During fall, I usually revel in the idea of longer fall evenings for a few weeks, largely because they give me a great excuse to curl up on my couch a little bit earlier every night. However, each year without fail, I end up feeling very over it by early December... and, well, here we are. This year is no different. So I, for one, am positively thrilled that the winter solstice is now just around the corner, because that means the days will finally start to slowly get longer, and I can celebrate the joy that comes with more sunlight. There are, however, a few reasons to not look forward to it — namely, these creepy things you should probably know about the winter solstice. I just hope they don't temper your excitement about the lengthening days too much.
First, a brief winter solstice 101. This year, the solstice (which is also the first day of the astronomical winter) falls on Dec. 21. According to the Farmer's Almanac, the winter solstice is the day with the fewest hours of sunlight. On this day, the sun's path has hit its southernmost position, after which it begins moving north. What this means for all of us is that the days will start getting slightly longer come Dec. 22. Before you know it, it might actually be light outside when you leave the office!
Now that I've delivered the good news, let's get on to the creepy stuff. Check out these weird, interesting winter solstice facts.
1. The Word Solstice Comes From The Latin Term For "The Sun Stands Still."
Since the sun reaches its southernmost post on this day and then reverses its direction, I understand why it makes sense to call the event a "solstice" (from the Latin word solstitium, according to Time and Date) — but that doesn't mean that the sheer idea of a sun normally in motion coming to a halt doesn't totally freak me out.
2. Historically, The Winter Solstice Was Viewed As A Time Of Death
According to Mental Floss, cultures throughout history have observed the winter solstice as a celebration of death, and have marked it with ceremonial fires and slaughters. I guess this one's less creepy if you happen to believe that death brings rebirth with it (as some of these cultures did), but still.
3. Some People Believe That Stonehenge Was Built To Celebrate The Winter Solstice
There's so much mystery around Stonehenge's history and existence that pretty much anything related to it gives me the creeps. While there are a lot of theories about where this stone monument came from and why it's there, some experts believe that the design appears to correspond to the winter (and summer) solstice, according to the Farmer's Almanac.
4. The Winter Solstice Doesn't Affect Daylight Hours Equally For Everyone
While sun lovers everywhere will rejoice in longer days after the winter solstice, the rate at which those days will get longer is actually different based on your geography. Weird, right? Per Time and Date, people in the northern hemisphere will see a more rapid increase in daylight hours if they live at more northern latitudes.
5. New Worlds Have Been Discovered On The Winter Solstice
In 1620, the pilgrims arrived in Plymouth on the winter solstice. In 1898, Pierre and Marie Curie discovered radium and ushered in a new age of science on the winter solstice. In 1968, the Apollo 8 launched and became the first manned moon mission on the winter solstice. Coincidence? I think not. There's definitely something eerie (if exciting and promising!) in the air.
6. Some Cultures Believe That Dark Spirits Emerge On The Winter Solstice
Iranian, Celtic, and Germanic tradition says that different types of evil spirits emerge on this occasion. Certain cultures would even stay up all night on the winter solstice so they could avoid firsthand encounters with the darkness.
7. Stonehenge Aligns With The Sun On The Solstice
More creepy Stonehenge vibes! According to Mental Floss, the setting sun lines up with the spaces between the stone structures on the winter solstice, shining directly through the gaps. This explains why some have theorized that there's a link between Stonehenge and the solstice.
8. The 2012 Winter Solstice Was Thought By Some To Be The End Of The World
The Ancient Mayan calendar suggested that Dec. 21, 2012 was the end of a 5126-year cycle — aka, the end of life as we know it, or the start of some other disastrous event. Times may be tough, but I, for one, am glad we dodged this particular winter solstice bullet.
9. Meteorologists Mark The Start Of Winter On A Different Day
It always creeps me out when I'm getting different information from different experts and I'm not sure what to believe —especially when we're talking about facts of the physical world that I've always taken for granted. According to Mashable, meteorologists say that winter actually begins a few weeks before the solstice on Dec. 1. The day we commonly accept as the first day of winter (the solstice) is actually the start of the astronomical winter. Winter is bad enough as it is. Can we just pick one day to kick it off?
10. Some People Believe That Christmas Should Be Celebrated On The Winter Solstice
Because there's no actual date associated with Jesus's birth in the Bible, there are theories out there that early pagans actually celebrated Christmas on the winter solstice. Symbolically, this makes sense, since the day marks a rebirth and a new season, but it's unsettling to think that we could be so wrong about such a major holiday.
11. The Winter Solstice Was Once Closely Linked To Famine
Per Roselinde on the Road, the winter solstice was once associated with the start of famine months. Food stores would typically dwindle in the winter months between January and April, so ancient cultures would go all out with fresh food on the solstice. | <urn:uuid:e8b5c11e-1344-4681-8a1f-6bd36350494b> | {
"date": "2018-04-19T17:39:45",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937015.7/warc/CC-MAIN-20180419165443-20180419185443-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9412001967430115,
"score": 2.828125,
"token_count": 1325,
"url": "https://www.bustle.com/p/11-creepy-things-about-the-winter-solstice-that-you-probably-didnt-know-7577882"
} |
1967, Philippines (Republic). Silver Proof-Like Peso "Bataan Day"
Mint year: 1967
Mint Place: Manila
Denomination: Silver Peso – 25th Anniversary of Bataan Day
Material: Silver (.900)
Araw ng Kagitingan (Filipino for Day of Valor), also known as Bataan Day or Bataan and Corregidor Day, is a national observance in the Philippines which commemorates the fall of Bataan during World War II. It falls on April 9, although in 2009 it would have coincided with Maundy Thursday and its celebration for 2009 was moved to April 6. | <urn:uuid:673e6c4d-693b-4c8d-98d9-b7226e7e01b3> | {
"date": "2018-09-24T22:06:07",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9359249472618103,
"score": 2.578125,
"token_count": 139,
"url": "https://www.coinshome.net/en/coin_definition-1_Peso-Silver-Philippines-m0QKbzbip_IAAAFNChhmYHyP.htm"
} |
Biblical ethics is inalienably religious. Reflection on issues of moral conduct and character in scripture is always qualified by religious convictions and commitments. To abstract biblical ethics from its religious context is to distort it.
Biblical ethics is unyieldingly diverse. The Bible contains many books, and more traditions, each addressed in a specific cultural and social context to a particular community facing concrete questions of moral conduct and character. Biblical ethics does not provide an autonomous and timeless and coherent set of rules; it provides an account of the work and will and way of the one God, and it evokes the creative and faithful response of those who would be God's people. The one God of scripture assures the unity of biblical ethics, but there is no simple unitive understanding even of that one God or of that one God's will. To force biblical ethics into a timeless, systematic unity is to impoverish it.
The one God of scripture stands behind the formation and continuation of a people as liberator and ruler. The story was told in countless recitals of faith: the God of Abraham heard our groaning when we were slaves, rescued us from Egypt, and made us a people with a covenant.
The covenant of God and the people was like an ancient suzerainty treaty, acknowledging and confirming that God will be their great king and they will be God's faithful people. Like other suzerainty treaties, the covenant begins by identifying the great king and reciting his works (e.g., Exod. 20.2), continues with stipulations forbidding conflicting loyalties and assuring peace in the land (e.g., Exod. 20.3–17), and ends with provisions for periodic renewal of the covenant and assurances of faithful blessings upon faithful observance and curses upon infidelity (e.g., Exod. 23.22–33).
This story and covenant provided a framework for the gathering of stories and stipulations until the literary formation of the Torah or Pentateuch, the first five books of the Bible, and its acceptance as having Mosaic authority.
“Torah” is often translated “law,” and much of it is legal material. Various collections can be identified (e.g., Exod. 20.22–23.19, the Book of the Covenant; Lev. 17–26, the Holiness Code; Deut. 4.44–28.68, the Deuteronomic Book of the Law) and associated with particular social contexts of Israel's history. The later collections sometimes included older material, but it is not the case that the whole Law was given once as a timeless code. Rather, the lawmakers were evidently both creative with, and faithful to, the legal traditions.
There are two forms of law, casuistic and apodictic. The casuistic regulations are similar in form and content to other Near Eastern law codes. The apodictic prohibitions, rejecting other gods and marking out the boundaries of freedom (and so securing it), seem an innovation.
There is no simple differentiation in the Law between ceremonial and civil and moral laws. All of life is covenanted. Ceremonially, the Torah struggles against the temptations to commit infidelity in foreign cults and nurtures a communal memory and commitment to covenant. Civilly, the Torah is fundamentally theocratic, and the theocratic conviction that the rulers are ruled too, that they are subject to law, not the final creators of it, has a democratizing effect. Morally, the Torah protects the family and its economic participation in God's gift of the land, protects persons and property (but persons more than property), requires fairness in settling disputes and economic transactions, and provides for the care and special protection of the vulnerable, such as widows, orphans, sojourners (see Alien), and the poor. This last characteristic is perhaps the most remarkable (though it is not absent from other ancient codes), but it is hardly surprising, given the story that surrounds the stipulations.
The legal materials never escape the story and its covenant, and “Torah” is, ultimately, better rendered “teachings.” The narrative and covenant preserve the responsiveness of obedience to the Law; gratitude then stands behind obedience as its fundamental motive. The story, moreover, forms and informs the Law and its use. The concern about the vulnerable reflects the story of one God who heard the cries of slaves (e.g., Exod. 22.21–23; Lev. 19.33–34). And the stories of Moses as the champion of the oppressed were intended to shape the use of the Law by any who honored its Mosaic authority.
The narratives of the Torah, it needs finally to be said, were morally significant in their own right; artfully told, they nurtured dispositions more effectively than the stipulations themselves. The Yahwist (see J), for example, had told the stories of the ancestors not only to trace the blessings of David's empire to God but to evoke the readiness to use the power of empire to bless the subject nations (e.g., Gen. 12.1–2; 18–19; 26; 30.27–28).
The one God who rescued and established a people visited them in the prophets. They came always with a particular word for a particular time, but the word they brought was always related to covenant. Their “Thus says the Lord” was the familiar language of diplomacy in the ancient Near East for the announcements of a messenger of a suzerain. The prophets were not social reformers, nor were they necessarily skilled in the craft and compromise of politics; they were messengers of the great king and announced his word of judgment.
The sum of that judgment was always the same: the people have forsaken the covenant (1 Kings 19.10, 14; Hos. 8.1; etc.). Concretely—and the message of the prophet was always concrete—some specific idolatry or injustice was condemned as infidelity to the covenant. The infidelity of idolatry was never merely religious. The claims of Baal involved the fertility of wombs and land as well as a theory of ownership. The prophet's announcement of God's greater power freed the people to farm a land stripped of divinity but acknowledged as God's gift, and bound them to leave the edges unharvested for the poor. The infidelity of injustice was never merely moral, for faithfulness to the covenant acts justly, and the welfare of the poor and powerless is the best index of fidelity and justice. So the prophets denounced unjust rulers, greedy merchants, corrupt judges, the complacent rich, but they saved their harshest words for those who celebrated covenant in ritual and ceremony without caring about justice, without protecting the powerless, without faithfulness (e.g., Amos 5.21–24).
On the other side of God's judgment, the prophets saw and announced God's faithfulness to God's own good future. God will reign and establish both peace and justice—not only in Israel but among all the nations, and not only among the nations but in nature itself. That future is not contingent on human striving, but it already affects human vision and dispositions and actions, readying the faithful even to suffer for the sake of God's cause in the world.
The way and will of the one God can be known not only in the great events of liberation and covenant, not only in the great oracles of God's messengers, but also in the regularities of nature and experience. The moral counsel of the sage was not founded on the Torah or the covenant; reflection on moral character and conduct among the wise was grounded and tested, rather, in experience.
Careful attention to nature and experience allowed the wise to comprehend the basic principles operative in the world, the regularities to which it was both prudent and moral to conform. The one God is the creator who established and secures the order and stability of ordinary life. So the sage could give counsel about eating and drinking and sleeping and working, the way to handle money and anger, the way to relate to friends and enemies and women and kings and fools, when to speak and when to be still—in short, about everything that was a part of experience.
The ethics of wisdom literature tends to be conservative, for the experience of a community over time provides a fund of wisdom, but the immediacy of experience keeps the tradition open to challenge and revision. The ethics of wisdom tends to be prudential, but a little experience is enough to teach that the righteous may suffer and that there is no neat fit between morality and prudence (Job). The ethics of wisdom tends to delight both in the simple things of life, like the love of a man and woman (Song of Solomon), and in the quest for wisdom itself, but experience itself teaches the hard lessons that wisdom has its limit in the inscrutable (Job 28) and that the regularities of nature and experience cannot simply be identified with the cause of a covenanted god (Ecclesiastes).
Wisdom reflects about conduct and character quite differently than the Torah and the Prophets, but “the end of the matter,” like “the beginning of knowledge” (Prov. 1.7), is a reminder of covenant: “Fear God, and keep his commandments” (Eccles. 12.13). That beginning and end keeps the wisdom literature in touch with the Torah; between that beginning and end, wisdom struggles mightily to keep Torah in touch with experience and covenant in touch with creation.
The New Testament.
Jesus of Nazareth came announcing that the kingdom of God was at hand and already making its power felt in his words and deeds. He called the people to repent, to form their conduct and character in response to the good news of that coming future.
To welcome a future where the last will be first (Mark 10.31), a future already prefigured in Jesus' humble service, is to be ready to be “servant of all” (Mark 9.35). To delight in a kingdom where the poor will be blessed is now to be carefree about riches and to give alms. To repent before a kingdom that belongs to children, that is already prefigured in table fellowship with sinners, and that is signaled in open conversation with women, is to turn from conventional standards to bless children, welcome sinners, and treat women as equals.
Because Jesus announced and already unveiled the coming reign of God, he spoke with authority, not simply on the basis of law and tradition. And because the coming reign of God demanded a response of the whole person and not merely external observance of the Law, his words made radical demands. So Jesus' radical demand for truthfulness replaced (and fulfilled) legal casuistry about oaths. The readiness to forgive and be reconciled set aside (and fulfilled) legal limitations on revenge. The disposition to love even enemies put aside legal debates about the meaning of “neighbor.” The ethics was based neither on the precepts of law nor the regularities of experience, nor did it discard them; law and wisdom were both qualified and fulfilled in this ethic of response to the future reign of the one God of scripture.
Jesus died on a Roman cross, but his followers proclaimed that God had raised him up in an act of power that was at once his vindication and the prelude to God's final triumph. Moral reflection in the New Testament always looks back to the vindicated Jesus and forward to God's cosmic sovereignty.
The Gospels used the traditions of Jesus' words and deeds to tell his story creatively and so to shape the conduct and character of the particular communities they addressed. Each has a distinctive emphasis. Mark represents Jesus as calling for heroic discipleship, ready to suffer and die and ready as well to live in ordinary relationships with heroic confidence in God. In Matthew, the Law holds: Jesus is presented as upholding the Law and as its best interpreter even as he demands a righteousness that “exceeds that of the scribes and Pharisees” (Matt. 5.20). Luke's emphasis falls on care for the poor, women, and sinners, as well as on the mutual respect due Jew and gentile in the community. John tells the story quite differently so that his reader might “have life” (John 20.31) and might know that this entails love for one another.
The letters of Paul make little use of the traditions of Jesus' words and deeds. Paul proclaims the gospel of the cross and resurrection as “the power of God for salvation” (Rom. 1.16) to his churches, sometimes in the indicative mood and sometimes in the imperative. The indicative describes the power of God in the crucified and risen Christ to provide an eschatological salvation of which Christians have the “first fruits” (Rom. 8.23) and “guarantee” (2 Cor. 5.5) in the Spirit. The imperative acknowledges that the powers of the old age still threaten Christians; so, “if we live by the Spirit, let us also be guided by the Spirit” (Gal. 5.25).
Reflection about conduct and character ought to be radically affected by God's power in the cross and resurrection. Paul provides no recipe for this new discernment, but some features are clear. Christians' self‐understanding as moral agents was determined by their incorporation into Christ (Gal. 2.20; Rom. 6.1–11). Their perspective was eschatological; the Corinthian enthusiasts who claimed to be already fully in the new age were reminded of the “not yet” character of their existence, while the Colossians, tempted to submit again to angelic powers, were told that Christ was already Lord. Freedom (Gal. 5.1; 2 Cor. 3.17) and love (1 Cor 13; Phil. 1.9) were values that provided tokens of the new age. The moral traditions of the church, the synagogue, and the Greek schools were not to be discarded, but selected, assimilated, and qualified by the gospel. Such discernment is applied to various moral issues: the relations of Jew and gentile, slave and free, male and female, rich and poor, the individual and the state. The judgments are not timeless truths in the style of either a philosopher or a code maker; they are timely applications of the gospel to specific problems in particular contexts.
The unyielding diversity of biblical ethics is only confirmed by other New Testament writings. The Pastoral letters use common hellenistic moral vocabulary and urge commonplace moral judgment against the gnostics. The letter of James is a didactic text collecting instructions into a moral miscellany. The book of Revelation provides a symbolic universe to make intelligible both the experience of injustice at the hands of the Roman emperor and the conviction that Jesus is Lord, and to make plausible both patient endurance of suffering and faithful resistance to the values of the empire.
See also Ethical Lists.
Allen D. Verhey | <urn:uuid:ee71f15d-7561-4f64-802f-67fe51f168ff> | {
"date": "2016-04-29T14:21:39",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111365.36/warc/CC-MAIN-20160428161511-00058-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9576197862625122,
"score": 3.109375,
"token_count": 3122,
"url": "http://www.oxfordbiblicalstudies.com/article/opr/t120/e0234?_hi=64&_pos=20"
} |
Guest post by Georgie Bray, Acting Farm Manager, Hope Farm
Last winter was an interesting one at Hope Farm, enabling us to see how farm management, the weather, and the interactions between these factors impact farmland birds. Last summer was a hard one for growing spring cereals with the dry weather, and we predicted that it would make for a harder winter on the birds that relied on cereal seed in winter bird seed mixes as their main food source. With that in mind, and looking at the distribution of birds across the farm, we can get a real understanding of why our farmland bird index has increased over twelve-fold, but also where the farm has fallen short against record years.
Smaller seed eating birds thrived off the dominating small seed-bearing plants in our seed mixes. It’s always positive to start off with where birds are thriving on the farm, and where we and other farmers across the country will be supporting birds with similar provisions throughout winter. In simple terms, where there was food, the birds flocked! The three and a half hectares of winter bird seed mixes had lots of small seed-bearing plants like quinoa, mustard, buckwheat, phacelia, and millet. As birds were used to using that area for feeding, we also put down supplementary seed of wheat, oilseed rape, red millet, and canary grass. Linnet, reed bunting and chaffinch probably did the best out on these parts of the farm, with record linnet counts seen since we bought Hope Farm nearly 20 years ago. It just goes to show the proof in the pudding here, that if the right food is put out for birds, they will thrive.
Linnet (adult female) feeding on grain at Hope Farm. Image: www.rspb-images.com
The usefulness of the winter bird food was probably improved by the large hedges nearby, as the small song birds tended to flit between the hedge and the food sources, using the thick thorned vegetation as a means of predator protection. Elsewhere on the farm, birds like goldfinch and the other non-farmland-bird songbird species were still concentrated around the hedge and coppice areas of the farm.
Although areas specifically maintained for conservation purposes were diverse and full of bird life, cropped areas could still be a stronghold for birds. There is quite a large acreage of direct drilled oilseed rape across the farm and these areas were great for grey partridge, skylark, meadow pipit, and even some waders like snipe and woodcock. Here, the soil ecosystem underground was relatively undisturbed with a rotting root system from the previous harvest to accompany the new growing roots, as a result of the direct drilled crop. This kind of soil structure is perfect for many soil dwelling invertebrates that in turn provide a good food supply for insectivorous birds. The vegetation structure in these fields also provides a good cover for waders, skylark and meadow pipit. The leaves are a fantastic food resource for wood pigeon but they aren’t the birds that we try to feed on the farm!
So why wouldn’t you see so many birds on the farm this year?
Although the winter bird seed mixes had a strong small seed component, the cereal component of triticale and barley really struggled to grow in the summer drought after it was planted in May. This meant that large seed eating birds like yellowhammer and corn bunting would have found it harder to find food out on the farm where large cereal seeds were not put out via supplementary feeding. Yellowhammers were our most abundant large cereal eating bird, and their distribution underlined a lack of cereals in the winter bird seed mixes. Although they were seen around the farm hedgerows, they were really concentrated to our supplementary feed stations.
This has underlined a few things for us, about the concerns about these birds finding enough food over winter if cereals continue to have poor growing years in winter bird seed mixes. Next year, if we have another poor season, we’ll hold back more cereals after harvest to keep these birds going over winter.
Although birds will have had a harder time finding food, there has been one saving grace – how mild the weather has been. When the weather gets tough, the flocks get going, and when the flocks get going we count huge numbers. 2017/18 and 2011/12 winters were mega counts, but that partly resulted from a tough year where they flocked together in such large numbers. With birds more widely dispersed, counts could be slightly lower.
At a glance, we had a look at the maps from our trusty bird surveyors and this was where some key farmland species were found in a greater abundance:
The three surveys that mean every metre of farm is walked to within 25m in a morning, allow the calculation of a Hope Farm winter bird index. This gives a measure of average change in the suite of 16 farmland bird species on the farm. The index now stands at 12.15 above the baseline, or equivalent to 1115% increase. This is slightly lower than the last three winters but still our 4th highest winter count since monitoring began.
The difference in abundance of each farmland bird species in December, January and February between 2000 and 2019:
2000 / 2001 winter count
2018 / 2019 winter count
The Hope Farm Winter Bird Index, calculating a proportional change in the 16 overwintering farmland bird species from the time that we purchased Hope Farm. | <urn:uuid:12083a76-6849-4827-92ac-c23047c75935> | {
"date": "2019-11-21T19:10:03",
"dump": "CC-MAIN-2019-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670948.64/warc/CC-MAIN-20191121180800-20191121204800-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9663053750991821,
"score": 3.03125,
"token_count": 1136,
"url": "https://www.conservationgrade.org/2019/05/birds-found-farm-can-tell-us-lot/"
} |
Higher crude oil prices will adversely impact the twin deficits of duty on retail fuel products), the direct impact on inflation—measured by. And the economy from rising fuel prices and provide other benefits figure 4 shows the effects of fuel efficiency and annual mileage on total.
This essay will reexamine how the lifting fuel monetary values affect the different macroeconomic variables such as rising prices, lifting production cost, unequal. Gas prices are on the mind of just about anyone that owns a car one after another, and that came on the heels of months of rising prices that impact the price of gas at the pump, and we'll find out where your gas money actually goes.
Volatile gas prices have taken center stage in the media this year as the national but higher gas prices affect more than just the cost to fill up at the gas station a very basic side effect of high gas prices is that discretionary. The usage and pricing of gasoline (or petrol) results from factors such as crude oil prices, after hurricane katrina and hurricane rita, gas prices started rising per liter, on a fixed price in the local currency that has been in effect since 1997.
This essay will review how the rising fuel prices affect the different macroeconomic variables such as inflation, rising production cost, unequal economic. Inflation impacts your life by lowering your standard of living everything people buy more than they need to avoid tomorrow's higher prices. In this essay, i would like to touch on the effects this price increase has on society today, were increasing vice activities, widening the gap.
The federal gas tax was a mere penny per gallon and first came into effect in 1932 as a temporary argumentative essay - rising gas prices: who is to blame.
Higher oil prices had many unexpected consequences—from breeding all of this largely stems from contracting oil and gas revenues (which. This article analysis the causes of the rising international food and fuel prices crisis with direct and indirect situations, the impact to. | <urn:uuid:c9e87fd7-5290-43c0-a1ac-e361c4c1288a> | {
"date": "2018-10-22T01:12:23",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9520511627197266,
"score": 2.609375,
"token_count": 396,
"url": "http://auassignmentkhvg.du-opfer.info/effects-of-rising-gas-prices-essay.html"
} |
The liberal arts vision of flooding society with a steady stream of virtuous, truth-seeking leaders has fallen on hard times, but Plato and Aristotle would remind us that educating the mind without cultivating the heart is no education at all.
by Gary David Stratton, Ph.D. • Senior Editor
The goal of educating two-handed warriors—men and women committed to both the life of the mind and the life of the Spirit—is really nothing new. Much of the best of Western society is based upon a classical liberal arts approach to education that is far more “two-handed” than most colleges and universities today. Founded in the fifth-century BC, the liberal arts tradition grew out of the Greco-Roman ideal of developing the life of the mind in a soul-nurturing relational environment. In fact, a popular aphorism commonly attributed to Aristotle accurately captures the spirit of the liberal arts tradition: “Educating the mind without educating the heart is no education at all.”
So how did they do it?
Liberating Minds for a Life of Leadership
Bruce M. Kimball (1986, 2002) discerns two distinct streams in the liberal arts traditions—the philosophical and the oratorical. 1) The Greek philosophical tradition was consumed with the pursuit of truth. It was birthed in the life and teachings of Socrates, as recorded by Plato (c. 427-347 BCE) and refined by Aristotle. In the philosophical tradition the liberal arts function as “liberating arts” in that they were designed to “free the mind from traditional beliefs accepted uncritically.” Their aim is to examine “our opinions and values to see whether or not they are really true and good” (Hoeckley, 2002b, p. 1).
2) The Roman oratorical tradition focused more on leadership development. It’s founder, Cicero (c. 106-43 BCE), never lost sight of his dream that education was about “training citizens to be leaders of society” (Taylor, 2001, p. 1). In the oratorical tradition studying the “liberal arts” meant that students were “liberated” from the pragmatic concerns of merely learning a trade. They were learning to think, so that they could lead their culture toward the good, the beautiful, and the true.
The two streams developed in tension with one other and eventually converged in the Middle Ages with the establishment of a curriculum rooted in the Trivium—Grammar, Rhetoric, Dialectic, and the Quadrivium—Arithmetic, Music, Geometry, and Astronomy (Cobban, 1975, p. 10; Hoeckley, 2002a, p. 1).
A Deeply Relational Connection
More importantly for our discussion, both traditions fostered highly collegial learning environments that were “spiritual,” at least in a relational sense.
Education and what we would call “discipleship” were virtually synonymous. Michael J. Wilkins (1992) notes that the master-disciple relationship was the key to education in the Greco-Roman world. “We find an early relationship between the noun mathetes (disciple) and the verb ‘to learn’” (p. 72). Philosophers and orators alike attracted students and/or were hired by parents or city-states to train young men in apprenticeship-like relationships (p. 73).
Socrates specifically rejected the Sophists’ more distant and “academic” student-teacher relationships, branding them educational mercenaries with little or no concern for the souls of their students. The Socratic method of instruction necessitated intimate relationships in tight-knit learning community (p. 74). Socrates and his student, Plato, called their disciples “friends,” precisely because they “wanted a relationship that was characterized by shared community” (p. 75).
Aristotle’s experience with Socrates and Plato led him to assert that virtue and friendship are the inseparable foundations of education. He believed that it is impossible for a student to learn from a teacher who is not also his friend (Kraut, 2005). The relationship between virtue and discipleship was so critical that the “imitation of the conduct of a human master became a significant feature of a disciple of a great master… and involved a commitment that affected the follower’s entire life” (Wilkins, p. 77, 76).
The Liberal Arts Today
It really isn’t all that difficult to imagine what Socrates would make of the distant, academic, and often mercenary approach to education that dominates twenty-first-century colleges and universities. While numerous historical, economic, and pragmatic factors led to most twentieth-century American colleges gradually abandoning the liberal arts tradition of friendship and virtue (even in many liberal arts colleges), the impact has been devastating.
The liberal arts vision of flooding society with a steady stream of virtuous, truth-seeking leaders has fallen on hard times. Julie Reuben’s (1996) The Making of the Modern University traces the tragic decline of relationally-based moral education and the corresponding decline in morality in American society. It is a difficult thesis to refute.
Whereas Plato and Aristotle interacted with their students as friends, the depersonalized modern university student is often little more than a number. No relationship means no moral transformation, at least not for the good.
Perhaps its time to consider going back to the future. It seems highly unlikely that twenty-first-century educators will ever be to cultivate two-handed warriors without a radical reexamination of the student-teacher relationship. Whatever the twenty-first century higher education might look like, whether on residential campuses or online communities, we cannot assemble two-handed warriors in educational assembly lines. They need to be nurtured in tight-knit learning communities.
The Greco-Roman tradition provided an algorithm that has really never been improved upon—the deeper the student-teacher connection, the deeper the impact. Whether you are teaching students to pursue truth, and/or developing them as cultural leaders, relationship is key. Smaller is better. Apprenticeship is ideal. Mentoring is life or death.
After all, 2500 years of transformational education can’t be all wrong,
Next post in the series, click: Rabbinic Higher Education.
Cobban, Alan (1975). The medieval universities: their development and organization. London: Methuen.
Hoeckley, Christian (2002a). “Introduction to Bruce Kimball’s, Interpreting the liberal arts: four lectures on the history and historiography of the liberal arts.” The Gaede Institute for the Liberal Arts, Westmont College, Santa Barbara, CA.
Hoeckley, Christian (2002b). “The Liberal Arts Traditions and Christian Higher Education: A Brief Guide.” The Gaede Institute for the Liberal Arts, Westmont College, Santa Barbara, CA.
Kimball, Bruce A. (1986). Orators and philosophers: a history of the idea of liberal education. New York: Teachers College.
Kimball, Bruce A. (2002). Interpreting the liberal arts: four lectures on the history and historiography of the liberal arts. The Gaede Institute for the Liberal Arts, Westmont College, Santa Barbara, CA.
Kraut, Richard. “Aristotle’s Ethics.” The Stanford encyclopedia of philosophy. Edward N. Zalta (ed.), http://plato.stanford.edu/archives/sum2005/entries/aristotle-ethics/
Reuben, Julie (1996). The making of the modern university: intellectual transformation and the marginalization of morality. Chicago: The University of Chicago Press.
Taylor, James E. (2002). “Christian Liberal Learning.” Summer 2002 Faculty Workshop, Westmont College, Santa Barbara, CA.
Wilkins, Michael J. (1992). Following the master: a biblical theology of discipleship. Grand Rapids, MI: Zondervan, 1992. | <urn:uuid:23942419-428f-4128-aace-52cbcf9190fd> | {
"date": "2017-11-19T17:54:56",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805708.41/warc/CC-MAIN-20171119172232-20171119192232-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.940862238407135,
"score": 2.921875,
"token_count": 1702,
"url": "http://garydavidstratton.com/tag/online-community/"
} |
From Birth to Finish Line: The Life of a Race Horse
The life of a race horse is planned from before it is born up until its retirement. What is not well known is what happens before the gate opens and after the finish line. Much like human athletes, it takes a lot of training and effort beyond the race itself to create a race horse.
The Birth of an Athlete
Race horses are literally designed for speed. Specialized farms, known as stud farms, keep winning retired stallions to be bred. They maintain careful records of lineages in an attempt to create the ideal race horse. Owners of retired racing mares pay a fee to use the stud, which can command anywhere from a few hundred dollars to $20,000 for the top racers. Foals are then raised for a year before their true training begins. They will not be given a name until they are registered to race, when they are young they are known only as their color, gender, and parents’ names.
Training for yearlings begins similarly to riding horses, getting them used to saddles and basic handling. Like a human athlete, they have a strict exercise routine and diet. They are trained in the beginning for endurance, not speed as one would expect. Endurance involves maintaining speed, a vital part of the races. For horses trained for jumps, an older horse is used as a teacher and example of how to jump a hurdle.
And They’re Off!
Once a horse is registered for racing, they receive an official name. They have a daily training routine, sometimes including swimming in equine pools to reduce the stress on their joints. Even the strongest horse would get burned out from galloping daily so it is reduced to twice a week at most. They stay in this routine for their entire racing lives, which can be until they are anywhere between 4 and 10 years old.
One of the greatest controversies surrounding race horses is their fate after they retire. Most horses have another decade or two to live once they are done running. However, they are not trained while young to do anything but race so they must be retrained to be used for other equestrian pursuits. Many, unfortunately, end up at one of the 3 slaughter houses in the US and are then sent as horse meal to Europe. Retirement centers far outnumber the slaughter houses in the US, however. The horses there are trained for riding and showing, and then rehomed with new owners. There they receive the attention and pleasant retirement they deserve after their first life as a racer. | <urn:uuid:bfd632ee-42b6-422f-b3fd-00ccc7c7ef88> | {
"date": "2013-12-08T14:26:45",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163065880/warc/CC-MAIN-20131204131745-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9801523089408875,
"score": 2.828125,
"token_count": 521,
"url": "http://www.probioticsmart.com/blog/from-birth-to-finish-line-the-life-of-a-race-horse/"
} |
Big Oak Flat is an old mining town located adjacent to Groveland. Population estimates often group residents with Groveland but the 2000 U.S. census recorded 149 residents in the Big Oak Flat zip code: 95305.
Big Oak Flat is at the top of Old and New Priest Grades. New Priest Grade is the section of State Route 120 that climbs from Moccasin at about 910 feet to 2,450 feet over a distance of six miles. Old Priest Grade, is the original route, it is a narrower road and covers the same change in elevation over about 2.7 miles. It is common to see vehicles with smoking brakes descending the old grade.
During summer, temperatures can be 90-100F causing many vehicles to overheat climbing the old grade. Locals tell stories of car accidents where the vehicles left the path of Old Priest Grade and tumbled into Grizzly Gulch. They claim that the terrain is so difficult that, in a few cases, the cars and bodies were not retrieved.
At an elevation of 2,838 feet, Big Oak Flat is a quiet village with a gas station, stores, and limited accommodations. During the Gold Rush it was a lively camp with millions of dollars worth of placer gold to be found. A few old buildings still stand, but most were burned in 1863. A monument near the west end of town displays the burned pieces of the big oak tree that the town was named after.
History of Big Oak Flat
Originally, Groveland and nearby Big Oak Flat were called Savage’s Diggings. James Savage discovered gold there in 1848. Savage’s Diggings became Garrote (a Spanish word for a type of execution) in 1850 because the towns preferred method of justice was hanging, for various offenses including stealing.
Big Oak Flat Zip Code: 95305
US Post Office -
17850 Highway 120 | <urn:uuid:3224d59f-cb2d-4c35-8336-b641c9902c7a> | {
"date": "2014-09-20T20:13:32",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133564.63/warc/CC-MAIN-20140914011213-00084-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9669888615608215,
"score": 2.546875,
"token_count": 387,
"url": "http://www.mymotherlode.com/community/guide/tuolumne/big-oak-flat"
} |
Artist: Vincent Van Gogh
Date: June 1889
Genre: Landscape; Oil on Canvas
Dimensions: 73.7 x 92.1 cm
Location: Museum of Modern Art, New York
This oil on canvas by post-impressionist artist, Vincent Van Gogh, is a representation of the view just before sunrise from his window with a merged in depiction of an idealized village. In it’s literal context, the painting describes Van Gogh’s perception of the space around him, which for him was fantastical, yet, physical.
The elements in the work of art like the sun, stars, sky and wind all exist individually and are by themselves narrating a story, but, together they describe the homogeneity of what makes the space within that time, which in this case, is dawn.
The minimal use of color variation and consistant brush strokes in the piece of art led me to evaluate the artwork as a whole before even observing the individual elements within the painting.
Time is a concept, the passage of which, is extremely subjective. Hours could pass in an instant and that same instant could stretch itself to feel like hours. The passage of time depends completely on how engaging the space is in which the time is spent.
The strokes in the painting, to me, are an expression of time lapses and derivatively, it’s passage. The view of the sky just before sunrise as mesmerizing as it is, is never motionless. Every second of every minute, the colors in the sky change shades as the sun rises. The variation in the colors is only a given few, but their tints and shades make the sky look complete as it continuously changes color, form and motion.
The painting depicts, at the same time, two states of the sky. The brush strokes make it seem motionless, yet, the passage of time is evident. It is this passage of time, within a space, that creates a memory, the memory created by Van Gogh before and during creating the Starry Night. | <urn:uuid:74687574-5f63-4dc3-abe2-cfc8570036f0> | {
"date": "2017-12-18T10:52:12",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948615810.90/warc/CC-MAIN-20171218102808-20171218124808-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9618077278137207,
"score": 2.953125,
"token_count": 425,
"url": "https://timewithsectionc.wordpress.com/2016/03/"
} |
Editors. "The Hague Conference for peace negotiations is opened". The Literary Encyclopedia. First published 01 April 2011
[http://www.litencyc.com/php/stopics.php?rec=true&UID=17091, accessed 01 October 2016.]
After disastrous losses at the battles of Oudenarde and Lille, Louis XIV seeks to negotiate a peace by sending his foreign minister, the Marquis de Torcy, to meet allied commanders at The Hague. Louis agrees to give up all his Spanish territories to the Allies, and to supply money to aid the expulsion of Philip V from Spain. However, the Allies demands the humiliating condition that Louis use his own army to dethrone his own grandson Philip, which he is not prepared to accept. This leads to the resumption of warfare.
Please log in to consult the article in its entirety. If you are a member (student of staff) of a subscribing institution (see List), you should be able to access the LE on campus directly (without the need to log in), and off-campus either via the institutional log in we offer, or via your institution's remote access facilities, or by creating a personal user account with your institutional email address. If you are not a member of a subscribing institution, you will need to purchase a personal subscription. For more information on how to subscribe as an individual user, please see under Individual Subcriptions. | <urn:uuid:10880258-90f0-49dd-af7b-0d8e474e73a0> | {
"date": "2016-10-01T15:57:43",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663010.9/warc/CC-MAIN-20160924173743-00182-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9475921392440796,
"score": 2.984375,
"token_count": 289,
"url": "http://www.litencyc.com/php/stopics.php?rec=true&UID=17091"
} |
Earlier this year I published a story in this magazine about geoengineering—which is the attempt to lessen the impact of global warming by deliberately altering the climate of the earth. There are many plans, some of which are absurd and potentially catastrophic, and others of which are absurd and potentially vital to the future of humanity. It will all depend on how desperate we become to counteract the effect of greenhouse-gas emissions. Most reputable scientists agree that climate change is real and that the effects are likely to be bad. But nobody can say for sure exactly what bad means.
The safest and most equitable way out of this horrific mess is simple: cut fossil-fuel emissions. Sharply. We, however, are doing the opposite. I wrote the story because it seemed important to examine the potential impact of these schemes before it gets too late. The piece ended with what I assumed was a bit of dark hyperbole from Nathan Myhrvold, one of the pioneers of Microsoft. Myhrvold now runs Intellectual Ventures, which has invested in several geoengineering ideas. “Rich, powerful countries might have invented much of [this technology], but it will be there for anyone to use,’’ he said. “People get themselves all balled up into knots over whether this can be done unilaterally or by one group or one nation. Well, guess what. We decide to do much worse than this every day, and we decide unilaterally. We are polluting the earth unilaterally. Whether it’s life-taking decisions, like wars, or something like a trade embargo, the world is about people taking action, not agreeing to take action.’’
Enter Russ George, an American entrepreneur who has fulfilled Myhrvolds’s dictum and become the world’s first geo-vigilante. This summer, it has just been revealed, George dumped a hundred tons of iron sulfate into the Pacific Ocean about two hundred nautical miles west of the Canadian islands of Haida Gwaii, triggering a ten-thousand-square-kilometre plankton bloom. In theory, the approach is not as nutty as it sounds: blooms like that are capable of sucking large amounts of carbon out of the atmosphere and eventually sequestering it deep in the ocean. (This is not George’s first try at this experiment: he has long sought to create lucrative carbon credits to trade on international markets. According to the Guardian, which first reported the story, George had been chief executive of a company called Planktos Inc.:
Those previous failed efforts to conduct large-scale commercial dumps near the Galapagos and Canary Islands led to his vessels being barred from ports by the Spanish and Ecuadorean governments. The US Environmental Protection Agency warned him that flying a US flag for his Galapagos project would violate US laws, and his activities are credited in part to the passing of international moratoria at the United Nations limiting ocean fertilization experiments.
George told the Guardian that the recent dump is “the most substantial ocean restoration project in history,” and that he has collected “a greater density and depth of scientific data than ever before…. We’ve gathered data targeting all the possible fears that have been raised [about ocean fertilization]…. And the news is good news. All around. For the planet.”
Well, gosh. That makes me feel so much more comfortable. Perhaps next, he can send a rocket into space, spread a few million tons of sulphur-dioxide particles, and cool the earth that way. Finally, a man capable—all by himself—of saving the earth.
This idea may eventually prove useful or at least necessary (and so might the notion of seeding the stratosphere with particles that can block light.) Many scientists are exploring these and other approaches to our growing climate crisis. And nearly all agree that we need to move with great deliberation when altering the ecosystem of the ocean. (A sudden influx of oxygen could harm bacteria that are an essential part of the food chain. Too much iron could result in an increased production of nitrous oxide, a greenhouse gas more powerful than carbon dioxide. And sequestering enormous amounts of CO2 could, conceivably also cause danger.)
George’s unilateral action was deplorable, premature, and violated several international laws and United Nations covenants. (Well, unilateral may be harsh. He apparently convinced the council of an indigenous village to approve the project.) There was no scientific assessment attached to the experiment, which does carry potential risks.
I may be wrong, but I am fairly certain that no village on earth should have the power to approve a project the consequences of which, for the entire planet, cannot possibly be foreseen.
Read Specter’s “The Climate Fixers: Is There a Technological Solution to Global Warming” or listen to him on NPR, and also with Elizabeth Kolbert and Nicholas Thompson discussing geoengineering on the New Yorker’s Out Loud podcast. Also, read Specter’s piece from this week’s issue on bacteria and the human body.
Photograph: Goddard Earth Sciences Data and Information Services Center/NASA. | <urn:uuid:eb0cf23a-4a88-483d-a2bf-ef02424144cb> | {
"date": "2015-08-28T19:25:17",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644063881.16/warc/CC-MAIN-20150827025423-00173-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9531386494636536,
"score": 2.640625,
"token_count": 1070,
"url": "http://www.newyorker.com/news/news-desk/the-first-geo-vigilante"
} |
Eight shillings a week
This dates from the winter of 1830, when starving farm-workers in the Southern Counties riotously demonstrated for a basic wage of a half a crown a day. They committed a breach of the peace but otherwise harmed no one, yet after the demonstrations three of them were hanged and over four hundred were transported. At that time a loaf of bread cost a shilling.
Come all you bold Britons where’re you may be,
I pray give attention and listen to me,
There once was good times but they’re gone by complete,
For a poor man now lives on eight shillings a week.
Such times in old England there never was seen,
As the present ones now but much better have been,
A poor man’s condemned and looked on as a thief.
And compelled to work hard on eight shillings a week.
Our venerable fathers remember the year,
When a man earned thee shillings a day and his beer,
He then could live well, keep his family all neat,
But now he must work for eight shillings a week
The nobs of old England of shameful renown,
Are striving to crush a poor man to the ground,
They’ll beat down his wages and starve him complete
And make him work hard for eight shillings a week.
A poor man to labour believe me ‘tis so,
To maintain his family is willing to go,
Either hedging or ditching, to plough or to reap,
But how does he live on eight shillings a week?
So now to conclude and finish my song,
May the times be much better before too long,
May each labouring man be able to keep,
His children and wife on twelve shillings a week. | <urn:uuid:698982ff-27a3-4ceb-b97d-a644a7346584> | {
"date": "2019-06-19T20:49:18",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999041.59/warc/CC-MAIN-20190619204313-20190619230313-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9679442644119263,
"score": 3.25,
"token_count": 383,
"url": "https://threeacresandacow.co.uk/category/geographical-area/dorset/"
} |
The horse, ass, and onager, all members of the genus Equus, family Equidae, order Perissodactyla (odd-toed ungulates), are found in the ancient Near East both as wild and domestic stock. The equids were secondary domesticates—chronologically later additions to husbanded sheep, goat, cattle, and pig—apparently more valued for their labor than for meat, milk, fiber, or hides. The wild ass, Equus africanus, is known from Nubia and the eastern desert of Egypt; it recently was identified in southwest Asia. Previously thought to have been domesticated only in Egypt, it now appears that this could have occurred in the Syro-Arabian region as well. Remains of the domestic ass, E. asinus, appear in fourth-millennium deposits in both areas. Among the earliest remains from Israel are those in Early Bronze I–II levels at Arad. In all periods after the beginning of the second millennium BCE, the ass was the most common equid, used for plowing and as the primary beast of burden.
Remains of caballine wild horse, E. ferus, are known from Pleistocene sites in the Levant. Once thought to have disappeared from there at the end of the Ice Age, recently identified remains from a Chalcolithic deposit in the northern Negev have provisionally been identified as E. ferus. This would mean that the species persisted later into the Holocene and farther south than previously thought. Current opinion on the domestication of the horse, E. caballus, places it on the Eurasian steppe in the late Neolithic. From there it spread to various regions, reaching the ancient Near East in the first half of the third millennium. The earliest archaeological evidence places the domestic horse in Mesopotamia in about 2300 BCE. The domestic horse in Israel is noted from a slightly earlier context, again from Early Bronze I–II levels at Arad. [See Arad, article on Bronze Age Period.]
In greater Mesopotamia the onager, or half ass, E. hemionus, ranged from the Mediterranean to the Caspian Seas. During the Neolithic, according to evidence from such sites as Umm Dabaghiyeh in Iraq, the animal was hunted for its meat and skin. It was once thought that the onager had been domesticated in Mesopotamia, but recent summaries of the phiological, osteological, and behavioral evidence make clear that onagers were and are intractable. Onagers were used as studs to produce hybrids with donkeys during the early dynastic period in Mesopotamia. However, this practice seems to have died out with the arrival of the horse. Mules (hybrids produced by crossing a horse with an ass) have been attested on the basis of bone finds; the earliest are from Iran at the end of the third millennium BCE.
Equids figured in ritual activity. In Mesopotamia, equids were interred with humans and even wheeled vehicles, beginning in the late fourth and continuing until the first half of the second millennium BCE. Among the western Semites, as documented at Mari, asses were sacrificed to conclude a covenant. During the Middle Bronze Age both asses and horses were buried by western Asiatics in southern Canaan and the Egyptian Delta in ritual contexts. At Tell el-῾Ajjul, near ancient Gaza, horses and asses were interred with human remains. At the Hyksos capital of Avaris in the Delta, asses accompanied some human burials. This was repeated at other sites in the southern tier of Canaan and the Delta as well. The Canaanite material also may have been sacrificial meals, for many of the equid skeletons are missing limbs or pelvic parts. At Tell el-῾Ajjul and nearby Tell Jemmeh in southern Canaan, equids were also used as foundation deposits. In Egypt, outside the time and sphere of Asiatic influence, equids were occasionally interred with humans as part of the great Egyptian preoccupation with providing familiar and necessary items for the deceased's afterlife. [See ῾Ajjul, Tell el-; Jemmeh, Tell.]
Throughout the ancient Near East, horses were always associated with elite classes, most often in their capacity to draw light chariots and, later, in the development of mounted cavalry. The equipment used to handle equids seems to have derived from that used for cattle. The earliest true bits appear in the sixteenth century BCE, but earlier evidence of mouth gear is known from marks left on teeth. Because they conferred considerable prestige on their owners, horses were highly prized. The horse is one of the few animals for which there is a demonstrated ancient interest in selective breeding. Horse texts from second- millennium Nuzi record genealogies, a parallel component of modern breed maintenance. [See Nuzi.] Mid-second-millennium Ugaritic texts include a discussion of veterinary issues in horse husbandry.
- Azzaroli, Augusto. An Early History of Horsemanship. Leiden, 1985. Includes extensive discussion of Near Eastern traditions of horsemanship.
- Boessneck, Joachim. Die Tierwelt des Alten Ägypten: Untersucht anhand Kulturgeschichtlicher und Zoologischer. Munich, 1988. Presents summaries of the Egyptian evidence by a zoologist who studied the faunal remains from hundreds of sites throughout the ancient world.
- Clutton-Brock, Juliet. Domesticated Animals from Early Times. Austin, 1981. Global summary of the equids, with a useful review of their biology and behavior.
- Meadow, Richard H., and Hans-Peter Uerpmann, eds. Equids in the Ancient World. 2 vols. Wiesbaden, 1986–1991. Important studies of the philology and osteology of the Old World equids by J. N. Postgate, Uperpmann, Pierre Ducos, Juris Zarins, Juliet Clutton-Brock, and Meadow.
Paula Wapnish and Brian Hesse | <urn:uuid:ca988a06-c12e-4511-ba5d-944d5b03020f> | {
"date": "2017-02-26T16:56:08",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00504-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9612600207328796,
"score": 3.65625,
"token_count": 1283,
"url": "http://www.oxfordbiblicalstudies.com/article/opr/t256/e346?_hi=565&_pos=15"
} |
World Heritage Centre’s Natural Heritage Strategy
In October 2006 the World Heritage Centre published the UNESCO World Heritage Centre's Natural Heritage Strategy, which was endorsed by the World Heritage Committee. The strategy outlines the guiding principles, mission statement, strategic orientations, and working methods of all activities relating to Natural Heritage. In addition, the strategy highlights recent endeavours and achievements, as well as ongoing World Heritage programs and initiatives on Natural Heritage.
The World Heritage Centre (WHC) was established in 1992 to serve as the Secretariat for the World Heritage Convention. The creation of the WHC was timely, as the number of World Cultural and Natural Heritage properties continued to grow rapidly - there are currently 182 States Parties to the Convention and 830 World Heritage properties, and their numbers are expected to grow to over 1,000 by the end of this decade. The enthusiasm for the inscription of new sites is a positive indication of global political and public support for the World Heritage Convention.
The concept of Natural Heritage is defined under Article 2 of the Convention and further elaborated in the World Heritage Operational Guidelines, which also contain the specific criteria and conditions of integrity for assessing Outstanding Universal Value(s) of prospective World Natural Heritage properties. The WHC works closely with the technical advisory body, IUCN - the World Conservation Union to ensure the long term protection and conservation of inscribed natural heritage sites and their World Heritage values. This includes undertaking monitoring missions in cooperation with site management agencies to evaluate the state of conservation of World Heritage sites, providing technical assistance, and building capacity in the States Parties. In pursuance of these and other crucial tasks the Centre has increasingly attempted to mobilise international support from public and private sectors.
Over the past several years the WHC has been able to broaden its range of partnerships and intervention strategies and raise substantial extrabudgetary resources. The United Nations Foundation (UNF) has played a key role in this effort, and the major international conservation non-governmental organisations like Conservation International (CI), Fauna and Flora International (FFI), The Nature Conservancy (TNC), The Wildlife Conservation Society (WCS) and the World Wide Fund for Nature (WWF) have figured prominently in the expanding range of activities carried out by the WHC. UNF support for biodiversity conservation has been and for the foreseeable future will continue to be a very important driver of the Centre's work on natural heritage. The WHC will continue to maintain a strong working relationship with its advisory body on natural heritage (IUCN) and all the partners who are involved in project implementation, and further diversify the nature of the collaboration. | <urn:uuid:97897030-10a9-42a0-9073-c5232252ad2e> | {
"date": "2015-03-01T07:06:42",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00213-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9226429462432861,
"score": 3.015625,
"token_count": 532,
"url": "http://whc.unesco.org/pg_friendly_print.cfm?www.unesco.org/fr/prospective=&id=398&cid=280"
} |
Your attitude determines your productivity.
More than almost any other factor, your perspective on the current situation affects your ability to get work done.
If you need to be more productive, make sure you bring your positive attitude.
Attitude Determines Your Productivity
Can you keep a positive attitude even when faced with a bad situation?
Or do you let anger, disappointment, and complaining take over?
When you are faced with adversity, you can let your mood change for the worse or you can choose to look on the positive side of the situation.
“The more positive your attitude, the more you can get done.” (Tweet this Quote)
As much as hard work, your attitude will determine your productivity.
Here are 7 Ways That a Positive Attitude Can Make You More Productive:
- People Want to Help – A positive attitude makes others want to help you. No one wants to get near the person who is yelling and losing it at the first sign of trouble. Yet, everyone wants to come to the aid of the person who is smiling and keeping their head high despite bad things happening.
- Avoids Wasting Time Complaining – Complaining doesn’t get anything done. Instead, put your energy into the positive action of doing something to improve the situation.
- Keeps Your Energy Level High – A positive attitude can lift you up even in hard times. Boost your energy level by looking on the bright side of any situation. No matter how bad things get, there is something you can look positively at.
- Builds Teamwork – A positive attitude is contagious. It brings people together. Others want to be around people who are positive. Nothing brings a team together and builds relationships like positive energy.
- Determines Your Confidence – As Henry Ford famously said, “Whether you think you can or you think you can’t… you’re right.” Your attitude determines your confidence and ultimately whether or not you can succeed.
- Solves Problems Instead of Making Problems – Have you ever disarmed a tough situation with a smile? (Try it the next time you are stuck at the airport.) Positive attitude is sometimes all it takes to turn a bad situation around. On the other side, a bad attitude can take a problem and quickly make it worse.
- Helps You Make Good Decisions – Anger clouds your judgement. When you let yourself get upset, you impact your ability to make good decisions. Let your positive attitude clear your mind so that you can take appropriate action instead of reacting to emotion.
Positive Attitude Delivers Results
Don’t underestimate the power of a positive attitude to increase your productivity.
Attitude is often as important as hard work.
The next time you need to get more done, make sure you bring your positive attitude.
Question: How does a positive attitude help you get more done? You can leave a comment by clicking here. | <urn:uuid:1b14e5ca-9c58-4cde-af97-c39cde80ede5> | {
"date": "2014-12-23T04:22:55",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802778085.5/warc/CC-MAIN-20141217075258-00051-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.930953860282898,
"score": 2.546875,
"token_count": 608,
"url": "http://timemanagementninja.com/2013/11/7-ways-a-positive-attitude-can-make-you-more-productive/"
} |
At the Denver March Powwow of 2010, three female veteran soldiers representing their Crow, Northern Cheyenne and Navajo nations were preparing to join the grand entry proceedings in which color guards honor veterans to begin the festivities. Among them was Mitchelene BigMan, who had designed her jingle dress to represent her status as a Native woman veteran of the U.S. Army.
While jingle dresses generally have a bright mixture of colors and are adorned with jingle bells, those worn by BigMan and the other two female vets proudly displayed large emblems of their branch of service on their backs. When an elder, Camille Clairmont, noticed how their red, white and blue jingle dresses were decorated—with the women’s designation of unit and rank, as well as U.S. flags and Iraqi Freedom patches—she asked Mitchelene why they were not with the other color guards.
When BigMan explained that they were not official color guards, Clairmont told them “the dresses speak for themselves.” Meaning, they looked as if they belonged in the color-guard procession.
BigMan agreed, and the three women decided they would join the other color guards. The male color guards told them to go at the end of the line, behind all of the male veteran color guards. BigMan was at first discouraged but then realized their position in the rear of the line was not a dishonor, but rather, a special position, since they’d be the last color guards seen.
As the color guards entered the arena, the emcee announced, “History has been made today—in all my years as an emcee, there has never been an all-female Native American color guard, and so I have the privilege in announcing our first.” And through such accidents is history made.
After marching at the Denver powwow, BigMan decided to officially serve as an all-women Native color guard. She founded The Native American Women Warriors, a non-profit organization that seeks to address the needs of today’s modern military women. Her Women Warriors are also the first all Native American female color guard. They now regularly serve as a color guard at powwows, and travel all over the country for events honoring Native veterans.
The Native American Woman Warriors group is comprised of former U.S. Army Sergeant First Class BigMan as President, Vice President and former U.S. Army Command Sergeant Major Julia Kelly and Secretary and former Marine Corps Sergeant Sarah Kristine Baker. “I never expected this whole concept to go anywhere because it always seemed as though the Native women veterans were not really recognized,” says BigMan. “But from this point forward it really just seemed to hit like wildfire.”
In the two years since the inception of the group, they have traveled all over the U.S. They were in the 91st Annual NYC Veterans Day parade of 2010 and presented the colors as part of the “Band of Pride Tribute” in Times Square while in regalia in 2011. Most recently, the group appeared at the White House for the National Tribal Summit on December 5th.
That trip was their second visit to D.C. They had previously met with senators and congressman while at a Native American Women Warrior Summit, which will now be an annual summit.
The group is currently in D.C., on its third trip, this time participating in the inauguration events for President Barack Obama.
According to Baker, there is a lot of healing that needs to be done for female veterans. “We say the jingle dress is a medicine dress and the way that the patches are put on is medicine to people. We have seen people cry. There is not one person I don't think it hasn't touched when they see it.”
Though she is extremely proud of the color guard, Baker says that is not all that the group is about. The Native American Women Warriors’ mission statement states: “We are dedicated to surfacing the recognition of women veterans, especially those of Native American descent, and their contribution to the military that represented our indigenous people and the United States of America.
“Our goal is to assist our Native American women veterans in receiving the help desperately needed to empower themselves in order to take on modern challenges in: transitioning from the military to civilian sector, housing, education, employment, VA benefits awareness, domestic violence, locating child care and any other needs our Native American women veterans may have. We also aim to empower our women with a powerful mind, body and spirit.”
“We are now in the process of setting up chapters all across the country in different regions and different teams to travel to events and do motivational speaking,” says Baker. “Hopefully, a few years down the line we can have regional centers set up around the country so that Native American military women can come in and receive services from us directly, rather than having to go through the government.”
According to Vice-President Kelly, a former Army Command Sergeant Major, being a member of the group brings a feeling of honor, pride, patriotism, self-esteem and self-confidence in a society where Native Women veterans are not recognized to the extent of men. “History provides many stories of Native women who fought to protect their lands and home. There are stories of Native women who went out on War Parties and were recognized by the Chief of their accomplishments. I joined to bring awareness that Native women are warriors also.”
To support The Native American Women Warriors – a 501 (c)(3) non-profit organization—visit http://www.crowdrise.com/naww or http://www.facebook.com/NativeAmericanWomenWarriors | <urn:uuid:65080ea7-6ca5-4bf4-be78-e1432086525b> | {
"date": "2017-08-22T22:32:56",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.7/warc/CC-MAIN-20170822221214-20170823001214-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.977593719959259,
"score": 2.5625,
"token_count": 1186,
"url": "https://indiancountrymedianetwork.com/news/politics/native-american-women-warriors-celebrate-inauguration-while-raising-awareness-for-native-female-veterans/"
} |
A computer worm is a noxious self-replicating program. Compared to other infections, a worm does not have to enter a program to multiply and go from computer to computer.
Worms are regularly used to make a secondary passage for a programmer to access the victims PC, for use in a botnet, to send spam mail, or to anonymize their own program history.
Similarly as with all malware, a slow Internet connection without any reason is a certain indication of a worm assault. Receiving a lot of unwanted emails, more than just the regular spam we are all accustomed to is another sign of a possible infection. Strange browser behavior or warning signs from your anti-virus and firewall systems may also occur.
If we have all reasons to suspect a computer infection we don't need to panic. Many viruses and other types of malware are designed simply to cause chaos and it may be the same case.
Supposing that you have an anti-virus program installed
Most probably a pop up message appears on your desktop from time to time or you have a shortcut on there. Simply open it and run a quick scan. Most of the time it takes from 10 to 20 minutes to finish depending on your computer's specs and how many files you have stored on your hard-disk.
If nothing shows up after the scan is complete and your computer behaviour didn't improved you may want to make an indepth scan. But this usually takes from 2 to 3 hours or even more! So you will have to be ready to do this in the morning and move to other things. I advise against leaving the computer overnight.
If the scan was completed, nothing was found and you still have all the reasons to beleive that your computer is infected you may want to change your anti-virus. | <urn:uuid:63ec9f71-0017-4bec-b84e-e99dfb618fd5> | {
"date": "2017-10-24T11:14:26",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828411.81/warc/CC-MAIN-20171024105736-20171024125736-00856.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9627036452293396,
"score": 2.625,
"token_count": 368,
"url": "http://spybot-spyware.com/category/virus-behavior-and-news/"
} |
Python grew up around the same time as the Internet. For the first few years, both Python and the Internet ran mainly on various flavors of Unix. Therefore, it’s no surprise to find that Python has excellent support for most of the common Internet protocols in use today. Fortunately, this heritage has moved to the Windows platform.
This chapter shows how to use many of the common Internet protocols from Python on Windows. For information on the SMTP mail protocol, see Chapter 14. | <urn:uuid:b7923a30-17e3-4cbe-babd-e5972625005a> | {
"date": "2019-12-15T21:07:53",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541310866.82/warc/CC-MAIN-20191215201305-20191215225305-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.937440037727356,
"score": 2.75,
"token_count": 98,
"url": "https://www.oreilly.com/library/view/python-programming-on/1565926218/ch15.html"
} |
Hero is a Four-Letter Word
Part Three: Hero and Villian Mix It Up
We've seen how both Hero and Villain are actually composed of several different qualities. And, we've seen that for every quality the Hero possesses, the Villain has a counterpart. When these qualities are combined in this classic manner, Hero and Villain become stereotypes. When these traits are expressed to the extreme, they become melodramatic.
We have also indicated that the elements of Hero and Villain might be distributed among other characters to break out of the stereotypical mold. One of the most powerful examples of this is to simply swap traits between the Hero and Villain themselves.
In this article, we're going to have the Hero and Villain "Mix it up," to show how relatively minor alterations in the stereotypical arrangement can open up a huge new realm of creative opportunities.
Hero vs. Villain
To begin, let's list the qualities of the Hero and Villain for comparison:
Hero: Protagonist, Main Character, Central Character, Good Guy
Villian: Antagonist, Influence Character, Second-Most Central, Bad Guy.
To recap, by the definitions we have been using: Protagonist is the Prime Mover or Driver of the effort to achieve the story's goal. Antagonist is the chief force opposed to the Protagonist achieving the goal.
Main Character represents the audience position in the story and carries the moral attitude being explored in the story. In contrast, the Influence Character represents the opposing moral viewpoint.
The Central Character is the one most prominent in the story, either by pages, screen time, or the intensity with which it is drawn. The 2nd Most Central character is right behind it in prominence.
Finally, the Good Guy character seeks to help others even at its own expense, while the Bad Guy character seeks to help itself, even at the expense of others. As we can see, these two classic character types are well balanced against each other in their stereotypical arrangement.
Protagonist / Antagonist Swap
But what happens if we maintain that balance yet swap some qualities between the two? Lets begin by swapping the first qualities - Protagonist and Antagonist - to create an arrangement like this:
Hero: Antagonist, Main Character, Central Character, Good Guy
Villian: Protagonist, Influence Character, Second-Most Central, Bad Guy
In the case shown above, we have created a modified Hero character who represents the audience or reader in the story, is the most important character, and is a Good Guy, but is trying to stop or prevent something rather than make something happen.
We also now have a modified Villain character who tries to change the Main Character's point of view, is second most important, and is a Bad Guy, but is trying to achieve something, rather than prevent something.
In fact, this is the arrangement of character traits in almost all of the James Bond films! It is the "Villain" who has a dastardly plan and puts it into action, making him the de facto Protagonist. The Villain is the one with initiative in 007 movies, and it is Bond who is the reactionary, trying to stop the Villain before he can successfully complete his evil scheme.
This is the primary character reason that the Bond films feel so uniquely Bond. Our Hero is actually the Antagonist! Now, some might argue that once the Villain begins his efforts, then Bond is the one with the goal - to stop him. But it really boils down to what is called "Point of Attack." That phrase describes the moment at which the story begins.
If the story began after the Villain's scheme was already a known problem, then perhaps we could say that was the status quo, and Bond is taking the initiative to change it, thereby making him the Protagonist. But most Bond films set the status quo as a peaceful world scene into which the Villain interjects an element of threat. Only then does Bond spring into action, to stop what the Villain is trying to do.
So, Bond remains a Good Guy, is still the Central Character, continues to carry the story's moral position, but is an Antagonist, rather than a Protagonist.
In a story, the Protagonist represents our own initiative - the motivation to shake things up, change the order, alter the course.
In contrast, the Antagonist represents our reluctance to change - the motivation is cto maintain the status quo or to return things to the state in which they had been. The battle between them illustrates the inner conflict we all experience when trying to decide if it is better to try something new or to let sleeping dogs lie.
So, simply swapping the qualities of being Protagonist and Antagonist will have a tremendous effect on a Hero and Villain, even though all the other qualities remain the same. If you have only been creating the standard Hero and Villain, this one technique alone will open many new creative avenues.
Main / Influence Swap
Now how much would you pay? But wait! There's more.... Suppose we put the Protagonist and Antagonist qualities back in their usual places and try another kind of swap:
Hero: Protagonist, Influence Character, Central Character, Good Guy
Villian: Antagonist, Main Character, Second-Most Central, Bad Guy
Here we have set the Villain up as the Main Character, which basically means that the reader or audience experiences the story through the Villain's eyes, and, that the Villain is the one grappling with the moral dilemma and the Hero is the one trying to change his world view.
Now that's interesting, isn't it? A good example of this arrangement is A Christmas Carol, in which Scrooge is the Bad Guy, suffering the Moral Dilemma, we see things from his position, and he is the Antagonist, trying to put a stop to the meddling of the ghosts and get the status quo back to normal.
The Ghosts, collectively, form the Hero of the story, taking the initiative to change Scrooge's life-course, tying to change his attitude, and trying to do the right thing for someone else, even though they can't help themselves (classic Good-Guy mentality).
There's one other change in that story that doesn't match the line-up listed above, however. Scrooge is also the Central Character and the Ghosts are the Second Most Central. So, the proper arrangement of qualities in A Christmas Carol would look like this:
Hero: Protagonist, Influence Character, Second-Most Central, Good Guy
Villian: Antagonist, Main Character, Central Character, Bad Guy
This example has served to illustrate that you don't have to limit yourself to swapping just one quality, but in fact, can mix and match them in any combination you want! Imagine the possibilities!
Good Guy / Bad Guy Swap
Still, there's one more kind of alteration in the classic Hero and Villain we have not yet addressed at all: Good Guy and Bad Guy. Based on what we have done so far, you might assume we would simply want to swap those two traits and, to be sure, we could do that:
Hero: Protagonist, Influence Character, Central Character, Bad Guy
Villian: Antagonist, Main Character, Second-Most Central , Good Guy
Now you have a Hero that is, perhaps, more of the classic Anti-Hero, something like the Main Character in Taxi Driver. Here's a disturbed individual who is under such personal pressure that he snaps into a fantasy world and acts to the harm of others. But, he is definitely the Central Character, and he is the Main Character because we see the story through his eyes and he grapples with the moral dilemma, He is also the Protagonist, because he is the one who take the initiative.
Now, while we could do that simply Good Guy/Bad Guy swap, there's something a little different that really opens up the game...
What if we make both characters Good Guys? You know, just because two people disagree doesn't mean one of them has to be operating from ill intent. They might both have the best interests of others paramount in their minds, yet differ in their views of how to accomplish that.
So, if one wants to build a dam on the river that runs through the small town in which he grew up in order to end the poverty under which his people are suffering, another of the town's citizens might be dead-set against it because he believes it would ruin the small-town atmosphere, and even if the people have more money, it wouldn't be worth living there anymore.
Clearly both are Good Guys, yet in the effort to achieve the goal, they are diametrically opposed. The man trying to build the dam is the Protagonist. The man trying to stop it is the Antagonist.
Putting it All Together
Okay, let's take the example above and use the freedom of all that we have learned to fashion two completely non-stereotypical characters.
First, we already have the Protagonist trying to build the dam and the Antagonist trying to stop it. Next, you pick one as Central Character and make him the more important and memorable of the two. You make this choice by picking the one you find most interesting to be Central, because your own interest in the character will almost automatically cause you to give him more media real estate and to draw him with the greatest passion.
Choosing which one you want as your Main Character may be trickier, since it doesn't necessarily have to be the Central Character nor the Protagonist. Often, a charismatic Antagonist makes a good Main Character, but so does a dull bystander who simply provides a good perspective on the story for the reader or audience to adopt.
Finally, you determine if both are Good Guys, Bad Guys, or if one is Good and the other Bad. This choice will depend on whether you want your audience or reader to stand in the shoes of a Good perspective, as with Dr. Richard Kimble in The Fugitive, or in the shoes of the Bad perspective as with Scrooge in A Christmas Carol.
In the Good scenario, you make your reader or audience feel self-righteous, and teach by example. In the Bad scenario, you accuse your reader or audience and teach by encouraging them to deny it in their own lives and prove you wrong. Then, you use your plot to explore both characters' points of view, ultimately passing your judgment upon them as your story's message.
Well, you get the idea. All this might seem pretty obvious by now, but recall back to the beginning in Part One one of this trilogy of articles when we were only talking about the classic Hero and Villain. At the time, they might have seemed the best way to go for any story, but now... Well, Hero is a four-letter word, and by breaking him and his Villainous counterpart into their various components, you can now create far more interesting, unpredictable and believable characters than you could before.
Study Exercises for Part Three: Mixed up Heroes and Villains
1. List three pairs of Heroes and Villains, such as Chief Brody and The Shark from Jaws.
2. Break down each pair to show how the four basic qualities of each are either in the classic arrangement, or have been redistributed between the two.
3. For each pair, list examples from the story in which they appear that illustrate each quality as belonging to the character you have determined possesses it.
Writing Exercises for Part Three: Building Non-Stereotypical Heroes and Villains
1. Devise a goal for a hypothetical story. Create a Hero/Villain pair with Protagonist and Antagonist swapped. Write an example of what might happen in the hypothetical story that would illustrate their positions in regard to the goal.
2. Devise a moral dilemma (such as working weekends to support one's family vs. spending time with your children). Create a Hero/Villain pair with Main and Influence Character qualities swapped. Use a story example to illustrate how the reader/audience sees the story through the Main Character's eyes, or from his or her position. Illustrate how the Hero, as Influence Character, will pressure the Villain to change his or her point of view in regard to the moral dilemma.
3. Create a story scenario that fits each of the following:
- Hero is a Good Guy and Villain is a Bad Guy.
- Both Hero and Villain are Good Guys.
- Both Hero and Villain are Bad Guys.
- Hero is a Bad Guy and Villain is a Good Guy.
Meet the Author: Melanie Ann Phillips
Melanie Anne Phillips is the creator of writing software such as StoryWeaver, Idea Spinner and Master Storyteller. She is also the co-creator of the Dramatica theory of Narrative Structure. Over the last twenty-five years, tens of thousands of writers from around the world have studied and employed Melanie’s methods for story structure and storytelling including m... | <urn:uuid:7969959b-6a99-4e06-bf39-1d34686d0e8e> | {
"date": "2020-01-17T13:53:40",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589560.16/warc/CC-MAIN-20200117123339-20200117151339-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9580708146095276,
"score": 3.6875,
"token_count": 2698,
"url": "https://www.writersstore.com/hero-is-a-4-letter-word"
} |
Stone Care and Maintenance for Experts
Over 45% of the earth’s composition is made of rock and stone – and as the crust circles the world’s inner core, more and more compounds are pressed together to form all new stone structures. For millennia, mankind has been harvesting these sources of rock with the intention of building homes and other types of structures – many of which have stood the test of time and can still be seen today, thousands of years after their initial erection.
Although very durable and able to resist all but the most severe damage; stones aren’t entirely safe against wear and tear, the elements and general use. Over time, even the most well-preserved rocks can start to suffer with damage and decay, and as far as stone resources within homes and gardens go; this event can be detrimental.
Fortunately, there are several methods that can help to keep stones looking clean and clear for years – and there are even products on the market that can help to reinforce the natural strength of rocks. But what are they and how do they work exactly?
Limestone and other types of commonly used rocks can suffer with colour fading over time. When these events occur, polishing powders like those manufactured by Aguila can be very beneficial. When added to water, the resulting paste is more than enough to strip away dirt and debris, before revealing a smooth surface and replenished colour.
Another very effective way to clean stone surfaces is by scrubbing them with an Aguila cleaning brush – a brand well-known for the strength and durability of its products. Unlike traditional brushes that rely on softer hairs to clean and buff, these specifically-made alternatives feature stronger fibres that run alongside the grains of the stone; allowing the potential for a much cleaner surface.
One of the most effective ways to polish a stone is by rubbing another one against it. As effective as this technique can be, it does leave a little something to be desired; especially if the rocks have different shapes, making point to point contact difficult. Polishing blocks are rocks that have been ground down and shaped to cater to a variety of proportions – and the Akemi grinding block in particular features two sides in both a finer and slightly thicker grit consistency.
The key to keeping rocky surfaces clean and clear is to polish them often – and in a consistent manner for at least a few hours, depending on the size of the surface. If allowed to be exposed to the elements for any length of time, the internal structure of rocks can begin to weaken and this is one of the main reasons why people paint brickwork and other rocky structures. | <urn:uuid:c9a91abb-9471-4192-b0b7-067ec1b29ce7> | {
"date": "2017-05-28T14:45:17",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609837.56/warc/CC-MAIN-20170528141209-20170528161209-00068.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9619708061218262,
"score": 2.78125,
"token_count": 531,
"url": "http://www.kirklandrealestate.com.au/stone-suppliers/"
} |
Tools of Characterization
Thoughts and Opinions
Thoughts and opinions provide our main avenue into understanding Josef K. and the rest of the characters of Kafka's The Trial. Kafka's novel has often been noted for its perspectivism, for its careful development of a character's unique perspective. With the main character, the novel sits inside K.'s mind and articulates both his insights and his blind spots as he navigates the twisted world of the courts. The other characters reveal their thoughts and opinions through dialogues with K., and the novel also plays close attention to K.'s process of interpreting what these characters say to him. We can see how K.'s perception of a character develops in the case of Block the merchant, for example: K. at first considers Block a romantic rival, but his opinion quickly changes to one of grudging respect when Block shares his intimate knowledge of court affairs. But this respect quickly gives way to disdain when Block humiliates himself before Huld.
Many characters, even prominent ones, are left unnamed, and are only referred to by their occupation – the bank vice president, the flogger, the court usher's wife, the prison chaplain, and, vaguest of all, the two men who show up to execute K. in the last chapter. Even when characters are named, their personalities are clearly defined by what they do, and what they do always has some relation to the court. Thus Leni, who appears to be a mere nurse, has enough influence as the nurse to a lawyer that she functions as a kind of gatekeeper; just as the gatekeeper in the parable of the Law controls access to the Law, Leni controls access to Huld. K. is often surprised by the court connections, as when he meets with a manufacturer, a bank customer, only to find that the manufacturer too is aware of his trial and has some connection to the court. By using occupation as a major tool of characterization, the novel highlights how expansive the court's influence is, and also how dehumanizing, as individuals are reduced to their functions within the court system.
Speech and Dialogue
Speech and dialogue is critical to our perception of characters other than K. because their words are our only access into their personalities. Frau Grubach's complacency, Huld's pomposity, the guards' unquestioning acceptance of their duty, the court usher's wife and Leni's nymphomania, and Block's desperation all come through in their conversations with K. The characters' speeches provide equally revealing glimpses into the workings of the court, and much of what we learn about the court comes through extended monologues that read more like lectures, particularly with mentor figures such as Titorelli and the prison chaplain. | <urn:uuid:e1961504-00e0-4267-94ca-b0ee406576f3> | {
"date": "2016-02-11T00:43:35",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701160918.28/warc/CC-MAIN-20160205193920-00210-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9713397026062012,
"score": 2.78125,
"token_count": 571,
"url": "http://www.shmoop.com/the-trial-kafka/characterization.html"
} |
Field name: Your choice (default = "Source")
DC Element: Source
Dublin Core defines this element as "a reference to a resource from which the present resource is derived." For instance, Source could be the book or journal from which a scanned article was taken, or the name of the original collection or repository in which the scanned resource resides.
Examples of field names:
- Original Source
- Image Source
- Journal Citation
Examples of data:
- Museum of History and Industry (Seattle, Wash.)
- Industries and Occupations Collection
- Journal of American Reptiles, v. 53, no. 3 (Mar. 1989)
- Use a consistent style for citations to books or journals (MLA, APA, etc.)
- Use a consistent form for names (same name, same form). See controlled vocabularies.
Recommended controlled vocabulary:
For the names of organizations:
- Library of Congress/National Authority File (LCAF): List maintained by LC and other libraries. This is the largest file of names (over 4 million) and covers names from many different subject areas and disciplines. It is also the authority file used by the UW Libraries Catalog and all UW Libraries digital projects. You can find authorized forms of names in the Library of Congress Authorities by doing a Name Authority Heading search.
- Union List of Artist Names (ULAN): Vocabulary maintained by the Getty Research Institute. The ULAN "contains around 220,000 names and other information about artists. The coverage of the ULAN is from Antiquity to the present, and the scope is global. The scope of the ULAN includes any identified individual or "corporate body" (i.e., a group of people working together) involved in the design or creation of art and architecture."
For citations to books or journals: | <urn:uuid:d6fd5d69-0076-413c-9995-9848f3fea277> | {
"date": "2013-05-22T21:45:26",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8822044134140015,
"score": 2.609375,
"token_count": 377,
"url": "http://www.lib.washington.edu/msd/pubcat/mig/advice/field/source"
} |
"An extensive literature deals with the exact causes of heart sounds. Possible explanations include actual closure of valve leaflets, tensing of related structures, leaflet positions and pressure gradients at the time of atrial and ventricular systole, and the effects of columns of blood."
|Netter's Atlas of Human Anatomy|
Then Bates goes on to offer a simplified explanation, which is perfectly fine for the purposes of this textbook. It would have been so easy to pass right over this little bit, and under other different circumstances I might have done so. Fortunately, I picked up on it and gave myself a moment to be struck by wonder. I never knew there was still such mystery surrounding the heart. We can make mechanical replacement heart valves and recognize their clicking in chests. I am quite sure we know exactly what causes that clicking and the precise moment at which it occurs. But we cannot completely account for the natural heart sounds? The very same heart sounds that we can hear when we lay our head on the chest of our lover? The very same heart sounds that have been heard for millennia?
|Leonardo da Vinci: The Anatomy of Man|
We could certainly take this in all kinds of mystical and romantic directions. The human heart is more than it appears to be... man is an unfathomable creation... maybe the answers to our questions about love lie in those heart sounds.... But without going that far, we can simply appreciate the wonder. It may not hold as many questions for the world as it did before da Vinci drew it, or before Netter drew it - or for me before I held one in my very own hands - but there still is some mystery in the human heart. And a little mystery is a beautiful thing.
|Auguste Rodin. The Kiss|
"The most beautiful thing we can experience is the mysterious. It is the source of all true art and science." - Albert Einstein | <urn:uuid:30ef4a70-3758-4f74-aca8-59e45aa990bc> | {
"date": "2017-05-30T07:16:49",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463614615.14/warc/CC-MAIN-20170530070611-20170530090611-00316.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9492663145065308,
"score": 3.046875,
"token_count": 394,
"url": "http://mindfulofbeauty.blogspot.com/2010/12/heart-of-matter.html"
} |
An attempt to explain the underlying concept for beginners to understand.
Unlike a traditional banking system or other online currencies such as eg. Paypal there is no central server, which plays a special role. At the technical level, all participants in the Bitcoin code network are organized in a peer-to-peer architecture and full equality.
Also known services such as blockchain.info or blockexplorer.com (there you can see transactions) play network for the actual Bitcoin code and its functioning is not important. These are nothing but services that have settled around to Bitcoin code. This is often confused. But even if all these would disappear related to Bitcoin code services and websites tomorrow from the Internet (or to be censored would), Bitcoin code would work as before.
In all previous banking and accounting systems, there is a central authority, a database that is stored in that account which has just balance. Now, when users will transfer A money from his bank account to the account of the user B, is reduced in this central dfatabase, the amount the account balance of A and B increased in.
But what is decentralized? If each user would store his account itself, which prevents him to manipulate their own bank balance? This leads us to the next point:
Transactions take account balances
There is no account balances.
Of course, I can use the wallet of my choice or websites like blockchain.info open and see there once the current “balance” my Bitcoin code address. But not this number, but instead only all transactions between all Bitcoin code addresses that have ever taken place is actually stored in the Bitcoin code network (the so-called “block chain”). Namely public. Since the beginning of Bitcoin code (on 03.01.2009).
Thus, everyone can understand the world, when the amount of money moved by what address to what address. Now if you go through all the transactions from the beginning to this day, you know at the end must be exactly the amount that landed at what address. That’s it. It is determined which address at this moment is what balance. This is what makes each Bitcoin code client. And after all make the world, an individual can not cheat and simply omit some transaction on his own account, or to cheat. Everyone else would see that he cheats. Therefore, the security.
TODO : Possibly Install here is a graph with various account balances of different addresses for multiple transactions.
By comparison, from a purely technical, it would be no problem at a traditional bank to exchange a number to the central booking server and easy to halve the balance in your account. However, trust us that the banks do not. Here is the difference in Bitcoin code you do not trust. You have the security through control.
How to get a Bitcoin code “account number”?
Ok, how do you come because of a Bitcoin code “account”. If there is no central bank or website where I can open me an account, how does that work then?
The answer is quite simple and sounds so simple that it’s the listen for some the first time, sounds too simple in the beginning just to believe:
You just comes up with one.
Ok, so simple is not, but basically it boils down to. To explain but you have to examine this, what because Bitcoin code addresses are actually exactly:
Bitcoin code addresses:
Behind Bitcoin code addresses so as you know, is in reality a pair consisting of two keys:
- a secret key (the private key ) to only the owner (or its Wallet software) knows. This is required if you want wegüberweisen out Bitcoin codes from an address starting elsewhere. Which one should never tell someone else (such as the watchword of the old passbook).
- and mathematically to belong to this private key, a public key (the so-called. public key ). So the rest of the world can understand mathematically certain that the author of a transaction in possession of the corresponding private key and thus is entitled.
Two of these keys (secret and public key) belong together always inseparable. So a couple has this ingenious feature is that it can be proved mathematically using the public key that you have the corresponding private key, without having to ever original and the secret key (as opposed to: the watchword of the passbook earlier, you had the / the bank employees say then knew it – that’s just not in Bitcoin code above).
And what is the Bitcoin code address? A Bitcoin code address (for example: 19bLDxjsV63oF14P38LhDZmfKUApNeqFi6 ) is now a specific derivation from the public key. So in principle: one takes the public key forth, converts the a little bit, it is characterized slightly shorter, and Read real reviews from users as a result we obtain the Bitcoin code address (simplified terms).
To summarize, there are also:
- a private key ( which only I know myself )
- to belong: a public key ( with this I can prove to the world that I possess the secret key )
- and, in turn belonging to: a public Bitcoin code address ( a shortened / simplified representation of the public key )
If one knows the private key, can it (mathematically) calculate the public key and from the public key, in turn, can calculate the Bitcoin code address.
Private Key Public Key >>> >>> Bitcoin code address
However, only in this direction . The other way you can not. You can not calculate the public key of a Bitcoin code address. And a public key can not the private key can be calculated. This is essential for the security of the entire system.
What is a Private Key?
What exactly, then, this private key from which, ultimately, results in the Bitcoin code address?
It’s simple: a random number from 1 to 115792089237316195423570985008687907853269984665640564039457584007908834671663
(this is the result of 2 256 – 2 32 – 977 and is a prime number)
Just in case you wonder: usually the private key is in Bitcoin code shown in another, slightly shorter notation, this then usually begins with the number “5” or the letter “K” or “L”. For example: 5KJvsngHeMpm884wtkJNzQGaCErckhHJBGFsvd3VyK5qMZXj3hS)
The human imagination is doing something difficult english page of the german site with very large numbers. But these numbers are so large that even if since the beginning of the universe one would try try out all the numbers, every second about 269000000000000000000000000000000000000000000000000000000000 numbers (this number is 60 digits long) would have to try to collect all the be today once by , (Again, as many numbers you would have to try out EVERY second since the big bang It is therefore really! Very very very very unlikely – in practical terms, virtually impossible – that two people, if they really randomly select a number from this area, the same secret key choose.)
What does that mean in everyday life?
Do not worry, it all sounds terribly complicated, but as a user of Bitcoin code has just not much to do, even with these details. Once done, the wallet software for one. In the Wallet your Bitcoin code addresses and the corresponding private keys are stored.
So if you already own Bitcoin code and wants to transfer to someone else, you need the recipient only Bitcoin code address (for example: 19bLDxjsV63oF14P38LhDZmfKUApNeqFi6 ). So you do not have to enter this long sausage of numbers and letters manually, mostly QR codes in use today, you can simply scanning with the camera of a smartphone. For example:
Currently being implemented and has other assistive technologies (keyword: Payment Protocol ) which will facilitate a handling this complicated addresses even further.
In addition Bitcoin code addresses include a checksum. This can immediately recognize the wallet software, if you have mistyped one or more characters.
Finally, you click in your own wallet only to ” Send ” and the receiver ( strictly speaking, the entire world ) is within a few seconds that this transaction in the Bitcoin code network is underway. (Order as pizza) for smaller amounts everyday shopping ranges that usually already made to trust that payment has been made.
That’s it! :-)
Ok, granted, of course, that’s not quite everything.
In order for a transaction is also anchored truly irreversible worldwide in the block chain (in particular to ensure that no two conflicting transactions sends to the network, the 2x the same money sent to different destinations – so Bitcoin codes spends twice -. So-called “double spending” ) are it in the block chain other mechanisms that ensure this security, without having to rely on central control instances.
The basic question like new scooped Bitcoin code be circulated is regulated there. Learn more in the following article: Mining & Co: How does the block chain? | <urn:uuid:20c08265-e385-4651-84eb-ff3dc1cd433e> | {
"date": "2018-01-23T12:15:54",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891926.62/warc/CC-MAIN-20180123111826-20180123131826-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9375114440917969,
"score": 2.984375,
"token_count": 1931,
"url": "http://www.runwildidaho.com/how-does-bitcoin-code-work/"
} |
Herbs and Medicinals in the Backcountry
- Grade Level:
- Fifth Grade-Eighth Grade
- Language Arts, Science and Technology, Social Studies
- 3 class periods
- Group Size:
- Up to 24
- in the park
- National/State Standards:
- SC: ELA: 5th: IV-A, B, C, D, G, I; V; 6th: IV-B, E, I: V; 7th: I-I, L, N; II-C; IV-B, G, I; 8th: I-L, N; II-B; IV-A, B, F, J Sci: 3rd: I, A, B; II - A, C; 4th: I- A, B: II-B; 5th: I-A, B; II-A, B; 6th: I, A, B; II - 7th: I-A; II-D; Grade 8, I-A; II-A
OverviewGOAL: To introduce students to backcountry lifestyles related to the battle of Cowpens.
The student will relate common plants to the development of the medicines that might have been used during the time of the Battle of Cowpens.
The student will use cognitive skills in answering questions posed by the facilitator.
The student will use science skills and knowledge by identifying plants and the parts of the plants that were used to make medicines.
The student will use sensory skills to see, feel, taste and smell plants and medicines.
The student will describe how the lifestyles of the early settlers and soldiers were related to the ecosystem of the area.
In the backcountry, the early settlers had few neighbors and practically no doctors. When an injury occurred they dealt with that in the best manner they could. Sickness was a constant threat, and herbal medicines were administered because herbal remedies were the only medical knowledge available. Since the earliest of times, knowledge of herbs, both cultivated and wild, had been passed down from generation to generation by oral traditions. Settlers had to rely on these oral traditions or trial and error. Most families in the eighteenth century had a kitchen garden, which contained vegetables as well as herbs.
Doctors were few and far between, and the only requirement to become a physician was to call oneself a doctor. In addition, in most families there was usually one woman who possessed the knowledge necessary to treat the family.
Many women died in childbirth, and many children died in infancy. Simple illnesses could worsen into fatal diseases even with the use of extensive herbal remedies. It was a difficult way of life by present-day standards.
The isolation of towns and neighbors was one preventative to the spread of infectious diseases, but when soldiers from different geographical areas came together in camp, disease went on the rampage. The younger soldiers were more susceptible to the illnesses, while the older soldiers seemed to have a better immunity to the illnesses. As an example of the killing power of diseases within the soldiers’ camp, musketry or bayonet killed 1,000 Americans, 1,200 received battlefield wounds, 6,000 more were interned in prison camps, while a staggering 10,000 lost their lives to illness.
Physicians sometimes knew little of diseases, and even less of bacteria and viruses. There were no diagnostic tools such as stethoscopes and thermometers. Little was known of the inner workings of the body, so doctors made diagnoses by simply observing the patient. Patient treatment for diseases included better food, cleaner water, laxatives, emetics (for vomiting), enemas, blistering (a caustic solution was applied to the skin to raise blisters; it was thought that it drew the inflammation out of the body), and bloodletting (again, drawing the sickness out.)
Herbal remedies for minor illnesses and injuries included teas, poultices and ointments made from the leaves, bark, roots, seeds, flowers, and fruit of various plants that were available in the nearby woods or that could be grown in the settler’s herb gardens. Willow for pain or fever, sage for coughs and colds, comfrey for bruises and broken bones, peppermint or chamomile for upset stomachs, ragweed for bee stings, onion and mustard poultices for coughs and colds are among some of the herbal remedies that the settlers used.
1. Using slides, book pictures or plant cuttings, have the students identify plants and ask the following questions: What is this plant called? (Perhaps include the scientific name, if appropriate)
Is this a helpful or harmful plant? (Stress the importance of knowing how harmful some plants can be - i.e., poison ivy, mushrooms, etc.)
In what sort of conditions would this plant grow?
What part of the plant could be used as medicine (the leaves, bark, root, flower, seeds, etc.?)
2. Discuss the uses of herbal medicines in colonial times and today.
1. Bring resource books on plant identification. Have students search Cowpens National Battlefield for plants that could be made into medicine. Students should list the plants they found and their possible uses. They may not pick the plants.
2.Provide small limbs to re-enact supporting a broken bone with a pair of sticks. Carry the play-acting further by discussing what might happen if the application of medicines to the wound did not work and the condition worsened.
1. Have students compose a journal of a soldier who has been wounded and describe his experience with medicine and healing. Alternately, the journal entry could be of a mother caring for and healing a sick child.
2. Have students compile a booklet or brochure of helpful and harmful plants in their own local area.
3. Discuss the scientific properties of plants. | <urn:uuid:456eba8d-14e0-461f-8774-6136ef86be14> | {
"date": "2014-12-20T22:15:09",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770403.126/warc/CC-MAIN-20141217075250-00075-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9619941711425781,
"score": 3.046875,
"token_count": 1216,
"url": "http://www.nps.gov/cowp/forteachers/classrooms/herbs-and-medicinals-in-the-backcountry.htm"
} |
6 Tricks to Help Your Toddler or Preschooler Go to Bed (and Stay There!)
6 of 7
Know Your Child's Sleep Requirements
Finally, take note of how much sleep your child actually needs. The American Academy of Pediatrics (AAP) offers a recommended range depending on your child's age. According to the AAP, children ages 1-3 years need 10-13 hours of sleep each night. The National Sleep Foundation (NSF) recommends that children in that age range get 12-14 hours of sleep in a 24 hour period, including naps. The NSF also recommends between 11-13 hours of sleep for children between the ages of 3-5, including naps. Keep in mind that most children ages 5 and up do not require a nap during the day.
The NSF suggests looking for cues during the day that your child is well-rested. For example, is she alert and able to concentrate? Does she wake up naturally in the morning, or do you have to drag her out of bed? Using these indications as a guideline will help determine if your child is getting enough sleep and whether or not you need to adjust her bedtime and/or nap schedule.
Next: More popular galleries | <urn:uuid:7b21a5e4-0807-4a02-9cfe-524e4a62f3d8> | {
"date": "2014-10-25T07:03:58",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119647865.10/warc/CC-MAIN-20141024030047-00103-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9456169605255127,
"score": 2.78125,
"token_count": 253,
"url": "http://life.familyeducation.com/sleep-schedules/bed-time/73145.html?page=6"
} |
A doctor diagnoses PAD by comparing blood pressure in your ankle and arm. This ratio is called the ankle-brachial index (ABI) score; lower pressure in the ankle than in the arm indicates blocked leg arteries.
Additional testing can measure the extent and location of plaque deposits. You may be asked to walk on a treadmill to reveal what level of exertion spurs symptoms. Doppler ultrasound can help pinpoint blockages and their severity.
If you have more advanced disease, angiography lets doctors actually visualize the blocked vessels. Your doctor can look at x-ray images that trace contrast dye flowing through your arteries for blockages.
Bruce Perler, MD, MBA The Julius H. Jacobson II Professor of Surgery; Chief, Division of Vascular Surgery & Endovascular Therapy; Director, Vascular Noninvasive Laboratory
The American Heart Association's statement sounds a well-needed alarm to postmenopausal women and their doctors: Your risk of peripheral artery disease may be higher than you think. The good news is that your doctor can diagnose PAD through simple blood-pressure testing, and if the condition is caught early, lifestyle changes alone may stop it from progressing.
Get more information from the Society for Vascular Surgery website, VascularWeb.
Source: Prepared by the Editors of The Johns Hopkins Medical Letter: Health After 50 | <urn:uuid:bba03fc0-de93-44e1-809b-8462a5f2caf3> | {
"date": "2017-11-22T16:16:58",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806615.74/warc/CC-MAIN-20171122160645-20171122180645-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9155275821685791,
"score": 2.734375,
"token_count": 277,
"url": "http://www.healthcommunities.com/peripheral-artery-disease/diagnosing-pad.shtml"
} |
Churchill and the Navy
Featured Article – Finest Hour 110
FIVE BELLS: PREDECESSORS
The Churchills: A Naval History
The Winston S. Churchill Has Interesting Forebears
by Neil Coates
The first vessel unequivocally named (with his permission) for Churchill was the cutter Winston Churchill, built by Percy Coverdale at Battery Point, Hobart, and launched in 1942. During World War II the sailboat served as a lighthouse tender off southern Tasmania. She competed in the first Sydney to Hobart Yacht Race in 1945 and in many subsequent races carrying sloop, cutter or yawl rigs, until she foundered with the loss of three lives off the east coast of Australia in 1998. (See Finest Hour 99, p. 47; 100, p. 6; 101, p. 7.)
The first ship named with Winston Churchill “firmly in mind” was HMS Chequers, a “C” Class destroyer. This nomination was made in 1944 by the First Lord of the Admiralty, A. V. Alexander, Chequers being the official residence of the Prime Minister.
Why not HMS Churchill? Alexander had to circumvent a contemporary custom which was to allow a decent interval to elapse between the death of any naval worthy and the naming of a ship after him. This precluded the Prime Minister’s name, as well as “Chartwell,” which would have been too closely identified with him.
The first warship named for WSC was thus the Valiant Class nuclear submarine HMS Churchill, S-104. The vessel was ordered from Vickers Ltd. Shipbuilding Group, Barrow on 21 October 1965, laid down 30 June 1967, launched 20 December 1968, and commissioned 15 July 1970. She was decommissioned in 1991.
The Churchill best known to the British public is the Sail Training Association schooner Sir Winston Churchill, launched 1966 and still in service, instilling an appreciation for traditional sailing among young people.
But the first vessel to carry the Churchill name preceded all of these. She was a destroyer, acquired from the United States in the destroyers-for-bases arrangement in 1940‹and, at least theoretically, she was named not for WSC but for a village in Gloucestershire!
In 1940, one of Churchill’s priorities was obtaining surplus destroyers from Roosevelt to protect British convoys. The loan of 50 U.S. destroyers in exchange for leases on bases in Western Hemisphere British colonies was approved in September 1940. They were obsolete World War I flush deck, four-stack destroyers, once considered a radical departure from their high-forecastle, broken-deck predecessors. In his Flush Decks and Four Pipes, John D. Alden writes that their design gave “added strength amidships while still keeping the customary draft and freeboard forward and aft.” Two hundred seventy-three were built, many going straight to mothballs upon completion. By 1939 Jane’s Fighting Ships listed 153 survivors.
These ships were mostly named for U.S. naval officers, some of whom had been rather too successful in the War of 1812 for their names to be retained by the Royal Navy! According to T.D. Manning’s The British Destroyers, Captain H. Taprell Dorling DSO, a World War I destroyer man (and prolific author under the pseudonym “Taffrail”) “hit upon the idea of renaming them with town names common to both Great Britain (and the Commonwealth) and the USA.” The ships became known as “Town” Class.
Despite the custom of not naming a ship after a living person, lead ships of destroyer flotillas were usually given a distinguished officer’s name. It must have been with no little satisfaction that the Ship Names Committee settled on villages, mostly in England and, that the leader of the first flotilla, commissioned 9 September 1940, was HMS Churchill ‹ostensibly christened for a village south-west of Chipping Norton, Gloucestershire, not far from Blenheim Palace.
HMS Churchill had started life as USS Herndon, DD-198, launched in Newport News, Virginia in 1919, and commissioned in September 1920. She was named for Cdr. William Lewis Herndon (1813-1857) who had commanded USS Iris in the Mexican War, had led an Amazon River exploration trip in 1851-53, and had gone down with his ship in a storm after saving the women and children and many others.
Herndon was placed in reserve in November 1920 and decommissioned in June 1922, but she served in the Coast Guard on the Rum Patrol during 1930-34. One of 63 destroyers activated in September 1939 for the Neutrality Patrol, she was recommissioned and operated in the Caribbean until transfer to the Royal Navy.
These new additions to the British Fleet were celebrated in a Daily Express cartoon on 20 September 1940: a caricature of Churchill and a destroyer with the caption, “Give a ship a good name. The first of the American Destroyer flotilla is named HMS Churchill.”* This clearly endorsed the serendipitous use of “Churchill” by the Ship Names Committee, suggesting that the public knew very well for whom she was named!
Though he had taken an active role in naming battleships before World War I and appointed a committee to investigate destroyer names in 1913, Churchill himself did not, or pretended not to, know the origin of the name. He wrote to Commander G. R. Cousins DSC, the ship’s new commanding officer, on 25 September 1940: “Am delighted that your ship should be named after the great Duke of Marlborough, and I am sending you one of his handwritten letters for your Ward Room for luck.” This misconception continues to the present.**
HMS Churchill served in transatlantic convoys and on patrol duties, including the famous hunt for the German battleship Bismarck. In The Grand Alliance, Churchill records addressing “representatives of the crews of the British and American ships in the anchorage, including the destroyers Hecla and Churchill,” in Iceland following his Argentia Conference with Roosevelt in August 1941.
One night in June 1942, while on convoy duty off Venezuela, HMS Churchill sighted what appeared to be a U-boat on the surface. The destroyer fired starshells and lobbed depth charges. These seemed to make no impression on the U-boat, so Churchill prepared to ram. After a violent last-minute alteration of course, Churchill missed her target by six yards. In the nick of time the “U-boat” had been recognised as the uncharted island of La Sola – a rock 200 feet long and 10 feet high!
HMS Churchill later served as an escort for the pre- and post-invasion buildup for the Allied invasion of North Africa. She changed nationality again in 1944, when on 30 May she was handed over to the Soviet Northern Fleet as part of a compromise with Stalin for Russia’s share of the defeated Italian fleet. Commissioned July 1944 as Dyeyatieny or Deiatelnyi (“Active”), she performed local defence duties before being sunk on 16 January 1945 by a homing torpedo launched by a U-boat, 60 miles east of the Kola Inlet, Northern Russia.
Notes and Recommended Reading
* Sir Martin Gilbert, The Churchill War Papers, vol. II, “Never Surrender” May 1940-December 1940, p. 841.
**Ibid., p. 870 and p. 870, note 2.
See also T. D. Manning, The British Destroyers, 1961; John D. Alden, Flush Decks and Four Pipes, 1965; T. D. Manning and C. F. Walker, British Warship Names, 1959; Who Was Who in America, 1607-1896, 1963; Dictionary of American Naval Fighting Ships, vol. III, 1968; and Philip Goodhart, Fifty Ships That Saved the World: The Foundation of the Anglo-American Alliance, 1965.Mr. Coates ([email protected]) is a member of ICS Australia living in Rose Bay, Tasmania
Mr Coates ([email protected]) is a member of ICS Australia living in Rose Bay, Tasmania | <urn:uuid:43c13ae0-2e24-407c-ad39-dd592d855cd1> | {
"date": "2017-07-25T10:49:01",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425144.89/warc/CC-MAIN-20170725102459-20170725122459-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9666997194290161,
"score": 2.640625,
"token_count": 1760,
"url": "http://www.winstonchurchill.org/the-life-of-churchill/in-memoriam/hms-churchill"
} |
Primary Documents - The Fall of Serbia by General von Cramon, November 1915
Reproduced below an account of the fall of Serbia in November 1915 by a German General - von Cramon - attached to the Austro-Hungarian Army Chief of Staff, Conrad von Hotzendorf.
Although the Serbs had successfully repulsed a concerted Austro-Hungarian offensive the previous year - much to the surprise of the major European powers - the entry of Bulgaria into the war in October 1915 effectively doomed Serbia.
Bulgaria entered the war for the openly stated purpose of annexing territory from Serbia; her participation in the planned Austro-German offensive against Serbia ensured the latter's defeat.
The Fall of Serbia, November 1915 by General von Cramon
Toward the end of September the Imperial Austrian Army, composed of Austrian and German troops, stood to the northwest and north of Belgrade, the German Eleventh Army in the region of Versetsch.
Tersztyansky had originally been chosen as the commander of the Austrians. Shortly, however, before the operations began he had a quarrel in his headquarters with one of the officials of Tisza and this assumed such proportions that the all-powerful Hungarian president of the ministry brought the question before the Emperor, Franz Josef.
The latter, as could not otherwise be expected, in view of the powerful position occupied by Tisza, dropped the general. In Teschen, at least among the younger men, the departure of Tersztyansky was not particularly regretted. Instead of him, General von Kovess now had the honour of winning Belgrade.
The Bulgarians drew up on the western frontier of their country. Czar Ferdinand had stipulated that he was not to move forward until several days after our own advance. He wanted absolute security. Nevertheless, the turn in the policy of Bulgaria could not remain unknown to the Entente. Russia sent an ultimatum on October 3rd to which Bulgaria replied "in unsatisfactory form" three days later; whereupon the quadruple alliance severed its relations with the government at Sofia.
On October 6th the German and Austrian troops of Mackensen crossed the Danube. While the Austrian battalions fastened themselves upon the northern edge of Belgrade, the 22nd Reserve Corps of the Germans forced its way through west of the city and compelled the enemy to evacuate the place.
The Serbians offered an obstinate resistance, but could not arrest our advance. A week of great successes passed and now the moment had come also for a decision on the part of the Bulgarians. One day the report arrived at Sofia that the Serbians had passed across the western border of Bulgaria at several points.
On the following day the Bulgarian armies invaded old Serbia and Macedonia. Toward the end of October another Imperial division joined in the encircling movement by penetrating into the Sandjak. By the end of November, Serbia and Macedonia were in the hands of the armies of the Central Powers. Only the shattered remnants of the enemy forces were able to effect their escape across the snow-covered mountains.
To the Entente the turn of affairs on the Balkan Peninsula was a great blow. When Bulgaria glided from its grasp, it endeavoured to equalize this by an increased pressure on Greece, where, in the astute Venizelos it possessed a sure ally. But King Constantine was for the time the stronger. Venizelos had to yield. The German Emperor gave a personal guarantee that no Bulgarian would cross the Macedonian-Greek border.
The fears of the Greeks because of the Bulgarians were thus to some extent allayed.
The Entente did not content itself with the just mentioned unsuccessful attempt in Athens. In the middle of October French and English troops were landed at Salonika. Greece could only make a protest against this breach of neutrality, which mild procedure greatly displeased General Conrad von Hotzendorf, chief of the General Staff of the Austrian army.
General Falkenhayn tranquilized him with the assurance that he, for his part, considered the attitude of Greece as "perfectly wonderful and particularly propitious." He assured the Austrian chief of staff that Germany would do all in its power to support the friendly disposed King of Greece. These efforts on the part of Germany, as we know, met with success.
During the preparations for the campaign in Serbia no great enthusiasm for it was manifested at Austrian headquarters. The primal moving factor had really been Falkenhayn. General von Hotzendorf was not in accord with all points of the plan of operations. He was of the opinion that more powerful forces would have to be put in action from the direction of the Upper Drina, in order to make the success in Serbia complete.
Mackensen, however, drew to the barrier on the Save a division already congregated on the Bosnian front. The catastrophe in Northern Serbia would surely have been greater had a timely attack been made on the enemy's rear at Uzice.
A similar difference of opinion arose during the course of the further operations when the Serbians in Macedonia were hard pressed from north and east, and it was a question of throwing them back into the Albanian mountains.
General von Hotzendorf earnestly tried to persuade General Falkenhayn to use all available forces to strengthen the Bulgarian troops which were exerting pressure from the east. He was, as ever, a master in recognizing the direction in which strategy could most effectively be exercised.
Falkenhayn, however, could rightly object on the ground that it would be impossible to add several divisions to the Bulgarian army under Bojadjeff because of the difficulties attending the transportation of supplies.
It is not necessary to enter into details. In a little over six weeks' time old Serbia and Macedonia were conquered. The remnants of the Serbian army wandered about in the desert mountains of Albania or after losing all accoutrements and supplies found touch with the Orient army of the Entente.
Source: Source Records of the Great War, Vol. III, ed. Charles F. Horne, National Alumni 1923
French tanks were used for the first time in battle on 17 April 1917, when the 'Char Schneider' (as they were known) was used during the Second Battle of the Aisne.
- Did you know? | <urn:uuid:2c74ffa9-58b0-4eab-8c71-95c4348e3636> | {
"date": "2015-07-02T16:35:16",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095632.21/warc/CC-MAIN-20150627031815-00136-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9733936190605164,
"score": 3.140625,
"token_count": 1301,
"url": "http://firstworldwar.com/source/serbia1915_voncramon.htm"
} |
O: Symbol for oxygen, an essential element.
O'Keeffe: Optimara variety belonging to the Artist's Palette series. Named for the American painter, Georgia O'Keeffe. Standard African Violet (4-inch pot size) with single, bi-color flowers. Flowers are white with a purple edge. Leaves are medium green. Introduced 1995. (AVSA Reg. No. 8332) More information.
Oak Leaf: Leaf type. Describes an African Violet leaf which has slight indentations around the edge. A leaf with more pronounced indentations is either ruffled or serrated.
Odessa: Optimara variety. Medium, standard African Violet (4-inch pot size) with single, pink flowers. More information.
Offset: See Sucker.
Ohio: Optimara variety. Medium, standard African Violet (4-inch pot size) with semi-double, red flowers and dark green leaves (red reverse). Introduced 1987. (AVSA Reg. No. 6587) More information.
Oidium: The fungus which causes Powdery Mildew.
Oklahoma: Optimara variety. Medium, standard African Violet (4-inch pot size) with frilled, dark pink flowers and dark green leaves. Introduced 1988. (AVSA Reg. No. 6967) More information.
Omaha: Optimara miniature variety. See Little Omaha Girl.
Omita: Optimara variety. Medium, standard African Violet (4-inch pot size) with single, burgundy flowers and medium green leaves. Introduced 1999. More information.
Ontario: Optimara variety. Medium, standard African Violet (4-inch pot size) with single, white flowers and medium green leaves. Introduced 1987. Improved 1996. (AVSA Reg. No. 6588) More information.
Opal: Optimara super miniature variety. See Little Opal.
Open Pollination: Also called natural pollination. Refers to pollination that occurs naturally, i.e., without human interference. Contrast with Cross-Pollination.
Ophelia: Rhapsodie variety. Standard African Violet (4-inch pot size). Introduced 1972. More information.
Optimara: Popular trademark for African Violets. Introduced in 1977 by Holtkamp Greenhouses. The name, Optimara, is derived from two words: optimum, meaning the best, and Usambara, the mountains in East Africa, now Tanzania, where the first recorded African Violet was discovered. The Optimara trademark includes several hundred varieties and a number of series, including the super miniature Little Jewel series, the miniature Little Indian series, the compact Little Dancer series, the Artist's Palette series, the Victorian Charm series and the extra large World Traveler series. In addition, Optimara has a line of plant care products developed especially for African Violets. The Optimara plant care line includes fertilizers, potting soil and self-watering devices, such as the Watermaid, MaxiWell, MiniWell and WaterShip. Also see Rhapsodie.
Orbicularis: See Saintpaulia orbicularis.
Oregon: Optimara variety. Medium, standard African Violet (4-inch pot size) with frilled, two-tone pink flowers and medium green leaves. Introduced 1987. (AVSA Reg. No. 6589) More information.
Organic: In chemical terms, describes any compound containing carbon. More generally, the term, organic, is used to describe any substance which not produced synthetically.
Organic Fertilizer: See Natural Organic Fertilizer.
Organic Insecticide: See Organic Pesticide.
Organic Pesticide: Pesticide in which the active ingredient is not synthesized, but is a naturally-occurring compound derived from plant or animal sources. Contrast with Elemental Pesticides and Synthetic Pesticides. See Neem and Pyrethrin. Also see Botanical Pesticide.
Orlando: Optimara variety. Small, standard African Violet (4-inch pot size) with frilled, dark blue flowers and medium green, girl-type leaves. Introduced 1987. (AVSA Reg. No. 6590) More information.
Ornamental: Describes any plant cultivated for decorative purposes. Plants classified as ornamental are generally contrasted with those grown as food sources, though there are other, non-ornamental uses for plants. Ornamentals include flowers such as African Violets.
Orthene: Popular trademark for an insecticide containing Acephate.
Orthocide: Popular trademark for a fungicide containing Captan.
Osmocote: Popular trademark for a slow-release fertilizer. This and other slow-release fertilizers are not recommended for African Violets. While these types of fertilizers are designed to reduce the frequency of application, they make it easy to overfertilize, especially for those who do not have a lot of experience with them. In addition, because the release of nutrients is influenced by various environmental factors, the results can sometimes be unpredictable.
Omaha: Optimara miniature variety. See Little Ottawa Girl.
Ovary: On a bloom, the part of the pistil which contains the ovules.
Ovate: Leaf type. Describes an African Violet leaf which is ovate or oval-shaped. While sometimes called spooned, an ovate leaf does not necessarily have the concave feature associated with that leaf type.
Overpotting: Cultural problem which describes an African Violet being grown in a pot that is too large. When overpotted, an African Violet will expend the greatest part of its energy growing roots, thus reducing the amount of energy which might otherwise go to growing leaves and flowers. In addition, because the larger pot size will hold more water than an African Violet can absorb, conditions of excessive moisture will leave the African Violet susceptible to potentially fatal diseases, such as Crown Rot, Pythium and Root Rot. More information.
Overwatering: Cultural problem which describes an African Violet that is receiving too much water. The soil in which African Violets are potted should be consistently moist, but never soggy. Excessive moisture creates an environment favorable to such diseases as Crown Rot, Pythium and Root Rot. Overwatering can also cause a condition known as denitrification. More information.
Ovule: On a bloom, the part of the ovary which, when pollinated, will develop into a seed. Also see Pollination.
Oxygen: (O) Major element essential to the growth and vitality of African Violets. Sometimes called a free element. Oxygen is absorbed from the air and water, primarily in the form of either carbon dioxide or H2O. Through the process of photosynthesis, oxygen combines with carbon and hydrogen to form plant carbohydrates.
|A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|Optimara Main Page|
|Doctor Optimara | Optimara Field Guide | Contact Optimara|
Copyright 1999 Optimara/Holtkamp Greenhouses, Inc. Nashville, Tennessee. Optimara and the Optimara logo are registered trademarks of International Plant Breeding, A.G., Switzerland. | <urn:uuid:880e53bf-4072-4b4d-9076-4427a36eecda> | {
"date": "2017-07-23T20:47:42",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424610.13/warc/CC-MAIN-20170723202459-20170723222459-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8722463846206665,
"score": 2.671875,
"token_count": 1515,
"url": "http://optimara.com/optimaraglossary/o.html"
} |
A MEMS version of a legacy delay-line memory has been demonstrated as a viable scratchpad memory for future quantum computers by the National Institute of Standards and Technology (NIST, Boulder, Colorado).
The memory element in the MEMS (microelectromechanical system) resonates when hit with microwave pulses whose amplitude and phase encode the quantum information. Because the mechanical oscillations continue during the coherence time of a typical quantum operation, NIST believes the micron-sized memory could store temporary values during quantum calculations.
In principle, the MEMS memory performs like a legacy delay-line memory from early computer days, which stored scratchpad values in acoustic waves traveling down a column of mercury. In recent years, the same delay-line concept has been used in optical systems that measure out lengths of fiber cable to temporarily store information.
MEMS micro-drum and circuit on a sapphire backing. JILA researchers demonstrated that the drum might be used as a memory device in future quantum computers.
Image source: NIST
The current prototype has demonstrated 65 percent efficiency in temporarily storing quantum information, but NIST believes it can improve the data exchange between microwave photons, which excite the device, and the mechanical phonons, from which stored values are read out, making it a viable scratchpad memory for future quantum computers.
NIST hawks microwave-based quantum computers
MEMS microbots square off in Alaska
NIST scales up quantum computing
NIST aims quartz microbalance at nanotech
NIST materials scientist awarded Kyoto Prize | <urn:uuid:56ff9b97-b032-4066-a11e-9e5c2b724aa5> | {
"date": "2014-07-23T04:57:07",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997873839.53/warc/CC-MAIN-20140722025753-00184-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8762243986129761,
"score": 3.28125,
"token_count": 316,
"url": "http://www.eetimes.com/author.asp?section_id=36&doc_id=1287105"
} |
- Order: Piciformes
- Family: Picidae
Peru; © Mark W. Eaton
Although Plain-breasted Piculet has a restricted distribution, this species is fairly common within its range. They are primarily found along large rivers in the Amazon basin of north central Peru, and the range extends east along the Amazon River to southern Colombia and extreme western Brazil. Their preferred habitat is young Cecropia forests on river islands, but they also occur in second-growth forest away from rivers. Although generally encountered as singles or pairs foraging in the canopy, these piculets occasionally forage lower down. They frequently join small mixed foraging flocks. Both sexes are very plain overall, lacking any strong barring or spotting on the body. Note especially the entirely black cap in the females, and the lack of black and white nape spotting in the males. The song of Plain-breasted Piculet is a high, thin, descending trill, similar to the song of many other species of piculets.
Schulenberg, Thomas S., and Hope Batcheller. 2012. Plain-breasted Piculet (Picumnus castelnau), Neotropical Birds Online (T. S. Schulenberg, Editor). Ithaca: Cornell Lab of Ornithology; retrieved from Neotropical Birds Online: http://neotropical.birds.cornell.edu/portal/species/overview?p_p_spp=307256
This map is based on the maps available from the NatureServe InfoNatura website, but has been revised by Neotropical Birds Online.
The data for the Infonatura maps are provided by NatureServe in collaboration with Robert Ridgely, James Zook, The Nature Conservancy - Migratory Bird Program, Conservation International - CABS, World Wildlife Fund - US, and Environment Canada - WILDSPACE.
- Migration/Movement:Resident (nonmigratory)
- Primary Habitat:River edge forest
- Foraging Strata:Understory/Midstory
- Foraging Behavior:Peck
- Diet:Terrestrial invertebrates
- Sociality:Mixed Flocks
- Mating System:
- Nest Form:Undescribed
- Clutch: -
- IUCN Status:Least Concern | <urn:uuid:158b76a9-42dd-4e7f-bb0f-6cdc45c55644> | {
"date": "2015-07-28T19:44:36",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042982502.13/warc/CC-MAIN-20150728002302-00312-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8548003435134888,
"score": 3.328125,
"token_count": 485,
"url": "http://neotropical.birds.cornell.edu/portal/species/overview?p_p_spp=307256"
} |
Time, once again, for another fully photocopiable, full lesson plan!
This week it is a wild animals lesson. Teach your classes 20 wild animals and then the four habitats they live in.
The lesson plan (in PDF format) includes;
- Teachers Notes (to help you know what to do with every activity),
- Animal Flashcards (to introduce the 20 animals),
- Treasure Hunt Answer Sheets (place these outside the classroom),
- Treasure Hunt Student Sheets (use in conjunction with the answer sheets and let the students find the names for all the animals and write them down),
- Dominoes (have your students match the pictures and words),
- A Board Game (so your students can name the animals),
- Top Score (use in place of the board game, or use once you have introduced the habitats),
- Habitats Flashcards (introduce the four habitats),
- Habitats Dice (you will need to make it, or let your students make one each, before using it to practice the habitats),
- Habitats Sort (cut up the names of the animals and have your students sort the animals into their respective habitats),
- Habitats Worksheet (as final consolidation of what animals live in the habitats).
It consists of about 20/21 pages, so is a little paper heavy but it does include everything you need for a fun and engaging lesson! | <urn:uuid:b6cd669f-83d3-49f2-bcfb-07cfcac3dc62> | {
"date": "2017-09-23T05:46:38",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689490.64/warc/CC-MAIN-20170923052100-20170923072100-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8744878172874451,
"score": 4.34375,
"token_count": 291,
"url": "http://esl-matt-erials.blogspot.com/2016/02/wild-animals-lesson.html"
} |
At some point, nearly everyone who calls himself a conservative has found it necessary to distinguish himself from the Republican party. Typically, this happens in arguments with Democrats about spending or the expansion of the entitlement state: “They lost their way; they became just like you!”
Except on the matter of race.
When it comes to race, it’s apparently convenient to fall back on one’s membership in the party of Lincoln and — wait for it — Martin Luther King Jr. himself.
As this 2006 Human Events piece by National Black Republican Association Chairman Frances Rice asserts:
It should come as no surprise that Dr. Martin Luther King, Jr. was a Republican. In that era, almost all black Americans were Republicans. Why? From its founding in 1854 as the anti-slavery party until today, the Republican Party has championed freedom and civil rights for blacks. And as one pundit so succinctly stated, the Democrat Party is as it always has been, the party of the four S’s: slavery, secession, segregation and now socialism.
It was the Democrats who fought to keep blacks in slavery and passed the discriminatory Black Codes and Jim Crow laws. The Democrats started the Ku Klux Klan to lynch and terrorize blacks. The Democrats fought to prevent the passage of every civil rights law beginning with the civil rights laws of the 1860s, and continuing with the civil rights laws of the 1950s and 1960s.
Kevin D. Williamson has a more sophisticated and thoroughly researched version of this argument in the current issue of National Review. It’s worth reading in full — in particular for its pushback against the familiar retort that Republicans and Democrats “switched places” in the all-important South:
If the parties had in some meaningful way flipped on civil rights, one would expect that to show up in the electoral results in the years following the Democrats’ 1964 about-face on the issue. Nothing of the sort happened: Of the 21 Democratic senators who opposed the 1964 act, only one would ever change parties. Nor did the segregationist constituencies that elected these Democrats throw them out in favor of Republicans: The remaining 20 continued to be elected as Democrats or were replaced by Democrats. It was, on average, nearly a quarter of a century before those seats went Republican. If southern rednecks ditched the Democrats because of a civil-rights law passed in 1964, it is strange that they waited until the late 1980s and early 1990s to do so. They say things move slower in the South — but not that slow.
But, ultimately, I’m not sure how helpful it is to look at race relations through a partisan lens. Is it truly helpful to note that Sen. John Calhoun — the incendiary defender of states’ rights enshrined in Russell Kirk’s The Conservative Mind — was a Democrat? And if we’re kicking Calhoun out of the pantheon (if only on the race question) does that mean liberal New Jersey Sen. Jacob Javits gets to come in? Williamson, too, cites Richard Nixon, recalling how he “helped shepherd the 1957 Civil Rights Act through Congress.” And how’s his reputation among mainstream conservatives these days? Is it not in the same dustbin occupied by the defunct Northeastern moderate wing?
Williamson is on firm ground when he cites other factors to explain Republican dominance in Dixie: among them the rise of a new suburban class in the South; the capture by the McGovernite left of the Democratic Party. He could have mentioned the influence of conservative protestantism as well.
But there’s no getting around the fact that the philosophical underpinnings of Southern politics centered on an agrarian republican worldview that sought to preserve a certain way of life and ward off federal encroachment. It was, in a word, conservative. Despite its association with slavery, there is much to recommend about this worldview. If you will, one can throw out the bathwater and still keep Wendell Berry’s baby.
But it’s too clever by half to try to pin the parts of this worldview that offend our sensibilities onto the contemporary Democratic party. | <urn:uuid:7a28f682-65b1-47df-ab17-5c3ab65990bb> | {
"date": "2016-05-30T04:57:15",
"dump": "CC-MAIN-2016-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049288709.66/warc/CC-MAIN-20160524002128-00171-ip-10-185-217-139.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9569300413131714,
"score": 3.046875,
"token_count": 865,
"url": "http://www.theamericanconservative.com/2012/05/22/the-problem-with-a-partisan-history-of-civil-rights/"
} |
People are in the mood to party, houses are hung green, red and white, ‘¡descuentos patrias!’ signs are in the shop windows, streets are flooded in patriotic lights and you can’t go anywhere without seeing a stall selling flags, hairbands, face paint and hats, all emblazoned with the Mexican flag.
This is Dia de la Independencia in Mexico.
Celebrated on September 16th, it is one of Mexico’s most important holidays. On the night of the 15th people gather in plazas all over the country to hear the bells ring and local mayors and politicians re-enact the famous Grito de Dolores; the famous call to arms originally delivered by Hidalgo in 1810. On the 16th, every city and town all over Mexico celebrates with parades, dances and other civic festivals.
But what’s the history behind the date of September 16th?
Well, by 1810, Mexicans had grown weary under Spanish rule and the creoles finally decided the time had come to fight for independence. There were several conspiracies during those years but in Querétaro an organized conspiracy including several prominent citizens was preparing to make its move at the end of 1810. The leaders included parish priest Father Miguel Hidalgo and army officer Ignacio Allende.
Their plot, however, began to unravel and one by one the conspirators were being rounded up by colonial officials. On the morning of the 16th, fearing his own imprisonment, Hidalgo took to the pulpit in the town of Dolores to urge the people to revolt alongside him. He managed to rouse an army and forge the path to independence.
This famous speech became known as “El Grito de Dolores,” and is what is now shouted from balconies all over Mexico on the night of the 15th:
¡Vivan los héroes que nos dieron patria!
¡Viva Josefa Ortíz de Dominguez!
¡Vivan Aldama y Matamoros!
¡Viva la Independencia Nacional!
¡Viva México! ¡Viva México! ¡Viva México!
Hidalgo and his angry mob marched to Mexico City, laying siege to many towns along the way, but they were eventually stopped by a much better-equipped Spanish army in 1811. Hidalgo and Allende were put to death and all seemed lost.
But such was not the case. Various heroic figures took up the flag of independence and continued fighting for six more years until 1821, when they reached an agreement which allowed for Mexico’s definitive liberation in September of 1821.
Now, in 2015, with Mexico celebrating 205 years of independence, I was able to join in the party.
After weeks of seeing the flags go up and the city prepare itself, on the night of the 15th we arrived early into the centre – but not early enough. By the time we got there the main square of Merida was completely packed. From outside the cathedral, across the whole park and stretching round the sides, people carried flags, wore patriotic colours and stood on tip toes to get a view of the balcony of the Palacio Municipal. The mood was bright and the music loud.
After a couple of festive beers we joined the crowds and waited until 11 o’clock to hear El Grito. The crowd faithfully returned their ‘Vivas!’, roaring in unison after each line of the chant (especially after the ‘Viva Yucatan!”) and then erupting into applause and shouting at the end.
El Grito was followed by a stunning fireworks display above the square, accompanied by a voiceover about independence. All fireworks in red, green and white, of course.
Afterwards the people of Merida were treated to a free concert in the square by Espinosa Paz, an extremely popular singer and ladies man. Imagine if One Direction came to your town to give a free concert. Imagine the amount of people trying to cram in and the amount of screaming. Multiple this by 4 and you’re somewhere close to imagining Merida on the night of the 15th. Paz started the concert by asking which lovely lady would take him home that night. The screaming still haunts me.
After El Grito and all the fun around the plaza, people dispersed off to continue the party in bars or with family at home.
I loved experiencing Mexico’s Independence Day. I might not be Mexican but this country and its people have a huge slice of my heart.
Just a note – it might have all seemed rosy and wonderful and as it was my first year here for the 16th I’m not in any position to make comparisons, but the general consensus amongst my Mexican friends and students was that this year there wasn’t much to celebrate. With the violence, censorship and murder of the press and the current state of politics in Mexico (the hatred of Peña Nieto is palpable everywhere) for many Mexicans this was not a happy day but one for reflection and protest. | <urn:uuid:2ea7de49-9c30-41bc-875a-a8f12b3565c8> | {
"date": "2017-07-24T10:50:47",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424846.81/warc/CC-MAIN-20170724102308-20170724122308-00216.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9660788178443909,
"score": 3.59375,
"token_count": 1083,
"url": "https://yucatantastic.com/2015/09/30/viva-mexico-independence-day-in-merida/"
} |
Man’s Highest Happiness
|Man’s Highest Happiness (1921)
by , translated by Syed Nawab Ali
|Some Religious and Moral Teachings.Translated in 1921 as part of|
The constitution of man possesses a number of powers and propensities, each of which has its own distinctive kind of enjoyment suited to it by nature. The appetite of hunger seeks food which preserves our body and the attainment of which is the delight of it, and so with every passion and propensity when their particular objects are attained. Similarly the moral faculty-call it inward sight, light of faith or reason-any name will do provided the object signified by it is rightly understood-delights in the attainment of its desideratum. I shall call it here the faculty of reason (not that wrangling reason of the Scholastics and the dialecticians)—that distinctive quality which makes him lord of creation. This faculty delights in the possession of all possible knowledge. Even an expert in chess boastfully delights in the knowledge of the game however insignificant it may be. And the higher the subject matter of our knowledge the greater our delight in it. For instance we would take more pleasure in knowing the secrets of a king than the secrets of a vizier. Now delights are either (a) external, derived from the five senses, or (b) internal, such as love of superiority and power, love of the knowledge, etc enjoyed by the mind. And the more the mind is noble the more there will be a desire for the second kind of delights. The simple will delight in dainty dishes, but a great mind leaving them aside will endanger his life and his honour and reputation from the jaws of death. Even sensuous delights present an amusing example of preference. An expert in chess while absorbed in playing will not come to his meals though hungry and repeatedly summoned, because the pleasure of check-mating his adversary is greater to him than the object of his appetite. Thus we see that inward delights and they are chiefly love of knowledge and superiority are preferred by noble minds. If then a man believes in a perfect being, will not the pleasure of His contemplation be preferred by him and will it not absorb his whole self? Surely the delights of the righteous are indescribable, for they are even in this life, in a paradise which no eye has seen and no ear has heard.
Abu Sulaiman Darani, the renowned Sufi, says: “There are servants of God whom neither fear of hell nor the hope of heaven can deviate from the divine love, how can the world with its temptations come in their way?”. Abu Mahfuz Karkhi was once asked by his disciples: ”Tell us what led you to devotion” but he kept quiet. “Is it the apprehension of death.” said one of them. “It matters little” replied the saint “Is it due to hell or to paradise”. inquired another. “What of them” said the saint” “both belong to a supreme Being, if you love him you will not be troubled by them”. Saint Rabia was once asked about her faith: “God forbid”, answered Rabia: “If I serve him like a bad labourer thinking of his wages only”. And then she sang: “Love draws me nigh, I know not why”. Thus we see that the hearts of those who ate and drank and breathed like us felt delights of divine love which was their highest happiness.
If we think over man’s gradual development we find that every stage of his life is followed by a new sort of delight. Children love playing and have no idea of the pleasures of courtship and marriage experienced by young men, who in their turn would not care to exchange their enjoyments for wealth and greatness which are the delights of the middle aged men who consider all previous delights as insignificant and low. These last mentioned delights are also looked upon as unsubstantial and transitory by pure and noble souls fully developed.
The Quran says: “Know that this world’s life is only sport and play and boasting among yourselves, and vying in the multiplication of wealth and children”. “Say, shall I tell you what is better than these?” For the righteous are gardens with their Lord, beneath which rivers flow, to abide in them and pure mates and Allah’s pleasure and Allah sees the servants”. “Those who say: Our Lord, surely we believe, so forgive us our faults, and keep us from the chastisement of fire; the patient and the truthful and the obedient and those who spend (benevolently) and those who ask forgiveness in morning times”.
Let us now point out some drawbacks which hinder the path of the divine love.
Man from his infancy is accustomed to enjoy sensual delights which are firmly implanted in him. Blind imitation of the creed with vague conception of the deity and his attributes fails to eradicate sensual delights and evoke the raptures of divine love. It is the dynamic force of direct contemplation of his attributes manifested in the universe that can prove an incentive for his love. To use a figure: a nation loves its national poet, but the feeling of one who studies the poet will be of exceeding strong love. The world is a masterpiece; he who studies it loves its invisible Author in a manner which cannot be described but is felt by the favoured few. Another drawback which sounds like a paradox, should be deeply studied. It is as follows: when we find a person writing or doing any other work, the fact that he is living will be most apparent to us: that is to say, his life, knowledge, power and will will be more apparent to us than his other internal qualities, e.g. colour, size, etc. which being perceived by the eye may be doubted. Similarly stones, plants, animals, the earth, the sky, the stars, the elements, in fact everything in the universe reveals to us the knowledge, power and the will of its originator. Nay, the first and the foremost proof is our consciousness, because the knowledge that I exist is immediate, and more apparent than our perceptions. Thus we see that man’s actions are but one proof of his life, knowledge, power and will, but with reference to God the whole phenomenal existence with its law of causation and order and adaptability bears testimony of him and his attributes. Therefore, He is so dazzlingly apparent that the understanding of the people fails to see Him just as the bat pereeaes at night fails to see in daylight, because its imperfect sight cannot bear the light of the sun, so our understanding is blurred by the effulgent light of his manifestations. The fact is that objects are known by their opposites but the conception of one who exists everywhere and who has no opposite would be most difficult. Besides, objects which differ in their respective significances can also be distinguished but if they have common significances the same difficulty will be felt. For instance if the sun would have shone always without setting, we could have formed no idea of light, knowing simply that objects have certain colours. But the setting of the sun revealed to us the nature of light by comparing it with darkness. If then light, which is more perceptible and apparent would have never been understood had there been no darkness notwithstanding its undeniable visibility, there is no wonder if God who is most apparent and all pervading true light (Nur) remains hidden, because if he would have disappeared (which means the annihilation of the universe), there would have been an idea of him by comparison as in the case of the light and darkness. Thus we see that the very mode of his existence and manifestation is a drawback for human understanding. But he whose inward sight is keen and has strong intuition in his balanced state of mind neither sees nor knows any other active power save God omnipotent. Such a person neither sees the sky as the sky nor the earth as the earth-in fact sees nothing in the universe except in the light of its being work of an all pervading True One. To use a figure: if a man looks at a poem or a writing, not as a collection of black lines scribbled on white sheets of paper but as a work of a poet or an author, he ought not to be considered as looking to anything other than the author. The universe is a unique masterpiece, a perfect song, he who reads it looks at the divine author and loves him. The true Mowahhid is one who sees nothing but God. He is not even aware of his self except as servant of God. Such a person will be called absorbed in Him; he is effaced, the self is annihilated. These are facts known to him who sees intuitively, but weak minds do not know them. Even Ulamas fail to express them adequately or consider the publicity of them as unsafe and unnecessary for the masses.
- Daran, a village near Damascus, where he died in 215 A.H.
- A famous Muslim woman saint of Basrah, considered to be an authority on Sufiism. She died in 801
- LVI 0 and III. 14-16.
- Compare Descartes’: Cogito ergo sum.
- Compare Quran XXIV 35. “Allah is the light of the heavens and the earth: a likeness of his light is a pillar on which is a lamp, the lamp is in a glass (and) the glass is as it were a brightly shining star lit from a blessed olive tree, neither eastern nor western, the oil whereof almost gives light though fire touches it not (heads daffor.) Allah guides to his light whom he pleases and Allah sets forth parables for men and Allah is cogniscant of all things.” Al Ghazzali has written a separate treatise called Mishkat ul Anwar dealing exhaustively with the above passage. An excellent summary of his views is given by Razi in his Commentary, vol. VI. 393-408. (Stamboul edition). In the above parable Islam is represented as a likeness of the divine light, a light placed high on a pillar so as to illumine the whole world, a light guarded by being placed in a glass so that no puff of wind can put it out, a light so resplendent that the glass itself in which it is placed is as a brillinnt star. Just as a fig tree stands for a symbol of Judaism (see St. Matthew XXI 19) the olive stands for Islam, which must give light to both the East and the West, and does not specifically belong to either one of them.
The doctrine of Fana is misunderstood by many Western scholars. Tennyson puts it:
* “That each, who seems a separate whole,
* Should move his rounds and fusing all
* The skirts of self again, should fall
* Remerging in the general soul,
* Is faith as vague as all unsweet.”
(In Memoriam XLVII)
Ghazzali’s vivid description is neither vague nor unsweet. To him Fana is “a prayer of rapture”. “In that state man is effaced from self, so that he is conscious neither of his body nor of outward things, nor of inward feelings. He is rapt from all these, journeying first to his Lord and then in his Lord, and if the thought that he is effaced from self occurs to him, that is a defect. The highest state is to be effaced from effacement”. [Editor: illegible character] Whinfield: Masnavi Introduction p. xxxvii. | <urn:uuid:5649336a-78c6-4604-8795-7688f618a6ea> | {
"date": "2014-09-02T20:09:28",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909043232-00095-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9713286757469177,
"score": 2.53125,
"token_count": 2449,
"url": "http://en.wikisource.org/wiki/Man%E2%80%99s_Highest_Happiness"
} |
OnlineUniversities.com have put together the following infographic, which details how teachers can use Pinterest to organize lesson plans, distribute curricula, collaborate with other faculty, and even encourage student participation.
Remember, however, that Pinterest’s terms of service dictate that users under the age of 13 are prohibited. So, if you’re still teaching your students the ABCs, you probably shouldn’t be encouraging them to use the social network.
16 Ways Educators Use Pinterest Smartly [INFOGRAPHIC]
From: Online Universities Blog | <urn:uuid:19b09d6d-94bc-4aa5-a923-e035cf2e0feb> | {
"date": "2016-05-24T21:23:26",
"dump": "CC-MAIN-2016-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049273667.68/warc/CC-MAIN-20160524002113-00096-ip-10-185-217-139.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8923360109329224,
"score": 2.546875,
"token_count": 115,
"url": "http://www.thesocialmediatoday.com/16-ways-educators-use-pinterest-smartly-infographic/"
} |
The differences between and OB-GYN and a Podiatrist are fairly obvious but what is not so obvious is how they are alike. Both medical specialists recognize that Diagnostic Ultrasound is a fast and safe way to get a real time image and information for treatment. Whereas OB-GYNs have been using ultrasound for some time, this tool is becoming best practice in the field of podiatry.
What is Diagnostic Ultrasound?
Diagnostic Ultrasound is a medical technique to view parts of the body by using high frequency sound waves. It produces sound waves by crystals that oscillate at a frequency beyond the range of the human ear. When sound waves penetrate the tissues of the body, part of the sound wave is reflected back causing reflective patterns that are sent to a computer. The patterns are then sent to a screen where they produce an image; and the image can be studied “live” or recorded and printed later.
What is the Procedure like?
Contact is made to the body using a hand-held device called a transducer. The transducer transmits the sound waves and captures the reflective echoes that produce an image. A transmission gel is used to complete contact between the transducer and the skin.
Is the Procedure painful?
There is no pain or discomfort associated with Diagnostic Ultrasound with the possible exception of a cold feeling that may be produced by the gel or the metal head of the transducer. The image is produced by the reflection of sound waves. Unlike an X-ray machine, no radiation is used.
Why is Diagnostic Ultrasound used in Podiatry?
Diagnostic Ultrasound is used because it is considered extremely safe procedure; however, when studying the damage of the foot and ankle, it is a very effective method to determine how to proceed and treat. Thicker tissue such as bones, produce a different image than fluid filled structures such as a cyst. A trained podiatrist can differentiate between what is normal and what is not.
How is Diagnostic Ultrasound used in Podiatry?
Ultrasound has proven to be an effective way to recognize many foot and ankle disorders such as: Morton’s neuroma, Achilles tendonitis, tears and ruptures, fibromas, cysts, ganglions, bone injury, bursitis, ligament tears, heel spurs, plantar facia tears and inflammation, pinching of nerves, abnormal growths, joint swelling, tarsal tunnel syndrome, bone injuries, fractures, stress fractures, ankle sprains and strains. It can also be used to find pieces of glass, wood or metal from puncture wounds which can be a frequent, hard to find reason for foot pain. Diagnostic ultrasound can even find areas of localized infection, show if tissue is being pinched between bones. It is particularly useful to use as a guide for the placement of an injection to ensure that medication is placed precisely where it needs to be for maximum effectiveness and pain relief.
What are the Benefits of Diagnostic Ultrasound?
There are many benefits to use Diagnostic Ultrasound and the risks are minimal making this a wonderful tool for diagnosis and treatment of numerous foot and ankle disorders. Here are some of the benefits:
- Testing is quick and painless
- Results are available immediately and you are able to see the problem when the ultrasound is being performed
- There is no radiation or side effects with this machine as there are with other diagnostic tests
- Ultrasound is much less expensive than MRI, CT scan or bone scans
- Unlike the magnetic field of MRI units, ultrasound is not affected by cardiac pacemakers or implants within the body
- Ultrasound may actually have advantages over MRI in seeing tendon structure, which is better appreciated by ultrasound than MRI at a fraction of the cost, and
- For diagnostic ultrasound there are no known harmful effects on humans
As with all disorders, your podiatrist is the best person to determine when it is appropriate to use Diagnostic Ultrasound and when other methods may be preferred. If you or someone you know suffers from chronic, unexplained foot pain and you want a definitive diagnosis, call Dr. Sigle today at (217) 787-2700 for an appointment.To learn more about this treatment, visit www.myfootandanklecenter.comand view a short video of the procedure. | <urn:uuid:baeb9684-ed70-4a57-bb7f-80d7dfe2f4ec> | {
"date": "2019-04-26T00:37:02",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578743307.87/warc/CC-MAIN-20190425233736-20190426015736-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9401523470878601,
"score": 3.15625,
"token_count": 909,
"url": "http://www.myfootandanklecenter.com/blog/post/what-does-an-ob-gyn-and-podiatrist-have-in-common.html"
} |
Kingdom of Northumbria
|Kingdom of Northumbria|
|Unified Angle kingdom (before 876)
North: Angle kingdom (after 876)
South: Danish kingdom (876–914)
South: Norwegian kingdom (after 914)
Location of Northumbria in 800
|Languages||Old English, Cumbric, Latin|
|-||died 954||Eric Bloodaxe|
|-||South is annexed by the Danelaw||876|
|-||South is conquered by Norse warriors||914|
|-||Annexed by Wessex||954|
|Today part of|| United Kingdom
∟ Northern England
∟ Lothian and Borders
The Kingdom of Northumbria (//; Old English: Norþhymbra rīce, "kingdom of the Northumbrians") was a medieval Anglian kingdom in what is now northern England and south-east Scotland, which subsequently became an earldom in a unified English kingdom. The name reflects the approximate southern limit to the kingdom's territory, the Humber estuary.
Northumbria was formed by Æthelfrith in central Great Britain in Anglo-Saxon times. At the beginning of the 7th century, the two kingdoms of Bernicia and Deira were unified. (In the 12th century writings of Henry of Huntingdon the kingdom was defined as one of the Heptarchy of Anglo-Saxon kingdoms). At its height, the kingdom extended at least from just south of the Humber to the River Mersey and to the Forth (roughly, Sheffield to Runcorn to Edinburgh)—and there is some evidence that it may have been much greater (see map).
The later (and smaller) earldom came about when the southern part of Northumbria (ex-Deira) was lost to the Danelaw. The northern part (ex-Bernicia) at first retained its status as a kingdom but when it became subordinate to the Danish kingdom, it had its powers curtailed to that of an earldom and retained that status when England was reunited by the Wessex-led reconquest of the Danelaw. The earldom was bounded by the River Tees in the south and the River Tweed in the north (broadly similar to the modern North East England).
Much of this land was "debated" between England and Scotland, but the Earldom of Northumbria was eventually recognised as part of England by the Anglo-Scottish Treaty of York in 1237. On the northern border, Berwick-upon-Tweed, which is north of the Tweed but had changed hands many times, was defined as subject to the laws of England by the Wales and Berwick Act 1746. The land once part of Northumbria at its peak is now divided by modern administrative boundaries:
- North East England
- Yorkshire and the Humber
- North West England includes Cumbria, though Cumbria was more of a Northumbrian colony with its own client kings for most of its history in the Early Medieval era
- Scottish Borders, West Lothian, Edinburgh, Midlothian and East Lothian
Northumbria is also used in the names of some regional institutions, particularly the police force (Northumbria Police, which covers Northumberland and Tyne and Wear) and a university (Northumbria University) based in Newcastle upon Tyne. The local Environment Agency office, located in Newcastle Business Park, also uses the term Northumbria to describe its patch. Otherwise, the term is not used in everyday conversation and is not the official name for the UK and EU region of North East England.
- 1 Kingdom (654–954)
- 2 Ealdormanships and earldoms in Northumbria (954–1217)
- 3 Culture
- 4 Language
- 5 See also
- 6 References
- 7 Further reading
- 8 External links
|This section does not cite any references or sources. (May 2014)|
Northumbria was originally composed of the union of two independent kingdoms, Bernicia and Deira. Bernicia covered lands north of the Tees, while Deira corresponded roughly to modern-day Yorkshire. Bernicia and Deira were first united by Aethelfrith, a king of Bernicia who conquered Deira around the year 604. He was defeated and killed around the year 616 in battle at the River Idle by Raedwald of East Anglia, who installed Edwin, the son of Ælla, a former king of Deira, as king.
Edwin, who accepted Christianity in 627, soon grew to become the most powerful king in England: he was recognised as Bretwalda and conquered the Isle of Man and Gwynedd in northern Wales. He was, however, himself defeated by an alliance of the exiled king of Gwynedd, Cadwallon ap Cadfan and Penda, king of Mercia, at the Battle of Hatfield Chase in 633.
After Edwin's death, Northumbria was split between Bernicia, where Eanfrith, a son of Aethelfrith, took power, and Deira, where a cousin of Edwin, Osric, became king. Cumbria tended to remain a country frontier with the Britons. Both of these rulers were killed during the year that followed, as Cadwallon continued his devastating invasion of Northumbria. After the murder of Eanfrith, his brother, Oswald, backed by warriors sent by Domnall Brecc of Dál Riata, defeated and killed Cadwallon at the Battle of Heavenfield in 634.
Oswald expanded his kingdom considerably. He incorporated Gododdin lands northwards up to the Firth of Forth and also gradually extended his reach westward, encroaching on the remaining Cumbric speaking kingdoms of Rheged and Strathclyde. Thus, Northumbria became not only part of modern England's far north, but also covered much of what is now the south-east of Scotland. King Oswald re-introduced Christianity to the Kingdom by appointing St. Aidan, an Irish monk from the Scottish island of Iona to convert his people. This led to the introduction of the practices of Celtic Christianity. A monastery was established on Lindisfarne.
War with Mercia continued, however. In 642, Oswald was killed by the Mercians under Penda at the Battle of Maserfield. In 655, Penda launched a massive invasion of Northumbria, aided by the sub-king of Deira, Aethelwald, but suffered a crushing defeat at the hands of an inferior force under Oswiu, Oswald's successor, at the Battle of Winwaed. This battle marked a major turning point in Northumbrian fortunes: Penda died in the battle, and Oswiu gained supremacy over Mercia, making himself the most powerful king in England.
In the year 664 the Synod of Whitby was held to discuss the controversy regarding the timing of the Easter festival. Dispute had arisen between the practices of the Celtic church influencing Northumbria and those of the Roman church predominate throughout southern England and Western Europe. Eventually, Northumbria was persuaded to move to the Roman practice and the Celtic Bishop Colman of Lindisfarne returned to Iona. The episcopal seat of Northumbria was transferred from Lindisfarne to York, which indicates the growing religious, political and economic importance of connections to southern Great Britain.
Decline of the Kingdom of Northumbria
Northumbria lost control of Mercia in the late 650s, after a successful revolt under Penda's son Wulfhere, but it retained its dominant position until it suffered a disastrous defeat at the hands of the Picts at the Battle of Dun Nechtain in 685; Northumbria's king, Ecgfrith (son of Oswiu), was killed, and its power in the north was gravely weakened. The peaceful reign of Aldfrith, Ecgfrith's half-brother and successor, did something to limit the damage done, but it is from this point that Northumbria's power began to decline, and chronic instability followed Aldfrith's death in 704.
In 867 Northumbria became the northern kingdom of the Danelaw, after its conquest by the brothers Halfdan Ragnarsson and Ivar the Boneless who installed an Englishman, Ecgberht, as a puppet king. Despite the pillaging of the kingdom, Viking rule brought lucrative trade to Northumbria, especially at their capital York. The kingdom passed between English, Norse and Norse-Gaelic kings until it was finally absorbed by King Eadred after the death of the last independent Northumbrian monarch, Erik Bloodaxe, in 954.
Ealdormanships and earldoms in Northumbria (954–1217)
After the English regained the territory of the former kingdom, Scots invasions reduced Northumbria to an earldom stretching from the Humber to the Tweed. Northumbria was disputed between the emerging kingdoms of England and Scotland. The land north of the Tweed was finally ceded to Scotland in 1018 as a result of the battle of Carham. Yorkshire and Northumberland were first mentioned as separate in the Anglo-Saxon Chronicle in 1065.
Norman invasion and partition of the earldom
William the Conqueror became king of England in 1066. He realised he needed to control Northumbria, which had remained virtually independent of the Kings of England, to protect his kingdom from Scottish invasion. In 1067, William appointed Copsi (sometimes Copsig) as Earl. However, just five weeks into his reign as earl, Copsi was murdered by Osulf II of Bamburgh.
To acknowledge the remote independence of Northumbria and ensure England was properly defended from the Scots, William gained the allegiance of both the Bishop of Durham and the Earl and confirmed their powers and privileges. However, anti-Norman rebellions followed. William therefore attempted to install Robert Comine, a Norman noble, as the Earl of Northumbria, but before Comine could take up office, he and his 700 men were massacred in the city of Durham. In revenge, the Conqueror led his army in a bloody raid into Northumbria, an event that became known as the Harrying of the North. Ethelwin, the Anglo-Saxon Bishop of Durham, tried to flee Northumbria at the time of the raid, with Northumbrian treasures. The bishop was subsequently caught, imprisoned, and later died in confinement; his seat was left vacant.
Rebellions continued, and William's son William Rufus decided to partition Northumbria. William of St. Carilef was made Bishop of Durham, and was also given the powers of Earl for the region south of the rivers Tyne and Derwent, which became the County Palatine of Durham.
The remainder, to the north of the rivers, became Northumberland, where the political powers of the Bishops of Durham were limited to only certain districts, and the earls continued to rule as clients of the English throne. The city of Newcastle was founded by the Normans in 1080 to control the region by holding the strategically important crossing point of the river Tyne.
The Northumbrian region continued a history of revolt and rebellion against the government, as seen in the Rising of the North in Tudor times. A major reason was the strength of Catholicism in the area after the Reformation. Rural, thinly populated, and sharing a border with an often hostile Scotland, the region became a wild place where reivers raided across the border and outlaws took refuge from justice. However, after the union of the crowns of Scotland and England under King James VI and I peace was largely established. After the Restoration, many inhabitants of the Northumbrian region supported the Jacobite cause.
Northumbria during its "golden age" was the most important centre of religious learning and arts in the British Isles. Initially the kingdom was evangelised by Irish monks from the Celtic Church, based at Iona in modern Scotland, which led to a flowering of monastic life. Lindisfarne on the east coast was founded from Iona by Saint Aidan in about 635, and was to remain the major Northumbrian monastic centre, producing figures like Wilfrid and Saint Cuthbert. The nobleman Benedict Biscop had visited Rome and headed the monastery at Canterbury in Kent and his twin-foundation Monkwearmouth-Jarrow Abbey added a direct Roman influence to Northumbrian culture, and produced figures such as Ceolfrith and Bede. Northumbria played an important role in the formation of Insular art, a unique style combining Anglo-Saxon, Celtic, Pictish, Byzantine and other elements, producing works such as the Lindisfarne Gospels, St Cuthbert Gospel, the Ruthwell Cross and Bewcastle Cross, and later the Book of Kells, which was probably created at Iona. After the Synod of Whitby in 664 Roman church practices officially replaced the Celtic ones but the influence of the Celtic style continued, the most famous examples of this being the Lindisfarne Gospels. The Venerable Bede (673–735) wrote his Historia ecclesiastica gentis Anglorum (Ecclesiastical History of the English People, completed in 731) in Monkwearmouth-Jarrow, and much of it focuses on the kingdom. The devastating Viking raid on Lindisfarne in 793 marked the beginning of a century of Viking invasions that severely checked all Anglo-Saxon culture, and heralded the end of Northumbria's position as a centre of influence, although in the years immediately following confident works like the Easby Cross were still being produced. A bullion-weight economy was still in use at the end of the 9th-century AD, as demonstrated in the twenty-nine silver ingots found in the Bedale Hoard, along with sword fittings and necklaces in gold and silver.
Northumbria has its own check or tartan, which is similar to many ancient tartans (especially those from Northern Europe, such as one found near Falkirk and those discovered in Jutland that date from Roman times (and even earlier). Modern Border Tartans are almost invariably a bold black and white check, but historically the light squares were the yellowish colour of untreated wool, with the dark squares any of a range of dark greys, blues, greens or browns; hence the alternative name of "Border Drab". At a distance the checks blend together making the fabric ideal camouflage for stalking game.
Apart from standard English, Northumbria has a series of closely related but distinctive dialects, descended from the early Germanic languages of the Angles, of which 80% of its vocabulary is derived, and Vikings with a few Celtic and Latin loanwords. The Scots language began to diverge from early Northumbrian Middle English, which was called Ynglis as late as the early 16th century (until the end of the 15th century the name Scottis (modern form: Scots) referred to Scottish Gaelic). There are many similarities between Modern Scots dialects and those of Northumbria.
The major Northumbrian dialects are Geordie (Tyneside), Northern (north of the River Coquet), Western (from Allendale through Hexham up to Kielder), Southern or Pitmatic (the mining towns such as Ashington and much of Durham), Mackem (Wearside), Smoggie (Teesside) and Tyke (Yorkshire). To an outsider's ear the similarities far outweigh the differences between the dialects. As an example of the differences, in the softer South County Durham/Wearside the English 'book' is pronounced 'bewk', in Geordie it becomes 'bouk', while in the Northumbrian it is 'byuk'.
- History of Northumberland
- Northumbria's golden age
- Northumbrian music
- Northumbrian smallpipes
- Northumbrian tartan
- English of Northumbria
- Geordie dialect words
- E. Ekwall, The Concise Oxford Dictionary of English Place-Names: 4th Ed, OUP, 1960, ISBN 0-19-869103-3
- Goffart, Walter. The Narrators of Barbarian History (A.D. 550–800): Jordanes, Gregory of Tours, Bede, and Paul the Deacon. Princeton: Princeton University Press, 1988. 238ff.
- Townedn, M. 2014.Viking Age Yorkshire. Pickering: Blackthorn Press
- Cultural Heritage
- J. P. Wild Britannia, Vol. 33, 2002 (2002)
- J. P. Wild, The Classical Quarterly, New Series, Vol. 14, No. 2 (Nov., 1964)
- Anglo-Saxon Thegn, 449–1066 A.D. By Mark Harrison, Osprey Publishing 1993, ISBN 1-85532-349-4; p. 17
- A short history of the Tartan
- The History of Scottish Tartans & Clans Tartans
- North East dialect origins and the meaning of 'Geordie'
- The Northumbrian Language Society
- Higham, N.J., (1993) The Kingdom of Northumbria AD 350–1100 ISBN 0-86299-730-5
- Rollason, D., (2003) Northumbria, 500–1100: Creation and Destruction of a Kingdom ISBN 0-521-81335-2
- Woodman, D. A. (March 2015). "Charters, Northumbria and the Unification of England in the Tenth and Eleventh Centuries". Northern History LII (1). OCLC 60626360.
- Lowlands-L, An e-mail discussion list for those who share an interest in the languages & cultures of the Lowlands
- Lowlands-L in Nothumbrian
- Northumbrian Association
- Northumbrian Language Society
- Northumbrian Small Pipes Encyclopedia
- Northumbrian Traditional Music
- Visit Northumberland – The Official Visitor Site for Northumberland | <urn:uuid:22f54898-81fe-4390-8efc-697e7053058a> | {
"date": "2015-06-30T04:03:35",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375091587.3/warc/CC-MAIN-20150627031811-00126-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9519010782241821,
"score": 3.859375,
"token_count": 3844,
"url": "https://en.wikipedia.org/wiki/Northumbrians"
} |
Description of Samoa
Samoa located in the southern region of Pacific Ocean. Samoan consists of two major islands which are Savi’i and Upolu, out of which Savi’i is the biggest island in the region of Polynesia. The capital city of the island is Apai Samoa and there is also an international airport located in the island of Upolu. Island Samoa got its independence from New Zeland in 1962 and was admitted to the United Nations in the year 1976.
History Map and Language
On January 1 1962, Western Samoa accomplished its independence from New Zealand.Yet Samoa celebrates its independence day on 1st of June. This is a very major day on the island and is very widely celebrated.
Samoa was initially found by the Dutch voyagers in the south Pacific region in the eighteenth century. Accordingly, it was investigated by the French and British pioneers. In 1847, a consular office was initiated in Apia. In 1853, the United States and in 1861, Germany/Prussia opened a consular office at the same spot. On November 2, 1871, the Government of New Zealand bolstered the takeover of the Samoa Islands by Britain.
Samoa is located on the south of the equator, somewhere between Hawaii and New Zealand in the Polynesian region of the Pacific Ocean. The aggregate area territory is 2,842 Sqkm comprising of the two substantial islands of Upolu and Savai'i which represent 99% of the aggregate area zone, and eight little islets.
Climate and Weather
Samoas atmosphere can be depicted as warm and tropical atmosphere. Temperatures are warm throughout the year and can get hot in the late spring seeing temperature rising till 35°C. Exchange winds from the east-southeast bring year long cooling breezes in late evening and an early night.
The season for tropical downpours is from December through February concurring with the hottest summer months. Samoa is situated in the southern Hemisphere, so summer keeps going from November to February and winter from April to September. On the other hand, there are no critical contrasts in temperature; by and large, the temperatures in the middle of April and September are just somewhat cooler than from November to February.
Culture and Holidays
The conventional Samoan culture, remains as one of the most influence aspect of life and governmental issues of Samoa. In spite of hundreds of years of European impact, Samoa keeps up its authentic traditions, political and social frameworks, and language. Social traditions, for example, Samoa 'ava service is noteworthy and grave ceremonies at critical events which also includes bestowal of matai primary titles. Things of social worth incorporate finely stiched ie toga. Sports wise rugby, cricket and netball are the most widely played. Manu Samoa is their national rugby team which is very widely popular.
Travelling and Tourism
Samoa is an ideal tropical holiday destination and can be the perfect destination for relaxation. There are many adventure sports and water activities that are carried out on the island for the entertainment of tourists. There are also many good shopping destinations on the Island which offers various stuff for the traveller to shop. The Airport located enjoys good connectivity from all the leading places in the world. There is also a ferry service that is carried out from New Zealand, which can be a preferred mode of transport.
Some facts about Samoa
Gallery of Samoa
Samoa video guide
More information about Samoa
Climate of Samoa:
Top cities of Samoa
© 2010-2017 gabisworld.com Contact Us | <urn:uuid:89c1a2b2-bf4e-467d-ac0d-28f2486d30a4> | {
"date": "2017-05-25T19:57:34",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608416.96/warc/CC-MAIN-20170525195400-20170525215400-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9620201587677002,
"score": 3.15625,
"token_count": 729,
"url": "http://gabisworld.com/samoa/"
} |
Hans Lollik Island
|This article needs additional citations for verification. (May 2008)|
The Hans Lollik Islands are two islands in the US Virgin Islands. Great Hans Lollik Island ("GHL") is found approximately 8,000 feet (2½ km) beyond the central northshore of St. Thomas, US Virgin Islands, separated from St. Thomas by the Leeward Passage. Little Hans Lollik and Pelican Cay lie to the north of Hans Lollik on the same shelf. The major part of the benthic zone around Hans Lollik is rocky and supports a dense diverse coral habitat.
The terrestrial features of the Hans Lollik group are functions of their natural topography, exposure to trade winds, and consequences of human occupation. In part because of its low elevation, GHL receives about 44 inches (1,120 mm) of rainfall annually. The east and northeast slopes experience regular northeasterly trade winds. The leeward hillsides and guts retain more moisture and support plant communities that differ from those on windward slopes in growth form and species composition.
Human occupation has had a significant impact on the ecology of the island. From the early 18th century to the 1850s, the Virgin Islands were clear-cut and farmed. Local historians estimate that about 30 to 40 acres (12 to 16 ha) of GHL was cultivated for cotton during this period. The steep profile of the island caused exposed soil to creep and wash into the sea as sediment run-off; some estimate that several feet of topsoil were lost during this agricultural period. In the 1940s and 1950s, GHL was logged for timber which was sold in St. Croix, U.S. Virgin Islands. While only donkeys, and European rabbits remain on the island, goats also occupied the island in the past years.
The legacy of modern human occupation of Hans Lollik has produced an island dissimilar to that seen by the Arawak prior to the island’s discovery by Europeans (at the end of the 15th century). Clear-cutting, burning, and logging have modified the island’s vegetation. Seed stock for species once present on the island no longer exists locally. Fire allowed resistant species (e.g., thatch palm) to dominate, and logging left stock for a future forest canopy dominated by softwoods (e.g., loblolly pine, blolly, and Geiger tree). Concomitantly, settlers introduced exotic species and cultivars, some of which spread and now dominate present plant communities on the island.
No native terrestrial mammals occur on either Great Hans Lollik or Little Hans Lollik. The black rat (Rattus rattus) was introduced by early European settlers within the last 500 years. The European rabbit (Oryctolagus cuniculus), cats (Felis cattus) and donkeys (Equus asinus) have been intentionally released. There should be four native species of bats present: Noctillio jeporinus (a fishing bat), Molossus molossus (a small insectivore), Jamaican fruit bat Artibeus jamaicensis, and Antillean fruit-eating bat Brachyphylla cavernarum (a pollen and nectar feeder).
Reptiles and amphibians
The herpetofauna of Hans Lollik has not been well studied, but species composition should closely resemble that of St. Thomas. Several species of lizards, common on nearby islands, have never been documented on Hans Lollik. During a 1990s survey, sight records of three previously unrecorded reptiles were established: two lizards (Ameiva exul and Anolis pulchellus) and a snake (Liophis portoricensis). Another lizard, Anolis stratulus, was collected for the first time. Lizards previously documented include: Anolis critatellus and Sphaerodactylus macrolepis.
Based on their distribution and habitat requirements on surrounding islands, one might expect the following species to be present as well: Iguana iguana, Hemidactylus mabouia, Mabuya mabouya, and Amphisbaena fenestrata. Iguana pinguis, a species endemic to the Puerto Rico Bank, has been extirpated from most developed islands in the region, but might survive on one or more of the islands in the study area. Two snakes found on St. Thomas might occur on Hans Lollik: Typhlops richardii and Liophis exequuis. Liophis portoricensis (a lizard-eating ground snake) has been reduced in numbers or extirpated on the large islands within its range. Geochelone carbonaria, the red-legged tortoise, has not been recorded but may be present.
No amphibians are known to live on Hans Lollik, but it is possible that one or more species of cocqui (Eleutherodactylus) occurs there. These tiny frogs create foam nests to protect their eggs and tadpoles from desiccation and standing freshwater is not required for reproduction while adult frogs hide in damp areas, such as the leaf bases of bromeliads, to avoid xeric conditions.
Many bird species are seasonal visitors to the offshore cays and are only in evidence at Hans Lollik during the summer breeding season. The most conspicuous birds at the study sites are the resident seabird species, including the brown booby (Sula melanogaster) and the brown pelican (Pelecanus occidentalis). Both species utilize the bait-rich waters of Hans Lollik for feeding; both species target white fry, blue fry, or false pilchard as preferred prey. The prime roosting spots for these species have been located and mapped by JDA[disambiguation needed] to enable the site planning process to avoid these areas. Hans Lollik has no critical nesting sites for any bird species. The cliff-site nesting areas for the tropic bird are de facto protected from humans by their precarious cliff location.
Hans Lollik has not been a historically important brown pelican-nesting site, and the sparse nesting which now occurs is opportunistic. This nesting may well be the result of a booming local population of pelicans, which is spreading out to new roosting and nesting sites, or it may be the result of displacement from other islands and cays. The brown pelican is listed as endangered, both federally and by the Virgin Islands. The brown pelican was once thought to be doomed due to the eggshell-thinning events brought about by DDT contamination. Since the DDT ban went into effect, brown pelican populations throughout the US have recovered, causing the species to be delisted throughout much of its range. The southeast U.S. (including Virgin Islands) populations have not yet been delisted, but indications are that these populations are also recovering.
Noddy terns (Anous stolidus), least terns (Sterna albifrons), sooty terns (Sterna fuscata), and royal terns (Thalasseus maximus) have all been recorded as nesting on nearby Pelican Cay, but not on Hans Lollik Island. Other bird species seen on Hans Lollik include the ubiquitous pearly-eyed thrasher (Margarops fuscatus), the bananaquit (Coeroba flaveloa), the oystercatcher (Haematopus pallitus), and the sparrowhawk (Falco sparverius).
The area between Hans Lollik and Little Hans Lollik is relatively shallow and is primarily a hard bottom with scattered large patches of sand and cobble. Currents flowing between the two islands are generally to the west, and are often quite swift. The shallows along the shores of both islands are colonized by head corals, Diploria strigosa, D. clivosa, Siderastrea siderea, D. labyrinthiformis, Colpophyllia natans, Porites astreoides, Montastraea annularis, M. cavernosa and Dendrogyra cylindrus. There are scattered elkhorn coral Acropora palmata, and staghorn coral A. cervicornis. In the shallower areas, less than 10 ft (3 m) most of the Acropora is alive, while deeper there are numerous skeletons of these once massive spreading corals. There are also some very large remnants of Porites porites colonies that lie between the two islands. Some of these mounds are 10 to 12 ft (3 to 4 m) in height and width. Agarcia, Millepora, P. porites, and a variety of sponge species have colonize the dead coral of these mounds. The entire area is destiny colonized by soft coral species and sea plumes, fans feathers are scattered throughout. To the southwest there is a sandy beach, and the sand extends offshore into the bentic environment. Within this sandy area there are emergent areas of rock that have become colonized by corals (Siderastrea and Diploria) and algae. Further offshore there is shallow reef area that is highly impacted by the on coming waves. The reef area supports of variety of soft and hard coral colonization. Along the western side of the island and along the northwestern tip the shoreline is rocky, and the rock extends below the sea. There are large boulders and slabs of rock that lie just below the waters surface along the shore. A diverse community of corals and sponges colonizes this rock substrate that rapidly drops to a depth of 20 to 25 ft (6 to 8 m). Head corals (Diploria strigosa, D. clivosa, Sidereastrea siderea, D. labyrinthiformis, Colpophyllia natans, Porites astreoides, Montastrea annularis, M. cavernosa and Dendrogyra cylindrus), branching corals (Acropora palmate, A cervicornis, Porites porites), and fire corals (Millepora spp.) are common within this area.
Cetaceans and other marine species
The most common cetacean species to move through the waters of the greater Hans Lollik area include bottlenose dolphins ('Tursiops truncatus) and humpback whales (Megaptera novaeangliae). Some pilot whales (Globicephala melaena) may also occur in the area. The presence of humpback whales is seasonal, with peak migrations occurring during January through March. In addition to reef fish, schooling fish have been evaluated in the area around GHL and Litte Hans Lollik. Fish abundance is greatest in the offshore area of the east coast fringing reef and in the deep-water areas off the northwest corner of GHL. Three sea turtle species occur around the island, the hawksbill turtle, green turtle, and leatherback turtle..
Prehistoric and historic human occupation
No significant evidence of prehistoric aboriginal occupation of the island has been found. Based upon historic accounts, a series of cotton plantation establishments were apparently developed and maintained from at least 1769, but probably several decades earlier. This occupancy continued until the mid-nineteenth century, followed by another enterprise in the 1950s. More recent uses have included logging, fishing, residence by an individual, and cattle raising in the 1950s when the existing overgrown circumferential road was created. An underwater survey of the bays on Hans Lollik failed to find any archaeological or cultural resources of importance. In Coconut Bay, a modern shipwreck was identified some years ago.
The Virgin Islands lie in the “Easterlies” or “Trade Winds” which traverse the southern part of the "Bermuda High" pressure area. Thus, the predominant winds are usually from the east-northeast and east. These trade winds vary seasonally and are broadly divided into four seasonal modes: December to February; March to May; June to August; and September to November. There are numerous disturbances during the year, especially squalls and thunderstorms. These occur most frequently during the summer, lasting only a few hours and cause no pronounced change in the trade winds..
Nearby small islands and cays
- Necker Island, BVI - Owned by Sir Richard Branson
- Guana Island & Norman Island, BVI - Owned by Henry Jarecki
- Great St. James
- Bruce Randolph Tizes
- Alton A. Adams, Jr.
- Amy Dempsey, Bioimpact
- William Baird, W. F. Baird and Associates
- James Dobbin, Dobbin Associates
- Ronald Thomas, MAAR Associates
- Claudette Lewis, Director of Archaeology, USVI Department of Planning and Natural Resources
- Vance P. Vincente, Wildlife Biologist, United States Fish and Wildlife Service
- Tere Rodrigues, U.S. Environmental Protection Agency
- McGill Marltime, Montreal, Quebec
- CISTI, Canada Institute for Scientific and Technical Information
- Marine Environmental Data Services, Asheville, North Carolina
- National Oceanic and Atmospheric Administration, Distribution Branch, Riverdale, Maryland
- National Ocean Services Tidal Datum, Quality Assurance Section, Rockville, Maryland
- Zufriendenheit Archaeological Project, St. Thomas, U.S.V.I.
- P. L. Tolson, Tolson Zoo, Toledo, Ohio | <urn:uuid:4f8a14dd-1e4d-4866-9d2e-b4fe6c3b13e7> | {
"date": "2015-08-01T08:58:11",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988598.68/warc/CC-MAIN-20150728002308-00249-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9177665114402771,
"score": 3.53125,
"token_count": 2812,
"url": "https://en.wikipedia.org/wiki/Hans_Lollik_Island"
} |
Fiqh Jafari Jurisprudence
- In Modern Standard Arabic, fiqh has come to mean jurisprudence in general, be it the month of Ramadan, however, it does not define how to perform these duties. .
- GENERAL PRECEPTION OF FATWA AND ITS ROLE IN ISLAMIC
- culminating in the creation of the four Sunni madhhabs and Shi'i Jafari .
- The Reopening of the Islamic Code Introduction
- scholars that Islamic classical jurisprudence (fiqh) must be reformulated to meet ..
- Imam Jafar e Sadiq asws
- Sunni counterparts, under the banner of 'Ijtihad' (jurisprudence). Their wish, together with the tyrant rulers' support led to the formation of 'Fiqh Jafarriya', mainly prompted for recognising the Jafari School within the fold of Sunni Islam .
- Parliamentary Manual
- Jurists the Afghan civil code based on the same Jurisprudence (Fiqh), at the order of King Zahir .
- the future of Ijtihad in Modern islamic thought
- No Jurisprudence Without a New Interpretive Theory. Ijtihad cannot worldwide. The introduction to Fiqh al-Sunnah is written by Hassan al-Banna himself, ..
- Ja'fari jurisprudence - Wikipedia, the free encyclopedia
- One as Conventional Fiqh and another as Dynamic Fiqh.
- Fiqh - Wikipedia, the free encyclopedia
- Main article: Usul al-fiqh.
- About | baitulqayem.org
- as a place to conduct religious, educational, charitable and cultural activities according to the Ithna-asheri Shia faith under fiqh-e-Jafaria (Jafari jurisprudence) .
- History of Jafari Jurisprudence
- Mar 27, 2011 Historia ya Fiqh ya Jafari Kitabu kipya kwa sasa kinatolewa na duka la vitabu la Alitrah Muda mchache kitakuwa katika tovuti: www.alitrah.info.
- Fiqh: Definition from Answers.com
- Fiqh Islamic jurisprudence. Fiqh (Arabic: فقه [fiqh]) is Islamic jurisprudence. .
Fiqh Jafari Jurisprudence is described in multiple online sources, as addition to our editors' articles, see section below for printable documents, Fiqh Jafari Jurisprudence books and related discussion.
Suggested Pdf Resources
Suggested Web Resources
Great care has been taken to prepare the information on this page. Elements of the content come from factual and lexical knowledge databases, realmagick.com library and third-party sources. We appreciate your suggestions and comments on further improvements of the site.
Fiqh Jafari Jurisprudence Topics
Related searchesreinsch test
body modification controversy
betsy ross early years
devil may cry story
william henry jackson | <urn:uuid:5d38cdc5-aa93-483a-882c-c78e21970c16> | {
"date": "2014-08-01T09:49:43",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274967.3/warc/CC-MAIN-20140728011754-00426-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8025990128517151,
"score": 2.875,
"token_count": 679,
"url": "http://www.realmagick.com/fiqh-jafari-jurisprudence/"
} |
HIV, AIDS and Hepatitis Awareness
This course aims to develop an understanding of HIV, AIDS and Hepatitis B and C.
The unpredictable nature of the diseases means that the individual's needs can change quickly. This, allied with potential for fear and prejudice, makes this subject an important issue.
This course will assist in the awareness of an organisation's development of good practice within the workplace.
- What is HIV?
- What is AIDS?
- How is HIV passed from person to person?
- Diagnosis & Treatment
- What is Hepatitis?
- Methods of spreading Hepatitis B / C
- Who is at risk?
- How do we protect ourselves? | <urn:uuid:8c98d31c-8d10-4d84-9cf1-64ae309db986> | {
"date": "2018-09-24T05:56:54",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160145.76/warc/CC-MAIN-20180924050917-20180924071317-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8926533460617065,
"score": 3.09375,
"token_count": 146,
"url": "http://tlclearningacademy.com/training-courses.asp?cat=7&id=31"
} |
In theory, the ordinary naked eye three-color vision, to generate blue, green and red wavelengths are three cones. However, the inadequacy of the naked eye is the presence of metamerism color, that colors look the same in spite of, but is actually made up of different spectral composition. In order to break through the “inherent redundancy” of the human eye, researchers from the University of Wisconsin-Madison have developed a device that uses two different transmittance lenses for left and right eyes, effectively triggering a four-color vision by separating short-wave cone response , that is, there are four different types of cells in the eye cone. After wearing glasses, the wearer can distinguish the difference between the metamerism of color, allowing the wearer to see the new color after the naked eye can not see. ray ban sunglasses dillards,Physicist Mikhail Kats told New Scientist: “The naked eye looks exactly the same color, and when you wear your glasses you will find that the two are completely different colors. In nature, there is a more complex visual system like goldfish Of the creature, born with the ability to deal with the extra wavelength in the wear of this glasses, but also gives the human can be comparable to the visual ability of these creatures. This design does not have a significant negative impact on the human body, to help people distinguish between the various blue Color, violet and purple, and we think that additional spectral information can be understood as creating a new set of “primitives” that can be used without the help of a filter to identify the color. This scientific discovery theory Can be divided into a cone or cone combination, in the future to form a maximum of six cone-like vision system.The system allows people based on the launch, reflection, projection spectrum to find the difference between objects, so far not yet found to have any adverse effect on the human body. Finally, the research team said the discovery could very Enhance the ability of human vision, so that human beings have a more accurate way to camouflage detection, and in the arts and data visualization aspects derived more powerful means of security.
With Ray-Ban, bright point of view, and other well-known brands of the world’s largest eyewear manufacturer Lu Xun ladder card group is expected to usher in 2017-2018 accelerated recovery, sales are expected to reach single-digit high to medium growth. Luxottica (LUX.MI), the world’s largest manufacturer and retailer of eyewear, has just released its semi-annual report, declining both its sales and profits in the first half of 2016 and cutting its full-year revenue forecast. This is the first time that Italian companies with well-known brands such as Ray-Ban, Oakley and LensCrafters have fallen for the first time in nearly a decade.
According to earnings reports, due to the second quarter, weak revenue, as of June 30 this year, six months, Lu Xun ladder card adjusted revenue of 4.719 billion euros (about 34.604 billion yuan), down 0.7%; adjusted hair Profits of 3.108 billion euros (about 22.79 billion yuan), ray ban sunglasses deals online,down 2.9%. Lu Xun ladder card announced this year’s sales growth forecast, from early March to develop 5% -6%, down to 2% -3%. Founded in 1961 Lu Xun ladder card’s main business, including glasses and sunglasses design, production, wholesale, trade and retail, vertical coverage of the whole industry chain. In addition to its own brand of Ray-Ban, Oakley glasses, and bright point of view, Sunglass Hut chain stores such as retail stores, it also includes Giorgio Armani, Tiffany & Co., Prada, Coach, Dolce & Gabbana, Chanel, DNKY and so the vast majority of luxury brands OEM glasses and sunglasses. North America is Lu Xun ladder card’s largest market, its contribution to the turnover of more than Liu Cheng. However, the first half of this year, due to macro consumption sluggish and bad weather, including Ray-Ban sunglasses in the region, including poor sales, adjusted net sales fell 2.7%. In addition, the Lu Xun ladder card on the Ray Ban and other brand dealers a strong control also directly affected its performance. Dealers only after the company’s consent before they can carry out discount promotions. In March this year, Lu Xun ladder card into 1.5 billion euros (about 11 billion yuan), to optimize the retail channels and in the field of e-commerce expansion, in response to sustained slowdown in profit growth. The mid-year report also said that the reporting period included a sum of about 66 million euros (about 484 million yuan) in one-time expenditure for last year’s acquisition of sports eyewear brand Oakley after the layoffs compensation and channel adjustment. After 2005, Lu Xun ladder through the acquisition of Beijing Xueliang, Guangzhou Ming Gallery and Shanghai modern optics and other domestic optical shop chain, to enter the Chinese mainland market. The Daily News pointed out that thanks to a strong sales network and favorable exchange rate changes, Lu Xun ladder card in the first half of this year to maintain growth in the Chinese market. During the reporting period, Lu Xun ladder card in the Chinese mainland opened nine Direct brand stores, and the brand in the Chinese market is optimistic about the future development. Last November, Lu Xun Ti card in the Chinese mainland, Hong Kong and Southeast Asia to adjust the recommended retail price, to gradually reduce its brand China and the international market price difference. Paolo Ciarlariello, president of Greater China, Lu Xun Tikka Group, said that China is one of the group’s most important markets, the proposed retail price adjustment for the Chinese customers to provide the right price, and brand and product experience , Thereby enhancing customer loyalty. Recently, Lu Xun ladder card management personnel are also frequent changes. In January this year, Lu Xun Tikka abolished the then chief executive Adil Mehboob-Khan. This is the company nearly 17 months to leave the third CEO. Currently, Leonardo Del Vecchio, the 81-year-old founder and controlling shareholder, returned to management as Executive Chairman.
The company is expected to usher in 2017-2018 accelerated recovery, sales are expected to reach single digits to high segment growth. However, Chief Financial Officer Stefano Grassi also said that Lu Xun ladder card is difficult to predict whether the realization of the next two years of revenue targets because of the recent turmoil in the international security situation on the tourism and retail industry impact.
The end of 2014, Oakley will invest in China for the first winter snow sports spectrum Ruizhi lens technology market, won the praise of athletes and sports enthusiasts, have praised it as “resort wear to understand the weapon”; 2015 brand in the Chinese market matures; 2016 spectrum Ruizhi lens technology in the Chinese new release, Release more segments of sports glasses environmental applications, including road, mountain, golf and city and other scenes. Spectrum Ruizhi lens after the world’s leading science and technology laboratory and field testing to ensure application performance and reliability of the technology; optimization based on the molecular level to achieve the optics, the lens itself so seamless, but let the athletes’ put to understand ” Cave instant clarity of vision unprecedented detail. Seeing is believing, improve performance: fine-tuning and optimization of visual contrast, spectral Ruizhi lens technology will visually imperceptible details clearly displayed. Whether in the mountains, roads, water, golf course or on the track, spectrum Ruizhi lens SCIENCE athletes and sports enthusiasts can make faster and more keen to see the details, so as to enhance athletic performance. | <urn:uuid:275b099b-0b36-4d40-82a8-074855ff2445> | {
"date": "2017-06-25T20:42:08",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00097.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9380336999893188,
"score": 3.34375,
"token_count": 1614,
"url": "http://www.namtech.co.uk/?tag=ray-ban-sunglasses-dealers"
} |
Bowles, M.L. & R.H. Thom. 1981. Endangered and threatened birds. Pages: 34-58 in Bowles, M.L., V.E. Diersing, J.E. Ebinger, & H.C. Schultz, editors. Endangered and threatened vertebrate animals and vascular plants of Illinois. Illinois Department of Conservation, Springfield, and Natural Land Institute, Rockford.
McEachern, K., M. Bowles, & N. Pavlovic. 1994. A metapopulation approach to recovery of the federally threatened Pitcher's thistle (Cirsium pitcheri) in southern Lake Michigan dunes. 1994. Pages 194- 218 in M. Bowles, & C. Whelan (editors), Restoration of Endangered Species: conceptual issues, planning and implementation. Cambridge University Press. pdf
Bowles, M.L. & J.L. McBride. 1996. Status and structure of a Pitcher's thistle (Cirsium pitcheri) population reintroducted to Illinois Beach Nature Preserve. Pages 194-218 in, D.Falk, C. Millar, P. Olwell (Eds, Restoring Diversity: Ecological Restoration and Endangered Plants. Island Press. pdf
Pavlovic, N.B. & M.L. Bowles. 1996. Rare Plant Monitoring at Indiana Dunes National Lakeshore. Pages 253-280 in, W.L. Alverson & G.E. Davis (Eds), Science & Ecosystem Management in the National Parks. Univerisity of Arizona Press, Tucson. pdf
Anderson, R.C. & M.L. Bowles 1999. Deep-soil savannas and barrens of the midwestern United States. pages 155-170 in, R.C. Anderson, J. Fralish, & Jerry Baskin (editors), The savanna, barren, and rock outcrop communities of North America. Cambridge University Press. pdf
Bell, T.J., M.L. Bowles, & K.A. McEachern. 2003. Projecting the Success of Plant Population Restoration with Viability Analysis. Pages 313-348 in, C.A. Brigham & M.W. Schwartz (Eds), Population Viability in Plants. Springer-Verlag, Berlin, Heidelberg. pdf | <urn:uuid:ef8f5812-1d03-40a2-96ea-5777c55350f7> | {
"date": "2017-04-30T22:37:55",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00591-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.6927938461303711,
"score": 2.828125,
"token_count": 506,
"url": "http://plantconservation.us/books.html"
} |
Nearly 55,000 adults in Southwest Utah are unaware they have prediabetes. Many of them will become diabetic within a few years if they make no lifestyle changes.
In the last 20 years, the number of adults diagnosed with diabetes has more than tripled as the American population has aged and become more overweight and obese. In Southwest Utah, about 60% of adults are either overweight or obese which is a leading risk factor in Type 2 diabetes.
What is Diabetes?
There are three main types of Diabetes:
Type 1 Diabetes is caused by an autoimmune reaction (the body attacks itself by mistake) that stops your body from making insulin. About 5% of the people who have diabetes have type 1. Symptoms of type 1 diabetes often develop quickly. It’s usually diagnosed in children, teens, and young adults. If you have type 1 diabetes, you’ll need to take insulin every day to survive. Currently, no one knows how to prevent type 1 diabetes.
With Type 2 Diabetes, your body doesn’t use insulin well and is unable to keep blood sugar at normal levels. About 95% of people with diabetes have type 2 diabetes. It develops over many years and is usually diagnosed in adults (though increasingly in children, teens, and young adults). You may not notice any symptoms, so it’s important to get your blood sugar tested if you’re at risk. Type 2 diabetes can be prevented or delayed with healthy lifestyle changes, such as losing weight if you’re overweight, healthy eating, and getting regular physical activity.
Gestational Diabetes develops in pregnant women who have never had diabetes. If you have gestational diabetes, your baby could be at higher risk for health complications. Gestational diabetes usually goes away after your baby is born but increases your risk for type 2 diabetes later in life. Your baby is more likely to become obese as a child or teen, and more likely to develop type 2 diabetes later in life too.
What are the complications of Diabetes?
Complications from diabetes include heart disease, stroke, vision loss, nerve damage, kidney disease, and amputations. In addition, diabetes puts you at risk for gum disease, hearing loss, Alzheimer’s disease, and depression.
Complications usually develop over a long time without any symptoms. That’s why it’s so important to make and keep doctor and dentist appointments even if you feel fine. Early treatment can help prevent or delay diabetes-related health conditions and improve overall health.
What does it mean to have Prediabetes?
Prediabetes means your blood glucose (sugar) is higher than normal, but not yet diabetes. Approximately 84 million American adults—more than 1 out of 3—have prediabetes. Of those with prediabetes, 90% don’t know they have it. Prediabetes puts you at increased risk of developing Type 2 Diabetes.
The good news is that if you have prediabetes, you can make lifestyle changes to prevent or delay type 2 diabetes and other serious health problems.
What causes Prediabetes?
Insulin is a hormone made by your pancreas that acts like a key to let blood sugar into cells for use as energy. If you have prediabetes, the cells in your body don’t respond normally to insulin. Your pancreas makes more insulin to try to get cells to respond. Eventually your pancreas can’t keep up, and your blood sugar rises, setting the stage for prediabetes—and type 2 diabetes down the road.
Am I at risk of Prediabetes?
If you are overweight, 45 years or older, have a parent or sibling with type 2 diabetes, not physically active, or had diabetes during pregnancy or gave birth to a baby who weighed more than 9 pounds you may be at risk of developing prediabetes. Race and ethnicity are also factors.
Take the Prediabetes quiz to find out if you are at risk for prediabetes.
What can I do to reduce my risk of Type 2 Diabetes?
If you have prediabetes, losing a small amount of weight if you’re overweight and getting regular physical activity can lower your risk for developing type 2 diabetes. A small amount of weight loss means around 5% to 7% of your body weight, just 10 to 14 pounds for a 200-pound person. Regular physical activity means getting at least 150 minutes a week of brisk walking or a similar activity. That’s just 30 minutes a day, five days a week.
In Southwest Utah, we are fortunate to have many resources available to care for diabetes and help prevent type 2 diabetes and other serious health problems. All of the resources listed on these guides are either free, evidence-based, ADA Recognized, AADE Accrediated, and/or an established Healthy Living Program. Please see our Diabetes and Prediabetes Resource Guides. It is really important to regularly make and come prepared to all your healthcare appointments.
Contact us for additional information!
Jeff Smith, MPA
Diabetes Program Development Manager
620 South 400 East Ste 362
St. George, UT 84770 | <urn:uuid:da0fc25c-9ef5-4202-b5af-267780519e40> | {
"date": "2019-04-26T00:34:58",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578743307.87/warc/CC-MAIN-20190425233736-20190426015736-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9277252554893494,
"score": 3.296875,
"token_count": 1062,
"url": "https://swuhealth.org/diabetes/"
} |
عنوان مقاله [English]
نویسندگان [English]چکیده [English]
Todays applying concrete structures is more usual than other structures which are used in buildings as in most of the world’s countries the application ratio of concrete to steel has increased from 10 to 1. Sometimes these structures require strengthening vulnerable members because of deficiency in their loading system in usual and critical conditions. There are different methods for strengthening these members. One of them is developing dimension of section by fresh concrete. In this method, the cohesion extent of fresh concrete to hardened concrete has significant role in force transfer.In this experimental project, the bond stress created between hardened concrete (core) and fresh concrete (screen) in core samples was measured and the effect of changing three factors was investigated that they are the length of sample, screen thickness, and 28 days compressive strength of screen concrete on bond stress. The push-out method was applied in this experiment for cracking the samples. | <urn:uuid:8d8242b8-eab6-47fa-a72f-4de650cf7cd5> | {
"date": "2020-01-25T14:27:46",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251672537.90/warc/CC-MAIN-20200125131641-20200125160641-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9494103193283081,
"score": 2.984375,
"token_count": 216,
"url": "http://civil-strj.iau-maragheh.ac.ir/article_520161.html"
} |
"It's fall. It's time to get the flu shot, not the flu." says Carla Bush, a family and consumer sciences agent with University of Tennessee Extension in Cannon County. The Centers for Disease Control and Prevention recommends that everyone 6 months of age and older get vaccinated every year to prevent getting the flu.
"Avoiding the flu is important, not only to protect your health but also that of family members," says UT Extension Family and Consumer Sciences health specialist Bobbi Clarke. "The flu is a highly contagious respiratory disease caused by influenza viruses and can make you feel miserable. Fever, cough, shaking chills, body aches and extreme weakness are common symptoms. So getting a flu shot is wise thing to do."
While everyone should get the flu shot, there are groups who need this vaccine to avoid developing serious complications from the flu. These include adults age 65 and older, young children under 5 years of age, pregnant women and people with certain health conditions, such as asthma, diabetes or heart disease, and persons who live in facilities like nursing homes.
The experts recommend that you get vaccinated as soon as the vaccine becomes available in your community. Flu season can begin as early as October and last as late as May. Allow about two weeks after vaccination for antibodies to develop and provide protection.
Clarke says you should consult your doctor before getting the shot if you have:
- A serious allergic reaction to eggs or a previous dose of the flu vaccine.
- A history of Guillain-Barre Syndrome.
- An illness with a fever.
The influenza vaccine is not approved for use in children younger than 6 months of age. Contact your insurance carrier to find out if the shot is covered. If you are a beneficiary of Medicare, Part B will pay for the shot when given at approved locations.
The experts also remind everyone that the best ways to avoid spreading germs during the flu season include:
- Covering your nose and mouth with a tissue when you cough or sneeze.
- Washing your hands often with soap and water.
- Avoiding touching your eyes, nose and mouth.
- Avoiding close contact with sick people.
- Staying at home when you are sick.
UT Extension provides a gateway to the University of Tennessee as the outreach unit of the Institute of Agriculture. With an office in every Tennessee county, UT Extension delivers educational programs and research-based information to citizens throughout the state. In cooperation with Tennessee State University, UT Extension works with farmers, families, youth and communities to improve lives by addressing problems and issue at the local, state and national levels.
Carla Y. Bush, MVTE
UT Extension, Cannon County
Family and Consumer Sciences
614 Lehman Street
Woodbury, TN 37190 | <urn:uuid:29dd1fff-a6b0-4646-a060-06381162cdff> | {
"date": "2017-07-27T18:53:12",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429417.40/warc/CC-MAIN-20170727182552-20170727202552-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9458280205726624,
"score": 3.09375,
"token_count": 569,
"url": "http://www.cannoncourier.com/bush-get-your-flu-shot--cms-11471"
} |
Our modern science owes a great bit of gratitude to Freemasonry and the Hermetic Arts. It was common throughout history, for any new scientific ideas to be censored or destroyed by the mainstream. We know today that this type of research is necessary for our advancement as a culture, but in ancient times it was frowned upon by the clergy and the monarchy. Organized Societies that had an interest in alchemical practices and the Hermetic Arts acted as safe havens for people with progressive ideas. Groups such as the Rosicrucian’s and the Royal Society were among these champions of science. People within these groups were experimenting with astronomy, physics, and alchemy, which was to become the basis for our modern chemistry. They allowed these people to express new ideas without the fear of being burnt at the stake!
In the excellent: The Shadow of Solomon by Laurence Gardner,the origins of Speculative, or symbolic Freemasonry are explored in detail. Where the rituals and practices used in modern Masonry originated from is still up to debate, but we know at some point, Masonry went from being an artisan trade group to being the philanthropic and philosophic society that it is today. Early Masonic and Hermetic luminaries in the scientific fields such as Francis Bacon and Isaac Newton were members of these societies. Gardner points out that the Royal Society, which was a scientific-based organization, was formed by early speculative Freemasons. One of which was the enigmatic Robert Boyle. Boyle, along with Christopher Wren helped found the Royal Society. Boyle was an alchemist who was searching for The Philosopher’s Stone (and just may have found it!). He is most well known for his scientific works of studying the volumes of gases and the elasticity of air. Boyle’s Law according the Wikipedia article, states that the absolute pressure and volume of a given mass of confined gas is inversely proportional, if the temperature remains the same. Boyle was able to discuss his findings with other members of the Royal Society and to advance his ideas.
Sir Isaac Newton was another Renaissance luminary that championed Freemasonry, and the Royal Society. Garnder points out that Newton was highly involved in alchemical and hermetic works. He was an early translator of the Hermetic Emerald Tablet that was the basis of Alchemy. He also became obsessed later in life, with the proportions and dimensions of Solomon’s Temple as referred to in the Bible and in Masonic ritual. In the scientific field, Newton explained the laws of gravitation and confirmed with Kepler’s beliefs that the Sun was the center of our solar system. These principles were to start a new scientific revolution.
These scientists were able to work and prosper, while being hidden from the almighty fist of the monarchy. We have these tolerant societies to thank for this. They understood the importance of this ancient wisdom, passed through time to us from the Mystery Schools. They knew that by looking back at the works of the great minds of antiquity, advances could be made in the current day. This is something that we have seemed to have lost a grasp of until very recently. We are slowly dissolving this amnesia of ancient wisdom, to make our own advances in science and technology today. Science wouldn’t be what it is today without these brave pioneers who kept up their work, even though it could have gotten them executed. They were Alchemists, Hermeticists, and Freemasons. | <urn:uuid:6a09cf7e-80c8-4af3-8f24-b12cd75deacc> | {
"date": "2017-07-22T08:37:38",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423927.54/warc/CC-MAIN-20170722082709-20170722102709-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9821333289146423,
"score": 3.0625,
"token_count": 699,
"url": "https://thepointofasharpinstrument.wordpress.com/2013/01/09/esoteric-wisdom-and-the-birth-of-modern-science/"
} |
Sociologists at Lancaster University are leading an international research project, launching this week, which explores lessons for 'low carbon innovation' from the world's biggest polluter.
The £500k UK-China collaboration will look into the implications of low-carbon ‘transitions’ in China, the world's largest carbon dioxide emitter.
To mitigate climate change worldwide we need to transform the way we power our homes, travel and feed the planet's ever-growing population. Decisions made in China on these issues are crucial as they will have an impact on the rest of the world.
With China throwing state support behind electric vehicles, solar energy and next-generation agricultural technologies, where bottom-up successes in electric two-wheelers, solar thermal and agro-ecological farming have also emerged, now is the time to understand the crucial impact of social and political issues on the successes and failures of low carbon innovations.
The Economic and Social Research Council-funded project 'Low Carbon Innovation in China – Prospects, Politics and Practice' will offer in-depth academic analysis seeking to inform opportunities for low-carbon transitions in China and beyond, with case studies spanning energy, mobility and agriculture.
Dr David Tyfield, Co-Investigator of the project, said: "The success or failure of low carbon innovations rests not on how superior the technology is, but on how people use the technology and the issues of power that surround it.
“Sometimes the most productive innovations do not involve high-tech. For example, electric vehicles are a top government priority in China but they’re just not selling. Conversely, putting an electric motor on a bike is cheap available technology but it’s a runaway success. It’s not new technologically but the way it is being used has potential to change the way people live their lives.
"This project is exploring these crucial social dynamics where they are arguably of greatest significance for global prospects of a 21st century shift to sustainability: China."
This new three-year project is an international collaboration between researchers in the UK and at leading institutions in China, led by Professor John Urry at Lancaster University. | <urn:uuid:da9a67d1-a9aa-45af-8a1e-f5e0e86e4f10> | {
"date": "2014-04-19T14:50:21",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537271.8/warc/CC-MAIN-20140416005217-00091-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9183297753334045,
"score": 2.546875,
"token_count": 441,
"url": "http://www.lancaster.ac.uk/news/articles/2013/can-chinese-innovation-help-address-the-climate-crisis/"
} |
February 24, 2010
The Real Have-Nots In Confederation: British Columbia, Alberta and Ontario
This policy study analyzes Canada’s equalization program to compare government services in the have and have-not provinces to discover if the residents in recipient provinces end up with more-generous public services than those who pay part of the bill, i.e., those in the have provinces whose tax transfers subsidize the former.
For the purposes of a longer-term look at equalization, Ontario is treated as a have province in this analysis despite the fact that it is receiving equalization payments in 2009-2010. This study considers it a have province because these payments are small relative to population and, taken together with other transfers, Ontario still contributes substantially more money to the federation than it receives in transfers and federal services.
Similarly, while Newfoundland has technically not received any equalization payments since the 2007-2008 budget year, it receives payments akin to equalization under a 1985 accord that will total $465-million in the current fiscal year (2009-2010). In broad terms, over the last three decades, British Columbia, Alberta and Ontario have been the main contributors to equalization (with a further qualification that British Columbia briefly received equalization early in this century). The other provinces have been the recipients.
How the have provinces lose out under equalization
The evidence presented in this paper strongly suggests that, in many important areas, levels of government service in the traditional and largest have provinces such as British Columbia, Alberta and Ontario are significantly below those that exist in most recipient provinces. Specifically, the data suggest that large transfers allow recipient provinces to spend more freely on a range of government services including health and education.
A comparison between British Columbia, Alberta and Ontario on the one hand and Quebec on the other in terms of government service levels helps to illustrate this point. Quebec is the largest recipient of equalization money; it will receive almost $8.4-billion in 2009-2010 out of a total equalization budget of $14.2-billion for the six receiving provinces, or 59 per cent of all equalization transfers. The billions of dollars in equalization transfers received by Quebec each year from taxpayers in British Columbia, Alberta and Ontario (and as of late, Saskatchewan and Newfoundland) are used to provide service levels far beyond what is provided in the paying provinces.
View entire study as PDF (39 Pages)
is Assistant Research Director and Senior Policy Analyst at the Frontier Centre for Public Policy. Ben holds a Masters Degree in Public Policy from the University of Toronto’s School of Public Policy and Governance. Since joining Frontier in 2009, Ben has completed major research papers on a wide variety of policy issues. He has authored papers on early childhood education policy, university tuition policy and Canadian fiscal federalism, among other topics. He is the lead researcher for Frontier’s two major inter-jurisdictional comparisons of healthcare system performance. Ben has co-authored a number of policy studies about environmental policy with Dr. Kenneth Green of the American Enterprise Institute. Ben has presented the findings of his research in dozens of radio and television interviews, and his op-ed commentaries have been published in the National Post as well as in major regional newspapers including the Winnipeg Free Press, the Calgary Herald, The Gazette and the Toronto Sun.
Click for a high-res photo | <urn:uuid:a16f871d-80fc-43cb-8f5c-83bdde65d79d> | {
"date": "2013-05-19T10:35:19",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9541498422622681,
"score": 2.625,
"token_count": 685,
"url": "http://www.fcpp.org/publication.php/3196"
} |
Neutrino pioneer wins 2001 National Medal of Science
May 10, 2002
The 2001 National Medal of Science has been awarded to Raymond Davis – who discovered the 'solar neutrino problem' – for his lifelong contribution to neutrino astronomy. Marvin Cohen also receives the medal in recognition for research into condensed matter spanning nearly forty years. Fifteen scientists are to receive the medal, which is the highest honour for lifetime achievement in the sciences in the US.
Davis began his research career at Brookhaven National Laboratory in 1948 after receiving his doctorate in physical chemistry from Yale University. He initially studied neutrinos created in the research reactor at Brookhaven, but the technology available at the time could not detect the neutrinos that physicists believed were generated by nuclear reactions in the Sun.
In the 1970s, Davis tackled this problem by developing an experiment in which solar neutrinos interacted with the chlorine nuclei in a 100 000-gallon tank of dry-cleaning fluid to produce radioactive argon. The tank was placed in a disused gold mine to protect it from the cosmic rays that had prevented scientists detecting solar neutrinos at ground level. Davis went on to confirm that the Sun produced neutrinos, but the discrepancy between the number of neutrinos expected and that observed – which became known as the solar neutrino problem – was only resolved last year.
Davis’ research took him to the University of Pennsylvania in 1984. Among other prizes, he received the 2000 Wolf Prize for his contributions to neutrino physics.
Marvin Cohen’s career began in 1963 after he completed his PhD at the University of Chicago. After spending a year at Bell Labs, he was made a senior scientist at Lawrence Berkeley National Laboratory, a position he still holds. In 1969, he also became professor of physics at the University of California at Berkeley, and has held the post of university professor since 1995.
In the course of his career, Cohen has published nearly 600 research papers on electronic and structural effecst in semiconductors and superconductors, and has received numerous awards.
About the author
Katie Pennicott is Editor of PhysicsWeb | <urn:uuid:4d4a61ea-aa28-474b-a34f-a2af32a798fc> | {
"date": "2015-08-02T08:29:39",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989018.48/warc/CC-MAIN-20150728002309-00133-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9794011116027832,
"score": 3.015625,
"token_count": 443,
"url": "http://physicsworld.com/cws/article/news/2002/may/10/neutrino-pioneer-wins-2001-national-medal-of-science"
} |
INVESTIGATE:Why did the boycott of Montgomery's buses succeed? (Read each source below, then answer the questions in the notebook. Ask your teacher for an inquiry organizer worksheet to help you think about the ways that the sources support and contradict each other.)
READ: Bayard Rustin's diary
Head Note: Bayard Rustin, an African American civil rights activist, traveled to Montgomery to advise Dr. King and support the bus boycott. Though he was eventually asked to leave Montgomery because leaders feared his reputation as a gay Communist would hurt the movement, he kept a diary of what he found.
42,000 Negroes have not ridden the busses since December 5. On December 6, the police began to harass, intimidate, and arrest Negro taxi drivers who were helping get these people to work. It thus became necessary for the Negro leaders to find an alternativeó-the car pool.1 They set up 23 dispatch centers where people gather to wait for free transportation.
This morning Rufus Lewis, director of the pool, invited me to attend the meeting of the drivers. On the way, he explained that there are three methods in addition to the car pool, for moving the Negro population:
2) The transportation of servants by white housewives.
Later he introduced me to two men, one of whom has walked 7 miles and the other 14 miles, every day since December 5.
"The success of the car pool is at the heart of the movement," Lewis said at the meeting. "It must not be stopped."
I wondered what the response of the drivers would be, since 28 of them had just been arrested on charges of conspiring to destroy the bus company. One by one, they pledged that, if necessary, they would be arrested again and again.
1The idea for a car pool came from leaders of the African American community in Baton Rouge who had organized a bus boycott in 1953.
USE THE NOTEBOOK (instructions):
To answer these questions, log in below | <urn:uuid:cf6e1e54-c4ea-4089-b14f-281bd1171d57> | {
"date": "2013-12-09T07:08:38",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163932627/warc/CC-MAIN-20131204133212-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9726678729057312,
"score": 3.265625,
"token_count": 414,
"url": "http://historicalthinkingmatters.org/rosaparks/0/inquiry/main/questions/25/"
} |
Multiplying and Dividing Exponents: To Add or Not to Add
Lesson 1 of 7
Objective: SWBAT interpret complex expressions and apply algebraic properties to simplify and evaluate expressions involving exponents .
The purpose of the Entry Ticket: Exponents is to activate students’ prior knowledge about working with exponents and expressions. I start by having students work on the Entry Ticket as soon as they enter the class – as the year has progressed it has become more and more automatic that students take out their binders and get to work on the Entry Ticket rather than milling around or socializing. This also frees up a couple of quick minutes for me to take care of housekeeping (attendance, etc.) and not waste valuable instructional time.
I typically give students a 2 minute warning so they know we will be talking as a group soon. About 5 minutes into class, I ask students to talk and turn to a partner about the Entry Ticket, specifically to converse about how they solved the problem and to identify the rules used to solve each problem. We then review the Entry Ticket as a class and ask groups to share out any discrepancies/errors and how to correct them.
I then turn my attention to the agenda board which has the lesson and language objectives, agenda and homework written on it. We review the objective as a class, and I talk about how this lesson’s objective fits into the bigger objectives of the unit (to support students who have difficulty seeing the big picture and/or shifting back and forth between the gestalt and the details of lessons and units). I typically have students write down the homework assignment during this time and hand out copies of the homework, but have students file the homework in their binders (I have also had classes where having the homework was too much of a distraction – in these cases I handed the homework out at the end of class).
The lesson objective is referred to with verbal and non-verbal cues throughout the lesson to contextualize the lesson for students. I ask students what they think they will need to do in order to be successful and meet the day’s objective. The reason for this is to scaffold and model metacognitive strategies in the hopes of students learning these skills and using them with increasing independence. After the day’s agenda has been reviewed, the class shifts to the middle of the lesson.
● Extensions and Scaffolds: I like to add in peer editing and feedback for the writing portion of this lesson ideally for all students, but often there is not enough time. So, adding the peer reflection piece as an extension for students who have completed the written response can be a quick and easy way to keep all students engaged in learning and on relevant material that is still tied to the objective of the lesson.
● Environment for this lesson: This lesson is taught as a 90 minute block. I like having students seated in groups of 2 or 4, mainly to provide more opportunities for students to have academic conversations with each other.
● Tools and Instructional Technology or Software:
SmartBoard, Khan Academy, Calculator, Word Processor (optional, for written responses)
To begin this section of class, I cue students to make sure they all have their binders and something to write with. I also explicitly tell students they need to take notes on the video we are about to watch (I recently have realized that I have a deeply engrained assumption that most students know when I want them to take notes, but in reality the majority of my 9th graders need explicit instruction of not only when to take notes, but how to take notes. I recommend to students that they take notes in two-column format, with the term or example on the left column and notes, definitions work on the right column. In addition the top of the notes should always have a clear topic, which I try to provide each class and the date. At the conclusion of the note-taking, I have students write a “Elevator Ride” statement at the end of their notes to support them in paraphrasing/identifying the main idea(s) of the session.
Once students are all set up with their notes I write the topic for the day “Multiplying and Dividing Exponents” on the board and ask them to be sure to have that as their topic for their notes. I then let students know we will be watching a video on the topic and that they should be taking notes and that I will be asking questions throughout the video.
I show the Khan Academy video on “Exponent Rules Part 1”
Reviewing Notes: After showing the video for part 1, I ask students to complete the following protocol: 2 minutes to add more details to their notes, 3 minutes sharing their notes with a partner (during this time the partner adds to/revises their notes), and 3 minutes flipping roles (the partner who initially revised now reviews their notes while the other partner now revises their notes). The intent of this protocol is to engage students in academic conversations with each other, but perhaps more importantly is to provide students with an immediate and different perspective on the important aspects of the video and the mathematics behind it.
I ask students if they have any additional questions, including if they would like to review one of the examples from the video or review an additional practice problem similar to the ones on the video on the SmartBoard as a class.
For the next section of class, students work on a problem set in small groups. I like to give problems that are a mix of similar to those in the focus lesson/explicit instruction section as well as problems that have anew or different twist to them.
For example, the Regents Exam Prep Center has a nice set of Practice Problems that students can practice. The problems can be projected on the white board, or students can work on the problems individually or in pairs online if there is access to technology (laptop, ipad, iphone, etc.) and the internet in the classroom.
I want students to be pushed to apply what they know to new situations and not simply be able to show they can follow the mathematical rules in isolation.
Additional Support/Instruction: sometime teach a second section of explicit instruction utilizing Khan Academy as a technology resource. 2nd Chunk - Kahn Academy Video, Part 2 (10 minutes) and Reviewing Notes (10 minutes): I then show the Khan Academy video “Exponent Rules Part 2
Reviewing Notes: have students follow the same protocol from the first video to check each other’s notes in pairs (2 minutes to silently review their own notes, and then 3 minutes sharing while the partner revises, and 3 minutes with roles reversed).
Independent Practice: Quiz
For independent practice, students complete a short quiz (Quiz: Multiplying and Dividing Exponents) that is aligned to the day's learning objectives.
If students complete the quiz early, I provide an answer key and have them self-correct the quiz and also try to identify where in the process they made mistakes and how to correct them. I also like to review the answers at the close of the class and take a quick poll to identify the 1 or 2 problems that a. students did well on (to celebrate) and b. the class struggled with and then re-teach right then and there to provide some immediate and constructive feedback.
In this activity students are asked to engage in the all important task of paraphrasing and summarizing information. To accomplish this task, students are asked to complete the Exit Ticket: Focus on Summarizing in partners in response to the prompt: “Summarize the key ideas in class today. Provide examples to back up your claims.”
Students are expected to write out a 1-2 paragraph response based on the Idea Organizer they completed earlier for homework. The intent is to get students to use the content reviewed in class in multiple language domains, including listening, speaking, reading and writing. Of all the tasks, writing is the most difficult for many students because it is not something that is automatically learned and something that requires a great deal of cognitive energy. | <urn:uuid:8f640bf4-11e1-42f1-b6df-1b09f5c3889b> | {
"date": "2018-07-21T09:50:29",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592475.84/warc/CC-MAIN-20180721090529-20180721110529-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9593161940574646,
"score": 3.34375,
"token_count": 1678,
"url": "https://betterlesson.com/lesson/resource/2756802/exit-ticket-focus-on-summarizing"
} |
A new technology could map Neuron wiring, the brain comprises billions of neurons wired in complex webs and conversing through electric pulses and chemical impulses. Although neuroscientists have made improvement in understanding the brain’s many functions – such as regulating sleeping, storing recollections, and making decisions – visualising the complete “wiring diagram” of neural contacts within a brain is extremely hard using available methods.
Using Drosophila fruit flies, research workers at California Institute of Technology (Caltech) in America have developed a strategy to easily see neural contacts and the circulation of communications within living flies.
The research, published in the journal eLife, is a step of progress toward building a map of the complete take a flight brain’s many contacts, that could help researchers understand the neural circuits within individuals brains as well. “If a power engineer wants to comprehend what sort of computer works, the initial thing that he/she would like to find out is how the several components are wired to one another,” said Carlos Lois, research teacher at Caltech.
“Similarly, we must know how neurons are wired together in order to understand how brains work,” he said. When two neurons connect, they link together with a structure called a synapse, space through which one neuron can send and receive electrical and chemical signals to or from another neuron. Even if multiple neurons are very close together, they need synapses to truly communicate.
Researchers developed a way for tracing the flow of information across synapses, called TRACT (Transneuronal Control of Transcription). Using genetically engineered Drosophila fruits flies, TRACT allows researchers to see which neurons are “talking” and which neurons are “listening” by promoting the linked neurons to create glowing proteins.
With TRACT, whenever a neuron “talks” – or transmits a chemical or electrical signal across a synapse – it will produce and send along a fluorescent protein that illuminates both talking neuron and a specific colour.
Any neurons “listening” to the signal receive this protein, which binds to a so-called receptor molecule – genetically built-in by the research workers – on the obtaining neuron’s surface. The binding of the signal protein triggers the receptor and causes the neuron it is mounted on in order to create its own, in another way coloured fluorescent health proteins. In this manner, communication between neurons becomes obvious.
Using a type of microscope that can peer by way of a thin window installed on the fly’s brain, the researchers observe the colourful glow of neural connections instantly as the take fly grows, moves, and experience changes in its environment.
Source- DD News | <urn:uuid:040472dd-173d-4e3a-9986-a11c3f49bb25> | {
"date": "2018-02-19T07:52:26",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812556.20/warc/CC-MAIN-20180219072328-20180219092328-00256.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9370477199554443,
"score": 3.890625,
"token_count": 559,
"url": "https://contentbuket.com/technology/map-brain-wiring/"
} |
We have begun our final writing unit: Realistic Fiction! First graders are just beginning their first attempts at writing fictional stories and it is very exciting! We are trying to write realistic fiction, focusing on coming up with a character, a setting and of course a problem, some trouble, or an adventure that the main character encounters. This is tricky stuff! But so far they are showing that they have gumption and giving it a go! | <urn:uuid:68ec2034-4b83-4591-957b-344f9ec5b5c8> | {
"date": "2017-11-19T03:08:58",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805265.10/warc/CC-MAIN-20171119023719-20171119043719-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9704339504241943,
"score": 2.625,
"token_count": 89,
"url": "http://respurvee1.blogspot.com/2015/05/writing-fiction-stories.html"
} |
Biofilm formation by Campylobacter jejuni in controlled mixed-microbial populations : a thesis presented in partial fulfillment of the requirements for the degree of Master of Technology in Food Technology at Massey University, Palmerston North, New Zealand
Poultry meat consumption in New Zealand has been increasing since 1975 with the
highest peak reported in 2006. The total poultry meat consumption was 36.5 kg per capita in the year ending September 2006. Consumption of contaminated food with raw poultry can lead to campylobacteriosis, which is a food-borne disease that causes gastroenteritis in humans and it is a major problem in New Zealand. There were 12,776 reported cases of campylobacteriosis in 2007, which accounts for 65.9% of the overall notified diseases.
Campylobacteriosis can lead to Guillain-Barré syndrome in some patients, an
autoimmune disorder of the peripheral nervous system. Campylobacteriosis is caused by consumption of either Campylobacter jejuni or Campylobacter coli. Campylobacter spp. have been found in commercially raised poultry being infected predominantly by C.
jejuni. C. jejuni has been found associated with biofilms of other bacterial species in the watering supplies and plumbing systems of animal husbandry facilities and animalprocessing plants. A biofilm is an assemblage of microbial cells that is associated with a surface and the cells are enclosed in a matrix of polysaccharides, which provides a survival advantage to the bacteria in the film. In this study, the ability to form biofilm was measured in a laboratory assay using microtitre plates. C. jejuni strains in monoculture were shown to attach to the abiotic surface and form biofilms to various degrees, thus potentially enhancing their survivability in the poultry environment. C. jejuni was also shown to have the ability to attach and survive in mixed-microbial populations. Biofilm formation may play a role in the epidemiology of C. jejuni infections. Enterococcus faecalis and Staphylococcus simulans may play a role in the biofilm formation in the poultry environment as both of these microorganisms were able to form, and harbour C. jejuni in their biofilms. Pseudomonas aeruginosa seemed to inhibit biofilm formation and C. jejuni in the mixed-microbial population. Further studies are required to establish control measures against the formation of biofilms containing C. jejuni in poultry processing plants and farms in New Zealand to reduce the reservoir of contamination and thus reduce the incidence of campylobacteriosis. | <urn:uuid:504a3ae6-d67b-453a-9c4c-b3b23ca698e1> | {
"date": "2018-11-18T08:55:37",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744320.70/warc/CC-MAIN-20181118073231-20181118095231-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9371351599693298,
"score": 2.578125,
"token_count": 549,
"url": "https://mro.massey.ac.nz/handle/10179/782"
} |
Fact: There is no scientific data that proves that eliminating gluten promotes weight loss. Any time we try something new, we are “all in,” at least at the onset, with a keen and committed attention to our nutrition, physical activity, and avoidance of what we (or the internet) consider “bad food.” So yes, there can be indirect weight loss for some people due to cutting down on calories as a result of elimination of certain foods or even an entire food group. Additionally, if processed gluten foods are being replaced with fruits and vegetables, some weight loss will likely occur.
Viewing entries in
Carbohydrates always seem to get a negative reputation. There are so many common misconceptions about carbohydrates, and it can be hard to keep in mind that carbs are good for us as part of a nutritious and balanced diet. To that end, I’ve gathered some common myths about carbohydrates that I hear all the time.
Calories count, but so does the quality of the food we are eating. So if you’re trying to manage your weight, go ahead and cut calories, but also choose the right foods in order to eat a combination of all three macronutrients: protein, fat, and carbohydrates.
Is going "gluten free" connected to weight loss? Here's what Registered Dietitian and Nutritionist Lela Iliopoulos has to say. | <urn:uuid:4c9fb3d9-0816-493e-ab47-56c702d1bb95> | {
"date": "2019-04-22T15:56:35",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578558125.45/warc/CC-MAIN-20190422155337-20190422181337-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9551109075546265,
"score": 2.515625,
"token_count": 289,
"url": "http://www.breadsense.com/news/category/Gluten"
} |
What Is Natural Law?
1 Answer | Add Yours
Natural law is the theory that some laws are basic to human nature. These laws can be known only through human reason, without reference to man-made law. Roman orator (public speaker) and philosopher Cicero (106–43 B.C.) insisted that natural law is universal, meaning that it is binding to governments and people everywhere.
Further Information:"Natural Law." Electric Library. [Online] Available http://www.encyclopedia.com/articles/09044.html, November 7, 2000; "Natural Law." Internet Encyclopedia of Philosophy. [Online] Available http://www.utm.edu/research/iep/n/natlaw.htm, November 7, 2000; Sells, Benjamin. Order in the Court: Crafting a More Just World in Lawless Times. Boston: Element, 1999.
Join to answer this question
Join a community of thousands of dedicated teachers and students.Join eNotes | <urn:uuid:46b6d502-c0f6-4d41-870a-6319363eefa8> | {
"date": "2015-05-26T10:20:30",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928817.87/warc/CC-MAIN-20150521113208-00149-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8607832193374634,
"score": 2.96875,
"token_count": 204,
"url": "http://www.enotes.com/homework-help/what-natural-law-288274"
} |
The E layer is a region of the ionosphere, extending from about 90-150 kilometres above the Earth, which influences long-distance communications by strongly reflecting radio waves in the 1-3 megahertz. It is also called E region, Heaviside layer, or Kennelly-Heaviside layer. This region reflects radio waves of medium wavelength and allows their reception around the surface of the Earth. The layer approaches the Earth by day and recedes from it at night. In medical terms, it is a cylinder of relativistic electrons gyrating in the magnetic field, which produces a self field strong enough to dominate the externally applied field and produces half reversal in the system. Since the mid ’20s, another connection regarding the ionosphere has been hypothesized that lightning can interact with the lower ionosphere. According to this theory, thunderstorms could modulate the transient, localized patches of relatively high-electron density in the mid-ionosphere E layer, which significantly affects radiowave propogation.
Tags Cylinder of Relativistic Electrons Gyrating E Layer E Region Heaviside Layer High-Electron Density Ionosphere Kennelly-Heaviside Layer Lower Ionosphere Magnetic Field Medical Terms Medium Wavelength Radio Waves Surface Of Earth
Originally, it was thought that the centre of the earth has magnetized iron deposits, which … | <urn:uuid:1aa89ba3-31b4-40df-87db-e23593c54905> | {
"date": "2017-06-25T01:56:07",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00017.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9044759273529053,
"score": 4.0625,
"token_count": 280,
"url": "http://www.4to40.com/wordpress/kids-questions-answers/science-mathematics-questions-answers/what-is-the-e-layer/"
} |
How much do you know about units of the National Park System that are designated "National Recreation Area"? Take this quiz and find out. Answers are at the end.
1. A total of ______ National Park System units have National Recreation Area as part of their name.
2. Which of the following lists the National Park System's three most popular National Recreation Areas in the order of their popularity, from most recreational visits to fewest?
a. Gateway, Lake Mead, Golden Gate
b. Golden Gate, Gateway, Lake Mead
c. Lake Mead, Golden Gate, Gateway
d. Gateway, Lake Mead, Golden Gate
3. The state with the most National Recreation Area-designated units of the National Park System wholly or partially within its borders is
4. The ______ National Park was formerly a National Recreation Area.
a. Cuyahoga Valley
b. Channel Islands
c. Lassen Volcanic
5. The ______ National Recreation Area consists mostly of non-federal land.
a. Lake Meredith
b. Lake Roosevelt
c. Santa Monica Mountains
6. Prior to the establishment of ______ National Recreation Area, all of the National Recreation Areas in the National Park System were reservoir-focused.
b. Boston Harbor Islands
c. Delaware Water Gap
d. Cuyahoga Valley
7. In 1976, Congress abolished Platt National Park and made it a component of ______ National Recreation Area.
c. Ross Lake
8. Formerly named Sanford National Recreation Area, ______ National Recreation Area is focused on a reservoir impounded by the Sanford Dam on the Canadian River.
a. Lake Meredith
b. Lake Roosevelt
d. Ross Lake
9. California's Whiskeytown-Shasta-Trinity National Recreation Area is co-managed by the National Park Service and
a. California State Parks
b. the Bureau of Reclamation
c. the U.S. Fish and Wildlife Service
d. the U.S. Forest Service
10. The ______ National Recreation Area lies partly within the Crow Indian Reservation.
a. Santa Monica Mountains
b. Bighorn Canyon
c. Lake Chelan
d. Glen Canyon
Extra Credit Question:
11. Only two National Recreation Areas have the word "River" as part of their name. Can you identify both of them? (Note: The National Park Service does not categorize the Big South Fork National River and Recreation Area and the Mississippi National River and Recreation Area as National Recreation Areas. Both are categorized as National Rivers.)
Super Bonus Question:
12. The ______ National Recreation Area was the first National Recreation Area to be created by an Act of Congress instead of an interagency agreement.
a. Lake Mead
b. Delaware Water Gap
c. Golden Gate
d. Santa Monica Mountains
(1) b -- The National Park System has 18 National Recreation Area-designated units.
(2) b -- With a little over 15 million recreational visits, Golden Gate was the most popular National Recreation Area in 2009. Gateway was a distant second (9.0 million visits) and Lake Mead came in third (7.7 million visits).
(3) d -- California has three National Recreation Area-designated NPS units: Golden Gate, Santa Monica Mountains, and Whiskeytown-Shasta-Trinity.
(4) a -- Cuyahoga Valley National Recreation Area was authorized in 1974, established in 1976, and redesignated Cuyahoga National Park in 2000.
(5) c -- Nonfederal land accounts for a little over 85% of the area of the 154,095-acre Santa Monica Mountains National Recreation Area, which is located near Los Angeles. The other three National Recreation Areas mentioned (Curecanti, Lake Roosevelt and Lake Meredith) consist entirely of federal land.
(6) c - Delaware Water Gap, preserves relatively unspoiled land on both the New Jersey and Pennsylvania sides of the Middle Delaware River. When it was authorized on September 1, 1965, it became the first National Recreation Area in the National Park System that was not reservoir-focused.
(7) d -- Platt National Park, which was created in 1906 from Sulphur Springs Reservation in south-central Oklahoma, was abolished in 1976 and combined with Arbuckle National Recreation Area (and additional lands) to form Chickasaw National Recreation Area.
(8) a -- Lake Meredith National Recreation Area, which is located on the Canadian River in the Texas panhandle, was called Sanford National Recreation Area prior to a 1972 redesignation.
(9) d -- The National Park Service manages the Whiskeytown unit of Whiskeytown-Shasta-Trinity National Recreation Area and the U.S. Forest Service manages the rest.
(10) b -- The 120,296-acre Bighorn Canyon National Recreation Area lies partly within the Crow Indian Reservation in south-central Montana.
(11) The only two National Recreation Areas that have "River" as part of their name are Georgia's Chattahoochee River National Recreation Areas and West Virginia's Gauley River National Recreation Area.
(12) a -- Lake Mead National Recreation Area was established by an Act of Congress in 1964. Before that, National Recreation Areas were established only by interagency agreements.
Grading: 9 or 10 correct, rest on your laurels; 7 or 8 correct, pretty darn good; 6 correct, passable fair; 5 or fewer correct, nothing to brag about. | <urn:uuid:a0e53e24-b341-46f6-84d8-93a334c9fa30> | {
"date": "2016-06-29T16:23:29",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00128-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.917522668838501,
"score": 3.203125,
"token_count": 1137,
"url": "http://www.nationalparkstraveler.com/item/national-park-quiz-89-national-recreation-areas"
} |
Class Teacher: Miss Ripley
Senior Teaching Assistant: Mrs Watts
This term, our topic is: Invaders and Settlers. We will be studying the Romans in the first half term and the Anglo-Saxons in the second half term.
Throughout this topic in the first half term, the children will explore the life of a Roman, design and create a Roman shield and also link their physical education by playing Hockey, taught as an invasion game.
Swimming and PE:
Swimming sessions take place on a Wednesday afternoon. Our second PE lesson takes place on a Thursday afternoon in school. Please ensure that children have their full PE/swimming kit in school on these days, long hair to be tied back and no jewellery is to be worn. Trainers will be needed on a Thursday for an outdoor PE session (weather dependent).
Year 4 - Autumn 1 Newsletter
As mentioned in the Autumn 1 newsletter, it is important that your child is reading regularly at home. In Year 4, children are expected to read at least 5 times a week for about 10 minutes. Please use this time to discuss the book and ask appropriate questions to further develop comprehension skills. Reading can be done independently, although it is still important that your child reads aloud regularly too. Please ensure that comments are added to your child's reading record. Reading records should be in school each day as they are checked each Tuesday but they are used to support communication between home and school too.
CLIC, Learn Its and SAFE:
CLIC and Learn Its are tested each Tuesday morning. The sheets will be taken home on a Tuesday after school and children are expected to practise any incorrect questions in preparation for the following week.
Likewise, the SAFE worksheets are completed each Friday morning and are taken home on a Friday after school.
Learn Its Homework
High Frequency Words:
Each half term, children will be tested on a set of High Frequency words (there are 6 lists in total). These words appear frequently in their reading books as children move through the school. We will identify the words your child needs to learn and they will be able to practise them during registration time each Thursday morning.
High Frequency Words List
Each Monday, children are introduced to their spelling focus and pattern. They will be given tips on how to remember to use the pattern and any rules that may apply. There are three spelling groups this term. Please find your group's spellings from the correct table below for this week (15/10/2018). The red and orange words for this week are also listed below. | <urn:uuid:3cd13ace-520e-4401-a6db-bd125e76e6b6> | {
"date": "2018-10-21T20:59:40",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514355.90/warc/CC-MAIN-20181021203102-20181021224602-00176.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9254518151283264,
"score": 3.609375,
"token_count": 525,
"url": "http://yarlsideacademy.org/year_4.html"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.